Home
last modified time | relevance | path

Searched refs:service (Results 1 – 25 of 41) sorted by relevance

12

/rk3399_ARM-atf/common/
H A Druntime_svc.c109 rt_svc_desc_t *service = &rt_svc_descs[index]; in runtime_svc_init() local
116 rc = validate_rt_svc_desc(service); in runtime_svc_init()
119 (void *) service); in runtime_svc_init()
130 if (service->init != NULL) { in runtime_svc_init()
131 rc = service->init(); in runtime_svc_init()
134 service->name); in runtime_svc_init()
145 start_idx = (uint8_t)get_unique_oen(service->start_oen, in runtime_svc_init()
146 service->call_type); in runtime_svc_init()
147 end_idx = (uint8_t)get_unique_oen(service->end_oen, in runtime_svc_init()
148 service->call_type); in runtime_svc_init()
/rk3399_ARM-atf/docs/getting_started/
H A Drt-svc-writers-guide.rst7 This document describes how to add a runtime service to the EL3 Runtime
17 SMC Functions are grouped together based on the implementor of the service, for
24 dispatched to their respective service implementation - the
80 handler will be responsible for all SMC Functions within a given service type.
86 each owning entity can place the implementation of its runtime service. The
89 Runtime service sources will need to include the ``runtime_svc.h`` header file.
91 Registering a runtime service
94 A runtime service is registered using the ``DECLARE_RT_SVC()`` macro, specifying
95 the name of the service, the range of OENs covered, the type of service and
130 During initialization the services framework validates each declared service
[all …]
/rk3399_ARM-atf/docs/components/
H A Darm-sip-service.rst18 - Execution State Switching service
20 Source definitions for Arm SiP service are located in the ``arm_sip_svc.h`` header
31 *Table 1: Showing different versions of arm-sip-service and changes done with each version*
33 Execution State Switching service
36 Execution State Switching service provides a mechanism for a non-secure lower
39 AArch32, or from AArch32 to AArch64, for the calling CPU. This service is only
59 Execution State Switching service being requested. argument
80 The service may return the following error codes:
H A Dven-el3-service.rst61 *Table 1: Showing different versions of Vendor-specific service and changes done with each version*
63 Each sub service will have its own version, one FID allocated for sub service version.
66 - VEN_EL3_SVC_VERSION_MAJOR is incremented when any of the sub service version discovery
69 - VEN_EL3_SVC_VERSION_MINOR is incremented when we add a new FID or a new sub service.
70 For example adding an new monitor service at 0x30, Debugfs starts at 0x10 and PMF
83 The optional DebugFS interface is accessed through Vendor specific EL3 service. Refer
H A Dindex.rst10 arm-sip-service
29 ven-el3-service
H A Dsecure-partition-manager-mm.rst20 fulfils the requirements of a security service as described above.
23 in the system, i.e. EL3 in Trusted Firmware-A (TF-A). The service requirements are
33 other interfaces (e.g. ACPI TCG TPM interface, UEFI runtime variable service).
82 fulfil a service request.
90 service requests.
93 accessing the services exported by a Secure Partition. A service can be
114 service always runs to completion (e.g. the requested services cannot be
183 0060A*) is used to invoke a Secure Partition service as a Fast Call.
185 The mechanism used to identify a service within the partition depends on the
186 service implementation. It is assumed that the caller of the service will be
[all …]
H A Ddebugfs-design.rst103 - On concurrent access, a spinlock is implemented in the BL31 service to protect
125 .. _ARM SiP Services: arm-sip-service.rst
H A Dven-el3-debugfs.rst4 The optional DebugFS interface is accessed through a Vendor specific EL3 service. Refer
H A Drealm-management-extension.rst71 RMMD is a new standard runtime service that handles the switch to the Realm
H A Dgranule-protection-tables-design.rst83 structure used by the granule transition service which will be covered more
182 #. In systems that make use of the granule transition service, runtime
/rk3399_ARM-atf/docs/perf/
H A Dpsci-performance-instr.rst27 instance, the PSCI Statistics service registers the PMF service
32 values from ``psci_svc`` at runtime. Alternatively, the service may be
35 service.
42 PSCI Statistics is a runtime service that provides residency statistics for
43 power states used by the platform. The service tracks residency time and
85 around the PMF to provide timestamp data. Although the service is not
92 In PSCI, this service provides instrumentation points in the
102 The service captures the cycle count, which allows for the time spent in the
H A Dtsp.rst7 The TSP is coupled with a companion runtime service in the BL31 firmware,
/rk3399_ARM-atf/docs/plat/
H A Damd-versal2.rst63 CUSTOM SIP service.
66 ``custom_smc_handler`` in this service.
68 - To use this service, the custom package should implement its own SMC handler
135 Call UID Query – Returns a unique identifier of the service provider.
137 Revision Query – Returns revision details of the service implementor.
H A Dxilinx-zynqmp.rst133 CUSTOM SIP service support
138 providing CUSTOM SIP service.
141 custom_smc_handler in this service.
143 - to use this service, custom package should implement their
209 Call UID Query – Returns a unique identifier of the service provider.
211 Revision Query – Returns revision details of the service implementor.
213 CUSTOM SIP service support
H A Dxilinx-versal.rst80 CUSTOM SIP service.
83 ``custom_smc_handler`` in this service.
85 - To use this service, the custom package should implement its own SMC handler
173 Call UID Query – Returns a unique identifier of the service provider.
175 Revision Query – Returns revision details of the service implementor.
H A Dxilinx-versal-net.rst114 Call UID Query – Returns a unique identifier of the service provider.
116 Revision Query – Returns revision details of the service implementor.
H A Ds32g274a.rst7 service-oriented gateways, domain controllers, zonal processors, safety
13 engineering for vehicle service-oriented gateway (SoG), domain control
/rk3399_ARM-atf/docs/design_documents/
H A Dmeasured_boot_poc.rst20 a firmware TPM (fTPM) service implemented on top of OP-TEE.
25 party (f)TPM service and they try to be as general as possible. Different
28 (or even a different type of service to provide the attestation)
40 contain a third party fTPM service which in turn will be used to process the
44 for convenience. As the fTPM service used is an OP-TEE TA, it was easy to add
50 - **OP-TEE**: As stated earlier, the fTPM service used in this PoC is built as an
59 - **fTPM Service**: We use a third party fTPM service in order to validate
60 the Measured Boot functionality. The chosen fTPM service is a sample
62 reference implementation from Microsoft. The service was updated in order
68 Arm does not provide an fTPM implementation. The fTPM service used here
[all …]
H A Drse.rst138 description, measurement algorithm, etc.). More info on measured boot service
141 delegated attestation key. More info on the delegated attestation service
153 Runtime service API
214 | service | | service |
225 service which is meant to store measurements and associated metadata alongside.
433 The detailed description of the delegated attestation service can be found in
437 attestation service of the RSE to get a realm attestation key and the CCA
438 platform token. BL31 does not use the service for its own purpose, only calls
685 The ``DICE Protection Environment (DPE)`` [8]_ service makes it possible to
688 that act on opaque context handles. The |DPE| service performs |DICE|
[all …]
/rk3399_ARM-atf/docs/design/
H A Dinterrupt-framework-design.rst275 #. Secure Payload Dispatcher (SPD) service. This service interfaces with the
282 the SPD service. TF-A implements an example Test Secure Payload Dispatcher
283 (TSPD) service.
285 An SPD service plugs into the EL3 runtime firmware and could be common to
290 SPD service to manage communication with non-secure software. TF-A
295 just like the SPD service.
349 particular type of interrupt. A Secure Payload Dispatcher service should use
401 A SPD service is responsible for determining and maintaining the interrupt
408 If the routing model is not known to the SPD service at build time, then it must
415 could either be provided to the SPD service at build time or by the SP at
[all …]
H A Dfirmware-design.rst12 TF-A also implements the `PSCI`_ as a runtime service. PSCI is the interface
544 The runtime service framework and its initialization is described in more
554 Dispatcher (SPD) service (see later for details). During initialization
555 that service must register a function to carry out initialization of BL32
841 #. Standard service calls
843 This service is for management of the entire system. The Power State
844 Coordination Interface (`PSCI`_) is the first set of standard service calls
847 #. Secure-EL1 Payload Dispatcher service
859 service - within TF-A this service is referred to as the Secure-EL1 Payload
866 #. CPU implementation service
[all …]
/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dthreat_model_el3_spm.rst127 - Denial of service
533 | | SPMC with requests targeting a service within an |
535 | | access this service.** |
538 | | a service within an endpoint such that the latter |
551 | Threat Type | Denial of service |
563 | | Other quality of service monitoring can be achieved|
588 | Threat Type | Denial of service |
/rk3399_ARM-atf/docs/resources/diagrams/plantuml/
H A Drse_measured_boot_flow.puml52 Measured Boot service to\n\ measurement slots.
/rk3399_ARM-atf/docs/components/fconf/
H A Dtb_fw_bindings.rst121 - A string identifying the UUID of the service implemented by this partition.
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-9.rst109 firmware service. This patch also implements ``SMCCC_ARCH_WORKAROUND_3`` for

12