| /rk3399_ARM-atf/docs/design/ |
| H A D | reset-design.rst | 58 Therefore, the cold boot code has to arbitrate access to hardware resources 166 .. |Default reset code flow| image:: ../resources/diagrams/default_reset_code.png 167 .. |Reset code flow with programmable reset address| image:: ../resources/diagrams/reset_code_no_bo… 168 .. |Reset code flow with single CPU released out of reset| image:: ../resources/diagrams/reset_code… 169 …rammable reset address and single CPU released out of reset| image:: ../resources/diagrams/reset_c…
|
| H A D | trusted-board-boot.rst | 179 .. image:: ../resources/diagrams/cot-tbbr.jpg 199 .. image:: ../resources/diagrams/cot-dualroot.jpg
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | cmake_framework.rst | 104 In the provisioning phase, first we have to obtain the necessary resources, i.e. 153 ../resources/diagrams/cmake_framework_structure.png 157 ../resources/diagrams/cmake_framework_workflow.png
|
| H A D | psci_osi_mode.rst | 376 .. image:: ../resources/diagrams/psci-osi-mode.png 682 * State3 - L3 cache off and system resources voted off 694 * State3 - L3 cache off and system resources voted off 696 .. image:: ../resources/diagrams/psci-flattened-vs-hierarchical-idle-states.png 709 .. image:: ../resources/diagrams/psci-pc-mode-vs-osi-mode.png
|
| H A D | dtpm_drivers.rst | 118 ../resources/diagrams/rpi3_dtpm_driver.png
|
| H A D | rse.rst | 305 information loss. Since RSE is not constrained on special HW resources to 376 .. figure:: ../resources/diagrams/rse_measured_boot_flow.svg 470 .. figure:: ../resources/diagrams/rse_attestation_flow.svg
|
| /rk3399_ARM-atf/plat/amd/versal2/ |
| H A D | scmi.c | 219 static const struct scmi_resources resources[] = { variable 232 assert(agent_id < ARRAY_SIZE(resources)); in find_resource() 234 return &resources[agent_id]; in find_resource()
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | imx8.rst | 19 control for system-level resources on i.MX8. The heart of the system
|
| H A D | xilinx-zynqmp.rst | 130 The 4 leaf power domains represent the individual A53 cores, while resources
|
| /rk3399_ARM-atf/docs/plat/nxp/ |
| H A D | nxp-layerscape.rst | 465 .. _ls1028ardb: https://www.nxp.com/design/qoriq-developer-resources/layerscape-ls1028a-reference-d… 467 .. _ls1043ardb: https://www.nxp.com/design/qoriq-developer-resources/layerscape-ls1043a-reference-d… 469 .. _ls1046ardb: https://www.nxp.com/design/qoriq-developer-resources/layerscape-ls1046a-reference-d… 470 .. _ls1046afrwy: https://www.nxp.com/design/qoriq-developer-resources/ls1046a-freeway-board:FRWY-LS… 472 .. _ls1088ardb: https://www.nxp.com/design/qoriq-developer-resources/layerscape-ls1088a-reference-d…
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_rse_interface.rst | 27 .. uml:: ../../resources/diagrams/plantuml/tfa_rse_dfd.puml
|
| H A D | threat_model_el3_spm.rst | 40 .. uml:: ../../resources/diagrams/plantuml/el3_spm_dfd.puml 584 | Assets | Shared resources, Scheduling cycles. | 599 | | take ownership of shared resources. It should |
|
| H A D | threat_model_firmware_handoff.rst | 44 .. uml:: ../../resources/diagrams/plantuml/firmware_handoff_dfd.puml
|
| H A D | threat_model_arm_cca.rst | 89 .. uml:: ../../resources/diagrams/plantuml/tfa_arm_cca_dfd.puml
|
| H A D | threat_model.rst | 59 .. uml:: ../../resources/diagrams/plantuml/tfa_dfd.puml 153 | | TF-A resources | 220 | | with other | and resources | 416 | | lack of boundary checking when accessing resources |
|
| /rk3399_ARM-atf/docs/components/fconf/ |
| H A D | index.rst | 98 .. uml:: ../../resources/diagrams/plantuml/fconf_bl1_load_config.puml 108 .. uml:: ../../resources/diagrams/plantuml/fconf_bl2_populate.puml
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | numa-per-cpu.rst | 25 .. figure:: ../resources/diagrams/per-cpu-numa-disabled.png 64 .. figure:: ../resources/diagrams/per-cpu-numa-enabled.png 91 .. figure:: ../resources/diagrams/per-cpu-false-sharing.png
|
| H A D | romlib-design.rst | 26 .. image:: ../resources/diagrams/romlib_design.png 57 .. image:: ../resources/diagrams/romlib_wrapper.png
|
| H A D | secure-partition-manager-mm.rst | 47 resources. Essentially, it is a software sandbox in the Secure world that runs 49 accesses the following system resources: 79 - Allocate resources requested by the Secure Partition. 146 Describing Secure Partition resources 150 resources required by the Secure Partition. Some instructions are given below. 236 operations typically require access to system resources that are either shared 785 - ``NO_MEMORY``: The SPM does not have memory resources to change the 843 .. |Image 1| image:: ../resources/diagrams/secure_sw_stack_tos.png 844 .. |Image 2| image:: ../resources/diagrams/secure_sw_stack_sp.png
|
| H A D | context-management-library.rst | 586 .. |Context Memory Allocation| image:: ../resources/diagrams/context_memory_allocation.png 587 .. |CPU Context Memory Configuration| image:: ../resources/diagrams/cpu_data_config_context_memory.… 588 .. |CPU Data Structure| image:: ../resources/diagrams/percpu-data-struct.png 589 .. |Context Init ColdBoot| image:: ../resources/diagrams/context_init_coldboot.png 590 .. |Context Init WarmBoot| image:: ../resources/diagrams/context_init_warmboot.png 591 .. |Root Context Sequence| image:: ../resources/diagrams/root_context_sequence.png
|
| H A D | firmware-update.rst | 78 .. image:: ../resources/diagrams/PSA-FWU.png 495 .. |Flow Diagram| image:: ../resources/diagrams/fwu_flow.png 496 .. |FWU state machine| image:: ../resources/diagrams/fwu_states.png
|
| H A D | realm-management-extension.rst | 19 .. image:: ../resources/diagrams/arm-cca-software-arch.png
|
| H A D | sdei.rst | 29 .. uml:: ../resources/diagrams/plantuml/sdei_general.puml 231 .. uml:: ../resources/diagrams/plantuml/sdei_explicit_dispatch.puml
|
| H A D | ras.rst | 178 .. image:: ../resources/diagrams/draw.io/ras.svg 375 .. |Image 1| image:: ../resources/diagrams/bl31-exception-entry-error-synchronization.png
|
| /rk3399_ARM-atf/docs/threat_model/ |
| H A D | supply_chain_threat_model.rst | 22 resources used throughout the development and/or build process such as 185 | | with other vulnerabilities | resources. | 757 .. |TF-A System Diagram| image:: ../resources/diagrams/tf-a_system_diagram.png 758 .. |TF-A Data Flow Diagram| image:: ../resources/diagrams/tf-a_data_flow_diagram.png 759 .. |TF-A Attack Tree| image:: ../resources/diagrams/tf-a_attack_tree.png
|