/trusted-firmware-a-3.4.0/docs/components/spd/ |
D | optee-dispatcher.rst | 4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1. 13 .. _OP-TEE OS: https://github.com/OP-TEE/build
|
D | tlk-dispatcher.rst | 20 TLK is a Trusted OS running as Secure EL1. It is a Free Open Source Software
|
/trusted-firmware-a-3.4.0/make_helpers/ |
D | build_env.mk | 43 ifdef OS 44 ifneq ($(findstring ${OS}, Windows_NT),)
|
/trusted-firmware-a-3.4.0/docs/about/ |
D | features.rst | 35 for example an AArch32 Secure OS. 42 When a Secure-EL1 Payload (SP) is present, for example a Secure OS, the 49 - SPDs for the `OP-TEE Secure OS`_, `NVIDIA Trusted Little Kernel`_ 50 and `Trusty Secure OS`_. 121 .. _OP-TEE Secure OS: https://github.com/OP-TEE/optee_os 123 .. _Trusty Secure OS: https://source.android.com/security/trusty
|
/trusted-firmware-a-3.4.0/lib/zlib/ |
D | inflate.h | 24 OS, /* i: waiting for extra flags and operating system (gzip) */ enumerator
|
D | inflate.c | 732 state->mode = OS; 733 case OS:
|
/trusted-firmware-a-3.4.0/docs/plat/ |
D | allwinner.rst | 71 entirely. Any bootloader or OS would need to setup the PMIC on its own then. 135 Trusted OS dispatcher 138 One can boot Trusted OS(OP-TEE OS, bl32 image) along side bl31 image on Allwinner A64. 141 while compiling the bl31 image and make sure the loader (SPL) loads the Trusted OS binary to
|
D | nvidia-tegra.rst | 74 Trusted OS dispatcher 77 Tegra supports multiple Trusted OS'. 84 This allows other Trusted OS vendors to use the upstream code and include 87 These are the supported Trusted OS' by Tegra platforms. 118 size for loading the Trusted OS and the UART port ID to be used. The Tegra
|
/trusted-firmware-a-3.4.0/plat/arm/board/fvp/fdts/ |
D | fvp_fw_config.dts | 40 /* If required, SPD should enable loading of trusted OS fw config */
|
/trusted-firmware-a-3.4.0/docs/security_advisories/ |
D | security-advisory-tfv-6.rst | 57 Note that if other privileged software, for example a Rich OS kernel, implements 117 integrated, for example as part of a Trusted OS. Therefore any Variant 2 133 applicable for TF. However, Secure Payloads (for example, Trusted OS) should
|
D | security-advisory-tfv-9.rst | 97 In case local workaround is not feasible, the Rich OS can invoke the SMC
|
/trusted-firmware-a-3.4.0/docs/getting_started/ |
D | rt-svc-writers-guide.rst | 22 Arm to support `PSCI`_, Secure Monitor for a Trusted OS and SoC specific 42 reserved exclusively for Trusted OS providers or for interoperability with 55 Fast 50-63 Trusted OS calls 58 Yielding 2-63 Trusted OS Standard Calls 305 Services that handle SMC Functions targeting a Trusted OS, Trusted Application,
|
D | image-terminology.rst | 68 Typically this is a TEE or Trusted OS, providing runtime secure services to the 79 For example, UEFI or uboot. Its primary purpose is to boot a normal world OS.
|
D | initial-build.rst | 76 include other runtime services, for example Trusted OS services. A guide
|
D | psci-lib-integration-guide.rst | 5 integrate with a suitable Trusted OS for an Armv8-A AArch32 system. The PSCI 13 include Trusted OS functionality. A minimal AArch32 Secure Payload, SP-MIN, is
|
/trusted-firmware-a-3.4.0/docs/plat/marvell/armada/ |
D | build.rst | 98 by Trusted OS (OP-TEE OS, BL32). The TF-A only prepares CCU address translation windows 100 When Trusted OS activates LLC SRAM, the CCU window target is changed to SRAM. 101 There is no reason to enable this feature if OP-TEE OS built with CFG_WITH_PAGER=n. 102 Only set LLC_SRAM=1 if OP-TEE OS is built with CFG_WITH_PAGER=y.
|
/trusted-firmware-a-3.4.0/docs/components/ |
D | secure-partition-manager.rst | 115 (Hypervisor or OS kernel) to the SPMC. 358 Secure Payload BL32 (Trusted OS): offset=0x1BCD1, size=0x15270, cmdline="--tos-fw" 536 secure partitions. For this a VM (Hypervisor or OS kernel), or SP invokes one of: 713 deployed in NWd, the Hypervisor or OS kernel must invoke the interface 804 - Hypervisor or OS kernel in NS-EL1/EL2: the SPMD returns the SPMC version 818 The request made by an Hypervisor or OS kernel is forwarded to the SPMC and 828 When invoked from the Hypervisor or OS kernel, the buffers are mapped into the 833 caller, either it being the Hypervisor or OS kernel, as well as a secure 842 - from Hypervisor or OS kernel to SPMC. The request is relayed by the SPMD. 896 - An SP cannot send a direct request to an Hypervisor or OS kernel. [all …]
|
D | debugfs-design.rst | 106 the higher level OS if the latter implements its own driver for the same
|
D | secure-partition-manager-mm.rst | 23 phones, tablets, STBs and embedded devices, a Trusted OS instantiates trusted 26 used by Non-secure world applications to access these services. A Trusted OS 39 include a Global Platform Trusted OS. Security functions are accessed through 127 Payload image executing at S-EL1 (e.g. a Trusted OS). Both are referred to as
|
/trusted-firmware-a-3.4.0/docs/ |
D | glossary.rst | 202 Trusted Little Kernel. A Trusted OS from NVIDIA.
|
/trusted-firmware-a-3.4.0/docs/threat_model/ |
D | threat_model_spm.rst | 22 - Mutual isolation of the normal world and the secure world (e.g. a Trusted OS 136 (Hypervisor) or NS-EL1 (VM or OS kernel). 205 | | A similar component can exist in the OS kernel | 802 | | If Hypervisor or OS kernel are compromised, the | 837 | | If Hypervisor or OS kernel are compromised, the |
|
D | threat_model.rst | 74 | DF4 | | Secure world software (e.g. trusted OS) interact | 78 | DF5 | | Non-secure world software (e.g. rich OS) interact | 278 | | physically, through the Rich OS, or using the |
|
/trusted-firmware-a-3.4.0/docs/process/ |
D | coding-guidelines.rst | 311 - BL31 Trusted OS SPD code discovers that BL2 has not loaded the corresponding 312 Trusted OS, which is critical for platform operation. 339 - A Trusted OS is waiting for a response from a proxy in the normal world that
|
/trusted-firmware-a-3.4.0/docs/plat/nxp/ |
D | nxp-layerscape.rst | 179 + EL1 BL32(Tee OS) | kernel 195 + EL1 fip-ddr BL32(Tee OS) | kernel
|
/trusted-firmware-a-3.4.0/docs/design/ |
D | firmware-design.rst | 98 stages and also by the Normal World Rich OS. 102 - TOS_FW_CONFIG - Trusted OS Firmware configuration file. Used by Trusted OS 870 If a system runs a Trusted OS or other Secure-EL1 Payload (SP) then 874 `SMCCC`_ provides for such SMCs with the Trusted OS Call and Trusted 927 initialization. This happens prior to initializing a Trusted OS and running 956 OENs, e.g. SMCs to call a Trusted OS function. To optimize the lookup of a 1083 On a production system that includes a Trusted OS running in Secure-EL1/EL0, 1084 the Trusted OS is coupled with a companion runtime service in the BL31 1086 OS and all communications with it. The Trusted OS is the BL32 stage of the 1091 the *Secure-EL1 Payload* - as it is not always a Trusted OS. [all …]
|