Home
last modified time | relevance | path

Searched refs:OS (Results 1 – 25 of 37) sorted by relevance

12

/trusted-firmware-a-3.6.0-3.5.0/docs/components/spd/
Doptee-dispatcher.rst4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.
9 There are two different modes for loading the OP-TEE OS. The default mode will
11 platforms to use. There is also another technique that will load OP-TEE OS after
15 understand the risks involved with allowing the Trusted OS to be loaded this
30 .. _OP-TEE OS: https://github.com/OP-TEE/build
Dpnc-dispatcher.rst7 ProvenCore is a secure OS developed by ProvenRun S.A.S. using deductive formal methods.
Dtlk-dispatcher.rst20 TLK is a Trusted OS running as Secure EL1. It is a Free Open Source Software
/trusted-firmware-a-3.6.0-3.5.0/docs/design_documents/
Dpsci_osi_mode.rst1 PSCI OS-initiated mode
31 OS-initiated.
43 OS-initiated
46 OS-initiated mode is optional.
48 In OS-initiated mode, the calling OS is responsible for coordinating power
55 There are two reasons why OS-initiated mode might be a more suitable option than
65 In OS-initiated mode, the OS has knowledge of the next wakeup event for each
75 In platform-coordinated mode, the OS doesn't have visibility when the last core
76 at a power level enters a low-power state. If the OS wants to perform last man
80 platform-coordinated mode when it should be using OS-initiated mode instead.
[all …]
/trusted-firmware-a-3.6.0-3.5.0/make_helpers/
Dbuild_env.mk43 ifdef OS
44 ifneq ($(findstring ${OS}, Windows_NT),)
/trusted-firmware-a-3.6.0-3.5.0/docs/about/
Dfeatures.rst35 for example an AArch32 Secure OS.
57 - SPDs for the `OP-TEE Secure OS`_, `NVIDIA Trusted Little Kernel`_,
58 `Trusty Secure OS`_ and `ProvenCore Secure OS`_.
125 .. _OP-TEE Secure OS: https://github.com/OP-TEE/optee_os
127 .. _Trusty Secure OS: https://source.android.com/security/trusty
128 .. _ProvenCore Secure OS: https://provenrun.com/products/provencore/
/trusted-firmware-a-3.6.0-3.5.0/docs/plat/
Dallwinner.rst73 entirely. Any bootloader or OS would need to setup the PMIC on its own then.
137 Trusted OS dispatcher
140 One can boot Trusted OS(OP-TEE OS, bl32 image) along side bl31 image on Allwinner A64.
143 while compiling the bl31 image and make sure the loader (SPL) loads the Trusted OS binary to
Dnvidia-tegra.rst74 Trusted OS dispatcher
77 Tegra supports multiple Trusted OS'.
84 This allows other Trusted OS vendors to use the upstream code and include
87 These are the supported Trusted OS' by Tegra platforms.
118 size for loading the Trusted OS and the UART port ID to be used. The Tegra
/trusted-firmware-a-3.6.0-3.5.0/lib/zlib/
Dinflate.h24 OS, /* i: waiting for extra flags and operating system (gzip) */ enumerator
/trusted-firmware-a-3.6.0-3.5.0/plat/arm/board/fvp/fdts/
Dfvp_fw_config.dts40 /* If required, SPD should enable loading of trusted OS fw config */
/trusted-firmware-a-3.6.0-3.5.0/docs/components/
Del3-spmc.rst239 The request made by an Hypervisor or OS kernel is forwarded to the SPMC and
253 When invoked from the Hypervisor or OS kernel, the buffers are mapped into the
258 caller, either it being the Hypervisor or OS kernel, as well as a secure
267 - from Hypervisor or OS kernel to SPMC. The request is relayed by the SPMD.
285 (or OS Kernel if Hyp is absent), SPMD and SPMC.
325 - An SP cannot send a direct request to an Hypervisor or OS kernel.
326 - An Hypervisor or OS kernel can send a direct request to an SP or LSP.
327 - An SP and LSP can send a direct response to an Hypervisor or OS kernel.
343 The Hypervisor or OS kernel can issue the FFA_SPM_ID_GET call handled by the
409 - The Hypervisor or OS kernel is the component initiating PSCI service calls.
[all …]
Dsecure-partition-manager.rst115 (Hypervisor or OS kernel) to the SPMC.
353 Secure Payload BL32 (Trusted OS): offset=0x1BCD1, size=0x15270, cmdline="--tos-fw"
470 or the SPMC itself, the OS Kernel/Hypervisor, or other NWd VMs. The SPMC
538 secure partitions. For this a VM (Hypervisor or OS kernel), or SP invokes one of:
720 deployed in NWd, the Hypervisor or OS kernel must invoke the interface
813 - Hypervisor or OS kernel in NS-EL1/EL2: the SPMD returns the SPMC version
827 The request made by an Hypervisor or OS kernel is forwarded to the SPMC and
837 When invoked from the Hypervisor or OS kernel, the buffers are mapped into the
846 caller, either it being the Hypervisor or OS kernel, as well as a secure
855 - from Hypervisor or OS kernel to SPMC. The request is relayed by the SPMD.
[all …]
Ddebugfs-design.rst106 the higher level OS if the latter implements its own driver for the same
/trusted-firmware-a-3.6.0-3.5.0/docs/security_advisories/
Dsecurity-advisory-tfv-6.rst57 Note that if other privileged software, for example a Rich OS kernel, implements
117 integrated, for example as part of a Trusted OS. Therefore any Variant 2
133 applicable for TF. However, Secure Payloads (for example, Trusted OS) should
Dsecurity-advisory-tfv-9.rst97 In case local workaround is not feasible, the Rich OS can invoke the SMC
/trusted-firmware-a-3.6.0-3.5.0/docs/getting_started/
Drt-svc-writers-guide.rst22 Arm to support `PSCI`_, Secure Monitor for a Trusted OS and SoC specific
42 reserved exclusively for Trusted OS providers or for interoperability with
55 Fast 50-63 Trusted OS calls
58 Yielding 2-63 Trusted OS Standard Calls
305 Services that handle SMC Functions targeting a Trusted OS, Trusted Application,
Dimage-terminology.rst77 Typically this is a TEE or Trusted OS, providing runtime secure services to the
88 For example, UEFI or uboot. Its primary purpose is to boot a normal world OS.
Dinitial-build.rst76 include other runtime services, for example Trusted OS services. A guide
Dtools-build.rst7 can be used if not updating the OpenSSL version on the OS. In order to do
/trusted-firmware-a-3.6.0-3.5.0/docs/plat/marvell/armada/
Dbuild.rst98 by Trusted OS (OP-TEE OS, BL32). The TF-A only prepares CCU address translation windows
100 When Trusted OS activates LLC SRAM, the CCU window target is changed to SRAM.
101 There is no reason to enable this feature if OP-TEE OS built with CFG_WITH_PAGER=n.
102 Only set LLC_SRAM=1 if OP-TEE OS is built with CFG_WITH_PAGER=y.
/trusted-firmware-a-3.6.0-3.5.0/docs/
Dglossary.rst229 Trusted Little Kernel. A Trusted OS from NVIDIA.
/trusted-firmware-a-3.6.0-3.5.0/docs/threat_model/
Dthreat_model.rst96 | DF4 | | Secure world software (e.g. trusted OS) interact |
100 | DF5 | | Non-secure world software (e.g. rich OS) interact |
300 | | physically, through the Rich OS, or using the |
947 | | untrusted binary as the secure OS.** |
978 | | the non-secure OS must be considered a closed |
/trusted-firmware-a-3.6.0-3.5.0/docs/design/
Dtrusted-board-boot-build.rst42 are loaded from that path instead of the default OS path. Export this
/trusted-firmware-a-3.6.0-3.5.0/docs/plat/nxp/
Dnxp-layerscape.rst179 + EL1 BL32(Tee OS) | kernel
195 + EL1 fip-ddr BL32(Tee OS) | kernel
/trusted-firmware-a-3.6.0-3.5.0/docs/process/
Dcoding-guidelines.rst311 - BL31 Trusted OS SPD code discovers that BL2 has not loaded the corresponding
312 Trusted OS, which is critical for platform operation.
339 - A Trusted OS is waiting for a response from a proxy in the normal world that

12