Home
last modified time | relevance | path

Searched refs:AP (Results 1 – 21 of 21) sorted by relevance

/trusted-firmware-a-3.7.0/docs/plat/marvell/armada/misc/
Dmvebu-a8k-addr-map.rst10 …|| AP DMA | | | | | +-------------+ …
11 …|| SD/eMMC | | CA72 CPUs | | AP MSS | +-------------+ …
14 …| | | | | +----- Translaton | |AP |…
19 …| | +-| translation | | Lookup +---- +--------- AP SPI |…
22 …| +------------| SMMU +---------+ | | Windows +--------- AP MCI0/1 |…
25 …| - | | +--------- AP STM |…
27 …| AP | | +-+---------+ …
Dmvebu-ccu.rst13 specific AP.
Dmvebu-io-win.rst24 specific AP.
/trusted-firmware-a-3.7.0/docs/threat_model/
Dthreat_model_rss_interface.rst1 Threat Model for RSS - AP interface
9 next to the Application Processor (AP).
15 AP. Otherwise, the TF-A :ref:`Generic Threat Model` document is applicable for
16 the AP core. The threat model for the RSS firmware will be provided by the RSS
23 it includes the RSS and highlights the interface between the AP and the RSS
24 cores. The interface description only focuses on the AP-RSS interface the rest
45 are applicable for the AP core, here only the differences are highlighted.
47 - ID 11: The access to the communication interface between AP and RSS is
Dthreat_model_arm_cca.rst105 | | measurements and retrieve data used for AP images |
/trusted-firmware-a-3.7.0/docs/getting_started/
Dimage-terminology.rst18 ambiguity (for example, within AP specific code/documentation), it is
52 AP Boot ROM: ``AP_BL1``
55 Typically, this is the first code to execute on the AP and cannot be modified.
57 and authenticate an updateable AP firmware image into an executable RAM
60 AP RAM Firmware: ``AP_BL2``
63 This is the 2nd stage AP firmware. It is currently also known as the "Trusted
71 Also known as "SoC AP firmware" or "EL3 monitor firmware". Its primary purpose
82 abbreviation should be avoided; use the recommended **Other AP 3rd level
85 AP Normal World Firmware: ``AP_BL33``
90 Other AP 3rd level images: ``AP_BL3_XXX``
[all …]
/trusted-firmware-a-3.7.0/docs/plat/arm/tc/
Dindex.rst9 loaded by AP BL2 from FIP in flash to SRAM for copying by SCP (SCP has access
10 to AP SRAM).
27 The execution begins from SCP_BL1. SCP_BL1 powers up the AP which starts
29 FIP to SRAM. The SCP has access to AP SRAM. The address and size of SCP_BL2
31 RAM and starts executing it. The AP then continues executing the rest of TF-A
/trusted-firmware-a-3.7.0/docs/resources/diagrams/plantuml/
Drss_measured_boot_flow.puml13 box AP
54 == RSS Runtime / AP Boot phase ==
55 Rnote over RSS_S, AP_BL1: MHU init between RSS and AP
78 == RSS / AP Runtime ==
Drss_attestation_flow.puml4 box AP
/trusted-firmware-a-3.7.0/docs/plat/arm/morello/
Dindex.rst17 It performs minimum initialization necessary to load and authenticate the AP
18 firmware image (the FIP image) from the AP QSPI NOR Flash Memory into the
/trusted-firmware-a-3.7.0/include/plat/marvell/armada/a8k/common/
Darmada_common.h55 AP enumerator
/trusted-firmware-a-3.7.0/docs/design_documents/
Drss.rst5 (RSS) and the application processor (AP). According to the ARM reference design
6 the RSS is an independent core next to the AP and the SCP on the same die. It
12 its own images and the initial images of SCP and AP. When AP and SCP are
30 the communication. RSS is capable of mapping the AP memory to its address space.
32 data between memory belonging to RSS or AP. In this way, a bigger amount of data
38 interface. One pair provides message sending from AP to RSS and the other pair
39 from RSS to AP. The sender and receiver are connected via channels. There is an
74 | AP | | |
137 - ``OTP assets management``: Public keys used by AP during the trusted boot
138 process can be requested from RSS. Furthermore, AP can request RSS to
[all …]
/trusted-firmware-a-3.7.0/plat/marvell/armada/a8k/common/
Dplat_ble_setup.c658 case(AP): in ble_skip_image_gpio()
/trusted-firmware-a-3.7.0/docs/design/
Dtrusted-board-boot-build.rst88 - NS_BL2U. The AP non-secure Firmware Updater image.
Dfirmware-design.rst52 - Boot Loader stage 1 (BL1) *AP Trusted ROM*
60 - Boot Loader stage 1 (BL1) *AP Trusted ROM*
376 memory. The SCP executes SCP_BL2 and signals to the Application Processor (AP)
1832 | AP TZC |
1877 | AP TZC |
1921 | AP TZC |
1968 | AP TZC |
2010 | AP TZC |
/trusted-firmware-a-3.7.0/docs/plat/arm/
Darm-build-options.rst111 compatible change to the MTL protocol, used for AP/SCP communication.
/trusted-firmware-a-3.7.0/docs/perf/
Dpsci-performance-juno.rst380 AP CPU to enter WFI before making the channel available to other CPUs, which
/trusted-firmware-a-3.7.0/docs/plat/marvell/armada/
Dbuild.rst127 Total amount of CPs (South Bridge) connected to AP. When the parameter is omitted,
/trusted-firmware-a-3.7.0/docs/components/
Dfirmware-update.rst177 authentication). Secure world certificates and non-AP images are examples
/trusted-firmware-a-3.7.0/docs/
Dporting-guide.rst261 Defines the maximum message size between AP and RSS. Need to define if
322 If the AP Firmware Updater Configuration image, BL2U is used, the following
1973 The AP Firmware Updater Configuration, BL2U, is an optional part of the FWU
1977 #. (Optional) Transferring the optional SCP_BL2U binary image from AP secure
1979 ``SCP_BL2U_BASE`` defines the address in AP secure memory where SCP_BL2U
2055 Application Processor (AP) for BL2U execution to continue.
Dchange-log.md2272 …- add MHU addresses for AP-RSS comms on TC2 ([6299c3a](https://review.trustedfirmware.org/plugins/…
2273 …- add RSS-AP message size macro ([445130b](https://review.trustedfirmware.org/plugins/gitiles/TF-A…
3016 …- rename AP-RSS message size macro ([70247dd](https://review.trustedfirmware.org/plugins/gitiles/T…
3805 …- change the AP runtime UART address ([07302a2](https://review.trustedfirmware.org/plugins/gitiles…
7520 - Add support for SCMI AP core configuration protocol v1.0
7521 - Use SCMI AP core protocol to set the warm boot entrypoint
7758 for communication between SCP and the AP CPU, replacing Boot-Over_MHU (BOM)