Home
last modified time | relevance | path

Searched refs:model (Results 1 – 25 of 56) sorted by relevance

123

/trusted-firmware-a-latest/plat/rpi/rpi3/
Drpi3_bl1_setup.c72 const char __unused *model, __unused *info; in bl1_platform_setup() local
76 model = "Raspberry Pi 3 Model B"; in bl1_platform_setup()
80 model = "Raspberry Pi 3 Model B"; in bl1_platform_setup()
84 model = "Raspberry Pi 3 Model B+"; in bl1_platform_setup()
88 model = "Unknown"; in bl1_platform_setup()
94 NOTICE("rpi3: Detected: %s %s [0x%08x]\n", model, info, rev); in bl1_platform_setup()
/trusted-firmware-a-latest/docs/threat_model/
Dindex.rst8 platform's needs, providing a holistic threat model covering all of its features
10 documents which, together, form the project's threat model. These are
15 As the TF-A codebase evolves and new features get added, these threat model
21 Although our aim is eventually to provide threat model material for all
43 …: https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats#stride-model
Dthreat_model_fvp_r.rst7 This document provides a threat model for TF-A fvp_r platform.
12 In this threat model, the target of evaluation is the fvp_r platform of Trusted
17 threat-model document, :ref:`Generic Threat Model`
21 The most fundamental difference between the threat model for the current fvp_r
22 implementation compared to the general TF-A threat model, is that fvp_r is
23 currently limited to BL1 only. Any threats from the general TF-A threat model
27 system. The threat model for that runtime system, being partner-defined, is
28 out-of-scope for this threat-model.
61 threat-model document, :ref:`Generic Threat Model`
Dthreat_model_rss_interface.rst7 This document is an extension for the general TF-A threat-model. It considers
14 The scope of this threat model only includes the interface between the RSS and
16 the AP core. The threat model for the RSS firmware will be provided by the RSS
25 is the same as in the general TF-A threat-model document.
44 threat-model document, :ref:`Generic Threat Model`. All the threats listed there
Dthreat_model_arm_cca.rst7 This document provides a threat model of TF-A firmware for platforms with Arm
18 In this threat model, the target of evaluation is the Trusted Firmware for
31 recommended by `Arm CCA security model`_:
40 These are requirements of the `Arm CCA security model`_:
48 Note that this threat model hardens *[R0149]* requirement by forbidding to
56 This is a requirement of the `Arm CCA security model`_:
68 These are requirements of the `Arm CCA security model`_:
84 model of the different components of a TF-A-based system and their interactions
120 In this threat model, we use the same method to analyse threats as in the
129 identified in this threat model will only be given a risk rating for this
[all …]
Dthreat_model_el3_spm.rst7 This document provides a threat model for the TF-A :ref:`EL3 Secure Partition Manager`
14 In this threat model, the target of evaluation is the ``Secure Partition Manager Core``
16 The monitor and SPMD at EL3 are covered by the :ref:`Generic TF-A threat model
19 The scope for this threat model is:
74 This threat model follows a similar methodology to the :ref:`Generic TF-A threat model
119 The following threat categories as exposed in the :ref:`Generic TF-A threat model
130 Similarly this threat model re-uses the same threat risk ratings. The risk
316 | | state transitions (run-time model). |
441 | | run time model, do input validation. |
/trusted-firmware-a-latest/plat/allwinner/common/
Dsunxi_bl31_setup.c143 const char *model; in bl31_platform_setup() local
146 model = fdt_getprop(fdt, 0, "model", &length); in bl31_platform_setup()
148 model ?: "unknown"); in bl31_platform_setup()
/trusted-firmware-a-latest/docs/design/
Dinterrupt-framework-design.rst57 Routing model
69 A routing model for a type of interrupt (generated as FIQ or IRQ) is defined as
73 routed to EL3. A routing model is applicable only when execution is not in EL3.
75 The default routing model for an interrupt type is to route it to the FEL in
99 secure state. This is a valid routing model as secure software is in
103 state. This is a valid routing model as secure software in EL3 can
107 non-secure state. This is an invalid routing model as a secure interrupt
112 non-secure state. This is a valid routing model as secure software in EL3
121 non-secure software through EL3. This is a valid routing model as secure
126 state. This is a valid routing model as secure software in EL3 can save
[all …]
/trusted-firmware-a-latest/fdts/
Dstm32mp157a-dk1.dts15 model = "STMicroelectronics STM32MP157A-DK1 Discovery Board";
Dcorstone700_fpga.dts12 model = "corstone700-fpga";
Dstm32mp157c-dk2.dts16 model = "STMicroelectronics STM32MP157C-DK2 Discovery Board";
Dcorstone700_fvp.dts12 model = "corstone700-fvp";
Dstm32mp257f-ev1.dts15 model = "STMicroelectronics STM32MP257F-EV1 Evaluation Board";
Dstm32mp157c-odyssey.dts13 model = "Seeed Studio Odyssey-STM32MP157C Board";
Dstm32mp157a-dhcor-avenger96.dts21 model = "Arrow Electronics STM32MP157A Avenger96 board";
Dstm32mp157c-dhcom-pdk2.dts19 model = "DH electronics STM32MP157C DHCOM Premium Developer Kit (2)";
Dstm32mp157c-ev1.dts11 model = "STMicroelectronics STM32MP157C eval daughter on eval mother";
Dn1sdp-single-chip.dts11 model = "Arm Neoverse N1 System Development Platform";
Dstm32mp157c-lxa-mc1.dts16 model = "Linux Automation MC-1 board";
Dfvp-ve-Cortex-A7x1.dts14 model = "V2F-1XV7 Cortex-A7x1 SMM";
Darm_fpga.dts16 model = "ARM FPGA";
/trusted-firmware-a-latest/plat/arm/board/fvp/fdts/
Doptee_sp_manifest.dts30 run-time-model = <1>; /* SP pre-emptible. */
/trusted-firmware-a-latest/docs/plat/arm/fvp/
Dindex.rst8 documentation for a detailed description of the model parameter options.
95 Since FVP model Version 11.0 Build 11.0.34 and Version 8.5 Build 0.8.5202
174 Therefore, one must modify the way the model is normally invoked in order to
185 using the following model parameters:
192 To provide the model with the EL3 payload image, the following methods may be
196 flash memory. On Base Cortex and AEM FVPs, the following model parameter
215 model parameters:
384 and enable the GICv3 device in the model. Note that without this option,
449 The following ``FVP_Base_Cortex-A57x4-A53x4`` model parameters should be used to
467 The following ``FVP_Base_Cortex-A32x4`` model parameters should be used to
[all …]
/trusted-firmware-a-latest/docs/
Dindex.rst38 Armv8-A model and hardware platforms.
76 **Platform Ports** provides a list of the supported hardware and software-model
/trusted-firmware-a-latest/include/drivers/
Draw_nand.h110 uint8_t model[20]; member

123