/arm-trusted-firmware-2.8.0/common/ |
A D | runtime_svc.c | 109 rt_svc_desc_t *service = &rt_svc_descs[index]; in runtime_svc_init() local 116 rc = validate_rt_svc_desc(service); in runtime_svc_init() 119 (void *) service); in runtime_svc_init() 130 if (service->init != NULL) { in runtime_svc_init() 131 rc = service->init(); in runtime_svc_init() 134 service->name); in runtime_svc_init() 145 start_idx = (uint8_t)get_unique_oen(service->start_oen, in runtime_svc_init() 146 service->call_type); in runtime_svc_init() 147 end_idx = (uint8_t)get_unique_oen(service->end_oen, in runtime_svc_init() 148 service->call_type); in runtime_svc_init()
|
/arm-trusted-firmware-2.8.0/docs/getting_started/ |
A D | rt-svc-writers-guide.rst | 24 dispatched to their respective service implementation - the 88 Registering a runtime service 92 the name of the service, the range of OENs covered, the type of service and 149 Initializing a runtime service 164 Error initializing runtime service <name of the service> 175 service. 177 Handling runtime service requests 180 SMC calls for a service are forwarded by the framework to the service's SMC 292 In that respect, `PSCI`_ is a 'sub-service' of the Standard calls service. In 294 service which perform independent functions. [all …]
|
/arm-trusted-firmware-2.8.0/docs/design_documents/ |
A D | drtm_poc.rst | 117 INFO: DRTM service handler: version 118 INFO: ++ DRTM service handler: TPM features 119 INFO: ++ DRTM service handler: Min. mem. requirement features 120 INFO: ++ DRTM service handler: DMA protection features 121 INFO: ++ DRTM service handler: Boot PE ID features 122 INFO: ++ DRTM service handler: TCB-hashes features 123 INFO: DRTM service handler: dynamic launch 124 WARNING: DRTM service handler: close locality is not supported 125 INFO: DRTM service handler: unprotect mem
|
A D | measured_boot_poc.rst | 18 a firmware TPM (fTPM) service implemented on top of OP-TEE. 23 party (f)TPM service and they try to be as general as possible. Different 26 (or even a different type of service to provide the attestation) 38 contain a third party fTPM service which in turn will be used to process the 42 for convenience. As the fTPM service used is an OP-TEE TA, it was easy to add 58 the Measured Boot functionality. The chosen fTPM service is a sample 68 service as provided by TF-A. As such, it is beyond the scope of this 70 fTPM service. 174 (2) calls ``tpm2_pcrread``, which will access the fTPM service to read the 186 The secure world terminal should show the debug logs for the fTPM service, [all …]
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | index.rst | 10 arm-sip-service
|
A D | arm-sip-service.rst | 19 - Execution State Switching service 22 Source definitions for Arm SiP service are located in the ``arm_sip_svc.h`` header 32 Execution State Switching service 35 Execution State Switching service provides a mechanism for a non-secure lower 38 AArch32, or from AArch32 to AArch64, for the calling CPU. This service is only 58 Execution State Switching service being requested. argument 79 The service may return the following error codes: 94 The optional DebugFS interface is accessed through an SMC SiP service. Refer
|
A D | secure-partition-manager-mm.rst | 27 fulfils the requirements of a security service as described above. 89 fulfil a service request. 97 service requests. 121 service always runs to completion (e.g. the requested services cannot be 190 0060A*) is used to invoke a Secure Partition service as a Fast Call. 193 service implementation. It is assumed that the caller of the service will be 290 - A request to handle a runtime service request. 320 - Register with the SPM a service that it provides. 321 - Indicate completion of a service request delegated by the SPM 508 completion of a partition service request. [all …]
|
A D | debugfs-design.rst | 103 - On concurrent access, a spinlock is implemented in the BL31 service to protect 125 .. _ARM SiP Services: arm-sip-service.rst
|
A D | rmm-el3-comms-spec.rst | 115 service commands in EL3, this buffer can be used to exchange data between RMM 210 services during the boot phase as well. The EL3 runtime service handling must 219 RMM-EL3 runtime service return codes 278 …err_code,x1,[63:0],RmiCommandReturnCode,Error code returned by the RMI service invoked by NS World…
|
A D | granule-protection-tables-design.rst | 79 structure used by the granule transition service which will be covered more 156 #. In systems that make use of the granule transition service, runtime
|
A D | firmware-update.rst | 252 BL1 SMC service. 266 This SMC returns the current version of the BL1 SMC service.
|
A D | ffa-manifest-binding.rst | 32 - An array consisting of 4 <u32> values, identifying the UUID of the service
|
A D | ras.rst | 165 interrupt number. This allows for fast look of handlers in order to service RAS
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | interrupt-framework-design.rst | 275 #. Secure Payload Dispatcher (SPD) service. This service interfaces with the 283 (TSPD) service. 290 SPD service to manage communication with non-secure software. TF-A 295 just like the SPD service. 521 service at runtime during its initialisation phase. 537 service during the registration phase. The SPD service would also need to 564 service at compile time then the SP could provide it during the 591 service at build time. 598 ``tsp_vectors`` to the TSPD service. 750 return control back to the SPD service through a SMC32 or SMC64. The SPD service [all …]
|
A D | firmware-design.rst | 862 #. Standard service calls 880 service - within TF-A this service is referred to as the Secure-EL1 Payload 901 the name of the service, the range of OENs covered, the type of service and 917 service handler is invoked. 960 populated for all of the OENs covered by a service after the service ``init()`` 987 service and handler. 2484 #. The service identifier. Each PMF service is identified by a 2485 service name and a service identifier. Both the service name and 2489 service. 2491 Registering a PMF service [all …]
|
/arm-trusted-firmware-2.8.0/docs/perf/ |
A D | tsp.rst | 7 The TSP is coupled with a companion runtime service in the BL31 firmware,
|
/arm-trusted-firmware-2.8.0/include/drivers/st/ |
A D | bsec.h | 124 uint32_t bsec_otp_lock(uint32_t service);
|
/arm-trusted-firmware-2.8.0/docs/threat_model/ |
A D | threat_model_el3_spm.rst | 125 - Denial of service 531 | | SPMC with requests targeting a service within an | 533 | | access this service.** | 536 | | a service within an endpoint such that the latter | 549 | Threat Type | Denial of service | 561 | | Other quality of service monitoring can be achieved| 586 | Threat Type | Denial of service |
|
A D | threat_model_spm.rst | 151 - Denial of service 576 | | SPMC with requests targeting a service within an | 578 | | access this service.** | 580 | | a service within an endpoint such that the latter | 593 | ``Threat Type`` | Denial of service | 606 | | Other quality of service monitoring can be achieved| 632 | ``Threat Type`` | Denial of service, Spoofing | 941 | | denial-of-service attack by using FFA_INTERRUPT |
|
/arm-trusted-firmware-2.8.0/drivers/st/bsec/ |
A D | bsec2.c | 848 uint32_t bsec_otp_lock(uint32_t service) in bsec_otp_lock() argument 856 switch (service) { in bsec_otp_lock()
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/ |
A D | arm-build-options.rst | 94 - ``ARM_ETHOSN_NPU_DRIVER``: boolean option to enable a SiP service that can 95 configure an Arm® Ethos™-N NPU. To use this service the target platform's
|
/arm-trusted-firmware-2.8.0/docs/security_advisories/ |
A D | security-advisory-tfv-9.rst | 111 firmware service. This patch also implements ``SMCCC_ARCH_WORKAROUND_3`` for
|
A D | security-advisory-tfv-6.rst | 71 the normal world to discover the presence of this firmware service.
|
/arm-trusted-firmware-2.8.0/docs/about/ |
A D | features.rst | 92 new standard service.
|
/arm-trusted-firmware-2.8.0/docs/ |
A D | change-log.md | 3231 - Added support for SiP service 3282 - Added support for TRNG firmware interface service 3284 - Added SiP service to configure Ethos-N NPU 4228 - xilinx: versal: Enable ipi mailbox service 4244 standard service. 4318 - intel: Create SiP service header file 4599 - bsec: Move bsec_mode_is_closed_device() service to platform 4653 - Fix service UUID lookup 5773 - Added new Arm SiP service SMC to switch execution state. 6723 implementation to be one such runtime service. [all …]
|