Processor SDK Linux for AM62Ax
master
1. Overview
2. Release Specific
3. Foundational Components
3.1. U-Boot
3.2. Kernel
3.3. Power Management
3.4. Security
3.4.1. Device Security
3.4.2. GP to HS-FS Migration Guide
3.4.3. Secure Boot
3.4.4. SELinux - User Guide
3.4.5. Authenticated Boot User Guide
3.4.6. Memory Firewalls
3.4.7. File System Encryption with fTPM
3.5. Filesystem
3.6. Tools
3.7. IPC for AM62ax
3.8. Multimedia Video Codec
3.9. ARM Trusted Firmware-A
3.10. OP-TEE
4. Edge AI
5. RTOS/NO-RTOS [MCU+ SDK]
6. How to Guides
7. Demo Applications
8. Documentation Tarball
Processor SDK Linux for AM62Ax
3.
Foundational Components
3.4.
Security
Edit on GitHub
3.4.
Security
3.4.1. Device Security
3.4.1.1. Security Overview
3.4.1.2. Security Domains
3.4.1.3. Security Features at a Glance
3.4.2. GP to HS-FS Migration Guide
3.4.2.1. Overview
3.4.2.2. Device types
3.4.2.3. Processor SDK
3.4.2.4. K3-image-gen
3.4.2.5. U-Boot
3.4.2.6. Linux Kernel
3.4.3. Secure Boot
3.4.3.1. Introduction
3.4.3.2. Secure Boot Flow
3.4.3.3. HS Boot Flow Tools
3.4.4. SELinux - User Guide
3.4.4.1. Introduction
3.4.4.2. Filesystem Setup
3.4.4.2.1. Yocto
3.4.4.2.2. Debian
3.4.4.3. Permissive mode Setup
3.4.4.4. Enforcing mode Setup
3.4.4.5. Integrating into Yocto for production
3.4.5. Authenticated Boot User Guide
3.4.5.1. Introduction
3.4.5.2. Learning
3.4.5.2.1. Root of Trust (RoT)
3.4.5.2.2. Chain of Trust (CoT)
3.4.5.2.3. Device Mapper
3.4.5.2.3.1. dm-verity
3.4.5.2.3.2. dm-crypt
3.4.5.3. Setup
3.4.5.4. Next steps
3.4.5.5. See Also
3.4.6. Memory Firewalls
3.4.6.1. Overview
3.4.6.2. What Happens During a Firewall Violation
3.4.6.3. Triggering a Firewall Exception
3.4.6.4. Enabling TIFS Logs
3.4.6.4.1. Modify U-Boot Configuration
3.4.6.4.2. Build and Deploy U-Boot
3.4.6.5. Accessing TIFS Logs
3.4.6.6. Interpreting TIFS Logs
3.4.7. File System Encryption with fTPM
3.4.7.1. Introduction
3.4.7.2. Key features
3.4.7.3. Concepts
3.4.7.3.1. Root Filesystem Encryption
3.4.7.3.2. Firmware TPM (fTPM)
3.4.7.3.3. eMMC RPMB
3.4.7.4. Implementation Details
3.4.7.4.1. System Architecture
3.4.7.4.2. Boot Process Flow
3.4.7.4.3. Key Management Flow
3.4.7.4.4. Encryption Process
3.4.7.5. Setup
3.4.7.6. dm-crypt performance
3.4.7.7. Security Considerations
3.4.7.7.1. Reference Implementation
3.4.7.7.2. Further Enhancements