Linux SDK for AM62L
12_00_00_07_04
1. Overview
2. Release Specific
3. Foundational Components
3.1. U-Boot
3.2. Kernel
3.3. Power Management
3.4. Security
3.4.1. Device Security
3.4.2. Authenticated Boot User Guide
3.4.3. Memory Firewalls
3.4.4. File System Encryption with fTPM
3.5. Filesystem
3.6. Tools
3.7. Hypervisor
3.8. Virtualization
3.9. Machine Learning
3.10. ARM Trusted Firmware-A
3.11. OP-TEE
4. How to Guides
5. Demo Applications
6. Supported Boards
7. Documentation Tarball
Linux SDK for AM62L
3.
Foundational Components
3.4.
Security
Edit on GitHub
3.4.
Security
3.4.1. Device Security
3.4.1.1. Security Overview
3.4.1.2. Security Domains
3.4.1.3. Security Features at a Glance
3.4.2. Authenticated Boot User Guide
3.4.2.1. Introduction
3.4.2.2. Learning
3.4.2.2.1. Root of Trust (RoT)
3.4.2.2.2. Chain of Trust (CoT)
3.4.2.2.3. Device Mapper
3.4.2.2.3.1. dm-verity
3.4.2.2.3.2. dm-crypt
3.4.2.3. Setup
3.4.2.4. Next steps
3.4.2.5. See Also
3.4.3. Memory Firewalls
3.4.3.1. Overview
3.4.3.2. What Happens During a Firewall Violation
3.4.3.3. Triggering a Firewall Exception
3.4.3.4. Enabling TIFS Logs
3.4.3.4.1. Modify U-Boot Configuration
3.4.3.4.2. Build and Deploy U-Boot
3.4.3.5. Accessing TIFS Logs
3.4.3.6. Interpreting TIFS Logs
3.4.4. File System Encryption with fTPM
3.4.4.1. Introduction
3.4.4.2. Key features
3.4.4.3. Concepts
3.4.4.3.1. Root Filesystem Encryption
3.4.4.3.2. Firmware TPM (fTPM)
3.4.4.3.3. eMMC RPMB
3.4.4.4. Implementation Details
3.4.4.4.1. System Architecture
3.4.4.4.2. Boot Process Flow
3.4.4.4.3. Key Management Flow
3.4.4.4.4. Encryption Process
3.4.4.5. Setup
3.4.4.6. dm-crypt performance
3.4.4.7. Security Considerations
3.4.4.7.1. Reference Implementation
3.4.4.7.2. Further Enhancements