Realm Management Monitor
latest
Home
About
1. Readme for TF-RMM
1.1. License
1.1.1. Third Party Projects
1.2. Contributing
1.3. Feedback and support
2. Project Maintenance
2.1. Maintainers
3. Change-log and Release notes
3.1. v0.3.0
3.1.1. New features in this release
3.1.2. Build/Testing improvements
3.1.3. Bug fixes in this release
3.1.4. Upcoming features
3.1.5. Known issues and limitations
3.2. v0.2.0
3.3. v0.1.0
3.3.1. Upcoming features
3.3.2. Known issues and limitations
4. Developer Certificate of Origin
5. License
Getting Started Guides
1. Prerequisite
2. Build Host
3. Tool & Dependency overview
4. Setup Toolchain
5. Package Installation (Ubuntu-20.04 x64)
6. Install python dependencies
7. Install coverage tools analysis dependencies
8. Getting the RMM Source
8.1. Additional steps for Contributors
9. Install Cppcheck and dependencies
10. Performing an Initial Build
11. Running the RMM
12. RMM Build Examples
13. RMM Build Options
14. RMM LLVM Build
15. RMM Fake Host Build
Process
1. Coding Standard
1.1. General
1.2. File Encoding
1.3. Language
1.4. C Language Standard
1.5. Length
1.6. Headers/Footers
1.7. Naming conventions
1.8. Indentation
1.9. Spacing
1.10. Braces
1.11. Commenting
1.12. Error return values and Exception handling
1.13. Use of asserts and panic
1.14. Using COMPILER_ASSERT to check for compile time data errors
1.15. Data types, structures and typedefs
1.16. Macros and Enums
1.17. Switch statements
1.18. Inline assembly
1.19. Libc functions that are banned or to be used with caution
2. Security Handling
3. Commit Style
3.1. Mandated Trailers
4. Contributor’s Guide
4.1. Getting Started
4.2. Making Changes
4.3. Submitting Changes
4.4. License and Copyright for Contributions
Design
1. RMM Locking Guidelines
1.1. Introduction
1.2. Requirements
1.2.1. Critical Section
1.2.2. Mutual Exclusion
1.2.3. Deadlock Avoidance
1.2.4. Starvation Avoidance
1.2.5. Nested Critical Sections
1.3. Implementation
1.3.1. Locking
1.3.2. Reference Counting
1.4. Guidelines
1.4.1. Mutual Exclusion
1.4.2. Deadlock Avoidance
1.4.3. Starvation Avoidance
1.4.4. Nested Critical Sections
1.5. References
2. RMM Folder and Component organization
2.1. Root Level Folders and Components
2.2. Component File and Cmake Structure
3. RMM Fake host architecture
3.1. Fake host architecture design
3.2. Fake host architecture employment scenarios implemented or ongoing
4. RMM Cold and Warm boot design
5. RMM-EL3 communication specification
Security
1. Threat Model
1.1. Introduction
1.2. Data Flow Diagram
1.2.1. Target of Evaluation
1.2.2. Data Flow Diagram
1.3. Threat Analysis components
1.3.1. Assets
1.3.2. Threat Agents
1.3.3. Threat Types
1.3.4. Threat Risk Ratings
1.4. Threat Assessment
Glossary
Realm Management Monitor
Process
Edit on GitHub
Previous
Next
Process
¶
Contents
1. Coding Standard
2. Security Handling
3. Commit Style
4. Contributor’s Guide
Read the Docs
v: latest
Versions
latest
tf-rmm-v0.3.0
tf-rmm-v0.2.0
tf-rmm-v0.1.0
rmm-spec-v1.0-eac2
Downloads
pdf
On Read the Docs
Project Home
Builds