Lines Matching refs:access
19 used by Non-secure world applications to access these services. A Trusted OS
46 privileged firmware (i.e. TF-A) to be granted access to system and processor
235 - Interfaces that enable access to privileged operations from S-EL0. These
236 operations typically require access to system resources that are either shared
255 Hence, the SVC conduit must be used by the Secure Partition to access interfaces
402 that it needs access to and their attributes. The SPM validates this resource
406 instruction access permissions.
408 2. Code memory regions are mapped with RO data and Executable instruction access
412 instruction access permissions.
415 instruction access permissions.
600 The SPM is responsible for enabling access to regions of memory in the system
609 access permissions of the memory regions are statically provided by the platform
622 In this case, the Secure Partition needs a way to change the access permissions
668 - Bits[1:0] : Data access permission
670 - b'00 : No access
671 - b'01 : Read-Write access
673 - b'11 : Read-only access
675 - Bit[2]: Instruction access permission
686 - ``INVALID_PARAMETERS``: The Secure Partition is not allowed to access the
722 The SPM must not return the memory access controls for a page of memory that
753 - Bits[1:0] : Data access permission
755 - b'00 : No access
756 - b'01 : Read-Write access
758 - b'11 : Read-only access
760 - Bit[2] : Instruction access permission
782 Partition is not allowed to access part or all of the memory region
815 The SPM must preserve the original memory access controls of the region of