| /rk3399_ARM-atf/services/std_svc/spm/spm_mm/ |
| H A D | spm_mm_xlat.c | 35 unsigned int access = (attributes & MM_SP_MEMORY_ATTRIBUTES_ACCESS_MASK) in smc_attr_to_mmap_attr() local 38 if (access == MM_SP_MEMORY_ATTRIBUTES_ACCESS_RW) { in smc_attr_to_mmap_attr() 40 } else if (access == MM_SP_MEMORY_ATTRIBUTES_ACCESS_RO) { in smc_attr_to_mmap_attr() 44 assert(access == MM_SP_MEMORY_ATTRIBUTES_ACCESS_NOACCESS); in smc_attr_to_mmap_attr()
|
| /rk3399_ARM-atf/include/lib/extensions/ |
| H A D | ras.h | 45 .access = ERR_ACCESS_SYSREG, \ 54 .access = ERR_ACCESS_MEMMAP, \ 157 unsigned int access:1; member
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | alt-boot-flows.rst | 8 the highest exception level is required. It allows full, direct access to the 27 configured to permit secure access only. This gives full access to the whole 35 - Little-endian data access;
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | secure-partition-manager-mm.rst | 19 used by Non-secure world applications to access these services. A Trusted OS 46 privileged firmware (i.e. TF-A) to be granted access to system and processor 235 - Interfaces that enable access to privileged operations from S-EL0. These 236 operations typically require access to system resources that are either shared 255 Hence, the SVC conduit must be used by the Secure Partition to access interfaces 402 that it needs access to and their attributes. The SPM validates this resource 406 instruction access permissions. 408 2. Code memory regions are mapped with RO data and Executable instruction access 412 instruction access permissions. 415 instruction access permissions. [all …]
|
| H A D | numa-per-cpu.rst | 14 memory, and CPUs within a node can access this memory with lower latency than 37 access across nodes incurs additional latency because of interconnect 39 nodes must access that data via the interconnect, leading to increased latency 45 framework optimizes the allocation and access of per-CPU objects by letting 46 platforms place them in the nodes with the lowest access latency. 84 CPUs access different addresses that lie on the same cache line. Although the 131 The NUMA-Aware Per-CPU Framework also provides macros to access per-CPU objects 215 visible to other CPUs or system components that may access this memory. This
|
| H A D | granule-protection-tables-design.rst | 13 address spaces have been added to control memory access for each state. The PAS 14 access allowed to each security state can be seen in the table below. 16 .. list-table:: Security states and PAS access rights 48 level 0 table controls access to a relatively large region in memory (GPT Block 111 structures, then the library will check the desired memory access layout for 153 During Granule Transition access to L1 tables is controlled by a lock to ensure 178 ``pas_region_t`` structures containing the desired memory access layout. The
|
| H A D | ffa-manifest-binding.rst | 279 - List of IDs belonging to a DMA capable peripheral device that has access to 285 - Identifies the SMMU IP that enforces the access control for the DMA device 288 - stream-ids-access-permissions 290 - List of attributes representing the instruction and data access permissions 291 used by the DMA device streams to access the memory region represented by 385 - exclusive-access 388 access and ownership of this device's MMIO region.
|
| H A D | debugfs-design.rst | 73 - This permits direct access to a firmware driver, mainly for test purposes 103 - On concurrent access, a spinlock is implemented in the BL31 service to protect
|
| H A D | context-management-library.rst | 34 configuration of system registers independent of other security states to access 40 running in either state has the privileges to access them. Additionally, some of 51 unauthorized access or data corruption between the different security states. 134 - Any feature access which does not trap to EL3 should be symmetric. 181 #. ``context_el2.h`` : internal header consisting of helper macros to access EL2 556 Therefore, Root world should maintain its own distinct settings to access 565 Root Context needs to be setup as early as possible before we try and access/modify
|
| /rk3399_ARM-atf/tools/fiptool/ |
| H A D | win_posix.h | 126 inline int access(const char *path, int mode) in access() function
|
| /rk3399_ARM-atf/docs/plat/arm/tc/ |
| H A D | index.rst | 9 loaded by AP BL2 from FIP in flash to SRAM for copying by SCP (SCP has access 27 FIP to SRAM. The SCP has access to AP SRAM. The address and size of SCP_BL2
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_rse_interface.rst | 47 - ID 11: The access to the communication interface between AP and RSE is 50 gain access to sensitive data.
|
| H A D | threat_model.rst | 77 | DF3 | | Debug and trace IP on a platform can allow access | 152 | AppDebug | | Physical attacker using debug signals to access | 155 | PhysicalAccess | | Physical attacker having access to external device | 263 that require physical access are unlikely in server environments while 461 | | access memory beyond its limit. | 490 | | access sensitive data, execute arbitrary | 491 | | code or access otherwise restricted HW | 496 | | normal world to access sensitive data or even | 519 | Mitigations | When configuring access permissions, the | 549 | | gains access to memory due to a vulnerability. | [all …]
|
| H A D | threat_model_el3_spm.rst | 66 | DF7 | External memory access. | 113 - Hardware attacks (non-invasive) requiring a physical access to the device, 335 | | getting access or gaining permissions to a memory | 535 | | access this service.** | 600 | | be able to relinquish the access to shared memory | 638 | Mitigations | Yes. The SPMC tracks ownership and access state |
|
| /rk3399_ARM-atf/plat/nvidia/tegra/include/t186/ |
| H A D | tegra_mc_def.h | 334 #define mc_make_sec_cfg(off, ns, ovrrd, access) \ argument 341 .override_enable = OVERRIDE_ ## access \
|
| /rk3399_ARM-atf/docs/plat/marvell/armada/misc/ |
| H A D | mvebu-io-win.rst | 14 - **0x2** = SPI direct access
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-3.rst | 29 contains flags to control data access permissions (``MT_RO``/``MT_RW``) and 47 permissions separately to data access permissions. All RO normal memory regions
|
| H A D | security-advisory-tfv-11.rst | 51 register. Which may cause a data abort or an access to a random EL3 memory region.
|
| /rk3399_ARM-atf/fdts/ |
| H A D | stmm_template.dts | 28 * System registers, rtc, uart and etc regions for access from S-EL0.
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | dtpm_drivers.rst | 38 such as getting information, requesting access, and relinquishing access,
|
| H A D | rse.rst | 61 - ``Pointer-access messaging``: The message header and the payload are 70 ``iovec``. Therefore, the sender must handle both cases and prevent access to 87 V | |access | | 192 | Register access | IRQ 205 | IRQ | Register access 439 it on behalf of RMM. The access to MHU interface and thereby to RSE is 440 restricted to BL31 only. Therefore, RMM does not have direct access, all calls 742 RSE provides access for AP to assets in OTP, which include keys for image
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | build-options.rst | 314 extension. It allows access to the SCXTNUM_EL2 (Software Context Number) 340 Virtualization feature, allowing for access to the CNTPOFF_EL2 (Counter-timer 347 Mode Register feature, allowing access to the FPMR register. FPMR register 353 feature allowing for access to the HDFGRTR_EL2 (Hypervisor Debug Fine-Grained 360 (Fine Grain Traps 2) feature allowing for access to Fine-grained trap 2 registers 376 This feature currently traps access to all EL3 registers in 384 allow access to HCRX_EL2 (extended hypervisor control register) from EL2 as 420 permission fault for any privileged data access from EL1/EL2 to virtual 463 Host Extensions) extension. It allows access to CONTEXTIDR_EL2 register 470 allow access t [all...] |
| /rk3399_ARM-atf/plat/arm/board/neoverse_rd/platform/rdn2/fdts/ |
| H A D | rdn2_stmm_sel0_manifest.dts | 48 * System registers region for access from S-EL0.
|
| /rk3399_ARM-atf/docs/plat/arm/ |
| H A D | arm-build-options.rst | 13 - ``ARM_CONFIG_CNTACR``: boolean option to unlock access to the ``CNTBase<N>`` 17 kernel). Default is true (access to the frame is allowed). 46 MPIDR is set and access the bit-fields in MPIDR accordingly. Default value of
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | rz-g2.rst | 82 behind using direct shared memory access to BOOT_KIND_BASE _and_ 162 - Boot the board in Mini-monitor mode and enable access to the
|