Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 35) sorted by relevance

12

/tf-a-ffa_el3_spmc/services/std_svc/spm/spm_mm/
A Dspm_mm_xlat.c35 unsigned int access = (attributes & SP_MEMORY_ATTRIBUTES_ACCESS_MASK) in smc_attr_to_mmap_attr() local
38 if (access == SP_MEMORY_ATTRIBUTES_ACCESS_RW) { in smc_attr_to_mmap_attr()
40 } else if (access == SP_MEMORY_ATTRIBUTES_ACCESS_RO) { in smc_attr_to_mmap_attr()
44 assert(access == SP_MEMORY_ATTRIBUTES_ACCESS_NOACCESS); in smc_attr_to_mmap_attr()
/tf-a-ffa_el3_spmc/include/lib/extensions/
A Dras.h45 .access = ERR_ACCESS_SYSREG, \
54 .access = ERR_ACCESS_MEMMAP, \
157 unsigned int access:1; member
/tf-a-ffa_el3_spmc/docs/design/
A Dalt-boot-flows.rst8 the highest exception level is required. It allows full, direct access to the
27 configured to permit secure access only. This gives full access to the whole
35 - Little-endian data access;
A Dfirmware-design.rst15 hotplug and idle). Normal world software can access TF-A runtime services via
285 system register access to implemented trace registers.
287 - ``FPEXC``. Enable access to the Advanced SIMD and floating-point
304 - Enable the MMU and map the memory it needs to access.
372 access to Floating Point and Advanced SIMD registers by setting the
387 - Enable the MMU and map the memory it needs to access.
567 - Enable the MMU and map the memory it needs to access.
633 EL3, little-endian data access, and all interrupt sources masked:
753 EL3, little-endian data access, and all interrupt sources masked:
815 data access and all interrupt sources masked:
[all …]
A Dreset-design.rst58 Therefore, the cold boot code has to arbitrate access to hardware resources
/tf-a-ffa_el3_spmc/tools/fiptool/
A Dwin_posix.h126 inline int access(const char *path, int mode) in access() function
A Dfiptool.c859 if (access(argv[0], F_OK) == 0) in update_cmd()
1000 if (access(file, F_OK) != 0 || fflag) { in unpack_cmd()
1114 if (outfile[0] != '\0' && access(outfile, F_OK) == 0 && !fflag) in remove_cmd()
/tf-a-ffa_el3_spmc/docs/components/
A Dsecure-partition-manager-mm.rst413 instruction access permissions.
419 instruction access permissions.
422 instruction access permissions.
668 - Bits[1:0] : Data access permission
670 - b'00 : No access
671 - b'01 : Read-Write access
673 - b'11 : Read-only access
743 - Bits[1:0] : Data access permission
745 - b'00 : No access
746 - b'01 : Read-Write access
[all …]
A Ddebugfs-design.rst73 - This permits direct access to a firmware driver, mainly for test purposes
103 - On concurrent access, a spinlock is implemented in the BL31 service to protect
A Dffa-manifest-binding.rst242 - exclusive-access
245 access and ownership of this device's MMIO region.
A Dsecure-partition-manager.rst524 translation regime, an SP can access its own manifest DTB blob and extract its
743 - Stage-2 translations for the NS IPA space access the NS PA space.
820 - Protection: An I/O device can be prohibited from read, write access to a
902 exclusive-access;
/tf-a-ffa_el3_spmc/docs/plat/arm/tc/
A Dindex.rst9 loaded by AP BL2 from FIP in flash to SRAM for copying by SCP (SCP has access
27 FIP to SRAM. The SCP has access to AP SRAM. The address and size of SCP_BL2
/tf-a-ffa_el3_spmc/plat/nvidia/tegra/include/t186/
A Dtegra_mc_def.h334 #define mc_make_sec_cfg(off, ns, ovrrd, access) \ argument
341 .override_enable = OVERRIDE_ ## access \
/tf-a-ffa_el3_spmc/docs/threat_model/
A Dthreat_model.rst55 | ``DF3`` | | Debug and trace IP on a platform can allow access |
125 | ``AppDebug`` | | Physical attacker using debug signals to access |
128 | ``PhysicalAccess``| | Physical attacker having access to external device |
225 that require physical access are unlikely in server environments while
242 | | storage. It is possible for an attacker to access|
358 | ``Threat`` | | **An attacker with physical access can execute |
498 | | | Secure and non-secure clients access TF-A services |
679 | | access sensitive data or execute arbitrary |
684 | | normal world to access sensitive data or even |
711 | | access permissions. Memory configurations are |
[all …]
A Dthreat_model_spm.rst87 | ``DF7`` | External memory access. |
137 - Hardware attacks (non-invasive) requiring a physical access to the device,
382 | | getting access or gaining permissions to a memory |
577 | | access this service.** |
/tf-a-ffa_el3_spmc/docs/plat/marvell/armada/misc/
A Dmvebu-io-win.rst14 - **0x2** = SPI direct access
/tf-a-ffa_el3_spmc/docs/security_advisories/
A Dsecurity-advisory-tfv-3.rst29 contains flags to control data access permissions (``MT_RO``/``MT_RW``) and
47 permissions separately to data access permissions. All RO normal memory regions
A Dsecurity-advisory-tfv-6.rst132 cannot be used to access secure memory from the non-secure world, and is not
/tf-a-ffa_el3_spmc/docs/plat/arm/
A Darm-build-options.rst13 - ``ARM_CONFIG_CNTACR``: boolean option to unlock access to the ``CNTBase<N>``
17 kernel). Default is true (access to the frame is allowed).
40 MPIDR is set and access the bit-fields in MPIDR accordingly. Default value of
/tf-a-ffa_el3_spmc/docs/plat/
A Drz-g2.rst82 behind using direct shared memory access to BOOT_KIND_BASE _and_
162 - Boot the board in Mini-monitor mode and enable access to the
A Drcar-gen3.rst87 behind using direct shared memory access to BOOT_KIND_BASE _and_
189 - Boot the board in Mini-monitor mode and enable access to the
A Drpi4.rst62 This part knows how to access the MMC controller and how to parse a FAT
/tf-a-ffa_el3_spmc/plat/arm/board/sgi575/fdts/
A Dsgi575_stmm_config.dts86 * System registers region for access from S-EL0.
/tf-a-ffa_el3_spmc/docs/process/
A Dsecurity-hardening.rst42 Since the Non-secure world has access to the ``PMCR`` register, it can
/tf-a-ffa_el3_spmc/docs/
A Dchange-log.rst406 - Allow access to TZC controller on all chips
408 - Allow access to nor2 flash and system registers from S-EL0
947 - Disabled non-secure access to PRCM power control registers
1391 - intel: Enable bridge access, SiP SMC secure register access, and uboot
2731 - Clean up the usage of void pointers to access symbols
3035 software to access SVE functionality but disable access to SVE, SIMD and
3058 include specifying Non-privileged access.
3065 an attempt to access addresses in the higher VA range.
3165 the MT field in MPDIR and access the bit fields accordingly.
3406 access the bit fields accordingly.
[all …]

Completed in 42 milliseconds

12