Home
last modified time | relevance | path

Searched refs:memory (Results 1 – 25 of 119) sorted by relevance

12345

/trusted-firmware-a-latest/fdts/
Djuno-ethosn.dtsi40 compatible = "ethosn-memory";
45 compatible = "ethosn-memory";
56 compatible = "ethosn-memory";
61 compatible = "ethosn-memory";
66 compatible = "ethosn-memory";
71 compatible = "ethosn-memory";
81 compatible = "ethosn-memory";
86 compatible = "ethosn-memory";
91 compatible = "ethosn-memory";
96 compatible = "ethosn-memory";
[all …]
Dstm32mp15-fw-config.dtsi17 /* OP-TEE reserved shared memory: located at DDR top or null size */
20 /* OP-TEE secure memory: located right below OP-TEE reserved shared memory */
70 memory-ranges = <
79 memory-ranges = <
Dmorello-fvp.dts17 reserved-memory {
110 /* The first bank of memory, memory map is actually provided by UEFI. */
111 memory@80000000 {
112 device_type = "memory";
117 memory@8080000000 {
118 device_type = "memory";
Dstm32mp257f-ev1.dts26 memory@80000000 {
27 device_type = "memory";
Dn1sdp-single-chip.dts23 * In the first 2GB of DRAM bank the top 16MB are reserved by firmware as secure memory.
26 memory@80000000 {
27 device_type = "memory";
Dfvp-ve-Cortex-A7x1.dts31 memory@0,80000000 {
32 device_type = "memory";
36 reserved-memory {
/trusted-firmware-a-latest/
Dpyproject.toml9 { include = "memory", from = "tools/memory"}
13 memory = "memory.memmap:main"
29 [tool.poetry.group.memory.dependencies]
D.gitignore25 tools/memory/memory/__pycache__/
/trusted-firmware-a-latest/docs/tools/
Dmemory-layout-tool.rst4 TF-A's memory layout tool is a Python script for analyzing the virtual
5 memory layout of TF-A builds.
26 poetry install --with memory
32 poetry run memory --help
39 main memory regions in an ELF file (i.e. text, bss, rodata) but can be modified
44 $ poetry run memory -s
114 poetry run memory --help
119 The tool enables users to view static memory consumption. When the options
121 the build path to generate a table (per memory type), showing memory allocation
126 $ poetry run memory -f
[all …]
Dindex.rst8 memory-layout-tool
/trusted-firmware-a-latest/plat/nvidia/tegra/scat/
Dbl31.scat174 * Bakery locks are stored in normal .bss memory
193 /* padded memory section to store per cpu bakery locks */
204 * Time-stamps are stored in normal .bss memory
206 * The compiler will allocate enough memory for one CPU's time-stamps,
212 /* store timestamps in this carved out memory */
225 /* padded memory section to store per cpu timestamps */
242 * The base address of the coherent memory section must be page-aligned (4K)
245 * memory attributes for the coherent data page tables.
250 * Bakery locks are stored in coherent memory
/trusted-firmware-a-latest/docs/security_advisories/
Dsecurity-advisory-tfv-3.rst5 | Title | RO memory is always executable at AArch64 Secure EL1 |
27 memory mappings in the form of ``mmap_region`` structures. Each ``mmap_region``
28 has memory attributes represented by the ``mmap_attr_t`` enumeration type. This
32 Read-Only (RO), non-executable memory region.
35 Any memory region mapped as RO will always be executable, regardless of whether
47 permissions separately to data access permissions. All RO normal memory regions
49 would only manifest itself for device memory mapped as RO; use of this mapping
62 permissions but always leaves the memory as executable at Secure EL1.
66 - The xlat\_tables library ensures that all Read-Write (RW) memory regions are
80 - ARM TF EL3 code (for example BL1 and BL31) ensures that all non-secure memory
Dsecurity-advisory-tfv-4.rst6 | | authentication of unexpected data in secure memory in |
20 | | memory |
72 memory for subsequent authentication. This is implemented by the
88 these unsanitized values and allow the following memory copy operation, that
90 secure memory if the memory is mapped in BL1's address space, or cause a fatal
94 resident in secure memory. This is implemented by the ``bl1_fwu_image_auth()``
112 on the unexpected secure memory accesses. Moreover, the normal world FWU code
Dsecurity-advisory-tfv-1.rst6 | | unexpectedly large data into secure memory |
18 | Impact | Copy of unexpectedly large data into the free secure memory |
52 implementation is designed to copy an image into secure memory for subsequent
54 unexpectedly large data into secure memory. Note that a separate vulnerability
56 system to change its behaviour based on the unexpected secure memory contents.
98 result in an unexpectedly large copy of data into secure memory.
131 large copy of data into secure memory.
153 This function checks that the passed memory region is within one of the
/trusted-firmware-a-latest/plat/arm/board/fvp/fdts/
Dfvp_spmc_manifest.dts86 memory@0 {
87 device_type = "memory";
93 memory@1 {
94 device_type = "ns-memory";
Dfvp_spmc_optee_sp_manifest.dts60 memory@6000000 {
61 device_type = "memory";
/trusted-firmware-a-latest/docs/components/
Dgranule-protection-tables-design.rst7 the systems memory layout, configure the system registers to enable granule
13 spaces have been added to control memory access for each state. The PAS access
48 level 0 table controls access to a relatively large region in memory (block
51 small regions (granules) of memory can be assigned to different PAS with a 2
65 determines how much physical memory is governed by each level 0 entry. A granule
66 is the smallest unit of memory that can be independently assigned to a PAS.
76 creates the tables in memory, and enables granule protection checks. In the
78 memory using the GPT register configuration and saves important data to a
98 #. The desired attributes of this memory region (mapping type, PAS type)
103 structures, then the library will check the desired memory access layout for
[all …]
Dxlat-tables-lib-v2-design.rst6 tables based on a description of the memory layout, as well as setting up system
13 upon a description of the memory layout. The memory layout is typically
14 provided by the platform port as a list of memory regions;
20 on. This can be used to temporarily map some memory regions and unmap them
26 #. Support for changing memory attributes of memory regions at run-time.
62 An ``mmap_region`` is an abstract, concise way to represent a memory region to
77 The region attributes specify the type of memory (for example device or cached
78 normal memory) as well as the memory access permissions (read-only or
87 granule size, the library might map a 2MB memory region using either of the two
95 potentially less memory. However, if part of this 2MB region is later remapped
[all …]
Dsecure-partition-manager-mm.rst167 describe the memory regions that the SPM needs to allocate for a Secure
172 with information about the memory map of the Secure Partition.
204 through a shared memory region. The location of data in the shared memory area
205 is passed as a parameter to the ``MM_COMMUNICATE`` SMC. The shared memory area
210 memory area. The shared memory area is implemented as per the guidelines
214 The format of data structures used to encapsulate data in the shared memory is
293 partition (e.g. management of memory attributes in the translation tables for
408 2. Code memory regions are mapped with RO data and Executable instruction access
411 3. Read Only data memory regions are mapped with RO data and Execute Never
414 4. Read Write data memory regions are mapped with RW data and Execute Never
[all …]
/trusted-firmware-a-latest/plat/arm/board/tc/fdts/
Dtc_spmc_manifest.dts120 memory@0 {
121 device_type = "memory";
127 memory@1 {
128 device_type = "ns-memory";
Dtc_spmc_optee_sp_manifest.dts119 memory@0 {
120 device_type = "memory";
124 memory@1 {
125 device_type = "ns-memory";
/trusted-firmware-a-latest/docs/components/measured_boot/
Devent_log.rst24 - Event Log base address in secure memory.
26 Note. Currently OP-TEE does not support reading DTBs from Secure memory
31 - Event Log base address in non-secure memory.
/trusted-firmware-a-latest/docs/threat_model/
Dthreat_model_arm_cca.rst36 - All TF-A images run from on-chip memory. Data used by these images also live
37 in on-chip memory. This means TF-A is not vulnerable to an attacker that can
38 probe or tamper with off-chip memory.
42 *[R0147] Monitor code executes entirely from on-chip memory.*
45 *than GPT, is either held in on-chip memory, or in external memory but with*
49 hold data in external memory, even if it is integrity-protected - except for
53 read-only memory or write-protected memory. This could be on-chip ROM, on-chip
62 *memory then other trusted subsystems or application PE cannot modify that*
114 | | memory. |
/trusted-firmware-a-latest/docs/plat/
Drpi4.rst12 **IMPORTANT NOTE**: This port isn't secure. All of the memory used is DRAM,
14 not seem to feature a secure memory controller of any kind, so portions of
42 The BL31 code will patch the provided device tree blob in memory to advertise
43 PSCI support, also will add a reserved-memory node to the DT to tell the
73 memory. The load addresses have a default, but can also be changed by
75 armstub image file, it will put those two load addresses in memory locations
76 near the beginning of memory, where TF-A code picks them up.
/trusted-firmware-a-latest/include/drivers/st/
Dstm32_sdmmc2.h33 bool plat_sdmmc2_use_dma(unsigned int instance, unsigned int memory);

12345