Home
last modified time | relevance | path

Searched refs:ID (Results 1 – 25 of 49) sorted by relevance

12

/arm-trusted-firmware-2.8.0/plat/xilinx/versal/pm_service/
A Dpm_node.h35 #define NODECLASS(ID) (((ID) & NODE_CLASS_MASK) >> NODE_CLASS_SHIFT) argument
36 #define NODESUBCLASS(ID) (((ID) & NODE_SUBCLASS_MASK) >> \ argument
38 #define NODETYPE(ID) (((ID) & NODE_TYPE_MASK) >> NODE_TYPE_SHIFT) argument
39 #define NODEINDEX(ID) (((ID) & NODE_INDEX_MASK) >> NODE_INDEX_SHIFT) argument
/arm-trusted-firmware-2.8.0/docs/threat_model/
A Dthreat_model_fvp_r.rst66 - ID 01: An attacker can mangle firmware images to execute arbitrary code.
68 - ID 03: An attacker can use Time-of-Check-Time-of-Use (TOCTOU) attack to
71 - ID 04: An attacker with physical access can execute arbitrary image by
75 - ID 05: Information leak via UART logs such as crashes
77 - ID 06: An attacker can read sensitive data and execute arbitrary code
80 - ID 08: Memory corruption due to memory overflows and lack of boundary
85 - ID 11: Misconfiguration of the Memory Protection Unit (MPU) may allow
A Dthreat_model_el3_spm.rst139 | ID | 01 |
142 | | FF-A ID in a direct request/response invocation.** |
171 | | SWd ID as the sender ID). |
177 | ID | 02 |
180 | | FF-A ID in a direct request/response invocation.** |
216 | | and another endpoint (e.g. which NWd endpoint ID |
217 | | sends a direct request to which SWd endpoint ID). |
228 | ID | 03 |
273 | ID | 04 |
321 | ID | 05 |
[all …]
A Dthreat_model_spm.rst164 | ID | 01 |
167 | | FF-A ID in a direct request/response invocation.** |
195 | | SWd ID as the sender ID). |
201 | | and another endpoint (e.g. which NWd endpoint ID |
202 | | sends a direct request to which SWd endpoint ID). |
211 | ID | 02 |
251 | ID | 03 |
298 | ID | 04 |
333 | ID | 05 |
764 | | provided sender ID must match the ID of the |
[all …]
A Dthreat_model.rst270 | ID | 01 |
316 | ID | 02 |
362 | ID | 03 |
406 | ID | 04 |
464 | ID | 05 |
533 | ID | 06 |
579 | ID | 07 |
622 | ID | 08 |
733 | ID | 10 |
777 | ID | 11 |
[all …]
/arm-trusted-firmware-2.8.0/plat/rockchip/rk3328/drivers/soc/
A Dsoc.h61 #define CRU_GATEID_CONS(ID) (0x200 + (ID / 16) * 4) argument
/arm-trusted-firmware-2.8.0/docs/components/
A Del3-spmc.rst282 - FF-A ID with bit 15 clear relates to VMs.
283 - FF-A ID with bit 15 set related to SPs or LSPs.
290 use a secure FF-A ID as origin world by spoofing:
293 (FF-A ID bit 15 clear) and destination world to be secure (FF-A ID bit 15
301 endpoint ID must be checked by SPMC for being a normal world ID.
307 ID is not consistent:
310 world ID",
311 - or initiated by an SP and thus origin endpoint ID must be a "secure world ID".
341 the SPMC returns the SPMC ID.
344 SPMD, which returns the SPMC ID.
[all …]
A Dplatform-interrupt-controller-API.rst32 The API should return whether the interrupt ID (first parameter) is categorized
45 The API should return whether the interrupt ID (first parameter) is categorized
58 The API should return whether the interrupt ID (first parameter) is categorized
71 This API should return the *active* status of the interrupt ID specified by the
86 This API should enable the interrupt ID specified by the first parameter,
101 This API should disable the interrupt ID specified by the first parameter,
207 the ID of the SGI. The second parameter, ``target``, must be the MPIDR of the
301 ``plat_ic_acknowledge_interrupt()``). If the interrupt ID is invalid, this API
305 masks out the interrupt ID field from the acknowledged value from GIC.
A Dfirmware-update.rst233 uint32_t function ID : 0x0
246 uint32_t function ID : 0x1
260 uint32_t function ID : 0x3
274 uint32_t function ID : 0x4
294 uint32_t function ID : 0x10
343 uint32_t function ID : 0x11
383 uint32_t function ID : 0x12
411 uint32_t function ID : 0x13
438 uint32_t function ID : 0x14
459 uint32_t function ID : 0x15
[all …]
A Dcot-binding.rst108 This property provides the Object ID of public key
122 This property provides the Object ID of hash provided in
298 This property provides the Object ID of non-volatile counter
A Dsecure-partition-manager.rst855 - FF-A ID with bit 15 clear relates to VMs.
856 - FF-A ID with bit 15 set related to SPs.
869 use a secure FF-A ID as origin world by spoofing:
872 (FF-A ID bit 15 clear) and destination world to be secure (FF-A ID bit 15
880 endpoint ID must be checked by SPMC for being a normal world ID.
886 ID is not consistent:
889 world ID",
890 - or initiated by an SP and thus origin endpoint ID must be a "secure world ID".
914 to be prepared to handle notifications for the provided VM ID.
960 the SPMC returns the priorly retrieved SPMC ID.
[all …]
A Drmm-el3-comms-spec.rst156 :header: "Error code", "Description", "ID"
226 :header: "Error code", "Description", "ID"
327 :header: "ID", "Condition"
370 :header: "ID", "Condition"
416 :header: "ID", "Condition"
431 :header: "ID", "Curve"
475 :header: "ID", "Condition"
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/misc/
A Dmvebu-iob.rst28 - Target-ID of the window
30 Target ID options
A Dmvebu-ccu.rst24 - Target-ID of the window
A Dmvebu-io-win.rst35 - Target-ID of the window
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/csf_hdr_parser/
A Dinput_blx_ch328 # Specify OEM AND FSL ID to be populated in header. [Optional]
A Dinput_blx_ch224 # Specify OEM AND FSL ID to be populated in header. [Optional]
A Dinput_pbi_ch326 # Specify OEM AND FSL ID to be populated in header. [Optional]
A Dinput_pbi_ch3_226 # Specify OEM AND FSL ID to be populated in header. [Optional]
A Dinput_bl2_ch3_243 # Specify OEM AND FSL ID to be populated in header. [Optional]
A Dinput_bl2_ch343 # Specify OEM AND FSL ID to be populated in header. [Optional]
/arm-trusted-firmware-2.8.0/docs/components/fconf/
A Dfconf_properties.rst31 - Image ID of the configuration.
/arm-trusted-firmware-2.8.0/docs/plat/arm/
A Darm-build-options.rst44 for the construction of composite state-ID in the power-state parameter.
46 State-ID yet. Hence this flag is used to configure whether to use the
47 recommended State-ID encoding or not. The default value of this flag is 0,
48 in which case the platform is configured to expect NULL in the State-ID
/arm-trusted-firmware-2.8.0/docs/getting_started/
A Drt-svc-writers-guide.rst64 the same type. For example, two SoC providers can use the same Function ID
69 The SMC Function ID also indicates whether the call has followed the SMC32
168 Function ID* result ``0xFFFFFFFF``.
195 #. Determining that ``smc_fid`` is a valid and supported SMC Function ID,
196 otherwise completing the request with the *Unknown SMC Function ID*:
299 part of the SMC Function ID to identify the sub-service. TF-A does not provide
/arm-trusted-firmware-2.8.0/docs/security_advisories/
A Dsecurity-advisory-tfv-5.rst8 | CVE ID | `CVE-2017-15031`_ |

Completed in 41 milliseconds

12