Home
last modified time | relevance | path

Searched refs:NS (Results 1 – 25 of 29) sorted by relevance

12

/arm-trusted-firmware-2.8.0/docs/threat_model/
A Dthreat_model_el3_spm.rst55 | DF3 | SPMD to NS forwarding. |
109 - Non-secure endpoint (referred NS-Endpoint later): normal world client at
110 NS-EL2 (Hypervisor) or NS-EL1 (VM or OS kernel).
151 | Threat Agent | NS-Endpoint, S-Endpoint |
189 | Threat Agent | NS-Endpoint, S-Endpoint |
244 | Threat Agent | NS-Endpoint, S-Endpoint |
301 | Threat Agent | NS-Endpoint, S-Endpoint |
343 | Threat Agent | NS-Endpoint, S-Endpoint |
379 | Threat Agent | NS-Endpoint, S-Endpoint |
426 | Threat Agent | NS-Endpoint, S-Endpoint |
[all …]
A Dthreat_model_spm.rst23 is prevented to map an arbitrary NS physical memory region such as the kernel
75 | ``DF3`` | SPMD to NS forwarding. |
135 - NS-Endpoint identifies a non-secure endpoint: normal world client at NS-EL2
136 (Hypervisor) or NS-EL1 (VM or OS kernel).
176 | ``Threat Agent`` | NS-Endpoint, S-Endpoint |
226 | ``Threat Agent`` | NS-Endpoint, S-Endpoint |
277 | ``Threat Agent`` | NS-Endpoint, S-Endpoint |
347 | ``Threat Agent`` | NS-Endpoint, S-Endpoint |
391 | ``Threat Agent`` | NS-Endpoint, S-Endpoint |
423 | ``Threat Agent`` | NS-Endpoint, S-Endpoint |
[all …]
A Dthreat_model_fvp_r.rst38 - Any threats regarding NS operation are not relevant.
A Dthreat_model.rst139 | | world, including NS-EL0 NS-EL1 and NS-EL2 levels |
/arm-trusted-firmware-2.8.0/docs/components/
A Ddebugfs-design.rst75 non-secure layers, or for which no support exists in the NS side).
81 (`SMC Calling Convention`_), using a specific SiP Function Id. An NS
112 The SMC interface is accessible from an NS environment, that is:
114 - a test payload, bootloader or hypervisor running at NS-EL2
115 - a Linux kernel driver running at NS-EL1
A Drmm-el3-comms-spec.rst15 SMC call from NS.
171 entry from NS Host on receiving an error. This will be done across all the PEs
172 in the system so as to present a symmetric view to the NS Host. Any further
262 results in a world switch to NS. This call is the reply to the original RMI
263 call and it is forwarded by EL3 to the NS world.
278 …err_code,x1,[63:0],RmiCommandReturnCode,Error code returned by the RMI service invoked by NS World…
487 As part of NS world switch, EL3 is expected to maintain a register context
497 As part of SMC forwarding between the NS world and Realm world, EL3 allows x0-x7 to be passed
501 EL3 will always copy x0-x4 from Realm context to NS Context.
513 will not be leaked to the NS Host and to maintain the confidentiality of the Realm World.
[all …]
A Drealm-management-extension.rst103 - NS (TF-A Test or Linux),
109 - NS (TF-A Test or Linux),
270 and a suitable NS boot loader is not available, then this option can be used to
A Dsecure-partition-manager.rst96 - The term Hypervisor refers to the NS-EL2 component managing Virtual Machines
509 the use of two root keys namely S-ROTPK and NS-ROTPK:
512 - BL33 may be signed by the OEM using NS-ROTPK.
513 - An SP may be signed either by SiP (using S-ROTPK) or by OEM (using NS-ROTPK).
515 signed with the NS-ROTPK key.
806 - Hypervisor or OS kernel in NS-EL1/EL2: the SPMD returns the SPMC version
831 SPMC EL2 Stage-1 translation regime and marked as NS buffers in the MMU
1049 NS/S IPA translations. The following controls are set up:
1053 - Stage-2 translations for the NS IPA space access the NS PA space.
1112 - NS-Int: A non-secure physical interrupt. It requires a switch to the normal
[all …]
A Del3-spmc.rst200 The following interfaces are exposed to both NS Client and SPs:
214 The following additional interfaces are forwarded from SPMD to support NS Client:
254 SPMC EL3 translation regime and marked as NS buffers in the MMU
375 - SPMC will set NS Bit to 1 in memory descriptor response.
A Darm-sip-service.rst36 Exception Level (either EL2, or NS EL1 if EL2 isn't implemented) to request to
A Dras.rst203 resulting from errors in NS world, to EL3.
/arm-trusted-firmware-2.8.0/lib/xlat_tables_v2/aarch64/
A Dxlat_tables_arch.c71 return LOWER_ATTRS(EL3_S1_NSE | NS); in xlat_arch_get_pas()
77 return LOWER_ATTRS(NS); in xlat_arch_get_pas()
/arm-trusted-firmware-2.8.0/docs/design_documents/
A Dcontext_mgmt_rework.rst55 It is expected that this skip EL2 configuration is only needed for NS
65 modify EL3 sysreg dynamically during the transition between NS and Secure
101 of NS world, the context is allocated by the PSCI lib. This scheme allows TF-A
111 can also export helpers for initialization of NS CPU Context since there is no
123 have some settings which are distinct from NS/S/Realm worlds. In this case,
140 to S-EL2 as SPM can take care of saving the incoming NS EL1 context.
143 world corresponds to the world it came from (eg: if entering EL3 from NS world,
144 the sysregs correspond to the values in NS context). There is a case that EL3
/arm-trusted-firmware-2.8.0/lib/xlat_tables_v2/
A Dxlat_tables_utils.c100 switch (desc & LOWER_ATTRS(EL3_S1_NSE | NS)) { in xlat_desc_print()
104 case LOWER_ATTRS(NS): in xlat_desc_print()
114 printf(((LOWER_ATTRS(NS) & desc) != 0ULL) ? "-NS" : "-S"); in xlat_desc_print()
/arm-trusted-firmware-2.8.0/lib/xlat_tables_v2/aarch32/
A Dxlat_tables_arch.c53 return LOWER_ATTRS(NS); in xlat_arch_get_pas()
/arm-trusted-firmware-2.8.0/include/lib/xlat_tables/
A Dxlat_tables_defs.h144 #define NS (U(0x1) << 3) macro
/arm-trusted-firmware-2.8.0/docs/resources/diagrams/plantuml/
A Del3_spm_dfd.puml24 nsec [label="NS Client"]
A Dspm_dfd.puml22 nsec [label="NS Client"]
/arm-trusted-firmware-2.8.0/lib/xlat_tables/
A Dxlat_tables_common.c204 desc |= ((attr & MT_NS) != 0U) ? LOWER_ATTRS(NS) : 0U; in mmap_desc()
/arm-trusted-firmware-2.8.0/docs/getting_started/
A Dbuild-options.rst573 Interrupts, resulting from errors in NS world, will be always trapped in
1014 buffer registers from NS ELs when FEAT_BRBE is implemented. BRBE is an
1020 control registers from NS ELs, NS-EL2 or NS-EL1(when NS-EL2 is implemented
1027 registers access from NS ELs, NS-EL2 or NS-EL1 (when NS-EL2 is implemented
1032 access from NS ELs, NS-EL2 or NS-EL1 (when NS-EL2 is implemented but unused),
A Dimage-terminology.rst154 it's in so it makes sense to encode "NS" in the normal world images. The absence
155 of "NS" implies a secure world image.
A Dpsci-lib-integration-guide.rst156 for AArch32 and in EL3 for AArch64. The NS bit in SCR (in AArch32) or SCR_EL3
/arm-trusted-firmware-2.8.0/docs/plat/
A Dimx8m.rst97 API to get the status and events is called from NS world passing destination
A Dnvidia-tegra.rst119 memory controller driver programs this base/size in order to restrict NS
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/
A Dbuild.rst171 … in NS world, will be always trapped in TF-A. TF-A in this case enables dirty hack / workaround for

Completed in 28 milliseconds

12