@AndreaBarisani I'd like the dojo material so I can take the piss on @dragosr & TZ DMA, thanks ;)
-
-
Replying to @cynicalsecurity
@cynicalsecurity@AndreaBarisani Arrigo you need to go to http://infocenter.arm.com :-P Trying to identify display read access security state.2 replies 0 retweets 0 likes -
Replying to @dragosr
@dragosr@cynicalsecurity no, u need to understand that VPU is a peripheral and http://arm.com info and/or MMU play no role here ;)1 reply 0 retweets 0 likes -
Replying to @AndreaBarisani
@AndreaBarisani@cynicalsecurity well if you are certain there are no unexpected ways you can use the display processing tables and DMA...2 replies 0 retweets 0 likes -
Replying to @dragosr
@dragosr@cynicalsecurity we spent months hammering this thing while making the USB armory and the dojo, it is really not that simple1 reply 0 retweets 0 likes -
Replying to @AndreaBarisani
@AndreaBarisani@cynicalsecurity never called this simple. Saw not very well documented microcode with DMA and got curious. Still am.1 reply 1 retweet 0 likes -
Replying to @dragosr
@dragosr@cynicalsecurity you are going to love the SDMA core then2 replies 0 retweets 0 likes -
-
Replying to @cynicalsecurity
@cynicalsecurity@dragosr independent RISC core for DMA operations, own RAM, instruction set and volatile microcode, still safe under TZ1 reply 0 retweets 1 like -
Replying to @AndreaBarisani
@AndreaBarisani@dragosr volatile microcode for?1 reply 0 retweets 0 likes
@cynicalsecurity @dragosr for its own "scripts" to have custom DMA ops http://billauer.co.il/blog/2011/10/imx-sdma-howto-assembler-linux/ …
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.