References:
“The block is designed to filter requests to memory and peripherals”
“Requests are checked on the basis of request address (and size) and the request source ID (SID)”
Possible usage scenarios:
Base IOPMP function
SID entry point: iopmp rule number that the checking start from.
Rule masking
Jump rule
Flexible unclock control
Strong ordering
Boot access
If you could revise
the fundmental principles of
computer system design
to improve security...
... what would you change?