SPRUJC6A December 2024 – July 2025 AM2752-Q1 , AM2754-Q1
The FLC passes the originating secure, priv, and privid from the original initiator on any command that is passed without address translation. All accesses to the FLC remote SRAM or accesses that copy the FLC range from the Flash carry the Privilege InterFace (PIF) secure, priv, and privid values. This allows the FLC remote data memory firewall to be able to determine who is the source of the operation and protect the FLC remote data memory from other initiators.
Since FLC copy accesses to the Flash also use the PIF security context, the system must allow the PIF security context to access the FLC range in the Flash.
The RL2 passes the originating secure, priv, and privid from the original initiator on any command that is not modified due to L2 hit detection. When the remote cache data storage memory is written due to a read allocate or read due to an L2 hit; the Privilege InterFace (PIF) secure, priv, and privid values are used. This allows the remote cache data storage memory firewall to be able to determine who is the source of the operation and protect the cache data storage from other initiators.