Home
last modified time | relevance | path

Searched +full:non +full:- +full:secure +full:- +full:callable (Results 1 – 7 of 7) sorted by relevance

/Zephyr-latest/arch/arm/core/cortex_m/tz/
DKconfig1 # ARM TrustZone-M core configuration options
4 # SPDX-License-Identifier: Apache-2.0
7 bool "ARM TrustZone-M support"
11 Platform has support for ARM TrustZone-M.
15 menu "ARM TrustZone-M Options"
18 comment "Secure firmware"
21 comment "Non-secure firmware"
25 bool "BusFault, HardFault, and NMI target Secure state"
28 Force NMI, HardFault, and BusFault (in Mainline ARMv8-M)
29 exceptions as Secure exceptions.
[all …]
Dsecure_entry_functions.ld4 * SPDX-License-Identifier: Apache-2.0
7 /* nRF-specific defines. */
11 - MAX(32, (1 << LOG2CEIL(__sg_size))))
22 /* The ARM SAU requires regions to be 32-byte-aligned. */
35 /* No input section necessary, since the Secure Entry Veneers are
39 __sg_size = __sg_end - __sg_start;
41 __nsc_size = . - __sg_start;
43 /* nRF-specific ASSERT. */
46 #define NRF_SG_SIZE (CONFIG_NRF_SPU_FLASH_REGION_SIZE - NRF_SG_START)
51 "The Non-Secure Callable region size must be a power of 2 \
/Zephyr-latest/dts/bindings/reserved-memory/
Dnordic,owned-memory.yaml2 # SPDX-License-Identifier: Apache-2.0
13 reserved-memory {
15 compatible = "nordic,owned-memory";
36 compatible: "nordic,owned-memory"
38 include: [base.yaml, "zephyr,memory-common.yaml"]
47 Array of (owner-id, permission-flags) pairs, where:
49 - Owner ID represents the domain that will have access to this memory.
53 - Permissions are encoded as a 32-bit bitfield, using the flags found in
54 include/zephyr/dt-bindings/reserved-memory/nordic-owned-memory.h,
64 owner-id:
[all …]
/Zephyr-latest/soc/silabs/silabs_s2/
Dsoc.c4 * SPDX-License-Identifier: Apache-2.0
63 if (SMU->IF & SMU_IF_BMPUSEC) { in smu_fault()
65 PR_EXC("SMU.BMPUFS=%d", SMU->BMPUFS); in smu_fault()
67 if (SMU->IF & SMU_IF_PPUSEC) { in smu_fault()
69 PR_EXC("SMU.PPUFS=%d", SMU->PPUFS); in smu_fault()
79 * If this is a secure app with no non-secure callable functions, it is a secure-only app. in soc_prep_hook()
80 * Configure all peripherals except the SMU and SEMAILBOX to non-secure aliases, and make in soc_prep_hook()
81 * all bus transactions from the CPU have non-secure attribution. in soc_prep_hook()
82 * This makes the secure-only app behave more like a non-secure app, allowing the use of in soc_prep_hook()
83 * libraries that only expect to use non-secure peripherals, such as the radio subsystem. in soc_prep_hook()
[all …]
/Zephyr-latest/include/zephyr/dt-bindings/reserved-memory/
Dnordic-owned-memory.h3 * SPDX-License-Identifier: Apache-2.0
9 #include <zephyr/dt-bindings/dt-util.h>
22 /** Secure-only. */
24 /** Non-secure-callable. */
/Zephyr-latest/include/zephyr/linker/
Dlinker-defs.h2 * Copyright (c) 2013-2014, Wind River Systems, Inc.
4 * SPDX-License-Identifier: Apache-2.0
13 * - Linker script files: for linker section declarations
14 * - C files: for external declaration of address or size of linker section
15 * - Assembly files: for external declaration of address or size of linker
98 * Consists of all kernel-side globals, all kernel objects, all thread stacks,
109 /* Used by z_bss_zero or arch-specific implementation */
113 /* Used by z_data_copy() or arch-specific implementation */
121 /* Virtual addresses of page-aligned kernel image mapped into RAM at boot */
205 * Non-Secure Callable region.
[all …]
/Zephyr-latest/doc/releases/
Drelease-notes-3.3.rst14 * Introduced :ref:`USB-C <usbc_api>` device stack with PD (power delivery)
17 CMSIS-DSP as the default backend.
30 * CVE-2023-0359: Under embargo until 2023-04-20
32 * CVE-2023-0779: Under embargo until 2023-04-22
66 removed in favor of new :dtcompatible:`zephyr,flash-disk` devicetree binding.
71 * Starting from this release ``zephyr-`` prefixed tags won't be created
82 image states). Use of a truncated hash or non-sha256 hash will still work
88 registration function at boot-up. If applications register this then
93 application code, these will now automatically be registered at boot-up (this
129 This may cause out-of-tree scripts or commands to fail if they have relied
[all …]