Home
last modified time | relevance | path

Searched refs:pointer (Results 1 – 25 of 28) sorted by relevance

12

/trusted-firmware-m-latest/docs/platform/arm/rse/
Drse_comms.rst57 two protocols currently supported, "embed" (``protocol_ver=0``) and "pointer
101 The pointer access protocol passes the psa_call iovecs as pointers to shared
146 - ``rse_comms_protocol_protocol_access.c``: The pointer access RSE comms protocol.
148 - ``rse_comms_atu.c``: Allocates and frees ATU regions for host pointer access.
149 - ``rse_comms_permissions_hal.c``: Checks service access permissions and pointer validity.
/trusted-firmware-m-latest/platform/ext/target/nordic_nrf/common/core/
Dconfig.cmake18 "Enable null-pointer dereference detection for \
21 Note that null-pointer dereferences from the NSPE \
/trusted-firmware-m-latest/docs/integration_guide/source_structure/
Dplatform_folder.rst16 peripherals, that is substituted to a pointer to type
17 ``struct platform_data_t``. The memory that the pointer points
18 to is allocated by the platform code. The pointer gets stored in the partitions
/trusted-firmware-m-latest/docs/security/security_advisories/
Dsvc_caller_sp_fetching_vulnerability.rst35 pointer:
51 Main stack pointer (MSP) is always used in 'Handler mode', which is irrelevant
53 pointer (PSP_S, S suffix here indicates the security state) for further SVC
57 stack pointer register by checking both the PE mode and SPSEL bit. The handler
66 When the vulnerability is happening, PSP_S is the incorrect stack pointer
Dindex.rst40 | |TFMV-8| | Unchecked user-supplied pointer via mailbox messages may cause |
Duser_pointers_mailbox_vectors_vulnerability.rst5 | Title | Unchecked user-supplied pointer via mailbox messages may |
/trusted-firmware-m-latest/platform/ext/target/arm/rse/common/host_drivers/ni_tower/discovery/
Dni_tower_discovery_reg.h56 __IM uint32_t pointer; member
Dni_tower_discovery_drv.c80 *ret_off_addr = component_hdr->subfeature[s_idx].pointer; in ni_tower_discover_subfeature_offset()
/trusted-firmware-m-latest/docs/building/
Drun_tfm_examples_on_arm_platforms.rst154 Description: 'Get handle with null handle pointer (DEPRECATED)'
210 Description: 'Get handle with null handle pointer (DEPRECATED)'
301 Description: 'Get handle with null handle pointer (DEPRECATED)'
308 Description: 'Get attributes with null attributes struct pointer'
491 Description: 'Set interface with NULL data pointer'
544 Description: 'Set interface with NULL data pointer'
/trusted-firmware-m-latest/docs/design_docs/services/
Dsecure_partition_runtime_library.rst70 The pointer validation needs to be considered. In general, at least the
71 'non-NULL' checking is mandatory. A detection for invalid pointer leads to a
213 pointer in a known position in the stack, but there is a bit of difficulty in
222 Another common method is to put the pointer in one shared global variable, and
Dtfm_psa_inter_process_communication.rst97 - Stack pointer
98 - Stack pointer limitation
Dtfm_fwu_service.rst123 - ``manifest``: A pointer to a buffer containing a detached manifest for the update.
/trusted-firmware-m-latest/docs/integration_guide/
Dtfm_secure_irq_integration_guide.rst212 It is a pointer to structure instance that usually includes the base address
307 - ``p_pt`` - pointer to Partition runtime struct of the owner Partition
308 - ``p_ildi`` - pointer to ``irq_load_info_t`` struct of the interrupt
/trusted-firmware-m-latest/platform/ext/target/cypress/psoc64/libs/core-lib/docs/html/search/
Dsearch.css150 cursor: pointer;
/trusted-firmware-m-latest/docs/design_docs/software/
Dhardware_abstraction_layer.rst548 If the implementation chooses to encode a pointer as the boundary,
549 a platform-specific pointer validation needs to be considered before
550 referencing the content in this pointer.
756 - ``p_pt`` - pointer to Partition runtime struct of the owner Partition
757 - ``p_ildi`` - pointer to ``irq_load_info_t`` struct of the interrupt
Dcode_sharing.rst100 Function pointer in shared global data() |
115 call a non-shared function in SPE code through a global function pointer.
/trusted-firmware-m-latest/platform/ext/target/cypress/psoc64/libs/core-lib/docs/html/
Ddoxygen_style.css745 cursor: pointer;
758 cursor: pointer;
1266 cursor: pointer;
/trusted-firmware-m-latest/platform/ext/common/armclang/
Dtfm_isolation_l3.sct.template253 * of TFM partition metadata pointer region.
Dtfm_common_s.sct195 * of TFM partition metadata pointer region.
/trusted-firmware-m-latest/platform/ext/common/iar/
Dtfm_isolation_l3.icf.template221 * of TFM partition metadata pointer region.
Dtfm_common_s.icf154 * of TFM partition metadata pointer region.
/trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/
Dpsa_driver_api_design.rst53 treat each object as an opaque pointer, while any module that needs access to
/trusted-firmware-m-latest/config/
Dconfig_base.cmake192 …st-overflow; nonnull-attribute;returns-nonnull-attribute; bool;enum;vptr;pointer-overflow;builtin")
/trusted-firmware-m-latest/docs/design_docs/dual-cpu/
Dmailbox_design_on_dual_core_system.rst854 | ``args`` | The pointer to the structure of PSA Client call parameters. |
1206 | ``msg_ptr`` | The pointer to the message to be sent. |
1237 | ``msg_ptr`` | The pointer to buffer for message to be received. |
/trusted-firmware-m-latest/docs/getting_started/
Dtfm_getting_started.rst407 Description: 'Set interface with NULL data pointer'

12