Searched refs:pointer (Results 1 – 25 of 28) sorted by relevance
12
| /trusted-firmware-m-latest/docs/platform/arm/rse/ |
| D | rse_comms.rst | 57 two protocols currently supported, "embed" (``protocol_ver=0``) and "pointer 101 The pointer access protocol passes the psa_call iovecs as pointers to shared 146 - ``rse_comms_protocol_protocol_access.c``: The pointer access RSE comms protocol. 148 - ``rse_comms_atu.c``: Allocates and frees ATU regions for host pointer access. 149 - ``rse_comms_permissions_hal.c``: Checks service access permissions and pointer validity.
|
| /trusted-firmware-m-latest/platform/ext/target/nordic_nrf/common/core/ |
| D | config.cmake | 18 "Enable null-pointer dereference detection for \ 21 Note that null-pointer dereferences from the NSPE \
|
| /trusted-firmware-m-latest/docs/integration_guide/source_structure/ |
| D | platform_folder.rst | 16 peripherals, that is substituted to a pointer to type 17 ``struct platform_data_t``. The memory that the pointer points 18 to is allocated by the platform code. The pointer gets stored in the partitions
|
| /trusted-firmware-m-latest/docs/security/security_advisories/ |
| D | svc_caller_sp_fetching_vulnerability.rst | 35 pointer: 51 Main stack pointer (MSP) is always used in 'Handler mode', which is irrelevant 53 pointer (PSP_S, S suffix here indicates the security state) for further SVC 57 stack pointer register by checking both the PE mode and SPSEL bit. The handler 66 When the vulnerability is happening, PSP_S is the incorrect stack pointer
|
| D | index.rst | 40 | |TFMV-8| | Unchecked user-supplied pointer via mailbox messages may cause |
|
| D | user_pointers_mailbox_vectors_vulnerability.rst | 5 | Title | Unchecked user-supplied pointer via mailbox messages may |
|
| /trusted-firmware-m-latest/platform/ext/target/arm/rse/common/host_drivers/ni_tower/discovery/ |
| D | ni_tower_discovery_reg.h | 56 __IM uint32_t pointer; member
|
| D | ni_tower_discovery_drv.c | 80 *ret_off_addr = component_hdr->subfeature[s_idx].pointer; in ni_tower_discover_subfeature_offset()
|
| /trusted-firmware-m-latest/docs/building/ |
| D | run_tfm_examples_on_arm_platforms.rst | 154 Description: 'Get handle with null handle pointer (DEPRECATED)' 210 Description: 'Get handle with null handle pointer (DEPRECATED)' 301 Description: 'Get handle with null handle pointer (DEPRECATED)' 308 Description: 'Get attributes with null attributes struct pointer' 491 Description: 'Set interface with NULL data pointer' 544 Description: 'Set interface with NULL data pointer'
|
| /trusted-firmware-m-latest/docs/design_docs/services/ |
| D | secure_partition_runtime_library.rst | 70 The pointer validation needs to be considered. In general, at least the 71 'non-NULL' checking is mandatory. A detection for invalid pointer leads to a 213 pointer in a known position in the stack, but there is a bit of difficulty in 222 Another common method is to put the pointer in one shared global variable, and
|
| D | tfm_psa_inter_process_communication.rst | 97 - Stack pointer 98 - Stack pointer limitation
|
| D | tfm_fwu_service.rst | 123 - ``manifest``: A pointer to a buffer containing a detached manifest for the update.
|
| /trusted-firmware-m-latest/docs/integration_guide/ |
| D | tfm_secure_irq_integration_guide.rst | 212 It is a pointer to structure instance that usually includes the base address 307 - ``p_pt`` - pointer to Partition runtime struct of the owner Partition 308 - ``p_ildi`` - pointer to ``irq_load_info_t`` struct of the interrupt
|
| /trusted-firmware-m-latest/platform/ext/target/cypress/psoc64/libs/core-lib/docs/html/search/ |
| D | search.css | 150 cursor: pointer;
|
| /trusted-firmware-m-latest/docs/design_docs/software/ |
| D | hardware_abstraction_layer.rst | 548 If the implementation chooses to encode a pointer as the boundary, 549 a platform-specific pointer validation needs to be considered before 550 referencing the content in this pointer. 756 - ``p_pt`` - pointer to Partition runtime struct of the owner Partition 757 - ``p_ildi`` - pointer to ``irq_load_info_t`` struct of the interrupt
|
| D | code_sharing.rst | 100 Function pointer in shared global data() | 115 call a non-shared function in SPE code through a global function pointer.
|
| /trusted-firmware-m-latest/platform/ext/target/cypress/psoc64/libs/core-lib/docs/html/ |
| D | doxygen_style.css | 745 cursor: pointer; 758 cursor: pointer; 1266 cursor: pointer;
|
| /trusted-firmware-m-latest/platform/ext/common/armclang/ |
| D | tfm_isolation_l3.sct.template | 253 * of TFM partition metadata pointer region.
|
| D | tfm_common_s.sct | 195 * of TFM partition metadata pointer region.
|
| /trusted-firmware-m-latest/platform/ext/common/iar/ |
| D | tfm_isolation_l3.icf.template | 221 * of TFM partition metadata pointer region.
|
| D | tfm_common_s.icf | 154 * of TFM partition metadata pointer region.
|
| /trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/ |
| D | psa_driver_api_design.rst | 53 treat each object as an opaque pointer, while any module that needs access to
|
| /trusted-firmware-m-latest/config/ |
| D | config_base.cmake | 192 …st-overflow; nonnull-attribute;returns-nonnull-attribute; bool;enum;vptr;pointer-overflow;builtin")
|
| /trusted-firmware-m-latest/docs/design_docs/dual-cpu/ |
| D | mailbox_design_on_dual_core_system.rst | 854 | ``args`` | The pointer to the structure of PSA Client call parameters. | 1206 | ``msg_ptr`` | The pointer to the message to be sent. | 1237 | ``msg_ptr`` | The pointer to buffer for message to be received. |
|
| /trusted-firmware-m-latest/docs/getting_started/ |
| D | tfm_getting_started.rst | 407 Description: 'Set interface with NULL data pointer'
|
12