Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 34) sorted by relevance

12

/trusted-firmware-m-3.7.0/platform/ext/target/cypress/psoc64/
Dtfm_hal_isolation.c101 bool privileged; in tfm_hal_bind_boundary() local
110 privileged = true; in tfm_hal_bind_boundary()
112 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
137 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
149 bool privileged = !!((uint32_t)boundary & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
153 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps2/an519/
Dtfm_hal_isolation.c164 bool privileged; in tfm_hal_bind_boundary() local
177 privileged = true; in tfm_hal_bind_boundary()
179 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
212 if (privileged) { in tfm_hal_bind_boundary()
225 if (!privileged) { in tfm_hal_bind_boundary()
242 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
256 bool privileged = !!((uint32_t)boundary & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
260 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/arm/corstone1000/
Dtfm_hal_isolation.c243 bool privileged; in tfm_hal_bind_boundary() local
252 privileged = true; in tfm_hal_bind_boundary()
254 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
258 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
276 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
280 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/arm/musca_s1/
Dtfm_hal_isolation.c172 bool privileged; in tfm_hal_bind_boundary() local
185 privileged = true; in tfm_hal_bind_boundary()
187 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
222 if (privileged) { in tfm_hal_bind_boundary()
235 if (!privileged) { in tfm_hal_bind_boundary()
252 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
266 bool privileged = !!(((uint32_t)boundary) & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
270 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/nuvoton/common/
Dtfm_hal_isolation.c265 bool privileged; in tfm_hal_bind_boundary() local
279 privileged = true; in tfm_hal_bind_boundary()
281 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
314 if (privileged) { in tfm_hal_bind_boundary()
327 if (!privileged) { in tfm_hal_bind_boundary()
363 partition_attrs |= ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
378 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
389 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
402 if (privileged) { in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/common/
Dtfm_hal_isolation_v8m.c282 bool privileged; in tfm_hal_bind_boundary() local
299 privileged = true; in tfm_hal_bind_boundary()
301 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
336 if (privileged) { in tfm_hal_bind_boundary()
349 if (!privileged) { in tfm_hal_bind_boundary()
398 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
412 bool privileged = !!((uint32_t)boundary & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
416 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/arm/musca_b1/
Dtfm_hal_isolation.c277 bool privileged; in tfm_hal_bind_boundary() local
291 privileged = true; in tfm_hal_bind_boundary()
293 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
326 if (privileged) { in tfm_hal_bind_boundary()
340 if (!privileged) { in tfm_hal_bind_boundary()
376 partition_attrs |= ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
391 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
402 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
415 if (privileged) { in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/stm32l5xx/secure/
Dtfm_hal_isolation.c269 bool privileged; in tfm_hal_bind_boundary() local
283 privileged = true; in tfm_hal_bind_boundary()
285 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
318 if (!privileged) { in tfm_hal_bind_boundary()
354 partition_attrs |= ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
369 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
380 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
393 if (privileged) { in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/stm32u5xx/secure/
Dtfm_hal_isolation.c360 bool privileged; in tfm_hal_bind_boundary() local
374 privileged = true; in tfm_hal_bind_boundary()
376 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
409 if (!privileged) { in tfm_hal_bind_boundary()
425 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
440 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
444 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/nxp/common/
Dtfm_hal_isolation.c337 bool privileged; in tfm_hal_bind_boundary() local
352 privileged = true; in tfm_hal_bind_boundary()
354 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
383 ppc_configure_to_secure(plat_data_ptr, privileged); in tfm_hal_bind_boundary()
389 if (!privileged) { in tfm_hal_bind_boundary()
425 partition_attrs |= ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
440 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
452 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
465 if (privileged) { in tfm_hal_activate_boundary()
640 void ppc_configure_to_secure(struct platform_data_t *platform_data, bool privileged) in ppc_configure_to_secure() argument
[all …]
Dtarget_cfg_common.h65 void ppc_configure_to_secure(struct platform_data_t *platform_data, bool privileged);
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/stm32h5xx/secure/
Dtfm_hal_isolation.c420 bool privileged; in tfm_hal_bind_boundary() local
434 privileged = true; in tfm_hal_bind_boundary()
436 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
469 if (!privileged) { in tfm_hal_bind_boundary()
485 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
500 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
504 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps2/an521/
Dtfm_hal_isolation.c392 bool privileged; in tfm_hal_bind_boundary() local
410 privileged = true; in tfm_hal_bind_boundary()
412 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
452 if (privileged) { in tfm_hal_bind_boundary()
473 if (!privileged) { in tfm_hal_bind_boundary()
510 partition_attrs |= ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
525 bool privileged = !!(local_handle & HANDLE_ATTR_PRIV_MASK); in tfm_hal_activate_boundary() local
540 ctrl.b.nPRIV = privileged ? 0 : 1; in tfm_hal_activate_boundary()
553 if (privileged) { in tfm_hal_activate_boundary()
/trusted-firmware-m-3.7.0/docs/security/security_advisories/
Dstack_seal_vulnerability.rst78 As described in the white paper, de-privileged interrupt handling is
79 also vulnerable to this problem. The Library mode of TF-M uses de-privileged
81 secure interrupt handling. But if the de-privileged handler makes a
86 part of de-privileged interrupt handling mitigates this vulnerability.
89 and does not use de-privileged interrupt handling mechanism. The PSA signal
99 (either via underflow of MSP_S or from top of MSP_S stack in de-privileged
104 of MSP_S before handing control over to de-privileged interrupt handler.
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/common/core/
Dtfm_hal_isolation.c78 bool privileged; in tfm_hal_bind_boundary() local
83 privileged = true; in tfm_hal_bind_boundary()
85 privileged = IS_PSA_ROT(p_ldinf); in tfm_hal_bind_boundary()
89 partition_attrs = ((uint32_t)privileged << HANDLE_ATTR_PRIV_POS) & in tfm_hal_bind_boundary()
134 if (!privileged) { in tfm_hal_bind_boundary()
/trusted-firmware-m-3.7.0/docs/releases/
D1.5.0.rst93 * - | Armclang 6.17 generates STRBT instead of STRB in privileged code.
94 | MemManage fault occurs when the privileged code calls STRBT to access
95 | a memory location only for privileged access.
/trusted-firmware-m-3.7.0/platform/ext/common/armclang/
Dtfm_common_s.sct159 * regions, unprivileged data sections and privileged data sections are
160 * separated and gathered in unprivileged/privileged data area respectively.
163 * privileged data region on Armv6-M/v7-M cores.
231 * Move BL2 shared area and MSP stack to the beginning of privileged data
/trusted-firmware-m-3.7.0/lib/ext/ethos_u_core_driver/
D001-Remove-malloc-usage.patch40 - dev->privileged = privilege_enable;
/trusted-firmware-m-3.7.0/platform/ext/common/iar/
Dtfm_common_s.icf183 * Move BL2 shared area and MSP stack to the beginning of privileged data
317 * regions, unprivileged data sections and privileged data sections are
318 * separated and gathered in unprivileged/privileged data area respectively.
321 * privileged data region on Armv6-M/v7-M cores.
364 * Move BL2 shared area and MSP stack to the beginning of privileged data
/trusted-firmware-m-3.7.0/platform/ext/common/gcc/
Dtfm_common_s.ld301 * regions, unprivileged data sections and privileged data sections are
302 * separated and gathered in unprivileged/privileged data area respectively.
305 * privileged data region on Armv6-M/v7-M cores.
408 * Move BL2 shared area and MSP stack to the beginning of privileged data
/trusted-firmware-m-3.7.0/docs/design_docs/dual-cpu/
Dtfm_multi_core_access_check.rst57 - Unprivileged secure access should not access privileged secure memory region
107 if (Not in privileged level) {
157 check may skip the privileged/unprivileged permission check for non-secure
160 If a multi-core system enforces the privileged/unprivileged isolation and
274 memory region allows privileged read/write. Both the fields are valid only
/trusted-firmware-m-3.7.0/docs/integration_guide/services/
Dtfm_platform_integration_guide.rst107 run in privileged mode in level 3 is not in place due to an ongoing work in
/trusted-firmware-m-3.7.0/docs/
Dglossary.rst125 ARMv7M assembly instruction to call a privileged handler function
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/device/source/
Dplatform_s_device_definition.c571 .privileged = 0,
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/corstone310/common/device/source/
Dplatform_s_device_definition.c573 .privileged = 0,

12