You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SM violation IRQ (for debug purposes) doesn't always reliably fire. The signal should probably be buffered in the front-end for the remainder of the currently executing instruction.
The text was updated successfully, but these errors were encountered:
Update. Upon an exec_violation when jumping to a non-SM entry address, the violating instruction is still executed. The memory backbone component properly blocks any memory read/write operations, but instructions such as sancus_disable that do not touch memory still execute normally.
Solution. Block Sancus instructions in the execution unit upon sm_violation signal.
SM violation IRQ (for debug purposes) doesn't always reliably fire. The signal should probably be buffered in the front-end for the remainder of the currently executing instruction.
The text was updated successfully, but these errors were encountered: