/trusted-firmware-m-3.4.0/secure_fw/spm/ffm/ |
D | stack_watermark.c | 28 for (int i = 0; i < p_pldi->stack_size / 4; i++) { in watermark_stack() 40 p < (uint32_t *)(LOAD_ALLOCED_STACK_ADDR(p_pldi) + p_pldi->stack_size); in used_stack() 48 return p_pldi->stack_size - (unused_words * 4); in used_stack() 58 SPMLOG_VAL(" Stack bytes: ", p_pt->p_ldinf->stack_size); in dump_used_stacks()
|
D | backend_sfn.c | 137 p_pldi->stack_size); in backend_init_comp_assuredly()
|
D | interrupt.c | 54 + p_owner_sp->p_ldinf->stack_size; in tfm_flih_prepare_depriv_flih()
|
D | backend_ipc.c | 177 p_pldi->stack_size); in backend_init_comp_assuredly()
|
/trusted-firmware-m-3.4.0/secure_fw/spm/include/ |
D | tfm_arch.h | 175 * Make the start stack pointer at 'stack_buf[stack_size]' because 178 #define ARCH_CLAIM_CTXCTRL_INSTANCE(name, stack_buf, stack_size) \ argument 180 .sp = (uint32_t)&stack_buf[stack_size], \ 181 .sp_base = (uint32_t)&stack_buf[stack_size], \
|
/trusted-firmware-m-3.4.0/tools/ |
D | CMakeLists.txt | 123 # - "stack_size" in manifests 133 parse_field_from_yaml("${MANIFEST_FILES}" stack_size STACK_SIZES) 136 # The "stack_size" might not be a valid number. Treat it as a configuration
|
/trusted-firmware-m-3.4.0/tools/templates/ |
D | partition_intermedia.template | 14 uint8_t {{manifest.name.lower()}}_stack[{{manifest.stack_size}}] __attribute__((aligned(8)));
|
D | partition_load_info.template | 124 .stack_size = {{manifest.stack_size}}, 126 .stack_size = 0,
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/internal_trusted_storage/ |
D | tfm_internal_trusted_storage.yaml | 15 "stack_size": "ITS_STACK_SIZE",
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/ns_agent_mailbox/ |
D | ns_agent_mailbox.yaml | 18 "stack_size": "0x800",
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/platform/ |
D | tfm_platform.yaml | 15 "stack_size": "PLATFORM_SP_STACK_SIZE",
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/protected_storage/ |
D | tfm_protected_storage.yaml | 15 "stack_size": "PS_STACK_SIZE",
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/crypto/ |
D | tfm_crypto.yaml | 15 "stack_size": "CRYPTO_STACK_SIZE",
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/firmware_update/ |
D | tfm_firmware_update.yaml | 15 "stack_size": "FWU_STACK_SIZE",
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/initial_attestation/ |
D | tfm_initial_attestation.yaml | 15 "stack_size": "ATTEST_STACK_SIZE",
|
/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/manifest/ |
D | tfm_crypto.yaml | 17 "stack_size": "CRYPTO_STACK_SIZE",
|
D | tfm_initial_attestation.yaml | 17 "stack_size": "ATTEST_STACK_SIZE",
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/idle_partition/ |
D | load_info_idle_sp.c | 43 .stack_size = IDLE_SP_STACK_SIZE,
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/ns_agent_tz/ |
D | load_info_ns_agent_tz.c | 60 .stack_size = CONFIG_TFM_NS_AGENT_TZ_STACK_SIZE,
|
/trusted-firmware-m-3.4.0/secure_fw/spm/include/load/ |
D | partition_defs.h | 71 size_t stack_size; /* Stack size */ member
|
/trusted-firmware-m-3.4.0/docs/integration_guide/services/ |
D | tfm_secure_partition_addition.rst | 109 "stack_size": "0x0200", 242 stack_size subsubsection 244 The ``stack_size`` is required to indicate the stack memory usage of the Secure 255 The allowed values are the same as the ``stack_size``.
|
/trusted-firmware-m-3.4.0/interface/include/ |
D | config_impl.h.template | 43 {% set total_stk.size = total_stk.size + " + " + partition.manifest.stack_size %}
|
/trusted-firmware-m-3.4.0/platform/ext/target/cypress/psoc64/Device/Include/ |
D | system_psoc6.h | 224 * \code .equ Stack_Size, 0x00001000 \endcode 230 * \code STACK_SIZE = 0x1000; \endcode 251 * \code STACK_SIZE = 0x1000; \endcode 259 * \code Stack_Size EQU 0x00001000 \endcode
|
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/ |
D | tfm_secure_partition_runtime_library.rst | 282 "stack_size": "0x1800",
|
D | secure_partition_manager.rst | 726 size_t stack_size; /* Stack size */
|