Home
last modified time | relevance | path

Searched refs:function (Results 1 – 25 of 56) sorted by relevance

123

/trusted-firmware-a-latest/plat/xilinx/common/include/
Dpm_svc_main.h27 #define SECURE_REDUNDANT_CALL(status, status_tmp, function, ...) \ argument
29 status = function(__VA_ARGS__); \
30 status_tmp = function(__VA_ARGS__); \
/trusted-firmware-a-latest/docs/components/
Dromlib-design.rst34 lib function [patch]
36 lib -- Name of the library the function belongs to
37 function -- Name of the function to be placed in library at ROM
38 [patch] -- Option to patch the function
41 "reserved" rather than the "lib" and "function" names as shown below:
60 When invoking a function of the "library at ROM", the calling sequence is as
63 BL image --> wrapper function --> jump table entry --> library at ROM
68 corresponding to the original function. Finally, the original function in the BL
69 image(s) is replaced with the wrapper function.
71 The "library at ROM" contains a necessary init function that initialises the
[all …]
Dfirmware-update.rst114 as part of the :ref:`PSA Firmware Update` procedure have failed to function.
233 uint32_t function ID : 0x0
246 uint32_t function ID : 0x1
260 uint32_t function ID : 0x3
274 uint32_t function ID : 0x4
294 uint32_t function ID : 0x10
343 uint32_t function ID : 0x11
383 uint32_t function ID : 0x12
411 uint32_t function ID : 0x13
438 uint32_t function ID : 0x14
[all …]
Dsecure-partition-manager-mm.rst55 - A range of synchronous exceptions (e.g. SMC function identifiers).
299 The current implementation reserves function IDs for Fast Calls in the Standard
302 function prototypes for each function ID. The function IDs specify whether one
351 This function returns the version of the Secure Partition Manager
361 minor revision value of revision A, then every function in revision A must
363 revision B to have a higher function count than revision A.
367 If this function returns a valid version number, all the functions that are
369 that a function is optional.
538 In the current implementation, this parameter contains the function ID of
573 This function signals to the SPM that the handling of the last event delegated
[all …]
Dactivity-monitors.rst27 - A platform implementation of the ``plat_amu_topology`` function (the default).
/trusted-firmware-a-latest/docs/
Dporting-guide.rst11 - Implementing a platform-specific function or variable,
77 platform-specific architecture setup function, ``blX_plat_arch_setup()``, and uses
143 function.
640 behaviour of the ``assert()`` function (for example, to save memory).
712 This function is called with the MMU and caches disabled
713 (``SCTLR_EL3.M`` = 0 and ``SCTLR_EL3.C`` = 0). The function is responsible for
717 BL31 initialization. If it's a cold reset then this function must return zero.
719 This function does not follow the Procedure Call Standard used by the
722 function.
724 This function fulfills requirement 1 and 3 listed above.
[all …]
/trusted-firmware-a-latest/docs/components/spd/
Dtrusty-dispatcher.rst15 specific function:
21 If this function is provided ``args->arg0`` must be set to the memory
23 function, but defines ``TSP_SEC_MEM_SIZE``, a default implementation
/trusted-firmware-a-latest/docs/components/fconf/
Dindex.rst40 then the platform has to provide a ``populate()`` function which essentially
44 Such a ``populate()`` function is usually platform specific and is associated
45 with a specific backend source. For example, a populator function which
47 Hence each ``populate()`` function must be registered with a specific
60 with the ``FCONF_REGISTER_POPULATOR()`` macro. This ensures that the function
61 would be called inside the generic ``fconf_populate()`` function during
84 anything appropriate: structure, array, function, etc..
103 Once a valid device tree is available, the ``fconf_populate(config)`` function
105 This function will call all the ``populate()`` callbacks which have been
/trusted-firmware-a-latest/docs/design_documents/
Dmeasured_boot.rst130 - In BL1, this function is used to initialize the Event Log backend
133 - In BL2, this function is used to initialize the Event Log buffer with
144 - Measure the image using a hash function of the crypto module.
152 - This function must return 0 on success, a signed integer error code
154 - On the Arm FVP port, this function measures the given image and then
178 - In BL1, this function is used to pass the base address of
182 - In BL2, this function is used to pass the Event Log buffer information
199 This function measures the given critical data structure and records its
201 This function must return 0 on success, a signed integer error code
214 - This function is used by the platform to measure the passed key and
[all …]
Dpsci_osi_mode.rst118 PSCI_FEATURES is for checking whether or not a PSCI function is implemented and
124 :param psci_func_id: the function ID of a PSCI function.
125 :retval NOT_SUPPORTED: if the function is not implemented.
126 :retval feature flags associated with the function: if the function is
299 * This function calls a platform specific ``validate_power_state`` handler,
305 * This function takes the ``state_info`` object containing the requested power
311 * This function takes the target power level and the ``state_info`` object
340 * Implement a new function handler ``psci_set_suspend_mode`` for
347 * Implement a new function ``psci_validate_state_coordination`` that ensures the
355 This function differs from ``psci_do_state_coordination`` in that:
/trusted-firmware-a-latest/lib/romlib/
Djmptbl.i7 # lib function [patch]
8 # Add "patch" at the end of the line to patch a function. For example:
/trusted-firmware-a-latest/docs/security_advisories/
Dsecurity-advisory-tfv-4.rst73 ``bl1_fwu_image_copy()`` function, which has the following function prototype:
87 the platform-specific function ``bl1_plat_mem_check()`` might get defeated by
95 function, which has the following function prototype:
106 they might defeat the ``bl1_plat_mem_check()`` function and make the
Dsecurity-advisory-tfv-1.rst58 Two of the vulnerabilities are in the function ``bl1_fwu_image_copy()`` in
135 ARM platform version of this function contains a similar vulnerability:
137 - Line 88 of ``plat/arm/common/arm_bl1_fwu.c`` in function of
153 This function checks that the passed memory region is within one of the
156 ``mem_size`` may result in an integer overflow and the function to incorrectly
/trusted-firmware-a-latest/docs/getting_started/
Drt-svc-writers-guide.rst13 the SMC Calling Convention PDD (`SMCCC`_). The `SMCCC`_ assigns function
107 - ``_setup`` is the initialization function with the ``rt_svc_init`` signature:
113 - ``_smch`` is the SMC handler function with the ``rt_svc_handle`` signature:
155 the service initialization function (``_setup`` in the declaration). This
156 function must carry out any essential EL3 initialization prior to receiving a
157 SMC Function call via the handler function.
159 On success, the initialization function must return ``0``. Any other return value
171 initialization function must itself cause the firmware boot to be halted.
181 handler function (``_smch`` in the service declaration). This function must have
202 #. Determining if the requested function is valid for the calling security
[all …]
Dpsci-lib-integration-guide.rst65 #. If the SMC function identifier corresponds to a SMC32 PSCI API, construct
180 This function is to be called by the primary CPU during cold boot before
190 /* The warm boot entrypoint function */
217 After ``psci_setup()`` and prior to exit to the non-secure world, this function
220 argument) will be used to determine the non-secure context. After this function
235 management operations. This function is used to register the ``spd_pm_ops_t``
237 appropriately during power management. Calling this function is optional and
252 This function is the top level handler for SMCs which fall within the
253 PSCI service range specified in `SMCCC`_. The function ID ``smc_fid`` (first
263 PSCI API corresponding to ``smc_fid``. This function may not return back to the
[all …]
/trusted-firmware-a-latest/lib/compiler-rt/builtins/
Dint_util.h24 const char *function);
/trusted-firmware-a-latest/plat/rockchip/common/aarch64/
Dpmu_sram_cpus_on.S14 .type \_name, %function
/trusted-firmware-a-latest/plat/rockchip/common/aarch32/
Dpmu_sram_cpus_on.S14 .type \_name, %function
/trusted-firmware-a-latest/plat/rockchip/common/pmusram/
Dcpus_on_fixed_addr.S17 .type \_name, %function
/trusted-firmware-a-latest/include/common/
Dasm_macros_common.S33 .type \_name, %function
/trusted-firmware-a-latest/docs/process/
Dcoding-style.rst100 Note that there is no space between the name of a function and the following
148 Example for a function:
209 Use lowercase for function names, separating multiple words with an underscore
223 Local variables and function parameters use the same format as function names:
252 Place any function attributes after the function type and before the function
459 This allows function declarations in other header files that depend on the
478 function shall use the same names and type qualifiers".
Dcoding-guidelines.rst158 | libc function | Status | Comments |
228 interpreting invalid state or bad function arguments as programming errors using
241 - Bad argument supplied to library function
242 - Bad argument provided by platform porting function
292 call ``panic()``. This will end up calling the platform-specific function
295 then emit an ``ERROR`` message and call the platform-specific function
388 - If an argument in a function declaration is pointing to a known type then
391 - If a variable (including an argument in a function declaration) is pointing
398 - For other pointer arguments in a function declaration, use ``void *``. This
400 pointers to arbitrary data. This allows the calling function to pass a
[all …]
/trusted-firmware-a-latest/plat/arm/board/fvp/
Djmptbl.i12 # lib function [patch]
/trusted-firmware-a-latest/plat/arm/board/juno/
Djmptbl.i12 # lib function [patch]
/trusted-firmware-a-latest/docs/design/
Dinterrupt-framework-design.rst364 The function will return ``0`` upon a successful registration. It will return
375 in the ``cpu_context`` is used by the ``el3_exit()`` function to program the
411 SPD initialisation function pointed to by the ``bl32_init`` variable.
443 It performs the following actions in the ``tspd_init()`` function to fulfill the
458 #. The TSPD implements a handler function for Secure-EL1 interrupts. This
459 function is registered with the EL3 runtime firmware using the
475 implements a handler function for non-secure interrupts. This function is
561 allocate a function identifier to issue a SMC64 or SMC32 to the SPD
563 non-secure interrupt. If this function identifier is not known to the SPD
669 #. Calling the registered handler function for the interrupt type generated.
[all …]

123