/trusted-firmware-a-latest/lib/stack_protector/ |
D | stack_protector.mk | 15 TF_CFLAGS += -fno-stack-protector
|
/trusted-firmware-a-latest/drivers/renesas/common/pwrc/ |
D | pwrc.h | 74 extern uint32_t rcar_pwrc_switch_stack(uintptr_t jump, uintptr_t stack,
|
D | pwrc.c | 733 uintptr_t stack = (uintptr_t) (DEVICE_SRAM_STACK_BASE + in rcar_pwrc_set_suspend_to_ram() local 744 rcar_pwrc_switch_stack(jump, stack, NULL); in rcar_pwrc_set_suspend_to_ram()
|
/trusted-firmware-a-latest/docs/plat/arm/juno/ |
D | index.rst | 16 stack that includes TF-A. This version of TF-A is tested with pre-built 17 `Linaro release software stack`_ version 20.01. You can alternatively 18 build the software stack yourself by following the 19 `Juno platform software user guide`_. Once you prepare the software stack 28 a single FIP binary. It assumes that a Linaro release software stack has been 246 .. _Linaro release software stack: http://releases.linaro.org/members/arm/platforms/
|
/trusted-firmware-a-latest/docs/security_advisories/ |
D | security-advisory-tfv-11.rst | 43 Call stack: 57 Call stack:
|
D | security-advisory-tfv-7.rst | 58 This approach permanently mitigates the entire software stack and no additional 87 approach will effectively permanently mitigate the entire software stack, since
|
D | security-advisory-tfv-8.rst | 29 ``x0`` to ``x3`` are not part of the CPU context saved on the stack. 38 CPU context stored on the stack. This includes registers ``x0`` to ``x3``, as
|
D | security-advisory-tfv-9.rst | 106 (from r1p0). The patch stack also includes an implementation for a specified
|
/trusted-firmware-a-latest/fdts/ |
D | juno-ethosn.dtsi | 10 * Refer to the Arm(R) Ethos(TM)-N driver stack for complete device tree examples. 11 * https://github.com/ARM-software/ethos-n-driver-stack
|
/trusted-firmware-a-latest/docs/plat/arm/fvp-ve/ |
D | index.rst | 27 - Obtain arm toolchain. The software stack has been verified with linaro 6.2
|
/trusted-firmware-a-latest/services/spd/trusty/ |
D | trusty.c | 172 uint64_t handler, uint64_t stack) in trusty_set_fiq_handler() argument 184 ctx->fiq_handler_sp = stack; in trusty_set_fiq_handler()
|
/trusted-firmware-a-latest/docs/plat/ |
D | xilinx-zynqmp.rst | 95 The stack size in TF-A for ZynqMP platform is configurable. 96 The custom package can define the desired stack size as per the requirement in
|
D | qemu.rst | 94 An alternate approach to deploy a full system stack on QEMU is to load the 99 For example, to test the following firmware stack:
|
/trusted-firmware-a-latest/plat/renesas/common/ |
D | plat_pm.c | 39 extern void rcar_pwrc_restore_generic_timer(uint64_t *stack);
|
/trusted-firmware-a-latest/lib/compiler-rt/builtins/ |
D | assembly.h | 53 #define NO_EXEC_STACK_DIRECTIVE .section .note.GNU-stack,"",%progbits
|
/trusted-firmware-a-latest/docs/components/ |
D | exception-handling.rst | 62 rest of the handling to a dedicated software stack running at lower Secure 66 processing of the error to dedicated software stack running at lower secure 95 priority levels as applicable for the Secure software stack. It then assigns the 132 stack—priority levels stack up in strictly increasing fashion, and need to be
|
D | secure-partition-manager-mm.rst | 26 The following diagram illustrates the corresponding software stack: 31 centres and enterprise servers) the secure software stack typically does not 65 Armv8-A software stack. A single or multiple Secure Partitions provide secure 470 A non-zero value will indicate that the SPM has initialised the stack pointer
|
D | sdei.rst | 311 written in C: compilers typically adjust the stack frame at the beginning and 343 /* Save link register whilst maintaining stack alignment */
|
/trusted-firmware-a-latest/docs/perf/ |
D | psci-performance-n1sdp.rst | 85 These instructions presume you have a complete firmware stack. The N1SDP
|
/trusted-firmware-a-latest/docs/ |
D | porting-guide.rst | 55 each BL stage to correctly port the firmware stack. They are categorized as 131 Defines the normal stack memory available to each CPU. This constant is used 1249 This function sets the current stack pointer to the normal memory stack that 1251 stack for the primary CPU, the UP version of the function is used. The size 1252 of the stack allocated to each CPU is specified by the platform defined 1267 This function returns the base address of the normal memory stack that 1269 stack for the primary CPU, the UP version of the function is used. The size 1270 of the stack allocated to each CPU is specified by the platform defined 1333 it has restrictions for stack usage and it can use the registers x0 - x17 as 1426 when the stack protector is enabled with ENABLE_STACK_PROTECTOR. A predictable [all …]
|
D | change-log.md | 627 …- add stack debug information to assembly routines ([f832885](https://review.trustedfirmware.org/p… 806 …- fix 32-bit builds with stack protector ([e57ca89](https://review.trustedfirmware.org/plugins/git… 1809 …- support guarded control stack ([688ab57](https://review.trustedfirmware.org/plugins/gitiles/TF-A… 2007 …- make stack size configurable ([5753665](https://review.trustedfirmware.org/plugins/gitiles/TF-A/… 2246 …- increase BL31's stack size for DRTM support ([44df105](https://review.trustedfirmware.org/plugin… 2473 …- increase stack size for tsp ([5b7bd2a](https://review.trustedfirmware.org/plugins/gitiles/TF-A/t… 3039 …- backtrace stack unwind misses lr adjustment ([a149eb4](https://review.trustedfirmware.org/plugin… 3915 …- change stack size of BL31 ([d544dfc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/tru… 4436 …- enabling stack protector for diphda ([c7e4f1c](https://review.trustedfirmware.org/plugins/gitile… 4550 …- add a USB DFU stack ([efbd65f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-f… [all …]
|
/trusted-firmware-a-latest/docs/design_documents/ |
D | psci_osi_mode.rst | 295 The functions of interest in the ``psci_cpu_suspend`` call stack are as follows: 368 error up the call stack.
|
/trusted-firmware-a-latest/docs/getting_started/ |
D | psci-lib-integration-guide.rst | 163 - The C runtime environment must be setup and stack initialized 282 - Invalidates the stack and enables the data cache.
|
/trusted-firmware-a-latest/docs/process/ |
D | coding-guidelines.rst | 232 call stack. 464 ``func_epilogue`` macros if you need to use the stack. Also, obeying the
|
/trusted-firmware-a-latest/docs/threat_model/ |
D | threat_model_el3_spm.rst | 402 | implemented? | implementing stack protector, pointer |
|