/trusted-firmware-a/fdts/ |
A D | juno-ethosn.dtsi | 9 * Arm Ethos-N NPU driver stack. 10 * https://github.com/ARM-software/ethos-n-driver-stack
|
/trusted-firmware-a/lib/stack_protector/ |
A D | stack_protector.mk | 15 TF_CFLAGS += -fno-stack-protector
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/juno/ |
A D | index.rst.txt | 16 stack that includes TF-A. This version of TF-A is tested with pre-built 17 `Linaro release software stack`_ version 20.01. You can alternatively 18 build the software stack yourself by following the 19 `Juno platform software user guide`_. Once you prepare the software stack 28 a single FIP binary. It assumes that a Linaro release software stack has been 246 .. _Linaro release software stack: http://releases.linaro.org/members/arm/platforms/
|
/trusted-firmware-a/docs/plat/arm/juno/ |
A D | index.rst | 16 stack that includes TF-A. This version of TF-A is tested with pre-built 17 `Linaro release software stack`_ version 20.01. You can alternatively 18 build the software stack yourself by following the 19 `Juno platform software user guide`_. Once you prepare the software stack 28 a single FIP binary. It assumes that a Linaro release software stack has been 246 .. _Linaro release software stack: http://releases.linaro.org/members/arm/platforms/
|
/trusted-firmware-a/drivers/renesas/common/pwrc/ |
A D | pwrc.h | 71 extern uint32_t rcar_pwrc_switch_stack(uintptr_t jump, uintptr_t stack,
|
A D | pwrc.c | 710 uintptr_t stack = (uintptr_t) (DEVICE_SRAM_STACK_BASE + in rcar_pwrc_set_suspend_to_ram() local 721 rcar_pwrc_switch_stack(jump, stack, NULL); in rcar_pwrc_set_suspend_to_ram()
|
/trusted-firmware-a/build/qemu/release/bl2/ |
A D | bl2.map | 208 .note.GNU-stack 217 .note.GNU-stack 226 .note.GNU-stack 424 .note.GNU-stack 509 .note.GNU-stack 555 .note.GNU-stack 571 .note.GNU-stack 1443 .note.GNU-stack 1445 .note.GNU-stack 1447 .note.GNU-stack [all …]
|
/trusted-firmware-a/build/qemu/release/bl31/ |
A D | bl31.map | 57 .note.GNU-stack 223 .note.GNU-stack 323 .note.GNU-stack 472 .note.GNU-stack 481 .note.GNU-stack 822 .note.GNU-stack 2123 .note.GNU-stack 2125 .note.GNU-stack 2127 .note.GNU-stack 2129 .note.GNU-stack [all …]
|
/trusted-firmware-a/build/qemu/release/bl1/ |
A D | bl1.map | 71 .note.GNU-stack 197 .note.GNU-stack 206 .note.GNU-stack 1365 .note.GNU-stack 1367 .note.GNU-stack 1369 .note.GNU-stack 1371 .note.GNU-stack 1373 .note.GNU-stack 1375 .note.GNU-stack 1377 .note.GNU-stack [all …]
|
/trusted-firmware-a/docs/security_advisories/ |
A D | security-advisory-tfv-7.rst | 58 This approach permanently mitigates the entire software stack and no additional 87 approach will effectively permanently mitigate the entire software stack, since
|
A D | security-advisory-tfv-8.rst | 29 ``x0`` to ``x3`` are not part of the CPU context saved on the stack. 38 CPU context stored on the stack. This includes registers ``x0`` to ``x3``, as
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/security_advisories/ |
A D | security-advisory-tfv-7.rst.txt | 58 This approach permanently mitigates the entire software stack and no additional 87 approach will effectively permanently mitigate the entire software stack, since
|
A D | security-advisory-tfv-8.rst.txt | 29 ``x0`` to ``x3`` are not part of the CPU context saved on the stack. 38 CPU context stored on the stack. This includes registers ``x0`` to ``x3``, as
|
/trusted-firmware-a/lib/compiler-rt/builtins/ |
A D | assembly.h | 48 #define NO_EXEC_STACK_DIRECTIVE .section .note.GNU-stack,"",%progbits
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/fvp-ve/ |
A D | index.rst.txt | 27 - Obtain arm toolchain. The software stack has been verified with linaro 6.2
|
/trusted-firmware-a/docs/plat/arm/fvp-ve/ |
A D | index.rst | 27 - Obtain arm toolchain. The software stack has been verified with linaro 6.2
|
/trusted-firmware-a/services/spd/trusty/ |
A D | trusty.c | 172 uint64_t handler, uint64_t stack) in trusty_set_fiq_handler() argument 184 ctx->fiq_handler_sp = stack; in trusty_set_fiq_handler()
|
/trusted-firmware-a/plat/renesas/common/ |
A D | plat_pm.c | 39 extern void rcar_pwrc_restore_generic_timer(uint64_t *stack);
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/ |
A D | exception-handling.rst.txt | 62 rest of the handling to a dedicated software stack running at lower Secure 66 processing of the error to dedicated software stack running at lower secure 95 priority levels as applicable for the Secure software stack. It then assigns the 132 stack—priority levels stack up in strictly increasing fashion, and need to be
|
A D | sdei.rst.txt | 311 written in C: compilers typically adjust the stack frame at the beginning and 343 /* Save link register whilst maintaining stack alignment */
|
/trusted-firmware-a/docs/components/ |
A D | exception-handling.rst | 62 rest of the handling to a dedicated software stack running at lower Secure 66 processing of the error to dedicated software stack running at lower secure 95 priority levels as applicable for the Secure software stack. It then assigns the 132 stack—priority levels stack up in strictly increasing fashion, and need to be
|
A D | sdei.rst | 311 written in C: compilers typically adjust the stack frame at the beginning and 343 /* Save link register whilst maintaining stack alignment */
|
/trusted-firmware-a/docs/plat/ |
A D | stm32mp1.rst | 230 - ``ENABLE_STACK_PROTECTOR``: To enable the stack protection.
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/ |
A D | stm32mp1.rst.txt | 230 - ``ENABLE_STACK_PROTECTOR``: To enable the stack protection.
|
/trusted-firmware-a/docs/getting_started/ |
A D | porting-guide.rst | 41 each BL stage to correctly port the firmware stack. They are categorized as 115 Defines the normal stack memory available to each CPU. This constant is used 950 This function sets the current stack pointer to the normal memory stack that 952 stack for the primary CPU, the UP version of the function is used. The size 953 of the stack allocated to each CPU is specified by the platform defined 968 This function returns the base address of the normal memory stack that 970 stack for the primary CPU, the UP version of the function is used. The size 971 of the stack allocated to each CPU is specified by the platform defined 1034 it has restrictions for stack usage and it can use the registers x0 - x17 as 1113 when the stack protector is enabled with ENABLE_STACK_PROTECTOR. A predictable [all …]
|