Home
last modified time | relevance | path

Searched refs:stack (Results 1 – 25 of 55) sorted by relevance

123

/trusted-firmware-a/fdts/
A Djuno-ethosn.dtsi9 * Arm Ethos-N NPU driver stack.
10 * https://github.com/ARM-software/ethos-n-driver-stack
/trusted-firmware-a/lib/stack_protector/
A Dstack_protector.mk15 TF_CFLAGS += -fno-stack-protector
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/juno/
A Dindex.rst.txt16 stack that includes TF-A. This version of TF-A is tested with pre-built
17 `Linaro release software stack`_ version 20.01. You can alternatively
18 build the software stack yourself by following the
19 `Juno platform software user guide`_. Once you prepare the software stack
28 a single FIP binary. It assumes that a Linaro release software stack has been
246 .. _Linaro release software stack: http://releases.linaro.org/members/arm/platforms/
/trusted-firmware-a/docs/plat/arm/juno/
A Dindex.rst16 stack that includes TF-A. This version of TF-A is tested with pre-built
17 `Linaro release software stack`_ version 20.01. You can alternatively
18 build the software stack yourself by following the
19 `Juno platform software user guide`_. Once you prepare the software stack
28 a single FIP binary. It assumes that a Linaro release software stack has been
246 .. _Linaro release software stack: http://releases.linaro.org/members/arm/platforms/
/trusted-firmware-a/drivers/renesas/common/pwrc/
A Dpwrc.h71 extern uint32_t rcar_pwrc_switch_stack(uintptr_t jump, uintptr_t stack,
A Dpwrc.c710 uintptr_t stack = (uintptr_t) (DEVICE_SRAM_STACK_BASE + in rcar_pwrc_set_suspend_to_ram() local
721 rcar_pwrc_switch_stack(jump, stack, NULL); in rcar_pwrc_set_suspend_to_ram()
/trusted-firmware-a/build/qemu/release/bl2/
A Dbl2.map208 .note.GNU-stack
217 .note.GNU-stack
226 .note.GNU-stack
424 .note.GNU-stack
509 .note.GNU-stack
555 .note.GNU-stack
571 .note.GNU-stack
1443 .note.GNU-stack
1445 .note.GNU-stack
1447 .note.GNU-stack
[all …]
/trusted-firmware-a/build/qemu/release/bl31/
A Dbl31.map57 .note.GNU-stack
223 .note.GNU-stack
323 .note.GNU-stack
472 .note.GNU-stack
481 .note.GNU-stack
822 .note.GNU-stack
2123 .note.GNU-stack
2125 .note.GNU-stack
2127 .note.GNU-stack
2129 .note.GNU-stack
[all …]
/trusted-firmware-a/build/qemu/release/bl1/
A Dbl1.map71 .note.GNU-stack
197 .note.GNU-stack
206 .note.GNU-stack
1365 .note.GNU-stack
1367 .note.GNU-stack
1369 .note.GNU-stack
1371 .note.GNU-stack
1373 .note.GNU-stack
1375 .note.GNU-stack
1377 .note.GNU-stack
[all …]
/trusted-firmware-a/docs/security_advisories/
A Dsecurity-advisory-tfv-7.rst58 This approach permanently mitigates the entire software stack and no additional
87 approach will effectively permanently mitigate the entire software stack, since
A Dsecurity-advisory-tfv-8.rst29 ``x0`` to ``x3`` are not part of the CPU context saved on the stack.
38 CPU context stored on the stack. This includes registers ``x0`` to ``x3``, as
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/security_advisories/
A Dsecurity-advisory-tfv-7.rst.txt58 This approach permanently mitigates the entire software stack and no additional
87 approach will effectively permanently mitigate the entire software stack, since
A Dsecurity-advisory-tfv-8.rst.txt29 ``x0`` to ``x3`` are not part of the CPU context saved on the stack.
38 CPU context stored on the stack. This includes registers ``x0`` to ``x3``, as
/trusted-firmware-a/lib/compiler-rt/builtins/
A Dassembly.h48 #define NO_EXEC_STACK_DIRECTIVE .section .note.GNU-stack,"",%progbits
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/fvp-ve/
A Dindex.rst.txt27 - Obtain arm toolchain. The software stack has been verified with linaro 6.2
/trusted-firmware-a/docs/plat/arm/fvp-ve/
A Dindex.rst27 - Obtain arm toolchain. The software stack has been verified with linaro 6.2
/trusted-firmware-a/services/spd/trusty/
A Dtrusty.c172 uint64_t handler, uint64_t stack) in trusty_set_fiq_handler() argument
184 ctx->fiq_handler_sp = stack; in trusty_set_fiq_handler()
/trusted-firmware-a/plat/renesas/common/
A Dplat_pm.c39 extern void rcar_pwrc_restore_generic_timer(uint64_t *stack);
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/
A Dexception-handling.rst.txt62 rest of the handling to a dedicated software stack running at lower Secure
66 processing of the error to dedicated software stack running at lower secure
95 priority levels as applicable for the Secure software stack. It then assigns the
132 stack—priority levels stack up in strictly increasing fashion, and need to be
A Dsdei.rst.txt311 written in C: compilers typically adjust the stack frame at the beginning and
343 /* Save link register whilst maintaining stack alignment */
/trusted-firmware-a/docs/components/
A Dexception-handling.rst62 rest of the handling to a dedicated software stack running at lower Secure
66 processing of the error to dedicated software stack running at lower secure
95 priority levels as applicable for the Secure software stack. It then assigns the
132 stack—priority levels stack up in strictly increasing fashion, and need to be
A Dsdei.rst311 written in C: compilers typically adjust the stack frame at the beginning and
343 /* Save link register whilst maintaining stack alignment */
/trusted-firmware-a/docs/plat/
A Dstm32mp1.rst230 - ``ENABLE_STACK_PROTECTOR``: To enable the stack protection.
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/
A Dstm32mp1.rst.txt230 - ``ENABLE_STACK_PROTECTOR``: To enable the stack protection.
/trusted-firmware-a/docs/getting_started/
A Dporting-guide.rst41 each BL stage to correctly port the firmware stack. They are categorized as
115 Defines the normal stack memory available to each CPU. This constant is used
950 This function sets the current stack pointer to the normal memory stack that
952 stack for the primary CPU, the UP version of the function is used. The size
953 of the stack allocated to each CPU is specified by the platform defined
968 This function returns the base address of the normal memory stack that
970 stack for the primary CPU, the UP version of the function is used. The size
971 of the stack allocated to each CPU is specified by the platform defined
1034 it has restrictions for stack usage and it can use the registers x0 - x17 as
1113 when the stack protector is enabled with ENABLE_STACK_PROTECTOR. A predictable
[all …]

Completed in 38 milliseconds

123