| /rk3399_ARM-atf/ |
| H A D | .versionrc.cjs | 23 const contents = fs.readFileSync("changelog.yaml", "utf8"); 25 changelog = yaml.load(contents); 86 "readVersion": function (contents) { 87 const _ver = contents.match(/version\s=.*"(\d+?)\.(\d+?)\.(\d+?)/); 92 "writeVersion": function (contents, version) { 95 return contents.replace(/^(version\s=\s")((\d).?)*$/m, _ver) 106 "readVersion": function (contents) { 107 const _ver = contents.match(/version\s=.*"(\d+?)\.(\d+?)\.(\d+?)/); 112 "writeVersion": function (contents, version) { 116 contents = contents.replace(/^(version\s=\s")((\d).?)*$/m, _ver) [all …]
|
| H A D | .commitlintrc.js | 24 const contents = fs.readFileSync("changelog.yaml", "utf8"); constant 26 changelog = yaml.load(contents);
|
| /rk3399_ARM-atf/tools/cot_dt2c/cot_dt2c/ |
| H A D | dt_validator.py | 67 contents = f.read() 69 pos = contents.find("/ {") 71 contents = contents[pos:] 74 tree = Devicetree.parseStr(contents)
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-13.rst | 6 | | prefetch engine to fetch the contents of a privileged location | 7 | | and consume those contents as an address that is | 35 to fetch the contents of a privileged location (for which it 36 does not have read permission) and consume those contents as an address
|
| H A D | security-advisory-tfv-1.rst | 56 system to change its behaviour based on the unexpected secure memory contents.
|
| H A D | security-advisory-tfv-10.rst | 68 Furthermore, ``cert_parse()`` does not check that the contents of the extension
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | index.rst | 61 In addition to the platforms ports listed within the table of contents, there
|
| H A D | rpi3.rst | 282 contents of the FIP automatically signed by the build process. The ROT key
|
| /rk3399_ARM-atf/tools/memory/src/memory/ |
| H A D | summary.py | 97 for module_path, contents in self._modules.items(): 99 contents.setdefault(section, 0) 100 contents[section] += size
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_fw_update_and_recovery.rst | 13 Model` in a number of places, as some of the contents are applicable to this
|
| H A D | threat_model_el3_spm.rst | 236 | | RX/TX buffer contents while the SPMC is processing | 264 | | The SPMC copies the contents of the TX buffer | 266 | | its contents. The SPMC implements hardened input |
|
| H A D | threat_model_firmware_handoff.rst | 95 | | | Do not log the contents of Transfer Entries when |
|
| H A D | threat_model_arm_cca.rst | 12 Model` in a number of places, as some of the contents is commonly applicable to
|
| H A D | threat_model.rst | 706 | | the external flash memory and change its contents| 1030 | | contents** |
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | debugfs-design.rst | 5 .. contents::
|
| H A D | secure-partition-manager.rst | 4 .. contents::
|
| H A D | el3-spmc.rst | 4 .. contents:: 182 BLOB contains Boot Info Header, followed by SP Manifest contents.
|
| H A D | numa-per-cpu.rst | 4 .. contents::
|
| H A D | sdei.rst | 309 The SDEI specification requires that event handlers preserve the contents of all
|
| H A D | xlat-tables-lib-v2-design.rst | 388 that all TLBs are disabled from reset and their contents have no effect on
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | tools-build.rst | 80 Example 2: view the contents of an existing Firmware package:
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | cmake_framework.rst | 9 .. contents:: Table of Contents
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | coding-guidelines.rst | 6 contents of the :ref:`Coding Style`. 419 - Use ``u_register_t`` when it's important to store the contents of a register
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | firmware-design.rst | 1236 register contents and report it via a dedicated UART (PL011 console). BL31 1426 can expose the data cache contents. 1650 - the static contents of the image. These are data actually stored in the 1654 - the run-time contents of the image. These are data that don't occupy any 1691 to the end address of the section's actual contents, rounded up to the right 1693 actual end address of the section's contents. 1704 corresponds to the size of the section's actual contents, rounded up to the 1706 to know the actual size of the section's contents. 1761 - ``__BL1_ROM_END__`` End address of BL1's ROM contents, covering its code 2114 The FIP layout consists of a table of contents (ToC) followed by payload data.
|
| /rk3399_ARM-atf/licenses/ |
| H A D | LICENSE-APACHE-2.0.txt | 116 wherever such third-party notices normally appear. The contents
|