Searched refs:image_src (Results 1 – 4 of 4) sorted by relevance
| /rk3399_ARM-atf/bl1/ |
| H A D | bl1_fwu.c | 30 uintptr_t image_src, 35 uintptr_t image_src, 228 uintptr_t image_src, in bl1_fwu_image_copy() argument 265 if ((image_src == 0U) || (block_size == 0U) || in bl1_fwu_image_copy() 266 check_uptr_overflow(image_src, block_size - 1)) { in bl1_fwu_image_copy() 335 if (bl1_plat_mem_check(image_src, block_size, flags) != 0) { in bl1_fwu_image_copy() 356 (void)memcpy((void *) dest_addr, (const void *) image_src, block_size); in bl1_fwu_image_copy() 371 uintptr_t image_src, in bl1_fwu_image_auth() argument 415 if ((image_src == 0U) || (image_size == 0U) || in bl1_fwu_image_auth() 416 check_uptr_overflow(image_src, image_size - 1)) { in bl1_fwu_image_auth() [all …]
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-4.rst | 78 uintptr_t image_src, 83 ``image_src`` is an SMC argument and therefore potentially controllable by an 85 sum of ``image_src`` and ``block_size`` overflowing a 32-bit type, which 100 uintptr_t image_src, 104 Similarly, if an attacker has control over the ``image_src`` or ``image_size``
|
| H A D | security-advisory-tfv-1.rst | 79 if (bl1_plat_mem_check(image_src, block_size, flags)) { 89 memcpy((void *)base_addr, (const void *)image_src, block_size); 105 if (bl1_plat_mem_check(image_src, block_size, flags)) { 123 memcpy((void *)base_addr, (const void *)image_src, block_size);
|
| /rk3399_ARM-atf/docs/ |
| H A D | porting-guide.rst | 1840 Argument : unsigned int image_id, uintptr_t image_src,
|