Home
last modified time | relevance | path

Searched refs:this (Results 1 – 25 of 162) sorted by relevance

1234567

/rk3399_ARM-atf/plat/mediatek/common/lpm_v2/
H A Dmt_lp_rq.c30 static int mt_lp_resource_update_and_set(struct mt_lp_resource_user *this);
32 static int mt_lp_resource_request(struct mt_lp_resource_user *this, in mt_lp_resource_request() argument
39 if ((this == NULL) || (resource == 0) || (resource > MT_LP_RQ_ALL)) { in mt_lp_resource_request()
49 rs[i]->res_usage |= this->umask; in mt_lp_resource_request()
55 ret = mt_lp_resource_update_and_set(this); in mt_lp_resource_request()
60 static int mt_lp_resource_release(struct mt_lp_resource_user *this) in mt_lp_resource_release() argument
66 if (this == NULL) in mt_lp_resource_release()
73 rs[i]->res_usage &= ~(this->umask); in mt_lp_resource_release()
78 ret = mt_lp_resource_update_and_set(this); in mt_lp_resource_release()
223 static int mt_lp_resource_update_and_set(struct mt_lp_resource_user *this) in mt_lp_resource_update_and_set() argument
/rk3399_ARM-atf/plat/mediatek/include/lpm/
H A Dmt_lp_rq.h24 int (*request)(struct mt_lp_resource_user *this, unsigned int resource);
26 int (*release)(struct mt_lp_resource_user *this);
/rk3399_ARM-atf/docs/
H A Dlicense.rst5 this project are accepted under the same license with developer sign-off as
15 - Redistributions of source code must retain the above copyright notice, this
19 this list of conditions and the following disclaimer in the documentation
23 endorse or promote products derived from this software without specific
61 (GPL-2.0+ OR BSD-2-Clause). It is used by this project under the terms of
62 the BSD-2-Clause license. Any contributions to this code must be made under
66 (NCSA OR MIT). It is used by this project under the terms of the NCSA
69 contributions to this code must be made under the terms of both licenses.
75 (GPL-2.0+ OR BSD-3-Clause). It is used by this project under the terms of the
76 BSD-3-Clause license. Any contributions to this code must be made under the
[all …]
H A Dporting-guide.rst27 then, you will find references to *weak* functions in this document.
65 provided to help in this setup.
67 Note that although this library supports non-identity mappings, this is intended
111 Each platform must ensure that a header file of this name is in the system
171 states for each level may be sparsely allocated between 0 and this value
172 with 0 being reserved for the RUN state. The PSCI implementation uses this
187 that the platform supports. The default value of this macro is 2 since
190 account for more local power states, then it must redefine this macro.
192 Currently, this macro is used by the Generic PSCI implementation to size
348 TF-A does not provide source code for this image.
[all …]
/rk3399_ARM-atf/plat/mediatek/include/lpm_v2/
H A Dmt_lp_rq.h27 int (*request)(struct mt_lp_resource_user *this, unsigned int res);
29 int (*release)(struct mt_lp_resource_user *this);
/rk3399_ARM-atf/plat/mediatek/common/lpm/
H A Dmt_lp_rq.c27 static int mt_lp_resource_request(struct mt_lp_resource_user *this, unsigned int resource) in mt_lp_resource_request() argument
32 if ((this == NULL) || (resource == 0) || (resource > MT_LP_RQ_ALL)) { in mt_lp_resource_request()
42 rs[i]->res_usage |= this->umask; in mt_lp_resource_request()
52 static int mt_lp_resource_release(struct mt_lp_resource_user *this) in mt_lp_resource_release() argument
57 if (this == NULL) { in mt_lp_resource_release()
65 rs[i]->res_usage &= ~(this->umask); in mt_lp_resource_release()
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-7.rst36 interfaces into the secure world with attacker-controlled inputs. However, this
56 For affected CPUs, this approach enables the mitigation during EL3
63 TF-A implements this approach for the following affected CPUs:
77 For affected CPUs, this approach also enables the mitigation during EL3
78 initialization, following every PE reset. In addition, this approach implements
83 on exit from EL3. For more information on this approach, see `Firmware
88 However, even without any mitigation code in other software components, this
92 Since the expectation in this approach is that more software executes with the
93 mitigation disabled, this may result in better system performance than the
95 use-cases, this performance saving may be outweighed by the additional overhead
[all …]
H A Dsecurity-advisory-tfv-8.rst57 In the presence of multiple normal world SMC clients, this behaviour might leak
67 For this reason, TF-A does not save ``x0`` to ``x3`` in the CPU context on an
68 SMC synchronous exception. It has behaved this way since the first version.
70 We can confirm that at least upstream KVM-based systems mitigate this threat,
71 and are therefore unaffected by this issue. Other EL2 software should be audited
72 to assess the impact of this threat.
74 EL2 software might find mitigating this threat somewhat onerous, because for all
76 it can sanitise any unused return registers. On the other hand, mitigating this
81 Note that AArch32 TF-A is not affected by this issue. The SMC handling code in
93 * Additionally, also save the 'pmcr' register as this is updated whilst
H A Dsecurity-advisory-tfv-2.rst27 Trusted Firmware (TF) unconditionally assign this bit to ``0`` in the early
30 Given that TF does not currently contain support for this feature (for example,
31 by saving and restoring the appropriate debug registers), this may allow a
37 Earlier versions of TF (prior to `commit 495f3d3`_) did not assign this bit.
44 interface. Therefore this issue only exists for AArch32 Secure EL1 code when
52 Finally, this also issue applies to AArch32 platforms that use the TF SP_MIN
H A Dsecurity-advisory-tfv-6.rst46 achieve this.
48 For Cortex-A57 and Cortex-A72 CPUs, the Pull Requests (PRs) in this advisory
52 For Cortex-A73 and Cortex-A75 CPUs, the PRs in this advisory invalidate the
61 on the PRs in this advisory being deployed in order for those workarounds to
72 the normal world to discover the presence of this firmware service.
82 with MMU disabled that this workaround entails effectively does invalidate the
83 branch predictor. Hence this is a reasonable comparison.
90 | ``PSCI_VERSION`` baseline (without PRs in this advisory) | 515 |
92 | ``PSCI_VERSION`` baseline (with PRs in this advisory) | 527 |
103 Due to the high severity and wide applicability of this issue, the above
[all …]
/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dthreat_model_fw_update_and_recovery.rst13 Model` in a number of places, as some of the contents are applicable to this
19 In this threat model, the target of evaluation is the Trusted Firmware for
26 For this section, please reference the Threat Assessment under the
36 of this threat model. Only additional details are pointed out.
67 in trial run or accepted run. The attacker tries to manipulate this field,
71 By design, no software mitigations exist to prevent this. The safeguarding
73 attacks on it, if this is a concern in the platform's threat model.
85 of this threat model. Only additional details are pointed out.
H A Dthreat_model_rse_interface.rst14 The scope of this threat model only includes the interface between the RSE and
43 For this section, please reference the Threat Assessment under the general TF-A
48 allowed only for firmware running at EL3. Accidentally exposing this
53 mitigates against this by clearing its internal buffer when reply is
/rk3399_ARM-atf/lib/compiler-rt/
H A DLICENSE.TXT6 "BSD-Like" license and the MIT license. As a user of this code you may choose
30 this software and associated documentation files (the "Software"), to deal with
37 this list of conditions and the following disclaimers.
40 this list of conditions and the following disclaimers in the
45 endorse or promote products derived from this Software without specific
61 of this software and associated documentation files (the "Software"), to deal
67 The above copyright notice and this permission notice shall be included in
89 University of Illinois to endorse or promote products derived from this
/rk3399_ARM-atf/
H A Ddco.txt9 Everyone is permitted to copy and distribute verbatim copies of this
15 By making a contribution to this project, I certify that:
33 (d) I understand and agree that this project and the contribution
37 this project or the open source license(s) involved.
/rk3399_ARM-atf/docs/design/
H A Dreset-design.rst6 integrator can tailor this code to the system configuration to some extent,
17 diagram illustrates this:
29 this case. Please refer to section 6 "Using BL31 entrypoint as the reset
47 To enable this boot flow, compile TF-A with ``PROGRAMMABLE_RESET_ADDRESS=1``.
69 To enable this boot flow, compile TF-A with ``COLD_BOOT_SINGLE_CPU=1``. This
87 To enable this boot flow, compile TF-A with both ``COLD_BOOT_SINGLE_CPU=1``
97 processor. For this type of SoC it is desirable for the application processor
101 logic in the BL31 entry point to support this use case.
103 In this configuration, the platform's Trusted Boot Firmware must ensure that
117 SRAM and all CPU reset vectors be changed from the default ``0x0`` to this run
[all …]
/rk3399_ARM-atf/docs/plat/arm/arm_fpga/
H A Dindex.rst7 this port ignores any power management features of the platform.
15 As a result this port is a fairly generic BL31-only port, which can serve
18 The aim of this port is to support as many FPGA images as possible with
23 across the various images, this is detected at runtime by BL31.
32 internal list, but for new or experimental cores this creates a lot of
33 churn. With this option, the code will fall back to some basic CPU support
35 Default value of this flag is 1.
38 It must have been loaded into DRAM already, typically this is done by
87 components at their respective load addresses. In addition to this file
/rk3399_ARM-atf/docs/plat/
H A Drpi4.rst5 Arm Cortex-A72 cores. Also in contrast to previous Raspberry Pi versions this
10 as well, but have not been tested at this point.
20 There are no real configuration options at this point, so there is only
31 arm64 Linux kernels are known to work this way.
54 In contrast to the existing Raspberry Pi 3 port this one here is a BL31-only
66 To accommodate this existing way of configuring and setting up the board,
67 we use as much of this workflow as possible.
70 load this file to the beginning of DRAM (address 0) and execute it in
84 could ignore this address as well.
H A Dsynquacer.rst5 Cortex-A53. The Developerbox, of 96boards, is a platform that contains this
6 processor. This port of the Trusted Firmware only supports this platform at
44 - Secondly, create a new working directory and store the absolute path to this
46 this directory is created but as an example:
96 any version of gcc >= 5 will support this feature and may be used to build EDK2.
/rk3399_ARM-atf/docs/components/
H A Dffa-manifest-binding.rst17 by this node. The minor number is incremented if the binding changes in a
20 - X is an integer representing the major version number of this document.
21 - Y is an integer representing the minor version number of this document.
36 identifying the UUID of the services implemented by this partition.
59 - In the absence of virtualization, this is the number of execution
61 - If value of this field = 1 and number of PEs > 1 then the partition is
63 - If the value of this field > 1 then the partition is treated as a MP
83 - Physical base address of the partition in memory. Absence of this field
90 the partition. Absence of this field indicates that the entry point is at
103 - A unique number amongst all partitions that specifies if this partition
[all …]
H A Dxlat-tables-lib-v2-design.rst10 More specifically, some use cases that this library aims to support are:
43 From this point onwards, this document will implicitly refer to version 2 of the
89 potentially less memory. However, if part of this 2MB region is later remapped
93 modified to point to this new level-3 table. This has a performance cost at
97 then they might enforce a 4KB mapping granularity for this 2MB region from the
102 library will choose the mapping granularity for this region as it sees fit (more
128 The resulting translation context variable will be called after this name, to
138 Number of translation tables to statically allocate for this context,
140 allocated. For example, if the initial lookup level is 1, this parameter would
142 for this context.
[all …]
H A Drmm-el3-comms-spec.rst5 There are two parts in this interface: the boot interface and the runtime
99 …x0,Linear index of this PE. This index starts from 0 and must be less than the maximum number of C…
100 x1,Version for this Boot Interface as defined in :ref:`rmm_el3_ifc_versioning`.
101 …x2,Maximum number of CPUs to be supported at runtime. RMM should ensure that it can support this m…
102 …be of 4KB size (1 page). The Boot Manifest must be present at the base of this shared buffer durin…
103 …tion, the activation token should be set to the value returned by RMM for this CPU during the init…
108 Normal memory attributes (IWB-OWB-ISH) at EL3. At boot, this memory will be
113 EL3 should also ensure that this shared buffer is always available for use by RMM
116 service commands in EL3, this buffer can be used to exchange data between RMM
118 utilizing this buffer during the boot phase, prior to return back to EL3 via
[all …]
/rk3399_ARM-atf/licenses/
H A DLICENSE-APACHE-2.0.txt11 and distribution as defined by Sections 1 through 9 of this document.
18 control with that entity. For the purposes of this definition,
25 exercising permissions granted by this License.
45 of this License, Derivative Works shall not include works that remain
54 the copyright owner. For the purposes of this definition, "submitted"
68 this License, each Contributor hereby grants to You a perpetual,
75 this License, each Contributor hereby grants to You a perpetual,
77 (except as stated in this section) patent license to make, have made,
87 granted to You under this License for that Work shall terminate
96 Derivative Works a copy of this License; and
[all …]
/rk3399_ARM-atf/docs/design_documents/
H A Dmeasured_boot.rst88 TCG has specified the architecture for the structure of this log in the
105 this document :ref:`Runtime Security Engine (RSE)` for more details.
134 somewhere, or panicking the system if this is considered a fatal error.
138 - In BL1, this function is used to initialize the Event Log backend
141 - In BL2, this function is used to initialize the Event Log buffer with
163 - On the Arm FVP port, this function measures the given image and then
183 system if this is considered a fatal error.
187 - In BL1, this function is used to pass the base address of
191 - In BL2, this function is used to pass the Event Log buffer information
214 using the backend via this interface.
[all …]
H A Dcmake_framework.rst14 and as part of this a reusable CMake framework for embedded projects.
20 to use CMake language for the new buildsystem. The main reasons of this decision
41 tasks, wrap CMake functions, etc. Since this functionality can be useful in
43 reusable framework and store this in a separate repository. The following
56 this.
59 macros, etc. in a structured way. It contains two utilities for this purpose:
93 and/or built by the framework. For this, the CMake find_package functionality is
110 supported). After this we run the selected build tool which in turn calls the
114 Usually during development only the steps in this second phase have to be
/rk3399_ARM-atf/docs/getting_started/
H A Dbuild-options.rst27 memory-mapped debug accesses are unaffected by this control.
56 image for the ``fip`` target. In this case, the BL2 in the TF-A will not be
60 BL2U image. In this case, the BL2U in TF-A will not be built.
77 enable this use-case. For now, this option is only supported
81 BL31 image for the ``fip`` target. In this case, the BL31 in TF-A will not
89 BL32 image for the ``fip`` target. In this case, the BL32 in TF-A will not
148 irrespective of the value of this option if the CPU supports it.
170 to be implemented in this case.
178 this is only enabled for a debug build of the firmware.
212 of the value of this flag if the CPU supports it. Alternatively, when
[all …]

1234567