| /rk3399_ARM-atf/lib/zlib/ |
| H A D | inffast.c | 75 unsigned char FAR *from; /* where to copy match from */ in inflate_fast() local 188 from = out - dist; in inflate_fast() 190 *out++ = *from++; in inflate_fast() 196 from = window; in inflate_fast() 198 from += wsize - op; in inflate_fast() 202 *out++ = *from++; in inflate_fast() 204 from = out - dist; /* rest from output */ in inflate_fast() 208 from += wsize + wnext - op; in inflate_fast() 213 *out++ = *from++; in inflate_fast() 215 from = window; in inflate_fast() [all …]
|
| /rk3399_ARM-atf/make_helpers/ |
| H A D | toolchain.mk | 370 toolchain-from-parameter = $($($(1)-$(2)-parameter)) 372 toolchain-from-cc-arm-clang-cpp = $(1) 373 toolchain-from-cc-arm-clang-as = $(1) 374 toolchain-from-cc-arm-clang-ld = # Fall back to `$(toolchain)-ld-default` 375 toolchain-from-cc-arm-clang-oc = # Fall back to `$(toolchain)-oc-default` 376 toolchain-from-cc-arm-clang-od = # Fall back to `$(toolchain)-od-default` 377 toolchain-from-cc-arm-clang-ar = # Fall back to `$(toolchain)-ar-default` 379 toolchain-from-cc-llvm-clang-cpp = $(1) 380 toolchain-from-cc-llvm-clang-as = $(1) 381 toolchain-from-cc-llvm-clang-ld = $(1) [all …]
|
| /rk3399_ARM-atf/ |
| H A D | .commitlintrc.js | 11 import fs from "fs"; 12 import rules from "@commitlint/rules"; 13 import yaml from "js-yaml";
|
| /rk3399_ARM-atf/docs/resources/diagrams/plantuml/ |
| H A D | fconf_bl1_load_config.puml | 38 load and auth image from fip 39 with info from plat_io_policy 46 note over fconf : get fw_config_dtb from image_info 58 load and auth image from fip 59 with info from plat_io_policy 66 note over fconf : get tb_fw_config_dtb from image_info
|
| H A D | fconf_bl2_populate.puml | 32 note over fconf_dyn_cfg_getter: read dtb_registry properties from dtb 39 note over fconf_tbbr_getter: read tbbr properties from dtb 41 note over arm_fconf_io: read arm io propeties from dtb
|
| /rk3399_ARM-atf/include/lib/libc/ |
| H A D | stdarg.h | 17 #define va_copy(to, from) __builtin_va_copy(to, from) argument
|
| /rk3399_ARM-atf/docs/plat/arm/tc/ |
| H A D | index.rst | 7 to abstract power and system management tasks away from application 9 loaded by AP BL2 from FIP in flash to SRAM for copying by SCP (SCP has access 25 The execution begins from SCP_BL1. SCP_BL1 powers up the AP which starts 26 executing AP_BL1 and then executes AP_BL2 which loads the SCP_BL2 from 28 is communicated to SCP using SDS. SCP copies SCP_BL2 from SRAM to its own
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | docs-build.rst | 40 The documentation can be compiled into HTML-formatted pages from the project 47 Output from the build process will be placed in: ``docs/build/html``. 77 docs latexpdf`` to build the documentation. Output from the build process 80 Building rendered documentation from Poetry's virtual environment 88 Running ``poetry shell`` from the directory containing this project, activates 100 Building rendered documentation from a container 108 from project root directory 118 The above command fetches the ``sphinxdoc/sphinx`` container from `docker 120 creates the documentation. Once done, exit the container and output from the
|
| H A D | prerequisites.rst | 8 different from those listed below, however only the software described in this 15 `TrustedFirmware.org`_. To clone this repository from the server, run the following 55 the table above. This can be installed from the `Arm Developer website`_. 74 If using OpenSSL 3, older Linux versions may require it to be built from 79 Versions 1.0.x and from v3.0.0 up to v3.0.6 are strongly advised against due 137 appropriate version of Node.js, run the following **from the root directory of 150 TF-A has been tested with pre-built binaries and file systems from `Linaro 151 Release 20.01`_. Alternatively, you can build the binaries from source using 168 running from within your newly-cloned repository: 217 To fetch the latest commits from all submodules, you can use:
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | rockchip.rst | 4 Trusted Firmware-A supports a number of Rockchip ARM SoCs from both 27 BL1/2 and BL33 can currently be supplied from either: 37 these images need to get build from the TF-A repository. 47 Both need replacing the PLAT argument with the platform from above you
|
| H A D | meson-gxl.rst | 12 can't be turned off, so there is a workaround to hide this from the caller. 22 Or, if willing to boot from U-Boot SPL (using standard params handling): 30 mentioned **bl31.img** by the one built from this port.
|
| H A D | rpi4.rst | 13 which is available from both the Non-secure and Secure worlds. The SoC does 15 DRAM can't be protected properly from the Non-secure world. 48 see some text from BL31, followed by the output of the EL2 payload. 49 The command line provided is read from the ``cmdline.txt`` file on the SD card. 55 port, also it deviates quite a lot from the RPi3 port in many other ways. 61 (bootcode.bin) from flash (EEPROM), which is again GPU code. 64 from the first FAT partition on the SD card.
|
| H A D | meson-axg.rst | 12 can't be turned off, so there is a workaround to hide this from the caller. 25 by the one built from this port.
|
| H A D | meson-gxbb.rst | 12 can't be turned off, so there is a workaround to hide this from the caller. 24 by the one built from this port.
|
| H A D | meson-g12a.rst | 12 can't be turned off, so there is a workaround to hide this from the caller. 24 mentioned **bl31.img** by the one built from this port.
|
| /rk3399_ARM-atf/docs/perf/ |
| H A D | psci-performance-instr.rst | 18 at runtime from the Performance Measurement Unit 32 values from ``psci_svc`` at runtime. Alternatively, the service may be 34 choose to expose SMCs that allow retrieval of these timestamps from the 47 ``PSCI_STAT_RESIDENCY`` and ``PSCI_STAT_COUNT`` from the `PSCI`_ 96 * Exit from the PSCI SMC handler 98 * Exit from low power state 100 * Exit from cache maintenance operations in PSCI 111 captured after normal return from the PSCI SMC handler, or, if a low power state
|
| /rk3399_ARM-atf/docs/threat_model/ |
| H A D | supply_chain_threat_model.rst | 38 contributors as well as libraries imported from other open-source projects, 46 - *zlib*: zlib is a data compression library imported from [2]_. 48 - *compiler-rt*: This is a collection of runtime libraries from the LLVM 50 provides low-level, target-specific compiler builtins from compiler-rt. 57 loaded by TF-A from non-volatile platform storage. 76 - *Mbed TLS Library*: This is a cryptography library from trustedfirmware.org 106 description of each component and where they are sourced from. 109 Arm SCP team built from the source from the GitHub repository [6]_. 111 - *OP-TEE*: Trusted Execution Environment (TEE) from tf.org that runs as 112 Secure EL1. We use OP-TEE built from source or binaries supplied with Arm [all …]
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | arm-sip-service.rst | 8 instruction executed from Exception Levels below EL3. SMC calls for SiP 38 switch its execution state (a.k.a. Register Width), either from AArch64 to 39 AArch32, or from AArch32 to AArch64, for the calling CPU. This service is only 63 Execution State has been switched. When calling from AArch64, *PC hi* must be 0. 67 0 and 1, respectively. When calling from AArch64, *Cookie hi* must be 0. 76 CPU endianness, however, is preserved from the previous execution state. Note
|
| /rk3399_ARM-atf/docs/plat/arm/automotive_rd/ |
| H A D | rd1ae.rst | 14 The boot process starts from RSE (Runtime Security Engine) that loads the 23 * Copies the AP BL31 image from Secure Flash to Secure SRAM 24 * Copies the AP BL32 (OP-TEE) image from Secure Flash to Secure DRAM 25 * Copies the AP BL33 (U-Boot) image from Secure Flash to Normal DRAM
|
| /rk3399_ARM-atf/plat/imx/imx8m/ddr/ |
| H A D | dram.c | 49 void imx8mq_dram_timing_copy(struct dram_timing_info *from) in imx8mq_dram_timing_copy() argument 54 memcpy(dram_timing_saved, from, sizeof(dram_timing_saved)); in imx8mq_dram_timing_copy() 57 info->ddrc_cfg = get_cfg_ptr(info->ddrc_cfg, from, dram_timing_saved); in imx8mq_dram_timing_copy() 58 info->ddrphy_cfg = get_cfg_ptr(info->ddrphy_cfg, from, dram_timing_saved); in imx8mq_dram_timing_copy() 59 info->ddrphy_trained_csr = get_cfg_ptr(info->ddrphy_trained_csr, from, dram_timing_saved); in imx8mq_dram_timing_copy() 60 info->ddrphy_pie = get_cfg_ptr(info->ddrphy_pie, from, dram_timing_saved); in imx8mq_dram_timing_copy()
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | security-hardening.rst | 32 world from making it leak timing information. In general, higher privilege 33 levels must defend from those below when the PMU is treated as an attack 39 Timing leakage attacks from the Non-secure world 44 Secure and Non-secure state. Thus, it attempts to leak timing information from 73 world. Examples include Spectre, Meltdown, as well as extracting secrets from 142 `getc()` feature, which allows the firmware to read characters from the 143 console. Keeping this feature enabled is considered dangerous from a security
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-2.rst | 28 entrypoint code, which enables debug exceptions from the secure world. This can 35 from the secure world. 43 meaning that debug exceptions from Secure EL1 are enabled by the authentication 50 from AArch32 Secure EL1.
|
| H A D | security-advisory-tfv-8.rst | 5 | Title | Not saving x0 to x3 registers can leak information from one | 18 | Impact | Leakage of SMC return values from one normal world SMC | 37 called. It restores the values of all general purpose registers taken from the 45 * This function restores all general purpose registers except x30 from the 58 some of the return values from one client to another. For example, if a victim 65 software must trap SMC calls from EL1 software to ensure secure behaviour.
|
| /rk3399_ARM-atf/docs/ |
| H A D | license.rst | 23 endorse or promote products derived from this software without specific 53 This project contains code from other projects as listed below. The original 56 - The libc source code is derived from `FreeBSD`_ and `SCC`_. FreeBSD uses 79 - Some source files originating from the Linux source tree, which are 88 - Some source files originating from the `Open Profile for DICE`_ project. 96 - Some source files originating from the `pydevicetree`_ project. 113 - Some source files originating from the `edk2`_ project. 122 - Some source files originating from the `mbed OS`_ project.
|
| /rk3399_ARM-atf/docs/plat/marvell/armada/ |
| H A D | porting.rst | 14 - The build system will reuse all files from within the soc directory, and take only the porting 15 files from the customer platform directory. 46 Boot rom can skip the current image and choose to boot from next position if a 48 feature is used for boot loader recovery by booting from a valid flash-image 77 skip image request message is printed on the screen and boot rom boots from the 88 The DDR driver called mv_ddr is released separately apart from TF-A sources. 118 board type, it is because the lanes from comphy-x to some PHY may have 119 different HW characteristic than lanes from comphy-y to the same
|