| /trusted-firmware-a/build/qemu/release/bl31/ |
| A D | bl31.map | 3 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memcpy.o) 5 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memmove.o) 7 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memset.o) 9 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(printf.o) 11 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(putchar.o) 13 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(strlen.o) 1996 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/bl31/gpio.o 2000 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/bl31/spe.o 2057 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/bl31/debug.o 2063 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libfdt.a [all …]
|
| /trusted-firmware-a/build/qemu/release/bl1/ |
| A D | bl1.map | 3 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memcmp.o) 5 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memcpy.o) 7 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memmove.o) 9 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(printf.o) 11 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(putchar.o) 13 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(strlen.o) 1283 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/bl1/io_fip.o 1294 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/bl1/tf_log.o 1320 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/bl1/debug.o 1326 LOAD /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libfdt.a [all …]
|
| /trusted-firmware-a/build/qemu/release/bl2/ |
| A D | bl2.map | 3 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libfdt.a(fdt.o) 7 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libfdt.a(fdt_ro.o) 9 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libfdt.a(fdt_rw.o) 11 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libfdt.a(fdt_wip.o) 13 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memchr.o) 15 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memcmp.o) 17 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memcpy.o) 19 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memmove.o) 21 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(memset.o) 23 /home/test/workspace/code/optee_3.16/trusted-firmware-a/build/qemu/release/lib/libc.a(printf.o) [all …]
|
| /trusted-firmware-a/plat/brcm/board/stingray/src/ |
| A D | scp_cmd.c | 25 uint32_t code; in scp_read_response() local 27 code = mmio_read_32(CRMU_MAIL_BOX0); in scp_read_response() 28 resp->completed = code & MCU_IPC_CMD_DONE_MASK; in scp_read_response() 29 resp->cmd = code & SCP_CMD_MASK; in scp_read_response() 30 resp->ret = (code & MCU_IPC_CMD_REPLY_MASK) >> MCU_IPC_CMD_REPLY_SHIFT; in scp_read_response()
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/process/ |
| A D | code-review-guidelines.rst.txt | 4 This document provides TF-A specific details about the project's code review 9 Why do we do code reviews? 12 The main goal of code reviews is to improve the code quality. By reviewing each 13 other's code, we can help catch issues that were missed by the author 19 community. People with more expertise in one area of the code base can 62 - If one code owner has become unresponsive, ask the other code owners for 90 Guidelines for code owners 100 - The structure of the code is clear. 116 - (Only applicable to generic code) The code is MISRA-compliant (see 169 name clashes with generic code. [all …]
|
| A D | coding-style.rst.txt | 91 .. code:: c 138 .. code:: c 150 .. code:: c 174 .. code:: c 182 .. code:: c 196 .. code:: c 213 .. code:: c 227 .. code:: c 245 .. code:: c 255 .. code:: c [all …]
|
| /trusted-firmware-a/docs/process/ |
| A D | code-review-guidelines.rst | 4 This document provides TF-A specific details about the project's code review 9 Why do we do code reviews? 12 The main goal of code reviews is to improve the code quality. By reviewing each 13 other's code, we can help catch issues that were missed by the author 19 community. People with more expertise in one area of the code base can 62 - If one code owner has become unresponsive, ask the other code owners for 90 Guidelines for code owners 100 - The structure of the code is clear. 116 - (Only applicable to generic code) The code is MISRA-compliant (see 169 name clashes with generic code. [all …]
|
| A D | coding-style.rst | 91 .. code:: c 138 .. code:: c 150 .. code:: c 174 .. code:: c 182 .. code:: c 196 .. code:: c 213 .. code:: c 227 .. code:: c 245 .. code:: c 255 .. code:: c [all …]
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/ |
| A D | hikey960.rst.txt | 35 .. code:: shell 45 .. code:: shell 54 .. code:: shell 62 .. code:: shell 70 .. code:: shell 85 .. code:: shell 91 .. code:: shell 103 .. code:: shell 110 .. code:: shell 124 .. code:: shell [all …]
|
| A D | hikey.rst.txt | 38 .. code:: shell 49 .. code:: shell 59 .. code:: shell 67 .. code:: shell 74 .. code:: shell 87 .. code:: shell 93 .. code:: shell 100 .. code:: shell 106 .. code:: shell 113 .. code:: shell [all …]
|
| A D | ti-k3.rst.txt | 28 .. code:: shell 34 .. code:: shell 40 .. code:: shell 47 .. code:: shell 55 .. code:: shell
|
| /trusted-firmware-a/docs/plat/ |
| A D | hikey960.rst | 35 .. code:: shell 45 .. code:: shell 54 .. code:: shell 62 .. code:: shell 70 .. code:: shell 85 .. code:: shell 91 .. code:: shell 103 .. code:: shell 110 .. code:: shell 124 .. code:: shell [all …]
|
| A D | hikey.rst | 38 .. code:: shell 49 .. code:: shell 59 .. code:: shell 67 .. code:: shell 74 .. code:: shell 87 .. code:: shell 93 .. code:: shell 100 .. code:: shell 106 .. code:: shell 113 .. code:: shell [all …]
|
| A D | ti-k3.rst | 28 .. code:: shell 34 .. code:: shell 40 .. code:: shell 47 .. code:: shell 55 .. code:: shell
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/security_advisories/ |
| A D | security-advisory-tfv-4.rst.txt | 17 | Affected | firmware update code executing before BL31 | 34 The macro code is at line 52, referring to the version of the code as of `commit 37 .. code:: c 52 #678`_ was merged (on 18 August 2016). However, the upstream code was not 55 then, the ``check_uptr_overflow()`` macro was not used in AArch32 code. 57 The vulnerability resides in the BL1 FWU SMC handling code and it may be 60 - Platform code uses TF BL1 with the ``TRUSTED_BOARD_BOOT`` build option. 62 - Platform code uses the Firmware Update (FWU) code provided in 75 .. code:: c 97 .. code:: c [all …]
|
| A D | security-advisory-tfv-1.rst.txt | 16 | Affected | firmware update code executing before BL31 | 19 | | reported by BL1 platform code | 35 The BL1 FWU SMC handling code, currently only supported on AArch64, contains 39 1. Platform code uses TF BL1 with the ``TRUSTED_BOARD_BOOT`` build option 42 2. Platform code arranges for untrusted normal world FWU code to be executed in 43 the cold boot path, before BL31 starts. Untrusted in this sense means code 47 3. Platform code copies the insecure pattern described below from the ARM 60 of the code: 64 .. code:: c 102 .. code:: c [all …]
|
| /trusted-firmware-a/docs/security_advisories/ |
| A D | security-advisory-tfv-4.rst | 17 | Affected | firmware update code executing before BL31 | 34 The macro code is at line 52, referring to the version of the code as of `commit 37 .. code:: c 52 #678`_ was merged (on 18 August 2016). However, the upstream code was not 55 then, the ``check_uptr_overflow()`` macro was not used in AArch32 code. 57 The vulnerability resides in the BL1 FWU SMC handling code and it may be 60 - Platform code uses TF BL1 with the ``TRUSTED_BOARD_BOOT`` build option. 62 - Platform code uses the Firmware Update (FWU) code provided in 75 .. code:: c 97 .. code:: c [all …]
|
| A D | security-advisory-tfv-1.rst | 16 | Affected | firmware update code executing before BL31 | 19 | | reported by BL1 platform code | 35 The BL1 FWU SMC handling code, currently only supported on AArch64, contains 39 1. Platform code uses TF BL1 with the ``TRUSTED_BOARD_BOOT`` build option 42 2. Platform code arranges for untrusted normal world FWU code to be executed in 43 the cold boot path, before BL31 starts. Untrusted in this sense means code 47 3. Platform code copies the insecure pattern described below from the ARM 60 of the code: 64 .. code:: c 102 .. code:: c [all …]
|
| /trusted-firmware-a/lib/zlib/ |
| A D | inflate.h | 109 code const FAR *lencode; /* starting table for length/literal codes */ 110 code const FAR *distcode; /* starting table for distance codes */ 118 code FAR *next; /* next available space in codes[] */ 121 code codes[ENOUGH]; /* space for code tables */
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/ |
| A D | license.rst.txt | 15 - Redistributions of source code must retain the above copyright notice, this 53 This project contains code from other projects as listed below. The original 56 - The libc source code is derived from `FreeBSD`_ and `SCC`_. FreeBSD uses 57 various BSD licenses, including BSD-3-Clause and BSD-2-Clause. The SCC code 60 - The libfdt source code is disjunctively dual licensed 62 the BSD-2-Clause license. Any contributions to this code must be made under 65 - The LLVM compiler-rt source code is disjunctively dual licensed 69 contributions to this code must be made under the terms of both licenses. 71 - The zlib source code is licensed under the Zlib license, which is a 74 - Some STMicroelectronics platform source code is disjunctively dual licensed [all …]
|
| /trusted-firmware-a/docs/ |
| A D | license.rst | 15 - Redistributions of source code must retain the above copyright notice, this 53 This project contains code from other projects as listed below. The original 56 - The libc source code is derived from `FreeBSD`_ and `SCC`_. FreeBSD uses 57 various BSD licenses, including BSD-3-Clause and BSD-2-Clause. The SCC code 60 - The libfdt source code is disjunctively dual licensed 62 the BSD-2-Clause license. Any contributions to this code must be made under 65 - The LLVM compiler-rt source code is disjunctively dual licensed 69 contributions to this code must be made under the terms of both licenses. 71 - The zlib source code is licensed under the Zlib license, which is a 74 - Some STMicroelectronics platform source code is disjunctively dual licensed [all …]
|
| /trusted-firmware-a/docs/getting_started/ |
| A D | tools-build.rst | 21 .. code:: shell 27 .. code:: shell 43 .. code:: shell 49 .. code:: shell 64 .. code:: shell 73 .. code:: shell 79 .. code:: shell 88 .. code:: shell 95 .. code:: shell 118 .. code:: shell [all …]
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/getting_started/ |
| A D | tools-build.rst.txt | 21 .. code:: shell 27 .. code:: shell 43 .. code:: shell 49 .. code:: shell 64 .. code:: shell 73 .. code:: shell 79 .. code:: shell 88 .. code:: shell 95 .. code:: shell 118 .. code:: shell [all …]
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/nxp/ |
| A D | nxp-ls-fuse-prov.rst.txt | 39 .. code:: shell 53 .. code:: shell 66 .. code:: shell 79 .. code:: shell 95 .. code:: shell 106 .. code:: shell 129 .. code:: shell 152 .. code:: shell 159 .. code:: shell 172 .. code:: shell [all …]
|
| /trusted-firmware-a/docs/plat/nxp/ |
| A D | nxp-ls-fuse-prov.rst | 39 .. code:: shell 53 .. code:: shell 66 .. code:: shell 79 .. code:: shell 95 .. code:: shell 106 .. code:: shell 129 .. code:: shell 152 .. code:: shell 159 .. code:: shell 172 .. code:: shell [all …]
|