| /OK3568_Linux_fs/kernel/lib/ |
| H A D | test_objagg.c | 29 struct world { struct 46 static struct objagg_obj *world_obj_get(struct world *world, in world_obj_get() argument 60 if (!world->key_refs[key_id_index(key_id)]) { in world_obj_get() 61 world->objagg_objs[key_id_index(key_id)] = objagg_obj; in world_obj_get() 62 } else if (world->objagg_objs[key_id_index(key_id)] != objagg_obj) { in world_obj_get() 68 world->key_refs[key_id_index(key_id)]++; in world_obj_get() 76 static void world_obj_put(struct world *world, struct objagg *objagg, in world_obj_put() argument 81 if (!world->key_refs[key_id_index(key_id)]) in world_obj_put() 83 objagg_obj = world->objagg_objs[key_id_index(key_id)]; in world_obj_put() 85 world->key_refs[key_id_index(key_id)]--; in world_obj_put() [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/directfb/directfb/ |
| H A D | fusion.patch | 9 direct_mutex_lock( &world->event_dispatcher_mutex ); 12 - if (!world->event_dispatcher_buffers) 13 + if (!world->event_dispatcher_buffers){ 14 … direct_waitqueue_wait( &world->event_dispatcher_cond, &world->event_dispatcher_mutex ); 16 + if (world->dispatch_stop) { 18 + direct_mutex_unlock( &world->event_dispatcher_mutex ); 22 buf = (FusionEventDispatcherBuffer *)world->event_dispatcher_buffers; 28 … direct_waitqueue_wait( &world->event_dispatcher_cond, &world->event_dispatcher_mutex ); 29 + if (world->dispatch_stop) { 31 + direct_mutex_unlock( &world->event_dispatcher_mutex ); [all …]
|
| /OK3568_Linux_fs/kernel/drivers/tee/optee/ |
| H A D | optee_smc.h | 75 * Used by non-secure world to figure out which Trusted OS is installed. 88 * Used by non-secure world to figure out which version of the Trusted OS 146 * world. 187 * Exchanges capabilities between normal world and secure world 191 * a1 bitfield of normal world capabilities OPTEE_SMC_NSEC_CAP_* 197 * a1 bitfield of secure world capabilities OPTEE_SMC_SEC_CAP_* 201 * a0 OPTEE_SMC_RETURN_ENOTAVAIL, can't use the capabilities from normal world 202 * a1 bitfield of secure world capabilities OPTEE_SMC_SEC_CAP_* 205 /* Normal world works as a uniprocessor system */ 207 /* Secure world has reserved shared memory for normal world to use */ [all …]
|
| H A D | optee_msg.h | 13 * with an instance of OP-TEE running in secure world. 17 * 2. Requests from normal world 18 * 3. Requests from secure world, Remote Procedure Call (RPC), handled by 107 * Secure and normal world communicates pointers as physical address 108 * instead of the virtual address. This is because secure and normal world 109 * have completely independent memory mapping. Normal world can even have a 112 * structure to secure world. 135 * Value parameters are passed unchecked between normal and secure world. 220 * Part 2 - requests from normal world 248 * Used by non-secure world to figure out which Trusted OS is installed. [all …]
|
| H A D | call.c | 27 * We're preparing to make a call to secure world. In case we can't in optee_cq_wait_init() 28 * allocate a thread in secure world we'll end up waiting in in optee_cq_wait_init() 31 * Normally if there's no contention in secure world the call will in optee_cq_wait_init() 38 * guarantees that we don't lose a completion if secure world in optee_cq_wait_init() 79 * We're done with the call to secure world. The thread in secure in optee_cq_wait_final() 80 * world that was used for this call is now available for some in optee_cq_wait_final() 93 * was just done with its call to secure world. Since yet another in optee_cq_wait_final() 94 * thread now is available in secure world wake up another eventual in optee_cq_wait_final() 117 * optee_do_call_with_arg() - Do an SMC to OP-TEE in secure world 119 * @parg: physical address of message to pass to secure world [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/arm/ |
| H A D | secure.txt | 1 * ARM Secure world bindings 6 world or the Secure world. However some devicetree consumers are 13 The general principle of the naming scheme for Secure world bindings 14 is that any property that needs a different value in the Secure world 19 world value is the same as specified for the Normal world by the 30 world consumers (like kernels that run entirely in Secure) to simply 31 describe the view of Secure world using the standard bindings. These 33 world views need to be described in a single device tree. 35 Valid Secure world properties 39 in the secure world. The combination of this with "status" allows [all …]
|
| /OK3568_Linux_fs/buildroot/dl/qt5location/git/src/plugins/geoservices/esri/ |
| H A D | maps.json | 5 "name": "World Street Map", 6 "description": "ArcGIS Online World Street Map", 15 "name": "World Imagery", 16 "": "ArcGIS Online World Imagery", 25 "name": "World Terrain Base", 26 "description": "ArcGIS Online World Terrain Base", 35 "name": "World Topography", 36 "description": "ArcGIS Online World Topography", 55 "name": "National Geographic World Map", 56 "description": "National Geographic World Map", [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/iio/ |
| H A D | mount-matrix.txt | 13 that produce three-dimensional data in relation to the world where it is 41 external world, the environment where the device is deployed. Usually the data 43 to this world. When using the mounting matrix, the sensor and device orientation 45 world. 47 Device-to-world examples for some three-dimensional sensor types: 49 - Accelerometers have their world frame of reference toward the center of 53 this point. Up and down in the world relative to the device frame of 93 - Magnetometers (compasses) have their world frame of reference relative to the 94 geomagnetic field. The system orientation vis-a-vis the world is defined with 160 space, relative to the device or world point of reference.
|
| /OK3568_Linux_fs/buildroot/package/optee-client/ |
| H A D | Config.in | 11 applications hosted in the OP-TEE OS secure world. The 12 supplicant provides services hosted by the non-secure world 13 and invoked by the secure world. 20 string "Path for normal world OS secure storage" 24 normal world OS providing the actual storage via
|
| /OK3568_Linux_fs/yocto/poky/bitbake/doc/bitbake-user-manual/ |
| H A D | bitbake-user-manual-hello.rst | 4 Hello World Example 7 BitBake Hello World 12 World <http://en.wikipedia.org/wiki/Hello_world_program>`__" example. 13 This appendix demonstrates, in tutorial form, Hello World within the 78 The Hello World Example 81 The overall goal of this exercise is to build a complete "Hello World" 89 build to eventually conclude with a working, minimal "Hello World" 101 `Mailing List post - The BitBake equivalent of "Hello, World!" 105 "Hello World". However, it is unknown what BitBake needs and what you 115 Following is the complete "Hello World" example. [all …]
|
| /OK3568_Linux_fs/buildroot/support/testing/tests/package/ |
| H A D | test_sudo.py | 29 output, exit_code = self.emulator.run("su - sudotest -c 'echo hello world'") 30 self.assertEqual(output, ["hello world"]) 32 output, exit_code = self.emulator.run("su - sudotest -c 'sudo echo hello world'") 34 self.assertEqual(output, ["hello world"])
|
| /OK3568_Linux_fs/u-boot/include/optee_include/ |
| H A D | teesmc.h | 16 * (secure world OS and normal world Linux kernel to start with) where 33 * a trusted OS in secure world. 66 * Used as an indication from normal world of compatible cache usage. 93 * Secure and normal world communicates pointer via physical address instead of 95 * Secure and normal world has completely independant memory mapping. Normal 96 * world can even have a hypervisor which need to translate the guest 98 * before passing the structure to secure world. 369 * Used by non-secure world to figure out which Trusted OS is installed. 383 * Used by non-secure world to figure out which version of the Trusted OS 432 * world. [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oeqa/manual/ |
| H A D | crops.json | 25 …stdio.h> \n\nint \nmain(int argc, char *argv[]) \n{ \n\tprintf(\"Hello world\\n\"); \n \n\tretu… 29 …io.h> \n\nint \nmain(int argc, char *argv[]) \n{ \n\tprintf(\"Hello world\\n\"); \n\n\tretu… 79 …<stdio.h> \n\nint \nmain(int argc, char *argv[]) \n{ \n\tprintf(\"Hello world\\n\"); \n \n\tretu… 83 …io.h> \n\nint \nmain(int argc, char *argv[]) \n{ \n\tprintf(\"Hello world\\n\"); \n\n\tretu… 133 …<stdio.h> \n\nint \nmain(int argc, char *argv[]) \n{ \n\tprintf(\"Hello world\\n\"); \n \n\tretu… 137 …nclude \n\nint \nmain(int argc, char *argv[]) \n{ \n\tprintf(\"Hello world\\n\"); \n\n\tretu… 237 …"action": "devtool add kernel-module-hello-world https://git.yoctoproject.org/git/kernel-module-he… 238 …ipe kernel-module-hello-world.bb under <crops-esdk-workdir-workspace>/recipes/kernel-module-hello-… 241 "action": "devtool build kernel-module-hello-world \n\n", 245 "action": "devtool reset kernel-module-hello-world ", [all …]
|
| /OK3568_Linux_fs/u-boot/doc/ |
| H A D | README.fsl-trustzone-components | 15 - Separates Secure World and Normal World on-chip RAM (OCRAM) spaces. 22 - Separates Secure World and Normal World external memory spaces for bus masters
|
| /OK3568_Linux_fs/kernel/drivers/scsi/qla2xxx/ |
| H A D | tcm_qla2xxx.h | 20 /* Binary World Wide unique Node Name for remote FC Initiator Nport */ 58 /* Binary World Wide unique Port Name for FC Target Lport */ 60 /* Binary World Wide unique Port Name for FC NPIV Target Lport */ 62 /* Binary World Wide unique Node Name for FC NPIV Target Lport */
|
| /OK3568_Linux_fs/kernel/scripts/kconfig/tests/preprocess/builtin_func/ |
| H A D | expected_stderr | 1 Kconfig:8: hello world 1 2 Kconfig:18: hello world 3 3 Kconfig:22: hello world 4
|
| H A D | Kconfig | 4 $(info,hello world 0) 8 $(warning-if,y,hello world 1) 18 $(warning,$(shell,echo hello world 3))
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-example/rust-hello-world/ |
| H A D | rust-hello-world_git.bb | 3 SRC_URI = "git://github.com/meta-rust/rust-hello-world.git;protocol=https;branch=master" 13 SUMMARY = "Hello World by Cargo for Rust" 14 HOMEPAGE = "https://github.com/meta-rust/rust-hello-world"
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oeqa/runtime/cases/ |
| H A D | rust.py | 11 @OEHasPackage(['rust-hello-world']) 13 cmd = "rust-hello-world" 19 self.assertEqual(output, "Hello, world!", msg=msg)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/duktape/files/ |
| H A D | run-ptest | 4 out="Hello world!" 13 ./eval "print('Hello world!'); 123;" > out.log 18 if grep -w 'Hello world!\|123' eval.log 2>&1; then
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/ |
| H A D | meta-world-pkgdata.bb | 1 SUMMARY = "Pulls in pkgdata for world" 15 WORLD_PKGDATADIR = "${D}/world-pkgdata" 20 do_collect_packagedata[sstate-outputdirs] = "${STAGING_DIR_HOST}/world-pkgdata"
|
| /OK3568_Linux_fs/kernel/Documentation/kbuild/ |
| H A D | kconfig-macro-language.rst | 181 For example, $(shell echo hello, world) runs the command "echo hello, world". 182 Likewise, $(info hello, world) prints "hello, world" to stdout. You could say 188 $(shell, echo hello, world) 194 $(shell, echo hello$(comma) world)
|
| /OK3568_Linux_fs/yocto/poky/scripts/lib/checklayer/cases/ |
| H A D | common.py | 53 "bitbake world" is expected to work. test_signatures does not cover that 54 because it is more lenient and ignores recipes in a world build that 55 are not actually buildable, so here we fail when "bitbake -S none world" 62 This also does "bitbake -S none world" along with inheriting "yocto-check-layer"
|
| /OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/deps/geojsonvt/6.5.1/include/mapbox/geojsonvt/ |
| H A D | wrap.hpp | 20 // left world copy in wrap() 22 // right world copy in wrap() 28 // center world copy in wrap()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/share/doc/gdb/ |
| H A D | Exception-Handling.html | 146 > """Greet the whole world.""" 148 > super (HelloWorld, self).__init__ ("hello-world", gdb.COMMAND_USER) 152 > raise gdb.GdbError ("hello-world takes no arguments") 153 > print "Hello, World!" 156 (gdb) hello-world 42 157 hello-world takes no arguments
|