| /OK3568_Linux_fs/kernel/drivers/gpu/drm/i915/display/ |
| H A D | intel_hdcp.c | 44 const struct intel_hdcp_shim *shim, u8 *bksv) in intel_hdcp_read_valid_bksv() argument 51 ret = shim->read_bksv(dig_port, bksv); in intel_hdcp_read_valid_bksv() 69 const struct intel_hdcp_shim *shim = connector->hdcp.shim; in intel_hdcp_capable() local 73 if (!shim) in intel_hdcp_capable() 76 if (shim->hdcp_capable) { in intel_hdcp_capable() 77 shim->hdcp_capable(dig_port, &capable); in intel_hdcp_capable() 79 if (!intel_hdcp_read_valid_bksv(dig_port, shim, bksv)) in intel_hdcp_capable() 107 hdcp->shim->hdcp_2_2_capable(dig_port, &capable); in intel_hdcp2_capable() 129 const struct intel_hdcp_shim *shim) in intel_hdcp_poll_ksv_fifo() argument 135 ret = __wait_for(read_ret = shim->read_ksv_ready(dig_port, in intel_hdcp_poll_ksv_fifo() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/soundwire/ |
| H A D | intel.c | 200 void __iomem *s = sdw->link_res->shim; in intel_reg_show() 338 void __iomem *shim = sdw->link_res->shim; in intel_link_power_up() local 373 sync_reg = intel_readl(shim, SDW_SHIM_SYNC); in intel_link_power_up() 378 intel_writel(shim, SDW_SHIM_SYNC, sync_reg); in intel_link_power_up() 381 link_control = intel_readl(shim, SDW_SHIM_LCTL); in intel_link_power_up() 389 ret = intel_set_bit(shim, SDW_SHIM_LCTL, link_control, cpa_mask); in intel_link_power_up() 396 ret = intel_wait_bit(shim, SDW_SHIM_SYNC, in intel_link_power_up() 417 void __iomem *shim = sdw->link_res->shim; in intel_shim_glue_to_master_ip() local 422 ioctl = intel_readw(shim, SDW_SHIM_IOCTL(link_id)); in intel_shim_glue_to_master_ip() 425 intel_writew(shim, SDW_SHIM_IOCTL(link_id), ioctl); in intel_shim_glue_to_master_ip() [all …]
|
| H A D | intel.h | 29 void __iomem *shim; member
|
| /OK3568_Linux_fs/kernel/sound/soc/intel/atom/sst/ |
| H A D | sst_loader.c | 60 csr.full = sst_shim_read64(sst_drv_ctx->shim, SST_CSR); in intel_sst_reset_dsp_mrfld() 65 sst_shim_write64(sst_drv_ctx->shim, SST_CSR, csr.full); in intel_sst_reset_dsp_mrfld() 66 csr.full = sst_shim_read64(sst_drv_ctx->shim, SST_CSR); in intel_sst_reset_dsp_mrfld() 71 sst_shim_write64(sst_drv_ctx->shim, SST_CSR, csr.full); in intel_sst_reset_dsp_mrfld() 73 csr.full = sst_shim_read64(sst_drv_ctx->shim, SST_CSR); in intel_sst_reset_dsp_mrfld() 89 csr.full = sst_shim_read64(sst_drv_ctx->shim, SST_CSR); in sst_start_mrfld() 93 sst_shim_write64(sst_drv_ctx->shim, SST_CSR, csr.full); in sst_start_mrfld() 95 csr.full = sst_shim_read64(sst_drv_ctx->shim, SST_CSR); in sst_start_mrfld() 100 sst_shim_write64(sst_drv_ctx->shim, SST_CSR, csr.full); in sst_start_mrfld() 102 csr.full = sst_shim_read64(sst_drv_ctx->shim, SST_CSR); in sst_start_mrfld()
|
| H A D | sst_ipc.c | 126 header.full = sst_shim_read64(sst_drv_ctx->shim, SST_IPCX); in sst_post_message_mrfld() 137 header.full = sst_shim_read64(sst_drv_ctx->shim, SST_IPCX); in sst_post_message_mrfld() 169 sst_shim_write64(sst_drv_ctx->shim, SST_IPCX, msg->mrfld_header.full); in sst_post_message_mrfld() 186 imr.full = sst_shim_read64(sst_drv_ctx->shim, SST_IMRX); in intel_sst_clear_intr_mrfld() 187 isr.full = sst_shim_read64(sst_drv_ctx->shim, SST_ISRX); in intel_sst_clear_intr_mrfld() 191 sst_shim_write64(sst_drv_ctx->shim, SST_ISRX, isr.full); in intel_sst_clear_intr_mrfld() 194 clear_ipc.full = sst_shim_read64(sst_drv_ctx->shim, SST_IPCD); in intel_sst_clear_intr_mrfld() 199 sst_shim_write64(sst_drv_ctx->shim, SST_IPCD, clear_ipc.full); in intel_sst_clear_intr_mrfld() 202 sst_shim_write64(sst_drv_ctx->shim, SST_IMRX, imr.full); in intel_sst_clear_intr_mrfld()
|
| H A D | sst.c | 56 isr.full = sst_shim_read64(drv->shim, SST_ISRX); in intel_sst_interrupt_mrfld() 61 header.full = sst_shim_read64(drv->shim, in intel_sst_interrupt_mrfld() 64 sst_shim_write64(drv->shim, drv->ipc_reg.ipcx, header.full); in intel_sst_interrupt_mrfld() 68 sst_shim_write64(drv->shim, SST_ISRX, isr.full); in intel_sst_interrupt_mrfld() 79 imr.full = sst_shim_read64(drv->shim, SST_IMRX); in intel_sst_interrupt_mrfld() 81 sst_shim_write64(drv->shim, SST_IMRX, imr.full); in intel_sst_interrupt_mrfld() 83 header.full = sst_shim_read64(drv->shim, drv->ipc_reg.ipcd); in intel_sst_interrupt_mrfld() 319 sst_shim_write64(ctx->shim, SST_IMRX, 0xFFFF0038); in sst_context_init()
|
| H A D | sst_pci.c | 65 ctx->shim = pcim_iomap(pci, 1, pci_resource_len(pci, 1)); in sst_platform_get_resources() 66 if (!ctx->shim) { in sst_platform_get_resources() 70 dev_dbg(ctx->dev, "SST Shim Ptr %p\n", ctx->shim); in sst_platform_get_resources()
|
| H A D | sst_acpi.c | 186 ctx->shim = devm_ioremap(ctx->dev, ctx->shim_phy_add, in sst_platform_get_resources() 188 if (!ctx->shim) { in sst_platform_get_resources()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/drbd/drbd-utils/ |
| H A D | 0001-drbd-utils-support-usrmerge.patch | 46 - install -m 755 drbd-service-shim.sh $(DESTDIR)/lib/drbd/scripts 51 + install -m 755 drbd-service-shim.sh $(DESTDIR)/${nonarch_libdir}/drbd/scripts 65 -ExecStart=/lib/drbd/scripts/drbd-service-shim.sh secondary-or-escalate %I 66 +ExecStart=@nonarch_libdir@/drbd/scripts/drbd-service-shim.sh secondary-or-escalate %I 76 -ExecCondition=/lib/drbd/scripts/drbd-service-shim.sh primary %I 77 -ExecStop=/lib/drbd/scripts/drbd-service-shim.sh secondary %I 78 +ExecCondition=@nonarch_libdir@/drbd/scripts/drbd-service-shim.sh primary %I 79 +ExecStop=@nonarch_libdir@/drbd/scripts/drbd-service-shim.sh secondary %I 120 -ExecStart=/lib/drbd/scripts/drbd-service-shim.sh adjust %I 121 -ExecReload=/lib/drbd/scripts/drbd-service-shim.sh adjust %I [all …]
|
| /OK3568_Linux_fs/buildroot/package/containerd/ |
| H A D | containerd.mk | 21 cmd/containerd-shim \ 22 cmd/containerd-shim-runc-v1 \ 23 cmd/containerd-shim-runc-v2 \
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0143-shim_lock-Only-skip-loading-shim_lock-verifier-with-.patch | 14 skipping validations, or if GRUB image is built with --disable-shim-lock. 41 boot and the shim. This functionality is provided by the shim_lock verifier. It 45 +is registered. If it is desired to use UEFI secure boot without shim, one can 46 +disable shim_lock by disabling shim verification with MokSbState UEFI variable 47 +or by building grub image with @samp{--disable-shim-lock} option. 75 + /* shim_lock is missing, check if GRUB image is built with --disable-shim-lock. */ 118 + { "disable-shim-lock", GRUB_INSTALL_OPTIONS_DISABLE_SHIM_LOCK, 0, 0, \ 174 + disable_shim_lock ? "--disable-shim-lock" : "", s); 196 + {"disable-shim-lock", GRUB_INSTALL_OPTIONS_DISABLE_SHIM_LOCK, 0, 0, N_("disable shim_lock verifi…
|
| /OK3568_Linux_fs/buildroot/boot/shim/ |
| H A D | shim.mk | 8 SHIM_SITE = https://github.com/rhboot/shim/releases/download/$(SHIM_VERSION) 9 SHIM_SOURCE = shim-$(SHIM_VERSION).tar.bz2
|
| H A D | Config.in | 2 bool "shim" 17 https://github.com/rhboot/shim
|
| H A D | shim.hash | 2 sha256 8344473dd10569588b8238a4656b8fab226714eea9f5363f8c410aa8a5090297 shim-15.4.tar.bz2
|
| /OK3568_Linux_fs/kernel/sound/soc/intel/common/ |
| H A D | sst-dsp.c | 53 sst->ops->write(sst->addr.shim, offset, value); in sst_dsp_shim_write() 64 val = sst->ops->read(sst->addr.shim, offset); in sst_dsp_shim_read() 73 sst->ops->write(sst->addr.shim, offset, value); in sst_dsp_shim_write_unlocked() 79 return sst->ops->read(sst->addr.shim, offset); in sst_dsp_shim_read_unlocked()
|
| H A D | sst-dsp-priv.h | 43 void __iomem *shim; member
|
| /OK3568_Linux_fs/external/xserver/hw/xwin/glx/ |
| H A D | gen_gl_wrappers.py | 40 shim=False variable 80 shim=True variable 103 if shim: 444 if shim:
|
| H A D | Makefile.am | 58 …THON3) $(srcdir)/gen_gl_wrappers.py -registry $(KHRONOS_SPEC_DIR)/gl.xml -shim $(GENGLWRAPPERSOPTS…
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-tzlocal_4.2.bb | 11 ${PYTHON_PN}-pytz-deprecation-shim \
|
| H A D | python3-pytz-deprecation-shim_0.1.0.post0.bb | 2 HOMEPAGE = "https://github.com/pganssle/pytz-deprecation-shim"
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/dynamic-layers/meta-python/recipes-extended/mozjs/mozjs-78/ |
| H A D | 0010-riscv-Set-march-correctly.patch | 55 …bdf375a057e673257348f6d7584c0dd11b66318d98f3647f69eb610b097","src/bin/gcc-shim.rs":"b7790787502949… 57 …bdf375a057e673257348f6d7584c0dd11b66318d98f3647f69eb610b097","src/bin/gcc-shim.rs":"b7790787502949…
|
| /OK3568_Linux_fs/yocto/meta-browser/meta-chromium/recipes-browser/chromium/files/musl/ |
| H A D | 0015-mallopt-is-glibc-specific-API.patch | 18 #include "base/allocator/partition_allocator/shim/winheap_stubs_win.h"
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/renderdoc/ |
| H A D | renderdoc_1.13.bb | 10 file://0001-renderdoc-use-xxd-instead-of-cross-compiling-shim-bi.patch \
|
| /OK3568_Linux_fs/kernel/Documentation/security/tpm/ |
| H A D | tpm_ftpm_tee.rst | 11 This driver is a shim for firmware implemented in ARM's TrustZone
|
| /OK3568_Linux_fs/buildroot/boot/ |
| H A D | Config.in | 22 source "boot/shim/Config.in"
|