| /rk3399_ARM-atf/include/plat/nuvoton/npcm845x/ |
| H A D | platform_def.h | 228 #pragma message(VAR_NAME_VALUE(ARM_AP_TZC_DRAM1_BASE)) 229 #pragma message(VAR_NAME_VALUE(BL31_BASE)) 230 #pragma message(VAR_NAME_VALUE(BL31_LIMIT)) 231 #pragma message(VAR_NAME_VALUE(PLAT_ARM_MAX_BL31_SIZE)) 232 #pragma message(VAR_NAME_VALUE(BL32_BASE)) 233 #pragma message(VAR_NAME_VALUE(BL32_LIMIT)) 234 #pragma message(VAR_NAME_VALUE(PLAT_ARM_MAX_BL32_SIZE) 235 #pragma message(VAR_NAME_VALUE(SPMD_SPM_AT_SEL2_KKO))
|
| /rk3399_ARM-atf/plat/arm/board/corstone700/common/drivers/mhu/ |
| H A D | corstone700_mhu.c | 64 unsigned int message) in mhu_secure_message_send() argument 91 mmio_write_32(address + CPU_INTR_S_SET, message); in mhu_secure_message_send()
|
| H A D | corstone700_mhu.h | 33 unsigned int message);
|
| /rk3399_ARM-atf/services/std_svc/spmd/ |
| H A D | spmd_private.h | 76 unsigned long long message);
|
| H A D | spmd_main.c | 110 unsigned long long message) in spmd_build_spmc_message() argument 117 write_ctx_reg(gpregs, CTX_GPREG_X3, message); in spmd_build_spmc_message()
|
| /rk3399_ARM-atf/services/std_svc/spm/el3_spmc/ |
| H A D | spmc_pm.c | 25 unsigned long long message, in spmc_build_pm_message() argument 35 write_ctx_reg(gpregs, CTX_GPREG_X3, message); in spmc_build_pm_message()
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_el3_spm.rst | 52 | | message request to SPMC targeting LSP as destination. | 169 | implemented? | The SPMC enforces checks in the direct message | 172 | | originated message directed to the SWd cannot use a| 328 | | A malicious endpoint may replay a message exchange | 410 | Threat | **A malicious endpoint may forge a direct message | 412 | | another endpoint through the direct message | 416 | | message by a direct message response with | 418 | | (e.g. partition message response outside of | 446 | | to be revealed through a direct message response. |
|
| /rk3399_ARM-atf/plat/mediatek/drivers/ptp3/ |
| H A D | ptp3_common.c | 121 #pragma message "PSCI hint not enable"
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | rse.rst | 20 subsystems can communicate with each other over message exchange. RSE waits 44 interface. One pair provides message sending from AP to RSE and the other pair 48 The RSE communication layer provides two ways for message exchange: 50 - ``Embedded messaging``: The full message, including header and payload, are 57 that data was read. Signalling happens via IRQ. If the message is longer than 58 the data fit to the channel registers then the message is sent over in 61 - ``Pointer-access messaging``: The message header and the payload are 74 decided at runtime based on the message size which way to transfer the message. 109 current use case only requires message exchange during the boot phase. In 115 A description of the message format can be found in the ``RSE communication
|
| /rk3399_ARM-atf/drivers/arm/gic/common/ |
| H A D | gic_common.c | 7 #pragma message __FILE__ " is deprecated, use gicv2.mk instead"
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | commit-style.rst | 10 A good commit message provides all the background information needed for 42 The following example commit message demonstrates the use of the
|
| H A D | coding-guidelines.rst | 271 emitting a ``WARN`` message, performing any necessary error handling and 291 1. If the unrecoverable error is unexpected then emit an ``ERROR`` message and 295 then emit an ``ERROR`` message and call the platform-specific function
|
| H A D | code-review-guidelines.rst | 230 posted via the commit message or on the mailing list.
|
| H A D | contributing.rst | 216 this case, the job's console output will show the following error message::
|
| /rk3399_ARM-atf/lib/zlib/ |
| H A D | inffast.c | 12 # pragma message("Assembler code may have bugs -- use at your own risk")
|
| /rk3399_ARM-atf/docs/tools/ |
| H A D | cot-dt2c.rst | 40 --help Show this message and exit.
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | el3-spmc.rst | 298 An incoming direct message request arriving at SPMD from NWd is forwarded to 300 message is coming from normal world in this specific code path. Thus the origin 303 An SP sending a direct message request must have bit 15 set in its origin 306 The SPMC shall reject the direct message if the claimed world in origin endpoint
|
| H A D | granule-protection-tables-design.rst | 244 error message and return a negative value. The return values of APIs should be
|
| H A D | xlat-tables-lib-v2-design.rst | 257 unexpected error is encountered, they will print an error message on the UART.
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | tools-build.rst | 68 Invoking the tool with ``help`` will print a help message with all available
|
| H A D | prerequisites.rst | 100 CI for feedback on commit message conformance.
|
| /rk3399_ARM-atf/docs/about/ |
| H A D | features.rst | 125 message.
|
| /rk3399_ARM-atf/docs/plat/marvell/armada/ |
| H A D | porting.rst | 77 skip image request message is printed on the screen and boot rom boots from the
|
| H A D | build.rst | 200 an error message will be printed prior trying to reboot via the usual way.
|
| /rk3399_ARM-atf/plat/intel/soc/common/sip/ |
| H A D | socfpga_sip_fcs.c | 767 psgsigma_teardown_msg message = { in intel_fcs_sigma_teardown() local 774 (uint32_t *) &message, sizeof(message) / MBOX_WORD_BYTE, in intel_fcs_sigma_teardown()
|