Home
last modified time | relevance | path

Searched refs:use (Results 1 – 25 of 128) sorted by relevance

123456

/rk3399_ARM-atf/docs/perf/
H A Dtsp.rst8 called the TSPD. Therefore, if you intend to use the TSP, the BL31 image
13 Then to build the TSP image use:
/rk3399_ARM-atf/docs/components/
H A Dven-el3-service.rst27 | 0x87000010 - 0x8700001F (SMC32) | DebugFS Interface | | 0 - 11 are in use. …
31 | 0x87000020 - 0x8700002F (SMC32) | Performance | | 0,1 is in use. …
35 | 0x87000030 - 0x8700003F (SMC32) | ACS (Architecture | | 0 in use. …
39 | 0x87000040 - 0x8700004F (SMC32) | TPM Start method | | 0 is in use. …
90 to their ACS EL3 code based on their respective use-cases.
H A Drealm-management-extension.rst62 address translation. GPC makes use of Granule Protection Table (GPT) in the
95 platform is by the use of `Shrinkwrap`_.
100 - Three-world execution: this is the configuration to use if Secure
103 - Four-world execution: this is the configuration to use if both Secure
H A Dmpmm.rst16 external power controller can use these metrics to budget SoC power by
/rk3399_ARM-atf/docs/process/
H A Dcoding-style.rst17 The source code must use the **UTF-8** character encoding. Comments and
18 documentation may use non-ASCII characters when required (e.g. Greek letters
31 Exceptions are made when referring directly to something that does not use
72 Use **tabs** for indentation. The use of spaces for indentation is forbidden
124 acceptable to use additional blank lines for clarity, if required.
175 For example, use the following style:
226 Local variables and function parameters use the same format as function names:
267 size of eight columns it would be necessary to use one tab character and two
322 * In this style, the first and last lines use asterisks that run the full
331 /* Single line comments can use this format */
[all …]
H A Dcoding-guidelines.rst11 Many of the rules given below (such as indentation size, use of tabs, and
48 the remote master, use:
76 Avoid printf and use logging macros
155 used (Banned) or are discouraged from use and must be used with care (Caution).
160 | ``strcpy, wcscpy``, | Banned | use strlcpy instead |
163 | ``strcat, wcscat``, | Banned | use strlcat instead |
166 | ``sprintf, vsprintf`` | Banned | use snprintf, vsnprintf |
175 | ``strtok`` | Banned | use strtok_r or strsep instead |
179 | ``ato*`` | Banned | use equivalent strto* functions |
192 Where possible, use the ``CASSERT`` macro to check the validity of data known at
[all …]
H A Dcommit-style.rst8 keep a more accurate changelog. You may use Markdown in commit messages.
42 The following example commit message demonstrates the use of the
90 While we don't enforce scopes strictly, we do ask that commits use these if they
93 It's highly recommended that you use the tooling installed by the optional steps
122 When creating new scopes, try to keep them short and succinct, and use kebab
124 platforms and some drivers) should use that name (e.g. ``gic600ae``,
125 ``flexspi``, ``stpmic1``), otherwise use a name that uniquely represents the
H A Dmisra-compliance.csv10 9,D,4.6,MISRA C 2012,Advisory,No,No,We use a mix of both. It would be too disruptive for the projec…
25 24,R,2.4,MISRA C 2012,Advisory,No,No,Header files may use enumerations instead of defines to group …
33 32,R,5.1,MISRA C 2012,Required,No,No,We use weak symbols that prevent us from complying with this r…
40 39,R,5.8,MISRA C 2012,Required,No,No,We use weak symbols that prevent us from complying with this r…
53 52,R,8.6,MISRA C 2012,Required,No,No,We use weak symbols that prevent us from complying with this r…
79 …clude the pattern of using void * in interfaces to hide the real object, which we use extensively."
130 129,R,19.2,MISRA C 2012,Advisory,Yes,Optional,"Unions can be useful. We almost don’t use them, so i…
139 …red,Yes,Optional,"We use a mix of #if and #ifdef for boolean macros, which may raise some failures…
/rk3399_ARM-atf/lib/compiler-rt/
H A DLICENSE.TXT7 to use it under either license. As a contributor, you agree to allow your code
32 use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
63 to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
88 other licenses gives permission to use the names of the LLVM Team or the
/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dthreat_model_firmware_handoff.rst8 use of the `Firmware Handoff` framework, which is implemented via the Transfer
38 From a system perspective, we re-use the :ref:`Generic TF-A threat model
55 | | and use it. |
89 | 05 | | As in the general case, it’s common to use logging |
121 | 13 | | A producer may use a TL to convey sensitive data |
/rk3399_ARM-atf/docs/resources/diagrams/plantuml/
H A Dfconf_bl1_load_config.puml43 note over fconf: use statically defined policies in bl1
63 note over fconf: use statically defined policies in bl1
H A Dfconf_bl2_populate.puml44 note over arm_io_storage: use populated properties
/rk3399_ARM-atf/licenses/
H A DLICENSE-APACHE-2.0.txt10 "License" shall mean the terms and conditions for use, reproduction,
78 use, offer to sell, sell, import, and otherwise transfer the Work,
126 for use, reproduction, or distribution of Your modifications, or
127 for any such Derivative Works as a whole, provided Your use,
139 6. Trademarks. This License does not grant permission to use the trade
141 except as required for reasonable and customary use in describing the
160 result of this License or out of the use or inability to use the
193 you may not use this file except in compliance with the License.
/rk3399_ARM-atf/docs/about/
H A Dacknowledgements.rst10 use for new contributions.
/rk3399_ARM-atf/plat/arm/board/n1sdp/fdts/
H A Dn1sdp_tb_fw_config.dts22 * BL2 in order to locate and re-use the heap.
/rk3399_ARM-atf/plat/arm/board/neoverse_rd/platform/rdn2/fdts/
H A Drdn2_tb_fw_config.dts23 * BL2 in order to locate and re-use the heap.
/rk3399_ARM-atf/plat/arm/board/morello/fdts/
H A Dmorello_tb_fw_config.dts22 * BL2 in order to locate and re-use the heap.
/rk3399_ARM-atf/include/drivers/brcm/
H A Dfru.h54 bool use; member
/rk3399_ARM-atf/plat/arm/board/neoverse_rd/platform/rdv3/fdts/
H A Drdv3_tb_fw_config.dts23 * BL2 in order to locate and re-use the heap.
/rk3399_ARM-atf/tools/marvell/doimage/secure/
H A Dsec_img_8K.cfg7 # use "*" string instead of file name for specifying an empty key
H A Dsec_img_7K.cfg7 # use "*" string instead of file name for specifying an empty key
/rk3399_ARM-atf/docs/plat/
H A Drpi3.rst7 The following instructions explain how to use this port of the TF-A with the
42 This means that we can use the default AArch32 kernel provided in the official
131 so that the kernel doesn't use it. The current port tries to modify the live DTB
171 use mailboxes to trap the secondary cores until they are ready to jump to the
175 Kernels with PSCI support can use the PSCI calls instead for a cleaner boot.
199 build folder (e.g. ``build/rpi3/debug/armstub8.bin``). To know how to use this
268 Please use the code from `here <https://github.com/OP-TEE/optee_os>`__.
275 Linux command line so that the USB driver doesn't use FIQs:
281 it. In order to use TBB, you might want to set ``GENERATE_COT=1`` to let the
309 Then compile TF-A. For a 32-bit kernel, use the following command line:
[all …]
/rk3399_ARM-atf/plat/arm/board/fvp/fdts/
H A Dfvp_tb_fw_config.dts25 * BL2 in order to locate and re-use the heap.
119 /* FVP does not support the CCA NV Counter so use the Trusted one. */
/rk3399_ARM-atf/docs/components/spd/
H A Dtlk-dispatcher.rst11 just needs to compile, any BL32 image would do. To use TLK as the BL32, please
23 You can download the LK modular embedded preemptive kernel for use on Arm,
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-7.rst47 have a system performance impact, which varies for each CPU type and use-case.
94 static approach for some systems or use-cases. However, for other systems or
95 use-cases, this performance saving may be outweighed by the additional overhead

123456