| /rk3399_ARM-atf/plat/nvidia/tegra/include/t186/ |
| H A D | tegra_mc_def.h | 356 #define mc_set_pcfifo_unordered_boot_so_mss(id, client) \ argument 357 ((uint32_t)~MC_PCFIFO_CLIENT_CONFIG##id##_PCFIFO_##client##_MASK | \ 358 MC_PCFIFO_CLIENT_CONFIG##id##_PCFIFO_##client##_UNORDERED) 360 #define mc_set_pcfifo_ordered_boot_so_mss(id, client) \ argument 361 MC_PCFIFO_CLIENT_CONFIG##id##_PCFIFO_##client##_ORDERED 363 #define mc_set_tsa_passthrough(client) \ argument 365 mmio_write_32(TEGRA_TSA_BASE + TSA_CONFIG_STATIC0_CSW_##client, \ 366 (TSA_CONFIG_STATIC0_CSW_##client##_RESET & \ 371 #define mc_set_tsa_w_passthrough(client) \ argument 373 mmio_write_32(TEGRA_TSA_BASE + TSA_CONFIG_STATIC0_CSW_##client, \ [all …]
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | sdei.rst | 18 client receives the event notification at the registered handler even when it 20 client are specific to the platform [#std-event]_. See also `Determining client 25 The following figure depicts a general sequence involving SDEI client executing 31 As part of initialisation, the SDEI client binds a Non-secure interrupt [1], and 32 the SDEI dispatcher returns a platform dynamic event number [2]. The client then 34 events on the current PE [7]. This sequence is typical of an SDEI client, but it 39 execute the registered handler [10]. The client terminates its execution with 42 the client handler completes, at which point EL3 does EOI [12]. 116 on the platform. The list of events made available to the client, along with 193 Determining client EL [all …]
|
| H A D | secure-partition-manager-mm.rst | 15 In some market segments that primarily deal with client-side devices like mobile 190 used to identify a management mode service. A client populates the GUID in the 347 client.
|
| H A D | exception-handling.rst | 142 The |EHF| is a client of *Interrupt Management Framework*, and registers the
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-8.rst | 6 | | Normal World SMC client to another | 19 | | client to another | 58 some of the return values from one client to another. For example, if a victim 59 client first sends an SMC that returns 4 values, a malicious client may then 61 ``SDEI_EVENT_COMPLETE`` SMC) to get the 4 return values of the victim client.
|
| H A D | security-advisory-tfv-11.rst | 35 The vulnerability exists when the SDEI client passes an interrupt ID which 66 SDEI client is a valid PPI or SPI, otherwise return an error code indicating
|
| H A D | security-advisory-tfv-3.rst | 26 translation tables in the MMU. The xlat\_tables client specifies its required 36 the client specified ``MT_EXECUTE`` or ``MT_EXECUTE_NEVER``.
|
| /rk3399_ARM-atf/fdts/ |
| H A D | corstone700.dtsi | 149 client { 150 compatible = "arm,client";
|
| /rk3399_ARM-atf/docs/resources/diagrams/plantuml/ |
| H A D | sdei_general.puml | 10 participant "SDEI client" as EL2
|
| H A D | sdei_explicit_dispatch.puml | 10 participant "SDEI client" as EL2
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | security.rst | 68 | | Normal World SMC client to another |
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | trusted-board-boot-build.rst | 35 By default, this will use the Chain of Trust described in the TBBR-client
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_el3_spm.rst | 110 - Non-secure endpoint (referred NS-Endpoint later): normal world client at
|
| H A D | threat_model.rst | 945 context handles and the identification of the client's target locality 946 (location of the client).
|
| /rk3399_ARM-atf/docs/ |
| H A D | porting-guide.rst | 2799 the client for both event registration and *Complete and Resume* |SDEI| calls. 2800 The function ensures that the address is valid in the client translation regime. 2802 The second argument is the exception level that the client is executing in. It 2808 translates the entry point address within the client translation regime and 2822 masked. The client therefore is expected to call ``PE_UNMASK`` to unmask 3258 normal world PSCI client. 3267 propagated back to the normal world PSCI client.
|
| H A D | change-log.md | 189 …- migrate RSU client to SiPSVC V3 ([b85b49e](https://review.trustedfirmware.org/plugins/gitiles/TF… 926 …- remove client-side implementation of PM_ABORT_SUSPEND ([86d9b35](https://review.trustedfirmware.… 939 …- remove client-side code of PM_ABORT_SUSPEND ([eeef4ac](https://review.trustedfirmware.org/plugin… 2568 …- pass the flags from client interface ([537a25e](https://review.trustedfirmware.org/plugins/gitil… 4007 …- add client API for DICE Protection Environment ([b03fe8c](https://review.trustedfirmware.org/plu… 5798 …- disable wakeup interrupt during client wakeup ([e663f09](https://review.trustedfirmware.org/plug… 5799 …- enable wake interrupt during client suspend ([39fffe5](https://review.trustedfirmware.org/plugin… 10741 - xilinx: versal: Add set wakeup source, client wakeup, query data, request 11469 can leak information from one Normal World SMC client to another) 11819 - Determine client EL from NS context's SCR_EL3 [all …]
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | rse.rst | 156 encoding follows the PSA client protocol described in the
|
| /rk3399_ARM-atf/ |
| H A D | poetry.lock | 1055 dev = ["bump2version", "sphinxcontrib-httpdomain", "transifex-client", "wheel"]
|