| /rk3399_ARM-atf/plat/mediatek/mt8195/drivers/spm/ |
| H A D | mt_spm.c | 44 .update = spm_update_rc_bus26m, 52 .update = spm_update_rc_syspll, 60 .update = spm_update_rc_dram, 68 .update = NULL, 83 .update = mt_spm_cond_update,
|
| H A D | mt_spm_cond.c | 223 if (((*rc)->update) == NULL) { in mt_spm_cond_update() 227 res = (*rc)->update(stateid, PLAT_RC_UPDATE_CONDITION, in mt_spm_cond_update()
|
| /rk3399_ARM-atf/plat/mediatek/mt8192/drivers/spm/ |
| H A D | mt_spm.c | 49 .update = spm_update_rc_bus26m, 57 .update = spm_update_rc_syspll, 65 .update = spm_update_rc_dram, 73 .update = NULL, 88 .update = mt_spm_cond_update,
|
| H A D | mt_spm_cond.c | 207 if (((*rc)->update) == NULL) { in mt_spm_cond_update() 211 res = (*rc)->update(stateid, PLAT_RC_UPDATE_CONDITION, in mt_spm_cond_update()
|
| /rk3399_ARM-atf/plat/mediatek/mt8186/drivers/spm/ |
| H A D | mt_spm.c | 52 .update = spm_update_rc_bus26m, 60 .update = spm_update_rc_syspll, 68 .update = spm_update_rc_dram, 77 .update = NULL, 92 .update = mt_spm_cond_update,
|
| H A D | mt_spm_cond.c | 201 if (((*rc)->update) == NULL) { in mt_spm_cond_update() 205 res = (*rc)->update(stateid, PLAT_RC_UPDATE_CONDITION, in mt_spm_cond_update()
|
| /rk3399_ARM-atf/plat/mediatek/drivers/spm/mt8188/ |
| H A D | mt_spm.c | 101 .update = spm_update_rc_bus26m, 110 .update = spm_update_rc_syspll, 119 .update = spm_update_rc_dram, 128 .update = spm_update_rc_cpu_buck_ldo, 144 .update = mt_spm_cond_update,
|
| H A D | mt_spm_cond.c | 253 if ((*_con)->update == NULL) { in mt_spm_cond_update() 256 res = (*_con)->update(stateid, PLAT_RC_UPDATE_CONDITION, in mt_spm_cond_update()
|
| /rk3399_ARM-atf/plat/mediatek/common/lpm/ |
| H A D | mt_lp_rm.c | 110 if (rm->update != NULL) { in mt_lp_rm_find_constraint() 111 res = rm->update(rm->consts, plat_mt_rm.count, stateid, priv); in mt_lp_rm_find_constraint() 153 if ((*rc)->update != NULL) { in mt_lp_rm_do_update() 154 res = (*rc)->update(stateid, type, p); in mt_lp_rm_do_update()
|
| /rk3399_ARM-atf/plat/mediatek/include/lpm/ |
| H A D | mt_lp_rm.h | 44 int (*update)(int stateid, int type, const void *p); member 52 int (*update)(struct mt_resource_constraint **con, unsigned int num, member
|
| /rk3399_ARM-atf/plat/mediatek/common/lpm_v2/ |
| H A D | mt_lp_rm.c | 103 if (rm->update != NULL) { in mt_lp_rm_find_constraint() 104 res = rm->update(rm->consts, plat_mt_rm.count, stateid, priv); in mt_lp_rm_find_constraint() 143 if ((*rc)->update != NULL) { in mt_lp_rm_do_update() 144 res = (*rc)->update(stateid, type, p); in mt_lp_rm_do_update()
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_fw_update_and_recovery.rst | 8 the feature PSA firmware update or TBBR firmware update or both enabled. 9 To understand the design of the firmware update refer 41 | 01 | Yes | | Attacker can use arbitrary images to update the | 44 | 02 | Yes | | Attacker tries to update the system with the | 69 intention of preventing the anti-rollback update.
|
| /rk3399_ARM-atf/plat/mediatek/include/lpm_v2/ |
| H A D | mt_lp_rm.h | 49 int (*update)(int stateid, int type, const void *p); member 57 int (*update)(struct mt_resource_constraint **con, unsigned int num, member
|
| /rk3399_ARM-atf/plat/mediatek/drivers/spm/mt8189/ |
| H A D | mt_spm.c | 223 .update = spm_update_rc_vcore, 232 .update = spm_update_rc_bus26m, 240 .update = spm_update_rc_syspll, 312 .update = NULL,
|
| H A D | mt_spm_cond.c | 130 for (i = 0, _con = con; *_con && (*_con)->update && (i < num); in mt_spm_cond_update() 132 res = (*_con)->update(stateid, PLAT_RC_UPDATE_CONDITION, in mt_spm_cond_update()
|
| /rk3399_ARM-atf/plat/mediatek/drivers/spm/mt8196/ |
| H A D | mt_spm.c | 234 .update = spm_update_rc_vcore, 243 .update = spm_update_rc_bus26m, 252 .update = spm_update_rc_syspll, 320 .update = NULL,
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | index.rst | 14 firmware-update
|
| H A D | firmware-update.rst | 17 failed update, which can be fulfilled with TBBR FWU implementation. 26 The `PSA FW update specification`_ defines the concepts of ``Firmware Update 33 The `PSA FW update specification`_ provides ABIs meant for a Normal-world 47 There are active and update banks in the non-volatile storage identified 49 An active bank stores running firmware, whereas an update bank contains 52 Once Firmwares are updated in the update bank of the non-volatile 53 storage, then ``Update Agent`` marks the update bank as the active bank, 70 ``Update Agent`` marks this update as accepted after further sanitisation 74 it's been confirmed that given update is accepted. 100 This technique enables authenticated firmware to update firmware images from [all …]
|
| H A D | ven-el3-service.rst | 65 Some ground rules when one should update top level version. 68 discovery changes will lead to major version update. 71 starts at 0x20 next one will start at 0x30, this will need a update to minor version.
|
| /rk3399_ARM-atf/plat/arm/board/tc/fdts/ |
| H A D | tc_spmc_common_sp_manifest.dtsi | 55 debug_name = "firmware-update";
|
| H A D | tc_tb_fw_config.dts | 44 firmware-update {
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | image-terminology.rst | 148 firmware update operation, and cannot be modified. Its primary purpose is to 149 load subsequent firmware update images from an external interface and communicate 152 During firmware update, there are (potentially) multiple transitions between the 161 complete the firmware update operation. It is potentially a subset of ``AP_BL2`` 168 complete the firmware update operation. It is potentially a subset of
|
| H A D | prerequisites.rst | 145 .. _Node Version Manager: https://github.com/nvm-sh/nvm#install--update-script 210 commit of ``libtl``), you can update your local copy by running: 215 git submodule update --init --recursive 221 git submodule update --remote
|
| H A D | tools-build.rst | 86 Example 3: update the entries of an existing Firmware package: 91 ./tools/fiptool/fiptool update \ 109 Note that if the destination FIP file exists, the create, update and
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | synquacer.rst | 92 Use SYNQUACERFIRMWAREUPDATECAPSULEFMPPKCS7.Cap for UEFI capsule update and 105 the capsule update method:.
|