| /rk3399_ARM-atf/plat/brcm/board/stingray/include/ |
| H A D | paxb.h | 63 void paxb_rc_cfg_write(unsigned int core_idx, unsigned int where, 65 unsigned int paxb_rc_cfg_read(unsigned int core_idx, unsigned int where);
|
| /rk3399_ARM-atf/plat/brcm/board/stingray/src/ |
| H A D | paxc.c | 99 static void paxc_rc_cfg_write(uint32_t where, uint32_t val) in paxc_rc_cfg_write() argument 102 where & PAXC_CFG_IND_ADDR_MASK); in paxc_rc_cfg_write() 106 static uint32_t paxc_rc_cfg_read(uint32_t where) in paxc_rc_cfg_read() argument 109 where & PAXC_CFG_IND_ADDR_MASK); in paxc_rc_cfg_read()
|
| H A D | paxb.c | 225 #define EP_CONFIG_VAL(bus_no, slot, fn, where) \ argument 229 ((where) & CFG_ADDR_REG_NUM_MASK) | \ 519 void paxb_rc_cfg_write(unsigned int core_idx, unsigned int where, in paxb_rc_cfg_write() argument 523 (where & PAXB_CFG_IND_ADDR_MASK) | in paxb_rc_cfg_write() 528 unsigned int paxb_rc_cfg_read(unsigned int core_idx, unsigned int where) in paxb_rc_cfg_read() argument 533 (where & PAXB_CFG_IND_ADDR_MASK) | in paxb_rc_cfg_read()
|
| /rk3399_ARM-atf/lib/debugfs/ |
| H A D | debugfs_smc.c | 41 char where[MAX_PATH_LEN]; member 124 parms.mount.where, in debugfs_smc_handler()
|
| H A D | dev.c | 791 int mount(const char *srv, const char *where, const char *spec) in mount() argument 806 ret = add_mount_point(mount_point_chan, where); in mount()
|
| /rk3399_ARM-atf/docs/components/spd/ |
| H A D | optee-dispatcher.rst | 16 way. ChromeOS uses a boot flow where it verifies the signature of the firmware 23 ensures the platform is 'closed' and running signed code through the point where
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-12.rst | 17 | Affected | environments where a modified, untrusted guest OS may | 79 and ensure that HPA-related security mitigations are enabled where applicable.
|
| H A D | security-advisory-tfv-7.rst | 49 for platforms that are unaffected or where the risk is deemed low enough. 81 context, where the risk is deemed low enough. This approach enables mitigation
|
| H A D | security-advisory-tfv-11.rst | 26 This security advisory describes a vulnerability in the SDEI services, where a
|
| /rk3399_ARM-atf/tools/nxp/create_pbl/ |
| H A D | README | 4 where, 26 -d <Address> - Destination address where BL2
|
| /rk3399_ARM-atf/include/lib/ |
| H A D | debugfs.h | 54 int bind(const char *path, const char *where);
|
| /rk3399_ARM-atf/docs/perf/ |
| H A D | performance-monitoring-unit.rst | 20 - 31 programmable event counters: ``PMEVCNTR<n>``, where ``n`` is ``0`` to 134 - If set to ``1`` it disables the cycle counter ``PMCCNTR`` where event 138 therefore will be able to count where the programmable counters are
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | imx8ulp.rst | 15 The design enables clean separation between two processing domains, where each has 19 is intended for applications where efficiency and simple system integration is important.
|
| H A D | rockchip.rst | 55 Both upstream U-Boot and Coreboot projects contain instructions on where
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | faq.rst | 48 time. In simple cases where all potential regressions have already been tested, 73 interface at http://ci.trustedfirmware.org, where details of the tests failures,
|
| H A D | coding-style.rst | 28 cases where there is a conflict between the American English and British English 73 except in the case where a term is being indented to a boundary that cannot be 117 **slightly** where the readability of the code would otherwise be significantly 136 Braces follow the **Kernighan and Ritchie (K&R)** style, where the opening brace 393 following system header files like in the example below, where the 418 location of the included header and reducing ambiguity in cases where generic
|
| H A D | code-review-guidelines.rst | 58 - Review other people's patches where possible. The more active reviewers there 131 - It complies with the relevant standards or technical documentation (where 148 - Documentation is provided/updated (where applicable). 217 layer. There are cases where a driver has to stay into the platform layer but
|
| /rk3399_ARM-atf/docs/components/fconf/ |
| H A D | tb_fw_bindings.rst | 15 - Should be the string ``"<plat>,io-fip-handle"``, where ``<plat>`` is the name of the 116 - Should be the string ``"<plat>,sp"``, where ``<plat>`` is the name of the
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | initial-build.rst | 98 where ``<platform>`` is the name of the chosen platform and ``<build-type>`` 108 ... where ``<D>`` is ``0`` or ``1``, as specified when building.
|
| H A D | image-terminology.rst | 17 to (for example ``AP_``, ``SCP_``, ...). In situations where there is no 79 Note that this abbreviation should only be used in systems where there is a 80 single or primary image executing at Secure-EL1. In systems where there are 100 In systems where 3rd level images are provided by different vendors, the
|
| /rk3399_ARM-atf/include/export/ |
| H A D | README | 25 (e.g. long, uintptr_t, pointer types) where possible. (Some existing export
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | ven-el3-debugfs.rst | 18 char where[MAX_PATH_LEN]; 75 filesystem location pointed to by path stored in `where`, using driver pointed
|
| H A D | numa-per-cpu.rst | 11 Modern system designs increasingly adopt multi-node architectures, where the 23 limits scalability in systems where each node has limited local memory. 41 crash reporting. This violates NUMA design principles, where data locality is
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_rse_interface.rst | 8 those platforms where a Runtime Security Engine (RSE) is included in the SoC
|
| /rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/ |
| H A D | input_bl2_ch2 | 37 # Specify the target where image will be loaded. (Default is NOR_16B) - [Optional]
|