/trusted-firmware-a-3.7.0/ |
D | dco.txt | 15 By making a contribution to this project, I certify that: 17 (a) The contribution was created in whole or in part by me and I 23 license and I have the right under that license to submit that 25 by me, under the same open source license (unless I am 30 person who certified (a), (b) or (c) and I have not modified 33 (d) I understand and agree that this project and the contribution 35 personal information I submit with it, including my sign-off) is
|
/trusted-firmware-a-3.7.0/plat/xilinx/common/ |
D | ipi.c | 37 #define IPI_REG_BASE(I) (ipi_table[(I)].ipi_reg_base) argument 40 #define IPI_BIT_MASK(I) (ipi_table[(I)].ipi_bit_mask) argument
|
/trusted-firmware-a-3.7.0/plat/xilinx/common/include/ |
D | ipi.h | 31 #define IPI_IS_SECURE(I) ((ipi_table[(I)].secure_only & \ argument
|
/trusted-firmware-a-3.7.0/docs/resources/diagrams/plantuml/ |
D | fip-secure-partitions.puml | 109 <i>signature</I> 121 <i>signature</I>
|
/trusted-firmware-a-3.7.0/fdts/ |
D | stm32mp157c-dhcom-pdk2.dts | 7 * DHCM-STM32MP157C-C065-R102-F0819-SPI-E2-CAN2-SDR104-RTC-WBT-T-DSI-I-01D2
|
D | stm32mp15-pinctrl.dtsi | 402 <STM32_PINMUX('I', 10, AF8)>; /* USART3_CTS_NSS */
|
/trusted-firmware-a-3.7.0/docs/plat/marvell/armada/ |
D | uart-booting.rst | 38 > WtpDownload_linux -P UART -C <port#> -E -B TIM_ATF.bin -I wtmi_h.bin -I boot-image_h.bin
|
/trusted-firmware-a-3.7.0/docs/plat/ |
D | intel-agilex.rst | 57 aarch64-linux-gnu-objcopy -I binary -O ihex --change-addresses 0xffe00000 bl2.bin bl2.hex
|
D | intel-stratix10.rst | 57 aarch64-linux-gnu-objcopy -I binary -O ihex --change-addresses 0xffe00000 bl2.bin bl2.hex
|
D | rz-g2.rst | 47 ARM CA57 (ARMv8) 1.5 GHz dual core, with NEON/VFPv4, L1$ I/D 48K/32K, L2$ 1MB 48 ARM CA53 (ARMv8) 1.2 GHz quad core, with NEON/VFPv4, L1$ I/D 32K/32K, L2$ 512K
|
D | rcar-gen3.rst | 43 ARM CA57 (ARMv8) 1.5 GHz quad core, with NEON/VFPv4, L1$ I/D 45 ARM CA53 (ARMv8) 1.2 GHz quad core, with NEON/VFPv4, L1$ I/D 32K/32K,
|
D | rpi3.rst | 127 | I/O | 139 different mappings than the Arm cores in which the I/O addresses don't overlap 265 | I/O |
|
/trusted-firmware-a-3.7.0/docs/process/ |
D | faq.rst | 4 How do I update my changes?
|
D | code-review-guidelines.rst | 114 - Bugs ("I think you need a logical \|\| rather than a bitwise \|.")
|
/trusted-firmware-a-3.7.0/docs/components/ |
D | sdei.rst | 253 - SDEI events must be unmasked on the PE. I.e. the client must have called 265 - A dispatch for the same event must not be outstanding. I.e. it hasn't already 284 I.e. the caller must make sure that the requested dispatch has sufficient
|
D | firmware-update.rst | 61 - Set these image specification in the corresponding I/O policies of the 65 - Use these I/O policies to read the images from this address into the memory
|
D | secure-partition-manager.rst | 595 state of the range that it relates to. I.e. non-secure memory shall be 1347 interrupt is not masked i.e., PSTATE.I = 0 1404 interrupt is not masked i.e., PSTATE.I = 0 1497 Direct Memory Access (DMA) requests from system I/O devices. 1503 - Protection: An I/O device can be prohibited from read, write access to a 1510 several I/O devices along with Interconnect and Memory system. 1525 - Traffic (memory transactions) from each upstream I/O peripheral device,
|
D | exception-handling.rst | 467 - *Fast* SMCs are atomic from the caller's point of view. I.e., they return 474 Yielding SMC. I.e., the caller might observe a Yielding SMC returning when
|
D | ras.rst | 335 documentation. I.e., for interrupts, the priority management is implicit; but
|
D | secure-partition-manager-mm.rst | 439 - ``I=1`` 452 - ``D,A,I,F=1``
|
/trusted-firmware-a-3.7.0/docs/design/ |
D | interrupt-framework-design.rst | 214 #. Interrupt exceptions (``PSTATE.I`` and ``F`` bits) are masked during execution 557 #. **CSS=0, TEL3=0**. If ``PSTATE.I=0``, non-secure interrupts will be 567 If ``PSTATE.I=1`` then the non-secure interrupt will pend until execution 571 be visible to the SP. The ``PSTATE.I`` bit in Secure-EL1/Secure-EL0 will 626 ``PSTATE.I`` and ``PSTATE.F`` bits set. 852 exceptions are unmasked i.e. ``PSTATE.I=0``, and a non-secure interrupt will 899 it is generated during execution in the TSP with ``PSTATE.I`` = 0 when the 924 vector table when ``PSTATE.I`` and ``PSTATE.F`` bits are 0. As described earlier, 990 assuming ``P.STATE.I=0`` in the non secure state :
|
/trusted-firmware-a-3.7.0/make_helpers/ |
D | build_macros.mk | 26 uppercase_table:=a,A b,B c,C d,D e,E f,F g,G h,H i,I j,J k,K l,L m,M n,N o,O p,P q,Q r,R s,S t,T u,…
|
/trusted-firmware-a-3.7.0/docs/ |
D | porting-guide.rst | 69 I/O addresses to reduce their virtual address space. All other addresses 905 which describes the regions of normal memory, memory mapped I/O 1178 FWU metadata, and update I/O policies of active/updated images using retrieved 1180 Further I/O layer operations such as I/O open, I/O read, etc. on these 1183 In Arm platforms, this function is used to set an I/O policy of the FIP image, 1196 responsible for setting up the platform I/O policy of the requested metadata 1202 statically in I/O policy. 1207 the I/O policy of the FWU metadata image. 1208 Further I/O layer operations such as I/O open, I/O read, etc. on FWU metadata 1212 Alongside, returns device handle and image specification from the I/O policy [all …]
|
/trusted-firmware-a-3.7.0/docs/plat/nxp/ |
D | nxp-layerscape.rst | 58 in a flexible I/O package supporting fanless designs. This SoC is a
|
/trusted-firmware-a-3.7.0/docs/plat/arm/fvp/ |
D | index.rst | 279 echo $(dtc -O dts -I dtb ${KERNEL_DTB}) ${CHOSEN_NODE} | \
|