/trusted-firmware-a-latest/include/plat/nuvoton/npcm845x/ |
D | platform_def.h | 232 #pragma message(VAR_NAME_VALUE(ARM_AP_TZC_DRAM1_BASE)) 233 #pragma message(VAR_NAME_VALUE(BL31_BASE)) 234 #pragma message(VAR_NAME_VALUE(BL31_LIMIT)) 235 #pragma message(VAR_NAME_VALUE(PLAT_ARM_MAX_BL31_SIZE)) 236 #pragma message(VAR_NAME_VALUE(BL32_BASE)) 237 #pragma message(VAR_NAME_VALUE(BL32_LIMIT)) 238 #pragma message(VAR_NAME_VALUE(PLAT_ARM_MAX_BL32_SIZE) 239 #pragma message(VAR_NAME_VALUE(SPMD_SPM_AT_SEL2_KKO))
|
/trusted-firmware-a-latest/plat/arm/board/corstone700/common/drivers/mhu/ |
D | corstone700_mhu.c | 64 unsigned int message) in mhu_secure_message_send() argument 91 mmio_write_32(address + CPU_INTR_S_SET, message); in mhu_secure_message_send()
|
D | corstone700_mhu.h | 33 unsigned int message);
|
/trusted-firmware-a-latest/services/std_svc/spmd/ |
D | spmd_private.h | 75 unsigned long long message);
|
D | spmd_main.c | 105 unsigned long long message) in spmd_build_spmc_message() argument 112 write_ctx_reg(gpregs, CTX_GPREG_X3, message); in spmd_build_spmc_message()
|
/trusted-firmware-a-latest/services/std_svc/spm/el3_spmc/ |
D | spmc_pm.c | 25 unsigned long long message, in spmc_build_pm_message() argument 35 write_ctx_reg(gpregs, CTX_GPREG_X3, message); in spmc_build_pm_message()
|
/trusted-firmware-a-latest/docs/threat_model/ |
D | threat_model_el3_spm.rst | 52 | | message request to SPMC targeting LSP as destination. | 169 | implemented? | The SPMC enforces checks in the direct message | 172 | | originated message directed to the SWd cannot use a| 328 | | A malicious endpoint may replay a message exchange | 410 | Threat | **A malicious endpoint may forge a direct message | 412 | | another endpoint through the direct message | 416 | | message by a direct message response with | 418 | | (e.g. partition message response outside of | 446 | | to be revealed through a direct message response. |
|
/trusted-firmware-a-latest/plat/mediatek/drivers/ptp3/ |
D | ptp3_common.c | 121 #pragma message "PSCI hint not enable"
|
/trusted-firmware-a-latest/docs/design_documents/ |
D | rss.rst | 20 subsystems can communicate with each other over message exchange. RSS waits 38 interface. One pair provides message sending from AP to RSS and the other pair 42 The RSS communication layer provides two ways for message exchange: 44 - ``Embedded messaging``: The full message, including header and payload, are 51 that data was read. Signalling happens via IRQ. If the message is longer than 52 the data fit to the channel registers then the message is sent over in 55 - ``Pointer-access messaging``: The message header and the payload are 68 decided at runtime based on the message size which way to transfer the message. 103 current use case only requires message exchange during the boot phase. In 109 A description of the message format can be found in the ``RSS communication
|
/trusted-firmware-a-latest/docs/process/ |
D | commit-style.rst | 10 A good commit message provides all the background information needed for 39 The following example commit message demonstrates the use of the
|
D | coding-guidelines.rst | 271 emitting a ``WARN`` message, performing any necessary error handling and 291 1. If the unrecoverable error is unexpected then emit an ``ERROR`` message and 295 then emit an ``ERROR`` message and call the platform-specific function
|
D | code-review-guidelines.rst | 230 posted via the commit message or on the mailing list.
|
/trusted-firmware-a-latest/drivers/arm/gic/common/ |
D | gic_common.c | 7 #pragma message __FILE__ " is deprecated, use gicv2.mk instead"
|
/trusted-firmware-a-latest/lib/zlib/ |
D | inffast.c | 12 # pragma message("Assembler code may have bugs -- use at your own risk")
|
/trusted-firmware-a-latest/docs/components/ |
D | secure-partition-manager.rst | 577 receive a direct message request originating from any physical core targeting 904 An incoming direct message request arriving at SPMD from NWd is forwarded to 906 message is coming from normal world in this specific code path. Thus the origin 909 An SP sending a direct message request must have bit 15 set in its origin 912 The SPMC shall reject the direct message if the claimed world in origin endpoint 1029 An attempt from an SP to send a message to a normal world VM whose RX buffer 1037 Hafnium copies a message from the sender TX buffer into receiver's RX buffer. 1045 On a successful message send, Hafnium pends an RX buffer full framework 1046 notification for the receiver, to inform it about a message in the RX buffer. 1161 A call chain represents all SPs in a sequence of invocations of a direct message [all …]
|
D | el3-spmc.rst | 298 An incoming direct message request arriving at SPMD from NWd is forwarded to 300 message is coming from normal world in this specific code path. Thus the origin 303 An SP sending a direct message request must have bit 15 set in its origin 306 The SPMC shall reject the direct message if the claimed world in origin endpoint
|
D | granule-protection-tables-design.rst | 211 error message and return a negative value. The return values of APIs should be
|
D | xlat-tables-lib-v2-design.rst | 274 unexpected error is encountered, they will print an error message on the UART.
|
/trusted-firmware-a-latest/docs/getting_started/ |
D | tools-build.rst | 68 Invoking the tool with ``help`` will print a help message with all available
|
D | prerequisites.rst | 99 CI for feedback on commit message conformance.
|
/trusted-firmware-a-latest/docs/about/ |
D | features.rst | 125 message.
|
/trusted-firmware-a-latest/docs/plat/marvell/armada/ |
D | porting.rst | 77 skip image request message is printed on the screen and boot rom boots from the
|
D | build.rst | 200 an error message will be printed prior trying to reboot via the usual way.
|
/trusted-firmware-a-latest/plat/intel/soc/common/sip/ |
D | socfpga_sip_fcs.c | 444 psgsigma_teardown_msg message = { in intel_fcs_sigma_teardown() local 451 (uint32_t *) &message, sizeof(message) / MBOX_WORD_BYTE, in intel_fcs_sigma_teardown()
|
/trusted-firmware-a-latest/docs/ |
D | change-log.md | 518 …- el3 direct message API ([66bdfd6](https://review.trustedfirmware.org/plugins/gitiles/TF-A/truste… 861 …- remove console error message ([f9820f2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/… 936 …- fix LSP direct message response ([c040621](https://review.trustedfirmware.org/plugins/gitiles/TF… 1206 …placed with the `<IMAGE>_LINKER_SCRIPT_SOURCES` variable. See the commit message for more informat… 1210 …GE_LINKERFILE>` build system variables have been renamed. See the commit message for more informat… 1419 …- fix typo in boot authentication message name ([81f525e](https://review.trustedfirmware.org/plugi… 2273 …- add RSS-AP message size macro ([445130b](https://review.trustedfirmware.org/plugins/gitiles/TF-A… 3011 …- clear the message buffer ([e3a6fb8](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trus… 3016 …- rename AP-RSS message size macro ([70247dd](https://review.trustedfirmware.org/plugins/gitiles/T… 3969 …- fix the incorrect log message ([ea04b3f](https://review.trustedfirmware.org/plugins/gitiles/TF-A… [all …]
|