/trusted-firmware-a-latest/plat/hisilicon/hikey960/drivers/ipc/ |
D | hisi_ipc.c | 80 hisi_ipc_clear_ack(enum src_id source, enum lpm3_mbox_id mbox) in hisi_ipc_clear_ack() argument 90 mmio_write_32(IPC_MBX_ICLR_REG(mbox), source); in hisi_ipc_clear_ack() 94 hisi_ipc_send_cmd_with_ack(enum src_id source, enum lpm3_mbox_id mbox, in hisi_ipc_send_cmd_with_ack() argument 106 mmio_write_32(IPC_MBX_SOURCE_REG(mbox), source); in hisi_ipc_send_cmd_with_ack() 108 if (regval == source) in hisi_ipc_send_cmd_with_ack() 118 mask = (~((int)source | SRC_LPM3) & 0x3F); in hisi_ipc_send_cmd_with_ack() 125 mmio_write_32(IPC_MBX_SEND_REG(mbox), source); in hisi_ipc_send_cmd_with_ack() 127 hisi_ipc_clear_ack(source, mbox); in hisi_ipc_send_cmd_with_ack() 130 mmio_write_32(IPC_MBX_SOURCE_REG(mbox), source); in hisi_ipc_send_cmd_with_ack() 138 enum src_id source = SRC_IDLE; in hisi_ipc_pm_on_off() local [all …]
|
/trusted-firmware-a-latest/docs/ |
D | license.rst | 12 Redistribution and use in source and binary forms, with or without modification, 15 - Redistributions of source code must retain the above copyright notice, this 54 license text is included in those source files. 56 - The libc source code is derived from `FreeBSD`_ and `SCC`_. FreeBSD uses 60 - The libfdt source code is disjunctively dual licensed 65 - The LLVM compiler-rt source code is disjunctively dual licensed 71 - The zlib source code is licensed under the Zlib license, which is a 74 - Some STMicroelectronics platform source code is disjunctively dual licensed 79 - Some source files originating from the Linux source tree, which are
|
D | glossary.rst | 102 and optimizing open source software and tools for the Arm architecture. 131 Open-source Trusted Execution Environment
|
/trusted-firmware-a-latest/ |
D | dco.txt | 18 have the right to submit it under the open source license 22 of my knowledge, is covered under an appropriate open source 25 by me, under the same open source license (unless I am 37 this project or the open source license(s) involved.
|
/trusted-firmware-a-latest/tools/nxp/create_pbl/ |
D | README | 9 Specified boot source (QSPI or SD or NOR) to the, 24 -b <boot source id> - Boot source id string, may be one of 41 -b Boot source.
|
/trusted-firmware-a-latest/docs/process/ |
D | platform-ports-policy.rst | 39 to deprecate it to keep the projects' source tree clean and healthy. Deprecation 42 - *2-stage*: The source code can be kept in the repository for a cooling off 46 - *1-stage*: The source code can be deleted straight away. In this case, both
|
D | contributing.rst | 45 - Use the checkpatch.pl script provided with the Linux source tree. A 52 or other in-source documentation needs updating. 107 owner) reviewer. Running ``git blame`` on the module's source code can 179 - ``Coverity Scan analysis`` is one of the tests we perform on our source code 181 build configurations of various platforms in order to cover the entire source 184 - When you submit your patches for review containing new source files, please 199 source files get built and analysed by Coverity. 213 to include most of their source files. 278 unwilling to open-source. This should be used as a rare exception. 283 cannot be open-sourced and must be linked into a larger open-source platform [all …]
|
D | security.rst | 31 Afterwards, we encourage you to write-up your findings about the TF-A source 38 with the source code and in any published security advisory.
|
/trusted-firmware-a-latest/lib/zlib/ |
D | zlib.h | 678 z_streamp source); 946 z_streamp source); 1233 const Bytef *source, uLong sourceLen); 1248 const Bytef *source, uLong sourceLen, 1271 const Bytef *source, uLong sourceLen); 1289 const Bytef *source, uLong *sourceLen);
|
D | zutil.c | 145 void ZLIB_INTERNAL zmemcpy(Bytef* dest, const Bytef* source, uInt len) { in zmemcpy() argument 148 *dest++ = *source++; /* ??? to be unrolled */ in zmemcpy()
|
D | inflate.c | 1439 int ZEXPORT inflateCopy(z_streamp dest, z_streamp source) { in inflateCopy() argument 1446 if (inflateStateCheck(source) || dest == Z_NULL) in inflateCopy() 1448 state = (struct inflate_state FAR *)source->state; in inflateCopy() 1452 ZALLOC(source, 1, sizeof(struct inflate_state)); in inflateCopy() 1457 ZALLOC(source, 1U << state->wbits, sizeof(unsigned char)); in inflateCopy() 1459 ZFREE(source, copy); in inflateCopy() 1465 zmemcpy((voidpf)dest, (voidpf)source, sizeof(z_stream)); in inflateCopy()
|
D | zutil.h | 235 void ZLIB_INTERNAL zmemcpy(Bytef* dest, const Bytef* source, uInt len);
|
/trusted-firmware-a-latest/docs/design_documents/ |
D | cmake_framework.rst | 27 * It is a well-established, mature tool, widely accepted by open-source 58 processing, and the target creation, source file description are mixed and 78 targets, i.e. what is the build output, what source files are used, what 131 it. This means that all source and header files used by the target will have all 133 executable, and add some source files. Since the target has the parameters from 134 the settings group, we can use it for conditionally adding source files. E.g.
|
/trusted-firmware-a-latest/docs/resources/diagrams/plantuml/ |
D | sdei_general.puml | 12 participant "SDEI interrupt source" as SDEI
|
/trusted-firmware-a-latest/docs/components/spd/ |
D | trusty-dispatcher.rst | 9 https://source.android.com/security/trusty
|
/trusted-firmware-a-latest/docs/getting_started/ |
D | prerequisites.rst | 74 source code, as it may not be available in the default package repositories. 87 source files (``.dts`` files). DTC is available for Linux through the package 140 Release 20.01`_. Alternatively, you can build the binaries from source using 189 .. _Arm Developer website: https://developer.arm.com/tools-and-software/open-source-software/develo…
|
/trusted-firmware-a-latest/docs/plat/arm/fvp_r/ |
D | index.rst | 27 - Obtain arm `toolchain <https://developer.arm.com/tools-and-software/open-source-software/develop…
|
/trusted-firmware-a-latest/docs/plat/arm/corstone1000/ |
D | index.rst | 29 …tal target `toolchain <https://developer.arm.com/tools-and-software/open-source-software/developer…
|
/trusted-firmware-a-latest/docs/plat/arm/morello/ |
D | index.rst | 32 - Obtain arm `toolchain <https://developer.arm.com/tools-and-software/open-source-software/develop…
|
/trusted-firmware-a-latest/docs/plat/ |
D | hikey.rst | 153 …ards-hikey/tools-images-hikey960/blob/master/build-from-source/README-ATF-UEFI-build-from-source.m…
|
D | hikey960.rst | 178 …ards-hikey/tools-images-hikey960/blob/master/build-from-source/README-ATF-UEFI-build-from-source.m…
|
D | intel-agilex.rst | 34 This will be updated to use an updated UEFI using the latest EDK2 source
|
/trusted-firmware-a-latest/docs/security_advisories/ |
D | security-advisory-tfv-10.rst | 62 The vulnerability lies in the following source file: 97 All standard chains of trust provided in TF-A source tree (that is, under 145 - Taken from an untrusted source (meaning that it is read prior to
|
/trusted-firmware-a-latest/fdts/ |
D | stm32mp151.dtsi | 113 wakeup-source; 137 wakeup-source; 433 wakeup-source; 519 wakeup-source;
|
/trusted-firmware-a-latest/docs/plat/nxp/ |
D | nxp-layerscape.rst | 238 `link <https://source.codeaurora.org/external/qoriq/qoriq-components/optee_os>`__ 241 `link <https://source.codeaurora.org/external/qoriq/qoriq-components/u-boot>`__ 244 `link <https://source.codeaurora.org/external/qoriq/qoriq-components/rcw>`__ 250 `link <https:://source.codeaurora.org/external/qoriq/qoriq-components/cst>`__ 394 -- Then reset to sd/emmc to boot up ATF from sd/emmc as boot-source.
|