Home
last modified time | relevance | path

Searched refs:I (Results 1 – 25 of 28) sorted by relevance

12

/arm-trusted-firmware-2.8.0/
A Ddco.txt15 By making a contribution to this project, I certify that:
17 (a) The contribution was created in whole or in part by me and I
23 license and I have the right under that license to submit that
25 by me, under the same open source license (unless I am
30 person who certified (a), (b) or (c) and I have not modified
33 (d) I understand and agree that this project and the contribution
35 personal information I submit with it, including my sign-off) is
A Dchangelog.yaml756 - title: I/O
1030 - title: I/O
/arm-trusted-firmware-2.8.0/plat/xilinx/common/
A Dipi.c36 #define IPI_REG_BASE(I) (ipi_table[(I)].ipi_reg_base) argument
39 #define IPI_BIT_MASK(I) (ipi_table[(I)].ipi_bit_mask) argument
/arm-trusted-firmware-2.8.0/plat/xilinx/common/include/
A Dipi.h31 #define IPI_IS_SECURE(I) ((ipi_table[(I)].secure_only & \ argument
/arm-trusted-firmware-2.8.0/docs/resources/diagrams/plantuml/
A Dfip-secure-partitions.puml109 <i>signature</I>
121 <i>signature</I>
/arm-trusted-firmware-2.8.0/fdts/
A Dstm32mp157c-dhcom-pdk2.dts7 * DHCM-STM32MP157C-C065-R102-F0819-SPI-E2-CAN2-SDR104-RTC-WBT-T-DSI-I-01D2
A Dstm32mp15-pinctrl.dtsi369 <STM32_PINMUX('I', 10, AF8)>; /* USART3_CTS_NSS */
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/
A Duart-booting.rst38 > WtpDownload_linux -P UART -C <port#> -E -B TIM_ATF.bin -I wtmi_h.bin -I boot-image_h.bin
/arm-trusted-firmware-2.8.0/docs/plat/
A Dintel-agilex.rst57 aarch64-linux-gnu-objcopy -I binary -O ihex --change-addresses 0xffe00000 bl2.bin bl2.hex
A Dintel-stratix10.rst57 aarch64-linux-gnu-objcopy -I binary -O ihex --change-addresses 0xffe00000 bl2.bin bl2.hex
A Drz-g2.rst47 ARM CA57 (ARMv8) 1.5 GHz dual core, with NEON/VFPv4, L1$ I/D 48K/32K, L2$ 1MB
48 ARM CA53 (ARMv8) 1.2 GHz quad core, with NEON/VFPv4, L1$ I/D 32K/32K, L2$ 512K
A Drcar-gen3.rst43 ARM CA57 (ARMv8) 1.5 GHz quad core, with NEON/VFPv4, L1$ I/D
45 ARM CA53 (ARMv8) 1.2 GHz quad core, with NEON/VFPv4, L1$ I/D 32K/32K,
A Drpi3.rst127 | I/O |
139 different mappings than the Arm cores in which the I/O addresses don't overlap
265 | I/O |
/arm-trusted-firmware-2.8.0/docs/process/
A Dfaq.rst4 How do I update my changes?
A Dcode-review-guidelines.rst85 - Bugs ("I think you need a logical \|\| rather than a bitwise \|.")
/arm-trusted-firmware-2.8.0/docs/components/
A Dsdei.rst253 - SDEI events must be unmasked on the PE. I.e. the client must have called
265 - A dispatch for the same event must not be outstanding. I.e. it hasn't already
284 I.e. the caller must make sure that the requested dispatch has sufficient
A Dfirmware-update.rst61 - Set these image specification in the corresponding I/O policies of the
65 - Use these I/O policies to read the images from this address into the memory
A Dsecure-partition-manager.rst1258 interrupt is not masked i.e., PSTATE.I = 0
1315 interrupt is not masked i.e., PSTATE.I = 0
1389 Direct Memory Access (DMA) requests from system I/O devices.
1395 - Protection: An I/O device can be prohibited from read, write access to a
1402 several I/O devices along with Interconnect and Memory system.
1417 - Traffic (memory transactions) from each upstream I/O peripheral device,
A Dras.rst236 documentation. I.e., for interrupts, the priority management is implicit; but
A Dexception-handling.rst467 - *Fast* SMCs are atomic from the caller's point of view. I.e., they return
474 Yielding SMC. I.e., the caller might observe a Yielding SMC returning when
A Dsecure-partition-manager-mm.rst446 - ``I=1``
459 - ``D,A,I,F=1``
/arm-trusted-firmware-2.8.0/docs/design/
A Dinterrupt-framework-design.rst214 #. Interrupt exceptions (``PSTATE.I`` and ``F`` bits) are masked during execution
557 #. **CSS=0, TEL3=0**. If ``PSTATE.I=0``, non-secure interrupts will be
567 If ``PSTATE.I=1`` then the non-secure interrupt will pend until execution
571 be visible to the SP. The ``PSTATE.I`` bit in Secure-EL1/Secure-EL0 will
626 ``PSTATE.I`` and ``PSTATE.F`` bits set.
852 exceptions are unmasked i.e. ``PSTATE.I=0``, and a non-secure interrupt will
899 it is generated during execution in the TSP with ``PSTATE.I`` = 0 when the
924 vector table when ``PSTATE.I`` and ``PSTATE.F`` bits are 0. As described earlier,
990 assuming ``P.STATE.I=0`` in the non secure state :
/arm-trusted-firmware-2.8.0/make_helpers/
A Dbuild_macros.mk25 uppercase_table:=a,A b,B c,C d,D e,E f,F g,G h,H i,I j,J k,K l,L m,M n,N o,O p,P q,Q r,R s,S t,T u,…
/arm-trusted-firmware-2.8.0/docs/getting_started/
A Dporting-guide.rst55 I/O addresses to reduce their virtual address space. All other addresses
855 which describes the regions of normal memory, memory mapped I/O
1128 FWU metadata, and update I/O policies of active/updated images using retrieved
1130 Further I/O layer operations such as I/O open, I/O read, etc. on these
1133 In Arm platforms, this function is used to set an I/O policy of the FIP image,
1146 responsible for setting up the platform I/O policy of the requested metadata
1152 statically in I/O policy.
1157 the I/O policy of the FWU metadata image.
1158 Further I/O layer operations such as I/O open, I/O read, etc. on FWU metadata
1162 Alongside, returns device handle and image specification from the I/O policy
[all …]
/arm-trusted-firmware-2.8.0/docs/plat/nxp/
A Dnxp-layerscape.rst58 in a flexible I/O package supporting fanless designs. This SoC is a

Completed in 47 milliseconds

12