/arm-trusted-firmware-2.8.0/plat/marvell/octeontx/otx2/t91/t9130/board/ |
A D | phy-porting-layer.h | 32 .valid = 1 }, /* Comphy2 */ 43 .valid = 1 }, /* Comphy4 */ 60 .valid = 1 }, /* Comphy2 */ 72 .valid = 1}, /* Comphy4 */ 89 .valid = 1 }, /* Comphy2 */ 100 .valid = 1 }, /* Comphy4 */ 135 .valid = 0x1
|
/arm-trusted-firmware-2.8.0/plat/marvell/armada/a8k/a80x0/board/ |
A D | phy-porting-layer.h | 28 .valid = 0x1 }, /* Comphy2 */ 37 .valid = 0x1 }, /* Comphy4 */ 52 .valid = 0x1 }, /* Comphy2 */ 61 .valid = 0x1 }, /* Comphy4 */ 96 .valid = 0x1 121 .valid = 0x1 152 .valid = 0x1 177 .valid = 0x1
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8195/drivers/spm/constraints/ |
A D | mt_spm_rc_dram.c | 77 .valid = (MT_SPM_RC_VALID_SW | 98 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_dram() 116 ((status.valid & in spm_update_rc_dram() 140 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_dram() 176 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_dram()
|
A D | mt_spm_rc_syspll.c | 75 .valid = (MT_SPM_RC_VALID_SW | 96 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_syspll() 115 ((status.valid & in spm_update_rc_syspll() 139 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_syspll() 175 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_syspll()
|
A D | mt_spm_rc_bus26m.c | 90 .valid = (MT_SPM_RC_VALID_SW | 158 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_bus26m() 177 ((status.valid & in spm_update_rc_bus26m()
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8186/drivers/spm/constraints/ |
A D | mt_spm_rc_dram.c | 68 .valid = (MT_SPM_RC_VALID_SW | 89 return ((status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid)); in spm_is_valid_rc_dram() 106 ((status.valid & in spm_update_rc_dram() 131 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_dram() 164 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_dram()
|
A D | mt_spm_rc_syspll.c | 73 .valid = (MT_SPM_RC_VALID_SW | 95 return ((status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid)); in spm_is_valid_rc_syspll() 113 ((status.valid & in spm_update_rc_syspll() 138 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_syspll() 172 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_syspll()
|
A D | mt_spm_rc_bus26m.c | 84 .valid = (MT_SPM_RC_VALID_SW | MT_SPM_RC_VALID_COND_LATCH), 149 return ((status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid)); in spm_is_valid_rc_bus26m() 167 ((status.valid & in spm_update_rc_bus26m()
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8192/drivers/spm/constraints/ |
A D | mt_spm_rc_dram.c | 68 .valid = (MT_SPM_RC_VALID_SW | 89 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_dram() 107 ((status.valid & in spm_update_rc_dram() 131 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_dram() 166 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_dram()
|
A D | mt_spm_rc_syspll.c | 67 .valid = (MT_SPM_RC_VALID_SW | 88 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_syspll() 107 ((status.valid & in spm_update_rc_syspll() 131 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_syspll() 167 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_syspll()
|
A D | mt_spm_rc_bus26m.c | 80 .valid = (MT_SPM_RC_VALID_SW | 148 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_bus26m() 167 ((status.valid & in spm_update_rc_bus26m()
|
/arm-trusted-firmware-2.8.0/plat/marvell/armada/a8k/a70x0_mochabin/board/ |
A D | phy-porting-layer.h | 30 .valid = 1 }, /* Comphy4 */ 57 .valid = 0x1 72 .valid = 0x1
|
/arm-trusted-firmware-2.8.0/drivers/marvell/comphy/ |
A D | phy-default-porting-layer.h | 23 .g1_rx_selmupf = 0x2, .g1_rx_selmupi = 0x2, .valid = 1 49 .valid = 0x1
|
A D | phy-comphy-cp110.h | 27 _Bool valid; member 81 _Bool valid; member
|
/arm-trusted-firmware-2.8.0/plat/st/common/ |
A D | stm32mp_trusted_boot.c | 35 bool valid = false; in copy_hash_from_otp() local 69 if (!stm32mp_is_closed_device() && !valid) { in copy_hash_from_otp() 71 valid = true; in copy_hash_from_otp() 76 if (!stm32mp_is_closed_device() && !valid) { in copy_hash_from_otp()
|
/arm-trusted-firmware-2.8.0/services/std_svc/trng/ |
A D | trng_entropy_pool.c | 48 bool valid = plat_get_entropy(&entropy[ENTROPY_FREE_INDEX]); in trng_fill_entropy() local 50 if (valid) { in trng_fill_entropy()
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8195/drivers/spm/ |
A D | mt_spm_constraint.h | 50 uint16_t valid; member
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8192/drivers/spm/ |
A D | mt_spm_constraint.h | 50 uint16_t valid; member
|
/arm-trusted-firmware-2.8.0/drivers/measured_boot/event_log/ |
A D | event_print.c | 32 bool valid = true; in id_event_print() local 59 valid = false; in id_event_print() 67 assert(valid); in id_event_print()
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8186/drivers/spm/ |
A D | mt_spm_constraint.h | 50 uint16_t valid; member
|
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/ |
A D | porting.rst | 48 feature is used for boot loader recovery by booting from a valid flash-image 70 Before resetting the board make sure there is a valid image on the next flash 73 -tftp [valid address] flash-image.bin 74 -sf update [valid address] 0x2000000 [size]
|
/arm-trusted-firmware-2.8.0/plat/brcm/board/stingray/src/ |
A D | iommu.c | 258 uint32_t valid; member 312 if (smr->valid) in arm_smmu_smr_cfg() 453 smmu->smr[idx].valid = 1; in arm_smmu_create_identity_map()
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | interrupt-framework-design.rst | 84 which ones are valid or invalid. EL3 interrupts are currently supported only 99 secure state. This is a valid routing model as secure software is in 103 state. This is a valid routing model as secure software in EL3 can 112 non-secure state. This is a valid routing model as secure software in EL3 121 non-secure software through EL3. This is a valid routing model as secure 126 state. This is a valid routing model as secure software in EL3 can save 133 non-secure state. This is a valid routing model as a non-secure interrupt 137 non-secure state. This is an invalid routing model as there is no valid 147 Secure-EL1/Secure-EL0. This is a valid routing model as secure software 157 Secure-EL1/Secure-EL0. This is a valid routing model as secure software [all …]
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/ |
A D | arm-build-options.rst | 146 valid value greater than 1, the platform code performs required configuration 153 valid values is platform specific.
|
/arm-trusted-firmware-2.8.0/docs/getting_started/ |
A D | rt-svc-writers-guide.rst | 62 Each individual entity can allocate the valid identifiers within the entity 195 #. Determining that ``smc_fid`` is a valid and supported SMC Function ID, 202 #. Determining if the requested function is valid for the calling security
|