Home
last modified time | relevance | path

Searched refs:valid (Results 1 – 25 of 60) sorted by relevance

123

/trusted-firmware-a/plat/marvell/octeontx/otx2/t91/t9130/board/
A Dphy-porting-layer.h32 .valid = 1 }, /* Comphy2 */
43 .valid = 1 }, /* Comphy4 */
60 .valid = 1 }, /* Comphy2 */
72 .valid = 1}, /* Comphy4 */
89 .valid = 1 }, /* Comphy2 */
100 .valid = 1 }, /* Comphy4 */
135 .valid = 0x1
/trusted-firmware-a/plat/marvell/armada/a8k/a80x0/board/
A Dphy-porting-layer.h28 .valid = 0x1 }, /* Comphy2 */
37 .valid = 0x1 }, /* Comphy4 */
52 .valid = 0x1 }, /* Comphy2 */
61 .valid = 0x1 }, /* Comphy4 */
96 .valid = 0x1
121 .valid = 0x1
152 .valid = 0x1
177 .valid = 0x1
/trusted-firmware-a/plat/mediatek/mt8195/drivers/spm/constraints/
A Dmt_spm_rc_dram.c77 .valid = (MT_SPM_RC_VALID_SW |
98 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_dram()
116 ((status.valid & in spm_update_rc_dram()
140 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_dram()
176 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_dram()
A Dmt_spm_rc_syspll.c75 .valid = (MT_SPM_RC_VALID_SW |
96 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_syspll()
115 ((status.valid & in spm_update_rc_syspll()
139 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_syspll()
175 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_syspll()
A Dmt_spm_rc_bus26m.c90 .valid = (MT_SPM_RC_VALID_SW |
158 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_bus26m()
177 ((status.valid & in spm_update_rc_bus26m()
/trusted-firmware-a/plat/mediatek/mt8192/drivers/spm/constraints/
A Dmt_spm_rc_dram.c68 .valid = (MT_SPM_RC_VALID_SW |
89 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_dram()
107 ((status.valid & in spm_update_rc_dram()
131 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_dram()
166 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_dram()
A Dmt_spm_rc_syspll.c67 .valid = (MT_SPM_RC_VALID_SW |
88 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_syspll()
107 ((status.valid & in spm_update_rc_syspll()
131 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_run_rc_syspll()
167 if (IS_MT_SPM_RC_BBLPM_MODE(status.valid)) { in spm_reset_rc_syspll()
A Dmt_spm_rc_bus26m.c80 .valid = (MT_SPM_RC_VALID_SW |
148 return (status.cond_block == 0U) && IS_MT_RM_RC_READY(status.valid); in spm_is_valid_rc_bus26m()
167 ((status.valid & in spm_update_rc_bus26m()
/trusted-firmware-a/plat/marvell/armada/a8k/a70x0_mochabin/board/
A Dphy-porting-layer.h30 .valid = 1 }, /* Comphy4 */
57 .valid = 0x1
72 .valid = 0x1
/trusted-firmware-a/drivers/marvell/comphy/
A Dphy-default-porting-layer.h23 .g1_rx_selmupf = 0x2, .g1_rx_selmupi = 0x2, .valid = 1
49 .valid = 0x1
A Dphy-comphy-cp110.h27 _Bool valid; member
81 _Bool valid; member
/trusted-firmware-a/services/std_svc/trng/
A Dtrng_entropy_pool.c48 bool valid = plat_get_entropy(&entropy[ENTROPY_FREE_INDEX]); in trng_fill_entropy() local
50 if (valid) { in trng_fill_entropy()
/trusted-firmware-a/drivers/measured_boot/event_log/
A Devent_print.c32 bool valid = true; in id_event_print() local
59 valid = false; in id_event_print()
67 assert(valid); in id_event_print()
/trusted-firmware-a/plat/mediatek/mt8195/drivers/spm/
A Dmt_spm_constraint.h50 uint16_t valid; member
/trusted-firmware-a/plat/mediatek/mt8192/drivers/spm/
A Dmt_spm_constraint.h50 uint16_t valid; member
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/marvell/armada/
A Dporting.rst.txt48 feature is used for boot loader recovery by booting from a valid flash-image
70 Before resetting the board make sure there is a valid image on the next flash
73 -tftp [valid address] flash-image.bin
74 -sf update [valid address] 0x2000000 [size]
/trusted-firmware-a/docs/plat/marvell/armada/
A Dporting.rst48 feature is used for boot loader recovery by booting from a valid flash-image
70 Before resetting the board make sure there is a valid image on the next flash
73 -tftp [valid address] flash-image.bin
74 -sf update [valid address] 0x2000000 [size]
/trusted-firmware-a/plat/brcm/board/stingray/src/
A Diommu.c258 uint32_t valid; member
312 if (smr->valid) in arm_smmu_smr_cfg()
453 smmu->smr[idx].valid = 1; in arm_smmu_create_identity_map()
/trusted-firmware-a/docs/build/TF-A_2.5/_static/
A Dsearchtools.js463 var valid = true;
479 valid = false;
485 if (valid) {
/trusted-firmware-a/docs/plat/nxp/
A Dnxp-layerscape.rst242 -- Next step is valid for platform where FIP-DDR is needed.
268 -- Next step is valid for platform that needs FIP-DDR.
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/nxp/
A Dnxp-layerscape.rst.txt242 -- Next step is valid for platform where FIP-DDR is needed.
268 -- Next step is valid for platform that needs FIP-DDR.
/trusted-firmware-a/docs/design/
A Dinterrupt-framework-design.rst84 which ones are valid or invalid. EL3 interrupts are currently supported only
99 secure state. This is a valid routing model as secure software is in
103 state. This is a valid routing model as secure software in EL3 can
112 non-secure state. This is a valid routing model as secure software in EL3
121 non-secure software through EL3. This is a valid routing model as secure
126 state. This is a valid routing model as secure software in EL3 can save
133 non-secure state. This is a valid routing model as a non-secure interrupt
137 non-secure state. This is an invalid routing model as there is no valid
147 Secure-EL1/Secure-EL0. This is a valid routing model as secure software
157 Secure-EL1/Secure-EL0. This is a valid routing model as secure software
[all …]
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/design/
A Dinterrupt-framework-design.rst.txt84 which ones are valid or invalid. EL3 interrupts are currently supported only
99 secure state. This is a valid routing model as secure software is in
103 state. This is a valid routing model as secure software in EL3 can
112 non-secure state. This is a valid routing model as secure software in EL3
121 non-secure software through EL3. This is a valid routing model as secure
126 state. This is a valid routing model as secure software in EL3 can save
133 non-secure state. This is a valid routing model as a non-secure interrupt
137 non-secure state. This is an invalid routing model as there is no valid
147 Secure-EL1/Secure-EL0. This is a valid routing model as secure software
157 Secure-EL1/Secure-EL0. This is a valid routing model as secure software
[all …]
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/getting_started/
A Drt-svc-writers-guide.rst.txt62 Each individual entity can allocate the valid identifiers within the entity
195 #. Determining that ``smc_fid`` is a valid and supported SMC Function ID,
202 #. Determining if the requested function is valid for the calling security
/trusted-firmware-a/docs/getting_started/
A Drt-svc-writers-guide.rst62 Each individual entity can allocate the valid identifiers within the entity
195 #. Determining that ``smc_fid`` is a valid and supported SMC Function ID,
202 #. Determining if the requested function is valid for the calling security

Completed in 29 milliseconds

123