Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 38) sorted by relevance

12

/arm-trusted-firmware-2.8.0/plat/mediatek/mt8195/drivers/spm/
A Dmt_spm.c45 .allow = spm_allow_rc_bus26m,
53 .allow = spm_allow_rc_syspll,
61 .allow = spm_allow_rc_dram,
69 .allow = spm_allow_rc_cpu_buck_ldo,
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8192/drivers/spm/
A Dmt_spm.c50 .allow = spm_allow_rc_bus26m,
58 .allow = spm_allow_rc_syspll,
66 .allow = spm_allow_rc_dram,
74 .allow = spm_allow_rc_cpu_buck_ldo,
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8186/drivers/spm/
A Dmt_spm.c53 .allow = spm_allow_rc_bus26m,
61 .allow = spm_allow_rc_syspll,
69 .allow = spm_allow_rc_dram,
78 .allow = spm_allow_rc_cpu_buck_ldo,
/arm-trusted-firmware-2.8.0/docs/components/fconf/
A Dmpmm-bindings.rst5 DTB bindings allow the platform to communicate per-core support for |MPMM| via
17 The ``cpu`` node has been augmented to allow the platform to indicate support
/arm-trusted-firmware-2.8.0/plat/mediatek/common/lpm/
A Dmt_lp_rm.h27 unsigned int (*allow)(int stateid); member
/arm-trusted-firmware-2.8.0/docs/security_advisories/
A Dsecurity-advisory-tfv-2.rst6 | | allow normal world to panic secure world |
31 by saving and restoring the appropriate debug registers), this may allow a
A Dsecurity-advisory-tfv-4.rst88 these unsanitized values and allow the following memory copy operation, that
89 would wrap around. This may allow an attacker to copy unexpected data into
A Dsecurity-advisory-tfv-7.rst77 ``SMCCC_ARCH_WORKAROUND_2`` in the Arm architectural range to allow callers at
A Dsecurity-advisory-tfv-1.rst53 authentication, but the vulnerabilities may allow an attacker to copy
/arm-trusted-firmware-2.8.0/docs/threat_model/
A Dthreat_model_fvp_r.rst81 checking when accessing resources could allow an attacker to execute
85 - ID 11: Misconfiguration of the Memory Protection Unit (MPU) may allow
A Dthreat_model.rst71 | DF3 | | Debug and trace IP on a platform can allow access |
626 | | could allow an attacker to execute arbitrary code, |
780 | | (MMU) may allow a normal world software to |
834 | | Unit (PMU) counters can allow an attacker to |
/arm-trusted-firmware-2.8.0/docs/process/
A Dsecurity.rst51 | |TFV-2| | Enabled secure self-hosted invasive debug interface can allow |
A Dsecurity-hardening.rst72 would allow it to carry out side-channel timing attacks against the Secure
/arm-trusted-firmware-2.8.0/docs/design_documents/
A Dcontext_mgmt_rework.rst36 EL3 firmware to allow management of their respective worlds. Allowing the
76 EL2. This method is inflexible and it does not allow to dynamically detect
182 Having this framework in place will allow Root world to make use of lower EL
A Ddrtm_poc.rst10 measurements allow attesting to what software is running on the system and
/arm-trusted-firmware-2.8.0/docs/
A Dglossary.rst192 bit can be set by software to allow or prevent the hardware from
A Dchange-log.md3297 - Added mechanism to allow platform specific image UUID
3403 allow it to be enabled independently
3796 - Added a provision to allow clients to retrieve the service UUID
4207 PL011 configuration, and allow using PL011 UART for RPi3/RPi4
4354 specified with GICD_BASE, and allow getting trusty memsize from
5243 allow a post-processing tool to choose the right binary to interpret the
5485 - Added support for the Scalable Vector Extension to allow Normal world
6056 - Enhanced topology description support to allow multi-cluster topology
6577 - Placed all assembler functions in their own section to allow more unused
6682 allow experimental use.
[all …]
/arm-trusted-firmware-2.8.0/lib/compiler-rt/
A DLICENSE.TXT7 to use it under either license. As a contributor, you agree to allow your code
/arm-trusted-firmware-2.8.0/docs/getting_started/
A Dinitial-build.rst41 contains the string 'clang'. This is to allow both clang and clang-X.Y
/arm-trusted-firmware-2.8.0/docs/plat/arm/arm_fpga/
A Dindex.rst30 - ``SUPPORT_UNKNOWN_MPID`` : Boolean option to allow unknown MPIDR registers.
/arm-trusted-firmware-2.8.0/docs/components/
A Dxlat-tables-lib-v2-design.rst210 does not allow dynamically allocating an arbitrary amount of memory at an
231 The ``MAP_REGION()`` and ``MAP_REGION_FLAT()`` macros do not allow specifying a
379 on the page size, levels 0 and 1 of translation may only allow table
381 level does not allow block descriptors, a table descriptor will have to be used
A Dgranule-protection-tables-design.rst146 a default state, that is, initializing all of the L0 descriptors to allow all
A Dsecure-partition-manager-mm.rst44 firmware more difficult and does not allow isolation of unrelated services from
617 port and should allow the Secure Partition to run its initialisation code.
635 initialisation is complete, the SPM does not allow changes to the memory
/arm-trusted-firmware-2.8.0/docs/plat/
A Dallwinner.rst43 some build options that allow to fine-tune the firmware, or to disable support
/arm-trusted-firmware-2.8.0/docs/design/
A Dpsci-pd-tree.rst173 allow use of a simpler logic to convert an MPIDR to a core index.

Completed in 33 milliseconds

12