/arm-trusted-firmware-2.8.0/plat/mediatek/mt8195/drivers/spm/ |
A D | mt_spm.c | 45 .allow = spm_allow_rc_bus26m, 53 .allow = spm_allow_rc_syspll, 61 .allow = spm_allow_rc_dram, 69 .allow = spm_allow_rc_cpu_buck_ldo,
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8192/drivers/spm/ |
A D | mt_spm.c | 50 .allow = spm_allow_rc_bus26m, 58 .allow = spm_allow_rc_syspll, 66 .allow = spm_allow_rc_dram, 74 .allow = spm_allow_rc_cpu_buck_ldo,
|
/arm-trusted-firmware-2.8.0/plat/mediatek/mt8186/drivers/spm/ |
A D | mt_spm.c | 53 .allow = spm_allow_rc_bus26m, 61 .allow = spm_allow_rc_syspll, 69 .allow = spm_allow_rc_dram, 78 .allow = spm_allow_rc_cpu_buck_ldo,
|
/arm-trusted-firmware-2.8.0/docs/components/fconf/ |
A D | mpmm-bindings.rst | 5 DTB bindings allow the platform to communicate per-core support for |MPMM| via 17 The ``cpu`` node has been augmented to allow the platform to indicate support
|
/arm-trusted-firmware-2.8.0/plat/mediatek/common/lpm/ |
A D | mt_lp_rm.h | 27 unsigned int (*allow)(int stateid); member
|
/arm-trusted-firmware-2.8.0/docs/security_advisories/ |
A D | security-advisory-tfv-2.rst | 6 | | allow normal world to panic secure world | 31 by saving and restoring the appropriate debug registers), this may allow a
|
A D | security-advisory-tfv-4.rst | 88 these unsanitized values and allow the following memory copy operation, that 89 would wrap around. This may allow an attacker to copy unexpected data into
|
A D | security-advisory-tfv-7.rst | 77 ``SMCCC_ARCH_WORKAROUND_2`` in the Arm architectural range to allow callers at
|
A D | security-advisory-tfv-1.rst | 53 authentication, but the vulnerabilities may allow an attacker to copy
|
/arm-trusted-firmware-2.8.0/docs/threat_model/ |
A D | threat_model_fvp_r.rst | 81 checking when accessing resources could allow an attacker to execute 85 - ID 11: Misconfiguration of the Memory Protection Unit (MPU) may allow
|
A D | threat_model.rst | 71 | DF3 | | Debug and trace IP on a platform can allow access | 626 | | could allow an attacker to execute arbitrary code, | 780 | | (MMU) may allow a normal world software to | 834 | | Unit (PMU) counters can allow an attacker to |
|
/arm-trusted-firmware-2.8.0/docs/process/ |
A D | security.rst | 51 | |TFV-2| | Enabled secure self-hosted invasive debug interface can allow |
|
A D | security-hardening.rst | 72 would allow it to carry out side-channel timing attacks against the Secure
|
/arm-trusted-firmware-2.8.0/docs/design_documents/ |
A D | context_mgmt_rework.rst | 36 EL3 firmware to allow management of their respective worlds. Allowing the 76 EL2. This method is inflexible and it does not allow to dynamically detect 182 Having this framework in place will allow Root world to make use of lower EL
|
A D | drtm_poc.rst | 10 measurements allow attesting to what software is running on the system and
|
/arm-trusted-firmware-2.8.0/docs/ |
A D | glossary.rst | 192 bit can be set by software to allow or prevent the hardware from
|
A D | change-log.md | 3297 - Added mechanism to allow platform specific image UUID 3403 allow it to be enabled independently 3796 - Added a provision to allow clients to retrieve the service UUID 4207 PL011 configuration, and allow using PL011 UART for RPi3/RPi4 4354 specified with GICD_BASE, and allow getting trusty memsize from 5243 allow a post-processing tool to choose the right binary to interpret the 5485 - Added support for the Scalable Vector Extension to allow Normal world 6056 - Enhanced topology description support to allow multi-cluster topology 6577 - Placed all assembler functions in their own section to allow more unused 6682 allow experimental use. [all …]
|
/arm-trusted-firmware-2.8.0/lib/compiler-rt/ |
A D | LICENSE.TXT | 7 to use it under either license. As a contributor, you agree to allow your code
|
/arm-trusted-firmware-2.8.0/docs/getting_started/ |
A D | initial-build.rst | 41 contains the string 'clang'. This is to allow both clang and clang-X.Y
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/arm_fpga/ |
A D | index.rst | 30 - ``SUPPORT_UNKNOWN_MPID`` : Boolean option to allow unknown MPIDR registers.
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | xlat-tables-lib-v2-design.rst | 210 does not allow dynamically allocating an arbitrary amount of memory at an 231 The ``MAP_REGION()`` and ``MAP_REGION_FLAT()`` macros do not allow specifying a 379 on the page size, levels 0 and 1 of translation may only allow table 381 level does not allow block descriptors, a table descriptor will have to be used
|
A D | granule-protection-tables-design.rst | 146 a default state, that is, initializing all of the L0 descriptors to allow all
|
A D | secure-partition-manager-mm.rst | 44 firmware more difficult and does not allow isolation of unrelated services from 617 port and should allow the Secure Partition to run its initialisation code. 635 initialisation is complete, the SPM does not allow changes to the memory
|
/arm-trusted-firmware-2.8.0/docs/plat/ |
A D | allwinner.rst | 43 some build options that allow to fine-tune the firmware, or to disable support
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | psci-pd-tree.rst | 173 allow use of a simpler logic to convert an MPIDR to a core index.
|