/arm-trusted-firmware-2.8.0/drivers/marvell/ |
A D | cache_llc.c | 116 uint32_t tc, way, ways_to_allocate; in llc_sram_enable() local 135 for (way = 0; way < ways_to_allocate; way++) { in llc_sram_enable() 140 LLC_BLK_ALOC_WAY_ID(way)); in llc_sram_enable()
|
/arm-trusted-firmware-2.8.0/include/drivers/marvell/ |
A D | cache_llc.h | 40 #define LLC_BLK_ALOC_WAY_ID(way) ((way) & 0x1f) argument
|
/arm-trusted-firmware-2.8.0/docs/plat/ |
A D | nvidia-tegra.rst | 34 implements a 7-way superscalar microarchitecture (up to 7 concurrent 35 micro-ops can be executed per clock), and includes a 128KB 4-way L1 36 instruction cache, a 64KB 4-way L1 data cache, and a 2MB 16-way L2
|
A D | rpi4.rst | 31 arm64 Linux kernels are known to work this way. 66 To accommodate this existing way of configuring and setting up the board,
|
A D | rpi3.rst | 44 anything else we need is in ``armstub8.bin``. This way we can forget about the 49 that we need to make the secondary cores work in the way the kernel expects, as 85 place the uncompressed AArch32 kernel image. This way, both AArch32 and 366 filesystem are 32-bit binaries, but it's a quick way to get it working, and it
|
A D | imx8m.rst | 53 When setting NEED_BL2=1 on imx8mm. We support an alternative way of
|
A D | socionext-uniphier.rst | 24 the BL2 validity in a different way; BL2 is GZIP-compressed and appended to
|
A D | qti-msm8916.rst | 80 boot enabled! Make sure that you have a way to recover the board in case
|
/arm-trusted-firmware-2.8.0/docs/design_documents/ |
A D | cmake_framework.rst | 63 macros, etc. in a structured way. It contains two utilities for this purpose: 83 This provides a more granular way than the current Makefile system where most of 91 way it is not tied to one specific compiler.
|
A D | context_mgmt_rework.rst | 49 Due to the way TF-A evolved, from EL3 interacting with an S-EL1 payload to 170 an optimal way. The `el3_sysreg` does not need to be saved
|
/arm-trusted-firmware-2.8.0/tools/nxp/create_pbl/ |
A D | README | 13 Usage in standalone way:
|
/arm-trusted-firmware-2.8.0/docs/process/ |
A D | code-review-guidelines.rst | 73 directory to have the freedom to change it in any way. This way, your changes 196 make it more flexible and fit slightly different use cases. That way, these
|
A D | security-hardening.rst | 103 - The only other way is to disable the ``PMCR_EL0.E`` bit upon entering
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | psci-pd-tree.rst | 29 node at each level. The natural way to perform this traversal is to 34 a way which facilitates such a traversal. 41 Therefore, there is a need to implement the tree in a way which facilitates this
|
A D | reset-design.rst | 119 the FVP models in this way. 134 same way.
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | xlat-tables-lib-v2-design.rst | 62 An ``mmap_region`` is an abstract, concise way to represent a memory region to 246 of the MMU, the two are still related in some way. Static regions can only be 273 the new region will overlap another one in an invalid way, or if any other 339 The mmap regions list is a conceptual way to represent the memory layout. At 345 of the ``mmap_add*()`` APIs does not affect the translation tables in any way, 386 The mmap regions are sorted in a way that simplifies the code that maps
|
A D | granule-protection-tables-design.rst | 70 whatever way is best for a given platform, either through some algorithm or hard 91 A ``pas_region_t`` structure is a way to represent a physical address space and
|
/arm-trusted-firmware-2.8.0/docs/getting_started/ |
A D | docs-build.rst | 83 dependencies to generate the documents, so in this case, one way to
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/juno/ |
A D | index.rst | 192 In the same way, the address ns_bl2u_base_address is the value of 215 The Trusted Firmware must be compiled in a similar way as for FVP explained
|
/arm-trusted-firmware-2.8.0/docs/security_advisories/ |
A D | security-advisory-tfv-8.rst | 68 SMC synchronous exception. It has behaved this way since the first version.
|
A D | security-advisory-tfv-4.rst | 111 vulnerability; for example a way to get the system to change its behaviour based
|
A D | security-advisory-tfv-1.rst | 55 is required to leverage these vulnerabilities; for example a way to get the
|
/arm-trusted-firmware-2.8.0/docs/plat/nxp/ |
A D | nxp-ls-fuse-prov.rst | 197 This method is used for quick way to provision fuses.
|
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/ |
A D | porting.rst | 135 The easiest way to prepare the PHY porting layer for custom board is to copy
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/fvp/ |
A D | index.rst | 166 In the same way, the address ns_bl2u_base_address is the value of 175 Therefore, one must modify the way the model is normally invoked in order to 178 One way to do that is to create an 8-byte file containing all zero bytes using
|