Searched refs:allow (Results 1 – 25 of 27) sorted by relevance
12
/tf-a-ffa_el3_spmc/plat/mediatek/mt8195/drivers/spm/ |
A D | mt_spm.c | 45 .allow = spm_allow_rc_bus26m, 53 .allow = spm_allow_rc_syspll, 61 .allow = spm_allow_rc_dram, 69 .allow = spm_allow_rc_cpu_buck_ldo,
|
/tf-a-ffa_el3_spmc/plat/mediatek/mt8192/drivers/spm/ |
A D | mt_spm.c | 50 .allow = spm_allow_rc_bus26m, 58 .allow = spm_allow_rc_syspll, 66 .allow = spm_allow_rc_dram, 74 .allow = spm_allow_rc_cpu_buck_ldo,
|
/tf-a-ffa_el3_spmc/plat/mediatek/common/lpm/ |
A D | mt_lp_rm.h | 27 unsigned int (*allow)(int stateid); member
|
/tf-a-ffa_el3_spmc/docs/security_advisories/ |
A D | security-advisory-tfv-2.rst | 6 | | allow normal world to panic secure world | 31 by saving and restoring the appropriate debug registers), this may allow a
|
A D | security-advisory-tfv-4.rst | 88 these unsanitized values and allow the following memory copy operation, that 89 would wrap around. This may allow an attacker to copy unexpected data into
|
A D | security-advisory-tfv-7.rst | 77 ``SMCCC_ARCH_WORKAROUND_2`` in the Arm architectural range to allow callers at
|
A D | security-advisory-tfv-1.rst | 53 authentication, but the vulnerabilities may allow an attacker to copy
|
/tf-a-ffa_el3_spmc/docs/ |
A D | glossary.rst | 169 bit can be set by software to allow or prevent the hardware from
|
A D | change-log.rst | 249 - Added mechanism to allow platform specific image UUID 377 and allow it to be enabled independently 861 - Added a provision to allow clients to retrieve the service UUID 1422 vs. PL011 configuration, and allow using PL011 UART for RPi3/RPi4 2686 set of standard registers to configure RAS node policy and allow RAS 2896 - Support shared Mbed TLS heap between BL1 and BL2 that allow a 3034 - Added support for the Scalable Vector Extension to allow Normal world 3460 - Enhanced the CPU operations framework to allow power handlers to be 3660 - Enhanced topology description support to allow multi-cluster topology 4397 allow experimental use. [all …]
|
/tf-a-ffa_el3_spmc/docs/process/ |
A D | security.rst | 51 | |TFV-2| | Enabled secure self-hosted invasive debug interface can allow |
|
A D | security-hardening.rst | 72 would allow it to carry out side-channel timing attacks against the Secure
|
A D | coding-guidelines.rst | 80 which wrap ``tf_log`` and which allow the logging call to be compiled-out
|
/tf-a-ffa_el3_spmc/lib/compiler-rt/ |
A D | LICENSE.TXT | 7 to use it under either license. As a contributor, you agree to allow your code
|
/tf-a-ffa_el3_spmc/docs/getting_started/ |
A D | initial-build.rst | 40 contains the string 'clang'. This is to allow both clang and clang-X.Y
|
A D | porting-guide.rst | 651 allow entry into the OS. This function must not return. 1130 a lower address than the stack bases. Failure to do so would allow an 1527 configuration of the TrustZone controller to allow non-secure masters access 1722 configuration of the TrustZone controller to allow non-secure masters access 1764 specific address by BL2. BL31 exports a set of APIs that allow runtime 1853 - Configure the priority mask register to allow interrupts of all priorities 1879 The purpose of this function is allow the platform to perform any BL31 runtime 3024 to allow access to the image data.
|
/tf-a-ffa_el3_spmc/docs/threat_model/ |
A D | threat_model.rst | 55 | ``DF3`` | | Debug and trace IP on a platform can allow access | 534 | | could allow an attacker to execute arbitrary code, | 542 | | security issue since it could allow an attacker | 678 | | (MMU) may allow a normal world software to | 726 | | Unit (PMU) counters can allow an attacker to |
|
/tf-a-ffa_el3_spmc/docs/components/ |
A D | xlat-tables-lib-v2-design.rst | 194 does not allow dynamically allocating an arbitrary amount of memory at an 215 The ``MAP_REGION()`` and ``MAP_REGION_FLAT()`` macros do not allow specifying a 362 on the page size, levels 0 and 1 of translation may only allow table 364 level does not allow block descriptors, a table descriptor will have to be used
|
A D | secure-partition-manager-mm.rst | 44 firmware more difficult and does not allow isolation of unrelated services from 617 port and should allow the Secure Partition to run its initialisation code. 635 initialisation is complete, the SPM does not allow changes to the memory
|
A D | sdei.rst | 198 will only allow SDEI calls to be made from:
|
/tf-a-ffa_el3_spmc/docs/plat/arm/arm_fpga/ |
A D | index.rst | 30 - ``SUPPORT_UNKNOWN_MPID`` : Boolean option to allow unknown MPIDR registers.
|
/tf-a-ffa_el3_spmc/ |
A D | PROTOTYPE_README | 3 purposes only and to serve as proof of concept. It is designed to allow
|
/tf-a-ffa_el3_spmc/docs/design/ |
A D | psci-pd-tree.rst | 173 allow use of a simpler logic to convert an MPIDR to a core index.
|
A D | firmware-design.rst | 385 - Configure any required platform storage to allow loading further bootloader 388 - Perform platform security setup to allow access to controlled components. 924 single array and defines symbols that allow the framework to locate and traverse 1397 The BL entrypoint code first invokes the ``plat_reset_handler()`` to allow 1530 allow faster loading from the FIP to the main memory. 2006 The Arm development platforms' policy is to only allow loading of a known set of 2007 images. The platform policy can be modified to allow additional images.
|
A D | auth-framework.rst | 306 should allow the Cryptography Library (CL) to support multiple hash 353 verified. Each image has a set of properties which allow the AM to verify it.
|
A D | interrupt-framework-design.rst | 220 #. Providing an interface to allow registration of a handler and 927 level. This will allow the non-secure interrupt to be handled in the non-secure
|
Completed in 58 milliseconds
12