/trusted-firmware-a/plat/mediatek/mt8183/drivers/spm/ |
A D | spm_pmic_wrap.c | 50 } _[NR_PMIC_WRAP_CMD]; member 61 ._[CMD_2] = {BUCK_VPROC12_CON0, 0x3,}, 62 ._[CMD_3] = {BUCK_VPROC12_CON0, 0x1,}, 63 ._[CMD_4] = {BUCK_VPROC11_CON0, 0x3,}, 64 ._[CMD_5] = {BUCK_VPROC11_CON0, 0x1,}, 65 ._[CMD_6] = {TOP_SPI_CON0, 0x1,}, 66 ._[CMD_7] = {TOP_SPI_CON0, 0x0,}, 67 ._[CMD_8] = {BUCK_VPROC12_CON0, 0x0,}, 68 ._[CMD_9] = {BUCK_VPROC12_CON0, 0x1,}, 134 data = pw.set[phase]._[idx].cmd_wdata; in mt_spm_pmic_wrap_set_phase() [all …]
|
/trusted-firmware-a/plat/mediatek/mt8195/drivers/spm/ |
A D | mt_spm_pmic_wrap.c | 47 } _[NR_PMIC_WRAP_CMD]; member 60 ._[CMD_4] = {TOP_SPI_CON0, 0x1,}, 61 ._[CMD_5] = {TOP_SPI_CON0, 0x0,}, 62 ._[CMD_6] = {BUCK_TOP_CON1, 0x0,}, 63 ._[CMD_7] = {BUCK_TOP_CON1, 0xf,}, 64 ._[CMD_8] = {TOP_CON, 0x3,}, 65 ._[CMD_9] = {TOP_CON, 0x0,}, 66 ._[CMD_10] = {TOP_DIG_WPK, 0x63,}, 68 ._[CMD_12] = {TOP_DIG_WPK, 0x0,}, 69 ._[CMD_13] = {TOP_CON_LOCK, 0x0,}, [all …]
|
/trusted-firmware-a/plat/mediatek/mt8192/drivers/spm/ |
A D | mt_spm_pmic_wrap.c | 47 } _[NR_PMIC_WRAP_CMD]; member 60 ._[CMD_4] = {TOP_SPI_CON0, 0x1,}, 61 ._[CMD_5] = {TOP_SPI_CON0, 0x0,}, 62 ._[CMD_6] = {BUCK_TOP_CON1, 0x0,}, 63 ._[CMD_7] = {BUCK_TOP_CON1, 0xf,}, 64 ._[CMD_8] = {TOP_CON, 0x3,}, 65 ._[CMD_9] = {TOP_CON, 0x0,}, 66 ._[CMD_10] = {TOP_DIG_WPK, 0x63,}, 68 ._[CMD_12] = {TOP_DIG_WPK, 0x0,}, 69 ._[CMD_13] = {TOP_CON_LOCK, 0x0,}, [all …]
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/about/ |
A D | maintainers.rst.txt | 22 :|G|: `danh-arm`_ 32 :|G|: `mardyk01`_ 34 :|G|: `odeprez`_ 42 :|G|: `vwadekar`_ 71 :|G|: `CJKay`_ 95 :|G|: `odeprez`_ 101 :|G|: `J-Alves`_ 221 :|G|: `CJKay`_ 327 :|G|: `MrVan`_ 515 :|G|: `niej`_ [all …]
|
A D | contact.rst.txt | 22 - `TF-A development`_ 23 - `TF-A-Tests development`_ 25 You can see a `summary of all the lists`_ on the TrustedFirmware.org website. 32 topic within the community. More details can be found `here`_. 39 Bug reports may be filed on the `issue tracker`_ on the TrustedFirmware.org 49 .. _`issue tracker`: https://developer.trustedfirmware.org 50 .. _`TF-A development`: https://lists.trustedfirmware.org/pipermail/tf-a/ 51 .. _`TF-A-Tests development`: https://lists.trustedfirmware.org/pipermail/tf-a-tests/ 52 .. _`summary of all the lists`: https://lists.trustedfirmware.org
|
/trusted-firmware-a/docs/about/ |
A D | maintainers.rst | 22 :|G|: `danh-arm`_ 32 :|G|: `mardyk01`_ 34 :|G|: `odeprez`_ 42 :|G|: `vwadekar`_ 71 :|G|: `CJKay`_ 95 :|G|: `odeprez`_ 101 :|G|: `J-Alves`_ 221 :|G|: `CJKay`_ 327 :|G|: `MrVan`_ 515 :|G|: `niej`_ [all …]
|
A D | contact.rst | 22 - `TF-A development`_ 23 - `TF-A-Tests development`_ 25 You can see a `summary of all the lists`_ on the TrustedFirmware.org website. 32 topic within the community. More details can be found `here`_. 39 Bug reports may be filed on the `issue tracker`_ on the TrustedFirmware.org 49 .. _`issue tracker`: https://developer.trustedfirmware.org 50 .. _`TF-A development`: https://lists.trustedfirmware.org/pipermail/tf-a/ 51 .. _`TF-A-Tests development`: https://lists.trustedfirmware.org/pipermail/tf-a-tests/ 52 .. _`summary of all the lists`: https://lists.trustedfirmware.org
|
/trusted-firmware-a/ |
A D | readme.rst | 5 for `Arm A-Profile architectures`_ (Armv8-A and Armv7-A), including an Exception 6 Level 3 (EL3) `Secure Monitor`_. It provides a suitable starting point for 12 - `Power State Coordination Interface (PSCI)`_ 13 - `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_ 14 - `SMC Calling Convention`_ 15 - `System Control and Management Interface (SCMI)`_ 16 - `Software Delegated Exception Interface (SDEI)`_ 31 To find out more about Trusted Firmware-A, please `view the full documentation`_ 32 that is available through `trustedfirmware.org`_.
|
/trusted-firmware-a/docs/security_advisories/ |
A D | security-advisory-tfv-6.rst | 8 | CVE ID | `CVE-2017-5753`_ / `CVE-2017-5715`_ / `CVE-2017-5754`_ | 21 | Fix Version | `Pull Request #1214`_, `Pull Request #1228`_, | 22 | | `Pull Request #1240`_ and `Pull Request #1405`_ | 31 Update`_. 33 Variant 1 (`CVE-2017-5753`_) 39 Variant 2 (`CVE-2017-5715`_) 65 `Pull Request #1240`_ and `Pull Request #1405`_ optimise the earlier fixes by 66 implementing a specified `CVE-2017-5715`_ workaround SMC 70 mitigation specification`_. The specification and implementation also enable 120 Payload, ``SP_MIN`` is provided in `Pull Request #1228`_. [all …]
|
A D | security-advisory-tfv-7.rst | 8 | CVE ID | `CVE-2018-3639`_ | 20 | Fix Version | `Pull Request #1392`_, `Pull Request #1397`_ | 27 identified by `Google Project Zero`_. To understand the background and wider 29 Processor Security Update`_. 37 (SDEI)`_. Also, the TF-A project does not have visibility of all 44 approaches in `Pull Request #1392`_ and `Pull Request #1397`_. Both approaches 82 interfaces for mitigating cache speculation vulnerabilities`_.
|
A D | security-advisory-tfv-2.rst | 8 | CVE ID | `CVE-2017-7564`_ | 20 | Fix Version | 15 Feb 2017 `Pull Request #841`_ | 29 be seen in the implementation of the ``el3_arch_init_common`` `AArch64 macro`_ . 37 Earlier versions of TF (prior to `commit 495f3d3`_) did not assign this bit. 53 image or integrate the `AArch32 equivalent`_ of the ``el3_arch_init_common``
|
A D | security-advisory-tfv-5.rst | 8 | CVE ID | `CVE-2017-15031`_ | 20 | Fix Version | `Pull Request #1127`_ (merged on 18 October 2017) | 22 | | `Commit e290a8fcbc`_ (merged on 23 August 2019) | 24 | | `Commit c3e8b0be9b`_ (merged on 27 September 2019) |
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/security_advisories/ |
A D | security-advisory-tfv-6.rst.txt | 8 | CVE ID | `CVE-2017-5753`_ / `CVE-2017-5715`_ / `CVE-2017-5754`_ | 21 | Fix Version | `Pull Request #1214`_, `Pull Request #1228`_, | 22 | | `Pull Request #1240`_ and `Pull Request #1405`_ | 31 Update`_. 33 Variant 1 (`CVE-2017-5753`_) 39 Variant 2 (`CVE-2017-5715`_) 65 `Pull Request #1240`_ and `Pull Request #1405`_ optimise the earlier fixes by 66 implementing a specified `CVE-2017-5715`_ workaround SMC 70 mitigation specification`_. The specification and implementation also enable 120 Payload, ``SP_MIN`` is provided in `Pull Request #1228`_. [all …]
|
A D | security-advisory-tfv-7.rst.txt | 8 | CVE ID | `CVE-2018-3639`_ | 20 | Fix Version | `Pull Request #1392`_, `Pull Request #1397`_ | 27 identified by `Google Project Zero`_. To understand the background and wider 29 Processor Security Update`_. 37 (SDEI)`_. Also, the TF-A project does not have visibility of all 44 approaches in `Pull Request #1392`_ and `Pull Request #1397`_. Both approaches 82 interfaces for mitigating cache speculation vulnerabilities`_.
|
A D | security-advisory-tfv-2.rst.txt | 8 | CVE ID | `CVE-2017-7564`_ | 20 | Fix Version | 15 Feb 2017 `Pull Request #841`_ | 29 be seen in the implementation of the ``el3_arch_init_common`` `AArch64 macro`_ . 37 Earlier versions of TF (prior to `commit 495f3d3`_) did not assign this bit. 53 image or integrate the `AArch32 equivalent`_ of the ``el3_arch_init_common``
|
A D | security-advisory-tfv-5.rst.txt | 8 | CVE ID | `CVE-2017-15031`_ | 20 | Fix Version | `Pull Request #1127`_ (merged on 18 October 2017) | 22 | | `Commit e290a8fcbc`_ (merged on 23 August 2019) | 24 | | `Commit c3e8b0be9b`_ (merged on 27 September 2019) |
|
/trusted-firmware-a/docs/build/latex/ |
A D | latexmkjarc | 5 my ($source, $basename, $destination) = @_; 21 return system( "mendex -J -f -s gglo.ist -o '$_[0].gls' '$_[0].glo'" );
|
A D | latexmkrc | 8 return system( "makeindex -s gglo.ist -o '$_[0].gls' '$_[0].glo'" );
|
/trusted-firmware-a/docs/build/TF-A_2.5/ |
A D | objects.inv | 8 b����"O���"�K6��h��H�QeD��*+�_��g!⸷��è,#hȰ���b}O���,#� /⬀� ���e��0�Y_y��xhP(�S�*�#]��]… 14 TB�C1������(4*�0_<E9ٌRn#P�+u�| 19 >L\X�����:�E�Q9����z;!_��-��]��>���$"�KΆw�*�)2t��Trc|�1/y)J���0��<*�� 20 ��Y���_~ӈ��(�*(�8������M�/5�RoUi�l�{>��}U�)+�Tܴ��h�M-ex�4�x#]�"y,%�!%꘡�(�� �P����d_… 35 �)��M$]_ 37 �G�wlS���t��4d�FxBw�0�Zˋ��2J�e��]."PD�Izys ��%?�W{�����~ۀF ,��G�$�W�_��*�m�!��Nkv 38 4�u����Ҡ_�~��Gkx� a��z��5Œz����C_� 55 ����)|�C��쳙ά��jΤ����\_\����0�I�C�B�p�(�����Hl�yL�zF��_��?� 56 �3V� �ݐi35A'm�S�t~j�d�:�)�����NOXP�k�Q�j�(�&61���oY����$Iy�����fDM��X�d@�_�����aو�*… 59 &3�R6�4���r��)ռ�l�F<vH���M�< �J�ym�ZSΤ&`��4���D��?e�?)1Ρ;w���� e�_�[�����t��I� [all …]
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/morello/ |
A D | index.rst.txt | 5 The platform port present at `site <https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git>`_ 8 …ility architecture specific changes will be added `here <https://git.morello-project.org/morello>`_ 10 …s available at `info <https://developer.arm.com/architectures/cpu-architecture/a-profile/morello>`_ 22 …r.arm.com/tools-and-software/open-source-software/developer-tools/gnu-toolchain/gnu-a/downloads>`_.
|
/trusted-firmware-a/docs/plat/arm/morello/ |
A D | index.rst | 5 The platform port present at `site <https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git>`_ 8 …ility architecture specific changes will be added `here <https://git.morello-project.org/morello>`_ 10 …s available at `info <https://developer.arm.com/architectures/cpu-architecture/a-profile/morello>`_ 22 …r.arm.com/tools-and-software/open-source-software/developer-tools/gnu-toolchain/gnu-a/downloads>`_.
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/ |
A D | index.rst.txt | 24 software for `Armv7-A and Armv8-A`_, including a `Secure Monitor`_ executing 28 - The `Power State Coordination Interface (PSCI)`_ 29 - `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_ 30 - `SMC Calling Convention`_ 31 - `System Control and Management Interface (SCMI)`_ 32 - `Software Delegated Exception Interface (SDEI)`_ 33 - `PSA FW update specification`_
|
/trusted-firmware-a/docs/ |
A D | index.rst | 24 software for `Armv7-A and Armv8-A`_, including a `Secure Monitor`_ executing 28 - The `Power State Coordination Interface (PSCI)`_ 29 - `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_ 30 - `SMC Calling Convention`_ 31 - `System Control and Management Interface (SCMI)`_ 32 - `Software Delegated Exception Interface (SDEI)`_ 33 - `PSA FW update specification`_
|
/trusted-firmware-a/docs/components/spd/ |
A D | optee-dispatcher.rst | 4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1. 7 `OP-TEE build.git`_
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/spd/ |
A D | optee-dispatcher.rst.txt | 4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1. 7 `OP-TEE build.git`_
|