Home
last modified time | relevance | path

Searched refs:disable (Results 1 – 25 of 50) sorted by relevance

12

/trusted-firmware-a/fdts/
A Dstm32mp15-pinctrl.dtsi24 bias-disable;
38 bias-disable;
47 bias-disable;
59 bias-disable;
77 bias-disable;
98 bias-disable;
104 bias-disable;
151 bias-disable;
157 bias-disable;
181 bias-disable;
[all …]
A Dstm32mp157c-lxa-mc1.dts54 disable-wp;
67 /delete-property/ bias-disable;
71 /delete-property/ bias-disable;
A Dstm32mp157c-odyssey.dts29 disable-wp;
A Dstm32mp15xx-dkx.dtsi302 disable-wp;
A Dstm32mp157c-ed1.dts312 disable-wp;
/trusted-firmware-a/plat/socionext/uniphier/
A Duniphier_cci.c38 void (*disable)(void); member
45 .disable = NULL,
50 .disable = __uniphier_cci_disable,
55 .disable = NULL,
79 if (uniphier_cci_ops.disable) in uniphier_cci_disable()
80 uniphier_cci_ops.disable(); in uniphier_cci_disable()
/trusted-firmware-a/docs/security_advisories/
A Dsecurity-advisory-tfv-6.rst54 significantly more complex than the "MMU disable/enable" workaround. The latter
62 locally (for example by implementing "MMU disable/enable" itself), there is no
75 disable/enable" and "BPIALL at AArch32 Secure-EL1" workarounds described above.
93 | ``PSCI_VERSION`` with "MMU disable/enable" | 930 |
95 | ``SMCCC_ARCH_WORKAROUND_1`` with "MMU disable/enable" | 386 |
104 performance and code size overhead. Platforms can choose to disable them at
A Dsecurity-advisory-tfv-2.rst34 The ``MDCR_EL3.SDD`` bit should be assigned to ``1`` to disable debug exceptions
49 ``MDCR_EL3.SPD32`` bits should be assigned to ``10`` to disable debug exceptions
A Dsecurity-advisory-tfv-7.rst55 initialization, following every PE reset. No mechanism is provided to disable
78 lower exception levels to temporarily disable the mitigation in their execution
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/security_advisories/
A Dsecurity-advisory-tfv-6.rst.txt54 significantly more complex than the "MMU disable/enable" workaround. The latter
62 locally (for example by implementing "MMU disable/enable" itself), there is no
75 disable/enable" and "BPIALL at AArch32 Secure-EL1" workarounds described above.
93 | ``PSCI_VERSION`` with "MMU disable/enable" | 930 |
95 | ``SMCCC_ARCH_WORKAROUND_1`` with "MMU disable/enable" | 386 |
104 performance and code size overhead. Platforms can choose to disable them at
A Dsecurity-advisory-tfv-2.rst.txt34 The ``MDCR_EL3.SDD`` bit should be assigned to ``1`` to disable debug exceptions
49 ``MDCR_EL3.SPD32`` bits should be assigned to ``10`` to disable debug exceptions
A Dsecurity-advisory-tfv-7.rst.txt55 initialization, following every PE reset. No mechanism is provided to disable
78 lower exception levels to temporarily disable the mitigation in their execution
/trusted-firmware-a/docs/plat/
A Dmeson-axg.rst14 - Basic SIP services (read efuse data, enable/disable JTAG).
A Dmeson-g12a.rst14 - Basic SIP services (read efuse data, enable/disable JTAG).
A Dmeson-gxbb.rst14 - Basic SIP services (read efuse data, enable/disable JTAG).
A Dmeson-gxl.rst14 - Basic SIP services (read efuse data, enable/disable JTAG).
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/
A Dmeson-axg.rst.txt14 - Basic SIP services (read efuse data, enable/disable JTAG).
A Dmeson-g12a.rst.txt14 - Basic SIP services (read efuse data, enable/disable JTAG).
A Dmeson-gxbb.rst.txt14 - Basic SIP services (read efuse data, enable/disable JTAG).
A Dmeson-gxl.rst.txt14 - Basic SIP services (read efuse data, enable/disable JTAG).
/trusted-firmware-a/services/std_svc/sdei/
A Dsdei_intr_mgmt.c356 bool disable = false; in handle_masked_trigger() local
368 disable = true; in handle_masked_trigger()
373 if (disable) { in handle_masked_trigger()
/trusted-firmware-a/docs/build/latex/
A Dsphinxlatexindbibtoc.sty39 % disable \@chappos in Appendix in pTeX
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/
A Dplatform-interrupt-controller-API.rst.txt101 This API should disable the interrupt ID specified by the first parameter,
105 writes to GIC *Clear Enable Register* to disable the interrupt, and inserts
/trusted-firmware-a/docs/components/
A Dplatform-interrupt-controller-API.rst101 This API should disable the interrupt ID specified by the first parameter,
105 writes to GIC *Clear Enable Register* to disable the interrupt, and inserts
/trusted-firmware-a/docs/process/
A Dsecurity-hardening.rst103 - The only other way is to disable the ``PMCR_EL0.E`` bit upon entering

Completed in 14 milliseconds

12