Lines Matching refs:this
36 interfaces into the secure world with attacker-controlled inputs. However, this
56 For affected CPUs, this approach enables the mitigation during EL3
63 TF-A implements this approach for the following affected CPUs:
77 For affected CPUs, this approach also enables the mitigation during EL3
78 initialization, following every PE reset. In addition, this approach implements
83 on exit from EL3. For more information on this approach, see `Firmware
88 However, even without any mitigation code in other software components, this
92 Since the expectation in this approach is that more software executes with the
93 mitigation disabled, this may result in better system performance than the
95 use-cases, this performance saving may be outweighed by the additional overhead
98 TF-A implements this approach for the following affected CPU: