| /rk3399_ARM-atf/plat/mediatek/mt8195/drivers/spm/ |
| H A D | mt_spm.c | 45 .allow = spm_allow_rc_bus26m, 53 .allow = spm_allow_rc_syspll, 61 .allow = spm_allow_rc_dram, 69 .allow = spm_allow_rc_cpu_buck_ldo,
|
| /rk3399_ARM-atf/plat/mediatek/mt8192/drivers/spm/ |
| H A D | mt_spm.c | 50 .allow = spm_allow_rc_bus26m, 58 .allow = spm_allow_rc_syspll, 66 .allow = spm_allow_rc_dram, 74 .allow = spm_allow_rc_cpu_buck_ldo,
|
| /rk3399_ARM-atf/plat/mediatek/mt8186/drivers/spm/ |
| H A D | mt_spm.c | 53 .allow = spm_allow_rc_bus26m, 61 .allow = spm_allow_rc_syspll, 69 .allow = spm_allow_rc_dram, 78 .allow = spm_allow_rc_cpu_buck_ldo,
|
| /rk3399_ARM-atf/plat/mediatek/drivers/spm/mt8188/ |
| H A D | mt_spm.c | 102 .allow = spm_allow_rc_bus26m, 111 .allow = spm_allow_rc_syspll, 120 .allow = spm_allow_rc_dram, 129 .allow = spm_allow_rc_cpu_buck_ldo,
|
| /rk3399_ARM-atf/plat/mediatek/drivers/spm/mt8189/ |
| H A D | mt_spm.c | 224 .allow = spm_allow_rc_vcore, 233 .allow = spm_allow_rc_bus26m, 241 .allow = spm_allow_rc_syspll,
|
| /rk3399_ARM-atf/plat/mediatek/drivers/spm/mt8196/ |
| H A D | mt_spm.c | 235 .allow = spm_allow_rc_vcore, 244 .allow = spm_allow_rc_bus26m, 253 .allow = spm_allow_rc_syspll,
|
| /rk3399_ARM-atf/plat/mediatek/include/lpm/ |
| H A D | mt_lp_rm.h | 48 unsigned int (*allow)(int stateid); member
|
| /rk3399_ARM-atf/plat/mediatek/include/lpm_v2/ |
| H A D | mt_lp_rm.h | 53 unsigned int (*allow)(int stateid); member
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-2.rst | 6 | | allow normal world to panic secure world | 31 by saving and restoring the appropriate debug registers), this may allow a
|
| H A D | security-advisory-tfv-4.rst | 88 these unsanitized values and allow the following memory copy operation, that 89 would wrap around. This may allow an attacker to copy unexpected data into
|
| H A D | security-advisory-tfv-13.rst | 33 An issue has been identified in some Arm-based CPUs that may allow
|
| H A D | security-advisory-tfv-7.rst | 79 ``SMCCC_ARCH_WORKAROUND_2`` in the Arm architectural range to allow callers at
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | index.rst | 4 As the TF-A codebase is highly configurable to allow tailoring it best for each
|
| H A D | threat_model_rse_interface.rst | 49 interface to NSCode can allow malicious code to interact with RSE and
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | drtm_poc.rst | 12 measurements allow attesting to what software is running on the system and
|
| H A D | measured_boot_dtpm_poc.rst | 70 to allow the build to succeed. First Clone U-boot and enter the repo. 136 - ``MEASURED_BOOT`` is enabled to allow the Measured Boot flow. 450 drivers has not started, these drivers will allow a larger number of platform
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | prerequisites.rst | 105 Required for managing Python dependencies, this will allow you to reliably 191 using Git submodules. Submodules allow external repositories to be included
|
| H A D | initial-build.rst | 41 contains the string 'clang'. This is to allow both clang and clang-X.Y
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | security.rst | 49 | |TFV-2| | Enabled secure self-hosted invasive debug interface can allow |
|
| /rk3399_ARM-atf/docs/plat/qti/ |
| H A D | rb3gen2.rst | 47 the OEM test signature to allow it to work on devices in non-secure mode. In
|
| /rk3399_ARM-atf/lib/compiler-rt/ |
| H A D | LICENSE.TXT | 7 to use it under either license. As a contributor, you agree to allow your code
|
| /rk3399_ARM-atf/docs/ |
| H A D | glossary.rst | 231 bit can be set by software to allow or prevent the hardware from
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | xlat-tables-lib-v2-design.rst | 194 does not allow dynamically allocating an arbitrary amount of memory at an 215 The ``MAP_REGION()`` and ``MAP_REGION_FLAT()`` macros do not allow specifying a 362 on the page size, levels 0 and 1 of translation may only allow table 364 level does not allow block descriptors, a table descriptor will have to be used
|
| /rk3399_ARM-atf/docs/perf/ |
| H A D | psci-performance-instr.rst | 34 choose to expose SMCs that allow retrieval of these timestamps from the
|
| /rk3399_ARM-atf/docs/plat/arm/arm_fpga/ |
| H A D | index.rst | 30 - ``SUPPORT_UNKNOWN_MPID`` : Boolean option to allow unknown MPIDR registers.
|