| /external/trusty/arm-trusted-firmware/lib/cpus/ |
| D | cpu-ops.mk | 41 # These should be enabled by the platform if the erratum workaround needs to be 44 # Flag to apply erratum 794073 workaround when disabling mmu. 47 # Flag to apply erratum 816470 workaround during power down. This erratum 51 # Flag to apply erratum 827671 workaround during reset. This erratum applies 55 # Flag to apply erratum 852421 workaround during reset. This erratum applies 59 # Flag to apply erratum 852423 workaround during reset. This erratum applies 63 # Flag to apply erratum 855472 workaround during reset. This erratum applies 67 # Flag to apply erratum 819472 workaround during reset. This erratum applies 71 # Flag to apply erratum 824069 workaround during reset. This erratum applies 75 # Flag to apply erratum 826319 workaround during reset. This erratum applies [all …]
|
| /external/trusty/arm-trusted-firmware/docs/design/ |
| D | cpu-specific-build-macros.rst | 14 - ``WORKAROUND_CVE_2017_5715``: Enables the security workaround for 16 of the PEs in the system need the workaround. Setting this flag to 0 provides 18 with the recommendation in the spec regarding workaround discovery. 21 - ``WORKAROUND_CVE_2018_3639``: Enables the security workaround for 25 regarding workaround discovery. 51 errata workaround is identified by its ``ID`` as specified in the processor's 53 errata workaround is ``ERRATA_<Processor name>_<ID>``, where the ``Processor name`` 57 write errata workaround functions. 61 errata workaround build flags in the platform specific makefile. In case 63 workaround is not applied. In the DEBUG build, this is indicated by [all …]
|
| /external/arm-trusted-firmware/docs/design/ |
| D | cpu-specific-build-macros.rst | 14 - ``WORKAROUND_CVE_2017_5715``: Enables the security workaround for 16 of the PEs in the system need the workaround. Setting this flag to 0 provides 18 with the recommendation in the spec regarding workaround discovery. 21 - ``WORKAROUND_CVE_2018_3639``: Enables the security workaround for 25 regarding workaround discovery. 47 errata workaround is identified by its ``ID`` as specified in the processor's 49 errata workaround is ``ERRATA_<Processor name>_<ID>``, where the ``Processor name`` 53 write errata workaround functions. 57 errata workaround build flags in the platform specific makefile. In case 59 workaround is not applied. In the DEBUG build, this is indicated by [all …]
|
| /external/arm-trusted-firmware/lib/cpus/ |
| D | cpu-ops.mk | 69 # These should be enabled by the platform if the erratum workaround needs to be 72 # Flag to apply erratum 794073 workaround when disabling mmu. 75 # Flag to apply erratum 816470 workaround during power down. This erratum 79 # Flag to apply erratum 827671 workaround during reset. This erratum applies 83 # Flag to apply erratum 852421 workaround during reset. This erratum applies 87 # Flag to apply erratum 852423 workaround during reset. This erratum applies 91 # Flag to apply erratum 855472 workaround during reset. This erratum applies 95 # Flag to apply erratum 819472 workaround during reset. This erratum applies 99 # Flag to apply erratum 824069 workaround during reset. This erratum applies 103 # Flag to apply erratum 826319 workaround during reset. This erratum applies [all …]
|
| /external/trusty/arm-trusted-firmware/plat/nxp/common/soc_errata/ |
| D | errata.c | 15 INFO("SoC workaround for Errata A050426 was applied\n"); in soc_errata() 19 INFO("SoC workaround for Errata A008850 Early-Phase was applied\n"); in soc_errata() 23 INFO("SoC workaround for Errata A009660 was applied\n"); in soc_errata() 27 INFO("SoC workaround for Errata A010539 was applied\n"); in soc_errata() 32 * The following DDR Erratas workaround are implemented in DDR driver, in soc_errata() 36 INFO("SoC workaround for DDR Errata A011396 was applied\n"); in soc_errata() 39 INFO("SoC workaround for DDR Errata A050450 was applied\n"); in soc_errata() 42 INFO("SoC workaround for DDR Errata A050958 was applied\n"); in soc_errata() 45 INFO("SoC workaround for DDR Errata A008511 was applied\n"); in soc_errata() 48 INFO("SoC workaround for DDR Errata A009803 was applied\n"); in soc_errata() [all …]
|
| /external/sdv/vsomeip/third_party/boost/process/include/boost/process/detail/windows/ |
| D | group_handle.hpp | 19 workaround::JOBOBJECT_EXTENDED_LIMIT_INFORMATION_ info; in break_away_enabled() 21 if (!workaround::query_information_job_object( in break_away_enabled() 23 workaround::JobObjectExtendedLimitInformation_, in break_away_enabled() 29 … return (info.BasicLimitInformation.LimitFlags & workaround::JOB_OBJECT_LIMIT_BREAKAWAY_OK_) != 0; in break_away_enabled() 34 workaround::JOBOBJECT_EXTENDED_LIMIT_INFORMATION_ info; in enable_break_away() 36 if (!workaround::query_information_job_object( in enable_break_away() 38 workaround::JobObjectExtendedLimitInformation_, in enable_break_away() 44 if ((info.BasicLimitInformation.LimitFlags & workaround::JOB_OBJECT_LIMIT_BREAKAWAY_OK_) != 0) in enable_break_away() 47 info.BasicLimitInformation.LimitFlags |= workaround::JOB_OBJECT_LIMIT_BREAKAWAY_OK_; in enable_break_away() 49 if (!workaround::set_information_job_object( in enable_break_away() [all …]
|
| D | handles.hpp | 33 auto info_pointer = reinterpret_cast<workaround::SYSTEM_HANDLE_INFORMATION_*>(buffer.data()); in get_handles() 39 nt_status = workaround::nt_system_query_information( in get_handles() 40 workaround::SystemHandleInformation_, in get_handles() 45 info_pointer = reinterpret_cast<workaround::SYSTEM_HANDLE_INFORMATION_*>(buffer.data()); in get_handles() 82 auto nt_status = workaround::nt_query_object( in is_stream_handle() 84 workaround::ObjectTypeInformation, in is_stream_handle() 91 …workaround::OBJECT_TYPE_INFORMATION_ * type_info_p = reinterpret_cast<workaround::OBJECT_TYPE_INFO… in is_stream_handle() 92 nt_status = workaround::nt_query_object( in is_stream_handle() 94 workaround::ObjectTypeInformation, in is_stream_handle()
|
| /external/arm-trusted-firmware/lib/cpus/aarch64/ |
| D | neoverse_v1.S | 25 * Errata Workaround for Neoverse V1 Errata #1774420. 32 /* Check workaround compatibility. */ 53 * Errata Workaround for Neoverse V1 Errata #1791573. 60 /* Check workaround compatibility. */ 81 * Errata Workaround for Neoverse V1 Errata #1852267. 88 /* Check workaround compatibility. */ 109 * Errata Workaround for Neoverse V1 Errata #1925756. 116 /* Check workaround compatibility. */ 137 * Errata Workaround for Neoverse V1 Erratum #1940577 192 * Errata Workaround for Neoverse V1 Errata #1966096 [all …]
|
| D | wa_cve_2017_5715_bpiall.S | 45 /* Preserve 32-bit system registers in GP registers through the workaround */ 54 * through the workaround. This is OK because at this point the 56 * register, which is unmodified by the workaround. 68 /* Switch EL3 exception vectors while the workaround is executing. */ 74 /* Land at the S-EL1 workaround stub */ 91 * This vector table is used at runtime to enter the workaround at 92 * AArch32 S-EL1 for Sync/IRQ/FIQ/SError exceptions. If the workaround 192 * This vector table is used while the workaround is executing. It 194 * workaround stubs to enter EL3 from S-EL1. It restores the previous 280 * Workaround is complete, so swap VBAR_EL3 to point [all …]
|
| /external/oboe/samples/RhythmGame/third_party/glm/detail/ |
| D | _fixes.hpp | 6 //! Workaround for compatibility with other libraries 11 //! Workaround for compatibility with other libraries 16 //! Workaround for Android 21 //! Workaround for Android 26 //! Workaround for Chrone Native Client
|
| /external/coreboot/Documentation/RFC/ |
| D | intel-gpio-cleanup.md | 4 done") introduced a workaround in coreboot for `soc/intel/cannonlake` 6 mainboard across call to FSP Silicon Init (FSP-S). This workaround was 11 fixed. Until the fix in FSP was available, this workaround was used to 25 mainboard that the workaround for GPIO reconfiguration was not 26 needed. However, at the time, we missed dropping the workaround in 27 'soc/intel/cannonlake`. Currently, this workaround is used by the 39 * The workaround can be safely dropped from `soc/intel/cannonlake` 69 by the above mainboards, the workaround implemented in CB:31250 can be 94 platforms that want to get rid of the above workaround, but also
|
| /external/coreboot/Documentation/soc/intel/fsp/ |
| D | index.md | 19 those are fixed. If possible a workaround is described here as well. 26 * Workaround: none 33 * Workaround: Don't disable this PCI device 39 * Workaround: Hide before MemoryInit 46 * Workaround: none 51 * Workaround: Flash Intel ME instead of SPS 57 * Workaround: Disable internal UART manually after calling FSP 63 * Workaround: Set "tconfig->PanelPowerEnable = 0"
|
| /external/sdv/vsomeip/third_party/boost/mpl/include/boost/mpl/aux_/preprocessed/msvc70/ |
| D | apply_wrap.hpp | 29 /// workaround for ETI bug 49 /// workaround for ETI bug 69 /// workaround for ETI bug 89 /// workaround for ETI bug 109 /// workaround for ETI bug 130 /// workaround for ETI bug
|
| D | apply.hpp | 31 /// workaround for ETI bug 55 /// workaround for ETI bug 79 /// workaround for ETI bug 103 /// workaround for ETI bug 127 /// workaround for ETI bug 152 /// workaround for ETI bug
|
| /external/grpc-grpc/doc/ |
| D | workarounds.md | 4 …mplemented on gRPC servers for record and reference when users need to enable a certain workaround. 6 ## Workaround List 10 **Workaround ID:** WORKAROUND\_ID\_CRONET\_COMPRESSION 19 **Workaround Description:** Implemented as a server channel filter in C core. The filter identifie…
|
| /external/sdv/vsomeip/third_party/boost/mpl/include/boost/mpl/aux_/preprocessed/msvc60/ |
| D | apply.hpp | 32 /// workaround for ETI bug 57 /// workaround for ETI bug 82 /// workaround for ETI bug 107 /// workaround for ETI bug 132 /// workaround for ETI bug 158 /// workaround for ETI bug
|
| D | advance_backward.hpp | 24 /// ETI workaround 42 /// ETI workaround 61 /// ETI workaround 81 /// ETI workaround 102 /// ETI workaround
|
| D | advance_forward.hpp | 24 /// ETI workaround 42 /// ETI workaround 61 /// ETI workaround 81 /// ETI workaround 102 /// ETI workaround
|
| D | apply_wrap.hpp | 44 /// workaround for ETI bug 80 /// workaround for ETI bug 116 /// workaround for ETI bug 152 /// workaround for ETI bug 194 /// workaround for ETI bug 239 /// workaround for ETI bug
|
| D | iter_fold_impl.hpp | 44 /// ETI workaround 73 /// ETI workaround 104 /// ETI workaround 137 /// ETI workaround 172 /// ETI workaround 252 /// ETI workaround
|
| /external/trusty/arm-trusted-firmware/docs/plat/ |
| D | qti-msm8916.rst | 162 INFO: BL31: cortex_a53: CPU workaround for 819472 was applied 163 INFO: BL31: cortex_a53: CPU workaround for 824069 was applied 164 INFO: BL31: cortex_a53: CPU workaround for 826319 was applied 165 INFO: BL31: cortex_a53: CPU workaround for 827319 was applied 166 INFO: BL31: cortex_a53: CPU workaround for 835769 was applied 167 INFO: BL31: cortex_a53: CPU workaround for disable_non_temporal_hint was applied 168 INFO: BL31: cortex_a53: CPU workaround for 843419 was applied 169 INFO: BL31: cortex_a53: CPU workaround for 1530924 was applied 191 INFO: BL32: cortex_a53: CPU workaround for 819472 was applied 192 INFO: BL32: cortex_a53: CPU workaround for 824069 was applied [all …]
|
| /external/arm-trusted-firmware/plat/nxp/common/soc_errata/ |
| D | errata.c | 15 INFO("SoC workaround for Errata A050426 was applied\n"); in soc_errata() 19 * The following DDR Erratas workaround are implemented in DDR driver, in soc_errata() 23 INFO("SoC workaround for DDR Errata A011396 was applied\n"); in soc_errata() 26 INFO("SoC workaround for DDR Errata A050450 was applied\n"); in soc_errata()
|
| /external/tensorflow/tensorflow/compiler/xla/g3doc/ |
| D | known_issues.md | 18 placed on a GPU. As a workaround, `int64` can be used. 30 *Workaround*: compile the outermost scope which is taking the derivative. 44 *Workaround*: all compiled while loops need to either have `maximum_iterations` 54 *Workaround*: provide a statically known bound to your arrays. 64 *Workaround*: use 83 *Workaround*: Unroll loops, e.g. by converting `tf.range` into Python `range`.
|
| /external/mesa3d/src/intel/dev/ |
| D | gen_wa_helpers.py | 94 /* These defines may be used to compile out genxml workaround implementations 222 """provide a map of workaround id -> GFX_VERx10 macro test""" 239 """provide a map of workaround id -> true/false, indicating whether the wa 275 for workaround, bug in wa_def.items(): 278 # stepping-specific workaround, not platform-wide 280 platform_bugs[platform].append(workaround) 286 for workaround, bug in wa_def.items(): 302 stepping_bugs[platform][u_step].append(workaround) 310 help="json data file with workaround definitions") 315 print(f"Error: workaround definition not found: {args.wa_file}") [all …]
|
| /external/trusty/arm-trusted-firmware/docs/security_advisories/ |
| D | security-advisory-tfv-9.rst | 42 inserting a loop workaround with implementation specific number of iterations 50 TF-A using the loop workaround(all cores that implement FEAT_CSV2 except the 97 In case local workaround is not feasible, the Rich OS can invoke the SMC 98 (``SMCCC_ARCH_WORKAROUND_3``) to apply the workaround. Refer to `SMCCC Calling 102 workaround for CPUs mentioned in the above table. For CPUs supporting 103 speculative barrier instruction, the loop workaround is optimised by using SB 107 `CVE-2022-23960`_ workaround SMC(``SMCCC_ARCH_WORKAROUND_3``) for use by normal 112 Cortex-A57, Coxtex-A72, Cortex-A73 and Cortex-A75 using the existing workaround. 115 The above workaround is enabled by default (on vulnerable CPUs only). Platforms
|