Searched full:mechanisms (Results 1 – 25 of 36) sorted by relevance
12
24 bool "Use Intel ADSP power gating mechanisms"29 Include Intel ADSP power domain control mechanisms
22 Stack protection mechanisms require hardware support that can restrict access57 MPUs may have a region priority mechanisms that use the highest priority region62 than the requested size. Region priority mechanisms may result in
133 through the following mechanisms:
57 widely accepted principles for protection mechanisms are defined to61 protection mechanisms cannot be kept secret on any system in72 process needs to be authenticated first. Mechanisms to store access92 - **Least common mechanism** specifies that mechanisms common to more108 underlying platform. In case such mechanisms are not provided by the156 - open design (security mechanisms should not depend on attacker169 - least common mechanism (the design should minimize the mechanisms
146 protection mechanisms are provided to protect against stack overruns.210 - **Stack protection:** Stack guards would provide mechanisms for282 accepted principles for protection mechanisms are defined to prevent286 protection mechanisms cannot be kept secret on any system in297 process needs to be authenticated first. Mechanisms to store318 - **Least common mechanism** specifies that mechanisms common to more334 underlying platform. In case such mechanisms are not provided by509 - Mechanisms to allow for **in-the-field** **updates** of devices using
37 mechanisms.
20 a variety of mechanisms, like UART and CMUX DLCI channels, in a
17 This sample tests various services and communication mechanisms across the
109 * mechanisms. in write_dword()143 * both mechanisms. in write_dword()246 * mechanisms. in erase_page()280 * both mechanisms. in erase_page()
14 * wait loop and the system timer are based on different mechanisms and may not
12 mechanisms.
60 the zephyr,concat-buf-size one, as both these buffering mechanisms
165 - Analogy with existing mechanisms: Git submodules with zephyr as the180 - Analogy with existing mechanisms: Git submodules with the application as268 - Analogy with existing mechanisms: Google repo-based source distribution
100 to change features or introduce different signing mechanisms. By default with
74 IPC mechanisms universally use local IRQ locking as the base layer for all
15 * synchronization mechanisms beyond reliable ordering of memory
7 referred to as just BC1.2. BC1.2 defines limits and detection mechanisms for USB
163 This option signifies the Cortex-M0 has some mechanisms that can map335 with no hardware vector table relocation mechanisms (e.g. VTOR).
2 mechanisms (ARM Only)
25 protection mechanisms is strongly discouraged (applications can
45 There are two mechanisms provided for enumerating all elements in an
37 * The SCHEDOP interface provides mechanisms for a guest to interact
184 /* Do it with both enumeration mechanisms */ in check_tree()
31 mechanisms for integrating, simulating, and building various designs
29 mechanisms