Home
last modified time | relevance | path

Searched refs:load_address (Results 1 – 15 of 15) sorted by relevance

/arm-trusted-firmware-2.8.0/plat/arm/board/fvp/fdts/
A Dfvp_spmc_manifest.dts25 load_address = <0x0 0x6000000>;
35 load_address = <0x7000000>;
42 load_address = <0x7100000>;
49 load_address = <0x7200000>;
56 load_address = <0x7600000>;
A Dfvp_spmc_optee_sp_manifest.dts25 load_address = <0x0 0x6000000>;
35 load_address = <0x6280000>;
/arm-trusted-firmware-2.8.0/plat/arm/board/tc/fdts/
A Dtc_spmc_manifest.dts18 load_address = <0x0 0xfd000000>;
28 load_address = <0xfe000000>;
35 load_address = <0xfe100000>;
42 load_address = <0xfe200000>;
49 load_address = <0xfe600000>;
A Dtc_spmc_optee_sp_manifest.dts18 load_address = <0x0 0xfd000000>;
28 load_address = <0xfd280000>;
40 load_address = <0xfee00000>;
47 load_address = <0xfec00000>;
/arm-trusted-firmware-2.8.0/docs/resources/diagrams/plantuml/
A Dfip-secure-partitions.puml15 load_address = 0xaaa
27 load_address = 0xbbb
38 spkg_1 load_address
41 spkg_2 load_address
A Dbl2-loading-sp.puml23 bl2 -> FW_CONFIG : read(load_address)
/arm-trusted-firmware-2.8.0/include/services/
A Dspm_core_manifest.h33 uint64_t load_address; member
/arm-trusted-firmware-2.8.0/plat/qemu/common/
A Dqemu_spmd_manifest.c25 manifest->load_address = BL32_BASE; in plat_spm_core_manifest_load()
/arm-trusted-firmware-2.8.0/plat/arm/board/n1sdp/fdts/
A Dn1sdp_optee_spmc_manifest.dts25 load_address = <0x0 0x08000000>;
/arm-trusted-firmware-2.8.0/plat/arm/board/corstone1000/common/fdts/
A Dcorstone1000_spmc_manifest.dts25 load_address = <0x0 0x2002000>;
/arm-trusted-firmware-2.8.0/tools/stm32image/
A Dstm32image.c38 uint32_t load_address; member
56 uint32_t load_address; member
113 __le32_to_cpu(stm32hdr->load_address)); in stm32image_print_header()
152 stm32hdr->load_address = __cpu_to_le32(loadaddr); in stm32image_set_header()
/arm-trusted-firmware-2.8.0/plat/common/
A Dplat_spmd_manifest.c69 rc = fdt_read_uint64(fdt, node, "load_address", &attr->load_address); in manifest_parse_attribute()
85 VERBOSE(" load_address: 0x%" PRIx64 "\n", attr->load_address); in manifest_parse_attribute()
/arm-trusted-firmware-2.8.0/plat/st/stm32mp1/include/
A Dboot_api.h312 uint32_t load_address; member
/arm-trusted-firmware-2.8.0/services/std_svc/spmd/
A Dspmd_main.c517 assert(!check_uptr_overflow(spmc_attrs.load_address, spmc_attrs.binary_size)); in spmd_check_address_in_binary_image()
519 return ((address >= spmc_attrs.load_address) && in spmd_check_address_in_binary_image()
520 (address < (spmc_attrs.load_address + spmc_attrs.binary_size))); in spmd_check_address_in_binary_image()
/arm-trusted-firmware-2.8.0/docs/components/
A Dsecure-partition-manager.rst444 load_address = <0x0 0x6000000>;
455 - *load_address* and *binary_size* are mostly used to verify secondary
464 indicates a FF-A compliant SP. The *load_address* field specifies the load

Completed in 14 milliseconds