/arm-trusted-firmware-2.8.0/plat/xilinx/common/ |
A D | plat_startup.c | 65 uint64_t flags = partition->flags & FSBL_FLAGS_CPU_MASK; in get_fsbl_cpu() 79 uint64_t flags = partition->flags & FSBL_FLAGS_EL_MASK; in get_fsbl_el() 93 uint64_t flags = partition->flags & FSBL_FLAGS_TZ_MASK; in get_fsbl_ss() 107 uint64_t flags = partition->flags & FSBL_FLAGS_ENDIAN_MASK; in get_fsbl_endian() 127 uint64_t flags = partition->flags & FSBL_FLAGS_ESTATE_MASK; in get_fsbl_estate() 183 ATFHandoffParams->partition[i].entry_point, in fsbl_atf_handover() 184 ATFHandoffParams->partition[i].flags); in fsbl_atf_handover() 186 target_cpu = get_fsbl_cpu(&ATFHandoffParams->partition[i]); in fsbl_atf_handover() 192 target_el = get_fsbl_el(&ATFHandoffParams->partition[i]); in fsbl_atf_handover() 248 ATFHandoffParams->partition[i].entry_point, in fsbl_atf_handover() [all …]
|
/arm-trusted-firmware-2.8.0/drivers/renesas/common/io/ |
A D | io_emmcdrv.c | 29 EMMC_PARTITION_ID partition; member 65 current_file.partition, current_file.file_pos, in emmcdrv_block_read() 100 current_file.partition = emmcdrv_bootpartition; in emmcdrv_block_open() 109 if ((block_spec->partition == PARTITION_ID_USER) || in emmcdrv_block_open() 110 (block_spec->partition == PARTITION_ID_BOOT_1) || in emmcdrv_block_open() 111 (block_spec->partition == PARTITION_ID_BOOT_2)) { in emmcdrv_block_open() 112 current_file.partition = block_spec->partition; in emmcdrv_block_open() 114 current_file.partition = emmcdrv_bootpartition; in emmcdrv_block_open() 118 if (emmc_select_partition(current_file.partition) != EMMC_SUCCESS) { in emmcdrv_block_open()
|
A D | io_rcar.c | 51 uintptr_t partition; /* for eMMC */ member 159 uintptr_t *partition) in file_to_offset() argument 182 *partition = rcar_image_header_prttn[addr]; in file_to_offset() 193 *partition = 0U; in file_to_offset() 306 uintptr_t dst, partition, handle; in load_bl33x() local 328 &partition); in load_bl33x() 336 ((io_drv_spec_t *) rcar_spec)->partition = partition; in load_bl33x() 484 uintptr_t partition, offset, dst; in rcar_file_open() local 512 current_file.partition = 0; in rcar_file_open() 527 current_file.partition = partition; in rcar_file_open() [all …]
|
A D | io_common.h | 13 uint32_t partition; member
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | ffa-manifest-binding.rst | 37 - Pre-allocated partition ID. 45 - Name of the partition e.g. for debugging purposes. 52 contexts that a partition implements. 56 capable partition irrespective of the number of PEs. 60 - The target exception level for the partition: 68 - The target execution state of the partition: 83 offset 0x0 from the base of the partition's binary. 87 - Translation granule used with the partition: 102 by the partition. 111 - Bit[1]: partition can send direct requests if set [all …]
|
A D | index.rst | 21 secure-partition-manager 23 secure-partition-manager-mm
|
A D | secure-partition-manager-mm.rst | 67 services in EL3 and instantiate the rest in a partition in S-EL0. 81 (SPM)** is responsible for managing the partition. This is semantically 105 applicable to a partition. 205 can only be a single outstanding Fast Call in a partition on a given CPU. 216 exchange data with a partition only if it has been populated in this shared 386 listed below. At the end of initialisation, the partition issues a 505 to the partition by programming a return from the last 508 completion of a partition service request. 527 partition. They are described as follows. 543 delegated to the partition by the SPM. [all …]
|
A D | secure-partition-manager.rst | 81 single S-EL0 partition `[2]`_. 332 (partition manifest at virtual FF-A instance) in DTS format. It is 391 if it does not exist there the UUID is extracted from the DTS partition 558 Parsing SP partition manifests 598 partition's DTB manifest. 602 .. image:: ../resources/diagrams/partition-package.png 612 booting the partition. 627 DTB blob and extract its partition manifest properties. 840 partition. 1015 in their respective partition manifest. The discovery of support [all …]
|
A D | el3-spmc.rst | 23 and SPMC at EL3, one S-EL1 secure partition, with an optional 145 Parsing SP partition manifests 179 partition's DTB manifest. 187 booting the partition. 249 When invoked from a secure partition FFA_RXTX_MAP maps the provided send and 259 partition. 393 When the SPMC boots, secure partition is initialized on its primary 396 The FFA_SECONDARY_EP_REGISTER interface is to be used by a secure partition 473 In the scenario when secure interrupt occurs while the secure partition is running,
|
/arm-trusted-firmware-2.8.0/include/drivers/brcm/emmc/ |
A D | emmc_api.h | 39 int emmc_erase(uintptr_t mem_addr, size_t num_of_blocks, uint32_t partition); 42 uint32_t emmc_partition_select(uint32_t partition);
|
/arm-trusted-firmware-2.8.0/plat/xilinx/common/include/ |
A D | plat_startup.h | 32 struct xfsbl_partition partition[FSBL_MAX_PARTITIONS]; member
|
/arm-trusted-firmware-2.8.0/plat/intel/soc/agilex/ |
A D | platform.mk | 39 drivers/partition/partition.c \ 40 drivers/partition/gpt.c \
|
/arm-trusted-firmware-2.8.0/plat/intel/soc/stratix10/ |
A D | platform.mk | 39 drivers/partition/partition.c \ 40 drivers/partition/gpt.c \
|
/arm-trusted-firmware-2.8.0/drivers/brcm/emmc/ |
A D | emmc_pboot_hal_memory_drv.c | 54 uint32_t emmc_partition_select(uint32_t partition) in emmc_partition_select() argument 64 switch (partition) { in emmc_partition_select() 194 int emmc_erase(uintptr_t mem_addr, size_t num_of_blocks, uint32_t partition) in emmc_erase() argument 205 emmc_partition_select(partition); in emmc_erase() 218 INFO("eMMC Erase of partition %d successful\n", partition); in emmc_erase() 220 ERROR("eMMC Erase of partition %d Failed(%i)\n", partition, err); in emmc_erase()
|
/arm-trusted-firmware-2.8.0/docs/threat_model/ |
A D | threat_model_spm.rst | 124 - Information exchange between endpoints (partition messages). 137 - S-Endpoint identifies a secure endpoint typically a secure partition. 290 | | threat by following the guidance for partition | 294 | | the partition runtime model. | 454 | | The secure partition or SPMC replies to a partition| 457 | | (.e.g. partition message response outside of | 484 | | on the basis of the rules established by partition | 657 | | state such that a partition isn't able to receive | 721 | | specific partition. | 724 | | disabled in the respective partition's manifest. | [all …]
|
A D | threat_model_el3_spm.rst | 22 - Secure partition is statically provisioned at boot time. 98 - Information exchange between endpoints (partition messages). 111 - Secure endpoint (referred as S-Endpoint later): typically a secure partition. 413 | | The secure partition or SPMC replies to a partition| 416 | | (e.g. partition message response outside of | 446 | | and partition states is followed. |
|
/arm-trusted-firmware-2.8.0/plat/hisilicon/hikey/ |
A D | platform.mk | 79 drivers/partition/gpt.c \ 80 drivers/partition/partition.c \
|
/arm-trusted-firmware-2.8.0/plat/hisilicon/hikey960/ |
A D | platform.mk | 81 drivers/partition/gpt.c \ 82 drivers/partition/partition.c \
|
/arm-trusted-firmware-2.8.0/plat/arm/common/ |
A D | arm_common.mk | 191 BL2_SOURCES += drivers/partition/gpt.c \ 192 drivers/partition/partition.c
|
/arm-trusted-firmware-2.8.0/docs/plat/ |
A D | intel-agilex.rst | 50 - dd fip.bin to a A2 partition on the MMC drive to be booted in Agilex
|
A D | intel-stratix10.rst | 50 - dd fip.bin to a A2 partition on the MMC drive to be booted in Stratix 10
|
A D | rpi3.rst | 34 - If a file called ``kernel8.img`` is located on the ``boot`` partition of the 387 by the corresponding path in your computers to the ``boot`` partition of the 397 filesystem partition of the SD card on your computer. 411 `Raspbian`_ (or that, at least, the ``boot`` partition is untouched, or nearly 414 1. Insert the SD card and open the ``boot`` partition.
|
A D | hikey.rst | 72 - Generate l-loader.bin and partition table for aosp. The eMMC capacity is either 8GB or 4GB. Just…
|
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/ |
A D | build.rst | 260 Image needs to be stored at disk LBA 0 or at disk partition with 261 MBR type 0x4d (ASCII 'M' as in Marvell) or at disk partition with 262 GPT partition type GUID ``6828311A-BA55-42A4-BCDE-A89BB5EDECAE``. 266 The boot partition number, default is 0. 343 the image boot from SPI NOR flash partition 0, and the image is non trusted in WTP, the command
|
/arm-trusted-firmware-2.8.0/docs/ |
A D | glossary.rst | 102 A logical secure partition managed by SPM
|