/arm-trusted-firmware-2.8.0/include/plat/arm/common/ |
A D | arm_fconf_getter.h | 17 &policies[id]; \ 26 extern struct plat_io_policy policies[];
|
/arm-trusted-firmware-2.8.0/plat/arm/common/fconf/ |
A D | arm_fconf_sp.c | 128 policies[plat_index].image_spec = in fconf_populate_arm_sp() 130 policies[plat_index].dev_handle = &fip_dev_handle; in fconf_populate_arm_sp() 131 policies[plat_index].check = open_fip; in fconf_populate_arm_sp() 137 policies[sip_index].image_spec = in fconf_populate_arm_sp() 139 policies[sip_index].dev_handle = &fip_dev_handle; in fconf_populate_arm_sp() 140 policies[sip_index].check = open_fip; in fconf_populate_arm_sp()
|
A D | arm_fconf_io.c | 96 struct plat_io_policy policies[MAX_NUMBER_IDS] = { variable 370 policies[load_info[i].image_id].image_spec = (uintptr_t)uuid_ptr; in fconf_populate_arm_io_policies() 371 policies[load_info[i].image_id].dev_handle = &fip_dev_handle; in fconf_populate_arm_io_policies() 372 policies[load_info[i].image_id].check = open_fip; in fconf_populate_arm_io_policies()
|
/arm-trusted-firmware-2.8.0/plat/st/common/include/ |
A D | stm32mp_fconf_getter.h | 18 &policies[id]; \ 28 extern struct plat_io_policy policies[];
|
/arm-trusted-firmware-2.8.0/plat/st/common/ |
A D | stm32mp_fconf_io.c | 38 struct plat_io_policy policies[MAX_NUMBER_IDS] = { variable 161 policies[load_info[i].image_id].image_spec = (uintptr_t)uuid_ptr; in fconf_populate_stm32mp_io_policies() 167 policies[load_info[i].image_id].dev_handle = &enc_dev_handle; in fconf_populate_stm32mp_io_policies() 168 policies[load_info[i].image_id].check = open_enc_fip; in fconf_populate_stm32mp_io_policies() 172 policies[load_info[i].image_id].dev_handle = &fip_dev_handle; in fconf_populate_stm32mp_io_policies() 173 policies[load_info[i].image_id].check = open_fip; in fconf_populate_stm32mp_io_policies()
|
A D | bl2_io_storage.c | 644 if ((guidcmp(&policies[i].img_type_guid, img_type_uuid)) == 0) { in stm32_get_image_spec() 645 return (void *)policies[i].image_spec; in stm32_get_image_spec() 699 policy = &policies[image_id]; in plat_set_image_source()
|
/arm-trusted-firmware-2.8.0/plat/intel/soc/common/ |
A D | socfpga_storage.c | 75 static const struct plat_io_policy policies[] = { variable 183 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 185 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/marvell/armada/common/ |
A D | marvell_io_storage.c | 69 static const struct plat_io_policy policies[] = { variable 200 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 202 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/rpi/common/ |
A D | rpi3_io_storage.c | 115 static const struct plat_io_policy policies[] = { variable 261 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 263 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/hisilicon/poplar/ |
A D | plat_storage.c | 93 static const struct plat_io_policy policies[] = { variable 210 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 212 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/hisilicon/hikey/ |
A D | hikey_io_storage.c | 137 static const struct plat_io_policy policies[] = { variable 305 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 307 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/imx/common/ |
A D | imx_io_storage.c | 123 static const struct plat_io_policy policies[] = { variable 262 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 264 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/brcm/common/ |
A D | brcm_io_storage.c | 145 static const struct plat_io_policy policies[] = { variable 381 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 387 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/hisilicon/hikey960/ |
A D | hikey960_io_storage.c | 138 static const struct plat_io_policy policies[] = { variable 363 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 365 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/docs/resources/diagrams/plantuml/ |
A D | fconf_bl1_load_config.puml | 43 note over fconf: use statically defined policies in bl1 63 note over fconf: use statically defined policies in bl1
|
A D | io_arm_class_diagram.puml | 37 policies : plat_io_policy[1..*]
|
/arm-trusted-firmware-2.8.0/plat/qemu/common/ |
A D | qemu_io_storage.c | 193 static const struct plat_io_policy policies[] = { variable 436 assert(image_id < ARRAY_SIZE(policies)); in plat_get_image_source() 438 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/nxp/common/setup/ |
A D | ls_io_storage.c | 137 static const struct plat_io_policy policies[] = { variable 531 if (image_id < ARRAY_SIZE(policies)) { in plat_get_image_source() 533 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/plat/renesas/common/ |
A D | plat_storage.c | 172 static const struct plat_io_policy policies[] = { variable 389 policy = &policies[image_id]; in plat_get_image_source()
|
/arm-trusted-firmware-2.8.0/docs/components/fconf/ |
A D | index.rst | 30 - Arm io policies: arm.io_policies.bl2_image 54 - TB_FW: properties related to trusted firmware such as IO policies,
|
/arm-trusted-firmware-2.8.0/docs/design_documents/ |
A D | drtm_poc.rst | 11 enable enforcing security policies.
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | firmware-update.rst | 61 - Set these image specification in the corresponding I/O policies of the 65 - Use these I/O policies to read the images from this address into the memory
|
/arm-trusted-firmware-2.8.0/docs/getting_started/ |
A D | porting-guide.rst | 1128 FWU metadata, and update I/O policies of active/updated images using retrieved
|
/arm-trusted-firmware-2.8.0/docs/ |
A D | change-log.md | 2587 …- add IO policies for STM32MP1 ([21e002f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/… 4298 - arm/common: Check for out-of-bound accesses in the platform io policies
|