Searched refs:load_address (Results 1 – 16 of 16) sorted by relevance
/trusted-firmware-a/plat/arm/board/fvp/fdts/ |
A D | fvp_spmc_manifest.dts | 25 load_address = <0x0 0x6000000>; 35 load_address = <0x7000000>; 42 load_address = <0x7100000>; 49 load_address = <0x7200000>; 56 load_address = <0x7600000>;
|
A D | fvp_spmc_optee_sp_manifest.dts | 25 load_address = <0x0 0x6000000>; 35 load_address = <0x6280000>;
|
/trusted-firmware-a/plat/arm/board/tc/fdts/ |
A D | tc_spmc_manifest.dts | 18 load_address = <0x0 0xfd000000>; 28 load_address = <0xfe000000>; 35 load_address = <0xfe100000>; 42 load_address = <0xfe200000>; 49 load_address = <0xfe600000>;
|
A D | tc_spmc_optee_sp_manifest.dts | 18 load_address = <0x0 0xfd000000>; 28 load_address = <0xfd280000>; 40 load_address = <0xfee00000>; 47 load_address = <0xfec00000>;
|
/trusted-firmware-a/docs/resources/diagrams/plantuml/ |
A D | fip-secure-partitions.puml | 15 load_address = 0xaaa 27 load_address = 0xbbb 38 spkg_1 load_address 41 spkg_2 load_address
|
A D | bl2-loading-sp.puml | 23 bl2 -> FW_CONFIG : read(load_address)
|
/trusted-firmware-a/include/services/ |
A D | spm_core_manifest.h | 33 uint64_t load_address; member
|
/trusted-firmware-a/tools/stm32image/ |
A D | stm32image.c | 38 uint32_t load_address; member 93 __le32_to_cpu(stm32hdr->load_address)); in stm32image_print_header() 114 stm32hdr->load_address = __cpu_to_le32(loadaddr); in stm32image_set_header()
|
/trusted-firmware-a/plat/common/ |
A D | plat_spmd_manifest.c | 69 rc = fdt_read_uint64(fdt, node, "load_address", &attr->load_address); in manifest_parse_attribute() 85 VERBOSE(" load_address: 0x%" PRIx64 "\n", attr->load_address); in manifest_parse_attribute()
|
/trusted-firmware-a/plat/arm/board/diphda/common/fdts/ |
A D | diphda_spmc_manifest.dts | 25 load_address = <0x0 0x2002000>;
|
/trusted-firmware-a/plat/st/stm32mp1/include/ |
A D | boot_api.h | 248 uint32_t load_address; member
|
/trusted-firmware-a/services/std_svc/spmd/ |
A D | spmd_main.c | 461 assert(!check_uptr_overflow(spmc_attrs.load_address, spmc_attrs.binary_size)); in spmd_check_address_in_binary_image() 463 return ((address >= spmc_attrs.load_address) && in spmd_check_address_in_binary_image() 464 (address < (spmc_attrs.load_address + spmc_attrs.binary_size))); in spmd_check_address_in_binary_image()
|
/trusted-firmware-a/drivers/st/io/ |
A D | io_stm32image.c | 299 if ((header->load_address != 0U) && in stm32image_partition_read() 300 (header->load_address != buffer)) { in stm32image_partition_read()
|
/trusted-firmware-a/docs/components/ |
A D | secure-partition-manager.rst | 384 load_address = <0x0 0x6000000>; 395 - *load_address* and *binary_size* are mostly used to verify secondary 404 indicates a FF-A compliant SP. The *load_address* field specifies the load
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/ |
A D | secure-partition-manager.rst.txt | 384 load_address = <0x0 0x6000000>; 395 - *load_address* and *binary_size* are mostly used to verify secondary 404 indicates a FF-A compliant SP. The *load_address* field specifies the load
|
/trusted-firmware-a/docs/build/TF-A_2.5/ |
A D | searchindex.js | 1 …,101,106,107,110,112,113,114,115,116,118,120,121,123,133,139,142,143],load_address:28,load_auth_im…
|
Completed in 33 milliseconds