/trusted-firmware-a/plat/xilinx/common/ |
A D | plat_startup.c | 68 struct xfsbl_partition partition[FSBL_MAX_PARTITIONS]; member 80 uint64_t flags = partition->flags & FSBL_FLAGS_CPU_MASK; in get_fsbl_cpu() 94 uint64_t flags = partition->flags & FSBL_FLAGS_EL_MASK; in get_fsbl_el() 108 uint64_t flags = partition->flags & FSBL_FLAGS_TZ_MASK; in get_fsbl_ss() 122 uint64_t flags = partition->flags & FSBL_FLAGS_ENDIAN_MASK; in get_fsbl_endian() 141 uint64_t flags = partition->flags & FSBL_FLAGS_ESTATE_MASK; in get_fsbl_estate() 199 ATFHandoffParams->partition[i].entry_point, in fsbl_atf_handover() 200 ATFHandoffParams->partition[i].flags); in fsbl_atf_handover() 208 target_el = get_fsbl_el(&ATFHandoffParams->partition[i]); in fsbl_atf_handover() 261 ATFHandoffParams->partition[i].entry_point, in fsbl_atf_handover() [all …]
|
/trusted-firmware-a/docs/components/ |
A D | ffa-manifest-binding.rst | 40 - Pre-allocated partition ID. 48 - Name of the partition e.g. for debugging purposes. 55 contexts that a partition implements. 59 capable partition irrespective of the number of PEs. 63 - The target exception level for the partition: 71 - The target execution state of the partition: 86 offset 0x0 from the base of the partition's binary. 90 - Translation granule used with the partition: 105 by the partition. 114 - Bit[1]: partition can send direct requests if set [all …]
|
A D | index.rst | 22 secure-partition-manager 23 secure-partition-manager-mm
|
A D | secure-partition-manager-mm.rst | 67 services in EL3 and instantiate the rest in a partition in S-EL0. 81 (SPM)** is responsible for managing the partition. This is semantically 105 applicable to a partition. 205 can only be a single outstanding Fast Call in a partition on a given CPU. 216 exchange data with a partition only if it has been populated in this shared 386 listed below. At the end of initialisation, the partition issues a 505 to the partition by programming a return from the last 508 completion of a partition service request. 527 partition. They are described as follows. 543 delegated to the partition by the SPM. [all …]
|
A D | secure-partition-manager.rst | 69 - SPM based on the MM interface to communicate with an S-EL0 partition `[2]`_. 93 partition and implementing the FF-A ABI on platforms not implementing the 297 (partition manifest at virtual FF-A instance) in DTS format. It is 339 to the SP binary image and associated DTS partition manifest file. The latter 493 Parsing SP partition manifests 526 Provided that the whole secure partition package image (see 529 partition manifest properties. 559 The SP primary EC (or the EC used when the partition is booted as described 651 The notifications receipt support is enabled in the partition FF-A manifest. 727 partition. [all …]
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/ |
A D | ffa-manifest-binding.rst.txt | 40 - Pre-allocated partition ID. 48 - Name of the partition e.g. for debugging purposes. 55 contexts that a partition implements. 59 capable partition irrespective of the number of PEs. 63 - The target exception level for the partition: 71 - The target execution state of the partition: 86 offset 0x0 from the base of the partition's binary. 90 - Translation granule used with the partition: 105 by the partition. 114 - Bit[1]: partition can send direct requests if set [all …]
|
A D | index.rst.txt | 22 secure-partition-manager 23 secure-partition-manager-mm
|
A D | secure-partition-manager-mm.rst.txt | 67 services in EL3 and instantiate the rest in a partition in S-EL0. 81 (SPM)** is responsible for managing the partition. This is semantically 105 applicable to a partition. 205 can only be a single outstanding Fast Call in a partition on a given CPU. 216 exchange data with a partition only if it has been populated in this shared 386 listed below. At the end of initialisation, the partition issues a 505 to the partition by programming a return from the last 508 completion of a partition service request. 527 partition. They are described as follows. 543 delegated to the partition by the SPM. [all …]
|
A D | secure-partition-manager.rst.txt | 69 - SPM based on the MM interface to communicate with an S-EL0 partition `[2]`_. 93 partition and implementing the FF-A ABI on platforms not implementing the 297 (partition manifest at virtual FF-A instance) in DTS format. It is 339 to the SP binary image and associated DTS partition manifest file. The latter 493 Parsing SP partition manifests 526 Provided that the whole secure partition package image (see 529 partition manifest properties. 559 The SP primary EC (or the EC used when the partition is booted as described 651 The notifications receipt support is enabled in the partition FF-A manifest. 727 partition. [all …]
|
/trusted-firmware-a/drivers/renesas/common/io/ |
A D | io_emmcdrv.c | 29 EMMC_PARTITION_ID partition; member 65 current_file.partition, current_file.file_pos, in emmcdrv_block_read() 100 current_file.partition = emmcdrv_bootpartition; in emmcdrv_block_open() 109 if ((block_spec->partition == PARTITION_ID_USER) || in emmcdrv_block_open() 110 (block_spec->partition == PARTITION_ID_BOOT_1) || in emmcdrv_block_open() 111 (block_spec->partition == PARTITION_ID_BOOT_2)) { in emmcdrv_block_open() 112 current_file.partition = block_spec->partition; in emmcdrv_block_open() 114 current_file.partition = emmcdrv_bootpartition; in emmcdrv_block_open() 118 if (emmc_select_partition(current_file.partition) != EMMC_SUCCESS) { in emmcdrv_block_open()
|
A D | io_rcar.c | 51 uintptr_t partition; /* for eMMC */ member 159 uintptr_t *partition) in file_to_offset() argument 182 *partition = rcar_image_header_prttn[addr]; in file_to_offset() 193 *partition = 0U; in file_to_offset() 306 uintptr_t dst, partition, handle; in load_bl33x() local 328 &partition); in load_bl33x() 336 ((io_drv_spec_t *) rcar_spec)->partition = partition; in load_bl33x() 484 uintptr_t partition, offset, dst; in rcar_file_open() local 512 current_file.partition = 0; in rcar_file_open() 527 current_file.partition = partition; in rcar_file_open() [all …]
|
A D | io_common.h | 13 uint32_t partition; member
|
/trusted-firmware-a/include/drivers/brcm/emmc/ |
A D | emmc_api.h | 39 int emmc_erase(uintptr_t mem_addr, size_t num_of_blocks, uint32_t partition); 42 uint32_t emmc_partition_select(uint32_t partition);
|
/trusted-firmware-a/plat/intel/soc/stratix10/ |
A D | platform.mk | 38 drivers/partition/partition.c \ 39 drivers/partition/gpt.c \
|
/trusted-firmware-a/plat/intel/soc/agilex/ |
A D | platform.mk | 38 drivers/partition/partition.c \ 39 drivers/partition/gpt.c \
|
/trusted-firmware-a/drivers/brcm/emmc/ |
A D | emmc_pboot_hal_memory_drv.c | 54 uint32_t emmc_partition_select(uint32_t partition) in emmc_partition_select() argument 64 switch (partition) { in emmc_partition_select() 194 int emmc_erase(uintptr_t mem_addr, size_t num_of_blocks, uint32_t partition) in emmc_erase() argument 205 emmc_partition_select(partition); in emmc_erase() 218 INFO("eMMC Erase of partition %d successful\n", partition); in emmc_erase() 220 ERROR("eMMC Erase of partition %d Failed(%i)\n", partition, err); in emmc_erase()
|
/trusted-firmware-a/plat/hisilicon/hikey/ |
A D | platform.mk | 79 drivers/partition/gpt.c \ 80 drivers/partition/partition.c \
|
/trusted-firmware-a/plat/hisilicon/hikey960/ |
A D | platform.mk | 80 drivers/partition/gpt.c \ 81 drivers/partition/partition.c \
|
/trusted-firmware-a/plat/arm/common/ |
A D | arm_common.mk | 183 BL2_SOURCES += drivers/partition/gpt.c \ 184 drivers/partition/partition.c
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/threat_model/ |
A D | threat_model_spm.rst.txt | 123 - Information exchange between endpoints (partition messages). 136 - S-Endpoint identifies a secure endpoint typically a secure partition. 455 | | The secure partition or SPMC replies to a partition| 458 | | (.e.g. partition message response outside of | 485 | | and partition states will be implemented in future | 615 .. _Secure Partition Manager: ../components/secure-partition-manager.html
|
/trusted-firmware-a/docs/threat_model/ |
A D | threat_model_spm.rst | 123 - Information exchange between endpoints (partition messages). 136 - S-Endpoint identifies a secure endpoint typically a secure partition. 455 | | The secure partition or SPMC replies to a partition| 458 | | (.e.g. partition message response outside of | 485 | | and partition states will be implemented in future | 615 .. _Secure Partition Manager: ../components/secure-partition-manager.html
|
/trusted-firmware-a/docs/plat/ |
A D | stm32mp1.rst | 54 It can then be copied in the first partition of the boot device. 244 Usually, two copies of fsbl are used (fsbl1 and fsbl2) instead of one partition fsbl. 254 Usually, two copies of fsbl are used (fsbl1 and fsbl2) instead of one partition fsbl.
|
A D | intel-agilex.rst | 50 - dd fip.bin to a A2 partition on the MMC drive to be booted in Agilex
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/ |
A D | stm32mp1.rst.txt | 54 It can then be copied in the first partition of the boot device. 244 Usually, two copies of fsbl are used (fsbl1 and fsbl2) instead of one partition fsbl. 254 Usually, two copies of fsbl are used (fsbl1 and fsbl2) instead of one partition fsbl.
|
A D | intel-agilex.rst.txt | 50 - dd fip.bin to a A2 partition on the MMC drive to be booted in Agilex
|