Home
last modified time | relevance | path

Searched +full:- +full:- +full:dtb (Results 1 – 25 of 369) sorted by relevance

12345678910>>...15

/external/dtc/tests/
Drun_tests.sh6 if [ -z "$CC" ]; then
10 if [ -z "$PYTHON" ]; then
14 if [ -n "$NO_PYTHON" ]; then
21 if [ -f ../pylibfdt/_libfdt.so ] || [ -f ../pylibfdt/_libfdt.cpython-3*.so ]; then
28 if [ -n "$NO_YAML" ]; then
35 if pkg-config --exists yaml-0.1; then
43 if [ -z "$STATSZ" ]; then
44 stat --version 2>/dev/null | grep -q 'GNU'
46 if [ "$GNUSTAT" -ne 0 ]; then
48 STATSZ="stat -f %Uz"
[all …]
/external/trusty/arm-trusted-firmware/plat/arm/common/
Darm_dyn_cfg_helpers.c2 * Copyright (c) 2018-2023, Arm Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
28 * Currently OP-TEE does not support reading DTBs from Secure memory
41 * Validate the tb_fw_config is a valid DTB file and returns the node offset
44 * void *dtb - pointer to the TB_FW_CONFIG in memory
45 * int *node - Returns the node offset to "arm,tb_fw" property if found.
47 * Returns 0 on success and -1 on error.
49 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument
51 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init()
55 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init()
[all …]
Darm_dyn_cfg.c2 * Copyright (c) 2018-2023, Arm Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
35 * which is a DTB.
38 * - To allocate space for the Mbed TLS heap --only if-- Trusted Board Boot
40 * - This implementation requires the DTB to be present so that BL1 has a
60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap()
70 * Puts the shared Mbed TLS heap information to the DTB.
80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap()
81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap()
85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap()
[all …]
/external/arm-trusted-firmware/plat/arm/common/
Darm_dyn_cfg_helpers.c2 * Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
27 * Currently OP-TEE does not support reading DTBs from Secure memory
37 * Validate the tb_fw_config is a valid DTB file and returns the node offset
40 * void *dtb - pointer to the TB_FW_CONFIG in memory
41 * int *node - Returns the node offset to "arm,tb_fw" property if found.
43 * Returns 0 on success and -1 on error.
45 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument
47 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init()
51 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init()
[all …]
Darm_dyn_cfg.c2 * Copyright (c) 2018-2021, Arm Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
35 * which is a DTB.
38 * - To allocate space for the Mbed TLS heap --only if-- Trusted Board Boot
40 * - This implementation requires the DTB to be present so that BL1 has a
60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap()
70 * Puts the shared Mbed TLS heap information to the DTB.
80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap()
81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap()
85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap()
[all …]
/external/arm-trusted-firmware/common/
Dfdt_wrappers.c2 * Copyright (c) 2018-2021, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
22 * Read cells from a given property of the given node. Any number of 32-bit
26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument
32 assert(dtb != NULL); in fdt_read_uint32_array()
38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array()
40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array()
41 return -FDT_ERR_NOTFOUND; in fdt_read_uint32_array()
47 return -FDT_ERR_BADVALUE; in fdt_read_uint32_array()
57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument
[all …]
Dfdt_fixup.c2 * Copyright (c) 2016-2020, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
13 * is used by the secure world, so that non-secure software avoids using
39 * the same execution state (AArch32/AArch64) as TF-A.
40 * Kernels running in AArch32 on an AArch64 TF-A should use PSCI v0.2.
51 * dt_add_psci_node() - Add a PSCI node into an existing device tree
62 * Return: 0 on success, -1 otherwise.
75 return -1; in dt_add_psci_node()
78 return -1; in dt_add_psci_node()
79 if (append_psci_compatible(fdt, offs, "arm,psci-1.0")) in dt_add_psci_node()
[all …]
/external/trusty/arm-trusted-firmware/plat/imx/imx8m/
Dimx8m_dyn_cfg_helpers.c5 * SPDX-License-Identifier: BSD-3-Clause
27 void *dtb = (void *)dt_base; in imx8m_event_log_fdt_init_overlay() local
29 ret = fdt_create_empty_tree(dtb, dt_size); in imx8m_event_log_fdt_init_overlay()
31 ERROR("cannot create empty dtb tree: %s\n", in imx8m_event_log_fdt_init_overlay()
36 offset = fdt_path_offset(dtb, "/"); in imx8m_event_log_fdt_init_overlay()
43 offset = fdt_add_subnode(dtb, offset, "fragment@0"); in imx8m_event_log_fdt_init_overlay()
50 ret = fdt_setprop_string(dtb, offset, "target-path", "/"); in imx8m_event_log_fdt_init_overlay()
52 ERROR("cannot set target-path property: %s\n", in imx8m_event_log_fdt_init_overlay()
57 offset = fdt_add_subnode(dtb, offset, "__overlay__"); in imx8m_event_log_fdt_init_overlay()
64 offset = fdt_add_subnode(dtb, offset, "tpm_event_log"); in imx8m_event_log_fdt_init_overlay()
[all …]
/external/trusty/arm-trusted-firmware/plat/xilinx/common/
Dplat_fdt.c4 * SPDX-License-Identifier: BSD-3-Clause
19 void *dtb; in prepare_dtb() local
23 dtb = (void *)XILINX_OF_BOARD_DTB_ADDR; in prepare_dtb()
28 map_ret = mmap_add_dynamic_region((unsigned long long)dtb, in prepare_dtb()
29 (uintptr_t)dtb, in prepare_dtb()
33 WARN("Failed to add dynamic region for dtb: error %d\n", in prepare_dtb()
40 if (fdt_check_header(dtb) != 0) { in prepare_dtb()
41 NOTICE("Can't read DT at %p\n", dtb); in prepare_dtb()
43 ret = fdt_open_into(dtb, dtb, XILINX_OF_BOARD_DTB_MAX_SIZE); in prepare_dtb()
47 dtb, ret); in prepare_dtb()
[all …]
Dplat_console.c4 * SPDX-License-Identifier: BSD-3-Clause
29 * get_baudrate() - Get the baudrate form DTB.
30 * @dtb: Address of the Device Tree Blob (DTB).
34 static int32_t get_baudrate(void *dtb) in get_baudrate() argument
42 node = fdt_path_offset(dtb, "/secure-chosen"); in get_baudrate()
44 node = fdt_path_offset(dtb, "/chosen"); in get_baudrate()
46 ret = -FDT_ERR_NOTFOUND; in get_baudrate()
51 prop = fdt_getprop(dtb, node, "stdout-path", NULL); in get_baudrate()
53 ret = -FDT_ERR_NOTFOUND; in get_baudrate()
60 ret = -FDT_ERR_NOTFOUND; in get_baudrate()
[all …]
/external/trusty/arm-trusted-firmware/plat/qemu/qemu/
Dqemu_helpers.c4 * SPDX-License-Identifier: BSD-3-Clause
20 * Currently OP-TEE does not support reading DTBs from Secure memory
36 void *dtb = (void *)config_base; in qemu_set_tee_fw_info() local
41 offs = fdtw_find_or_add_subnode(dtb, 0, "tpm-event-log"); in qemu_set_tee_fw_info()
43 ERROR("Failed to add node tpm-event-log %d\n", offs); in qemu_set_tee_fw_info()
47 if (fdt_appendprop(dtb, offs, "compatible", compatible, in qemu_set_tee_fw_info()
49 return -1; in qemu_set_tee_fw_info()
52 err = fdt_setprop(dtb, offs, DTB_PROP_HW_SM_LOG_ADDR, &sec_base, 8); in qemu_set_tee_fw_info()
58 err = fdt_setprop(dtb, offs, DTB_PROP_HW_LOG_SIZE, &sz, 4); in qemu_set_tee_fw_info()
69 * Write the Event Log address and its size in the DTB.
[all …]
/external/trusty/arm-trusted-firmware/common/
Dfdt_wrappers.c2 * Copyright (c) 2018-2023, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
22 * Read cells from a given property of the given node. Any number of 32-bit
26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument
32 assert(dtb != NULL); in fdt_read_uint32_array()
38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array()
40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array()
41 return -FDT_ERR_NOTFOUND; in fdt_read_uint32_array()
47 return -FDT_ERR_BADVALUE; in fdt_read_uint32_array()
57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument
[all …]
Dfdt_fixup.c2 * Copyright (c) 2016-2022, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
13 * is used by the secure world, so that non-secure software avoids using
39 * the same execution state (AArch32/AArch64) as TF-A.
40 * Kernels running in AArch32 on an AArch64 TF-A should use PSCI v0.2.
51 * dt_add_psci_node() - Add a PSCI node into an existing device tree
62 * Return: 0 on success, -1 otherwise.
75 return -1; in dt_add_psci_node()
78 return -1; in dt_add_psci_node()
79 if (append_psci_compatible(fdt, offs, "arm,psci-1.0")) in dt_add_psci_node()
[all …]
/external/arm-trusted-firmware/include/common/
Dfdt_wrappers.h2 * Copyright (c) 2018-2021, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
17 int fdt_read_uint32(const void *dtb, int node, const char *prop_name,
19 uint32_t fdt_read_uint32_default(const void *dtb, int node,
21 int fdt_read_uint64(const void *dtb, int node, const char *prop_name,
23 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name,
25 int fdtw_read_string(const void *dtb, int node, const char *prop,
27 int fdtw_read_uuid(const void *dtb, int node, const char *prop,
29 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop,
31 int fdtw_read_bytes(const void *dtb, int node, const char *prop,
[all …]
/external/trusty/arm-trusted-firmware/include/common/
Dfdt_wrappers.h2 * Copyright (c) 2018-2023, Arm Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
18 int fdt_read_uint32(const void *dtb, int node, const char *prop_name,
20 uint32_t fdt_read_uint32_default(const void *dtb, int node,
22 int fdt_read_uint64(const void *dtb, int node, const char *prop_name,
24 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name,
26 int fdtw_read_string(const void *dtb, int node, const char *prop,
28 int fdtw_read_uuid(const void *dtb, int node, const char *prop,
30 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop,
32 int fdtw_read_bytes(const void *dtb, int node, const char *prop,
[all …]
/external/trusty/arm-trusted-firmware/plat/qemu/qemu_sbsa/
Dsbsa_sip_svc.c4 * SPDX-License-Identifier: BSD-3-Clause
38 void read_platform_config_from_dt(void *dtb) in read_platform_config_from_dt() argument
57 node = fdt_path_offset(dtb, "/intc"); in read_platform_config_from_dt()
62 data = fdt_getprop(dtb, node, "reg", NULL); in read_platform_config_from_dt()
67 err = fdt_get_reg_props_by_index(dtb, node, 0, &gicd_base, NULL); in read_platform_config_from_dt()
74 err = fdt_get_reg_props_by_index(dtb, node, 1, &gicr_base, NULL); in read_platform_config_from_dt()
83 node = fdt_path_offset(dtb, "/intc/its"); in read_platform_config_from_dt()
88 err = fdt_get_reg_props_by_index(dtb, node, 0, &gic_its_addr, NULL); in read_platform_config_from_dt()
96 void read_platform_version(void *dtb) in read_platform_version() argument
100 node = fdt_path_offset(dtb, "/"); in read_platform_version()
[all …]
/external/mesa3d/.gitlab-ci/bare-metal/
Dfastboot.sh6 . "$SCRIPTS_DIR"/setup-test-env.sh
8 BM=$CI_PROJECT_DIR/install/bare-metal
11 if [ -z "$BM_SERIAL" ] && [ -z "$BM_SERIAL_SCRIPT" ]; then
12 …echo "Must set BM_SERIAL OR BM_SERIAL_SCRIPT in your gitlab-runner config.toml [[runners]] environ…
20 if [ -z "$BM_POWERUP" ]; then
21 echo "Must set BM_POWERUP in your gitlab-runner config.toml [[runners]] environment"
27 if [ -z "$BM_POWERDOWN" ]; then
28 echo "Must set BM_POWERDOWN in your gitlab-runner config.toml [[runners]] environment"
33 if [ -z "$BM_FASTBOOT_SERIAL" ]; then
34 echo "Must set BM_FASTBOOT_SERIAL in your gitlab-runner config.toml [[runners]] environment"
[all …]
/external/trusty/arm-trusted-firmware/plat/rpi/rpi4/
Drpi4_bl31_setup.c2 * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
53 * the security state specified. BL33 corresponds to the non-secure image type
67 if (next_image_info->pc) { in bl31_plat_get_next_image_ep_info()
93 /* Cleared by the GPU if DTB address is valid. */ in rpi4_get_dtb_address()
97 WARN("Stub magic failure, DTB address unknown\n"); in rpi4_get_dtb_address()
115 * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before
132 /* LOCAL_PRESCALER; divide-by (0x80000000 / register_val) == 1 */ in bl31_early_platform_setup2()
151 * r1 = machine type number, optional in DT-only platforms (~0 if so) in bl31_early_platform_setup2()
154 VERBOSE("rpi4: Preparing to boot 32-bit Linux kernel\n"); in bl31_early_platform_setup2()
[all …]
/external/arm-trusted-firmware/plat/rpi/rpi4/
Drpi4_bl31_setup.c2 * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
53 * the security state specified. BL33 corresponds to the non-secure image type
67 if (next_image_info->pc) { in bl31_plat_get_next_image_ep_info()
93 /* Cleared by the GPU if DTB address is valid. */ in rpi4_get_dtb_address()
97 WARN("Stub magic failure, DTB address unknown\n"); in rpi4_get_dtb_address()
115 * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before
132 /* LOCAL_PRESCALER; divide-by (0x80000000 / register_val) == 1 */ in bl31_early_platform_setup2()
151 * r1 = machine type number, optional in DT-only platforms (~0 if so) in bl31_early_platform_setup2()
154 VERBOSE("rpi4: Preparing to boot 32-bit Linux kernel\n"); in bl31_early_platform_setup2()
[all …]
/external/trusty/arm-trusted-firmware/lib/fconf/
Dfconf_dyn_cfg_getter.c2 * Copyright (c) 2019-2023, Arm Limited. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
41 dtb_info->config_addr = config_addr; in set_config_info()
42 dtb_info->secondary_config_addr = secondary_config_addr; in set_config_info()
43 dtb_info->config_max_size = config_max_size; in set_config_info()
44 dtb_info->config_id = config_id; in set_config_info()
52 /* Positions index to the proper config-id */ in dyn_cfg_dtb_info_get_index()
64 /* Positions index to the proper config-id */ in dyn_cfg_dtb_info_getter()
82 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local
85 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry()
[all …]
Dfconf_cot_getter.c2 * Copyright (c) 2020-2023, Arm Limited. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
50 * 1. Certificates are validated using nv-cntr and pk
68 * update_parent_auth_data() - Update authentication data structure
80 auth_param_desc_t *auth_data = &auth_desc->authenticated_data[0]; in update_parent_auth_data()
97 return -1; in update_parent_auth_data()
106 return -1; in update_parent_auth_data()
113 * get_auth_param_type_desc() - Get pointer of authentication parameter
130 *type_desc = img_auth_method->param.sig.pk; in get_auth_param_type_desc()
135 *type_desc = img_auth_method->param.hash.hash; in get_auth_param_type_desc()
[all …]
/external/arm-trusted-firmware/lib/fconf/
Dfconf_dyn_cfg_getter.c2 * Copyright (c) 2019-2020, Arm Limited. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
38 dtb_info->config_addr = config_addr; in set_config_info()
39 dtb_info->config_max_size = config_max_size; in set_config_info()
40 dtb_info->config_id = config_id; in set_config_info()
47 /* Positions index to the proper config-id */ in dyn_cfg_dtb_info_getter()
65 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local
68 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry()
70 * function, Below check is present to avoid re-population of in fconf_populate_dtb_registry()
77 uint32_t config_max_size = fdt_totalsize(dtb); in fconf_populate_dtb_registry()
[all …]
Dfconf_cot_getter.c4 * SPDX-License-Identifier: BSD-3-Clause
48 * 1. Certificates are validated using nv-cntr and pk
66 * update_parent_auth_data() - Update authentication data structure
78 auth_param_desc_t *auth_data = &auth_desc->authenticated_data[0]; in update_parent_auth_data()
95 return -1; in update_parent_auth_data()
104 return -1; in update_parent_auth_data()
111 * get_auth_param_type_desc() - Get pointer of authentication parameter
128 *type_desc = img_auth_method->param.sig.pk; in get_auth_param_type_desc()
133 *type_desc = img_auth_method->param.hash.hash; in get_auth_param_type_desc()
136 return -1; in get_auth_param_type_desc()
[all …]
/external/mesa3d/.gitlab-ci/container/
Dbaremetal_build.sh3 set -e
4 set -o xtrace
6 # Fetch the arm-built rootfs image and unpack it in our x86_64 container (saves
10 if curl -X HEAD -s "${ARTIFACTS_PREFIX}/${FDO_UPSTREAM_REPO}/${ARTIFACTS_SUFFIX}/${arch}/done"; then
16 curl -L --retry 4 -f --retry-all-errors --retry-delay 60 \
17 "${ARTIFACTS_URL}"/lava-rootfs.tar.zst -o rootfs.tar.zst
18 mkdir -p /rootfs-"$arch"
19 tar -C /rootfs-"$arch" '--exclude=./dev/*' --zstd -xf rootfs.tar.zst
23 mkdir -p /baremetal-files
24 pushd /baremetal-files
[all …]
/external/autotest/utils/
Demulator_manager.py2 # Use of this source code is governed by a BSD-style license that can be
7 arm emulator kernel.dtb (or another dtb file) must also be in imagedir.
23 """Bad port, missing artifact or non-existant imagedir."""
40 run('test -f %s' % os.path.join(imagedir, 'system.img'))
55 @return: Bool - True if emulator stops.
69 """Detect a dtb file in the image directory
71 @return: Path to dtb file or None.
73 cmd_result = self.run('find "%s" -name "*.dtb"' % self.imagedir)
74 dtb = cmd_result.stdout.split('\n')[0]
75 return dtb.strip() or None
[all …]

12345678910>>...15