| /external/dtc/tests/ |
| D | run_tests.sh | 6 if [ -z "$CC" ]; then 10 if [ -z "$PYTHON" ]; then 14 if [ -n "$NO_PYTHON" ]; then 21 if [ -f ../pylibfdt/_libfdt.so ] || [ -f ../pylibfdt/_libfdt.cpython-3*.so ]; then 28 if [ -n "$NO_YAML" ]; then 35 if pkg-config --exists yaml-0.1; then 43 if [ -z "$STATSZ" ]; then 44 stat --version 2>/dev/null | grep -q 'GNU' 46 if [ "$GNUSTAT" -ne 0 ]; then 48 STATSZ="stat -f %Uz" [all …]
|
| /external/trusty/arm-trusted-firmware/plat/arm/common/ |
| D | arm_dyn_cfg_helpers.c | 2 * Copyright (c) 2018-2023, Arm Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 28 * Currently OP-TEE does not support reading DTBs from Secure memory 41 * Validate the tb_fw_config is a valid DTB file and returns the node offset 44 * void *dtb - pointer to the TB_FW_CONFIG in memory 45 * int *node - Returns the node offset to "arm,tb_fw" property if found. 47 * Returns 0 on success and -1 on error. 49 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument 51 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init() 55 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init() [all …]
|
| D | arm_dyn_cfg.c | 2 * Copyright (c) 2018-2023, Arm Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 35 * which is a DTB. 38 * - To allocate space for the Mbed TLS heap --only if-- Trusted Board Boot 40 * - This implementation requires the DTB to be present so that BL1 has a 60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap() 70 * Puts the shared Mbed TLS heap information to the DTB. 80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap() 81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap() 85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap() [all …]
|
| /external/arm-trusted-firmware/plat/arm/common/ |
| D | arm_dyn_cfg_helpers.c | 2 * Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 27 * Currently OP-TEE does not support reading DTBs from Secure memory 37 * Validate the tb_fw_config is a valid DTB file and returns the node offset 40 * void *dtb - pointer to the TB_FW_CONFIG in memory 41 * int *node - Returns the node offset to "arm,tb_fw" property if found. 43 * Returns 0 on success and -1 on error. 45 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument 47 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init() 51 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init() [all …]
|
| D | arm_dyn_cfg.c | 2 * Copyright (c) 2018-2021, Arm Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 35 * which is a DTB. 38 * - To allocate space for the Mbed TLS heap --only if-- Trusted Board Boot 40 * - This implementation requires the DTB to be present so that BL1 has a 60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap() 70 * Puts the shared Mbed TLS heap information to the DTB. 80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap() 81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap() 85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap() [all …]
|
| /external/arm-trusted-firmware/common/ |
| D | fdt_wrappers.c | 2 * Copyright (c) 2018-2021, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 22 * Read cells from a given property of the given node. Any number of 32-bit 26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument 32 assert(dtb != NULL); in fdt_read_uint32_array() 38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array() 40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array() 41 return -FDT_ERR_NOTFOUND; in fdt_read_uint32_array() 47 return -FDT_ERR_BADVALUE; in fdt_read_uint32_array() 57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument [all …]
|
| D | fdt_fixup.c | 2 * Copyright (c) 2016-2020, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 13 * is used by the secure world, so that non-secure software avoids using 39 * the same execution state (AArch32/AArch64) as TF-A. 40 * Kernels running in AArch32 on an AArch64 TF-A should use PSCI v0.2. 51 * dt_add_psci_node() - Add a PSCI node into an existing device tree 62 * Return: 0 on success, -1 otherwise. 75 return -1; in dt_add_psci_node() 78 return -1; in dt_add_psci_node() 79 if (append_psci_compatible(fdt, offs, "arm,psci-1.0")) in dt_add_psci_node() [all …]
|
| /external/trusty/arm-trusted-firmware/plat/imx/imx8m/ |
| D | imx8m_dyn_cfg_helpers.c | 5 * SPDX-License-Identifier: BSD-3-Clause 27 void *dtb = (void *)dt_base; in imx8m_event_log_fdt_init_overlay() local 29 ret = fdt_create_empty_tree(dtb, dt_size); in imx8m_event_log_fdt_init_overlay() 31 ERROR("cannot create empty dtb tree: %s\n", in imx8m_event_log_fdt_init_overlay() 36 offset = fdt_path_offset(dtb, "/"); in imx8m_event_log_fdt_init_overlay() 43 offset = fdt_add_subnode(dtb, offset, "fragment@0"); in imx8m_event_log_fdt_init_overlay() 50 ret = fdt_setprop_string(dtb, offset, "target-path", "/"); in imx8m_event_log_fdt_init_overlay() 52 ERROR("cannot set target-path property: %s\n", in imx8m_event_log_fdt_init_overlay() 57 offset = fdt_add_subnode(dtb, offset, "__overlay__"); in imx8m_event_log_fdt_init_overlay() 64 offset = fdt_add_subnode(dtb, offset, "tpm_event_log"); in imx8m_event_log_fdt_init_overlay() [all …]
|
| /external/trusty/arm-trusted-firmware/plat/xilinx/common/ |
| D | plat_fdt.c | 4 * SPDX-License-Identifier: BSD-3-Clause 19 void *dtb; in prepare_dtb() local 23 dtb = (void *)XILINX_OF_BOARD_DTB_ADDR; in prepare_dtb() 28 map_ret = mmap_add_dynamic_region((unsigned long long)dtb, in prepare_dtb() 29 (uintptr_t)dtb, in prepare_dtb() 33 WARN("Failed to add dynamic region for dtb: error %d\n", in prepare_dtb() 40 if (fdt_check_header(dtb) != 0) { in prepare_dtb() 41 NOTICE("Can't read DT at %p\n", dtb); in prepare_dtb() 43 ret = fdt_open_into(dtb, dtb, XILINX_OF_BOARD_DTB_MAX_SIZE); in prepare_dtb() 47 dtb, ret); in prepare_dtb() [all …]
|
| D | plat_console.c | 4 * SPDX-License-Identifier: BSD-3-Clause 29 * get_baudrate() - Get the baudrate form DTB. 30 * @dtb: Address of the Device Tree Blob (DTB). 34 static int32_t get_baudrate(void *dtb) in get_baudrate() argument 42 node = fdt_path_offset(dtb, "/secure-chosen"); in get_baudrate() 44 node = fdt_path_offset(dtb, "/chosen"); in get_baudrate() 46 ret = -FDT_ERR_NOTFOUND; in get_baudrate() 51 prop = fdt_getprop(dtb, node, "stdout-path", NULL); in get_baudrate() 53 ret = -FDT_ERR_NOTFOUND; in get_baudrate() 60 ret = -FDT_ERR_NOTFOUND; in get_baudrate() [all …]
|
| /external/trusty/arm-trusted-firmware/plat/qemu/qemu/ |
| D | qemu_helpers.c | 4 * SPDX-License-Identifier: BSD-3-Clause 20 * Currently OP-TEE does not support reading DTBs from Secure memory 36 void *dtb = (void *)config_base; in qemu_set_tee_fw_info() local 41 offs = fdtw_find_or_add_subnode(dtb, 0, "tpm-event-log"); in qemu_set_tee_fw_info() 43 ERROR("Failed to add node tpm-event-log %d\n", offs); in qemu_set_tee_fw_info() 47 if (fdt_appendprop(dtb, offs, "compatible", compatible, in qemu_set_tee_fw_info() 49 return -1; in qemu_set_tee_fw_info() 52 err = fdt_setprop(dtb, offs, DTB_PROP_HW_SM_LOG_ADDR, &sec_base, 8); in qemu_set_tee_fw_info() 58 err = fdt_setprop(dtb, offs, DTB_PROP_HW_LOG_SIZE, &sz, 4); in qemu_set_tee_fw_info() 69 * Write the Event Log address and its size in the DTB. [all …]
|
| /external/trusty/arm-trusted-firmware/common/ |
| D | fdt_wrappers.c | 2 * Copyright (c) 2018-2023, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 22 * Read cells from a given property of the given node. Any number of 32-bit 26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument 32 assert(dtb != NULL); in fdt_read_uint32_array() 38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array() 40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array() 41 return -FDT_ERR_NOTFOUND; in fdt_read_uint32_array() 47 return -FDT_ERR_BADVALUE; in fdt_read_uint32_array() 57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument [all …]
|
| D | fdt_fixup.c | 2 * Copyright (c) 2016-2022, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 13 * is used by the secure world, so that non-secure software avoids using 39 * the same execution state (AArch32/AArch64) as TF-A. 40 * Kernels running in AArch32 on an AArch64 TF-A should use PSCI v0.2. 51 * dt_add_psci_node() - Add a PSCI node into an existing device tree 62 * Return: 0 on success, -1 otherwise. 75 return -1; in dt_add_psci_node() 78 return -1; in dt_add_psci_node() 79 if (append_psci_compatible(fdt, offs, "arm,psci-1.0")) in dt_add_psci_node() [all …]
|
| /external/arm-trusted-firmware/include/common/ |
| D | fdt_wrappers.h | 2 * Copyright (c) 2018-2021, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 17 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, 19 uint32_t fdt_read_uint32_default(const void *dtb, int node, 21 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, 23 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, 25 int fdtw_read_string(const void *dtb, int node, const char *prop, 27 int fdtw_read_uuid(const void *dtb, int node, const char *prop, 29 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop, 31 int fdtw_read_bytes(const void *dtb, int node, const char *prop, [all …]
|
| /external/trusty/arm-trusted-firmware/include/common/ |
| D | fdt_wrappers.h | 2 * Copyright (c) 2018-2023, Arm Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 18 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, 20 uint32_t fdt_read_uint32_default(const void *dtb, int node, 22 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, 24 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, 26 int fdtw_read_string(const void *dtb, int node, const char *prop, 28 int fdtw_read_uuid(const void *dtb, int node, const char *prop, 30 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop, 32 int fdtw_read_bytes(const void *dtb, int node, const char *prop, [all …]
|
| /external/trusty/arm-trusted-firmware/plat/qemu/qemu_sbsa/ |
| D | sbsa_sip_svc.c | 4 * SPDX-License-Identifier: BSD-3-Clause 38 void read_platform_config_from_dt(void *dtb) in read_platform_config_from_dt() argument 57 node = fdt_path_offset(dtb, "/intc"); in read_platform_config_from_dt() 62 data = fdt_getprop(dtb, node, "reg", NULL); in read_platform_config_from_dt() 67 err = fdt_get_reg_props_by_index(dtb, node, 0, &gicd_base, NULL); in read_platform_config_from_dt() 74 err = fdt_get_reg_props_by_index(dtb, node, 1, &gicr_base, NULL); in read_platform_config_from_dt() 83 node = fdt_path_offset(dtb, "/intc/its"); in read_platform_config_from_dt() 88 err = fdt_get_reg_props_by_index(dtb, node, 0, &gic_its_addr, NULL); in read_platform_config_from_dt() 96 void read_platform_version(void *dtb) in read_platform_version() argument 100 node = fdt_path_offset(dtb, "/"); in read_platform_version() [all …]
|
| /external/mesa3d/.gitlab-ci/bare-metal/ |
| D | fastboot.sh | 6 . "$SCRIPTS_DIR"/setup-test-env.sh 8 BM=$CI_PROJECT_DIR/install/bare-metal 11 if [ -z "$BM_SERIAL" ] && [ -z "$BM_SERIAL_SCRIPT" ]; then 12 …echo "Must set BM_SERIAL OR BM_SERIAL_SCRIPT in your gitlab-runner config.toml [[runners]] environ… 20 if [ -z "$BM_POWERUP" ]; then 21 echo "Must set BM_POWERUP in your gitlab-runner config.toml [[runners]] environment" 27 if [ -z "$BM_POWERDOWN" ]; then 28 echo "Must set BM_POWERDOWN in your gitlab-runner config.toml [[runners]] environment" 33 if [ -z "$BM_FASTBOOT_SERIAL" ]; then 34 echo "Must set BM_FASTBOOT_SERIAL in your gitlab-runner config.toml [[runners]] environment" [all …]
|
| /external/trusty/arm-trusted-firmware/plat/rpi/rpi4/ |
| D | rpi4_bl31_setup.c | 2 * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 53 * the security state specified. BL33 corresponds to the non-secure image type 67 if (next_image_info->pc) { in bl31_plat_get_next_image_ep_info() 93 /* Cleared by the GPU if DTB address is valid. */ in rpi4_get_dtb_address() 97 WARN("Stub magic failure, DTB address unknown\n"); in rpi4_get_dtb_address() 115 * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before 132 /* LOCAL_PRESCALER; divide-by (0x80000000 / register_val) == 1 */ in bl31_early_platform_setup2() 151 * r1 = machine type number, optional in DT-only platforms (~0 if so) in bl31_early_platform_setup2() 154 VERBOSE("rpi4: Preparing to boot 32-bit Linux kernel\n"); in bl31_early_platform_setup2() [all …]
|
| /external/arm-trusted-firmware/plat/rpi/rpi4/ |
| D | rpi4_bl31_setup.c | 2 * Copyright (c) 2015-2019, ARM Limited and Contributors. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 53 * the security state specified. BL33 corresponds to the non-secure image type 67 if (next_image_info->pc) { in bl31_plat_get_next_image_ep_info() 93 /* Cleared by the GPU if DTB address is valid. */ in rpi4_get_dtb_address() 97 WARN("Stub magic failure, DTB address unknown\n"); in rpi4_get_dtb_address() 115 * parameters passed by the calling EL (S-EL1 in BL2 & EL3 in BL1) before 132 /* LOCAL_PRESCALER; divide-by (0x80000000 / register_val) == 1 */ in bl31_early_platform_setup2() 151 * r1 = machine type number, optional in DT-only platforms (~0 if so) in bl31_early_platform_setup2() 154 VERBOSE("rpi4: Preparing to boot 32-bit Linux kernel\n"); in bl31_early_platform_setup2() [all …]
|
| /external/trusty/arm-trusted-firmware/lib/fconf/ |
| D | fconf_dyn_cfg_getter.c | 2 * Copyright (c) 2019-2023, Arm Limited. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 41 dtb_info->config_addr = config_addr; in set_config_info() 42 dtb_info->secondary_config_addr = secondary_config_addr; in set_config_info() 43 dtb_info->config_max_size = config_max_size; in set_config_info() 44 dtb_info->config_id = config_id; in set_config_info() 52 /* Positions index to the proper config-id */ in dyn_cfg_dtb_info_get_index() 64 /* Positions index to the proper config-id */ in dyn_cfg_dtb_info_getter() 82 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local 85 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry() [all …]
|
| D | fconf_cot_getter.c | 2 * Copyright (c) 2020-2023, Arm Limited. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 50 * 1. Certificates are validated using nv-cntr and pk 68 * update_parent_auth_data() - Update authentication data structure 80 auth_param_desc_t *auth_data = &auth_desc->authenticated_data[0]; in update_parent_auth_data() 97 return -1; in update_parent_auth_data() 106 return -1; in update_parent_auth_data() 113 * get_auth_param_type_desc() - Get pointer of authentication parameter 130 *type_desc = img_auth_method->param.sig.pk; in get_auth_param_type_desc() 135 *type_desc = img_auth_method->param.hash.hash; in get_auth_param_type_desc() [all …]
|
| /external/arm-trusted-firmware/lib/fconf/ |
| D | fconf_dyn_cfg_getter.c | 2 * Copyright (c) 2019-2020, Arm Limited. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 38 dtb_info->config_addr = config_addr; in set_config_info() 39 dtb_info->config_max_size = config_max_size; in set_config_info() 40 dtb_info->config_id = config_id; in set_config_info() 47 /* Positions index to the proper config-id */ in dyn_cfg_dtb_info_getter() 65 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local 68 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry() 70 * function, Below check is present to avoid re-population of in fconf_populate_dtb_registry() 77 uint32_t config_max_size = fdt_totalsize(dtb); in fconf_populate_dtb_registry() [all …]
|
| D | fconf_cot_getter.c | 4 * SPDX-License-Identifier: BSD-3-Clause 48 * 1. Certificates are validated using nv-cntr and pk 66 * update_parent_auth_data() - Update authentication data structure 78 auth_param_desc_t *auth_data = &auth_desc->authenticated_data[0]; in update_parent_auth_data() 95 return -1; in update_parent_auth_data() 104 return -1; in update_parent_auth_data() 111 * get_auth_param_type_desc() - Get pointer of authentication parameter 128 *type_desc = img_auth_method->param.sig.pk; in get_auth_param_type_desc() 133 *type_desc = img_auth_method->param.hash.hash; in get_auth_param_type_desc() 136 return -1; in get_auth_param_type_desc() [all …]
|
| /external/mesa3d/.gitlab-ci/container/ |
| D | baremetal_build.sh | 3 set -e 4 set -o xtrace 6 # Fetch the arm-built rootfs image and unpack it in our x86_64 container (saves 10 if curl -X HEAD -s "${ARTIFACTS_PREFIX}/${FDO_UPSTREAM_REPO}/${ARTIFACTS_SUFFIX}/${arch}/done"; then 16 curl -L --retry 4 -f --retry-all-errors --retry-delay 60 \ 17 "${ARTIFACTS_URL}"/lava-rootfs.tar.zst -o rootfs.tar.zst 18 mkdir -p /rootfs-"$arch" 19 tar -C /rootfs-"$arch" '--exclude=./dev/*' --zstd -xf rootfs.tar.zst 23 mkdir -p /baremetal-files 24 pushd /baremetal-files [all …]
|
| /external/autotest/utils/ |
| D | emulator_manager.py | 2 # Use of this source code is governed by a BSD-style license that can be 7 arm emulator kernel.dtb (or another dtb file) must also be in imagedir. 23 """Bad port, missing artifact or non-existant imagedir.""" 40 run('test -f %s' % os.path.join(imagedir, 'system.img')) 55 @return: Bool - True if emulator stops. 69 """Detect a dtb file in the image directory 71 @return: Path to dtb file or None. 73 cmd_result = self.run('find "%s" -name "*.dtb"' % self.imagedir) 74 dtb = cmd_result.stdout.split('\n')[0] 75 return dtb.strip() or None [all …]
|