Home
last modified time | relevance | path

Searched +full:- +full:- +full:enable +full:- +full:scp (Results 1 – 25 of 160) sorted by relevance

1234567

/external/arm-trusted-firmware/plat/arm/css/common/
Dcss_common.mk2 # Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
8 # By default, SCP images are needed by CSS platforms.
14 PLAT_INCLUDES += -Iinclude/plat/arm/css/common/aarch64
30 drivers/arm/css/scp/css_pm_scpi.c \
38 drivers/arm/css/scp/css_pm_scmi.c
48 $(eval $(call TOOL_ADD_IMG,scp_bl2u,--scp-fwu-cfg,FWU_))
52 BL2U_SOURCES += drivers/arm/css/scp/css_sds.c \
55 BL2_SOURCES += drivers/arm/css/scp/css_sds.c \
59 drivers/arm/css/scp/css_bom_bootloader.c \
[all …]
/external/trusty/arm-trusted-firmware/plat/arm/css/common/
Dcss_common.mk2 # Copyright (c) 2015-2022, Arm Limited and Contributors. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
8 # By default, SCP images are needed by CSS platforms.
14 PLAT_INCLUDES += -Iinclude/plat/arm/css/common/aarch64
30 drivers/arm/css/scp/css_pm_scpi.c \
39 drivers/arm/css/scp/css_pm_scmi.c
49 $(eval $(call TOOL_ADD_IMG,scp_bl2u,--scp-fwu-cfg,FWU_))
53 BL2U_SOURCES += drivers/arm/css/scp/css_sds.c \
56 BL2_SOURCES += drivers/arm/css/scp/css_sds.c \
60 drivers/arm/css/scp/css_bom_bootloader.c \
[all …]
/external/trusty/arm-trusted-firmware/docs/plat/
Dsocionext-uniphier.rst4 Socionext UniPhier Armv8-A SoCs use Trusted Firmware-A (TF-A) as the secure
8 image from a non-volatile storage to the on-chip SRAM, and jumps over to it.
9 TF-A provides a special mode, BL2-AT-EL3, which enables BL2 to execute at EL3.
10 It is useful for platforms with non-TF-A boot ROM, like UniPhier. Here, a
14 `UniPhier BL`_. This loader runs in the on-chip SRAM, initializes the DRAM,
16 of TF-A run in DRAM.
24 the BL2 validity in a different way; BL2 is GZIP-compressed and appended to
31 ---------
35 This is hard-wired ROM, so never corrupted. It loads the UniPhier BL (with
36 compressed-BL2 appended) into the on-chip SRAM. If the SoC fuses are blown,
[all …]
/external/arm-trusted-firmware/docs/plat/
Dsocionext-uniphier.rst4 Socionext UniPhier Armv8-A SoCs use Trusted Firmware-A (TF-A) as the secure
8 image from a non-volatile storage to the on-chip SRAM, and jumps over to it.
9 TF-A provides a special mode, BL2-AT-EL3, which enables BL2 to execute at EL3.
10 It is useful for platforms with non-TF-A boot ROM, like UniPhier. Here, a
14 `UniPhier BL`_. This loader runs in the on-chip SRAM, initializes the DRAM,
16 of TF-A run in DRAM.
24 the BL2 validity in a different way; BL2 is GZIP-compressed and appended to
31 ---------
35 This is hard-wired ROM, so never corrupted. It loads the UniPhier BL (with
36 compressed-BL2 appended) into the on-chip SRAM. If the SoC fuses are blown,
[all …]
/external/arm-trusted-firmware/docs/plat/arm/tc/
Dindex.rst4 Some of the features of TC platform referenced in TF-A include:
6 - A `System Control Processor <https://github.com/ARM-software/SCP-firmware>`_
8 processors. The RAM firmware for SCP is included in the TF-A FIP and is
9 loaded by AP BL2 from FIP in flash to SRAM for copying by SCP (SCP has access
11 - GICv4
12 - Trusted Board Boot
13 - SCMI
14 - MHUv2
17 (TARGET_PLATFORM=1) platforms w.r.t to TF-A is the CPUs supported. TC0 has
23 -------------
[all …]
/external/arm-trusted-firmware/plat/socionext/synquacer/
Dsq_psci.c2 * Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
30 * SCP takes care of powering up parent power domains so we in sq_pwr_domain_on()
46 * Perform the common cluster specific operations i.e enable coherency in sq_pwr_domain_on_finisher_common()
60 /* Program the gic per-cpu distributor or re-distributor interface */ in sq_pwr_domain_on_finish()
63 /* Enable the gic cpu interface */ in sq_pwr_domain_on_finish()
87 * Ask the SCP to power down the appropriate components depending upon in sq_power_down_common()
151 /* Send the system reset request to the SCP */ in sq_system_reset()
155 ERROR("SQ System Reset: SCP error %u.\n", response); in sq_system_reset()
171 /* Enable PhysicalIRQ bit for NS world to wake the CPU */ in sq_cpu_standby()
Dplatform.mk2 # Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
12 # Enable workarounds for selected Cortex-A53 erratas.
14 # Enable SCMI support
21 PLAT_INCLUDES := -I$(PLAT_PATH)/include \
22 -I$(PLAT_PATH)/drivers/scpi \
23 -I$(PLAT_PATH)/drivers/mhu \
24 -Idrivers/arm/css/scmi \
25 -Idrivers/arm/css/scmi/vendor
47 $(PLAT_PATH)/drivers/scp/sq_scp.c
[all …]
/external/trusty/arm-trusted-firmware/docs/plat/arm/tc/
Dindex.rst4 Some of the features of TC platform referenced in TF-A include:
6 - A `System Control Processor <https://github.com/ARM-software/SCP-firmware>`_
8 processors. The RAM firmware for SCP is included in the TF-A FIP and is
9 loaded by AP BL2 from FIP in flash to SRAM for copying by SCP (SCP has access
11 - GICv4
12 - Trusted Board Boot
13 - SCMI
14 - MHUv2
16 The TF-A build is specified by the option `TARGET_PLATFORM` which represents
20 - TC0 has support for Cortex A510, Cortex A710 and Cortex X2. (Note TC0 is now deprecated)
[all …]
/external/arm-trusted-firmware/docs/plat/arm/
Darm-build-options.rst5 --------------------------
7 - ``ARM_BL31_IN_DRAM``: Boolean option to select loading of BL31 in TZC secured
13 - ``ARM_CONFIG_CNTACR``: boolean option to unlock access to the ``CNTBase<N>``
16 should match the frame used by the Non-Secure image (normally the Linux
19 - ``ARM_DISABLE_TRUSTED_WDOG``: boolean option to disable the Trusted Watchdog.
27 - ``ARM_LINUX_KERNEL_AS_BL33``: The Linux kernel expects registers x0-x3 to
37 - ``ARM_PLAT_MT``: This flag determines whether the Arm platform layer has to
38 cater for the multi-threading ``MT`` bit when accessing MPIDR. When this flag
40 MPIDR is set and access the bit-fields in MPIDR accordingly. Default value of
43 - ``ARM_RECOM_STATE_ID_ENC``: The PSCI1.0 specification recommends an encoding
[all …]
/external/trusty/arm-trusted-firmware/plat/socionext/synquacer/
Dsq_psci.c2 * Copyright (c) 2018-2022, ARM Limited and Contributors. All rights reserved.
4 * SPDX-License-Identifier: BSD-3-Clause
30 * SCP takes care of powering up parent power domains so we in sq_pwr_domain_on()
46 * Perform the common cluster specific operations i.e enable coherency in sq_pwr_domain_on_finisher_common()
60 /* Program the gic per-cpu distributor or re-distributor interface */ in sq_pwr_domain_on_finish()
63 /* Enable the gic cpu interface */ in sq_pwr_domain_on_finish()
87 * Ask the SCP to power down the appropriate components depending upon in sq_power_down_common()
155 /* Send the system reset request to the SCP */ in sq_system_reset()
159 ERROR("SQ System Reset: SCP error %u.\n", response); in sq_system_reset()
175 /* Enable PhysicalIRQ bit for NS world to wake the CPU */ in sq_cpu_standby()
/external/trusty/arm-trusted-firmware/docs/plat/arm/
Darm-build-options.rst5 --------------------------
7 - ``ARM_BL31_IN_DRAM``: Boolean option to select loading of BL31 in TZC secured
13 - ``ARM_CONFIG_CNTACR``: boolean option to unlock access to the ``CNTBase<N>``
16 should match the frame used by the Non-Secure image (normally the Linux
19 - ``ARM_FW_CONFIG_LOAD_ENABLE``: Boolean option to enable the loading of
25 - ``ARM_DISABLE_TRUSTED_WDOG``: boolean option to disable the Trusted Watchdog.
33 - ``ARM_LINUX_KERNEL_AS_BL33``: The Linux kernel expects registers x0-x3 to
43 - ``ARM_PLAT_MT``: This flag determines whether the Arm platform layer has to
44 cater for the multi-threading ``MT`` bit when accessing MPIDR. When this flag
46 MPIDR is set and access the bit-fields in MPIDR accordingly. Default value of
[all …]
/external/curl/docs/cmdline-opts/
Dcompressed-ssh.md1 ---
3 SPDX-License-Identifier: curl
4 Long: compressed-ssh
5 Help: Enable SSH compression
6 Protocols: SCP SFTP
8 Category: scp ssh
10 See-also:
11 - compressed
13 - --compressed-ssh sftp://example.com/
14 ---
[all …]
/external/arm-trusted-firmware/plat/allwinner/common/
Dallwinner-common.mk2 # Copyright (c) 2017-2021, ARM Limited and Contributors. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
13 PLAT_INCLUDES := -Iinclude/plat/arm/common/aarch64 \
14 -I${AW_PLAT}/common/include \
15 -I${AW_PLAT}/${PLAT}/include
36 # is not enabled or SCP firmware is not loaded, fall back to a simpler native
39 # If SCP firmware will always be present (or absent), the unused implementation
67 # Do not enable SPE (not supported on ARM v8.0).
70 # Do not enable SVE (not supported on ARM v8.0).
73 # Enable workarounds for Cortex-A53 errata. Allwinner uses at least r0p4.
[all …]
/external/trusty/arm-trusted-firmware/plat/brcm/board/stingray/src/
Dscp_utils.c2 * Copyright (c) 2017-2020, Broadcom
4 * SPDX-License-Identifier: BSD-3-Clause
20 #include <scp.h>
84 * First check if SCP patch has already been loaded in plat_bcm_bl2_plat_handle_scp_bl2()
91 INFO("SCP Patch is already active.\n"); in plat_bcm_bl2_plat_handle_scp_bl2()
114 * MCU patch stamps critical points in REG9 (debug test-point) in plat_bcm_bl2_plat_handle_scp_bl2()
123 ret = download_scp_patch((void *)scp_bl2_image_info->image_base, in plat_bcm_bl2_plat_handle_scp_bl2()
124 scp_bl2_image_info->image_size); in plat_bcm_bl2_plat_handle_scp_bl2()
128 VERBOSE("SCP Patch loaded OK.\n"); in plat_bcm_bl2_plat_handle_scp_bl2()
134 ERROR("SCP Patch could not initialize; error %d\n", in plat_bcm_bl2_plat_handle_scp_bl2()
[all …]
Dbrcm_pm_ops.c2 * Copyright (c) 2017 - 2020, Broadcom
4 * SPDX-License-Identifier: BSD-3-Clause
29 #define CORE_PWR_STATE(state) ((state)->pwr_domain_state[MPIDR_AFFLVL0])
31 ((state)->pwr_domain_state[MPIDR_AFFLVL1])
32 #define SYSTEM_PWR_STATE(state) ((state)->pwr_domain_state[MPIDR_AFFLVL2])
38 * On systems where participant CPUs are cache-coherent, we can use spinlocks
58 * SCP takes care of powering up parent power domains so we in brcm_pwr_domain_on()
85 * Perform the common cluster specific operations i.e enable coherency in brcm_pwr_domain_on_finish()
93 /* Program the gic per-cpu distributor or re-distributor interface */ in brcm_pwr_domain_on_finish()
96 /* Enable the gic cpu interface */ in brcm_pwr_domain_on_finish()
[all …]
/external/arm-trusted-firmware/plat/brcm/board/stingray/src/
Dscp_utils.c2 * Copyright (c) 2017-2020, Broadcom
4 * SPDX-License-Identifier: BSD-3-Clause
20 #include <scp.h>
84 * First check if SCP patch has already been loaded in plat_bcm_bl2_plat_handle_scp_bl2()
91 INFO("SCP Patch is already active.\n"); in plat_bcm_bl2_plat_handle_scp_bl2()
114 * MCU patch stamps critical points in REG9 (debug test-point) in plat_bcm_bl2_plat_handle_scp_bl2()
123 ret = download_scp_patch((void *)scp_bl2_image_info->image_base, in plat_bcm_bl2_plat_handle_scp_bl2()
124 scp_bl2_image_info->image_size); in plat_bcm_bl2_plat_handle_scp_bl2()
128 VERBOSE("SCP Patch loaded OK.\n"); in plat_bcm_bl2_plat_handle_scp_bl2()
134 ERROR("SCP Patch could not initialize; error %d\n", in plat_bcm_bl2_plat_handle_scp_bl2()
[all …]
Dbrcm_pm_ops.c2 * Copyright (c) 2017 - 2020, Broadcom
4 * SPDX-License-Identifier: BSD-3-Clause
29 #define CORE_PWR_STATE(state) ((state)->pwr_domain_state[MPIDR_AFFLVL0])
31 ((state)->pwr_domain_state[MPIDR_AFFLVL1])
32 #define SYSTEM_PWR_STATE(state) ((state)->pwr_domain_state[MPIDR_AFFLVL2])
38 * On systems where participant CPUs are cache-coherent, we can use spinlocks
58 * SCP takes care of powering up parent power domains so we in brcm_pwr_domain_on()
85 * Perform the common cluster specific operations i.e enable coherency in brcm_pwr_domain_on_finish()
93 /* Program the gic per-cpu distributor or re-distributor interface */ in brcm_pwr_domain_on_finish()
96 /* Enable the gic cpu interface */ in brcm_pwr_domain_on_finish()
[all …]
/external/arm-trusted-firmware/plat/arm/board/n1sdp/
Dplatform.mk2 # Copyright (c) 2018-2020, ARM Limited and Contributors. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
12 PLAT_INCLUDES := -I${N1SDP_BASE}/include
17 # GIC-600 configuration
41 FDT_SOURCES += fdts/${PLAT}-single-chip.dts \
42 fdts/${PLAT}-multi-chip.dts
44 # TF-A not required to load the SCP Images
61 # SCP during power management operations and for SCP RAM Firmware transfer.
67 # When building for systems with hardware-assisted coherency, there's no need to
71 # Enable the flag since N1SDP has a system level cache
/external/coreboot/src/vendorcode/cavium/include/bdk/libbdk-arch/
Dbdk-csrs-rst.h3 /* This file is auto-generated. Do not edit */
6 * Copyright (c) 2003-2017 Cavium Inc. (support@cavium.com). All rights
44 #include <bdk-minimal.h>
45 #include <libbdk-arch/bdk-csr.h>
76 * Enumerates the reasons for boot failure, returned to post-boot code
96 * RST Primary Boot-strap Method Enumeration
156 * RST MSI-X Vector Enumeration
157 * Enumerates the MSI-X interrupt vectors.
200 #if __BYTE_ORDER == __BIG_ENDIAN /* Word 0 - Big Endian */
202 uint32_t trusted : 1; /**< [ 15: 15] This was a trusted-mode boot. */
[all …]
/external/curl/docs/libcurl/opts/
DCURLOPT_REDIR_PROTOCOLS_STR.md1 ---
3 SPDX-License-Identifier: curl
7 See-also:
8 - CURLINFO_SCHEME (3)
9 - CURLOPT_DEFAULT_PROTOCOL (3)
10 - CURLOPT_PROTOCOLS (3)
11 - CURLOPT_PROTOCOLS_STR (3)
12 - CURLOPT_REDIR_PROTOCOLS (3)
14 - HTTP
15 Added-in: 7.85.0
[all …]
/external/trusty/arm-trusted-firmware/plat/allwinner/common/
Dallwinner-common.mk2 # Copyright (c) 2017-2021, ARM Limited and Contributors. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
13 PLAT_INCLUDES := -Iinclude/plat/arm/common/aarch64 \
14 -I${AW_PLAT}/common/include \
15 -I${AW_PLAT}/${PLAT}/include
37 # is not enabled or SCP firmware is not loaded, fall back to a simpler native
40 # If SCP firmware will always be present (or absent), the unused implementation
89 # Do not enable SPE (not supported on ARM v8.0).
92 # Do not enable SVE (not supported on ARM v8.0).
95 # Enable workarounds for Cortex-A53 errata. Allwinner uses at least r0p4.
[all …]
/external/trusty/arm-trusted-firmware/plat/marvell/armada/a8k/common/mss/
Dmss_bl2_setup.c4 * SPDX-License-Identifier: BSD-3-Clause
40 * - get the information about device id which is stored in CP0 registers
42 * - get the access to cp which is needed for loading fw for cp0/cp1
56 /* CCU window-0 should not be counted - it's already used */ in bl2_plat_mmap_init()
57 if (cfg_num > (MVEBU_CCU_MAX_WINS - 1)) { in bl2_plat_mmap_init()
59 return -1; in bl2_plat_mmap_init()
62 /* Enable required CCU windows in bl2_plat_mmap_init()
71 /* Enable required CCU windows */ in bl2_plat_mmap_init()
94 * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
95 * Return 0 on success, -1 otherwise.
[all …]
/external/arm-trusted-firmware/plat/marvell/armada/a8k/common/mss/
Dmss_bl2_setup.c4 * SPDX-License-Identifier: BSD-3-Clause
40 * - get the information about device id which is stored in CP0 registers
42 * - get the access to cp which is needed for loading fw for cp0/cp1
56 /* CCU window-0 should not be counted - it's already used */ in bl2_plat_mmap_init()
57 if (cfg_num > (MVEBU_CCU_MAX_WINS - 1)) { in bl2_plat_mmap_init()
59 return -1; in bl2_plat_mmap_init()
62 /* Enable required CCU windows in bl2_plat_mmap_init()
71 /* Enable required CCU windows */ in bl2_plat_mmap_init()
94 * Transfer SCP_BL2 from Trusted RAM using the SCP Download protocol.
95 * Return 0 on success, -1 otherwise.
[all …]
/external/trusty/arm-trusted-firmware/plat/arm/board/n1sdp/
Dplatform.mk2 # Copyright (c) 2018-2023, Arm Limited. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
12 PLAT_INCLUDES := -I${N1SDP_BASE}/include
21 # GIC-600 configuration
59 FDT_SOURCES += fdts/${PLAT}-single-chip.dts \
60 fdts/${PLAT}-multi-chip.dts \
70 $(eval $(call TOOL_ADD_PAYLOAD,${FW_CONFIG},--fw-config,${FW_CONFIG}))
72 $(eval $(call TOOL_ADD_PAYLOAD,${TB_FW_CONFIG},--tb-fw-config,${TB_FW_CONFIG}))
74 $(eval $(call TOOL_ADD_PAYLOAD,${NT_FW_CONFIG},--nt-fw-config,${NT_FW_CONFIG}))
81 $(eval $(call TOOL_ADD_PAYLOAD,${N1SDP_TOS_FW_CONFIG},--tos-fw-config,${N1SDP_TOS_FW_CONFIG}))
[all …]
/external/arm-trusted-firmware/plat/arm/board/juno/
Dplatform.mk2 # Copyright (c) 2013-2021, ARM Limited and Contributors. All rights reserved.
4 # SPDX-License-Identifier: BSD-3-Clause
29 # SCP during power management operations and for SCP RAM Firmware transfer.
32 PLAT_INCLUDES := -Iplat/arm/board/juno/include
37 # Flag to enable support for AArch32 state on JUNO
42 # Flag to enable support for TZMP1 on JUNO
122 ./lib/romlib/gen_combined_bl1_romlib.sh -o bl1_romlib.bin $(BUILD_PLAT)
124 # Errata workarounds for Cortex-A53:
134 # Errata workarounds for Cortex-A57:
147 # Errata workarounds for Cortex-A72:
[all …]

1234567