Home
last modified time | relevance | path

Searched full:firmware (Results 1 – 25 of 50) sorted by relevance

12

/optee_os/lib/libutee/include/
H A Dremoteproc_pta.h20 /* Hardware capability: firmware format */
52 * Get Platform firmware loader service capabilities.
55 * [out] params[1].value.a: Firmware format (PTA_RPROC_HWCAP_FMT_*)
61 * Firmware loading.
66 * [in] params[1].memref: Loadable firmware image
74 * save the whole firmware image. Upon segment load, a successful completion
89 * to clear a memory on the remote firmware load.
101 * Firmware start.
103 * Start up a successfully loaded remote processor firmware.
110 * Firmware stop.
[all …]
/optee_os/ta/remoteproc/src/
H A Delf_parser.h14 * struct resource_table - firmware resource table header
22 * If needed, the remote processor firmware should contain this table
55 * @fw: Firmware ELF file image
56 * @size: Byte size of firmware ELF file image
63 * @fw: Firmware ELF file image
64 * @fw_size: Firmware ELF file image byte size
65 * @load_seg: Callback for loading a firmware image segment into device memory
79 * @fw: Firmware ELF file image
80 * @fw_size: Firmware ELF file image byte size
H A Dremoteproc_core.c49 * | Firmware |
54 * | Firmware |
59 /* Firmware state */
123 * struct remoteproc_fw_hdr - firmware header
128 * @img_len: Firmware image chunk byte length
163 * struct remoteproc_context - firmware context
166 * @tlvs: Location of a secure copy of the firmware TLVs
167 * @tlvs_sz: Byte size of the firmware TLVs blob.
168 * @fw_img: Firmware image
169 * @fw_img_sz: Byte size of the firmware image
[all …]
H A Duser_ta_header_defines.h27 #define TA_DESCRIPTION "remote processor firmware management"
H A Delf_parser.c25 EMSG("Invalid firmware address"); in e32_parse_ehdr()
148 EMSG("Unsupported firmware version %"PRId32, in e32_parser_find_rsc_table()
/optee_os/core/lib/scmi-server/
H A Dsub.mk1 # SCMI server library is built from SCP-firmware source tree.
2 # The firmware is made of a framework, a product and modules.
3 # Only modules used by firmware must be built, as stated by
4 # CFG_SCPFW_MOD_* switches. SCP-firmware needs a C source and
25 # SCP-firmware cmake configuration generates header fwk_module_idx.h and
26 # source files fwk_module_list.c needed for scp-firmware compilation.
34 # compile any source file with CMake, we only generate some SCP-firmware
47 depends-fwk_module_list = $(scpfw-path)/product/$(scpfw-product)/fw/Firmware.cmake $(conf-file)
70 # The below directives will be removed once SCP-firmware pull requests
110 # Include SCP-firmware make files
H A Dconf.mk1 # Configuration switches for SCP-firmware:
3 # CFG_SCMI_SCPFW Boolean switch, embeds SCP-firmware SCMI stack when enabled.
4 # CFG_SCMI_SCPFW_PRODUCT Name of the SCP-firmware product to build.
5 # CFG_SCP_FIRMWARE Directory path to SCP-firmware source tree
6 # CFG_SCPFW_LOG_LEVEL SCP-firmware log level
7 # CFG_SCPFW_MOD_x Boolean switch, embeds SCP-firmware module x when enabled
H A Dconf-optee-stm32mp2.mk11 # Info level is sufficient for scp-firmware
H A Dscmi_server.c17 * OP-TEE helper function exported to SCP-firmware
/optee_os/ta/remoteproc/include/
H A Dta_remoteproc.h19 * Authentication of the firmware and load in the remote processor memory.
22 * [in] params[1].memref: buffer containing the image of the firmware
55 * Get remote processor firmware core dump. If found, return either
65 * Release remote processor firmware images and associated resources.
67 * the firmware images (TA_RPROC_CMD_LOAD_FW) and the starting of the remote
/optee_os/core/lib/scmi-server/include/
H A Dscmi_agent_configuration.h66 * reserved as the ID of the SCMI server itself in SCP-firmware.
76 * struct scpfw_config - SCP firmware configuration root node
86 /* Get the platform configuration data for the SCP firmware */
89 /* Release resources allocated to create SCP-firmware configuration data */
/optee_os/.github/workflows/
H A Dci.yml226 - name: arm SCP firmware
228 function download_scp_firmware() { git clone --single-branch https://git.gitlab.arm.com/firmware/SCP-firmware.git $HOME/scp-firmware && git -C $HOME/scp-firmware checkout 0d48080449e3bd3e5218a31c5f24a6068004c5af || (rm -rf $HOME/scp-firmware ; echo Nervermind); }
231 if [ -d $HOME/scp-firmware ]; then _make PLATFORM=vexpress-qemu_armv8a CFG_SCMI_SCPFW=y CFG_SCP_FIRMWARE=$HOME/scp-firmware; fi
232 if [ -d $HOME/scp-firmware ]; then _make PLATFORM=stm32mp2 CFG_SCP_FIRMWARE=$HOME/scp-firmware; f
[all...]
/optee_os/core/arch/arm/plat-k3/drivers/
H A Dti_sci_protocol.h71 * struct ti_sci_msg_version_req - Request for firmware version information
81 * struct ti_sci_msg_resp_version - Response for firmware version information
83 * @firmware_description: String describing the firmware
84 * @firmware_revision: Firmware revision
85 * @abi_major: Major version of the ABI that firmware supports
86 * @abi_minor: Minor version of the ABI that firmware supports
87 * @sub_version: Sub-version number of the firmware
88 * @patch_version: Patch-version number of the firmware.
/optee_os/core/arch/arm/include/scmi/
H A Dscmi_server.h35 * Get SCP-firmware channel device ID from the client channel ID.
38 * @handle: Output SCP-firmware device ID for the target SCMI mailbox
/optee_os/core/include/drivers/
H A Dstm32_remoteproc.h19 * Return a pointer to the rproc firmware handle related to @rproc_id or NULL.
78 /* Return true is secure loading of remoteproc firmware is enabled */
/optee_os/core/pta/bcm/
H A Delog.c43 * Load nitro firmware memory
47 * [in] value[2].a: Firmware image size
77 /* Check if firmware file size exceeds reserved memory size */ in pta_elog_load_nitro_fw()
/optee_os/core/pta/stm32mp/
H A Dremoteproc_pta.c32 * Firmware states
33 * REMOTEPROC_OFF: firmware is off
34 * REMOTEPROC_ON: firmware is running
63 * protected image only, so that firmware image can be loaded from in rproc_pta_capabilities()
/optee_os/scripts/
H A Dsign_rproc_fw.py68 # | Firmware |
73 # | Firmware |
299 description='Sign a remote processor firmware loadable by OP-TEE.',
305 help='Name of firmware input file ' +
308 help='Name of the signed firmware output file')
403 # Firmware image
/optee_os/core/arch/arm/plat-rockchip/
H A Dplatform.c35 * Region 0 is assigned for Trusted-Firmware memory, so use in platform_init()
/optee_os/core/kernel/
H A Dtransfer_list.c7 * Transfer list library compliant with the Firmware Handoff specification at:
22 * Compliant with 2.4.6 of Firmware Handoff specification (v0.9).
121 * Compliant with 2.4.5 of Firmware Handoff specification (v0.9).
158 * Compliant with 2.4.6 of Firmware Handoff specification (v0.9).
198 * Compliant with 2.4.1 of Firmware Handoff specification (v0.9).
453 * Compliant with 2.4.3 of Firmware Handoff specification (v0.9).
509 * Compliant with 2.4.4 of Firmware Handoff specification (v0.9).
/optee_os/core/drivers/remoteproc/
H A Dstm32_remoteproc.c60 * @ns_loading: True if supports non-secure firmware loading, false otherwise
100 * The firmware is started by de-asserting the hold boot and in stm32_rproc_start()
418 * mechanism to map the memory in secure area for the firmware in stm32_rproc_probe()
/optee_os/core/tee/
H A Dtee_svc.c104 /* Trusted firmware version */
107 /* Trusted firmware version (binary value) */
110 /* Trusted firmware manufacturer name */
357 .name = "gpd.tee.firmware.implementation.version",
363 .name = "gpd.tee.firmware.implementation.binaryversion",
369 .name = "gpd.tee.firmware.manufacturer",
/optee_os/core/arch/arm/plat-rpi3/
H A Dplatform_config.h59 * 0x0840_0000 [ARM Trusted Firmware ] -
/optee_os/core/arch/arm/include/sm/
H A Dteesmc_opteed.h17 * only concerns the OP-TEE Dispatcher in ARM Trusted Firmware and OP-TEE
/optee_os/core/lib/libfdt/
H A DREADME.license26 including by proprietary or otherwise GPL-incompatible firmware or

12