/trusty/kernel/platform/generic-arm64/ |
D | smc_service_access_policy.c | 76 paddr_t paddr = request->params[2]; in smc_test_request_check() local 77 if (!paddr || !trusty_uuid_dma_is_allowed(uuid, paddr)) { in smc_test_request_check()
|
/trusty/kernel/lib/sm/ |
D | shared_mem.c | 81 paddr_t paddr; in sm_mem_compat_get_vmm_obj() local 89 paddr = (paddr_t)ns_paddr; in sm_mem_compat_get_vmm_obj() 90 if (paddr != ns_paddr) { in sm_mem_compat_get_vmm_obj() 107 obj->page_runs[0].paddr = paddr; in sm_mem_compat_get_vmm_obj() 229 &frag_info, i, &obj->ext_mem_obj.page_runs[i].paddr, in sm_mem_get_vmm_obj()
|
D | sm.c | 401 paddr_t paddr = round_down(lk_boot_args[1], PAGE_SIZE); in sm_init() local 406 PAGE_SIZE_SHIFT, paddr, 0, in sm_init()
|
/trusty/hardware/nxp/app/hwcrypto/ |
D | caam.c | 106 writel((uint32_t)pmem.paddr + offsetof(struct caam_job_rings, in), in setup_job_rings() 108 writel((uint32_t)pmem.paddr + offsetof(struct caam_job_rings, out), in setup_job_rings() 125 job_pa = (uint32_t)pmem.paddr; in run_job() 279 kmod_pa = (uint32_t)pmem.paddr; in caam_decap_blob() 287 blob_pa = (uint32_t)pmem.paddr; in caam_decap_blob() 294 plain_pa = (uint32_t)pmem.paddr; in caam_decap_blob() 336 kmod_pa = (uint32_t)pmem.paddr; in caam_gen_blob() 343 plain_pa = (uint32_t)pmem.paddr; in caam_gen_blob() 351 blob_pa = (uint32_t)pmem.paddr; in caam_gen_blob() 395 key_pa = (uint32_t)pmem.paddr; in caam_aes_op() [all …]
|
/trusty/kernel/lib/extmem/ |
D | external_memory.c | 129 paddr_t* paddr, in ext_mem_obj_get_page() argument 151 *paddr = ext_obj->page_runs[index].paddr + page_offset; in ext_mem_obj_get_page() 154 offset, index, ext_obj->page_run_count, *paddr, *paddr_size); in ext_mem_obj_get_page()
|
/trusty/kernel/lib/extmem/include/lib/extmem/ |
D | extmem.h | 58 paddr_t paddr; member 199 paddr_t* paddr,
|
/trusty/hardware/nxp/platform/imx/ |
D | platform.c | 92 paddr_t paddr, in generic_arm64_map_regs() argument 98 vmm_get_kernel_aspace(), name, size, &vaddrp, 0, paddr, in generic_arm64_map_regs()
|
/trusty/kernel/include/uapi/uapi/ |
D | mm.h | 105 uint64_t paddr; member
|
/trusty/kernel/lib/trusty/ |
D | syscall.c | 379 paddr_t paddr; in sys_prepare_dma() local 382 &paddr, &paddr_size); in sys_prepare_dma() 387 kpmem.paddr = paddr; in sys_prepare_dma()
|
D | trusty_app.c | 321 paddr_t paddr) { in trusty_app_dma_is_allowed_locked() argument 340 paddr); in trusty_app_dma_is_allowed_locked() 345 if (paddr >= prepared_paddr && paddr <= prepared_paddr_end) { in trusty_app_dma_is_allowed_locked() 353 TRACEF("paddr 0x%" PRIxPADDR " is not valid for dma\n", paddr); in trusty_app_dma_is_allowed_locked() 357 bool trusty_app_dma_is_allowed(const struct trusty_app* app, paddr_t paddr) { in trusty_app_dma_is_allowed() argument 360 res = trusty_app_dma_is_allowed_locked(app, paddr); in trusty_app_dma_is_allowed() 688 bool trusty_uuid_dma_is_allowed(const struct uuid* uuid, paddr_t paddr) { in trusty_uuid_dma_is_allowed() argument 693 res = trusty_app_dma_is_allowed_locked(app, paddr); in trusty_uuid_dma_is_allowed()
|
D | tipc_virtio_dev.c | 200 paddr_t* paddr, in tipc_ext_mem_get_page() argument 203 return tem->ext_mem->ops->get_page(tem->ext_mem, offset, paddr, paddr_size); in tipc_ext_mem_get_page()
|
/trusty/kernel/lib/trusty/include/lib/trusty/ |
D | trusty_app.h | 308 bool trusty_app_dma_is_allowed(const struct trusty_app* app, paddr_t paddr); 318 bool trusty_uuid_dma_is_allowed(const struct uuid* uuid, paddr_t paddr);
|
/trusty/user/base/lib/smc/tests/ |
D | smc_test.c | 250 ASSERT_NE(pmem.paddr, 0); in TEST_F() 253 request.params[2] = pmem.paddr; in TEST_F() 262 ASSERT_EQ(response.params[2], pmem.paddr); in TEST_F()
|
/trusty/user/app/sample/manifest-test/ |
D | manifest_test.c | 55 ASSERT_EQ(phy_addr, pmem.paddr); in compare_memory_map()
|
/trusty/user/base/lib/hwasan/test/ |
D | hwasan_test.c | 296 ASSERT_EQ(pmem.paddr, MEM_MAP_ADDR); in TEST()
|