Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 29) sorted by relevance

12

/optee_os/core/arch/arm/plat-k3/drivers/
H A Dsa2ul.c49 uint32_t permissions[FWL_MAX_PRIVID_SLOTS] = { }; in sa2ul_init() local
75 * to do additional setup for access permissions below. in sa2ul_init()
83 &control, permissions, in sa2ul_init()
92 permissions[0] = (FW_WILDCARD_PRIVID << 16) | FW_NON_SECURE; in sa2ul_init()
94 control, permissions, in sa2ul_init()
112 &control, permissions, in sa2ul_init()
123 permissions[num_perm++] = (FW_BIG_ARM_PRIVID << 16) | FW_SECURE_ONLY; in sa2ul_init()
128 permissions[num_perm++] = (FW_TIFS_PRIVID << 16) | FW_NON_SECURE; in sa2ul_init()
131 control, permissions, in sa2ul_init()
H A Dti_sci_protocol.h157 * struct ti_sci_msg_req_fwl_set_firewall_region - Set firewall permissions
169 * @permissions: Contents of the firewall PERMISSION register to set
179 uint32_t permissions[FWL_MAX_PRIVID_SLOTS]; member
189 * struct ti_sci_msg_req_fwl_get_firewall_region - Retrieve firewall permissions
210 * firewall permissions
224 * @permissions: Contents of the firewall PERMISSION registers
234 uint32_t permissions[FWL_MAX_PRIVID_SLOTS]; member
H A Dti_sci.h56 * @permissions: Contents of the firewall PERMISSION register to set
64 const uint32_t permissions[FWL_MAX_PRIVID_SLOTS],
79 * @permissions: Contents of the firewall PERMISSION register
87 uint32_t permissions[FWL_MAX_PRIVID_SLOTS],
H A Dti_sci.c207 const uint32_t permissions[FWL_MAX_PRIVID_SLOTS], in ti_sci_set_fwl_region()
230 req.permissions[i] = permissions[i]; in ti_sci_set_fwl_region()
243 uint32_t permissions[FWL_MAX_PRIVID_SLOTS], in ti_sci_get_fwl_region()
271 permissions[i] = resp.permissions[i]; in ti_sci_get_fwl_region()
/optee_os/core/drivers/crypto/caam/include/
H A Dcaam_hal_sm.h67 * Open all Secure Memory Permissions
80 * @grp1_perm Group 1 Permissions
81 * @grp2_perm Group 2 Permissions
/optee_os/core/arch/arm/include/
H A Dffa.h146 /* Memory access permissions: Read-write */
149 /* Memory access permissions: executable */
152 /* Memory access permissions mask */
274 /* Memory access permissions descriptor */
/optee_os/.github/workflows/
H A Dstales.yml6 permissions:
H A Dnotify.yml13 permissions:
H A Dci.yml3 permissions:
/optee_os/core/drivers/
H A Dtzc380.c110 * permissions, with or without security inversion.
111 * Check TZC380 "2.2.5 Region security permissions" for
H A Dtzc400.c263 * permissions.
H A Dstm32_tamp.c375 * TAMP backup registers access permissions
913 * access permissions based on the secure status of the accesser. in parse_bkpregs_dt_conf()
/optee_os/lib/libutils/compiler-rt/
H A DLICENSE.TXT28 exercising permissions granted by this License.
155 risks associated with Your exercise of permissions under this License.
204 See the License for the specific language governing permissions and
/optee_os/lib/libmbedtls/mbedtls/
H A DLICENSE32 exercising permissions granted by this License.
159 risks associated with Your exercise of permissions under this License.
208 See the License for the specific language governing permissions and
335 this License, whose permissions for other licensees extend to the
/optee_os/core/arch/arm/kernel/
H A Dsecure_partition.c899 /* Check instruction and data access permissions */ in handle_fdt_load_relative_mem_regions()
911 EMSG("Invalid memory access permissions"); in handle_fdt_load_relative_mem_regions()
971 * mapped and only need to set the correct permissions. in handle_fdt_load_relative_mem_regions()
1034 /* Check instruction and data access permissions */ in handle_fdt_dev_regions()
1043 EMSG("Invalid memory access permissions"); in handle_fdt_dev_regions()
1223 * - Instruction/data access permissions in handle_fdt_mem_regions()
1237 /* Check instruction and data access permissions */ in handle_fdt_mem_regions()
1249 EMSG("Invalid memory access permissions"); in handle_fdt_mem_regions()
H A Dentry_a32.S986 /* Enable Access flag (simplified access permissions) and TEX remap */
/optee_os/core/drivers/crypto/caam/
H A Dcaam_sm.c148 * If any group permissions are set, need to enable Secure World MID in caam_sm_set_access_perm()
/optee_os/core/crypto/
H A Daes-gcm-ghash-tbl.c18 * See the License for the specific language governing permissions and
/optee_os/core/include/mm/
H A Dtee_pager.h120 * @flags: TEE_MATTR_U* flags describing permissions of the region
/optee_os/lib/libutee/include/
H A Dpta_system.h107 * Different parts of an TA binary file needs different permissions.
/optee_os/core/include/drivers/
H A Dtzc400.h177 /* Macros for setting Region ID access permissions based on NSAID */
/optee_os/lib/libutee/
H A Dtee_api.c129 * to do here. If there's security/permissions in map_tmp_param()
/optee_os/ldelf/
H A Dta_elf.c669 * Permissions needs to be merged. The offset must have in adjust_segments()
685 * Merge the segments and their permissions. in adjust_segments()
/optee_os/core/kernel/
H A Dtee_ta_manager.c380 * permissions regarding memory reference parameters. in check_params()
/optee_os/core/mm/
H A Dvm.c775 * this case we change the permissions on an in vm_set_prot()

12