| /optee_os/core/arch/arm/plat-k3/drivers/ |
| H A D | sa2ul.c | 49 uint32_t permissions[FWL_MAX_PRIVID_SLOTS] = { }; in sa2ul_init() local 75 * to do additional setup for access permissions below. in sa2ul_init() 83 &control, permissions, in sa2ul_init() 92 permissions[0] = (FW_WILDCARD_PRIVID << 16) | FW_NON_SECURE; in sa2ul_init() 94 control, permissions, in sa2ul_init() 112 &control, permissions, in sa2ul_init() 123 permissions[num_perm++] = (FW_BIG_ARM_PRIVID << 16) | FW_SECURE_ONLY; in sa2ul_init() 128 permissions[num_perm++] = (FW_TIFS_PRIVID << 16) | FW_NON_SECURE; in sa2ul_init() 131 control, permissions, in sa2ul_init()
|
| H A D | ti_sci_protocol.h | 157 * struct ti_sci_msg_req_fwl_set_firewall_region - Set firewall permissions 169 * @permissions: Contents of the firewall PERMISSION register to set 179 uint32_t permissions[FWL_MAX_PRIVID_SLOTS]; member 189 * struct ti_sci_msg_req_fwl_get_firewall_region - Retrieve firewall permissions 210 * firewall permissions 224 * @permissions: Contents of the firewall PERMISSION registers 234 uint32_t permissions[FWL_MAX_PRIVID_SLOTS]; member
|
| H A D | ti_sci.h | 56 * @permissions: Contents of the firewall PERMISSION register to set 64 const uint32_t permissions[FWL_MAX_PRIVID_SLOTS], 79 * @permissions: Contents of the firewall PERMISSION register 87 uint32_t permissions[FWL_MAX_PRIVID_SLOTS],
|
| H A D | ti_sci.c | 207 const uint32_t permissions[FWL_MAX_PRIVID_SLOTS], in ti_sci_set_fwl_region() 230 req.permissions[i] = permissions[i]; in ti_sci_set_fwl_region() 243 uint32_t permissions[FWL_MAX_PRIVID_SLOTS], in ti_sci_get_fwl_region() 271 permissions[i] = resp.permissions[i]; in ti_sci_get_fwl_region()
|
| /optee_os/core/drivers/crypto/caam/include/ |
| H A D | caam_hal_sm.h | 67 * Open all Secure Memory Permissions 80 * @grp1_perm Group 1 Permissions 81 * @grp2_perm Group 2 Permissions
|
| /optee_os/core/arch/arm/include/ |
| H A D | ffa.h | 146 /* Memory access permissions: Read-write */ 149 /* Memory access permissions: executable */ 152 /* Memory access permissions mask */ 274 /* Memory access permissions descriptor */
|
| /optee_os/.github/workflows/ |
| H A D | stales.yml | 6 permissions:
|
| H A D | notify.yml | 13 permissions:
|
| H A D | ci.yml | 3 permissions:
|
| /optee_os/core/drivers/ |
| H A D | tzc380.c | 110 * permissions, with or without security inversion. 111 * Check TZC380 "2.2.5 Region security permissions" for
|
| H A D | tzc400.c | 263 * permissions.
|
| H A D | stm32_tamp.c | 375 * TAMP backup registers access permissions 913 * access permissions based on the secure status of the accesser. in parse_bkpregs_dt_conf()
|
| /optee_os/lib/libutils/compiler-rt/ |
| H A D | LICENSE.TXT | 28 exercising permissions granted by this License. 155 risks associated with Your exercise of permissions under this License. 204 See the License for the specific language governing permissions and
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | LICENSE | 32 exercising permissions granted by this License. 159 risks associated with Your exercise of permissions under this License. 208 See the License for the specific language governing permissions and 335 this License, whose permissions for other licensees extend to the
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | secure_partition.c | 899 /* Check instruction and data access permissions */ in handle_fdt_load_relative_mem_regions() 911 EMSG("Invalid memory access permissions"); in handle_fdt_load_relative_mem_regions() 971 * mapped and only need to set the correct permissions. in handle_fdt_load_relative_mem_regions() 1034 /* Check instruction and data access permissions */ in handle_fdt_dev_regions() 1043 EMSG("Invalid memory access permissions"); in handle_fdt_dev_regions() 1223 * - Instruction/data access permissions in handle_fdt_mem_regions() 1237 /* Check instruction and data access permissions */ in handle_fdt_mem_regions() 1249 EMSG("Invalid memory access permissions"); in handle_fdt_mem_regions()
|
| H A D | entry_a32.S | 986 /* Enable Access flag (simplified access permissions) and TEX remap */
|
| /optee_os/core/drivers/crypto/caam/ |
| H A D | caam_sm.c | 148 * If any group permissions are set, need to enable Secure World MID in caam_sm_set_access_perm()
|
| /optee_os/core/crypto/ |
| H A D | aes-gcm-ghash-tbl.c | 18 * See the License for the specific language governing permissions and
|
| /optee_os/core/include/mm/ |
| H A D | tee_pager.h | 120 * @flags: TEE_MATTR_U* flags describing permissions of the region
|
| /optee_os/lib/libutee/include/ |
| H A D | pta_system.h | 107 * Different parts of an TA binary file needs different permissions.
|
| /optee_os/core/include/drivers/ |
| H A D | tzc400.h | 177 /* Macros for setting Region ID access permissions based on NSAID */
|
| /optee_os/lib/libutee/ |
| H A D | tee_api.c | 129 * to do here. If there's security/permissions in map_tmp_param()
|
| /optee_os/ldelf/ |
| H A D | ta_elf.c | 669 * Permissions needs to be merged. The offset must have in adjust_segments() 685 * Merge the segments and their permissions. in adjust_segments()
|
| /optee_os/core/kernel/ |
| H A D | tee_ta_manager.c | 380 * permissions regarding memory reference parameters. in check_params()
|
| /optee_os/core/mm/ |
| H A D | vm.c | 775 * this case we change the permissions on an in vm_set_prot()
|