Home
last modified time | relevance | path

Searched refs:slice (Results 1 – 8 of 8) sorted by relevance

/trusty/kernel/lib/trusty/
Dmemref.c49 struct vmm_obj_slice slice; member
57 vmm_obj_slice_release(&memref->slice); in memref_destroy()
91 if (offset > memref->slice.size) { in memref_mmap()
96 if (size > memref->slice.size - offset) { in memref_mmap()
112 rc = vmm_alloc_obj(app->aspace, "memref", memref->slice.obj, in memref_mmap()
113 memref->slice.offset + offset, size, &vaddr, 0, 0, in memref_mmap()
138 vmm_obj_slice_init(&memref->slice); in memref_create()
144 static status_t check_slice(struct vmm_obj_slice *slice, uint32_t mmap_prot) { in check_slice() argument
145 if (!IS_PAGE_ALIGNED(slice->size) || !IS_PAGE_ALIGNED(slice->offset)) { in check_slice()
156 rc = slice->obj->ops->check_flags(slice->obj, &arch_mmu_flags); in check_slice()
[all …]
Dsyscall.c366 struct vmm_obj_slice slice; in sys_prepare_dma() local
367 vmm_obj_slice_init(&slice); in sys_prepare_dma()
369 ret = vmm_get_obj(trusty_app->aspace, vaddr, size, &slice); in sys_prepare_dma()
373 if (!slice.obj || !slice.obj->ops) { in sys_prepare_dma()
381 ret = slice.obj->ops->get_page(slice.obj, slice.offset + mapped_size, in sys_prepare_dma()
420 ret = trusty_app_allow_dma_range(trusty_app, slice.obj, slice.offset, in sys_prepare_dma()
421 slice.size, vaddr, flags); in sys_prepare_dma()
428 vmm_obj_slice_release(&slice); in sys_prepare_dma()
Dtrusty_app.c253 struct vmm_obj_slice slice; member
283 vmm_obj_slice_init(&range_list_entry->slice); in trusty_app_allow_dma_range()
284 vmm_obj_slice_bind(&range_list_entry->slice, obj, offset, size); in trusty_app_allow_dma_range()
304 DEBUG_ASSERT(range->slice.size); in trusty_app_destroy_dma_range()
305 if (range->vaddr == vaddr && range->slice.size == size) { in trusty_app_destroy_dma_range()
307 vmm_obj_slice_release(&range->slice); in trusty_app_destroy_dma_range()
330 DEBUG_ASSERT(range->slice.size); in trusty_app_dma_is_allowed_locked()
335 ret = range->slice.obj->ops->get_page( in trusty_app_dma_is_allowed_locked()
336 range->slice.obj, range->slice.offset + offset, in trusty_app_dma_is_allowed_locked()
348 offset += MIN(range->slice.size - offset, prepared_paddr_size); in trusty_app_dma_is_allowed_locked()
[all …]
/trusty/kernel/lib/dtb_service/
Ddtb_service.cpp63 struct vmm_obj_slice slice = VMM_OBJ_SLICE_INITIAL_VALUE(slice); in dtb_service_add_user() local
85 rc = vmm_get_obj(kas, (vaddr_t)dtb_copy, aligned_size, &slice); in dtb_service_add_user()
92 rc = vmm_obj_service_create_ro(dtb_port, &dtb_service_port_acl, slice.obj, in dtb_service_add_user()
93 slice.offset, slice.size, &srv); in dtb_service_add_user()
106 vmm_obj_slice_release(&slice); in dtb_service_add_user()
114 vmm_obj_slice_release(&slice); in dtb_service_add_user()
/trusty/kernel/app/mmutest/
Dmmutest.c325 struct vmm_obj_slice slice; in TEST() local
326 vmm_obj_slice_init(&slice); in TEST()
345 ret = vmm_get_obj(aspace, (vaddr_t)ptr1, PAGE_SIZE, &slice); in TEST()
348 EXPECT_NE(NULL, slice.obj); in TEST()
349 EXPECT_EQ(PAGE_SIZE, slice.size); in TEST()
350 EXPECT_EQ(NO_ERROR, slice.offset); in TEST()
351 vmm_obj_slice_release(&slice); in TEST()
439 struct vmm_obj_slice slice; in TEST_P() local
440 vmm_obj_slice_init(&slice); in TEST_P()
463 ret = vmm_get_obj(aspace, (vaddr_t)ptr1 - PAGE_SIZE, PAGE_SIZE, &slice); in TEST_P()
[all …]
/trusty/user/base/lib/tipc/rust/src/
Dserialization.rs3 use core::{mem, slice};
33 let bytes: &'s [u8] = slice::from_raw_parts(&*ptr, mem::size_of::<T>()); in serialize_as_bytes()
/trusty/user/base/lib/trusty-std/src/
Dlib.rs54 pub use alloc_crate::{borrow, boxed, fmt, format, rc, slice, str, string, vec};
/trusty/user/base/lib/trusty-std/src/ffi/
Dc_str.rs43 use core::slice::memchr;