/trusty/kernel/lib/trusty/ |
D | memref.c | 49 struct vmm_obj_slice slice; member 57 vmm_obj_slice_release(&memref->slice); in memref_destroy() 91 if (offset > memref->slice.size) { in memref_mmap() 96 if (size > memref->slice.size - offset) { in memref_mmap() 112 rc = vmm_alloc_obj(app->aspace, "memref", memref->slice.obj, in memref_mmap() 113 memref->slice.offset + offset, size, &vaddr, 0, 0, in memref_mmap() 138 vmm_obj_slice_init(&memref->slice); in memref_create() 144 static status_t check_slice(struct vmm_obj_slice *slice, uint32_t mmap_prot) { in check_slice() argument 145 if (!IS_PAGE_ALIGNED(slice->size) || !IS_PAGE_ALIGNED(slice->offset)) { in check_slice() 156 rc = slice->obj->ops->check_flags(slice->obj, &arch_mmu_flags); in check_slice() [all …]
|
D | syscall.c | 366 struct vmm_obj_slice slice; in sys_prepare_dma() local 367 vmm_obj_slice_init(&slice); in sys_prepare_dma() 369 ret = vmm_get_obj(trusty_app->aspace, vaddr, size, &slice); in sys_prepare_dma() 373 if (!slice.obj || !slice.obj->ops) { in sys_prepare_dma() 381 ret = slice.obj->ops->get_page(slice.obj, slice.offset + mapped_size, in sys_prepare_dma() 420 ret = trusty_app_allow_dma_range(trusty_app, slice.obj, slice.offset, in sys_prepare_dma() 421 slice.size, vaddr, flags); in sys_prepare_dma() 428 vmm_obj_slice_release(&slice); in sys_prepare_dma()
|
D | trusty_app.c | 253 struct vmm_obj_slice slice; member 283 vmm_obj_slice_init(&range_list_entry->slice); in trusty_app_allow_dma_range() 284 vmm_obj_slice_bind(&range_list_entry->slice, obj, offset, size); in trusty_app_allow_dma_range() 304 DEBUG_ASSERT(range->slice.size); in trusty_app_destroy_dma_range() 305 if (range->vaddr == vaddr && range->slice.size == size) { in trusty_app_destroy_dma_range() 307 vmm_obj_slice_release(&range->slice); in trusty_app_destroy_dma_range() 330 DEBUG_ASSERT(range->slice.size); in trusty_app_dma_is_allowed_locked() 335 ret = range->slice.obj->ops->get_page( in trusty_app_dma_is_allowed_locked() 336 range->slice.obj, range->slice.offset + offset, in trusty_app_dma_is_allowed_locked() 348 offset += MIN(range->slice.size - offset, prepared_paddr_size); in trusty_app_dma_is_allowed_locked() [all …]
|
/trusty/kernel/lib/dtb_service/ |
D | dtb_service.cpp | 63 struct vmm_obj_slice slice = VMM_OBJ_SLICE_INITIAL_VALUE(slice); in dtb_service_add_user() local 85 rc = vmm_get_obj(kas, (vaddr_t)dtb_copy, aligned_size, &slice); in dtb_service_add_user() 92 rc = vmm_obj_service_create_ro(dtb_port, &dtb_service_port_acl, slice.obj, in dtb_service_add_user() 93 slice.offset, slice.size, &srv); in dtb_service_add_user() 106 vmm_obj_slice_release(&slice); in dtb_service_add_user() 114 vmm_obj_slice_release(&slice); in dtb_service_add_user()
|
/trusty/kernel/app/mmutest/ |
D | mmutest.c | 325 struct vmm_obj_slice slice; in TEST() local 326 vmm_obj_slice_init(&slice); in TEST() 345 ret = vmm_get_obj(aspace, (vaddr_t)ptr1, PAGE_SIZE, &slice); in TEST() 348 EXPECT_NE(NULL, slice.obj); in TEST() 349 EXPECT_EQ(PAGE_SIZE, slice.size); in TEST() 350 EXPECT_EQ(NO_ERROR, slice.offset); in TEST() 351 vmm_obj_slice_release(&slice); in TEST() 439 struct vmm_obj_slice slice; in TEST_P() local 440 vmm_obj_slice_init(&slice); in TEST_P() 463 ret = vmm_get_obj(aspace, (vaddr_t)ptr1 - PAGE_SIZE, PAGE_SIZE, &slice); in TEST_P() [all …]
|
/trusty/user/base/lib/tipc/rust/src/ |
D | serialization.rs | 3 use core::{mem, slice}; 33 let bytes: &'s [u8] = slice::from_raw_parts(&*ptr, mem::size_of::<T>()); in serialize_as_bytes()
|
/trusty/user/base/lib/trusty-std/src/ |
D | lib.rs | 54 pub use alloc_crate::{borrow, boxed, fmt, format, rc, slice, str, string, vec};
|
/trusty/user/base/lib/trusty-std/src/ffi/ |
D | c_str.rs | 43 use core::slice::memchr;
|