Lines Matching full:world

75  * Used by non-secure world to figure out which Trusted OS is installed.
88 * Used by non-secure world to figure out which version of the Trusted OS
116 * When calling these functions, normal world has a few responsibilities:
169 * world.
214 * Exchanges capabilities between normal world and secure world
218 * a1 bitfield of normal world capabilities OPTEE_SMC_NSEC_CAP_*
224 * a1 bitfield of secure world capabilities OPTEE_SMC_SEC_CAP_*
225 * a2 The maximum secure world notification number
233 * a0 OPTEE_SMC_RETURN_ENOTAVAIL, can't use the capabilities from normal world
234 * a1 bitfield of secure world capabilities OPTEE_SMC_SEC_CAP_*
237 /* Normal world works as a uniprocessor system */
239 /* Secure world has reserved shared memory for normal world to use */
241 /* Secure world can communicate via previously unregistered shared memory */
245 * Secure world supports commands "register/unregister shared memory",
246 * secure world accepts command buffers located in any parts of non-secure RAM
249 /* Secure world is built with virtualization support */
251 /* Secure world supports Shared Memory with a NULL reference */
253 /* Secure world supports asynchronous notification of normal world */
255 /* Secure world supports pre-allocating RPC arg struct */
272 * Secure world can cache frequently used shared memory objects, for
273 * example objects used as RPC arguments. When secure world is idle this
311 * Secure world can cache frequently used shared memory objects, for
312 * example objects used as RPC arguments. When secure world is idle this
314 * secure world isn't idle OPTEE_SMC_RETURN_EBUSY is returned.
336 * Normal World OS or Hypervisor issues this call to find out how many
359 * Inform OP-TEE that normal world is able to receive asynchronous
386 * value is retrieved, it's cleared from the record in secure world.
389 * in normal world.
446 * world.
515 * Deliver a foreign interrupt in normal world.
534 * - ret return value of the request, filled in by normal world