/trusted-firmware-a-latest/bl32/tsp/ |
D | ffa_helpers.c | 15 smc_args_t ffa_msg_send_direct_req(ffa_endpoint_id16_t sender, in ffa_msg_send_direct_req() argument 23 uint32_t src_dst_ids = (sender << FFA_DIRECT_MSG_SOURCE_SHIFT) | in ffa_msg_send_direct_req() 35 smc_args_t *ffa_msg_send_direct_resp(ffa_endpoint_id16_t sender, in ffa_msg_send_direct_resp() argument 43 uint32_t src_dst_ids = (sender << FFA_DIRECT_MSG_SOURCE_SHIFT) | in ffa_msg_send_direct_resp() 59 struct ffa_mtd *memory_region, ffa_endpoint_id16_t sender, in ffa_memory_region_init_header() argument 71 memory_region->sender_id = sender; in ffa_memory_region_init_header() 96 ffa_endpoint_id16_t sender, ffa_endpoint_id16_t *receivers, uint32_t receiver_count, in ffa_memory_retrieve_request_init() argument 101 ffa_memory_region_init_header(memory_region, sender, attributes, flags, in ffa_memory_retrieve_request_init() 145 uint64_t handle, ffa_endpoint_id16_t sender, in memory_retrieve() argument 168 memory_region, handle, sender, receivers, receiver_count, 0, flags, in memory_retrieve()
|
D | ffa_helpers.h | 49 ffa_endpoint_id16_t sender) in ffa_mem_relinquish_init() argument 54 relinquish_request->endpoint_array[0] = sender; in ffa_mem_relinquish_init() 97 uint64_t handle, ffa_endpoint_id16_t sender, 102 smc_args_t ffa_msg_send_direct_req(ffa_endpoint_id16_t sender, 109 smc_args_t *ffa_msg_send_direct_resp(ffa_endpoint_id16_t sender,
|
D | tsp_ffa_main.c | 106 static int test_memory_send(ffa_endpoint_id16_t sender, uint64_t handle, in test_memory_send() argument 115 ffa_endpoint_id16_t source = sender; in test_memory_send() 128 if (ffa_is_secure_world_id(sender)) { in test_memory_send() 129 ERROR("Invalid sender ID 0x%x.\n", sender); in test_memory_send() 436 uint16_t sender = ffa_endpoint_source(arg1); in handle_partition_message() local 444 status = test_memory_send(sender, arg4, FFA_FLAG_SHARE_MEMORY, !multi_endpoint); in handle_partition_message() 449 status = test_memory_send(sender, arg4, FFA_FLAG_LEND_MEMORY, !multi_endpoint); in handle_partition_message() 454 status = test_memory_send(sender, arg4, FFA_FLAG_SHARE_MEMORY, multi_endpoint); in handle_partition_message() 459 status = test_memory_send(sender, arg4, FFA_FLAG_LEND_MEMORY, multi_endpoint); in handle_partition_message() 477 return ffa_msg_send_direct_resp(receiver, sender, status, 0, 0, 0, 0); in handle_partition_message()
|
/trusted-firmware-a-latest/plat/socionext/synquacer/drivers/scpi/ |
D | sq_scpi.c | 135 cmd->sender = 0; in scpi_set_sq_power_state() 161 cmd->sender = 0; in scpi_sys_power_state() 190 cmd->sender = 0; in scpi_get_draminfo()
|
D | sq_scpi.h | 23 uint32_t sender : 8; member
|
/trusted-firmware-a-latest/plat/brcm/common/ |
D | brcm_scpi.c | 154 cmd->sender = 0; in scpi_set_brcm_power_state() 242 cmd->sender = 0; in scpi_sys_power_state()
|
D | brcm_scpi.h | 23 uint32_t sender : 8; member
|
/trusted-firmware-a-latest/include/drivers/arm/css/ |
D | css_scpi.h | 23 uint32_t sender : 8; member
|
/trusted-firmware-a-latest/drivers/arm/css/scpi/ |
D | css_scpi.c | 159 cmd->sender = 0; in scpi_set_css_power_state() 258 cmd->sender = 0; in scpi_sys_power_state()
|
/trusted-firmware-a-latest/docs/design_documents/ |
D | rss.rst | 35 The MHU comes in pairs. There is a sender and receiver side. They are connected 36 to each other. An MHU interface consists of two pairs of MHUs, one sender and 39 from RSS to AP. The sender and receiver are connected via channels. There is an 40 IMPDEF number of channels (e.g: 4-16) between a sender and a receiver module. 46 word. The sender writes the data to the channel register on its side and the 49 meant for signalling that the sender loaded the data to the channel registers 53 multiple rounds. Both, sender and receiver allocate a local buffer for the 58 copied over by RSS core (or by DMA) between the sender and the receiver. This 64 ``iovec``. Therefore, the sender must handle both cases and prevent access to 83 | MHU sender | | MHU receiver | | | Copy data | [all …]
|
/trusted-firmware-a-latest/docs/threat_model/ |
D | threat_model_el3_spm.rst | 143 | Threat | **An endpoint impersonates the sender | 173 | | SWd ID as the sender ID). | 221 | | This component checks the sender/receiver fields | 576 | | Denying a new sender endpoint to make progress |
|
/trusted-firmware-a-latest/docs/components/ |
D | secure-partition-manager.rst | 744 A sender can signal notifications once the receiver has provided it with 765 a specific execution context, as determined by the sender. 768 permissions to the sender. 947 handling notifications, an FF-A endpoint must allow a given sender to signal a 1037 Hafnium copies a message from the sender TX buffer into receiver's RX buffer. 1041 Both receiver and sender need to enable support for indirect messaging,
|