Home
last modified time | relevance | path

Searched full:tee (Results 1 – 25 of 353) sorted by relevance

12345678910>>...15

/openbmc/linux/drivers/crypto/ccp/
H A Dtee-dev.c3 * AMD Trusted Execution Environment (TEE) interface
18 #include <linux/psp-tee.h>
21 #include "tee-dev.h"
25 static int tee_alloc_ring(struct psp_tee_device *tee, int ring_size) in tee_alloc_ring() argument
27 struct ring_buf_manager *rb_mgr = &tee->rb_mgr; in tee_alloc_ring()
49 static void tee_free_ring(struct psp_tee_device *tee) in tee_free_ring() argument
51 struct ring_buf_manager *rb_mgr = &tee->rb_mgr; in tee_free_ring()
65 static int tee_wait_cmd_poll(struct psp_tee_device *tee, unsigned int timeout, in tee_wait_cmd_poll() argument
72 *reg = ioread32(tee->io_regs + tee->vdata->cmdresp_reg); in tee_wait_cmd_poll()
79 dev_err(tee->dev, "tee: command timed out, disabling PSP\n"); in tee_wait_cmd_poll()
[all …]
H A Dtee-dev.h10 /* This file describes the TEE communication interface between host and AMD
24 * enum tee_ring_cmd_id - TEE interface commands for ring buffer configuration
36 * struct tee_init_ring_cmd - Command to init TEE ring buffer
73 * enum tee_cmd_state - TEE command states for the ring buffer interface
75 * @TEE_CMD_STATE_PROCESS: command being processed by TEE environment
85 * enum cmd_resp_state - TEE command's response status maintained by driver
87 * @CMD_WAITING_FOR_RESPONSE: driver waiting for response from TEE
88 * @CMD_RESPONSE_TIMEDOUT: failed to get response from TEE
89 * @CMD_RESPONSE_COPIED: driver has copied response from TEE
99 * struct tee_ring_cmd - Structure of the command buffer in TEE ring
[all …]
/openbmc/linux/Documentation/staging/
H A Dtee.rst2 TEE subsystem
5 This document describes the TEE subsystem in Linux.
7 A TEE (Trusted Execution Environment) is a trusted OS running in some
9 secure co-processor etc. A TEE driver handles the details needed to
10 communicate with the TEE.
14 - Registration of TEE drivers
16 - Managing shared memory between Linux and the TEE
18 - Providing a generic API to the TEE
20 The TEE interface
23 include/uapi/linux/tee.h defines the generic interface to a TEE.
[all …]
/openbmc/u-boot/doc/
H A DREADME.tee2 TEE uclass
5 This document describes the TEE uclass in U-Boot
7 A TEE (Trusted Execution Environment) is a trusted OS running in some
9 secure co-processor etc. A TEE driver handles the details needed to
10 communicate with the TEE.
14 - Registration of TEE drivers
16 - Managing shared memory between U-Boot and the TEE
18 - Providing a generic API to the TEE
20 The TEE interface
23 include/tee.h defines the generic interface to a TEE.
[all …]
/openbmc/linux/include/linux/
H A Dpsp-tee.h3 * AMD Trusted Execution Environment (TEE) interface
17 /* This file defines the Trusted Execution Environment (TEE) interface commands
19 * AMD-TEE Trusted OS.
23 * enum tee_cmd_id - TEE Interface Command IDs
25 * TEE environment
26 * @TEE_CMD_ID_UNLOAD_TA: Unload TA binary from TEE environment
46 * @cmd_id: TEE command ID (&enum tee_cmd_id)
47 * @buf: Command buffer for TEE processing. On success, is updated
50 * @status: On success, holds the TEE command execution status
53 * TEE environment and waits for a response or until the command times out.
[all …]
H A Dtee_drv.h14 #include <linux/tee.h>
19 * The file describes the API provided by the generic TEE driver to the
20 * specific TEE driver.
27 #define TEE_SHM_PRIV BIT(3) /* Memory private to TEE driver */
44 * wait for tee-supplicant daemon to be started if not present
46 * that arises from TEE based kernel drivers that should be
48 * @cap_memref_null: flag indicating if the TEE Client support shared
91 * @shm_register: register shared memory buffer in TEE
92 * @shm_unregister: unregister shared memory buffer in TEE
118 * struct tee_desc - Describes the TEE driver to the subsystem
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-client.inc1 SUMMARY = "OP-TEE Client API"
2 DESCRIPTION = "Open Portable Trusted Execution Environment - Normal World Client side of the TEE"
3 HOMEPAGE = "https://www.op-tee.org/"
11 git://github.com/OP-TEE/optee_client.git;branch=master;protocol=https \
12 file://tee-supplicant@.service \
13 file://tee-supplicant.sh \
23 -DCFG_TEE_FS_PARENT_PATH='${localstatedir}/lib/tee' \
28 …install -D -p -m0644 ${UNPACKDIR}/tee-supplicant@.service ${D}${systemd_system_unitdir}/tee-suppli…
29 install -D -p -m0755 ${UNPACKDIR}/tee-supplicant.sh ${D}${sysconfdir}/init.d/tee-supplicant
35 ${D}${systemd_system_unitdir}/tee-supplicant@.service \
[all …]
H A Doptee-test.inc1 SUMMARY = "OP-TEE sanity testsuite"
3 HOMEPAGE = "https://www.op-tee.org/"
14 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \
42 # install path should match the value set in optee-client/tee-supplicant
46 mkdir -p ${D}${libdir}/tee-supplicant/plugins
47 install -D -p -m0444 ${B}/supp_plugin/*.plugin ${D}${libdir}/tee-supplicant/plugins/
58 ${libdir}/tee-supplicant/plugins/ \
/openbmc/u-boot/include/
H A Dtee.h11 #define TEE_GEN_CAP_GP BIT(0) /* GlobalPlatform compliant TEE */
15 #define TEE_SHM_SEC_REGISTER BIT(1) /* TEE notified of this memory */
55 * struct tee_optee_ta_uuid - OP-TEE Trusted Application (TA) UUID format
57 * Used to identify an OP-TEE TA and define suitable to initialize structs
60 * OP-TEE. See RFC4122 for details on the format.
70 * struct tee_shm - memory shared with the TEE
71 * @dev: The TEE device
163 * struct tee_version_data - description of TEE
171 * struct tee_driver_ops - TEE driver operations
172 * @get_version: Query capabilities of TEE device,
[all …]
/openbmc/linux/tools/testing/selftests/rcutorture/bin/
H A Dkvm-remote.sh79 echo | tee -a "$oldrun/remote-log"
80 echo " ----" kvm.sh output: "(`date`)" | tee -a "$oldrun/remote-log"
81 cat $T/kvm.sh.out | tee -a "$oldrun/remote-log"
88 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log"
89 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log"
106 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log"
107 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log"
113 echo | tee -a "$oldrun/remote-log"
114 echo " ----" kvm-again.sh output: "(`date`)" | tee -a "$oldrun/remote-log"
116 echo | tee -a "$oldrun/remote-log"
[all …]
H A Dkvm-end-run-stats.sh30 echo | tee -a "$rundir/log"
31 echo | tee -a "$rundir/log"
32 echo " --- `date` Test summary:" | tee -a "$rundir/log"
33 echo Results directory: $rundir | tee -a "$rundir/log"
34 kcsan-collapse.sh "$rundir" | tee -a "$rundir/log"
37 cat $T/kvm-recheck.sh.out | tee -a "$rundir/log"
38 echo " --- Done at `date` (`get_starttime_duration $starttime`) exitcode $ret" | tee -a "$rundir/lo…
/openbmc/u-boot/drivers/tee/optee/
H A DKconfig1 # OP-TEE Trusted Execution Environment Configuration
3 bool "OP-TEE"
6 This implements the OP-TEE Trusted Execution Environment (TEE)
7 driver. OP-TEE is a Trusted OS designed primarily to rely on the
9 mechanism. This driver can request services from OP-TEE, but also
10 handle Remote Procedure Calls (RPC) from OP-TEE needed to
11 execute a service. For more information see: https://www.op-tee.org
15 menu "OP-TEE options"
21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
/openbmc/u-boot/drivers/tee/
H A DKconfig2 config TEE config
8 Environment (TEE). A TEE is a trusted OS running in some secure
13 if TEE
15 menu "TEE drivers"
18 bool "Sandbox TEE emulator"
22 This emulates a generic TEE needed for testing including the AVB
23 TA. The emulation provides all callbacks of a regular TEE and
31 source "drivers/tee/optee/Kconfig"
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-bus-optee-devices1 What: /sys/bus/tee/devices/optee-ta-<uuid>/
4 Contact: op-tee@lists.trustedfirmware.org
6 OP-TEE bus provides reference to registered drivers under this directory. The <uuid>
10 What: /sys/bus/tee/devices/optee-ta-<uuid>/need_supplicant
13 Contact: op-tee@lists.trustedfirmware.org
15 Allows to distinguish whether an OP-TEE based TA/device requires user-space
16 tee-supplicant to function properly or not. This attribute will be present for
17 devices which depend on tee-supplicant to be running.
/openbmc/u-boot/tools/
H A Dk3_fit_atf.sh17 [ -z "$TEE" ] && TEE="bl32.bin"
19 if [ ! -f $TEE ]; then
20 echo "WARNING OPTEE file $TEE NOT found, resulting might be non-functional" >&2
21 TEE=/dev/null
42 tee {
44 data = /incbin/("$TEE");
45 type = "tee";
48 os = "tee";
90 loadables = "tee", "spl";
/openbmc/linux/drivers/tee/optee/
H A DKconfig2 # OP-TEE Trusted Execution Environment Configuration
4 tristate "OP-TEE"
8 This implements the OP-TEE Trusted Execution Environment (TEE)
12 bool "Load OP-TEE image as firmware"
16 This loads the BL32 image for OP-TEE as firmware when the driver is
26 Documentation/staging/tee.rst.
/openbmc/u-boot/doc/device-tree-bindings/firmware/
H A Dlinaro,optee-tz.txt1 OP-TEE Device Tree Bindings
3 OP-TEE is a piece of software using hardware features to provide a Trusted
10 * OP-TEE based on ARM TrustZone required properties:
14 - method : The method of calling the OP-TEE Trusted OS. Permitted
18 in drivers/tee/optee/optee_smc.h
21 in drivers/tee/optee/optee_smc.h
/openbmc/linux/tools/testing/selftests/amd-pstate/
H A Dgitsource.sh31 echo "$1, $2, $3, $4, $5, $6, $7, $8" | tee -a $OUTFILE_GIT.csv > /dev/null 2>&1
101 printf "Gitsource-$1-#$2 avg des perf: $avg_des_perf\n" | tee -a $OUTFILE_GIT.result
105 printf "Gitsource-$1-#$2 avg freq: $avg_freq\n" | tee -a $OUTFILE_GIT.result
109 printf "Gitsource-$1-#$2 avg load: $avg_load\n" | tee -a $OUTFILE_GIT.result
113 printf "Gitsource-$1-#$2 user time(s): $time_sum\n" | tee -a $OUTFILE_GIT.result
117 printf "Gitsource-$1-#$2 power consumption(J): $en_sum\n" | tee -a $OUTFILE_GIT.result
127 printf "Gitsource-$1-#$2 performance per watt(1/J): $ppw\n" | tee -a $OUTFILE_GIT.result
128 printf "\n" | tee -a $OUTFILE_GIT.result
148 printf "Gitsource test result for $1 (loops:$LOOP_TIMES)" | tee -a $OUTFILE_GIT.result
149 printf "\n--------------------------------------------------\n" | tee -a $OUTFILE_GIT.result
[all …]
H A Dtbench.sh26 echo "$1, $2, $3, $4, $5, $6, $7, $8" | tee -a $OUTFILE_TBENCH.csv > /dev/null 2>&1
88 printf "Tbench-$1-#$2 avg des perf: $avg_des_perf\n" | tee -a $OUTFILE_TBENCH.result
92 printf "Tbench-$1-#$2 avg freq: $avg_freq\n" | tee -a $OUTFILE_TBENCH.result
96 printf "Tbench-$1-#$2 avg load: $avg_load\n" | tee -a $OUTFILE_TBENCH.result
100 printf "Tbench-$1-#$2 throughput(MB/s): $tp_sum\n" | tee -a $OUTFILE_TBENCH.result
104 printf "Tbench-$1-#$2 power consumption(J): $en_sum\n" | tee -a $OUTFILE_TBENCH.result
114 printf "Tbench-$1-#$2 performance per watt(MB/J): $ppw\n" | tee -a $OUTFILE_TBENCH.result
115 printf "\n" | tee -a $OUTFILE_TBENCH.result
135 printf "Tbench test result for $1 (loops:$LOOP_TIMES)" | tee -a $OUTFILE_TBENCH.result
136 printf "\n--------------------------------------------------\n" | tee -a $OUTFILE_TBENCH.result
[all …]
/openbmc/linux/drivers/tee/amdtee/
H A Dcall.c7 #include <linux/tee.h>
9 #include <linux/psp-tee.h>
15 static int tee_params_to_amd_params(struct tee_param *tee, u32 count, in tee_params_to_amd_params() argument
24 if (!tee || !amd || count > TEE_MAX_PARAMS) in tee_params_to_amd_params()
29 /* AMD TEE does not support meta parameter */ in tee_params_to_amd_params()
30 if (tee[i].attr > TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT) in tee_params_to_amd_params()
33 amd->param_types |= ((tee[i].attr & 0xF) << i * 4); in tee_params_to_amd_params()
48 u32 buf_id = get_buffer_id(tee[i].u.memref.shm); in tee_params_to_amd_params()
51 amd->params[i].mref.offset = tee[i].u.memref.shm_offs; in tee_params_to_amd_params()
52 amd->params[i].mref.size = tee[i].u.memref.size; in tee_params_to_amd_params()
[all …]
/openbmc/linux/include/uapi/linux/
H A Dtee.h35 * This file describes the API provided by a TEE driver to user space.
37 * Each TEE driver defines a TEE specific protocol which is used for the
47 #define TEE_GEN_CAP_GP (1 << 0)/* GlobalPlatform compliant TEE */
55 * TEE Implementation ID
61 * OP-TEE specific capabilities
66 * struct tee_ioctl_version_data - TEE version
67 * @impl_id: [out] TEE implementation id
71 * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above.
82 * TEE_IOC_VERSION - query version of TEE
84 * Takes a tee_ioctl_version_data struct and returns with the TEE version
[all …]
/openbmc/linux/drivers/tee/
H A DKconfig3 menuconfig TEE config
12 Environment (TEE).
14 if TEE
16 source "drivers/tee/optee/Kconfig"
17 source "drivers/tee/amdtee/Kconfig"
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/libts/
H A D0001-Remove-TEE-driver-external-component.patch4 Subject: [PATCH] Remove TEE driver external component
56 #include <linux/tee.h>
67 + * This define is part of linux/tee.h starting from Linux v6.10
95 - printf("error: cannot read TS TEE driver version\n");
99 - printf("error: TS TEE driver not available\n");
116 - printf("error: TS TEE driver is v%u.%u.%u but required v%u.%u.%u\n", major, minor, patch,
144 - out/linux-arm-ffa-tee/load_module.sh
157 - out/linux-arm-ffa-tee/load_module.sh
177 - DOC "Linux FF-A TEE driver include directory"
183 - CACHE STRING "Linux FF-A TEE driver repository URL")
[all …]
H A Dtee-udev.rules1 # tee devices can only be accessed by the teeclnt group members
2 KERNEL=="tee[0-9]*", TAG+="systemd", MODE="0660", GROUP="teeclnt"
5 # tee-supplicant.service with the device name as parameter
6 KERNEL=="teepriv[0-9]*", MODE="0660", OWNER="root", GROUP="tee", \
7 TAG+="systemd", ENV{SYSTEMD_WANTS}+="tee-supplicant@%k.service"
/openbmc/linux/drivers/firmware/arm_scmi/
H A Doptee.c15 #include <uapi/linux/tee.h>
37 * and SCMI server (OP-TEE) parts.
60 * SCMI shm information are 0 if agent expects to use OP-TEE regular SHM
86 * OP-TEE SCMI service capabilities bit flags (32bit)
89 * When set, OP-TEE supports command using SMT header protocol (SCMI shmem) in
93 * When set, OP-TEE supports command using MSG header protocol in an OP-TEE
104 * struct scmi_optee_channel - Description of an OP-TEE SCMI channel
106 * @channel_id: OP-TEE channel ID used for this transport
107 * @tee_session: TEE session identifier
108 * @caps: OP-TEE SCMI channel capabilities
[all …]

12345678910>>...15