/openbmc/linux/drivers/crypto/ccp/ |
H A D | tee-dev.c | 3 * AMD Trusted Execution Environment (TEE) interface 18 #include <linux/psp-tee.h> 21 #include "tee-dev.h" 25 static int tee_alloc_ring(struct psp_tee_device *tee, int ring_size) in tee_alloc_ring() argument 27 struct ring_buf_manager *rb_mgr = &tee->rb_mgr; in tee_alloc_ring() 49 static void tee_free_ring(struct psp_tee_device *tee) in tee_free_ring() argument 51 struct ring_buf_manager *rb_mgr = &tee->rb_mgr; in tee_free_ring() 65 static int tee_wait_cmd_poll(struct psp_tee_device *tee, unsigned int timeout, in tee_wait_cmd_poll() argument 72 *reg = ioread32(tee->io_regs + tee->vdata->cmdresp_reg); in tee_wait_cmd_poll() 79 dev_err(tee->dev, "tee: command timed out, disabling PSP\n"); in tee_wait_cmd_poll() [all …]
|
H A D | tee-dev.h | 10 /* This file describes the TEE communication interface between host and AMD 24 * enum tee_ring_cmd_id - TEE interface commands for ring buffer configuration 36 * struct tee_init_ring_cmd - Command to init TEE ring buffer 73 * enum tee_cmd_state - TEE command states for the ring buffer interface 75 * @TEE_CMD_STATE_PROCESS: command being processed by TEE environment 85 * enum cmd_resp_state - TEE command's response status maintained by driver 87 * @CMD_WAITING_FOR_RESPONSE: driver waiting for response from TEE 88 * @CMD_RESPONSE_TIMEDOUT: failed to get response from TEE 89 * @CMD_RESPONSE_COPIED: driver has copied response from TEE 99 * struct tee_ring_cmd - Structure of the command buffer in TEE ring [all …]
|
/openbmc/linux/Documentation/staging/ |
H A D | tee.rst | 2 TEE subsystem 5 This document describes the TEE subsystem in Linux. 7 A TEE (Trusted Execution Environment) is a trusted OS running in some 9 secure co-processor etc. A TEE driver handles the details needed to 10 communicate with the TEE. 14 - Registration of TEE drivers 16 - Managing shared memory between Linux and the TEE 18 - Providing a generic API to the TEE 20 The TEE interface 23 include/uapi/linux/tee.h defines the generic interface to a TEE. [all …]
|
/openbmc/u-boot/doc/ |
H A D | README.tee | 2 TEE uclass 5 This document describes the TEE uclass in U-Boot 7 A TEE (Trusted Execution Environment) is a trusted OS running in some 9 secure co-processor etc. A TEE driver handles the details needed to 10 communicate with the TEE. 14 - Registration of TEE drivers 16 - Managing shared memory between U-Boot and the TEE 18 - Providing a generic API to the TEE 20 The TEE interface 23 include/tee.h defines the generic interface to a TEE. [all …]
|
/openbmc/linux/include/linux/ |
H A D | psp-tee.h | 3 * AMD Trusted Execution Environment (TEE) interface 17 /* This file defines the Trusted Execution Environment (TEE) interface commands 19 * AMD-TEE Trusted OS. 23 * enum tee_cmd_id - TEE Interface Command IDs 25 * TEE environment 26 * @TEE_CMD_ID_UNLOAD_TA: Unload TA binary from TEE environment 46 * @cmd_id: TEE command ID (&enum tee_cmd_id) 47 * @buf: Command buffer for TEE processing. On success, is updated 50 * @status: On success, holds the TEE command execution status 53 * TEE environment and waits for a response or until the command times out. [all …]
|
H A D | tee_drv.h | 14 #include <linux/tee.h> 19 * The file describes the API provided by the generic TEE driver to the 20 * specific TEE driver. 27 #define TEE_SHM_PRIV BIT(3) /* Memory private to TEE driver */ 44 * wait for tee-supplicant daemon to be started if not present 46 * that arises from TEE based kernel drivers that should be 48 * @cap_memref_null: flag indicating if the TEE Client support shared 91 * @shm_register: register shared memory buffer in TEE 92 * @shm_unregister: unregister shared memory buffer in TEE 118 * struct tee_desc - Describes the TEE driver to the subsystem [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-client.inc | 1 SUMMARY = "OP-TEE Client API" 2 DESCRIPTION = "Open Portable Trusted Execution Environment - Normal World Client side of the TEE" 3 HOMEPAGE = "https://www.op-tee.org/" 11 git://github.com/OP-TEE/optee_client.git;branch=master;protocol=https \ 12 file://tee-supplicant@.service \ 13 file://tee-supplicant.sh \ 23 -DCFG_TEE_FS_PARENT_PATH='${localstatedir}/lib/tee' \ 28 …install -D -p -m0644 ${UNPACKDIR}/tee-supplicant@.service ${D}${systemd_system_unitdir}/tee-suppli… 29 install -D -p -m0755 ${UNPACKDIR}/tee-supplicant.sh ${D}${sysconfdir}/init.d/tee-supplicant 35 ${D}${systemd_system_unitdir}/tee-supplicant@.service \ [all …]
|
H A D | optee-test.inc | 1 SUMMARY = "OP-TEE sanity testsuite" 3 HOMEPAGE = "https://www.op-tee.org/" 14 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \ 42 # install path should match the value set in optee-client/tee-supplicant 46 mkdir -p ${D}${libdir}/tee-supplicant/plugins 47 install -D -p -m0444 ${B}/supp_plugin/*.plugin ${D}${libdir}/tee-supplicant/plugins/ 58 ${libdir}/tee-supplicant/plugins/ \
|
/openbmc/u-boot/include/ |
H A D | tee.h | 11 #define TEE_GEN_CAP_GP BIT(0) /* GlobalPlatform compliant TEE */ 15 #define TEE_SHM_SEC_REGISTER BIT(1) /* TEE notified of this memory */ 55 * struct tee_optee_ta_uuid - OP-TEE Trusted Application (TA) UUID format 57 * Used to identify an OP-TEE TA and define suitable to initialize structs 60 * OP-TEE. See RFC4122 for details on the format. 70 * struct tee_shm - memory shared with the TEE 71 * @dev: The TEE device 163 * struct tee_version_data - description of TEE 171 * struct tee_driver_ops - TEE driver operations 172 * @get_version: Query capabilities of TEE device, [all …]
|
/openbmc/linux/tools/testing/selftests/rcutorture/bin/ |
H A D | kvm-remote.sh | 79 echo | tee -a "$oldrun/remote-log" 80 echo " ----" kvm.sh output: "(`date`)" | tee -a "$oldrun/remote-log" 81 cat $T/kvm.sh.out | tee -a "$oldrun/remote-log" 88 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log" 89 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log" 106 echo $scriptname: kvm-again.sh failed exit code $? | tee -a "$oldrun/remote-log" 107 cat $T/kvm-again.sh.out | tee -a "$oldrun/remote-log" 113 echo | tee -a "$oldrun/remote-log" 114 echo " ----" kvm-again.sh output: "(`date`)" | tee -a "$oldrun/remote-log" 116 echo | tee -a "$oldrun/remote-log" [all …]
|
H A D | kvm-end-run-stats.sh | 30 echo | tee -a "$rundir/log" 31 echo | tee -a "$rundir/log" 32 echo " --- `date` Test summary:" | tee -a "$rundir/log" 33 echo Results directory: $rundir | tee -a "$rundir/log" 34 kcsan-collapse.sh "$rundir" | tee -a "$rundir/log" 37 cat $T/kvm-recheck.sh.out | tee -a "$rundir/log" 38 echo " --- Done at `date` (`get_starttime_duration $starttime`) exitcode $ret" | tee -a "$rundir/lo…
|
/openbmc/u-boot/drivers/tee/optee/ |
H A D | Kconfig | 1 # OP-TEE Trusted Execution Environment Configuration 3 bool "OP-TEE" 6 This implements the OP-TEE Trusted Execution Environment (TEE) 7 driver. OP-TEE is a Trusted OS designed primarily to rely on the 9 mechanism. This driver can request services from OP-TEE, but also 10 handle Remote Procedure Calls (RPC) from OP-TEE needed to 11 execute a service. For more information see: https://www.op-tee.org 15 menu "OP-TEE options" 21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
|
/openbmc/u-boot/drivers/tee/ |
H A D | Kconfig | 2 config TEE config 8 Environment (TEE). A TEE is a trusted OS running in some secure 13 if TEE 15 menu "TEE drivers" 18 bool "Sandbox TEE emulator" 22 This emulates a generic TEE needed for testing including the AVB 23 TA. The emulation provides all callbacks of a regular TEE and 31 source "drivers/tee/optee/Kconfig"
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-optee-devices | 1 What: /sys/bus/tee/devices/optee-ta-<uuid>/ 4 Contact: op-tee@lists.trustedfirmware.org 6 OP-TEE bus provides reference to registered drivers under this directory. The <uuid> 10 What: /sys/bus/tee/devices/optee-ta-<uuid>/need_supplicant 13 Contact: op-tee@lists.trustedfirmware.org 15 Allows to distinguish whether an OP-TEE based TA/device requires user-space 16 tee-supplicant to function properly or not. This attribute will be present for 17 devices which depend on tee-supplicant to be running.
|
/openbmc/u-boot/tools/ |
H A D | k3_fit_atf.sh | 17 [ -z "$TEE" ] && TEE="bl32.bin" 19 if [ ! -f $TEE ]; then 20 echo "WARNING OPTEE file $TEE NOT found, resulting might be non-functional" >&2 21 TEE=/dev/null 42 tee { 44 data = /incbin/("$TEE"); 45 type = "tee"; 48 os = "tee"; 90 loadables = "tee", "spl";
|
/openbmc/linux/drivers/tee/optee/ |
H A D | Kconfig | 2 # OP-TEE Trusted Execution Environment Configuration 4 tristate "OP-TEE" 8 This implements the OP-TEE Trusted Execution Environment (TEE) 12 bool "Load OP-TEE image as firmware" 16 This loads the BL32 image for OP-TEE as firmware when the driver is 26 Documentation/staging/tee.rst.
|
/openbmc/u-boot/doc/device-tree-bindings/firmware/ |
H A D | linaro,optee-tz.txt | 1 OP-TEE Device Tree Bindings 3 OP-TEE is a piece of software using hardware features to provide a Trusted 10 * OP-TEE based on ARM TrustZone required properties: 14 - method : The method of calling the OP-TEE Trusted OS. Permitted 18 in drivers/tee/optee/optee_smc.h 21 in drivers/tee/optee/optee_smc.h
|
/openbmc/linux/tools/testing/selftests/amd-pstate/ |
H A D | gitsource.sh | 31 echo "$1, $2, $3, $4, $5, $6, $7, $8" | tee -a $OUTFILE_GIT.csv > /dev/null 2>&1 101 printf "Gitsource-$1-#$2 avg des perf: $avg_des_perf\n" | tee -a $OUTFILE_GIT.result 105 printf "Gitsource-$1-#$2 avg freq: $avg_freq\n" | tee -a $OUTFILE_GIT.result 109 printf "Gitsource-$1-#$2 avg load: $avg_load\n" | tee -a $OUTFILE_GIT.result 113 printf "Gitsource-$1-#$2 user time(s): $time_sum\n" | tee -a $OUTFILE_GIT.result 117 printf "Gitsource-$1-#$2 power consumption(J): $en_sum\n" | tee -a $OUTFILE_GIT.result 127 printf "Gitsource-$1-#$2 performance per watt(1/J): $ppw\n" | tee -a $OUTFILE_GIT.result 128 printf "\n" | tee -a $OUTFILE_GIT.result 148 printf "Gitsource test result for $1 (loops:$LOOP_TIMES)" | tee -a $OUTFILE_GIT.result 149 printf "\n--------------------------------------------------\n" | tee -a $OUTFILE_GIT.result [all …]
|
H A D | tbench.sh | 26 echo "$1, $2, $3, $4, $5, $6, $7, $8" | tee -a $OUTFILE_TBENCH.csv > /dev/null 2>&1 88 printf "Tbench-$1-#$2 avg des perf: $avg_des_perf\n" | tee -a $OUTFILE_TBENCH.result 92 printf "Tbench-$1-#$2 avg freq: $avg_freq\n" | tee -a $OUTFILE_TBENCH.result 96 printf "Tbench-$1-#$2 avg load: $avg_load\n" | tee -a $OUTFILE_TBENCH.result 100 printf "Tbench-$1-#$2 throughput(MB/s): $tp_sum\n" | tee -a $OUTFILE_TBENCH.result 104 printf "Tbench-$1-#$2 power consumption(J): $en_sum\n" | tee -a $OUTFILE_TBENCH.result 114 printf "Tbench-$1-#$2 performance per watt(MB/J): $ppw\n" | tee -a $OUTFILE_TBENCH.result 115 printf "\n" | tee -a $OUTFILE_TBENCH.result 135 printf "Tbench test result for $1 (loops:$LOOP_TIMES)" | tee -a $OUTFILE_TBENCH.result 136 printf "\n--------------------------------------------------\n" | tee -a $OUTFILE_TBENCH.result [all …]
|
/openbmc/linux/drivers/tee/amdtee/ |
H A D | call.c | 7 #include <linux/tee.h> 9 #include <linux/psp-tee.h> 15 static int tee_params_to_amd_params(struct tee_param *tee, u32 count, in tee_params_to_amd_params() argument 24 if (!tee || !amd || count > TEE_MAX_PARAMS) in tee_params_to_amd_params() 29 /* AMD TEE does not support meta parameter */ in tee_params_to_amd_params() 30 if (tee[i].attr > TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT) in tee_params_to_amd_params() 33 amd->param_types |= ((tee[i].attr & 0xF) << i * 4); in tee_params_to_amd_params() 48 u32 buf_id = get_buffer_id(tee[i].u.memref.shm); in tee_params_to_amd_params() 51 amd->params[i].mref.offset = tee[i].u.memref.shm_offs; in tee_params_to_amd_params() 52 amd->params[i].mref.size = tee[i].u.memref.size; in tee_params_to_amd_params() [all …]
|
/openbmc/linux/include/uapi/linux/ |
H A D | tee.h | 35 * This file describes the API provided by a TEE driver to user space. 37 * Each TEE driver defines a TEE specific protocol which is used for the 47 #define TEE_GEN_CAP_GP (1 << 0)/* GlobalPlatform compliant TEE */ 55 * TEE Implementation ID 61 * OP-TEE specific capabilities 66 * struct tee_ioctl_version_data - TEE version 67 * @impl_id: [out] TEE implementation id 71 * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above. 82 * TEE_IOC_VERSION - query version of TEE 84 * Takes a tee_ioctl_version_data struct and returns with the TEE version [all …]
|
/openbmc/linux/drivers/tee/ |
H A D | Kconfig | 3 menuconfig TEE config 12 Environment (TEE). 14 if TEE 16 source "drivers/tee/optee/Kconfig" 17 source "drivers/tee/amdtee/Kconfig"
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/libts/ |
H A D | 0001-Remove-TEE-driver-external-component.patch | 4 Subject: [PATCH] Remove TEE driver external component 56 #include <linux/tee.h> 67 + * This define is part of linux/tee.h starting from Linux v6.10 95 - printf("error: cannot read TS TEE driver version\n"); 99 - printf("error: TS TEE driver not available\n"); 116 - printf("error: TS TEE driver is v%u.%u.%u but required v%u.%u.%u\n", major, minor, patch, 144 - out/linux-arm-ffa-tee/load_module.sh 157 - out/linux-arm-ffa-tee/load_module.sh 177 - DOC "Linux FF-A TEE driver include directory" 183 - CACHE STRING "Linux FF-A TEE driver repository URL") [all …]
|
H A D | tee-udev.rules | 1 # tee devices can only be accessed by the teeclnt group members 2 KERNEL=="tee[0-9]*", TAG+="systemd", MODE="0660", GROUP="teeclnt" 5 # tee-supplicant.service with the device name as parameter 6 KERNEL=="teepriv[0-9]*", MODE="0660", OWNER="root", GROUP="tee", \ 7 TAG+="systemd", ENV{SYSTEMD_WANTS}+="tee-supplicant@%k.service"
|
/openbmc/linux/drivers/firmware/arm_scmi/ |
H A D | optee.c | 15 #include <uapi/linux/tee.h> 37 * and SCMI server (OP-TEE) parts. 60 * SCMI shm information are 0 if agent expects to use OP-TEE regular SHM 86 * OP-TEE SCMI service capabilities bit flags (32bit) 89 * When set, OP-TEE supports command using SMT header protocol (SCMI shmem) in 93 * When set, OP-TEE supports command using MSG header protocol in an OP-TEE 104 * struct scmi_optee_channel - Description of an OP-TEE SCMI channel 106 * @channel_id: OP-TEE channel ID used for this transport 107 * @tee_session: TEE session identifier 108 * @caps: OP-TEE SCMI channel capabilities [all …]
|