Searched hist:"05 c69cf75edf53478e23fce157fea72372b49597" (Results 1 – 9 of 9) sorted by relevance
| /rk3399_ARM-atf/docs/components/spd/ |
| H A D | optee-dispatcher.rst | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| /rk3399_ARM-atf/services/spd/opteed/ |
| H A D | teesmc_opteed.h | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| H A D | teesmc_opteed_macros.h | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| H A D | opteed.mk | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| H A D | opteed_private.h | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| H A D | opteed_pm.c | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| H A D | opteed_main.c | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| /rk3399_ARM-atf/include/lib/ |
| H A D | optee_utils.h | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|
| /rk3399_ARM-atf/lib/optee/ |
| H A D | optee_utils.c | 05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
|