Home
last modified time | relevance | path

Searched hist:"05 c69cf75edf53478e23fce157fea72372b49597" (Results 1 – 9 of 9) sorted by relevance

/rk3399_ARM-atf/docs/components/spd/
H A Doptee-dispatcher.rst05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
/rk3399_ARM-atf/services/spd/opteed/
H A Dteesmc_opteed.h05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
H A Dteesmc_opteed_macros.h05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
H A Dopteed.mk05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
H A Dopteed_private.h05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
H A Dopteed_pm.c05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
H A Dopteed_main.c05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
/rk3399_ARM-atf/include/lib/
H A Doptee_utils.h05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
/rk3399_ARM-atf/lib/optee/
H A Doptee_utils.c05c69cf75edf53478e23fce157fea72372b49597 Mon Oct 03 22:50:21 UTC 2022 Jeffrey Kardatzke <jkardatzke@google.com> feat(optee): add loading OP-TEE image via an SMC

This adds the ability to load the OP-TEE image via an SMC called from
non-secure userspace rather than loading it during boot. This should
only be utilized on platforms that can ensure security is maintained up
until the point the SMC is invoked as it breaks the normal barrier
between the secure and non-secure world.

Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com>
Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc