Directory Files
.. 7
File Size
Kconfig 1.0 kB
Makefile 318 B
call.c 14 kB
core.c 5.4 kB
device.c 4.2 kB
ffa_abi.c 24 kB
notif.c 2.5 kB
optee_ffa.h 5.5 kB
optee_msg.h 12 kB
optee_private.h 11 kB
optee_rpc_cmd.h 3.3 kB
optee_smc.h 20 kB
optee_trace.h 1.7 kB
rpc.c 6.5 kB
smc_abi.c 48 kB
supp.c 9.0 kB

Linux v6.6.1 - optee

# SPDX-License-Identifier: GPL-2.0-only
# OP-TEE Trusted Execution Environment Configuration
config OPTEE
	tristate "OP-TEE"
	depends on HAVE_ARM_SMCCC
	depends on MMU
	help
	  This implements the OP-TEE Trusted Execution Environment (TEE)
	  driver.

config OPTEE_INSECURE_LOAD_IMAGE
	bool "Load OP-TEE image as firmware"
	default n
	depends on OPTEE && ARM64
	help
	  This loads the BL32 image for OP-TEE as firmware when the driver is
	  probed. This returns -EPROBE_DEFER until the firmware is loadable from
	  the filesystem which is determined by checking the system_state until
	  it is in SYSTEM_RUNNING. This also requires enabling the corresponding
	  option in Trusted Firmware for Arm. The documentation there explains
	  the security threat associated with enabling this as well as
	  mitigations at the firmware and platform level.
	  https://trustedfirmware-a.readthedocs.io/en/latest/threat_model/threat_model.html

	  Additional documentation on kernel security risks are at
	  Documentation/staging/tee.rst.