Searched refs:TEE (Results 1 – 25 of 69) sorted by relevance
123
1 OP-TEE Dispatcher4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.6 To build and execute OP-TEE follow the instructions at7 `OP-TEE build.git`_13 .. _OP-TEE OS: https://github.com/OP-TEE/build14 .. _OP-TEE build.git: https://github.com/OP-TEE/build
5 Environment (TEE) on mobile devices, published and maintained by Google.
1791 [ 1.383135] [7: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…1792 [ 1.383316] [7: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…1793 [ 1.383649] [7: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…1795 [ 1.383709] [0: tee_fastcall: 1733] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 13504 [ 3.322667] [4: kworker/4:1: 1964] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Jul 26 2…3505 [ 3.322689] [4: kworker/4:1: 1964] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V012…3507 [ 3.323481] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start: 3518 [ 3.323569] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…3519 [ 3.324985] [5: mcDriverDaemon: 2786] Trustonic TEE: admin_open: daemon connection open, TGID 2…3524 [ 3.432355] [2: kworker/2:1: 1963] Trustonic TEE: 601|TA SPT2 : Starting.[all …]
302 [ 1.088975] [5: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…303 [ 1.089096] [5: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…304 [ 1.089281] [5: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…306 [ 1.089346] [0: tee_fastcall: 1730] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 12574 [ 2.419006] [6: kworker/6:1: 1254] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Feb 3 2…2575 [ 2.419018] [6: kworker/6:1: 1254] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V011…2576 [ 2.421585] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start: 2587 [ 2.421655] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…2588 [ 2.422124] [3: mcDriverDaemon: 3130] Trustonic TEE: admin_open: daemon connection open, TGID 3…2589 [ 2.527368] [0: kworker/0:1: 1275] Trustonic TEE: 601|TA SPT2 : Starting.[all …]
452 [ 4.564337] [6: mcDriverDaemon: 2117] [c6] Trustonic TEE: admin_open: opened by PID(2117), name…453 [ 4.564551] [0: kworker/0:2: 1239] [c0] Trustonic TEE: *** <t MTK, Build: May 5 2016, 21:33…454 [ 4.564568] [0: kworker/0:2: 1239] [c0] Trustonic TEE: t-base-EXYNOS64-Android-310B-V007-201…455 [ 4.565875] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start: 465 [ 4.565999] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start: SWd uses LPAE MMU tab…466 [ 4.567271] [7: mcDriverDaemon: 2117] [c7] Trustonic TEE: admin_open: admin connection open, PI…488 [ 4.678027] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 501|SEC_DRIVER_2.0_2016.03.10489 [ 4.703853] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|drTima: starting main driver thre…490 [ 4.703873] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: OpenSSL prema…491 [ 4.703887] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: Embedded …[all …]
1662 [ 2.244748] [4: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…1663 [ 2.244769] [4: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…1664 [ 2.246013] [7: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…1665 [ 2.246215] [0: mc_fastcall: 1638] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 13103 [ 3.996775] [7: mcDriverDaemon: 3090] Trustonic TEE: admin_open: opened by PID(3090), name(mcDr…3104 [ 3.996994] [7: kworker/7:2: 3016] Trustonic TEE: *** <t MTK, Build: May 5 2016, 21:33:03 *…3105 [ 3.997004] [7: kworker/7:2: 3016] Trustonic TEE: t-base-EXYNOS64-Android-310B-V007-20160505…3106 [ 3.997927] [4: mcDriverDaemon: 3090] Trustonic TEE: mobicore_start: 3116 [ 3.997964] [4: mcDriverDaemon: 3090] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…3117 [ 3.998302] [4: mcDriverDaemon: 3090] Trustonic TEE: admin_open: admin connection open, PID 3090[all …]
1 # iptables-translate -t mangle -A PREROUTING -j TEE --gateway 192.168.0.2 --oif eth04 # iptables-translate -t mangle -A PREROUTING -j TEE --gateway 192.168.0.27 ip6tables-translate -t mangle -A PREROUTING -j TEE --gateway ab12:00a1:1112:acba::10 ip6tables-translate -t mangle -A PREROUTING -j TEE --gateway ab12:00a1:1112:acba:: --oif eth0
2 -j TEE --gateway 1.1.1.1;=;OK3 -j TEE ! --gateway 1.1.1.1;;FAIL4 -j TEE;;FAIL
12 \-t mangle \-A PREROUTING \-i eth0 \-j TEE \-\-gateway 2001:db8::1
18 The secure firmware utilizes the OP-TEE implementation of the Global Platform specifications. The O…19 …this repository but is obtained directly from the public release. The build of OP-TEE is based on a20 native Linux build, however the following installation steps allow OP-TEE to be built under Windows…27 See the [optee_os documentation](https://github.com/OP-TEE/optee_os/blob/master/documentation/build…51 If you do not already have a version of the OP-TEE OS repo cloned on your machine you may run:57 #### 5. Build OP-TEE OS for the target platform65 Additional information on Microsoft IoT fork of OP-TEE OS can be found [here](https://github.com/ms…
29 .. |OP-TEE| replace:: :term:`OP-TEE`54 .. |TEE| replace:: :term:`TEE`
101 OP-TEE102 Open Portable Trusted Execution Environment. An example of a :term:`TEE`181 TEE
11 R5(U-Boot) --> TF-A BL31 --> BL32(OP-TEE) --> TF-A BL31 --> BL33(U-Boot) --> Linux32 OP-TEE:50 make ARCH=arm CROSS_COMPILE=aarch64-linux-gnu- ATF=<path> TEE=<path>
89 or if Op-TEE is used:91 ROM code -> BL2 (compiled with BL2_AT_EL3) -> OP-TEE -> BL33 (U-Boot)114 To build TF-A with OP-TEE support for all bootable devices:141 OP-TEE artifacts go into separate partitions as follows:
17 - OP-TEE18 `link <https://github.com/OP-TEE/optee_os>`__41 git clone https://github.com/OP-TEE/optee_os
17 - OP-TEE:18 `link <https://github.com/OP-TEE/optee_os>`__38 git clone https://github.com/OP-TEE/optee_os
12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is36 OP-TEE39 https://github.com/OP-TEE/optee_os.git
42 One can boot Trusted OS(OP-TEE OS, bl32 image) along side bl31 image on Allwinner A64.
35 return ChooseMask(PredBlockMask::TET, PredBlockMask::TEE); in expandPredBlockMask()42 case PredBlockMask::TEE: in expandPredBlockMask()
22 - tpm_event_log_sm_addr [fvp_nt_fw_config.dts with OP-TEE]26 Note. Currently OP-TEE does not support reading DTBs from Secure memory
15 $(info Trusted Firmware-A built for OP-TEE payload support)
40 TEE("tee"), enumConstant
49 - SPDs for the `OP-TEE Secure OS`_, `NVIDIA Trusted Little Kernel`_123 .. _OP-TEE Secure OS: https://github.com/OP-TEE/optee_os
73 TEE, enumConstant126 assertEquals(Bar.TEE, foo.enumField); in testConstantInjection()161 assertEquals(Bar.TEE, foo.enumField); in testConstantInjectionWithExplicitBindingsRequired()
101 TEE = 10, // 0b1010 enumerator