<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Kconfig</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>c835e5a3 - tee: tstee: Add Trusted Services TEE driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#c835e5a3</link>
        <description>tee: tstee: Add Trusted Services TEE driverThe Trusted Services project provides a framework for developing anddeploying device Root of Trust services in FF-A Secure Partitions. TheFF-A SPs are accessible through the FF-A driver, but this doesn&apos;tprovide a user space interface. The goal of this TEE driver is to makeTrusted Services SPs accessible for user space clients.All TS SPs have the same FF-A UUID, it identifies the RPC protocol usedby TS. A TS SP can host one or more services, a service is identified byits service UUID. The same type of service cannot be present twice inthe same SP. During SP boot each service in an SP is assigned aninterface ID, this is just a short ID to simplify message addressing.There is 1:1 mapping between TS SPs and TEE devices, i.e. a separate TEEdevice is registered for each TS SP. This is required since contrary tothe generic TEE design where memory is shared with the whole TEEimplementation, in case of FF-A, memory is shared with a specific SP. Auser space client has to be able to separately share memory with each SPbased on its endpoint ID.Acked-by: Sumit Garg &lt;sumit.garg@linaro.org&gt;Signed-off-by: Balint Dobszay &lt;balint.dobszay@arm.com&gt;Signed-off-by: Jens Wiklander &lt;jens.wiklander@linaro.org&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Mon, 25 Mar 2024 15:11:03 +0000</pubDate>
        <dc:creator>Balint Dobszay &lt;balint.dobszay@arm.com&gt;</dc:creator>
    </item>
<item>
        <title>a4b75fe8 - tee: combine &quot;config&quot; and &quot;menu&quot; for TEE&apos;s menuconfig</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#a4b75fe8</link>
        <description>tee: combine &quot;config&quot; and &quot;menu&quot; for TEE&apos;s menuconfigDon&apos;t let TEE occupy two lines in menuconfig when practically noother (sub)menu does either.Signed-off-by: Jan Engelhardt &lt;jengelh@inai.de&gt;Reviewed-by: Sumit Garg &lt;sumit.garg@linaro.org&gt;Signed-off-by: Jens Wiklander &lt;jens.wiklander@linaro.org&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Tue, 28 Dec 2021 19:57:37 +0000</pubDate>
        <dc:creator>Jan Engelhardt &lt;jengelh@inai.de&gt;</dc:creator>
    </item>
<item>
        <title>60b4000f - tee: fix crypto select</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#60b4000f</link>
        <description>tee: fix crypto selectWhen selecting a crypto cipher, we also need to select thesubsystem itself:WARNING: unmet direct dependencies detected for CRYPTO_SHA1  Depends on [m]: CRYPTO [=m]  Selected by [y]:  - TEE [=y] &amp;&amp; (HAVE_ARM_SMCCC [=n] || COMPILE_TEST [=y] || CPU_SUP_AMD [=y])  Selected by [m]:  - CRYPTO_DEV_QAT [=m] &amp;&amp; CRYPTO [=m] &amp;&amp; CRYPTO_HW [=y]  - CRYPTO_DEV_MEDIATEK [=m] &amp;&amp; CRYPTO [=m] &amp;&amp; CRYPTO_HW [=y] &amp;&amp; (ARM &amp;&amp; ARCH_MEDIATEK || COMPILE_TEST [=y])  - CRYPTO_DEV_SAFEXCEL [=m] &amp;&amp; CRYPTO [=m] &amp;&amp; CRYPTO_HW [=y] &amp;&amp; (OF [=y] || PCI [=y] || COMPILE_TEST [=y]) &amp;&amp; HAS_IOMEM [=y]  - CRYPTO_DEV_CCREE [=m] &amp;&amp; CRYPTO [=m] &amp;&amp; CRYPTO_HW [=y] &amp;&amp; OF [=y] &amp;&amp; HAS_DMA [=y]  - CRYPTO_DEV_SP_CCP [=y] &amp;&amp; CRYPTO [=m] &amp;&amp; CRYPTO_HW [=y] &amp;&amp; CRYPTO_DEV_CCP [=y] &amp;&amp; CRYPTO_DEV_CCP_DD [=m] &amp;&amp; DMADEVICES [=y]Link: https://lore.kernel.org/r/20200527133924.724819-1-arnd@arndb.deFixes: e33bcbab16d1 (&quot;tee: add support for session&apos;s client UUID generation&quot;)Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Reviewed-by: Vesa J&#228;&#228;skel&#228;inen &lt;vesa.jaaskelainen@vaisala.com&gt;Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Wed, 27 May 2020 13:39:16 +0000</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
<item>
        <title>e33bcbab - tee: add support for session&apos;s client UUID generation</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#e33bcbab</link>
        <description>tee: add support for session&apos;s client UUID generationTEE Client API defines that from user space only information needed forspecified login operations is group identifier for group based logins.REE kernel is expected to formulate trustworthy client UUID and pass thatto TEE environment. REE kernel is required to verify that provided groupidentifier for group based logins matches calling processes groupmemberships.TEE specification only defines that the information passed from REEenvironment to TEE environment is encoded into on UUID.In order to guarantee trustworthiness of client UUID user space is notallowed to freely pass client UUID.UUIDv5 form is used encode variable amount of information needed fordifferent login types.Signed-off-by: Vesa J&#228;&#228;skel&#228;inen &lt;vesa.jaaskelainen@vaisala.com&gt;[jw: remove unused variable application_id]Signed-off-by: Jens Wiklander &lt;jens.wiklander@linaro.org&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Thu, 30 Apr 2020 12:37:09 +0000</pubDate>
        <dc:creator>Vesa J&#228;&#228;skel&#228;inen &lt;vesa.jaaskelainen@vaisala.com&gt;</dc:creator>
    </item>
<item>
        <title>757cc3e9 - tee: add AMD-TEE driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#757cc3e9</link>
        <description>tee: add AMD-TEE driverAdds AMD-TEE driver.* targets AMD APUs which has AMD Secure Processor with software-based  Trusted Execution Environment (TEE) support* registers with TEE subsystem* defines tee_driver_ops function callbacks* kernel allocated memory is used as shared memory between normal  world and secure world.* acts as REE (Rich Execution Environment) communication agent, which  uses the services of AMD Secure Processor driver to submit commands  for processing in TEE environmentCc: Ard Biesheuvel &lt;ard.biesheuvel@linaro.org&gt;Cc: Tom Lendacky &lt;thomas.lendacky@amd.com&gt;Acked-by: Jens Wiklander &lt;jens.wiklander@linaro.org&gt;Co-developed-by: Devaraj Rangasamy &lt;Devaraj.Rangasamy@amd.com&gt;Signed-off-by: Devaraj Rangasamy &lt;Devaraj.Rangasamy@amd.com&gt;Signed-off-by: Rijo Thomas &lt;Rijo-john.Thomas@amd.com&gt;Reviewed-by: Gary R Hook &lt;gary.hook@amd.com&gt;Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Fri, 27 Dec 2019 05:24:01 +0000</pubDate>
        <dc:creator>Rijo Thomas &lt;Rijo-john.Thomas@amd.com&gt;</dc:creator>
    </item>
<item>
        <title>1a74fa38 - tee: allow compilation of tee subsystem for AMD CPUs</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#1a74fa38</link>
        <description>tee: allow compilation of tee subsystem for AMD CPUsAllow compilation of tee subsystem for AMD&apos;s CPUs which have a dedicatedAMD Secure Processor for Trusted Execution Environment (TEE).Acked-by: Jens Wiklander &lt;jens.wiklander@linaro.org&gt;Co-developed-by: Devaraj Rangasamy &lt;Devaraj.Rangasamy@amd.com&gt;Signed-off-by: Devaraj Rangasamy &lt;Devaraj.Rangasamy@amd.com&gt;Signed-off-by: Rijo Thomas &lt;Rijo-john.Thomas@amd.com&gt;Reviewed-by: Gary R Hook &lt;gary.hook@amd.com&gt;Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Fri, 27 Dec 2019 05:24:00 +0000</pubDate>
        <dc:creator>Rijo Thomas &lt;Rijo-john.Thomas@amd.com&gt;</dc:creator>
    </item>
<item>
        <title>ec8f24b7 - treewide: Add SPDX license identifier - Makefile/Kconfig</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#ec8f24b7</link>
        <description>treewide: Add SPDX license identifier - Makefile/KconfigAdd SPDX license identifiers to all Make/Kconfig files which: - Have no license information of any formThese files fall under the project license, GPL v2 only. The resulting SPDXlicense identifier is:  GPL-2.0-onlySigned-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Sun, 19 May 2019 12:07:45 +0000</pubDate>
        <dc:creator>Thomas Gleixner &lt;tglx@linutronix.de&gt;</dc:creator>
    </item>
<item>
        <title>e8418885 - tee: add ARM_SMCCC dependency</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#e8418885</link>
        <description>tee: add ARM_SMCCC dependencyFor the moment, the tee subsystem only makes sense in combination withthe op-tee driver that depends on ARM_SMCCC, so let&apos;s hide the subsystemfrom users that can&apos;t select that.Suggested-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Wed, 10 May 2017 19:05:16 +0000</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
<item>
        <title>4fb0a5eb - tee: add OP-TEE driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#4fb0a5eb</link>
        <description>tee: add OP-TEE driverAdds a OP-TEE driver which also can be compiled as a loadable module.* Targets ARM and ARM64* Supports using reserved memory from OP-TEE as shared memory* Probes OP-TEE version using SMCs* Accepts requests on privileged and unprivileged device* Uses OPTEE message protocol version 2 to communicate with secure worldAcked-by: Andreas Dannenberg &lt;dannenberg@ti.com&gt;Tested-by: Jerome Forissier &lt;jerome.forissier@linaro.org&gt; (HiKey)Tested-by: Volodymyr Babchuk &lt;vlad.babchuk@gmail.com&gt; (RCAR H3)Tested-by: Scott Branden &lt;scott.branden@broadcom.com&gt;Reviewed-by: Javier Gonz&#225;lez &lt;javier@javigon.com&gt;Signed-off-by: Jens Wiklander &lt;jens.wiklander@linaro.org&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Tue, 14 Apr 2015 12:33:20 +0000</pubDate>
        <dc:creator>Jens Wiklander &lt;jens.wiklander@linaro.org&gt;</dc:creator>
    </item>
<item>
        <title>967c9cca - tee: generic TEE subsystem</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/tee/Kconfig#967c9cca</link>
        <description>tee: generic TEE subsystemInitial patch for generic TEE subsystem.This subsystem provides:* Registration/un-registration of TEE drivers.* Shared memory between normal world and secure world.* Ioctl interface for interaction with user space.* Sysfs implementation_id of TEE driverA TEE (Trusted Execution Environment) driver is a driver that interfaceswith a trusted OS running in some secure environment, for example,TrustZone on ARM cpus, or a separate secure co-processor etc.The TEE subsystem can serve a TEE driver for a Global Platform compliantTEE, but it&apos;s not limited to only Global Platform TEEs.This patch builds on other similar implementations trying to solvethe same problem:* &quot;optee_linuxdriver&quot; by among others  Jean-michel DELORME&lt;jean-michel.delorme@st.com&gt; and  Emmanuel MICHEL &lt;emmanuel.michel@st.com&gt;* &quot;Generic TrustZone Driver&quot; by Javier Gonz&#225;lez &lt;javier@javigon.com&gt;Acked-by: Andreas Dannenberg &lt;dannenberg@ti.com&gt;Tested-by: Jerome Forissier &lt;jerome.forissier@linaro.org&gt; (HiKey)Tested-by: Volodymyr Babchuk &lt;vlad.babchuk@gmail.com&gt; (RCAR H3)Tested-by: Scott Branden &lt;scott.branden@broadcom.com&gt;Reviewed-by: Javier Gonz&#225;lez &lt;javier@javigon.com&gt;Signed-off-by: Jens Wiklander &lt;jens.wiklander@linaro.org&gt;

            List of files:
            /linux-6.15/drivers/tee/Kconfig</description>
        <pubDate>Wed, 11 Mar 2015 13:39:39 +0000</pubDate>
        <dc:creator>Jens Wiklander &lt;jens.wiklander@linaro.org&gt;</dc:creator>
    </item>
</channel>
</rss>
