linux/drivers/tee
Amirreza Zarrabi d5b8b0fa17 tee: add TEE_IOCTL_PARAM_ATTR_TYPE_OBJREF
The TEE subsystem allows session-based access to trusted services,
requiring a session to be established to receive a service. This
is not suitable for an environment that represents services as objects.
An object supports various operations that a client can invoke,
potentially generating a result or a new object that can be invoked
independently of the original object.

Add TEE_IOCTL_PARAM_ATTR_TYPE_OBJREF_INPUT/OUTPUT/INOUT to represent an
object. Objects may reside in either TEE or userspace. To invoke an
object in TEE, introduce a new ioctl. Use the existing SUPPL_RECV and
SUPPL_SEND to invoke an object in userspace.

Reviewed-by: Sumit Garg <sumit.garg@oss.qualcomm.com>
Tested-by: Neil Armstrong <neil.armstrong@linaro.org>
Tested-by: Harshal Dev <quic_hdev@quicinc.com>
Signed-off-by: Amirreza Zarrabi <amirreza.zarrabi@oss.qualcomm.com>
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2025-09-15 17:34:06 +02:00
..
amdtee amdtee: Sort header includes 2025-04-29 10:57:57 +02:00
optee optee: smc abi: dynamic protected memory allocation 2025-09-11 11:22:43 +02:00
tstee tee: tstee: Add Trusted Services TEE driver 2024-04-03 14:03:09 +02:00
Kconfig tee: implement protected DMA-heap 2025-09-11 11:22:20 +02:00
Makefile tee: implement protected DMA-heap 2025-09-11 11:22:20 +02:00
tee_core.c tee: add TEE_IOCTL_PARAM_ATTR_TYPE_OBJREF 2025-09-15 17:34:06 +02:00
tee_heap.c tee: implement protected DMA-heap 2025-09-11 11:22:20 +02:00
tee_private.h tee: add close_context to TEE driver operation 2025-09-15 17:34:06 +02:00
tee_shm.c tee: add tee_shm_alloc_dma_mem() 2025-09-11 11:22:33 +02:00
tee_shm_pool.c tee: Refactor TEE subsystem header files 2024-04-03 09:19:31 +02:00