Lines Matching +full:non +full:- +full:secure
2 * Copyright (c) 2015-2016, Linaro Limited
34 * This file defines the OP-TEE message protocol used to communicate
35 * with an instance of OP-TEE running in secure world.
40 * 3. Requests from secure world, Remote Procedure Call (RPC), handled by
41 * tee-supplicant.
45 * Part 1 - formatting of messages
62 * Meta parameter to be absorbed by the Secure OS and not passed
70 * Pointer to a list of pages used to register user-defined SHM buffer.
73 * list of page addresses. OP-TEE core can reconstruct contiguous buffer from
85 * uint64_t pages_array[OPTEE_MSG_NONCONTIG_PAGE_SIZE/sizeof(uint64_t) - 1];
119 * Page size used in non-contiguous buffer entries
124 * struct optee_msg_param_tmem - temporary memory reference parameter
129 * Secure and normal world communicates pointers as physical address
130 * instead of the virtual address. This is because secure and normal world
134 * structure to secure world.
143 * struct optee_msg_param_rmem - registered memory reference parameter
155 * struct optee_msg_param_value - opaque value parameter
157 * Value parameters are passed unchecked between normal and secure world.
166 * struct optee_msg_param - parameter used together with struct optee_msg_arg
188 * struct optee_msg_arg - call argument
228 * OPTEE_MSG_GET_ARG_SIZE - return size of struct optee_msg_arg
240 * Part 2 - requests from normal world
246 * 384fb3e0-e7f8-11e3-af63-0002a5d5c51b.
247 * Represented in 4 32-bit words in OPTEE_MSG_UID_0, OPTEE_MSG_UID_1,
258 * extensions. Represented in 2 32-bit words in OPTEE_MSG_REVISION_MAJOR
268 * Used by non-secure world to figure out which Trusted OS is installed.
271 * Returns UUID in 4 32-bit words in the same way as
283 * Used by non-secure world to figure out which version of the Trusted OS
287 * Returns revision in 2 32-bit words in the same way as
293 * Do a secure call with struct optee_msg_arg as argument
299 * param[0].u.value.a-b uuid of Trusted Application
300 * param[1].u.value.a-b uuid of Client
339 * Part 3 - Requests from secure world, RPC
346 * RPC communication with tee-supplicant is reversed compared to normal
352 * Load a TA into memory, defined in tee-supplicant
362 * File system access, defined in tee-supplicant
370 * 1970-01-01 00:00:00 +0000 (UTC).
378 * Wait queue primitive, helper for secure world to implement a wait queue.
380 * If secure world need to wait for a secure world mutex it issues a sleep
381 * request instead of spinning in secure world. Conversely is a wakeup
382 * request issued when a secure world mutex with a thread waiting thread is
425 * as in param[n-1].u.tmem.shm_ref)
428 /* Memory that can be shared with a non-secure user space application */
430 /* Memory only shared with non-secure kernel */