ACIL FM
Dark
Refresh
Current DIR:
/usr/src/kernels/5.14.0-611.34.1.el9_7.x86_64/drivers/tee/optee
/
usr
src
kernels
5.14.0-611.34.1.el9_7.x86_64
drivers
tee
optee
Upload
Zip Selected
Delete Selected
Pilih semua
Nama
Ukuran
Permission
Aksi
Kconfig
1 MB
chmod
View
DL
Edit
Rename
Delete
Makefile
318 B
chmod
View
DL
Edit
Rename
Delete
Edit file: /usr/src/kernels/5.14.0-611.34.1.el9_7.x86_64/drivers/tee/optee/Kconfig
# SPDX-License-Identifier: GPL-2.0-only # OP-TEE Trusted Execution Environment Configuration config OPTEE tristate "OP-TEE" depends on HAVE_ARM_SMCCC depends on MMU help This implements the OP-TEE Trusted Execution Environment (TEE) driver. config OPTEE_INSECURE_LOAD_IMAGE bool "Load OP-TEE image as firmware" default n depends on OPTEE && ARM64 help This loads the BL32 image for OP-TEE as firmware when the driver is probed. This returns -EPROBE_DEFER until the firmware is loadable from the filesystem which is determined by checking the system_state until it is in SYSTEM_RUNNING. This also requires enabling the corresponding option in Trusted Firmware for Arm. The documentation there explains the security threat associated with enabling this as well as mitigations at the firmware and platform level. https://trustedfirmware-a.readthedocs.io/en/latest/threat_model/threat_model.html Additional documentation on kernel security risks are at Documentation/staging/tee.rst.
Simpan
Batal
Isi Zip:
Unzip
Create
Buat Folder
Buat File
Terminal / Execute
Run
Chmod Bulk
All File
All Folder
All File dan Folder
Apply