From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-oo1-f45.google.com (mail-oo1-f45.google.com [209.85.161.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3BA6C27E05E for ; Wed, 13 Aug 2025 07:49:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.161.45 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755071382; cv=none; b=GUat4zVU8cw56+ukpRvYlvFJlTznzL3lrjr38CHypxUbQU6bdEmr+warESDOhjffTLxwJRuCzhM4rO/jRjDyEsqJ4neQyYxmHJlkdQkY2/qN1XQEPc8uc/2Mgjf8rfq0s58qqIEbxtUZq31H8CL0wtg8oqyMZyjOT9YR2uWHnhg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755071382; c=relaxed/simple; bh=wfeJn6OXLOSd2GklhvEK2KXBF/te/QhNlLJRLLpT6NU=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=B//oHzYqSM5srjwjZpujAjKunhpnjip3eZct6xHg+MMvhHhYsiNxe/fZ98IrJ77yT9McAqHB6nCWgXQPJzIuDO18/ALo8QZ8Jula42XsBGvfREHeV+EQjm9cknuzJ4gDmzW734FT1wFMe+eXvoo/hJK2P0gcjK26+DSqZj6hzQ4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org; spf=pass smtp.mailfrom=linaro.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b=XLyuCYqE; arc=none smtp.client-ip=209.85.161.45 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linaro.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="XLyuCYqE" Received: by mail-oo1-f45.google.com with SMTP id 006d021491bc7-619a603b7cdso1885477eaf.2 for ; Wed, 13 Aug 2025 00:49:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1755071379; x=1755676179; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=wfeJn6OXLOSd2GklhvEK2KXBF/te/QhNlLJRLLpT6NU=; b=XLyuCYqEnk9yF8JdXGunyN+ujw1Fymw1txYThuFHVO2alhysN1K4UCef6XGGbyw5it 2w0IztDtFaXf65o16a9X5/C6QcWHc/D94mgHCUwA34dngIcBBdYYDnV54lk3yrY6Si7x gIewLX3Vp/4GbAGHr/ZjpbHAauw2rtEsgLo7/PNdYPphtnLTjL1YCQiJFlIzHn6ofNsW nD76UpLQUHYCKuBeJiR8PSOAuOchc/t5lZ7/SIK75NQw5Fir5TTIkgblpdxglIh/dcZm i19+M2atTq0+VCm9ibcrVebj29D6Bute5K5CHRYwwqLlty+2MyY5WNCJ0vWDrPpSnkAv mkkw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755071379; x=1755676179; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=wfeJn6OXLOSd2GklhvEK2KXBF/te/QhNlLJRLLpT6NU=; b=tNdnDlIFETZgSvTK+Q2Sq2yaSYi71rY4YNhG6Qx50JJzfNICxZs8EO7iVbB5AafOnG SJq4/vyE6V88pdhqZKNQWdmGIiA5qzvjhJHneAfVW282ILSvv3fCPdpcgruRC+zOUW2K fgSn7FRzdSNX/ClfZ/uBtezIsOaOCw79TbcZT5FHQMOMy8K8Q1JDhsvI/2yQZw/yFzqr ZN1fmsmKNWcsYvSBNhBw/uEvGMIkm0Nwzuw1+30hQj/aQoBJH6I4RluPtjlcGQ1kdBDx S/8t0F/+/ifvyJ9QgOrEf8z9N9RKU6l5hUp5oEleGb2aMLGNcDOlAs3x03+B8uUgkxxi nuzQ== X-Forwarded-Encrypted: i=1; AJvYcCWUyNlefY+GBAMVEIoiK8Q2Y/7rTeGphSDBBpPv7RbWQaAb+EM8erpAtWGWTdF2yDsdDeYF2wuP2eVJxl/ZN9o=@vger.kernel.org X-Gm-Message-State: AOJu0Ywh/DSNCeJiRKIAJ0V6ZyPob+LjJLeVjqJpDic4S9/jFFj58Dse XJXz+IE+duGWSwudm8NTeK65hXjCDI09I6O9lsabBdClVVd+pSuYkRvQ74v+BW/WAfZQGwzPvqw fq1Hb/4sjJtyNbaqJ6h8KAmiYk1JN0NfDvvBqD4hFCA== X-Gm-Gg: ASbGncsvBmkRiGbnEmh0/xpJmbD5kqMAGW2YvGXqShGWHA0olVYluZQZNo39LJlRsbP YX+0EQGtziQaIbzFKoF0PIsz+Mn+KTmlEal9mMch6ra/QwytGqRqL/UdhggKYyRKDuWrx4JrFNK TbUAVTf2cnoHOXH+bE3wLKObEH303OUFzHY1CHssn0fcGMUORQtu9xAQMdrddMeIPRm8SeMTRRw grXIUJnlYOc2MRJPp8= X-Google-Smtp-Source: AGHT+IFAfPPXVnV/fIsv8KnI8b8Bl+IOsf+U5t0pmvRJM0gZ8xG3AukFt3DXdXVb9aF/gWZVqDSUuTyRuSP2uDtgU3s= X-Received: by 2002:a05:6820:1ac1:b0:619:a6c0:b4b with SMTP id 006d021491bc7-61bc758538amr1013523eaf.5.1755071379266; Wed, 13 Aug 2025 00:49:39 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-hardening@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20250812-qcom-tee-using-tee-ss-without-mem-obj-v7-0-ce7a1a774803@oss.qualcomm.com> In-Reply-To: <20250812-qcom-tee-using-tee-ss-without-mem-obj-v7-0-ce7a1a774803@oss.qualcomm.com> From: Jens Wiklander Date: Wed, 13 Aug 2025 09:49:27 +0200 X-Gm-Features: Ac12FXyfvHrDtrackOzZC99WcBb71C_WC3_DT2d5Ppi_3YWKQtwtthH808vWulI Message-ID: Subject: Re: [PATCH v7 00/11] Trusted Execution Environment (TEE) driver for Qualcomm TEE (QTEE) To: Amirreza Zarrabi , Bjorn Andersson , Konrad Dybcio Cc: Sumit Garg , Bartosz Golaszewski , Apurupa Pattapu , Kees Cook , "Gustavo A. R. Silva" , Sumit Semwal , =?UTF-8?Q?Christian_K=C3=B6nig?= , Harshal Dev , linux-arm-msm@vger.kernel.org, op-tee@lists.trustedfirmware.org, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-doc@vger.kernel.org, Sumit Garg , Neil Armstrong Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi Amir, On Wed, Aug 13, 2025 at 2:37=E2=80=AFAM Amirreza Zarrabi wrote: > > This patch series introduces a Trusted Execution Environment (TEE) > driver for Qualcomm TEE (QTEE). QTEE enables Trusted Applications (TAs) > and services to run securely. It uses an object-based interface, where > each service is an object with sets of operations. Clients can invoke > these operations on objects, which can generate results, including other > objects. For example, an object can load a TA and return another object > that represents the loaded TA, allowing access to its services. > There are some build errors/warnings for arm and x86_64, see https://tuxapi.tuxsuite.com/v1/groups/linaro/projects/jens/plans/31DmCOn1pF= 2JGVDk3otBOXOL6kV Thanks, Jens