| 38bdafe8 | 26-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
plat-stm: move some CFG_'s from platform_config.h to conf.mk
STM platform can be configured from CFG_DDR_START/_SIZE, CFG_CORE_TZSRAM_EMUL_START and CFG_DDR_TEETZ_RESERVED_START/_SIZE.
Signed-off-b
plat-stm: move some CFG_'s from platform_config.h to conf.mk
STM platform can be configured from CFG_DDR_START/_SIZE, CFG_CORE_TZSRAM_EMUL_START and CFG_DDR_TEETZ_RESERVED_START/_SIZE.
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 2723fc9a | 26-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
plat-ti: move some CFG_'s from platform_config.h to conf.mk
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Andrew F. Davis <afd@ti.com> |
| 3235302e | 26-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
plat-ls: move some CFG_'s from platform_config.h to conf.mk
Remove CFG_DDR_TEETZ_RESERVED_START/_SIZE: internal to platform. Remove CFG_PUB_RAM_SIZE, use TEE_SHMEM_SIZE instead. Remove useless defin
plat-ls: move some CFG_'s from platform_config.h to conf.mk
Remove CFG_DDR_TEETZ_RESERVED_START/_SIZE: internal to platform. Remove CFG_PUB_RAM_SIZE, use TEE_SHMEM_SIZE instead. Remove useless definition of DDR_PHYS_START, DDR_SIZE, DRAM0_BASE/_SIZE, CFG_DDR_START/_SIZE.
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Sumit Garg <sumit.garg@nxp.com> Reviewed-by: Pankaj Gupta <pankaj.gupta@nxp.com>
show more ...
|
| f6bbec8e | 24-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
core: remove CFG_ prefix from CFG_TEE_LOAD_ADDR
TEE_LOAD_ADDR is now local to source files. It is set to CFG_TEE_LOAD_ADDR value if defined only for the platforms that previously allowed build to ov
core: remove CFG_ prefix from CFG_TEE_LOAD_ADDR
TEE_LOAD_ADDR is now local to source files. It is set to CFG_TEE_LOAD_ADDR value if defined only for the platforms that previously allowed build to override the value. Few platform did hardcod CFG_TEE_LOAD_ADDR, this change preserve these configurations.
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 6f4e40ab | 25-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
core: remove CFG_ prefix from CFG_SHMEM_START/_SIZE
Almost platform currently define these directives from within the source code, through platform_config.h. These values do not need to be configura
core: remove CFG_ prefix from CFG_SHMEM_START/_SIZE
Almost platform currently define these directives from within the source code, through platform_config.h. These values do not need to be configuration directive with the CFG_ prefix.
This change renames the CFG_SHMEM_xxx into TEE_SHMEM_xxx so that they do not mess with the platform configuration directives. Yet, the old CFG_SHMEM_START/SIZE directives can still be used by platform_config.h to set TEE_SHMEM_START/SIZE if the platform supports it (i.e plat-stm).
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 247bea90 | 25-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
core: remove CFG_ prefix from TA_RAM_START/TA_RAM_SIZE
Almost platform currently define these directives from within the source code, through platform_config.h. These values do not need to be config
core: remove CFG_ prefix from TA_RAM_START/TA_RAM_SIZE
Almost platform currently define these directives from within the source code, through platform_config.h. These values do not need to be configuration directive with the CFG_ prefix.
This change renames these macros so that they do not mess with the platform configuration directives.
Old macro label New macro label CFG_TA_RAM_START TA_RAM_START CFG_TA_RAM_SIZE TA_RAM_SIZE
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 446cc62a | 25-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
core: remove CFG_ prefix from TEE_RAM_START/VA_SIZE/PH_SIZE
Almost platform currently define these directives from within the source code, through platform_config.h. These values do not need to be c
core: remove CFG_ prefix from TEE_RAM_START/VA_SIZE/PH_SIZE
Almost platform currently define these directives from within the source code, through platform_config.h. These values do not need to be configuration directive with the CFG_ prefix.
This change renames these macros so that they do not mess with the platform configuration directives.
Old macro label New macro label CFG_TEE_RAM_START TEE_RAM_START CFG_TEE_RAM_VA_SIZE TEE_RAM_VA_SIZE CFG_TEE_RAM_PH_SIZE TEE_RAM_PH_SIZE
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 847b6aa6 | 25-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
plat-poplar: fix comments layout that hurts checkpatch
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> |
| d8dfc2d1 | 25-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
core: split SDP memory CFG_ and non-CFG_ configuration directives
This change aim at removing definition of CFG_ directive (here related to SDP) from the platform_config.h files.
CFG_TEE_SDP_MEM_BA
core: split SDP memory CFG_ and non-CFG_ configuration directives
This change aim at removing definition of CFG_ directive (here related to SDP) from the platform_config.h files.
CFG_TEE_SDP_MEM_BASE/_SIZE is a generic configuration directive to register a SDP memory.
Some platforms define a SDP test memory when SDP is enable. This SDP memory is located at the end of the TA_RAM. Introduce platform settings TEE_SDP_TEST_MEM_BASE/_SIZE to register a SDP test buffer, independently from the generic CFG_TEE_SDP_MEM_BASE/_SIZE.
Platforms marvel, stm, ti and vexpress updated.
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 9a159b2f | 13-Apr-2018 |
Ken Liu <ken.liu@arm.com> |
core: mmu: lpae: copy table of actual primary core
SOC has configurable core settings (e.g., Juno) does not take core-0 as primary core. Copying mapping table of core-0 to other cores causes boot fa
core: mmu: lpae: copy table of actual primary core
SOC has configurable core settings (e.g., Juno) does not take core-0 as primary core. Copying mapping table of core-0 to other cores causes boot failure on such configured SOC. Fix this problem by taking mapping table of actual primary core as copy source.
Signed-off-by: Ken Liu <ken.liu@arm.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 315415e6 | 23-Apr-2018 |
Jerome Forissier <jerome.forissier@linaro.org> |
core: ltc: DSA signature verification: fix return code
The GP TEE Internal Core specification mandates that TEE_AsymmetricVerifyDigest() must return TEE_SUCCESS if the signature is valid, TEE_ERROR_
core: ltc: DSA signature verification: fix return code
The GP TEE Internal Core specification mandates that TEE_AsymmetricVerifyDigest() must return TEE_SUCCESS if the signature is valid, TEE_ERROR_SIGNATURE_INVALID if it is invalid, or panic if any other error oocurs.
In the current implementation, TEE_ERROR_SIGNATURE_INVALID will never happen with the DSA algorithms. Fix that by properly checking the return code and signature status of the LibTomCrypt function.
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 3018c8e0 | 23-Apr-2018 |
Jerome Forissier <jerome.forissier@linaro.org> |
core: ltc: ECC signature verification: fix return code
The GP TEE Internal Core specification mandates that TEE_AsymmetricVerifyDigest() must return TEE_SUCCESS if the signature is valid, TEE_ERROR_
core: ltc: ECC signature verification: fix return code
The GP TEE Internal Core specification mandates that TEE_AsymmetricVerifyDigest() must return TEE_SUCCESS if the signature is valid, TEE_ERROR_SIGNATURE_INVALID if it is invalid, or panic if any other error oocurs.
In the current implementation, TEE_ERROR_SIGNATURE_INVALID will never happen with the ECC algorithms. Fix that by properly checking the return code and signature status of the LibTomCrypt function.
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| a3f5668a | 23-Apr-2018 |
Jerome Forissier <jerome.forissier@linaro.org> |
core: ltc: RSA signature verification: fix return code
The GP TEE Internal Core specification mandates that TEE_AsymmetricVerifyDigest() must return TEE_SUCCESS if the signature is valid, TEE_ERROR_
core: ltc: RSA signature verification: fix return code
The GP TEE Internal Core specification mandates that TEE_AsymmetricVerifyDigest() must return TEE_SUCCESS if the signature is valid, TEE_ERROR_SIGNATURE_INVALID if it is invalid, or panic if any other error oocurs.
In the current implementation, all errors returned by the LibTomCrypt RSA signature verification function are translated to TEE_ERROR_SIGNATURE_INVALID. It is incorrect. Fix that by introducing a helper function to properly handle both the return code and the signature verification status.
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| bdc2df1e | 23-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
qemu: discard legacy bios mailbox and support arm-tf boot scheme
Replace the unused bios_qemu_tz_arm mailbox for waking secondary boot cores with the mailbox used by the Arm trusted firmware.
Signe
qemu: discard legacy bios mailbox and support arm-tf boot scheme
Replace the unused bios_qemu_tz_arm mailbox for waking secondary boot cores with the mailbox used by the Arm trusted firmware.
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Tested-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 8aa2c8a2 | 20-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
qemu_virt: move core location to match qemu_armv8
Moving qemu_virt core to the same location as the core for qemu_armv8 allows to use the same arm-trusted-firmware configuration for ARMv7 and ARMv8
qemu_virt: move core location to match qemu_armv8
Moving qemu_virt core to the same location as the core for qemu_armv8 allows to use the same arm-trusted-firmware configuration for ARMv7 and ARMv8 Qemu support.
Qemu_virt Kasan offset is updated since new memory layout.
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 4d763fc3 | 20-Apr-2018 |
Etienne Carriere <etienne.carriere@linaro.org> |
core: 32bit generic entry executes in cpu Supervisor mode.
This change aims at supporting some bootloaders as the Aarch32 Arm trusted firmware that may boot cores in Monitor mode.
Signed-off-by: Et
core: 32bit generic entry executes in cpu Supervisor mode.
This change aims at supporting some bootloaders as the Aarch32 Arm trusted firmware that may boot cores in Monitor mode.
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| d2d2d58b | 19-Apr-2018 |
deebee-v2 <darren.broche@gmail.com> |
crypto: Make name and path of crypto library configurable
Allows for platform dependent implementations of exported crypto API
Signed-off-by: Darren Roche <darren.broche@gmail.com> Reviewed-by: Jen
crypto: Make name and path of crypto library configurable
Allows for platform dependent implementations of exported crypto API
Signed-off-by: Darren Roche <darren.broche@gmail.com> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 82d398c0 | 19-Apr-2018 |
Jerome Forissier <jerome.forissier@linaro.org> |
core: generic_entry_a64.S: use adr_l to allow bigger data sections
Fixes the following linker errors which happens when adding a big global array of data:
.../generic_entry_a64.o: In function `_sta
core: generic_entry_a64.S: use adr_l to allow bigger data sections
Fixes the following linker errors which happens when adding a big global array of data:
.../generic_entry_a64.o: In function `_start`: .../generic_entry_a64.S:95:(.text._start+0x30): relocation truncated to fit: R_AARCH64_ADR_PREL_LO21 against symbol `__bss_start` defined in .bss.__malloc_spinlock section in all_objs.o .../generic_entry_a64.S:96:(.text._start+0x34): relocation truncated to fit: R_AARCH64_ADR_PREL_LO21 against symbol `__bss_end` defined in .bss.__malloc_spinlock section in all_objs.o .../generic_entry_a64.o: In function `clear_bss`: .../generic_entry_a64.S:108:(.text._start+0x84): relocation truncated to fit: R_AARCH64_ADR_PREL_LO21 against symbol `__text_start` defined in .bss.__malloc_spinlock section in all_objs.o .../generic_entry_a64.S:139:(.text._start+0xc4): relocation truncated to fit: R_AARCH64_ADR_PREL_LO21 against symbol `__text_start` defined in .bss.__malloc_spinlock section in all_objs.o
The root cause is the 'adr x0, symbol' instructions. They generate a relocation of type R_AARCH64_ADR_PREL_LO21, therefore 'symbol' can only be +/-1MB away from the current PC (otherwise the linker emits the above error). The problem is, in _start() and clear_bss() there is no guarantee that the referenced symbols are in the allowed range.
The linker script core/arch/arm/kernel/link_dummy.ld, which is used to generate all_objs.o, places __bss_start, __bss_end, __text_start etc. at the end of the binary. The _start() and clear_bss() functions, on the other hand, are near the start. If the total size of the binary is sufficiently increased (for instance by adding global data), the error will occur.
The __text_start error could probably be avoided by modifying link_dummy.ld -- the actual location of the __* symbols does not matter much in this phase of the build. However, the references to __bss_start and __bss_end are still likely to be problematic in the final link phase, because .bss can very well be more than 1MB away from .text (with .rodata and .data between them).
So, let's use the adr_l macro which splits 'adr x0, symbol' in two steps: 'adrp x0, symbol' (which generates a relocation of type R_AARCH64_ADR_PREL_PG_HI21 for the 4K page offset) followed by 'add x0, x0, :lo12:symbol' (which generates a R_AARCH64_ADD_ABS_LO12 relocation for the offset into the page). The accessible range becomes +/- 4GB.
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Reported-by: Guanchao Liang <liangguanchao1@huawei.com> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 7ff6724e | 19-Apr-2018 |
Jerome Forissier <jerome.forissier@linaro.org> |
core: arm64: add adr_l assembly macro
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> |
| 7531fb24 | 29-Mar-2018 |
Jens Wiklander <jens.wiklander@linaro.org> |
Use mempool API from libutils for bignum allocations
Uses the Use mempool API from libutils for bignum allocations.
Reviewed-by: Volodymyr Babchuk <vlad.babchuk@gmail.com> Acked-by: Jerome Forissie
Use mempool API from libutils for bignum allocations
Uses the Use mempool API from libutils for bignum allocations.
Reviewed-by: Volodymyr Babchuk <vlad.babchuk@gmail.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| bc879b17 | 16-Apr-2018 |
Jerome Forissier <jerome.forissier@linaro.org> |
ltc: detect GCM counter re-use
Upstream commit 7d418b34b3fe ("Fix GCM counter reuse"):
GCM should error out after processing (2^32)-1 blocks / (2^39)-256 bits
[Note: LibTomCrypt GCM is used when C
ltc: detect GCM counter re-use
Upstream commit 7d418b34b3fe ("Fix GCM counter reuse"):
GCM should error out after processing (2^32)-1 blocks / (2^39)-256 bits
[Note: LibTomCrypt GCM is used when CFG_CRYPTO_AES_GCM_FROM_CRYPTOLIB=y which is not the default]
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (QEMU) Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (HiKey960) Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| a449c911 | 12-Apr-2018 |
Andrew F. Davis <afd@ti.com> |
plat-ti: Restore GIC context on resume
The resume path may need to re-setup the GIC. This is cleared in some suspend paths and so should be restored.
Signed-off-by: Andrew F. Davis <afd@ti.com> |
| 8d91fe09 | 13-Apr-2018 |
Victor Chong <victor.chong@linaro.org> |
hikey: register additional dyn shm
Signed-off-by: Victor Chong <victor.chong@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> |
| 9896cd2d | 13-Apr-2018 |
Victor Chong <victor.chong@linaro.org> |
hikey: fix typo
Signed-off-by: Victor Chong <victor.chong@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> |
| 74977ea7 | 03-Apr-2018 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: calculate size of special rx map at EL0
Calculate the required size the read-only executable mapping of kernel mode code while in user mode (EL0) instead of the old hard coded 8k size.
Review
core: calculate size of special rx map at EL0
Calculate the required size the read-only executable mapping of kernel mode code while in user mode (EL0) instead of the old hard coded 8k size.
Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Tested-by: Jens Wiklander <jens.wiklander@linaro.org> (Juno) Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|