| 4bdddf20 | 31-May-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
ta: relax location of ta_head
TAs where required to have the ta_head as at the load address of the TA prior to this patch. This makes the linker script slightly more complicated and also confuses GD
ta: relax location of ta_head
TAs where required to have the ta_head as at the load address of the TA prior to this patch. This makes the linker script slightly more complicated and also confuses GDB so that an offset must be applied to the load address of the TA when using GDB for debugging. So allow that ta_head symbol to reside anywhere in the ELF binary and also add ta_head to the .dynsym section to make sure that tools and ldelf can find the symbol.
This change requires prior updates to tools and ldelf.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 7f2daddf | 31-May-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
ta/link.mk: always generate TA dyn_list
Always generate the file holding the list of dynamic symbols a TA should provide. This is needed if CFG_FTRACE_SUPPORT should be changed between two compilati
ta/link.mk: always generate TA dyn_list
Always generate the file holding the list of dynamic symbols a TA should provide. This is needed if CFG_FTRACE_SUPPORT should be changed between two compilations. Use the make macro mv-if-changed() to only update the used file if it will be changed.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 5831e426 | 31-May-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
Move mv-if-changed() into mk/macros.mk
Moves the make macro mv-if-changed() into mk/macros.mk to allow use of it in the TA devkit.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Signed
Move mv-if-changed() into mk/macros.mk
Moves the make macro mv-if-changed() into mk/macros.mk to allow use of it in the TA devkit.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 32b31808 | 06-Oct-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
Squashed commit upgrading to mbedtls-3.4.0
Squash merging branch import/mbedtls-3.4.0
8225713449d3 ("libmbedtls: fix unrecognized compiler option") f03730842d7b ("core: ltc: configure internal MD5"
Squashed commit upgrading to mbedtls-3.4.0
Squash merging branch import/mbedtls-3.4.0
8225713449d3 ("libmbedtls: fix unrecognized compiler option") f03730842d7b ("core: ltc: configure internal MD5") 2b0d0c50127c ("core: ltc: configure internal SHA-1 and SHA-224") 0e48a6e17630 ("libmedtls: core: update to mbedTLS 3.4.0 API") 049882b143af ("libutee: update to mbedTLS 3.4.0 API") 982307bf6169 ("core: LTC mpi_desc.c: update to mbedTLS 3.4.0 API") 33218e9eff7b ("ta: pkcs11: update to mbedTLS 3.4.0 API") 6956420cc064 ("libmbedtls: fix cipher_wrap.c for NIST AES Key Wrap mode") ad67ef0b43fd ("libmbedtls: fix cipher_wrap.c for chacha20 and chachapoly") 7300f4d97bbf ("libmbedtls: add fault mitigation in mbedtls_rsa_rsassa_pkcs1_v15_verify()") cec89b62a86d ("libmbedtls: add fault mitigation in mbedtls_rsa_rsassa_pss_verify_ext()") e7e048796c44 ("libmbedtls: add SM2 curve") 096beff2cd31 ("libmbedtls: mbedtls_mpi_exp_mod(): optimize mempool usage") 7108668efd3f ("libmbedtls: mbedtls_mpi_exp_mod(): reduce stack usage") 0ba4eb8d0572 ("libmbedtls: mbedtls_mpi_exp_mod() initialize W") 3fd6ecf00382 ("libmbedtls: fix no CRT issue") d5ea7e9e9aa7 ("libmbedtls: add interfaces in mbedtls for context memory operation") 2b0fb3f1fa3d ("libmedtls: mpi_miller_rabin: increase count limit") 2c3301ab99bb ("libmbedtls: add mbedtls_mpi_init_mempool()") 9a111f0da04b ("libmbedtls: make mbedtls_mpi_mont*() available") 804fe3a374f5 ("mbedtls: configure mbedtls to reach for config") b28a41531427 ("mbedtls: remove default include/mbedtls/config.h") dfafe507bbef ("Import mbedtls-3.4.0")
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (vexpress-qemu_armv8a)
show more ...
|
| 7c243321 | 29-Jul-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: fix EC private key import
When importing EC private key also generate hidden EC public key for that.
This fixes EC private key import problem.
Signed-off-by: Vesa Jääskeläinen <vesa.ja
ta: pkcs11: fix EC private key import
When importing EC private key also generate hidden EC public key for that.
This fixes EC private key import problem.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Tested-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| c9cf3320 | 27-Jul-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: add hidden EC point support
The PKCS#11 standard does not allow one to have CKA_EC_POINT for private keys but TEE internal API requires one to be present when performing private key oper
ta: pkcs11: add hidden EC point support
The PKCS#11 standard does not allow one to have CKA_EC_POINT for private keys but TEE internal API requires one to be present when performing private key operations. Instead of calculating it each time it is needed store it as hidden attribute.
This fixes EC private key generation to function as specified in standard.
There is backwards support for existing keys that has been created inadvertently with CKA_EC_POINT included.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Tested-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 981966bc | 27-Jul-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: add OP-TEE hidden attribute extension
Attributes which has hidden OP-TEE vendor flag specified are not exported to user space nor can be imported from user space.
Signed-off-by: Vesa Jä
ta: pkcs11: add OP-TEE hidden attribute extension
Attributes which has hidden OP-TEE vendor flag specified are not exported to user space nor can be imported from user space.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Tested-by: Ayoub Zaki <ayoub.zaki@embetrix.com>
show more ...
|
| 58282936 | 27-Jul-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: specify OP-TEE's vendor specific attribute scheme
Add vendor allocation specification for OP-TEE specific attributes.
Specifies which bits of attribute identifier is for what purpose.
ta: pkcs11: specify OP-TEE's vendor specific attribute scheme
Add vendor allocation specification for OP-TEE specific attributes.
Specifies which bits of attribute identifier is for what purpose.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Tested-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 6a7d7282 | 27-Jul-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: introduce PKCS11_CKF_ARRAY_ATTRIBUTE
Add own define for PKCS11_CKF_ARRAY_ATTRIBUTE to keep attribute defines clear.
Adjust users to new define.
Value is same as CKF_ARRAY_ATTRIBUTE in
ta: pkcs11: introduce PKCS11_CKF_ARRAY_ATTRIBUTE
Add own define for PKCS11_CKF_ARRAY_ATTRIBUTE to keep attribute defines clear.
Adjust users to new define.
Value is same as CKF_ARRAY_ATTRIBUTE in standard.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Tested-by: Ayoub Zaki <ayoub.zaki@embetrix.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 0f6acf3a | 17-Apr-2023 |
Arnaud Pouliquen <arnaud.pouliquen@foss.st.com> |
ta: export remoteproc signature script and default key
The remoteproc firmware signature script and its associated default key must be exported in the dev kit in order to be able to sign the remotep
ta: export remoteproc signature script and default key
The remoteproc firmware signature script and its associated default key must be exported in the dev kit in order to be able to sign the remoteproc firmware.
Signed-off-by: Arnaud Pouliquen <arnaud.pouliquen@foss.st.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 5071d7d1 | 30-Jul-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: on RSA public key import calculate CKA_MODULUS_BITS
When RSA public key is created with C_CreateObject() CKA_MODULUS_BITS is not allowed to be specified.
The tooling like pkcs11-tool ex
ta: pkcs11: on RSA public key import calculate CKA_MODULUS_BITS
When RSA public key is created with C_CreateObject() CKA_MODULUS_BITS is not allowed to be specified.
The tooling like pkcs11-tool expects that the value is there.
In specification it is not specified clearly that it needs to be calculated but it is assumed to be in the RSA public key object.
Calculate the value and add it to the object during RSA public key import.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 074c61af | 28-Jul-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: remove redundant comment about start and end date
PKCS#11 standard specifies that verification or usage of start and end date for certificate objects is responsibility of the application
ta: pkcs11: remove redundant comment about start and end date
PKCS#11 standard specifies that verification or usage of start and end date for certificate objects is responsibility of the application.
There is no other activity than storage needed for those.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 175d68e9 | 20-Jun-2023 |
Alvin Chang <alvinga@andestech.com> |
ta: riscv: Add MCOUNT_SYM definition
With the -pg option, the compiler inserts a call to _mcount into every function prologue. Add definition for MCOUNT_SYM so that the linker creates the additional
ta: riscv: Add MCOUNT_SYM definition
With the -pg option, the compiler inserts a call to _mcount into every function prologue. Add definition for MCOUNT_SYM so that the linker creates the additional space for ftrace buffer.
Signed-off-by: Alvin Chang <alvinga@andestech.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Sumit Garg <sumit.garg@linaro.org> Reviewed-by: Marouene Boubakri <marouene.boubakri@nxp.com>
show more ...
|
| 5d6b6c79 | 12-Jun-2023 |
Jose Quaresma <jose.quaresma@foundries.io> |
ta: pkcs11: Fix conflicting types due to enum/integer mismatch
This is an error with gcc13 [-Werror=enum-int-mismatch]
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Jose Qu
ta: pkcs11: Fix conflicting types due to enum/integer mismatch
This is an error with gcc13 [-Werror=enum-int-mismatch]
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
show more ...
|
| d1b003fe | 05-Jun-2023 |
Tadd Kao <tadd.kao@mediatek.com> |
mk: Support user static lib for aosp build
The aosp build environment don't allow writing to source folder, move the $(libname).a in current folder to $(out-link-dir$(sm)). And since static librarie
mk: Support user static lib for aosp build
The aosp build environment don't allow writing to source folder, move the $(libname).a in current folder to $(out-link-dir$(sm)). And since static libraries are not needed for runtime, set the LOCAL_MODULE_CLASS to STATIC_LIBRARIES to avoid installing by aosp build.
Signed-off-by: Tadd Kao <tadd.kao@mediatek.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 3c5443ad | 06-Jun-2023 |
Imre Kis <imre.kis@arm.com> |
ffa: remove ffa.h and smccc.h from host export list
commit 5489e94f0566 ("core: ffa: add boot info structs and defines") causes the compiler error below in host applications.
ffa.h:196:41: error: i
ffa: remove ffa.h and smccc.h from host export list
commit 5489e94f0566 ("core: ffa: add boot info structs and defines") causes the compiler error below in host applications.
ffa.h:196:41: error: implicit declaration of function ‘U’ [-Werror=implicit-function-declaration] 196 | #define FFA_BOOT_INFO_NAME_LEN U(16) | ^ ffa.h:319:19: note: in expansion of macro ‘FFA_BOOT_INFO_NAME_LEN’ 319 | char name[FFA_BOOT_INFO_NAME_LEN]; | ^~~~~~~~~~~~~~~~~~~~~~ ffa.h:319:14: error: variably modified ‘name’ at file scope 319 | char name[FFA_BOOT_INFO_NAME_LEN]; | ^~~~
ffa.h uses the U macro which is only part of OP-TEE's libc and not a standard macro. This causes a compiler error when compiling a host application and the libc is provided by the compiler. This makes ffa.h not suitable for host export.
This patch resolves the issue by removing ffa.h from the host export list to prevent external components to use it. TAs and client applications have no use of this file.
Also remove smccc.h as it was only added to the list because it is a dependency of ffa.h
Signed-off-by: Imre Kis <imre.kis@arm.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 12fc3771 | 30-May-2023 |
Arnaud Pouliquen <arnaud.pouliquen@foss.st.com> |
keys: rename the default key to default.pem
The default key can have other uses than the TA signature. Rename the file to have a generic name.
For compatibility with existing code, doc and CI, the
keys: rename the default key to default.pem
The default key can have other uses than the TA signature. Rename the file to have a generic name.
For compatibility with existing code, doc and CI, the default_ta.pem is kept but becomes a symbolic link.
If the default_ta.pem is selected, the default.pem file is also copied in the build folder as default_ta.pem symlink points to it.
Signed-off-by: Arnaud Pouliquen <arnaud.pouliquen@foss.st.com> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 4a2392dd | 30-May-2023 |
Arnaud Pouliquen <arnaud.pouliquen@foss.st.com> |
ta: use TA_SIGN_KEY value for the key to copy for build
The default_ta.pem is copied whatever the key file used. This leads to a build error if TA_SIGN_KEY is specified in the build command.
Use th
ta: use TA_SIGN_KEY value for the key to copy for build
The default_ta.pem is copied whatever the key file used. This leads to a build error if TA_SIGN_KEY is specified in the build command.
Use the "TA_SIGN_KEY" value instead of hard-coding the key name.
Signed-off-by: Arnaud Pouliquen <arnaud.pouliquen@foss.st.com> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| bb5d1825 | 12-May-2023 |
Etienne Carriere <etienne.carriere@linaro.org> |
ta: pkcs11: invalidate handle of destroyed token objects
Marks as invalid any object handle that refers to the token object that is being destroying so that any use of the related handle will consid
ta: pkcs11: invalidate handle of destroyed token objects
Marks as invalid any object handle that refers to the token object that is being destroying so that any use of the related handle will consider the object handle as invalid.
Link: https://github.com/OP-TEE/optee_os/issues/6005 Reviewed-by: Valerii Chubar <valerii_chubar@epam.com> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 2bc50ed5 | 12-May-2023 |
Etienne Carriere <etienne.carriere@linaro.org> |
ta: pkcs11: invalidating handle in a database
Introduces a specific pointer value for handles that are no more valid and API function handle_invalidate() to mark that a handle is no more valid.
Rev
ta: pkcs11: invalidating handle in a database
Introduces a specific pointer value for handles that are no more valid and API function handle_invalidate() to mark that a handle is no more valid.
Reviewed-by: Valerii Chubar <valerii_chubar@epam.com> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| b8fa5170 | 12-May-2023 |
Etienne Carriere <etienne.carriere@linaro.org> |
ta: pkcs11: factorize handle reference sanity test
Factorizes sanity validation of handle database and handle value in pkcs11 TA handle functions
Reviewed-by: Valerii Chubar <valerii_chubar@epam.co
ta: pkcs11: factorize handle reference sanity test
Factorizes sanity validation of handle database and handle value in pkcs11 TA handle functions
Reviewed-by: Valerii Chubar <valerii_chubar@epam.com> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 920e0127 | 26-Mar-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: Allow authentication mode switch with PIN change
In order to enable one to switch from PIN mode to TEE Identity mode or vice versa enable the mode switch when token has just been initial
ta: pkcs11: Allow authentication mode switch with PIN change
In order to enable one to switch from PIN mode to TEE Identity mode or vice versa enable the mode switch when token has just been initialized but not taken in use (eg. no user PIN set).
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| f1105cc5 | 26-Mar-2023 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
ta: pkcs11: Fix token initialization's authentication
When token has been initialized make sure that SO is properly authenticated based on authentication mode setting to follow PKCS#11 2.40 specific
ta: pkcs11: Fix token initialization's authentication
When token has been initialized make sure that SO is properly authenticated based on authentication mode setting to follow PKCS#11 2.40 specification for C_InitToken().
This makes it impossible to change authentication mode with C_InitToken().
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 31b31015 | 29-Mar-2023 |
liushiwei <liushiwei@eswincomputing.com> |
build: ta: add RISC-V linker script
Sort out the common code compiled by TA, abstract RISCV and ARM compile the common part of TA.
Signed-off-by: liushiwei <liushiwei@eswincomputing.com> Reviewed-b
build: ta: add RISC-V linker script
Sort out the common code compiled by TA, abstract RISCV and ARM compile the common part of TA.
Signed-off-by: liushiwei <liushiwei@eswincomputing.com> Reviewed-by: chenchaokai <chenchaokai@eswincomputing.com> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 9894fdb4 | 24-Feb-2023 |
Clement Faure <clement.faure@nxp.com> |
ta: pkcs11: fix trace compilation warning
Fix the following compilation issue: $ make PLATFORM=imx-mx8mmevk CFG_TEE_TA_LOG_LEVEL=4 CFG_PKCS11_TA=y
In file included from out/arm-plat-imx/export-ta_a
ta: pkcs11: fix trace compilation warning
Fix the following compilation issue: $ make PLATFORM=imx-mx8mmevk CFG_TEE_TA_LOG_LEVEL=4 CFG_PKCS11_TA=y
In file included from out/arm-plat-imx/export-ta_arm64/include/assert.h:9, from ta/pkcs11/src/entry.c:6: ta/pkcs11/src/entry.c: In function ‘TA_InvokeCommandEntryPoint’: ta/pkcs11/src/entry.c:143:14: warning: format ‘%u’ expects argument of type ‘unsigned int’, but argument 7 has type ‘size_t’ {aka ‘long unsigned int’} [-Wformat=] 143 | DMSG("%s p#0 %"PRIu32"@%p, p#1 %s %"PRIu32"@%p, p#2 %s %"PRIu32"@%p", | ^~~~~~~~~~ 144 | id2str_ta_cmd(cmd), 145 | params[0].memref.size, params[0].memref.buffer, | ~~~~~~~~~~~~~~~~~~~~~ | | | size_t {aka long unsigned int} out/arm-plat-imx/export-ta_arm64/include/trace.h:41:22: note: in definition of macro ‘trace_printf_helper’ 41 | __VA_ARGS__) | ^~~~~~~~~~~ ta/pkcs11/src/entry.c:143:9: note: in expansion of macro ‘DMSG’ 143 | DMSG("%s p#0 %"PRIu32"@%p, p#1 %s %"PRIu32"@%p, p#2 %s %"PRIu32"@%p", | ^~~~ ta/pkcs11/src/entry.c:143:23: note: format string is defined here 143 | DMSG("%s p#0 %"PRIu32"@%p, p#1 %s %"PRIu32"@%p, p#2 %s %"PRIu32"@%p", | ~^ | | | unsigned int | %lu ta/pkcs11/src/entry.c:143:14: warning: format ‘%u’ expects argument of type ‘unsigned int’, but argument 10 has type ‘size_t’ {aka ‘long unsigned int’} [-Wformat=] 143 | DMSG("%s p#0 %"PRIu32"@%p, p#1 %s %"PRIu32"@%p, p#2 %s %"PRIu32"@%p", | ^~~~~~~~~~ ...... 148 | param_is_memref(ptypes, 1) ? params[1].memref.size : 0, | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | | | size_t {aka long unsigned int} out/arm-plat-imx/export-ta_arm64/include/trace.h:41:22: note: in definition of macro ‘trace_printf_helper’ 41 | __VA_ARGS__) | ^~~~~~~~~~~ ta/pkcs11/src/entry.c:143:9: note: in expansion of macro ‘DMSG’ 143 | DMSG("%s p#0 %"PRIu32"@%p, p#1 %s %"PRIu32"@%p, p#2 %s %"PRIu32"@%p", | ^~~~ ta/pkcs11/src/entry.c:143:14: warning: format ‘%u’ expects argument of type ‘unsigned int’, but argument 13 has type ‘size_t’ {aka ‘long unsigned int’} [-Wformat=] 143 | DMSG("%s p#0 %"PRIu32"@%p, p#1 %s %"PRIu32"@%p, p#2 %s %"PRIu32"@%p", | ^~~~~~~~~~ ...... 152 | param_is_memref(ptypes, 2) ? params[2].memref.size : 0, | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | | | size_t {aka long unsigned int} out/arm-plat-imx/export-ta_arm64/include/trace.h:41:22: note: in definition of macro ‘trace_printf_helper’ 41 | __VA_ARGS__) | ^~~~~~~~~~~ ta/pkcs11/src/entry.c:143:9: note: in expansion of macro ‘DMSG’ 143 | DMSG("%s p#0 %"PRIu32"@%p, p#1 %s %"PRIu32"@%p, p#2 %s %"PRIu32"@%p", | ^~~~
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|