| cad32ade | 17-Dec-2019 |
Etienne Carriere <etienne.carriere@st.com> |
plat-stm32mp1: define memory dma to shared resource
This change defines memory DMA as a shared resource. Despite Secure and non-secure have have specific access to memory DMA, the reset control is e
plat-stm32mp1: define memory dma to shared resource
This change defines memory DMA as a shared resource. Despite Secure and non-secure have have specific access to memory DMA, the reset control is exclusive to the secure world.
With memory DMAs defined as the shared resource, the secure world will be able to open access to the resource if it is not used by the secure side.
Signed-off-by: Etienne Carriere <etienne.carriere@st.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 78f462f6 | 23-Mar-2020 |
Sumit Garg <sumit.garg@linaro.org> |
core: add TEE_LOGIN_REE_KERNEL login method
Add private login method for REE kernel clients to invoke TAs. It allows a TA to distinguish among normal world clients whether its a REE kernel client or
core: add TEE_LOGIN_REE_KERNEL login method
Add private login method for REE kernel clients to invoke TAs. It allows a TA to distinguish among normal world clients whether its a REE kernel client or a REE user-space client.
Signed-off-by: Sumit Garg <sumit.garg@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org>
show more ...
|
| 740676d0 | 20-Mar-2020 |
Fangsuo Wu <fangsuowu@asrmicro.com> |
drivers: gic: allow set pending a non-secure SGI
Remove assertion in GIC driver function gic_it_set_pending() preventing Core from setting as pending a non-secure SGI.
Reviewed-by: Etienne Carriere
drivers: gic: allow set pending a non-secure SGI
Remove assertion in GIC driver function gic_it_set_pending() preventing Core from setting as pending a non-secure SGI.
Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Fangsuo Wu <fangsuowu@asrmicro.com>
show more ...
|
| 7c82da3b | 17-Dec-2019 |
Etienne Carriere <etienne.carriere@st.com> |
drivers/stm32_etzpc: initialize etzpc driver early
Changes initcall level for STM32 ETZPC driver so that in initializes early, at service_init level. The driver does not depends on other SoC drivers
drivers/stm32_etzpc: initialize etzpc driver early
Changes initcall level for STM32 ETZPC driver so that in initializes early, at service_init level. The driver does not depends on other SoC drivers and can be initialize early. This change allows other driver_init level initialization sequence to use ETZPC resources.
Signed-off-by: Etienne Carriere <etienne.carriere@st.com> Acked-by: Jerome Forissier <jerome@forissier.org>
show more ...
|
| dfb57b8b | 07-Aug-2019 |
Cedric Neveux <cedric.neveux@nxp.com> |
drivers: caam: implement NXP CAAM driver - Cipher
Add the NXP CAAM drivers: - Cipher (AES/DES/DES3)
Signed-off-by: Cedric Neveux <cedric.neveux@nxp.com> Signed-off-by: Clement Faure <clement.faur
drivers: caam: implement NXP CAAM driver - Cipher
Add the NXP CAAM drivers: - Cipher (AES/DES/DES3)
Signed-off-by: Cedric Neveux <cedric.neveux@nxp.com> Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| e43ab7a8 | 07-Aug-2019 |
Cedric Neveux <cedric.neveux@nxp.com> |
core: driver: generic resources for crypto cipher driver
Add a generic cryptographic Cipher driver interface connecting TEE Crypto generic APIs to HW driver interface
To make Cipher HW driver gener
core: driver: generic resources for crypto cipher driver
Add a generic cryptographic Cipher driver interface connecting TEE Crypto generic APIs to HW driver interface
To make Cipher HW driver generic and to reduce the amount of function parameters, add structure data for the initialization and update function driver call. Checks the Cipher operation's parameter in the generic part before calling the HW driver.
Signed-off-by: Cedric Neveux <cedric.neveux@nxp.com> Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| b4f1a77e | 17-Mar-2020 |
Etienne Carriere <etienne.carriere@linaro.org> |
ta: pkcs11: fix token flags as per specification
Fix the token flags position that are expected to match the PKCS#11 specification and did not.
Fixes: a67dc424ff106 ("ta: pkcs11: API for slot/token
ta: pkcs11: fix token flags as per specification
Fix the token flags position that are expected to match the PKCS#11 specification and did not.
Fixes: a67dc424ff106 ("ta: pkcs11: API for slot/token information") Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 956765e2 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in select_va_in_range()
Fixes possible overflow when calculating begin_va and end_va in select_va_in_range().
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerom
core: fix overflow in select_va_in_range()
Fixes possible overflow when calculating begin_va and end_va in select_va_in_range().
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c31a95e6 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in vm_unmap()
Fixes a possible overflow in vm_unmap() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@fo
core: fix overflow in vm_unmap()
Fixes a possible overflow in vm_unmap() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 095b07ce | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: add overflow guard in system_unmap()
Adds an early overflow guard in system_unmap() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Foriss
core: add overflow guard in system_unmap()
Adds an early overflow guard in system_unmap() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| a8e39e9c | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: wipe user data in system_derive_ta_unique_key()
Before system_derive_ta_unique_key() returns wipe the supplied user data from the heap as a precaution.
Reviewed-by: Joakim Bech <joakim.bech@l
core: wipe user data in system_derive_ta_unique_key()
Before system_derive_ta_unique_key() returns wipe the supplied user data from the heap as a precaution.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 18871ad0 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: add overflow guard in system_set_prot()
Adds an early overflow guard in system_set_prot() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome
core: add overflow guard in system_set_prot()
Adds an early overflow guard in system_set_prot() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c5560e02 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in merge_vm_range()
Fixes a possible overflow in merge_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissie
core: fix overflow in merge_vm_range()
Fixes a possible overflow in merge_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 4c666179 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in tee_pager_merge_um_region()
Fixes a possible overflow in tee_pager_merge_um_region() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Review
core: fix overflow in tee_pager_merge_um_region()
Fixes a possible overflow in tee_pager_merge_um_region() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 30dce041 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in split_vm_range()
Fixes a possible overflow in split_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissie
core: fix overflow in split_vm_range()
Fixes a possible overflow in split_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| f19dd214 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix typo in system_set_prot()
Fixes a typo in system_set_prot() where a "," was used instead of a ";". This fix should not change the behaviour of the function.
Reviewed-by: Joakim Bech <joak
core: fix typo in system_set_prot()
Fixes a typo in system_set_prot() where a "," was used instead of a ";". This fix should not change the behaviour of the function.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 1d61f04b | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in va_range_is_contiguous()
Fixes a possible overflow in va_range_is_contiguous() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by:
core: fix overflow in va_range_is_contiguous()
Fixes a possible overflow in va_range_is_contiguous() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 4047f318 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in binh_copy_to()
Fixes overflows in binh_copy_to() when num_bytes or offs_bytes are very large numbers.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome For
core: fix overflow in binh_copy_to()
Fixes overflows in binh_copy_to() when num_bytes or offs_bytes are very large numbers.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| a5267eb5 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in read_uncompressed()
Fixes overflow in read_uncompressed() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome
core: fix overflow in read_uncompressed()
Fixes overflow in read_uncompressed() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 43937d5b | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in buf_ta_read()
Fixes overflow in buf_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <
core: fix overflow in buf_ta_read()
Fixes overflow in buf_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 74af6559 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in ree_fs_ta_read()
Fixes overflow in ree_fs_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Foris
core: fix overflow in ree_fs_ta_read()
Fixes overflow in ree_fs_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 1e4e976b | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix potential overflow in system_map_ta_binary()
Fixes potential overflows when calculating required sizes for mapping a part of a fobj.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Revi
core: fix potential overflow in system_map_ta_binary()
Fixes potential overflows when calculating required sizes for mapping a part of a fobj.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 908ce2d4 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix handle return in system_open_ta_binary()
Prior to this patch system_open_ta_binary() was not updating the params[0].value.a out parameter used to carry a handle of the opened binary. Fix t
core: fix handle return in system_open_ta_binary()
Prior to this patch system_open_ta_binary() was not updating the params[0].value.a out parameter used to carry a handle of the opened binary. Fix this by assigning the value to the handle to params[0].value.a.
Note that if only one binary is opened at a time the handle will be 0 and ldelf will still work even without this fix.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 787295df | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix potential overflow in system_map_zi()
Fixes a potential overflow when calculating required page size for a fobj allocation. This is fixed by using the new ROUNDUP_DIV() macro instead of ro
core: fix potential overflow in system_map_zi()
Fixes a potential overflow when calculating required page size for a fobj allocation. This is fixed by using the new ROUNDUP_DIV() macro instead of rounding up and the dividing.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| a73ebd47 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
util.h: add ROUNDUP_DIV(x, y) macro
Adds the ROUNDUP_DIV(x, y) macro which Rounds up to the nearest multiple of y and then divides by y. Safe against overflow, y has to be a multiple of 2 just as in
util.h: add ROUNDUP_DIV(x, y) macro
Adds the ROUNDUP_DIV(x, y) macro which Rounds up to the nearest multiple of y and then divides by y. Safe against overflow, y has to be a multiple of 2 just as in the other two ROUNDUP*() macros.
This macro is intended to be used to convert from "number of bytes" to "number of pages" or similar units. Example: num_pages = ROUNDUP_DIV(num_bytes, SMALL_PAGE_SIZE);
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|