History log of /optee_os/ (Results 8351 – 8375 of 8383)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
92542a7129-Aug-2014 Pascal Brand <pascal.brand@st.com>

plat-orly2 and plat-cannes merged in plat-stm

PLATFORM_FLAVOR is used to distinguish orly2 and cannes

Change-Id: Iaed89451f704120e29b0b0adb83627f11bf9df48

f1c74b4b20-Aug-2014 Jens Wiklander <jens.wiklander@linaro.org>

Reentrancy fixes

Before this patch: The normal world was only allowed to enter
secure world with one thread at a time.

After this patch: The normal world may try to enter secure world
with as many

Reentrancy fixes

Before this patch: The normal world was only allowed to enter
secure world with one thread at a time.

After this patch: The normal world may try to enter secure world
with as many threads as it likes, secure world will return busy
when no more threads can be allowed. Secure world still only allows
one active thread at a time, but during RPC another thread may enter
and do some work. This is needed for cancellation to work.

* Adds a mutex that waits in normal world if busy
* Adds a new RPC service to wait in normal world
* Imports bitstring.h from FreeBSD to aid mutex implementation
* Adds a critical section in tee_ta_init_session
* Unmaps TA before RPC exit and maps it again on return to handle
rescheduling of threads during RPC
* Doesn't clear a1-a3 when returning busy
* Bugfixes vector_std_smc_entry

This patch depends on the "Allow parallel entries to secure world"
patch in optee_linuxdriver.

show more ...

35dd284327-Aug-2014 Pascal Brand <pascal.brand@st.com>

Make more common implementation of orly2 and cannes platforms

This will prepare PLAT_FLAVOR of orly2 / cannes

2ff3fdbb29-Aug-2014 Pascal Brand <pascal.brand@st.com>

TEE_ROUNDxxx renamed in ROUNDxxx in libutee

This change is to have the same macro names in core
part and libutee part

6b050c9f28-Aug-2014 Jerome Forissier <jerome.forissier@linaro.org>

tee_acipher_rsadorep: fix handling of zero-padding in output

- Always remove leading null bytes in output buffer (previously this was done
only for PK_PRIVATE keys)
- Leave one null byte when rsa_ex

tee_acipher_rsadorep: fix handling of zero-padding in output

- Always remove leading null bytes in output buffer (previously this was done
only for PK_PRIVATE keys)
- Leave one null byte when rsa_exptmod() output is all zeroes (do not return
an empty buffer)
- Fix output buffer length check (take padding into account)

show more ...

a17acc4c27-Aug-2014 Sabrina Ni <sabrina.ni@linaro.org>

Create util.h to rearrange define macro

4a429f5327-Aug-2014 Pascal Brand <pascal.brand@st.com>

Cannes / H410 support

Support STMicroelectronics chip H410 "cannes".
Is compiled using
PLATFORM=cannes make

55d3ebe922-Aug-2014 Pascal Brand <pascal.brand@st.com>

Cleanup

647f9c7621-Aug-2014 Jerome Forissier <jerome.forissier@linaro.org>

Get value of gpd.tee.arith.maxBigIntSize from libutee

The property gpd.tee.arith.maxBigIntSize was implemented in TEE core by
tee_svc_sys_get_property() which was returning a constant taken from the

Get value of gpd.tee.arith.maxBigIntSize from libutee

The property gpd.tee.arith.maxBigIntSize was implemented in TEE core by
tee_svc_sys_get_property() which was returning a constant taken from the
crypto module (LTC_MAX_BITS_PER_VARIABLE / 2).
The correct value is TEE_MAX_NUMBER_OF_SUPPORTED_BITS from libutee.
This commit makes libutee return the appropriate value directly (without
calling the TEE core) and deletes the property from the syscall.
Additionally, this removes the unjustified dependency of tee_svc.c on
<tee_ltc_wrapper.h>.

show more ...

e7d09f8a21-Aug-2014 Etienne Carriere <etienne.carriere@st.com>

enable_mmu functions renamed in cpu_enable_mmu

2cb1e0d015-Aug-2014 Jens Wiklander <jens.wiklander@linaro.org>

Bugfix TA dev kit

* Small bugfixes to bring the mk-files for TA dev kit up to date.
* Compile TAs with -fpie
* Add fix_ta_binary to fix the absolute relocation issue in TA header

a4e6c40415-Aug-2014 SY Chiu <sy.chiu@linaro.org>

Add a flag to turn on/off PSCI debug msg

53bd332a11-Aug-2014 SY Chiu <sy.chiu@linaro.org>

Add GIC status dump utility

- fixed fvp gic cpu interface and distrubtor offset
- added new mapping for distrubtor
- add utility to dump gic status

aaac098218-Aug-2014 Jerome Forissier <jerome.forissier@linaro.org>

mk/compile.mk: simplify dependency generation; better support ccache

This commit modifies the compilation flags that are used to generate
dependency files (*.o.d). Rather than using the preprocessor

mk/compile.mk: simplify dependency generation; better support ccache

This commit modifies the compilation flags that are used to generate
dependency files (*.o.d). Rather than using the preprocessor's -MD flag
(-Wp,-MD,<depfile>), we now use the frontend's equivalent (-MD -MF <depfile>
-MT <target>).

There are three reasons for doing so:
1. The GCC man page recommends against using -Wp, because "the
preprocessor's direct interface is undocumented and subject to change".
2. The new flags generate the correct rule directly, including the
subdirectory in front of the object name, so scripts/fixdep is not needed
anymore.
3. ccache (3.1.9) would not handle -Wp,-MD as expected. It would preserve
the directory prefix, so that we would end up with an invalid path after
the fixdep phase, making the rules useless. With this patch, OP-TEE builds
fine with ccache:
make -j3 CROSS_COMPILE="ccache arm-linux-gnueabihf-"

show more ...

27cbcc5708-Aug-2014 Jens Wiklander <jens.wiklander@linaro.org>

Cleanup loading/unloading of a TA

* A TA is only loaded via tee-supplicant, directly supplying a
pointer to the TA binary is not supported any longer.
This requires and update to the client lib

Cleanup loading/unloading of a TA

* A TA is only loaded via tee-supplicant, directly supplying a
pointer to the TA binary is not supported any longer.
This requires and update to the client lib to avoid leaking
shared memory.
* The shared memory used to load the TA is freed as soon as the
TA have been loaded into secure memory
* Divides tee_ta_init_session() into sevaral functions
* Divides tee_ta_close_session() into two functions
* Divides tee_ta_load() into several functions with one
separate function for signature verification
* Removes some unused code for kernel TAs
* Removes the option to lock/unlock a TA is only used by kernel
TAs which we don't support any longer.
* Removes the static global tee_rs. Switch to use Thread Local
Storage pointer provided by the thread handler.
* Adds TA_FLAG_USER_MODE by default to TA header since
all TAs are user mode TAs now.
* Reformats user_ta_header.c to make checkpatch less unhappy with it.

show more ...

cebca6a513-Aug-2014 Jens Wiklander <jens.wiklander@linaro.org>

fvp: fix compiler warning

Fixes compiler warning when compiling with default
CFG_TEE_CORE_LOG_LEVEL.

ec21959813-Aug-2014 Pascal Brand <pascal.brand@st.com>

Remove core dependencies from generic part

This concerns:
- Communication Non-Secure <--> Secure
- sys/types.h contains some types not defined on all compilers

Signed-off-by: Pascal Brand <pascal.b

Remove core dependencies from generic part

This concerns:
- Communication Non-Secure <--> Secure
- sys/types.h contains some types not defined on all compilers

Signed-off-by: Pascal Brand <pascal.brand@st.com>

show more ...

c034684505-Jun-2014 Jens Wiklander <jens.wiklander@linaro.org>

Add plat-vexpress

* Initial support for Versatile Express of FVP with ARM Trusted
Firmware (ATF below)

* Use entry vector for entering TEE

Align interface between TEE and secure monitor with t

Add plat-vexpress

* Initial support for Versatile Express of FVP with ARM Trusted
Firmware (ATF below)

* Use entry vector for entering TEE

Align interface between TEE and secure monitor with the interface
between OPTEED in ATF and TEE.

Uses an ATF compatible entry vector for entering TEE from internal
secure monitor.

Internal secure monitor saves entry reason to be able to tell when
switching back to nonsecure world if r0-r3 should be preserved (FIQ case)
or returned as is (normal call case).

* Many small fixes of generic problems that could affect other platforms
too.

* Disable unaligned data accesses by adding compiler flag
-mno-unaligned-access

* Adds support for Versatile Express of QEMU with 8 MiB of secure DRAM

show more ...

565e42f907-Aug-2014 Pascal Brand <pascal.brand@st.com>

subdir.mk supports absolute path

Signed-off-by: Pascal Brand <pascal.brand@st.com>

42da650207-Aug-2014 Pascal Brand <pascal.brand@st.com>

Fix compilation issue when there is no traces

8541149406-Aug-2014 Pascal Brand <pascal.brand@st.com>

Cleanup Libtomcrypt

- Do not compile libtomcrypt tests anymore
- Define LTC_NO_FILE to remove all file operations in libtomcrypt
- Minor fix in argument description of malloc

Signed-off-by: Pascal

Cleanup Libtomcrypt

- Do not compile libtomcrypt tests anymore
- Define LTC_NO_FILE to remove all file operations in libtomcrypt
- Minor fix in argument description of malloc

Signed-off-by: Pascal Brand <pascal.brand@st.com>

show more ...

e65b51de08-Jul-2014 Joakim Bech <joakim.bech@linaro.org>

Adding GlobalPlatform documentation

Signed-off-by: Joakim Bech <joakim.bech@linaro.org>

7349681024-Jun-2014 Joakim Bech <joakim.bech@linaro.org>

Removed file core/include/kernel/kta_mem.h

Signed-off-by: Joakim Bech <joakim.bech@linaro.org>


1f70169d24-Jun-2014 Joakim Bech <joakim.bech@linaro.org>

Removed unused KTA related defines

- Moved IO macro from kta_mem.h to io.h.
- Removed unused TEE_MEM_xyz defines.
- Removed code that was used for TA's in TEE RAM (impossible to reach
that code).

Removed unused KTA related defines

- Moved IO macro from kta_mem.h to io.h.
- Removed unused TEE_MEM_xyz defines.
- Removed code that was used for TA's in TEE RAM (impossible to reach
that code).

Signed-off-by: Joakim Bech <joakim.bech@linaro.org>

show more ...

bc5871d401-Jul-2014 Pascal Brand <pascal.brand@st.com>

GitHub usage documentation

Signed-off-by: Pascal Brand <pascal.brand@st.com>

1...<<331332333334335336