| #
0dfcf61e |
| 19-Aug-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "fix(optee): allow opteed_handle_smc_load to handle 64-bit data_pa" into integration
|
| #
0c1ca2ee |
| 15-Aug-2025 |
Yidi Lin <yidilin@google.com> |
fix(optee): allow opteed_handle_smc_load to handle 64-bit data_pa
Change the datatype of data_pa to uint64_t to allow opteed_handle_smc_load to handle 64-bit data_pa from non secure.
Change-Id: I90
fix(optee): allow opteed_handle_smc_load to handle 64-bit data_pa
Change the datatype of data_pa to uint64_t to allow opteed_handle_smc_load to handle 64-bit data_pa from non secure.
Change-Id: I90d0630d23dbd97143a975f00a0f6b74b7cc0223 Signed-off-by: Yidi Lin <yidilin@google.com>
show more ...
|
| #
d90bb650 |
| 23-Jun-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "build(handoff)!: switch to LibTL submodule" into integration
|
| #
b5d0740e |
| 13-May-2025 |
Harrison Mutai <harrison.mutai@arm.com> |
build(handoff)!: switch to LibTL submodule
Removes in-tree Transfer List implementation and updates all references to use the external LibTL submodule. Updates include paths, Makefile macros, and pl
build(handoff)!: switch to LibTL submodule
Removes in-tree Transfer List implementation and updates all references to use the external LibTL submodule. Updates include paths, Makefile macros, and platform integration logic to link with LibTL as a static library.
If you cloned TF-A without the `--recurse-submodules` flag, you can ensure that this submodule is present by running:
git submodule update --init --recursive
BREAKING-CHANGE: LibTL is now included in TF-A as a submodule. Please run `git submodule update --init --recursive` if you encounter issues after migrating to the latest version of TF-A.
Change-Id: I1fa31f7b730066c27985d968698e553b00b07c38 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| #
50d1ce3d |
| 19-Jun-2025 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes Ia34bc0f4,I0be3773b,I701e357a,Icdbe1992 into integration
* changes: refactor(versal2): guard handoff logic w/ build flag refactor(qemu): guard handoff logic w/ build flag refacto
Merge changes Ia34bc0f4,I0be3773b,I701e357a,Icdbe1992 into integration
* changes: refactor(versal2): guard handoff logic w/ build flag refactor(qemu): guard handoff logic w/ build flag refactor(optee): guard handoff logic w/ build flag feat(handoff): support libtl submodule builds
show more ...
|
| #
0d45ba99 |
| 27-May-2025 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(optee): guard handoff logic w/ build flag
Prepare OP-TEE for environments where the Firmware Handoff (LibTL) submodule may not be available. Wrap all Transfer List dependent logic in `#if
refactor(optee): guard handoff logic w/ build flag
Prepare OP-TEE for environments where the Firmware Handoff (LibTL) submodule may not be available. Wrap all Transfer List dependent logic in `#if TRANSFER_LIST` guards, ensuring OP-TEE can build and run without the submodule.
This is useful for platforms or builds not integrating the firmware handoff mechanism.
Change-Id: I701e357a8ee29d37b370c98c907d3e2795a921dd Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| #
ea7bffdb |
| 09-Jan-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge changes from topic "handoff_tpm_event_log" into integration
* changes: feat(qemu): hand off TPM event log via TL feat(handoff): common API for TPM event log handoff feat(handoff): transf
Merge changes from topic "handoff_tpm_event_log" into integration
* changes: feat(qemu): hand off TPM event log via TL feat(handoff): common API for TPM event log handoff feat(handoff): transfer entry ID for TPM event log fix(qemu): fix register convention in BL31 for qemu fix(handoff): fix register convention in opteed
show more ...
|
| #
c0688c55 |
| 14-Nov-2024 |
Raymond Mao <raymond.mao@linaro.org> |
fix(handoff): fix register convention in opteed
The commit with Change-Id:Ie417e054a7a4c192024a2679419e99efeded1705 updated the register convention r1/x1 values but missing necessary changes in BL31
fix(handoff): fix register convention in opteed
The commit with Change-Id:Ie417e054a7a4c192024a2679419e99efeded1705 updated the register convention r1/x1 values but missing necessary changes in BL31. As a result, a system panic observed during setup for BL32 when TRANSFER_LIST is enabled due to unexpected arguments. This patch is to fix this issue for optee.
Change-Id: I13e116e7cb5a7d89fafc11d20295cffbf24793ab Signed-off-by: Raymond Mao <raymond.mao@linaro.org>
show more ...
|
| #
a3939b1b |
| 24-Jul-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(handoff): fix register convention r1/x1 value on transfer list" into integration
|
| #
7475815f |
| 13-May-2024 |
levi.yun <yeoreum.yun@arm.com> |
feat(handoff): fix register convention r1/x1 value on transfer list
According to recently firmware handsoff spec [1]'s "Register usage at handoff boundary", Transfer List's signature value was chang
feat(handoff): fix register convention r1/x1 value on transfer list
According to recently firmware handsoff spec [1]'s "Register usage at handoff boundary", Transfer List's signature value was changed from 0x40_b10b (3 bytes) to 4a0f_b10b (4 bytes).
As updating of TL's signature, register value of x1/r1 should be:
In aarch32's r1 value should be R1[23:0]: set to the TL signature (4a0f_b10b -> masked range value: 0f_b10b) R1[31:24]: version of the register convention == 1 and In aarch64's x1 value should be X1[31:0]: set to the TL signature (4a0f_b10b) X1[39:32]: version of the register convention == 1 X1[63:40]: MBZ (See the [2] and [3]).
Therefore, it requires to separate mask and shift value for register convention version field when sets each r1/x1.
This patch fix two problems: 1. breaking X1 value with updated specification in aarch64 - change of length of signature field.
2. previous error value set in R1 in arm32. - length of signature should be 24, but it uses 32bit signature.
This change is breaking change. It requires some patch for other softwares (u-boot[4], optee[5]).
Link: https://github.com/FirmwareHandoff/firmware_handoff [1] Link: https://github.com/FirmwareHandoff/firmware_handoff/issues/32 [2] Link: https://github.com/FirmwareHandoff/firmware_handoff/commit/5aa7aa1d3a1db75213e458d392b751f0707de027 [3] Link: https://lists.denx.de/pipermail/u-boot/2024-July/558628.html [4] Link: https://github.com/OP-TEE/optee_os/pull/6933 [5] Signed-off-by: Levi Yun <yeoreum.yun@arm.com> Change-Id: Ie417e054a7a4c192024a2679419e99efeded1705
show more ...
|
| #
0a4b3a2e |
| 25-Apr-2024 |
Yann Gautier <yann.gautier@st.com> |
Merge "fix(optee): set interrupt handler before kernel boot" into integration
|
| #
0ec69a5b |
| 17-Apr-2024 |
Jeffrey Kardatzke <jkardatzke@google.com> |
fix(optee): set interrupt handler before kernel boot
When loading OPTEE via an SMC after we start Linux, we end up changing the interrupt settings which is a violation of the Linux kernel's policies
fix(optee): set interrupt handler before kernel boot
When loading OPTEE via an SMC after we start Linux, we end up changing the interrupt settings which is a violation of the Linux kernel's policies. This change sets the interrupt handler before we proceed to starting the kernel and ignores any incoming interrupts that occur before OPTEE is loaded.
Signed-off-by: Jeffrey Kardatzke<jkardatzke@google.com> Change-Id: I7da5334498e14f4a703e8cc3eeff386e3ecc0882
show more ...
|
| #
e534668b |
| 02-Feb-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "feat(cros_widevine): add ChromeOS widevine SMC handler" into integration
|
| #
b22e6898 |
| 11-Apr-2023 |
Yi Chou <yich@google.com> |
feat(cros_widevine): add ChromeOS widevine SMC handler
The ChromeOS will use the SMC to pass some secrets from firmware to optee.
Change-Id: Iaf3357d40a7ed22415926acd9d7979df24dd81f1 Signed-off-by:
feat(cros_widevine): add ChromeOS widevine SMC handler
The ChromeOS will use the SMC to pass some secrets from firmware to optee.
Change-Id: Iaf3357d40a7ed22415926acd9d7979df24dd81f1 Signed-off-by: Yi Chou <yich@google.com>
show more ...
|
| #
22d79f2c |
| 18-Jan-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "tl_bl31_bl32" into integration
* changes: feat(qemu): enable transfer list to BL31/32 feat(optee): enable transfer list in opteed
|
| #
0e8def99 |
| 04-Oct-2023 |
Raymond Mao <raymond.mao@linaro.org> |
feat(optee): enable transfer list in opteed
Enable handoff to OP-TEE using transfer list. Create transfer list when loading OP-TEE image via non-secure SMC call. Fallback to default handoff args whe
feat(optee): enable transfer list in opteed
Enable handoff to OP-TEE using transfer list. Create transfer list when loading OP-TEE image via non-secure SMC call. Fallback to default handoff args when transfer list is disabled or transfer list signature does not exist.
Change-Id: I94bb5b7fdfbb8829016a9d5d9ef5aff993d7cc99 Signed-off-by: Raymond Mao <raymond.mao@linaro.org>
show more ...
|
| #
3331c33d |
| 11-May-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(optee): add device tree for coreboot table" into integration
|
| #
f4bbf435 |
| 09-Feb-2023 |
Jeffrey Kardatzke <jkardatzke@google.com> |
feat(optee): add device tree for coreboot table
This adds creation of a device tree that will be passed to OP-TEE. Currently that device tree only contains the coreboot table per the Linux coreboot
feat(optee): add device tree for coreboot table
This adds creation of a device tree that will be passed to OP-TEE. Currently that device tree only contains the coreboot table per the Linux coreboot device tree specification. This device tree is then passed to OP-TEE so it can extract the CBMEM console information from the coreboot table for logging purposes.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I6a26d335e16f7226018c56ad571cca77b81b0f6a
show more ...
|
| #
18459571 |
| 29-Mar-2023 |
Julius Werner <jwerner@chromium.org> |
Merge "fix(optee): return UUID for image loading service" into integration
|
| #
85ab8823 |
| 02-Mar-2023 |
Jeffrey Kardatzke <jkardatzke@google.com> |
fix(optee): return UUID for image loading service
This adds return of a UUID when TF-A is in the state where it needs to receive the SMC call to load the OP-TEE image. It also changes the OEN used f
fix(optee): return UUID for image loading service
This adds return of a UUID when TF-A is in the state where it needs to receive the SMC call to load the OP-TEE image. It also changes the OEN used for the image loading call to match the OEN used for the UUID call.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I713cb602d8e53b3f20d179b5fb5162da6a2ed057
show more ...
|
| #
a13b4cd7 |
| 10-Feb-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "fix(optee): address late comments and fix bad rc" into integration
|
| #
8d7c80fa |
| 09-Feb-2023 |
Jeffrey Kardatzke <jkardatzke@google.com> |
fix(optee): address late comments and fix bad rc
There were some late comments to the prior change (18635) which are address in this commit. There was also an invalid return value check which was ch
fix(optee): address late comments and fix bad rc
There were some late comments to the prior change (18635) which are address in this commit. There was also an invalid return value check which was changed and the wrong result was being returned via the SMC call for loading OP-TEE which is now fixed.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I883ddf966662549a3ef9c801a2d4f47709422332
show more ...
|
| #
8b47f87a |
| 02-Feb-2023 |
Joanna Farley <joanna.farley@arm.com> |
Merge "feat(optee): add loading OP-TEE image via an SMC" into integration
|
| #
05c69cf7 |
| 03-Oct-2022 |
Jeffrey Kardatzke <jkardatzke@google.com> |
feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be ut
feat(optee): add loading OP-TEE image via an SMC
This adds the ability to load the OP-TEE image via an SMC called from non-secure userspace rather than loading it during boot. This should only be utilized on platforms that can ensure security is maintained up until the point the SMC is invoked as it breaks the normal barrier between the secure and non-secure world.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Change-Id: I21cfa9699617c493fa4190f01d1cbb714e7449cc
show more ...
|
| #
9a207532 |
| 04-Jan-2019 |
Antonio Niño Díaz <antonio.ninodiaz@arm.com> |
Merge pull request #1726 from antonio-nino-diaz-arm/an/includes
Sanitise includes across codebase
|