| #
084b8864 |
| 23-Oct-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "gr/cov_fixes" into integration
* changes: fix(dsu): fix illegal address Coverity finding fix(sdei): fix coverity finding array index read
|
| #
6d113285 |
| 16-Oct-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(sdei): fix coverity finding array index read
Fix - CID 463142: (#1 of 1): Overflowed array index read (INTEGER_OVERFLOW)
Based on issue - https://scan4.scan.coverity.com/#/project-view/68818/1
fix(sdei): fix coverity finding array index read
Fix - CID 463142: (#1 of 1): Overflowed array index read (INTEGER_OVERFLOW)
Based on issue - https://scan4.scan.coverity.com/#/project-view/68818/11439?selectedIssue=463142
Add boundary checks overflow checks.
Change-Id: I56022b605008f8d35231d70d058c4d449d618d34 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| #
14acc06e |
| 13-Jun-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(sdei): resolve coverity error for SDEI GIC" into integration
|
| #
9dde2cc1 |
| 28-Apr-2025 |
Mark Dykes <mark.dykes@arm.com> |
fix(sdei): resolve coverity error for SDEI GIC
Fix the following issues from Coverity check:
*** CID 463142: Memory - illegal accesses (INTEGER_OVERFLOW) /services/std_svc/sdei/sdei_event.c: 79 i
fix(sdei): resolve coverity error for SDEI GIC
Fix the following issues from Coverity check:
*** CID 463142: Memory - illegal accesses (INTEGER_OVERFLOW) /services/std_svc/sdei/sdei_event.c: 79 in get_event_entry_target_pe()
*** CID 463141: Memory - illegal accesses (NEGATIVE_RETURNS) /services/std_svc/sdei/sdei_intr_mgmt.c: 64 in sdei_is_target_pe_masked()
Change-Id: I0f2928a6405f091b1ea988a43428d7032ee4c136 Signed-off-by: Mark Dykes <mark.dykes@arm.com>
show more ...
|
| #
5776045b |
| 23-Apr-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "fix(sdei): return SDEI_EINVAL if signaling state is incorrect" into integration
|
| #
b142ede7 |
| 07-Oct-2024 |
Igor Podgainõi <igor.podgainoi@arm.com> |
fix(sdei): return SDEI_EINVAL if signaling state is incorrect
In case a step is omitted when an SDEI event is registered, enabled, unmasked and then signaled, incorrect code paths may be reached.
T
fix(sdei): return SDEI_EINVAL if signaling state is incorrect
In case a step is omitted when an SDEI event is registered, enabled, unmasked and then signaled, incorrect code paths may be reached.
This patch adds additional checks to return early from such an incorrect state.
Change-Id: Ia2753e9a1b95544e1afa72603574fe830f51ea9f Signed-off-by: Igor Podgainõi <igor.podgainoi@arm.com> Signed-off-by: Mark Dykes <mark.dykes@arm.com>
show more ...
|
| #
75c69358 |
| 28-Aug-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(sdei): fix a crash when attempting to bind more events than are available" into integration
|
| #
4096bd66 |
| 07-Aug-2024 |
Charlie Bareham <charlie.bareham@arm.com> |
fix(sdei): fix a crash when attempting to bind more events than are available
You can only bind a limited number of events in each range. If you attempt to bind more, it was crashing. This patch mak
fix(sdei): fix a crash when attempting to bind more events than are available
You can only bind a limited number of events in each range. If you attempt to bind more, it was crashing. This patch makes it return an error code instead.
Change-Id: Ib19f0f0780959ded244d45349d9d6c8607255c15 Signed-off-by: Charlie Bareham <charlie.bareham@arm.com>
show more ...
|
| #
e0c7d8f5 |
| 07-Nov-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(smccc): ensure that mpidr passed through SMC is valid" into integration
|
| #
e60c1847 |
| 27-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(smccc): ensure that mpidr passed through SMC is valid
There are various SMC calls which pass mpidr as an argument which is currently tested at random places in SMC call path. To make the mpidr v
fix(smccc): ensure that mpidr passed through SMC is valid
There are various SMC calls which pass mpidr as an argument which is currently tested at random places in SMC call path. To make the mpidr validation check consistent across SMC calls, do this check as part of SMC argument validation.
This patch introduce a helper function is_valid_mpidr() to validate mpidr and call it as part of validating SMC arguments at starting of SMC handlers (which expect mpidr as an argument).
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I11ea50e22caf17896cf4b2059b87029b2ba136b1
show more ...
|
| #
5a4c3f0b |
| 06-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(sdei): ensure that interrupt ID is valid" into integration
|
| #
a7eff347 |
| 26-Oct-2023 |
Manish Pandey <manish.pandey2@arm.com> |
fix(sdei): ensure that interrupt ID is valid
As per SDEI spec (section 5.1.14.1), SDEI_INTERRUPT_BIND interface expects a valid PPI or SPI. SGI's are not allowed to be bounded. Current check in the
fix(sdei): ensure that interrupt ID is valid
As per SDEI spec (section 5.1.14.1), SDEI_INTERRUPT_BIND interface expects a valid PPI or SPI. SGI's are not allowed to be bounded. Current check in the code only checks for an SGI and returns invalid ID. This check is insufficient as it will not catch architecturally invalid interrupt IDs.
Modify the check to ensure that interrupt is either PPI or SPI.
Signed-off-by: Manish Pandey <manish.pandey2@arm.com> Change-Id: I52eb0a6d7f88a12f6816cff9b68fb3a7ca12cbb7
show more ...
|
| #
b6b486f3 |
| 10-Nov-2021 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(sdei): fix assert while kdump issue" into integration
|
| #
28623c10 |
| 08-Nov-2021 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix: libc: use long for 64-bit types on aarch64" into integration
|
| #
4ce3e99a |
| 25-Aug-2020 |
Scott Branden <scott.branden@broadcom.com> |
fix: libc: use long for 64-bit types on aarch64
Use long instead of long long on aarch64 for 64_t stdint types. Introduce inttypes.h to properly support printf format specifiers for fixed width type
fix: libc: use long for 64-bit types on aarch64
Use long instead of long long on aarch64 for 64_t stdint types. Introduce inttypes.h to properly support printf format specifiers for fixed width types for such change.
Change-Id: I0bca594687a996fde0a9702d7a383055b99f10a1 Signed-off-by: Scott Branden <scott.branden@broadcom.com>
show more ...
|
| #
d39db269 |
| 09-Sep-2021 |
Ming Huang <huangming@linux.alibaba.com> |
fix(sdei): fix assert while kdump issue
Assert condition: 1 Register secure timer(ppi=29) for sdei nmi watchdog; 2 kernel panic and then kdump; While kdump, kernel mask all cores sdei, secure timer
fix(sdei): fix assert while kdump issue
Assert condition: 1 Register secure timer(ppi=29) for sdei nmi watchdog; 2 kernel panic and then kdump; While kdump, kernel mask all cores sdei, secure timer trigger and go to handle_masked_trigger() and assert here: assert(se->affinity == my_mpidr);
As kernel register with flag=0, mpidr=0 and TF-A set flag to SDEI_REGF_RM_PE but leave mpidr=0. So set mpidr to fix his assert issue.
Signed-off-by: Ming Huang <huangming@linux.alibaba.com> Change-Id: Ia9182f40bde94fb004b46e2a72b186eb0ef05166
show more ...
|
| #
387ff949 |
| 22-Oct-2021 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(sdei): print event number in hex format" into integration
|
| #
6b94356b |
| 01-Sep-2021 |
Vasyl Gomonovych <vgomonovych@marvell.com> |
fix(sdei): print event number in hex format
SDEI specified event numbers in hexadecimal format. Change event number format to hexadecimal to make it easier for the reader to recognize the proper eve
fix(sdei): print event number in hex format
SDEI specified event numbers in hexadecimal format. Change event number format to hexadecimal to make it easier for the reader to recognize the proper event.
Change-Id: Iac7a91d0910316e0ad54a8f09bc17209e8c6adf6 Signed-off-by: Vasyl Gomonovych <vgomonovych@marvell.com>
show more ...
|
| #
2c62b00e |
| 05-Mar-2021 |
Mark Dykes <mark.dykes@arm.com> |
Merge "SDEI: updata the affinity of shared event" into integration
|
| #
6ccbcff5 |
| 31-Dec-2020 |
Tony Xie <tony.xie@rock-chips.com> |
SDEI: updata the affinity of shared event
when updata routing of an SDEI event, if the registration flags is SDEI_REGF_RM_PE, need to updata the affinity of shared event.
Signed-off-by: Tony Xie <t
SDEI: updata the affinity of shared event
when updata routing of an SDEI event, if the registration flags is SDEI_REGF_RM_PE, need to updata the affinity of shared event.
Signed-off-by: Tony Xie <tony.xie@rock-chips.com> Change-Id: Ie5d7cc4199253f6af1c28b407f712caac3092d06
show more ...
|
| #
4108abb4 |
| 15-May-2020 |
Mark Dykes <mardyk01@review.trustedfirmware.org> |
Merge "plat/arm/fvp: Support performing SDEI platform setup in runtime" into integration
|
| #
cbf9e84a |
| 18-Dec-2019 |
Balint Dobszay <balint.dobszay@arm.com> |
plat/arm/fvp: Support performing SDEI platform setup in runtime
This patch introduces dynamic configuration for SDEI setup and is supported when the new build flag SDEI_IN_FCONF is enabled. Instead
plat/arm/fvp: Support performing SDEI platform setup in runtime
This patch introduces dynamic configuration for SDEI setup and is supported when the new build flag SDEI_IN_FCONF is enabled. Instead of using C arrays and processing the configuration at compile time, the config is moved to dts files. It will be retrieved at runtime during SDEI init, using the fconf layer.
Change-Id: If5c35a7517ba00a9f258d7f3e7c8c20cee169a31 Signed-off-by: Balint Dobszay <balint.dobszay@arm.com> Co-authored-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
show more ...
|
| #
9a207532 |
| 04-Jan-2019 |
Antonio Niño Díaz <antonio.ninodiaz@arm.com> |
Merge pull request #1726 from antonio-nino-diaz-arm/an/includes
Sanitise includes across codebase
|
| #
09d40e0e |
| 14-Dec-2018 |
Antonio Nino Diaz <antonio.ninodiaz@arm.com> |
Sanitise includes across codebase
Enforce full include path for includes. Deprecate old paths.
The following folders inside include/lib have been left unchanged:
- include/lib/cpus/${ARCH} - inclu
Sanitise includes across codebase
Enforce full include path for includes. Deprecate old paths.
The following folders inside include/lib have been left unchanged:
- include/lib/cpus/${ARCH} - include/lib/el3_runtime/${ARCH}
The reason for this change is that having a global namespace for includes isn't a good idea. It defeats one of the advantages of having folders and it introduces problems that are sometimes subtle (because you may not know the header you are actually including if there are two of them).
For example, this patch had to be created because two headers were called the same way: e0ea0928d5b7 ("Fix gpio includes of mt8173 platform to avoid collision."). More recently, this patch has had similar problems: 46f9b2c3a282 ("drivers: add tzc380 support").
This problem was introduced in commit 4ecca33988b9 ("Move include and source files to logical locations"). At that time, there weren't too many headers so it wasn't a real issue. However, time has shown that this creates problems.
Platforms that want to preserve the way they include headers may add the removed paths to PLAT_INCLUDES, but this is discouraged.
Change-Id: I39dc53ed98f9e297a5966e723d1936d6ccf2fc8f Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
show more ...
|
| #
2013523c |
| 07-Sep-2018 |
Dimitris Papastamos <dimitris.papastamos@arm.com> |
Merge pull request #1564 from jeenu-arm/sdei-suspend
SDEI: Mask events after CPU wakeup
|