| d781959f | 11-Jan-2023 |
Demi Marie Obenour <demiobenour@gmail.com> |
fix(el3-spmc): only call spmc_shm_check_obj() on complete objects
When called on incomplete objects, it might fail or access uninitialized memory. This allows simplifying spmc_shm_check_obj().
Chan
fix(el3-spmc): only call spmc_shm_check_obj() on complete objects
When called on incomplete objects, it might fail or access uninitialized memory. This allows simplifying spmc_shm_check_obj().
Change-Id: I7c11f15d4c8ebe8cd15e7d8c37a0d0f3daa83675 Signed-off-by: Demi Marie Obenour <demiobenour@gmail.com>
show more ...
|
| cbbb8a03 | 31-Dec-2022 |
Demi Marie Obenour <demiobenour@gmail.com> |
refactor(el3-spmc): spmc_shmem_obj_get_emad() will never fail
Earlier validation ensures spmc_shmem_obj_get_emad() will never fail, so trip an assertion instead of returning NULL.
Change-Id: I285f3
refactor(el3-spmc): spmc_shmem_obj_get_emad() will never fail
Earlier validation ensures spmc_shmem_obj_get_emad() will never fail, so trip an assertion instead of returning NULL.
Change-Id: I285f3b59150773b2404db5719753fdb240e9ed63 Signed-off-by: Demi Marie Obenour <demiobenour@gmail.com>
show more ...
|
| 2b0bc4e0 | 07-Mar-2023 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
feat(cpufeat): enable FEAT_SVE for FEAT_STATE_CHECKED
Add support for runtime detection (ENABLE_SVE_FOR_NS=2), by splitting sve_supported() into an ID register reading function and a second function
feat(cpufeat): enable FEAT_SVE for FEAT_STATE_CHECKED
Add support for runtime detection (ENABLE_SVE_FOR_NS=2), by splitting sve_supported() into an ID register reading function and a second function to report the support status. That function considers both build time settings and runtime information (if needed), and is used before we do SVE specific setup.
Change the FVP platform default to the now supported dynamic option (=2), so the right decision can be made by the code at runtime.
Change-Id: I1caaba2216e8e2a651452254944a003607503216 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| eed15e43 | 18-Oct-2022 |
Marc Bonnici <marc.bonnici@arm.com> |
fix(el3-spmc): check descriptor size for overflow
Ensure that the provided descriptor size used when reserving space for a memory descriptor does not overflow to prevent scope for memory corruption.
fix(el3-spmc): check descriptor size for overflow
Ensure that the provided descriptor size used when reserving space for a memory descriptor does not overflow to prevent scope for memory corruption. Reported by Matt Oh, Google Android Red Team.
Reported-by: mattoh@google.com Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: If06985c4de9a88ff82ce60d10e346da948ed383f
show more ...
|
| 21ed9ea3 | 18-Oct-2022 |
Marc Bonnici <marc.bonnici@arm.com> |
fix(el3-spmc): fix location of fragment length check
Ensure that the fragment_length parameter is validated to prevent a buffer overflow before it is used. Reported by Matt Oh, Google Android Red Te
fix(el3-spmc): fix location of fragment length check
Ensure that the fragment_length parameter is validated to prevent a buffer overflow before it is used. Reported by Matt Oh, Google Android Red Team.
Reported-by: mattoh@google.com Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I0323c096ffd988fbd85bbd4ade3abd8427aea977
show more ...
|
| 0dc35186 | 18-Oct-2022 |
Marc Bonnici <marc.bonnici@arm.com> |
fix(el3-spmc): fix detection of overlapping memory regions
The current logic does not cover all scenarios of overlapping memory regions. Update the implementation to verify non-overlapping regions i
fix(el3-spmc): fix detection of overlapping memory regions
The current logic does not cover all scenarios of overlapping memory regions. Update the implementation to verify non-overlapping regions instead. Reported by Matt Oh, Google Android Red Team.
Reported-by: mattoh@google.com Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: I16c53d081e4455bc0e28399d28a1b27b1a9eb49c
show more ...
|
| cee8bb3b | 09-Aug-2022 |
vallau01 <valentin.laurent@trustonic.com> |
fix(el3-spmc): error handling in allocation
Error check must be done on the previously allocated pointer, not a random one from the code.
Change-Id: I1c8253eacbe778cc4a9a8d71081fc615fa7e5293 Signed
fix(el3-spmc): error handling in allocation
Error check must be done on the previously allocated pointer, not a random one from the code.
Change-Id: I1c8253eacbe778cc4a9a8d71081fc615fa7e5293 Signed-off-by: Lukas Hanel <lukas.hanel@trustonic.com>
show more ...
|
| ac568b2b | 09-Aug-2022 |
vallau01 <valentin.laurent@trustonic.com> |
fix(el3-spmc): deadlock when relinquishing memory
Do not forget to pass via err_unlock_mailbox: label.
Change-Id: Icfb997b1c7cce196003af2c28bffc50dc73e30b4 Signed-off-by: Lukas Hanel <lukas.hanel@t
fix(el3-spmc): deadlock when relinquishing memory
Do not forget to pass via err_unlock_mailbox: label.
Change-Id: Icfb997b1c7cce196003af2c28bffc50dc73e30b4 Signed-off-by: Lukas Hanel <lukas.hanel@trustonic.com>
show more ...
|
| 25eb2d41 | 20-May-2022 |
Marc Bonnici <marc.bonnici@arm.com> |
fix(spmc): fix incorrect FF-A version usage
Fix the wrong FF-A version being used for retrieving existing memory descriptors for v1.0 clients. Internally these should always be stored using the late
fix(spmc): fix incorrect FF-A version usage
Fix the wrong FF-A version being used for retrieving existing memory descriptors for v1.0 clients. Internally these should always be stored using the latest version rather than client version.
Signed-off-by: Marc Bonnici <marc.bonnici@arm.com> Change-Id: Ibee1b2452c8d6ebd23bbd9d703c96ca185444093
show more ...
|