Update Notice.md#1
Merged
1 commit merged intoOP-TEE:masterfrom Jun 12, 2014
Merged
Conversation
jforissier
referenced
this pull request
in jforissier/optee_os
May 12, 2015
Build information includes: - Version string as returned by 'git describe --dirty' - Build counter (#1 initially or after 'make clean') - Build date - Link format For example: 0.2.0-107-g4d0acfc #1 Tue May 12 16:02:57 UTC 2015 elf32-littlearm Signed-off-by: Jerome Forissier <[email protected]>
jforissier
referenced
this pull request
in jforissier/optee_os
May 13, 2015
Build information includes: - Version string as returned by 'git describe --dirty' - Build counter (#1 initially or after 'make clean') - Build date/time - Linker architecture ('arm', 'aarch64') For example: 0.2.0-107-g985d7d8 #1 Tue May 12 16:49:14 UTC 2015 aarch64 Signed-off-by: Jerome Forissier <[email protected]>
jforissier
referenced
this pull request
in jforissier/optee_os
May 13, 2015
Build information includes: - Version string as returned by 'git describe --always --dirty' - Build counter (#1 initially or after 'make clean') - Build date/time - Linker architecture ('arm', 'aarch64') For example: 0.2.0-107-g985d7d8 #1 Tue May 12 16:49:14 UTC 2015 aarch64 Signed-off-by: Jerome Forissier <[email protected]>
jforissier
referenced
this pull request
in jforissier/optee_os
May 13, 2015
Build information includes: - Version string as returned by 'git describe --always --dirty' - Build counter (#1 initially or after 'make clean') - Build date/time - Linker architecture ('arm', 'aarch64') For example: 0.2.0-107-g985d7d8 #1 Tue May 12 16:49:14 UTC 2015 aarch64 Signed-off-by: Jerome Forissier <[email protected]> Reviewed-by: Joakim Bech <[email protected]> Reviewed-by: Pascal Brand <[email protected]> Reviewed-by: Jens Wiklander <[email protected]>
ardbiesheuvel
referenced
this pull request
in jforissier/optee_os
Jul 7, 2015
Signed-off-by: Jerome Forissier <[email protected]>
Closed
jforissier
referenced
this pull request
in jforissier/optee_os
Sep 13, 2016
There is a race condition in the code that creates and deletes trusted
storage. If multiple threads invoke a multi-session TA to create and
delete different files (such as xtest 6016), the following can occur:
Thread #1 (create file #1) | Thread #2 (delete file #2)
|
| remove("/TA_dir/file");
mkdir("/TA_dir"); |
| rmdir("/TA_dir");
create("/TA_dir/file1"); |
=> ENOENT |
Add a mutex to prevent this race condition.
Note: the bug is currently not triggered by xtest 1016 because the test
is run for RPMB FS only, and because directory operations are no-ops in
the RPMB implementation. The fix will be needed when enabling single-TA
concurrency with the REE and SQL backends.
Signed-off-by: Jerome Forissier <[email protected]>
jforissier
referenced
this pull request
in jforissier/optee_os
Sep 13, 2016
There is a race condition in the code that creates and deletes trusted
storage. If multiple threads invoke a multi-session TA to create and
delete different files (such as xtest 6016), the following can occur:
Thread #1 (create file #1) | Thread #2 (delete file #2)
|
| unlink("/TA_dir/file2");
mkdir("/TA_dir"); |
| rmdir("/TA_dir");
create("/TA_dir/file1"); |
=> ENOENT |
Add a mutex to prevent this race condition.
Note: the bug is currently not triggered by xtest 1016 because the test
is run for RPMB FS only, and because directory operations are no-ops in
the RPMB implementation. The fix will be needed when enabling single-TA
concurrency with the REE and SQL backends.
Signed-off-by: Jerome Forissier <[email protected]>
Closed
This was referenced Mar 15, 2017
jforissier
referenced
this pull request
in jforissier/optee_os
Jun 28, 2017
The first and and fourth lines in the boot sequence below are debug messages that should not be printed when the log level is INFO: INFO: TEE-CORE: No NSEC DDR memory area defined INFO: TEE-CORE: INFO: TEE-CORE: OP-TEE version: 2.5.0-rc1 #1 Wed Jun 28 15:11:06 UTC 2017 aarch64 INFO: TEE-CORE: Shared memory address range: 3dc00000, 3f000000 INFO: TEE-CORE: Initialized Signed-off-by: Jerome Forissier <[email protected]>
jforissier
referenced
this pull request
in jforissier/optee_os
Jun 28, 2017
The first and and fourth lines in the boot sequence below are debug messages that should not be printed when the log level is INFO: INFO: TEE-CORE: No NSEC DDR memory area defined INFO: TEE-CORE: INFO: TEE-CORE: OP-TEE version: 2.5.0-rc1 #1 Wed Jun 28 15:11:06 UTC 2017 aarch64 INFO: TEE-CORE: Shared memory address range: 3dc00000, 3f000000 INFO: TEE-CORE: Initialized Signed-off-by: Jerome Forissier <[email protected]> Reviewed-by: Etienne Carriere <[email protected]>
jforissier
added a commit
that referenced
this pull request
Jun 28, 2017
The first and and fourth lines in the boot sequence below are debug messages that should not be printed when the log level is INFO: INFO: TEE-CORE: No NSEC DDR memory area defined INFO: TEE-CORE: INFO: TEE-CORE: OP-TEE version: 2.5.0-rc1 #1 Wed Jun 28 15:11:06 UTC 2017 aarch64 INFO: TEE-CORE: Shared memory address range: 3dc00000, 3f000000 INFO: TEE-CORE: Initialized Signed-off-by: Jerome Forissier <[email protected]> Reviewed-by: Etienne Carriere <[email protected]>
jenswi-linaro
added a commit
that referenced
this pull request
May 27, 2021
Replaces right shift operations on 32-bit integers by more than 31 bits with 0. This fixes coverity scan: CID 1501844 (#1 of 1): Bad bit shift operation (BAD_SHIFT) Signed-off-by: Jens Wiklander <[email protected]>
jenswi-linaro
added a commit
that referenced
this pull request
May 27, 2021
In tee_fs_dirfile_get_tmp() dirh->files is checked to be not NULL leading but at another place dirh->nbits is checked instead before accessing dirh->files. Both checks are OK since dirh->files mustn't be NULL if dirh->nbits is larger than 0. This confuses coverity to emit a warning, so change the function to check dirh->nbits instead. This fixes coverity scan: CID 1501821 (#1 of 1): Dereference after null check (FORWARD_NULL) Signed-off-by: Jens Wiklander <[email protected]>
jenswi-linaro
added a commit
that referenced
this pull request
May 27, 2021
In populate_files() db->files is checked to be not NULL leading but at another place db->nbits is checked instead before accessing db->files. Both checks are OK since db->files mustn't be NULL if db->nbits is larger than 0. This confuses coverity to emit a warning, so change the function to check db->nbits instead. This fixes coverity scan: CID 1501793 (#1 of 1): Dereference after null check (FORWARD_NULL) Signed-off-by: Jens Wiklander <[email protected]>
This was referenced Sep 17, 2021
Closed
Closed
Closed
This pull request was closed.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Added some precisions on license terms in notice.md