Skip to content

Update Notice.md#1

Merged
1 commit merged intoOP-TEE:masterfrom
hsibert:patch-1
Jun 12, 2014
Merged

Update Notice.md#1
1 commit merged intoOP-TEE:masterfrom
hsibert:patch-1

Conversation

@hsibert
Copy link
Copy Markdown

@hsibert hsibert commented Jun 12, 2014

Added some precisions on license terms in notice.md

ghost pushed a commit that referenced this pull request Jun 12, 2014
@ghost ghost merged commit 7c6ae17 into OP-TEE:master Jun 12, 2014
jforissier referenced this pull request in jforissier/optee_os May 12, 2015
Build information includes:

- Version string as returned by 'git describe --dirty'
- Build counter (#1 initially or after 'make clean')
- Build date
- Link format

For example:

0.2.0-107-g4d0acfc #1 Tue May 12 16:02:57 UTC 2015 elf32-littlearm

Signed-off-by: Jerome Forissier <[email protected]>
jforissier referenced this pull request in jforissier/optee_os May 13, 2015
Build information includes:

- Version string as returned by 'git describe --dirty'
- Build counter (#1 initially or after 'make clean')
- Build date/time
- Linker architecture ('arm', 'aarch64')

For example: 0.2.0-107-g985d7d8 #1 Tue May 12 16:49:14 UTC 2015 aarch64

Signed-off-by: Jerome Forissier <[email protected]>
jforissier referenced this pull request in jforissier/optee_os May 13, 2015
Build information includes:

- Version string as returned by 'git describe --always --dirty'
- Build counter (#1 initially or after 'make clean')
- Build date/time
- Linker architecture ('arm', 'aarch64')

For example: 0.2.0-107-g985d7d8 #1 Tue May 12 16:49:14 UTC 2015 aarch64

Signed-off-by: Jerome Forissier <[email protected]>
jforissier referenced this pull request in jforissier/optee_os May 13, 2015
Build information includes:

- Version string as returned by 'git describe --always --dirty'
- Build counter (#1 initially or after 'make clean')
- Build date/time
- Linker architecture ('arm', 'aarch64')

For example: 0.2.0-107-g985d7d8 #1 Tue May 12 16:49:14 UTC 2015 aarch64

Signed-off-by: Jerome Forissier <[email protected]>
Reviewed-by: Joakim Bech <[email protected]>
Reviewed-by: Pascal Brand <[email protected]>
Reviewed-by: Jens Wiklander <[email protected]>
ardbiesheuvel referenced this pull request in jforissier/optee_os Jul 7, 2015
@neil1899 neil1899 mentioned this pull request Dec 8, 2015
jforissier referenced this pull request in jforissier/optee_os Sep 13, 2016
There is a race condition in the code that creates and deletes trusted
storage. If multiple threads invoke a multi-session TA to create and
delete different files (such as xtest 6016), the following can occur:

    Thread #1 (create file #1) |   Thread #2 (delete file #2)
                               |
                               |   remove("/TA_dir/file");
    mkdir("/TA_dir");          |
                               |   rmdir("/TA_dir");
    create("/TA_dir/file1");   |
      => ENOENT                |

Add a mutex to prevent this race condition.

Note: the bug is currently not triggered by xtest 1016 because the test
is run for RPMB FS only, and because directory operations are no-ops in
the RPMB implementation. The fix will be needed when enabling single-TA
concurrency with the REE and SQL backends.

Signed-off-by: Jerome Forissier <[email protected]>
jforissier referenced this pull request in jforissier/optee_os Sep 13, 2016
There is a race condition in the code that creates and deletes trusted
storage. If multiple threads invoke a multi-session TA to create and
delete different files (such as xtest 6016), the following can occur:

    Thread #1 (create file #1) |   Thread #2 (delete file #2)
                               |
                               |   unlink("/TA_dir/file2");
    mkdir("/TA_dir");          |
                               |   rmdir("/TA_dir");
    create("/TA_dir/file1");   |
      => ENOENT                |

Add a mutex to prevent this race condition.

Note: the bug is currently not triggered by xtest 1016 because the test
is run for RPMB FS only, and because directory operations are no-ops in
the RPMB implementation. The fix will be needed when enabling single-TA
concurrency with the REE and SQL backends.

Signed-off-by: Jerome Forissier <[email protected]>
jforissier referenced this pull request in jforissier/optee_os Jun 28, 2017
The first and and fourth lines in the boot sequence below are debug
messages that should not be printed when the log level is INFO:

 INFO:    TEE-CORE: No NSEC DDR memory area defined
 INFO:    TEE-CORE:
 INFO:    TEE-CORE: OP-TEE version: 2.5.0-rc1 #1 Wed Jun 28 15:11:06 UTC 2017 aarch64
 INFO:    TEE-CORE: Shared memory address range: 3dc00000, 3f000000
 INFO:    TEE-CORE: Initialized

Signed-off-by: Jerome Forissier <[email protected]>
jforissier referenced this pull request in jforissier/optee_os Jun 28, 2017
The first and and fourth lines in the boot sequence below are debug
messages that should not be printed when the log level is INFO:

 INFO:    TEE-CORE: No NSEC DDR memory area defined
 INFO:    TEE-CORE:
 INFO:    TEE-CORE: OP-TEE version: 2.5.0-rc1 #1 Wed Jun 28 15:11:06 UTC 2017 aarch64
 INFO:    TEE-CORE: Shared memory address range: 3dc00000, 3f000000
 INFO:    TEE-CORE: Initialized

Signed-off-by: Jerome Forissier <[email protected]>
Reviewed-by: Etienne Carriere <[email protected]>
jforissier added a commit that referenced this pull request Jun 28, 2017
The first and and fourth lines in the boot sequence below are debug
messages that should not be printed when the log level is INFO:

 INFO:    TEE-CORE: No NSEC DDR memory area defined
 INFO:    TEE-CORE:
 INFO:    TEE-CORE: OP-TEE version: 2.5.0-rc1 #1 Wed Jun 28 15:11:06 UTC 2017 aarch64
 INFO:    TEE-CORE: Shared memory address range: 3dc00000, 3f000000
 INFO:    TEE-CORE: Initialized

Signed-off-by: Jerome Forissier <[email protected]>
Reviewed-by: Etienne Carriere <[email protected]>
jenswi-linaro added a commit that referenced this pull request May 27, 2021
Replaces right shift operations on 32-bit integers by more than 31 bits
with 0.

This fixes coverity scan:
CID 1501844 (#1 of 1): Bad bit shift operation (BAD_SHIFT)

Signed-off-by: Jens Wiklander <[email protected]>
jenswi-linaro added a commit that referenced this pull request May 27, 2021
In tee_fs_dirfile_get_tmp() dirh->files is checked to be not NULL
leading but at another place dirh->nbits is checked instead before
accessing dirh->files. Both checks are OK since dirh->files mustn't be
NULL if dirh->nbits is larger than 0.

This confuses coverity to emit a warning, so change the function to
check dirh->nbits instead.

This fixes coverity scan:
CID 1501821 (#1 of 1): Dereference after null check (FORWARD_NULL)

Signed-off-by: Jens Wiklander <[email protected]>
jenswi-linaro added a commit that referenced this pull request May 27, 2021
In populate_files() db->files is checked to be not NULL leading but at
another place db->nbits is checked instead before accessing db->files.
Both checks are OK since db->files mustn't be NULL if db->nbits is
larger than 0.

This confuses coverity to emit a warning, so change the function to
check db->nbits instead.

This fixes coverity scan:
CID 1501793 (#1 of 1): Dereference after null check (FORWARD_NULL)

Signed-off-by: Jens Wiklander <[email protected]>
This was referenced Aug 13, 2021
@klcib508 klcib508 mentioned this pull request Feb 22, 2022
@sungkeunsong sungkeunsong mentioned this pull request Jun 15, 2024
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant