Skip to content
  1. Nov 19, 2019
  2. Nov 13, 2019
  3. Nov 05, 2019
  4. Oct 30, 2019
    • Petre-Ionut Tudor's avatar
      Aarch32: Secure PMU counter leak tests · f1a45f76
      Petre-Ionut Tudor authored
      
      
      This patch adds Aarch32 support to the PMU counter leak tests.
      
      These tests attempt to profile the Secure world by configuring
      EL0 system registers such that the PMU is told to increment
      counters at Secure EL1, Secure EL2 and EL3. The tests fail if
      useful information was leaked.
      
      The Secure world defends against this type of attack with a
      combination of configuring EL3 system registers and saving/restoring
      EL0 PMU registers. Exactly which defense is employed depends on the
      architecture version.
      
      Signed-off-by: Petre-Ionut Tudor's avatarPetre-Ionut Tudor <petre-ionut.tudor@arm.com>
      Change-Id: I2dcc9e786a18d9859ac089f8008b060d277bee3a
      f1a45f76
  5. Oct 22, 2019
  6. Oct 21, 2019
  7. Oct 18, 2019
    • Deepika Bhavnani's avatar
      Extend SYSTEM_OFF test case · 8108c9a3
      Deepika Bhavnani authored
      
      
      Extend SYSTEM_OFF to involve more than just the lead CPU.
      
      The typical way to use SYSTEM_OFF is to use calls to CPU_OFF on
      all online cores except for the last one, which instead uses SYSTEM_OFF.
      
      test_system_off_cpu_other_than_lead() case is added to turn on any
      random CPU other then lead CPU and perform SYSTEM_OFF from the CPU which
      was turned ON.
      
      Signed-off-by: default avatarDeepika Bhavnani <deepika.bhavnani@arm.com>
      Change-Id: Ice62d0e7ef0db63ccb030e8dc1a83d9bd55e70f2
      8108c9a3
  8. Oct 16, 2019
  9. Oct 15, 2019
  10. Oct 14, 2019
  11. Oct 10, 2019
  12. Oct 08, 2019
  13. Oct 04, 2019
  14. Oct 03, 2019
  15. Oct 01, 2019
  16. Sep 30, 2019
  17. Sep 27, 2019
  18. Sep 26, 2019
    • Imre Kis's avatar
      Allowing zeroes in trusted OS SMC return values · 1c97f941
      Imre Kis authored
      
      
      Trusted OSes should preserve or fill by zeroes the values of x1-x3
      registers across an SMC call in order to prevent data leakage. The
      behaviour of OP-TEE regarding to this has changed recently from
      preserving values to filling them by zeroes. This patch utilitizes the
      newly added allow_zeros[] parameter of the smc_check_match function to
      make the tests compatible with OP-TEE commit 6e558fa94ab0 or later.
      
      Signed-off-by: Imre Kis's avatarImre Kis <imre.kis@arm.com>
      Change-Id: I52ddfb69261833a3fba76c5f89d27d1ea13043b0
      1c97f941
  19. Sep 25, 2019
  20. Sep 24, 2019
  21. Sep 23, 2019
  22. Aug 16, 2019
  23. Aug 08, 2019
  24. Aug 02, 2019
  25. Aug 01, 2019
  26. Jul 31, 2019
Loading