summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2020-12-27mk/compile.mk: Fix handling of '+' in path for generated include guardsVesa Jääskeläinen
When building with bitbake with gitpkgv class git revision details have '+' as delimeter. Version details appears in path and this causes following warnings during the OP-TEE OS build: In file included from core/arch/arm/kernel/entry_a64.S:11: /build/.../optee-os/devel+gitrAUTOINC+e97c83bd6f-r0/build.zcu102/core/include/generated/asm-defines.h:1:123: warning: extra tokens at end of #ifndef directive 1 | #ifndef _build_..._optee_os_devel+gitrAUTOINC+e97c83bd6f_r0_build_zcu102_core_include_generated_asm_defines_h | ^ /build/.../optee-os/devel+gitrAUTOINC+e97c83bd6f-r0/build.zcu102/core/include/generated/asm-defines.h:2:9: warning: missing whitespace after the macro name 2 | #define _build_..._optee_os_devel+gitrAUTOINC+e97c83bd6f_r0_build_zcu102_core_include_generated_asm_defines_h | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Reviewed-by: Jerome Forissier <jerome@forissier.org> Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Use get_attribute_ptr() instead of get_attribute()Ruchika Gupta
When just trying to determine if an attribute is present in the list or not withour requiring the actual value of the attribute, using get_attribute_ptr() is better to use as it is more light-weight than it's counterpart get_attribute(). Suggested-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Add class_id in create_attributes_from_template()Ruchika Gupta
Add a parameter to pass pkcs11_class_id. The parameter will be used when attributes need to be created for a template supporting public or private class key. It is unused for now. Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Add class and type hint in sanitize_client_object()Ruchika Gupta
Specification allows one to pass templates while genrating key/keypair where class and type may be omitted from the template. In such cases, pass class and type as hint in sanitize_client_object() so that they can be added in the attribute list being prepared. Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Fix for CKA_KEY_GEN_MECHANISM in create_attributes_from_template()Ruchika Gupta
CKA_KEY_GEN_MECHANISM attribute is not added in the attribute list (attrs) from the template (temp) when a key object is created as it doesn't fall in mandatory/optional attribute. So, error checking for this attribute should be done on the original source template(temp) and not the attribute list(attrs) in create_attributes_from_template(). Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Fix for CKA_LOCAL in create_attributes_from_template()Ruchika Gupta
CKA_LOCAL attribute is not added in the attribute list (attrs) from the template (temp) when a key object is created as it doesn't fall in mandatory/optional attribute. So, error checking for this attribute should be done on the original source template(temp) and not the attribute list(attrs) in create_attributes_from_template(). Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Add support for Key GenerationRuchika Gupta
Adds support of mechanisms PKCS11_CKM_GENERIC_SECRET_KEY_GEN, PKCS11_CKM_AES_KEY_GEN for key generation API. Co-developed-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Define TA mechanisms for Key GenerationRuchika Gupta
Adds the mechanisms PKCS11_CKM_GENERIC_SECRET_KEY_GEN in enum pkcs11_mechanism_id. Co-developed-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-23ta: pkcs11: Define command for Key GenerationRuchika Gupta
Add command PKCS11_CMD_GENERATE_KEY in enum pkcs11_ta_cmd. Co-developed-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com>
2020-12-19shippable: imx8mm/imx6ull: add plug and trust supportJorge Ramirez-Ortiz
Validates the different SE050 configuration options with the Plug And Trust library on arm64 and arm. This will be useful to avoid regressions when multiple crypto drivers are enabled. Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Reviewed-by: Jerome Forissier <jerome@forissier.org>
2020-12-17ta: pkcs11: Fix the error code returnedRuchika Gupta
While generating a key of type PKCS11_CKO_SECRET_KEY, if CKA_VALUE_LEN field is not specified in the attribute template, the error returned needs to be PKCS11_CKR_TEMPLATE_INCOMPLETE. Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org>
2020-12-17ta: pkcs11: Temporary workaround in sanitize_indirect_attr()Ruchika Gupta
Since the type of key to be generated is implicit in the key generation mechanism, the template does not need to supply a key type or class. (CKA_CLASS and CKA_KEY_TYPE attributes). sanitize_indirect_attr() expects these attributes to be available else gives an error. The right way of handling this would be perhaps passing a hint of the class and key type to this function if key is being generated using key generated mechanisms. However, we don't have support for wrap/derive key which uses the indirect attributes at present in the code. So, we would not be able to test it. For now, just move the class checking afer the attribute checking which helps avoid this error. Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org>
2020-12-15Use barrier_read_cntpct() to read CNTPCTJens Wiklander
Arm ARM quite clearly mentions [1] [2] that such reads must be preceded by an ISB to forbid re-ordering. [1] https://developer.arm.com/documentation/ddi0487/fc/ page D13-2863 "Synchronization requirements for AArch64 System registers" and page G8-6146 "Ordering of reads of System registers". [2] https://developer.arm.com/documentation/ddi0406/cd/ page B3-1441 "Ordering of reads of system control registers" Reviewed-by: Jerome Forissier <jerome@forissier.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Reported-by: Olivier Deprez <Olivier.Deprez@arm.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15libutee: add isb() and barrier_read_cntpct()Jens Wiklander
Adds isb() and barrier_read_cntpct() to arm_user_sysreg.h, the latter to be used as a helper when reading CNTPCT. Reviewed-by: Jerome Forissier <jerome@forissier.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15core: add barrier_read_cntpct()Jens Wiklander
Adds barrier_read_cntpct() to arm.h. To be used as a helper when reading CNTPCT. Reviewed-by: Jerome Forissier <jerome@forissier.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15libutee: fix TEE_BigIntInit() memset()Jens Wiklander
The TEE_BigIntInit() supplied length is the number of words allocated for the bigint, including headers. Prior to this patch it seems it was assumed that length was number of bits given the call to TEE_BigIntSizeInU32(). With this patch correct this by removing the TEE_BigIntSizeInU32() call. Fixes: 062e3d01c039 ("ta: switch to to mbedtls for bignum") Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15libutee: TEE_CopyOperation() copy info.digestLengthJens Wiklander
When copying an operation include info.digestLength in the copied fields which is needed for the authenticated encryption algorithms AES-GCM and AES-CCM. Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jerome Forissier <jerome@forissier.org> Suggested-by: Tony He <tony.he@armchina.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15libutee: TEE_CopyOperation() check operation modeJens Wiklander
Adds a check in TEE_CopyOperation() to panic if operation mode doesn't match in the source and destination operations. Reviewed-by: Jerome Forissier <jerome@forissier.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15core: copy ctx_finalize in syscall_cryp_state_copy()Jens Wiklander
Copies the ctx_finalize() when a state is copied using syscall_cryp_state_copy() in order to support proper cleanup of the state once it's removed. Acked-by: Jerome Forissier <jerome@forissier.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Suggested-by: Tony He <tony.he@armchina.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15core: copy mode in cts_copy_state()Jens Wiklander
Fixes cts_copy_state() by copying the "mode" element also for the state to be complete. Fixes: 96098f011f7c ("core: crypto: introduce struct crypto_cipher_ops") Acked-by: Jerome Forissier <jerome@forissier.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Reported-by: Tony He <tony.he@armchina.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-15plat-rockchip: mark parameters as __maybe_unused in platform_secure_ddr_regionHeiko Stuebner
The weak variant of platform_secure_ddr_region() only emits a message that the target region won't get protected due to missing platform-code. Depending on the log-level this can result in the function parameters not getting used at all, so mark them as __maybe_unused. Signed-off-by: Heiko Stuebner <heiko.stuebner@theobroma-systems.com> Reviewed-by: Jerome Forissier <jerome@forissier.org>
2020-12-15core: tzc380: restart search at full sizeRouven Czerwinski
Restart the search at the biggest region size after finding a region. This way we can use subregions for the first offset and use full regions afterwards. Fixes https://github.com/OP-TEE/optee_os/issues/4252 Signed-off-by: Rouven Czerwinski <r.czerwinski@pengutronix.de> Tested-by: Robin van der Gracht <robin@protonic.nl> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-15drivers: crypto: se050: die_id generationJorge Ramirez-Ortiz
Guarantee the uniqueness of the die_id even when the requested length is smaller than the se050 unique identifier. Currently, tee_otp_get_die_id requests 12 bytes while the se050 unique identifier is 18 bytes which is an issue as the uniqueness of the device can be lost due to the truncation of the identifier. Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome@forissier.org>
2020-12-14core: fix user mode context reference in pagerEtienne Carriere
Fix tee_pager_gpt_save_and_release_entries() to use to_user_mode_ctx() to get current context user memory areas instead of to_user_ta_ctx() since the former supports both SP and TA contexts. Prior this change was pager asserting with an error trace like below: E/TC:0 0 assertion 'is_user_ta_ctx(ctx)' failed at core/arch/arm/include/kernel/user_ta.h:56 <to_user_ta_ctx> E/TC:0 0 Panic at core/kernel/assert.c:28 <_assert_break> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-14build: make 'force' macro more robustJerome Forissier
The 'force' macro can cause unexpected errors in some cases where the name of the configuration variable is preceded by a space: '$(call force, CFG_FOO,foo)' instead of '$(call force,CFG_FOO,foo)'. For example: $ make PLATFORM=imx-mx8mmevk CFG_STACK_{TMP,THREAD}_EXTRA=8192 \ CFG_CRYPTO_DRV_ACIPHER=y CFG_NXP_SE05X=y CFG_NXP_CAAM=y core/drivers/crypto/se050/crypto.mk:49: *** CFG_CRYPTO_DRV_ACIPHER is set to '' (from undefined) but its value must be 'y' [Mandated by CFG_NXP_SE05X_ACIPHER_DRV]. Stop. Fixing the callers is certainly a good thing to do (if only for consistency) but the current behavior is difficult to troubleshoot. Therefore, make the 'force' macro more robust by stripping any space around the variable name. Reported-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Signed-off-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-14drivers: crypto: se050: strip spaces from crypto.mkJorge Ramirez-Ortiz
Some versions of the force function used in the makefile might produce incorrect results when spaces are included in the parameter field. In general is a better practice to strip spaces when invoking this sort of functions. To prevent issues (ie: in case of backport) make sure that the SE050 driver is not affected by that variability. Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Jerome Forissier <jerome@forissier.org>
2020-12-11drivers: imx_i2c: remove non-portable use of defineJorge Ramirez-Ortiz
Fix the build error triggered when enabling -Werror=expansion-to-defined Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-11Initial support for Renesas RZ/G2{H,M,N,E} SoC'sLad Prabhakar
This patch adds support for Renesas RZ/G2{H,M,N,E} SoC's. * Compiled with: | make PLATFORM=rzg # Defaults to RZ/G2M SoC Based on the work done from Huynh Thanh Hung for RZ/G2 internally and similar work done for Renesas RCar-Gen3 SoC's in mainline OP-TEE OS. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Reviewed-by: Biju Das <biju.das.jz@bp.renesas.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome@forissier.org>
2020-12-11core: kernel: link.mk: Move rules to generate tee-raw.bin and tee.srec from ↵Lad Prabhakar
rcar platform Move the rules to generate tee-raw.bin and tee.srec from rcar platform to core/arch/arm/kernel/link.mk so that similar platforms can re-use it. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org>
2020-12-11ta: pkcs11: rename argument bp to attrs for generic attributesEtienne Carriere
Rename input argument bp/bp_count to attrs/attrs_count in several local functions in pkcs11_attributes.c since the reference cover any kind of attribute, not only boolean attributes (bp stood for boolean property). Reviewed-by: Ruchika Gupta <ruchika.gupta@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-11ta: pkcs11: fix initial value for return codeEtienne Carriere
Fix initial value for enumerated variable of type enum pkcs11_rc. Reviewed-by: Ruchika Gupta <ruchika.gupta@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-11ta: pkcs11: fix ordering in switch caseEtienne Carriere
Fix ordering switch/case block of get_key_min_max_sizes(). Reviewed-by: Ruchika Gupta <ruchika.gupta@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-11ta: pkcs11: add missing header filesEtienne Carriere
Add missing header files inclusion in few source files. Reviewed-by: Ruchika Gupta <ruchika.gupta@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-11ta: pkcs11: remove empty tee_release_ctr_operation()Etienne Carriere
Remove function tee_release_ctr_operation() that is empty since the generic sequence already releases CTR operation extra context. Reviewed-by: Ruchika Gupta <ruchika.gupta@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-11ta: pkcs11: release active process on session closureEtienne Carriere
Release the possible active processing resources when closing a session. Fixes: 512cbf1d30dd ("ta: pkcs11: adds support for symmetric AES cipher modes") Reviewed-by: Ruchika Gupta <ruchika.gupta@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-11ta: pkcs11: fix return code when parsing attribute templatesEtienne Carriere
Fix return code that was not set in few error cases in create_attributes_from_template(). Fixes: 63f89caa9022 ("ta: pkcs11: attribute helper functions") Reviewed-by: Ruchika Gupta <ruchika.gupta@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-10core: remove unused TEE_TIME_BOOT_TICKS_HZJerome Forissier
The TEE_TIME_BOOT_TICKS_HZ macro is not used, remove it. Signed-off-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-10libutee: user_ta_header.h: remove unused struct ta_func_headJerome Forissier
struct ta_func_head is unused, remove it. Signed-off-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-10libutee: user_ta_header.h: remove unused property stringsJerome Forissier
user_ta_header.h defines a few macros with property names that are not used anywhere and are not part of any specification. Remove them. Signed-off-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-10libutee: user_ta_header.h: remove unused enum user_ta_core_service_idJerome Forissier
enum user_ta_core_service_id is unused, remove it. Signed-off-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-07spi: pl022: expose internal fifo flush APIVahid Dukandar
We identified that the caller of the pl022 driver needs to flush the pl022's internal fifo to make sure next transaction starts clean. This PR expose existing pl022_flush_fifo API to caller via spi_ops. The validation is performed on bcm platform. Signed-off-by: Vahid Dukandar <vahidd@microsoft.com> Reviewed-by: Victor Chong <victor.chong@linaro.org>
2020-12-07ta: pkcs11: Add support for big key sizes for HMAC hash MechanismsRuchika Gupta
Currently the support for maximum key size supported in HMAC hash functions is limited by the underlying Global TEE implementation. The RFC 2202 and 4231 specify some HMAC test vectors where key size is greater than the sizes as supported in current TEE implementation. For such key sizes, greater than the maximum key size supported by TEE, first hash the key and then use the resultant as the actual key to HMAC. Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-07ta: pkcs11: Add minimum key size checking for HMAC MechanismsRuchika Gupta
For HMAC mechanisms for hash operations, if the size of the key object is less than the minimum size supported by the implementation, error PKCS11_CKR_KEY_SIZE_RANGE should be returned. If this check is not done before TEE_AllocateOperation(), passing a key size not supported by TEE results in a PKCS11_CKR_MECHANISM_INVALID error, which is ambiguous as Mehcanism is supported here and the issue is with key size. Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-07ta: pkcs11: Fix usage of CKK_GENERIC_SECRET for HMAC FunctionsRuchika Gupta
The use of CKK_GENERIC_SECRET is allowed with HMAC mechanisms. In earlier implementation, CKK_GENERIC_SECRET was mapped to TEE_GENERIC_KEY. TEE_AllocateOperation() would return an error when TEE key of type TEE_GENERIC_KEY is used with HMAC algorithms. So, special handling is required for such keys where the PKCS11 mechanism should be used to determine the corresponding TEE KEY Type for CKK_GENERIC_SECRET when used with HMAC mechanisms. Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-07ta: pkcs11: Add support for HMAC keys in get_key_min_max_sizes()Ruchika Gupta
The PKCS11_CKK_<h>_HMAC key entries were missing in get_key_min_max_sizes(). These have been added. Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-07ta: pkcs11: Correct the key size for HMAC mechanismsRuchika Gupta
The minimum and maximum key sizes supported by HMAC mechanism should be in sync with the Global Platform API's used for implementing them. The sizes are now in sync with the key sizes as specified in TEE_AllocateTransientObjects() in [1]. [1] GlobalPlatform Technology TEE Internal Core API Specification Version 1.1.2.50 Signed-off-by: Ruchika Gupta <ruchika.gupta@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-07Remove unused file lib/libutee/errno.cJerome Forissier
lib/libutee/errno.c is not built or used in any way so remove it. Signed-off-by: Jerome Forissier <jerome@forissier.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
2020-12-04core: kernel: link.mk: make path to kernel linker script genericMarouene Boubakri
The path to kernel script is hard-coded. Despite it is in a arch specific folder, it should use defined variables. This is helpful in case of porting OP-TEE OS to a new architecture such we make maximum reuse of existing sources. Signed-off-by: Marouene Boubakri <marouene.boubakri@nxp.com> Acked-by: Jerome Forissier <jerome@forissier.org>
2020-12-03plat-mediatek: add support for MT8183 SoCFabien Parent
Add OP-TEE support for MT8183 SoC. Signed-off-by: Fabien Parent <fparent@baylibre.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
2020-12-03plat-mediatek: Add support for GICFabien Parent
Add the support for the GIC for the MediaTek platforms. Signed-off-by: Fabien Parent <fparent@baylibre.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>