aboutsummaryrefslogtreecommitdiff
path: root/include
diff options
context:
space:
mode:
authorIlias Apalodimas <apalos@gmail.com>2021-12-24 10:08:41 +0200
committerHeinrich Schuchardt <heinrich.schuchardt@canonical.com>2021-12-31 06:44:29 +0100
commit2707610eb7d3068dbd131401dcde65a57ddc0018 (patch)
tree3e7ae84ab05db35831364720cbc15c5111f6277e /include
parent40e5b53ea0dc67cdff3e6e7d8cac7b258a9d885b (diff)
downloadu-boot-2707610eb7d3068dbd131401dcde65a57ddc0018.zip
u-boot-2707610eb7d3068dbd131401dcde65a57ddc0018.tar.gz
u-boot-2707610eb7d3068dbd131401dcde65a57ddc0018.tar.bz2
efi_loader: Don't limit the StMM buffer size explicitly
Currently we allow and explicitly check a single shared page with StandAloneMM. This is dictated by OP-TEE which runs the application. However there's no way for us dynamically discover the number of pages we are allowed to use. Since writing big EFI signature list variable requires more than a page, OP-TEE has bumped the number of shared pages to four. Let's remove our explicit check and allow the request to reach OP-TEE even if it's bigger than what it supports. There's no need to sanitize the number of pages internally. OP-TEE will fail if we try to write more than it's allowed. The error will just trigger later on, during the StMM access. While at it add an error message to help users figure out what failed. Signed-off-by: Ilias Apalodimas <ilias.apalodimas@linaro.org> Tested-by: Ying-Chun Liu (PaulLiu) <paul.liu@linaro.org> Signed-off-by: Ilias Apalodimas <apalos@gmail.com>
Diffstat (limited to 'include')
-rw-r--r--include/tee.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/tee.h b/include/tee.h
index 5005149..13f6096 100644
--- a/include/tee.h
+++ b/include/tee.h
@@ -58,6 +58,7 @@
#define TEE_SUCCESS 0x00000000
#define TEE_ERROR_STORAGE_NOT_AVAILABLE 0xf0100003
#define TEE_ERROR_GENERIC 0xffff0000
+#define TEE_ERROR_EXCESS_DATA 0xffff0004
#define TEE_ERROR_BAD_PARAMETERS 0xffff0006
#define TEE_ERROR_ITEM_NOT_FOUND 0xffff0008
#define TEE_ERROR_NOT_IMPLEMENTED 0xffff0009