-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security issues when using SDP shared memory #4572
Comments
I am a new researcher on OS and TEE and I have some question about SDP:
|
Hello @YogzZ,
Your description looks right.
Safety of the fd value itself in CA should not be needed, from protected content security point of view.
ION does not see the TA heap (where TA does malloc() etc...).
CA does not hold any virtual address for a SDP buffer. CA manipulates fd abstract scalar value, likely 0, 1, 2, 3, ... A last comment to your attention: |
Thank you for your answer~ I still have some question about SDP:
|
The physical address (and size) points a secure address range meaningful to optee_os (thanks to macro
REE knows the physical address but cannot access the memory.
In secure side, core_memprot.h defines the resources used by OPTEE to identify memory.
TAs without
True. The part that will need to upgrade is the test part. Optee_test will need to upgrade as a regression test relies on ION and the unmapped heap. Linux source tree also where the OP-TEE fork has some commits to enable ION and implement unmap heaps. |
@YogzZ, I have this document that describes the extensions to GPD TEE Client API and GPD TEE Internal Core API for SDP. |
@etienne-lms Thank you! You are so considerate! |
No description provided.
The text was updated successfully, but these errors were encountered: