| 23721794 | 06-Sep-2024 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(security): enable WORKAROUND_CVE_2024_7881 build option
This patch enables build option needed to include support for CVE_2024_7881 [1] migitation.
[1]: https://developer.arm.com/Arm%20Security
fix(security): enable WORKAROUND_CVE_2024_7881 build option
This patch enables build option needed to include support for CVE_2024_7881 [1] migitation.
[1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: Id77f82a4dfaa4422729f7e3f2429f47cc90d9782
show more ...
|
| bba792b1 | 24-Jan-2025 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes Ided750de,Id3cc887c into integration
* changes: docs(gxl): add build instructions for booting BL31 from U-Boot SPL feat(gxl): add support for booting from U-Boot SPL/with standard
Merge changes Ided750de,Id3cc887c into integration
* changes: docs(gxl): add build instructions for booting BL31 from U-Boot SPL feat(gxl): add support for booting from U-Boot SPL/with standard params
show more ...
|
| 52e5a3f1 | 24-Jan-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
docs(maintainers): update LTS maintainers
Updating LTS maintainers list as agreed with other LTS maintainers.
Change-Id: Ibf087c6b0e24d6faa9dafb6f8a0955a47f583f28 Signed-off-by: Govindraj Raja <gov
docs(maintainers): update LTS maintainers
Updating LTS maintainers list as agreed with other LTS maintainers.
Change-Id: Ibf087c6b0e24d6faa9dafb6f8a0955a47f583f28 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| a62e2c88 | 22-Jan-2025 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
docs(context-mgmt): remove redundant information
The details specified under "Design" section with regard to enhancing the context_management library specifies the information on introducing root_co
docs(context-mgmt): remove redundant information
The details specified under "Design" section with regard to enhancing the context_management library specifies the information on introducing root_context.
This design has been through several discussions and based on its outcome, library has been enhanced.
The updated information covering all the aspects with regard to implementation is listed under "Components" section. https://trustedfirmware-a.readthedocs.io/en/latest/components/context-management-library.html
Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> Change-Id: I2cf3ccd8cd94444b90fdc627f45a72a4b6096638
show more ...
|
| faa8c656 | 09-Jan-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
docs: updates to LTS
Adding updates to LTS process -
- This is based on review comments in here - https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/34069/3/docs/lts.rst#37 - Based on
docs: updates to LTS
Adding updates to LTS process -
- This is based on review comments in here - https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/34069/3/docs/lts.rst#37 - Based on discussions with other LTS maintainers.
Change-Id: Iafc606a66ea3ea69c51b433867b5025b8debebe9 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| d39c2f38 | 12-Dec-2024 |
Govindraj Raja <govindraj.raja@arm.com> |
docs: add inital lts doc
Ref: https://linaro.atlassian.net/browse/TFC-669
The initial LTS document was created as pdf and was maintained in a shared folder location, to avoid pdf getting lost and t
docs: add inital lts doc
Ref: https://linaro.atlassian.net/browse/TFC-669
The initial LTS document was created as pdf and was maintained in a shared folder location, to avoid pdf getting lost and trying to find where it is we decided to have LTS details part of docs in TF-A.
This patch directly reflects the data from pdf attached to TFC-669. Any improvements or amends to this will be done at later phases based on LTS maintainers comments and agreements.
Change-Id: I1434c29f0236161d2a127596e2cc528bf4cc3e85 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 6b8df7b9 | 09-Jan-2025 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
feat(mops): enable FEAT_MOPS in EL3 when INIT_UNUSED_NS_EL2=1
FEAT_MOPS, mandatory from Arm v8.8, is typically managed in EL2. However, in configurations where NS_EL2 is not enabled, EL3 must set th
feat(mops): enable FEAT_MOPS in EL3 when INIT_UNUSED_NS_EL2=1
FEAT_MOPS, mandatory from Arm v8.8, is typically managed in EL2. However, in configurations where NS_EL2 is not enabled, EL3 must set the HCRX_EL2.MSCEn bit to 1 to enable the feature.
This patch ensures FEAT_MOPS is enabled by setting HCRX_EL2.MSCEn to 1.
Change-Id: Ic4960e0cc14a44279156b79ded50de475b3b21c5 Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
show more ...
|
| 043eca9e | 08-Jan-2025 |
Ferass El Hafidi <funderscore@postmarketos.org> |
docs(gxl): add build instructions for booting BL31 from U-Boot SPL
Change-Id: Ided750decea924ff8d78d2d345d34bc40b05f0cb Signed-off-by: Ferass El Hafidi <funderscore@postmarketos.org> |
| 6157ef37 | 09-Jan-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "bk/smccc_feature" into integration
* changes: feat(smccc): implement SMCCC_ARCH_FEATURE_AVAILABILITY refactor(cm): clean up per-world context refactor(cm): change own
Merge changes from topic "bk/smccc_feature" into integration
* changes: feat(smccc): implement SMCCC_ARCH_FEATURE_AVAILABILITY refactor(cm): clean up per-world context refactor(cm): change owning security state when a feature is disabled
show more ...
|
| 696ed168 | 03-Jan-2025 |
Olivier Deprez <olivier.deprez@arm.com> |
fix(build): include platform mk earlier
Move platform.mk inclusion in top level Makefile to permit a platform specifying BRANCH_PROTECTION option.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.
fix(build): include platform mk earlier
Move platform.mk inclusion in top level Makefile to permit a platform specifying BRANCH_PROTECTION option.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: I1f662f82cd949eedfdbb61b9f66de15c46fb3106
show more ...
|
| 8db17052 | 25-Oct-2024 |
Boyan Karatotev <boyan.karatotev@arm.com> |
feat(smccc): implement SMCCC_ARCH_FEATURE_AVAILABILITY
SMCCC_ARCH_FEATURE_AVAILABILITY [1] is a call to query firmware about the features it is aware of and enables. This is useful when a feature is
feat(smccc): implement SMCCC_ARCH_FEATURE_AVAILABILITY
SMCCC_ARCH_FEATURE_AVAILABILITY [1] is a call to query firmware about the features it is aware of and enables. This is useful when a feature is not enabled at EL3, eg due to an older FW image, but it is present in hardware. In those cases, the EL1 ID registers do not reflect the usable feature set and this call should provide the necessary information to remedy that.
The call itself is very lightweight - effectively a sanitised read of the relevant system register. Bits that are not relevant to feature enablement are masked out and active low bits are converted to active high.
The implementation is also very simple. All relevant, irrelevant, and inverted bits combined into bitmasks at build time. Then at runtime the masks are unconditionally applied to produce the right result. This assumes that context managers will make sure that disabled features do not have their bits set and the registers are context switched if any fields in them make enablement ambiguous.
Features that are not yet supported in TF-A have not been added. On debug builds, calling this function will fail an assert if any bits that are not expected are set. In combination with CI this should allow for this feature to to stay up to date as new architectural features are added.
If a call for MPAM3_EL3 is made when MPAM is not enabled, the call will return INVALID_PARAM, while if it is FEAT_STATE_CHECK, it will return zero. This should be fairly consistent with feature detection.
The bitmask is meant to be interpreted as the logical AND of the relevant ID registers. It would be permissible for this to return 1 while the ID returns 0. Despite this, this implementation takes steps not to. In the general case, the two should match exactly.
Finally, it is not entirely clear whether this call replies to SMC32 requests. However, it will not, as the return values are all 64 bits.
[1]: https://developer.arm.com/documentation/den0028/galp1/?lang=en
Co-developed-by: Charlie Bareham <charlie.bareham@arm.com> Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com> Change-Id: I1a74e7d0b3459b1396961b8fa27f84e3f0ad6a6f
show more ...
|
| 5d8c7218 | 31-Dec-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(cert-create): add default keysize to Brainpool ECDSA" into integration |
| 0da16fe3 | 18-Sep-2024 |
Maxime Méré <maxime.mere@foss.st.com> |
fix(cert-create): add default keysize to Brainpool ECDSA
By default, the ECDSA Brainpool regular and ECDSA Brainpool twisted algorithms support 256-bit sized keys. Not defining this leads to an erro
fix(cert-create): add default keysize to Brainpool ECDSA
By default, the ECDSA Brainpool regular and ECDSA Brainpool twisted algorithms support 256-bit sized keys. Not defining this leads to an error indicating that '256' is not a valid key size for ECDSA Brainpool. KEY_SIZES matrix must have a value in its table to avoid problems when KEY_SIZE is defined.
Signed-off-by: Maxime Méré <maxime.mere@foss.st.com> Change-Id: I34886659315f59a9582dcee1d92d0e24d4a4138e
show more ...
|
| 4639f890 | 13-Nov-2024 |
Ryan Everett <ryan.everett@arm.com> |
docs(arm): update docs to reflect rotpk key changes
The hashing algorithm for the rotpk is now HASH_ALG, not always sha-256. The public development keys are no longer in the repository and are now g
docs(arm): update docs to reflect rotpk key changes
The hashing algorithm for the rotpk is now HASH_ALG, not always sha-256. The public development keys are no longer in the repository and are now generated at run-time, updates the documentation to reflect this.
Change-Id: Ic336f7aca858e9b6a1af6d6e6dc5f4aa428da179 Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| 508a2f1c | 23-Dec-2024 |
Jaiprakash Singh <jaiprakashs@marvell.com> |
docs(maintainers): update marvell maintainer
Add Jaiprakash Singh as marvell maintainer
Change-Id: Ica924c0502b0a271b0368255841ef413391de959 Signed-off-by: Jaiprakash Singh <jaiprakashs@marvell.com> |
| af65cbb9 | 20-May-2024 |
Sona Mathew <sonarebecca.mathew@arm.com> |
fix(cpus): workaround for CVE-2024-5660 for Cortex-X4
Implements mitigation for CVE-2024-5660 that affects Cortex-X4 revisions r0p0, r0p1, r0p2. The workaround is to disable the hardware page aggreg
fix(cpus): workaround for CVE-2024-5660 for Cortex-X4
Implements mitigation for CVE-2024-5660 that affects Cortex-X4 revisions r0p0, r0p1, r0p2. The workaround is to disable the hardware page aggregation at EL3 by setting CPUECTLR_EL1[46] = 1'b1.
Public Documentation: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-5660
Change-Id: I378cb4978919cced03e7febc2ad431c572eac72d Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
show more ...
|
| 885503f4 | 16-Dec-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(docs): put INIT_UNUSED_NS_EL2 docs back" into integration |
| f3ad3f48 | 13-Dec-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(qti): platform support for qcs615" into integration |
| f60617d3 | 07-Nov-2024 |
quic_assethi <quic_assethi@quicinc.com> |
feat(qti): platform support for qcs615
Change-Id: Ibbe78a196d77530fa9d94d7d12b2f08a4b66d62e Signed-off-by: Amarinder Singh Sethi <quic_assethi@quicinc.com> |
| f8872c94 | 12-Dec-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(cpus): workaround for Cortex-X4 erratum 2923985" into integration |
| a57e18e4 | 11-Nov-2024 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
feat(fpmr): disable FPMR trap
This patch enables support of FEAT_FPMR by enabling access to FPMR register. It achieves it by setting the EnFPM bit of SCR_EL3. This feature is currently enabled for N
feat(fpmr): disable FPMR trap
This patch enables support of FEAT_FPMR by enabling access to FPMR register. It achieves it by setting the EnFPM bit of SCR_EL3. This feature is currently enabled for NS world only.
Reference: https://developer.arm.com/documentation/109697/2024_09/ Feature-descriptions/The-Armv9-5-architecture-extension?lang=en
Change-Id: I580c409b9b22f8ead0737502280fb9093a3d5dd2 Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
show more ...
|
| cc461661 | 27-Nov-2024 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(cpus): workaround for Cortex-X4 erratum 2923985
Cortex-X4 erratum 2923935 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2.
The workaround is to set CPUACTLR4_EL1[1
fix(cpus): workaround for Cortex-X4 erratum 2923985
Cortex-X4 erratum 2923935 is a Cat B erratum that applies to all revisions <= r0p1 and is fixed in r0p2.
The workaround is to set CPUACTLR4_EL1[11:10] to 0b11.
SDEN documentation: https://developer.arm.com/documentation/SDEN-2432808/latest
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I9207802ad479919a7f77c1271019fa2479e076ee
show more ...
|
| 4557c0c0 | 09-Dec-2024 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(docs): put INIT_UNUSED_NS_EL2 docs back
Commit b65dfe40a removed the documentation for this flag in error. Put it back.
Change-Id: I61a352553a010385997c47116b53d2fbe939ccd4 Signed-off-by: Boyan
fix(docs): put INIT_UNUSED_NS_EL2 docs back
Commit b65dfe40a removed the documentation for this flag in error. Put it back.
Change-Id: I61a352553a010385997c47116b53d2fbe939ccd4 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| 95037029 | 09-Dec-2024 |
Ryan Everett <ryan.everett@arm.com> |
docs(prerequisites): update mbedtls to version 3.6.2
This new update to the LTS branch of MbedTLS provides the fix for a buffer underrun vulnerability. TF-A does not use the previously vulnerable fu
docs(prerequisites): update mbedtls to version 3.6.2
This new update to the LTS branch of MbedTLS provides the fix for a buffer underrun vulnerability. TF-A does not use the previously vulnerable functions `mbedtls_pk_write_key_der` or `mbedtls_pk_write_key_pem`. Full patch notes to this MbedTLS update can be found at https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-3.6.2.
Change-Id: Ibc4a8712c92019648fe0e75390cd3540d86b735d Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| ae952c1e | 09-Dec-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "docs(auth): extrapolate on the functions within a CM" into integration |