History log of /rk3399_ARM-atf/ (Results 4351 – 4375 of 18314)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
cfa466ab12-Jul-2021 Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com>

feat(rcar3): enable the stack protection

This commit changes ENABLE_STACK_PROTECTOR value to "strong" for
enabling the stack protector by canary.

Signed-off-by: Koichi Yamaguchi <koichi.yamaguchi.z

feat(rcar3): enable the stack protection

This commit changes ENABLE_STACK_PROTECTOR value to "strong" for
enabling the stack protector by canary.

Signed-off-by: Koichi Yamaguchi <koichi.yamaguchi.zb@hitachi.com>
Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com>
Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com>
Change-Id: Ice351d23c98daf12737a5e65cef743035d62dabe

show more ...

b908814c08-Dec-2023 laurenw-arm <lauren.wehrmeister@arm.com>

docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a

docs(threat-model): supply chain threat model TF-A

Software supply chain attacks aim to inject malicious code into a
software product. There are several ways a malicious code can be
injected into a software product (open-source project).

These include:
- Malicious code commits
- Malicious dependencies
- Malicious toolchains

This document provides analysis of software supply chain attack
threats for the TF-A project

Change-Id: I03545d65a38dc372f3868a16c725b7378640a771
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>

show more ...

57410eeb19-Jan-2024 Lauren Wehrmeister <lauren.wehrmeister@arm.com>

Merge "docs(threat-model): add threat model for PSA FWU and TBBR FWU(recovery)" into integration

0ec25e3819-Jan-2024 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge "fix(spm): silence warning in sp_mk_generator" into integration

5abc58be19-Jan-2024 Madhukar Pappireddy <madhukar.pappireddy@arm.com>

Merge changes from topic "kc/dir_msg_req2" into integration

* changes:
feat(spmd): add FFA_MSG_SEND_DIR_RESP2
feat(spmd): add FFA_MSG_SEND_DIR_REQ2

48461ec919-Jan-2024 Manish Pandey <manish.pandey2@arm.com>

Merge "style(hooks): copyright year check as per author email" into integration

93d1f4bc14-Apr-2023 Akshay Belsare <akshay.belsare@amd.com>

style(hooks): copyright year check as per author email

Add a check in pre-commit hook to check the
- copyright header is present for the authors organisation.
- the copyright year for the copyright

style(hooks): copyright year check as per author email

Add a check in pre-commit hook to check the
- copyright header is present for the authors organisation.
- the copyright year for the copyright header is updated.

The author email id is parsed to get the organization. Depending upon
the parsed info, the copyright header for the organization is checked
if its present in the file(s) or not.
If the copyright header is present in the file(s) then the copyright
year is checked.

If the copyright header is not present or the copyright year in the
header is not updated it is highlighted to the author
which the user then needs to incorporate in the change accordingly.

To enable this check, the case statement in
.husky/pre-commit.copyright needs to be modified to add the domain
from the email id and corresponding copyright header of the
organisation.

Change-Id: I4dedb68248b3dae997d887dd380155fe326d071d
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>

show more ...

3d43bf5519-Jan-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge changes from topic "cca_dtb" into integration

* changes:
feat(arm): add COT_DESC_IN_DTB option for CCA CoT
feat(fvp): add CCA CoT in DTB support
docs(arm): update TBBR CoT dtsi file name

Merge changes from topic "cca_dtb" into integration

* changes:
feat(arm): add COT_DESC_IN_DTB option for CCA CoT
feat(fvp): add CCA CoT in DTB support
docs(arm): update TBBR CoT dtsi file name in doc
feat(dt-bindings): introduce CCA CoT, rename TBBR

show more ...

bb4d7d7102-Jan-2024 Manish V Badarkhe <Manish.Badarkhe@arm.com>

docs(threat-model): add threat model for PSA FWU and TBBR FWU(recovery)

Added a threat model for PSA firmware update as well as TBBR FWU aka
firmware recovery.

Change-Id: I2396e13144076d7294f61f681

docs(threat-model): add threat model for PSA FWU and TBBR FWU(recovery)

Added a threat model for PSA firmware update as well as TBBR FWU aka
firmware recovery.

Change-Id: I2396e13144076d7294f61f6817e1a8646225c6c2
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>

show more ...

51ff56e419-Jan-2024 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge "feat(intel): enable SDMMC frontdoor load for ATF->Linux" into integration

b3a7396d19-Jan-2024 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge changes Iaa189c54,I8856b495 into integration

* changes:
feat(intel): enable query of fip offset on RSU
feat(intel): support query of fip offset using RSU

781f9c5219-Jan-2024 Sandrine Bailleux <sandrine.bailleux@arm.com>

Merge changes from topic "cca_dtb" into integration

* changes:
docs(fconf): update bindings for multi-RoT CoTs
feat(fconf): support signing-key in root cert node

586701ce02-Oct-2019 Yann Gautier <yann.gautier@st.com>

refactor(st-i2c): use fdt_read_uint32_default()

The function stm32_i2c_get_setup_from_fdt() was using fdt_getprop() to
to get some i2c node properties, and set a default value if the node
was not fo

refactor(st-i2c): use fdt_read_uint32_default()

The function stm32_i2c_get_setup_from_fdt() was using fdt_getprop() to
to get some i2c node properties, and set a default value if the node
was not found. The function fdt_read_uint32_default() already does
this in a simpler way.
Remove useless STM32_I2C_SPEED_DEFAULT.

Change-Id: I74c6295bb5765ee7c7e0a9ae020b741f1fe022a6
Signed-off-by: Yann Gautier <yann.gautier@st.com>

show more ...

b76a43c928-Nov-2023 laurenw-arm <lauren.wehrmeister@arm.com>

feat(arm): add COT_DESC_IN_DTB option for CCA CoT

Add support for BL2 to get the CCA chain of trust description
through the Firmware Configuration Framework (FCONF). This makes
it possible to export

feat(arm): add COT_DESC_IN_DTB option for CCA CoT

Add support for BL2 to get the CCA chain of trust description
through the Firmware Configuration Framework (FCONF). This makes
it possible to export the part of the CCA chain of trust enforced
by BL2 in BL2's configuration file (TB_FW_CONFIG DTB file). BL2
will parse it when setting up the platform.

This feature can be enabled through the COT_DESC_IN_DTB=1 option.
The default behaviour (COT_DESC_IN_DTB=0) remains to hard-code
the CCA CoT into BL2 image.

Change-Id: Iec4f623d5e42b7c166beeb3ad6b35d918969f7e2
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>

show more ...

4c79b86e10-Jan-2024 laurenw-arm <lauren.wehrmeister@arm.com>

feat(fvp): add CCA CoT in DTB support

Adding support for CCA CoT in DTB. This makes it possible for BL2
to retrieve its chain of trust description from a configuration file
in DTB format. With this,

feat(fvp): add CCA CoT in DTB support

Adding support for CCA CoT in DTB. This makes it possible for BL2
to retrieve its chain of trust description from a configuration file
in DTB format. With this, the CoT description may be updated without
rebuilding BL2 image. This feature can be enabled by building BL2
with COT_DESC_IN_DTB=1 and COT=cca. The default behaviour remains to
embed the CoT description into BL2 image.

Change-Id: I5912aad5ae529281a93a76e6b8f4b89d867445fe
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>

show more ...

dc35bd3228-Nov-2023 laurenw-arm <lauren.wehrmeister@arm.com>

docs(arm): update TBBR CoT dtsi file name in doc

Change-Id: I31ebee7574f5133aadbf2767377fd74a21775ce5
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>

c4b35ceb10-Jan-2024 laurenw-arm <lauren.wehrmeister@arm.com>

feat(dt-bindings): introduce CCA CoT, rename TBBR

Add CCA CoT DTB and rename generic CoT DTB to TBBR CoT DTB

This allows CCA platforms to get their chain of trust description
from a configuration f

feat(dt-bindings): introduce CCA CoT, rename TBBR

Add CCA CoT DTB and rename generic CoT DTB to TBBR CoT DTB

This allows CCA platforms to get their chain of trust description
from a configuration file, rather than hard-coding it into the
firmware itself.

Change-Id: I114788a5d21b9a8d625239cfb71b442d204e3654
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>

show more ...

0de9a12c10-Jan-2024 laurenw-arm <lauren.wehrmeister@arm.com>

docs(fconf): update bindings for multi-RoT CoTs

Update CoT binding documentation to add the signing-key property
as optional in root-certificates and add rot_keys node

Change-Id: I1d1fbc0394275520c

docs(fconf): update bindings for multi-RoT CoTs

Update CoT binding documentation to add the signing-key property
as optional in root-certificates and add rot_keys node

Change-Id: I1d1fbc0394275520cfa43213d5b7006e51990fdd
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>

show more ...

0651b7be08-Sep-2023 Kathleen Capella <kathleen.capella@arm.com>

feat(spmd): add FFA_MSG_SEND_DIR_RESP2

Add handling for FF-A 1.2 FFA_MSG_SEND_DIR_RESP2 interface.

Signed-off-by: Kathleen Capella <kathleen.capella@arm.com>
Change-Id: Ibd0546ecd71d004804e6e18b27a

feat(spmd): add FFA_MSG_SEND_DIR_RESP2

Add handling for FF-A 1.2 FFA_MSG_SEND_DIR_RESP2 interface.

Signed-off-by: Kathleen Capella <kathleen.capella@arm.com>
Change-Id: Ibd0546ecd71d004804e6e18b27a4728a21259fa0

show more ...

cc6047b331-Jul-2023 Kathleen Capella <kathleen.capella@arm.com>

feat(spmd): add FFA_MSG_SEND_DIR_REQ2

Add handling for FF-A 1.2 FFA_MSG_SEND_DIR_REQ2 interface.
Handler validates security states of sender/receiver pairs
and forwards the call to other world if ne

feat(spmd): add FFA_MSG_SEND_DIR_REQ2

Add handling for FF-A 1.2 FFA_MSG_SEND_DIR_REQ2 interface.
Handler validates security states of sender/receiver pairs
and forwards the call to other world if necessary.

Signed-off-by: Kathleen Capella <kathleen.capella@arm.com>
Change-Id: I02a60362d8d9a50fcc0b6a84753cba274ba5eb1b

show more ...

04ac0b3c10-Jan-2024 laurenw-arm <lauren.wehrmeister@arm.com>

feat(fconf): support signing-key in root cert node

Until now we have only supported describing chain of trusts through the
CoT DTB with a single ROTPK so the signing key for root certificates was
im

feat(fconf): support signing-key in root cert node

Until now we have only supported describing chain of trusts through the
CoT DTB with a single ROTPK so the signing key for root certificates was
implicit. Therefore signing key was not a supported property in the
root certificates node.

Now we want to extend that to describe CoTs with mulitiple roots of
trust so we need a way to specify for each root certificate with which
ROTPK it should be verified. For that, we reuse the 'signing-key'
property already in use for the non-root certificates, but we make it
optional for root certificates in single-RoT CoTs and for root
certificates signed with the default ROTPK in multi-RoT CoTs.

Change-Id: I41eb6579e8f1d01eaf10480fe5e224d2eed9c736
Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>

show more ...

9653570e18-Jan-2024 Manish V Badarkhe <manish.badarkhe@arm.com>

Merge "feat(memmap): add RELA section display" into integration

d1eb4e2302-Jan-2024 Manish Pandey <manish.pandey2@arm.com>

docs(security): security advisory for CVE-2023-49100

Reported-by: Christian Lindenmeier <christian.lindenmeier@fau.de>
Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I13fa93a65e501

docs(security): security advisory for CVE-2023-49100

Reported-by: Christian Lindenmeier <christian.lindenmeier@fau.de>
Signed-off-by: Manish Pandey <manish.pandey2@arm.com>
Change-Id: I13fa93a65e5017dae6c837e88cd80bda72d4c2a3

show more ...

a5ea5aa418-Jan-2024 Bipin Ravi <bipin.ravi@arm.com>

Merge "docs(threat-model): provide PSR specification reference" into integration

1685b42015-Jan-2024 Chris Kay <chris.kay@arm.com>

build: remove the `NM` variable

No part of the build system uses the `NM` variable, which is usually
used to dump symbol tables from compiled images. This change removes all
declarations of it.

Cha

build: remove the `NM` variable

No part of the build system uses the `NM` variable, which is usually
used to dump symbol tables from compiled images. This change removes all
declarations of it.

Change-Id: I796ff365e6a7f97d21678f1c8cf8b59bfbb1ae9c
Signed-off-by: Chris Kay <chris.kay@arm.com>

show more ...

1...<<171172173174175176177178179180>>...733