- User Since
- Sep 28 2018, 3:39 PM (202 w, 2 d)
Jun 22 2022
Olivier is on holiday and once he is back next week, we can arrange something to discuss.
Jun 13 2022
That is not what I meant. The NS SVE/FP access trap is needed to avoid saving and restoring the state when the SVE/FP registers are actively used by the secure world.
May 24 2022
May 20 2022
When you have a S-EL2 based system with possibly multiple S-EL1 partitions, it would be complex to implement a scheme where in EL3 will restore the right S-EL1 context on taking a trap during lazy save mechanism. In such systems, it is easier for S-EL2 to implement such a scheme since it is the manager for S-EL1 contexts.
Mar 28 2022
We are following this up internally. Could you please let us know what revision of Helios you have and whether you run linux? (Linux doesn't work around any Helios errata currently)
Nov 16 2020
Patch fixed and merged
Nov 4 2020
Closed the previous issue https://developer.trustedfirmware.org/T845 as duplicate
Internal ref : https://jira.arm.com/browse/IOTPSW-3471
Oct 21 2020
Cleaning the flash properly seems to solve the issue. Closing this bug as resolved. The SST hardening will taken up as a backlog item.
The latest FVP claims to have resolved this problem. This needs to be re-tested on latest AN521 FVP.
Oct 16 2020
Building the documentation seems to clone all dependancies which seems like an overhead.
Oct 14 2020
A patch is uploaded here: https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/6432
Oct 2 2020
To elaborate the "Support for binary psa-arch-tests (design in progress)" point mentioned above.
Sep 23 2020
Persistent key support has been added as part of TFMv1.1. Clsoing this issue.
Sep 21 2020
Aug 17 2020
Apr 21 2020
One comment regarding fully supported platform :"It builds all supported configurations." , There may be configuration in the project which are isolated to some niche use-cases or niche market segment and may not be applicable to the platform and intended target market.
Mar 30 2020
Internal ref: https://jira.arm.com/browse/IOTPSW-2914
Internal ref : https://jira.arm.com/browse/IOTPSW-2861
Internal ref : https://jira.arm.com/browse/IOTPSW-2826
Internal ref: https://jira.arm.com/browse/IOTPSW-2801
Internal ref: https://jira.arm.com/browse/IOTPSW-2817
Mar 26 2020
This causes random failure in PSA Arch ITS and PSA Arch PS tests.
See related Musca-A2 issue here : https://developer.trustedfirmware.org/T694
We would need to support versioning of SST FS data and also have mechanisms to detect if the flash is clean or in consistent state.
Internal ref : https://jira.arm.com/browse/IOTPSW-2808
This issue is also seen on Musca-A board.
Mar 25 2020
This is an issue on FVP. It will case the system cannot boot up after a warm reset. So as a workaround, we have to skip BL2 when testing.
The output hangs at this point :
Trying ::1... Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. [INF] Starting bootloader [INF] Image 0: version=0.0.0+5, magic= good, image_ok=0x3 [INF] Image 1: No valid image [INF] Booting image from the primary slot [INF] Bootloader chainload address offset: 0x80000 [INF] Jumping to the first image slot [Sec Thread] Secure image initializing! TFM level is: 0x00000001 [Sec Thread] Jumping to non-secure code...
This is a known limitation of CC-312 and hence will not be fixed in TF-M code.
Update from Tamas
Mar 12 2020
Hi Andrew, yes the change looks fine.
Mar 3 2020
ACKed. We need to investigate how to solve this problem.
Feb 25 2020
Yes, the mbed-crypto tag 3.1.0 adds these 2 new APIs whereas the version TF-M currently supports is 3.0.1. I intend to catch up once again in a month's time and hopefully by then mbed-crypto will have added more functions which can be utilized.
Jan 14 2020
Closing the issue as the RSA Key size support has now been merged.
The TF-A now has support for RSA-3K in Cryptocell variant.
Jan 7 2020
Could you please send this query to the TF-A mailing list ?
Dec 2 2019
Hi Sandeep, could you please send a mail to the mailing list for this.
Oct 21 2019
Sep 5 2019
Are you thinking something similar to measured boot ?
The TF-A implements what is called verified boot. Found a good description for difference between verified and measured boot here:
Jul 10 2019
Please email me at email@example.com
The Cryptocell variant supported by TF-A is CC-712 which only has support for RSA 2048.
Jun 10 2019
May 28 2019
May 21 2019
Ah, You are right. Having taken a look at it again, yes, the SP-> SPM communication is register based and this spm_response_add() is invoked by SPM to push to a buffer within EL3 (its not a shared buffer between different ELs). I suspect the shared buffer primitives were written with shared buffer scenario in mind and the current prototype implementation does not optimize it for the case when the buffer is within EL3.
Who is the lockless reader for spm_response_add() and spm_response_get()?
May 8 2019
Example comment 3