Hi All,
I’ll be running the TF-A Tech Forum next week and I wanted to give an idea of what to expect in this inaugural meeting.
While in future meetings I will want to seek input of what the agenda will be before the meeting with the option for other project contributors to present on topics in this first one I have a set agenda which is influenced by the format used in the counterpart TF-M Tech Forum.
Agenda:
* Introduction to the TF-A Technical Forum Meeting
* Technical Overview of the Debug-FS Feature
* Optional TF-A Mailing List Topic Discussions
Thanks
Joanna
From: TF-A <tf-a-bounces(a)lists.trustedfirmware.org> on behalf of Bill Fletcher via TF-A <tf-a(a)lists.trustedfirmware.org>
Reply to: Bill Fletcher <bill.fletcher(a)linaro.org>
Date: Friday, 28 February 2020 at 15:25
To: <tf-a(a)lists.trustedfirmware.org>
Subject: [TF-A] Updated invitation: TF-A Tech Forum @ Thu 12 Mar 2020 17:00 - 18:00 (GMT) (tf-a(a)lists.trustedfirmware.org)
This event has been changed.
TF-A Tech Forum
When
Thu 12 Mar 2020 17:00 – 18:00 United Kingdom Time
Calendar
tf-a(a)lists.trustedfirmware.org
Who
(Guest list has been hidden at organiser's request)
more details »<https://www.google.com/calendar/event?action=VIEW&eid=MGVhNDdsMGVqNnEzZ3BpY…>
Changed:
We are starting an open technical forum call for anyone to participate and it is not restricted to Trusted Firmware project members. It will operate under the guidance of the TF TSC.
Feel free to forward this invite to colleagues. Future invites will be via the TF-A mailing list and also published on the Trusted Firmware website. Details are here: https://www.trustedfirmware.org/meetings/tf-a-technical-forum/<https://www.google.com/url?q=https%3A%2F%2Fwww.trustedfirmware.org%2Fmeetin…>
Trusted Firmware is inviting you to a scheduled Zoom meeting.
Join Zoom Meeting
https://zoom.us/j/9159704974<https://www.google.com/url?q=https%3A%2F%2Fzoom.us%2Fj%2F9159704974&sa=D&us…>
Meeting ID: 915 970 4974
One tap mobile
+16465588656,,9159704974# US (New York)
+16699009128,,9159704974# US (San Jose)
Dial by your location
+1 646 558 8656 US (New York)
+1 669 900 9128 US (San Jose)
877 853 5247 US Toll-free
888 788 0099 US Toll-free
Meeting ID: 915 970 4974
Find your local number: https://zoom.us/u/ad27hc6t7h<https://www.google.com/url?q=https%3A%2F%2Fzoom.us%2Fu%2Fad27hc6t7h&sa=D&us…>
(updated due to content filtering issues)
Going (tf-a(a)lists.trustedfirmware.org)? Yes<https://www.google.com/calendar/event?action=RESPOND&eid=MGVhNDdsMGVqNnEzZ3…> - Maybe<https://www.google.com/calendar/event?action=RESPOND&eid=MGVhNDdsMGVqNnEzZ3…> - No<https://www.google.com/calendar/event?action=RESPOND&eid=MGVhNDdsMGVqNnEzZ3…> more options »<https://www.google.com/calendar/event?action=VIEW&eid=MGVhNDdsMGVqNnEzZ3BpY…>
Invitation from Google Calendar<https://www.google.com/calendar/>
You are receiving this courtesy email at the account tf-a(a)lists.trustedfirmware.org because you are an attendee of this event.
To stop receiving future updates for this event, decline this event. Alternatively, you can sign up for a Google Account at https://www.google.com/calendar/ and control your notification settings for your entire calendar.
Forwarding this invitation could allow any recipient to send a response to the organiser and be added to the guest list, invite others regardless of their own invitation status or to modify your RSVP. Learn more<https://support.google.com/calendar/answer/37135#forwarding>.
-- TF-A mailing list TF-A(a)lists.trustedfirmware.org https://lists.trustedfirmware.org/mailman/listinfo/tf-a
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
Hello,
I'm preparing a set of patches for GICv3 driver for GICv3.1 and GICv4 support.
Please review and provide your comments for the 1st patch which separates GICD and GICR accessor functions and adds new macros for GICv3 registers access.
https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/3550
Regards.
Alexei
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
sandeep.tripathy(a)broadcom.com has replied "Maybe" to this invitation.
Title: TF-A Tech Forum
This meeting originally contained an attachment. Please contact your
organizer for the attachment.
This event has been changed.
TF-A Tech Forum
When
Thu 12 Mar 2020 17:00 – 18:00 United Kingdom Time
Calendar
tf-a(a)lists.trustedfirmware.org
Who
(Guest list has been hidden at organiser's request)
more details »
Changed:
We are starting an open technical forum call for anyone to participate and
it is not restricted to Trusted Firmware project members. It will operate
under the guidance of the TF TSC.
Feel free to forward this invite to colleagues. Future invites will be via
the TF-A mailing list and also published on the Trusted Firmware website.
Details are here:
https://www.trustedfirmware.org/meetings/tf-a-technical-forum/
Trusted Firmware is inviting you to a scheduled Zoom meeting.
Join Zoom Meeting
https://zoom.us/j/9159704974
Meeting ID: 915 970 4974
One tap mobile
+16465588656,,9159704974# US (New York)
+16699009128,,9159704974# US (San Jose)
Dial by your location
+1 646 558 8656 US (New York)
+1 669 900 9128 US (San Jose)
877 853 5247 US Toll-free
888 788 0099 US Toll-free
Meeting ID: 915 970 4974
Find your local number: https://zoom.us/u/ad27hc6t7h
(updated due to content filtering issues)
Going (tf-a(a)lists.trustedfirmware.org)?
Yes -
Maybe -
No more options »
Invitation from Google Calendar
You are receiving this courtesy email at the account
tf-a(a)lists.trustedfirmware.org because you are an attendee of this event.
To stop receiving future updates for this event, decline this event.
Alternatively, you can sign up for a Google Account at
https://www.google.com/calendar/ and control your notification settings for
your entire calendar.
Forwarding this invitation could allow any recipient to send a response to
the organiser and be added to the guest list, invite others regardless of
their own invitation status or to modify your RSVP. Learn more .
When: Thu Mar 12, 2020 10:30pm – 11:30pm India Standard Time - Kolkata
Calendar: Bill Fletcher via TF-A
Who:
* Bill Fletcher via TF-A - organizer
* sandeep.tripathy(a)broadcom.com - creator
Invitation from Google Calendar: https://www.google.com/calendar/
You are receiving this courtesy email at the account
tf-a(a)lists.trustedfirmware.org because you are an attendee of this event.
To stop receiving future updates for this event, decline this event.
Alternatively you can sign up for a Google account at
https://www.google.com/calendar/ and control your notification settings for
your entire calendar.
Forwarding this invitation could allow any recipient to send a response to
the organizer and be added to the guest list, or invite others regardless
of their own invitation status, or to modify your RSVP. Learn more at
https://support.google.com/calendar/answer/37135#forwarding
This event has been changed.
Title: TF-A Tech Forum
We are starting an open technical forum call for anyone to participate and
it is not restricted to Trusted Firmware project members. It will operate
under the guidance of the TF TSC. Feel free to forward this invite to
colleagues. Future invites will be via the TF-A mailing list and also
published on the Trusted Firmware website. Details are
here: https://www.trustedfirmware.org/meetings/tf-a-technical-forum/Tr…
Firmware is inviting you to a scheduled Zoom meeting.Join Zoom
Meetinghttps://zoom.us/j/9159704974Meeting ID: 915 970 4974One tap
mobile+16465588656,,9159704974# US (New York)+16699009128,,9159704974# US
(San Jose)Dial by your location +1 646 558 8656
US (New York) +1 669 900 9128 US (San
Jose) 877 853 5247 US Toll-free
888 788 0099 US Toll-freeMeeting ID: 915 970 4974Find your
local number: https://zoom.us/u/ad27hc6t7h (updated due to
content filtering issues) (changed)
When: Thu 12 Mar 2020 17:00 – 18:00 United Kingdom Time
Calendar: tf-a(a)lists.trustedfirmware.org
Who:
(Guest list has been hidden at organiser's request)
Event details:
https://www.google.com/calendar/event?action=VIEW&eid=MGVhNDdsMGVqNnEzZ3BpY…
Invitation from Google Calendar: https://www.google.com/calendar/
You are receiving this courtesy email at the account
tf-a(a)lists.trustedfirmware.org because you are an attendee of this event.
To stop receiving future updates for this event, decline this event.
Alternatively, you can sign up for a Google Account at
https://www.google.com/calendar/ and control your notification settings for
your entire calendar.
Forwarding this invitation could allow any recipient to send a response to
the organiser and be added to the guest list, invite others regardless of
their own invitation status or to modify your RSVP. Learn more at
https://support.google.com/calendar/answer/37135#forwarding
You have been invited to the following event.
Title: TF-A Tech Forum
We are starting an open technical forum call for anyone to participate and
it is not restricted to Trusted Firmware project members. It will operate
under the guidance of the TF TSC. Feel free to forward this invite to
colleagues. Future invites will be via the TF-A mailing list and also
published on the Trusted Firmware website. Details are
here: https://www.trustedfirmware.org/meetings/tf-a-technical-forum/Tr…
Firmware is inviting you to a scheduled Zoom meeting.Join Zoom
Meetinghttps://zoom.us/j/9159704974Meeting ID: 915 970 4974One tap
mobile+16465588656,,9159704974# US (New York)+16699009128,,9159704974# US
(San Jose)Dial by your location +1 646 558 8656
US (New York) +1 669 900 9128 US (San
Jose) 877 853 5247 US Toll-free
888 788 0099 US Toll-freeMeeting ID: 915 970 4974Find your
local number: https://zoom.us/u/ad27hc6t7h
When: Thu 12 Mar 2020 17:00 – 18:00 United Kingdom Time
Calendar: tf-a(a)lists.trustedfirmware.org
Who:
(Guest list has been hidden at organiser's request)
Event details:
https://www.google.com/calendar/event?action=VIEW&eid=MGVhNDdsMGVqNnEzZ3BpY…
Invitation from Google Calendar: https://www.google.com/calendar/
You are receiving this courtesy email at the account
tf-a(a)lists.trustedfirmware.org because you are an attendee of this event.
To stop receiving future updates for this event, decline this event.
Alternatively, you can sign up for a Google Account at
https://www.google.com/calendar/ and control your notification settings for
your entire calendar.
Forwarding this invitation could allow any recipient to send a response to
the organiser and be added to the guest list, invite others regardless of
their own invitation status or to modify your RSVP. Learn more at
https://support.google.com/calendar/answer/37135#forwarding
Hi Scott
Please add the platform specific flags as a field in fip_dev_state_t.
typedef struct {
uintptr_t dev_spec;
uint32_t plat_toc_flag;
} fip_dev_state_t;
Then this field can be updated as part of verifying the FIP header. This header needs to be cleared when the device is closed.
Introduce a helper in fip driver to query the flags:
int fip_dev_get_plat_toc_flag(io_dev_info_t *dev_info, uint32_t *plat_toc_flag);
That should satisfy your requirement.
Best Regards
Soby Mathew
> -----Original Message-----
> From: TF-A <tf-a-bounces(a)lists.trustedfirmware.org> On Behalf Of Scott
> Branden via TF-A
> Sent: 07 February 2020 18:57
> To: tf-a(a)lists.trustedfirmware.org
> Subject: [TF-A] FIP header flags available for feature selection
>
> Hello,
>
> The fip header has reserved fields available for platform specific use.
> The fiptool allows these header fields to be filled in using the --plat-toc-flags.
>
> A call needs to be available in the ATF framework to get these flags without
> accessing the FIP file again to get these flags.
> We have a solution we've used for ATF for quite some time to access these
> flags.
>
> It's finally being upstreamed here:
> https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/2839
>
> If there are any other efficient methods to access these flags or a better
> proposal please suggest.
>
> Thanks,
> Scott
> --
> TF-A mailing list
> TF-A(a)lists.trustedfirmware.org
> https://lists.trustedfirmware.org/mailman/listinfo/tf-a
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
Hi Raghu,
Thanks a lot for the review comments and feedback!
On 2/25/20 3:45 AM, Raghu Krishnamurthy via TF-A wrote:
> The patch stack looks great! I do have a suggestion for the long term
> evolution/future work on root's of trust and cert_create. It would be
> great to generalize "dual-root" to "multi-root". It is conceivable that
> firmware supporting secure partitions/SPCI etc, could move to having
> multiple root's of trust. Here we have the silicon provider, and the
> platform owner as two roots, but a more complex system could contain
> silicon firmware, platform firmware and multiple secure partitions, each
> signed by different entities. To remove the signing dependencies between
> each of these entities, we could have a ROTPK for each of these entities
> and the same solution used here, can be applied to solve multiple root's
> of trust and is summarized very well by your statement -"As long as
> there is a defined contract between BL2 and the (P)(*)ROTK-rooted images
> as to how/where to securely get this key or hash, there should not be
> any need for the two vendors to do any cross-signing."
>> To do this, If possible, we should start moving away from tables such as
> the ones in cert_create/src/dualroot/cot.c and have platforms provide
> the certificate dependencies and keys used to sign them in a config
> file. This achieves two things: it makes cert_create independent of the
> cert chain a platform wants to use and the number of roots of trust,
> and, makes cert_create more usable by reducing the number of command
> line arguments to be provided, which is a long list today. You could
> potentially use the config file provided to auto generate the tbbr_cot.c
> file being linked into the firmware too.
>
> Let me know what you think.
I agree with everything you said above. Indeed, there's no reason to
stop at 2 roots of trust and as you pointed out there are real use cases
to enable more. The dualroot chain of trust is only the first step in
that direction and is a useful way to experiment with extending the TBBR
implementation and chain of trust, while addressing a real use case.
Also completely agree with the lack of flexibility of the hard-coded
chain of trust in cert_create/src/dualroot/cot.c and
drivers/auth/dualroot/cot.c for that matter. In fact, we (at Arm) are
thinking along the same lines as you and have had similar ideas boiling
for some time. We are making gradual changes to introduce more
flexibility into TF-A, not just for the chain of trust, but for any
platform-specific data.
Maybe you've seen the recent FConf framework patches, which is a key
piece into enabling platform layers to move platform-specific data into
configuration files. There is still work to do but down the line we are
already thinking about moving the chain of trust description into such a
configuration file.
Moving the CoT into a configuration file has many advantages:
- It could constitute the single input source for the chain of trust,
serving both the cert_create tool and the firmware. Today, the CoT is
described and duplicated in both places and there is really no good
reason to keep things like that IMO. As you said, we could auto-generate
the tbbr_cot.c file and build into the firmware, or even have the
firmware dynamically parse the configuration file at runtime and extract
its CoT.
- It could simplify the description of the CoT. Today, I think that the
C data structures in tbbr_cot.c are quite complex and not
straight-forward to understand at first. If we described them using some
configuration language, I believe we could abstract some of these
details away or at least organize them in a more intuitive way.
Regards,
Sandrine