Hi all,
I am sending the email below on behalf on Kenneth Kabogo, who unfortunately is facing issues with the mailing list.
Regards,
Sandrine Afsa
----
Dear TF-A Maintainers,
I am proposing the introduction of a standardized SMC Argument Validation Framework into the TF-A codebase.
Over the past several weeks of security auditing across multiple platform ports, I have identified a recurring architectural failure mode termed "Privilege-Blind Forwarding" (PBF). This occurs when an EL3 handler receives a non-secure physical address and forwards it to a secure memory operation without re-validating the range against the platform's current security state (GPT/RMM).
Furthermore, there is a widespread Structural TOCTOU (Double-Fetch) vulnerability in many SiP ports where handlers validate arguments but later re-fetch them from non-secure memory, allowing a malicious caller to swap addresses mid-execution.
The proposed framework addresses these via an Atomic Shadow-Copy design pattern, requiring all SMC arguments to be unmarshaled into EL3 registers/memory once before validation.
The 3-part prototype and migration guide are available for review on Gerrit:
Framework Hardening (Core Logic): https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/47441
Architectural Guidance (Documentation): https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/47465
Arm Platform Demonstration (Migration Guide): https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/47466
I look forward to the community's feedback on this architectural shift.
Best regards,
Kenneth Kabogo
tf-a@lists.trustedfirmware.org