From 8cf9edba5cc3ec11ed5463f206aa5819f7fdbade Mon Sep 17 00:00:00 2001
From: Release CI <ci@trustedfirmware.org>
Date: Fri, 28 Feb 2025 17:09:41 +0000
Subject: [PATCH] docs(changelog): changelog for lts-v2.12.1 release

Change-Id: Id73c4039740d206e7c0dc386b2b7d5d3cd73f9d3
Signed-off-by: Release CI <ci@trustedfirmware.org>
---
 Makefile                                      |  2 +-
 docs/change-log.md                            | 85 +++++++++++++++++++
 docs/conf.py                                  |  4 +-
 package-lock.json                             |  4 +-
 package.json                                  |  2 +-
 pyproject.toml                                |  2 +-
 readme.rst                                    |  1 +
 .../conventional-changelog-tf-a/package.json  |  2 +-
 8 files changed, 94 insertions(+), 8 deletions(-)

diff --git a/Makefile b/Makefile
index edd9f6e1f5..b357b1d83f 100644
--- a/Makefile
+++ b/Makefile
@@ -10,7 +10,7 @@
 VERSION_MAJOR			:= 2
 VERSION_MINOR			:= 12
 # VERSION_PATCH is only used for LTS releases
-VERSION_PATCH			:= 0
+VERSION_PATCH			:= 1
 VERSION				:= ${VERSION_MAJOR}.${VERSION_MINOR}.${VERSION_PATCH}
 
 # Default goal is build all images
diff --git a/docs/change-log.md b/docs/change-log.md
index 721e0f3252..a625313e84 100644
--- a/docs/change-log.md
+++ b/docs/change-log.md
@@ -3,6 +3,91 @@
 This document contains a summary of the new features, changes, fixes and known
 issues in each release of Trusted Firmware-A.
 
+## [lts-2.12.1](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/refs/tags/lts-v2.12.0..refs/tags/lts-v2.12.1) (2025-02-28)
+
+### New Features
+
+- **Platforms**
+
+  - **Arm**
+
+    - **Automotive RD**
+
+      - **RD-1 AE**
+
+        - add Generic Timer in device tree ([34f10e7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/34f10e7d9fc74881dd048f5302ae6d5f4fe21f9d))
+        - add support for OP-TEE SPMC ([8e42407](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8e42407798677a9b02cf5f055989fcf3f164e571))
+
+- **Drivers**
+
+  - **Authentication**
+
+    - **mbedTLS**
+
+      - mbedtls config update for v3.6.2 ([8e4bb69](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8e4bb69c747ec7c17b79ebf6a7cb55ddb56d5aec))
+
+### Resolved Issues
+
+- **Platforms**
+
+  - **Arm**
+
+    - **Automotive RD**
+
+      - **RD-1 AE**
+
+        - fix rd1-ae device tree ([b19ce90](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b19ce90a908cd04ad47f4a588777f42010983445))
+
+- **Libraries**
+
+  - **CPU Support**
+
+    - workaround for accessing ICH_VMCR_EL2 ([9d6143e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/9d6143ec8ffb673a28b497ef8e235f978f4a7a77))
+    - workaround for Cortex-A710 erratum 3701772 ([d482688](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/d4826882210b88241c4976d0d043c1556a0af53e))
+    - workaround for Cortex-A715 erratum 3699560 ([a7b3227](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a7b322706435f0f5886a3a28bfedd12687537bce))
+    - workaround for Cortex-A720 erratum 3699561 ([2452627](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/24526273fc504500c36029fa8c188f4e394f4f07))
+    - workaround for Cortex-A720-AE erratum 3699562 ([ae6edfd](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ae6edfd5b5434e2e647ce2d6fc6f5b5f3f0ba880))
+    - workaround for Cortex-A725 erratum 3699564 ([4e78288](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4e78288fd2bce291ec2b1e8c2f2fb7ad4d5cb6d3))
+    - workaround for Cortex-X2 erratum 3701772 ([fa6c987](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/fa6c9874485bb92cab324bc1fa07eefafc7fa4db))
+    - workaround for Cortex-X3 erratum 3701769 ([8299c12](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8299c127461782cfc2d0f606abf8ae67544f50db))
+    - workaround for Cortex-X4 erratum 2923985 ([a6f6396](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a6f6396313eacf66e0ef13ff3bc63d0252c2a160))
+    - workaround for Cortex-X4 erratum 3701758 ([6e0efc7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/6e0efc7fe739a2101e013e23fa3697276bf9b9b3))
+    - workaround for Cortex-X925 erratum 3701747 ([15300ac](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/15300ac30c552814dfe9339a13ce170e8f388b23))
+    - workaround for CVE-2024-5660 for Cortex-A710 ([6041f07](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/6041f0723994a6dcf783a20b341b4ee0a8d76751))
+    - workaround for CVE-2024-5660 for Cortex-A77 ([0b2d220](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/0b2d22097c967b73b3b1044a6a9186d7899ae91c))
+    - workaround for CVE-2024-5660 for Cortex-A78 ([eda09ac](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/eda09acd1b22fa993686799743ea2e10ac70d5fb))
+    - workaround for CVE-2024-5660 for Cortex-A78_AE ([d52c52a](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/d52c52a5fa8c811dc050032f93621308aef6e513))
+    - workaround for CVE-2024-5660 for Cortex-A78C ([3bd6531](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3bd6531a55a477148328dd325b2c101000ff1ca8))
+    - workaround for CVE-2024-5660 for Cortex-X1 ([b9766da](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b9766da963651df9a25ea4a04b565c52bc654147))
+    - workaround for CVE-2024-5660 for Cortex-X2 ([41b64fe](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/41b64fe36f42f29e10592c28259408187f1ac3fd))
+    - workaround for CVE-2024-5660 for Cortex-X3 ([ef37871](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ef378713fa4bac6e815426ec831fb367416d86cf))
+    - workaround for CVE-2024-5660 for Cortex-X4 ([b8e111c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b8e111c726197e3a84891c62528e10e618aa7023))
+    - workaround for CVE-2024-5660 for Cortex-X925 ([70a7d3f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/70a7d3f2d0303a411a0ac5ffc5b8b395e201f26f))
+    - workaround for CVE-2024-5660 for Neoverse-N2 ([6324220](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/6324220805b105f10eab59fca3dee5caabfe3cb3))
+    - workaround for CVE-2024-5660 for Neoverse-V1 ([193370e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/193370e1c6a28382992d500b59f2bd05392ea897))
+    - workaround for CVE-2024-5660 for Neoverse-V2 ([b23f5da](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b23f5da614e63370dbc37a88294544e03410641e))
+    - workaround for CVE-2024-5660 for Neoverse-V3 ([2898088](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2898088f8ba6537a7ae2adb46d61e7f1a8ef82fa))
+    - workaround for Neoverse-N2 erratum 3701773 ([7e41b70](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/7e41b706e97c0e36e19d51b6a1785280e9ff4108))
+    - workaround for Neoverse-N3 erratum 3699563 ([4a9ff09](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4a9ff092c9b41ddc844c17f6508afd5cc9c20d1d))
+    - workaround for Neoverse-V3 erratum 3701767 ([3809359](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3809359e212473ae46e770f94c6a7f11a5ae71b5))
+
+- **Miscellaneous**
+
+  - **Security**
+
+    - add CVE-2024-7881 mitigation to Cortex-X3 ([16b8724](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/16b87247ed03fbe98c5c4a96c4dd00844ae53284))
+    - add CVE-2024-7881 mitigation to Cortex-X4 ([41a52ef](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/41a52efd6f38920e90e19f42d7193d261e6ab209))
+    - add CVE-2024-7881 mitigation to Cortex-X925 ([3e4d94c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3e4d94c43b64c66b2aa5f8108f5b9fe13c2ceb82))
+    - add CVE-2024-7881 mitigation to Neoverse-V2 ([192a152](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/192a152448aef856ca98dfbb405f9d75bb7da911))
+    - add CVE-2024-7881 mitigation to Neoverse-V3 ([427c33b](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/427c33bc0c0bba043ac8e30de01b4ad1cfb2e760))
+    - add support in cpu_ops for CVE-2024-7881 ([bea64fd](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bea64fd5272deaf53111135baf36abb47b73b93e))
+    - apply SMCCC_ARCH_WORKAROUND_4 to affected cpus ([9427c06](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/9427c061eb8dee00c32d72c20d6bc231002a575c))
+    - enable WORKAROUND_CVE_2024_7881 build option ([2f09b9f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2f09b9f3c2af685d86eaad1f847e55a22fd53c60))
+
+- **Build System**
+
+  - do not force PLAT in plat_helpers.mk ([d1c3a5d](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/d1c3a5d8b9d8ace9914495cace668dd93008a9a3))
+
 ## [2.12.0](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/refs/tags/v2.11.0..refs/tags/v2.12.0) (2024-11-19)
 
 The threat model for context management and the asymmetric CPU extension support
diff --git a/docs/conf.py b/docs/conf.py
index 3a7264fd3f..dbd6393767 100644
--- a/docs/conf.py
+++ b/docs/conf.py
@@ -14,8 +14,8 @@
 
 project = "Trusted Firmware-A"
 author = "Trusted Firmware-A contributors"
-version = "2.12.0"
-release = "2.12.0"
+version = "2.12.1"
+release = "2.12.1"
 
 # -- General configuration ---------------------------------------------------
 
diff --git a/package-lock.json b/package-lock.json
index a039bc5b55..902bf9435c 100644
--- a/package-lock.json
+++ b/package-lock.json
@@ -1,12 +1,12 @@
 {
   "name": "trusted-firmware-a",
-  "version": "2.12.0",
+  "version": "2.12.1",
   "lockfileVersion": 3,
   "requires": true,
   "packages": {
     "": {
       "name": "trusted-firmware-a",
-      "version": "2.12.0",
+      "version": "2.12.1",
       "license": "BSD-3-Clause",
       "devDependencies": {
         "@commitlint/cli": "^19.0.0",
diff --git a/package.json b/package.json
index 0908528f8f..ebb3620b28 100644
--- a/package.json
+++ b/package.json
@@ -1,6 +1,6 @@
 {
   "name": "trusted-firmware-a",
-  "version": "2.12.0",
+  "version": "2.12.1",
   "license": "BSD-3-Clause",
   "type": "module",
   "private": true,
diff --git a/pyproject.toml b/pyproject.toml
index 62878b4124..f0b28df712 100644
--- a/pyproject.toml
+++ b/pyproject.toml
@@ -1,6 +1,6 @@
 [tool.poetry]
 name = "trusted-firmware-a"
-version = "2.12.0"
+version = "2.12.1"
 description = "Trusted Firmware-A (TF-A) Python dependencies."
 authors = ["Arm Ltd."]
 license = "BSD-3-Clause"
diff --git a/readme.rst b/readme.rst
index 171b32bf76..ab4c887718 100644
--- a/readme.rst
+++ b/readme.rst
@@ -49,3 +49,4 @@ that is available through `trustedfirmware.org`_.
 .. _view the full documentation: https://www.trustedfirmware.org/docs/tf-a
 .. _trustedfirmware.org: http://www.trustedfirmware.org
 
+
diff --git a/tools/conventional-changelog-tf-a/package.json b/tools/conventional-changelog-tf-a/package.json
index 9975ea3216..102063bcb8 100644
--- a/tools/conventional-changelog-tf-a/package.json
+++ b/tools/conventional-changelog-tf-a/package.json
@@ -1,6 +1,6 @@
 {
   "name": "conventional-changelog-tf-a",
-  "version": "2.12.0",
+  "version": "2.12.1",
   "license": "BSD-3-Clause",
   "private": true,
   "main": "index.js",
-- 
GitLab