- Jun 16, 2020
-
-
It's not used, and interferes when a platform doesn't have this file. Change-Id: Icbffa7e912f297cbeaf4d1edfbd20fdf96efcacd Signed-off-by:
Øyvind Rønningstad <oyvind.ronningstad@nordicsemi.no>
-
Fix warnings of the form: implicitly converting 'bool' to 'STRING' type. implicitly converting 'internal' to 'STRING' type. implicitly converting 'string' to 'STRING' type. by changing the type to STRING. Change-Id: I888126809cd0b9ae4841585979f8ebed6e357160 Signed-off-by:
Kumar Gala <kumar.gala@linaro.org>
-
Jamie Fox authored
Changes the eFlash driver functions to only check the CMD_PENDING bit of the status register, and ignore the ARBITRATION_LOCKED bit, before proceeding. This prevents the functions from failing unnecessarily when an AHB access is taking priority over any APB accesses. Change-Id: I57290e04397ee1c8f2b79219feee47990d7b8747 Signed-off-by:
Jamie Fox <jamie.fox@arm.com>
-
David Hu authored
Add notes in build instruction document to clairfy that Profile Small config doesn't all the platforms supported in TF-M. Change-Id: I5cc94e02175276d1954505e68e89321c0a418a48 Signed-off-by:
David Hu <david.hu@arm.com>
-
Chris Brand authored
PSoC64 has 512-byte flash sectors, so bumping this to 512 can significantly reduce the number of read and write operations, depending on the alignment of the reads and writes. Change-Id: I9f156542f0d489ec13a0894d035bef7dff882f25 Signed-off-by:
Chris Brand <chris.brand@cypress.com>
-
Chris Brand authored
No unprivileged code needs access to these regions. Change-Id: Idb724d7a654d3b9fddeae51ff9b250ca69f87e72 Signed-off-by:
Chris Brand <chris.brand@cypress.com>
-
Chris Brand authored
Rather than using SMPU region 10, use 8. Later versions of the bootloader use the higher-numbered SMPU regions. Signed-off-by:
Chris Brand <chris.brand@cypress.com> Change-Id: Idac3c9bbbffb1a67c9d12e04d74082f8e0826170
-
- Jun 15, 2020
-
-
The maximum size of the region ER_DATA in BL2 scatter files is set to BL2_DATA_SIZE, which is usually equal to the size of the available RAM. But the BOOT_DATA, the heap and the MSP stack also have to be placed into RAM. In addition, if the TFM_MULTI_CORE_TOPOLOGY macro is set then the BOOT_DATA is not placed at the start of the RAM in TF-M, but after unprivileged data. In the case of NS scatter files, NS_DATA_SIZE is usually set to half of the available RAM, or the size of the RAM, minus the size of the S image. Nevertheless, the stack and the heap still have to fit in the ER_DATA region. So the scatter files are modified like in tfm_common_s.sct, adjusting the size of the ER_DATA region. Signed-off-by:
Balint Matyi <Balint.Matyi@arm.com> Change-Id: I8deafe4c3846c5f1615b5842c6d65d9d5bb7c4a0
-
This patch allows to group all stm targets in single cmake entry point. The stm TARGET_PLATFORM should prefix by "STM". stm platforms supports CoreIPC, CoreIPCTfmLevel2 and RegressionIPCTfmLevel2 Build with GNUARM toolchain. Change-Id: I6535420b2304c18f2ab260620c38fef632eb7488 Signed-off-by:
Ludovic Barre <ludovic.barre@st.com> Signed-off-by:
Michel Jaouen <michel.jaouen@st.com>
-
- nucleo_l552ze_q and disco_l562qe boards supported and build with gnuarm compiler. - dummy driver for nvm counter, - mcuboot config overwrite only and 2 images, - timer not supported - icache ip not activated Change-Id: I6c87662ae26fc6552e0b65f35000cfc73735fd21 Signed-off-by:
Michel Jaouen <michel.jaouen@st.com>
-
Summer Qin authored
There are only IPC partitions under IPC model now. Enumerate from the service list start directly instead of partition list. Change-Id: I000cd0a06a75ee873462fd6fda271f19af950819 Signed-off-by:
Summer Qin <summer.qin@arm.com>
-
TTornblom authored
Removed conditional on __GNUC__. This code needs to be compiled with all toolchains. Signed-off-by:
TTornblom <thomas.tornblom@iar.com> Change-Id: I0a5d5213704e4cb2f1a905cefde7c0d53f1d3e4e
-
Ken Liu authored
Update the including path for CC312 building after folder structure adjustment. Change-Id: Ia444acac19df280be35d42e6345f51059d474c59 Signed-off-by:
Ken Liu <ken.liu@arm.com>
-
- Jun 12, 2020
-
-
Jamie Fox authored
Updates FVP_SSE300_MPS2 platform files to use PS names instead of SST. Change-Id: I428668a645cb0c47b6f5b62ab9a0fc61e116c2fc Signed-off-by:
Jamie Fox <jamie.fox@arm.com>
-
Kevin Peng authored
This patches renames SST(Secure STorage) to PS(Protected Storage) for files, folders and any contents in files to align with the PSA Storage API spec. Change-Id: Icf991f59512875780c159f22737b521b3b2d4924 Signed-off-by:
Kevin Peng <kevin.peng@arm.com>
-
- Jun 11, 2020
-
-
Modify the flow of the IRQ test case so it can be executed with the IRQ testing tool. Change-Id: Ibc646baf2b979a0c054cc969b5a061e3c0e79081 Signed-off-by:
Mate Toth-Pal <mate.toth-pal@arm.com>
-
Add support for FVP_SSE300_MPS2 platform Change-Id: Ieddb5adbdc0cc47690bbe0b3dfbaf39d005d03ea Signed-off-by:
Mark Horvath <mark.horvath@arm.com> Signed-off-by:
Marton Berke <marton.berke@arm.com>
-
Minos Galanakis authored
The TF-M repository has been moved from git.trustedfirmware.org/trusted-firmware-m to git.trustedfirmware.org/TF-M/trusted-firmware-m This patch updates references to the documentation to reflect that change. Signed-off-by:
Minos Galanakis <minos.galanakis@arm.com> Change-Id: Ib7d4d45bae7790bf69fcad4fd16f558716b20d92
-
- Jun 10, 2020
-
-
TTornblom authored
Added supported toolchain versions. Signed-off-by:
TTornblom <thomas.tornblom@iar.com> Change-Id: I01f9d5a6d12f1e1032776da78dc52e9278bd4e18
-
TTornblom authored
After running tools/tfm_parse_manifest_list.py on Windows, git lists all generated files as changed, even if it is just the newlines that has changed. git converts the newlines on checkout and commit, so the files should really have newlines that are appropriate for the build system. This change makes python generate the appropriate newlines so that only truly changed files will be listed by git. Signed-off-by:
TTornblom <thomas.tornblom@iar.com> Change-Id: Iba0a0a7f162de432f2c5eba938539759e00dd376
-
TTornblom authored
Commit 8fa3a7b6 uses "Image$$ARM_LIB_STACK_MSP$$ZI$$Base" instead of using the REGION_DECLARE macros in region.h. This causes link issues with IAR. Signed-off-by:
TTornblom <thomas.tornblom@iar.com> Change-Id: I00fb896d2005eb9e64e5a6869e3d6e1d814d43a7
-
- Jun 09, 2020
-
-
TTornblom authored
Update the IAR CMSE_FLAG handling for 8f17a711 Fixed a few warnings about unused variables with IAR Disabled some harmless warnings for IAR Signed-off-by:
TTornblom <thomas.tornblom@iar.com> Change-Id: I7197ae009e3e85bcb8d8b21b7528108d966ee330
-
Soby Mathew authored
This patch cleanup the PSA Crypto interface headers files and decouples it from TF-M build flag dependencies. The `psa_key_attributes_t` struct definition previously depended on various config options. The struct now only has fields which can be set and read by the client. Hence the client view of the structure is now defined separately in the crypto_client_struct.h header. The platform dependant definitions of the PSA Crypto types are fixed and hence the crypto_platform.h header is removed and the contents are moved to other PSA crypto headers. The previous intermediate solution for hiding the type differences between crypto server and client view via `psa_client_core_key_attributes_t` is now removed. Change-Id: I2644b5a2da3babe561c569ebf5690b3daa576a12 Signed-off-by:
Soby Mathew <soby.mathew@arm.com>
-
- Jun 08, 2020
-
-
Dávid Vincze authored
Fix1: replace hard-coded value with the image index variable. It remained from when only 1 image was supported by the rollback protection mechanism. Fix2: typo in NV counter identifier. Change-Id: Iaa275d02ad34ca6e95a01a0d3f85fd190d44bc3d Signed-off-by:
David Vincze <david.vincze@linaro.org>
-
Dávid Vincze authored
Fix misplaced preprocessor directive which caused the bootloader to use the NO_SWAP strategy as default instead of overwrite-only. Fix "maximum line length" coding rule violations. Change-Id: Ib82fb567912873add2c5b4407c59deb92791dbaa Signed-off-by:
David Vincze <david.vincze@linaro.org>
-
Mingyang Sun authored
Change the absolute including into relative including for core sources. Change-Id: Ic5b47c149a3739ad5e79af8231e48dfc68074369 Signed-off-by:
Mingyang Sun <mingyang.sun@arm.com>
-
Mingyang Sun authored
Change the absolute including into relative including for partition service sources. Change-Id: I1cc2057e5965046242a9b70e01e937243cacfc7e Signed-off-by:
Mingyang Sun <mingyang.sun@arm.com>
-
Mingyang Sun authored
Change the absolute including into relative path including for platform sources. Change-Id: I594577eae7689ea8ac6cb557d5b0b5a048ee9b4d Signed-off-by:
Mingyang Sun <mingyang.sun@arm.com>
-
- Jun 05, 2020
-
-
Benjamin Copeland authored
Change-Id: If09018fead554a66cb7e415cbe3b3dfc47c9e8ef
-
Kevin Peng authored
The uart_stdout implementations are actually identical for Non-secure and Secure. The only difference is the actual underlying stdio driver. This patch unifies the implementations to one file, using Macro to distinguish different drivers. The patch also removes the unused enum uart_channel. Change-Id: Ice89127cc98bd185947ce8de7af5190bd5bd69dc Signed-off-by:
Kevin Peng <kevin.peng@arm.com>
-
Ken Liu authored
Due to the folder name is updated from 'secure_fw/services' to 'secure_fw/partitions', update related documents with updated name. Change-Id: I5b85d3c2c4f2a4e1f7fd422910e968e970d70527 Signed-off-by:
Ken Liu <ken.liu@arm.com>
-
Edison Ai authored
Add the related glossaries for TF-M HAL. Change-Id: Ic14b1058f1a1c7bcf29ee906ebd8118c3d88afa1 Signed-off-by:
Edison Ai <edison.ai@arm.com>
-
Edison Ai authored
- Change "Trusted Firmware - M" to "Trusted Firmware-M". - Align the glossary.rst in 80 columns. - Sort by alphabet. Change-Id: I5ef05409a310b0edd8a1c96c283f332b4062a85a Signed-off-by:
Edison Ai <edison.ai@arm.com>
-
- Jun 04, 2020
-
-
Control checking for hard-coded claim values in the attestation suite by introducing the 'ATTEST_CLAIM_VALUE_CHECK' flag. When set to 'ON', the test will check if the claim values match the constant values found in 'platform/ext/common/template/attest_hal.c'. Signed-off-by:
Balint Matyi <Balint.Matyi@arm.com> Change-Id: I22ab1471609d6b931deaf97f31cb3a0dcd83fda0
-
This commit adds a requirements.txt file listing the requirements for the image signing script, etc. Signed-off-by:
Kevin Townsend <kevin.townsend@linaro.org> Change-Id: I3c19c06046cc051113ea80ad370e56c56c45a999
-
Signed-off-by:
Balint Matyi <Balint.Matyi@arm.com> Change-Id: I356119b7dd0a1b6c62e6255e2baf4e992a29a86f
-
This commit adds an explicit cast to `bytes` for the payload when signing data with imgtool. On some systems, the data may be provided as a `ByteArray`, which will cause the signing function to fail since the underlying library expects `bytes`. Signed-off-by:
Kevin Townsend <kevin.townsend@linaro.org> Change-Id: I7405d9e76570d61cc745dcd81e6033dec637d2f3
-
Kevin Townsend authored
This commit enables to use of `-GNinja` for builds, which provides significantly faster TF-M builds, and enables building TF-M as a cmake external project with Zephyr's build system. ``` $ cmake -GNinja \ -DPROJ_CONFIG=`readlink -f ../configs/ConfigDefault.cmake` \ -DTARGET_PLATFORM=LPC55S69 -DBL2=False -DCOMPILER=GNUARM .. $ ninja ``` Signed-off-by:
Kevin Townsend <kevin.townsend@linaro.org> Change-Id: I5deaaf9ffb3ec3329174881d70fe7033b531ec49
-
- Jun 03, 2020
-
-
Ken Liu authored
This is the first patch to follow the first commit of source structure document. The items under the 'secure_fw' folder are re-organized: - Create/Move some folders/files to follow document. - Rename some folders to foll, for example, 'secure_fw/services' to 'secure_fw/partitions'. - Update affected files to make it work. This is a big change, to make the structure meet the basic shape of the structure document defined, and make it easier to be understood for users. Staging changes are not applicable so they are combined into one - and because it is not the final shape yet, so: - Upcoming updates on the 'secure_fw' folder would follow up soon. - Fine-tune about the 'source_structure.rst' would come, too. Change-Id: I5c11175e0a4579cd9b42d3e3519dbffb87334d0b Signed-off-by:
Ken Liu <ken.liu@arm.com>
-
- Jun 02, 2020
-
-
The Musca-S1 does not have a real OTP, so its crypto hardware values are saved to MRAM instead. Before, the life-cycle state was only checked on the S1 from the MRAM once provisioning was already done. This resulted in being able to run provisioning repeatedly. Change this so that the values in the MRAM are used always, so that one needs to wipe the MRAM to repeat the process. Also, update the relevant docs. Signed-off-by:
Balint Matyi <Balint.Matyi@arm.com> Change-Id: I51d36b6b453ccfd1770955a4fe3f5f6fdfd70cf0
-