- Jan 18, 2021
-
-
Raef Coles authored
To avoid errors when not building with the initial attestation partition enabled, as optional targets are only compiled when they are a dependency of a non-optional target. Change-Id: If109ec1b2208c7d9138355f9e346ec1b1a3eb13f Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
- Jan 15, 2021
-
-
Shawn Shan authored
Exclude the log source files from build system when log level is equal to SILENCE. Change-Id: I92171327a8a4993896b188a3fcaa06da740ea42a Signed-off-by:
Shawn Shan <Shawn.Shan@arm.com>
-
Shawn Shan authored
Set SPM log level differently according to their build type. Change hard-coded log level to the related macro definition. Change-Id: I8d72433e3be7f0edc1645084dc17c12451e5b17d Signed-off-by:
Shawn Shan <Shawn.Shan@arm.com>
-
Shawn Shan authored
Add log level control for SP. Set the default SP log level as INFO level. Change-Id: I9aeaffdf0445fef8878a85ba4b678aba5762887a Signed-off-by:
Shawn Shan <Shawn.Shan@arm.com>
-
Shawn Shan authored
As the UART device is occupied by the privileged log, to reuse the device, provide an SVC entrance for the unprivileged log. Change-Id: Ia01f434cdecd2697af7841a1fd9dca672537a834 Signed-off-by:
Shawn Shan <Shawn.Shan@arm.com>
-
- Jan 14, 2021
-
-
Kevin Peng authored
The build system currently fetches the latest tf-m-tests repo always. The build would be broken if there was a dependency change between TF-M repo and test repo and developer was working on a older TF-M commit. This patch changes the version of tf-m-tests to be fetched to specific commits. With this patch, the build system will download a fixed workable version of tf-m-tests. Documentation on how the version will be updated is also added. Change-Id: Ia6fbf824f1cc3e3509aebe3ad71b04291a81c8a2 Signed-off-by:
Kevin Peng <kevin.peng@arm.com>
-
- Jan 13, 2021
-
-
Minos Galanakis authored
This patch removes the '#' from the output of the auto-detected version string. Signed-off-by:
Minos Galanakis <minos.galanakis@arm.com> Change-Id: I90ad1283ce930f311887b2edbfeccce9c971bfa3
-
Xinyu Zhang authored
Directory structure of TF-M documents has been changed. The URL needs to be updated. Signed-off-by:
Xinyu Zhang <xinyu.zhang@arm.com> Change-Id: Ife8a58a841521e68d275a0974a66e71081a01fd8
-
- Jan 12, 2021
-
-
Shawn Shan authored
Delete the UART symbols in test partition section, make sure those symbols put into TF-M core code section. Change-Id: Ica27e90b85210729b4986c34e7dc9aaebf1fdd39 Signed-off-by:
Shawn Shan <Shawn.Shan@arm.com>
-
Summer Qin authored
Change-Id: I530f194fe1ddd1a33de7bd17d45304cfbd9169bd Signed-off-by:
Summer Qin <summer.qin@arm.com>
-
- Jan 08, 2021
-
-
Karl Zhang authored
Add TFM_CODE_COVERAGE for GNU compiler to output more symbol info by the parameter "-g". The code coverage will be disabled by default. Define TFM_CODE_COVERAGE=True to enable the code coverage flag when build. This is a preparation for code coverage analysis after the binary run. And the code coverage report will rely on the symbol info for calculating. Change-Id: I4d5c8ebd7fd0777c49ab06cbdf1b9e2e2efb3d1e Signed-off-by:
Karl Zhang <karl.zhang@arm.com>
-
Raef Coles authored
To allow easier use of the exported tfm. Change-Id: I5bdb3eadd020cab109aa97cd907413ebeae84870 Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
Raef Coles authored
To make it more clear that it contains the ns interface sources, headers and static libraries, and to allow more clear installation of other components. Change-Id: Id02bd472270b55245ea804437bd21d1dca24b7d8 Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
Raef Coles authored
Change-Id: I4e519d59448b74679a7d1bfa2171ffa024263944 Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
- Jan 07, 2021
-
-
Summer Qin authored
SPM and Secure Partitions(SP) will use different log implementations. This patch adds the implementations for SP: - SP log HAL API - SP log interface The log implementations re-use the currently shared log implementations. Change-Id: I3e87e9424e6ea2a51e534bdab85406e4007c8261 Signed-off-by:
Kevin Peng <kevin.peng@arm.com> Co-authored-by:
Summer Qin <summer.qin@arm.com> Co-authored-by:
Shawn Shan <shawn.shan@arm.com>
-
Add logging, timer, and memory functionality. This adds functions that are not used in the TF-M code, but are called from the psa-arch-tests nrf platform. Change-Id: I1e149356b426302dbc125d0db9e7add4d331bfd7 Signed-off-by:
Øyvind Rønningstad <oyvind.ronningstad@nordicsemi.no>
-
- Jan 06, 2021
-
-
Mingyang Sun authored
SPM HAL implementation has covered the old HAL API tfm_spm_hal_init_isolation_hw(), it is not used now and can be removed. Change-Id: I0b63be8a6ff0e8dca4004bb0992664fed053fb24 Signed-off-by:
Mingyang Sun <mingyang.sun@arm.com>
-
Mingyang Sun authored
Adds error check in isolation configuration HAL API. Change-Id: Ied388da79bf56c92302fe04c14c7d98f00c00d97 Signed-off-by:
Mingyang Sun <mingyang.sun@arm.com>
-
Mingyang Sun authored
The flag "CONFIG_TFM_ENABLE_MEMORY_PROTECT" is a platform-scope option, move it to platform_s target. Remove the isolation setup in library SPM code and reuse the one of SPM HAL, since they are doing the same things. Change-Id: I5766ddecc525ee2eda3f2e5989b31dd5c41fde6b Signed-off-by:
Mingyang Sun <mingyang.sun@arm.com>
-
- Jan 05, 2021
-
-
Raef Coles authored
To prevent linker errors related to targets not properly linking the cc312 log symbols. Change-Id: I6a7bbc6d305fc8557e2922698ee3975dd23c3457 Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
Raef Coles authored
To resolve an accidental link between secure bl2, by duplicating the libraries for each target. Change-Id: I9e5103d1ac95d95ed6fd03b477084e216b8ea316 Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
Raef Coles authored
For Musca S1 and B1. In order to allow for a future change to remove the link between platform_s and platform_bl2 which currently provides the crypto key symbols to the secure binary. Change-Id: I9924560af90a734409c1026ed8d40a8af6c26175 Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
Raef Coles authored
To avoid collisions with the buffer check implemented in cc312.c, which should be used in all cases. Change-Id: I0c34ae280fe9e95e3712981b40f2f129ebb06e0d Signed-off-by:
Raef Coles <raef.coles@arm.com>
-
This is a landing page for TF-M security, including the list of advisories and how the security issue disclosures or reports. Change-Id: Ibe7918876af0537ea170f38022b6eb19cc849212 Signed-off-by:
Karl Zhang <karl.zhang@arm.com>
-
Ken Liu authored
This section is not used. Remove this section and related platform sources, and remove some unprivileged code objects out of the unprivileged code section because they are not used by unprivileged logic. Change-Id: I9915cdd2d90a80cb52c357e0d759de2854e971de Signed-off-by:
Ken Liu <Ken.Liu@arm.com>
-
- Jan 04, 2021
-
-
Tamas Ban authored
The initialization of RNG driver was misplaced to the platform uninit code instead of the init call. Signed-off-by:
Tamas Ban <tamas.ban@arm.com> Change-Id: I239db25502908cbf3482fe2d635ec80c908d35ef
-
Øyvind Rønningstad authored
So it is more easily overrideable. Now, an external platform can specify their own partitions easily, and still use the core nrf53/91 platforms. Change-Id: Ia04d94e9ad4dc276f3b5d5cb61eeb13785cdb63d Signed-off-by:
Øyvind Rønningstad <oyvind.ronningstad@nordicsemi.no>
-
- Dec 31, 2020
-
-
Maulik Patel authored
Updated the docs/introduction/readme.rst file to generate correct html format for version history. Change-Id: Ief1e413dbb6b49ad9bb57a129f395cea9f2c8f64 Signed-off-by:
Maulik Patel <maulik.patel@arm.com>
-
- Dec 30, 2020
-
-
Charley Chu authored
Change-Id: Iae0f9b982d37a4dde3823d32cd22acd88740554c Signed-off-by:
Charley Chu <haoc@cypress.com>
-
- Dec 29, 2020
-
-
Ken Liu authored
Remove the sections defined for stack in linker script/scatter file, apply the global array as partition stacks. Signed-off-by:
Ken Liu <ken.liu@arm.com> Change-Id: I88de2b4f7fdad66ba80ad84eabb6b8d2e37472fc
-
Mingyang Sun authored
This patch adds global array as partition stacks. Global stack arrays are generated automatically in the build process. Using a global array as partition stack would wrap stack into partition private data, which skips allocating specific space by the linker. The related tools and templates are modified together in this patch. The 'psa_ff_test' related partitions also need new generated intermedia files, before feedback this change to 'psa_ff_test', put those test partitions intermedia files under build directory. Change-Id: Ibcc79bdee0c3d4db7cd060bb92861ce3aa5e4437 Signed-off-by:
Ken Liu <ken.liu@arm.com> Co-authored-by:
Mingyang Sun <mingyang.sun@arm.com>
-
- Dec 28, 2020
-
-
David Hu authored
Set EXCLUDE_FROM_ALL property in platform_ns target to skip building platform_ns target when NS app is disabled. Change-Id: I2e9c5122ec3253d510806d5cdf3d18ee3e4b1985 Signed-off-by:
David Hu <david.hu@arm.com>
-
David Hu authored
Move NS interface source code build to NS side. NS interface build should be executed during NS build. Change-Id: I7ac3bbf1a9e975d8a9e2f4fb5cd6f367ff94cc9d Signed-off-by:
David Hu <david.hu@arm.com>
-
- Dec 25, 2020
-
-
David Hu authored
Add a generic threat model document of TF-M. Create a dedicated folder under docs to contain threat models. Change-Id: Ifb332d20e1667082d054959bb7d890eda5ce025d Signed-off-by:
David Hu <david.hu@arm.com>
-
- Dec 23, 2020
-
-
David Hu authored
Since audit logging is not supported in IPC model yet, create a IPC dedicated default config to explicitly set TFM_PARTITION_AUDIT_LOG to OFF in IPC model. It can skip installing audit logging files in IPC model. Change-Id: Ie2c948aedb2fe40a88399a855e22f4490d631179 Signed-off-by:
David Hu <david.hu@arm.com>
-
- Dec 22, 2020
-
-
Alamy Liu authored
---- Problem ---- IRQ test has problem to run on Isolation Level 2 ---- Info ---- TFM_CORE_TEST_1017 is part of the Core non-secure tests. Set ON to the following two MACROs to enable the test. TEST_NS=ON TFM_IRQ_TEST=ON ---- History ---- The initial implementation was at the time when the isolation level was level 1. There was no problem in the original design to share configuration data between TIMER0 (Secure) & TIMER1 (Non-Secure). The data sharing between NS & S triggers the problem when the development moved to Isolation Level 2. ---- Solution ---- Separate the data for TIMER0 & TIMER1 Change-Id: I1f0a0c4ae09356c3dff8378202e01dccf866473d Signed-off-by:
Alamy Liu <alamy.liu@infineon.com>
-
David Hu authored
Some PSA RoT services also require memory access check. Allow multi-core memory access to be performed not only in Handler mode, but also in privileged thread mode. Change-Id: Ic8abec6121a644325b80ac54a0e330460b19eec5 Signed-off-by:
David Hu <david.hu@arm.com>
-
- Dec 18, 2020
-
-
Michel Jaouen authored
Change-Id: I04a853380161c625d0aba21da77b507979e1dd92 Signed-off-by:
Michel Jaouen <michel.jaouen@st.com>
-
Michel Jaouen authored
(T862) External flash support on stm uses 2 drivers : - internal flash slot 0/1, scratch : driver internal flash - external flash slot 2/3 : octospi driver external flash Change-Id: I58d86a48081ad0bca3dda961318a15fe17248a93 Signed-off-by:
Michel Jaouen <michel.jaouen@st.com>
-
Summer Qin authored
The memset always clears the full IOVEC buffers whereas we need to clear only the used buffer. Change the return type of tfm_crypto_clear_scratch() to 'void' since it doesn't need to return value. Change-Id: I30246bcabbe9957c35e6ae59d9e0ff5def9be01c Signed-off-by:
Summer Qin <summer.qin@arm.com>
-