Patch:
https://review.trustedfirmware.org/c/trusted-firmware-m/+/1234
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jun 11 2019
Jun 3 2019
Thanks, guys. I think this issue could be closed. Only one test patch is not merged.
https://review.trustedfirmware.org/c/trusted-firmware-m/+/775
May 29 2019
May 23 2019
May 5 2019
The patch is here:
https://review.trustedfirmware.org/c/trusted-firmware-m/+/968
Apr 30 2019
Apr 28 2019
A new patch has been provided, to avoid set response file as default:
https://review.trustedfirmware.org/c/trusted-firmware-m/+/925
Apr 24 2019
This problem is not the one NXP reported. This is the models conflict in regression tests. Summer is doing a task and trying to fix this.
Apr 19 2019
Apr 18 2019
Apr 16 2019
Apr 12 2019
This issue is related to a further design change of retrieve NS parameters; let me down the priority for it and keep it here as a reminder.
Apr 9 2019
Mar 30 2019
Mar 28 2019
After Jinja2 is merged, there is a template for GCC and ARMCLANG. Close this task.
Mar 27 2019
Mar 26 2019
Mar 25 2019
Mar 21 2019
Mar 18 2019
Tried latest merged master branch on MUSCA_A and IPC works fine. Mark this task as resolved.
Thanks.
Mar 15 2019
@mikisch81
A short question, has your platform defined __FPU_PRESENT=1?
Mar 14 2019
Mar 13 2019
Patches for the fixing:
https://review.trustedfirmware.org/c/trusted-firmware-m/+/712
Does it mean that patches mentioned in T95 could be merged?
Fatal error: L6002U: Could not open file @CMakeFiles/tfm_s.dir/objects1.rsp: No such file or directory Finished: 0 information, 0 warning, 0 error and 1 fatal error messages. make.exe[2]: *** [app/secure_fw/CMakeFiles/tfm_s.dir/build.make:167: app/secure_fw/tfm_s.axf] Error 1 make.exe[1]: *** [CMakeFiles/Makefile2:252: app/secure_fw/CMakeFiles/tfm_s.dir/all] Error 2 make.exe: *** [Makefile:118: all] Error 2
Hi,
I am using ARMCLANG build on AN521, with latest master branch:
https://git.trustedfirmware.org/trusted-firmware-m.git/commit/?h=refs/heads/master&id=807fedbb8070b6d735e1c9e2103e6c1ea632fe8c
The patch is created, do the test now. Expect to publish it soon for review.
Thanks.
Hi Gyuri,
I saw the document update patch, but cmake 3.10 still fails in my side. Which means the document is updated first before cmake change?
Thanks.
Mar 12 2019
In T273#3082, @mikisch81 wrote:Can you elaborate on the root cause?
Mar 11 2019
Hi @mikisch81 ,
We have spotted this issue, and now thinking the best solution for it. Please ping me if you have any updates for this task, thanks!
Hi @mikisch81,
Since you have found the root cause, can you provide a fix for that? You can push to branch feature-ipc.
Thanks.
Mar 1 2019
Feb 21 2019
Hi Oren,
I read the test code and got some questions:
- There are two partitions involved, can you tell which psa_wait returned wrong signal code and show me the debug message (I noticed SP2 would print out something if psa_wait returned error message)? It would be nice if you can tell the line number in the source you shared.
- It looks like the case is: client -> SP1 -> SP2, three roles get involved in testing, is that true? Or there are more roles?
- I can not find TF-M adapter layer in cloned source of mbed-os, is the code showed as same as the working version on your local?
Hi Oren,
For PSA related ticket please add me as subscriber. Thanks.
Feb 19 2019
Feb 18 2019
Validated and merged. Please help to close this ticket.
Validated and merged.
Can you help to close this item? Thanks.
Feb 12 2019
Thanks Alex.
That's a quick fix for removing the blocker. After T244 is solved this patch maybe not relevant, the purpose is no affecting API user behaviour (no workarounds) even the connection handle allocation mechanism is changed. Since mechanism changing may not happen soon, let's apply this one first.
Feb 1 2019
Jan 31 2019
Thanks for submitting. We will investigate it and try to find out a plan.
Jan 29 2019
Hi Alex,
This line is for extracting NSPE invec/outvec from invec due to parameters number limitation. The anti-TOCTOU is added in line: 177 now working for secure partitions.
Jan 28 2019
Thanks, Alexander, currently we copy into a local buffer and then moved to the message instead of moving to message directly due to message buffer allocation limitation (https://developer.trustedfirmware.org/T195)
Jan 24 2019
Jan 23 2019
Jan 22 2019
Task moved to :https://developer.trustedfirmware.org/T185
Jan 11 2019
No problem to handle this task, since it is needed eventually. Current no duplicated item for this, the only thing is if there is a bigger task would cover this item.
Dec 27 2018
Hi Gyuri,
Version 3.7 won't report the issue in my side.
Dec 26 2018
Gerrit review items:
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/472/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/473/
https://review.trustedfirmware.org/#/c/trusted-firmware-m/+/474/