https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/6274
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Oct 8 2020
Oct 7 2020
Oct 6 2020
Oct 5 2020
It got obsoleted due to CMake refactor.
Oct 2 2020
To elaborate the "Support for binary psa-arch-tests (design in progress)" point mentioned above.
MCU boot platforms (like Musca-A) images are singed as a part of the mcuboot build. For the platforms that do not use TFM's MCU boot (e.g. PSoC64), the images have to be signed manually.
Some time ago we had a discussion on adding hooks for running a custom post-build scripts (https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/2588). Can we consider adding this now with the new build system introduction?
thanks
Oct 1 2020
MCU boot platforms (like Musca-A) images are singed as a part of the mcuboot build. For the platforms that do not use TFM's MCU boot (e.g. PSoC64), the images have to be signed manually.
Some time ago we had a discussion on adding hooks for running a custom post-build scripts (https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/2588). Can we consider adding this now with the new build system introduction?
thanks
Sep 30 2020
The change for this issue had been merged
Fixed in a separate commit
Sep 29 2020
Sep 28 2020
Sep 27 2020
Sep 25 2020
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5874
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5539
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/4951
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/4953
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5875
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5876
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5877
Sep 24 2020
Sep 23 2020
I haven't looked at in much detail but I think the shareability attributes would need to be exposed by the mm module, and then converted by ffa_memory_permissions_to_mode.
Persistent key support has been added as part of TFMv1.1. Clsoing this issue.
Sep 22 2020
SMMUv3.2 supports secure Stage-2 translations and that's the feature we intend to enable as a first step.
The IP also supports "nested translations" aka S-EL1 SMMU paravirtualization although we're not looking at this option immediately.
Sep 21 2020
Sep 17 2020
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5695
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5696
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5697
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5698
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5699
Sep 16 2020
Sep 15 2020
Description: 'Short circuit signature test of attest token'
Test logs:
Thanks for your reply, so there is Stage-2 SMMU support, right? And i think we can support passthrough io support in Secure-EL1 with Stage-2 SMMU
Sep 14 2020
Notes, missing features for current uploaded source changes:
• No support for isolation level2 on SSE-200
• Protected Storage is an Application RoT partition, but PS also moved to Secure Enclave
• Some regression tests running on secure side of SSE-200 fail as all messages are forwarded with the same client ID to Secure Enclave
• All IPC message forwarding is a blocking call
• Only one message is put into the mailbox at a time
• Musca-B1 related documentation is not complete yet
• Generated files are not committed, manifest parser should be run before build.
• The BL0 component mentioned in the tech forum presentation is not uploaded, as it is based on the new cmake system, and not so interesting right now
• Cmake changes are rudimentary, will be rebased to new cmake system.
Sep 11 2020
This does not seem to be an issue with the new build system.
Sep 10 2020
Sep 9 2020
The patches are merged.
The change is merged.
We're considering the SMMUv3.2 support which covers the Secure Stage-2 mappings (https://developer.arm.com/documentation/ihi0070/latest).
This is still in initial investigation phases, but we hope to share design details and early patches by end of Q4'20.
Several preparation patches including scatter file adjustments.
Starts with:
https://review.trustedfirmware.org/c/TF-M/trusted-firmware-m/+/5571