| 07da4854 | 24-Jan-2024 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topics "rcar-tools-fix", "toolchain-cleanup" into integration
* changes: build: remove the `NM` variable build: prefer `gcc-ar` over `ar` build: add `--no-warn-rwx-segments`
Merge changes from topics "rcar-tools-fix", "toolchain-cleanup" into integration
* changes: build: remove the `NM` variable build: prefer `gcc-ar` over `ar` build: add `--no-warn-rwx-segments` when linking with GCC build: always use the C compiler to assemble build: always use the C compiler to preprocess fix(rcar): fix implicit rule invocations in tools
show more ...
|
| 9f9b4814 | 23-Jan-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(marvell-tools): include mbedtls/version.h before use" into integration |
| 0ec25e38 | 19-Jan-2024 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(spm): silence warning in sp_mk_generator" into integration |
| 9653570e | 18-Jan-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(memmap): add RELA section display" into integration |
| e068a7ca | 15-Jan-2024 |
Chris Kay <chris.kay@arm.com> |
fix(rcar): fix implicit rule invocations in tools
The `rzg_layout_create` and `rcar_layout_create` tools have a rule to build object files from C files, but it depends on object files in the parent
fix(rcar): fix implicit rule invocations in tools
The `rzg_layout_create` and `rcar_layout_create` tools have a rule to build object files from C files, but it depends on object files in the parent directory when it should depend on object files in the current directory. Consequently, the rule is not triggering and the implicit C compilation rule is executed instead. This rule works, so I have replaced the broken rule with exactly the same command as what the implicit rule is executing and fixed the dependency.
Change-Id: Ib8d640361adff8c4d660738dda230e5536bec629 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 2c5c394f | 18-Jan-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "refactor(juno): move plat_def_uuid_config to fiptool" into integration |
| a6462e05 | 18-Jan-2024 |
Yann Gautier <yann.gautier@st.com> |
feat(memmap): add RELA section display
When PIE is enabled, it can be handy to display the .rela.dyn section. Add RELA in the list of symbols parsed, to display this section in memory map.
Signed-o
feat(memmap): add RELA section display
When PIE is enabled, it can be handy to display the .rela.dyn section. Add RELA in the list of symbols parsed, to display this section in memory map.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: Ic40da54ce6fb6e281fb1a6627e9b8830993cfb2c
show more ...
|
| 6dc8ee61 | 17-Jan-2024 |
Sekhar Nori <nsekhar@ti.com> |
fix(memmap): fix memory map dump when SEPARATE_CODE_AND_RODATA=0
When building BL1 with SEPARATE_CODE_AND_RODATA=0, symbol names __RO_{START|END}__ are ignored by memory map dump script.
Fix it by
fix(memmap): fix memory map dump when SEPARATE_CODE_AND_RODATA=0
When building BL1 with SEPARATE_CODE_AND_RODATA=0, symbol names __RO_{START|END}__ are ignored by memory map dump script.
Fix it by including the symbol in regular expression.
While at it, update the copyright year to current.
Change-Id: Iafeab75c5711429ea0b744510caf27dd8784a29a Signed-off-by: Sekhar Nori <nsekhar@ti.com>
show more ...
|
| 6a3225e2 | 17-Jan-2024 |
J-Alves <joao.alves@arm.com> |
fix(spm): silence warning in sp_mk_generator
Silence warning from sp_mk_generator that 'is not' operator is not meant for integers. This replaces the referred instance with '!='.
Signed-off-by: J-A
fix(spm): silence warning in sp_mk_generator
Silence warning from sp_mk_generator that 'is not' operator is not meant for integers. This replaces the referred instance with '!='.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: I0d31ad65466dbeafebbfc929e506c3e290913aca
show more ...
|
| a4fab36d | 15-Jan-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(spm): not defining load-address in SP config" into integration |
| 9e72d01e | 05-Sep-2023 |
Harrison Mutai <harrison.mutai@arm.com> |
fix(memmap): fix footprint free space calculation
Calculate the free space as the range between the limit and the end of the memory region *_REGION_END.
Change-Id: I9cacadea2543c9f5ddaebca82344a836
fix(memmap): fix footprint free space calculation
Calculate the free space as the range between the limit and the end of the memory region *_REGION_END.
Change-Id: I9cacadea2543c9f5ddaebca82344a83678cd7d55 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 04e7f808 | 11-Jan-2024 |
J-Alves <joao.alves@arm.com> |
fix(spm): not defining load-address in SP config
The FF-A specification has made it such that SPs may optionally specify their load address in the manifest.
This info was being retrieved to generat
fix(spm): not defining load-address in SP config
The FF-A specification has made it such that SPs may optionally specify their load address in the manifest.
This info was being retrieved to generate some information for the SPMC manifest. However, it is not a mandatory utility.
This change relaxes the case in which the SP manifest doesn't have a load address.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: Ic4c1b1ec6666522900c113903be45ba0eb5d0bf6
show more ...
|
| 503cf992 | 10-Dec-2023 |
Andrey Skvortsov <andrej.skvortzov@gmail.com> |
refactor(juno): move plat_def_uuid_config to fiptool
The same was done for other platforms: stm32mp1, tc before in commit 034a2e3ef8a9e8e58f7cb7fab6db4ee60b2f9c29 ('refactor(fiptool): move plat_fipt
refactor(juno): move plat_def_uuid_config to fiptool
The same was done for other platforms: stm32mp1, tc before in commit 034a2e3ef8a9e8e58f7cb7fab6db4ee60b2f9c29 ('refactor(fiptool): move plat_fiptool.mk to tools')
Additionally this will make ignore generated files:
Untracked files: plat/arm/board/juno/fip/plat_def_uuid_config.d plat/arm/board/juno/fip/plat_def_uuid_config.o
Signed-off-by: Andrey Skvortsov <andrej.skvortzov@gmail.com> Change-Id: Ia5f1082fcd6d9dfc0be012759493e61ddb869956
show more ...
|
| 4f7e0fa3 | 01-Dec-2021 |
Takuya Sakata <takuya.sakata.wz@bp.renesas.com> |
fix(rcar3): fix load address range check
Fixed the check of the address range which the program is loaded to. Use the addresses and sizes in the BL31 and BL32 certificates to check that they are wit
fix(rcar3): fix load address range check
Fixed the check of the address range which the program is loaded to. Use the addresses and sizes in the BL31 and BL32 certificates to check that they are within the range of the target address and size defined inside the TF-A. It also uses the addresses and sizes in the BL33x certificates to check that they are outside the protected area defined inside the TF-A.
Signed-off-by: Hideyuki Nitta <hideyuki.nitta.jf@hitachi.com> Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> # Code clean up Change-Id: Iade15431fc86587489fb0ca9106f6baaf7e926e2
show more ...
|
| 8eb4efe7 | 04-Dec-2023 |
Henrik Nordstrom <henrik.nordstrom@addiva.se> |
fix(marvell-tools): include mbedtls/version.h before use
mbedtls/version.h needs to be included before the use of any mbedtls config variables.
Fixes a build failure regression from commit a8eadc51
fix(marvell-tools): include mbedtls/version.h before use
mbedtls/version.h needs to be included before the use of any mbedtls config variables.
Fixes a build failure regression from commit a8eadc51a.
Change-Id: Idd955d7955b0a55ffd127f31053335542cb15e22 Signed-off-by: Henrik Nordstrom <henrik.nordstrom@addiva.se>
show more ...
|
| 98735809 | 21-Nov-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
docs(changelog): changelog for v2.10 release
Added changelog for v2.10 release.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com>
docs(changelog): changelog for v2.10 release
Added changelog for v2.10 release.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com> Change-Id: Id06263047fcc1ec60e82f85cd09e2e4bc95830f5
show more ...
|
| 256c1c60 | 21-Nov-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Revert "docs(changelog): changelog for v2.10 release"
This reverts commit 0abbfab320344d4f2110e95d64863a3e82a51ec9.
Reason for revert: Changelog was based on rc0 tag but we got few more patches aft
Revert "docs(changelog): changelog for v2.10 release"
This reverts commit 0abbfab320344d4f2110e95d64863a3e82a51ec9.
Reason for revert: Changelog was based on rc0 tag but we got few more patches after that which were not captured.
Change-Id: I9829f2b6dc09f0bd5c538845cbae051f6e4c8a75
show more ...
|
| 0abbfab3 | 10-Nov-2023 |
Juan Pablo Conde <juanpablo.conde@arm.com> |
docs(changelog): changelog for v2.10 release
Change-Id: I44b88c3232d099b85ff71ee14c4918c4f8180146 Signed-off-by: Juan Pablo Conde <juanpablo.conde@arm.com> |
| bb3b0c0b | 16-Oct-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
fix(cert-create): fix key loading logic
When key_load() attempts to load the key from a file and it fails to open this file, the 'err_code' output argument is set to 'KEY_ERR_OPEN' error code. Howev
fix(cert-create): fix key loading logic
When key_load() attempts to load the key from a file and it fails to open this file, the 'err_code' output argument is set to 'KEY_ERR_OPEN' error code. However, it is incorrectly overwritten later on with 'KEY_ERR_NONE' or 'KEY_ERR_LOAD'.
The latter case messes up with the key creation scenario. The 'KEY_ERR_LOAD' error leads the tool to exit, when it should attempt to create the said key file if invoked with the --new-keys/-n option.
Note that, to complicate matters further, which of 'KEY_ERR_OPEN' or 'KEY_ERR_NONE' values is returned by key_load() depends on the version of OpenSSL in use:
- If using v3+, KEY_ERROR_LOAD is returned.
- If using <v3, KEY_ERROR_NONE is returned as a result of the key pair container being initialized by key_new().
This patch fixes this bug and also takes the opportunity to refactor key_load() implementation to (hopefully) make it more straight-forward and easier to reason about.
Fixes: 616b3ce27d9a "feat(cert-create): add pkcs11 engine support" Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> Reported-by: Wenchen Tan <xtaens@qq.com> Change-Id: Ia78ff442e04c5ff98e6ced8d26becbd817a8ccb7
show more ...
|
| c512c89c | 15-Aug-2023 |
laurenw-arm <lauren.wehrmeister@arm.com> |
feat(cert-create): ecdsa p384 key support
Adding ECDSA P384 (secp384r1) key creation support through key_bits obtained from KEY_SIZE.
Change-Id: I571251caef20222990bd927cdfb5f35bf2a185d0 Signed-off
feat(cert-create): ecdsa p384 key support
Adding ECDSA P384 (secp384r1) key creation support through key_bits obtained from KEY_SIZE.
Change-Id: I571251caef20222990bd927cdfb5f35bf2a185d0 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
show more ...
|
| 7c3ff62d | 26-Sep-2023 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "feat(fiptool): add ability to build statically" into integration |
| 4d4fec28 | 31-Aug-2023 |
Olivier Deprez <olivier.deprez@arm.com> |
feat(fiptool): add ability to build statically
Provide a STATIC command line build option for platforms willing to build fiptool statically and remove dependency to toolchain and OpenSSL libraries.
feat(fiptool): add ability to build statically
Provide a STATIC command line build option for platforms willing to build fiptool statically and remove dependency to toolchain and OpenSSL libraries.
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: I1d1b6676df50081828170e2b0ab7b71c4ec19d6e
show more ...
|
| 616b3ce2 | 12-Sep-2023 |
Robin van der Gracht <robin@protonic.nl> |
feat(cert-create): add pkcs11 engine support
Add pkcs11 engine support which allows using keys that are securely stored on a HSM or TPM. To use this feature the user has to supply an RFC 7512 compli
feat(cert-create): add pkcs11 engine support
Add pkcs11 engine support which allows using keys that are securely stored on a HSM or TPM. To use this feature the user has to supply an RFC 7512 compliant PKCS11 URI to a key instead of a file as an argument to one of the key options. This change is fully backwards compatible.
This change makes use of the openssl engine API which is deprecated since openssl 3.0 and will most likely be removed in version 4. So pkcs11 support will have to be updated to the openssl provider API in the near future.
Signed-off-by: Robin van der Gracht <robin@protonic.nl> Change-Id: If96725988ca62c5613ec59123943bf15922f5d1f
show more ...
|
| ea6f8452 | 19-Sep-2023 |
Robin van der Gracht <robin@protonic.nl> |
fix(cert-create): key: Avoid having a temporary value for pkey in key_load
key->key and k will point to the same if PEM_read_PrivateKey (pem_read_bio_key_decoder) succeeds. There is no need for the
fix(cert-create): key: Avoid having a temporary value for pkey in key_load
key->key and k will point to the same if PEM_read_PrivateKey (pem_read_bio_key_decoder) succeeds. There is no need for the temporary 'k' pointer here.
Signed-off-by: Robin van der Gracht <robin@protonic.nl> Change-Id: I219c49d331eb6dd7200b49b75d47fd66da3d82dd
show more ...
|
| 20629b31 | 14-Feb-2023 |
Karl Meakin <karl.meakin@arm.com> |
feat(sptool): generate `ARM_BL2_SP_LIST_DTS` file from `sp_layout.json`
TF-A makefile accepts a device-tree snippet to override hardcoded SP nodes, via the `ARM_BL2_SP_LIST_DTS` variable. However th
feat(sptool): generate `ARM_BL2_SP_LIST_DTS` file from `sp_layout.json`
TF-A makefile accepts a device-tree snippet to override hardcoded SP nodes, via the `ARM_BL2_SP_LIST_DTS` variable. However the SPs declared in `ARM_BL2_SP_LIST_DTS` must be in the same order as they are in the FIP image, otherwise hash authentication will fail when loaded by BL2.
This patch generates the `ARM_BL2_SP_LIST_DTS` file from the `sp_layout.json` file. The SPs in the FIP image are also generated from `sp_layout.json`, so this ensures that there is only one source of truth for the SP list, removing the possibility to have the lists disagree with each other.
Signed-off-by: Karl Meakin <karl.meakin@arm.com> Change-Id: I7d76715135c596605c6a02aad5196d967dfeb1ce
show more ...
|