| a89412a6 | 20-Jan-2022 |
Jiafei Pan <Jiafei.Pan@nxp.com> |
fix(nxp-tools): fix tool location path for byte_swape
Fix byte_swape tool's location.
Signed-off-by: Jiafei Pan <Jiafei.Pan@nxp.com> Change-Id: I63856a8d62aeb5eb0b41b2b0dc671de96302aa1d |
| 5ac60ea1 | 08-Feb-2022 |
Imre Kis <imre.kis@arm.com> |
build(sptool): handle uuid field in SP layout file
Extract the UUID from the SP layout JSON file if the optional 'uuid' field exists otherwise fall back to the current method for extracting the SP U
build(sptool): handle uuid field in SP layout file
Extract the UUID from the SP layout JSON file if the optional 'uuid' field exists otherwise fall back to the current method for extracting the SP UUID from the partition manifest file.
This change gives a way to decouple TF-A's dependency on the SP manifest file's format which is tied to the SPMC.
Signed-off-by: Imre Kis <imre.kis@arm.com> Change-Id: I13af066c1de58bfb9c3fd470ee137ea0275cd98c
show more ...
|
| b06344a3 | 07-Jan-2022 |
Anders Dellien <anders.dellien@arm.com> |
fix(sptool): add leading zeroes in UUID conversion
The UUID conversion drops leading zeroes, so make sure that all hex strings always are 8 digits long
Signed-off-by: Anders Dellien <anders.dellien
fix(sptool): add leading zeroes in UUID conversion
The UUID conversion drops leading zeroes, so make sure that all hex strings always are 8 digits long
Signed-off-by: Anders Dellien <anders.dellien@arm.com> Change-Id: I5d7e3cf3b53403a02bf551f35f17dbdb96dec8ae
show more ...
|
| 8edd19e4 | 01-Dec-2021 |
Chris Kay <chris.kay@arm.com> |
chore(npm): update package versions/license
These fields were not updated accidentally on the v2.6.0 release.
Change-Id: I215105da618ff6f72057eaa40a34ff4b24f7ee36 Signed-off-by: Chris Kay <chris.ka
chore(npm): update package versions/license
These fields were not updated accidentally on the v2.6.0 release.
Change-Id: I215105da618ff6f72057eaa40a34ff4b24f7ee36 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| dd14d0f6 | 22-Dec-2021 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "fix(fiptool): respect OPENSSL_DIR" into integration |
| ab556c9c | 18-Dec-2021 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(fiptool): avoid packing the zero size images in the FIP
Updated the fiptool to avoid packing the zero size images in the FIP. Also, updated the commitlint-json file to cover the fiptool changes
fix(fiptool): avoid packing the zero size images in the FIP
Updated the fiptool to avoid packing the zero size images in the FIP. Also, updated the commitlint-json file to cover the fiptool changes under a separate scope.
Change-Id: Id7ac3dcff0c7318546e49308d0f17b6cbd5eb24b Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 0a956f81 | 25-Oct-2021 |
Ross Burton <ross.burton@arm.com> |
fix(fiptool): respect OPENSSL_DIR
fiptool links to libcrypto, so as with the other tools it should respect OPENSSL_DIR for include/library paths.
Change-Id: Icd8c15fa5097db1da9a3a9222d9e267548c4c7e
fix(fiptool): respect OPENSSL_DIR
fiptool links to libcrypto, so as with the other tools it should respect OPENSSL_DIR for include/library paths.
Change-Id: Icd8c15fa5097db1da9a3a9222d9e267548c4c7e2 Signed-off-by: Ross Burton <ross.burton@arm.com>
show more ...
|
| c4e8edab | 09-Nov-2021 |
Chris Kay <chris.kay@arm.com> |
build(docs): introduce release script
This change introduces a new NPM run script to automatically generate the release changelog, as well as bump version numbers across the code-base and create the
build(docs): introduce release script
This change introduces a new NPM run script to automatically generate the release changelog, as well as bump version numbers across the code-base and create the release tag.
This script runs [Standard Version] to execute this, which is a tool designed around automating substantial parts of the release process. This can be done by running:
npm run release -- [<standard-version args>]
Standard Version expects the project to adhere to the [Semantic Versioning] convention which TF-A does not, so you may need to specify the version manually, e.g.:
npm run release -- --release-as 2.6.0
Individual steps of the release process may also be skipped at-will, which may be necessary when, for example, tweaking the changelog:
npm run release -- --skip.commit --skip.tag
Standard Version is configured by the `.versionrc.js` file, which contains information about the Conventional Commits types and scopes used by the project, and how they map to the changelog.
To maintain continuity with the existing changelog style - at least to the extent possible in the move from manual to automatic creation - a customized changelog template has been introduced, based on the Conventional Commits template provided by Standard Version.
This template package extends the Conventional Commits template package by introducing support for parsing the Conventional Commits scopes into changelog sections, similarly to how they were previously organized.
[Standard Version]: https://github.com/conventional-changelog/standard-version [Semantic Versioning]: https://semver.org
Change-Id: I5bafa512daedc631baae951651c38c1c62046b0a Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 1d651211 | 06-Oct-2021 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "za/feat_rme" into integration
* changes: refactor(gpt): productize and refactor GPT library feat(rme): disable Watchdog for Arm platforms if FEAT_RME enabled docs(rme
Merge changes from topic "za/feat_rme" into integration
* changes: refactor(gpt): productize and refactor GPT library feat(rme): disable Watchdog for Arm platforms if FEAT_RME enabled docs(rme): add build and run instructions for FEAT_RME fix(plat/fvp): bump BL2 stack size fix(plat/fvp): allow changing the kernel DTB load address refactor(plat/arm): rename ARM_DTB_DRAM_NS region macros refactor(plat/fvp): update FVP platform DTS for FEAT_RME feat(plat/arm): add GPT initialization code for Arm platforms feat(plat/fvp): add memory map for FVP platform for FEAT_RME refactor(plat/arm): modify memory region attributes to account for FEAT_RME feat(plat/fvp): add RMM image support for FVP platform feat(rme): add GPT Library feat(rme): add ENABLE_RME build option and support for RMM image refactor(makefile): remove BL prefixes in build macros feat(rme): add context management changes for FEAT_RME feat(rme): add Test Realm Payload (TRP) feat(rme): add RMM dispatcher (RMMD) feat(rme): run BL2 in root world when FEAT_RME is enabled feat(rme): add xlat table library changes for FEAT_RME feat(rme): add Realm security state definition feat(rme): add register definitions and helper functions for FEAT_RME
show more ...
|
| 5b18de09 | 11-Jul-2021 |
Zelalem Aweke <zelalem.aweke@arm.com> |
feat(rme): add ENABLE_RME build option and support for RMM image
The changes include:
- A new build option (ENABLE_RME) to enable FEAT_RME
- New image called RMM. RMM is R-EL2 firmware that manage
feat(rme): add ENABLE_RME build option and support for RMM image
The changes include:
- A new build option (ENABLE_RME) to enable FEAT_RME
- New image called RMM. RMM is R-EL2 firmware that manages Realms. When building TF-A, a path to RMM image can be specified using the "RMM" build flag. If RMM image is not provided, TRP is built by default and used as RMM image.
- Support for RMM image in fiptool
Signed-off-by: Zelalem Aweke <zelalem.aweke@arm.com> Change-Id: I017c23ef02e465a5198baafd665a60858ecd1b25
show more ...
|
| a6db44ad | 05-Oct-2021 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes Ie7c0eaf2,I11d882f3,I3f173ac4,If1fa12bf,I3e3a202f, ... into integration
* changes: feat(plat/rcar3): keep RWDT enabled feat(drivers/rcar3): add extra offset if booting B-side fea
Merge changes Ie7c0eaf2,I11d882f3,I3f173ac4,If1fa12bf,I3e3a202f, ... into integration
* changes: feat(plat/rcar3): keep RWDT enabled feat(drivers/rcar3): add extra offset if booting B-side feat(plat/rcar3): modify LifeC register setting for R-Car D3 feat(plat/rcar3): modify SWDT counter setting for R-Car D3 feat(plat/rcar3): update DDR setting for R-Car D3 feat(plat/rcar3): remove access to RMSTPCRn registers in R-Car D3 feat(plat/rcar3): add process of SSCG setting for R-Car D3 feat(plat/rcar3): add process to back up X6 and X7 register's value feat(plat/rcar3): modify operation register from SYSCISR to SYSCISCR feat(plat/rcar3): add SYSCEXTMASK bit set/clear in scu_power_up feat(plat/rcar3): change the memory map for OP-TEE feat(plat/rcar3): use PRR cut to determine DRAM size on M3 feat(plat/rcar3): apply ERRATA_A53_1530924 and ERRATA_A57_1319537 fix(plat/rcar3): fix disabling MFIS write protection for R-Car D3 fix(plat/rcar3): fix eMMC boot support for R-Car D3 fix(plat/rcar3): fix version judgment for R-Car D3 fix(plat/rcar3): fix source file to make about GICv2 fix(drivers/rcar3): console: fix a return value of console_rcar_init
show more ...
|
| dcdbcdde | 11-May-2021 |
Olivier Deprez <olivier.deprez@arm.com> |
fix: SP UUID little to big endian in TF-A build
The UUID field in SP manifest DTS is represented as an array of four integers that the SPMC consumes using the little endian representation. The reaso
fix: SP UUID little to big endian in TF-A build
The UUID field in SP manifest DTS is represented as an array of four integers that the SPMC consumes using the little endian representation. The reason is that those values are directly mapped to the SMCCC section 5.3 recommendation and the way they are exposed to the FFA_PARTITION_INFO_GET interface.
Per [1] TF-A build flow expects a big endian representation of the UUID so the sp_mk_generator script is updated to accommodate this conversion.
[1] https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/9563
Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: I7c7b295225e23ea64f49170e27d97442b289703b
show more ...
|
| a4d821a5 | 12-Jul-2021 |
Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> |
feat(plat/rcar3): change the memory map for OP-TEE
The memory area size of OP-TEE was changed from 1MB to 2MB because the size of OP-TEE has increased.
Signed-off-by: Toshiyuki Ogasahara <toshiyuki
feat(plat/rcar3): change the memory map for OP-TEE
The memory area size of OP-TEE was changed from 1MB to 2MB because the size of OP-TEE has increased.
Signed-off-by: Toshiyuki Ogasahara <toshiyuki.ogasahara.bo@hitachi.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> Change-Id: Ic8a165c83a3a9ef2829f68d5fabeed9ccb6da95e
show more ...
|
| 8d0036d3 | 18-Nov-2019 |
Nicolas Le Bayon <nicolas.le.bayon@st.com> |
fix(tools/stm32image): improve the tool
Add parameters to fill header version: Two new options are added (m and n) to fill header version major and minor. The default is v1.0 (major = 1, minor = 0)
fix(tools/stm32image): improve the tool
Add parameters to fill header version: Two new options are added (m and n) to fill header version major and minor. The default is v1.0 (major = 1, minor = 0)
Fix image header on big endian hosts: Three header fields are not properly converted to little endian before assignment, resulting in incorrect header while executing stm32image on big endian hosts.
Convert the value of the header fields version_number, image_checksum and edcsa_algorithm to little endian before the assignment.
Don't force the base of strtol, since it's able to select the base automatically depending on the prefix of the value. This does not breaks the current build script that extracts the addresses, including the 0x prefix, from the map file. This change helps using stm32image in shell scripts where the addresses can be computed using the shell arithmetic expansion "$((...))", that produces a value in base decimal.
The variable stm32image_header is declared with global visibility but is use in one function only, move it as local variable in the function.
Fix error message on destination file: The error message on mmap() failure of destination file reports incorrectly information about the source file. Change the error message to match the file that causes the error.
Change-Id: Iebc8c915297306845b3847b32f9516443a515c97 Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Antonio Borneo <antonio.borneo@st.com> Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@st.com>
show more ...
|
| dbeab0da | 25-Mar-2021 |
Pali Rohár <pali@kernel.org> |
fiptool: Do not call 'make clean' in 'all' target
Calling 'make clean' in 'all' target is causing recompilation of binary at every 'make' call, which is wrong.
Also building a new target via 'make
fiptool: Do not call 'make clean' in 'all' target
Calling 'make clean' in 'all' target is causing recompilation of binary at every 'make' call, which is wrong.
Also building a new target via 'make TARGET' can cause infinite loop as it is not defined as explicit make dependency. Dependent targets must be specified after colon when defining target, which also prevents infinite loops as make is able to detect these circular dependencies.
Moreover calling 'make clean' is supposed to be done by user when configuration is changing.
So remove calling 'make clean' in 'all' target and define dependency for '${PROJECT}' at correct place.
Signed-off-by: Pali Rohár <pali@kernel.org> Change-Id: I70e7fd2b04b02f6a0650c82df91d58c9a4cb24d9
show more ...
|
| 32669476 | 09-Dec-2020 |
Pankaj Gupta <pankaj.gupta@nxp.com> |
nxp-tool: for creating pbl file from bl2
NXP tool to create pbl from bl2 binary: - RCW is prepended to BL2.bin - If TRUSTED_BOARD_BOOT=1, pre-append the CSF header to be understood by NXP boot-rom.
nxp-tool: for creating pbl file from bl2
NXP tool to create pbl from bl2 binary: - RCW is prepended to BL2.bin - If TRUSTED_BOARD_BOOT=1, pre-append the CSF header to be understood by NXP boot-rom.
Signed-off-by: Pankaj Gupta <pankaj.gupta@nxp.com> Change-Id: Iddc7336a045222e2073ddad86358ebc4440b8bcf
show more ...
|
| 3527d6d2 | 09-Dec-2020 |
Pankaj Gupta <pankaj.gupta@nxp.com> |
tools: add mechanism to allow platform specific image UUID
Generic framework is added to include platform defined UUID.
This framework is added for the following: - All NXP SoC based platforms need
tools: add mechanism to allow platform specific image UUID
Generic framework is added to include platform defined UUID.
This framework is added for the following: - All NXP SoC based platforms needed additional fip-fuse.bin - NXP SoC lx2160a based platforms requires additional fip-ddr.bin
Signed-off-by: Pankaj Gupta <pankaj.gupta@nxp.com> Change-Id: Ibe05d9c596256e34077287a490dfcd5b731ef2cf
show more ...
|
| b94bf967 | 09-Dec-2020 |
Pankaj Gupta <pankaj.gupta@nxp.com> |
cert_create: updated tool for platform defined certs, keys & extensions
Changes to 'tools/cert_create' folder, to include platform defined certificates, keys, and extensions.
NXP SoC lx2160a : base
cert_create: updated tool for platform defined certs, keys & extensions
Changes to 'tools/cert_create' folder, to include platform defined certificates, keys, and extensions.
NXP SoC lx2160a : based platforms requires additional FIP DDR to be loaded before initializing the DDR.
To enable chain of trust on these platforms, FIP DDR image needs to be authenticated, additionally.
Platform specific folder 'tools/nxp/cert_create_helper' is added to support platform specific macros and definitions.
Signed-off-by: Pankaj Gupta <pankaj.gupta@nxp.com> Change-Id: I4752a30a9ff3aa1d403e9babe3a07ba0e6b2bf8f
show more ...
|
| 5bc6f284 | 28-Jan-2021 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "tools: cert_create: Create only requested certificates" into integration |
| 42ea70e8 | 27-Jan-2021 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge "cert-tool: avoid duplicates in extension stack" into integration |
| 1ed941c0 | 20-Jan-2021 |
Jimmy Brisson <jimmy.brisson@arm.com> |
cert-tool: avoid duplicates in extension stack
This bug manifests itself as a segfault triggered by a double-free.
I noticed that right before the double-free, the sk list contained 2 elements with
cert-tool: avoid duplicates in extension stack
This bug manifests itself as a segfault triggered by a double-free.
I noticed that right before the double-free, the sk list contained 2 elements with the same address.
(gdb) p sk_X509_EXTENSION_value(sk, 1) $34 = (X509_EXTENSION *) 0x431ad0 (gdb) p sk_X509_EXTENSION_value(sk, 0) $35 = (X509_EXTENSION *) 0x431ad0 (gdb) p sk_X509_EXTENSION_num(sk) $36 = 2
This caused confusion; this should never happen.
I figured that this was caused by a ext_new_xxxx function freeing something before it is added to the list, so I put a breakpoint on each of them to step through. I was suprised to find that none of my breakpoints triggered for the second element of the iteration through the outer loop just before the double-free.
Looking through the code, I noticed that it's possible to avoid doing a ext_new_xxxx, when either: * ext->type == NVCOUNTER and ext->arg == NULL * ext->type == HASH and ext->arg == NULL and ext->optional == false So I put a breakpoint on both.
It turns out that it was the HASH version, but I added a fix for both. The fix for the Hash case is simple, as it was a mistake. The fix for the NVCOUNTER case, however, is a bit more subtle. The NVCOUNTER may be optional, and when it's optional we can skip it. The other case, when the NVCOUNTER is required (not optinal), the `check_cmd_params` function has already verified that the `ext->arg` must be non-NULL. We assert that before processing it to covert any possible segfaults into more descriptive errors.
This should no longer cause double-frees by adding the same ext twice.
Change-Id: Idae2a24ecd964b0a3929e6193c7f85ec769f6470 Signed-off-by: Jimmy Brisson <jimmy.brisson@arm.com>
show more ...
|
| 294e2656 | 26-Jan-2021 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
tools: cert_create: Create only requested certificates
The certification tool creates all the certificates mentioned statically in the code rather than taking explicit certificate requests from the
tools: cert_create: Create only requested certificates
The certification tool creates all the certificates mentioned statically in the code rather than taking explicit certificate requests from the command line parameters.
Code is optimized to avoid unnecessary attempts to create non-requested certificates.
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com> Change-Id: I78feac25bc701bf8f08c6aa5a2e1590bec92d0f2
show more ...
|
| 6b2924bb | 20-Jan-2021 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes Ic9bacaf3,I99a18dbb,I34803060,I3ed55aa4,Ic8eed072, ... into integration
* changes: doc: renesas: Update RZ/G2 code owner list plat: renesas: rzg: DT memory node enhancements rene
Merge changes Ic9bacaf3,I99a18dbb,I34803060,I3ed55aa4,Ic8eed072, ... into integration
* changes: doc: renesas: Update RZ/G2 code owner list plat: renesas: rzg: DT memory node enhancements renesas: rzg: emmc: Enable RZ/G2M support plat: renesas: rzg: Add HopeRun HiHope RZ/G2M board support drivers: renesas: rzg: Add HiHope RZ/G2M board support tools: renesas: Add tool support for RZ/G2 platforms
show more ...
|
| dfa04b3d | 15-Jan-2021 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes from topic "certtool-memleak" into integration
* changes: Use preallocated parts of the HASH struct Free arguments copied with strdup Free keys after use Free X509_EXTENSIONs |
| 6369498c | 07-Dec-2020 |
Biju Das <biju.das.jz@bp.renesas.com> |
tools: renesas: Add tool support for RZ/G2 platforms
Add tool support for creating bootparam and cert_header images for RZ/G2 SoC based platforms.
Signed-off-by: Biju Das <biju.das.jz@bp.renesas.co
tools: renesas: Add tool support for RZ/G2 platforms
Add tool support for creating bootparam and cert_header images for RZ/G2 SoC based platforms.
Signed-off-by: Biju Das <biju.das.jz@bp.renesas.com> Reviewed-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Change-Id: Iab8ba6eda442c8d75f23c5633b8178f86339e4c9
show more ...
|