Commit Graph

3079 Commits (7ec1663dd7859eb1470e8b9c255910e3c4ddeb8e)

Author SHA1 Message Date
Martin Kojtal 659c099ff7
Merge pull request #10625 from jamesbeyond/example_test
TESTS: update examples.json to enable testing
2019-05-24 12:19:35 +01:00
Martin Kojtal ab82f1fca6
Merge pull request #10627 from devran01/remove_future_sequana_target
Remove targets FUTURE_SEQUANA_M0_PSA and FUTURE_SEQUANA_PSA
2019-05-24 12:16:10 +01:00
Alexander Zilberkant 67905bddae Use build directory in postbuild
Use build directory instead of temp directory for for
intermediate files during binaries merge.
2019-05-22 17:17:27 +03:00
Michael Schwarcz 96268d91ef Updates after rebase
- postbuild: Use find_secure_image and update prebuilt binaries
- Add CMSIS driver headers
- Align with 2-region memory model
2019-05-22 17:17:23 +03:00
Michael Schwarcz 36a8514dbd Add documentation on Musca-A1 signing key 2019-05-22 17:17:22 +03:00
Michael Schwarcz ff1c769c7e Add ARM_MUSCA_A1 as a new target platform
Musca-A1 is a Cortex-M33 based target with security extension enabled.

- ARM_MUSCA_A1 is the non-secure target running mbed-os.
- ARM_MUSCA_A1_S is the secure target running TF-M.
- TF-M sources were imported and patched in previous commits.
- TF-M secure bootloader (McuBoot) for MUSCA_A1 is submitted by a pre-built binary.
- A post-build hook concatenates The secure and non-secure binaries,
  signs it and then concatenates the bootloader with the signed binary.
2019-05-22 17:17:20 +03:00
Devaraj Ranganna 29dfab93bb Replace FUTURE_SEQUANA_M0_PSA and FUTURE_SEQUANA_PSA targets with
CY8CKIT_062_WIFI_BT_M0_PSA and CY8CKIT_062_WIFI_BT_PSA in config test

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2019-05-22 10:20:57 +01:00
Martin Kojtal 77ca32dd57
Merge pull request #10606 from jeromecoutant/PR_PSAscript
PSA release script update: add toolchain option
2019-05-21 15:06:10 +01:00
Devaraj Ranganna 7765d39283 The targets FUTURE_SEQUANA_M0_PSA and FUTURE_SEQUANA_PSA are removed
due to partial implementation. Having FUTURE_SEQUANA_M0 and
FUTURE_SEQUANA PSA targets is misleading.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2019-05-21 15:00:31 +01:00
Qinghao Shi 09e21a20d2 TESTS: update examples.json to enable testing 2019-05-21 14:27:10 +01:00
Martin Kojtal 7d0cc69fb1
Merge pull request #10521 from jamesbeyond/example_test
TEST: update python script to enable examples smoke test
2019-05-21 10:07:28 +01:00
Qinghao Shi 35eeef55a1 fix a bug where base_path was wrong 2019-05-19 00:32:39 +01:00
Qinghao Shi 3bb0a8aded fix a bug when STDOUT has less than 5 lines 2019-05-18 23:57:23 +01:00
jeromecoutant 79ea26614b PSA release script update: add toolchain option 2019-05-17 16:32:49 +02:00
Anna Bridge 9fb4429379
Merge pull request #10520 from kjbracey-arm/build_tz_heuristic
Permit non-TrustZone ARMv8 build
2019-05-17 11:06:55 +01:00
Qinghao Shi 48e1a56e0e add a comment based on review 2019-05-15 23:31:58 +01:00
Martin Kojtal 998d85f80b
Merge pull request #10505 from orenc17/imporve_importer
Improve importer.py
2019-05-13 14:15:21 +01:00
Martin Kojtal 571caad59e
Merge pull request #10539 from bridadan/fix_armc6_mbed_studio
Add mbed studio flag during assembly
2019-05-13 14:08:57 +01:00
Qinghao Shi 71d7970fc5 fix issues base on the review 2019-05-10 17:48:15 +01:00
Anna Bridge 97e1c9cbaf
Merge pull request #10287 from linlingao/pr10177
Enable MTS_DRAGONFLY_F411RE to register with Pelion
2019-05-10 16:21:46 +01:00
Brian Daniels fb62ed643c Add mbed studio flag during assembly 2019-05-07 11:45:30 -05:00
Kevin Bracey 65e0887ef3 Permit non-TrustZone ARMv8 build
Change the heuristic for selection of CMSE in the tools python, so that
a non-TrustZone ARMv8 build can happen.

Ideally we would have more direct flagging in the targets, but this
refines the heuristic so the necessary behaviour can be easily
achieved.

* DOMAIN_NS=1 is based purely on the `-NS` suffix on the core name.

* Enabling CMSE in the compiler and outputting a secure import library
  is now enabled when the core doesn't have an `-NS` suffix by either
  the target label `TFM` being present or the flag `trustzone` being set.

This covers the existing ARMv8-M behaviour - TF-M builds have the TFM
label, as per its documentation; M2351 secure builds have no explicit
flagging, so we ensure that the M2351_NS target has the trustzone flag
set, and the out-of-tree secure target inherits that.
2019-05-03 13:36:38 +03:00
Lin Gao 2c22f549e9 Add option to keep post_binary_hook and make it default. It can be disabled by setting it to null 2019-05-02 11:25:20 -05:00
Qinghao Shi b2611fb801 TEST: update python script to enable example smoke test
* it will check examples.json if contains 'test', 'compare_log', 'baud_rate' keys
 * it will dump test_spec.json test in examples compiled successfully
2019-05-02 15:26:15 +01:00
Martin Kojtal 00f461eee0
Merge pull request #10447 from kfnta/alzix/byos
PSA Bring Your Own Service
2019-05-02 08:54:25 +01:00
Alexander Zilberkant cae568ca07 Add Cortex-M33E to cpu conversion table for ARMC6 2019-04-30 14:55:46 +03:00
Alexander Zilberkant 5f2991dcc7
Handle Cortex-M33E no-fpu flags
Add compilation "-mfpu=none" flag for Cortex-M33E.
2019-04-30 14:48:38 +03:00
Alexander Zilberkant fe9eac78c2 Update PSA tools Readme 2019-04-30 14:41:09 +03:00
Alexander Zilberkant 91505184d3 Integrate with mbeb-cli build system
PSA code generation will be called automatically upon mbed invocation.
The autogenerated files will be created under <mbed-os-root>/PSA_AUTOGEN directory.
2019-04-30 14:41:09 +03:00
Oren Cohen f58e600d6e Fix armclang fpu detection 2019-04-30 14:11:54 +03:00
Alexander Zilberkant 8c5ba9154d Update PSA code generator
Unify TF-M and Mbed-SPM code generators:
 - Unify SPM initialization logic:
   - All partitions are registered at once
   - Test partitions are guarded by #ifndef
   - Introduce single template list
 - Beatify template files and add "Autogen-do not modify" notice
Prepare for integration with mbed-os build system:
 - Generate all the files in a single place
Simplify tools/psa/release.py script
2019-04-30 14:10:23 +03:00
Martin Kojtal 8a92271a3b
Merge pull request #10448 from fredlee12001/master
Size should be calculate after confirm the final start address
2019-04-30 09:46:39 +01:00
Martin Kojtal a85b70e53f
Merge pull request #10477 from VeijoPesonen/config_mesh_wisun
Wi-SUN: adds greentea test config
2019-04-30 09:40:35 +01:00
Martin Kojtal 360b7bb033
Merge pull request #10443 from bridadan/fix_binary_notify
Fix for downloading the wrong binary in the online compiler
2019-04-30 09:20:12 +01:00
Martin Kojtal 47205bfd02
Merge pull request #10502 from kfnta/feature_trusted-firmware-m_f2dea5b
PSA: TFM import
2019-04-30 09:12:37 +01:00
Martin Kojtal 39699d53be
Merge pull request #10398 from bridadan/official_release_changes
Clean up ARM toolchains from get_mbed_official_release()
2019-04-29 13:39:12 +01:00
Oren Cohen d1fa7bd277 Use a directory context to simplify git commands 2019-04-29 14:13:16 +03:00
Oren Cohen be8a1e804f Use argparse.FileType to parse config file 2019-04-29 14:10:59 +03:00
Oren Cohen ca5dff69f5 Extract import logic to a separate method 2019-04-29 14:09:34 +03:00
Oren Cohen b24f42f5ba Move regex to the using function 2019-04-29 14:08:30 +03:00
Oren Cohen bd5d059b13
Set log level during argument parsing 2019-04-29 00:37:16 +03:00
Oren Cohen 6f19ba093a
Proper documentation 2019-04-29 00:11:39 +03:00
Oren Cohen 8a2426d6da
Styling and annoyances 2019-04-28 23:53:00 +03:00
Oren Cohen c0a1c45ae5
Use custom agrparse.Action to handle input parameters 2019-04-28 23:48:30 +03:00
Oren Cohen 09af58fad5
Use regex to find cherry-pick message 2019-04-28 23:44:18 +03:00
Oren Cohen 3273edba8d Allow comments in commit SHA list 2019-04-28 20:05:41 +03:00
Oren Cohen e15068d728 Refactor continuation logic 2019-04-28 20:03:08 +03:00
Oren Cohen d26bca7be8 Make sure the script is run from within mbed-os directory 2019-04-28 20:02:19 +03:00
Oren Cohen edcde5ebc0 Reformat and Improve 2019-04-28 20:01:06 +03:00
Oren Cohen 14ad60ae01 Update commit sha's 2019-04-28 15:48:18 +03:00