Commit Graph

3543 Commits (c2a09abee8af43370785550c1f7867e2e51bb4e8)

Author SHA1 Message Date
Anna Bridge 4ba1a5433f
Merge pull request #13433 from LDong-Arm/refactor_device_key
Refactor device_key
2020-08-24 12:56:10 +01:00
Martin Kojtal 08ef04d027
Merge pull request #13468 from urutva/add-ccache-to-travis
Add ccache to travis
2020-08-24 08:47:27 +01:00
Martin Kojtal 7829238c61
Merge pull request #13469 from LDong-Arm/spellignore
Support ignore list for spell checks
2020-08-21 14:29:33 +01:00
Devaraj Ranganna fef4454359 ci: Enable `ccache` in Travis
Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2020-08-21 14:17:13 +01:00
Martin Kojtal 76d51a5b80
Merge pull request #13435 from urutva/fix-arm-none-eab-gcc-version
ci: Update `arm-none-eabi-` version
2020-08-21 13:50:44 +01:00
Lingkai Dong 8c610a6544 Spell checker: add an argument to pass file containing ignored patterns 2020-08-20 17:23:17 +01:00
RyoheiHagimoto db3cec4398 Added GR-MANGO to be a target.
Passed GreenTea CI.
Added RZ_A2XX and GR_MANGO to targets.json.
Added RZ_A2XX to mbedlib.json in lwipstack and netsocket/ppp.
Added TARGET_RZ_A2XX directory to targets/TARGET_RENESAS.
Added TARGET_RENESAS_EMAC directory to features/netsocket/emac-drivers.
Moved TARGET_RZ_A1_EMAC directory into the TARGET_RENESAS_EMAC directory below and renamed to TARGET_RZ_A1XX.
Added TARGET_RZ_A2XX directory to features/netsocket/emac-drivers/TARGET_RENESAS_EMAC.
2020-08-18 10:48:48 +09:00
Devaraj Ranganna 85e0199dd5 ci: Update `arm-none-eabi-` version
The `arm-none-eabi-` version is updated from version 6 to version 9.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2020-08-17 16:11:33 +01:00
Lingkai Dong a59bace6f2 Add technical terms to spell checker ignore list 2020-08-17 10:13:53 +01:00
Anna Bridge 88d931384f
Merge pull request #13358 from RaymondNgun/topic/cytfm_064b0s2_4343w
Add CYTFM_064B0S2 4343W Target
2020-08-11 10:52:39 +01:00
Martin Kojtal afcefd6e46
Merge pull request #13294 from MultiTechSystems/dragonfly-new-bootloader
Update MTS_DRAGONFLY_F411RE bootloader to work with mbed 5 & 6
2020-08-10 11:44:39 +01:00
Raymond Ngun 1be0b1f297 CYTFM_064B0S2_4343W: Inital creation of PSA target
Target is similar to CY8CKIT_064B0S2_4343W but with PSA
and TFM enabled.

Signed-off-by: Raymond Ngun <raymond.ngun@cypress.com>
2020-08-07 08:02:01 -07:00
Qinghao Shi c4c120b390 TESTS: add new psa targets 2020-07-30 15:24:46 +01:00
Qinghao Shi 6167d46b91 TESTS: removed mbed OS 6 unsupported target in examples test 2020-07-30 15:24:20 +01:00
Rajkumar Kanagaraj 947d2d75b9 Fix spell check and astyle format issue 2020-07-23 06:22:15 -07:00
Ashok Rao fb2a009303 Adding NUCLEO_F429ZI to AWS example 2020-07-21 14:14:08 +01:00
Leon Lindenfelser 7d08698352 Update MTS_DRAGONFLY_F411RE bootloader to work with mbed 5 & 6 2020-07-14 15:26:36 -05:00
Vikas Katariya 486e72acaa tool: Use a different key to sign Non-secure image
This applies only to `ARM_MUSCA_B1` target
When MCUBOOT repo: UPSTREAM was set as default as part of TF-M 1.1
release, few things were changed:
MCUBOOT_IMAGE_NUMBER: '2'
MCUBOOT_UPGRADE_STRATEGY: 'OVERWRITE_ONLY'
MCUBOOT_HW_KEY: 'On'(default)

Therefore the signing strategy for Non-secure image (Mbed OS)
needs to be done with its own private key, which is validated during
boot.

Signed-off-by: Vikas Katariya <vikas.katariya@arm.com>
2020-07-13 16:37:48 +01:00
Martin Kojtal 4a0aaf1ce7
Merge pull request #13263 from Patater/update-tfm-20200709
psa: Update TF-M for ARM_MUSCA_B1
2020-07-10 13:25:28 +02:00
Martin Kojtal efe46b5aa1
Merge pull request #13011 from alzix/alzix/both-artifacts
Always build both .hex and .bin files
2020-07-10 09:31:32 +02:00
Jaeden Amero 2f2e4a95a1 psa: Update TF-M for ARM_MUSCA_B1 2020-07-09 15:40:38 +01:00
jeromecoutant 55cd5c4527 STM32L4: add missing sectors in arm pack manager file
For STM32L4Rx and STM32L4Sx, Dual Bank configuration is set by default
2020-07-06 15:51:21 +02:00
jeromecoutant 52f964f5c1 STM32F7 add sectors in arm pack manager file
For STM32F76x and STM32F77x, Single Bank configuration is set by default
2020-07-06 15:51:21 +02:00
jeromecoutant 62c67af09b STM32F4 add sectors in arm pack manager file 2020-07-06 15:51:20 +02:00
jeromecoutant a4f65a0506 STM32F3: add missing RAM in arm pack manager file 2020-07-06 15:51:20 +02:00
jeromecoutant a5003419e0 STM32F2: add missing sectors in arm pack manager file 2020-07-06 15:51:19 +02:00
Martin Kojtal 57809c4a37
Merge pull request #13171 from LDong-Arm/reenable_aws_example
Re-enable AWS example, limit targets
2020-07-03 10:15:43 +02:00
Martin Kojtal 6c27da57d9
Merge pull request #13122 from romanjoe/pr/add_cy8ckit_064b0b2_4343w
Cypress: Add target CY8CKIT_064B0S2_4343W, update psoc6pdl, psoc6cm0p
2020-06-24 09:36:39 +02:00
Lingkai Dong 183a4c7ecf mbed-os-example-aws: build for DISCO_L475VG_IOT01A and K64F 2020-06-22 16:39:25 +01:00
Lingkai Dong 8a09d308d5 Revert "disable compilation in CI"
This reverts commit d4e9267542.
2020-06-22 16:26:40 +01:00
Martin Kojtal 107d9bbf8a
Merge pull request #13070 from ithinuel/add_aws_example_to_build_list
add mbed-os-example-aws to the example list
2020-06-22 16:08:45 +02:00
Wilfried Chauveau d4e9267542
disable compilation in CI 2020-06-22 14:15:52 +01:00
Roman Okhrimenko fc42c74e7b Rework find_policy() in post build script to enable default locations 2020-06-19 16:16:54 +03:00
Roman Okhrimenko f689c05db7 Modify post build scripts to support only cysecuretools signing 2020-06-19 16:16:47 +03:00
Jaeden Amero b38c5ed8e3 examples: Add PSA example to list of examples 2020-06-18 12:16:30 +01:00
Devaraj Ranganna cd88e724f7 psa: Add a script to validate PSA targets
Add a script to parse `targets.json` to identify PSA targets and ensure
mandatory parameters are configured correctly for all PSA targets.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2020-06-18 12:16:29 +01:00
Devaraj Ranganna c9c593f7ca tools: Remove obsolete API
The API is_PSA_non_secure_target() uses obsolete labels to detect if a
target is PSA non-secure target and is not needed anymore.

Mbed OS depends on TF-M for PSA SPM and services. TF-M is built using
it's own build system. Therefore, we don't need to differentiate secure
and non-secure targets anymore in Mbed OS as all PSA targets in Mbed OS
are non-secure targets.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2020-06-18 12:16:28 +01:00
Devaraj Ranganna 939ed6940c tools: Improve PSA target identification logic
Current logic `is_TFM_target` relies on the availability of attribute
`tfm_target_name` to identify PSA targets. The API `is_TFM_target` is
used in pytest to validate PSA target configuration which again checks
the availability of `tfm_target_name`. If a target doesn't contain the
attribute `tfm_target_name` then this check will fail instead of
catching it. Therefore, we now check for `TFM` config option in `labels`
attribute.

The API `is_TFM_target()` returns true for Mbed OS PSA targets which are
supported by TF-M also.

Add a new API `is_PSA_target()` which returns true for all Mbed OS PSA
targets.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2020-06-18 12:16:26 +01:00
Devaraj Ranganna abccf97ebf psa: Import latest image signing scripts from TF-M
Import the latest image signing scripts from TF-M version
TF-Mv1.0-85-g3b7cc95a042c.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2020-06-18 12:16:22 +01:00
Devaraj Ranganna 76e911c5ef psa: Replace Mbed PSA with TF-M
Add TF-M to Mbed OS, replacing the previous PSA implementation for
TF-M-capable targets. This commit adds files imported from TF-M, without
modification. The version of TF-M imported can be found in
`features/FEATURE_PSA/TARGET_TFM/VERSION.txt`.

These changes switch to TF-M as the sole PSA implementation for v8-M and
dual core targets, with TF-M running on the secure side and Mbed OS
running on the non-secure side. Single core v7-M targets will continue
to have PSA implemented via PSA emulation, implemented by Mbed OS.

Move or remove many PSA-implementing files, as PSA will be provided by
TF-M on non-single-v7-M targets. Delete any files that are not relevant
for PSA emulation mode.
 - Remove imported TF-M SPM
 - Remove Mbed SPM and tests
 - Remove Mbed-implemented PSA services and tests
 - Remove PSA_SRV_IMPL, PSA_SRV_IPC, PSA_SRV_EMUL and NSPE.
 - Replace PSA_SRV_EMUL and PSA_SRV_IMPL with MBED_PSA_SRV
 - Remove any files autogenerated by
   "tools/psa/generate_partition_code.py", which no longer exists.

Add new feature `PSA` to support PSA in Mbed OS.

Move the Mbed OS implementation of PSA services for v7-M targets (which
employ PSA emulation, and don't yet use TF-M) to
features/FEATURE_PSA/TARGET_MBED_PSA_SRV. Update the `requires`
attribute in TESTS/configs/baremetal.json to avoid breaking baremetal
testing builds.

Update .astyleignore to match new directory structure

Update Mbed TLS importer to place files into FEATURE_PSA

Create the following generic PSA targets:

* `PSA_Target` (Root level PSA generic target)
* `PSA_V7_M` (Single v7-M PSA generic target)
* `PSA_DUAL_CORE` (Dual-core PSA generic target)
* `PSA_V8_M` (v8-M PSA generic target)

Flatten MUSCA_NS and private MUSCA targets into public MUSCA targets.

Move mcuboot.bin to flat location (removing prebuilt folder)

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
Signed-off-by: Jaeden Amero <jaeden.amero@arm.com>
2020-06-18 12:16:20 +01:00
Devaraj Ranganna e2af612a99 tools: Musca B1 signing strategy
Currently, the final binary (TF-M + Mbed OS) is signed after
concatenating TF-M and Mbed OS binaries. But TF-M signs the images
separately and then concatenates them. Update the Musca B1 signing
strategy to match TF-M.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2020-06-18 12:16:16 +01:00
Vikas Katariya 8252f3ee6e psa: Add TF-M utility scripts to python path
When python3 is enforced to build the ARM_MUSCA_A1 or ARM_MUSCA_B1
targets, it is unable to find binary utility tool scripts which are
imported from TF-M.

The reason to use the python3 environment is as follows: Mbed OS + TFM
contained a faulty boot record TLV, which failed the attestation test
(TF-M regression). The data in the boot record TLV will be included in
the generated attestation token as 1 item in the SW_COMPONENTS claim.

This data (in the boot record TLV) is pre-encoded in CBOR format at
build time and appended to the image during the image signing process
(done by the imgtool Python3 script).

Signed-off-by: Vikas Katariya <vikas.katariya@arm.com>
2020-06-18 12:16:13 +01:00
Martin Kojtal 9fc12213f4
Merge pull request #13135 from MultiTechSystems/mts-mdot-bootloader
Restore MTS_MDOT_F411RE bootloader binary
2020-06-18 11:29:10 +02:00
Martin Kojtal 86dad5cda9
Merge pull request #12471 from AGlass0fMilk/adc-voltage-api
Extend AnalogIn API: read_voltage
2020-06-17 19:57:28 +02:00
Taylor Heck f145594b28 Restore MTS_MDOT_F411RE bootloader binary 2020-06-17 09:27:30 -05:00
Martin Kojtal 31748ed1a9
Merge pull request #13036 from jeromecoutant/PR_GENPERIPH_V12
STM32_gen_PeripheralPins.py script v1.12
2020-06-17 12:14:20 +02:00
Martin Kojtal 93be66e91e
Merge pull request #13081 from ARMmbed/rw-post-build-hooks
Reinstate post build hooks for legacy targets
2020-06-10 12:02:05 +02:00
Rob Walton f8f59fc1ef Add a coverage_patterns kwarg to ARM_MICRO 2020-06-09 09:41:08 +01:00
Rob Walton 6ee9b161e3 Reintroduce mts_dot combine_bins. 2020-06-08 13:12:23 +01:00
Rob Walton 422931208c Reintroduce LPC4088 and Teensy3.1 post build hooks 2020-06-08 13:11:49 +01:00