Skip to content

west.yml: Bump tf-m with stm32 patches #93520

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

nandojve
Copy link
Member

This patches are necessary to make STM32U5Axxx works with TF-M.

Tested with

west build -p -b b_u585i_iot02a/stm32u585xx/ns samples/tfm_integration/tfm_ipc
./build/tfm/api_ns/regression.sh
west flash

press reset button

[INF] BANK 1 secure flash [0, 75] : OB [0, 127]
[ERR] Unexpected value for secure flash protection: set wmsec1
[INF] BANK 2 secure flash [127, 0] : OB [0, 127]
[INF] BANK 1 flash write protection [10, 21] : OB [127, 0]
[ERR] Unexpected value for write protection : set wrp1
[INF] BANK 1 secure user flash [8, 20] : OB [0, 0]
[ERR] Unexpected value for secure user flash protection : set hdp1
[INF] BANK 1 secure flash [0, 75] : OB [8, 75]
[ERR] Unexpected value for secure flash protection: set wmsec1
[INF] Starting bootloader
[WRN] This device was provisioned with dummy keys. This device is NOT SECURE
[INF] Primary image: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
[INF] Scratch: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
[INF] Boot source: primary slot
[INF] Image index: 1, Swap type: none
[INF] Primary image: magic=bad, swap_type=0x1, copy_done=0x3, image_ok=0x3
[INF] Scratch: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
[INF] Boot source: none
[INF] Image index: 0, Swap type: none
[INF] Bootloader chainload address offset: 0x38000
[INF] Image version: v0.0.0
[INF] Jumping to the first image slot
Booting TF-M v2.2.0+gdf04cce18
[WRN] This device was provisioned with dummy keys. This device is NOT SECURE
[Sec Thread] Secure image initializing!
Creating an empty ITS flash layout.
Creating an empty PS flash layout.
[INF][PS] Encryption alg: 0x5500200
[INF][Crypto] Init HW accelerator...
[INF][Crypto] Init HW accelerator... complete.
*** Booting Zephyr OS build v4.2.0-301-g3d4020728bce ***
TF-M IPC on b_u585i_iot02a
The version of the PSA Framework API is 257.
The PSA Crypto service minor version is 1.
Generating 256 bytes of random data:
EC 3D 3E B7 C1 02 14 10 6A 23 93 9F A7 80 BF CC 
CF E0 0A 62 71 B5 A2 38 3D 17 78 CE DA 9F 1D A6 
18 C4 E7 5B 86 AD 86 F5 A7 B2 3B A0 89 F8 A5 56 
94 E6 E3 6B 37 18 02 B7 AB B8 F9 78 BA 4A 63 D2 
B2 F7 A2 71 66 70 14 35 15 33 B0 86 B8 55 78 C9 
BD FB 63 9A FD 50 55 61 9E 5E 76 05 C6 16 83 0D 
3B 51 AE E6 93 2B 99 D9 77 1D F0 0D 0B E0 2B B6 
D7 0B 17 E8 9B 59 2C 07 60 2A 58 EA 28 AF A6 A6 
67 FB E7 C1 D2 A5 A8 A8 DE 6B 03 20 49 35 DE 8A 
D0 A4 47 DB 7F 40 70 D8 FC 5D 80 28 4C F2 03 09 
C9 BB 64 9E D8 FE 0B A1 0F B7 93 B7 3F 74 56 99 
DF 64 31 B9 05 22 26 FA 3C 1E BE 21 45 50 1B A5 
FE 3D D0 24 C5 28 5A D7 44 75 B5 A3 09 6A D1 BD 
47 ED AA D1 F7 68 F3 13 95 62 B2 73 4F 89 F4 54 
8D BC E6 99 D4 73 CE 95 9C 9B 22 DA 96 EC F0 12 
92 FE A9 A7 C3 52 D9 04 0C 21 7B 1E 5C 22 3E B3 

This patches are necessary to make STM32U5Axxx works with TF-M.

Signed-off-by: BUDKE Gerson Fernando <gerson.budke@leica-geosystems.com>
@zephyrbot zephyrbot added the size: XS A PR changing only a single line of code label Jul 22, 2025
Copy link

The following west manifest projects have changed revision in this Pull Request:

Name Old Revision New Revision Diff
trusted-firmware-m zephyrproject-rtos/trusted-firmware-m@021e2bb (main) zephyrproject-rtos/trusted-firmware-m#145 zephyrproject-rtos/trusted-firmware-m#145/files

DNM label due to: 1 project with PR revision

Note: This message is automatically posted and updated by the Manifest GitHub Action.

@github-actions github-actions bot added manifest manifest-trusted-firmware-m DNM (manifest) This PR should not be merged (controlled by action-manifest) labels Jul 22, 2025
@nandojve nandojve added the backport v4.2-branch Request backport to the v4.2-branch label Jul 22, 2025
Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport v4.2-branch Request backport to the v4.2-branch DNM (manifest) This PR should not be merged (controlled by action-manifest) manifest manifest-trusted-firmware-m size: XS A PR changing only a single line of code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants