Home
last modified time | relevance | path

Searched refs:partition (Results 1 – 25 of 108) sorted by relevance

12345

/trusted-firmware-m-3.4.0/platform/ext/common/gcc/
Dtfm_isolation_l3.ld.template96 {% for partition in partitions %}
97 LONG (LOADADDR(.ER_{{partition.manifest.name}}_RWZI))
98 LONG (ADDR(.ER_{{partition.manifest.name}}_RWZI))
99 LONG (SIZEOF(.ER_{{partition.manifest.name}}_RWZI) / 4)
118 {% for partition in partitions %}
119 LONG (ADDR(.{{partition.manifest.name}}_RWZI_BSS))
120 LONG (SIZEOF(.{{partition.manifest.name}}_RWZI_BSS) / 4)
125 /**** Section for holding partition RO load data */
127 * Sort the partition info by priority to guarantee the initing order.
128 * The first loaded partition will be inited at last in SFN model.
[all …]
/trusted-firmware-m-3.4.0/config/tests/
Dregression_config.cmake11 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
12 …M_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition")
13 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
14 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
15 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition")
18 …set(TFM_PARTITION_FIRMWARE_UPDATE ON CACHE BOOL "Enable firmware update partition")
23 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
24 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
28 …M_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition")
29 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
[all …]
Dconfig_test_psa_api.cmake18 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
19 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
20 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
21 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition")
25 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
26 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
27 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition")
31 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
32 …M_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition")
33 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
[all …]
/trusted-firmware-m-3.4.0/platform/ext/common/iar/
Dtfm_isolation_l3.icf.template63 /**** Section for holding partition RO load data */
65 * Sort the partition info by priority to guarantee the initing order.
66 * The first loaded partition will be inited at last in SFN model.
92 {% for partition in partitions %}
93 define block ER_{{partition.manifest.name}}_RO with alignment = {{ 'TFM_LINKER_PSA_ROT_LINKER_CODE…
95 {% if partition.attr.linker_pattern.library_list %}
96 {% for pattern in partition.attr.linker_pattern.library_list %}
101 {% if partition.attr.linker_pattern.object_list %}
102 {% for pattern in partition.attr.linker_pattern.object_list %}
106 {% if partition.manifest.type == 'PSA-ROT' %}
[all …]
/trusted-firmware-m-3.4.0/secure_fw/spm/cmsis_psa/
Dspm_ipc.c281 struct partition_t *partition = NULL; in tfm_spm_check_authorization() local
292 partition = GET_CURRENT_COMPONENT(); in tfm_spm_check_authorization()
293 if (!partition) { in tfm_spm_check_authorization()
297 dep = LOAD_INFO_DEPS(partition->p_ldinf); in tfm_spm_check_authorization()
298 for (i = 0; i < partition->p_ldinf->ndeps; i++) { in tfm_spm_check_authorization()
304 if (i == partition->p_ldinf->ndeps) { in tfm_spm_check_authorization()
352 if (partition_id != p_conn_handle->service->partition->p_ldinf->pid) { in spm_get_handle_by_msg_handle()
412 struct partition_t *partition; in tfm_spm_partition_get_running_partition_id() local
414 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_get_running_partition_id()
415 if (partition && partition->p_ldinf) { in tfm_spm_partition_get_running_partition_id()
[all …]
Dstatic_loader.c76 struct partition_t *partition; in load_a_partition_assuredly() local
110 partition = tfm_allocate_partition_assuredly(); in load_a_partition_assuredly()
111 partition->p_ldinf = p_ptldinf; in load_a_partition_assuredly()
115 UNI_LIST_INSERT_AFTER(head, partition, next); in load_a_partition_assuredly()
117 return partition; in load_a_partition_assuredly()
144 services[i].partition = p_partition; in load_services_assuredly()
/trusted-firmware-m-3.4.0/platform/ext/common/armclang/
Dtfm_isolation_l3.sct.template73 /**** Section for holding partition RO load data */
75 * Sort the partition info by priority to guarantee the initing order.
76 * The first loaded partition will be inited at last in SFN model.
86 {% for partition in partitions %}
87 {% if partition.manifest.type == 'PSA-ROT' %}
88 ER_{{partition.manifest.name}}_RO +0 ALIGN TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT {
89 {% if partition.attr.linker_pattern.library_list %}
90 {% for pattern in partition.attr.linker_pattern.library_list %}
94 {% if partition.attr.linker_pattern.object_list %}
95 {% for pattern in partition.attr.linker_pattern.object_list %}
[all …]
/trusted-firmware-m-3.4.0/secure_fw/spm/ffm/
Dpsa_api.c450 struct partition_t *partition = NULL; in tfm_spm_partition_psa_wait() local
458 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_wait()
467 if ((partition->signals_allowed) && in tfm_spm_partition_psa_wait()
468 (partition->signals_allowed & signal_mask) == 0) { in tfm_spm_partition_psa_wait()
480 return backend_wait(partition, signal_mask); in tfm_spm_partition_psa_wait()
483 return partition->signals_asserted & signal_mask; in tfm_spm_partition_psa_wait()
491 struct partition_t *partition = NULL; in tfm_spm_partition_psa_get() local
502 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_get()
509 partition->boundary, (uintptr_t)msg, in tfm_spm_partition_psa_get()
520 if (partition->signals_asserted == 0) { in tfm_spm_partition_psa_get()
[all …]
/trusted-firmware-m-3.4.0/config/profile/
Dprofile_medium.cmake18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
20 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition")
21 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition")
22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
Dprofile_small.cmake18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
20 set(TFM_PARTITION_PLATFORM OFF CACHE BOOL "Enable the TF-M Platform partition")
21 set(TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
Dprofile_medium_arotless.cmake18 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
19 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
20 …M_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition")
21 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
22 …TFM_PARTITION_FIRMWARE_UPDATE ON CACHE BOOL "Enable firmware update partition")
23 …M_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
Dprofile_large.cmake18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
20 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition")
21 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition")
22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
/trusted-firmware-m-3.4.0/interface/include/psa_manifest/
Dsid.h.template17 {% for partition in partitions %}
18 {% if partition.manifest.services %}
19 /******** {{partition.manifest.name}} ********/
20 {% for service in partition.manifest.services %}
Dpid.h.template18 {% for partition in partitions %}
19 #define {{"%-62s"|format(partition.manifest.name)}} ({{partition.attr.pid}})
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/scripts/
Dassemble.py60 def add_image(self, source, partition): argument
64 if pos > self.offsets[partition]:
66 if pos < self.offsets[partition]:
67 ofd.write(b'\xFF' * (self.offsets[partition] - pos))
69 if statinfo.st_size > self.sizes[partition]:
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/
Dsecure_partition_manager.rst32 Services are grouped into `Secure Partition` (aka `partition`). A partition:
47 - Manages partition runtime to follow FF-M.
58 process. Besides this, another important implementation part is partition
63 One partition must work under as `ONE` of the runtime models:
67 A partition that runs under the `IPC` model looks like a classic `process`.
68 There is `ONE` thread inside the partition keeps waiting for signals. SPM
70 and assert a signal to the partition. The partition calls corresponded service
80 model converts multiple service accesses into messages, let the partition
83 The `Secure Function` (`SFN`) model partition is close to a `library`. Each
84 service is provided as a function entry inside the partition. SPM launches
[all …]
/trusted-firmware-m-3.4.0/config/
Dtfm_ipc_config_default.cmake18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
Dtfm_sfn_config_default.cmake18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
Dtfm_fwu_config.cmake9 …M_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
10 … "mcuboot" CACHE STRING "Bootloader configure file for Firmware Update partition")
13 … "" CACHE STRING "The device configuration file for Firmware Update partition")
/trusted-firmware-m-3.4.0/platform/ext/target/nordic_nrf/nrf9161dk_nrf9161/
DCMakeLists.txt15 ../common/nrf91/partition
26 ../common/nrf91/partition
38 ../common/nrf91/partition
/trusted-firmware-m-3.4.0/platform/ext/target/nordic_nrf/nrf5340dk_nrf5340_cpuapp/
DCMakeLists.txt17 ../common/nrf5340/partition
28 ../common/nrf5340/partition
40 ../common/nrf5340/partition
/trusted-firmware-m-3.4.0/platform/ext/target/nordic_nrf/nrf9160dk_nrf9160/
DCMakeLists.txt17 ../common/nrf91/partition
28 ../common/nrf91/partition
40 ../common/nrf91/partition
/trusted-firmware-m-3.4.0/platform/ext/target/lairdconnectivity/bl5340_dvk_cpuapp/
DCMakeLists.txt18 ../common/bl5340/partition
29 ../common/bl5340/partition
41 ../common/bl5340/partition
/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/
Dconfig.cmake36 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
37 …M_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
38 …TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
39 …TITION_INTERNAL_TRUSTED_STORAGE OFF CACHE BOOL "Enable Internal Trusted Storage partition")
40 set(TFM_PARTITION_MEASURED_BOOT ON CACHE BOOL "Enable Measured boot partition")
46 …measured_boot;delegated_attestation" CACHE STRING "List of extra secure partition directory name(s…
48 …/delegated_attestation_manifest_list.yaml" CACHE STRING "List of extra secure partition manifests")
50 …PARTITION_DELEGATED_ATTESTATION ON CACHE BOOL "Enable Delegated Attestation partition")
/trusted-firmware-m-3.4.0/tools/
Dtfm_parse_manifest_list.py177 for partition in partitions:
178 manifest = partition['manifest']
190 for partition in dependency_table.keys():
191 validate_dependency_chain(partition, dependency_table, [])
193 def validate_dependency_chain(partition, argument
207 dependency_chain.append(partition)
208 if partition in dependency_chain[:-1]:
213 for dependency in dependency_table[partition]['dependencies']:
217 dependency_table[partition]['validated'] = True
551 for partition in partitions:
[all …]

12345