/trusted-firmware-m-3.7.0/secure_fw/spm/core/ |
D | psa_irq_api.c | 20 struct partition_t *partition; in tfm_spm_partition_psa_irq_enable() local 23 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_irq_enable() 25 irq_info = get_irq_info_for_signal(partition->p_ldinf, irq_signal); in tfm_spm_partition_psa_irq_enable() 37 struct partition_t *partition; in tfm_spm_partition_psa_irq_disable() local 40 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_irq_disable() 42 irq_info = get_irq_info_for_signal(partition->p_ldinf, irq_signal); in tfm_spm_partition_psa_irq_disable() 58 struct partition_t *partition; in tfm_spm_partition_psa_reset_signal() local 60 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_reset_signal() 62 irq_info = get_irq_info_for_signal(partition->p_ldinf, irq_signal); in tfm_spm_partition_psa_reset_signal() 72 if ((partition->signals_asserted & irq_signal) == 0) { in tfm_spm_partition_psa_reset_signal() [all …]
|
D | psa_api.c | 75 struct partition_t *partition = NULL; in tfm_spm_partition_psa_wait() local 84 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_wait() 93 if ((partition->signals_allowed) && in tfm_spm_partition_psa_wait() 94 (partition->signals_allowed & signal_mask) == 0) { in tfm_spm_partition_psa_wait() 103 signal = backend_wait_signals(partition, signal_mask); in tfm_spm_partition_psa_wait() 108 signal = partition->signals_asserted & signal_mask; in tfm_spm_partition_psa_wait() 120 struct partition_t *partition = NULL; in tfm_spm_partition_psa_get() local 131 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_get() 138 partition->boundary, (uintptr_t)msg, in tfm_spm_partition_psa_get() 149 if (partition->signals_asserted == 0) { in tfm_spm_partition_psa_get() [all …]
|
D | spm_ipc.c | 150 struct partition_t *partition = NULL; in tfm_spm_check_authorization() local 161 partition = GET_CURRENT_COMPONENT(); in tfm_spm_check_authorization() 162 if (!partition) { in tfm_spm_check_authorization() 166 dep = LOAD_INFO_DEPS(partition->p_ldinf); in tfm_spm_check_authorization() 167 for (i = 0; i < partition->p_ldinf->ndeps; i++) { in tfm_spm_check_authorization() 173 if (i == partition->p_ldinf->ndeps) { in tfm_spm_check_authorization() 289 if (partition_id != p_conn_handle->service->partition->p_ldinf->pid) { in spm_msg_handle_to_connection() 324 struct partition_t *partition; in tfm_spm_partition_get_running_partition_id() local 326 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_get_running_partition_id() 327 if (partition && partition->p_ldinf) { in tfm_spm_partition_get_running_partition_id() [all …]
|
D | rom_loader.c | 66 struct partition_t *partition; in load_a_partition_assuredly() local 108 UNI_LIST_FOREACH(partition, head, next) { in load_a_partition_assuredly() 109 if (!IS_NS_AGENT(partition->p_ldinf)) { in load_a_partition_assuredly() 112 client_id_base = partition->p_ldinf->client_id_base; in load_a_partition_assuredly() 113 client_id_limit = partition->p_ldinf->client_id_limit; in load_a_partition_assuredly() 121 partition = tfm_allocate_partition_assuredly(); in load_a_partition_assuredly() 122 partition->p_ldinf = p_ptldinf; in load_a_partition_assuredly() 126 UNI_LIST_INSERT_AFTER(head, partition, next); in load_a_partition_assuredly() 128 return partition; in load_a_partition_assuredly() 155 services[i].partition = p_partition; in load_services_assuredly()
|
D | psa_mmiovec_api.c | 20 struct partition_t *partition = NULL; in tfm_spm_partition_psa_map_invec() local 29 partition = handle->service->partition; in tfm_spm_partition_psa_map_invec() 81 partition->boundary, (uintptr_t)handle->invec_base[invec_idx], in tfm_spm_partition_psa_map_invec() 150 struct partition_t *partition = NULL; in tfm_spm_partition_psa_map_outvec() local 159 partition = handle->service->partition; in tfm_spm_partition_psa_map_outvec() 210 partition->boundary, (uintptr_t)handle->outvec_base[outvec_idx], in tfm_spm_partition_psa_map_outvec()
|
D | backend_sfn.c | 49 !p_connection->service->partition) { in backend_messaging() 53 p_target = p_connection->service->partition; in backend_messaging() 156 struct partition_t *partition = GET_CURRENT_COMPONENT(); in backend_system_run() local 158 SPM_ASSERT(partition != NULL); in backend_system_run() 160 pldi = partition->p_ldinf; in backend_system_run()
|
/trusted-firmware-m-3.7.0/platform/ext/common/gcc/ |
D | tfm_isolation_l3.ld.template | 81 /**** Section for holding partition RO load data */ 83 * Sort the partition info by priority to guarantee the initing order. 84 * The first loaded partition will be inited at last in SFN model. 101 {% for partition in partitions %} 102 {% if partition.manifest.type == 'PSA-ROT' %} 103 .{{partition.manifest.name}}_RO ALIGN(TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT) : 105 {% if partition.attr.linker_pattern.library_list %} 106 {% for pattern in partition.attr.linker_pattern.library_list %} 111 {% if partition.attr.linker_pattern.object_list %} 112 {% for pattern in partition.attr.linker_pattern.object_list %} [all …]
|
/trusted-firmware-m-3.7.0/platform/ext/common/armclang/ |
D | tfm_isolation_l3.sct.template | 73 /**** Section for holding partition RO load data */ 75 * Sort the partition info by priority to guarantee the initing order. 76 * The first loaded partition will be inited at last in SFN model. 86 {% for partition in partitions %} 87 {% if partition.manifest.type == 'PSA-ROT' %} 88 ER_{{partition.manifest.name}}_RO +0 ALIGN TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT { 89 {% if partition.attr.linker_pattern.library_list %} 90 {% for pattern in partition.attr.linker_pattern.library_list %} 94 {% if partition.attr.linker_pattern.object_list %} 95 {% for pattern in partition.attr.linker_pattern.object_list %} [all …]
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/corstone1000/ |
D | create-flash-image.sh | 79 --new=1:34:+3k --partition-guid=1:$(uuidgen) --change-name=1:'reserved_1' \ 80 …--new=2:40:+4K --typecode=2:$FWU_METADATA_TYPE_UUID --partition-guid=2:$(uuidgen) --change-name=2:… 81 …--new=3:48:+4K --typecode=3:$FWU_METADATA_TYPE_UUID --partition-guid=3:$(uuidgen) --change-name=3:… 82 …--new=4:56:+4K --typecode=4:$PRIVATE_METADATA_TYPE_UUID --partition-guid=4:$(uuidgen) --change-nam… 83 …--new=5:64:+4k --typecode=5:$PRIVATE_METADATA_TYPE_UUID --partition-guid=5:$(uuidgen) --change-nam… 84 …--new=6:72:+100k --typecode=6:$SE_BL2_TYPE_UUID --partition-guid=6:$(uuidgen) --change-name=6:'bl2… 85 …--new=7:272:+368K --typecode=7:$TFM_TYPE_UUID --partition-guid=7:$(uuidgen) --change-name=7:'tfm_p… 86 …--new=8:32784:+100k --typecode=8:$SE_BL2_TYPE_UUID --partition-guid=8:$(uuidgen) --change-name=8:'… 87 …--new=9:32984:+368K --typecode=9:$TFM_TYPE_UUID --partition-guid=9:$(uuidgen) --change-name=9:'tfm… 88 --new=10:65496:65501 --partition-guid=10:$(uuidgen) --change-name=10:'reserved_2' \
|
/trusted-firmware-m-3.7.0/platform/ext/common/iar/ |
D | tfm_isolation_l3.icf.template | 63 /**** Section for holding partition RO load data */ 65 * Sort the partition info by priority to guarantee the initing order. 66 * The first loaded partition will be inited at last in SFN model. 91 {% for partition in partitions %} 92 define block ER_{{partition.manifest.name}}_RO with alignment = {{ 'TFM_LINKER_PSA_ROT_LINKER_CODE… 94 {% if partition.attr.linker_pattern.library_list %} 95 {% for pattern in partition.attr.linker_pattern.library_list %} 100 {% if partition.attr.linker_pattern.object_list %} 101 {% for pattern in partition.attr.linker_pattern.object_list %} 105 {% if partition.manifest.type == 'PSA-ROT' %} [all …]
|
/trusted-firmware-m-3.7.0/config/profile/ |
D | profile_medium_arotless.cmake | 18 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 19 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 20 …M_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition") 21 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 22 …TFM_PARTITION_FIRMWARE_UPDATE ON CACHE BOOL "Enable firmware update partition") 23 …M_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
|
D | profile_medium.cmake | 18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 20 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition") 21 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition") 22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
|
D | profile_small.cmake | 17 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 18 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 19 set(TFM_PARTITION_PLATFORM OFF CACHE BOOL "Enable the TF-M Platform partition") 20 set(TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition") 21 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 23 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
|
D | profile_large.cmake | 17 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 18 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 19 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition") 20 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition") 21 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 23 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
|
/trusted-firmware-m-3.7.0/interface/include/psa_manifest/ |
D | sid.h.template | 17 {% for partition in partitions %} 18 {% if partition.manifest.services %} 19 /******** {{partition.manifest.name}} ********/ 20 {% for service in partition.manifest.services %}
|
D | pid.h.template | 18 {% for partition in partitions %} 19 #define {{"%-62s"|format(partition.manifest.name)}} ({{partition.attr.pid}})
|
/trusted-firmware-m-3.7.0/platform/ext/target/stm/nucleo_l552ze_q/ |
D | CMakeLists.txt | 55 ${TARGET_PLATFORM_PATH}/partition/flash_layout.h 56 ${TARGET_PLATFORM_PATH}/partition/region_defs.h 57 DESTINATION ${INSTALL_PLATFORM_NS_DIR}/partition 67 install(FILES ${TARGET_PLATFORM_PATH}/partition/flash_layout.h 68 ${TARGET_PLATFORM_PATH}/partition/region_defs.h
|
/trusted-firmware-m-3.7.0/bl2/ext/mcuboot/scripts/ |
D | assemble.py | 60 def add_image(self, source, partition): argument 64 if pos > self.offsets[partition]: 66 if pos < self.offsets[partition]: 67 ofd.write(b'\xFF' * (self.offsets[partition] - pos)) 69 if statinfo.st_size > self.sizes[partition]:
|
/trusted-firmware-m-3.7.0/config/ |
D | tfm_ipc_config_default.cmake | 18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition") 25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
|
D | tfm_sfn_config_default.cmake | 18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition") 25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
|
/trusted-firmware-m-3.7.0/docs/design_docs/services/ |
D | secure_partition_manager.rst | 32 Services are grouped into `Secure Partition` (aka `partition`). A partition: 47 - Manages partition runtime to follow FF-M. 58 process. Besides this, another important implementation part is partition 63 One partition must work under as `ONE` of the runtime models: 67 A partition that runs under the `IPC` model looks like a classic `process`. 68 There is `ONE` thread inside the partition keeps waiting for signals. SPM 70 and assert a signal to the partition. The partition calls corresponded service 80 model converts multiple service accesses into messages, let the partition 83 The `Secure Function` (`SFN`) model partition is close to a `library`. Each 84 service is provided as a function entry inside the partition. SPM launches [all …]
|
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/alcor/common/ns/ |
D | common.cmake | 18 ${ALCOR_COMMON_DIR}/partition 19 ${PLATFORM_DIR}/partition 38 ${ALCOR_COMMON_DIR}/partition 39 ${CMAKE_CURRENT_SOURCE_DIR}/partition 65 ${ALCOR_COMMON_DIR}/partition 67 ${CMAKE_CURRENT_SOURCE_DIR}/partition
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/ |
D | config.cmake | 52 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 53 …TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition") 54 …TITION_INTERNAL_TRUSTED_STORAGE OFF CACHE BOOL "Enable Internal Trusted Storage partition") 55 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition") 63 …station;dice_protection_environment" CACHE STRING "List of extra secure partition directory name(s… 65 …ection_environment/dpe_manifest_list.yaml" CACHE STRING "List of extra secure partition manifests") 87 …set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 88 …t(TFM_PARTITION_DELEGATED_ATTESTATION OFF CACHE BOOL "Enable Delegated Attestation partition") 89 …PARTITION_DPE OFF CACHE BOOL "Enable DICE Protection Environment partition") 90 set(TFM_PARTITION_MEASURED_BOOT OFF CACHE BOOL "Enable Measured Boot partition") [all …]
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/corstone300/fvp/ |
D | CMakeLists.txt | 20 ${CMAKE_CURRENT_SOURCE_DIR}/partition 21 ${CORSTONE300_COMMON_DIR}/partition 36 install(FILES ${TARGET_PLATFORM_PATH}/partition/platform_base_address.h 37 DESTINATION ${INSTALL_PLATFORM_NS_DIR}/partition)
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/corstone300/common/ns/ |
D | common.cmake | 17 ${CORSTONE300_COMMON_DIR}/partition 18 ${PLATFORM_DIR}/partition 37 ${CORSTONE300_COMMON_DIR}/partition 38 ${CMAKE_CURRENT_SOURCE_DIR}/partition 71 ${CORSTONE300_COMMON_DIR}/partition
|