Home
last modified time | relevance | path

Searched refs:partition (Results 1 – 25 of 152) sorted by relevance

1234567

/trusted-firmware-m-3.7.0/secure_fw/spm/core/
Dpsa_irq_api.c20 struct partition_t *partition; in tfm_spm_partition_psa_irq_enable() local
23 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_irq_enable()
25 irq_info = get_irq_info_for_signal(partition->p_ldinf, irq_signal); in tfm_spm_partition_psa_irq_enable()
37 struct partition_t *partition; in tfm_spm_partition_psa_irq_disable() local
40 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_irq_disable()
42 irq_info = get_irq_info_for_signal(partition->p_ldinf, irq_signal); in tfm_spm_partition_psa_irq_disable()
58 struct partition_t *partition; in tfm_spm_partition_psa_reset_signal() local
60 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_reset_signal()
62 irq_info = get_irq_info_for_signal(partition->p_ldinf, irq_signal); in tfm_spm_partition_psa_reset_signal()
72 if ((partition->signals_asserted & irq_signal) == 0) { in tfm_spm_partition_psa_reset_signal()
[all …]
Dpsa_api.c75 struct partition_t *partition = NULL; in tfm_spm_partition_psa_wait() local
84 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_wait()
93 if ((partition->signals_allowed) && in tfm_spm_partition_psa_wait()
94 (partition->signals_allowed & signal_mask) == 0) { in tfm_spm_partition_psa_wait()
103 signal = backend_wait_signals(partition, signal_mask); in tfm_spm_partition_psa_wait()
108 signal = partition->signals_asserted & signal_mask; in tfm_spm_partition_psa_wait()
120 struct partition_t *partition = NULL; in tfm_spm_partition_psa_get() local
131 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_get()
138 partition->boundary, (uintptr_t)msg, in tfm_spm_partition_psa_get()
149 if (partition->signals_asserted == 0) { in tfm_spm_partition_psa_get()
[all …]
Dspm_ipc.c150 struct partition_t *partition = NULL; in tfm_spm_check_authorization() local
161 partition = GET_CURRENT_COMPONENT(); in tfm_spm_check_authorization()
162 if (!partition) { in tfm_spm_check_authorization()
166 dep = LOAD_INFO_DEPS(partition->p_ldinf); in tfm_spm_check_authorization()
167 for (i = 0; i < partition->p_ldinf->ndeps; i++) { in tfm_spm_check_authorization()
173 if (i == partition->p_ldinf->ndeps) { in tfm_spm_check_authorization()
289 if (partition_id != p_conn_handle->service->partition->p_ldinf->pid) { in spm_msg_handle_to_connection()
324 struct partition_t *partition; in tfm_spm_partition_get_running_partition_id() local
326 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_get_running_partition_id()
327 if (partition && partition->p_ldinf) { in tfm_spm_partition_get_running_partition_id()
[all …]
Drom_loader.c66 struct partition_t *partition; in load_a_partition_assuredly() local
108 UNI_LIST_FOREACH(partition, head, next) { in load_a_partition_assuredly()
109 if (!IS_NS_AGENT(partition->p_ldinf)) { in load_a_partition_assuredly()
112 client_id_base = partition->p_ldinf->client_id_base; in load_a_partition_assuredly()
113 client_id_limit = partition->p_ldinf->client_id_limit; in load_a_partition_assuredly()
121 partition = tfm_allocate_partition_assuredly(); in load_a_partition_assuredly()
122 partition->p_ldinf = p_ptldinf; in load_a_partition_assuredly()
126 UNI_LIST_INSERT_AFTER(head, partition, next); in load_a_partition_assuredly()
128 return partition; in load_a_partition_assuredly()
155 services[i].partition = p_partition; in load_services_assuredly()
Dpsa_mmiovec_api.c20 struct partition_t *partition = NULL; in tfm_spm_partition_psa_map_invec() local
29 partition = handle->service->partition; in tfm_spm_partition_psa_map_invec()
81 partition->boundary, (uintptr_t)handle->invec_base[invec_idx], in tfm_spm_partition_psa_map_invec()
150 struct partition_t *partition = NULL; in tfm_spm_partition_psa_map_outvec() local
159 partition = handle->service->partition; in tfm_spm_partition_psa_map_outvec()
210 partition->boundary, (uintptr_t)handle->outvec_base[outvec_idx], in tfm_spm_partition_psa_map_outvec()
Dbackend_sfn.c49 !p_connection->service->partition) { in backend_messaging()
53 p_target = p_connection->service->partition; in backend_messaging()
156 struct partition_t *partition = GET_CURRENT_COMPONENT(); in backend_system_run() local
158 SPM_ASSERT(partition != NULL); in backend_system_run()
160 pldi = partition->p_ldinf; in backend_system_run()
/trusted-firmware-m-3.7.0/platform/ext/common/gcc/
Dtfm_isolation_l3.ld.template81 /**** Section for holding partition RO load data */
83 * Sort the partition info by priority to guarantee the initing order.
84 * The first loaded partition will be inited at last in SFN model.
101 {% for partition in partitions %}
102 {% if partition.manifest.type == 'PSA-ROT' %}
103 .{{partition.manifest.name}}_RO ALIGN(TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT) :
105 {% if partition.attr.linker_pattern.library_list %}
106 {% for pattern in partition.attr.linker_pattern.library_list %}
111 {% if partition.attr.linker_pattern.object_list %}
112 {% for pattern in partition.attr.linker_pattern.object_list %}
[all …]
/trusted-firmware-m-3.7.0/platform/ext/common/armclang/
Dtfm_isolation_l3.sct.template73 /**** Section for holding partition RO load data */
75 * Sort the partition info by priority to guarantee the initing order.
76 * The first loaded partition will be inited at last in SFN model.
86 {% for partition in partitions %}
87 {% if partition.manifest.type == 'PSA-ROT' %}
88 ER_{{partition.manifest.name}}_RO +0 ALIGN TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT {
89 {% if partition.attr.linker_pattern.library_list %}
90 {% for pattern in partition.attr.linker_pattern.library_list %}
94 {% if partition.attr.linker_pattern.object_list %}
95 {% for pattern in partition.attr.linker_pattern.object_list %}
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/arm/corstone1000/
Dcreate-flash-image.sh79 --new=1:34:+3k --partition-guid=1:$(uuidgen) --change-name=1:'reserved_1' \
80 …--new=2:40:+4K --typecode=2:$FWU_METADATA_TYPE_UUID --partition-guid=2:$(uuidgen) --change-name=2:…
81 …--new=3:48:+4K --typecode=3:$FWU_METADATA_TYPE_UUID --partition-guid=3:$(uuidgen) --change-name=3:…
82 …--new=4:56:+4K --typecode=4:$PRIVATE_METADATA_TYPE_UUID --partition-guid=4:$(uuidgen) --change-nam…
83 …--new=5:64:+4k --typecode=5:$PRIVATE_METADATA_TYPE_UUID --partition-guid=5:$(uuidgen) --change-nam…
84 …--new=6:72:+100k --typecode=6:$SE_BL2_TYPE_UUID --partition-guid=6:$(uuidgen) --change-name=6:'bl2…
85 …--new=7:272:+368K --typecode=7:$TFM_TYPE_UUID --partition-guid=7:$(uuidgen) --change-name=7:'tfm_p…
86 …--new=8:32784:+100k --typecode=8:$SE_BL2_TYPE_UUID --partition-guid=8:$(uuidgen) --change-name=8:'…
87 …--new=9:32984:+368K --typecode=9:$TFM_TYPE_UUID --partition-guid=9:$(uuidgen) --change-name=9:'tfm…
88 --new=10:65496:65501 --partition-guid=10:$(uuidgen) --change-name=10:'reserved_2' \
/trusted-firmware-m-3.7.0/platform/ext/common/iar/
Dtfm_isolation_l3.icf.template63 /**** Section for holding partition RO load data */
65 * Sort the partition info by priority to guarantee the initing order.
66 * The first loaded partition will be inited at last in SFN model.
91 {% for partition in partitions %}
92 define block ER_{{partition.manifest.name}}_RO with alignment = {{ 'TFM_LINKER_PSA_ROT_LINKER_CODE…
94 {% if partition.attr.linker_pattern.library_list %}
95 {% for pattern in partition.attr.linker_pattern.library_list %}
100 {% if partition.attr.linker_pattern.object_list %}
101 {% for pattern in partition.attr.linker_pattern.object_list %}
105 {% if partition.manifest.type == 'PSA-ROT' %}
[all …]
/trusted-firmware-m-3.7.0/config/profile/
Dprofile_medium_arotless.cmake18 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
19 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
20 …M_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition")
21 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
22 …TFM_PARTITION_FIRMWARE_UPDATE ON CACHE BOOL "Enable firmware update partition")
23 …M_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
Dprofile_medium.cmake18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
20 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition")
21 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition")
22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
Dprofile_small.cmake17 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
18 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
19 set(TFM_PARTITION_PLATFORM OFF CACHE BOOL "Enable the TF-M Platform partition")
20 set(TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
21 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
23 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
Dprofile_large.cmake17 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
18 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition")
19 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition")
20 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition")
21 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
23 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
/trusted-firmware-m-3.7.0/interface/include/psa_manifest/
Dsid.h.template17 {% for partition in partitions %}
18 {% if partition.manifest.services %}
19 /******** {{partition.manifest.name}} ********/
20 {% for service in partition.manifest.services %}
Dpid.h.template18 {% for partition in partitions %}
19 #define {{"%-62s"|format(partition.manifest.name)}} ({{partition.attr.pid}})
/trusted-firmware-m-3.7.0/platform/ext/target/stm/nucleo_l552ze_q/
DCMakeLists.txt55 ${TARGET_PLATFORM_PATH}/partition/flash_layout.h
56 ${TARGET_PLATFORM_PATH}/partition/region_defs.h
57 DESTINATION ${INSTALL_PLATFORM_NS_DIR}/partition
67 install(FILES ${TARGET_PLATFORM_PATH}/partition/flash_layout.h
68 ${TARGET_PLATFORM_PATH}/partition/region_defs.h
/trusted-firmware-m-3.7.0/bl2/ext/mcuboot/scripts/
Dassemble.py60 def add_image(self, source, partition): argument
64 if pos > self.offsets[partition]:
66 if pos < self.offsets[partition]:
67 ofd.write(b'\xFF' * (self.offsets[partition] - pos))
69 if statinfo.st_size > self.sizes[partition]:
/trusted-firmware-m-3.7.0/config/
Dtfm_ipc_config_default.cmake18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
Dtfm_sfn_config_default.cmake18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition")
23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
/trusted-firmware-m-3.7.0/docs/design_docs/services/
Dsecure_partition_manager.rst32 Services are grouped into `Secure Partition` (aka `partition`). A partition:
47 - Manages partition runtime to follow FF-M.
58 process. Besides this, another important implementation part is partition
63 One partition must work under as `ONE` of the runtime models:
67 A partition that runs under the `IPC` model looks like a classic `process`.
68 There is `ONE` thread inside the partition keeps waiting for signals. SPM
70 and assert a signal to the partition. The partition calls corresponded service
80 model converts multiple service accesses into messages, let the partition
83 The `Secure Function` (`SFN`) model partition is close to a `library`. Each
84 service is provided as a function entry inside the partition. SPM launches
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/alcor/common/ns/
Dcommon.cmake18 ${ALCOR_COMMON_DIR}/partition
19 ${PLATFORM_DIR}/partition
38 ${ALCOR_COMMON_DIR}/partition
39 ${CMAKE_CURRENT_SOURCE_DIR}/partition
65 ${ALCOR_COMMON_DIR}/partition
67 ${CMAKE_CURRENT_SOURCE_DIR}/partition
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/
Dconfig.cmake52 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition")
53 …TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
54 …TITION_INTERNAL_TRUSTED_STORAGE OFF CACHE BOOL "Enable Internal Trusted Storage partition")
55 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition")
63 …station;dice_protection_environment" CACHE STRING "List of extra secure partition directory name(s…
65 …ection_environment/dpe_manifest_list.yaml" CACHE STRING "List of extra secure partition manifests")
87 …set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition")
88 …t(TFM_PARTITION_DELEGATED_ATTESTATION OFF CACHE BOOL "Enable Delegated Attestation partition")
89 …PARTITION_DPE OFF CACHE BOOL "Enable DICE Protection Environment partition")
90 set(TFM_PARTITION_MEASURED_BOOT OFF CACHE BOOL "Enable Measured Boot partition")
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/corstone300/fvp/
DCMakeLists.txt20 ${CMAKE_CURRENT_SOURCE_DIR}/partition
21 ${CORSTONE300_COMMON_DIR}/partition
36 install(FILES ${TARGET_PLATFORM_PATH}/partition/platform_base_address.h
37 DESTINATION ${INSTALL_PLATFORM_NS_DIR}/partition)
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/corstone300/common/ns/
Dcommon.cmake17 ${CORSTONE300_COMMON_DIR}/partition
18 ${PLATFORM_DIR}/partition
37 ${CORSTONE300_COMMON_DIR}/partition
38 ${CMAKE_CURRENT_SOURCE_DIR}/partition
71 ${CORSTONE300_COMMON_DIR}/partition

1234567