/trusted-firmware-m-3.5.0/secure_fw/spm/ffm/ |
D | interrupt.c | 122 psa_signal_t signal) in get_irq_info_for_signal() argument 127 if (!IS_ONLY_ONE_BIT_IN_UINT32(signal)) { in get_irq_info_for_signal() 133 if (irq_info[i].signal == signal) { in get_irq_info_for_signal() 178 backend_assert_signal(p_pt, p_ildi->signal); in spm_handle_interrupt()
|
D | psa_api.c | 95 psa_status_t tfm_spm_partition_psa_get(psa_signal_t signal, psa_msg_t *msg) in tfm_spm_partition_psa_get() argument 105 if (!IS_ONLY_ONE_BIT_IN_UINT32(signal)) { in tfm_spm_partition_psa_get() 134 if ((partition->signals_asserted & signal) == 0) { in tfm_spm_partition_psa_get() 142 handle = spm_get_handle_by_signal(partition, signal); in tfm_spm_partition_psa_get()
|
D | backend_ipc.c | 162 psa_signal_t signal = 0; in backend_messaging() local 169 signal = service->p_ldinf->signal; in backend_messaging() 174 backend_assert_signal(p_owner, signal); in backend_messaging() 310 uint32_t backend_assert_signal(struct partition_t *p_pt, psa_signal_t signal) in backend_assert_signal() argument 319 p_pt->signals_asserted |= signal; in backend_assert_signal()
|
D | backend_sfn.c | 167 uint32_t backend_assert_signal(struct partition_t *p_pt, psa_signal_t signal) in backend_assert_signal() argument 169 p_pt->signals_asserted |= signal; in backend_assert_signal()
|
D | interrupt.h | 32 psa_signal_t signal);
|
/trusted-firmware-m-3.5.0/secure_fw/spm/include/ffm/ |
D | backend_ipc.h | 12 #define BACKEND_SERVICE_SET(set, p_service) ((set) |= (p_service)->signal)
|
D | backend.h | 63 uint32_t backend_assert_signal(struct partition_t *p_pt, psa_signal_t signal);
|
D | psa_api.h | 224 psa_status_t tfm_spm_partition_psa_get(psa_signal_t signal, psa_msg_t *msg);
|
/trusted-firmware-m-3.5.0/tools/templates/ |
D | partition_load_info.template | 164 .signal = {{service.signal_value}}, 166 .signal = {{service.name}}_SIGNAL, 267 {% set irq_info.signal = irq.signal %} 269 {% set irq_info.signal = irq.name + "_SIGNAL" %} 276 .signal = {{irq_info.signal}},
|
D | manifestfilename.template | 38 #define {{"%-55s"|format(irq.signal)}} ({{"0x%x"|format(irq.signal_value)}})
|
/trusted-firmware-m-3.5.0/secure_fw/spm/cmsis_psa/ |
D | spm_ipc.c | 184 psa_signal_t signal) in spm_get_handle_by_signal() argument 196 if (p_handle_iter->service->p_ldinf->signal == signal) { in spm_get_handle_by_signal() 207 p_ptn->signals_asserted &= ~signal; in spm_get_handle_by_signal()
|
D | psa_interface_svc.c | 46 __naked psa_status_t psa_get_svc(psa_signal_t signal, psa_msg_t *msg) in psa_get_svc() argument
|
D | spm.h | 158 psa_signal_t signal);
|
D | rom_loader.c | 179 p_partition->signals_allowed |= p_irq_info->signal; in load_irqs_assuredly()
|
D | psa_interface_cross.c | 106 psa_status_t psa_get_cross(psa_signal_t signal, psa_msg_t *msg) in psa_get_cross() argument
|
/trusted-firmware-m-3.5.0/secure_fw/spm/include/load/ |
D | interrupt_defs.h | 28 psa_signal_t signal; /* The signal assigned for IRQ */ member
|
D | service_defs.h | 54 psa_signal_t signal; /* Service signal */ member
|
/trusted-firmware-m-3.5.0/secure_fw/partitions/lib/runtime/ |
D | psa_api_ipc.c | 39 psa_status_t psa_get(psa_signal_t signal, psa_msg_t *msg) in psa_get() argument 41 return PART_METADATA()->psa_fns->psa_get(signal, msg); in psa_get()
|
/trusted-firmware-m-3.5.0/docs/integration_guide/ |
D | tfm_secure_irq_integration_guide.rst | 27 The interrupt handling can optionally set an interrupt signal for the Secure 90 "signal": "DUAL_TIMER_SIGNAL" 94 "signal": "TIMER_1_SIGNAL" 106 - signal 110 The ``signal`` attribute is a symbolic name used by TF-M to identify which 112 It is also used by the Secure Partition to receive the interrupt signal by 120 #define signal VALUE 158 - the interrupt signal symbol: ``{{name}}_SIGNAL``, the equivalent of 159 ``signal`` in FF-M v1.0
|
/trusted-firmware-m-3.5.0/interface/include/psa/ |
D | service.h | 135 psa_status_t psa_get(psa_signal_t signal, psa_msg_t *msg);
|
/trusted-firmware-m-3.5.0/docs/design_docs/dual-cpu/ |
D | mailbox_ns_agent_update.rst | 182 `Agent-specific signal`_. 184 Agent-specific signal 186 To cooperate with the agent-specific API, one extra acknowledgement signal is 193 This signal can be sent to agent type component only. An agent can call 194 ``psa_get`` with this signal to get one acknowledged message. This signal is
|
/trusted-firmware-m-3.5.0/secure_fw/spm/include/interface/ |
D | runtime_defs.h | 33 psa_status_t (*psa_get)(psa_signal_t signal, psa_msg_t *msg);
|
/trusted-firmware-m-3.5.0/docs/security/security_advisories/ |
D | stack_seal_vulnerability.rst | 88 The interrupt handling in IPC model uses PSA signal to signal the partition 89 and does not use de-privileged interrupt handling mechanism. The PSA signal
|
/trusted-firmware-m-3.5.0/docs/integration_guide/services/ |
D | tfm_secure_partition_addition.rst | 378 * signal(s). 411 incoming signal. This implementation is up to the user, however an example 460 Secure Partition signal to be asserted for SFN Secure Partitions. Instead,
|
/trusted-firmware-m-3.5.0/docs/design_docs/services/ |
D | secure_partition_manager.rst | 70 and assert a signal to the partition. The partition calls corresponded service 71 function indicated by the signal and its bound message, and reply service 288 signal into a specific partition, or customized peripheral settings. 501 - Launching NSPE software (Trustzone case, e.g.), or send a signal to NSPE
|