Trusted Firmware-M (TF-M) implements the Secure Processing Environment (SPE) for Arm Cortex-M based platforms. This aligns the reference implementation of the platform security architecture with the PSA Certified guidelines. Thus, TF-M allows relevant chips and devices to become PSA Certified.
This library contains Trusted Firmware-M (TF-M) for secure projects. Use the ifx-trusted-firmware-m-ns library to integrate TF-M services into a non-secure project (NSPE).
This software component is licensed under a mixture of the Apache License, version 2 and the 3-Clause BSD License. See separate files to determine which license applies. Note the licensing of the following modules:
- Add the ifx-trusted-firmware-m library to the secure project.
- Modify the memory configuration. See Memory configuration.
- Build a secure project.
NOTE: The main.c, linker script, startup, and other files provided by a ModusToolbox™ secure project will not be included in the TF-M build, files from the TF-M sources (ifx-trusted-firmware-m library) will be used instead.
To use TF-M services in non-secure applications:
- Add the ifx-trusted-firmware-m-ns library to the non-secure project. For more details, see the README.md of the ifx-trusted-firmware-m-ns library.
The code used to bind a non-secure project with TF-M is generated during the TF-M secure project build
in folder TFM_INSTALL_PATH
.
There are two types of configuration options:
- ModusToolbox™ Makefile configuration options - set and used in ModusToolbox™ Makefile.
- CMake configuration options - set in ModusToolbox™ Makefile using
the
TFM_CONFIGURE_EXT_OPTIONS
variable and passed to the TF-M CMake configuration system.
Optional variables to configure in TF-M Makefile:
TFM_GIT_URL
- The optional location of the Git repo with TF-M sources. Use it if you created your own fork of the TF-M sources. The sources are cloned to folder .tmp of the ifx-trusted-firmware-m library ifTFM_SRC_DIR
is not specified.TFM_GIT_REF
- The reference to the commit/branch/tag in the Git repo specified byTFM_GIT_URL
.
TFM_SRC_DIR
- The path to TF-M sources. The sources provided by the ifx-trusted-firmware-m library are used by default if neitherTFM_SRC_DIR
norTFM_GIT_URL
is provided.- The following variables can be used to specify custom locations for corresponding libraries:
IFX_CORE_LIB_PATH
IFX_DEVICE_DB_LIB_PATH
IFX_MBEDTLS_ACCELERATION_LIB_PATH
IFX_PDL_LIB_PATH
MBEDCRYPTO_PATH
TFM_BUILD_DIR
- The location of the build directory.TFM_COMPILE_COMMANDS_PATH
- The optional location ofcompile_commands.json
, which will be updated after CMake configuration.TFM_DEBUG_SYMBOLS
- Enables the debug info. It does not affect optimization flags.TFM_CMAKE_BUILD_TYPE
- The optional parameter to specify the CMake build type. SeeCMAKE_BUILD_TYPE
in CMake documentation.CONFIG
- TF-M Makefile uses this variable to defineCMAKE_BUILD_TYPE
ifTFM_CMAKE_BUILD_TYPE
is not specified. Valid arguments:Debug
- The MinSizeRel configuration (CMAKE_BUILD_TYPE=MinSizeRel
) with the debug info (TFM_DEBUG_SYMBOLS=ON) is used.Release
- The MinSizeRel configuration without the debug info (CMAKE_BUILD_TYPE=MinSizeRel
) is used.
TFM_TOOLS_CMAKE
- The path to CMake executable.- If
TFM_TOOLS_CMAKE
is not specified,TFM_TOOLS_CMAKE_URL
can be specified to override the default URL for downloading CMake. In this case, CMake will be downloaded during the build process.
- If
TFM_INSTALL_PATH
- The optional path where the non-secure interface is installed. This is the parent folder. of the TF-M secure project by default.TFM_CONFIGURE_EXT_OPTIONS
- The additional options, which will be appended to setup CMake configuration. See below for details.
TFM_CONFIGURE_EXT_OPTIONS
make variable can be used to specify additional CMake options.
CMake configuration options:
TFM_PROFILE
- TF-M profile.TFM_ISOLATION_LEVEL
- TF-M isolation level.IFX_MBEDTLS_ACCELERATION_ENABLED
- Whether to use the H/W crypto acceleration for Crypto partition provided by the cy-mbedtls-acceleration library. Ensure that the cy-mbedtls-acceleration library is added to the secure project to use it.IFX_MBEDTLS_CONFIG_PATH
- Path to optional ifx-mbedtls configuration header. It's included at the end of platform configuration header defined byTFM_MBEDCRYPTO_PLATFORM_EXTRA_CONFIG_PATH
.IFX_PDL_SECURE_SERVICES
- Whether to provide a mechanism for non-secure code to control certain secure functions such as clocking, debug, and Deep Sleep.IFX_PROJECT_CONFIG_PATH
- Path to optional project configuration header included at the begining of config_tfm_target.h header. You can use it to override settings provided by profile configuration header.- Other CMake configuration options - For more details, refer to TF-M documentation.
To enable the TF-M logging:
- Configure SCBx to UART mode in the Device Configurator and name it
IFX_TFM_SPM_UART
. - Set
IFX_UART_ENABLED
CMake option to ON. TFM_SPM_LOG_LEVEL
CMake option defines SPM (Secure Partition Manager) log level:TFM_SPM_LOG_LEVEL_DEBUG
- All log APIs output.TFM_SPM_LOG_LEVEL_INFO
- All log APIs output except SPMLOG_DBG and SPMLOG_DBGMSGVAL.TFM_SPM_LOG_LEVEL_ERROR
- Only SPMLOG_ERRMSG and SPMLOG_ERRMSGVAL APIs output.TFM_SPM_LOG_LEVEL_SILENCE
- All log APIs are suppressed.
TFM_PARTITION_LOG_LEVEL
CMake option defines the secure partitions log level:TFM_PARTITION_LOG_LEVEL_DEBUG
- All log APIs output.TFM_PARTITION_LOG_LEVEL_INFO
- All log APIs output except LOG_DBGFMT.TFM_PARTITION_LOG_LEVEL_ERROR
- Only LOG_ERRFMT APIs output.TFM_PARTITION_LOG_LEVEL_SILENCE
- All log APIs are suppressed.
Only the SPM domain has access to the IFX_TFM_SPM_UART
SCBx peripheral if the TF-M logging is enabled.
You can use the ifx_platform_log_msg
function to write to IFX_TFM_SPM_UART
from a secure partition or
a non-secure project.
For the general TF-M documentation, refer to TF-M user guide.
TF-M uses the memory regions described in the table below. The rightmost column details the supported types of memory and the recommended size for each block. Depending on the configuration, some of these regions may not be required. See the notes below for details.
Description | Region name | PCS3 |
---|---|---|
TF-M data section | TFM_DATA | SRAM 48kB |
CM33 NSPE data section | CM33_NS_DATA | SRAM 16kB |
TF-M code region | TFM_IMAGE_EXECUTE | FLASH 186kB |
Internal Trusted Storage data | TFM_ITS | FLASH 4kB |
Rollback counters | FLASH_NV_COUNTERS | FLASH 2kB |
CM33 NSPE code region | CM33_NS_IMAGE_EXECUTE | FLASH 32kB |
CM33 NSPE secondary slot | CM33_NS_SECONDARY_SLOT | FLASH 32kB |
- The Flashboot starts the TF-M application.
- Additional data is used by the Flashboot, which is the image header. The size of execute regions includes a header. See the Flashboot documentation for more details.
- TFM_IMAGE_EXECUTE is used to specify the location of TF-M code.
- CM33_NS_IMAGE_EXECUTE is used to specify the location of the CM33 NSPE code.
NOTE: The CM33_NS_SECONDARY_SLOT region is not used by TF-M, but used by Flashboot to update the NSPE image.
The PSC3 platform supports NSPE on the Cortex-M33 core, it is always enabled.
For the correct use of NSPE, the client must initialize the NS interface by calling the tfm_ns_interface_init
function in the NSPE CM33 code before the first call to the PSA function.
Some of the peripheral registers (e.g. clock, power, protection configuration registers, etc.) on PSC3 are protected as Secure access only by TFM, so the Non-Secure code that access these registers (SystemInit, cybsp_init, etc.) must not be executed (otherwise, device reset will be done because of the Secure violation).
Use SCB3 for IFX_TFM_SPM_UART
because currently SCB3 is configured by default in the TF-M protection
settings.
The PSC3 platform requires specific setting to be provisioned during oem provisioning:
- Set the boot configuration ID to BOOT_THREE_SLOTS.
"boot": {
"boot_cfg_id": {
"description": "A behavior for BOOT_APP_LAYOUT (BOOT_SIMPLE_APP applicable to NORMAL_PROVISIONED only)",
"applicable_conf": "BOOT_SIMPLE_APP, BOOT_ONE_SLOT, BOOT_TWO_SLOTS, BOOT_THREE_SLOTS, BOOT_IDLE",
"value": "BOOT_THREE_SLOTS"
}
}
- Enable the L2 slot authentication.
"boot_auth_l2_enable": {
"description": "Indicates whether to enable L2 slot authentication by Boot FW",
"value": true
}
- Add the TFM_IMAGE_EXECUTE, CM33_NS_IMAGE_EXECUTE and CM33_NS_SECONDARY_SLOT memory regions to the boot application layout option.
"boot_app_layout": {
"description": "The memory layout for the applications defined by BOOT_CFG_ID. 0x32000000 - 0x33FFFFFF for secure addresses; 0x22000000 - 0x23FFFFFF for non-secure addresses",
"value": [
{
"address": "0x32000000",
"size": "0x2E800" # 186kB
},
{
"address": "0x22030000",
"size": "0x8000" # 32kB
},
{
"address": "0x22038000",
"size": "0x8000" # 32kB
}
]
}
NOTE: The value of boot_app_layout represents the executable regions from the memory configuration, in our case, these are the TFM_IMAGE_EXECUTE, CM33_NS_IMAGE_EXECUTE, and CM33_NS_SECONDARY_SLOT regions.
- MPC configuration, thus TF-M is not allowed to change it.
"mpc": {
"mpc_struct_ram": {
"description": "RAM MPC structures. The total number of RAM and Flash MPC structures must be less than 32",
"value": [
{
"description": "TFM_DATA region. PC2 WR secure. Offset and size in KB. The values must be multiple of 2 (e.g. 0 KB, 2 KB, 4 KB, 8 KB, ...)",
"offset": "0 KB",
"size": "48 KB",
"attr": {
"description": "The MPC attributes for this memory region",
"comment_1": "WRN allow write, read, and NS only access",
"comment_2": "-RN allow read, NS-only access",
"comment_3": "--- and --N, no access",
"comment_4": "WR- read and write access, but secure only",
"value": {
"pc0": "WR-",
"pc1": "WR-",
"pc2": "WR-",
"pc3": "WR-",
"pc4": "WR-",
"pc5": "WR-",
"pc6": "WR-",
"pc7": "WR-"
}
}
},
{
"description": "CM33_NS_DATA region. PC2 WR not secure. Offset and size in KB. The values must be multiple of 2 (e.g. 0 KB, 2 KB, 4 KB, 8 KB, ...)",
"offset": "48 KB",
"size": "16 KB",
"attr": {
"description": "The MPC attributes for this memory region",
"comment_1": "WRN allow write, read, and NS only access",
"comment_2": "-RN allow read, NS-only access",
"comment_3": "--- and --N, no access",
"comment_4": "WR- read and write access, but secure only",
"value": {
"pc0": "WR-",
"pc1": "WR-",
"pc2": "WRN",
"pc3": "WR-",
"pc4": "WR-",
"pc5": "WR-",
"pc6": "WR-",
"pc7": "WR-"
}
}
}
]
},
"mpc_struct_flash": {
"description": "Flash MPC structures. The total number of RAM and Flash MPC structures must be less than 32",
"value": [
{
"description": "TFM_IMAGE_EXECUTE, TFM_ITS and FLASH_NV_COUNTERS regions. PC2 WR secure. Offset and size in KB. The values must be multiple of 2 (e.g. 0 KB, 2 KB, 4 KB, 8 KB, ...)",
"offset": "0 KB",
"size": "192 KB",
"attr": {
"description": "The MPC attributes for this memory region",
"comment_1": "WRN allow read, write, and NS only access",
"comment_2": "-RN allow read, NS-only access",
"comment_3": "--- and --N, no access",
"comment_4": "WR- read and write access, but secure only",
"value": {
"pc0": "WR-",
"pc1": "WR-",
"pc2": "WR-",
"pc3": "WR-",
"pc4": "WR-",
"pc5": "WR-",
"pc6": "WR-",
"pc7": "WR-"
}
}
},
{
"description": "CM33_NS_IMAGE_EXECUTE and CM33_NS_SECONDARY_SLOT regions. PC2 WR is not secure. The offset and size are in KB. The values must be multiple of 2 (e.g. 0 KB, 2 KB, 4 KB, 8 KB, ...)",
"offset": "192 KB",
"size": "64 KB",
"attr": {
"description": "The MPC attributes for this memory region",
"comment_1": "WRN allow read, write, and NS only access",
"comment_2": "-RN allow read, NS-only access",
"comment_3": "--- and --N, no access",
"comment_4": "WR- read and write access, but secure only",
"value": {
"pc0": "WR-",
"pc1": "WR-",
"pc2": "WRN",
"pc3": "WR-",
"pc4": "WR-",
"pc5": "WR-",
"pc6": "WR-",
"pc7": "WR-"
}
}
}
]
}
}
NOTE: The offsets and sizes in the MPC configuration are filled in according to the PCS3 memory configuration, and must be recalculated if the PCS3 memory configuration is changed.
TF-M is configured by default with the following settings:
Description | Configuration option | PSC3 |
---|---|---|
Profile | TFM_PROFILE | profile_medium |
Crypto partition | TFM_PARTITION_CRYPTO | ON |
Use Crypto accelerator | IFX_MBEDTLS_ACCELERATION_ENABLED | ON |
Firmware Update partition | TFM_PARTITION_FIRMWARE_UPDATE | OFF |
Initial Attestation partition | TFM_PARTITION_INITIAL_ATTESTATION | ON |
Internal Trusted Storage partition | TFM_PARTITION_INTERNAL_TRUSTED_STORAGE | ON |
Platform partition | TFM_PARTITION_PLATFORM | ON |
Protected Storage partition | TFM_PARTITION_PROTECTED_STORAGE | OFF |
Isolation Level | TFM_ISOLATION_LEVEL | 2 |
Fault Injection Hardening | TFM_FIH_PROFILE | OFF |
NOTE: The Firmware Update service is not supported for the PSC3 device.
TF-M code is checked with MISRA-C and CERT-C rules checkers.
Following rules MISRA-C are ignored during the checks:
- PSC3: 1.2; 1.5; 2.1; 2.3; 2.4; 2.5; 2.7; 3.1; 5.1; 5.6; 5.7; 5.8; 8.3; 8.4; 8.5; 8.6; 8.7; 8.8; 8.9; 8.13; 8.15; 10.3; 10.5; 10.8; 11.1; 11.4; 11.5; 11.9; 12.1; 14.4; 15.5; 16.1; 16.3; 16.6; 20.9; 21.1; 21.2; 21.15.
Following rules CERT-C are ignored during the checks:
- PSC3: EXP32-C; EXP34-C; INT30-C; INT31-C; INT33-C; STR30-C.
Other MISRA-C and CERT-C rules may be suppressed for a specific lines - see TF-M source code for more details.
Use the following links for more information:
- Cypress Semiconductor Corporation (an Infineon company)
- Cypress Semiconductor Corporation (an Infineon company) GitHub
- Trusted Firmware website
- TF-M project
- PSA API
- ModusToolbox Software Environment, Quick Start Guide, Documentation, and Videos
© 2023-2025, Cypress Semiconductor Corporation (an Infineon company) or an affiliate of Cypress Semiconductor Corporation.