Skip to content

Add more links #1018

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Mar 24, 2019
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 7 additions & 2 deletions docs/porting/psa/spm.md
Original file line number Diff line number Diff line change
Expand Up @@ -257,7 +257,7 @@ Target-specific code must implement the function `spm_hal_memory_protection_init
The implementation of this function must be aligned with the SPM general guidelines, as the table below describes. This table describes the allowed operations (Read, Write and Execute) on the secure and nonsecure RAM and Flash by each core:

- X means No access.
- V means Must be able to access.
- ✓ means Must be able to access.
- ? means it is up to the target.
- X? means it is up to the target, preferably No access.

Expand All @@ -273,7 +273,12 @@ Processor access |Secure RAM |Secure FLASH|Nonsecure RAM |Nonsecu

### TF-M SPM porting (for ARMv8-M targets)

TF-M HAL functions are defined in `tfm_spm_hal.h`.
The `tfm_spm_hal.h` file defines TF-M HAL functions.

Mbed OS integrates TF-M sources from [trusted-firmware-m.git](https://git.trustedfirmware.org/trusted-firmware-m.git/about/).

For more information about Mbed OS builds and related concepts, please see [Mbed OS build rules](../reference/mbed-os-build-rules.html).


### System reset

Expand Down