Run TF-M examples on Arm platforms
Instructions for how to run TF-M and example test application on Arm platforms.
Follow build instruction to build the binaries. Follow secure boot to build the binaries with or without BL2 bootloader.
Execute TF-M example and regression tests on MPS2 boards and FVP
The BL2 bootloader and TF-M example application and tests have been verified using the reference model for MPS2 (AN521), in Keil MDK , Fixed Virtual Platforms and Arm Development Studio .
Note
The name of the reference model’s executable can vary depending on toolchain.
SMM-SSE-200 for Keil MDK
FVP_MPS2_AEMv8M for Fixed Virtual Platforms and Arm Development Studio
For more information please refer to the appropriate toolchain’s documentation: Keil MDK Documentation , Fixed Virtual Platforms Documentation , Arm Development Studio Documentation
To run the example code on an SSE-200 Fast-Model
Using FVP_MPS2_AEMv8M provided by Arm Development Studio 2019.1.
Example application and regression tests without BL2 bootloader
Add tfm_s.axf
and tfm_ns.axf
to symbol files in Debug Configuration
menu.
<DS_PATH>/sw/models/bin/FVP_MPS2_AEMv8M \
--parameter fvp_mps2.platform_type=2 \
--parameter cpu0.baseline=0 \
--parameter cpu0.INITVTOR_S=0x10000000 \
--parameter cpu0.semihosting-enable=0 \
--parameter fvp_mps2.DISABLE_GATING=0 \
--parameter fvp_mps2.telnetterminal0.start_telnet=1 \
--parameter fvp_mps2.telnetterminal1.start_telnet=0 \
--parameter fvp_mps2.telnetterminal2.start_telnet=0 \
--parameter fvp_mps2.telnetterminal0.quiet=0 \
--parameter fvp_mps2.telnetterminal1.quiet=1 \
--parameter fvp_mps2.telnetterminal2.quiet=1 \
--application cpu0=<build_dir>/bin/tfm_s.axf \
--data cpu0=<build_dir>/bin/tfm_ns.bin@0x00100000
Example application and regression tests with BL2 bootloader
To test TF-M with bootloader, one must apply the following changes:
Add
bl2.axf
to symbol files in DS-5 in Debug Configuration menu.Replace the last two lines of the previous command with this:
--application cpu0=<build_dir>/bin/bl2.axf \
--data cpu0=<build_dir>/bin/tfm_s_ns_signed.bin@0x10080000
Test software upgrade with BL2 bootloader
BL2 bootloader is mandatory to test software update. Furthermore two TF-M blob must be built. Outputs of example application and regression test can be used to test it. Load output of example application to the primary slot (0x10080000) and output of regression test to the secondary slot (0x10180000). Add the following line to the end of the previous chapter:
--data cpu0=<build_dir>/bin/tfm_s_ns_signed.bin@0x10180000
To run the example code on SSE 200 FPGA on MPS2 board
FPGA image is available to download here
To run BL2 bootloader and TF-M example application and tests in the MPS2 board,
it is required to have SMM-SSE-200 for MPS2 (AN521) image in the MPS2 board SD
card. The image should be located in
<MPS2 device name>/MB/HBI0263<board revision letter>/AN521
The MPS2 board tested is HBI0263C referred also as MPS2+.
Warning
If you change the exe names, MPS2 expects file names in 8.3 format.
Example application
Copy
bl2.bin
andtfm_s_ns_signed.bin
files from<build_dir>/bin
to<MPS2 device name>/SOFTWARE/
Open
<MPS2 device name>/MB/HBI0263C/AN521/images.txt
Update the
AN521/images.txt
file as follows:TITLE: Versatile Express Images Configuration File [IMAGES] TOTALIMAGES: 2 ;Number of Images (Max: 32) IMAGE0ADDRESS: 0x10000000 IMAGE0FILE: \Software\bl2.bin ; BL2 bootloader IMAGE1ADDRESS: 0x10080000 IMAGE1FILE: \Software\tfm_s_ns_signed.bin ; TF-M example application binary blob
Close
<MPS2 device name>/MB/HBI0263C/AN521/images.txt
Unmount/eject the
<MPS2 device name>
unitReset the board to execute the TF-M example application
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[INF] Starting bootloader [INF] Image 0: magic=good, copy_done=0xff, image_ok=0xff [INF] Scratch: magic=bad, copy_done=0x5, image_ok=0xcf [INF] Boot source: primary slot [INF] Swap type: none [INF] Bootloader chainload address offset: 0x80000 [INF] Jumping to the first image slot [Sec Thread] Secure image initializing!
Regression tests
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[INF] Starting bootloader
[INF] Image 0: magic=good, copy_done=0xff, image_ok=0xff
[INF] Scratch: magic=bad, copy_done=0x5, image_ok=0xcf
[INF] Boot source: primary slot
[INF] Swap type: none
[INF] Bootloader chainload address offset: 0x80000
[INF] Jumping to the first image slot
[Sec Thread] Secure image initializing!
#### Execute test suites for the protected storage service ####
Running Test Suite PS secure interface tests (TFM_PS_TEST_2XXX)...
> Executing 'TFM_PS_TEST_2001'
Description: 'Create interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2002'
Description: 'Get handle interface (DEPRECATED)'
This test is DEPRECATED and the test execution was SKIPPED
TEST PASSED!
> Executing 'TFM_PS_TEST_2003'
Description: 'Get handle with null handle pointer (DEPRECATED)'
This test is DEPRECATED and the test execution was SKIPPED
TEST PASSED!
> Executing 'TFM_PS_TEST_2004'
Description: 'Write interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2005'
Description: 'Read interface'
....
Note
PS reliability tests take a few minutes to run on the MPS2.
Example application without BL2 bootloader
Copy
tfm_s.bin
andtfm_ns.bin
files from<build_dir>/bin
to<MPS2 device name>/SOFTWARE/
Open
<MPS2 device name>/MB/HBI0263C/AN521/images.txt
Update the
AN521/images.txt
file as follows:TITLE: Versatile Express Images Configuration File [IMAGES] TOTALIMAGES: 2 ;Number of Images (Max: 32) IMAGE0ADDRESS: 0x10000000 IMAGE0FILE: \Software\tfm_s.bin ; Secure code IMAGE1ADDRESS: 0x00100000 IMAGE1FILE: \Software\tfm_ns.bin ; Non-secure code
Close
<MPS2 device name>/MB/HBI0263C/AN521/images.txt
Unmount/eject the
<MPS2 device name>
unitReset the board to execute the TF-M example application
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[Sec Thread] Secure image initializing!
Regression tests without BL2 bootloader
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[Sec Thread] Secure image initializing!
#### Execute test suites for the protected storage service ####
Running Test Suite PS secure interface tests (TFM_PS_TEST_2XXX)...
> Executing 'TFM_PS_TEST_2001'
Description: 'Create interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2002'
Description: 'Get handle interface (DEPRECATED)'
This test is DEPRECATED and the test execution was SKIPPED
TEST PASSED!
> Executing 'TFM_PS_TEST_2003'
Description: 'Get handle with null handle pointer (DEPRECATED)'
This test is DEPRECATED and the test execution was SKIPPED
TEST PASSED!
> Executing 'TFM_PS_TEST_2004'
Description: 'Write interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2005'
Description: 'Read interface'
....
Execute TF-M example and regression tests on Musca test chip boards
Note
Before executing any images on Musca-B1 board, please check the target platform readme to have the correct setup.
Install SRecord for Musca test chip boards.
Windows: SRecord v1.63
Linux: sudo apt-get install -y srecord
Example application with BL2 bootloader
Create a unified hex file comprising of both
bl2.bin
andtfm_s_ns_signed.bin
.For Musca-B1
Windows:
srec_cat.exe bin\bl2.bin -Binary -offset 0xA000000 bin\tfm_s_ns_signed.bin -Binary -offset 0xA020000 -o tfm.hex -Intel
Linux:
srec_cat bin/bl2.bin -Binary -offset 0xA000000 bin/tfm_s_ns_signed.bin -Binary -offset 0xA020000 -o tfm.hex -Intel
For Musca-S1
Windows:
srec_cat.exe bin\bl2.bin -Binary -offset 0xA000000 bin\tfm_s_ns_signed.bin -Binary -offset 0xA020000 -o tfm.hex -Intel
Linux:
srec_cat bin/bl2.bin -Binary -offset 0xA000000 bin/tfm_s_ns_signed.bin -Binary -offset 0xA020000 -o tfm.hex -Intel
Power up the Musca board by connecting it to a computer with a USB lead. Press the
PBON
button if the greenON
LED does not immediately turn on. The board should appear as a USB drive.Copy
tfm.hex
to the USB drive. The orangePWR
LED should start blinking.Once the
PWR
LED stops blinking, power cycle or reset the board to boot from the new image.After completing the procedure you should see the following messages on the DAPLink UART (baud 115200 8n1):
[INF] Starting bootloader [INF] Image 0: magic=good, copy_done=0xff, image_ok=0xff [INF] Scratch: magic=bad, copy_done=0x5, image_ok=0xd9 [INF] Boot source: primary slot [INF] Swap type: none [INF] Bootloader chainload address offset: 0x20000 [INF] Jumping to the first image slot [Sec Thread] Secure image initializing!
Regression tests with BL2 bootloader
Note
As the Internal Trusted Storage and Protected Storage tests use persistent storage, it is recommended to erase the storage area before running the tests. Existing data may prevent the tests from running to completion if, for example, there is not enough free space for the test data or the UIDs used by the tests have already been created with the write-once flag set. Repeated test runs can be done without erasing between runs.
To erase the storage when flashing an image, -fill 0xFF <start_addr>
<end_addr>
can be added to the srec_cat
command used to create the
combined hex file. The <start_addr>
and <end_addr>
are the start and
end addresses of the storage area, found in the board’s flash_layout.h
file. The board’s flash can also be erased via a debugger; see your IDE’s
documentation for instructions.
After completing the procedure you should see the following messages on the DAPLink UART (baud 115200 8n1):
[INF] Starting bootloader
[INF] Image 0: magic=good, copy_done=0xff, image_ok=0xff
[INF] Scratch: magic=bad, copy_done=0x5, image_ok=0x9
[INF] Boot source: primary slot
[INF] Swap type: none
[INF] Bootloader chainload address offset: 0x20000
[INF] Jumping to the first image slot
[Sec Thread] Secure image initializing!
#### Execute test suites for the protected storage service ####
Running Test Suite PS secure interface tests (TFM_PS_TEST_2XXX)...
> Executing 'TFM_PS_TEST_2001'
Description: 'Create interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2002'
Description: 'Get handle interface (DEPRECATED)'
This test is DEPRECATED and the test execution was SKIPPED
TEST PASSED!
> Executing 'TFM_PS_TEST_2003'
Description: 'Get handle with null handle pointer (DEPRECATED)'
This test is DEPRECATED and the test execution was SKIPPED
TEST PASSED!
> Executing 'TFM_PS_TEST_2004'
Description: 'Get attributes interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2005'
Description: 'Get attributes with null attributes struct pointer'
....
PSA API tests
Follow the build instructions for the PSA API tests and then follow the above procedures for flashing the image to the board. The PSA API tests are linked into the TF-M binaries and will automatically run. A log similar to the following should be visible on the UART; it is normal for some tests to be skipped but there should be no failed tests:
[Sec Thread] Secure image initializing!
Booting TFM v1.1
Non-Secure system starting...
***** PSA Architecture Test Suite - Version 1.0 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
<further tests removed from log for brevity>
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 11
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 6
******************************************
Note
The Internal Trusted Storage and Protected Storage flash areas must be wiped before running the Storage test suites.
Many IDEs for embedded development (such as Keil µVision) offer a function to erase a device’s flash. Refer to your IDE’s documentation for instructions.
Another way this can be achieved is by using srec_cat
with the -fill
parameter to fill the corresponding area in the binary with the erase value
of the flash (0xFF
).
Refer to the platform flash layout for appropriate addresses to erase on other platforms.
This step is not required on targets that emulate flash storage in RAM, as it will be erased each time the device is reset. Note, however, that a warm reset may not clear SRAM contents, so it may be necessary to power the device off and on again between test runs.
Example application or regression tests on Musca-B1 without BL2 bootloader
Follow the above procedures, but create a unified hex file out of tfm_s.bin
and tfm_ns.bin
:
Windows:
srec_cat.exe bin\tfm_s.bin -Binary -offset 0xA000000 bin\tfm_ns.bin -Binary -offset 0xA080000 -o tfm.hex -Intel
Linux:
srec_cat bin/tfm_s.bin -Binary -offset 0xA000000 bin/tfm_ns.bin -Binary -offset 0xA080000 -o tfm.hex -Intel
Execute TF-M example and regression tests on MPS3 boards
To run the example code on CoreLink SSE-200 Subsystem for MPS3 (AN524)
FPGA image is available to download here
To run BL2 bootloader and TF-M example application and tests in the MPS3 board,
it is required to have SMM-SSE-200 for MPS3 (AN524) image in the MPS3 board
SD card. The image should be located in
<MPS3 device name>/MB/HBI<BoardNumberBoardrevision>/AN524
And the current boot memory for AN524 is QSPI flash, so you need to set the
correct REMAP option in
<MPS3 device name>/MB/HBI<BoardNumberBoardrevision>/AN524/an524_v1.txt
REMAP: QSPI ;REMAP boot device BRAM/QSPI. Must match REMAPVAL below.
REMAPVAL: 1 ;REMAP register value e.g. 0-BRAM. 1-QSPI
The MPS3 board tested is HBI0309B.
Note
If you change the exe names, MPS3 expects file names in 8.3 format.
Example application
Copy
bl2.bin
andtfm_s_ns_signed.bin
files from build dir to<MPS3 device name>/SOFTWARE/
Open
<MPS3 device name>/MB/HBI0309B/AN524/images.txt
Update the
images.txt
file as follows:TITLE: Arm MPS3 FPGA prototyping board Images Configuration File [IMAGES] TOTALIMAGES: 2 ;Number of Images (Max: 32) IMAGE0UPDATE: AUTO ;Image Update:NONE/AUTO/FORCE IMAGE0ADDRESS: 0x00000000 ;Please select the required executable program IMAGE0FILE: \SOFTWARE\bl2.bin IMAGE1UPDATE: AUTO IMAGE1ADDRESS: 0x00040000 IMAGE1FILE: \SOFTWARE\tfm_s_ns_signed.bin
Close
<MPS3 device name>/MB/HBI0309B/AN524/images.txt
Unmount/eject the
<MPS3 device name>
unitReset the board to execute the TF-M example application
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[INF] Starting bootloader [INF] Image 0: magic= good, copy_done=0xff, image_ok=0xff [INF] Scratch: magic=unset, copy_done=0x43, image_ok=0xff [INF] Boot source: slot 0 [INF] Swap type: none [INF] Bootloader chainload address offset: 0x40000 [INF] Jumping to the first image slot [Sec Thread] Secure image initializing!
Regression tests
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[INF] Starting bootloader
[INF] Image 0: magic= good, copy_done=0xff, image_ok=0xff
[INF] Scratch: magic=unset, copy_done=0x9, image_ok=0xff
[INF] Boot source: slot 0
[INF] Swap type: none
[INF] Bootloader chainload address offset: 0x40000
[INF] Jumping to the first image slot
[Sec Thread] Secure image initializing!
#### Execute test suites for the Secure area ####
Running Test Suite PSA protected storage S interface tests (TFM_PS_TEST_2XXX)...
> Executing 'TFM_PS_TEST_2001'
Description: 'Set interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2002'
Description: 'Set interface with create flags'
TEST PASSED!
> Executing 'TFM_PS_TEST_2003'
Description: 'Set interface with NULL data pointer'
TEST PASSED!
> Executing 'TFM_PS_TEST_2004'
Description: 'Set interface with invalid data length'
TEST PASSED!
....
Note
Some of the attestation tests take a few minutes to run on the MPS3.
Example application without BL2 bootloader
Copy
tfm_s.bin
andtfm_ns.bin
files from build dir to<MPS3 device name>/SOFTWARE/
Open
<MPS3 device name>/MB/HBI0309B/AN524/images.txt
Update the
images.txt
file as follows:TITLE: Arm MPS3 FPGA prototyping board Images Configuration File [IMAGES] TOTALIMAGES: 2 ;Number of Images (Max: 32) IMAGE0UPDATE: AUTO ;Image Update:NONE/AUTO/FORCE IMAGE0ADDRESS: 0x00000000 ;Please select the required executable program IMAGE0FILE: \SOFTWARE\tfm_s.bin IMAGE1UPDATE: AUTO IMAGE1ADDRESS: 0x000C0000 IMAGE1FILE: \SOFTWARE\tfm_ns.bin
Close
<MPS3 device name>/MB/HBI0309B/AN521/images.txt
Unmount/eject the
<MPS3 device name>
unitReset the board to execute the TF-M example application
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[Sec Thread] Secure image initializing!
Regression tests without BL2 bootloader
After completing the procedure you should be able to visualize on the serial port (baud 115200 8n1) the following messages:
[Sec Thread] Secure image initializing!
#### Execute test suites for the Secure area ####
Running Test Suite PSA protected storage S interface tests (TFM_PS_TEST_2XXX)...
> Executing 'TFM_PS_TEST_2001'
Description: 'Set interface'
TEST PASSED!
> Executing 'TFM_PS_TEST_2002'
Description: 'Set interface with create flags'
TEST PASSED!
> Executing 'TFM_PS_TEST_2003'
Description: 'Set interface with NULL data pointer'
TEST PASSED!
> Executing 'TFM_PS_TEST_2004'
Description: 'Set interface with invalid data length'
TEST PASSED!
....
Firmware upgrade and image validation with BL2 bootloader
High level operation of BL2 bootloader and instructions for testing firmware upgrade is described in secure boot.
Copyright (c) 2017-2022, Arm Limited. All rights reserved.