Verified Commit 020b2b3b authored by Vincent Coubard's avatar Vincent Coubard
Browse files

Version 0.4



This delivery contains the following improvements:

    - Added OTA sections in the README
    - Improved README instructions and deleted unnecessary sections.
    - Removed references to orta in favor of Arm Virtual Hardware/AVH
    - Improved sw version management.
Signed-off-by: Vincent Coubard's avatarVincent Coubard <vincent.coubard@arm.com>
parent bb1b8de2
# Introduction
[Arm IoT Total Solutions](https://confluence.arm.com/www.arm.com/solutions/iot/total-solutions-iot) provides a complete solution designed for specific use-cases, leaving developers to focus on what really matters – innovation and differentiation across diverse and varied use cases. It has everything needed to simplify the design process and streamline product development, including hardware IP, software, real-time OS support, machine learning (ML) models, advanced tools such as the new Virtual Hardware Targets, application specific reference code and support from the world’s largest IoT ecosystem.
[Arm IoT Total Solutions](https://www.arm.com/solutions/iot/total-solutions-iot) provides a complete solution designed for specific use-cases, leaving developers to focus on what really matters – innovation and differentiation across diverse and varied use cases. It has everything needed to simplify the design process and streamline product development, including hardware IP, software, real-time OS support, machine learning (ML) models, advanced tools such as the new Arm Virtual Hardware, application specific reference code and support from the world’s largest IoT ecosystem.
# Configurations
This repo contains Arm's first [IoT Total Solution](https://confluence.arm.com/www.arm.com/solutions/iot/total-solutions-iot), "Keyword Detection". It provides general-purpose compute and ML workload use-cases, including an ML-based keyword recognition example that leverages the DS-CNN model from the [Arm Model Zoo](https://github.com/ARM-software/ML-zoo). The software supports multiple configurations of the Arm Corstone™-300 subsystem, incorporating the Cortex-M55 processor and Arm Ethos™-U55 microNPU. This total solution provides the complex, non differentiated secure platform software on behalf of the ecosystem, thus enabling you to focus on your next killer app. This repo also supports a GitHub runner ci/cd workflow right out of the box which leverages [Arm Virtual Hardware](https://www.arm.com/products/development-tools/simulation/virtual-hardware), a simulation environment that enables software development without the need of physical SoCs. The source code in this repo supports several configurations of the software, all of which are AWS IoT Core (OTA, etc.) enabled right out of the box. Instructions for using non-default configurations are provided in the below table.
| # | default | description | .github/workflows/build.yml code change | |
|---|---------|----------------------------------------------------------------------------------------------------------|-----------------------------------------|---|
| 1 | | general purpose compute application (blinky application running on the m55 processor only) | tbd | |
| 2 | | keyword detection application (running on the m55 only) | tbd | |
| 3 | YES | keyword detection application (running on the m55+u55) | tbd | |
| 4 | | instructions for replacing the keyword model and application code with your own custom application/model | tbd | |
This repo contains Arm's first [IoT Total Solution](https://www.arm.com/solutions/iot/total-solutions-iot), "Keyword Detection". It provides general-purpose compute and ML workload use-cases, including an ML-based keyword recognition example that leverages the DS-CNN model from the [Arm Model Zoo](https://github.com/ARM-software/ML-zoo). The software supports multiple configurations of the Arm Corstone™-300 subsystem, incorporating the Cortex-M55 processor and Arm Ethos™-U55 microNPU. This total solution provides the complex, non differentiated secure platform software on behalf of the ecosystem, thus enabling you to focus on your next killer app. This repo also supports a GitHub runner CI/CD workflow right out of the box which leverages [Arm Virtual Hardware](https://www.arm.com/virtual-hardware), a simulation environment that enables software development without the need of physical SoCs. The source code in this repo supports several configurations of the software, all of which are AWS IoT Core (OTA, etc.) enabled right out of the box. Instructions for using non-default configurations are coming soon!e.
# Quick Start
Follow these simple steps to use this code example's default configuration #3 keyword detection application.
1. Mirror this repo
1. Mirror the repository
```sh
# create a mirror (assumes new repo is already created https://docs.github.com/en/articles/creating-a-new-repository)
> git clone --bare https://github.com/ARM-software/ATS-Keyword
> cd ATS-Keyword
> git push --mirror https://github.com/exampleuser/my-ats-keyword.git
> cd ..
# clone your new repo
> git clone https://github.com/exampleuser/my-ats-keyword.git
# optionally remove the original repo from your hard drive
> cd ..
> rm -rf ATS-Keyword
```
2. Launch Arm Virtual Hardware Instance
To utilize the Arm Virtual Hardware, you will need to create an AWS Account if you don’t already have one.
```sh
# Ensure aws cli is installed and set up: https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-install.html
# The script requires a key pair to be set in AWS to identify instances and start new ones.
# Provisioning of keys is detailed here: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html
# Note: The key parameter required by the script is the name of the key pair in AWS.
# Open your favorite terminal program or linux shell application
# Start a new instance.
./scripts/avh_cli.py -k <key pair> start
......@@ -51,31 +49,25 @@ Follow these simple steps to use this code example's default configuration #3 ke
3. Launch GitHub Self-Hosted Runner
```sh
# follow your repo's instructions to configure the github self hosted runner on the Arm Virtual Hardware ec2 instance
# https://github.com/exampleuser/my-ats-keyword.git/settings/actions/runners/new
```sh
# Login to the ami
> ssh ubuntu@<your-ec2-instance>
# Install runner software
> mkdir actions-runner && cd actions-runner
> curl -o <actions-runner.tar.gz -L https://github.com/actions/runner/releases/download/<version>/<action-runner>.tar.gz
> echo "<sha> <action-runner>.tar.gz" | shasum -a 256 -c
> tar xzf ./<action-runner>.tar.gz
# Create, configure and run the runner
> ./config.sh --url https://github.com/exampleuser/my-ats-keyword --token <token>
> ./run.sh
```
Follow your repo's instructions to configure the github self hosted runner on the Arm Virtual Hardware ec2 instance
https://github.com/exampleuser/my-ats-keyword.git/settings/actions/runners/new
```sh
# exit the ami and return shell back to your desktop
> exit
```
4. make a trivial (whitespace) code change and watch the code example compile and run test cases on Arm Virtual Hardware on your ec2 instance.
Please refer to Github actions [documentation](https://docs.github.com/en/actions) to make additional change to the workflow
4. Trigger the GitHub Runner.
```sh
# make a trivial (whitespace) code change and watch the code example compile and
# run test cases on Arm Virtual Hardware on your ec2 instance.
# add whitespace to this file
> vim .github/workflows/avh.yml
......@@ -85,9 +77,23 @@ Follow these simple steps to use this code example's default configuration #3 ke
> git push origin main
```
5. To update the application, a set of scripts is included to setup the environment, build applications, run them and test them. These scripts must be executed in the AVH AMI.
Please refer to Github actions [documentation](https://docs.github.com/en/actions) to make additional changes to the workflow
5. Build and execute the application
```sh
# To update the application, a set of scripts is included to setup the environment,
# build applications, run them and test them. These scripts must be executed in the AVH AMI.
# Open your favorite terminal program or linux shell application and connect to the AVH AMI instance
# Login to the ami
ssh ubuntu@<your-ec2-instance>
# clone your new repo in the ami
git clone https://github.com/exampleuser/my-ats-keyword.git
cd my-ats-keyword
# Synchronize git submodules, setup ML and apply required patches
./bootstrap.sh
......@@ -109,7 +115,7 @@ Alternatively, the projects can be build using [Keil MDK](https://www.arm.com/pr
# Setting up AWS connectivity
The KWS Demo will attempt to connect to AWS IOT and report ML inference results through an MQTT connection. For this to work you will need a [AWS Account](https://aws.amazon.com/) and setup an IoT thing and set credentials in the application.
The Keyword Detection application Demo will attempt to connect to AWS IOT and report ML inference results through an MQTT connection. To connect to the AWS cloud service you will need to setup an IoT Thing and then set the AWS credentials of the IoT Thing within the Application. You will need to create an [AWS Account](https://aws.amazon.com/) if you don’t already have one.
## AWS account IoT setup
......@@ -128,7 +134,7 @@ The KWS Demo will attempt to connect to AWS IOT and report ML inference results
1. In the navigation pane of the AWS IoT console, choose **Secure**, and then choose **Policies**.
2. On the **Policies** page, choose **Create** (top right corner).
3. On the **Create a policy** page, enter a name for the policy. In the **Action** box, enter **iot:Connect**, **iot:Publish**, **iot:Subscribe**, **iot:Receive**. The **Resource ARN** box will be auto-filled with your credentials. Replace the part after the last semicolon (`:`) with `*`. Under **Effect**, check the **Allow** box. Click on **Create**.
3. On the **Create a policy** page, enter a name for the policy. In the **Action** box, enter **iot:Connect**, **iot:Publish**, **iot:Subscribe**, **iot:Receive**. The **Resource ARN** box will be auto-filled with your credentials. Replace the part after the last colon (`:`) with `*`. Under **Effect**, check the **Allow** box. Click on **Create**.
4. In the left navigation pane of the AWS IoT console, choose **Secure**, and then choose **Certificates**. You should see the certificate that you have created earlier.
5. Click on the three dots in the upper right corner of the certificate and choose **Attach policy**.
6. In the **Attach policies to certificate(s)** window, enable the policy that you have just created and click **Attach**.
......@@ -167,13 +173,44 @@ To see messages being sent by the application:
3. Select the thing you created, and open the **Activity** tab. This will show the application connecting and subscribing to a topic.
4. Click on the **MQTT test client** button. This will open a new tab.
5. The tab **Subscribe to a topic** should be already selected. Open the **Additional configuration** rollout.
6. In the topic filter field enter the topic name which is a concatenation of the name of your thing (set in clientcredentialIOT_THING_NAME) and `/ml/inference` (e.g. if you thing name is MyThing then it's `MyThing/ml/inference`)
6. In the topic filter field enter the topic name which is a concatenation of the name of your thing (set in `clientcredentialIOT_THING_NAME`) and `/ml/inference` (e.g. if you thing name is MyThing then it's `MyThing/ml/inference`)
7. In the **MQTT payload display** combo box select `Display payloads as strings (more accurate)`
8. Click the **Subscribe** button. The messages will be shown below.
# Replace DS-CNN
# OTA firmware update
The application includes OTA update functionality. Application will check for updates at boot time and stop ml processing and instead download and apply new firmware if a newer version is available. To make such a version available you need to prepare the update binary (this is part of the build process) and crate an OTA job on AWS.
All the ML models supported by the [ML Embedded Eval Kit](All the models supported ) are available to applications. The first step to use another odule is to generate sources files from its labels and `.tflite` model.
## Creating updated firmware
As part of the example build process an updated firmware will be created that will only differ in version number. That is enough to demonstrate the OTA process. If you want to add other changes you will have to copy the non-updated binary elsewhere before running the build again with your changes as the same build is used for both. The update binary is placed in `build/kws/tfm_ns_signed_update.bin`. This is already signed and is the file you will need to upload to a AWS bucket in the next section.
Upon completion of the build and sign process the signature string will be echoed. This will be needed in the next step.
## Creating AWS IoT firmware update job
1. [Create an Amazon S3 bucket to store your update](https://docs.aws.amazon.com/freertos/latest/userguide/dg-ota-bucket.html)
2. [Create an OTA Update service role](https://docs.aws.amazon.com/freertos/latest/userguide/create-service-role.html)
3. [Create an OTA user policy](https://docs.aws.amazon.com/freertos/latest/userguide/create-ota-user-policy.html)
4. Go to AWS IoT web interface and choose **Manage** and then **Jobs*
5. Click the create job button and select **Create FreeRTOS OTA update job**
6. Give it a name and click next
7. Select the device to update (the Thing you created in earlier steps)
8. Select `MQTT` transport only
9. Select **Use my custom signed file**
10. Paste the signature string that is echoed during the build of the example (it is also available in `build/kws/update-signature.txt`).
11. Select `SHA-256` and `RSA` algorithms.
12. For **Path name of code signing certificate on device** put in `0` (the path is not used)
13. Select upload new file and select the signed update binary (`build/kws/tfm_ns_signed_update.bin`)
14. Select the S3 bucket you created in step 1. to upload the binary to
15. For **Path name of file on device** put in `non_secure image`
16. As the role, select the OTA role you created in step 2.
17. Click next
18. Click next, your update job is ready and running - next time your application connects it will perform the update.
# ML Model Replacement
All the ML models supported by the [ML Embedded Eval Kit](All the models supported ) are available to applications. The first step to use another module is to generate sources files from its labels and `.tflite` model.
```sh
# Enter the ml example repository
......@@ -200,10 +237,6 @@ Pre-integrated source code is available from the `ML Embedded Eval Kit` and can
Integrating a new model means integrating its source code and requires update of the build files.
# ML Embedded Eval Kit
Philip Lewer to replace this text with a paragraph for ml embedded eval kit
# Future Enhancements
- [AWS Partner Device Catalog Listing](https://devices.amazonaws.com/) (leveraging Arm Virtual Hardware)
- cmake
......@@ -226,4 +259,4 @@ Philip Lewer to replace this text with a paragraph for ml embedded eval kit
The software is provided under the Apache-2.0 license. All contributions to software and documents are licensed by contributors under the same license model as the software/document itself (ie. inbound == outbound licensing). ATS-Keyword may reuse software already licensed under another license, provided the license is permissive in nature and compatible with Apache v2.0.
Folders containing files under different permissive license than Apache 2.0 are listed in the LICENSE file.
\ No newline at end of file
Folders containing files under different permissive license than Apache 2.0 are listed in the LICENSE file.
......@@ -9,7 +9,6 @@
<project>
<PathAndName>.\tfm.bootloader.uvprojx</PathAndName>
<NodeIsActive>1</NodeIsActive>
</project>
<project>
......@@ -18,6 +17,7 @@
<project>
<PathAndName>.\tfm.kws_ns.uvprojx</PathAndName>
<NodeIsActive>1</NodeIsActive>
</project>
</ProjectWorkspace>
......@@ -39,6 +39,7 @@
#include "iot_logging_task.h"
#include "aws_dev_mode_key_provisioning.h"
#include "psa/update.h"
#include "version/application_version.h"
extern int mbedtls_platform_set_calloc_free( void * (*calloc_func)( size_t, size_t ),
void (*free_func)( void * ) );
......@@ -88,15 +89,12 @@ psa_key_handle_t xOTACodeVerifyKeyHandle = NULL;
void print_version()
{
psa_image_info_t xImageInfo = { 0 };
psa_image_id_t ulImageID = FWU_CALCULATE_IMAGE_ID(FWU_IMAGE_ID_SLOT_ACTIVE, FWU_IMAGE_ID_SLOT_ACTIVE, 0);
psa_status_t uxStatus = psa_fwu_query( ulImageID, &xImageInfo );
if( uxStatus != PSA_SUCCESS )
if( GetImageVersionPSA(FWU_IMAGE_TYPE_NONSECURE) == 0 )
{
print_log("Firmware version: %d.%d.%d",
xImageInfo.version.iv_major,
xImageInfo.version.iv_minor,
xImageInfo.version.iv_revision);
xAppFirmwareVersion.u.x.major,
xAppFirmwareVersion.u.x.minor,
xAppFirmwareVersion.u.x.build);
}
}
......
......@@ -25,7 +25,7 @@ import logging
import platform
# AWS ORTA-TEST connection details
# AWS AVH-TEST connection details
# TODO will eventually change to public AMI
# version 0.3.0
ImgId="ami-030e410551d9b5fa5"
......@@ -52,17 +52,17 @@ else:
nc="\033[0m"
def start_orta(profile, key, region, initfile):
def start_avh(profile, key, region, initfile):
global ImgId, InstType
if status_orta(profile, region, False)[0] > 0 :
print(orange + "One or more ORTA instances are already running." + nc)
if status_avh(profile, region, False)[0] > 0 :
print(orange + "One or more AVH instances are already running." + nc)
confirm = input("Please confirm to launch a new instance [Y/n]: ")
if confirm != "Y":
print("Cancelling... No instance will be started.")
sys.exit(1)
print("Starting ORTA instance...")
print("Starting AVH instance...")
cmd = "aws ec2 run-instances --profile {} --image-id {} --instance-type {} --key-name {} --region {}".format(
profile, ImgId, InstType, key, region)
......@@ -83,7 +83,7 @@ def start_orta(profile, key, region, initfile):
return
def status_orta(profile, region, printv):
def status_avh(profile, region, printv):
global ImgId
n_instances = 0
......@@ -123,11 +123,11 @@ def status_orta(profile, region, printv):
return n_instances, arr_inst
def stop_orta(profile, region):
[n, arr] = status_orta(profile, region, False)
def stop_avh(profile, region):
[n, arr] = status_avh(profile, region, False)
if n == 0 :
logging.error(red + "No ORTA instance is running." + nc)
logging.error(red + "No AVH instance is running." + nc)
sys.exit(1)
else:
if n > 1:
......@@ -142,7 +142,7 @@ def stop_orta(profile, region):
if(instanceid == ""):
print("Cancelling... No instance will be stopped.")
else:
print(orange + "Stopping ORTA instance ID {}...".format(instanceid) + nc)
print(orange + "Stopping AVH instance ID {}...".format(instanceid) + nc)
cmd = "aws ec2 terminate-instances --profile {} --instance-ids {} --region {}".format(
profile, instanceid, region)
......@@ -158,7 +158,7 @@ def stop_orta(profile, region):
# Command options
if __name__ == "__main__":
parser = argparse.ArgumentParser(description="ORTA command-line interface for AWS. Starts (launches) a single ORTA AMI instance and stops (terminates) it.")
parser = argparse.ArgumentParser(description="AVH command-line interface for AWS. Starts (launches) a single AVH AMI instance and stops (terminates) it.")
parser.add_argument("-p", dest="profile", metavar="NAME", action="store", type=str, help=("Name of the profile configuration (default is 'default')"), default="default")
parser.add_argument("-k", dest="key", metavar="KEY", action="store", type=str, help=("Name of the AWS key. If not specified, a key will be created"))
parser.add_argument("-r", dest="region", metavar="REGION", action="store", type=str, help=("Name of the AWS region (default is 'us-east-1')"), default="us-east-1")
......@@ -195,11 +195,11 @@ if __name__ == "__main__":
if args.command.lower() == "start" :
# Key check
if args.key == None:
args.key = "orta_user"
if os.path.isfile(os.path.join(os.path.expanduser('~'),'.ssh/orta_user.pem')) == False :
logging.info(red + "No key specified and orta_user key not found, creating 'orta_user' key..." + nc)
args.key = "avh_user"
if os.path.isfile(os.path.join(os.path.expanduser('~'),'.ssh/avh_user.pem')) == False :
logging.info(red + "No key specified and avh_user key not found, creating 'avh_user' key..." + nc)
cmd = "aws ec2 create-key-pair --key-name orta_user --profile {} --region {}".format(
cmd = "aws ec2 create-key-pair --key-name avh_user --profile {} --region {}".format(
args.profile, args.region)
try:
out = subprocess.check_output(cmd, shell=True).decode("utf-8")
......@@ -208,7 +208,7 @@ if __name__ == "__main__":
sys.exit(1)
outd = json.loads(out)
key_file = open(os.path.join(os.path.expanduser('~'),'.ssh/orta_user.pem'), 'x')
key_file = open(os.path.join(os.path.expanduser('~'),'.ssh/avh_user.pem'), 'x')
try:
key_file.write(outd["KeyMaterial"])
except:
......@@ -219,19 +219,19 @@ if __name__ == "__main__":
# Set permissions
if platform.system() == "Linux" :
os.system('chmod 600 ~/.ssh/orta_user.pem')
os.system('chmod 600 ~/.ssh/avh_user.pem')
logging.info(orange + "Key has been saved as {}.ssh".format(os.path.expanduser('~') + os.path.sep) + os.path.sep + "orta_user.pem." + nc)
logging.info(orange + "Key has been saved as {}.ssh".format(os.path.expanduser('~') + os.path.sep) + os.path.sep + "avh_user.pem." + nc)
else:
logging.info(orange + "Using 'orta_user' key in {}.ssh ...".format(os.path.expanduser('~') + os.path.sep) + nc)
logging.info(orange + "Using 'avh_user' key in {}.ssh ...".format(os.path.expanduser('~') + os.path.sep) + nc)
start_orta(args.profile, args.key, args.region, args.cloudinit)
start_avh(args.profile, args.key, args.region, args.cloudinit)
elif args.command.lower() == "status" :
status_orta(args.profile, args.region, True)
status_avh(args.profile, args.region, True)
elif args.command.lower() == "stop" :
stop_orta(args.profile, args.region)
stop_avh(args.profile, args.region)
else :
logging.error(red + "Unknown command." + nc)
......
......@@ -50,7 +50,7 @@ python3 ./lib/tf-m/bl2/ext/mcuboot/scripts/wrapper/wrapper.py \
echo "Signing non-secure binary."
python3 ./lib/tf-m/bl2/ext/mcuboot/scripts/wrapper/wrapper.py \
-v 0.0.0 \
-v 1.0.0 \
--layout $(readlink -f "bsp/signing_layout_ns.c") \
-k ./lib/tf-m/bl2/ext/mcuboot/root-RSA-2048_1.pem \
--public-key-format full \
......
......@@ -73,7 +73,7 @@
<LExpSel>0</LExpSel>
</OPTXL>
<OPTFL>
<tvExp>0</tvExp>
<tvExp>1</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
<IsCurrentTarget>1</IsCurrentTarget>
</OPTFL>
......
......@@ -88,7 +88,7 @@
<nStopA1X>0</nStopA1X>
<nStopA2X>0</nStopA2X>
</AfterMake>
<SelectedForBatchBuild>0</SelectedForBatchBuild>
<SelectedForBatchBuild>1</SelectedForBatchBuild>
<SVCSIdString></SVCSIdString>
</TargetCommonOption>
<CommonProperty>
......
......@@ -26,7 +26,7 @@
<files>
<group name="platform_an547_bl2">
<cflags add="-DBL2 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -DTFM_LVL=1 -DTFM_PARTITION_AUDIT_LOG -DTFM_PARTITION_CRYPTO -DTFM_PARTITION_INITIAL_ATTESTATION -DTFM_PARTITION_INTERNAL_TRUSTED_STORAGE -DTFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG -DTFM_PARTITION_PLATFORM -DTFM_PARTITION_PROTECTED_STORAGE -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/ext/target/arm/mps3/an547/. -I./lib/tf-m/platform/.. -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/tf-m/interface/include -I./bsp/interface/include -I./lib/tf-m/bl2/include -I./lib/tf-m/secure_fw/spm/cmsis_psa/arch -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<cflags add="-DBL2 -DMCUBOOT_DATA_SHARING=1 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -DTFM_LVL=1 -DTFM_PARTITION_AUDIT_LOG -DTFM_PARTITION_CRYPTO -DTFM_PARTITION_INITIAL_ATTESTATION -DTFM_PARTITION_INTERNAL_TRUSTED_STORAGE -DTFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG -DTFM_PARTITION_PLATFORM -DTFM_PARTITION_PROTECTED_STORAGE -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/ext/target/arm/mps3/an547/. -I./lib/tf-m/platform/.. -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/tf-m/interface/include -I./bsp/interface/include -I./lib/tf-m/bl2/include -I./lib/tf-m/secure_fw/spm/cmsis_psa/arch -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<file category="sourceC" name="./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/Driver_Flash.c"/>
<file category="sourceC" name="./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/Driver_USART.c"/>
<file category="sourceC" name="./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/device_definition.c"/>
......@@ -36,7 +36,7 @@
</group>
<group name="platform_bl2">
<cflags add="-DBL2 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -DTFM_LVL=1 -DTFM_PARTITION_AUDIT_LOG -DTFM_PARTITION_CRYPTO -DTFM_PARTITION_INITIAL_ATTESTATION -DTFM_PARTITION_INTERNAL_TRUSTED_STORAGE -DTFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG -DTFM_PARTITION_PLATFORM -DTFM_PARTITION_PROTECTED_STORAGE -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/ext/target/arm/mps3/an547/. -I./lib/tf-m/platform/.. -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/tf-m/interface/include -I./bsp/interface/include -I./lib/tf-m/bl2/include -I./lib/tf-m/secure_fw/spm/cmsis_psa/arch -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<cflags add="-DBL2 -DMCUBOOT_DATA_SHARING=1 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -DTFM_LVL=1 -DTFM_PARTITION_AUDIT_LOG -DTFM_PARTITION_CRYPTO -DTFM_PARTITION_INITIAL_ATTESTATION -DTFM_PARTITION_INTERNAL_TRUSTED_STORAGE -DTFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG -DTFM_PARTITION_PLATFORM -DTFM_PARTITION_PROTECTED_STORAGE -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/ext/target/arm/mps3/an547/. -I./lib/tf-m/platform/.. -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/tf-m/interface/include -I./bsp/interface/include -I./lib/tf-m/bl2/include -I./lib/tf-m/secure_fw/spm/cmsis_psa/arch -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<file category="sourceC" name="./lib/tf-m/platform/ext/common/boot_hal.c"/>
<file category="sourceC" name="./lib/tf-m/platform/ext/common/uart_stdout.c"/>
<file category="sourceC" name="./lib/tf-m/platform/ext/common/template/nv_counters.c"/>
......@@ -118,7 +118,7 @@
</group>
<group name="bootutil">
<cflags add="-DBL2 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMBEDTLS_CONFIG_FILE=2 -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/mcuboot/boot/bootutil/include -I./lib/mcuboot/boot/bootutil/src -I./lib/tf-m/bl2/ext/mcuboot/include -I./lib/tf-m/bl2/ext/mcuboot/config -I./clang_test/bl2/ext/mcuboot -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/mbedcrypto/include -I./lib/mbedcrypto/library -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<cflags add="-DBL2 -DMCUBOOT_DATA_SHARING=1 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMBEDTLS_CONFIG_FILE=2 -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/mcuboot/boot/bootutil/include -I./lib/mcuboot/boot/bootutil/src -I./lib/tf-m/bl2/ext/mcuboot/include -I./lib/tf-m/bl2/ext/mcuboot/config -I./clang_test/bl2/ext/mcuboot -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/mbedcrypto/include -I./lib/mbedcrypto/library -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<file category="sourceC" name="./lib/mcuboot/boot/bootutil/src/boot_record.c"/>
<file category="sourceC" name="./lib/mcuboot/boot/bootutil/src/bootutil_misc.c"/>
<file category="sourceC" name="./lib/mcuboot/boot/bootutil/src/bootutil_public.c"/>
......@@ -139,7 +139,7 @@
</group>
<group name="bl2">
<cflags add="-DBL2 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMBEDTLS_CONFIG_FILE=2 -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/tf-m/bl2/ext/mcuboot/include -I./lib/tf-m/bl2/include -I./lib/mcuboot/boot/bootutil/src -I./lib/mcuboot/boot/bootutil/include -I./lib/tf-m/bl2/ext/mcuboot/config -I./clang_test/bl2/ext/mcuboot -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/mbedcrypto/include -I./lib/mbedcrypto/library -I./lib/tf-m/secure_fw/spm/include -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<cflags add="-DBL2 -DMCUBOOT_DATA_SHARING=1 -DTFM_SYSTEM_ARCHITECTURE=armv8.1-m.main -DTFM_SYSTEM_MVE=OFF -DTFM_SYSTEM_PROCESSOR=cortex-m55 -DDAUTH_CHIP_DEFAULT -DMBEDTLS_CONFIG_FILE=2 -DMCUBOOT_DIRECT_XIP_REVERT -DMCUBOOT_FIH_PROFILE_OFF -DMCUBOOT_HW_KEY -DMCUBOOT_IMAGE_NUMBER=2 -DMCUBOOT_OVERWRITE_ONLY -DMCUBOOT_SIGN_RSA -DMCUBOOT_SIGN_RSA_LEN=2048 -I./ -I./lib/mcuboot/ext/mbedtls/tests/include/spe -I./bsp -I./lib/tf-m/bl2/ext/mcuboot/include -I./lib/tf-m/bl2/include -I./lib/mcuboot/boot/bootutil/src -I./lib/mcuboot/boot/bootutil/include -I./lib/tf-m/bl2/ext/mcuboot/config -I./clang_test/bl2/ext/mcuboot -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include -I./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang -I./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers -I./lib/tf-m/platform/ext/target/arm/mps3/an547/partition -I./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src -I./lib/tf-m/platform/include -I./lib/tf-m/platform/ext/cmsis -I./lib/tf-m/platform/ext/driver -I./lib/tf-m/platform/ext/common -I./lib/tf-m/platform/ext -I./lib/mbedcrypto/include -I./lib/mbedcrypto/library -I./lib/tf-m/secure_fw/spm/include -march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -ffunction-sections -fno-builtin -fshort-enums -fshort-wchar -funsigned-char -masm=auto -nostdlib -std=c99 -mfpu=none" compiler="AC6"/>
<file category="sourceC" name="./lib/tf-m/bl2/src/security_cnt.c"/>
<file category="sourceC" name="./lib/tf-m/bl2/src/flash_map.c"/>
<file category="sourceC" name="./lib/tf-m/bl2/ext/mcuboot/bl2_main.c"/>
......@@ -147,6 +147,7 @@
<file category="sourceC" name="./lib/tf-m/bl2/ext/mcuboot/flash_map_extended.c"/>
<file category="sourceC" name="./lib/tf-m/bl2/ext/mcuboot/flash_map_legacy.c"/>
<file category="sourceC" name="./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/startup_an547_bl2.c"/>
<file category="sourceC" name="./lib/tf-m/bl2/src/shared_data.c"/>
</group>
</files>
......
......@@ -73,7 +73,7 @@
<LExpSel>0</LExpSel>
</OPTXL>
<OPTFL>
<tvExp>1</tvExp>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
<IsCurrentTarget>1</IsCurrentTarget>
</OPTFL>
......@@ -1455,6 +1455,18 @@
<RteFlg>0</RteFlg>
<bShared>0</bShared>
</File>
<File>
<GroupNumber>5</GroupNumber>
<FileNumber>105</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
<bDave2>0</bDave2>
<PathWithFileName>.\lib\tf-m\bl2\src\shared_data.c</PathWithFileName>
<FilenameWithoutPath>shared_data.c</FilenameWithoutPath>
<RteFlg>0</RteFlg>
<bShared>0</bShared>
</File>
</Group>
</ProjectOpt>
......@@ -10,7 +10,6 @@
<TargetName>bootloader</TargetName>
<ToolsetNumber>0x4</ToolsetNumber>
<ToolsetName>ARM-ADS</ToolsetName>
<pCCUsed>6160000::V6.16::ARMCLANG</pCCUsed>
<uAC6>1</uAC6>
<TargetOption>
<TargetCommonOption>
......@@ -89,7 +88,7 @@
<nStopA1X>0</nStopA1X>
<nStopA2X>0</nStopA2X>
</AfterMake>
<SelectedForBatchBuild>0</SelectedForBatchBuild>
<SelectedForBatchBuild>1</SelectedForBatchBuild>
<SVCSIdString></SVCSIdString>
</TargetCommonOption>
<CommonProperty>
......@@ -426,7 +425,7 @@
<v6Rtti>2</v6Rtti>
<VariousControls>
<MiscControls>-march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -fno-builtin -masm=auto -nostdlib -mfpu=none</MiscControls>
<Define>BL2 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048 TFM_LVL=1 TFM_PARTITION_AUDIT_LOG TFM_PARTITION_CRYPTO TFM_PARTITION_INITIAL_ATTESTATION TFM_PARTITION_INTERNAL_TRUSTED_STORAGE TFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG TFM_PARTITION_PLATFORM TFM_PARTITION_PROTECTED_STORAGE</Define>
<Define>BL2 MCUBOOT_DATA_SHARING=1 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048 TFM_LVL=1 TFM_PARTITION_AUDIT_LOG TFM_PARTITION_CRYPTO TFM_PARTITION_INITIAL_ATTESTATION TFM_PARTITION_INTERNAL_TRUSTED_STORAGE TFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG TFM_PARTITION_PLATFORM TFM_PARTITION_PROTECTED_STORAGE</Define>
<Undefine></Undefine>
<IncludePath>./;./lib/mcuboot/ext/mbedtls/tests/include/spe;./bsp;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang;./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/partition;./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src;./lib/tf-m/platform/ext/target/arm/mps3/an547/.;./lib/tf-m/platform/..;./lib/tf-m/platform/include;./lib/tf-m/platform/ext/cmsis;./lib/tf-m/platform/ext/driver;./lib/tf-m/platform/ext/common;./lib/tf-m/platform/ext;./lib/tf-m/interface/include;./bsp/interface/include;./lib/tf-m/bl2/include;./lib/tf-m/secure_fw/spm/cmsis_psa/arch</IncludePath>
</VariousControls>
......@@ -530,7 +529,7 @@
<v6Rtti>2</v6Rtti>
<VariousControls>
<MiscControls>-march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -fno-builtin -masm=auto -nostdlib -mfpu=none</MiscControls>
<Define>BL2 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048 TFM_LVL=1 TFM_PARTITION_AUDIT_LOG TFM_PARTITION_CRYPTO TFM_PARTITION_INITIAL_ATTESTATION TFM_PARTITION_INTERNAL_TRUSTED_STORAGE TFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG TFM_PARTITION_PLATFORM TFM_PARTITION_PROTECTED_STORAGE</Define>
<Define>BL2 MCUBOOT_DATA_SHARING=1 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048 TFM_LVL=1 TFM_PARTITION_AUDIT_LOG TFM_PARTITION_CRYPTO TFM_PARTITION_INITIAL_ATTESTATION TFM_PARTITION_INTERNAL_TRUSTED_STORAGE TFM_PARTITION_LOG_LEVEL=TFM_PARTITION_LOG_LEVEL_DEBUG TFM_PARTITION_PLATFORM TFM_PARTITION_PROTECTED_STORAGE</Define>
<Undefine></Undefine>
<IncludePath>./;./lib/mcuboot/ext/mbedtls/tests/include/spe;./bsp;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang;./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/partition;./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src;./lib/tf-m/platform/ext/target/arm/mps3/an547/.;./lib/tf-m/platform/..;./lib/tf-m/platform/include;./lib/tf-m/platform/ext/cmsis;./lib/tf-m/platform/ext/driver;./lib/tf-m/platform/ext/common;./lib/tf-m/platform/ext;./lib/tf-m/interface/include;./bsp/interface/include;./lib/tf-m/bl2/include;./lib/tf-m/secure_fw/spm/cmsis_psa/arch</IncludePath>
</VariousControls>
......@@ -1048,7 +1047,7 @@
<v6Rtti>2</v6Rtti>
<VariousControls>
<MiscControls>-march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -fno-builtin -masm=auto -nostdlib -mfpu=none</MiscControls>
<Define>BL2 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MBEDTLS_CONFIG_FILE=2 MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048</Define>
<Define>BL2 MCUBOOT_DATA_SHARING=1 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MBEDTLS_CONFIG_FILE=2 MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048</Define>
<Undefine></Undefine>
<IncludePath>./;./lib/mcuboot/ext/mbedtls/tests/include/spe;./bsp;./lib/mcuboot/boot/bootutil/include;./lib/mcuboot/boot/bootutil/src;./lib/tf-m/bl2/ext/mcuboot/include;./lib/tf-m/bl2/ext/mcuboot/config;./clang_test/bl2/ext/mcuboot;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang;./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/partition;./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src;./lib/tf-m/platform/include;./lib/tf-m/platform/ext/cmsis;./lib/tf-m/platform/ext/driver;./lib/tf-m/platform/ext/common;./lib/tf-m/platform/ext;./lib/mbedcrypto/include;./lib/mbedcrypto/library</IncludePath>
</VariousControls>
......@@ -1207,7 +1206,7 @@
<v6Rtti>2</v6Rtti>
<VariousControls>
<MiscControls>-march=armv8.1-m.main -Wno-ignored-optimization-argument -Wno-unused-command-line-argument -Wall -Wno-error=cpp -c -fdata-sections -fno-builtin -masm=auto -nostdlib -mfpu=none</MiscControls>
<Define>BL2 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MBEDTLS_CONFIG_FILE=2 MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048</Define>
<Define>BL2 MCUBOOT_DATA_SHARING=1 TFM_SYSTEM_ARCHITECTURE=armv8.1-m.main TFM_SYSTEM_MVE=OFF TFM_SYSTEM_PROCESSOR=cortex-m55 DAUTH_CHIP_DEFAULT MBEDTLS_CONFIG_FILE=2 MCUBOOT_DIRECT_XIP_REVERT MCUBOOT_FIH_PROFILE_OFF MCUBOOT_HW_KEY MCUBOOT_IMAGE_NUMBER=2 MCUBOOT_OVERWRITE_ONLY MCUBOOT_SIGN_RSA MCUBOOT_SIGN_RSA_LEN=2048</Define>
<Undefine></Undefine>
<IncludePath>./;./lib/mcuboot/ext/mbedtls/tests/include/spe;./bsp;./lib/tf-m/bl2/ext/mcuboot/include;./lib/tf-m/bl2/include;./lib/mcuboot/boot/bootutil/src;./lib/mcuboot/boot/bootutil/include;./lib/tf-m/bl2/ext/mcuboot/config;./clang_test/bl2/ext/mcuboot;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/cmsis_drivers/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/config;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/include;./lib/tf-m/platform/ext/target/arm/mps3/an547/device/source/armclang;./lib/tf-m/platform/ext/target/arm/mps3/an547/native_drivers;./lib/tf-m/platform/ext/target/arm/mps3/an547/partition;./lib/tf-m/platform/ext/target/arm/mps3/an547/services/src;./lib/tf-m/platform/include;./lib/tf-m/platform/ext/cmsis;./lib/tf-m/platform/ext/driver;./lib/tf-m/platform/ext/common;./lib/tf-m/platform/ext;./lib/mbedcrypto/include;./lib/mbedcrypto/library;./lib/tf-m/secure_fw/spm/include</IncludePath>
</VariousControls>
......@@ -1268,6 +1267,11 @@
<FileType>1</FileType>
<FilePath>.\lib\tf-m\platform\ext\target\arm\mps3\an547\device\source\startup_an547_bl2.c</FilePath>
</File>
<File>
<FileName>shared_data.c</FileName>
<FileType>1</FileType>
<FilePath>.\lib\tf-m\bl2\src\shared_data.c</FilePath>
</File>
</Files>
</Group>
</Groups>
......
This diff is collapsed.
This diff is collapsed.
This diff is collapsed.
This diff is collapsed.
......@@ -2291,6 +2291,18 @@
<RteFlg>0</RteFlg>
<bShared>0</bShared>
</File>
<File>
<GroupNumber>12</GroupNumber>
<FileNumber>170</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
<bDave2>0</bDave2>
<PathWithFileName>.\lib\tf-m\bl2\src\shared_data.c</PathWithFileName>
<FilenameWithoutPath>shared_data.c</FilenameWithoutPath>
<RteFlg>0</RteFlg>
<bShared>0</bShared>
</File>
</Group>
<Group>
......@@ -2301,7 +2313,7 @@
<RteFlg>0</RteFlg>
<File>
<GroupNumber>13</GroupNumber>
<FileNumber>170</FileNumber>
<FileNumber>171</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
......@@ -2313,7 +2325,7 @@
</File>
<File>
<GroupNumber>13</GroupNumber>
<FileNumber>171</FileNumber>
<FileNumber>172</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
......@@ -2325,7 +2337,7 @@
</File>
<File>
<GroupNumber>13</GroupNumber>
<FileNumber>172</FileNumber>
<FileNumber>173</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
......@@ -2337,7 +2349,7 @@
</File>
<File>
<GroupNumber>13</GroupNumber>
<FileNumber>173</FileNumber>
<FileNumber>174</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
......@@ -2349,7 +2361,7 @@
</File>
<File>
<GroupNumber>13</GroupNumber>
<FileNumber>174</FileNumber>
<FileNumber>175</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
......@@ -2361,7 +2373,7 @@
</File>
<File>
<GroupNumber>13</GroupNumber>
<FileNumber>175</FileNumber>
<FileNumber>176</FileNumber>
<FileType>1</FileType>
<tvExp>0</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
......@@ -2373,7 +2385,7 @@
</File>
<File>
<GroupNumber>13</GroupNumber>
<FileNumber>176</FileNumber>
<FileNumbe