Hello,
The next Technical Forum is planned on Thursday, Sep 12 at 7:00-8:00 UTC (East time zone).
Please reply on this email with your proposals for agenda topics.
Recording and slides of previous meetings are here:
https://www.trustedfirmware.org/meetings/tf-m-technical-forum/
Best regards,
Anton
Hi,
TF-M's tech forum of today is cancelled due to unforeseen circumstances. Talks that were scheduled for today are postponed. Will confirm in which one of the upcoming occurrences. Apologies for the short notice.
Thanks,
Antonio
________________________________
From: Trusted Firmware Public Meetings
Sent: Friday, June 6, 2025 10:03:13 AM
To: Trusted Firmware Public Meetings <linaro.org_havjv2figrh5egaiurb229pd8c(a)group.calendar.google.com>; Anton Komlev <Anton.Komlev(a)arm.com>; Don Harbin <don.harbin(a)linaro.org>; abdelmalek.omar1(a)gmail.com <abdelmalek.omar1(a)gmail.com>; Kevin Townsend (kevin.townsend(a)linaro.org) <kevin.townsend(a)linaro.org>; seth(a)nxmlabs.com <seth(a)nxmlabs.com>; leonardo.sandoval(a)linaro.org <leonardo.sandoval(a)linaro.org>; Joanna Farley <Joanna.Farley(a)arm.com>; tf-m(a)lists.trustedfirmware.org <tf-m(a)lists.trustedfirmware.org>
Subject: TF-M Tech forum
When: Thursday, August 28, 2025 4:00 PM-5:00 PM.
Where: https://linaro-org.zoom.us/j/95570795742?pwd=N21YWHJpUjZyS3Fzd0tkOG9hanpidz…
This email keeps the event up to date in your calendar.
Set up inbox filters to hide this and similar calendar sync emails.
Learn more about calendar sync emails and setting up filters<https://support.google.com/calendar?p=filter_invitations>
This is an open forum for anyone to participate and it is not restricted to Trusted Firmware project members. It will operate under the guidance of the TF TSC.
Feel free to forward it to colleagues.
Details of previous meetings are here: https://www.trustedfirmware.org/meetings/tf-m-technical-forum/<https://www.google.com/url?q=https%3A%2F%2Fwww.trustedfirmware.org%2Fmeetin…>
===Zoom Info====
Trusted Firmware is inviting you to a scheduled Zoom meeting.
Topic: TF-M Tech forum - US Time Zone Friendly
Time: Oct 29, 2020 03:00 PM Greenwich Mean Time
Every 4 weeks on Thu, until Mar 18, 2021, 6 occurrence(s)
Oct 29, 2020 03:00 PM
Nov 26, 2020 03:00 PM
Dec 24, 2020 03:00 PM
Jan 21, 2021 03:00 PM
Feb 18, 2021 03:00 PM
Mar 18, 2021 03:00 PM
Please download and import the following iCalendar (.ics) files to your calendar system.
Weekly: https://linaro-org.zoom.us/meeting/tJEocOmvpz4tHtYu0Wvn2fOsG91u0kv_ECPd/ics…<https://www.google.com/url?q=https%3A%2F%2Flinaro-org.zoom.us%2Fmeeting%2Ft…>
Join Zoom Meeting
https://linaro-org.zoom.us/j/95570795742?pwd=N21YWHJpUjZyS3Fzd0tkOG9hanpidz…<https://www.google.com/url?q=https%3A%2F%2Flinaro-org.zoom.us%2Fj%2F9557079…>
Meeting ID: 955 7079 5742
Passcode: 177658
One tap mobile
+12532158782,,95570795742# US (Tacoma)
+13462487799,,95570795742# US (Houston)
Dial by your location
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
+1 669 900 9128 US (San Jose)
+1 301 715 8592 US (Germantown)
+1 312 626 6799 US (Chicago)
+1 646 558 8656 US (New York)
877 853 5247 US Toll-free
888 788 0099 US Toll-free
Meeting ID: 955 7079 5742
Find your local number: https://linaro-org.zoom.us/u/abx3I7IoRq<https://www.google.com/url?q=https%3A%2F%2Flinaro-org.zoom.us%2Fu%2Fabx3I7I…>
When
Every 4 weeks from 8am to 9am on Thursday (Mountain Standard Time - Phoenix)
Location
https://linaro-org.zoom.us/j/95570795742?pwd=N21YWHJpUjZyS3Fzd0tkOG9hanpidz…
View map<https://www.google.com/url?q=https%3A%2F%2Flinaro-org.zoom.us%2Fj%2F9557079…>
Guests
Don Harbin<mailto:don.harbin@linaro.org> - creator
anton.komlev(a)arm.com<mailto:anton.komlev@arm.com>
abdelmalek.omar1(a)gmail.com<mailto:abdelmalek.omar1@gmail.com>
kevin.townsend(a)linaro.org<mailto:kevin.townsend@linaro.org>
seth(a)nxmlabs.com<mailto:seth@nxmlabs.com>
leonardo.sandoval(a)linaro.org<mailto:leonardo.sandoval@linaro.org>
Joanna Farley<mailto:joanna.farley@arm.com>
tf-m(a)lists.trustedfirmware.org<mailto:tf-m@lists.trustedfirmware.org>
Invitation from Google Calendar<https://calendar.google.com/calendar/>
You are receiving this email because you are an attendee on the event.
Forwarding this invitation could allow any recipient to send a response to the organizer, be added to the guest list, invite others regardless of their own invitation status, or modify your RSVP. Learn more<https://support.google.com/calendar/answer/37135#forwarding>
Dear TF-M Team,
I'm Takekazu Tabata, a director and architect from the Fujitsu processor team.
We are currently developing FUJITSU-MONAKA, which supports the CCA feature.
We have three questions regarding the TF-M documents and TF-M implementations.
We would greatly appreciate it if you could provide answers.
Question 1)
In the TF-M document “RSE provisioning”,
The CM provisioning Key is used to encrypt DM Provisioning Bundle.
https://trustedfirmware-m.readthedocs.io/en/latest/platform/arm/rse/rse_pro…
After the cold reset, the RSE will automatically transition to Device Manufacturer provisioning
state “DM” as the LCM hardware state-machine reads the values of the cm_config_1 and cm_config_2 fields as non-zero. This state is designed to provision the DM provisioning key, the DM code-encryption key and the DM config. The procedure follows the same steps as the CM provisioning flow, with the exception that the bundle will now be encrypted and signed using the CM provisioning key and must be placed at the base of VM1.
However, the purpose of the data provided in the DM is not described in this document. These data are not used in the source code of TF-M v2.2.0.
DM provisioning is probably assumed to be done during device manufacturing, but could you explain the purpose in more detail?
Also, What are the DM provisioning key, the DM code-encryption key and the DM config used for?
Question 2)
In the TF-M document “RSE integration guide”,
attestation key(CPAK) is derived by GUK.
https://trustedfirmware-m.readthedocs.io/en/latest/platform/arm/rse/rse_int…<https://trustedfirmware-m.readthedocs.io/en/latest/platform/arm/rse/rse_int…>
The GUK is a key unique to a group of chips that have identical security properties, used to derive the attestation key.
However, CPAK is derived from HUK in the source code of TF-M. GUK in the specification is a typo.
https://git.trustedfirmware.org/plugins/gitiles/TF-M/trusted-firmware-m.git…<https://git.trustedfirmware.org/plugins/gitiles/TF-M/trusted-firmware-m.git…>
/* This derives from HUK, there is a typo in the spec, not from GUK.
* FixMe: this should be configurable per platform
*/
return setup_key_from_derivation(KMU_HW_SLOT_HUK, NULL, iak_seed_label,
sizeof(iak_seed_label), NULL, 0,
RSE_KMU_SLOT_CPAK_SEED, /* FixMe: The slot needs rename to IAK_SEED */
&aes_key0_export_config, NULL, false,
boot_state_config);
Which is right, GUK or HUK?
If it‘s HUK (not Virtual HUK), is it no problem that multiple CPAKs are generated in Multi-socket systems?
Question 3)
In the CM/DM lifecycle state, is it no problem to create an original provisioning bundle to run chip or device verification programs in PE?
Thank you for your time and assistance.
Best regards,
TABATA
Dear TF-M Community,
I have a question regarding a specific use case involving interrupt handling
and domain preemption in a TrustZone-enabled system using TF-M.
In the scenario where the processor is executing within a Secure user
context (e.g., during Secure Partition execution), is it possible for an
interrupt assigned to the Non-Secure domain to pre-empt this Secure
execution?
* Does TF-M support such preemption by default?
* If not supported out-of-the-box, what modifications or configuration
changes would be required within TF-M to enable this behavior?
Any guidance on how TF-M manages interrupt priority and security attribution
in this context would be greatly appreciated.
Best regards,
Waqar Ali
Waqar Ali Tahir
(He / Him / His)
Embedded SW Engineer
Phone: +433124 299160
Email: <mailto:waqar.tahir@nxp.com> waqar.tahir(a)nxp.com
NXP Semiconductors Austria GmbH & Co KG | Mikronweg 1, 8101 Gratkorn |
Austria |
Sitz: Gratkorn, Österreich | Firmenbuchgericht: Landesgericht für ZRS Graz |
Firmenbuchnummer: FN 541474 k | VAT: ATU76231908
Unless otherwise recorded in a signed, written agreement, all sales
transactions by NXP are exclusively subject to NXPs Terms and Conditions of
Commercial Sale (NXP Terms) published at:
<http://www.nxp.com/profile/terms/index.html>
www.nxp.com/profile/terms/index.html. NXP explicitly rejects and disregards
any terms and conditions of customer that add to, or differ from, NXPs
Terms irrespective of when customer raises its terms. The information
contained in this message is confidential. The message is intended solely
for the addressee(s). If you are not the intended recipient, any use,
dissemination, or reproduction is strictly prohibited and may be unlawful
and you are asked to please contact the sender by return e-mail and destroy
all copies of the original message.