Hello Bohdan,

 

Looks like the design docs are full of word instead of diagrams, I tried to search the public docs and found these diagrams, please check if it could be useful:

https://tf-m-user-guide.trustedfirmware.org/technical_references/design_docs/secure_partition_manager.html

 

/Ken

 

From: Bohdan.Hunko--- via TF-M <tf-m@lists.trustedfirmware.org>
Sent: Thursday, December 1, 2022 10:26 PM
To: tf-m@lists.trustedfirmware.org
Cc: Hennadiy.Kytsun@infineon.com; Roman.Mazurak@infineon.com; Chris.Brand@infineon.com
Subject: [TF-M] TF-M threat modeling diagrams

 

Hi all,

 

Our team is working on TFM threat modeling, we are analyzing existing code to find and fix any security issues/problems with it.

 

To better perform this modeling we are interested in having detailed diagrams of TFM boot and execution flows. Ideally the diagrams should be quite detailed to show system state transitions, detailed execution flow and any actions that are not obvious when first looking into TFM code (e.g. scheduling of nested calls, execution of secure IRQs that interrupt nested scheduling, ….).

 

Does TFM community have such (or similar) diagrams/? If so then where can we find them?

 

We think that these diagrams may be very useful to TFM in general. They will let TFM users easily understand how TFM works (in details).

 

Regards,

Bohdan Hunko

 

Cypress Semiconductor Ukraine

Engineer

CSUKR CSS ICW SW FW

Mobile: +38099 50 19 714
Bohdan.Hunko@infineon.com