没有合适的资源?快使用搜索试试~ 我知道了~
首页TrustZone for Armv8-A
TrustZone for Armv8-A
需积分: 22 195 浏览量
更新于2023-05-27
评论 2
收藏 1.39MB PDF 举报
TrustZone for Armv8-A ARM Trustzone的详细介绍
资源详情
资源评论
资源推荐

TrustZone for Armv8-A
Version 1.0

TrustZone for Armv8-A
ARM062-1010708621-28
Version 1.0
Copyright © 2019 Arm Limited (or its affiliates). All rights reserved.
Non-Confidential
Page 2 of 40
TrustZone for Armv8-A
Copyright
©
2019 Arm Limited (or its affiliates). All rights reserved.
Release Information
Document History
Version
Date
Confidentiality
Change
1.0
08 January 2020
Non-Confidential
1
Non-Confidential Proprietary Notice
This document is protected by copyright and other related rights and the practice or implementation of the information contained in
this document may be protected by one or more patents or pending patent applications. No part of this document may be
reproduced in any form by any means without the express prior written permission of Arm. No license, express or implied, by
estoppel or otherwise to any intellectual property rights is granted by this document unless specifically stated.
Your access to the information in this document is conditional upon your acceptance that you will not use or permit others to use
the information for the purposes of determining whether implementations infringe any third party patents.
THIS DOCUMENT IS PROVIDED “AS IS”. ARM PROVIDES NO REPRESENTATIONS AND NO WARRANTIES, EXPRESS, IMPLIED OR
STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-
INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE WITH RESPECT TO THE DOCUMENT. For the avoidance of doubt, Arm
makes no representation with respect to, and has undertaken no analysis to identify or understand the scope and content of,
patents, copyrights, trade secrets, or other rights.
This document may include technical inaccuracies or typographical errors.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL ARM BE LIABLE FOR ANY DAMAGES, INCLUDING WITHOUT
LIMITATION ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES, HOWEVER CAUSED AND
REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF ANY USE OF THIS DOCUMENT, EVEN IF ARM HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
This document consists solely of commercial items. You shall be responsible for ensuring that any use, duplication or disclosure of
this document complies fully with any relevant export laws and regulations to assure that this document or any portion thereof is
not exported, directly or indirectly, in violation of such export laws. Use of the word “partner” in reference to Arm’s customers is not
intended to create or refer to any partnership relationship with any other company. Arm may make changes to this document at any
time and without notice.
If any of the provisions contained in these terms conflict with any of the provisions of any click through or signed written agreement
covering this document with Arm, then the click through or signed written agreement prevails over and supersedes the conflicting
provisions of these terms. This document may be translated into other languages for convenience, and you agree that if there is any
conflict between the English version of this document and any translation, the terms of the English version of the Agreement shall
prevail.
The Arm corporate logo and words marked with ® or ™ are registered trademarks or trademarks of Arm Limited (or its subsidiaries)
in the US and/or elsewhere. All rights reserved. Other brands and names mentioned in this document may be the trademarks of
their respective owners. Please follow Arm’s trademark usage guidelines at 33Thttp://www.arm.com/company/policies/trademarks33T .

TrustZone for Armv8-A
ARM062-1010708621-28
Version 1.0
Copyright © 2019 Arm Limited (or its affiliates). All rights reserved.
Non-Confidential
Page 3 of 40
Copyright
©
2019 Arm Limited (or its affiliates). All rights reserved.
Arm Limited. Company 02557590 registered in England.
110 Fulbourn Road, Cambridge, England CB1 9NJ.
LES-PRE-20349
Confidentiality Status
This document is Non-Confidential. The right to use, copy and disclose this document may be subject to license restrictions in
accordance with the terms of the agreement entered into by Arm and the party that Arm delivered this document to.
Unrestricted Access is an Arm internal classification.
Product Status
The information in this document is Final, that is for a developed product.
Web Address
33Thttp://www.arm.com33T

TrustZone for Armv8-A
ARM062-1010708621-28
Version 1.0
Contents
1 Overview............................................................................................................................................................................................................................................... 6
1.1. Before you begin ..................................................................................................................................................................................................... 6
2 What is TrustZone? ............................................................................................................................................................................................................................ 7
2.1. TrustZone for Armv8-M ......................................................................................................................................................................................... 7
3 TrustZone in the processor ............................................................................................................................................................................................................. 8
3.1. Security states ......................................................................................................................................................................................................... 8
3.2. Switching between Security states ........................................................................................................................................................................ 8
3.3. Virtual address spaces .......................................................................................................................................................................................... 10
3.4. Physical address spaces ........................................................................................................................................................................................ 11
3.5. Data, instruction, and unified caches ................................................................................................................................................................... 13
3.6. Translation Lookaside Buffer ............................................................................................................................................................................... 14
3.7. SMC exceptions ..................................................................................................................................................................................................... 14
3.8. Secure virtualization ............................................................................................................................................................................................. 15
4 System architecture ......................................................................................................................................................................................................................... 18
4.1. Slave devices: peripherals, and memories ........................................................................................................................................................... 18
4.3 Enforcing isolation ......................................................................................................................................................................................... 19
4.4 Bus masters .................................................................................................................................................................................................... 20
4.5 M and R profile Arm processors ................................................................................................................................................................... 22
4.6 Interrupts ........................................................................................................................................................................................................ 22
4.7 Handling interrupts ....................................................................................................................................................................................... 23
4.8 Debug, trace, and profiling ............................................................................................................................................................................ 24
4.9 Other devices ................................................................................................................................................................................................. 26
4.10 Trusted Base System Architecture .............................................................................................................................................................. 27
5 Software architecture ........................................................................................................................................................................................................ 28
5.1 Top-level software architecture ................................................................................................................................................................... 28
5.1.1 Trusting the message? ................................................................................................................................................................................... 29
5.1.2 Scheduling ...................................................................................................................................................................................................... 29
5.1.3 OP-TEE ........................................................................................................................................................................................................... 29
5.2 Interacting with Non-secure virtualization ................................................................................................................................................. 30
5.3 Boot and the chain of trust ............................................................................................................................................................................ 31
5.4 Boot failures ................................................................................................................................................................................................... 33
5.5 Trusted Board Boot Requirements .............................................................................................................................................................. 33
5.6 Trusted Firmware .......................................................................................................................................................................................... 34

TrustZone for Armv8-A
ARM062-1010708621-28
Version 1.0
Overview
Copyright © 2019 Arm Limited (or its affiliates). All rights reserved.
Non-Confidential
Page 5 of 40
6 Example use cases ............................................................................................................................................................................................................... 35
6.1 Encrypted filesystem ..................................................................................................................................................................................... 35
6.2 Over the air firmware update ....................................................................................................................................................................... 36
7 Check your knowledge ....................................................................................................................................................................................................... 38
8 Related information ............................................................................................................................................................................................................ 39
9 Next steps .............................................................................................................................................................................................................................. 40
剩余39页未读,继续阅读















安全验证
文档复制为VIP权益,开通VIP直接复制

评论0