Using Trustzone on mx53 and L4Linux
panton
panton at lcc.uma.es
Tue Nov 19 17:23:12 CET 2013
Hello Hackers,
I am trying to run the example on l4/examples/sys/vm-tz on my imx53 qsb.
I get something running but I am pretty sure it is not correct. I have
found a message called "Full virtualization with Trustzone" that make me
wonder several questions and I hope you can help me.
1- The vm-tz example is supposed to run a L4Linux on NS world. What I
don't understand in which format should be the linux-image (or any other
app you want to run). I use a gz compress linux image (the same I use
for running "L4Linux ARM" example), but I think it should be a bin file
(not even a ELF).
2- The vm-tz example make use of l4sigma0_map_iomem() to request a
memory mapping, but why not a l4sigma0_map_mem() if what you want is RAM
mapping?
The serial exit I get is:
SIGMA0: Dump of all resource maps
RAM:------------------------
[0:70000000;70000fff]
[0:70063000;7008ffff]
[0:70097000;70097fff]
[0:7009f000;7013ffff]
[4:70140000;7016cfff]
[0:7016d000;7016ffff]
[4:70170000;70186fff]
[0:70187000;7100cfff]
[4:7100d000;7100dfff]
[0:7100e000;710fffff]
[4:71100000;7182cfff]
[0:7182d000;8effffff]
IOMEM:----------------------
[0:0;6fffffff]
[0:90000000;ffffffff]
MOE: Hello world
MOE: found 499832 KByte free memory
MOE: found RAM from 70000000 to 8f000000
MOE: allocated 496 KByte for the page array @0x7009f000
MOE: virtual user address space [0-bfffffff]
MOE: rom name space cap -> [C:501000]
BOOTFS: [716eb000-71704494] [C:503000] l4re
BOOTFS: [71705000-7171e674] [C:504000] vm-tz
BOOTFS: [7171f000-7182c73c] [C:505000] io
BOOTFS: [71100000-711000bd] [C:506000] arm-rv.io
BOOTFS: [71101000-713ea4b4] [C:507000] vmlinuz.arm (My gz
compressed linux image)
BOOTFS: [713eb000-716eb000] [C:508000] ramdisk-arm.rd
MOE: cmdline: moe --init=rom/vm-tz
MOE: Starting: rom/vm-tz
MOE: loading 'rom/vm-tz'
And next is repeated forever without change.
VM run
VM exit
pc:20007000 cpsr:00000013
r0:00000000 r1:0000033b r2:20007100 r3:00000000
r4:00000000 r5:00000000 r6:00000000 r7:00000000
r8:00000000 r9:00000000 r10:00000000 r11:00000000
r12:00000000
lr_svc:00000000 sp_svc:00000000 spsr_svc:00000000
Thanks in advanced for your answers, if any :).
Pablo Anton.
More information about the l4-hackers
mailing list