Using Trustzone on mx53 and L4Linux

panton panton at lcc.uma.es
Tue Nov 19 17:23:12 CET 2013


Hello Hackers,

I am trying to run the example on l4/examples/sys/vm-tz on my imx53 qsb. 
I get something running but I am pretty sure it is not correct. I have 
found a message called "Full virtualization with Trustzone" that make me 
wonder several questions and I hope you can help me.

1- The vm-tz example is supposed to run a L4Linux on NS world. What I 
don't understand in which format should be the linux-image (or any other 
app you want to run). I use a gz compress linux image (the same I use 
for running "L4Linux ARM" example), but I think it should be a bin file 
(not even a ELF).

2- The vm-tz example make use of l4sigma0_map_iomem() to request a 
memory mapping, but why not a l4sigma0_map_mem() if what you want is RAM 
mapping?

The serial exit I get is:

SIGMA0: Dump of all resource maps
RAM:------------------------
[0:70000000;70000fff]
[0:70063000;7008ffff]
[0:70097000;70097fff]
[0:7009f000;7013ffff]
[4:70140000;7016cfff]
[0:7016d000;7016ffff]
[4:70170000;70186fff]
[0:70187000;7100cfff]
[4:7100d000;7100dfff]
[0:7100e000;710fffff]
[4:71100000;7182cfff]
[0:7182d000;8effffff]
IOMEM:----------------------
[0:0;6fffffff]
[0:90000000;ffffffff]
MOE: Hello world
MOE: found 499832 KByte free memory
MOE: found RAM from 70000000 to 8f000000
MOE: allocated 496 KByte for the page array @0x7009f000
MOE: virtual user address space [0-bfffffff]
MOE: rom name space cap -> [C:501000]
   BOOTFS: [716eb000-71704494] [C:503000] l4re
   BOOTFS: [71705000-7171e674] [C:504000] vm-tz
   BOOTFS: [7171f000-7182c73c] [C:505000] io
   BOOTFS: [71100000-711000bd] [C:506000] arm-rv.io
   BOOTFS: [71101000-713ea4b4] [C:507000] vmlinuz.arm     (My gz 
compressed linux image)
   BOOTFS: [713eb000-716eb000] [C:508000] ramdisk-arm.rd
MOE: cmdline: moe --init=rom/vm-tz
MOE: Starting: rom/vm-tz
MOE: loading 'rom/vm-tz'


And next is repeated forever without change.

VM run
VM exit
pc:20007000 cpsr:00000013
r0:00000000 r1:0000033b r2:20007100 r3:00000000
r4:00000000 r5:00000000 r6:00000000 r7:00000000
r8:00000000 r9:00000000 r10:00000000 r11:00000000
r12:00000000
lr_svc:00000000 sp_svc:00000000 spsr_svc:00000000




Thanks in advanced for your answers, if any :).

Pablo Anton.




More information about the l4-hackers mailing list