Difference between revisions of "TZC internal peripheral"

[quality revision] [quality revision]
 
 


Template:ArticleMainWriter Template:ArticleApprovedVersion


1 Article purpose[edit]

The purpose of this article is to:

  • briefly introduce the TZC peripheral and its main features
  • indicate the level of security supported by this hardware block
  • explain how it can be allocated to the three runtime contexts and linked to the corresponding software components
  • explain, when necessary, how to configure the TZC peripheral.

2 Peripheral overview[edit]

The TZC peripheral is used to filter read/write accesses to the DDR controller according to TrustZone access rights, and according to Non-Secure master Address ID (NSAID) on up to 9 programmable regions.

2.1 Features[edit]

Refer to the STM32MP15 reference manuals for the complete list of features, and to the software components, introduced below, to see which features are implemented.

2.2 Security support[edit]

The TZC is a secure peripheral.

3 Peripheral usage and associated software[edit]

3.1 Boot time[edit]

The TZC is configured at boot time to setup DDR accesses.

3.2 Runtime[edit]

3.2.1 Overview[edit]

The TZC is a system peripheral and is controlled by the Arm® Cortex®-A7 secure.

3.2.2 Software frameworks[edit]

Domain Peripheral Software frameworks Comment
Cortex-A7
secure
(OP-TEE)
Cortex-A7
non-secure
(Linux)
Cortex-M4

(STM32Cube)
Security TZC OP-TEE TZC driver

3.2.3 Peripheral configuration[edit]

The configuration is applied by the firmware running in the secure context.

This configuration is done in TF-A or in OP-TEE.

3.2.4 Peripheral assignment[edit]

Internal peripherals

Check boxes illustrate the possible peripheral allocations supported by STM32 MPU Embedded Software:

  • means that the peripheral can be assigned () to the given runtime context.
  • is used for system peripherals that cannot be unchecked because they are statically connected in the device.

Refer to How to assign an internal peripheral to a runtime context for more information on how to assign peripherals manually or via STM32CubeMX.
The present chapter describes STMicroelectronics recommendations or choice of implementation. Additional possiblities might be described in STM32MP15 reference manuals.

Domain Peripheral Runtime allocation Comment
Instance Cortex-A7
secure
(OP-TEE)
Cortex-A7
non-secure
(Linux)
Cortex-M4

(STM32Cube)
Security TZC TZC

4 How to go further[edit]

The TZC is an Arm® peripheral: TZC-400 TrustZone Address Space Controller[1]

5 References[edit]

<noinclude>

{{ArticleBasedOnModel| [[Internal peripheral article model]]}}
{{ArticleMainWriter|YannG}}
{{ArticleApprovedVersion | YannG | Jean-ChristopheT | YannG - 19Sept'18 | AlainF - 19Sept'18 - 8790 | 07Jan’19}}

[[Category:Security peripherals]]</noinclude>

==Article purpose==
The purpose of this article is to:
* briefly introduce the TZC peripheral and its main features
* indicate the level of security supported by this hardware block
* explain how it can be allocated to the three runtime contexts and linked to the corresponding software components
* explain, when necessary, how to configure the TZC peripheral.

==Peripheral overview==
The TZC peripheral is used to filter read/write accesses to the DDR controller according to TrustZone access rights, and according to Non-Secure master Address ID (NSAID) on up to 9 programmable regions.<br />


===Features===
Refer to the [[STM32MP15 resources#Reference manuals|STM32MP15 reference manuals]] for the complete list of features, and to the software components, introduced below, to see which features are implemented.

===Security support===
The TZC is a '''secure''' peripheral.

==Peripheral usage and associated software==
===Boot time===
The TZC is configured at boot time to setup DDR accesses.

===Runtime===

====Overview====
The TZC is a system peripheral and is controlled by the Arm<sup>&reg;</sup> Cortex<sup>&reg;</sup>-A7 secure.

====Software frameworks====
{{:Internal_peripherals_software_table_template}}
 | Security
 | [[TZC internal peripheral|TZC]]
 | [[OP-TEE_overview|OP-TEE TZC driver]]
 | 
 | 
 |
 |-
 |}

====Peripheral configuration====
The configuration is applied by the firmware running in the secure context.

This configuration is done in [[TF-A_overview|TF-A]]  or in [[OP-TEE_overview|OP-TEE]].

====Peripheral assignment====
{{:Internal_peripherals_assignment_table_template}}<onlyinclude>

 | rowspan="1" | Security
 | rowspan="1" | [[TZC internal peripheral|TZC]]
 | TZC
 | <span title="system peripheral" style="font-size:21px"></span>

 | 
 |
 |
 |-</onlyinclude>

 |}

==How to go further==
The TZC is an Arm<sup>&reg;</sup> peripheral:  TZC-400 TrustZone Address Space Controller<ref>http://infocenter.arm.com/help/topic/com.arm.doc.ddi0504c/DDI0504C_tzc400_r0p1_trm.pdf</ref>


==References==<references/>

<noinclude>

[[Category:Security peripherals]]
{{PublicationRequestId | 8790 | 2018-09-19 | AlainF}}
{{ArticleBasedOnModel| Internal peripheral article model}}</noinclude>
Line 1: Line 1:
<noinclude>
 
{{ArticleBasedOnModel| [[Internal peripheral article model]]}}
 
{{ArticleMainWriter|YannG}}
 
{{ArticleApprovedVersion | YannG | Jean-ChristopheT | YannG - 19Sept'18 | AlainF - 19Sept'18 - 8790 | 07Jan’19}}
 
 
[[Category:Security peripherals]]
 
</noinclude>
 
 
 
==Article purpose==
 
==Article purpose==
 
The purpose of this article is to:
 
The purpose of this article is to:
Line 67: Line 59:
 
==References==
 
==References==
 
<references/>
 
<references/>
  +
  +
<noinclude>
  +
[[Category:Security peripherals]]
  +
{{PublicationRequestId | 8790 | 2018-09-19 | AlainF}}
  +
{{ArticleBasedOnModel| Internal peripheral article model}}
  +
</noinclude>