Develop Software for the Cortex-M Security Extensions Using Arm DS and Arm GNU Toolchain

This post describes the steps to create a basic TrustZone example for the Armv8-M processor with Security Extension by using Arm DS and Arm GNU toolchain. It is assumed that you have a basic knowledge of the Armv8-M Security Extension and embedded-M software programming.

The Secure and Non-secure images make function calls across security boundary based on Armv8-M Security Extension. The steps to create a basic TrustZone example for the Armv8-M processor using Arm DS and Arm GNU toolchain are as follows:

  1. Configure system and memory.
  2. Create and build Secure project in Arm DS.
  3. Create and build Non-secure project in Arm DS.
  4. Run Secure and Non-secure images in Arm DS with FVP.

Click here to read more ...

×
Semiconductor IP