Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Saturday August 11 2018, @12:53AM   Printer-friendly
from the another-day-another-CPU dept.

Although a wide range of potential applications exists for the ARMV8-M processors, developers working on secure real-time applications will certainly see the largest benefit. So far, the ARMV8-M architecture can be found in M23 and M33 Cortex-M and M35P processors. Let’s take a look at the new features included in ARMV8-M and how these processors differ from previous generation ARMV7-M parts.

[...] The ARMV8-M feature that really sets the M23, M33, and M35P apart is their support for ARM TrustZone. TrustZone is a security extension that provides hardware isolation within the microcontroller so that developers can create secure and unsecure regions. These regions can be locations in RAM, Flash, or even interrupts and peripherals. The separation between secure and unsecure regions creates isolation within the microcontroller, allowing developers to protect mission-critical code and data.

The isolation creates two new modes that the processor can be running in: secure and unsecure. When in secure mode, the executing code can access all memory within both the secure and unsecure zones. However, if the processor is executing in the unsecure zone, only the unsecure regions can be seen. The secure regions are hidden and cannot be executed from the unsecure state without special code being added, which creates a gateway to access a secure call. This makes it possible to use secure functions while hiding what is happening behind the scenes. 

There are several other new features that developers will find interesting besides the TrustZone extension. These include:

  • Simpler MPU setup
  • Flexible breakpoint configuration
  • Improved trace support
  • Instruction set enhancements
  • Dynamic reprioritization of interrupts

Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by MichaelDavidCrawford on Saturday August 11 2018, @04:47AM

    by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Saturday August 11 2018, @04:47AM (#720220) Homepage Journal

    A primary Defense contractor hired me because I had expertise with The Part.

    After we signed the contract they asked me to FTP an unclassified MIL-SPEC whose content led me to believe that were I to so much as _speculate_ who The Client actually was, The Client would throw my mother from a helicopter at 30,000 feet.

    (TIME PASSES)

    "Hey Mike - we just had a bunch of prototype hardware built. The Client is loving it! How is your firmware for The Part coming?"

    "I'm trying to find a workaround for a Mask Error. So is my contact at The Vendor's support department."

    (SIX WEEKS LATER)

    "Hey Mike - we really really need the firmware for The Part! Do you have a build for us yet?"

    "No, because neither I nor Edward have been able to find a workaround. Get This:"

    "YOU SELECTED THE WRONG PART!"

    Click.

    Edward resigned a couple weeks later.

    Don't select The Consultant because he knows all about The Part. Hire The Consultant so _he_ or "she" I'm not being sexist here - can select The Right Part.

    --
    Yes I Have No Bananas. [gofundme.com]
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2