9a4a0448be
When building Genode for VEA9X4 as micro-hypervisor protected by the ARM TrustZone hardware we ran into limitations regarding our basic daily testing routines. The most significant is that, when speaking about RAM partitioning, the only available options are to configure the whole SRAM to be secure and the whole DDR-RAM to be non-secure or vice versa. The SRAM however provides only 32 MB which isn't enough for both a representative non-secure guest OS or a secure Genode that is still capable of passing our basic tests. This initiated our decision to remove the VEA9X4 TrustZone-support. Fixes #1351 |
||
---|---|---|
.. | ||
imx53 | ||
include | ||
README |
README
This is a small example virtual machine monitor, that uses the base-hw kernel as secure-world micro-hypervisor on ARM TrustZone platforms. The VMM configures TrustZone hardware in a way, that allows a guest to access nearly all devices, and the DDR-RAM. Only few resources needed by the kernel (timer, SRAM) aren't accessable by the virtual-machine. Moreover, the VMM prepares the guest memory with a Linux image, and ramdisk, and boots it. For the Linux guest to work properly a small patch, and tweaked configuration is needed.