Single MCU Solution for Safety-Related Applications Using TrustZone
TrustZone® (TZ) technology often gets associated with safety-related applications, like protecting cryptographic keys or hardware resources from unauthorized exposure. By reducing the attack surface and strictly enforcing the access policy, it is possible to create an on-chip environment safeguarding the misuse of such valuable resources.
Generalizing from the security-focused use case, what TZ really provides is hardware isolation of resources within a processing context, so generally applicable to other environments, where IEC 60730 normative requirements must be fulfilled. Those norms define several classes or categories of appliances and strive for the safe operation of automatic electrical controls within a household. The classification in categories A, B, or C is tied to the type of appliance and the threats it might pose to human beings during operation. Class A products do not provide potentially harmful features or functions. Class B appliances need to implement control functions that can prevent an unsafe operation of the controlled equipment. A washing machine is a good example, with sensors to stop operation as soon as the appliance temperature exceeds the safe operational limit, or a door lock preventing an operator from accessing the loading drum during an ongoing washing cycle. The related software includes code meant to prevent hazards if a hardware fault occurs.
Class C is more demanding since the control functions must prevent especially dangerous and harmful hazards like explosions. A typical example of such a system is an automatic burner control. Such type of software requires more strict controls, as deep and thorough diagnostics are necessary since a fault in the safety critical software routine will result in a hazard. This is because a failure in one function is not assumed to be mitigated by intervention of another software safety routine, or by redundant hardware. Several annexes to the main norm define the software evaluation requirements, down to the electronics controls. Broadly speaking, the norms discuss the embedded components (i.e., system implementation aspects) that must be tested to comply with Class B and Class C. At the same time, the norms list a few measures required to ensure safe and reliable operation.
Within the RA6 and RA4 MCU family, Arm® Cortex®-M33 CPU-based devices provide support for Arm TrustZone-M. TrustZone technology defines a secure or non-secure state within the CPU context, isolating user threads and interrupts from executing while in the non-secure state from those executing in the secure state. A secure program (located in an executable memory region marked as secure) can access both secure and non-secure data and executes only while the CPU is in a secure state. A non-secure program (in non-secure executable memory) can access non-secure data only and executes only while the CPU is in a non-secure state; any violating transaction is blocked, and a secure fault exception (interrupt) is issued. The non-secure environment can interact with the secure portion by using a controlled, user-defined, non-secure callable functional interface. The RA hardware supports a convenient granularity for defining the TZ memory section boundaries, to optimize their allocation.
At the system level, the asset isolation policy is similarly applied to on-chip memories, bus initiators like direct memory access (DMA) controllers, peripherals, and I/O ports. All bus initiators feature security attributes that allow allocation of their operation within one of the two domains, identifying each generated transaction as either secure or non-secure. Illegal transactions generate system exceptions for appropriate user-configurable error handling. To ensure system integrity, all transfers violating the policy are either rejected upfront or stopped as soon as the violation is detected.
On the receiver side, TZ filters are implemented to monitor all bus transactions, allow the legitimate ones to proceed, and block the non-allowed ones, according to the user-defined system configuration. In addition, every peripheral functional interface (memory mapped registers) has dedicated security attributes for either all its registers, for each channel (applicable to multi-channel instances), or at the individual bit level (for shared system level settings, or general-purpose I/O modules). Complementary hardware features like application watchdogs, independent watchdogs, and MPUs, assist the developer in enhancing system resilience and supporting the safety-relevant Class C software in monitoring the operation of the non-safety-related application portion. This is mandatory to react appropriately and ensure the system is always in a safe and controlled state of operation.
As for the configuration of the application and the drivers, RENESAS has developed a clever and simple-to-use tool, integrated within the e2 studio development environment, to guide the user in creating a secure and non-secure project in a few easy steps. Under the hood, the tool takes care of generating all appropriate compiler primitives and macros necessary to handle the configured non-secure callable interfaces and function stubs. It also assists in allocating the memory layout automatically in a size-optimized way and generating the secure and non-secure sections for later seamless programming of the application image.
Noticeably, TrustZone as a tool by itself does not comply with the Class C standard requirements. Just using TrustZone does not mean creating or being compliant with the requirements of a software system for Class A and C; the final software evaluation and the testing according to abnormal operation (operation under fault conditions of hardware) is not substituted by simply using TrustZone. It is still the manufacturer’s responsibility to use the TrustZone and MCU environment correctly and completely to fulfill the requirements of the standard.
However, TrustZone as a tool and its implementation on the RA family of microcontrollers can support the software manufacturer in creating a software system of software Class A and C within one single microcontroller. This statement has been confirmed by VDE, and the respective test report (about the result of a singular investigation carried out on the product submitted, of which a sample was tested) found the accordance with the thereafter listed [Standards] or clauses from the relevant [Standards], see footnote.
Renesas has created a technical note that details how the RA MCU features can support the creation of a Class C application. Developers can contact Renesas to get more information on this solution advancement and get the full test report information.
[Standards] IEC 60335-1:2010, /AMD1:2013, /AMD2:2015 Annex R; EN 60335-1:2012+AC+A11+A13+A1+A2+A14:2019; EN 60335-1:2012/A15:2021 Annex R; IEC 60730-1:2013, /AMD1:2015, /AMD2:2020 Annex H; EN 60730-1:2016+A1:2019, EN 60730-1:2016/A2:2022 Annex H
- |
- +1 赞 0
- 收藏
- 评论 0
本文由翊翊所思转载自RENESAS Blogs,原文标题为:Single MCU Solution for Safety-Related Applications Using TrustZone,本站所有转载文章系出于传递更多信息之目的,且明确注明来源,不希望被转载的媒体或个人可与我们联系,我们将立即进行删除处理。
相关推荐
【应用】瑞萨的RZ/G1M嵌入式多核处理器(MPU)帮助相机系统实现了实时图像处理,最大总线频率高达800MHz
瑞萨支持网络摄像机的主要设备,从高分辨率和高清CMOS图像传感器,到具有图像处理功能和显示功能的MPU,到用于摄像机电机控制的MCU。瑞萨还通过提供更智能的图像识别和身份验证应用软件,帮助用户提高产品价值。瑞萨的RZ/G系列MPU扩展了RZ/A MPU的功能,通过摄像头输入、3D图形加速器、全高清视频编解码器和GbE等功能,为图形,多流视频和嵌入式视觉提供高端性能。
【应用】基于瑞萨MCU、MPU的交流伺服系统微处理/控制器解决方案
交流伺服系统(AC Servo System)是一种伺服系统,根据Servo一词它是指能跟随外部指令进行人们所期望运动的系统,运动要素可以包括位置、力矩以及速度等。交流伺服系统包括基于异步电动机的伺服系统以及基于同步电动机的伺服系统,具有稳定性好、快速快、精度高等特点。
【应用】具备3D图形引擎/视频编解码器的瑞萨高性能MPU,助力智能停车场控制系统设计
对于现代智能停车场管理系统,在系统设计中,本文推荐Renesas提供的MPU解决方案——RZ/G1N和RZ/G1M高端MPU,采用1.5 GHz双核CPU,具备3D图形和视频编解码器引擎,支持全高清视频编码和解码,具备极高的数据处理性能。是智能停车场管理系统图像处理的理想选择。
【经验】瑞萨RA系列MCU使用e2 studio的断点调试方法和注意事项
瑞萨RA系列MCU可以使用e2 studio等开发环境进行调试和下载程序,在使用e2 studio时我们经常会遇到一些异常现象,如没有办法下断点进行调试,无法debug观察寄存器状态等,本文将介绍一下e2 studio常见的断点调试方法和注意事项。
【经验】解析瑞萨RA家族MCU的主要区别及命名规则
目前瑞萨电子(Renesas)已经发布的RA产品家族MCU主要包括四个系列即RA2系列、RA4系列和RA6系列,以及计划发布的RA8系列。有很多客户不了解RA家族处理器的主要区别和命名规则,本文讲详细讲解。
【经验】瑞萨RA系列MCU低功耗唤醒功能测试
瑞萨RA系列MCU低功耗一共有三种模式,本次测试选择时钟为32.76kHZ,使用电容触摸按键唤醒,datasheet上描述芯片常温下功耗为0.55uA,用开发板实测功耗为60uA,经过检测,功耗主要来源于电容电阻,开发板中有一颗电阻功耗在30uA,并具体分析。
【经验】解析瑞萨MPU RZ/T1 SPI总线通信功能配置方法
当我们使用瑞萨(Renesas)MPU RZ/T1做项目开发时,基本都会用到SPI总线通信的功能,SPI总线通信速率较快很适合在单片机板级之间进行数据交互,本文将介绍使用瑞萨开发环境配置生成RZ/T1 SPI总线驱动程序的方法。
RZ/G MPU G2L、LC、UL组
型号- RZ/G3YYY,RZ/G2L,RZ/G2M,RZ/G2LC,RZ/G2UL,RZ/G1M,RZ/G2N,RZ/G1N,RZ/G,RZ/G1C,RZ/G2E,RZ/G1E,RZ/G2H,RZ/G1H,RZ/G3YY,RZ/G3XX,RZ/G3ZZ,RZ/G4X,RZ/G3X,RZ/G3Y,RZ/G4XX,RZ/G3Z
【经验】瑞萨RA系列MCU时钟系统解析
本文以瑞萨MCU RA6T2为例,如下XTAL是外接的主时钟,频率为8到24M范围内任意可选。连接到单片机的XTAL和EXTAL引脚,HOCO:是片上高速振荡器,他不可以随意设置,比如RA6T2,他的HOCO为16,18,20M三选一。
【经验】瑞萨MPU RZ/T1使用SSC生成EtherCAT CiA402协议栈方法
瑞萨MPU RZ/T1支持EtherCAT网络设计,如何使用协议栈工具生成相对应的EtherCAT从机栈代码呢,本文主要就Beckhoff工具生成EtherCAT CiA402协议栈方法做相关介绍。
RZ/G MPU G2H,M,N,N组
型号- RZ/G3YYY,RZ/G2L,RZ/G2M,RZ/G2LC,RZ/G2UL,RZ/G1M,RZ/G2N,RZ/G1N,RZ/G1C,RZ/G2E,RZ/G1E,RZ/G2H,RZ/G1H,RZ/G3XX,RZ/G3YY,RZ/G3ZZ,RZ/G4X,RZ/G3X,RZ/G3Y,RZ/G4XX,RZ/G3Z
【经验】瑞萨RZ/T2M系列MPU使用IAR开发环境时的调试方法和注意事项
瑞萨RZ/T2M系列MPU可以使用IAR开发环境进行开发,当我们使用IAR开发环境加载一些瑞萨RZ/T2M相关例程项目时,总是会遇到一些编译报错问题,烧写异常问题,此文主要介绍使用IAR开发环境连接调试RZ/T2M系列MPU的方法和一些注意事项。
【经验】瑞萨MPU RZ/T1使用code generator生成SCI的初始代码方法
工程师初次使用瑞萨(Renesas)RZ/T1系列MPU时,可能不知道SCI该如何配置波特率,中断入口,中断标志位等。本文将介绍RZ/T1系列MPU利用code generator生产SCI的配置方法。
电子商城
现货市场
服务
可定制显示屏的尺寸0.96”~15.6”,分辨率80*160~3840*2160,TN/IPS视角,支持RGB、MCU、SPI、MIPI、LVDS、HDMI接口,配套定制玻璃、背光、FPCA/PCBA。
最小起订量: 1000 提交需求>
可烧录IC封装SOP/MSOP/SSOP/TSOP/TSSOP/PLCC/QFP/QFN/MLP/MLF/BGA/CSP/SOT/DFN;IC包装Tray/Tube/Tape;IC厂商不限,交期1-3天。支持IC测试(FT/SLT),管装、托盘装、卷带装包装转换,IC打印标记加工。
最小起订量: 1pcs 提交需求>
登录 | 立即注册
提交评论