hello_world_s

SECURE VULNERABILITY NOTE: There is a vulnerability that can affect TrustZone applications that also use floating point unit (CVE-2021-35465). The TrustZone examples delivered here do not use floating point, and so they aren’t affected. However, if TrustZone and FPU are used together, the used compiler should be checked for inbuilt workaround. If workaround is not available yet, then the actions described in CVE-2021-35465 should be applied manually.

Actual compilers status for this vulnerability: MCUX IDE v11.5.0 – fix not available yet GNU Arm Embedded Toolchain 10.3-2021.07 - fix not available yet EWARM v9.20.1 – already fixed ARM MDK v5.35 – check for new Arm compiler v6.17

Overview

The Hello World demo application provides a sanity check for the new SDK build environments and board bring up. This demo application also utilizes TrustZone, so it demonstrates following techniques for TrustZone applications development:

  1. Application separation between secure and non-secure part

  2. TrustZone environment configuration

  3. Exporting secure function to non-secure world

  4. Calling non-secure function from secure world

  5. Creating veneer table

  6. Configuring IAR, MDK, GCC and MCUX environments for TrustZone based projects

Supported Boards