Home | History | Annotate | Download | only in trusty
      1 <html devsite>
      2   <head>
      3     <title>Trusty TEE</title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           http://www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23 
     24 
     25 
     26 <p>Trusty is a set of software components supporting a Trusted Execution
     27 Environment (TEE) on mobile devices.</p>
     28 
     29 <p>Trusty consists of:</p>
     30 
     31 <ul>
     32   <li>An operating system (the Trusty OS) that runs on a processor intended to
     33 provide a TEE
     34   <li>Drivers for the Android kernel (Linux) to facilitate communication with
     35 applications running under the Trusty OS
     36   <li>A set of libraries for Android systems software to facilitate communication
     37 with trusted applications executed within the Trusty OS using the kernel
     38 drivers
     39 </ul>
     40 
     41 <p><strong>Important</strong>: Trusty and the Trusty API are subject
     42 to change.</p>
     43 
     44 <p>For information about the Trusty API, see the <a
     45 href="trusty-ref.html">API Reference</a>.</p>
     46 
     47 <h2 id=uses_examples>Uses and examples</h2>
     48 
     49 <p>Any TEE OS (not just Trusty) can be used for TEE implementations.</p>
     50 
     51 <p>A TEE processor is typically a separate microprocessor in the system or a
     52 virtualized instance of the main processor. The TEE processor is isolated from
     53 the rest of the system using memory and I/O protection mechanisms supported by
     54 the hardware.</p>
     55 
     56 <p>TEE processors have become a mainstay in today's mobile devices. The main
     57 processor on these devices is considered "untrusted" and cannot access certain
     58 areas of RAM, hardware registers and fuses where secret data (such as
     59 device-specific cryptographic keys) is stored by the manufacturer. Software
     60 running on the main processor delegates any operations that require use of
     61 secret data to the TEE processor.</p>
     62 
     63 <p>The most widely known example of this in the Android ecosystem
     64 is the <a href="/devices/drm.html">DRM framework</a> for
     65 protected content. Software running on the TEE processor can access
     66 device-specific keys required to decrypt protected content. The main processor
     67 sees only the encrypted content, providing a high level of security and
     68 protection against software-based attacks.</p>
     69 
     70 <p>There are many other uses for a TEE such as mobile payments, secure banking,
     71 full-disk encryption, multi-factor authentication, device reset protection,
     72 replay-protected persistent storage, wireless display ("cast") of protected
     73 content, secure PIN and fingerprint processing, and even malware detection.</p>
     74 
     75 <p>Trusty provides APIs for developing two classes of applications:</p>
     76 
     77 <ul>
     78   <li>Trusted applications or services that run on the TEE processor
     79   <li>Normal/untrusted applications that run on the main processor and use services
     80 provided by Trusted applications
     81 </ul>
     82 
     83 <p>Software running on the main processor can use Trusty APIs to connect to
     84 trusted applications and exchange arbitrary messages with them, just like a
     85 network service over IP. It is up to the application to determine the data
     86 format and semantics of these messages using an app-level protocol. Reliable
     87 delivery of messages is guaranteed by the underlying Trusty infrastructure (in
     88 the form of drivers running on the main processor), and the communication is
     89 completely asynchronous.</p>
     90 
     91 <h2 id=trusted_applications_and_services>Trusted applications and services</h2>
     92 
     93 <p>Trusted applications run as isolated processes under the Trusty OS kernel. Each
     94 process runs in its own virtual memory sandbox utilizing the MMU capabilities
     95 of the TEE processor. The kernel schedules these processes using a
     96 priority-based, round-robin scheduler driven by a secure timer tick. In the
     97 current version of Trusty, all Trusty applications share the same priority.</p>
     98 
     99 <p>Applications for the Trusty OS can be written in C/C++ (C++ support is
    100 limited), and they have access to a small C library. The <code>main()</code>
    101 function currently does not take any arguments. System call stubs are provided
    102 in native assembly code as part of this library, so system calls can be
    103 accessed by name.</p>
    104 
    105 <h3 id=language_threading>Language and threading support</h3>
    106 
    107 <p>All Trusty applications are single-threaded; multithreading in Trusty userspace
    108 currently is unsupported.</p>
    109 
    110 <h3 id=application_structure>Application structure</h3>
    111 
    112 <p>Trusty applications initialize once during load and reside in memory until the
    113 TEE processor is reset. Trusty currently does not support dynamic loading and
    114 unloading of applications.</p>
    115 
    116 <p>Trusted applications are written as <strong>event-driven servers</strong>
    117 waiting for commands from other applications or from applications running on
    118 the main processor. Trusted applications can also be clients of other trusted
    119 server applications. Events described in the following API sections will be
    120 delivered to trusted applications by the Trusty kernel.</p>
    121 
    122 <h2 id=third-party_trusty_applications>Third-party Trusty applications</h2>
    123 
    124 <p>Currently all Trusty applications are developed by a single party and packaged
    125 with the Trusty kernel image. The entire image is signed and verified by the
    126 bootloader during boot. Third-party application development is not supported in
    127 this version of Trusty.</p>
    128 
    129 <p>Although the Trusty OS enables the development of new applications, doing so
    130 must be exercised with extreme care; each new application increases the area of
    131 the trusted computing base (TCB) of the system. Trusted applications can access
    132 device secrets and can perform computations or data transformations using them.</p>
    133 
    134 <p>The ability to develop new applications that run in the TEE opens up many
    135 possibilities for innovation. However, due to the very definition of TEE, these
    136 applications cannot be distributed without some form of <strong>trust</strong> attached.
    137 Typically this comes in the form of a digital signature by an entity
    138 trusted by the user of the product on which the application runs.</p>
    139 
    140 <h2 id=downloading_building>Downloading and building Trusty</h2>
    141 
    142 <p>You can find the Trusty implementation in the Android Open Source Project (AOSP) here:<br/>
    143 <a href="https://android-review.googlesource.com/#/admin/projects/?filter=trusty">https://android-review.googlesource.com/#/admin/projects/?filter=trusty</a></p>
    144 
    145 <p>The Trusty kernel branches on AOSP are here:<br/>
    146 <a href="https://android.googlesource.com/kernel/common/+/android-trusty-3.10">https://android.googlesource.com/kernel/common/+/android-trusty-3.10</a><br/>
    147 <a href="https://android.googlesource.com/kernel/common/+/android-trusty-3.18">https://android.googlesource.com/kernel/common/+/android-trusty-3.18</a></p>
    148 
    149 <p>To make Trusty, run the following commands (assuming the Android toolchain is already in the path):</p>
    150 <pre class="devsite-click-to-copy">
    151 <code class="devsite-terminal">repo init -u https://android.googlesource.com/trusty/manifest</code>
    152 <code class="devsite-terminal">repo sync</code>
    153 <code class="devsite-terminal">make -j24 generic-arm64</code>
    154 </pre>
    155 
    156 <p>You may select another supported build target from: <code>device/*/*/project/*</code></p>
    157 
    158   </body>
    159 </html>
    160