mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-17 10:04:26 +00:00
Add ARM CoreLink DMC-500 driver to program TrustZone protection
The ARM CoreLink DMC-500 Dynamic Memory Controller provides the programmable address region control of a TrustZone Address Space Controller. The access permissions can be defined for eight separate address regions plus a background or default region. This patch adds a DMC-500 driver to define address regions and program their access permissions as per ARM 100131_0000_02_en (r0p0) document. Change-Id: I9d33120f9480d742bcf7937e4b876f9d40c727e6
This commit is contained in:
parent
57f782019a
commit
f568604b06
2 changed files with 473 additions and 0 deletions
299
drivers/arm/tzc/tzc_dmc500.c
Normal file
299
drivers/arm/tzc/tzc_dmc500.c
Normal file
|
@ -0,0 +1,299 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions are met:
|
||||||
|
*
|
||||||
|
* Redistributions of source code must retain the above copyright notice, this
|
||||||
|
* list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* Redistributions in binary form must reproduce the above copyright notice,
|
||||||
|
* this list of conditions and the following disclaimer in the documentation
|
||||||
|
* and/or other materials provided with the distribution.
|
||||||
|
*
|
||||||
|
* Neither the name of ARM nor the names of its contributors may be used
|
||||||
|
* to endorse or promote products derived from this software without specific
|
||||||
|
* prior written permission.
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||||||
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
||||||
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||||
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||||
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||||
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||||||
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||||
|
* POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <assert.h>
|
||||||
|
#include <debug.h>
|
||||||
|
#include <mmio.h>
|
||||||
|
#include <tzc_dmc500.h>
|
||||||
|
#include "tzc_common.h"
|
||||||
|
#include "tzc_common_private.c"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Macros which will be used by common core functions.
|
||||||
|
*/
|
||||||
|
#define TZC_DMC500_REGION_BASE_LOW_0_OFFSET 0x054
|
||||||
|
#define TZC_DMC500_REGION_BASE_HIGH_0_OFFSET 0x058
|
||||||
|
#define TZC_DMC500_REGION_TOP_LOW_0_OFFSET 0x05C
|
||||||
|
#define TZC_DMC500_REGION_TOP_HIGH_0_OFFSET 0x060
|
||||||
|
#define TZC_DMC500_REGION_ATTR_0_OFFSET 0x064
|
||||||
|
#define TZC_DMC500_REGION_ID_ACCESS_0_OFFSET 0x068
|
||||||
|
|
||||||
|
#define TZC_DMC500_ACTION_OFF 0x50
|
||||||
|
|
||||||
|
/* Pointer to the tzc_dmc500_driver_data structure populated by the platform */
|
||||||
|
static const tzc_dmc500_driver_data_t *g_driver_data;
|
||||||
|
|
||||||
|
#define verify_region_attr(region, attr) \
|
||||||
|
((g_conf_regions[(region)].sec_attr == \
|
||||||
|
((attr) >> TZC_REGION_ATTR_SEC_SHIFT)) \
|
||||||
|
&& ((attr) & (0x1 << TZC_REGION_ATTR_F_EN_SHIFT)))
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Structure for configured regions attributes in DMC500.
|
||||||
|
*/
|
||||||
|
typedef struct tzc_dmc500_regions {
|
||||||
|
tzc_region_attributes_t sec_attr;
|
||||||
|
int is_enabled;
|
||||||
|
} tzc_dmc500_regions_t;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Array storing the attributes of the configured regions. This array
|
||||||
|
* will be used by the `tzc_dmc500_verify_complete` to verify the flush
|
||||||
|
* completion.
|
||||||
|
*/
|
||||||
|
static tzc_dmc500_regions_t g_conf_regions[MAX_REGION_VAL + 1];
|
||||||
|
|
||||||
|
/* Helper Macros for making the code readable */
|
||||||
|
#define DMC_INST_BASE_ADDR(instance) (g_driver_data->dmc_base[instance])
|
||||||
|
#define DMC_INST_SI_BASE(instance, interface) \
|
||||||
|
(DMC_INST_BASE_ADDR(instance) + IFACE_OFFSET(interface))
|
||||||
|
|
||||||
|
DEFINE_TZC_COMMON_WRITE_ACTION(_dmc500, DMC500)
|
||||||
|
DEFINE_TZC_COMMON_WRITE_REGION_BASE(_dmc500, DMC500)
|
||||||
|
DEFINE_TZC_COMMON_WRITE_REGION_TOP(_dmc500, DMC500)
|
||||||
|
DEFINE_TZC_COMMON_WRITE_REGION_ATTRIBUTES(_dmc500, DMC500)
|
||||||
|
DEFINE_TZC_COMMON_WRITE_REGION_ID_ACCESS(_dmc500, DMC500)
|
||||||
|
|
||||||
|
DEFINE_TZC_COMMON_CONFIGURE_REGION0(_dmc500)
|
||||||
|
DEFINE_TZC_COMMON_CONFIGURE_REGION(_dmc500)
|
||||||
|
|
||||||
|
static inline unsigned int _tzc_dmc500_read_region_attr_0(
|
||||||
|
uintptr_t dmc_si_base,
|
||||||
|
int region_no)
|
||||||
|
{
|
||||||
|
return mmio_read_32(dmc_si_base +
|
||||||
|
TZC_REGION_OFFSET(TZC_DMC500_REGION_SIZE, region_no) +
|
||||||
|
TZC_DMC500_REGION_ATTR_0_OFFSET);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline void _tzc_dmc500_write_flush_control(uintptr_t dmc_si_base)
|
||||||
|
{
|
||||||
|
mmio_write_32(dmc_si_base + SI_FLUSH_CTRL_OFFSET, 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Sets the Flush controls for all the DMC Instances and System Interfaces.
|
||||||
|
* This initiates the flush of configuration settings from the shadow
|
||||||
|
* registers to the actual configuration register. The caller should poll
|
||||||
|
* changed register to confirm update.
|
||||||
|
*/
|
||||||
|
void tzc_dmc500_config_complete(void)
|
||||||
|
{
|
||||||
|
int dmc_inst, sys_if;
|
||||||
|
|
||||||
|
assert(g_driver_data);
|
||||||
|
|
||||||
|
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
|
||||||
|
assert(DMC_INST_BASE_ADDR(dmc_inst));
|
||||||
|
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++)
|
||||||
|
_tzc_dmc500_write_flush_control(
|
||||||
|
DMC_INST_SI_BASE(dmc_inst, sys_if));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This function reads back the secure attributes from the configuration
|
||||||
|
* register for each DMC Instance and System Interface and compares it with
|
||||||
|
* the configured value. The successful verification of the region attributes
|
||||||
|
* confirms that the flush operation has completed.
|
||||||
|
* If the verification fails, the caller is expected to invoke this API again
|
||||||
|
* till it succeeds.
|
||||||
|
* Returns 0 on success and 1 on failure.
|
||||||
|
*/
|
||||||
|
int tzc_dmc500_verify_complete(void)
|
||||||
|
{
|
||||||
|
int dmc_inst, sys_if, region_no;
|
||||||
|
unsigned int attr;
|
||||||
|
|
||||||
|
assert(g_driver_data);
|
||||||
|
/* Region 0 must be configured */
|
||||||
|
assert(g_conf_regions[0].is_enabled);
|
||||||
|
|
||||||
|
/* Iterate over all configured regions */
|
||||||
|
for (region_no = 0; region_no <= MAX_REGION_VAL; region_no++) {
|
||||||
|
if (!g_conf_regions[region_no].is_enabled)
|
||||||
|
continue;
|
||||||
|
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count;
|
||||||
|
dmc_inst++) {
|
||||||
|
assert(DMC_INST_BASE_ADDR(dmc_inst));
|
||||||
|
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT;
|
||||||
|
sys_if++) {
|
||||||
|
attr = _tzc_dmc500_read_region_attr_0(
|
||||||
|
DMC_INST_SI_BASE(dmc_inst, sys_if),
|
||||||
|
region_no);
|
||||||
|
VERBOSE("Verifying DMC500 region:%d"
|
||||||
|
" dmc_inst:%d sys_if:%d attr:%x\n",
|
||||||
|
region_no, dmc_inst, sys_if, attr);
|
||||||
|
if (!verify_region_attr(region_no, attr))
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* `tzc_dmc500_configure_region0` is used to program region 0 in both the
|
||||||
|
* system interfaces of all the DMC-500 instances. Region 0 covers the whole
|
||||||
|
* address space that is not mapped to any other region for a system interface,
|
||||||
|
* and is always enabled; this cannot be changed. This function only changes
|
||||||
|
* the access permissions.
|
||||||
|
*/
|
||||||
|
void tzc_dmc500_configure_region0(tzc_region_attributes_t sec_attr,
|
||||||
|
unsigned int nsaid_permissions)
|
||||||
|
{
|
||||||
|
int dmc_inst, sys_if;
|
||||||
|
|
||||||
|
/* Assert if DMC-500 is not initialized */
|
||||||
|
assert(g_driver_data);
|
||||||
|
|
||||||
|
/* Configure region_0 in all DMC instances */
|
||||||
|
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
|
||||||
|
assert(DMC_INST_BASE_ADDR(dmc_inst));
|
||||||
|
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++)
|
||||||
|
_tzc_dmc500_configure_region0(
|
||||||
|
DMC_INST_SI_BASE(dmc_inst, sys_if),
|
||||||
|
sec_attr, nsaid_permissions);
|
||||||
|
}
|
||||||
|
|
||||||
|
g_conf_regions[0].sec_attr = sec_attr;
|
||||||
|
g_conf_regions[0].is_enabled = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* `tzc_dmc500_configure_region` is used to program a region into all system
|
||||||
|
* interfaces of all the DMC instances.
|
||||||
|
* NOTE:
|
||||||
|
* Region 0 is special; it is preferable to use tzc_dmc500_configure_region0
|
||||||
|
* for this region (see comment for that function).
|
||||||
|
*/
|
||||||
|
void tzc_dmc500_configure_region(int region_no,
|
||||||
|
uintptr_t region_base,
|
||||||
|
uintptr_t region_top,
|
||||||
|
tzc_region_attributes_t sec_attr,
|
||||||
|
unsigned int nsaid_permissions)
|
||||||
|
{
|
||||||
|
int dmc_inst, sys_if;
|
||||||
|
|
||||||
|
assert(g_driver_data);
|
||||||
|
/* Do range checks on regions. */
|
||||||
|
assert(region_no >= 0 && region_no <= MAX_REGION_VAL);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Do address range check based on DMC-TZ configuration. A 43bit address
|
||||||
|
* is the max and expected case.
|
||||||
|
*/
|
||||||
|
assert(((region_top <= (UINT64_MAX >> (64 - 43))) &&
|
||||||
|
(region_base < region_top)));
|
||||||
|
|
||||||
|
/* region_base and (region_top + 1) must be 4KB aligned */
|
||||||
|
assert(((region_base | (region_top + 1)) & (4096 - 1)) == 0);
|
||||||
|
|
||||||
|
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
|
||||||
|
assert(DMC_INST_BASE_ADDR(dmc_inst));
|
||||||
|
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++)
|
||||||
|
_tzc_dmc500_configure_region(
|
||||||
|
DMC_INST_SI_BASE(dmc_inst, sys_if),
|
||||||
|
TZC_DMC500_REGION_ATTR_F_EN_MASK,
|
||||||
|
region_no, region_base, region_top,
|
||||||
|
sec_attr, nsaid_permissions);
|
||||||
|
}
|
||||||
|
|
||||||
|
g_conf_regions[region_no].sec_attr = sec_attr;
|
||||||
|
g_conf_regions[region_no].is_enabled = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Sets the action value for all the DMC instances */
|
||||||
|
void tzc_dmc500_set_action(tzc_action_t action)
|
||||||
|
{
|
||||||
|
int dmc_inst;
|
||||||
|
|
||||||
|
assert(g_driver_data);
|
||||||
|
|
||||||
|
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
|
||||||
|
assert(DMC_INST_BASE_ADDR(dmc_inst));
|
||||||
|
/*
|
||||||
|
* - Currently no handler is provided to trap an error via
|
||||||
|
* interrupt or exception.
|
||||||
|
* - The interrupt action has not been tested.
|
||||||
|
*/
|
||||||
|
_tzc_dmc500_write_action(DMC_INST_BASE_ADDR(dmc_inst), action);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* A DMC-500 instance must be present at each base address provided by the
|
||||||
|
* platform. It also expects platform to pass at least one instance of
|
||||||
|
* DMC-500.
|
||||||
|
*/
|
||||||
|
static void validate_plat_driver_data(
|
||||||
|
const tzc_dmc500_driver_data_t *plat_driver_data)
|
||||||
|
{
|
||||||
|
#if DEBUG
|
||||||
|
int i;
|
||||||
|
unsigned int dmc_id;
|
||||||
|
uintptr_t dmc_base;
|
||||||
|
|
||||||
|
assert(plat_driver_data);
|
||||||
|
assert(plat_driver_data->dmc_count > 0 &&
|
||||||
|
(plat_driver_data->dmc_count <= MAX_DMC_COUNT));
|
||||||
|
|
||||||
|
for (i = 0; i < plat_driver_data->dmc_count; i++) {
|
||||||
|
dmc_base = plat_driver_data->dmc_base[i];
|
||||||
|
assert(dmc_base);
|
||||||
|
|
||||||
|
dmc_id = _tzc_read_peripheral_id(dmc_base);
|
||||||
|
assert(dmc_id == DMC500_PERIPHERAL_ID);
|
||||||
|
}
|
||||||
|
#endif /* DEBUG */
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Initializes the base address and count of DMC instances.
|
||||||
|
*
|
||||||
|
* Note : Only pointer to plat_driver_data is saved, so it is caller's
|
||||||
|
* responsibility to keep it valid until the driver is used.
|
||||||
|
*/
|
||||||
|
void tzc_dmc500_driver_init(const tzc_dmc500_driver_data_t *plat_driver_data)
|
||||||
|
{
|
||||||
|
/* Check valid pointer is passed */
|
||||||
|
assert(plat_driver_data);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* NOTE: This driver expects the DMC-500 controller is already in
|
||||||
|
* READY state. Hence, it uses the reconfiguration method for
|
||||||
|
* programming TrustZone regions
|
||||||
|
*/
|
||||||
|
/* Validates the information passed by platform */
|
||||||
|
validate_plat_driver_data(plat_driver_data);
|
||||||
|
g_driver_data = plat_driver_data;
|
||||||
|
}
|
174
include/drivers/arm/tzc_dmc500.h
Normal file
174
include/drivers/arm/tzc_dmc500.h
Normal file
|
@ -0,0 +1,174 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions are met:
|
||||||
|
*
|
||||||
|
* Redistributions of source code must retain the above copyright notice, this
|
||||||
|
* list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* Redistributions in binary form must reproduce the above copyright notice,
|
||||||
|
* this list of conditions and the following disclaimer in the documentation
|
||||||
|
* and/or other materials provided with the distribution.
|
||||||
|
*
|
||||||
|
* Neither the name of ARM nor the names of its contributors may be used
|
||||||
|
* to endorse or promote products derived from this software without specific
|
||||||
|
* prior written permission.
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||||||
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
||||||
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||||
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||||
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||||
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||||||
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||||
|
* POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef __TZC_DMC500_H__
|
||||||
|
#define __TZC_DMC500_H__
|
||||||
|
|
||||||
|
#include <tzc_common.h>
|
||||||
|
|
||||||
|
#define SI_STATUS_OFFSET 0x000
|
||||||
|
#define SI_STATE_CTRL_OFFSET 0x030
|
||||||
|
#define SI_FLUSH_CTRL_OFFSET 0x034
|
||||||
|
#define SI_INT_CONTROL_OFFSET 0x048
|
||||||
|
|
||||||
|
#define SI_INT_STATUS_OFFSET 0x004
|
||||||
|
#define SI_TZ_FAIL_ADDRESS_LOW_OFFSET 0x008
|
||||||
|
#define SI_TZ_FAIL_ADDRESS_HIGH_OFFSET 0x00c
|
||||||
|
#define SI_FAIL_CONTROL_OFFSET 0x010
|
||||||
|
#define SI_FAIL_ID_OFFSET 0x014
|
||||||
|
#define SI_INT_CLR_OFFSET 0x04c
|
||||||
|
|
||||||
|
/*
|
||||||
|
* DMC-500 has 2 system interfaces each having a similar set of regs
|
||||||
|
* to configure each interface.
|
||||||
|
*/
|
||||||
|
#define SI0_BASE 0x0000
|
||||||
|
#define SI1_BASE 0x0200
|
||||||
|
|
||||||
|
/* Bit positions of SIx_SI_STATUS */
|
||||||
|
#define SI_EMPTY_SHIFT 0x01
|
||||||
|
#define SI_STALL_ACK_SHIFT 0x00
|
||||||
|
#define SI_EMPTY_MASK 0x01
|
||||||
|
#define SI_STALL_ACK_MASK 0x01
|
||||||
|
|
||||||
|
/* Bit positions of SIx_SI_INT_STATUS */
|
||||||
|
#define PMU_REQ_INT_OVERFLOW_STATUS_SHIFT 18
|
||||||
|
#define FAILED_ACCESS_INT_OVERFLOW_STATUS_SHIFT 16
|
||||||
|
#define PMU_REQ_INT_STATUS_SHIFT 2
|
||||||
|
#define FAILED_ACCESS_INT_INFO_TZ_OVERLAP_STATUS_SHIFT 1
|
||||||
|
#define FAILED_ACCESS_INT_STATUS_SHIFT 0
|
||||||
|
#define PMU_REQ_INT_OVERFLOW_STATUS_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_OVERFLOW_STATUS_MASK 0x1
|
||||||
|
#define PMU_REQ_INT_STATUS_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_INFO_TZ_OVERLAP_STATUS_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_STATUS_MASK 0x1
|
||||||
|
|
||||||
|
/* Bit positions of SIx_TZ_FAIL_CONTROL */
|
||||||
|
#define DIRECTION_SHIFT 24
|
||||||
|
#define NON_SECURE_SHIFT 21
|
||||||
|
#define PRIVILEGED_SHIFT 20
|
||||||
|
#define FAILED_ACCESS_INT_INFO_RANK_MASKED_SHIFT 3
|
||||||
|
#define FAILED_ACCESS_INT_INFO_UNMAPPED_SHIFT 2
|
||||||
|
#define FAILED_ACCESS_INT_TZ_FAIL_SHIFT 0x1
|
||||||
|
#define FAILED_ACCESS_INT_INFO_OUTSIDE_DEFAULT_SHIFT 0
|
||||||
|
#define DIRECTION_MASK 0x1
|
||||||
|
#define NON_SECURE_MASK 0x1
|
||||||
|
#define PRIVILEGED_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_INFO_RANK_MASKED_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_INFO_UNMAPPED_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_TZ_FAIL_MASK 1
|
||||||
|
#define FAILED_ACCESS_INT_INFO_OUTSIDE_DEFAULT_MASK 0x1
|
||||||
|
|
||||||
|
/* Bit positions of SIx_FAIL_STATUS */
|
||||||
|
#define FAIL_ID_VNET_SHIFT 24
|
||||||
|
#define FAIL_ID_ID_SHIFT 0
|
||||||
|
#define FAIL_ID_VNET_MASK 0xf
|
||||||
|
#define FAIL_ID_ID_MASK 0xffffff
|
||||||
|
|
||||||
|
/* Bit positions of SIx_SI_STATE_CONTRL */
|
||||||
|
#define SI_STALL_REQ_GO 0x0
|
||||||
|
#define SI_STALL_REQ_STALL 0x1
|
||||||
|
|
||||||
|
/* Bit positions of SIx_SI_FLUSH_CONTROL */
|
||||||
|
#define SI_FLUSH_REQ_INACTIVE 0x0
|
||||||
|
#define SI_FLUSH_REQ_ACTIVE 0x1
|
||||||
|
#define SI_FLUSH_REQ_MASK 0x1
|
||||||
|
|
||||||
|
/* Bit positions of SIx_SI_INT_CONTROL */
|
||||||
|
#define PMU_REQ_INT_EN_SHIFT 2
|
||||||
|
#define OVERLAP_DETECT_INT_EN_SHIFT 1
|
||||||
|
#define FAILED_ACCESS_INT_EN_SHIFT 0
|
||||||
|
#define PMU_REQ_INT_EN_MASK 0x1
|
||||||
|
#define OVERLAP_DETECT_INT_EN_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_EN_MASK 0x1
|
||||||
|
#define PMU_REQ_INT_EN 0x1
|
||||||
|
#define OVERLAP_DETECT_INT_EN 0x1
|
||||||
|
#define FAILED_ACCESS_INT_EN 0x1
|
||||||
|
|
||||||
|
/* Bit positions of SIx_SI_INT_CLR */
|
||||||
|
#define PMU_REQ_OFLOW_CLR_SHIFT 18
|
||||||
|
#define FAILED_ACCESS_OFLOW_CLR_SHIFT 16
|
||||||
|
#define PMU_REQ_INT_CLR_SHIFT 2
|
||||||
|
#define FAILED_ACCESS_INT_CLR_SHIFT 0
|
||||||
|
#define PMU_REQ_OFLOW_CLR_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_OFLOW_CLR_MASK 0x1
|
||||||
|
#define PMU_REQ_INT_CLR_MASK 0x1
|
||||||
|
#define FAILED_ACCESS_INT_CLR_MASK 0x1
|
||||||
|
#define PMU_REQ_OFLOW_CLR 0x1
|
||||||
|
#define FAILED_ACCESS_OFLOW_CLR 0x1
|
||||||
|
#define PMU_REQ_INT_CLR 0x1
|
||||||
|
#define FAILED_ACCESS_INT_CLR 0x1
|
||||||
|
|
||||||
|
/* Macro to get the correct base register for a system interface */
|
||||||
|
#define IFACE_OFFSET(sys_if) ((sys_if) ? SI1_BASE : SI0_BASE)
|
||||||
|
|
||||||
|
#define MAX_SYS_IF_COUNT 2
|
||||||
|
#define MAX_REGION_VAL 8
|
||||||
|
|
||||||
|
/* DMC-500 supports striping across a max of 4 DMC instances */
|
||||||
|
#define MAX_DMC_COUNT 4
|
||||||
|
|
||||||
|
/* Consist of part_number_1 and part_number_0 */
|
||||||
|
#define DMC500_PERIPHERAL_ID 0x0450
|
||||||
|
|
||||||
|
/* Filter enable bits in a TZC */
|
||||||
|
#define TZC_DMC500_REGION_ATTR_F_EN_MASK 0x1
|
||||||
|
|
||||||
|
/* Length of registers for configuring each region */
|
||||||
|
#define TZC_DMC500_REGION_SIZE 0x018
|
||||||
|
|
||||||
|
#ifndef __ASSEMBLY__
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Contains the base addresses of all the DMC instances.
|
||||||
|
*/
|
||||||
|
typedef struct tzc_dmc500_driver_data {
|
||||||
|
uintptr_t dmc_base[MAX_DMC_COUNT];
|
||||||
|
int dmc_count;
|
||||||
|
} tzc_dmc500_driver_data_t;
|
||||||
|
|
||||||
|
void tzc_dmc500_driver_init(const tzc_dmc500_driver_data_t *plat_driver_data);
|
||||||
|
void tzc_dmc500_configure_region0(tzc_region_attributes_t sec_attr,
|
||||||
|
unsigned int nsaid_permissions);
|
||||||
|
void tzc_dmc500_configure_region(int region_no,
|
||||||
|
uintptr_t region_base,
|
||||||
|
uintptr_t region_top,
|
||||||
|
tzc_region_attributes_t sec_attr,
|
||||||
|
unsigned int nsaid_permissions);
|
||||||
|
void tzc_dmc500_set_action(tzc_action_t action);
|
||||||
|
void tzc_dmc500_config_complete(void);
|
||||||
|
int tzc_dmc500_verify_complete(void);
|
||||||
|
|
||||||
|
|
||||||
|
#endif /* __ASSEMBLY__ */
|
||||||
|
#endif /* __TZC_DMC500_H__ */
|
||||||
|
|
Loading…
Add table
Reference in a new issue