Browse Source
This patch replaces direct accesses to the TZC-400 registers by the appropiate calls to the generic driver available in the Trusted Firmware in order to initialize the TrustZone Controller. Functions related to the initialization of the secure memory, like the TZC-400 configuration, have been moved to a new file 'plat_security.c'. This reorganization makes easier to set up the secure memory from any BL stage. TZC-400 initialization has been moved from BL1 to BL2 because BL1 does not access the non-secure memory. It is BL2's responsibility to enable and configure the TZC-400 before loading the next BL images. In Juno, BL3-0 initializes some of the platform peripherals, like the DDR controller. Thus, BL3-0 must be loaded before configuring the TrustZone Controller. As a consequence, the IO layer initialization has been moved to early platform initialization. Fixes ARM-software/tf-issues#234 Change-Id: I83dde778f937ac8d2996f7377e871a2e77d9490epull/215/head
Juan Castillo
10 years ago
6 changed files with 90 additions and 38 deletions
@ -0,0 +1,76 @@ |
|||
/*
|
|||
* Copyright (c) 2014, ARM Limited and Contributors. All rights reserved. |
|||
* |
|||
* Redistribution and use in source and binary forms, with or without |
|||
* modification, are permitted provided that the following conditions are met: |
|||
* |
|||
* Redistributions of source code must retain the above copyright notice, this |
|||
* list of conditions and the following disclaimer. |
|||
* |
|||
* Redistributions in binary form must reproduce the above copyright notice, |
|||
* this list of conditions and the following disclaimer in the documentation |
|||
* and/or other materials provided with the distribution. |
|||
* |
|||
* Neither the name of ARM nor the names of its contributors may be used |
|||
* to endorse or promote products derived from this software without specific |
|||
* prior written permission. |
|||
* |
|||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
|||
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
|||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
|||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
|||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
|||
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
|||
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
|||
* POSSIBILITY OF SUCH DAMAGE. |
|||
*/ |
|||
|
|||
#include <debug.h> |
|||
#include <tzc400.h> |
|||
#include "juno_def.h" |
|||
|
|||
/*******************************************************************************
|
|||
* Initialize the TrustZone Controller. Configure Region 0 with Secure RW access |
|||
* and allow Non-Secure masters full access |
|||
******************************************************************************/ |
|||
static void init_tzc400(void) |
|||
{ |
|||
tzc_init(TZC400_BASE); |
|||
|
|||
/* Disable filters. */ |
|||
tzc_disable_filters(); |
|||
|
|||
/* Configure region 0. Juno TZC-400 handles 40-bit addresses. */ |
|||
tzc_configure_region(0xf, 0, 0x0ull, 0xffffffffffull, |
|||
TZC_REGION_S_RDWR, |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_CCI400) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_PCIE) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_HDLCD0) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_HDLCD1) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_USB) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_DMA330) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_THINLINKS) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_AP) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_GPU) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_SCP) | |
|||
TZC_REGION_ACCESS_RDWR(TZC400_NSAID_CORESIGHT)); |
|||
|
|||
/* Raise an exception if a NS device tries to access secure memory */ |
|||
tzc_set_action(TZC_ACTION_ERR); |
|||
|
|||
/* Enable filters. */ |
|||
tzc_enable_filters(); |
|||
} |
|||
|
|||
/*******************************************************************************
|
|||
* Initialize the secure environment. At this moment only the TrustZone |
|||
* Controller is initialized. |
|||
******************************************************************************/ |
|||
void plat_security_setup(void) |
|||
{ |
|||
/* Initialize the TrustZone Controller */ |
|||
init_tzc400(); |
|||
} |
Loading…
Reference in new issue