Browse Source
The ARM CoreLink DMC-500 Dynamic Memory Controller provides the programmable address region control of a TrustZone Address Space Controller. The access permissions can be defined for eight separate address regions plus a background or default region. This patch adds a DMC-500 driver to define address regions and program their access permissions as per ARM 100131_0000_02_en (r0p0) document. Change-Id: I9d33120f9480d742bcf7937e4b876f9d40c727e6pull/575/head
Vikram Kanigiri
9 years ago
committed by
Soby Mathew
2 changed files with 473 additions and 0 deletions
@ -0,0 +1,299 @@ |
|||
/*
|
|||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved. |
|||
* |
|||
* Redistribution and use in source and binary forms, with or without |
|||
* modification, are permitted provided that the following conditions are met: |
|||
* |
|||
* Redistributions of source code must retain the above copyright notice, this |
|||
* list of conditions and the following disclaimer. |
|||
* |
|||
* Redistributions in binary form must reproduce the above copyright notice, |
|||
* this list of conditions and the following disclaimer in the documentation |
|||
* and/or other materials provided with the distribution. |
|||
* |
|||
* Neither the name of ARM nor the names of its contributors may be used |
|||
* to endorse or promote products derived from this software without specific |
|||
* prior written permission. |
|||
* |
|||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
|||
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
|||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
|||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
|||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
|||
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
|||
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
|||
* POSSIBILITY OF SUCH DAMAGE. |
|||
*/ |
|||
|
|||
#include <assert.h> |
|||
#include <debug.h> |
|||
#include <mmio.h> |
|||
#include <tzc_dmc500.h> |
|||
#include "tzc_common.h" |
|||
#include "tzc_common_private.c" |
|||
|
|||
/*
|
|||
* Macros which will be used by common core functions. |
|||
*/ |
|||
#define TZC_DMC500_REGION_BASE_LOW_0_OFFSET 0x054 |
|||
#define TZC_DMC500_REGION_BASE_HIGH_0_OFFSET 0x058 |
|||
#define TZC_DMC500_REGION_TOP_LOW_0_OFFSET 0x05C |
|||
#define TZC_DMC500_REGION_TOP_HIGH_0_OFFSET 0x060 |
|||
#define TZC_DMC500_REGION_ATTR_0_OFFSET 0x064 |
|||
#define TZC_DMC500_REGION_ID_ACCESS_0_OFFSET 0x068 |
|||
|
|||
#define TZC_DMC500_ACTION_OFF 0x50 |
|||
|
|||
/* Pointer to the tzc_dmc500_driver_data structure populated by the platform */ |
|||
static const tzc_dmc500_driver_data_t *g_driver_data; |
|||
|
|||
#define verify_region_attr(region, attr) \ |
|||
((g_conf_regions[(region)].sec_attr == \ |
|||
((attr) >> TZC_REGION_ATTR_SEC_SHIFT)) \ |
|||
&& ((attr) & (0x1 << TZC_REGION_ATTR_F_EN_SHIFT))) |
|||
|
|||
/*
|
|||
* Structure for configured regions attributes in DMC500. |
|||
*/ |
|||
typedef struct tzc_dmc500_regions { |
|||
tzc_region_attributes_t sec_attr; |
|||
int is_enabled; |
|||
} tzc_dmc500_regions_t; |
|||
|
|||
/*
|
|||
* Array storing the attributes of the configured regions. This array |
|||
* will be used by the `tzc_dmc500_verify_complete` to verify the flush |
|||
* completion. |
|||
*/ |
|||
static tzc_dmc500_regions_t g_conf_regions[MAX_REGION_VAL + 1]; |
|||
|
|||
/* Helper Macros for making the code readable */ |
|||
#define DMC_INST_BASE_ADDR(instance) (g_driver_data->dmc_base[instance]) |
|||
#define DMC_INST_SI_BASE(instance, interface) \ |
|||
(DMC_INST_BASE_ADDR(instance) + IFACE_OFFSET(interface)) |
|||
|
|||
DEFINE_TZC_COMMON_WRITE_ACTION(_dmc500, DMC500) |
|||
DEFINE_TZC_COMMON_WRITE_REGION_BASE(_dmc500, DMC500) |
|||
DEFINE_TZC_COMMON_WRITE_REGION_TOP(_dmc500, DMC500) |
|||
DEFINE_TZC_COMMON_WRITE_REGION_ATTRIBUTES(_dmc500, DMC500) |
|||
DEFINE_TZC_COMMON_WRITE_REGION_ID_ACCESS(_dmc500, DMC500) |
|||
|
|||
DEFINE_TZC_COMMON_CONFIGURE_REGION0(_dmc500) |
|||
DEFINE_TZC_COMMON_CONFIGURE_REGION(_dmc500) |
|||
|
|||
static inline unsigned int _tzc_dmc500_read_region_attr_0( |
|||
uintptr_t dmc_si_base, |
|||
int region_no) |
|||
{ |
|||
return mmio_read_32(dmc_si_base + |
|||
TZC_REGION_OFFSET(TZC_DMC500_REGION_SIZE, region_no) + |
|||
TZC_DMC500_REGION_ATTR_0_OFFSET); |
|||
} |
|||
|
|||
static inline void _tzc_dmc500_write_flush_control(uintptr_t dmc_si_base) |
|||
{ |
|||
mmio_write_32(dmc_si_base + SI_FLUSH_CTRL_OFFSET, 1); |
|||
} |
|||
|
|||
/*
|
|||
* Sets the Flush controls for all the DMC Instances and System Interfaces. |
|||
* This initiates the flush of configuration settings from the shadow |
|||
* registers to the actual configuration register. The caller should poll |
|||
* changed register to confirm update. |
|||
*/ |
|||
void tzc_dmc500_config_complete(void) |
|||
{ |
|||
int dmc_inst, sys_if; |
|||
|
|||
assert(g_driver_data); |
|||
|
|||
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { |
|||
assert(DMC_INST_BASE_ADDR(dmc_inst)); |
|||
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++) |
|||
_tzc_dmc500_write_flush_control( |
|||
DMC_INST_SI_BASE(dmc_inst, sys_if)); |
|||
} |
|||
} |
|||
|
|||
/*
|
|||
* This function reads back the secure attributes from the configuration |
|||
* register for each DMC Instance and System Interface and compares it with |
|||
* the configured value. The successful verification of the region attributes |
|||
* confirms that the flush operation has completed. |
|||
* If the verification fails, the caller is expected to invoke this API again |
|||
* till it succeeds. |
|||
* Returns 0 on success and 1 on failure. |
|||
*/ |
|||
int tzc_dmc500_verify_complete(void) |
|||
{ |
|||
int dmc_inst, sys_if, region_no; |
|||
unsigned int attr; |
|||
|
|||
assert(g_driver_data); |
|||
/* Region 0 must be configured */ |
|||
assert(g_conf_regions[0].is_enabled); |
|||
|
|||
/* Iterate over all configured regions */ |
|||
for (region_no = 0; region_no <= MAX_REGION_VAL; region_no++) { |
|||
if (!g_conf_regions[region_no].is_enabled) |
|||
continue; |
|||
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; |
|||
dmc_inst++) { |
|||
assert(DMC_INST_BASE_ADDR(dmc_inst)); |
|||
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; |
|||
sys_if++) { |
|||
attr = _tzc_dmc500_read_region_attr_0( |
|||
DMC_INST_SI_BASE(dmc_inst, sys_if), |
|||
region_no); |
|||
VERBOSE("Verifying DMC500 region:%d" |
|||
" dmc_inst:%d sys_if:%d attr:%x\n", |
|||
region_no, dmc_inst, sys_if, attr); |
|||
if (!verify_region_attr(region_no, attr)) |
|||
return 1; |
|||
} |
|||
} |
|||
} |
|||
|
|||
return 0; |
|||
} |
|||
|
|||
/*
|
|||
* `tzc_dmc500_configure_region0` is used to program region 0 in both the |
|||
* system interfaces of all the DMC-500 instances. Region 0 covers the whole |
|||
* address space that is not mapped to any other region for a system interface, |
|||
* and is always enabled; this cannot be changed. This function only changes |
|||
* the access permissions. |
|||
*/ |
|||
void tzc_dmc500_configure_region0(tzc_region_attributes_t sec_attr, |
|||
unsigned int nsaid_permissions) |
|||
{ |
|||
int dmc_inst, sys_if; |
|||
|
|||
/* Assert if DMC-500 is not initialized */ |
|||
assert(g_driver_data); |
|||
|
|||
/* Configure region_0 in all DMC instances */ |
|||
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { |
|||
assert(DMC_INST_BASE_ADDR(dmc_inst)); |
|||
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++) |
|||
_tzc_dmc500_configure_region0( |
|||
DMC_INST_SI_BASE(dmc_inst, sys_if), |
|||
sec_attr, nsaid_permissions); |
|||
} |
|||
|
|||
g_conf_regions[0].sec_attr = sec_attr; |
|||
g_conf_regions[0].is_enabled = 1; |
|||
} |
|||
|
|||
/*
|
|||
* `tzc_dmc500_configure_region` is used to program a region into all system |
|||
* interfaces of all the DMC instances. |
|||
* NOTE: |
|||
* Region 0 is special; it is preferable to use tzc_dmc500_configure_region0 |
|||
* for this region (see comment for that function). |
|||
*/ |
|||
void tzc_dmc500_configure_region(int region_no, |
|||
uintptr_t region_base, |
|||
uintptr_t region_top, |
|||
tzc_region_attributes_t sec_attr, |
|||
unsigned int nsaid_permissions) |
|||
{ |
|||
int dmc_inst, sys_if; |
|||
|
|||
assert(g_driver_data); |
|||
/* Do range checks on regions. */ |
|||
assert(region_no >= 0 && region_no <= MAX_REGION_VAL); |
|||
|
|||
/*
|
|||
* Do address range check based on DMC-TZ configuration. A 43bit address |
|||
* is the max and expected case. |
|||
*/ |
|||
assert(((region_top <= (UINT64_MAX >> (64 - 43))) && |
|||
(region_base < region_top))); |
|||
|
|||
/* region_base and (region_top + 1) must be 4KB aligned */ |
|||
assert(((region_base | (region_top + 1)) & (4096 - 1)) == 0); |
|||
|
|||
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { |
|||
assert(DMC_INST_BASE_ADDR(dmc_inst)); |
|||
for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++) |
|||
_tzc_dmc500_configure_region( |
|||
DMC_INST_SI_BASE(dmc_inst, sys_if), |
|||
TZC_DMC500_REGION_ATTR_F_EN_MASK, |
|||
region_no, region_base, region_top, |
|||
sec_attr, nsaid_permissions); |
|||
} |
|||
|
|||
g_conf_regions[region_no].sec_attr = sec_attr; |
|||
g_conf_regions[region_no].is_enabled = 1; |
|||
} |
|||
|
|||
/* Sets the action value for all the DMC instances */ |
|||
void tzc_dmc500_set_action(tzc_action_t action) |
|||
{ |
|||
int dmc_inst; |
|||
|
|||
assert(g_driver_data); |
|||
|
|||
for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { |
|||
assert(DMC_INST_BASE_ADDR(dmc_inst)); |
|||
/*
|
|||
* - Currently no handler is provided to trap an error via |
|||
* interrupt or exception. |
|||
* - The interrupt action has not been tested. |
|||
*/ |
|||
_tzc_dmc500_write_action(DMC_INST_BASE_ADDR(dmc_inst), action); |
|||
} |
|||
} |
|||
|
|||
/*
|
|||
* A DMC-500 instance must be present at each base address provided by the |
|||
* platform. It also expects platform to pass at least one instance of |
|||
* DMC-500. |
|||
*/ |
|||
static void validate_plat_driver_data( |
|||
const tzc_dmc500_driver_data_t *plat_driver_data) |
|||
{ |
|||
#if DEBUG |
|||
int i; |
|||
unsigned int dmc_id; |
|||
uintptr_t dmc_base; |
|||
|
|||
assert(plat_driver_data); |
|||
assert(plat_driver_data->dmc_count > 0 && |
|||
(plat_driver_data->dmc_count <= MAX_DMC_COUNT)); |
|||
|
|||
for (i = 0; i < plat_driver_data->dmc_count; i++) { |
|||
dmc_base = plat_driver_data->dmc_base[i]; |
|||
assert(dmc_base); |
|||
|
|||
dmc_id = _tzc_read_peripheral_id(dmc_base); |
|||
assert(dmc_id == DMC500_PERIPHERAL_ID); |
|||
} |
|||
#endif /* DEBUG */ |
|||
} |
|||
|
|||
|
|||
/*
|
|||
* Initializes the base address and count of DMC instances. |
|||
* |
|||
* Note : Only pointer to plat_driver_data is saved, so it is caller's |
|||
* responsibility to keep it valid until the driver is used. |
|||
*/ |
|||
void tzc_dmc500_driver_init(const tzc_dmc500_driver_data_t *plat_driver_data) |
|||
{ |
|||
/* Check valid pointer is passed */ |
|||
assert(plat_driver_data); |
|||
|
|||
/*
|
|||
* NOTE: This driver expects the DMC-500 controller is already in |
|||
* READY state. Hence, it uses the reconfiguration method for |
|||
* programming TrustZone regions |
|||
*/ |
|||
/* Validates the information passed by platform */ |
|||
validate_plat_driver_data(plat_driver_data); |
|||
g_driver_data = plat_driver_data; |
|||
} |
@ -0,0 +1,174 @@ |
|||
/*
|
|||
* Copyright (c) 2016, ARM Limited and Contributors. All rights reserved. |
|||
* |
|||
* Redistribution and use in source and binary forms, with or without |
|||
* modification, are permitted provided that the following conditions are met: |
|||
* |
|||
* Redistributions of source code must retain the above copyright notice, this |
|||
* list of conditions and the following disclaimer. |
|||
* |
|||
* Redistributions in binary form must reproduce the above copyright notice, |
|||
* this list of conditions and the following disclaimer in the documentation |
|||
* and/or other materials provided with the distribution. |
|||
* |
|||
* Neither the name of ARM nor the names of its contributors may be used |
|||
* to endorse or promote products derived from this software without specific |
|||
* prior written permission. |
|||
* |
|||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
|||
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
|||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
|||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
|||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
|||
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
|||
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
|||
* POSSIBILITY OF SUCH DAMAGE. |
|||
*/ |
|||
|
|||
#ifndef __TZC_DMC500_H__ |
|||
#define __TZC_DMC500_H__ |
|||
|
|||
#include <tzc_common.h> |
|||
|
|||
#define SI_STATUS_OFFSET 0x000 |
|||
#define SI_STATE_CTRL_OFFSET 0x030 |
|||
#define SI_FLUSH_CTRL_OFFSET 0x034 |
|||
#define SI_INT_CONTROL_OFFSET 0x048 |
|||
|
|||
#define SI_INT_STATUS_OFFSET 0x004 |
|||
#define SI_TZ_FAIL_ADDRESS_LOW_OFFSET 0x008 |
|||
#define SI_TZ_FAIL_ADDRESS_HIGH_OFFSET 0x00c |
|||
#define SI_FAIL_CONTROL_OFFSET 0x010 |
|||
#define SI_FAIL_ID_OFFSET 0x014 |
|||
#define SI_INT_CLR_OFFSET 0x04c |
|||
|
|||
/*
|
|||
* DMC-500 has 2 system interfaces each having a similar set of regs |
|||
* to configure each interface. |
|||
*/ |
|||
#define SI0_BASE 0x0000 |
|||
#define SI1_BASE 0x0200 |
|||
|
|||
/* Bit positions of SIx_SI_STATUS */ |
|||
#define SI_EMPTY_SHIFT 0x01 |
|||
#define SI_STALL_ACK_SHIFT 0x00 |
|||
#define SI_EMPTY_MASK 0x01 |
|||
#define SI_STALL_ACK_MASK 0x01 |
|||
|
|||
/* Bit positions of SIx_SI_INT_STATUS */ |
|||
#define PMU_REQ_INT_OVERFLOW_STATUS_SHIFT 18 |
|||
#define FAILED_ACCESS_INT_OVERFLOW_STATUS_SHIFT 16 |
|||
#define PMU_REQ_INT_STATUS_SHIFT 2 |
|||
#define FAILED_ACCESS_INT_INFO_TZ_OVERLAP_STATUS_SHIFT 1 |
|||
#define FAILED_ACCESS_INT_STATUS_SHIFT 0 |
|||
#define PMU_REQ_INT_OVERFLOW_STATUS_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_OVERFLOW_STATUS_MASK 0x1 |
|||
#define PMU_REQ_INT_STATUS_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_INFO_TZ_OVERLAP_STATUS_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_STATUS_MASK 0x1 |
|||
|
|||
/* Bit positions of SIx_TZ_FAIL_CONTROL */ |
|||
#define DIRECTION_SHIFT 24 |
|||
#define NON_SECURE_SHIFT 21 |
|||
#define PRIVILEGED_SHIFT 20 |
|||
#define FAILED_ACCESS_INT_INFO_RANK_MASKED_SHIFT 3 |
|||
#define FAILED_ACCESS_INT_INFO_UNMAPPED_SHIFT 2 |
|||
#define FAILED_ACCESS_INT_TZ_FAIL_SHIFT 0x1 |
|||
#define FAILED_ACCESS_INT_INFO_OUTSIDE_DEFAULT_SHIFT 0 |
|||
#define DIRECTION_MASK 0x1 |
|||
#define NON_SECURE_MASK 0x1 |
|||
#define PRIVILEGED_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_INFO_RANK_MASKED_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_INFO_UNMAPPED_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_TZ_FAIL_MASK 1 |
|||
#define FAILED_ACCESS_INT_INFO_OUTSIDE_DEFAULT_MASK 0x1 |
|||
|
|||
/* Bit positions of SIx_FAIL_STATUS */ |
|||
#define FAIL_ID_VNET_SHIFT 24 |
|||
#define FAIL_ID_ID_SHIFT 0 |
|||
#define FAIL_ID_VNET_MASK 0xf |
|||
#define FAIL_ID_ID_MASK 0xffffff |
|||
|
|||
/* Bit positions of SIx_SI_STATE_CONTRL */ |
|||
#define SI_STALL_REQ_GO 0x0 |
|||
#define SI_STALL_REQ_STALL 0x1 |
|||
|
|||
/* Bit positions of SIx_SI_FLUSH_CONTROL */ |
|||
#define SI_FLUSH_REQ_INACTIVE 0x0 |
|||
#define SI_FLUSH_REQ_ACTIVE 0x1 |
|||
#define SI_FLUSH_REQ_MASK 0x1 |
|||
|
|||
/* Bit positions of SIx_SI_INT_CONTROL */ |
|||
#define PMU_REQ_INT_EN_SHIFT 2 |
|||
#define OVERLAP_DETECT_INT_EN_SHIFT 1 |
|||
#define FAILED_ACCESS_INT_EN_SHIFT 0 |
|||
#define PMU_REQ_INT_EN_MASK 0x1 |
|||
#define OVERLAP_DETECT_INT_EN_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_EN_MASK 0x1 |
|||
#define PMU_REQ_INT_EN 0x1 |
|||
#define OVERLAP_DETECT_INT_EN 0x1 |
|||
#define FAILED_ACCESS_INT_EN 0x1 |
|||
|
|||
/* Bit positions of SIx_SI_INT_CLR */ |
|||
#define PMU_REQ_OFLOW_CLR_SHIFT 18 |
|||
#define FAILED_ACCESS_OFLOW_CLR_SHIFT 16 |
|||
#define PMU_REQ_INT_CLR_SHIFT 2 |
|||
#define FAILED_ACCESS_INT_CLR_SHIFT 0 |
|||
#define PMU_REQ_OFLOW_CLR_MASK 0x1 |
|||
#define FAILED_ACCESS_OFLOW_CLR_MASK 0x1 |
|||
#define PMU_REQ_INT_CLR_MASK 0x1 |
|||
#define FAILED_ACCESS_INT_CLR_MASK 0x1 |
|||
#define PMU_REQ_OFLOW_CLR 0x1 |
|||
#define FAILED_ACCESS_OFLOW_CLR 0x1 |
|||
#define PMU_REQ_INT_CLR 0x1 |
|||
#define FAILED_ACCESS_INT_CLR 0x1 |
|||
|
|||
/* Macro to get the correct base register for a system interface */ |
|||
#define IFACE_OFFSET(sys_if) ((sys_if) ? SI1_BASE : SI0_BASE) |
|||
|
|||
#define MAX_SYS_IF_COUNT 2 |
|||
#define MAX_REGION_VAL 8 |
|||
|
|||
/* DMC-500 supports striping across a max of 4 DMC instances */ |
|||
#define MAX_DMC_COUNT 4 |
|||
|
|||
/* Consist of part_number_1 and part_number_0 */ |
|||
#define DMC500_PERIPHERAL_ID 0x0450 |
|||
|
|||
/* Filter enable bits in a TZC */ |
|||
#define TZC_DMC500_REGION_ATTR_F_EN_MASK 0x1 |
|||
|
|||
/* Length of registers for configuring each region */ |
|||
#define TZC_DMC500_REGION_SIZE 0x018 |
|||
|
|||
#ifndef __ASSEMBLY__ |
|||
|
|||
#include <stdint.h> |
|||
|
|||
/*
|
|||
* Contains the base addresses of all the DMC instances. |
|||
*/ |
|||
typedef struct tzc_dmc500_driver_data { |
|||
uintptr_t dmc_base[MAX_DMC_COUNT]; |
|||
int dmc_count; |
|||
} tzc_dmc500_driver_data_t; |
|||
|
|||
void tzc_dmc500_driver_init(const tzc_dmc500_driver_data_t *plat_driver_data); |
|||
void tzc_dmc500_configure_region0(tzc_region_attributes_t sec_attr, |
|||
unsigned int nsaid_permissions); |
|||
void tzc_dmc500_configure_region(int region_no, |
|||
uintptr_t region_base, |
|||
uintptr_t region_top, |
|||
tzc_region_attributes_t sec_attr, |
|||
unsigned int nsaid_permissions); |
|||
void tzc_dmc500_set_action(tzc_action_t action); |
|||
void tzc_dmc500_config_complete(void); |
|||
int tzc_dmc500_verify_complete(void); |
|||
|
|||
|
|||
#endif /* __ASSEMBLY__ */ |
|||
#endif /* __TZC_DMC500_H__ */ |
|||
|
Loading…
Reference in new issue