| /* |
| * Copyright (c) 2016-2018, ARM Limited and Contributors. All rights reserved. |
| * |
| * SPDX-License-Identifier: BSD-3-Clause |
| */ |
| |
| #ifndef TZC_COMMON_PRIVATE_H |
| #define TZC_COMMON_PRIVATE_H |
| |
| #include <arch.h> |
| #include <arch_helpers.h> |
| #include <mmio.h> |
| #include <tzc_common.h> |
| |
| #define DEFINE_TZC_COMMON_WRITE_ACTION(fn_name, macro_name) \ |
| static inline void _tzc##fn_name##_write_action( \ |
| uintptr_t base, \ |
| unsigned int action) \ |
| { \ |
| mmio_write_32(base + TZC_##macro_name##_ACTION_OFF, \ |
| action); \ |
| } |
| |
| #define DEFINE_TZC_COMMON_WRITE_REGION_BASE(fn_name, macro_name) \ |
| static inline void _tzc##fn_name##_write_region_base( \ |
| uintptr_t base, \ |
| unsigned int region_no, \ |
| unsigned long long region_base) \ |
| { \ |
| mmio_write_32(base + \ |
| TZC_REGION_OFFSET( \ |
| TZC_##macro_name##_REGION_SIZE, \ |
| region_no) + \ |
| TZC_##macro_name##_REGION_BASE_LOW_0_OFFSET, \ |
| (uint32_t)region_base); \ |
| mmio_write_32(base + \ |
| TZC_REGION_OFFSET( \ |
| TZC_##macro_name##_REGION_SIZE, \ |
| region_no) + \ |
| TZC_##macro_name##_REGION_BASE_HIGH_0_OFFSET, \ |
| (uint32_t)(region_base >> 32)); \ |
| } |
| |
| #define DEFINE_TZC_COMMON_WRITE_REGION_TOP(fn_name, macro_name) \ |
| static inline void _tzc##fn_name##_write_region_top( \ |
| uintptr_t base, \ |
| unsigned int region_no, \ |
| unsigned long long region_top) \ |
| { \ |
| mmio_write_32(base + \ |
| TZC_REGION_OFFSET \ |
| (TZC_##macro_name##_REGION_SIZE, \ |
| region_no) + \ |
| TZC_##macro_name##_REGION_TOP_LOW_0_OFFSET, \ |
| (uint32_t)region_top); \ |
| mmio_write_32(base + \ |
| TZC_REGION_OFFSET( \ |
| TZC_##macro_name##_REGION_SIZE, \ |
| region_no) + \ |
| TZC_##macro_name##_REGION_TOP_HIGH_0_OFFSET, \ |
| (uint32_t)(region_top >> 32)); \ |
| } |
| |
| #define DEFINE_TZC_COMMON_WRITE_REGION_ATTRIBUTES(fn_name, macro_name) \ |
| static inline void _tzc##fn_name##_write_region_attributes( \ |
| uintptr_t base, \ |
| unsigned int region_no, \ |
| unsigned int attr) \ |
| { \ |
| mmio_write_32(base + \ |
| TZC_REGION_OFFSET( \ |
| TZC_##macro_name##_REGION_SIZE, \ |
| region_no) + \ |
| TZC_##macro_name##_REGION_ATTR_0_OFFSET, \ |
| attr); \ |
| } |
| |
| #define DEFINE_TZC_COMMON_WRITE_REGION_ID_ACCESS(fn_name, macro_name) \ |
| static inline void _tzc##fn_name##_write_region_id_access( \ |
| uintptr_t base, \ |
| unsigned int region_no, \ |
| unsigned int val) \ |
| { \ |
| mmio_write_32(base + \ |
| TZC_REGION_OFFSET( \ |
| TZC_##macro_name##_REGION_SIZE, \ |
| region_no) + \ |
| TZC_##macro_name##_REGION_ID_ACCESS_0_OFFSET, \ |
| val); \ |
| } |
| |
| /* |
| * It is used to program region 0 ATTRIBUTES and ACCESS register. |
| */ |
| #define DEFINE_TZC_COMMON_CONFIGURE_REGION0(fn_name) \ |
| static void _tzc##fn_name##_configure_region0(uintptr_t base, \ |
| unsigned int sec_attr, \ |
| unsigned int ns_device_access) \ |
| { \ |
| assert(base != 0U); \ |
| VERBOSE("TrustZone : Configuring region 0 " \ |
| "(TZC Interface Base=0x%lx sec_attr=0x%x," \ |
| " ns_devs=0x%x)\n", base, \ |
| sec_attr, ns_device_access); \ |
| \ |
| /* Set secure attributes on region 0 */ \ |
| _tzc##fn_name##_write_region_attributes(base, 0, \ |
| sec_attr << TZC_REGION_ATTR_SEC_SHIFT); \ |
| \ |
| /***************************************************/ \ |
| /* Specify which non-secure devices have permission*/ \ |
| /* to access region 0. */ \ |
| /***************************************************/ \ |
| _tzc##fn_name##_write_region_id_access(base, \ |
| 0, \ |
| ns_device_access); \ |
| } |
| |
| /* |
| * It is used to program a region from 1 to 8 in the TrustZone controller. |
| * NOTE: |
| * Region 0 is special; it is preferable to use |
| * ##fn_name##_configure_region0 for this region (see comment for |
| * that function). |
| */ |
| #define DEFINE_TZC_COMMON_CONFIGURE_REGION(fn_name) \ |
| static void _tzc##fn_name##_configure_region(uintptr_t base, \ |
| unsigned int filters, \ |
| unsigned int region_no, \ |
| unsigned long long region_base, \ |
| unsigned long long region_top, \ |
| unsigned int sec_attr, \ |
| unsigned int nsaid_permissions) \ |
| { \ |
| assert(base != 0U); \ |
| VERBOSE("TrustZone : Configuring region " \ |
| "(TZC Interface Base: 0x%lx, region_no = %u)" \ |
| "...\n", base, region_no); \ |
| VERBOSE("TrustZone : ... base = %llx, top = %llx," \ |
| "\n", region_base, region_top); \ |
| VERBOSE("TrustZone : ... sec_attr = 0x%x," \ |
| " ns_devs = 0x%x)\n", \ |
| sec_attr, nsaid_permissions); \ |
| \ |
| /***************************************************/ \ |
| /* Inputs look ok, start programming registers. */ \ |
| /* All the address registers are 32 bits wide and */ \ |
| /* have a LOW and HIGH */ \ |
| /* component used to construct an address up to a */ \ |
| /* 64bit. */ \ |
| /***************************************************/ \ |
| _tzc##fn_name##_write_region_base(base, \ |
| region_no, region_base); \ |
| _tzc##fn_name##_write_region_top(base, \ |
| region_no, region_top); \ |
| \ |
| /* Enable filter to the region and set secure attributes */\ |
| _tzc##fn_name##_write_region_attributes(base, \ |
| region_no, \ |
| (sec_attr << TZC_REGION_ATTR_SEC_SHIFT) |\ |
| (filters << TZC_REGION_ATTR_F_EN_SHIFT));\ |
| \ |
| /***************************************************/ \ |
| /* Specify which non-secure devices have permission*/ \ |
| /* to access this region. */ \ |
| /***************************************************/ \ |
| _tzc##fn_name##_write_region_id_access(base, \ |
| region_no, \ |
| nsaid_permissions); \ |
| } |
| |
| static inline unsigned int _tzc_read_peripheral_id(uintptr_t base) |
| { |
| unsigned int id; |
| |
| id = mmio_read_32(base + PID0_OFF); |
| /* Masks DESC part in PID1 */ |
| id |= ((mmio_read_32(base + PID1_OFF) & 0xFU) << 8U); |
| |
| return id; |
| } |
| |
| #if ENABLE_ASSERTIONS |
| #ifdef AARCH32 |
| static inline unsigned long long _tzc_get_max_top_addr(unsigned int addr_width) |
| { |
| /* |
| * Assume at least 32 bit wide address and initialize the max. |
| * This function doesn't use 64-bit integer arithmetic to avoid |
| * having to implement additional compiler library functions. |
| */ |
| unsigned long long addr_mask = 0xFFFFFFFFU; |
| uint32_t *addr_ptr = (uint32_t *)&addr_mask; |
| |
| assert(addr_width >= 32U); |
| |
| /* This logic works only on little - endian platforms */ |
| assert((read_sctlr() & SCTLR_EE_BIT) == 0U); |
| |
| /* |
| * If required address width is greater than 32, populate the higher |
| * 32 bits of the 64 bit field with the max address. |
| */ |
| if (addr_width > 32U) |
| *(addr_ptr + 1U) = ((1U << (addr_width - 32U)) - 1U); |
| |
| return addr_mask; |
| } |
| #else |
| static inline unsigned long long _tzc_get_max_top_addr(unsigned int addr_width) |
| { |
| return UINT64_MAX >> (64U - addr_width); |
| } |
| #endif /* AARCH32 */ |
| |
| #endif /* ENABLE_ASSERTIONS */ |
| |
| #endif /* TZC_COMMON_PRIVATE_H */ |