blob: a6c92278f564762bb133324d42ca3ef9b41b4cdc [file] [log] [blame]
Harry Liebelcef93392014-04-01 19:27:38 +01001/*
Summer Qin5ce394c2018-03-12 11:28:26 +08002 * Copyright (c) 2014-2018, ARM Limited and Contributors. All rights reserved.
Harry Liebelcef93392014-04-01 19:27:38 +01003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Harry Liebelcef93392014-04-01 19:27:38 +01005 */
6
Dan Handley2b6b5742015-03-19 19:17:53 +00007#include <arm_config.h>
8#include <plat_arm.h>
Harry Liebelcef93392014-04-01 19:27:38 +01009
10/*
Dan Handley2b6b5742015-03-19 19:17:53 +000011 * We assume that all security programming is done by the primary core.
Harry Liebelcef93392014-04-01 19:27:38 +010012 */
Dan Handley2b6b5742015-03-19 19:17:53 +000013void plat_arm_security_setup(void)
Harry Liebelcef93392014-04-01 19:27:38 +010014{
Harry Liebelcef93392014-04-01 19:27:38 +010015 /*
16 * The Base FVP has a TrustZone address space controller, the Foundation
17 * FVP does not. Trying to program the device on the foundation FVP will
18 * cause an abort.
19 *
20 * If the platform had additional peripheral specific security
21 * configurations, those would be configured here.
22 */
23
Dan Handley2b6b5742015-03-19 19:17:53 +000024 if (get_arm_config()->flags & ARM_CONFIG_HAS_TZC)
Summer Qin5ce394c2018-03-12 11:28:26 +080025 arm_tzc400_setup(NULL);
Harry Liebelcef93392014-04-01 19:27:38 +010026}