blob: 3de636ddd3bf0dc87f28f4d8c4ee8d53dd641656 [file] [log] [blame]
Saurabh Gorecha70389ca2020-04-22 21:31:24 +05301/*
2 * Copyright (c) 2019-2020, The Linux Foundation. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6#ifndef QTI_SECURE_IO_CFG_H
7#define QTI_SECURE_IO_CFG_H
8
9#include <stdint.h>
10
11/*
12 * List of peripheral/IO memory areas that are protected from
13 * non-secure world but not required to be secure.
14 */
15
16#define APPS_SMMU_TBU_PWR_STATUS 0x15002204
17#define APPS_SMMU_CUSTOM_CFG 0x15002300
18#define APPS_SMMU_STATS_SYNC_INV_TBU_ACK 0x150025DC
19#define APPS_SMMU_SAFE_SEC_CFG 0x15002648
20#define APPS_SMMU_MMU2QSS_AND_SAFE_WAIT_CNTR 0x15002670
21
22static const uintptr_t qti_secure_io_allowed_regs[] = {
23 APPS_SMMU_TBU_PWR_STATUS,
24 APPS_SMMU_CUSTOM_CFG,
25 APPS_SMMU_STATS_SYNC_INV_TBU_ACK,
26 APPS_SMMU_SAFE_SEC_CFG,
27 APPS_SMMU_MMU2QSS_AND_SAFE_WAIT_CNTR,
28};
29
30#endif /* QTI_SECURE_IO_CFG_H */