blob: be8c39f4582e3c35cfd4d47874d24f0d8c32838c [file] [log] [blame]
Jerome Forissier3d5d9f52015-05-04 09:40:03 +02001/*
2 * Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
8#include <debug.h>
9#include <platform_def.h>
10#include <stdint.h>
11#include <strings.h>
12#include <utils_def.h>
13#include "hikey_private.h"
14
15#define PORTNUM_MAX 5
16
17#define MDDRC_SECURITY_BASE 0xF7121000
18
19struct int_en_reg {
20 unsigned in_en:1;
21 unsigned reserved:31;
22};
23
24struct rgn_map_reg {
25 unsigned rgn_base_addr:24;
26 unsigned rgn_size:6;
27 unsigned reserved:1;
28 unsigned rgn_en:1;
29};
30
31struct rgn_attr_reg {
32 unsigned sp:4;
33 unsigned security_inv:1;
34 unsigned reserved_0:3;
35 unsigned mid_en:1;
36 unsigned mid_inv:1;
37 unsigned reserved_1:6;
38 unsigned rgn_en:1;
39 unsigned subrgn_disable:16;
40};
41
42static volatile struct int_en_reg *get_int_en_reg(uint32_t base)
43{
44 uint64_t addr = base + 0x20;
45 return (struct int_en_reg *)addr;
46}
47
48static volatile struct rgn_map_reg *get_rgn_map_reg(uint32_t base, int region, int port)
49{
50 uint64_t addr = base + 0x100 + 0x10 * region + 0x400 * (uint64_t)port;
51 return (struct rgn_map_reg *)addr;
52}
53
54static volatile struct rgn_attr_reg *get_rgn_attr_reg(uint32_t base, int region,
55 int port)
56{
57 uint64_t addr = base + 0x104 + 0x10 * region + 0x400 * (uint64_t)port;
58 return (struct rgn_attr_reg *)addr;
59}
60
61/*
62 * Configure secure memory region
63 * region_size must be a power of 2 and at least 64KB
64 * region_base must be region_size aligned
65 */
Peter Griffin52988b32017-12-21 18:03:46 +000066static void sec_protect(uint32_t region_base, uint32_t region_size,
67 int region)
Jerome Forissier3d5d9f52015-05-04 09:40:03 +020068{
69 volatile struct int_en_reg *int_en;
70 volatile struct rgn_map_reg *rgn_map;
71 volatile struct rgn_attr_reg *rgn_attr;
72 uint32_t i = 0;
73
Peter Griffin52988b32017-12-21 18:03:46 +000074 assert(region < 1 || region > 15);
Jerome Forissier3d5d9f52015-05-04 09:40:03 +020075 assert(!IS_POWER_OF_TWO(region_size) || region_size < 0x10000);
76 /* ensure secure region_base is aligned to region_size */
77 assert((region_base & (region_size - 1)));
78
79 INFO("BL2: TrustZone: protecting %u bytes of memory at 0x%x\n", region_size,
80 region_base);
81
82 int_en = get_int_en_reg(MDDRC_SECURITY_BASE);
83 int_en->in_en = 0x1;
84
85 for (i = 0; i < PORTNUM_MAX; i++) {
Peter Griffin52988b32017-12-21 18:03:46 +000086 rgn_map = get_rgn_map_reg(MDDRC_SECURITY_BASE, region, i);
87 rgn_attr = get_rgn_attr_reg(MDDRC_SECURITY_BASE, region, i);
Jerome Forissier3d5d9f52015-05-04 09:40:03 +020088 rgn_map->rgn_base_addr = region_base >> 16;
89 rgn_attr->subrgn_disable = 0x0;
90 rgn_attr->sp = (i == 3) ? 0xC : 0x0;
91 rgn_map->rgn_size = __builtin_ffs(region_size) - 2;
92 rgn_map->rgn_en = 0x1;
93 }
94}
95
96/*******************************************************************************
97 * Initialize the secure environment.
98 ******************************************************************************/
99void hikey_security_setup(void)
100{
Peter Griffin52988b32017-12-21 18:03:46 +0000101 sec_protect(DDR_SEC_BASE, DDR_SEC_SIZE, 1);
102 sec_protect(DDR_SDP_BASE, DDR_SDP_SIZE, 2);
Jerome Forissier3d5d9f52015-05-04 09:40:03 +0200103}