drivers: qcom: ramblur: configure pIMEM accessConfigure memory access to enable execution of Trusted Applications.OP-TEE and its Trusted Applications execute from pIMEM, a region protectedby the
drivers: qcom: ramblur: configure pIMEM accessConfigure memory access to enable execution of Trusted Applications.OP-TEE and its Trusted Applications execute from pIMEM, a region protectedby the RAMBLUR IP block.RAMBLUR provides anti-rollback protection as well as confidentiality andintegrity guarantees for the memory region under its control.Any agent accessing the pIMEM-protected region performs normal reads orwrites to the pIMEM address range in the SNoC. The SNoC routes thesetransactions to the pIMEM slave port, and pIMEM remasters them to DDR.For write transactions, pIMEM applies the required cryptographicoperations before committing data to DDR.For read transactions, pIMEM applies the corresponding cryptographicoperations before returning the data from DDR to the requesting master.The reserved DDR region used by pIMEM to store cryptographicallyprocessed data and associated cryptographic state is referred to as thepIMEM vault.With the current U-Boot (tag 2026.01-rc3), the pIMEM Vault DDRreservation is derived from the TZ node in U-Boot’s built-in device tree(specifically the trusted_apps_mem reserved-memory node).U-Boot uses this node to construct the EFI memory map that is laterpassed to the kernel.A future update will remove this dependency on the built-in device tree.Instead, U-Boot will obtain the memory configuration directly from SMEM.Because of this transition, the current version of the driver does notgenerate a DT overlay for U-Boot to consume.Signed-off-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>Reviewed-by: Sumit Garg <sumit.garg@oss.qualcomm.com>Reviewed-by: Tony Hamilton <tonyh@qti.qualcomm.com>
show more ...