| #
e9ff3486 |
| 29-Mar-2022 |
Yann Gautier <yann.gautier@foss.st.com> |
refactor(st-drivers): do not rely on DT in etzpc_init
The ETZPC peripheral is always secure, and has a fixed address, given by STM32MP1_ETZPC_BASE. This is then not needed to check that in DT.
Sign
refactor(st-drivers): do not rely on DT in etzpc_init
The ETZPC peripheral is always secure, and has a fixed address, given by STM32MP1_ETZPC_BASE. This is then not needed to check that in DT.
Signed-off-by: Yann Gautier <yann.gautier@foss.st.com> Change-Id: Ifb0779abaf830e1e5a469c72181c2b2726fb47b5
show more ...
|
| #
77d0504e |
| 08-Dec-2019 |
Etienne Carriere <etienne.carriere@st.com> |
drivers: introduce ST ETZPC driver
ETZPC stands for Extended TrustZone Protection Controller. It is a resource conditional access device. It is mainly based on Arm TZPC.
ST ETZPC exposes memory map
drivers: introduce ST ETZPC driver
ETZPC stands for Extended TrustZone Protection Controller. It is a resource conditional access device. It is mainly based on Arm TZPC.
ST ETZPC exposes memory mapped DECPROT cells to set access permissions to SoC peripheral interfaces as I2C, SPI, DDR controllers, and some of the SoC internal memories.
ST ETZPC exposes memory mapped TZMA cells to set access permissions to some SoC internal memories.
Change-Id: I47ce20ffcfb55306dab923153b71e1bcbe2a5570 Co-developed-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
show more ...
|