Home
last modified time | relevance | path

Searched hist:ca52cbe65b1453f4a2811249847d3387b6888fd3 (Results 1 – 2 of 2) sorted by relevance

/rk3399_ARM-atf/plat/imx/common/
H A Dimx_caam.cca52cbe65b1453f4a2811249847d3387b6888fd3 Wed Jul 11 15:35:17 UTC 2018 Bryan O'Donoghue <bryan.odonoghue@linaro.org> imx: imx_caam: Add code to initialize the CAAM job-rings to NS-world

This patch defines the most basic part of the CAAM and the only piece of
the CAAM silicon we are really interested in, in ATF, the CAAM control
structure.

The CAAM itself is a huge address space of some 32k, way out of scope for
the purpose we have in ATF.

This patch adds a simple CAAM init function that assigns ownership of the
CAAM job-rings to the non-secure MID with the ownership bit set to
non-secure.

This will allow later logic in the boot process such as OPTEE, u-boot and
Linux to assign job-rings as appropriate, restricting if necessary but
leaving open the main functionality of the CAAM to the Linux NS runtime.

Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
/rk3399_ARM-atf/plat/imx/common/include/
H A Dimx_caam.hca52cbe65b1453f4a2811249847d3387b6888fd3 Wed Jul 11 15:35:17 UTC 2018 Bryan O'Donoghue <bryan.odonoghue@linaro.org> imx: imx_caam: Add code to initialize the CAAM job-rings to NS-world

This patch defines the most basic part of the CAAM and the only piece of
the CAAM silicon we are really interested in, in ATF, the CAAM control
structure.

The CAAM itself is a huge address space of some 32k, way out of scope for
the purpose we have in ATF.

This patch adds a simple CAAM init function that assigns ownership of the
CAAM job-rings to the non-secure MID with the ownership bit set to
non-secure.

This will allow later logic in the boot process such as OPTEE, u-boot and
Linux to assign job-rings as appropriate, restricting if necessary but
leaving open the main functionality of the CAAM to the Linux NS runtime.

Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org>