1*f568604bSVikram Kanigiri /* 2*f568604bSVikram Kanigiri * Copyright (c) 2016, ARM Limited and Contributors. All rights reserved. 3*f568604bSVikram Kanigiri * 4*f568604bSVikram Kanigiri * Redistribution and use in source and binary forms, with or without 5*f568604bSVikram Kanigiri * modification, are permitted provided that the following conditions are met: 6*f568604bSVikram Kanigiri * 7*f568604bSVikram Kanigiri * Redistributions of source code must retain the above copyright notice, this 8*f568604bSVikram Kanigiri * list of conditions and the following disclaimer. 9*f568604bSVikram Kanigiri * 10*f568604bSVikram Kanigiri * Redistributions in binary form must reproduce the above copyright notice, 11*f568604bSVikram Kanigiri * this list of conditions and the following disclaimer in the documentation 12*f568604bSVikram Kanigiri * and/or other materials provided with the distribution. 13*f568604bSVikram Kanigiri * 14*f568604bSVikram Kanigiri * Neither the name of ARM nor the names of its contributors may be used 15*f568604bSVikram Kanigiri * to endorse or promote products derived from this software without specific 16*f568604bSVikram Kanigiri * prior written permission. 17*f568604bSVikram Kanigiri * 18*f568604bSVikram Kanigiri * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 19*f568604bSVikram Kanigiri * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20*f568604bSVikram Kanigiri * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21*f568604bSVikram Kanigiri * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 22*f568604bSVikram Kanigiri * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23*f568604bSVikram Kanigiri * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24*f568604bSVikram Kanigiri * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25*f568604bSVikram Kanigiri * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26*f568604bSVikram Kanigiri * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27*f568604bSVikram Kanigiri * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28*f568604bSVikram Kanigiri * POSSIBILITY OF SUCH DAMAGE. 29*f568604bSVikram Kanigiri */ 30*f568604bSVikram Kanigiri 31*f568604bSVikram Kanigiri #include <assert.h> 32*f568604bSVikram Kanigiri #include <debug.h> 33*f568604bSVikram Kanigiri #include <mmio.h> 34*f568604bSVikram Kanigiri #include <tzc_dmc500.h> 35*f568604bSVikram Kanigiri #include "tzc_common.h" 36*f568604bSVikram Kanigiri #include "tzc_common_private.c" 37*f568604bSVikram Kanigiri 38*f568604bSVikram Kanigiri /* 39*f568604bSVikram Kanigiri * Macros which will be used by common core functions. 40*f568604bSVikram Kanigiri */ 41*f568604bSVikram Kanigiri #define TZC_DMC500_REGION_BASE_LOW_0_OFFSET 0x054 42*f568604bSVikram Kanigiri #define TZC_DMC500_REGION_BASE_HIGH_0_OFFSET 0x058 43*f568604bSVikram Kanigiri #define TZC_DMC500_REGION_TOP_LOW_0_OFFSET 0x05C 44*f568604bSVikram Kanigiri #define TZC_DMC500_REGION_TOP_HIGH_0_OFFSET 0x060 45*f568604bSVikram Kanigiri #define TZC_DMC500_REGION_ATTR_0_OFFSET 0x064 46*f568604bSVikram Kanigiri #define TZC_DMC500_REGION_ID_ACCESS_0_OFFSET 0x068 47*f568604bSVikram Kanigiri 48*f568604bSVikram Kanigiri #define TZC_DMC500_ACTION_OFF 0x50 49*f568604bSVikram Kanigiri 50*f568604bSVikram Kanigiri /* Pointer to the tzc_dmc500_driver_data structure populated by the platform */ 51*f568604bSVikram Kanigiri static const tzc_dmc500_driver_data_t *g_driver_data; 52*f568604bSVikram Kanigiri 53*f568604bSVikram Kanigiri #define verify_region_attr(region, attr) \ 54*f568604bSVikram Kanigiri ((g_conf_regions[(region)].sec_attr == \ 55*f568604bSVikram Kanigiri ((attr) >> TZC_REGION_ATTR_SEC_SHIFT)) \ 56*f568604bSVikram Kanigiri && ((attr) & (0x1 << TZC_REGION_ATTR_F_EN_SHIFT))) 57*f568604bSVikram Kanigiri 58*f568604bSVikram Kanigiri /* 59*f568604bSVikram Kanigiri * Structure for configured regions attributes in DMC500. 60*f568604bSVikram Kanigiri */ 61*f568604bSVikram Kanigiri typedef struct tzc_dmc500_regions { 62*f568604bSVikram Kanigiri tzc_region_attributes_t sec_attr; 63*f568604bSVikram Kanigiri int is_enabled; 64*f568604bSVikram Kanigiri } tzc_dmc500_regions_t; 65*f568604bSVikram Kanigiri 66*f568604bSVikram Kanigiri /* 67*f568604bSVikram Kanigiri * Array storing the attributes of the configured regions. This array 68*f568604bSVikram Kanigiri * will be used by the `tzc_dmc500_verify_complete` to verify the flush 69*f568604bSVikram Kanigiri * completion. 70*f568604bSVikram Kanigiri */ 71*f568604bSVikram Kanigiri static tzc_dmc500_regions_t g_conf_regions[MAX_REGION_VAL + 1]; 72*f568604bSVikram Kanigiri 73*f568604bSVikram Kanigiri /* Helper Macros for making the code readable */ 74*f568604bSVikram Kanigiri #define DMC_INST_BASE_ADDR(instance) (g_driver_data->dmc_base[instance]) 75*f568604bSVikram Kanigiri #define DMC_INST_SI_BASE(instance, interface) \ 76*f568604bSVikram Kanigiri (DMC_INST_BASE_ADDR(instance) + IFACE_OFFSET(interface)) 77*f568604bSVikram Kanigiri 78*f568604bSVikram Kanigiri DEFINE_TZC_COMMON_WRITE_ACTION(_dmc500, DMC500) 79*f568604bSVikram Kanigiri DEFINE_TZC_COMMON_WRITE_REGION_BASE(_dmc500, DMC500) 80*f568604bSVikram Kanigiri DEFINE_TZC_COMMON_WRITE_REGION_TOP(_dmc500, DMC500) 81*f568604bSVikram Kanigiri DEFINE_TZC_COMMON_WRITE_REGION_ATTRIBUTES(_dmc500, DMC500) 82*f568604bSVikram Kanigiri DEFINE_TZC_COMMON_WRITE_REGION_ID_ACCESS(_dmc500, DMC500) 83*f568604bSVikram Kanigiri 84*f568604bSVikram Kanigiri DEFINE_TZC_COMMON_CONFIGURE_REGION0(_dmc500) 85*f568604bSVikram Kanigiri DEFINE_TZC_COMMON_CONFIGURE_REGION(_dmc500) 86*f568604bSVikram Kanigiri 87*f568604bSVikram Kanigiri static inline unsigned int _tzc_dmc500_read_region_attr_0( 88*f568604bSVikram Kanigiri uintptr_t dmc_si_base, 89*f568604bSVikram Kanigiri int region_no) 90*f568604bSVikram Kanigiri { 91*f568604bSVikram Kanigiri return mmio_read_32(dmc_si_base + 92*f568604bSVikram Kanigiri TZC_REGION_OFFSET(TZC_DMC500_REGION_SIZE, region_no) + 93*f568604bSVikram Kanigiri TZC_DMC500_REGION_ATTR_0_OFFSET); 94*f568604bSVikram Kanigiri } 95*f568604bSVikram Kanigiri 96*f568604bSVikram Kanigiri static inline void _tzc_dmc500_write_flush_control(uintptr_t dmc_si_base) 97*f568604bSVikram Kanigiri { 98*f568604bSVikram Kanigiri mmio_write_32(dmc_si_base + SI_FLUSH_CTRL_OFFSET, 1); 99*f568604bSVikram Kanigiri } 100*f568604bSVikram Kanigiri 101*f568604bSVikram Kanigiri /* 102*f568604bSVikram Kanigiri * Sets the Flush controls for all the DMC Instances and System Interfaces. 103*f568604bSVikram Kanigiri * This initiates the flush of configuration settings from the shadow 104*f568604bSVikram Kanigiri * registers to the actual configuration register. The caller should poll 105*f568604bSVikram Kanigiri * changed register to confirm update. 106*f568604bSVikram Kanigiri */ 107*f568604bSVikram Kanigiri void tzc_dmc500_config_complete(void) 108*f568604bSVikram Kanigiri { 109*f568604bSVikram Kanigiri int dmc_inst, sys_if; 110*f568604bSVikram Kanigiri 111*f568604bSVikram Kanigiri assert(g_driver_data); 112*f568604bSVikram Kanigiri 113*f568604bSVikram Kanigiri for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { 114*f568604bSVikram Kanigiri assert(DMC_INST_BASE_ADDR(dmc_inst)); 115*f568604bSVikram Kanigiri for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++) 116*f568604bSVikram Kanigiri _tzc_dmc500_write_flush_control( 117*f568604bSVikram Kanigiri DMC_INST_SI_BASE(dmc_inst, sys_if)); 118*f568604bSVikram Kanigiri } 119*f568604bSVikram Kanigiri } 120*f568604bSVikram Kanigiri 121*f568604bSVikram Kanigiri /* 122*f568604bSVikram Kanigiri * This function reads back the secure attributes from the configuration 123*f568604bSVikram Kanigiri * register for each DMC Instance and System Interface and compares it with 124*f568604bSVikram Kanigiri * the configured value. The successful verification of the region attributes 125*f568604bSVikram Kanigiri * confirms that the flush operation has completed. 126*f568604bSVikram Kanigiri * If the verification fails, the caller is expected to invoke this API again 127*f568604bSVikram Kanigiri * till it succeeds. 128*f568604bSVikram Kanigiri * Returns 0 on success and 1 on failure. 129*f568604bSVikram Kanigiri */ 130*f568604bSVikram Kanigiri int tzc_dmc500_verify_complete(void) 131*f568604bSVikram Kanigiri { 132*f568604bSVikram Kanigiri int dmc_inst, sys_if, region_no; 133*f568604bSVikram Kanigiri unsigned int attr; 134*f568604bSVikram Kanigiri 135*f568604bSVikram Kanigiri assert(g_driver_data); 136*f568604bSVikram Kanigiri /* Region 0 must be configured */ 137*f568604bSVikram Kanigiri assert(g_conf_regions[0].is_enabled); 138*f568604bSVikram Kanigiri 139*f568604bSVikram Kanigiri /* Iterate over all configured regions */ 140*f568604bSVikram Kanigiri for (region_no = 0; region_no <= MAX_REGION_VAL; region_no++) { 141*f568604bSVikram Kanigiri if (!g_conf_regions[region_no].is_enabled) 142*f568604bSVikram Kanigiri continue; 143*f568604bSVikram Kanigiri for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; 144*f568604bSVikram Kanigiri dmc_inst++) { 145*f568604bSVikram Kanigiri assert(DMC_INST_BASE_ADDR(dmc_inst)); 146*f568604bSVikram Kanigiri for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; 147*f568604bSVikram Kanigiri sys_if++) { 148*f568604bSVikram Kanigiri attr = _tzc_dmc500_read_region_attr_0( 149*f568604bSVikram Kanigiri DMC_INST_SI_BASE(dmc_inst, sys_if), 150*f568604bSVikram Kanigiri region_no); 151*f568604bSVikram Kanigiri VERBOSE("Verifying DMC500 region:%d" 152*f568604bSVikram Kanigiri " dmc_inst:%d sys_if:%d attr:%x\n", 153*f568604bSVikram Kanigiri region_no, dmc_inst, sys_if, attr); 154*f568604bSVikram Kanigiri if (!verify_region_attr(region_no, attr)) 155*f568604bSVikram Kanigiri return 1; 156*f568604bSVikram Kanigiri } 157*f568604bSVikram Kanigiri } 158*f568604bSVikram Kanigiri } 159*f568604bSVikram Kanigiri 160*f568604bSVikram Kanigiri return 0; 161*f568604bSVikram Kanigiri } 162*f568604bSVikram Kanigiri 163*f568604bSVikram Kanigiri /* 164*f568604bSVikram Kanigiri * `tzc_dmc500_configure_region0` is used to program region 0 in both the 165*f568604bSVikram Kanigiri * system interfaces of all the DMC-500 instances. Region 0 covers the whole 166*f568604bSVikram Kanigiri * address space that is not mapped to any other region for a system interface, 167*f568604bSVikram Kanigiri * and is always enabled; this cannot be changed. This function only changes 168*f568604bSVikram Kanigiri * the access permissions. 169*f568604bSVikram Kanigiri */ 170*f568604bSVikram Kanigiri void tzc_dmc500_configure_region0(tzc_region_attributes_t sec_attr, 171*f568604bSVikram Kanigiri unsigned int nsaid_permissions) 172*f568604bSVikram Kanigiri { 173*f568604bSVikram Kanigiri int dmc_inst, sys_if; 174*f568604bSVikram Kanigiri 175*f568604bSVikram Kanigiri /* Assert if DMC-500 is not initialized */ 176*f568604bSVikram Kanigiri assert(g_driver_data); 177*f568604bSVikram Kanigiri 178*f568604bSVikram Kanigiri /* Configure region_0 in all DMC instances */ 179*f568604bSVikram Kanigiri for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { 180*f568604bSVikram Kanigiri assert(DMC_INST_BASE_ADDR(dmc_inst)); 181*f568604bSVikram Kanigiri for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++) 182*f568604bSVikram Kanigiri _tzc_dmc500_configure_region0( 183*f568604bSVikram Kanigiri DMC_INST_SI_BASE(dmc_inst, sys_if), 184*f568604bSVikram Kanigiri sec_attr, nsaid_permissions); 185*f568604bSVikram Kanigiri } 186*f568604bSVikram Kanigiri 187*f568604bSVikram Kanigiri g_conf_regions[0].sec_attr = sec_attr; 188*f568604bSVikram Kanigiri g_conf_regions[0].is_enabled = 1; 189*f568604bSVikram Kanigiri } 190*f568604bSVikram Kanigiri 191*f568604bSVikram Kanigiri /* 192*f568604bSVikram Kanigiri * `tzc_dmc500_configure_region` is used to program a region into all system 193*f568604bSVikram Kanigiri * interfaces of all the DMC instances. 194*f568604bSVikram Kanigiri * NOTE: 195*f568604bSVikram Kanigiri * Region 0 is special; it is preferable to use tzc_dmc500_configure_region0 196*f568604bSVikram Kanigiri * for this region (see comment for that function). 197*f568604bSVikram Kanigiri */ 198*f568604bSVikram Kanigiri void tzc_dmc500_configure_region(int region_no, 199*f568604bSVikram Kanigiri uintptr_t region_base, 200*f568604bSVikram Kanigiri uintptr_t region_top, 201*f568604bSVikram Kanigiri tzc_region_attributes_t sec_attr, 202*f568604bSVikram Kanigiri unsigned int nsaid_permissions) 203*f568604bSVikram Kanigiri { 204*f568604bSVikram Kanigiri int dmc_inst, sys_if; 205*f568604bSVikram Kanigiri 206*f568604bSVikram Kanigiri assert(g_driver_data); 207*f568604bSVikram Kanigiri /* Do range checks on regions. */ 208*f568604bSVikram Kanigiri assert(region_no >= 0 && region_no <= MAX_REGION_VAL); 209*f568604bSVikram Kanigiri 210*f568604bSVikram Kanigiri /* 211*f568604bSVikram Kanigiri * Do address range check based on DMC-TZ configuration. A 43bit address 212*f568604bSVikram Kanigiri * is the max and expected case. 213*f568604bSVikram Kanigiri */ 214*f568604bSVikram Kanigiri assert(((region_top <= (UINT64_MAX >> (64 - 43))) && 215*f568604bSVikram Kanigiri (region_base < region_top))); 216*f568604bSVikram Kanigiri 217*f568604bSVikram Kanigiri /* region_base and (region_top + 1) must be 4KB aligned */ 218*f568604bSVikram Kanigiri assert(((region_base | (region_top + 1)) & (4096 - 1)) == 0); 219*f568604bSVikram Kanigiri 220*f568604bSVikram Kanigiri for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { 221*f568604bSVikram Kanigiri assert(DMC_INST_BASE_ADDR(dmc_inst)); 222*f568604bSVikram Kanigiri for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++) 223*f568604bSVikram Kanigiri _tzc_dmc500_configure_region( 224*f568604bSVikram Kanigiri DMC_INST_SI_BASE(dmc_inst, sys_if), 225*f568604bSVikram Kanigiri TZC_DMC500_REGION_ATTR_F_EN_MASK, 226*f568604bSVikram Kanigiri region_no, region_base, region_top, 227*f568604bSVikram Kanigiri sec_attr, nsaid_permissions); 228*f568604bSVikram Kanigiri } 229*f568604bSVikram Kanigiri 230*f568604bSVikram Kanigiri g_conf_regions[region_no].sec_attr = sec_attr; 231*f568604bSVikram Kanigiri g_conf_regions[region_no].is_enabled = 1; 232*f568604bSVikram Kanigiri } 233*f568604bSVikram Kanigiri 234*f568604bSVikram Kanigiri /* Sets the action value for all the DMC instances */ 235*f568604bSVikram Kanigiri void tzc_dmc500_set_action(tzc_action_t action) 236*f568604bSVikram Kanigiri { 237*f568604bSVikram Kanigiri int dmc_inst; 238*f568604bSVikram Kanigiri 239*f568604bSVikram Kanigiri assert(g_driver_data); 240*f568604bSVikram Kanigiri 241*f568604bSVikram Kanigiri for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) { 242*f568604bSVikram Kanigiri assert(DMC_INST_BASE_ADDR(dmc_inst)); 243*f568604bSVikram Kanigiri /* 244*f568604bSVikram Kanigiri * - Currently no handler is provided to trap an error via 245*f568604bSVikram Kanigiri * interrupt or exception. 246*f568604bSVikram Kanigiri * - The interrupt action has not been tested. 247*f568604bSVikram Kanigiri */ 248*f568604bSVikram Kanigiri _tzc_dmc500_write_action(DMC_INST_BASE_ADDR(dmc_inst), action); 249*f568604bSVikram Kanigiri } 250*f568604bSVikram Kanigiri } 251*f568604bSVikram Kanigiri 252*f568604bSVikram Kanigiri /* 253*f568604bSVikram Kanigiri * A DMC-500 instance must be present at each base address provided by the 254*f568604bSVikram Kanigiri * platform. It also expects platform to pass at least one instance of 255*f568604bSVikram Kanigiri * DMC-500. 256*f568604bSVikram Kanigiri */ 257*f568604bSVikram Kanigiri static void validate_plat_driver_data( 258*f568604bSVikram Kanigiri const tzc_dmc500_driver_data_t *plat_driver_data) 259*f568604bSVikram Kanigiri { 260*f568604bSVikram Kanigiri #if DEBUG 261*f568604bSVikram Kanigiri int i; 262*f568604bSVikram Kanigiri unsigned int dmc_id; 263*f568604bSVikram Kanigiri uintptr_t dmc_base; 264*f568604bSVikram Kanigiri 265*f568604bSVikram Kanigiri assert(plat_driver_data); 266*f568604bSVikram Kanigiri assert(plat_driver_data->dmc_count > 0 && 267*f568604bSVikram Kanigiri (plat_driver_data->dmc_count <= MAX_DMC_COUNT)); 268*f568604bSVikram Kanigiri 269*f568604bSVikram Kanigiri for (i = 0; i < plat_driver_data->dmc_count; i++) { 270*f568604bSVikram Kanigiri dmc_base = plat_driver_data->dmc_base[i]; 271*f568604bSVikram Kanigiri assert(dmc_base); 272*f568604bSVikram Kanigiri 273*f568604bSVikram Kanigiri dmc_id = _tzc_read_peripheral_id(dmc_base); 274*f568604bSVikram Kanigiri assert(dmc_id == DMC500_PERIPHERAL_ID); 275*f568604bSVikram Kanigiri } 276*f568604bSVikram Kanigiri #endif /* DEBUG */ 277*f568604bSVikram Kanigiri } 278*f568604bSVikram Kanigiri 279*f568604bSVikram Kanigiri 280*f568604bSVikram Kanigiri /* 281*f568604bSVikram Kanigiri * Initializes the base address and count of DMC instances. 282*f568604bSVikram Kanigiri * 283*f568604bSVikram Kanigiri * Note : Only pointer to plat_driver_data is saved, so it is caller's 284*f568604bSVikram Kanigiri * responsibility to keep it valid until the driver is used. 285*f568604bSVikram Kanigiri */ 286*f568604bSVikram Kanigiri void tzc_dmc500_driver_init(const tzc_dmc500_driver_data_t *plat_driver_data) 287*f568604bSVikram Kanigiri { 288*f568604bSVikram Kanigiri /* Check valid pointer is passed */ 289*f568604bSVikram Kanigiri assert(plat_driver_data); 290*f568604bSVikram Kanigiri 291*f568604bSVikram Kanigiri /* 292*f568604bSVikram Kanigiri * NOTE: This driver expects the DMC-500 controller is already in 293*f568604bSVikram Kanigiri * READY state. Hence, it uses the reconfiguration method for 294*f568604bSVikram Kanigiri * programming TrustZone regions 295*f568604bSVikram Kanigiri */ 296*f568604bSVikram Kanigiri /* Validates the information passed by platform */ 297*f568604bSVikram Kanigiri validate_plat_driver_data(plat_driver_data); 298*f568604bSVikram Kanigiri g_driver_data = plat_driver_data; 299*f568604bSVikram Kanigiri } 300