1a9cc84d7SVikram Kanigiri /* 2*e29efeb1SAntonio Nino Diaz * Copyright (c) 2014-2017, ARM Limited and Contributors. All rights reserved. 3a9cc84d7SVikram Kanigiri * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 5a9cc84d7SVikram Kanigiri */ 6a9cc84d7SVikram Kanigiri 7a9cc84d7SVikram Kanigiri #include <arm_def.h> 8*e29efeb1SAntonio Nino Diaz #include <arm_spm_def.h> 9a9cc84d7SVikram Kanigiri #include <debug.h> 10a9cc84d7SVikram Kanigiri #include <platform_def.h> 11a9cc84d7SVikram Kanigiri #include <tzc400.h> 12a9cc84d7SVikram Kanigiri 13a9cc84d7SVikram Kanigiri 14a9cc84d7SVikram Kanigiri /* Weak definitions may be overridden in specific ARM standard platform */ 15a9cc84d7SVikram Kanigiri #pragma weak plat_arm_security_setup 16a9cc84d7SVikram Kanigiri 17a9cc84d7SVikram Kanigiri 18a9cc84d7SVikram Kanigiri /******************************************************************************* 19a9cc84d7SVikram Kanigiri * Initialize the TrustZone Controller for ARM standard platforms. 20a9cc84d7SVikram Kanigiri * Configure: 21a9cc84d7SVikram Kanigiri * - Region 0 with no access; 22a9cc84d7SVikram Kanigiri * - Region 1 with secure access only; 23a9cc84d7SVikram Kanigiri * - the remaining DRAM regions access from the given Non-Secure masters. 24a9cc84d7SVikram Kanigiri * 25a9cc84d7SVikram Kanigiri * When booting an EL3 payload, this is simplified: we configure region 0 with 26a9cc84d7SVikram Kanigiri * secure access only and do not enable any other region. 27a9cc84d7SVikram Kanigiri ******************************************************************************/ 2857f78201SSoby Mathew void arm_tzc400_setup(void) 29a9cc84d7SVikram Kanigiri { 30a9cc84d7SVikram Kanigiri INFO("Configuring TrustZone Controller\n"); 31a9cc84d7SVikram Kanigiri 3257f78201SSoby Mathew tzc400_init(PLAT_ARM_TZC_BASE); 33a9cc84d7SVikram Kanigiri 34a9cc84d7SVikram Kanigiri /* Disable filters. */ 3557f78201SSoby Mathew tzc400_disable_filters(); 36a9cc84d7SVikram Kanigiri 37a9cc84d7SVikram Kanigiri #ifndef EL3_PAYLOAD_BASE 38e60f2af9SSoby Mathew 39a9cc84d7SVikram Kanigiri /* Region 0 set to no access by default */ 4057f78201SSoby Mathew tzc400_configure_region0(TZC_REGION_S_NONE, 0); 41a9cc84d7SVikram Kanigiri 42a9cc84d7SVikram Kanigiri /* Region 1 set to cover Secure part of DRAM */ 4357f78201SSoby Mathew tzc400_configure_region(PLAT_ARM_TZC_FILTERS, 1, 44a22dffc6SSoby Mathew ARM_AP_TZC_DRAM1_BASE, ARM_EL3_TZC_DRAM1_END, 45a9cc84d7SVikram Kanigiri TZC_REGION_S_RDWR, 46a9cc84d7SVikram Kanigiri 0); 47a9cc84d7SVikram Kanigiri 48a9cc84d7SVikram Kanigiri /* Region 2 set to cover Non-Secure access to 1st DRAM address range. 49a9cc84d7SVikram Kanigiri * Apply the same configuration to given filters in the TZC. */ 5057f78201SSoby Mathew tzc400_configure_region(PLAT_ARM_TZC_FILTERS, 2, 51a9cc84d7SVikram Kanigiri ARM_NS_DRAM1_BASE, ARM_NS_DRAM1_END, 52e60f2af9SSoby Mathew ARM_TZC_NS_DRAM_S_ACCESS, 53a9cc84d7SVikram Kanigiri PLAT_ARM_TZC_NS_DEV_ACCESS); 54a9cc84d7SVikram Kanigiri 55a9cc84d7SVikram Kanigiri /* Region 3 set to cover Non-Secure access to 2nd DRAM address range */ 5657f78201SSoby Mathew tzc400_configure_region(PLAT_ARM_TZC_FILTERS, 3, 57a9cc84d7SVikram Kanigiri ARM_DRAM2_BASE, ARM_DRAM2_END, 58e60f2af9SSoby Mathew ARM_TZC_NS_DRAM_S_ACCESS, 59a9cc84d7SVikram Kanigiri PLAT_ARM_TZC_NS_DEV_ACCESS); 60*e29efeb1SAntonio Nino Diaz 61*e29efeb1SAntonio Nino Diaz #if ENABLE_SPM 62*e29efeb1SAntonio Nino Diaz /* 63*e29efeb1SAntonio Nino Diaz * Region 4 set to cover Non-Secure access to the communication buffer 64*e29efeb1SAntonio Nino Diaz * shared with the Secure world. 65*e29efeb1SAntonio Nino Diaz */ 66*e29efeb1SAntonio Nino Diaz tzc400_configure_region(PLAT_ARM_TZC_FILTERS, 67*e29efeb1SAntonio Nino Diaz 4, 68*e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_NS_BUF_BASE, 69*e29efeb1SAntonio Nino Diaz (ARM_SP_IMAGE_NS_BUF_BASE + 70*e29efeb1SAntonio Nino Diaz ARM_SP_IMAGE_NS_BUF_SIZE) - 1, 71*e29efeb1SAntonio Nino Diaz TZC_REGION_S_NONE, 72*e29efeb1SAntonio Nino Diaz PLAT_ARM_TZC_NS_DEV_ACCESS); 73*e29efeb1SAntonio Nino Diaz #endif 74*e29efeb1SAntonio Nino Diaz 75*e29efeb1SAntonio Nino Diaz #else /* if defined(EL3_PAYLOAD_BASE) */ 76*e29efeb1SAntonio Nino Diaz 77a9cc84d7SVikram Kanigiri /* Allow secure access only to DRAM for EL3 payloads. */ 7857f78201SSoby Mathew tzc400_configure_region0(TZC_REGION_S_RDWR, 0); 79*e29efeb1SAntonio Nino Diaz 80a9cc84d7SVikram Kanigiri #endif /* EL3_PAYLOAD_BASE */ 81a9cc84d7SVikram Kanigiri 82a9cc84d7SVikram Kanigiri /* 83a9cc84d7SVikram Kanigiri * Raise an exception if a NS device tries to access secure memory 84a9cc84d7SVikram Kanigiri * TODO: Add interrupt handling support. 85a9cc84d7SVikram Kanigiri */ 8657f78201SSoby Mathew tzc400_set_action(TZC_ACTION_ERR); 87a9cc84d7SVikram Kanigiri 88a9cc84d7SVikram Kanigiri /* Enable filters. */ 8957f78201SSoby Mathew tzc400_enable_filters(); 90a9cc84d7SVikram Kanigiri } 91a9cc84d7SVikram Kanigiri 92a9cc84d7SVikram Kanigiri void plat_arm_security_setup(void) 93a9cc84d7SVikram Kanigiri { 9457f78201SSoby Mathew arm_tzc400_setup(); 95a9cc84d7SVikram Kanigiri } 96