xref: /rk3399_ARM-atf/plat/qti/kodiak/inc/qti_secure_io_cfg.h (revision 1c63cd61495542b0b52e1b6e484c59ce5c26e0d2)
1*6091f03dSSumit Garg /*
2*6091f03dSSumit Garg  * Copyright (c) 2019-2021, The Linux Foundation. All rights reserved.
3*6091f03dSSumit Garg  *
4*6091f03dSSumit Garg  * SPDX-License-Identifier: BSD-3-Clause
5*6091f03dSSumit Garg  */
6*6091f03dSSumit Garg #ifndef QTI_SECURE_IO_CFG_H
7*6091f03dSSumit Garg #define QTI_SECURE_IO_CFG_H
8*6091f03dSSumit Garg 
9*6091f03dSSumit Garg #include <stdint.h>
10*6091f03dSSumit Garg 
11*6091f03dSSumit Garg /*
12*6091f03dSSumit Garg  * List of peripheral/IO memory areas that are protected from
13*6091f03dSSumit Garg  * non-secure world but not required to be secure.
14*6091f03dSSumit Garg  */
15*6091f03dSSumit Garg 
16*6091f03dSSumit Garg #define EUD_MODE_MANAGER2_EN			0x088E2000
17*6091f03dSSumit Garg #define APPS_SMMU_TBU_PWR_STATUS		0x15002204
18*6091f03dSSumit Garg #define APPS_SMMU_CUSTOM_CFG			0x15002300
19*6091f03dSSumit Garg #define APPS_SMMU_STATS_SYNC_INV_TBU_ACK	0x150025DC
20*6091f03dSSumit Garg #define APPS_SMMU_SAFE_SEC_CFG			0x15002648
21*6091f03dSSumit Garg #define APPS_SMMU_MMU2QSS_AND_SAFE_WAIT_CNTR	0x15002670
22*6091f03dSSumit Garg 
23*6091f03dSSumit Garg static const uintptr_t qti_secure_io_allowed_regs[] = {
24*6091f03dSSumit Garg 	EUD_MODE_MANAGER2_EN,
25*6091f03dSSumit Garg 	APPS_SMMU_TBU_PWR_STATUS,
26*6091f03dSSumit Garg 	APPS_SMMU_CUSTOM_CFG,
27*6091f03dSSumit Garg 	APPS_SMMU_STATS_SYNC_INV_TBU_ACK,
28*6091f03dSSumit Garg 	APPS_SMMU_SAFE_SEC_CFG,
29*6091f03dSSumit Garg 	APPS_SMMU_MMU2QSS_AND_SAFE_WAIT_CNTR,
30*6091f03dSSumit Garg };
31*6091f03dSSumit Garg 
32*6091f03dSSumit Garg #endif /* QTI_SECURE_IO_CFG_H */
33