hikey: configure the top 16MB of DRAM as secure
authorJerome Forissier <jerome.forissier@linaro.org>
Mon, 4 May 2015 07:40:03 +0000 (09:40 +0200)
committerPeter Griffin <peter.griffin@linaro.org>
Wed, 24 Jan 2018 03:30:23 +0000 (03:30 +0000)
DRAM region 0x3f000000 - 0x3fffffff is reserved for OP-TEE and should
therefore be accessible only from secure world.

Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org>
Signed-off-by: Peter Griffin <peter.griffin@linaro.org>
Acked-by: Victor Chong <victor.chong@linaro.org>
plat/hisilicon/hikey/hikey_bl2_setup.c
plat/hisilicon/hikey/hikey_private.h
plat/hisilicon/hikey/hikey_security.c [new file with mode: 0644]
plat/hisilicon/hikey/platform.mk

index 13dc6c9b839d03abbe1c719e50118abb57336896..6c9fe51c3ec50cb9f5ed6b521144373e040819eb 100644 (file)
@@ -347,4 +347,5 @@ void bl2_plat_arch_setup(void)
 
 void bl2_platform_setup(void)
 {
+       hikey_security_setup();
 }
index a7709b26c7cc53cefae4e2d081f32cc10802e9e8..da98734955362e6ef7573bd0edac8ec3ac316436 100644 (file)
@@ -44,6 +44,7 @@ int hikey_erase(const char *arg);
 int hikey_flash(const char *arg);
 int hikey_oem(const char *arg);
 int hikey_reboot(const char *arg);
+void hikey_security_setup(void);
 
 const char *hikey_init_serialno(void);
 int hikey_read_serialno(struct random_serial_num *serialno);
diff --git a/plat/hisilicon/hikey/hikey_security.c b/plat/hisilicon/hikey/hikey_security.c
new file mode 100644 (file)
index 0000000..2a784e7
--- /dev/null
@@ -0,0 +1,100 @@
+/*
+ * Copyright (c) 2018, ARM Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#include <assert.h>
+#include <debug.h>
+#include <platform_def.h>
+#include <stdint.h>
+#include <strings.h>
+#include <utils_def.h>
+#include "hikey_private.h"
+
+#define PORTNUM_MAX            5
+
+#define MDDRC_SECURITY_BASE    0xF7121000
+
+struct int_en_reg {
+       unsigned in_en:1;
+       unsigned reserved:31;
+};
+
+struct rgn_map_reg {
+       unsigned rgn_base_addr:24;
+       unsigned rgn_size:6;
+       unsigned reserved:1;
+       unsigned rgn_en:1;
+};
+
+struct rgn_attr_reg {
+       unsigned sp:4;
+       unsigned security_inv:1;
+       unsigned reserved_0:3;
+       unsigned mid_en:1;
+       unsigned mid_inv:1;
+       unsigned reserved_1:6;
+       unsigned rgn_en:1;
+       unsigned subrgn_disable:16;
+};
+
+static volatile struct int_en_reg *get_int_en_reg(uint32_t base)
+{
+       uint64_t addr = base + 0x20;
+       return (struct int_en_reg *)addr;
+}
+
+static volatile struct rgn_map_reg *get_rgn_map_reg(uint32_t base, int region, int port)
+{
+       uint64_t addr = base + 0x100 + 0x10 * region + 0x400 * (uint64_t)port;
+       return (struct rgn_map_reg *)addr;
+}
+
+static volatile struct rgn_attr_reg *get_rgn_attr_reg(uint32_t base, int region,
+                                            int port)
+{
+       uint64_t addr = base + 0x104 + 0x10 * region + 0x400 * (uint64_t)port;
+       return (struct rgn_attr_reg *)addr;
+}
+
+/*
+ * Configure secure memory region
+ * region_size must be a power of 2 and at least 64KB
+ * region_base must be region_size aligned
+ */
+static void sec_protect(uint32_t region_base, uint32_t region_size)
+{
+       volatile struct int_en_reg *int_en;
+       volatile struct rgn_map_reg *rgn_map;
+       volatile struct rgn_attr_reg *rgn_attr;
+       uint32_t i = 0;
+
+       assert(!IS_POWER_OF_TWO(region_size) || region_size < 0x10000);
+       /* ensure secure region_base is aligned to region_size */
+       assert((region_base & (region_size - 1)));
+
+       INFO("BL2: TrustZone: protecting %u bytes of memory at 0x%x\n", region_size,
+            region_base);
+
+       int_en = get_int_en_reg(MDDRC_SECURITY_BASE);
+       int_en->in_en = 0x1;
+
+       for (i = 0; i < PORTNUM_MAX; i++) {
+               rgn_map = get_rgn_map_reg(MDDRC_SECURITY_BASE, 1, i);
+               rgn_attr = get_rgn_attr_reg(MDDRC_SECURITY_BASE, 1, i);
+               rgn_map->rgn_base_addr = region_base >> 16;
+               rgn_attr->subrgn_disable = 0x0;
+               rgn_attr->sp = (i == 3) ? 0xC : 0x0;
+               rgn_map->rgn_size = __builtin_ffs(region_size) - 2;
+               rgn_map->rgn_en = 0x1;
+       }
+}
+
+/*******************************************************************************
+ * Initialize the secure environment.
+ ******************************************************************************/
+void hikey_security_setup(void)
+{
+       sec_protect(DDR_SEC_BASE, DDR_SEC_SIZE);
+}
index 8da3998806c913b80c5a2740b5e7dbdfc220d942..b7fb6ddda12d776149a25319b1810b1f22b177ef 100644 (file)
@@ -65,6 +65,7 @@ BL2_SOURCES           +=      drivers/arm/sp804/sp804_delay_timer.c   \
                                drivers/synopsys/emmc/dw_mmc.c          \
                                plat/hisilicon/hikey/aarch64/hikey_helpers.S \
                                plat/hisilicon/hikey/hikey_bl2_setup.c  \
+                               plat/hisilicon/hikey/hikey_security.c   \
                                plat/hisilicon/hikey/hikey_ddr.c        \
                                plat/hisilicon/hikey/hikey_io_storage.c \
                                plat/hisilicon/hikey/hisi_dvfs.c        \