Add ARM CoreLink DMC-500 driver to program TrustZone protection
authorVikram Kanigiri <vikram.kanigiri@arm.com>
Fri, 29 Jan 2016 11:37:04 +0000 (11:37 +0000)
committerSoby Mathew <soby.mathew@arm.com>
Thu, 31 Mar 2016 20:23:24 +0000 (21:23 +0100)
The ARM CoreLink DMC-500 Dynamic Memory Controller provides the
programmable address region control of a TrustZone Address Space
Controller. The access permissions can be defined for eight
separate address regions plus a background or default region.
This patch adds a DMC-500 driver to define address regions and
program their access permissions as per ARM 100131_0000_02_en
(r0p0) document.

Change-Id: I9d33120f9480d742bcf7937e4b876f9d40c727e6

drivers/arm/tzc/tzc_dmc500.c [new file with mode: 0644]
include/drivers/arm/tzc_dmc500.h [new file with mode: 0644]

diff --git a/drivers/arm/tzc/tzc_dmc500.c b/drivers/arm/tzc/tzc_dmc500.c
new file mode 100644 (file)
index 0000000..16a53a4
--- /dev/null
@@ -0,0 +1,299 @@
+/*
+ * Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * Redistributions of source code must retain the above copyright notice, this
+ * list of conditions and the following disclaimer.
+ *
+ * Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * Neither the name of ARM nor the names of its contributors may be used
+ * to endorse or promote products derived from this software without specific
+ * prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <assert.h>
+#include <debug.h>
+#include <mmio.h>
+#include <tzc_dmc500.h>
+#include "tzc_common.h"
+#include "tzc_common_private.c"
+
+/*
+ * Macros which will be used by common core functions.
+ */
+#define TZC_DMC500_REGION_BASE_LOW_0_OFFSET            0x054
+#define TZC_DMC500_REGION_BASE_HIGH_0_OFFSET           0x058
+#define TZC_DMC500_REGION_TOP_LOW_0_OFFSET             0x05C
+#define TZC_DMC500_REGION_TOP_HIGH_0_OFFSET            0x060
+#define TZC_DMC500_REGION_ATTR_0_OFFSET                        0x064
+#define TZC_DMC500_REGION_ID_ACCESS_0_OFFSET           0x068
+
+#define TZC_DMC500_ACTION_OFF                          0x50
+
+/* Pointer to the tzc_dmc500_driver_data structure populated by the platform */
+static const tzc_dmc500_driver_data_t *g_driver_data;
+
+#define verify_region_attr(region, attr)       \
+               ((g_conf_regions[(region)].sec_attr ==                  \
+                       ((attr) >> TZC_REGION_ATTR_SEC_SHIFT))          \
+               && ((attr) & (0x1 << TZC_REGION_ATTR_F_EN_SHIFT)))
+
+/*
+ * Structure for configured regions attributes in DMC500.
+ */
+typedef struct tzc_dmc500_regions {
+       tzc_region_attributes_t sec_attr;
+       int is_enabled;
+} tzc_dmc500_regions_t;
+
+/*
+ * Array storing the attributes of the configured regions. This array
+ * will be used by the `tzc_dmc500_verify_complete` to verify the flush
+ * completion.
+ */
+static tzc_dmc500_regions_t g_conf_regions[MAX_REGION_VAL + 1];
+
+/* Helper Macros for making the code readable */
+#define DMC_INST_BASE_ADDR(instance) (g_driver_data->dmc_base[instance])
+#define DMC_INST_SI_BASE(instance, interface) \
+               (DMC_INST_BASE_ADDR(instance) + IFACE_OFFSET(interface))
+
+DEFINE_TZC_COMMON_WRITE_ACTION(_dmc500, DMC500)
+DEFINE_TZC_COMMON_WRITE_REGION_BASE(_dmc500, DMC500)
+DEFINE_TZC_COMMON_WRITE_REGION_TOP(_dmc500, DMC500)
+DEFINE_TZC_COMMON_WRITE_REGION_ATTRIBUTES(_dmc500, DMC500)
+DEFINE_TZC_COMMON_WRITE_REGION_ID_ACCESS(_dmc500, DMC500)
+
+DEFINE_TZC_COMMON_CONFIGURE_REGION0(_dmc500)
+DEFINE_TZC_COMMON_CONFIGURE_REGION(_dmc500)
+
+static inline unsigned int _tzc_dmc500_read_region_attr_0(
+                                       uintptr_t dmc_si_base,
+                                       int region_no)
+{
+       return mmio_read_32(dmc_si_base +
+                       TZC_REGION_OFFSET(TZC_DMC500_REGION_SIZE, region_no) +
+                       TZC_DMC500_REGION_ATTR_0_OFFSET);
+}
+
+static inline void _tzc_dmc500_write_flush_control(uintptr_t dmc_si_base)
+{
+       mmio_write_32(dmc_si_base + SI_FLUSH_CTRL_OFFSET, 1);
+}
+
+/*
+ * Sets the Flush controls for all the DMC Instances and System Interfaces.
+ * This initiates the flush of configuration settings from the shadow
+ * registers to the actual configuration register. The caller should poll
+ * changed register to confirm update.
+ */
+void tzc_dmc500_config_complete(void)
+{
+       int dmc_inst, sys_if;
+
+       assert(g_driver_data);
+
+       for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
+               assert(DMC_INST_BASE_ADDR(dmc_inst));
+               for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++)
+                       _tzc_dmc500_write_flush_control(
+                                       DMC_INST_SI_BASE(dmc_inst, sys_if));
+       }
+}
+
+/*
+ * This function reads back the secure attributes from the configuration
+ * register for each DMC Instance and System Interface and compares it with
+ * the configured value. The successful verification of the region attributes
+ * confirms that the flush operation has completed.
+ * If the verification fails, the caller is expected to invoke this API again
+ * till it succeeds.
+ * Returns 0 on success and 1 on failure.
+ */
+int tzc_dmc500_verify_complete(void)
+{
+       int dmc_inst, sys_if, region_no;
+       unsigned int attr;
+
+       assert(g_driver_data);
+       /* Region 0 must be configured */
+       assert(g_conf_regions[0].is_enabled);
+
+       /* Iterate over all configured regions */
+       for (region_no = 0; region_no <= MAX_REGION_VAL; region_no++) {
+               if (!g_conf_regions[region_no].is_enabled)
+                       continue;
+               for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count;
+                                                               dmc_inst++) {
+                       assert(DMC_INST_BASE_ADDR(dmc_inst));
+                       for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT;
+                                                       sys_if++) {
+                               attr = _tzc_dmc500_read_region_attr_0(
+                                       DMC_INST_SI_BASE(dmc_inst, sys_if),
+                                       region_no);
+                               VERBOSE("Verifying DMC500 region:%d"
+                                       " dmc_inst:%d sys_if:%d attr:%x\n",
+                                       region_no, dmc_inst, sys_if, attr);
+                               if (!verify_region_attr(region_no, attr))
+                                       return 1;
+                       }
+               }
+       }
+
+       return 0;
+}
+
+/*
+ * `tzc_dmc500_configure_region0` is used to program region 0 in both the
+ * system interfaces of all the DMC-500 instances. Region 0 covers the whole
+ * address space that is not mapped to any other region for a system interface,
+ * and is always enabled; this cannot be changed. This function only changes
+ * the access permissions.
+ */
+void tzc_dmc500_configure_region0(tzc_region_attributes_t sec_attr,
+                                       unsigned int nsaid_permissions)
+{
+       int dmc_inst, sys_if;
+
+       /* Assert if DMC-500 is not initialized */
+       assert(g_driver_data);
+
+       /* Configure region_0 in all DMC instances */
+       for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
+               assert(DMC_INST_BASE_ADDR(dmc_inst));
+               for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++)
+                       _tzc_dmc500_configure_region0(
+                                       DMC_INST_SI_BASE(dmc_inst, sys_if),
+                                       sec_attr, nsaid_permissions);
+       }
+
+       g_conf_regions[0].sec_attr = sec_attr;
+       g_conf_regions[0].is_enabled = 1;
+}
+
+/*
+ * `tzc_dmc500_configure_region` is used to program a region into all system
+ * interfaces of all the DMC instances.
+ * NOTE:
+ * Region 0 is special; it is preferable to use tzc_dmc500_configure_region0
+ * for this region (see comment for that function).
+ */
+void tzc_dmc500_configure_region(int region_no,
+                       uintptr_t region_base,
+                       uintptr_t region_top,
+                       tzc_region_attributes_t sec_attr,
+                       unsigned int nsaid_permissions)
+{
+       int dmc_inst, sys_if;
+
+       assert(g_driver_data);
+       /* Do range checks on regions. */
+       assert(region_no >= 0 && region_no <= MAX_REGION_VAL);
+
+       /*
+        * Do address range check based on DMC-TZ configuration. A 43bit address
+        * is the max and expected case.
+        */
+       assert(((region_top <= (UINT64_MAX >> (64 - 43))) &&
+               (region_base < region_top)));
+
+       /* region_base and (region_top + 1) must be 4KB aligned */
+       assert(((region_base | (region_top + 1)) & (4096 - 1)) == 0);
+
+       for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
+               assert(DMC_INST_BASE_ADDR(dmc_inst));
+               for (sys_if = 0; sys_if < MAX_SYS_IF_COUNT; sys_if++)
+                       _tzc_dmc500_configure_region(
+                                       DMC_INST_SI_BASE(dmc_inst, sys_if),
+                                       TZC_DMC500_REGION_ATTR_F_EN_MASK,
+                                       region_no, region_base, region_top,
+                                       sec_attr, nsaid_permissions);
+       }
+
+       g_conf_regions[region_no].sec_attr = sec_attr;
+       g_conf_regions[region_no].is_enabled = 1;
+}
+
+/* Sets the action value for all the DMC instances */
+void tzc_dmc500_set_action(tzc_action_t action)
+{
+       int dmc_inst;
+
+       assert(g_driver_data);
+
+       for (dmc_inst = 0; dmc_inst < g_driver_data->dmc_count; dmc_inst++) {
+               assert(DMC_INST_BASE_ADDR(dmc_inst));
+               /*
+                * - Currently no handler is provided to trap an error via
+                *   interrupt or exception.
+                * - The interrupt action has not been tested.
+                */
+               _tzc_dmc500_write_action(DMC_INST_BASE_ADDR(dmc_inst), action);
+       }
+}
+
+/*
+ * A DMC-500 instance must be present at each base address provided by the
+ * platform. It also expects platform to pass at least one instance of
+ * DMC-500.
+ */
+static void validate_plat_driver_data(
+                       const tzc_dmc500_driver_data_t *plat_driver_data)
+{
+#if DEBUG
+       int i;
+       unsigned int dmc_id;
+       uintptr_t dmc_base;
+
+       assert(plat_driver_data);
+       assert(plat_driver_data->dmc_count > 0 &&
+               (plat_driver_data->dmc_count <= MAX_DMC_COUNT));
+
+       for (i = 0; i < plat_driver_data->dmc_count; i++) {
+               dmc_base = plat_driver_data->dmc_base[i];
+               assert(dmc_base);
+
+               dmc_id = _tzc_read_peripheral_id(dmc_base);
+               assert(dmc_id == DMC500_PERIPHERAL_ID);
+       }
+#endif /* DEBUG */
+}
+
+
+/*
+ * Initializes the base address and count of DMC instances.
+ *
+ * Note : Only pointer to plat_driver_data is saved, so it is caller's
+ * responsibility to keep it valid until the driver is used.
+ */
+void tzc_dmc500_driver_init(const tzc_dmc500_driver_data_t *plat_driver_data)
+{
+       /* Check valid pointer is passed */
+       assert(plat_driver_data);
+
+       /*
+        * NOTE: This driver expects the DMC-500 controller is already in
+        * READY state. Hence, it uses the reconfiguration method for
+        * programming TrustZone regions
+        */
+       /* Validates the information passed by platform */
+       validate_plat_driver_data(plat_driver_data);
+       g_driver_data = plat_driver_data;
+}
diff --git a/include/drivers/arm/tzc_dmc500.h b/include/drivers/arm/tzc_dmc500.h
new file mode 100644 (file)
index 0000000..70f8ad2
--- /dev/null
@@ -0,0 +1,174 @@
+/*
+ * Copyright (c) 2016, ARM Limited and Contributors. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * Redistributions of source code must retain the above copyright notice, this
+ * list of conditions and the following disclaimer.
+ *
+ * Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * Neither the name of ARM nor the names of its contributors may be used
+ * to endorse or promote products derived from this software without specific
+ * prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#ifndef __TZC_DMC500_H__
+#define __TZC_DMC500_H__
+
+#include <tzc_common.h>
+
+#define SI_STATUS_OFFSET                               0x000
+#define SI_STATE_CTRL_OFFSET                           0x030
+#define SI_FLUSH_CTRL_OFFSET                           0x034
+#define SI_INT_CONTROL_OFFSET                          0x048
+
+#define SI_INT_STATUS_OFFSET                           0x004
+#define SI_TZ_FAIL_ADDRESS_LOW_OFFSET                  0x008
+#define SI_TZ_FAIL_ADDRESS_HIGH_OFFSET                 0x00c
+#define SI_FAIL_CONTROL_OFFSET                         0x010
+#define SI_FAIL_ID_OFFSET                              0x014
+#define SI_INT_CLR_OFFSET                              0x04c
+
+/*
+ * DMC-500 has 2 system interfaces each having a similar set of regs
+ * to configure each interface.
+ */
+#define SI0_BASE                                       0x0000
+#define SI1_BASE                                       0x0200
+
+/* Bit positions of SIx_SI_STATUS */
+#define SI_EMPTY_SHIFT                                 0x01
+#define SI_STALL_ACK_SHIFT                             0x00
+#define SI_EMPTY_MASK                                  0x01
+#define SI_STALL_ACK_MASK                              0x01
+
+/* Bit positions of SIx_SI_INT_STATUS */
+#define PMU_REQ_INT_OVERFLOW_STATUS_SHIFT              18
+#define FAILED_ACCESS_INT_OVERFLOW_STATUS_SHIFT                16
+#define PMU_REQ_INT_STATUS_SHIFT                       2
+#define FAILED_ACCESS_INT_INFO_TZ_OVERLAP_STATUS_SHIFT 1
+#define FAILED_ACCESS_INT_STATUS_SHIFT                 0
+#define PMU_REQ_INT_OVERFLOW_STATUS_MASK               0x1
+#define FAILED_ACCESS_INT_OVERFLOW_STATUS_MASK         0x1
+#define PMU_REQ_INT_STATUS_MASK                                0x1
+#define FAILED_ACCESS_INT_INFO_TZ_OVERLAP_STATUS_MASK  0x1
+#define FAILED_ACCESS_INT_STATUS_MASK                  0x1
+
+/* Bit positions of SIx_TZ_FAIL_CONTROL */
+#define DIRECTION_SHIFT                                        24
+#define NON_SECURE_SHIFT                               21
+#define PRIVILEGED_SHIFT                               20
+#define FAILED_ACCESS_INT_INFO_RANK_MASKED_SHIFT       3
+#define FAILED_ACCESS_INT_INFO_UNMAPPED_SHIFT          2
+#define FAILED_ACCESS_INT_TZ_FAIL_SHIFT                        0x1
+#define FAILED_ACCESS_INT_INFO_OUTSIDE_DEFAULT_SHIFT   0
+#define DIRECTION_MASK                                 0x1
+#define NON_SECURE_MASK                                        0x1
+#define PRIVILEGED_MASK                                        0x1
+#define FAILED_ACCESS_INT_INFO_RANK_MASKED_MASK                0x1
+#define FAILED_ACCESS_INT_INFO_UNMAPPED_MASK           0x1
+#define FAILED_ACCESS_INT_TZ_FAIL_MASK                 1
+#define FAILED_ACCESS_INT_INFO_OUTSIDE_DEFAULT_MASK    0x1
+
+/* Bit positions of SIx_FAIL_STATUS */
+#define FAIL_ID_VNET_SHIFT                             24
+#define FAIL_ID_ID_SHIFT                               0
+#define FAIL_ID_VNET_MASK                              0xf
+#define FAIL_ID_ID_MASK                                        0xffffff
+
+/* Bit positions of SIx_SI_STATE_CONTRL */
+#define SI_STALL_REQ_GO                                        0x0
+#define SI_STALL_REQ_STALL                             0x1
+
+/* Bit positions of SIx_SI_FLUSH_CONTROL */
+#define SI_FLUSH_REQ_INACTIVE                          0x0
+#define SI_FLUSH_REQ_ACTIVE                            0x1
+#define SI_FLUSH_REQ_MASK                              0x1
+
+/* Bit positions of SIx_SI_INT_CONTROL */
+#define PMU_REQ_INT_EN_SHIFT                           2
+#define OVERLAP_DETECT_INT_EN_SHIFT                    1
+#define FAILED_ACCESS_INT_EN_SHIFT                     0
+#define PMU_REQ_INT_EN_MASK                            0x1
+#define OVERLAP_DETECT_INT_EN_MASK                     0x1
+#define FAILED_ACCESS_INT_EN_MASK                      0x1
+#define PMU_REQ_INT_EN                                 0x1
+#define OVERLAP_DETECT_INT_EN                          0x1
+#define FAILED_ACCESS_INT_EN                           0x1
+
+/* Bit positions of SIx_SI_INT_CLR */
+#define PMU_REQ_OFLOW_CLR_SHIFT                                18
+#define FAILED_ACCESS_OFLOW_CLR_SHIFT                  16
+#define PMU_REQ_INT_CLR_SHIFT                          2
+#define FAILED_ACCESS_INT_CLR_SHIFT                    0
+#define PMU_REQ_OFLOW_CLR_MASK                         0x1
+#define FAILED_ACCESS_OFLOW_CLR_MASK                   0x1
+#define PMU_REQ_INT_CLR_MASK                           0x1
+#define FAILED_ACCESS_INT_CLR_MASK                     0x1
+#define PMU_REQ_OFLOW_CLR                              0x1
+#define FAILED_ACCESS_OFLOW_CLR                                0x1
+#define PMU_REQ_INT_CLR                                        0x1
+#define FAILED_ACCESS_INT_CLR                          0x1
+
+/* Macro to get the correct base register for a system interface */
+#define IFACE_OFFSET(sys_if)   ((sys_if) ? SI1_BASE : SI0_BASE)
+
+#define MAX_SYS_IF_COUNT                               2
+#define MAX_REGION_VAL                                 8
+
+/* DMC-500 supports striping across a max of 4 DMC instances */
+#define MAX_DMC_COUNT                                  4
+
+/* Consist of part_number_1 and part_number_0 */
+#define DMC500_PERIPHERAL_ID                           0x0450
+
+/* Filter enable bits in a TZC */
+#define TZC_DMC500_REGION_ATTR_F_EN_MASK               0x1
+
+/* Length of registers for configuring each region */
+#define TZC_DMC500_REGION_SIZE                         0x018
+
+#ifndef __ASSEMBLY__
+
+#include <stdint.h>
+
+/*
+ * Contains the base addresses of all the DMC instances.
+ */
+typedef struct tzc_dmc500_driver_data {
+       uintptr_t dmc_base[MAX_DMC_COUNT];
+       int dmc_count;
+} tzc_dmc500_driver_data_t;
+
+void tzc_dmc500_driver_init(const tzc_dmc500_driver_data_t *plat_driver_data);
+void tzc_dmc500_configure_region0(tzc_region_attributes_t sec_attr,
+                               unsigned int nsaid_permissions);
+void tzc_dmc500_configure_region(int region_no,
+                               uintptr_t region_base,
+                               uintptr_t region_top,
+                               tzc_region_attributes_t sec_attr,
+                               unsigned int nsaid_permissions);
+void tzc_dmc500_set_action(tzc_action_t action);
+void tzc_dmc500_config_complete(void);
+int tzc_dmc500_verify_complete(void);
+
+
+#endif /* __ASSEMBLY__ */
+#endif /* __TZC_DMC500_H__ */
+