Add a helper function which can be used by the board code to setup an early non-secure TZASC region1 which covers the whole SDRAM size.
This eliminates the current workaround of configuring region0 as non-secure/secure region. tzasc.c can now be used for i.MX6 as well, so expand ARCH_IMX_TZASC accordingly. Acked-by: Ahmad Fatoum <a.fat...@pengutronix.de> Signed-off-by: Marco Felsch <m.fel...@pengutronix.de> Signed-off-by: Sascha Hauer <s.ha...@pengutronix.de> --- arch/arm/mach-imx/Kconfig | 2 +- arch/arm/mach-imx/tzasc.c | 53 +++++++++++++++++++++++++++++++++++++++++++++++ include/mach/imx/tzasc.h | 2 ++ 3 files changed, 56 insertions(+), 1 deletion(-) diff --git a/arch/arm/mach-imx/Kconfig b/arch/arm/mach-imx/Kconfig index 34c8a077d32d0b87d0b804fd36c6a1693f0071a9..bb6bad169831b03879527ef9f676ff99b955a6fd 100644 --- a/arch/arm/mach-imx/Kconfig +++ b/arch/arm/mach-imx/Kconfig @@ -48,7 +48,7 @@ config ARCH_IMX_SCRATCHMEM config ARCH_IMX_TZASC bool - depends on ARCH_IMX8M + depends on ARCH_IMX6 || ARCH_IMX8M default y if PBL_OPTEE # diff --git a/arch/arm/mach-imx/tzasc.c b/arch/arm/mach-imx/tzasc.c index 2a48f841af49d3f14bc017950d2553f7f52b7416..169c4b9801e5fdd01edd3c5661418a945cf21c55 100644 --- a/arch/arm/mach-imx/tzasc.c +++ b/arch/arm/mach-imx/tzasc.c @@ -3,8 +3,10 @@ #define pr_fmt(fmt) "tzc380: " fmt #include <common.h> +#include <mach/imx/esdctl.h> #include <mach/imx/generic.h> #include <mach/imx/tzasc.h> +#include <mach/imx/imx6-regs.h> #include <linux/bitfield.h> #include <linux/bitops.h> #include <linux/log2.h> @@ -71,6 +73,9 @@ * SoC specific defines ******************************************************************************/ +#define MX6_TZASC1_BASE 0x21d0000 +#define MX6_TZASC2_BASE 0x21d4000 + #define GPR_TZASC_EN BIT(0) #define GPR_TZASC_ID_SWAP_BYPASS BIT(1) #define GPR_TZASC_EN_LOCK BIT(16) @@ -250,6 +255,54 @@ tzc380_auto_configure(struct tzc380_instance *tzc380, unsigned int region, * SoC specific helpers ******************************************************************************/ +static void imx_tzc380_init_and_setup(void __iomem *base, unsigned int region, + resource_size_t region_base, + resource_size_t region_size, + unsigned int region_attr) +{ + struct tzc380_instance *tzasc = tzc380_init(base); + + tzc380_auto_configure(tzasc, region, region_base, region_size, + region_attr); +} + +/* + * imx6q_tzc380_early_ns_region1 - configure the whole DRAM as non-secure + * region1 + * + * Passing data between TEE and barebox need to follow some requirements: + * - the location can be accessed by the normal and secure world + * - the mapping in the normal and secure world must be the same to avoid + * manual cache maintenance. + * + * Therefore this function reads the DRAM size out of the MMDC controller and + * configures the whole size as non-secure TZC380 region1. This allows the + * early TEE code to map the location as non-secure to while writing the data + * e.g. device-tee-overlays. Later on the TEE may reconfigure and lock the + * TZC380 regions. The reconfiguration needs to ensure that the exchange data + * location is still accessible by the normal world. + */ +void imx6q_tzc380_early_ns_region1(void) +{ + resource_size_t ram_sz = imx6_get_mmdc_sdram_size(); + + imx_tzc380_init_and_setup(IOMEM(MX6_TZASC1_BASE), 1, + MX6_MMDC_PORT01_BASE_ADDR, ram_sz, + TZC380_REGION_SP_NS_RW); + imx_tzc380_init_and_setup(IOMEM(MX6_TZASC2_BASE), 1, + MX6_MMDC_PORT01_BASE_ADDR, ram_sz, + TZC380_REGION_SP_NS_RW); +} + +void imx6ul_tzc380_early_ns_region1(void) +{ + resource_size_t ram_sz = imx6_get_mmdc_sdram_size(); + + imx_tzc380_init_and_setup(IOMEM(MX6_TZASC1_BASE), 1, + MX6_MMDC_PORT0_BASE_ADDR, ram_sz, + TZC380_REGION_SP_NS_RW); +} + void imx8m_tzc380_init(void) { u32 __iomem *gpr = IOMEM(MX8M_IOMUXC_GPR_BASE_ADDR); diff --git a/include/mach/imx/tzasc.h b/include/mach/imx/tzasc.h index 51c86f168ee41db8659c0ad5f48ca1f102cb76d3..eb479ad55c9c101a5fb47fc4a7178b3669b9e44f 100644 --- a/include/mach/imx/tzasc.h +++ b/include/mach/imx/tzasc.h @@ -6,6 +6,8 @@ #include <linux/types.h> #include <asm/system.h> +void imx6q_tzc380_early_ns_region1(void); +void imx6ul_tzc380_early_ns_region1(void); void imx8m_tzc380_init(void); bool imx8m_tzc380_is_enabled(void); -- 2.39.5