diff options
author | Leo Chen <leochen@broadcom.com> | 2009-08-07 15:10:24 -0400 |
---|---|---|
committer | Russell King <rmk+kernel@arm.linux.org.uk> | 2009-08-15 11:01:49 -0400 |
commit | a364143127a3155153f3e93d47cfc0f99a6f1858 (patch) | |
tree | eb04619f053a6b796beb153a7566aa666fa55a47 /arch/arm/mach-bcmring | |
parent | 7ba09020287fa6c181707490ea7143abb3db55b1 (diff) |
ARM: 5661/1: bcmring: add csp security hardware headers
add csp security hardware headers
Signed-off-by: Leo Chen <leochen@broadcom.com>
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
Diffstat (limited to 'arch/arm/mach-bcmring')
-rw-r--r-- | arch/arm/mach-bcmring/include/csp/secHw.h | 65 | ||||
-rw-r--r-- | arch/arm/mach-bcmring/include/mach/csp/secHw_def.h | 100 | ||||
-rw-r--r-- | arch/arm/mach-bcmring/include/mach/csp/secHw_inline.h | 79 |
3 files changed, 244 insertions, 0 deletions
diff --git a/arch/arm/mach-bcmring/include/csp/secHw.h b/arch/arm/mach-bcmring/include/csp/secHw.h new file mode 100644 index 000000000000..b9d7e0732dfc --- /dev/null +++ b/arch/arm/mach-bcmring/include/csp/secHw.h | |||
@@ -0,0 +1,65 @@ | |||
1 | /***************************************************************************** | ||
2 | * Copyright 2004 - 2008 Broadcom Corporation. All rights reserved. | ||
3 | * | ||
4 | * Unless you and Broadcom execute a separate written software license | ||
5 | * agreement governing use of this software, this software is licensed to you | ||
6 | * under the terms of the GNU General Public License version 2, available at | ||
7 | * http://www.broadcom.com/licenses/GPLv2.php (the "GPL"). | ||
8 | * | ||
9 | * Notwithstanding the above, under no circumstances may you combine this | ||
10 | * software in any way with any other Broadcom software provided under a | ||
11 | * license other than the GPL, without Broadcom's express prior written | ||
12 | * consent. | ||
13 | *****************************************************************************/ | ||
14 | |||
15 | /****************************************************************************/ | ||
16 | /** | ||
17 | * @file secHw.h | ||
18 | * | ||
19 | * @brief Definitions for accessing low level security features | ||
20 | * | ||
21 | */ | ||
22 | /****************************************************************************/ | ||
23 | #ifndef SECHW_H | ||
24 | #define SECHW_H | ||
25 | |||
26 | typedef void (*secHw_FUNC_t) (void); | ||
27 | |||
28 | typedef enum { | ||
29 | secHw_MODE_SECURE = 0x0, /* Switches processor into secure mode */ | ||
30 | secHw_MODE_NONSECURE = 0x1 /* Switches processor into non-secure mode */ | ||
31 | } secHw_MODE; | ||
32 | |||
33 | /****************************************************************************/ | ||
34 | /** | ||
35 | * @brief Requesting to execute the function in secure mode | ||
36 | * | ||
37 | * This function requests the given function to run in secure mode | ||
38 | * | ||
39 | */ | ||
40 | /****************************************************************************/ | ||
41 | void secHw_RunSecure(secHw_FUNC_t /* Function to run in secure mode */ | ||
42 | ); | ||
43 | |||
44 | /****************************************************************************/ | ||
45 | /** | ||
46 | * @brief Sets the mode | ||
47 | * | ||
48 | * his function sets the processor mode (secure/non-secure) | ||
49 | * | ||
50 | */ | ||
51 | /****************************************************************************/ | ||
52 | void secHw_SetMode(secHw_MODE /* Processor mode */ | ||
53 | ); | ||
54 | |||
55 | /****************************************************************************/ | ||
56 | /** | ||
57 | * @brief Get the current mode | ||
58 | * | ||
59 | * This function retieves the processor mode (secure/non-secure) | ||
60 | * | ||
61 | */ | ||
62 | /****************************************************************************/ | ||
63 | void secHw_GetMode(secHw_MODE *); | ||
64 | |||
65 | #endif /* SECHW_H */ | ||
diff --git a/arch/arm/mach-bcmring/include/mach/csp/secHw_def.h b/arch/arm/mach-bcmring/include/mach/csp/secHw_def.h new file mode 100644 index 000000000000..d15f5f3ec2d8 --- /dev/null +++ b/arch/arm/mach-bcmring/include/mach/csp/secHw_def.h | |||
@@ -0,0 +1,100 @@ | |||
1 | /***************************************************************************** | ||
2 | * Copyright 2003 - 2008 Broadcom Corporation. All rights reserved. | ||
3 | * | ||
4 | * Unless you and Broadcom execute a separate written software license | ||
5 | * agreement governing use of this software, this software is licensed to you | ||
6 | * under the terms of the GNU General Public License version 2, available at | ||
7 | * http://www.broadcom.com/licenses/GPLv2.php (the "GPL"). | ||
8 | * | ||
9 | * Notwithstanding the above, under no circumstances may you combine this | ||
10 | * software in any way with any other Broadcom software provided under a | ||
11 | * license other than the GPL, without Broadcom's express prior written | ||
12 | * consent. | ||
13 | *****************************************************************************/ | ||
14 | |||
15 | /****************************************************************************/ | ||
16 | /** | ||
17 | * @file secHw_def.h | ||
18 | * | ||
19 | * @brief Definitions for configuring/testing secure blocks | ||
20 | * | ||
21 | * @note | ||
22 | * None | ||
23 | */ | ||
24 | /****************************************************************************/ | ||
25 | |||
26 | #ifndef SECHW_DEF_H | ||
27 | #define SECHW_DEF_H | ||
28 | |||
29 | #include <mach/csp/mm_io.h> | ||
30 | |||
31 | /* Bit mask for various secure device */ | ||
32 | #define secHw_BLK_MASK_CHIP_CONTROL 0x00000001 | ||
33 | #define secHw_BLK_MASK_KEY_SCAN 0x00000002 | ||
34 | #define secHw_BLK_MASK_TOUCH_SCREEN 0x00000004 | ||
35 | #define secHw_BLK_MASK_UART0 0x00000008 | ||
36 | #define secHw_BLK_MASK_UART1 0x00000010 | ||
37 | #define secHw_BLK_MASK_WATCHDOG 0x00000020 | ||
38 | #define secHw_BLK_MASK_SPUM 0x00000040 | ||
39 | #define secHw_BLK_MASK_DDR2 0x00000080 | ||
40 | #define secHw_BLK_MASK_EXT_MEM 0x00000100 | ||
41 | #define secHw_BLK_MASK_ESW 0x00000200 | ||
42 | #define secHw_BLK_MASK_SPU 0x00010000 | ||
43 | #define secHw_BLK_MASK_PKA 0x00020000 | ||
44 | #define secHw_BLK_MASK_RNG 0x00040000 | ||
45 | #define secHw_BLK_MASK_RTC 0x00080000 | ||
46 | #define secHw_BLK_MASK_OTP 0x00100000 | ||
47 | #define secHw_BLK_MASK_BOOT 0x00200000 | ||
48 | #define secHw_BLK_MASK_MPU 0x00400000 | ||
49 | #define secHw_BLK_MASK_TZCTRL 0x00800000 | ||
50 | #define secHw_BLK_MASK_INTR 0x01000000 | ||
51 | |||
52 | /* Trustzone register set */ | ||
53 | typedef struct { | ||
54 | volatile uint32_t status; /* read only - reflects status of writes of 2 write registers */ | ||
55 | volatile uint32_t setUnsecure; /* write only. reads back as 0 */ | ||
56 | volatile uint32_t setSecure; /* write only. reads back as 0 */ | ||
57 | } secHw_TZREG_t; | ||
58 | |||
59 | /* There are 2 register sets. The first is for the lower 16 bits, the 2nd */ | ||
60 | /* is for the higher 16 bits. */ | ||
61 | |||
62 | typedef enum { | ||
63 | secHw_IDX_LS = 0, | ||
64 | secHw_IDX_MS = 1, | ||
65 | secHw_IDX_NUM | ||
66 | } secHw_IDX_e; | ||
67 | |||
68 | typedef struct { | ||
69 | volatile secHw_TZREG_t reg[secHw_IDX_NUM]; | ||
70 | } secHw_REGS_t; | ||
71 | |||
72 | /****************************************************************************/ | ||
73 | /** | ||
74 | * @brief Configures a device as a secure device | ||
75 | * | ||
76 | */ | ||
77 | /****************************************************************************/ | ||
78 | static inline void secHw_setSecure(uint32_t mask /* mask of type secHw_BLK_MASK_XXXXXX */ | ||
79 | ); | ||
80 | |||
81 | /****************************************************************************/ | ||
82 | /** | ||
83 | * @brief Configures a device as a non-secure device | ||
84 | * | ||
85 | */ | ||
86 | /****************************************************************************/ | ||
87 | static inline void secHw_setUnsecure(uint32_t mask /* mask of type secHw_BLK_MASK_XXXXXX */ | ||
88 | ); | ||
89 | |||
90 | /****************************************************************************/ | ||
91 | /** | ||
92 | * @brief Get the trustzone status for all components. 1 = non-secure, 0 = secure | ||
93 | * | ||
94 | */ | ||
95 | /****************************************************************************/ | ||
96 | static inline uint32_t secHw_getStatus(void); | ||
97 | |||
98 | #include <mach/csp/secHw_inline.h> | ||
99 | |||
100 | #endif /* SECHW_DEF_H */ | ||
diff --git a/arch/arm/mach-bcmring/include/mach/csp/secHw_inline.h b/arch/arm/mach-bcmring/include/mach/csp/secHw_inline.h new file mode 100644 index 000000000000..9cd6a032ab71 --- /dev/null +++ b/arch/arm/mach-bcmring/include/mach/csp/secHw_inline.h | |||
@@ -0,0 +1,79 @@ | |||
1 | /***************************************************************************** | ||
2 | * Copyright 2003 - 2008 Broadcom Corporation. All rights reserved. | ||
3 | * | ||
4 | * Unless you and Broadcom execute a separate written software license | ||
5 | * agreement governing use of this software, this software is licensed to you | ||
6 | * under the terms of the GNU General Public License version 2, available at | ||
7 | * http://www.broadcom.com/licenses/GPLv2.php (the "GPL"). | ||
8 | * | ||
9 | * Notwithstanding the above, under no circumstances may you combine this | ||
10 | * software in any way with any other Broadcom software provided under a | ||
11 | * license other than the GPL, without Broadcom's express prior written | ||
12 | * consent. | ||
13 | *****************************************************************************/ | ||
14 | |||
15 | /****************************************************************************/ | ||
16 | /** | ||
17 | * @file secHw_inline.h | ||
18 | * | ||
19 | * @brief Definitions for configuring/testing secure blocks | ||
20 | * | ||
21 | * @note | ||
22 | * None | ||
23 | */ | ||
24 | /****************************************************************************/ | ||
25 | |||
26 | #ifndef SECHW_INLINE_H | ||
27 | #define SECHW_INLINE_H | ||
28 | |||
29 | /****************************************************************************/ | ||
30 | /** | ||
31 | * @brief Configures a device as a secure device | ||
32 | * | ||
33 | */ | ||
34 | /****************************************************************************/ | ||
35 | static inline void secHw_setSecure(uint32_t mask /* mask of type secHw_BLK_MASK_XXXXXX */ | ||
36 | ) { | ||
37 | secHw_REGS_t *regp = (secHw_REGS_t *) MM_IO_BASE_TZPC; | ||
38 | |||
39 | if (mask & 0x0000FFFF) { | ||
40 | regp->reg[secHw_IDX_LS].setSecure = mask & 0x0000FFFF; | ||
41 | } | ||
42 | |||
43 | if (mask & 0xFFFF0000) { | ||
44 | regp->reg[secHw_IDX_MS].setSecure = mask >> 16; | ||
45 | } | ||
46 | } | ||
47 | |||
48 | /****************************************************************************/ | ||
49 | /** | ||
50 | * @brief Configures a device as a non-secure device | ||
51 | * | ||
52 | */ | ||
53 | /****************************************************************************/ | ||
54 | static inline void secHw_setUnsecure(uint32_t mask /* mask of type secHw_BLK_MASK_XXXXXX */ | ||
55 | ) { | ||
56 | secHw_REGS_t *regp = (secHw_REGS_t *) MM_IO_BASE_TZPC; | ||
57 | |||
58 | if (mask & 0x0000FFFF) { | ||
59 | regp->reg[secHw_IDX_LS].setUnsecure = mask & 0x0000FFFF; | ||
60 | } | ||
61 | if (mask & 0xFFFF0000) { | ||
62 | regp->reg[secHw_IDX_MS].setUnsecure = mask >> 16; | ||
63 | } | ||
64 | } | ||
65 | |||
66 | /****************************************************************************/ | ||
67 | /** | ||
68 | * @brief Get the trustzone status for all components. 1 = non-secure, 0 = secure | ||
69 | * | ||
70 | */ | ||
71 | /****************************************************************************/ | ||
72 | static inline uint32_t secHw_getStatus(void) | ||
73 | { | ||
74 | secHw_REGS_t *regp = (secHw_REGS_t *) MM_IO_BASE_TZPC; | ||
75 | |||
76 | return (regp->reg[1].status << 16) + regp->reg[0].status; | ||
77 | } | ||
78 | |||
79 | #endif /* SECHW_INLINE_H */ | ||