1 /*
2 * Copyright (c) 2020-2021, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7 #include <common/debug.h>
8 #include <plat/arm/common/plat_arm.h>
9 #include <platform_def.h>
10
11 #define RDN2_TZC_CPER_REGION \
12 {CSS_SGI_SP_CPER_BUF_BASE, (CSS_SGI_SP_CPER_BUF_BASE + \
13 CSS_SGI_SP_CPER_BUF_SIZE) - 1, TZC_REGION_S_NONE, \
14 PLAT_ARM_TZC_NS_DEV_ACCESS}
15
16 static const arm_tzc_regions_info_t tzc_regions[] = {
17 ARM_TZC_REGIONS_DEF,
18 #if ENABLE_FEAT_RAS && FFH_SUPPORT
19 RDN2_TZC_CPER_REGION,
20 #endif
21 {}
22 };
23
24 #if (CSS_SGI_PLATFORM_VARIANT == 2 && CSS_SGI_CHIP_COUNT > 1)
25 static const arm_tzc_regions_info_t tzc_regions_mc[][CSS_SGI_CHIP_COUNT - 1] = {
26 {
27 /* TZC memory regions for second chip */
28 SGI_PLAT_TZC_NS_REMOTE_REGIONS_DEF(1),
29 {}
30 },
31 #if CSS_SGI_CHIP_COUNT > 2
32 {
33 /* TZC memory regions for third chip */
34 SGI_PLAT_TZC_NS_REMOTE_REGIONS_DEF(2),
35 {}
36 },
37 #endif
38 #if CSS_SGI_CHIP_COUNT > 3
39 {
40 /* TZC memory regions for fourth chip */
41 SGI_PLAT_TZC_NS_REMOTE_REGIONS_DEF(3),
42 {}
43 },
44 #endif
45 };
46 #endif /* CSS_SGI_PLATFORM_VARIANT && CSS_SGI_CHIP_COUNT */
47
48 /* Initialize the secure environment */
plat_arm_security_setup(void)49 void plat_arm_security_setup(void)
50 {
51 unsigned int i;
52
53 INFO("Configuring TrustZone Controller for Chip 0\n");
54
55 for (i = 0; i < TZC400_COUNT; i++) {
56 arm_tzc400_setup(TZC400_BASE(i), tzc_regions);
57 }
58
59 #if (CSS_SGI_PLATFORM_VARIANT == 2 && CSS_SGI_CHIP_COUNT > 1)
60 unsigned int j;
61
62 for (i = 1; i < CSS_SGI_CHIP_COUNT; i++) {
63 INFO("Configuring TrustZone Controller for Chip %u\n", i);
64
65 for (j = 0; j < TZC400_COUNT; j++) {
66 arm_tzc400_setup(CSS_SGI_REMOTE_CHIP_MEM_OFFSET(i)
67 + TZC400_BASE(j), tzc_regions_mc[i-1]);
68 }
69 }
70 #endif
71 }
72