All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: u-boot@lists.denx.de
Subject: [U-Boot] [PATCH v5 13/14] tegra124: Reserve secure RAM using MC_SECURITY_CFG{0, 1}_0
Date: Mon,  9 Mar 2015 08:00:23 +0100	[thread overview]
Message-ID: <1752b259f9d7005d10aea8211afc12d0b70a3188.1425884424.git.jan.kiszka@siemens.com> (raw)
In-Reply-To: <cover.1425884424.git.jan.kiszka@siemens.com>

From: Ian Campbell <ijc@hellion.org.uk>

These registers can be used to prevent non-secure world from accessing a
megabyte aligned region of RAM, use them to protect the u-boot secure monitor
code.

At first I tried to do this from s_init(), however this inexplicably causes
u-boot's networking (e.g. DHCP) to fail, while networking under Linux was fine.

So instead I have added a new weak arch function protect_secure_section()
called from relocate_secure_section() and reserved the region there. This is
better overall since it defers the reservation until after the sec vs. non-sec
decision (which can be influenced by an envvar) has been made when booting the
os.

Signed-off-by: Ian Campbell <ijc@hellion.org.uk>
[Jan: tiny style adjustment]
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
---
 arch/arm/cpu/armv7/virt-v7.c  |  5 +++++
 arch/arm/include/asm/system.h |  1 +
 arch/arm/mach-tegra/ap.c      | 15 +++++++++++++++
 3 files changed, 21 insertions(+)

diff --git a/arch/arm/cpu/armv7/virt-v7.c b/arch/arm/cpu/armv7/virt-v7.c
index b69fd37..eb6195c 100644
--- a/arch/arm/cpu/armv7/virt-v7.c
+++ b/arch/arm/cpu/armv7/virt-v7.c
@@ -46,6 +46,10 @@ static unsigned long get_gicd_base_address(void)
 #endif
 }
 
+/* Define a specific version of this function to enable any available
+ * hardware protections for the reserved region */
+void __weak protect_secure_section(void) {}
+
 static void relocate_secure_section(void)
 {
 #ifdef CONFIG_ARMV7_SECURE_BASE
@@ -54,6 +58,7 @@ static void relocate_secure_section(void)
 	memcpy((void *)CONFIG_ARMV7_SECURE_BASE, __secure_start, sz);
 	flush_dcache_range(CONFIG_ARMV7_SECURE_BASE,
 			   CONFIG_ARMV7_SECURE_BASE + sz + 1);
+	protect_secure_section();
 	invalidate_icache_all();
 #endif
 }
diff --git a/arch/arm/include/asm/system.h b/arch/arm/include/asm/system.h
index 2a5bed2..d6dfddd 100644
--- a/arch/arm/include/asm/system.h
+++ b/arch/arm/include/asm/system.h
@@ -77,6 +77,7 @@ void armv8_switch_to_el1(void);
 void gic_init(void);
 void gic_send_sgi(unsigned long sgino);
 void wait_for_wakeup(void);
+void protect_secure_region(void);
 void smp_kick_all_cpus(void);
 
 void flush_l3_cache(void);
diff --git a/arch/arm/mach-tegra/ap.c b/arch/arm/mach-tegra/ap.c
index a17dfd1..869a2ed 100644
--- a/arch/arm/mach-tegra/ap.c
+++ b/arch/arm/mach-tegra/ap.c
@@ -10,6 +10,7 @@
 #include <common.h>
 #include <asm/io.h>
 #include <asm/arch/gp_padctrl.h>
+#include <asm/arch/mc.h>
 #include <asm/arch-tegra/ap.h>
 #include <asm/arch-tegra/clock.h>
 #include <asm/arch-tegra/fuse.h>
@@ -154,6 +155,20 @@ static void init_pmc_scratch(void)
 	writel(odmdata, &pmc->pmc_scratch20);
 }
 
+#ifdef CONFIG_ARMV7_SECURE_RESERVE_SIZE
+void protect_secure_section(void)
+{
+	struct mc_ctlr *mc = (struct mc_ctlr *)NV_PA_MC_BASE;
+
+	/* Must be MB aligned */
+	BUILD_BUG_ON(CONFIG_ARMV7_SECURE_BASE & 0xFFFFF);
+	BUILD_BUG_ON(CONFIG_ARMV7_SECURE_RESERVE_SIZE & 0xFFFFF);
+
+	writel(CONFIG_ARMV7_SECURE_BASE, &mc->mc_security_cfg0);
+	writel(CONFIG_ARMV7_SECURE_RESERVE_SIZE >> 20, &mc->mc_security_cfg1);
+}
+#endif
+
 void s_init(void)
 {
 	/* Init PMC scratch memory */
-- 
2.1.4

  parent reply	other threads:[~2015-03-09  7:00 UTC|newest]

Thread overview: 59+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-03-09  7:00 [U-Boot] [PATCH v5 00/14] Add PSCI support for Jetson TK1/Tegra124 + CNTFRQ fix Jan Kiszka
2015-03-09  7:00 ` [U-Boot] [PATCH v5 01/14] sun7i: Remove duplicate call to psci_arch_init Jan Kiszka
2015-03-11 15:11   ` Tom Rini
2015-03-12  7:34     ` Jan Kiszka
2015-03-12 12:28       ` Tom Rini
2015-03-12 13:44         ` Jan Kiszka
2015-03-21 13:34     ` Hans de Goede
2015-03-09  7:00 ` [U-Boot] [PATCH v5 02/14] ARM: Factor out common psci_get_cpu_id Jan Kiszka
2015-03-11 15:11   ` Tom Rini
2015-03-18 16:54   ` Ian Campbell
2015-03-19  7:52     ` Jan Kiszka
2015-03-09  7:00 ` [U-Boot] [PATCH v5 03/14] ARM: Factor out reusable psci_cpu_off_common Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 04/14] ARM: Factor out reusable psci_cpu_entry Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 05/14] ARM: Factor out reusable psci_get_cpu_stack_top Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 06/14] ARM: Put target PC for PSCI CPU_ON on per-CPU stack Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 07/14] tegra124: Add more registers to struct mc_ctlr Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 08/14] virt-dt: Allow reservation of secure region when in a RAM carveout Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-12  7:34     ` Jan Kiszka
2015-03-12  8:18     ` Thierry Reding
2015-03-12 12:30       ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 09/14] tegra: Make tegra_powergate_power_on public Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 10/14] tegra: Add ap_pm_init hook Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 11/14] tegra124: Add PSCI support for Tegra124 Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 12/14] jetson-tk1: Add PSCI configuration options and reserve secure code Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` Jan Kiszka [this message]
2015-03-11 15:12   ` [U-Boot] [PATCH v5 13/14] tegra124: Reserve secure RAM using MC_SECURITY_CFG{0, 1}_0 Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 14/14] tegra: Set CNTFRQ for secondary CPUs Jan Kiszka
2015-03-11 15:13   ` Tom Rini
2015-03-11  8:56 ` [U-Boot] [PATCH v5 00/14] Add PSCI support for Jetson TK1/Tegra124 + CNTFRQ fix Ian Campbell
2015-03-12  7:55   ` Ian Campbell
2015-03-11 15:11 ` Tom Rini
2015-03-18  6:40   ` Jan Kiszka
2015-03-18 16:02     ` Tom Warren
2015-03-18 16:54   ` Ian Campbell
2015-03-19  7:52     ` Jan Kiszka
2015-03-19 15:02 ` Thierry Reding
2015-04-08  8:37   ` Jan Kiszka
2015-04-08 13:43     ` Tom Rini
2015-04-08 13:55       ` Jan Kiszka
2015-04-08 14:02         ` Tom Rini
2015-04-08 14:12           ` Jan Kiszka
2015-04-08 15:54             ` Tom Rini
2015-04-08 16:13               ` Jan Kiszka
2015-04-08 16:22                 ` Tom Rini
2015-04-10  6:59     ` Thierry Reding
2015-04-10  7:07       ` Jan Kiszka
2015-04-10  9:54         ` Thierry Reding
2015-04-10 10:19           ` Jan Kiszka
2015-04-10 10:22             ` Thierry Reding

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1752b259f9d7005d10aea8211afc12d0b70a3188.1425884424.git.jan.kiszka@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.