2 * ARM TrustZone peripheral protection controller emulation
4 * Copyright (c) 2018 Linaro Limited
5 * Written by Peter Maydell
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 or
9 * (at your option) any later version.
12 #include "qemu/osdep.h"
14 #include "qemu/module.h"
15 #include "qapi/error.h"
17 #include "hw/sysbus.h"
18 #include "migration/vmstate.h"
19 #include "hw/registerfields.h"
21 #include "hw/misc/tz-ppc.h"
22 #include "hw/qdev-properties.h"
24 static void tz_ppc_update_irq(TZPPC
*s
)
26 bool level
= s
->irq_status
&& s
->irq_enable
;
28 trace_tz_ppc_update_irq(level
);
29 qemu_set_irq(s
->irq
, level
);
32 static void tz_ppc_cfg_nonsec(void *opaque
, int n
, int level
)
34 TZPPC
*s
= TZ_PPC(opaque
);
36 assert(n
< TZ_NUM_PORTS
);
37 trace_tz_ppc_cfg_nonsec(n
, level
);
38 s
->cfg_nonsec
[n
] = level
;
41 static void tz_ppc_cfg_ap(void *opaque
, int n
, int level
)
43 TZPPC
*s
= TZ_PPC(opaque
);
45 assert(n
< TZ_NUM_PORTS
);
46 trace_tz_ppc_cfg_ap(n
, level
);
50 static void tz_ppc_cfg_sec_resp(void *opaque
, int n
, int level
)
52 TZPPC
*s
= TZ_PPC(opaque
);
54 trace_tz_ppc_cfg_sec_resp(level
);
55 s
->cfg_sec_resp
= level
;
58 static void tz_ppc_irq_enable(void *opaque
, int n
, int level
)
60 TZPPC
*s
= TZ_PPC(opaque
);
62 trace_tz_ppc_irq_enable(level
);
63 s
->irq_enable
= level
;
67 static void tz_ppc_irq_clear(void *opaque
, int n
, int level
)
69 TZPPC
*s
= TZ_PPC(opaque
);
71 trace_tz_ppc_irq_clear(level
);
75 s
->irq_status
= false;
80 static bool tz_ppc_check(TZPPC
*s
, int n
, MemTxAttrs attrs
)
82 /* Check whether to allow an access to port n; return true if
83 * the check passes, and false if the transaction must be blocked.
84 * If the latter, the caller must check cfg_sec_resp to determine
85 * whether to abort or RAZ/WI the transaction.
87 * + nonsec_mask suppresses any check of the secure attribute
88 * + otherwise, block if cfg_nonsec is 1 and transaction is secure,
89 * or if cfg_nonsec is 0 and transaction is non-secure
90 * + block if transaction is usermode and cfg_ap is 0
92 if ((attrs
.secure
== s
->cfg_nonsec
[n
] && !(s
->nonsec_mask
& (1 << n
))) ||
93 (attrs
.user
&& !s
->cfg_ap
[n
])) {
94 /* Block the transaction. */
96 /* Note that holding irq_clear high suppresses interrupts */
105 static MemTxResult
tz_ppc_read(void *opaque
, hwaddr addr
, uint64_t *pdata
,
106 unsigned size
, MemTxAttrs attrs
)
108 TZPPCPort
*p
= opaque
;
111 AddressSpace
*as
= &p
->downstream_as
;
115 if (!tz_ppc_check(s
, n
, attrs
)) {
116 trace_tz_ppc_read_blocked(n
, addr
, attrs
.secure
, attrs
.user
);
117 if (s
->cfg_sec_resp
) {
127 data
= address_space_ldub(as
, addr
, attrs
, &res
);
130 data
= address_space_lduw_le(as
, addr
, attrs
, &res
);
133 data
= address_space_ldl_le(as
, addr
, attrs
, &res
);
136 data
= address_space_ldq_le(as
, addr
, attrs
, &res
);
139 g_assert_not_reached();
145 static MemTxResult
tz_ppc_write(void *opaque
, hwaddr addr
, uint64_t val
,
146 unsigned size
, MemTxAttrs attrs
)
148 TZPPCPort
*p
= opaque
;
150 AddressSpace
*as
= &p
->downstream_as
;
154 if (!tz_ppc_check(s
, n
, attrs
)) {
155 trace_tz_ppc_write_blocked(n
, addr
, attrs
.secure
, attrs
.user
);
156 if (s
->cfg_sec_resp
) {
165 address_space_stb(as
, addr
, val
, attrs
, &res
);
168 address_space_stw_le(as
, addr
, val
, attrs
, &res
);
171 address_space_stl_le(as
, addr
, val
, attrs
, &res
);
174 address_space_stq_le(as
, addr
, val
, attrs
, &res
);
177 g_assert_not_reached();
182 static const MemoryRegionOps tz_ppc_ops
= {
183 .read_with_attrs
= tz_ppc_read
,
184 .write_with_attrs
= tz_ppc_write
,
185 .endianness
= DEVICE_LITTLE_ENDIAN
,
188 static bool tz_ppc_dummy_accepts(void *opaque
, hwaddr addr
,
189 unsigned size
, bool is_write
,
193 * Board code should never map the upstream end of an unused port,
194 * so we should never try to make a memory access to it.
196 g_assert_not_reached();
199 static const MemoryRegionOps tz_ppc_dummy_ops
= {
200 .valid
.accepts
= tz_ppc_dummy_accepts
,
203 static void tz_ppc_reset(DeviceState
*dev
)
205 TZPPC
*s
= TZ_PPC(dev
);
207 trace_tz_ppc_reset();
208 s
->cfg_sec_resp
= false;
209 memset(s
->cfg_nonsec
, 0, sizeof(s
->cfg_nonsec
));
210 memset(s
->cfg_ap
, 0, sizeof(s
->cfg_ap
));
213 static void tz_ppc_init(Object
*obj
)
215 DeviceState
*dev
= DEVICE(obj
);
216 TZPPC
*s
= TZ_PPC(obj
);
218 qdev_init_gpio_in_named(dev
, tz_ppc_cfg_nonsec
, "cfg_nonsec", TZ_NUM_PORTS
);
219 qdev_init_gpio_in_named(dev
, tz_ppc_cfg_ap
, "cfg_ap", TZ_NUM_PORTS
);
220 qdev_init_gpio_in_named(dev
, tz_ppc_cfg_sec_resp
, "cfg_sec_resp", 1);
221 qdev_init_gpio_in_named(dev
, tz_ppc_irq_enable
, "irq_enable", 1);
222 qdev_init_gpio_in_named(dev
, tz_ppc_irq_clear
, "irq_clear", 1);
223 qdev_init_gpio_out_named(dev
, &s
->irq
, "irq", 1);
226 static void tz_ppc_realize(DeviceState
*dev
, Error
**errp
)
228 Object
*obj
= OBJECT(dev
);
229 SysBusDevice
*sbd
= SYS_BUS_DEVICE(dev
);
230 TZPPC
*s
= TZ_PPC(dev
);
234 /* We can't create the upstream end of the port until realize,
235 * as we don't know the size of the MR used as the downstream until then.
237 for (i
= 0; i
< TZ_NUM_PORTS
; i
++) {
238 if (s
->port
[i
].downstream
) {
243 for (i
= 0; i
<= max_port
; i
++) {
244 TZPPCPort
*port
= &s
->port
[i
];
248 if (!port
->downstream
) {
250 * Create dummy sysbus MMIO region so the sysbus region
251 * numbering doesn't get out of sync with the port numbers.
252 * The size is entirely arbitrary.
254 name
= g_strdup_printf("tz-ppc-dummy-port[%d]", i
);
255 memory_region_init_io(&port
->upstream
, obj
, &tz_ppc_dummy_ops
,
256 port
, name
, 0x10000);
257 sysbus_init_mmio(sbd
, &port
->upstream
);
262 name
= g_strdup_printf("tz-ppc-port[%d]", i
);
265 address_space_init(&port
->downstream_as
, port
->downstream
, name
);
267 size
= memory_region_size(port
->downstream
);
268 memory_region_init_io(&port
->upstream
, obj
, &tz_ppc_ops
,
270 sysbus_init_mmio(sbd
, &port
->upstream
);
275 static const VMStateDescription tz_ppc_vmstate
= {
278 .minimum_version_id
= 1,
279 .fields
= (VMStateField
[]) {
280 VMSTATE_BOOL_ARRAY(cfg_nonsec
, TZPPC
, 16),
281 VMSTATE_BOOL_ARRAY(cfg_ap
, TZPPC
, 16),
282 VMSTATE_BOOL(cfg_sec_resp
, TZPPC
),
283 VMSTATE_BOOL(irq_enable
, TZPPC
),
284 VMSTATE_BOOL(irq_clear
, TZPPC
),
285 VMSTATE_BOOL(irq_status
, TZPPC
),
286 VMSTATE_END_OF_LIST()
290 #define DEFINE_PORT(N) \
291 DEFINE_PROP_LINK("port[" #N "]", TZPPC, port[N].downstream, \
292 TYPE_MEMORY_REGION, MemoryRegion *)
294 static Property tz_ppc_properties
[] = {
295 DEFINE_PROP_UINT32("NONSEC_MASK", TZPPC
, nonsec_mask
, 0),
312 DEFINE_PROP_END_OF_LIST(),
315 static void tz_ppc_class_init(ObjectClass
*klass
, void *data
)
317 DeviceClass
*dc
= DEVICE_CLASS(klass
);
319 dc
->realize
= tz_ppc_realize
;
320 dc
->vmsd
= &tz_ppc_vmstate
;
321 dc
->reset
= tz_ppc_reset
;
322 device_class_set_props(dc
, tz_ppc_properties
);
325 static const TypeInfo tz_ppc_info
= {
327 .parent
= TYPE_SYS_BUS_DEVICE
,
328 .instance_size
= sizeof(TZPPC
),
329 .instance_init
= tz_ppc_init
,
330 .class_init
= tz_ppc_class_init
,
333 static void tz_ppc_register_types(void)
335 type_register_static(&tz_ppc_info
);
338 type_init(tz_ppc_register_types
);