123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312 |
- /*
- * ARM TrustZone master security controller emulation
- *
- * Copyright (c) 2018 Linaro Limited
- * Written by Peter Maydell
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2 or
- * (at your option) any later version.
- */
- #include "qemu/osdep.h"
- #include "qemu/log.h"
- #include "qemu/module.h"
- #include "qapi/error.h"
- #include "trace.h"
- #include "hw/sysbus.h"
- #include "migration/vmstate.h"
- #include "hw/registerfields.h"
- #include "hw/irq.h"
- #include "hw/misc/tz-msc.h"
- #include "hw/qdev-properties.h"
- static void tz_msc_update_irq(TZMSC *s)
- {
- bool level = s->irq_status;
- trace_tz_msc_update_irq(level);
- qemu_set_irq(s->irq, level);
- }
- static void tz_msc_cfg_nonsec(void *opaque, int n, int level)
- {
- TZMSC *s = TZ_MSC(opaque);
- trace_tz_msc_cfg_nonsec(level);
- s->cfg_nonsec = level;
- }
- static void tz_msc_cfg_sec_resp(void *opaque, int n, int level)
- {
- TZMSC *s = TZ_MSC(opaque);
- trace_tz_msc_cfg_sec_resp(level);
- s->cfg_sec_resp = level;
- }
- static void tz_msc_irq_clear(void *opaque, int n, int level)
- {
- TZMSC *s = TZ_MSC(opaque);
- trace_tz_msc_irq_clear(level);
- s->irq_clear = level;
- if (level) {
- s->irq_status = false;
- tz_msc_update_irq(s);
- }
- }
- /* The MSC may either block a transaction by aborting it, block a
- * transaction by making it RAZ/WI, allow it through with
- * MemTxAttrs indicating a secure transaction, or allow it with
- * MemTxAttrs indicating a non-secure transaction.
- */
- typedef enum MSCAction {
- MSCBlockAbort,
- MSCBlockRAZWI,
- MSCAllowSecure,
- MSCAllowNonSecure,
- } MSCAction;
- static MSCAction tz_msc_check(TZMSC *s, hwaddr addr)
- {
- /*
- * Check whether to allow an access from the bus master, returning
- * an MSCAction indicating the required behaviour. If the transaction
- * is blocked, the caller must check cfg_sec_resp to determine
- * whether to abort or RAZ/WI the transaction.
- */
- IDAUInterfaceClass *iic = IDAU_INTERFACE_GET_CLASS(s->idau);
- IDAUInterface *ii = IDAU_INTERFACE(s->idau);
- bool idau_exempt = false, idau_ns = true, idau_nsc = true;
- int idau_region = IREGION_NOTVALID;
- iic->check(ii, addr, &idau_region, &idau_exempt, &idau_ns, &idau_nsc);
- if (idau_exempt) {
- /*
- * Uncheck region -- OK, transaction type depends on
- * whether bus master is configured as Secure or NonSecure
- */
- return s->cfg_nonsec ? MSCAllowNonSecure : MSCAllowSecure;
- }
- if (idau_ns) {
- /* NonSecure region -- always forward as NS transaction */
- return MSCAllowNonSecure;
- }
- if (!s->cfg_nonsec) {
- /* Access to Secure region by Secure bus master: OK */
- return MSCAllowSecure;
- }
- /* Attempted access to Secure region by NS bus master: block */
- trace_tz_msc_access_blocked(addr);
- if (!s->cfg_sec_resp) {
- return MSCBlockRAZWI;
- }
- /*
- * The TRM isn't clear on behaviour if irq_clear is high when a
- * transaction is blocked. We assume that the MSC behaves like the
- * PPC, where holding irq_clear high suppresses the interrupt.
- */
- if (!s->irq_clear) {
- s->irq_status = true;
- tz_msc_update_irq(s);
- }
- return MSCBlockAbort;
- }
- static MemTxResult tz_msc_read(void *opaque, hwaddr addr, uint64_t *pdata,
- unsigned size, MemTxAttrs attrs)
- {
- TZMSC *s = opaque;
- AddressSpace *as = &s->downstream_as;
- uint64_t data;
- MemTxResult res;
- switch (tz_msc_check(s, addr)) {
- case MSCBlockAbort:
- return MEMTX_ERROR;
- case MSCBlockRAZWI:
- *pdata = 0;
- return MEMTX_OK;
- case MSCAllowSecure:
- attrs.secure = 1;
- attrs.unspecified = 0;
- break;
- case MSCAllowNonSecure:
- attrs.secure = 0;
- attrs.unspecified = 0;
- break;
- }
- switch (size) {
- case 1:
- data = address_space_ldub(as, addr, attrs, &res);
- break;
- case 2:
- data = address_space_lduw_le(as, addr, attrs, &res);
- break;
- case 4:
- data = address_space_ldl_le(as, addr, attrs, &res);
- break;
- case 8:
- data = address_space_ldq_le(as, addr, attrs, &res);
- break;
- default:
- g_assert_not_reached();
- }
- *pdata = data;
- return res;
- }
- static MemTxResult tz_msc_write(void *opaque, hwaddr addr, uint64_t val,
- unsigned size, MemTxAttrs attrs)
- {
- TZMSC *s = opaque;
- AddressSpace *as = &s->downstream_as;
- MemTxResult res;
- switch (tz_msc_check(s, addr)) {
- case MSCBlockAbort:
- return MEMTX_ERROR;
- case MSCBlockRAZWI:
- return MEMTX_OK;
- case MSCAllowSecure:
- attrs.secure = 1;
- attrs.unspecified = 0;
- break;
- case MSCAllowNonSecure:
- attrs.secure = 0;
- attrs.unspecified = 0;
- break;
- }
- switch (size) {
- case 1:
- address_space_stb(as, addr, val, attrs, &res);
- break;
- case 2:
- address_space_stw_le(as, addr, val, attrs, &res);
- break;
- case 4:
- address_space_stl_le(as, addr, val, attrs, &res);
- break;
- case 8:
- address_space_stq_le(as, addr, val, attrs, &res);
- break;
- default:
- g_assert_not_reached();
- }
- return res;
- }
- static const MemoryRegionOps tz_msc_ops = {
- .read_with_attrs = tz_msc_read,
- .write_with_attrs = tz_msc_write,
- .endianness = DEVICE_LITTLE_ENDIAN,
- };
- static void tz_msc_reset(DeviceState *dev)
- {
- TZMSC *s = TZ_MSC(dev);
- trace_tz_msc_reset();
- s->cfg_sec_resp = false;
- s->cfg_nonsec = false;
- s->irq_clear = 0;
- s->irq_status = 0;
- }
- static void tz_msc_init(Object *obj)
- {
- DeviceState *dev = DEVICE(obj);
- TZMSC *s = TZ_MSC(obj);
- qdev_init_gpio_in_named(dev, tz_msc_cfg_nonsec, "cfg_nonsec", 1);
- qdev_init_gpio_in_named(dev, tz_msc_cfg_sec_resp, "cfg_sec_resp", 1);
- qdev_init_gpio_in_named(dev, tz_msc_irq_clear, "irq_clear", 1);
- qdev_init_gpio_out_named(dev, &s->irq, "irq", 1);
- }
- static void tz_msc_realize(DeviceState *dev, Error **errp)
- {
- Object *obj = OBJECT(dev);
- SysBusDevice *sbd = SYS_BUS_DEVICE(dev);
- TZMSC *s = TZ_MSC(dev);
- const char *name = "tz-msc-downstream";
- uint64_t size;
- /*
- * We can't create the upstream end of the port until realize,
- * as we don't know the size of the MR used as the downstream until then.
- * We insist on having a downstream, to avoid complicating the
- * code with handling the "don't know how big this is" case. It's easy
- * enough for the user to create an unimplemented_device as downstream
- * if they have nothing else to plug into this.
- */
- if (!s->downstream) {
- error_setg(errp, "MSC 'downstream' link not set");
- return;
- }
- if (!s->idau) {
- error_setg(errp, "MSC 'idau' link not set");
- return;
- }
- size = memory_region_size(s->downstream);
- address_space_init(&s->downstream_as, s->downstream, name);
- memory_region_init_io(&s->upstream, obj, &tz_msc_ops, s, name, size);
- sysbus_init_mmio(sbd, &s->upstream);
- }
- static const VMStateDescription tz_msc_vmstate = {
- .name = "tz-msc",
- .version_id = 1,
- .minimum_version_id = 1,
- .fields = (VMStateField[]) {
- VMSTATE_BOOL(cfg_nonsec, TZMSC),
- VMSTATE_BOOL(cfg_sec_resp, TZMSC),
- VMSTATE_BOOL(irq_clear, TZMSC),
- VMSTATE_BOOL(irq_status, TZMSC),
- VMSTATE_END_OF_LIST()
- }
- };
- static Property tz_msc_properties[] = {
- DEFINE_PROP_LINK("downstream", TZMSC, downstream,
- TYPE_MEMORY_REGION, MemoryRegion *),
- DEFINE_PROP_LINK("idau", TZMSC, idau,
- TYPE_IDAU_INTERFACE, IDAUInterface *),
- DEFINE_PROP_END_OF_LIST(),
- };
- static void tz_msc_class_init(ObjectClass *klass, void *data)
- {
- DeviceClass *dc = DEVICE_CLASS(klass);
- dc->realize = tz_msc_realize;
- dc->vmsd = &tz_msc_vmstate;
- dc->reset = tz_msc_reset;
- device_class_set_props(dc, tz_msc_properties);
- }
- static const TypeInfo tz_msc_info = {
- .name = TYPE_TZ_MSC,
- .parent = TYPE_SYS_BUS_DEVICE,
- .instance_size = sizeof(TZMSC),
- .instance_init = tz_msc_init,
- .class_init = tz_msc_class_init,
- };
- static void tz_msc_register_types(void)
- {
- type_register_static(&tz_msc_info);
- }
- type_init(tz_msc_register_types);
|