<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Layerscapeのトピック[LS1043a] No eSDHC controller RAM access when TZASC activated</title>
    <link>https://community.nxp.com/t5/Layerscape/LS1043a-No-eSDHC-controller-RAM-access-when-TZASC-activated/m-p/790254#M3503</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm working with a LS1043a based platform from Microsys.&lt;BR /&gt;Reading SMMU_IDR7 (0x21), it looks like it implements SMMUV2.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my setup I boot SPL responsible for loading different firmware.&lt;BR /&gt;This includes usual u-boot and Linux + proprietary firmware able to run as secure monitor and micro-kernel in the secure world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The goal I want to achieve is to reserve RAM used for proprietary firmware load and runtime for secure accesses only.&lt;BR /&gt;To reach such property, early stage of SPL, I configure/enable TZASC to reserve last 512MB of RAM for secure access only.&lt;BR /&gt;While booting, I confirm that eSDHC controller is not able anymore to load proprietary firmware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm then trying to enable/configure "Secure State Determination" (SSD) in SMMU, in order to indicate, eSDHC controller can act as a secure master. &lt;/P&gt;&lt;P&gt;It is here I meet issue, unable to configure SMMU SSD correctly to allow eSDHC reserved RAM access as soon as TZASC is activated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From SMMU and LS1043 documents, here is what I understand:&lt;BR /&gt;- eSDHC is default non secure master&lt;BR /&gt;- SCFG_SDHC_ICID register can be programmed with so called "ICID" that shall be transmitted to SMMU each time eSDHC initiates SMMU transaction&lt;BR /&gt;- SMMU provides SSD address space allowing to build a SSD index table with programmable/non programmable bits indicating type of SMMU transaction (e.g secure or non secure) for a given index.&lt;BR /&gt;- SSD memory space is divided in 1024bits areas, each areas corresponding to a TBU&lt;BR /&gt;- I have 4 TBUs on my SMMU: TBU0 to TBU3&lt;BR /&gt;- TBU3 is used for eSDHC transactions&lt;/P&gt;&lt;P&gt;- programming both SCFG_SDHC_ICID and corresponding SMMU SSD register shall allow SMMU to accept secure transaction for eSDHC controller.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In SMMU Architecture Specification, regarding SMMU SSD address space, it is written: &lt;BR /&gt;- "Software can detect programmable bits by using a read-modify-write sequence."&lt;BR /&gt;Playing read-modify-write sequence, I found (at least this is what I understand) that I have only 4 programmables bits, one per TBU, so as 1 bit always secure, also one per TBU and all bits not modified when writting them thus indicating "always non secure transaction" for corresponding index.&lt;BR /&gt;Regarding SMMU SSD address space:&lt;BR /&gt;- at offset 0x0 (TBU0 ?): bit0 is always secure, bit 1 is programmable&lt;BR /&gt;- at offset 0x80 (TBU1 ?): same results&lt;BR /&gt;- at offset 0x100 (TBU2 ?): same results&lt;BR /&gt;- at offset 0x180 (TBU3 ?): same results&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I kept all programmable and default SSD indexes to "secure" and tried to "play" with SCFG_SDHC_ICID value with no success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I miss good value for SCFG_SDHC_ICID or something else in SMMU config to allow eSDHC to perform secure SMMU transactions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help/clarifications welcome here.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Sep 2018 11:55:13 GMT</pubDate>
    <dc:creator>alexandreberder</dc:creator>
    <dc:date>2018-09-24T11:55:13Z</dc:date>
    <item>
      <title>[LS1043a] No eSDHC controller RAM access when TZASC activated</title>
      <link>https://community.nxp.com/t5/Layerscape/LS1043a-No-eSDHC-controller-RAM-access-when-TZASC-activated/m-p/790254#M3503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm working with a LS1043a based platform from Microsys.&lt;BR /&gt;Reading SMMU_IDR7 (0x21), it looks like it implements SMMUV2.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my setup I boot SPL responsible for loading different firmware.&lt;BR /&gt;This includes usual u-boot and Linux + proprietary firmware able to run as secure monitor and micro-kernel in the secure world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The goal I want to achieve is to reserve RAM used for proprietary firmware load and runtime for secure accesses only.&lt;BR /&gt;To reach such property, early stage of SPL, I configure/enable TZASC to reserve last 512MB of RAM for secure access only.&lt;BR /&gt;While booting, I confirm that eSDHC controller is not able anymore to load proprietary firmware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm then trying to enable/configure "Secure State Determination" (SSD) in SMMU, in order to indicate, eSDHC controller can act as a secure master. &lt;/P&gt;&lt;P&gt;It is here I meet issue, unable to configure SMMU SSD correctly to allow eSDHC reserved RAM access as soon as TZASC is activated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From SMMU and LS1043 documents, here is what I understand:&lt;BR /&gt;- eSDHC is default non secure master&lt;BR /&gt;- SCFG_SDHC_ICID register can be programmed with so called "ICID" that shall be transmitted to SMMU each time eSDHC initiates SMMU transaction&lt;BR /&gt;- SMMU provides SSD address space allowing to build a SSD index table with programmable/non programmable bits indicating type of SMMU transaction (e.g secure or non secure) for a given index.&lt;BR /&gt;- SSD memory space is divided in 1024bits areas, each areas corresponding to a TBU&lt;BR /&gt;- I have 4 TBUs on my SMMU: TBU0 to TBU3&lt;BR /&gt;- TBU3 is used for eSDHC transactions&lt;/P&gt;&lt;P&gt;- programming both SCFG_SDHC_ICID and corresponding SMMU SSD register shall allow SMMU to accept secure transaction for eSDHC controller.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In SMMU Architecture Specification, regarding SMMU SSD address space, it is written: &lt;BR /&gt;- "Software can detect programmable bits by using a read-modify-write sequence."&lt;BR /&gt;Playing read-modify-write sequence, I found (at least this is what I understand) that I have only 4 programmables bits, one per TBU, so as 1 bit always secure, also one per TBU and all bits not modified when writting them thus indicating "always non secure transaction" for corresponding index.&lt;BR /&gt;Regarding SMMU SSD address space:&lt;BR /&gt;- at offset 0x0 (TBU0 ?): bit0 is always secure, bit 1 is programmable&lt;BR /&gt;- at offset 0x80 (TBU1 ?): same results&lt;BR /&gt;- at offset 0x100 (TBU2 ?): same results&lt;BR /&gt;- at offset 0x180 (TBU3 ?): same results&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I kept all programmable and default SSD indexes to "secure" and tried to "play" with SCFG_SDHC_ICID value with no success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I miss good value for SCFG_SDHC_ICID or something else in SMMU config to allow eSDHC to perform secure SMMU transactions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help/clarifications welcome here.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 11:55:13 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/LS1043a-No-eSDHC-controller-RAM-access-when-TZASC-activated/m-p/790254#M3503</guid>
      <dc:creator>alexandreberder</dc:creator>
      <dc:date>2018-09-24T11:55:13Z</dc:date>
    </item>
  </channel>
</rss>

