binman: k3: Add k3-security.h and include it in k3-binman.dtsi
For readability during configuring firewalls, adding k3-security.h file and including it in k3-binman.dtsi to be accessible across K3 SoCs Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
This commit is contained in:
parent
30eb98a1eb
commit
d20a175a8f
|
|
@ -3,6 +3,8 @@
|
|||
* Copyright (C) 2022 Texas Instruments Incorporated - https://www.ti.com/
|
||||
*/
|
||||
|
||||
#include "k3-security.h"
|
||||
|
||||
/ {
|
||||
binman: binman {
|
||||
multiple-images;
|
||||
|
|
|
|||
|
|
@ -0,0 +1,58 @@
|
|||
/* SPDX-License-Identifier: GPL-2.0 */
|
||||
/*
|
||||
* Copyright (C) 2023 Texas Instruments Incorporated - https://www.ti.com/
|
||||
*/
|
||||
|
||||
#ifndef DTS_ARM64_TI_K3_FIREWALL_H
|
||||
#define DTS_ARM64_TI_K3_FIREWALL_H
|
||||
|
||||
#define FWPRIVID_ALL 0xc3
|
||||
#define FWPRIVID_ARMV8 1
|
||||
#define FWPRIVID_SHIFT 16
|
||||
|
||||
#define FWCTRL_EN 0xA
|
||||
#define FWCTRL_LOCK (1 << 4)
|
||||
#define FWCTRL_BG (1 << 8)
|
||||
#define FWCTRL_CACHE (1 << 9)
|
||||
|
||||
#define FWPERM_SECURE_PRIV_WRITE (1 << 0)
|
||||
#define FWPERM_SECURE_PRIV_READ (1 << 1)
|
||||
#define FWPERM_SECURE_PRIV_CACHEABLE (1 << 2)
|
||||
#define FWPERM_SECURE_PRIV_DEBUG (1 << 3)
|
||||
|
||||
#define FWPERM_SECURE_PRIV_RWCD (FWPERM_SECURE_PRIV_READ | \
|
||||
FWPERM_SECURE_PRIV_WRITE | \
|
||||
FWPERM_SECURE_PRIV_CACHEABLE | \
|
||||
FWPERM_SECURE_PRIV_DEBUG)
|
||||
|
||||
#define FWPERM_SECURE_USER_WRITE (1 << 4)
|
||||
#define FWPERM_SECURE_USER_READ (1 << 5)
|
||||
#define FWPERM_SECURE_USER_CACHEABLE (1 << 6)
|
||||
#define FWPERM_SECURE_USER_DEBUG (1 << 7)
|
||||
|
||||
#define FWPERM_SECURE_USER_RWCD (FWPERM_SECURE_USER_READ | \
|
||||
FWPERM_SECURE_USER_WRITE | \
|
||||
FWPERM_SECURE_USER_CACHEABLE | \
|
||||
FWPERM_SECURE_USER_DEBUG)
|
||||
|
||||
#define FWPERM_NON_SECURE_PRIV_WRITE (1 << 8)
|
||||
#define FWPERM_NON_SECURE_PRIV_READ (1 << 9)
|
||||
#define FWPERM_NON_SECURE_PRIV_CACHEABLE (1 << 10)
|
||||
#define FWPERM_NON_SECURE_PRIV_DEBUG (1 << 11)
|
||||
|
||||
#define FWPERM_NON_SECURE_PRIV_RWCD (FWPERM_NON_SECURE_PRIV_READ | \
|
||||
FWPERM_NON_SECURE_PRIV_WRITE | \
|
||||
FWPERM_NON_SECURE_PRIV_CACHEABLE | \
|
||||
FWPERM_NON_SECURE_PRIV_DEBUG)
|
||||
|
||||
#define FWPERM_NON_SECURE_USER_WRITE (1 << 12)
|
||||
#define FWPERM_NON_SECURE_USER_READ (1 << 13)
|
||||
#define FWPERM_NON_SECURE_USER_CACHEABLE (1 << 14)
|
||||
#define FWPERM_NON_SECURE_USER_DEBUG (1 << 15)
|
||||
|
||||
#define FWPERM_NON_SECURE_USER_RWCD (FWPERM_NON_SECURE_USER_READ | \
|
||||
FWPERM_NON_SECURE_USER_WRITE | \
|
||||
FWPERM_NON_SECURE_USER_CACHEABLE | \
|
||||
FWPERM_NON_SECURE_USER_DEBUG)
|
||||
|
||||
#endif
|
||||
Loading…
Reference in New Issue