MLK-20958-1 imx8: Sync SCFW API to commit ef4a5057

Also fixes MLK-21051: Replace manually added pads with defines from SCFW
export package.

Signed-off-by: Leonard Crestez <leonard.crestez@nxp.com>
Acked-by: Fugang Duan <fugang.duan@nxp.com>
(cherry picked from commit cc76365cb15dc9d4ba3983ec93094c6017e12d83)
This commit is contained in:
Leonard Crestez 2019-03-01 18:06:38 +02:00
parent 3d2b5c0dae
commit fc2798fc55
6 changed files with 117 additions and 14 deletions

View File

@ -20,7 +20,7 @@
/* Defines */ /* Defines */
#define SCFW_API_VERSION_MAJOR 1U #define SCFW_API_VERSION_MAJOR 1U
#define SCFW_API_VERSION_MINOR 3U #define SCFW_API_VERSION_MINOR 4U
#define SC_RPC_VERSION 1U #define SC_RPC_VERSION 1U

View File

@ -140,12 +140,21 @@ typedef uint8_t sc_rm_perm_t;
* - SC_ERR_UNAVAILABLE if partition table is full (no more allocation space) * - SC_ERR_UNAVAILABLE if partition table is full (no more allocation space)
* *
* Marking as non-secure prevents subsequent functions from configuring masters in this * Marking as non-secure prevents subsequent functions from configuring masters in this
* partition to assert the secure signal. If restricted then the new partition is limited * partition to assert the secure signal. Basically, if TrustZone SW is used, the Cortex-A
* in what functions it can call, especially those associated with managing partitions. * cores and peripherals the TZ SW will use should be in a secure partition. Almost all
* other partitions (for a non-secure OS or M4 cores) should be in non-secure partitions.
*
* Isolated should be true for almost all partitions. The exception is the non-secure
* partition for a Cortex-A core used to run a non-secure OS. This isn't isolated by
* domain but is instead isolated by the TZ security hardware.
*
* If restricted then the new partition is limited in what functions it can call,
* especially those associated with managing partitions.
* *
* The grant option is usually used to isolate a bus master's traffic to specific * The grant option is usually used to isolate a bus master's traffic to specific
* memory without isolating the peripheral interface of the master or the API * memory without isolating the peripheral interface of the master or the API
* controls of that master. * controls of that master. This is only used when creating a sub-partition with
* no CPU. It's useful to separate out a master and the memory it uses.
*/ */
sc_err_t sc_rm_partition_alloc(sc_ipc_t ipc, sc_rm_pt_t *pt, sc_bool_t secure, sc_err_t sc_rm_partition_alloc(sc_ipc_t ipc, sc_rm_pt_t *pt, sc_bool_t secure,
sc_bool_t isolated, sc_bool_t restricted, sc_bool_t grant, sc_bool_t coherent); sc_bool_t isolated, sc_bool_t restricted, sc_bool_t grant, sc_bool_t coherent);
@ -317,6 +326,12 @@ sc_err_t sc_rm_move_all(sc_ipc_t ipc, sc_rm_pt_t pt_src, sc_rm_pt_t pt_dst,
* assigned * assigned
* @param[in] resource resource to assign * @param[in] resource resource to assign
* *
* This function assigned a resource to a partition. This partition is then
* the owner. All resources always have an owner (one owner). The owner
* has various rights to make API calls affecting the resource. Ownership
* does not imply access to the peripheral itself (that is based on access
* rights).
*
* @return Returns an error code (SC_ERR_NONE = success). * @return Returns an error code (SC_ERR_NONE = success).
* *
* This action resets the resource's master and peripheral attributes. * This action resets the resource's master and peripheral attributes.
@ -367,6 +382,12 @@ sc_err_t sc_rm_set_resource_movable(sc_ipc_t ipc, sc_rsrc_t resource_fst,
* @param[in] resource resource to use to identify subsystem * @param[in] resource resource to use to identify subsystem
* @param[in] movable movable flag (SC_TRUE is movable) * @param[in] movable movable flag (SC_TRUE is movable)
* *
* A subsystem is a physical grouping within the chip of related resources;
* this is SoC specific. This function is used to optimize moving resource
* for these groupings, for instance, an M4 core and its associated resources.
* The list of subsystems and associated resources can be found in the
* SoC-specific API document [Resources](@ref RESOURCES) chapter.
*
* @return Returns an error code (SC_ERR_NONE = success). * @return Returns an error code (SC_ERR_NONE = success).
* *
* Return errors: * Return errors:
@ -396,9 +417,13 @@ sc_err_t sc_rm_set_subsys_rsrc_movable(sc_ipc_t ipc, sc_rsrc_t resource,
* - SC_ERR_NOACCESS if caller's partition is not a parent of the resource owner, * - SC_ERR_NOACCESS if caller's partition is not a parent of the resource owner,
* - SC_ERR_LOCKED if the owning partition is locked * - SC_ERR_LOCKED if the owning partition is locked
* *
* This function configures how the HW isolation will see bus transactions * Masters are IP blocks that generate bus transactions. This function configures
* from the specified master. Note the security attribute will only be * how the isolation HW will define these bus transactions from the specified master.
* changed if the caller's partition is secure. * Note the security attribute will only be changed if the caller's partition is
* secure.
*
* Note an IP block can be both a master and peripheral (have both a programming model
* and generate bus transactions).
*/ */
sc_err_t sc_rm_set_master_attributes(sc_ipc_t ipc, sc_rsrc_t resource, sc_err_t sc_rm_set_master_attributes(sc_ipc_t ipc, sc_rsrc_t resource,
sc_rm_spa_t sa, sc_rm_spa_t pa, sc_bool_t smmu_bypass); sc_rm_spa_t sa, sc_rm_spa_t pa, sc_bool_t smmu_bypass);
@ -444,9 +469,15 @@ sc_err_t sc_rm_set_master_sid(sc_ipc_t ipc, sc_rsrc_t resource,
* - SC_ERR_LOCKED if the owning partition is locked * - SC_ERR_LOCKED if the owning partition is locked
* - SC_ERR_LOCKED if the \a pt is confidential and the caller isn't \a pt * - SC_ERR_LOCKED if the \a pt is confidential and the caller isn't \a pt
* *
* This function configures how the HW isolation will restrict access to a * Peripherals are IP blocks that have a programming model that can be
* accessed.
*
* This function configures how the isolation HW will restrict access to a
* peripheral based on the attributes of a transaction from bus master. It * peripheral based on the attributes of a transaction from bus master. It
* also allows the access permissions of SC_R_SYSTEM to be set. * also allows the access permissions of SC_R_SYSTEM to be set.
*
* Note an IP block can be both a master and peripheral (have both a programming
* model and generate bus transactions).
*/ */
sc_err_t sc_rm_set_peripheral_permissions(sc_ipc_t ipc, sc_rsrc_t resource, sc_err_t sc_rm_set_peripheral_permissions(sc_ipc_t ipc, sc_rsrc_t resource,
sc_rm_pt_t pt, sc_rm_perm_t perm); sc_rm_pt_t pt, sc_rm_perm_t perm);
@ -486,6 +517,10 @@ sc_err_t sc_rm_get_resource_owner(sc_ipc_t ipc, sc_rsrc_t resource,
* @param[in] ipc IPC handle * @param[in] ipc IPC handle
* @param[in] resource resource to check * @param[in] resource resource to check
* *
* Masters are IP blocks that generate bus transactions. Note an IP block
* can be both a master and peripheral (have both a programming model
* and generate bus transactions).
*
* @return Returns a boolean (SC_TRUE if the resource is a bus master). * @return Returns a boolean (SC_TRUE if the resource is a bus master).
* *
* If \a resource is out of range then SC_FALSE is returned. * If \a resource is out of range then SC_FALSE is returned.
@ -498,6 +533,10 @@ sc_bool_t sc_rm_is_resource_master(sc_ipc_t ipc, sc_rsrc_t resource);
* @param[in] ipc IPC handle * @param[in] ipc IPC handle
* @param[in] resource resource to check * @param[in] resource resource to check
* *
* Peripherals are IP blocks that have a programming model that can be
* accessed. Note an IP block can be both a master and peripheral (have
* both a programming model and generate bus transactions)
*
* @return Returns a boolean (SC_TRUE if the resource is a peripheral). * @return Returns a boolean (SC_TRUE if the resource is a peripheral).
* *
* If \a resource is out of range then SC_FALSE is returned. * If \a resource is out of range then SC_FALSE is returned.
@ -676,6 +715,12 @@ sc_err_t sc_rm_assign_memreg(sc_ipc_t ipc, sc_rm_pt_t pt, sc_rm_mr_t mr);
* applied for * applied for
* @param[in] perm permissions to apply to \a mr for \a pt * @param[in] perm permissions to apply to \a mr for \a pt
* *
* This function assigned a memory region to a partition. This partition is then
* the owner. All regions always have an owner (one owner). The owner
* has various rights to make API calls affecting the region. Ownership
* does not imply access to the memory itself (that is based on access
* rights).
*
* @return Returns an error code (SC_ERR_NONE = success). * @return Returns an error code (SC_ERR_NONE = success).
* *
* Return errors: * Return errors:
@ -754,6 +799,10 @@ sc_err_t sc_rm_assign_pad(sc_ipc_t ipc, sc_rm_pt_t pt, sc_pad_t pad);
* @param[in] pad_lst last pad for which flag should be set * @param[in] pad_lst last pad for which flag should be set
* @param[in] movable movable flag (SC_TRUE is movable) * @param[in] movable movable flag (SC_TRUE is movable)
* *
* This function assigned a pad to a partition. This partition is then
* the owner. All pads always have an owner (one owner). The owner
* has various rights to make API calls affecting the pad.
*
* @return Returns an error code (SC_ERR_NONE = success). * @return Returns an error code (SC_ERR_NONE = success).
* *
* Return errors: * Return errors:

View File

@ -731,10 +731,16 @@
#define SC_R_ALL ((sc_rsrc_t) UINT16_MAX) /*!< All resources */ #define SC_R_ALL ((sc_rsrc_t) UINT16_MAX) /*!< All resources */
/*@}*/ /*@}*/
/*!
* Define for ATF/Linux. Not used by SCFW. Not a valid parameter
* for any SCFW API calls!
*/
#define SC_R_NONE 0xFFF0U
/* NOTE - please add by replacing some of the UNUSED from above! */ /* NOTE - please add by replacing some of the UNUSED from above! */
/*! /*!
* Defnes for sc_ctrl_t. * Defines for sc_ctrl_t.
*/ */
#define SC_C_TEMP 0U #define SC_C_TEMP 0U
#define SC_C_TEMP_HI 1U #define SC_C_TEMP_HI 1U

View File

@ -969,6 +969,32 @@
#define SC_P_ENET1_RGMII_RXD3_DMA_UART3_RX SC_P_ENET1_RGMII_RXD3 1 #define SC_P_ENET1_RGMII_RXD3_DMA_UART3_RX SC_P_ENET1_RGMII_RXD3 1
#define SC_P_ENET1_RGMII_RXD3_VPU_TSI_S1_CLK SC_P_ENET1_RGMII_RXD3 2 #define SC_P_ENET1_RGMII_RXD3_VPU_TSI_S1_CLK SC_P_ENET1_RGMII_RXD3 2
#define SC_P_ENET1_RGMII_RXD3_LSIO_GPIO6_IO21 SC_P_ENET1_RGMII_RXD3 3 #define SC_P_ENET1_RGMII_RXD3_LSIO_GPIO6_IO21 SC_P_ENET1_RGMII_RXD3 3
/*@}*/
/*!
* @name Fake Pad Mux Definitions
* format: name padid 0
*/
/*@{*/
#define SC_P_COMP_CTL_GPIO_1V8_3V3_SIM_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_SIM 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOLH_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOLH 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_LVDSGPIO_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_LVDSGPIO 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_MIPIDSIGPIO_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_MIPIDSIGPIO 0
#define SC_P_COMP_CTL_GPIO_3V3_HDMIGPIO_PAD SC_P_COMP_CTL_GPIO_3V3_HDMIGPIO 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHB_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHB 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHC_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHC 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHT_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHT 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOLHT_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOLHT 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOTHR_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOTHR 0
#define SC_P_COMP_CTL_GPIO_3V3_USB3IO_PAD SC_P_COMP_CTL_GPIO_3V3_USB3IO 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_VSELSEP_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_VSELSEP 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOCT_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOCT 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI1_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI1 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI0_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI0 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_PCIESEP_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_PCIESEP 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_SD1FIX_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_SD1FIX 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_VSEL2_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_VSEL2 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_VSEL3_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_VSEL3 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB 0 #define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETA_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETA 0 #define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETA_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETA 0
/*@}*/ /*@}*/

View File

@ -764,9 +764,30 @@
#define SC_P_QSPI0B_SS1_B_LSIO_QSPI1A_SS1_B SC_P_QSPI0B_SS1_B 1 #define SC_P_QSPI0B_SS1_B_LSIO_QSPI1A_SS1_B SC_P_QSPI0B_SS1_B 1
#define SC_P_QSPI0B_SS1_B_LSIO_KPP0_ROW3 SC_P_QSPI0B_SS1_B 2 #define SC_P_QSPI0B_SS1_B_LSIO_KPP0_ROW3 SC_P_QSPI0B_SS1_B 2
#define SC_P_QSPI0B_SS1_B_LSIO_GPIO3_IO24 SC_P_QSPI0B_SS1_B 4 #define SC_P_QSPI0B_SS1_B_LSIO_GPIO3_IO24 SC_P_QSPI0B_SS1_B 4
/*@}*/
/*!
* @name Fake Pad Mux Definitions
* format: name padid 0
*/
/*@{*/
#define SC_P_COMP_CTL_GPIO_1V8_3V3_PCIESEP_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_PCIESEP 0
#define SC_P_COMP_CTL_GPIO_3V3_USB3IO_PAD SC_P_COMP_CTL_GPIO_3V3_USB3IO 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_SD1FIX0_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_SD1FIX0 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_SD1FIX1_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_SD1FIX1 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_VSELSEP_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_VSELSEP 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_VSEL3_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_VSEL3 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB0_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB0 0 #define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB0_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB0 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB1_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB1 0 #define SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB1_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_ENET_ENETB1 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOCT_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOCT 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHB_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHB 0 #define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHB_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHB 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHK_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHK 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHT_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHT 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOLH_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIOLH 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_MIPIDSIGPIO_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_MIPIDSIGPIO 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHD_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_GPIORHD 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI0A_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI0A 0
#define SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI0B_PAD SC_P_COMP_CTL_GPIO_1V8_3V3_QSPI0B 0
/*@}*/ /*@}*/
#endif /* SC_PADS_H */ #endif /* SC_PADS_H */

View File

@ -560,6 +560,7 @@
#define SC_R_DMA_5_CH3 544 #define SC_R_DMA_5_CH3 544
#define SC_R_ATTESTATION 545 #define SC_R_ATTESTATION 545
#define SC_R_LAST 546 #define SC_R_LAST 546
#define SC_R_NONE 0xFFF0
#endif /* DT_BINDINGS_RSCRC_IMX_H */ #endif /* DT_BINDINGS_RSCRC_IMX_H */