This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Can I set NIC (registers) with secure privilege?

Hi experts,

I'm using a Juno r1 board which is deployed with a Yukon Ultra-2 Ethernet Controller. Now I'm working on a project which is trying to protect some registers of this NIC based on the TrustZone technology so the best solution for me is configuring these registers as secure-world access-only. My thought is setting the physical address of these registers as secure world address while I'm not sure if it's possible or not.

If this is not feasible, then I want to know can I configure the entire NIC with S/NS attributes dynamically during the runtime? For example, when the normal world switch to the secure world, EL3 configure the NIC as secure-world device and recover it as the NS device after the secure world execution.

Any suggestion or related document is appreciated! Thank you in advance.

Simon

Parents
  • Hi Simon,

    I don't think you can do this. Secure accesses ultimately rely on a hardware side-band signal (AXPROT) that is propagated on the bus. A Secure peripheral is one that will only respond to a bus access marked as Secure. You can see in the Juno SoC TRM there are a limited number of secure peripherals

    In Secure world software you can control whether a memory access is Secure or Non-Secure

    But, how a peripheral responds to such accesses (i.e. will it only respond to Secure accesses) is down to the peripheral itself & decided at hardware design time.

    MarkN.

Reply
  • Hi Simon,

    I don't think you can do this. Secure accesses ultimately rely on a hardware side-band signal (AXPROT) that is propagated on the bus. A Secure peripheral is one that will only respond to a bus access marked as Secure. You can see in the Juno SoC TRM there are a limited number of secure peripherals

    In Secure world software you can control whether a memory access is Secure or Non-Secure

    But, how a peripheral responds to such accesses (i.e. will it only respond to Secure accesses) is down to the peripheral itself & decided at hardware design time.

    MarkN.

Children