mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-10-31 04:59:55 +00:00 
			
		
		
		
	Merge branch 'feature/apm_support_esp32c6' into 'master'
apm: added support for APM on esp32c6 Closes IDF-5819 and IDF-5818 See merge request espressif/esp-idf!22157
This commit is contained in:
		| @@ -82,7 +82,7 @@ esp_err_t async_memcpy_impl_init(async_memcpy_impl_t *impl) | ||||
| #if SOC_APM_SUPPORTED | ||||
|     // APM strategy: trusted mode | ||||
|     // TODO: IDF-5354 GDMA for M2M usage only need read and write permissions, we should disable the execute permission by the APM controller | ||||
|     apm_ll_set_master_secure_mode(APM_LL_MASTER_GDMA + m2m_trigger.instance_id, APM_LL_SECURE_MODE_TEE); | ||||
|     apm_tee_ll_set_master_secure_mode(APM_LL_MASTER_GDMA + m2m_trigger.instance_id, APM_LL_SECURE_MODE_TEE); | ||||
| #endif // SOC_APM_SUPPORTED | ||||
|  | ||||
|     gdma_rx_event_callbacks_t cbs = { | ||||
|   | ||||
| @@ -155,6 +155,10 @@ if(NOT BOOTLOADER_BUILD) | ||||
|         list(APPEND srcs "${target}/pmu_hal.c") | ||||
|     endif() | ||||
|  | ||||
|     if(CONFIG_SOC_APM_SUPPORTED) | ||||
|         list(APPEND srcs "apm_hal.c") | ||||
|     endif() | ||||
|  | ||||
|     if(${target} STREQUAL "esp32") | ||||
|         list(APPEND srcs | ||||
|             "touch_sensor_hal.c" | ||||
|   | ||||
							
								
								
									
										80
									
								
								components/hal/apm_hal.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										80
									
								
								components/hal/apm_hal.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,80 @@ | ||||
| /* | ||||
|  * SPDX-FileCopyrightText: 2023 Espressif Systems (Shanghai) CO LTD | ||||
|  * | ||||
|  * SPDX-License-Identifier: Apache-2.0 | ||||
|  */ | ||||
|  | ||||
| #include "hal/assert.h" | ||||
| #include "hal/apm_hal.h" | ||||
| #include "hal/apm_ll.h" | ||||
|  | ||||
| void apm_tee_hal_set_master_secure_mode(apm_ll_master_id_t master_id, apm_ll_secure_mode_t sec_mode) | ||||
| { | ||||
|     apm_tee_ll_set_master_secure_mode(master_id, sec_mode); | ||||
| } | ||||
|  | ||||
| void apm_tee_hal_clk_gating_enable(bool enable) | ||||
| { | ||||
|     apm_tee_ll_clk_gating_enable(enable); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_region_filter_enable(uint32_t regn_num, bool enable) | ||||
| { | ||||
|     apm_hp_ll_region_filter_enable(regn_num, enable); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_m_filter_enable(apm_ll_hp_access_path_t hp_m_path, bool enable) | ||||
| { | ||||
|     apm_hp_ll_m_filter_enable(hp_m_path, enable); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_region_config(const apm_hp_hal_region_config_data_t *pms_data) | ||||
| { | ||||
|     HAL_ASSERT((!pms_data) || (pms_data->regn_num > APM_LL_HP_MAX_REGION_NUM)); | ||||
|  | ||||
|     apm_hp_ll_set_region_start_address(pms_data->regn_num, pms_data->regn_start_addr); | ||||
|     apm_hp_ll_set_region_end_address(pms_data->regn_num, pms_data->regn_end_addr); | ||||
|     apm_hp_ll_sec_mode_region_attr_config(pms_data->regn_num, pms_data->sec_mode, pms_data->regn_pms); | ||||
| } | ||||
|  | ||||
| uint8_t apm_hp_hal_m_exception_status(apm_ll_hp_access_path_t hp_m_path) | ||||
| { | ||||
|     return apm_hp_ll_m_exception_status(hp_m_path); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_m_exception_clear(apm_ll_hp_access_path_t hp_m_path) | ||||
| { | ||||
|     apm_hp_ll_m_exception_clear(hp_m_path); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_get_m_exception_info(apm_hp_m_exception_info_t *excp_info) | ||||
| { | ||||
|     apm_hp_ll_get_m_exception_info(excp_info); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_m_interrupt_enable(apm_ll_hp_access_path_t hp_m_path, bool enable) | ||||
| { | ||||
|     apm_hp_ll_m_interrupt_enable(hp_m_path, enable); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_clk_gating_enable(bool enable) | ||||
| { | ||||
|     apm_hp_ll_clk_gating_enable(enable); | ||||
| } | ||||
|  | ||||
| /* TBD: IDF-6759 */ | ||||
| void apm_hp_hal_master_sec_mode_config(apm_hp_secure_mode_config_t *sec_mode_data) | ||||
| { | ||||
|     for (int i = 0; i < APM_LL_MASTER_MAX; i++) { | ||||
|         if (sec_mode_data->master_ids & (1 << i)) { | ||||
|             apm_tee_hal_set_master_secure_mode(i, sec_mode_data->sec_mode); | ||||
|         } | ||||
|     } | ||||
|     sec_mode_data->pms_data->sec_mode = sec_mode_data->sec_mode; | ||||
|     apm_hp_hal_region_config(sec_mode_data->pms_data); | ||||
| } | ||||
|  | ||||
| void apm_hp_hal_reset_event_enable(bool enable) | ||||
| { | ||||
|     apm_hp_ll_reset_event_enable(enable); | ||||
| } | ||||
| @@ -7,14 +7,30 @@ | ||||
|  | ||||
| #include <stdint.h> | ||||
| #include <stdbool.h> | ||||
| #include "soc/pcr_reg.h" | ||||
| #include "soc/tee_reg.h" | ||||
|  | ||||
| #define TEE_LL_MODE_CTRL_REG(master_id) (TEE_M0_MODE_CTRL_REG + 4 * (master_id)) | ||||
| #include "soc/hp_apm_reg.h" | ||||
| #include "soc/hp_apm_struct.h" | ||||
|  | ||||
| #ifdef __cplusplus | ||||
| extern "C" { | ||||
| #endif | ||||
|  | ||||
| #define TEE_LL_MODE_CTRL_REG(master_id) (TEE_M0_MODE_CTRL_REG + 4 * (master_id)) | ||||
| #define APM_LL_REGION_ADDR_START_REG(regn_num) (HP_APM_REGION0_ADDR_START_REG + 0xC * (regn_num)) | ||||
| #define APM_LL_REGION_ADDR_END_REG(regn_num) (HP_APM_REGION0_ADDR_END_REG + 0xC * (regn_num)) | ||||
| #define APM_LL_REGION_ADDR_ATTR_REG(regn_num) (HP_APM_REGION0_PMS_ATTR_REG + 0xC * (regn_num)) | ||||
| #define APM_LL_TEE_EXCP_STATUS_REG(sec_mode) (HP_APM_M0_STATUS_REG + 0x10 * (sec_mode)) | ||||
| #define APM_LL_TEE_EXCP_CLR_REG(sec_mode) (HP_APM_M0_STATUS_CLR_REG + 0x10 * (sec_mode)) | ||||
| #define APM_LL_TEE_EXCP_INFO0_REG(sec_mode) (HP_APM_M0_EXCEPTION_INFO0_REG + 0x10 * (sec_mode)) | ||||
|  | ||||
| #define APM_LL_HP_SEC_MODE_REGION_ATTR(sec_mode, regn_pms) ((regn_pms) << (4 * (sec_mode - 1))) | ||||
| #define APM_LL_HP_SEC_MODE_REGION_ATTR_V  0x00000003U | ||||
| #define APM_LL_HP_SEC_MODE_REGION_ATTR_M(sec_mode) (APM_LL_HP_SEC_MODE_REGION_ATTR_V << (4 * (sec_mode - 1))) | ||||
|  | ||||
| #define APM_LL_HP_MAX_REGION_NUM 15 | ||||
| #define APM_LL_MASTER_MAX        32 | ||||
|  | ||||
| /** | ||||
|  * @brief APM Master ID | ||||
|  */ | ||||
| @@ -46,17 +62,201 @@ typedef enum { | ||||
|     APM_LL_SECURE_MODE_REE2 = 3, /* Rich execution environment mode2 (need to configure APM strategy for this mode) */ | ||||
| } apm_ll_secure_mode_t; | ||||
|  | ||||
| /** | ||||
|  * @brief APM HP access path | ||||
|  */ | ||||
| typedef enum { | ||||
|     APM_LL_HP_ACCESS_PATH_M0 = 0x0, | ||||
|     APM_LL_HP_ACCESS_PATH_M1 = 0x1, | ||||
|     APM_LL_HP_ACCESS_PATH_M2 = 0x2, | ||||
|     APM_LL_HP_ACCESS_PATH_M3 = 0x3, | ||||
| } apm_ll_hp_access_path_t; | ||||
|  | ||||
| /** | ||||
|  * @brief APM exception information | ||||
|  */ | ||||
| typedef struct { | ||||
|     uint8_t  excp_id; | ||||
|     apm_ll_secure_mode_t sec_mode; | ||||
|     uint8_t excp_regn; | ||||
|     uint8_t excp_mode; | ||||
|     uint32_t excp_addr; | ||||
| } apm_hp_m_exception_info_t; | ||||
|  | ||||
| /** | ||||
|  * @brief Set secure mode | ||||
|  * | ||||
|  * @param master_id APM master ID | ||||
|  * @param mode Secure mode | ||||
|  */ | ||||
| static inline void apm_ll_set_master_secure_mode(apm_ll_master_id_t master_id, apm_ll_secure_mode_t mode) | ||||
| static inline void apm_tee_ll_set_master_secure_mode(apm_ll_master_id_t master_id, apm_ll_secure_mode_t sec_mode) | ||||
| { | ||||
|     REG_WRITE(TEE_LL_MODE_CTRL_REG(master_id), mode); | ||||
|     REG_WRITE(TEE_LL_MODE_CTRL_REG(master_id), sec_mode); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief TEE controller clock auto gating enable | ||||
|  * | ||||
|  * @param enable Flag for HP clock auto gating enable/disable | ||||
|  */ | ||||
| static inline void apm_tee_ll_clk_gating_enable(bool enable) | ||||
| { | ||||
|     if (enable) { | ||||
|         REG_SET_BIT(TEE_CLOCK_GATE_REG, TEE_CLK_EN); | ||||
|     } else { | ||||
|         REG_CLR_BIT(TEE_CLOCK_GATE_REG, TEE_CLK_EN); | ||||
|     } | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief enable/disable HP Region access permission filter | ||||
|  * | ||||
|  * @param regn_num Memory Region number | ||||
|  * @param enable Flag for Region access filter enable/disable | ||||
|  */ | ||||
| static inline void apm_hp_ll_region_filter_enable(uint32_t regn_num, bool enable) | ||||
| { | ||||
|     if (enable) { | ||||
|         REG_SET_BIT(HP_APM_REGION_FILTER_EN_REG, BIT(regn_num)); | ||||
|     } else { | ||||
|         REG_CLR_BIT(HP_APM_REGION_FILTER_EN_REG, BIT(regn_num)); | ||||
|     } | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief enable/disable HP access path(M[0:3]) | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  * @param enable    Flag for HP M path filter enable/disable | ||||
|  */ | ||||
| static inline void apm_hp_ll_m_filter_enable(apm_ll_hp_access_path_t hp_m_path, bool enable) | ||||
| { | ||||
|     if (enable) { | ||||
|         REG_SET_BIT(HP_APM_FUNC_CTRL_REG, BIT(hp_m_path)); | ||||
|     } else { | ||||
|         REG_CLR_BIT(HP_APM_FUNC_CTRL_REG, BIT(hp_m_path)); | ||||
|     } | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief HP Region start address configuration | ||||
|  * | ||||
|  * @param regn_num HP Region number to be configured | ||||
|  * @param addr     Region start address | ||||
|  */ | ||||
| static inline void apm_hp_ll_set_region_start_address(uint32_t regn_num, uint32_t addr) | ||||
| { | ||||
|     REG_WRITE(APM_LL_REGION_ADDR_START_REG(regn_num), addr); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief HP Region end address configuration | ||||
|  * | ||||
|  * @param regn_num HP Region number to be configured | ||||
|  * @param addr     Region end address | ||||
|  */ | ||||
| static inline void apm_hp_ll_set_region_end_address(uint32_t regn_num, uint32_t addr) | ||||
| { | ||||
|     REG_WRITE(APM_LL_REGION_ADDR_END_REG(regn_num), addr); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief HP Region pms attributes configuration | ||||
|  * | ||||
|  * @param regn_num Region number to be configured | ||||
|  * @param sec_mode Secure mode of the Master | ||||
|  * @param regn_pms XWR permissions for the given secure mode and Region number | ||||
|  */ | ||||
| static inline void apm_hp_ll_sec_mode_region_attr_config(uint32_t regn_num, apm_ll_secure_mode_t sec_mode, uint32_t regn_pms) | ||||
| { | ||||
|     uint32_t val = 0; | ||||
|     val = REG_READ(APM_LL_REGION_ADDR_ATTR_REG(regn_num)); | ||||
|     val &= ~APM_LL_HP_SEC_MODE_REGION_ATTR_M(sec_mode); | ||||
|     val |= APM_LL_HP_SEC_MODE_REGION_ATTR(sec_mode, regn_pms); | ||||
|     REG_WRITE(APM_LL_REGION_ADDR_ATTR_REG(regn_num), val); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief Get HP access path(M[0:3]) exception status | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  */ | ||||
| static inline uint8_t apm_hp_ll_m_exception_status(apm_ll_hp_access_path_t hp_m_path) | ||||
| { | ||||
|     return REG_READ(APM_LL_TEE_EXCP_STATUS_REG(hp_m_path)); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief Clear HP access path(M[0:3]) exception | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  */ | ||||
| static inline void apm_hp_ll_m_exception_clear(apm_ll_hp_access_path_t hp_m_path) | ||||
| { | ||||
|     REG_SET_BIT(APM_LL_TEE_EXCP_CLR_REG(hp_m_path), HP_APM_M0_REGION_STATUS_CLR); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief Get HP access path(M[0:3]) exception information | ||||
|  * | ||||
|  * @param excp_info Exception related information like addr, | ||||
|  * region, sec_mode and master id | ||||
|  */ | ||||
| static inline void apm_hp_ll_get_m_exception_info(apm_hp_m_exception_info_t *excp_info) | ||||
| { | ||||
|     excp_info->excp_id = REG_GET_FIELD(APM_LL_TEE_EXCP_INFO0_REG(excp_info->sec_mode), HP_APM_M0_EXCEPTION_ID); | ||||
|     excp_info->excp_mode = REG_GET_FIELD(APM_LL_TEE_EXCP_INFO0_REG(excp_info->sec_mode), HP_APM_M0_EXCEPTION_MODE); | ||||
|     excp_info->excp_regn = REG_GET_FIELD(APM_LL_TEE_EXCP_INFO0_REG(excp_info->sec_mode), HP_APM_M0_EXCEPTION_REGION); | ||||
|     excp_info->excp_addr = REG_READ(HP_APM_M0_EXCEPTION_INFO1_REG); | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief Interrupt enable for access path(M[0:3]) | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  * @param enable    Flag for access path interrupt enable/disable | ||||
|  */ | ||||
| static inline void apm_hp_ll_m_interrupt_enable(apm_ll_hp_access_path_t hp_m_path, bool enable) | ||||
| { | ||||
|     if (enable) { | ||||
|         REG_SET_BIT(HP_APM_INT_EN_REG, BIT(hp_m_path)); | ||||
|     } else { | ||||
|         REG_CLR_BIT(HP_APM_INT_EN_REG, BIT(hp_m_path)); | ||||
|     } | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief HP clock auto gating enable | ||||
|  * | ||||
|  * @param enable   Flag for HP clock auto gating enable/disable | ||||
|  */ | ||||
| static inline void apm_hp_ll_clk_gating_enable(bool enable) | ||||
| { | ||||
|     if (enable) { | ||||
|         REG_SET_BIT(HP_APM_CLOCK_GATE_REG, HP_APM_CLK_EN); | ||||
|     } else { | ||||
|         REG_CLR_BIT(HP_APM_CLOCK_GATE_REG, HP_APM_CLK_EN); | ||||
|     } | ||||
| } | ||||
|  | ||||
| /** | ||||
|  * @brief APM/TEE/HP System Reg reset event bypass enable | ||||
|  * | ||||
|  * Disable: tee_reg/apm_reg/hp_system_reg will not only be reset by power-reset, | ||||
|  * but also some reset events. | ||||
|  * Enable: tee_reg/apm_reg/hp_system_reg will only be reset by power-reset. | ||||
|  * Some reset events will be bypassed. | ||||
|  * | ||||
|  * @param enable   Flag for event bypass enable/disable | ||||
|  */ | ||||
| static inline void apm_hp_ll_reset_event_enable(bool enable) | ||||
| { | ||||
|     if (enable) { | ||||
|         REG_SET_BIT(PCR_RESET_EVENT_BYPASS_REG, PCR_RESET_EVENT_BYPASS_APM); | ||||
|     } else { | ||||
|         REG_CLR_BIT(PCR_RESET_EVENT_BYPASS_REG, PCR_RESET_EVENT_BYPASS_APM); | ||||
|     } | ||||
| } | ||||
| #ifdef __cplusplus | ||||
| } | ||||
| #endif | ||||
|   | ||||
							
								
								
									
										134
									
								
								components/hal/include/hal/apm_hal.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										134
									
								
								components/hal/include/hal/apm_hal.h
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,134 @@ | ||||
| /* | ||||
|  * SPDX-FileCopyrightText: 2023 Espressif Systems (Shanghai) CO LTD | ||||
|  * | ||||
|  * SPDX-License-Identifier: Apache-2.0 | ||||
|  */ | ||||
| #pragma once | ||||
|  | ||||
| #include "hal/apm_ll.h" | ||||
|  | ||||
| #ifdef __cplusplus | ||||
| extern "C" { | ||||
| #endif | ||||
|  | ||||
| /** | ||||
|  * @brief Region configuration data. | ||||
|  */ | ||||
| typedef struct { | ||||
|     apm_ll_secure_mode_t sec_mode; | ||||
|     uint32_t regn_num; | ||||
|     uint32_t regn_start_addr; | ||||
|     uint32_t regn_end_addr; | ||||
|     uint32_t regn_pms; | ||||
| } apm_hp_hal_region_config_data_t; | ||||
|  | ||||
| /** | ||||
|  * @brief Secure mode(TEE/REE[0:2] configuration data. | ||||
|  */ | ||||
| typedef struct { | ||||
|     apm_ll_secure_mode_t sec_mode;             /* Secure mode to be configured TEE/REE[0:2]. */ | ||||
|     uint32_t master_ids;                       /* Bit mask for masters to be part of this secure mode. */ | ||||
|     apm_hp_hal_region_config_data_t *pms_data; /* Region configuration data. */ | ||||
| } apm_hp_secure_mode_config_t; | ||||
|  | ||||
| /** | ||||
|  * @brief Set secure mode | ||||
|  * | ||||
|  * @param master_id APM master ID | ||||
|  * @param sec_mode Secure mode | ||||
|  */ | ||||
| void apm_tee_hal_set_master_secure_mode(apm_ll_master_id_t master_id, apm_ll_secure_mode_t sec_mode); | ||||
|  | ||||
| /** | ||||
|  * @brief TEE controller clock auto gating enable | ||||
|  * | ||||
|  * @param enable Flag for HP clock auto gating enable/disable | ||||
|  */ | ||||
| void apm_tee_hal_clk_gating_enable(bool enable); | ||||
|  | ||||
| /** | ||||
|  * @brief enable/disable HP Region access permission filter | ||||
|  * | ||||
|  * @param regn_num Memory Region number | ||||
|  * @param enable Flag for Region access filter enable/disable | ||||
|  */ | ||||
| void apm_hp_hal_region_filter_enable(uint32_t regn_num, bool enable); | ||||
|  | ||||
| /** | ||||
|  * @brief enable/disable HP access path(M[0:3]) | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  * @param enable    Flag for HP M path filter enable/disable | ||||
|  */ | ||||
| void apm_hp_hal_m_filter_enable(apm_ll_hp_access_path_t hp_m_path, bool enable); | ||||
|  | ||||
| /** | ||||
|  * @brief Region configuration | ||||
|  * | ||||
|  * @param pms_data Region configuration data | ||||
|  */ | ||||
| void apm_hp_hal_region_config(const apm_hp_hal_region_config_data_t *pms_data); | ||||
|  | ||||
| /** | ||||
|  * @brief Get HP access path(M[0:3]) exception status | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  */ | ||||
| uint8_t apm_hp_hal_m_exception_status(apm_ll_hp_access_path_t hp_m_path); | ||||
|  | ||||
| /** | ||||
|  * @brief Clear HP access path(M[0:3]) exception | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  */ | ||||
| void apm_hp_hal_m_exception_clear(apm_ll_hp_access_path_t hp_m_path); | ||||
|  | ||||
| /** | ||||
|  * @brief Get HP access path(M[0:3]) exception information | ||||
|  * | ||||
|  * @param excp_info Exception related information like addr, | ||||
|  * region, sec_mode and master id | ||||
|  */ | ||||
| void apm_hp_hal_get_m_exception_info(apm_hp_m_exception_info_t *excp_info); | ||||
|  | ||||
| /** | ||||
|  * @brief Interrupt enable for access path(M[0:3]) | ||||
|  * | ||||
|  * @param hp_m_path HP access path | ||||
|  * @param enable    Flag for access path interrupt enable/disable | ||||
|  */ | ||||
| void apm_hp_hal_m_interrupt_enable(apm_ll_hp_access_path_t hp_m_path, bool enable); | ||||
|  | ||||
| /** | ||||
|  * @brief HP clock auto gating enable | ||||
|  * | ||||
|  * @param enable   Flag for HP clock auto gating enable/disable | ||||
|  */ | ||||
| void apm_hp_hal_clk_gating_enable(bool enable); | ||||
|  | ||||
| /** | ||||
|  * @brief TEE/REE execution environment configuration. | ||||
|  * | ||||
|  * This API will be called from TEE mode initialization code which is | ||||
|  * responsible to setup TEE/REE execution environment. | ||||
|  * It includes, allocation of all bus masters, memory ranges and other | ||||
|  * peripherals to the given secure mode. | ||||
|  * All this information should be passed by the TEE mode initialization code. | ||||
|  */ | ||||
| void apm_hp_hal_master_sec_mode_config(apm_hp_secure_mode_config_t *sec_mode_data); | ||||
|  | ||||
| /** | ||||
|  * @brief APM/TEE/HP System Reg reset event bypass enable | ||||
|  * | ||||
|  * Disable: tee_reg/apm_reg/hp_system_reg will not only be reset by power-reset, | ||||
|  * but also some reset events. | ||||
|  * Enable: tee_reg/apm_reg/hp_system_reg will only be reset by power-reset. | ||||
|  * Some reset events will be bypassed. | ||||
|  * | ||||
|  * @param enable   Flag for event bypass enable/disable | ||||
|  */ | ||||
| void apm_hp_hal_reset_event_enable(bool enable); | ||||
|  | ||||
| #ifdef __cplusplus | ||||
| } | ||||
| #endif | ||||
							
								
								
									
										23
									
								
								components/hal/include/hal/apm_types.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										23
									
								
								components/hal/include/hal/apm_types.h
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,23 @@ | ||||
| /* | ||||
|  * SPDX-FileCopyrightText: 2023 Espressif Systems (Shanghai) CO LTD | ||||
|  * | ||||
|  * SPDX-License-Identifier: Apache-2.0 | ||||
|  */ | ||||
| #pragma once | ||||
|  | ||||
| #ifdef __cplusplus | ||||
| extern "C" { | ||||
| #endif | ||||
|  | ||||
| /** | ||||
|  * @brief APM Region PMS authority | ||||
|  */ | ||||
| typedef enum { | ||||
|     APM_REGION_PMS_X = 0x1, /*!< Region executive authority. */ | ||||
|     APM_REGION_PMS_W = 0x2, /*!< Region write authority. */ | ||||
|     APM_REGION_PMS_R = 0x4, /*!< Region read authority. */ | ||||
| } apm_region_pms_t; | ||||
|  | ||||
| #ifdef __cplusplus | ||||
| } | ||||
| #endif | ||||
| @@ -99,10 +99,6 @@ config SOC_BOD_SUPPORTED | ||||
|     bool | ||||
|     default y | ||||
|  | ||||
| config SOC_APM_SUPPORTED | ||||
|     bool | ||||
|     default y | ||||
|  | ||||
| config SOC_XTAL_SUPPORT_32M | ||||
|     bool | ||||
|     default y | ||||
|   | ||||
| @@ -62,7 +62,7 @@ | ||||
| // #define SOC_FLASH_ENC_SUPPORTED         1 // TODO: IDF-6282 | ||||
| // #define SOC_SECURE_BOOT_SUPPORTED       1 // TODO: IDF-6281 | ||||
| #define SOC_BOD_SUPPORTED               1 | ||||
| #define SOC_APM_SUPPORTED               1 | ||||
| // #define SOC_APM_SUPPORTED               1 // TODO: IDF-6277 | ||||
|  | ||||
| /*-------------------------- XTAL CAPS ---------------------------------------*/ | ||||
| #define SOC_XTAL_SUPPORT_32M            1 | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Mahavir Jain
					Mahavir Jain