Altera cyclone V Technical Reference page 761

Hard processor system
Hide thumbs Also See for cyclone V:
Table of Contents

Advertisement

cv_5v4
2016.10.28
Example of Configuration for TrustZone
For a TrustZone configuration, memory is TrustZone divided into a range of memory accessible by secure
masters and a range of memory accessible by non-secure masters. The two memory address ranges may
have a range of memory that overlaps.
This example implements the following memory configuration:
• 2 GB total RAM size
• 0—512 MB dedicated secure area
• 513—576 MB shared area
• 577—2048 MB dedicated non-secure area
Figure 11-8: Example Memory Configuration
In this example, each port is configured by default to disallow all accesses. The following table shows the
two rules programmed into the memory protection table.
Table 11-9: Rules in Memory Protection Table for Example Configuration
Rule #
Port Mask
1
0x3FF (1023)
2
0x3FF (1023)
The port mask value, AxID Low, and AxID High, apply to all ports and all transfers within those ports.
Each access request is evaluated against the memory protection table, and will fail unless there is a rule
match allowing a transaction to complete successfully.
SDRAM Controller Subsystem
Send Feedback
2048
1024
576
512
0
AxID
AxID High
Low
0x000
0xFFF (4095)
0x000
0xFFF (4095)
Example of Configuration for TrustZone
Non-Secure
2 GB
Shared
Secure
Address
Address
Low
High
0
576
0x1
512
2047
0x0
protruledata.security
Fail/Allow
Allow
Allow
Altera Corporation
11-23

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents