This application claims priority to FI 20215598 filed May 20, 2021, the entire contents of which is hereby incorporated by reference.
Various example embodiments relate to bus decoders.
In computing design one of the main goals is to realise reliable and fast operation of devices. In modern computing design the circuits are complex comprising a large number of different components. A typical structure used in circuit design is bus design, where a bus is used to connect components to each other. For example, a given number of master or manager units may be connected to a given number of slave or subordinate units via one or more buses. Slave units may be memories, for example.
Security aspects in device design are taken increasingly into account. It has become more and more important that data and data units are accessed only by those units that are authorized to do so.
According to an aspect, there is provided a bus decoder operationally connectable to a set of master units and a set of slave units, comprising a circuitry for causing the decoder to: receive an address from a master unit trying to access a slave unit; map the received address to a slave address; associate default access permissions to the master-slave connection; determine additional access permissions associated with the master unit and the slave address; enable the master-slave connection if additional access permissions allow the master unit to access the slave, otherwise reject the connection.
According to another aspect, there is provided a method for providing an access to a slave unit, the method comprising: receiving an address from a master unit trying to access a slave unit; mapping the received address to a slave address; associating default access permissions to the master-slave connection; determining additional access permissions associated with the master unit and the slave address; enabling the master-slave connection if additional access permissions allow the master unit to access the slave, otherwise reject the connection.
One of the advantaged provided by the aspects is that proposed bus decoder does not steal time neither from master or slave bus path. It adds a very low overhead to bus decoding time as the lookups are parallel and not serial.
Embodiments are defined in the dependent claims. The scope of protection sought for various embodiments is set out by the independent claims.
The embodiments and features, if any, described in this specification that do not fall under the scope of the independent claims are to be interpreted as examples useful for understanding various embodiments of the invention.
In the following, example embodiments will be described in greater detail with reference to the attached drawings, in which
Integrated circuits or chips are designed for numerous purposes with different designs. System on a chip, SoC, is one kind of integrated circuit where a desired system is designed on a circuit, utilizing many kinds of components. For example, a computer or other kind of electronic system may be designed on a chip.
The masters may be, for example, processors (Central Processing Units CPUs, Digital Signal Processors DSPs), Direct Memory Access (DMA) modules (modules designed for data transfers between memories or between peripherals or memory), peripherals with built-in DMA, or bridges connecting one bus to another bus. The bridge may be a slave on one bus and a master on the other bus.
The slaves may be, for example, memories (non-volatile memory, random access memory RAM, external memory), peripherals (configuration and data registers) or bridges, connecting one bus to another.
The above list are merely non-limiting examples of possible masters and slaves. The embodiments are not limited to above examples as they do not depend on the types of master or slaves. The embodiments can be applied to any integrated circuit comprising a bus and a bus decoder. The embodiments can be applied especially in integrated circuits, where masters may have different privileges.
Typically, the bus 104 comprises a bus decoder, which maps address received from a master 100A, 100B, 100C to a slave 102A, 102B, 102C, 102D address.
The example shows two buses, Bus 0200 and Bus 1202. Each bus has its own bus decoder 204, 206.
Masters 100A, 100B, 100C are connected to the first bus 200 and masters 208A, 208B are connected to the second bus 202. Slaves 102A, 102B, 102C are connected to the first bus 200 and slaves 210A, 210B to the second bus 202.
In this example, each bus also comprises a default slave 212A, 212B, which is configured to act as an error handler in case there is a transaction, which cannot be connected to any actual slave of the system.
In an embodiment, the system further comprises a global slave 214A, which is used when a transaction is not matched to any local slave of a bus. A global slave may comprise a bridge 214B to another bus of the system, in this example to the second bus 202. The device may also act as a master 214C to the bus 202.
There are three example transactions illustrated in
Master 100B tries to access a slave address. The bus decoder 204 determines that the address does not match any slave on the bus, and it is connected 218 to default slave 212A, which generates a bus error.
Master 100A tries to access a slave 210A. The bus decoder 204 determines transaction is not matched to any local slave and the bus decoder connects the transaction 220 through global slave 214A, the bridge 214B and the from master 214C to the desired slave 210A.
In some cases, there is a need to perform security filtering, i.e. limit the permissions of master to access the slaves. In prior art, such solutions are based on separate modules on master side, which steal time from bus access path of the masters. Alternatively, the security filtering has been performed by an address filter on the slave side, which steals time from slave decoding cycle. In both above cases the security filtering is independent of bus decoder.
The figure shows three masters or master units 100A, 100B, 100C, which are connected to a set of slave units 102A, 102B, 102C, 102D and a global slave 214A via a bus matrix 104. The figure further shows a bus decoder 204. The bus decoder comprises a set of master decoders 300A, 300B, 300C. In an embodiment, the number of master decoders corresponds to the number of masters connected to the bus decoder. The bus decoder further comprises tables or data bases, which may be denoted as a region table 304 and an override table 306.
In step 400, the bus decoder is configured to receive an address from a master unit trying to access a slave unit.
In step 402, the bus decoder is configured to map the received address to a slave address.
In step 404, the bus decoder is configured to associate default access permissions to the master-slave connection. In an embodiment, each slave connected to the bus matrix is assigned a default access permission, which is applicable to all addresses within the same slave and which applies to all masters accessing the slave. Each slave may have different default access permissions. The default permissions may have been set independently for read, write, execute and secure processes.
In step 406, the bus decoder is configured to determine additional access permissions associated with the master unit and the slave address. The additional access permissions depend on the master trying to access the slave. In an embodiment, the additional access permissions can be set up per master or shared for a group of masters.
In an embodiment, one or more masters comprise a unique identity. In an embodiment, whenever a master tries to access a slave the access request may comprise the master identity. The identity may be denoted with a unique OwnerID sideband information, for example as an AxUSER signal, in systems utilising Advanced eXtensible Interface, AXI.
For example, the system may comprise a set of system masters with the same access privileges, each having a unique identification. They may be located anywhere in the system, not necessarily in local interconnect. Various interconnects may be connected to each other by a set of bridges and transactions may be routed to different parts of the system than where the system master is located. In an embodiment, when receiving an address from a system master, and the unique identification of the master, the bus decoder may be configured to determine additional access permissions based in part to the unique identification.
In step 408, the bus decoder is configured to enable the master-slave connection if additional access permissions allow the master unit to access the slave, otherwise reject the connection.
In an embodiment, the region table 304 comprises a set of slave entries, each containing the slave number, start address, and address mask of a slave region. The region table also comprises default access permissions. In an embodiment, the region table is shared among all master decoders, so that slave entries can be shared among masters. In an embodiment, each master is configured to see only a specific subset of the full region table. Thus, the connection between region entries and master decoders can be viewed as a sparsely populated matrix, defined by a static configuration for each device, which may have been defined at design time. mapping between addresses from master units and slave addresses and default permissions of slave addresses.
In an embodiment, the override table 306 defines overriding access permissions for any physical address range, which may map to a subset of a slave address range. Each master decoder may be connected to a subset of the override entries, also mapped as a sparsely populated matrix.
In an embodiment, the override table 306 comprises entries for slave address ranges, an entry comprising start and end addresses for the entry, indication which default access permissions are overridden, additional access permissions for the overridden default permissions, indications of master units the additional access permissions relate to, and indication of remapping.
In an embodiment, the bus decoder may be configured to determine the identity of the master requesting access to a slave and determine access permissions utilizing the identity and the override table.
In an embodiment, both or one of the region and override tables may comprise a mix of hardwired parametrized constants and programmable register entries.
As mentioned, in an embodiment, if the bus decoder detects that the address from a master does not match to any local slave of the bus connected to the bus decoder, the bus decoder is configured to a global slave 214A which may forward the connection to another bus.
Thus, in an embodiment, the master decoder comprises independent decoders 500, 506 for read and write streams. Both operations may be run concurrently.
The proposed bus decoder performing security filtering does not steal time neither from the master or slave bus path. It adds a very low overhead to bus decoding time as the lookups are parallel and not serial. It provides security filtering at a very low cost, as same information may be used to define slave regions and permission regions.
As the additional access permissions may be associated with a master unit, complex security patterns are possible. Different permissions regarding the same slave region may be given to different masters. Multiple transactions owners are supported in the system.
The address 600 from the master is provided to a region decoder 604 and the address 600 and the identity 602 of the master to the override decoder 606.
In an embodiment, the region decoder is configured to receive the address 600, map the received address to a slave address and associate default access permissions to the master-slave connection. The information 608 may be provided to an override unit 610.
In an embodiment, the override decoder 606 is configured to determine additional access permissions associated with the master unit and the slave address. The information 612 may be provided to an override unit 610.
In an embodiment, the override unit 610 enables the master-slave connection if additional access permissions allow the master unit to access the slave, otherwise reject the connection.
In an embodiment, in systems utilising Advanced eXtensible Interface, AXI, there may be a further check in permission check unit 614, based on AxPROT signal 616 which may provide additional access protection, for example privileged/unprivileged access or instruction/data access.
At the output of the bus decoder is the slave address 618.
In an embodiment, the bus decoder is configured to apply a configurable delay to slave access. The bus decoder may comprise a delay table 620, which may be used to introduce programmable delay to slave access for debugging purposes. In an embodiment, the delay information 622 may be provided to real-time choke, for stress testing of the system for slow slaves. In some system, some slaves may have varying latency. The delay table may comprise a given delay value for a slave address, simulating a maximum delay regarding the slave. The real-time choke (not shown) may delay a given transaction with a given number of cycles indicated in the delay table. Thus, a worst-case scenario for a slave latency may be simulated.
In a further embodiment, the override decoder may override the slave decoding by the region decoder and provide as a result a different slave address, thus remapping the master to a different slave or different memory address of a slave.
The proposed bus decoder supports remapping of one address range to another.
In a further embodiment, the override decoder may apply an offset 624 to a slave address. Thus, the master may be routed to a different slave or different memory address of a slave by introducing the offset. The offset may be programmable offset providing a remapping functionality. The offset may also direct the access to a different bus through the global slave.
In an embodiment, the region table and decoder may use hardwired entries, while the override table and decoder may use programmable entries. However, this may be configurable option.
In an embodiment, a master connected to the bus decoder may only access a configurable subset of addresses in region and override tables. Thus, a master may use a mix of region/override entries shared with other masters, and unique region/override entries not seen by other masters. The connection between region/override and masters can be viewed as a sparsely populated matrix configured at design time.
In an embodiment, a slave address range can be broken up into multiple region/override entries, in case different sub-ranges of the address space has different default access permissions.
The proposed apparatus can be realized as a circuitry operationally connected or connectable to one or more master units and slave units and a bus.
As used in this application, the term ‘circuitry’ refers to one or more of the following: hardware-only circuit implementations such as implementations in only analogue and/or digital circuitry; combinations of hardware circuits and software and/or firmware; and circuits such as a microprocessor(s) or a portion of a microprocessor(s) that require software or firmware for operation, even if the software or firmware is not physically present. This definition of ‘circuitry’ applies to uses of this term in this application. As a further example, as used in this application, the term “circuitry” would also cover an implementation of merely a processor (or multiple processors) or portion of a processor, e.g. one core of a multi-core processor, and accompanying software and/or firmware. The term “circuitry” would also cover, for example and if applicable to the particular element, a base-band integrated circuit, an application-specific integrated circuit (ASIC), and/or a field-programmable grid array (FPGA) circuit for the apparatus according to an embodiment of the invention.
Embodiments described herein are applicable to various systems where memory circuits are accessed. defined above but also to other systems. The protocols used, the specifications of the systems and their elements develop rapidly. Such development may require extra changes to the described embodiments. Therefore, all words and expressions should be interpreted broadly, and they are intended to illustrate, not to restrict, the embodiment. It will be obvious to a person skilled in the art that, as technology advances, the inventive concept can be implemented in various ways. Embodiments are not limited to the examples described above but may vary within the scope of the claims.
Number | Date | Country | Kind |
---|---|---|---|
20215598 | May 2021 | FI | national |
Number | Name | Date | Kind |
---|---|---|---|
5936867 | Ashuri | Aug 1999 | A |
5987620 | Tran | Nov 1999 | A |
6195734 | Porterfield | Feb 2001 | B1 |
6247137 | Wickeraad | Jun 2001 | B1 |
6356132 | Mastrocola | Mar 2002 | B1 |
6813722 | Yeh | Nov 2004 | B1 |
7676542 | Moser | Mar 2010 | B2 |
8099624 | Saxena | Jan 2012 | B1 |
8640194 | Inoue | Jan 2014 | B2 |
20020198609 | Baron | Dec 2002 | A1 |
20030005345 | Fletcher | Jan 2003 | A1 |
20030172214 | Moyer | Sep 2003 | A1 |
20040237003 | Adkisson | Nov 2004 | A1 |
20040243823 | Moyer et al. | Dec 2004 | A1 |
20050039001 | Hudis | Feb 2005 | A1 |
20050091179 | Kalthoff | Apr 2005 | A1 |
20050235084 | Nariai | Oct 2005 | A1 |
20060063590 | Abassi | Mar 2006 | A1 |
20060155903 | Soga | Jul 2006 | A1 |
20060155904 | Murakami | Jul 2006 | A1 |
20060195449 | Hunter | Aug 2006 | A1 |
20070073695 | Conlan | Mar 2007 | A1 |
20070156691 | Sturms | Jul 2007 | A1 |
20070300287 | Wynne | Dec 2007 | A1 |
20080172498 | Boucard | Jul 2008 | A1 |
20090037779 | Kawakami | Feb 2009 | A1 |
20090182974 | Greiner | Jul 2009 | A1 |
20100005213 | Butter et al. | Jan 2010 | A1 |
20100153862 | Schreiber | Jun 2010 | A1 |
20120101952 | Raleigh | Apr 2012 | A1 |
20120198192 | Balasubramanian | Aug 2012 | A1 |
20130111168 | Circello | May 2013 | A1 |
20130232189 | Lewis | Sep 2013 | A1 |
20140007154 | Seibold | Jan 2014 | A1 |
20140245373 | Martin | Aug 2014 | A1 |
20150095662 | Jejurikar | Apr 2015 | A1 |
20150248730 | Pilot | Sep 2015 | A1 |
20150261688 | Craddock | Sep 2015 | A1 |
20150295916 | Sanso | Oct 2015 | A1 |
20160124400 | Kanayama | May 2016 | A1 |
20160224021 | Kuikka | Aug 2016 | A1 |
20170090983 | Kovalev | Mar 2017 | A1 |
20170154166 | Klein | Jun 2017 | A1 |
20170171214 | Anderson | Jun 2017 | A1 |
20170185345 | Lim | Jun 2017 | A1 |
20170295094 | Jackson | Oct 2017 | A1 |
20170346830 | Goldfarb | Nov 2017 | A1 |
20180157590 | Persson | Jun 2018 | A1 |
20180225466 | Ducatel | Aug 2018 | A1 |
20190050587 | Dang | Feb 2019 | A1 |
20190095356 | Milojicic | Mar 2019 | A1 |
20190179645 | Prasad | Jun 2019 | A1 |
20190306170 | Wang | Oct 2019 | A1 |
20190324806 | Javre | Oct 2019 | A1 |
20200050454 | Barnes | Feb 2020 | A1 |
20200394141 | Ramagiri | Dec 2020 | A1 |
20210400479 | Li | Dec 2021 | A1 |
20230076376 | Hoel | Mar 2023 | A1 |
Number | Date | Country |
---|---|---|
1 571 559 | Sep 2005 | EP |
2020002534 | Jan 2020 | WO |
Entry |
---|
Search Report for FI20215598, dated Dec. 17, 2021, 2 pages. |
“PIC32 Family Reference Manual. Microchip Technology Inc.”, [online], Nov. 2013, section 48, retrieved Dec. 15, 2021, https://microchip.com/downloads/en/DeviceDoc/60001214A.pdf, 28 pages. |
“SPC58 line—How to use the Memory Protection Layers”, STMicroelectronics, [online], May 2019, retrieved Dec. 12, 2021, http://www.st.com/respuree/technical_note/tn1289-spc58-line--how-to-use-the-memory-protection-layers-stmicroelectronics.pdf , 52 pages. |
“ARM® CoreLinkTM TZC-400 TrustZone Address Space Controller”, Technical Reference Manual, Feb. 20, 2014, https://developer.arm.com/documentation/ddi0504/c , 76 pages. |
Extended European Search Report issued on Sep. 23, 2022 in corresponding European Application No. 22173274.6, 3 pages. |
Number | Date | Country | |
---|---|---|---|
20220374377 A1 | Nov 2022 | US |