xref: /rk3399_ARM-atf/plat/arm/soc/common/soc_css_security.c (revision 09d40e0e08283a249e7dce0e106c07c5141f9b7e)
1b4315306SDan Handley /*
2fd116b9fSRoberto Vargas  * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
3b4315306SDan Handley  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
5b4315306SDan Handley  */
6b4315306SDan Handley 
7b4315306SDan Handley #include <platform_def.h>
8*09d40e0eSAntonio Nino Diaz 
9*09d40e0eSAntonio Nino Diaz #include <drivers/arm/nic_400.h>
10*09d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
11*09d40e0eSAntonio Nino Diaz 
12*09d40e0eSAntonio Nino Diaz #include <board_css_def.h>
13fd116b9fSRoberto Vargas #include <soc_css.h>
14b4315306SDan Handley #include <soc_css_def.h>
15b4315306SDan Handley 
16b4315306SDan Handley void soc_css_init_nic400(void)
17b4315306SDan Handley {
18b4315306SDan Handley 	/*
19b4315306SDan Handley 	 * NIC-400 Access Control Initialization
20b4315306SDan Handley 	 *
21b4315306SDan Handley 	 * Define access privileges by setting each corresponding bit to:
22b4315306SDan Handley 	 *   0 = Secure access only
23b4315306SDan Handley 	 *   1 = Non-secure access allowed
24b4315306SDan Handley 	 */
25b4315306SDan Handley 
26b4315306SDan Handley 	/*
27b4315306SDan Handley 	 * Allow non-secure access to some SOC regions, excluding UART1, which
282431d00fSAlexei Fedorov 	 * remains secure (unless CSS_NON_SECURE_UART is set).
29b4315306SDan Handley 	 * Note: This is the NIC-400 device on the SOC
30b4315306SDan Handley 	 */
31b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
32b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_USB_EHCI), ~0);
33b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
34b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_TLX_MASTER), ~0);
35b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
36b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_USB_OHCI), ~0);
37b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
38b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_PL354_SMC), ~0);
39b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
40b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_APB4_BRIDGE), ~0);
412431d00fSAlexei Fedorov #if  CSS_NON_SECURE_UART
422431d00fSAlexei Fedorov 	/* Configure UART for non-secure access */
432431d00fSAlexei Fedorov 	mmio_write_32(SOC_CSS_NIC400_BASE +
442431d00fSAlexei Fedorov 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_BOOTSEC_BRIDGE), ~0);
452431d00fSAlexei Fedorov #else
46b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
47b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_BOOTSEC_BRIDGE),
48b4315306SDan Handley 		~SOC_CSS_NIC400_BOOTSEC_BRIDGE_UART1);
492431d00fSAlexei Fedorov #endif /* CSS_NON_SECURE_UART */
50b4315306SDan Handley 
51b4315306SDan Handley }
52b4315306SDan Handley 
53b4315306SDan Handley 
54b4315306SDan Handley #define PCIE_SECURE_REG		0x3000
55b4315306SDan Handley /* Mask uses REG and MEM access bits */
56b4315306SDan Handley #define PCIE_SEC_ACCESS_MASK	((1 << 0) | (1 << 1))
57b4315306SDan Handley 
58b4315306SDan Handley void soc_css_init_pcie(void)
59b4315306SDan Handley {
60b4315306SDan Handley #if !PLAT_juno
61b4315306SDan Handley 	/*
62b4315306SDan Handley 	 * Do not initialize PCIe in emulator environment.
63b4315306SDan Handley 	 * Platform ID register not supported on Juno
64b4315306SDan Handley 	 */
65b4315306SDan Handley 	if (BOARD_CSS_GET_PLAT_TYPE(BOARD_CSS_PLAT_ID_REG_ADDR) ==
66b4315306SDan Handley 			BOARD_CSS_PLAT_TYPE_EMULATOR)
67b4315306SDan Handley 		return;
68b4315306SDan Handley #endif /* PLAT_juno */
69b4315306SDan Handley 
70b4315306SDan Handley 	/*
71b4315306SDan Handley 	 * PCIE Root Complex Security settings to enable non-secure
72b4315306SDan Handley 	 * access to config registers.
73b4315306SDan Handley 	 */
74b4315306SDan Handley 	mmio_write_32(SOC_CSS_PCIE_CONTROL_BASE + PCIE_SECURE_REG,
75b4315306SDan Handley 			PCIE_SEC_ACCESS_MASK);
76b4315306SDan Handley }
77