1b4315306SDan Handley /*
2fd116b9fSRoberto Vargas * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved.
3b4315306SDan Handley *
482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause
5b4315306SDan Handley */
6b4315306SDan Handley
7b4315306SDan Handley #include <platform_def.h>
809d40e0eSAntonio Nino Diaz
909d40e0eSAntonio Nino Diaz #include <drivers/arm/nic_400.h>
1009d40e0eSAntonio Nino Diaz #include <lib/mmio.h>
11*bd9344f6SAntonio Nino Diaz #include <plat/arm/soc/common/soc_css.h>
12b4315306SDan Handley
soc_css_init_nic400(void)13b4315306SDan Handley void soc_css_init_nic400(void)
14b4315306SDan Handley {
15b4315306SDan Handley /*
16b4315306SDan Handley * NIC-400 Access Control Initialization
17b4315306SDan Handley *
18b4315306SDan Handley * Define access privileges by setting each corresponding bit to:
19b4315306SDan Handley * 0 = Secure access only
20b4315306SDan Handley * 1 = Non-secure access allowed
21b4315306SDan Handley */
22b4315306SDan Handley
23b4315306SDan Handley /*
24b4315306SDan Handley * Allow non-secure access to some SOC regions, excluding UART1, which
252431d00fSAlexei Fedorov * remains secure (unless CSS_NON_SECURE_UART is set).
26b4315306SDan Handley * Note: This is the NIC-400 device on the SOC
27b4315306SDan Handley */
28b4315306SDan Handley mmio_write_32(SOC_CSS_NIC400_BASE +
29b4315306SDan Handley NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_USB_EHCI), ~0);
30b4315306SDan Handley mmio_write_32(SOC_CSS_NIC400_BASE +
31b4315306SDan Handley NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_TLX_MASTER), ~0);
32b4315306SDan Handley mmio_write_32(SOC_CSS_NIC400_BASE +
33b4315306SDan Handley NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_USB_OHCI), ~0);
34b4315306SDan Handley mmio_write_32(SOC_CSS_NIC400_BASE +
35b4315306SDan Handley NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_PL354_SMC), ~0);
36b4315306SDan Handley mmio_write_32(SOC_CSS_NIC400_BASE +
37b4315306SDan Handley NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_APB4_BRIDGE), ~0);
382431d00fSAlexei Fedorov #if CSS_NON_SECURE_UART
392431d00fSAlexei Fedorov /* Configure UART for non-secure access */
402431d00fSAlexei Fedorov mmio_write_32(SOC_CSS_NIC400_BASE +
412431d00fSAlexei Fedorov NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_BOOTSEC_BRIDGE), ~0);
422431d00fSAlexei Fedorov #else
43b4315306SDan Handley mmio_write_32(SOC_CSS_NIC400_BASE +
44b4315306SDan Handley NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_BOOTSEC_BRIDGE),
45b4315306SDan Handley ~SOC_CSS_NIC400_BOOTSEC_BRIDGE_UART1);
462431d00fSAlexei Fedorov #endif /* CSS_NON_SECURE_UART */
47b4315306SDan Handley
48b4315306SDan Handley }
49b4315306SDan Handley
50b4315306SDan Handley
51b4315306SDan Handley #define PCIE_SECURE_REG 0x3000
52b4315306SDan Handley /* Mask uses REG and MEM access bits */
53b4315306SDan Handley #define PCIE_SEC_ACCESS_MASK ((1 << 0) | (1 << 1))
54b4315306SDan Handley
soc_css_init_pcie(void)55b4315306SDan Handley void soc_css_init_pcie(void)
56b4315306SDan Handley {
57b4315306SDan Handley #if !PLAT_juno
58b4315306SDan Handley /*
59b4315306SDan Handley * Do not initialize PCIe in emulator environment.
60b4315306SDan Handley * Platform ID register not supported on Juno
61b4315306SDan Handley */
62b4315306SDan Handley if (BOARD_CSS_GET_PLAT_TYPE(BOARD_CSS_PLAT_ID_REG_ADDR) ==
63b4315306SDan Handley BOARD_CSS_PLAT_TYPE_EMULATOR)
64b4315306SDan Handley return;
65b4315306SDan Handley #endif /* PLAT_juno */
66b4315306SDan Handley
67b4315306SDan Handley /*
68b4315306SDan Handley * PCIE Root Complex Security settings to enable non-secure
69b4315306SDan Handley * access to config registers.
70b4315306SDan Handley */
71b4315306SDan Handley mmio_write_32(SOC_CSS_PCIE_CONTROL_BASE + PCIE_SECURE_REG,
72b4315306SDan Handley PCIE_SEC_ACCESS_MASK);
73b4315306SDan Handley }
74