xref: /rk3399_ARM-atf/plat/arm/soc/common/soc_css_security.c (revision 883852ca0ad6e4f96d86fbe532c3ec12458f9d74)
1b4315306SDan Handley /*
2b4315306SDan Handley  * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
3b4315306SDan Handley  *
4b4315306SDan Handley  * Redistribution and use in source and binary forms, with or without
5b4315306SDan Handley  * modification, are permitted provided that the following conditions are met:
6b4315306SDan Handley  *
7b4315306SDan Handley  * Redistributions of source code must retain the above copyright notice, this
8b4315306SDan Handley  * list of conditions and the following disclaimer.
9b4315306SDan Handley  *
10b4315306SDan Handley  * Redistributions in binary form must reproduce the above copyright notice,
11b4315306SDan Handley  * this list of conditions and the following disclaimer in the documentation
12b4315306SDan Handley  * and/or other materials provided with the distribution.
13b4315306SDan Handley  *
14b4315306SDan Handley  * Neither the name of ARM nor the names of its contributors may be used
15b4315306SDan Handley  * to endorse or promote products derived from this software without specific
16b4315306SDan Handley  * prior written permission.
17b4315306SDan Handley  *
18b4315306SDan Handley  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19b4315306SDan Handley  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20b4315306SDan Handley  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21b4315306SDan Handley  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22b4315306SDan Handley  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23b4315306SDan Handley  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24b4315306SDan Handley  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25b4315306SDan Handley  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26b4315306SDan Handley  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27b4315306SDan Handley  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28b4315306SDan Handley  * POSSIBILITY OF SUCH DAMAGE.
29b4315306SDan Handley  */
30b4315306SDan Handley 
31b4315306SDan Handley #include <board_css_def.h>
32b4315306SDan Handley #include <mmio.h>
33*883852caSVikram Kanigiri #include <nic_400.h>
34b4315306SDan Handley #include <platform_def.h>
35b4315306SDan Handley #include <soc_css_def.h>
36b4315306SDan Handley 
37b4315306SDan Handley void soc_css_init_nic400(void)
38b4315306SDan Handley {
39b4315306SDan Handley 	/*
40b4315306SDan Handley 	 * NIC-400 Access Control Initialization
41b4315306SDan Handley 	 *
42b4315306SDan Handley 	 * Define access privileges by setting each corresponding bit to:
43b4315306SDan Handley 	 *   0 = Secure access only
44b4315306SDan Handley 	 *   1 = Non-secure access allowed
45b4315306SDan Handley 	 */
46b4315306SDan Handley 
47b4315306SDan Handley 	/*
48b4315306SDan Handley 	 * Allow non-secure access to some SOC regions, excluding UART1, which
49b4315306SDan Handley 	 * remains secure.
50b4315306SDan Handley 	 * Note: This is the NIC-400 device on the SOC
51b4315306SDan Handley 	 */
52b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
53b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_USB_EHCI), ~0);
54b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
55b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_TLX_MASTER), ~0);
56b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
57b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_USB_OHCI), ~0);
58b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
59b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_PL354_SMC), ~0);
60b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
61b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_APB4_BRIDGE), ~0);
62b4315306SDan Handley 	mmio_write_32(SOC_CSS_NIC400_BASE +
63b4315306SDan Handley 		NIC400_ADDR_CTRL_SECURITY_REG(SOC_CSS_NIC400_BOOTSEC_BRIDGE),
64b4315306SDan Handley 		~SOC_CSS_NIC400_BOOTSEC_BRIDGE_UART1);
65b4315306SDan Handley 
66b4315306SDan Handley }
67b4315306SDan Handley 
68b4315306SDan Handley 
69b4315306SDan Handley #define PCIE_SECURE_REG		0x3000
70b4315306SDan Handley /* Mask uses REG and MEM access bits */
71b4315306SDan Handley #define PCIE_SEC_ACCESS_MASK	((1 << 0) | (1 << 1))
72b4315306SDan Handley 
73b4315306SDan Handley void soc_css_init_pcie(void)
74b4315306SDan Handley {
75b4315306SDan Handley #if !PLAT_juno
76b4315306SDan Handley 	/*
77b4315306SDan Handley 	 * Do not initialize PCIe in emulator environment.
78b4315306SDan Handley 	 * Platform ID register not supported on Juno
79b4315306SDan Handley 	 */
80b4315306SDan Handley 	if (BOARD_CSS_GET_PLAT_TYPE(BOARD_CSS_PLAT_ID_REG_ADDR) ==
81b4315306SDan Handley 			BOARD_CSS_PLAT_TYPE_EMULATOR)
82b4315306SDan Handley 		return;
83b4315306SDan Handley #endif /* PLAT_juno */
84b4315306SDan Handley 
85b4315306SDan Handley 	/*
86b4315306SDan Handley 	 * PCIE Root Complex Security settings to enable non-secure
87b4315306SDan Handley 	 * access to config registers.
88b4315306SDan Handley 	 */
89b4315306SDan Handley 	mmio_write_32(SOC_CSS_PCIE_CONTROL_BASE + PCIE_SECURE_REG,
90b4315306SDan Handley 			PCIE_SEC_ACCESS_MASK);
91b4315306SDan Handley }
92