70 lines
2.3 KiB
C
70 lines
2.3 KiB
C
/*
|
|
* Copyright (c) 2014-2015, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <mmio.h>
|
|
#include <nic_400.h>
|
|
#include <plat_arm.h>
|
|
#include <soc_css.h>
|
|
#include "juno_def.h"
|
|
|
|
|
|
/*******************************************************************************
|
|
* Set up the MMU-401 SSD tables. The power-on configuration has all stream IDs
|
|
* assigned to Non-Secure except some for the DMA-330. Assign those back to the
|
|
* Non-Secure world as well, otherwise EL1 may end up erroneously generating
|
|
* (untranslated) Secure transactions if it turns the SMMU on.
|
|
******************************************************************************/
|
|
static void init_mmu401(void)
|
|
{
|
|
uint32_t reg = mmio_read_32(MMU401_DMA330_BASE + MMU401_SSD_OFFSET);
|
|
reg |= 0x1FF;
|
|
mmio_write_32(MMU401_DMA330_BASE + MMU401_SSD_OFFSET, reg);
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Program CSS-NIC400 to allow non-secure access to some CSS regions.
|
|
******************************************************************************/
|
|
static void css_init_nic400(void)
|
|
{
|
|
/* Note: This is the NIC-400 device on the CSS */
|
|
mmio_write_32(PLAT_SOC_CSS_NIC400_BASE +
|
|
NIC400_ADDR_CTRL_SECURITY_REG(CSS_NIC400_SLAVE_BOOTSECURE),
|
|
~0);
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Initialize debug configuration.
|
|
******************************************************************************/
|
|
static void init_debug_cfg(void)
|
|
{
|
|
#if !DEBUG
|
|
/* Set internal drive selection for SPIDEN. */
|
|
mmio_write_32(SSC_REG_BASE + SSC_DBGCFG_SET,
|
|
1U << SPIDEN_SEL_SET_SHIFT);
|
|
|
|
/* Drive SPIDEN LOW to disable invasive debug of secure state. */
|
|
mmio_write_32(SSC_REG_BASE + SSC_DBGCFG_CLR,
|
|
1U << SPIDEN_INT_CLR_SHIFT);
|
|
#endif
|
|
}
|
|
|
|
/*******************************************************************************
|
|
* Initialize the secure environment.
|
|
******************************************************************************/
|
|
void plat_arm_security_setup(void)
|
|
{
|
|
/* Initialize debug configuration */
|
|
init_debug_cfg();
|
|
/* Initialize the TrustZone Controller */
|
|
arm_tzc400_setup();
|
|
/* Do ARM CSS internal NIC setup */
|
|
css_init_nic400();
|
|
/* Do ARM CSS SoC security setup */
|
|
soc_css_security_setup();
|
|
/* Initialize the SMMU SSD tables */
|
|
init_mmu401();
|
|
}
|