xlat_tables_common.c 11.8 KB
Newer Older
1
/*
2
 * Copyright (c) 2016-2018, ARM Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
7
8
9
10
 */

#include <arch.h>
#include <arch_helpers.h>
#include <assert.h>
#include <cassert.h>
11
#include <common_def.h>
12
13
#include <debug.h>
#include <platform_def.h>
14
#include <stdbool.h>
15
#include <stdint.h>
16
#include <string.h>
17
#include <utils.h>
18
#include <xlat_tables.h>
19
#include "xlat_tables_private.h"
20
21
22
23
24
25
26

#if LOG_LEVEL >= LOG_LEVEL_VERBOSE
#define LVL0_SPACER ""
#define LVL1_SPACER "  "
#define LVL2_SPACER "    "
#define LVL3_SPACER "      "
#define get_level_spacer(level)		\
27
28
29
			(((level) == U(0)) ? LVL0_SPACER : \
			(((level) == U(1)) ? LVL1_SPACER : \
			(((level) == U(2)) ? LVL2_SPACER : LVL3_SPACER)))
30
#define debug_print(...) printf(__VA_ARGS__)
31
32
33
34
#else
#define debug_print(...) ((void)0)
#endif

35
#define UNSET_DESC	~0ULL
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
36
#define MT_UNKNOWN	~0U
37
38
39
40

static uint64_t xlat_tables[MAX_XLAT_TABLES][XLAT_TABLE_ENTRIES]
			__aligned(XLAT_TABLE_SIZE) __section("xlat_table");

41
static unsigned int next_xlat;
42
43
44
static unsigned long long xlat_max_pa;
static uintptr_t xlat_max_va;

45
static uint64_t execute_never_mask;
46
static uint64_t ap1_mask;
47

48
49
50
51
52
53
54
55
56
57
58
59
/*
 * Array of all memory regions stored in order of ascending base address.
 * The list is terminated by the first entry with size == 0.
 */
static mmap_region_t mmap[MAX_MMAP_REGIONS + 1];


void print_mmap(void)
{
#if LOG_LEVEL >= LOG_LEVEL_VERBOSE
	debug_print("mmap:\n");
	mmap_region_t *mm = mmap;
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
60
	while (mm->size != 0U) {
61
62
63
64
65
66
67
68
69
70
		debug_print(" VA:%p  PA:0x%llx  size:0x%zx  attr:0x%x\n",
				(void *)mm->base_va, mm->base_pa,
				mm->size, mm->attr);
		++mm;
	};
	debug_print("\n");
#endif
}

void mmap_add_region(unsigned long long base_pa, uintptr_t base_va,
71
		     size_t size, unsigned int attr)
72
73
{
	mmap_region_t *mm = mmap;
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
74
75
76
	const mmap_region_t *mm_last = mm + ARRAY_SIZE(mmap) - 1U;
	unsigned long long end_pa = base_pa + size - 1U;
	uintptr_t end_va = base_va + size - 1U;
77
78
79
80
81

	assert(IS_PAGE_ALIGNED(base_pa));
	assert(IS_PAGE_ALIGNED(base_va));
	assert(IS_PAGE_ALIGNED(size));

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
82
	if (size == 0U)
83
84
		return;

85
86
87
	assert(base_pa < end_pa); /* Check for overflows */
	assert(base_va < end_va);

88
	assert((base_va + (uintptr_t)size - (uintptr_t)1) <=
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
89
					(PLAT_VIRT_ADDR_SPACE_SIZE - 1U));
90
	assert((base_pa + (unsigned long long)size - 1ULL) <=
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
91
					(PLAT_PHY_ADDR_SPACE_SIZE - 1U));
92

93
#if ENABLE_ASSERTIONS
94
95
96
97

	/* Check for PAs and VAs overlaps with all other regions */
	for (mm = mmap; mm->size; ++mm) {

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
98
		uintptr_t mm_end_va = mm->base_va + mm->size - 1U;
99
100
101
102
103

		/*
		 * Check if one of the regions is completely inside the other
		 * one.
		 */
104
105
106
		bool fully_overlapped_va =
			((base_va >= mm->base_va) && (end_va <= mm_end_va)) ||
			((mm->base_va >= base_va) && (mm_end_va <= end_va));
107
108
109
110
111
112

		/*
		 * Full VA overlaps are only allowed if both regions are
		 * identity mapped (zero offset) or have the same VA to PA
		 * offset. Also, make sure that it's not the exact same area.
		 */
113
		if (fully_overlapped_va) {
114
115
116
117
118
119
120
121
122
123
124
125
126
			assert((mm->base_va - mm->base_pa) ==
			       (base_va - base_pa));
			assert((base_va != mm->base_va) || (size != mm->size));
		} else {
			/*
			 * If the regions do not have fully overlapping VAs,
			 * then they must have fully separated VAs and PAs.
			 * Partial overlaps are not allowed
			 */

			unsigned long long mm_end_pa =
						     mm->base_pa + mm->size - 1;

127
128
129
130
			bool separated_pa = (end_pa < mm->base_pa) ||
				(base_pa > mm_end_pa);
			bool separated_va = (end_va < mm->base_va) ||
				(base_va > mm_end_va);
131

132
			assert(separated_va && separated_pa);
133
134
135
136
137
		}
	}

	mm = mmap; /* Restore pointer to the start of the array */

138
#endif /* ENABLE_ASSERTIONS */
139

140
	/* Find correct place in mmap to insert new region */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
141
	while ((mm->base_va < base_va) && (mm->size != 0U))
142
143
		++mm;

144
145
146
147
148
149
150
151
152
153
154
155
156
157
	/*
	 * If a section is contained inside another one with the same base
	 * address, it must be placed after the one it is contained in:
	 *
	 * 1st |-----------------------|
	 * 2nd |------------|
	 * 3rd |------|
	 *
	 * This is required for mmap_region_attr() to get the attributes of the
	 * small region correctly.
	 */
	while ((mm->base_va == base_va) && (mm->size > size))
		++mm;

158
	/* Make room for new region by moving other regions up by one place */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
159
	(void)memmove(mm + 1, mm, (uintptr_t)mm_last - (uintptr_t)mm);
160
161

	/* Check we haven't lost the empty sentinal from the end of the array */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
162
	assert(mm_last->size == 0U);
163
164
165
166
167
168

	mm->base_pa = base_pa;
	mm->base_va = base_va;
	mm->size = size;
	mm->attr = attr;

169
170
171
172
	if (end_pa > xlat_max_pa)
		xlat_max_pa = end_pa;
	if (end_va > xlat_max_va)
		xlat_max_va = end_va;
173
174
175
176
}

void mmap_add(const mmap_region_t *mm)
{
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
177
178
	const mmap_region_t *mm_cursor = mm;

179
	while ((mm_cursor->size != 0U) || (mm_cursor->attr != 0U)) {
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
180
181
182
		mmap_add_region(mm_cursor->base_pa, mm_cursor->base_va,
				mm_cursor->size, mm_cursor->attr);
		mm_cursor++;
183
184
185
	}
}

186
187
static uint64_t mmap_desc(unsigned int attr, unsigned long long addr_pa,
			  unsigned int level)
188
{
189
	uint64_t desc;
190
191
	int mem_type;

192
	/* Make sure that the granularity is fine enough to map this address. */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
193
	assert((addr_pa & XLAT_BLOCK_MASK(level)) == 0U);
194

195
	desc = addr_pa;
196
197
198
199
200
	/*
	 * There are different translation table descriptors for level 3 and the
	 * rest.
	 */
	desc |= (level == XLAT_TABLE_LEVEL_MAX) ? PAGE_DESC : BLOCK_DESC;
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
201
202
	desc |= ((attr & MT_NS) != 0U) ? LOWER_ATTRS(NS) : 0U;
	desc |= ((attr & MT_RW) != 0U) ? LOWER_ATTRS(AP_RW) : LOWER_ATTRS(AP_RO);
203
204
205
206
	/*
	 * Always set the access flag, as this library assumes access flag
	 * faults aren't managed.
	 */
207
	desc |= LOWER_ATTRS(ACCESS_FLAG);
208
	desc |= ap1_mask;
209

210
211
212
213
214
215
216
217
218
219
	/*
	 * Deduce shareability domain and executability of the memory region
	 * from the memory type.
	 *
	 * Data accesses to device memory and non-cacheable normal memory are
	 * coherent for all observers in the system, and correspondingly are
	 * always treated as being Outer Shareable. Therefore, for these 2 types
	 * of memory, it is not strictly needed to set the shareability field
	 * in the translation tables.
	 */
220
	mem_type = MT_TYPE(attr);
221
	if (mem_type == MT_DEVICE) {
222
		desc |= LOWER_ATTRS(ATTR_DEVICE_INDEX | OSH);
223
224
225
226
227
228
		/*
		 * Always map device memory as execute-never.
		 * This is to avoid the possibility of a speculative instruction
		 * fetch, which could be an issue if this memory region
		 * corresponds to a read-sensitive peripheral.
		 */
229
230
		desc |= execute_never_mask;

231
232
233
	} else { /* Normal memory */
		/*
		 * Always map read-write normal memory as execute-never.
234
235
236
237
		 * This library assumes that it is used by software that does
		 * not self-modify its code, therefore R/W memory is reserved
		 * for data storage, which must not be executable.
		 *
238
		 * Note that setting the XN bit here is for consistency only.
239
		 * The function that enables the MMU sets the SCTLR_ELx.WXN bit,
240
241
242
		 * which makes any writable memory region to be treated as
		 * execute-never, regardless of the value of the XN bit in the
		 * translation table.
243
244
245
		 *
		 * For read-only memory, rely on the MT_EXECUTE/MT_EXECUTE_NEVER
		 * attribute to figure out the value of the XN bit.
246
		 */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
247
		if (((attr & MT_RW) != 0U) || ((attr & MT_EXECUTE_NEVER) != 0U)) {
248
249
			desc |= execute_never_mask;
		}
250
251
252
253
254
255
256

		if (mem_type == MT_MEMORY) {
			desc |= LOWER_ATTRS(ATTR_IWBWA_OWBWA_NTR_INDEX | ISH);
		} else {
			assert(mem_type == MT_NON_CACHEABLE);
			desc |= LOWER_ATTRS(ATTR_NON_CACHEABLE_INDEX | OSH);
		}
257
258
259
260
	}

	debug_print((mem_type == MT_MEMORY) ? "MEM" :
		((mem_type == MT_NON_CACHEABLE) ? "NC" : "DEV"));
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
261
262
263
	debug_print(((attr & MT_RW) != 0U) ? "-RW" : "-RO");
	debug_print(((attr & MT_NS) != 0U) ? "-NS" : "-S");
	debug_print(((attr & MT_EXECUTE_NEVER) != 0U) ? "-XN" : "-EXEC");
264
265
266
	return desc;
}

267
/*
268
269
270
271
272
 * Look for the innermost region that contains the area at `base_va` with size
 * `size`. Populate *attr with the attributes of this region.
 *
 * On success, this function returns 0.
 * If there are partial overlaps (meaning that a smaller size is needed) or if
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
273
274
 * the region can't be found in the given area, it returns MT_UNKNOWN. In this
 * case the value pointed by attr should be ignored by the caller.
275
 */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
276
277
static unsigned int mmap_region_attr(const mmap_region_t *mm, uintptr_t base_va,
				     size_t size, unsigned int *attr)
278
{
279
	/* Don't assume that the area is contained in the first region */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
280
	unsigned int ret = MT_UNKNOWN;
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296

	/*
	 * Get attributes from last (innermost) region that contains the
	 * requested area. Don't stop as soon as one region doesn't contain it
	 * because there may be other internal regions that contain this area:
	 *
	 * |-----------------------------1-----------------------------|
	 * |----2----|     |-------3-------|    |----5----|
	 *                   |--4--|
	 *
	 *                   |---| <- Area we want the attributes of.
	 *
	 * In this example, the area is contained in regions 1, 3 and 4 but not
	 * in region 2. The loop shouldn't stop at region 2 as inner regions
	 * have priority over outer regions, it should stop at region 5.
	 */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
297
	for ( ; ; ++mm) {
298

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
299
		if (mm->size == 0U)
300
			return ret; /* Reached end of list */
301

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
302
		if (mm->base_va > (base_va + size - 1U))
303
			return ret; /* Next region is after area so end */
304

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
305
		if ((mm->base_va + mm->size - 1U) < base_va)
306
307
			continue; /* Next region has already been overtaken */

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
308
		if ((ret == 0U) && (mm->attr == *attr))
309
310
			continue; /* Region doesn't override attribs so skip */

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
311
312
313
		if ((mm->base_va > base_va) ||
			((mm->base_va + mm->size - 1U) < (base_va + size - 1U)))
			return MT_UNKNOWN; /* Region doesn't fully cover area */
314

315
		*attr = mm->attr;
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
316
		ret = 0U;
317
	}
318
	return ret;
319
320
321
322
323
}

static mmap_region_t *init_xlation_table_inner(mmap_region_t *mm,
					uintptr_t base_va,
					uint64_t *table,
324
					unsigned int level)
325
{
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
326
327
	assert((level >= XLAT_TABLE_LEVEL_MIN) &&
	       (level <= XLAT_TABLE_LEVEL_MAX));
328

329
330
331
332
333
	unsigned int level_size_shift =
		       L0_XLAT_ADDRESS_SHIFT - level * XLAT_TABLE_ENTRIES_SHIFT;
	u_register_t level_size = (u_register_t)1 << level_size_shift;
	u_register_t level_index_mask =
		((u_register_t)XLAT_TABLE_ENTRIES_MASK) << level_size_shift;
334
335
336
337
338
339

	debug_print("New xlat table:\n");

	do  {
		uint64_t desc = UNSET_DESC;

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
340
		if (mm->size == 0U) {
341
342
			/* Done mapping regions; finish zeroing the table */
			desc = INVALID_DESC;
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
343
		} else if ((mm->base_va + mm->size - 1U) < base_va) {
344
			/* This area is after the region so get next region */
345
346
347
348
			++mm;
			continue;
		}

349
350
		debug_print("%s VA:%p size:0x%llx ", get_level_spacer(level),
			(void *)base_va, (unsigned long long)level_size);
351

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
352
		if (mm->base_va > (base_va + level_size - 1U)) {
353
			/* Next region is after this area. Nothing to map yet */
354
			desc = INVALID_DESC;
355
356
		/* Make sure that the current level allows block descriptors */
		} else if (level >= XLAT_BLOCK_LEVEL_MIN) {
357
358
359
360
361
			/*
			 * Try to get attributes of this area. It will fail if
			 * there are partially overlapping regions. On success,
			 * it will return the innermost region's attributes.
			 */
362
			unsigned int attr;
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
363
364
			unsigned int r = mmap_region_attr(mm, base_va,
							  level_size, &attr);
365

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
366
			if (r == 0U) {
367
368
369
				desc = mmap_desc(attr,
					base_va - mm->base_va + mm->base_pa,
					level);
370
			}
371
372
373
374
		}

		if (desc == UNSET_DESC) {
			/* Area not covered by a region so need finer table */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
375
376
377
			uint64_t *new_table = xlat_tables[next_xlat];

			next_xlat++;
378
			assert(next_xlat <= MAX_XLAT_TABLES);
379
			desc = TABLE_DESC | (uintptr_t)new_table;
380
381
382

			/* Recurse to fill in new table */
			mm = init_xlation_table_inner(mm, base_va,
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
383
						new_table, level + 1U);
384
385
386
387
388
389
		}

		debug_print("\n");

		*table++ = desc;
		base_va += level_size;
390
	} while ((base_va & level_index_mask) &&
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
391
		 ((base_va - 1U) < (PLAT_VIRT_ADDR_SPACE_SIZE - 1U)));
392
393
394
395
396

	return mm;
}

void init_xlation_table(uintptr_t base_va, uint64_t *table,
397
			unsigned int level, uintptr_t *max_va,
398
399
			unsigned long long *max_pa)
{
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
400
	unsigned int el = xlat_arch_current_el();
401
402
403

	execute_never_mask = xlat_arch_get_xn_desc(el);

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
404
	if (el == 3U) {
405
406
		ap1_mask = LOWER_ATTRS(AP_ONE_VA_RANGE_RES1);
	} else {
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
407
408
		assert(el == 1U);
		ap1_mask = 0ULL;
409
410
	}

411
412
413
414
	init_xlation_table_inner(mmap, base_va, table, level);
	*max_va = xlat_max_va;
	*max_pa = xlat_max_pa;
}