xref: /rk3399_ARM-atf/lib/xlat_tables/aarch32/xlat_tables.c (revision 61f72a34250d063da67f4fc2b0eb8c3fda3376be)
1 /*
2  * Copyright (c) 2016-2018, ARM Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <arch.h>
8 #include <arch_helpers.h>
9 #include <assert.h>
10 #include <platform_def.h>
11 #include <utils.h>
12 #include <xlat_tables_arch.h>
13 #include <xlat_tables.h>
14 #include "../xlat_tables_private.h"
15 
16 #if (ARM_ARCH_MAJOR == 7) && !defined(ARMV7_SUPPORTS_LARGE_PAGE_ADDRESSING)
17 #error ARMv7 target does not support LPAE MMU descriptors
18 #endif
19 
20 #define XLAT_TABLE_LEVEL_BASE	\
21        GET_XLAT_TABLE_LEVEL_BASE(PLAT_VIRT_ADDR_SPACE_SIZE)
22 
23 #define NUM_BASE_LEVEL_ENTRIES	\
24        GET_NUM_BASE_LEVEL_ENTRIES(PLAT_VIRT_ADDR_SPACE_SIZE)
25 
26 static uint64_t base_xlation_table[NUM_BASE_LEVEL_ENTRIES]
27 		__aligned(NUM_BASE_LEVEL_ENTRIES * sizeof(uint64_t));
28 
29 #if ENABLE_ASSERTIONS
30 static unsigned long long get_max_supported_pa(void)
31 {
32 	/* Physical address space size for long descriptor format. */
33 	return (1ULL << 40) - 1ULL;
34 }
35 #endif /* ENABLE_ASSERTIONS */
36 
37 unsigned int xlat_arch_current_el(void)
38 {
39 	/*
40 	 * If EL3 is in AArch32 mode, all secure PL1 modes (Monitor, System,
41 	 * SVC, Abort, UND, IRQ and FIQ modes) execute at EL3.
42 	 */
43 	return 3U;
44 }
45 
46 uint64_t xlat_arch_get_xn_desc(unsigned int el __unused)
47 {
48 	return UPPER_ATTRS(XN);
49 }
50 
51 void init_xlat_tables(void)
52 {
53 	unsigned long long max_pa;
54 	uintptr_t max_va;
55 	print_mmap();
56 	init_xlation_table(0U, base_xlation_table, XLAT_TABLE_LEVEL_BASE,
57 						&max_va, &max_pa);
58 
59 	assert(max_va <= (PLAT_VIRT_ADDR_SPACE_SIZE - 1U));
60 	assert(max_pa <= (PLAT_PHY_ADDR_SPACE_SIZE - 1U));
61 	assert((PLAT_PHY_ADDR_SPACE_SIZE - 1U) <= get_max_supported_pa());
62 }
63 
64 /*******************************************************************************
65  * Function for enabling the MMU in Secure PL1, assuming that the
66  * page-tables have already been created.
67  ******************************************************************************/
68 void enable_mmu_secure(unsigned int flags)
69 {
70 	unsigned int mair0, ttbcr, sctlr;
71 	uint64_t ttbr0;
72 
73 	assert(IS_IN_SECURE());
74 	assert((read_sctlr() & SCTLR_M_BIT) == 0U);
75 
76 	/* Set attributes in the right indices of the MAIR */
77 	mair0 = MAIR0_ATTR_SET(ATTR_DEVICE, ATTR_DEVICE_INDEX);
78 	mair0 |= MAIR0_ATTR_SET(ATTR_IWBWA_OWBWA_NTR,
79 			ATTR_IWBWA_OWBWA_NTR_INDEX);
80 	mair0 |= MAIR0_ATTR_SET(ATTR_NON_CACHEABLE,
81 			ATTR_NON_CACHEABLE_INDEX);
82 	write_mair0(mair0);
83 
84 	/* Invalidate TLBs at the current exception level */
85 	tlbiall();
86 
87 	/*
88 	 * Set TTBCR bits as well. Set TTBR0 table properties. Disable TTBR1.
89 	 */
90 	int t0sz = 32 - __builtin_ctzll(PLAT_VIRT_ADDR_SPACE_SIZE);
91 
92 	if ((flags & XLAT_TABLE_NC) != 0U) {
93 		/* Inner & outer non-cacheable non-shareable. */
94 		ttbcr = TTBCR_EAE_BIT |
95 			TTBCR_SH0_NON_SHAREABLE | TTBCR_RGN0_OUTER_NC |
96 			TTBCR_RGN0_INNER_NC | (uint32_t) t0sz;
97 	} else {
98 		/* Inner & outer WBWA & shareable. */
99 		ttbcr = TTBCR_EAE_BIT |
100 			TTBCR_SH0_INNER_SHAREABLE | TTBCR_RGN0_OUTER_WBA |
101 			TTBCR_RGN0_INNER_WBA | (uint32_t) t0sz;
102 	}
103 	ttbcr |= TTBCR_EPD1_BIT;
104 	write_ttbcr(ttbcr);
105 
106 	/* Set TTBR0 bits as well */
107 	ttbr0 = (uintptr_t) base_xlation_table;
108 	write64_ttbr0(ttbr0);
109 	write64_ttbr1(0U);
110 
111 	/*
112 	 * Ensure all translation table writes have drained
113 	 * into memory, the TLB invalidation is complete,
114 	 * and translation register writes are committed
115 	 * before enabling the MMU
116 	 */
117 	dsbish();
118 	isb();
119 
120 	sctlr = read_sctlr();
121 	sctlr |= SCTLR_WXN_BIT | SCTLR_M_BIT;
122 
123 	if ((flags & DISABLE_DCACHE) != 0U)
124 		sctlr &= ~SCTLR_C_BIT;
125 	else
126 		sctlr |= SCTLR_C_BIT;
127 
128 	write_sctlr(sctlr);
129 
130 	/* Ensure the MMU enable takes effect immediately */
131 	isb();
132 }
133 
134 void enable_mmu_direct(unsigned int flags)
135 {
136 	enable_mmu_secure(flags);
137 }
138