1 /* 2 * Copyright (c) 2016-2017, ARM Limited and Contributors. All rights reserved. 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions are met: 6 * 7 * Redistributions of source code must retain the above copyright notice, this 8 * list of conditions and the following disclaimer. 9 * 10 * Redistributions in binary form must reproduce the above copyright notice, 11 * this list of conditions and the following disclaimer in the documentation 12 * and/or other materials provided with the distribution. 13 * 14 * Neither the name of ARM nor the names of its contributors may be used 15 * to endorse or promote products derived from this software without specific 16 * prior written permission. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28 * POSSIBILITY OF SUCH DAMAGE. 29 */ 30 31 #include <arch.h> 32 #include <arch_helpers.h> 33 #include <assert.h> 34 #include <cassert.h> 35 #include <common_def.h> 36 #include <debug.h> 37 #include <platform_def.h> 38 #include <string.h> 39 #include <types.h> 40 #include <utils.h> 41 #include <xlat_tables.h> 42 #include "xlat_tables_private.h" 43 44 #if LOG_LEVEL >= LOG_LEVEL_VERBOSE 45 #define LVL0_SPACER "" 46 #define LVL1_SPACER " " 47 #define LVL2_SPACER " " 48 #define LVL3_SPACER " " 49 #define get_level_spacer(level) \ 50 (((level) == 0) ? LVL0_SPACER : \ 51 (((level) == 1) ? LVL1_SPACER : \ 52 (((level) == 2) ? LVL2_SPACER : LVL3_SPACER))) 53 #define debug_print(...) tf_printf(__VA_ARGS__) 54 #else 55 #define debug_print(...) ((void)0) 56 #endif 57 58 #define UNSET_DESC ~0ull 59 60 static uint64_t xlat_tables[MAX_XLAT_TABLES][XLAT_TABLE_ENTRIES] 61 __aligned(XLAT_TABLE_SIZE) __section("xlat_table"); 62 63 static unsigned next_xlat; 64 static unsigned long long xlat_max_pa; 65 static uintptr_t xlat_max_va; 66 67 static uint64_t execute_never_mask; 68 69 /* 70 * Array of all memory regions stored in order of ascending base address. 71 * The list is terminated by the first entry with size == 0. 72 */ 73 static mmap_region_t mmap[MAX_MMAP_REGIONS + 1]; 74 75 76 void print_mmap(void) 77 { 78 #if LOG_LEVEL >= LOG_LEVEL_VERBOSE 79 debug_print("mmap:\n"); 80 mmap_region_t *mm = mmap; 81 while (mm->size) { 82 debug_print(" VA:%p PA:0x%llx size:0x%zx attr:0x%x\n", 83 (void *)mm->base_va, mm->base_pa, 84 mm->size, mm->attr); 85 ++mm; 86 }; 87 debug_print("\n"); 88 #endif 89 } 90 91 void mmap_add_region(unsigned long long base_pa, uintptr_t base_va, 92 size_t size, mmap_attr_t attr) 93 { 94 mmap_region_t *mm = mmap; 95 mmap_region_t *mm_last = mm + ARRAY_SIZE(mmap) - 1; 96 unsigned long long end_pa = base_pa + size - 1; 97 uintptr_t end_va = base_va + size - 1; 98 99 assert(IS_PAGE_ALIGNED(base_pa)); 100 assert(IS_PAGE_ALIGNED(base_va)); 101 assert(IS_PAGE_ALIGNED(size)); 102 103 if (!size) 104 return; 105 106 assert(base_pa < end_pa); /* Check for overflows */ 107 assert(base_va < end_va); 108 109 assert((base_va + (uintptr_t)size - (uintptr_t)1) <= 110 (PLAT_VIRT_ADDR_SPACE_SIZE - 1)); 111 assert((base_pa + (unsigned long long)size - 1ULL) <= 112 (PLAT_PHY_ADDR_SPACE_SIZE - 1)); 113 114 #if ENABLE_ASSERTIONS 115 116 /* Check for PAs and VAs overlaps with all other regions */ 117 for (mm = mmap; mm->size; ++mm) { 118 119 uintptr_t mm_end_va = mm->base_va + mm->size - 1; 120 121 /* 122 * Check if one of the regions is completely inside the other 123 * one. 124 */ 125 int fully_overlapped_va = 126 ((base_va >= mm->base_va) && (end_va <= mm_end_va)) || 127 ((mm->base_va >= base_va) && (mm_end_va <= end_va)); 128 129 /* 130 * Full VA overlaps are only allowed if both regions are 131 * identity mapped (zero offset) or have the same VA to PA 132 * offset. Also, make sure that it's not the exact same area. 133 */ 134 if (fully_overlapped_va) { 135 assert((mm->base_va - mm->base_pa) == 136 (base_va - base_pa)); 137 assert((base_va != mm->base_va) || (size != mm->size)); 138 } else { 139 /* 140 * If the regions do not have fully overlapping VAs, 141 * then they must have fully separated VAs and PAs. 142 * Partial overlaps are not allowed 143 */ 144 145 unsigned long long mm_end_pa = 146 mm->base_pa + mm->size - 1; 147 148 int separated_pa = 149 (end_pa < mm->base_pa) || (base_pa > mm_end_pa); 150 int separated_va = 151 (end_va < mm->base_va) || (base_va > mm_end_va); 152 153 assert(separated_va && separated_pa); 154 } 155 } 156 157 mm = mmap; /* Restore pointer to the start of the array */ 158 159 #endif /* ENABLE_ASSERTIONS */ 160 161 /* Find correct place in mmap to insert new region */ 162 while (mm->base_va < base_va && mm->size) 163 ++mm; 164 165 /* 166 * If a section is contained inside another one with the same base 167 * address, it must be placed after the one it is contained in: 168 * 169 * 1st |-----------------------| 170 * 2nd |------------| 171 * 3rd |------| 172 * 173 * This is required for mmap_region_attr() to get the attributes of the 174 * small region correctly. 175 */ 176 while ((mm->base_va == base_va) && (mm->size > size)) 177 ++mm; 178 179 /* Make room for new region by moving other regions up by one place */ 180 memmove(mm + 1, mm, (uintptr_t)mm_last - (uintptr_t)mm); 181 182 /* Check we haven't lost the empty sentinal from the end of the array */ 183 assert(mm_last->size == 0); 184 185 mm->base_pa = base_pa; 186 mm->base_va = base_va; 187 mm->size = size; 188 mm->attr = attr; 189 190 if (end_pa > xlat_max_pa) 191 xlat_max_pa = end_pa; 192 if (end_va > xlat_max_va) 193 xlat_max_va = end_va; 194 } 195 196 void mmap_add(const mmap_region_t *mm) 197 { 198 while (mm->size) { 199 mmap_add_region(mm->base_pa, mm->base_va, mm->size, mm->attr); 200 ++mm; 201 } 202 } 203 204 static uint64_t mmap_desc(mmap_attr_t attr, unsigned long long addr_pa, 205 int level) 206 { 207 uint64_t desc; 208 int mem_type; 209 210 /* Make sure that the granularity is fine enough to map this address. */ 211 assert((addr_pa & XLAT_BLOCK_MASK(level)) == 0); 212 213 desc = addr_pa; 214 /* 215 * There are different translation table descriptors for level 3 and the 216 * rest. 217 */ 218 desc |= (level == XLAT_TABLE_LEVEL_MAX) ? PAGE_DESC : BLOCK_DESC; 219 desc |= (attr & MT_NS) ? LOWER_ATTRS(NS) : 0; 220 desc |= (attr & MT_RW) ? LOWER_ATTRS(AP_RW) : LOWER_ATTRS(AP_RO); 221 desc |= LOWER_ATTRS(ACCESS_FLAG); 222 223 /* 224 * Deduce shareability domain and executability of the memory region 225 * from the memory type. 226 * 227 * Data accesses to device memory and non-cacheable normal memory are 228 * coherent for all observers in the system, and correspondingly are 229 * always treated as being Outer Shareable. Therefore, for these 2 types 230 * of memory, it is not strictly needed to set the shareability field 231 * in the translation tables. 232 */ 233 mem_type = MT_TYPE(attr); 234 if (mem_type == MT_DEVICE) { 235 desc |= LOWER_ATTRS(ATTR_DEVICE_INDEX | OSH); 236 /* 237 * Always map device memory as execute-never. 238 * This is to avoid the possibility of a speculative instruction 239 * fetch, which could be an issue if this memory region 240 * corresponds to a read-sensitive peripheral. 241 */ 242 desc |= execute_never_mask; 243 244 } else { /* Normal memory */ 245 /* 246 * Always map read-write normal memory as execute-never. 247 * (Trusted Firmware doesn't self-modify its code, therefore 248 * R/W memory is reserved for data storage, which must not be 249 * executable.) 250 * Note that setting the XN bit here is for consistency only. 251 * The function that enables the MMU sets the SCTLR_ELx.WXN bit, 252 * which makes any writable memory region to be treated as 253 * execute-never, regardless of the value of the XN bit in the 254 * translation table. 255 * 256 * For read-only memory, rely on the MT_EXECUTE/MT_EXECUTE_NEVER 257 * attribute to figure out the value of the XN bit. 258 */ 259 if ((attr & MT_RW) || (attr & MT_EXECUTE_NEVER)) { 260 desc |= execute_never_mask; 261 } 262 263 if (mem_type == MT_MEMORY) { 264 desc |= LOWER_ATTRS(ATTR_IWBWA_OWBWA_NTR_INDEX | ISH); 265 } else { 266 assert(mem_type == MT_NON_CACHEABLE); 267 desc |= LOWER_ATTRS(ATTR_NON_CACHEABLE_INDEX | OSH); 268 } 269 } 270 271 debug_print((mem_type == MT_MEMORY) ? "MEM" : 272 ((mem_type == MT_NON_CACHEABLE) ? "NC" : "DEV")); 273 debug_print(attr & MT_RW ? "-RW" : "-RO"); 274 debug_print(attr & MT_NS ? "-NS" : "-S"); 275 debug_print(attr & MT_EXECUTE_NEVER ? "-XN" : "-EXEC"); 276 return desc; 277 } 278 279 /* 280 * Look for the innermost region that contains the area at `base_va` with size 281 * `size`. Populate *attr with the attributes of this region. 282 * 283 * On success, this function returns 0. 284 * If there are partial overlaps (meaning that a smaller size is needed) or if 285 * the region can't be found in the given area, it returns -1. In this case the 286 * value pointed by attr should be ignored by the caller. 287 */ 288 static int mmap_region_attr(mmap_region_t *mm, uintptr_t base_va, 289 size_t size, mmap_attr_t *attr) 290 { 291 /* Don't assume that the area is contained in the first region */ 292 int ret = -1; 293 294 /* 295 * Get attributes from last (innermost) region that contains the 296 * requested area. Don't stop as soon as one region doesn't contain it 297 * because there may be other internal regions that contain this area: 298 * 299 * |-----------------------------1-----------------------------| 300 * |----2----| |-------3-------| |----5----| 301 * |--4--| 302 * 303 * |---| <- Area we want the attributes of. 304 * 305 * In this example, the area is contained in regions 1, 3 and 4 but not 306 * in region 2. The loop shouldn't stop at region 2 as inner regions 307 * have priority over outer regions, it should stop at region 5. 308 */ 309 for (;; ++mm) { 310 311 if (!mm->size) 312 return ret; /* Reached end of list */ 313 314 if (mm->base_va > base_va + size - 1) 315 return ret; /* Next region is after area so end */ 316 317 if (mm->base_va + mm->size - 1 < base_va) 318 continue; /* Next region has already been overtaken */ 319 320 if (!ret && mm->attr == *attr) 321 continue; /* Region doesn't override attribs so skip */ 322 323 if (mm->base_va > base_va || 324 mm->base_va + mm->size - 1 < base_va + size - 1) 325 return -1; /* Region doesn't fully cover our area */ 326 327 *attr = mm->attr; 328 ret = 0; 329 } 330 return ret; 331 } 332 333 static mmap_region_t *init_xlation_table_inner(mmap_region_t *mm, 334 uintptr_t base_va, 335 uint64_t *table, 336 int level) 337 { 338 assert(level >= XLAT_TABLE_LEVEL_MIN && level <= XLAT_TABLE_LEVEL_MAX); 339 340 unsigned int level_size_shift = 341 L0_XLAT_ADDRESS_SHIFT - level * XLAT_TABLE_ENTRIES_SHIFT; 342 u_register_t level_size = (u_register_t)1 << level_size_shift; 343 u_register_t level_index_mask = 344 ((u_register_t)XLAT_TABLE_ENTRIES_MASK) << level_size_shift; 345 346 debug_print("New xlat table:\n"); 347 348 do { 349 uint64_t desc = UNSET_DESC; 350 351 if (!mm->size) { 352 /* Done mapping regions; finish zeroing the table */ 353 desc = INVALID_DESC; 354 } else if (mm->base_va + mm->size - 1 < base_va) { 355 /* This area is after the region so get next region */ 356 ++mm; 357 continue; 358 } 359 360 debug_print("%s VA:%p size:0x%llx ", get_level_spacer(level), 361 (void *)base_va, (unsigned long long)level_size); 362 363 if (mm->base_va > base_va + level_size - 1) { 364 /* Next region is after this area. Nothing to map yet */ 365 desc = INVALID_DESC; 366 /* Make sure that the current level allows block descriptors */ 367 } else if (level >= XLAT_BLOCK_LEVEL_MIN) { 368 /* 369 * Try to get attributes of this area. It will fail if 370 * there are partially overlapping regions. On success, 371 * it will return the innermost region's attributes. 372 */ 373 mmap_attr_t attr; 374 int r = mmap_region_attr(mm, base_va, level_size, &attr); 375 376 if (!r) { 377 desc = mmap_desc(attr, 378 base_va - mm->base_va + mm->base_pa, 379 level); 380 } 381 } 382 383 if (desc == UNSET_DESC) { 384 /* Area not covered by a region so need finer table */ 385 uint64_t *new_table = xlat_tables[next_xlat++]; 386 assert(next_xlat <= MAX_XLAT_TABLES); 387 desc = TABLE_DESC | (uintptr_t)new_table; 388 389 /* Recurse to fill in new table */ 390 mm = init_xlation_table_inner(mm, base_va, 391 new_table, level+1); 392 } 393 394 debug_print("\n"); 395 396 *table++ = desc; 397 base_va += level_size; 398 } while ((base_va & level_index_mask) && 399 (base_va - 1 < PLAT_VIRT_ADDR_SPACE_SIZE - 1)); 400 401 return mm; 402 } 403 404 void init_xlation_table(uintptr_t base_va, uint64_t *table, 405 int level, uintptr_t *max_va, 406 unsigned long long *max_pa) 407 { 408 execute_never_mask = xlat_arch_get_xn_desc(xlat_arch_current_el()); 409 init_xlation_table_inner(mmap, base_va, table, level); 410 *max_va = xlat_max_va; 411 *max_pa = xlat_max_pa; 412 } 413