Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 1 | /* |
Petre-Ionut Tudor | e5a6fef | 2019-11-07 15:18:03 +0000 | [diff] [blame] | 2 | * Copyright (c) 2017-2020, ARM Limited and Contributors. All rights reserved. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 7 | #ifndef XLAT_TABLES_V2_H |
| 8 | #define XLAT_TABLES_V2_H |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 9 | |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 10 | #include <lib/xlat_tables/xlat_tables_defs.h> |
| 11 | #include <lib/xlat_tables/xlat_tables_v2_helpers.h> |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 12 | |
Julius Werner | 53456fc | 2019-07-09 13:49:11 -0700 | [diff] [blame] | 13 | #ifndef __ASSEMBLER__ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 14 | #include <stddef.h> |
| 15 | #include <stdint.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 16 | |
| 17 | #include <lib/xlat_tables/xlat_mmu_helpers.h> |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 18 | |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 19 | /* |
| 20 | * Default granularity size for an mmap_region_t. |
| 21 | * Useful when no specific granularity is required. |
| 22 | * |
| 23 | * By default, choose the biggest possible block size allowed by the |
| 24 | * architectural state and granule size in order to minimize the number of page |
| 25 | * tables required for the mapping. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 26 | */ |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 27 | #define REGION_DEFAULT_GRANULARITY XLAT_BLOCK_SIZE(MIN_LVL_BLOCK_DESC) |
| 28 | |
| 29 | /* Helper macro to define an mmap_region_t. */ |
| 30 | #define MAP_REGION(_pa, _va, _sz, _attr) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 31 | MAP_REGION_FULL_SPEC(_pa, _va, _sz, _attr, REGION_DEFAULT_GRANULARITY) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 32 | |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 33 | /* Helper macro to define an mmap_region_t with an identity mapping. */ |
| 34 | #define MAP_REGION_FLAT(_adr, _sz, _attr) \ |
| 35 | MAP_REGION(_adr, _adr, _sz, _attr) |
| 36 | |
| 37 | /* |
Antonio Nino Diaz | c003328 | 2018-11-20 16:03:11 +0000 | [diff] [blame] | 38 | * Helper macro to define entries for mmap_region_t. It allows to define 'pa' |
| 39 | * and sets 'va' to 0 for each region. To be used with mmap_add_alloc_va(). |
| 40 | */ |
| 41 | #define MAP_REGION_ALLOC_VA(pa, sz, attr) MAP_REGION(pa, 0, sz, attr) |
| 42 | |
| 43 | /* |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 44 | * Helper macro to define an mmap_region_t to map with the desired granularity |
| 45 | * of translation tables. |
| 46 | * |
| 47 | * The granularity value passed to this macro must be a valid block or page |
| 48 | * size. When using a 4KB translation granule, this might be 4KB, 2MB or 1GB. |
| 49 | * Passing REGION_DEFAULT_GRANULARITY is also allowed and means that the library |
| 50 | * is free to choose the granularity for this region. In this case, it is |
| 51 | * equivalent to the MAP_REGION() macro. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 52 | */ |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 53 | #define MAP_REGION2(_pa, _va, _sz, _attr, _gr) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 54 | MAP_REGION_FULL_SPEC(_pa, _va, _sz, _attr, _gr) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 55 | |
| 56 | /* |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 57 | * Shifts and masks to access fields of an mmap attribute |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 58 | */ |
Varun Wadekar | c6a11f6 | 2017-05-25 18:04:48 -0700 | [diff] [blame] | 59 | #define MT_TYPE_MASK U(0x7) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 60 | #define MT_TYPE(_attr) ((_attr) & MT_TYPE_MASK) |
| 61 | /* Access permissions (RO/RW) */ |
Varun Wadekar | c6a11f6 | 2017-05-25 18:04:48 -0700 | [diff] [blame] | 62 | #define MT_PERM_SHIFT U(3) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 63 | /* Security state (SECURE/NS) */ |
Varun Wadekar | c6a11f6 | 2017-05-25 18:04:48 -0700 | [diff] [blame] | 64 | #define MT_SEC_SHIFT U(4) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 65 | /* Access permissions for instruction execution (EXECUTE/EXECUTE_NEVER) */ |
Varun Wadekar | c6a11f6 | 2017-05-25 18:04:48 -0700 | [diff] [blame] | 66 | #define MT_EXECUTE_SHIFT U(5) |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 67 | /* In the EL1&0 translation regime, User (EL0) or Privileged (EL1). */ |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 68 | #define MT_USER_SHIFT U(6) |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 69 | /* All other bits are reserved */ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 70 | |
| 71 | /* |
| 72 | * Memory mapping attributes |
| 73 | */ |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 74 | |
| 75 | /* |
| 76 | * Memory types supported. |
| 77 | * These are organised so that, going down the list, the memory types are |
| 78 | * getting weaker; conversely going up the list the memory types are getting |
| 79 | * stronger. |
| 80 | */ |
| 81 | #define MT_DEVICE U(0) |
| 82 | #define MT_NON_CACHEABLE U(1) |
| 83 | #define MT_MEMORY U(2) |
| 84 | /* Values up to 7 are reserved to add new memory types in the future */ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 85 | |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 86 | #define MT_RO (U(0) << MT_PERM_SHIFT) |
| 87 | #define MT_RW (U(1) << MT_PERM_SHIFT) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 88 | |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 89 | #define MT_SECURE (U(0) << MT_SEC_SHIFT) |
| 90 | #define MT_NS (U(1) << MT_SEC_SHIFT) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 91 | |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 92 | /* |
| 93 | * Access permissions for instruction execution are only relevant for normal |
| 94 | * read-only memory, i.e. MT_MEMORY | MT_RO. They are ignored (and potentially |
| 95 | * overridden) otherwise: |
| 96 | * - Device memory is always marked as execute-never. |
| 97 | * - Read-write normal memory is always marked as execute-never. |
| 98 | */ |
| 99 | #define MT_EXECUTE (U(0) << MT_EXECUTE_SHIFT) |
| 100 | #define MT_EXECUTE_NEVER (U(1) << MT_EXECUTE_SHIFT) |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 101 | |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 102 | /* |
| 103 | * When mapping a region at EL0 or EL1, this attribute will be used to determine |
| 104 | * if a User mapping (EL0) will be created or a Privileged mapping (EL1). |
| 105 | */ |
| 106 | #define MT_USER (U(1) << MT_USER_SHIFT) |
| 107 | #define MT_PRIVILEGED (U(0) << MT_USER_SHIFT) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 108 | |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 109 | /* Compound attributes for most common usages */ |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 110 | #define MT_CODE (MT_MEMORY | MT_RO | MT_EXECUTE) |
| 111 | #define MT_RO_DATA (MT_MEMORY | MT_RO | MT_EXECUTE_NEVER) |
| 112 | #define MT_RW_DATA (MT_MEMORY | MT_RW | MT_EXECUTE_NEVER) |
| 113 | |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 114 | /* |
| 115 | * Structure for specifying a single region of memory. |
| 116 | */ |
| 117 | typedef struct mmap_region { |
| 118 | unsigned long long base_pa; |
| 119 | uintptr_t base_va; |
| 120 | size_t size; |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 121 | unsigned int attr; |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 122 | /* Desired granularity. See the MAP_REGION2() macro for more details. */ |
| 123 | size_t granularity; |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 124 | } mmap_region_t; |
| 125 | |
Sandrine Bailleux | 3120ea2 | 2017-07-10 13:37:48 +0100 | [diff] [blame] | 126 | /* |
Antonio Nino Diaz | 9d596c4 | 2018-07-12 15:43:07 +0100 | [diff] [blame] | 127 | * Translation regimes supported by this library. EL_REGIME_INVALID tells the |
| 128 | * library to detect it at runtime. |
Douglas Raillard | 2d54579 | 2017-09-25 15:23:22 +0100 | [diff] [blame] | 129 | */ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 130 | #define EL1_EL0_REGIME 1 |
Antonio Nino Diaz | 128de8d | 2018-08-07 19:59:49 +0100 | [diff] [blame] | 131 | #define EL2_REGIME 2 |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 132 | #define EL3_REGIME 3 |
Antonio Nino Diaz | 9d596c4 | 2018-07-12 15:43:07 +0100 | [diff] [blame] | 133 | #define EL_REGIME_INVALID -1 |
Douglas Raillard | 2d54579 | 2017-09-25 15:23:22 +0100 | [diff] [blame] | 134 | |
| 135 | /* |
Sandrine Bailleux | 3120ea2 | 2017-07-10 13:37:48 +0100 | [diff] [blame] | 136 | * Declare the translation context type. |
| 137 | * Its definition is private. |
| 138 | */ |
| 139 | typedef struct xlat_ctx xlat_ctx_t; |
| 140 | |
| 141 | /* |
| 142 | * Statically allocate a translation context and associated structures. Also |
| 143 | * initialize them. |
| 144 | * |
| 145 | * _ctx_name: |
| 146 | * Prefix for the translation context variable. |
| 147 | * E.g. If _ctx_name is 'foo', the variable will be called 'foo_xlat_ctx'. |
| 148 | * Useful to distinguish multiple contexts from one another. |
| 149 | * |
| 150 | * _mmap_count: |
| 151 | * Number of mmap_region_t to allocate. |
| 152 | * Would typically be MAX_MMAP_REGIONS for the translation context describing |
| 153 | * the BL image currently executing. |
| 154 | * |
| 155 | * _xlat_tables_count: |
| 156 | * Number of sub-translation tables to allocate. |
| 157 | * Would typically be MAX_XLAT_TABLES for the translation context describing |
| 158 | * the BL image currently executing. |
| 159 | * Note that this is only for sub-tables ; at the initial lookup level, there |
| 160 | * is always a single table. |
| 161 | * |
| 162 | * _virt_addr_space_size, _phy_addr_space_size: |
| 163 | * Size (in bytes) of the virtual (resp. physical) address space. |
| 164 | * Would typically be PLAT_VIRT_ADDR_SPACE_SIZE |
| 165 | * (resp. PLAT_PHY_ADDR_SPACE_SIZE) for the translation context describing the |
| 166 | * BL image currently executing. |
Masahiro Yamada | 0db2375 | 2020-03-06 19:21:26 +0900 | [diff] [blame] | 167 | |
| 168 | * _base_table_section: |
| 169 | * Specify the name of the section where the base translation tables have to |
| 170 | * be placed by the linker. |
Sandrine Bailleux | 3120ea2 | 2017-07-10 13:37:48 +0100 | [diff] [blame] | 171 | */ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 172 | #define REGISTER_XLAT_CONTEXT(_ctx_name, _mmap_count, _xlat_tables_count, \ |
Masahiro Yamada | 0db2375 | 2020-03-06 19:21:26 +0900 | [diff] [blame] | 173 | _virt_addr_space_size, _phy_addr_space_size, \ |
| 174 | _base_table_section) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 175 | REGISTER_XLAT_CONTEXT_FULL_SPEC(_ctx_name, (_mmap_count), \ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 176 | (_xlat_tables_count), \ |
| 177 | (_virt_addr_space_size), \ |
| 178 | (_phy_addr_space_size), \ |
Masahiro Yamada | 0db2375 | 2020-03-06 19:21:26 +0900 | [diff] [blame] | 179 | EL_REGIME_INVALID, \ |
| 180 | "xlat_table", (_base_table_section)) |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 181 | |
| 182 | /* |
Antonio Nino Diaz | 086fbd6 | 2017-11-17 11:48:55 +0000 | [diff] [blame] | 183 | * Same as REGISTER_XLAT_CONTEXT plus the additional parameters: |
| 184 | * |
| 185 | * _xlat_regime: |
| 186 | * Specify the translation regime managed by this xlat_ctx_t instance. The |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 187 | * values are the one from the EL*_REGIME definitions. |
Antonio Nino Diaz | 086fbd6 | 2017-11-17 11:48:55 +0000 | [diff] [blame] | 188 | * |
| 189 | * _section_name: |
| 190 | * Specify the name of the section where the translation tables have to be |
| 191 | * placed by the linker. |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 192 | */ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 193 | #define REGISTER_XLAT_CONTEXT2(_ctx_name, _mmap_count, _xlat_tables_count, \ |
| 194 | _virt_addr_space_size, _phy_addr_space_size, \ |
| 195 | _xlat_regime, _section_name) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 196 | REGISTER_XLAT_CONTEXT_FULL_SPEC(_ctx_name, (_mmap_count), \ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 197 | (_xlat_tables_count), \ |
| 198 | (_virt_addr_space_size), \ |
| 199 | (_phy_addr_space_size), \ |
Masahiro Yamada | 0db2375 | 2020-03-06 19:21:26 +0900 | [diff] [blame] | 200 | (_xlat_regime), \ |
| 201 | (_section_name), ".bss" \ |
| 202 | ) |
Sandrine Bailleux | 3120ea2 | 2017-07-10 13:37:48 +0100 | [diff] [blame] | 203 | |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 204 | /****************************************************************************** |
| 205 | * Generic translation table APIs. |
| 206 | * Each API comes in 2 variants: |
| 207 | * - one that acts on the current translation context for this BL image |
| 208 | * - another that acts on the given translation context instead. This variant |
| 209 | * is named after the 1st version, with an additional '_ctx' suffix. |
| 210 | *****************************************************************************/ |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 211 | |
| 212 | /* |
| 213 | * Initialize translation tables from the current list of mmap regions. Calling |
| 214 | * this function marks the transition point after which static regions can no |
| 215 | * longer be added. |
| 216 | */ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 217 | void init_xlat_tables(void); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 218 | void init_xlat_tables_ctx(xlat_ctx_t *ctx); |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 219 | |
| 220 | /* |
Antonio Nino Diaz | 675d155 | 2018-10-30 11:36:47 +0000 | [diff] [blame] | 221 | * Fill all fields of a dynamic translation tables context. It must be done |
| 222 | * either statically with REGISTER_XLAT_CONTEXT() or at runtime with this |
| 223 | * function. |
| 224 | */ |
| 225 | void xlat_setup_dynamic_ctx(xlat_ctx_t *ctx, unsigned long long pa_max, |
| 226 | uintptr_t va_max, struct mmap_region *mmap, |
| 227 | unsigned int mmap_num, uint64_t **tables, |
| 228 | unsigned int tables_num, uint64_t *base_table, |
| 229 | int xlat_regime, int *mapped_regions); |
| 230 | |
| 231 | /* |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 232 | * Add a static region with defined base PA and base VA. This function can only |
| 233 | * be used before initializing the translation tables. The region cannot be |
| 234 | * removed afterwards. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 235 | */ |
| 236 | void mmap_add_region(unsigned long long base_pa, uintptr_t base_va, |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 237 | size_t size, unsigned int attr); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 238 | void mmap_add_region_ctx(xlat_ctx_t *ctx, const mmap_region_t *mm); |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 239 | |
| 240 | /* |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 241 | * Add an array of static regions with defined base PA and base VA. This |
| 242 | * function can only be used before initializing the translation tables. The |
| 243 | * regions cannot be removed afterwards. |
| 244 | */ |
| 245 | void mmap_add(const mmap_region_t *mm); |
| 246 | void mmap_add_ctx(xlat_ctx_t *ctx, const mmap_region_t *mm); |
| 247 | |
Antonio Nino Diaz | c003328 | 2018-11-20 16:03:11 +0000 | [diff] [blame] | 248 | /* |
| 249 | * Add a region with defined base PA. Returns base VA calculated using the |
| 250 | * highest existing region in the mmap array even if it fails to allocate the |
| 251 | * region. |
| 252 | */ |
| 253 | void mmap_add_region_alloc_va(unsigned long long base_pa, uintptr_t *base_va, |
| 254 | size_t size, unsigned int attr); |
| 255 | void mmap_add_region_alloc_va_ctx(xlat_ctx_t *ctx, mmap_region_t *mm); |
| 256 | |
| 257 | /* |
| 258 | * Add an array of static regions with defined base PA, and fill the base VA |
| 259 | * field on the array of structs. This function can only be used before |
| 260 | * initializing the translation tables. The regions cannot be removed afterwards. |
| 261 | */ |
| 262 | void mmap_add_alloc_va(mmap_region_t *mm); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 263 | |
| 264 | #if PLAT_XLAT_TABLES_DYNAMIC |
| 265 | /* |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 266 | * Add a dynamic region with defined base PA and base VA. This type of region |
| 267 | * can be added and removed even after the translation tables are initialized. |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 268 | * |
| 269 | * Returns: |
| 270 | * 0: Success. |
| 271 | * EINVAL: Invalid values were used as arguments. |
| 272 | * ERANGE: Memory limits were surpassed. |
| 273 | * ENOMEM: Not enough space in the mmap array or not enough free xlat tables. |
| 274 | * EPERM: It overlaps another region in an invalid way. |
| 275 | */ |
| 276 | int mmap_add_dynamic_region(unsigned long long base_pa, uintptr_t base_va, |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 277 | size_t size, unsigned int attr); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 278 | int mmap_add_dynamic_region_ctx(xlat_ctx_t *ctx, mmap_region_t *mm); |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 279 | |
| 280 | /* |
Antonio Nino Diaz | c003328 | 2018-11-20 16:03:11 +0000 | [diff] [blame] | 281 | * Add a dynamic region with defined base PA. Returns base VA calculated using |
| 282 | * the highest existing region in the mmap array even if it fails to allocate |
| 283 | * the region. |
| 284 | * |
| 285 | * mmap_add_dynamic_region_alloc_va() returns the allocated VA in 'base_va'. |
| 286 | * mmap_add_dynamic_region_alloc_va_ctx() returns it in 'mm->base_va'. |
| 287 | * |
| 288 | * It returns the same error values as mmap_add_dynamic_region(). |
| 289 | */ |
| 290 | int mmap_add_dynamic_region_alloc_va(unsigned long long base_pa, |
| 291 | uintptr_t *base_va, |
| 292 | size_t size, unsigned int attr); |
| 293 | int mmap_add_dynamic_region_alloc_va_ctx(xlat_ctx_t *ctx, mmap_region_t *mm); |
| 294 | |
| 295 | /* |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 296 | * Remove a region with the specified base VA and size. Only dynamic regions can |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 297 | * be removed, and they can be removed even if the translation tables are |
| 298 | * initialized. |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 299 | * |
| 300 | * Returns: |
| 301 | * 0: Success. |
| 302 | * EINVAL: The specified region wasn't found. |
| 303 | * EPERM: Trying to remove a static region. |
| 304 | */ |
| 305 | int mmap_remove_dynamic_region(uintptr_t base_va, size_t size); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 306 | int mmap_remove_dynamic_region_ctx(xlat_ctx_t *ctx, |
| 307 | uintptr_t base_va, |
| 308 | size_t size); |
| 309 | |
| 310 | #endif /* PLAT_XLAT_TABLES_DYNAMIC */ |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 311 | |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 312 | /* |
Sandrine Bailleux | 439c901 | 2017-10-17 12:02:03 +0100 | [diff] [blame] | 313 | * Change the memory attributes of the memory region starting from a given |
| 314 | * virtual address in a set of translation tables. |
| 315 | * |
| 316 | * This function can only be used after the translation tables have been |
| 317 | * initialized. |
| 318 | * |
| 319 | * The base address of the memory region must be aligned on a page boundary. |
| 320 | * The size of this memory region must be a multiple of a page size. |
| 321 | * The memory region must be already mapped by the given translation tables |
| 322 | * and it must be mapped at the granularity of a page. |
| 323 | * |
| 324 | * Return 0 on success, a negative value on error. |
| 325 | * |
| 326 | * In case of error, the memory attributes remain unchanged and this function |
| 327 | * has no effect. |
| 328 | * |
| 329 | * ctx |
| 330 | * Translation context to work on. |
| 331 | * base_va: |
| 332 | * Virtual address of the 1st page to change the attributes of. |
| 333 | * size: |
| 334 | * Size in bytes of the memory region. |
| 335 | * attr: |
| 336 | * New attributes of the page tables. The attributes that can be changed are |
| 337 | * data access (MT_RO/MT_RW), instruction access (MT_EXECUTE_NEVER/MT_EXECUTE) |
| 338 | * and user/privileged access (MT_USER/MT_PRIVILEGED) in the case of contexts |
| 339 | * that are used in the EL1&0 translation regime. Also, note that this |
| 340 | * function doesn't allow to remap a region as RW and executable, or to remap |
| 341 | * device memory as executable. |
| 342 | * |
| 343 | * NOTE: The caller of this function must be able to write to the translation |
| 344 | * tables, i.e. the memory where they are stored must be mapped with read-write |
| 345 | * access permissions. This function assumes it is the case. If this is not |
| 346 | * the case then this function might trigger a data abort exception. |
| 347 | * |
| 348 | * NOTE2: The caller is responsible for making sure that the targeted |
| 349 | * translation tables are not modified by any other code while this function is |
| 350 | * executing. |
| 351 | */ |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 352 | int xlat_change_mem_attributes_ctx(const xlat_ctx_t *ctx, uintptr_t base_va, |
| 353 | size_t size, uint32_t attr); |
| 354 | int xlat_change_mem_attributes(uintptr_t base_va, size_t size, uint32_t attr); |
Sandrine Bailleux | 439c901 | 2017-10-17 12:02:03 +0100 | [diff] [blame] | 355 | |
Petre-Ionut Tudor | e5a6fef | 2019-11-07 15:18:03 +0000 | [diff] [blame] | 356 | #if PLAT_RO_XLAT_TABLES |
| 357 | /* |
| 358 | * Change the memory attributes of the memory region encompassing the higher |
| 359 | * level translation tables to secure read-only data. |
| 360 | * |
| 361 | * Return 0 on success, a negative error code on error. |
| 362 | */ |
| 363 | int xlat_make_tables_readonly(void); |
| 364 | #endif |
| 365 | |
Sandrine Bailleux | 439c901 | 2017-10-17 12:02:03 +0100 | [diff] [blame] | 366 | /* |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 367 | * Query the memory attributes of a memory page in a set of translation tables. |
| 368 | * |
| 369 | * Return 0 on success, a negative error code on error. |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 370 | * On success, the attributes are stored into *attr. |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 371 | * |
| 372 | * ctx |
| 373 | * Translation context to work on. |
| 374 | * base_va |
| 375 | * Virtual address of the page to get the attributes of. |
| 376 | * There are no alignment restrictions on this address. The attributes of the |
| 377 | * memory page it lies within are returned. |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 378 | * attr |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 379 | * Output parameter where to store the attributes of the targeted memory page. |
| 380 | */ |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 381 | int xlat_get_mem_attributes_ctx(const xlat_ctx_t *ctx, uintptr_t base_va, |
| 382 | uint32_t *attr); |
| 383 | int xlat_get_mem_attributes(uintptr_t base_va, uint32_t *attr); |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 384 | |
Julius Werner | 53456fc | 2019-07-09 13:49:11 -0700 | [diff] [blame] | 385 | #endif /*__ASSEMBLER__*/ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 386 | #endif /* XLAT_TABLES_V2_H */ |