blob: 5e3220c606ae5869711a6eb0bfc203b84944d734 [file] [log] [blame]
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +00001/*
Jeenu Viswambharan58e81482018-04-27 15:06:57 +01002 * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +00005 */
6
7#include <arch.h>
8#include <arch_helpers.h>
9#include <assert.h>
10#include <cassert.h>
11#include <platform_def.h>
12#include <utils.h>
Isla Mitchellc4a1a072017-08-07 11:20:13 +010013#include <utils_def.h>
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000014#include <xlat_tables_v2.h>
15#include "../xlat_tables_private.h"
16
Etienne Carriere0af78b62017-11-08 13:53:47 +010017#if ARM_ARCH_MAJOR == 7 && !defined(ARMV7_SUPPORTS_LARGE_PAGE_ADDRESSING)
18#error ARMv7 target does not support LPAE MMU descriptors
19#endif
20
Antonio Nino Diaz4413ad52018-06-11 13:40:32 +010021/*
22 * Returns 1 if the provided granule size is supported, 0 otherwise.
23 */
24int xlat_arch_is_granule_size_supported(size_t size)
25{
26 /*
Antonio Nino Diaz0842bd62018-07-12 15:54:10 +010027 * The library uses the long descriptor translation table format, which
28 * supports 4 KiB pages only.
Antonio Nino Diaz4413ad52018-06-11 13:40:32 +010029 */
30 return (size == (4U * 1024U));
31}
32
33size_t xlat_arch_get_max_supported_granule_size(void)
34{
35 return 4U * 1024U;
36}
37
Antonio Nino Diaz3759e3f2017-03-22 15:48:51 +000038#if ENABLE_ASSERTIONS
Sandrine Bailleuxc5b63772017-05-31 13:31:48 +010039unsigned long long xlat_arch_get_max_supported_pa(void)
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000040{
41 /* Physical address space size for long descriptor format. */
David Cunadoc1503122018-02-16 21:12:58 +000042 return (1ULL << 40) - 1ULL;
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000043}
Antonio Nino Diaz3759e3f2017-03-22 15:48:51 +000044#endif /* ENABLE_ASSERTIONS*/
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000045
Antonio Nino Diazdcf9d922017-10-04 16:52:15 +010046int is_mmu_enabled_ctx(const xlat_ctx_t *ctx __unused)
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000047{
48 return (read_sctlr() & SCTLR_M_BIT) != 0;
49}
50
Antonio Nino Diaz44d3c212018-07-05 08:11:48 +010051uint64_t xlat_arch_regime_get_xn_desc(int xlat_regime __unused)
52{
53 return UPPER_ATTRS(XN);
54}
55
Antonio Nino Diazad5dc7f2018-07-11 09:46:45 +010056void xlat_arch_tlbi_va(uintptr_t va, int xlat_regime __unused)
Douglas Raillard2d545792017-09-25 15:23:22 +010057{
58 /*
59 * Ensure the translation table write has drained into memory before
60 * invalidating the TLB entry.
61 */
62 dsbishst();
63
64 tlbimvaais(TLBI_ADDR(va));
65}
66
Antonio Nino Diazac998032017-02-27 17:23:54 +000067void xlat_arch_tlbi_va_sync(void)
68{
69 /* Invalidate all entries from branch predictors. */
70 bpiallis();
71
72 /*
73 * A TLB maintenance instruction can complete at any time after
74 * it is issued, but is only guaranteed to be complete after the
75 * execution of DSB by the PE that executed the TLB maintenance
76 * instruction. After the TLB invalidate instruction is
77 * complete, no new memory accesses using the invalidated TLB
78 * entries will be observed by any observer of the system
79 * domain. See section D4.8.2 of the ARMv8 (issue k), paragraph
80 * "Ordering and completion of TLB maintenance instructions".
81 */
82 dsbish();
83
84 /*
85 * The effects of a completed TLB maintenance instruction are
86 * only guaranteed to be visible on the PE that executed the
87 * instruction after the execution of an ISB instruction by the
88 * PE that executed the TLB maintenance instruction.
89 */
90 isb();
91}
92
Antonio Nino Diazefabaa92017-04-27 13:30:22 +010093int xlat_arch_current_el(void)
94{
95 /*
96 * If EL3 is in AArch32 mode, all secure PL1 modes (Monitor, System,
97 * SVC, Abort, UND, IRQ and FIQ modes) execute at EL3.
Antonio Nino Diaz9d596c42018-07-12 15:43:07 +010098 *
99 * The PL1&0 translation regime in AArch32 behaves like the EL1&0 regime
100 * in AArch64 except for the XN bits, but we set and unset them at the
101 * same time, so there's no difference in practice.
Antonio Nino Diazefabaa92017-04-27 13:30:22 +0100102 */
Antonio Nino Diaz9d596c42018-07-12 15:43:07 +0100103 return 1;
Antonio Nino Diazefabaa92017-04-27 13:30:22 +0100104}
105
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000106/*******************************************************************************
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100107 * Function for enabling the MMU in Secure PL1, assuming that the page tables
108 * have already been created.
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000109 ******************************************************************************/
Antonio Nino Diaz67f799e2018-07-15 16:42:01 +0100110void setup_mmu_cfg(uint64_t *params, unsigned int flags,
111 const uint64_t *base_table, unsigned long long max_pa,
112 uintptr_t max_va, __unused int xlat_regime)
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000113{
Antonio Nino Diaz668d9ee2018-07-12 15:44:42 +0100114 uint64_t mair, ttbr0;
115 uint32_t ttbcr;
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000116
117 assert(IS_IN_SECURE());
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100118
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000119 /* Set attributes in the right indices of the MAIR */
Antonio Nino Diaz668d9ee2018-07-12 15:44:42 +0100120 mair = MAIR0_ATTR_SET(ATTR_DEVICE, ATTR_DEVICE_INDEX);
121 mair |= MAIR0_ATTR_SET(ATTR_IWBWA_OWBWA_NTR,
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000122 ATTR_IWBWA_OWBWA_NTR_INDEX);
Antonio Nino Diaz668d9ee2018-07-12 15:44:42 +0100123 mair |= MAIR0_ATTR_SET(ATTR_NON_CACHEABLE,
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000124 ATTR_NON_CACHEABLE_INDEX);
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100125
126 /*
127 * Configure the control register for stage 1 of the PL1&0 translation
128 * regime.
129 */
130
131 /* Use the Long-descriptor translation table format. */
132 ttbcr = TTBCR_EAE_BIT;
133
134 /*
135 * Disable translation table walk for addresses that are translated
136 * using TTBR1. Therefore, only TTBR0 is used.
137 */
138 ttbcr |= TTBCR_EPD1_BIT;
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000139
140 /*
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100141 * Limit the input address ranges and memory region sizes translated
Sandrine Bailleux46c53a22017-07-11 15:11:10 +0100142 * using TTBR0 to the given virtual address space size, if smaller than
143 * 32 bits.
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100144 */
Sandrine Bailleux46c53a22017-07-11 15:11:10 +0100145 if (max_va != UINT32_MAX) {
146 uintptr_t virtual_addr_space_size = max_va + 1;
147 assert(CHECK_VIRT_ADDR_SPACE_SIZE(virtual_addr_space_size));
148 /*
Sandrine Bailleux12e86442017-07-19 10:11:13 +0100149 * __builtin_ctzll(0) is undefined but here we are guaranteed
Sandrine Bailleux46c53a22017-07-11 15:11:10 +0100150 * that virtual_addr_space_size is in the range [1, UINT32_MAX].
151 */
Sandrine Bailleux12e86442017-07-19 10:11:13 +0100152 ttbcr |= 32 - __builtin_ctzll(virtual_addr_space_size);
Sandrine Bailleux46c53a22017-07-11 15:11:10 +0100153 }
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100154
155 /*
156 * Set the cacheability and shareability attributes for memory
157 * associated with translation table walks using TTBR0.
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000158 */
Summer Qindaf5dbb2017-03-16 17:16:34 +0000159 if (flags & XLAT_TABLE_NC) {
160 /* Inner & outer non-cacheable non-shareable. */
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100161 ttbcr |= TTBCR_SH0_NON_SHAREABLE | TTBCR_RGN0_OUTER_NC |
162 TTBCR_RGN0_INNER_NC;
Summer Qindaf5dbb2017-03-16 17:16:34 +0000163 } else {
164 /* Inner & outer WBWA & shareable. */
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100165 ttbcr |= TTBCR_SH0_INNER_SHAREABLE | TTBCR_RGN0_OUTER_WBA |
166 TTBCR_RGN0_INNER_WBA;
Summer Qindaf5dbb2017-03-16 17:16:34 +0000167 }
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000168
169 /* Set TTBR0 bits as well */
170 ttbr0 = (uint64_t)(uintptr_t) base_table;
Antonio Nino Diaz668d9ee2018-07-12 15:44:42 +0100171
Isla Mitchellc4a1a072017-08-07 11:20:13 +0100172#if ARM_ARCH_AT_LEAST(8, 2)
173 /*
Antonio Nino Diaz668d9ee2018-07-12 15:44:42 +0100174 * Enable CnP bit so as to share page tables with all PEs. This
175 * is mandatory for ARMv8.2 implementations.
Isla Mitchellc4a1a072017-08-07 11:20:13 +0100176 */
177 ttbr0 |= TTBR_CNP_BIT;
178#endif
Sandrine Bailleux1423d052017-05-31 13:38:51 +0100179
Jeenu Viswambharan58e81482018-04-27 15:06:57 +0100180 /* Now populate MMU configuration */
Antonio Nino Diaz67f799e2018-07-15 16:42:01 +0100181 params[MMU_CFG_MAIR] = mair;
182 params[MMU_CFG_TCR] = (uint64_t) ttbcr;
183 params[MMU_CFG_TTBR0] = ttbr0;
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +0000184}