Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 1 | /* |
Govindraj Raja | eee28e7 | 2023-08-01 15:52:40 -0500 | [diff] [blame] | 2 | * Copyright (c) 2017-2021, Arm Limited and Contributors. All rights reserved. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 7 | #ifndef XLAT_TABLES_V2_H |
| 8 | #define XLAT_TABLES_V2_H |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 9 | |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 10 | #include <lib/xlat_tables/xlat_tables_defs.h> |
| 11 | #include <lib/xlat_tables/xlat_tables_v2_helpers.h> |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 12 | |
Julius Werner | 53456fc | 2019-07-09 13:49:11 -0700 | [diff] [blame] | 13 | #ifndef __ASSEMBLER__ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 14 | #include <stddef.h> |
| 15 | #include <stdint.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 16 | |
| 17 | #include <lib/xlat_tables/xlat_mmu_helpers.h> |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 18 | |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 19 | /* |
| 20 | * Default granularity size for an mmap_region_t. |
| 21 | * Useful when no specific granularity is required. |
| 22 | * |
| 23 | * By default, choose the biggest possible block size allowed by the |
| 24 | * architectural state and granule size in order to minimize the number of page |
| 25 | * tables required for the mapping. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 26 | */ |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 27 | #define REGION_DEFAULT_GRANULARITY XLAT_BLOCK_SIZE(MIN_LVL_BLOCK_DESC) |
| 28 | |
| 29 | /* Helper macro to define an mmap_region_t. */ |
| 30 | #define MAP_REGION(_pa, _va, _sz, _attr) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 31 | MAP_REGION_FULL_SPEC(_pa, _va, _sz, _attr, REGION_DEFAULT_GRANULARITY) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 32 | |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 33 | /* Helper macro to define an mmap_region_t with an identity mapping. */ |
| 34 | #define MAP_REGION_FLAT(_adr, _sz, _attr) \ |
| 35 | MAP_REGION(_adr, _adr, _sz, _attr) |
| 36 | |
| 37 | /* |
Antonio Nino Diaz | c003328 | 2018-11-20 16:03:11 +0000 | [diff] [blame] | 38 | * Helper macro to define entries for mmap_region_t. It allows to define 'pa' |
| 39 | * and sets 'va' to 0 for each region. To be used with mmap_add_alloc_va(). |
| 40 | */ |
| 41 | #define MAP_REGION_ALLOC_VA(pa, sz, attr) MAP_REGION(pa, 0, sz, attr) |
| 42 | |
| 43 | /* |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 44 | * Helper macro to define an mmap_region_t to map with the desired granularity |
| 45 | * of translation tables. |
| 46 | * |
| 47 | * The granularity value passed to this macro must be a valid block or page |
| 48 | * size. When using a 4KB translation granule, this might be 4KB, 2MB or 1GB. |
| 49 | * Passing REGION_DEFAULT_GRANULARITY is also allowed and means that the library |
| 50 | * is free to choose the granularity for this region. In this case, it is |
| 51 | * equivalent to the MAP_REGION() macro. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 52 | */ |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 53 | #define MAP_REGION2(_pa, _va, _sz, _attr, _gr) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 54 | MAP_REGION_FULL_SPEC(_pa, _va, _sz, _attr, _gr) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 55 | |
| 56 | /* |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 57 | * Shifts and masks to access fields of an mmap attribute |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 58 | */ |
Varun Wadekar | c6a11f6 | 2017-05-25 18:04:48 -0700 | [diff] [blame] | 59 | #define MT_TYPE_MASK U(0x7) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 60 | #define MT_TYPE(_attr) ((_attr) & MT_TYPE_MASK) |
| 61 | /* Access permissions (RO/RW) */ |
Varun Wadekar | c6a11f6 | 2017-05-25 18:04:48 -0700 | [diff] [blame] | 62 | #define MT_PERM_SHIFT U(3) |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame] | 63 | |
| 64 | /* Physical address space (SECURE/NS/Root/Realm) */ |
| 65 | #define MT_PAS_SHIFT U(4) |
| 66 | #define MT_PAS_MASK (U(3) << MT_PAS_SHIFT) |
| 67 | #define MT_PAS(_attr) ((_attr) & MT_PAS_MASK) |
| 68 | |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 69 | /* Access permissions for instruction execution (EXECUTE/EXECUTE_NEVER) */ |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame] | 70 | #define MT_EXECUTE_SHIFT U(6) |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 71 | /* In the EL1&0 translation regime, User (EL0) or Privileged (EL1). */ |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame] | 72 | #define MT_USER_SHIFT U(7) |
Pramod Kumar | 316b73b | 2020-02-19 10:39:10 +0530 | [diff] [blame] | 73 | |
| 74 | /* Shareability attribute for the memory region */ |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame] | 75 | #define MT_SHAREABILITY_SHIFT U(8) |
Pramod Kumar | 316b73b | 2020-02-19 10:39:10 +0530 | [diff] [blame] | 76 | #define MT_SHAREABILITY_MASK (U(3) << MT_SHAREABILITY_SHIFT) |
| 77 | #define MT_SHAREABILITY(_attr) ((_attr) & MT_SHAREABILITY_MASK) |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame] | 78 | |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 79 | /* All other bits are reserved */ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 80 | |
| 81 | /* |
| 82 | * Memory mapping attributes |
| 83 | */ |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 84 | |
| 85 | /* |
| 86 | * Memory types supported. |
| 87 | * These are organised so that, going down the list, the memory types are |
| 88 | * getting weaker; conversely going up the list the memory types are getting |
| 89 | * stronger. |
| 90 | */ |
| 91 | #define MT_DEVICE U(0) |
| 92 | #define MT_NON_CACHEABLE U(1) |
| 93 | #define MT_MEMORY U(2) |
| 94 | /* Values up to 7 are reserved to add new memory types in the future */ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 95 | |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 96 | #define MT_RO (U(0) << MT_PERM_SHIFT) |
| 97 | #define MT_RW (U(1) << MT_PERM_SHIFT) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 98 | |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame] | 99 | #define MT_SECURE (U(0) << MT_PAS_SHIFT) |
| 100 | #define MT_NS (U(1) << MT_PAS_SHIFT) |
| 101 | #define MT_ROOT (U(2) << MT_PAS_SHIFT) |
| 102 | #define MT_REALM (U(3) << MT_PAS_SHIFT) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 103 | |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 104 | /* |
| 105 | * Access permissions for instruction execution are only relevant for normal |
| 106 | * read-only memory, i.e. MT_MEMORY | MT_RO. They are ignored (and potentially |
| 107 | * overridden) otherwise: |
| 108 | * - Device memory is always marked as execute-never. |
| 109 | * - Read-write normal memory is always marked as execute-never. |
| 110 | */ |
| 111 | #define MT_EXECUTE (U(0) << MT_EXECUTE_SHIFT) |
| 112 | #define MT_EXECUTE_NEVER (U(1) << MT_EXECUTE_SHIFT) |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 113 | |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 114 | /* |
| 115 | * When mapping a region at EL0 or EL1, this attribute will be used to determine |
| 116 | * if a User mapping (EL0) will be created or a Privileged mapping (EL1). |
| 117 | */ |
| 118 | #define MT_USER (U(1) << MT_USER_SHIFT) |
| 119 | #define MT_PRIVILEGED (U(0) << MT_USER_SHIFT) |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 120 | |
Pramod Kumar | 316b73b | 2020-02-19 10:39:10 +0530 | [diff] [blame] | 121 | /* |
| 122 | * Shareability defines the visibility of any cache changes to |
| 123 | * all masters belonging to a shareable domain. |
| 124 | * |
| 125 | * MT_SHAREABILITY_ISH: For inner shareable domain |
| 126 | * MT_SHAREABILITY_OSH: For outer shareable domain |
| 127 | * MT_SHAREABILITY_NSH: For non shareable domain |
| 128 | */ |
| 129 | #define MT_SHAREABILITY_ISH (U(1) << MT_SHAREABILITY_SHIFT) |
| 130 | #define MT_SHAREABILITY_OSH (U(2) << MT_SHAREABILITY_SHIFT) |
| 131 | #define MT_SHAREABILITY_NSH (U(3) << MT_SHAREABILITY_SHIFT) |
| 132 | |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 133 | /* Compound attributes for most common usages */ |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 134 | #define MT_CODE (MT_MEMORY | MT_RO | MT_EXECUTE) |
| 135 | #define MT_RO_DATA (MT_MEMORY | MT_RO | MT_EXECUTE_NEVER) |
| 136 | #define MT_RW_DATA (MT_MEMORY | MT_RW | MT_EXECUTE_NEVER) |
| 137 | |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 138 | /* |
| 139 | * Structure for specifying a single region of memory. |
| 140 | */ |
| 141 | typedef struct mmap_region { |
| 142 | unsigned long long base_pa; |
| 143 | uintptr_t base_va; |
| 144 | size_t size; |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 145 | unsigned int attr; |
Sandrine Bailleux | 8f23fa8 | 2017-09-28 21:58:12 +0100 | [diff] [blame] | 146 | /* Desired granularity. See the MAP_REGION2() macro for more details. */ |
| 147 | size_t granularity; |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 148 | } mmap_region_t; |
| 149 | |
Sandrine Bailleux | 3120ea2 | 2017-07-10 13:37:48 +0100 | [diff] [blame] | 150 | /* |
Antonio Nino Diaz | 9d596c4 | 2018-07-12 15:43:07 +0100 | [diff] [blame] | 151 | * Translation regimes supported by this library. EL_REGIME_INVALID tells the |
| 152 | * library to detect it at runtime. |
Douglas Raillard | 2d54579 | 2017-09-25 15:23:22 +0100 | [diff] [blame] | 153 | */ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 154 | #define EL1_EL0_REGIME 1 |
Antonio Nino Diaz | 128de8d | 2018-08-07 19:59:49 +0100 | [diff] [blame] | 155 | #define EL2_REGIME 2 |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 156 | #define EL3_REGIME 3 |
Antonio Nino Diaz | 9d596c4 | 2018-07-12 15:43:07 +0100 | [diff] [blame] | 157 | #define EL_REGIME_INVALID -1 |
Douglas Raillard | 2d54579 | 2017-09-25 15:23:22 +0100 | [diff] [blame] | 158 | |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame] | 159 | /* Memory type for EL3 regions. With RME, EL3 is in ROOT PAS */ |
| 160 | #if ENABLE_RME |
| 161 | #define EL3_PAS MT_ROOT |
| 162 | #else |
| 163 | #define EL3_PAS MT_SECURE |
| 164 | #endif /* ENABLE_RME */ |
| 165 | |
Douglas Raillard | 2d54579 | 2017-09-25 15:23:22 +0100 | [diff] [blame] | 166 | /* |
Sandrine Bailleux | 3120ea2 | 2017-07-10 13:37:48 +0100 | [diff] [blame] | 167 | * Declare the translation context type. |
| 168 | * Its definition is private. |
| 169 | */ |
| 170 | typedef struct xlat_ctx xlat_ctx_t; |
| 171 | |
| 172 | /* |
| 173 | * Statically allocate a translation context and associated structures. Also |
| 174 | * initialize them. |
| 175 | * |
| 176 | * _ctx_name: |
| 177 | * Prefix for the translation context variable. |
| 178 | * E.g. If _ctx_name is 'foo', the variable will be called 'foo_xlat_ctx'. |
| 179 | * Useful to distinguish multiple contexts from one another. |
| 180 | * |
| 181 | * _mmap_count: |
| 182 | * Number of mmap_region_t to allocate. |
| 183 | * Would typically be MAX_MMAP_REGIONS for the translation context describing |
| 184 | * the BL image currently executing. |
| 185 | * |
| 186 | * _xlat_tables_count: |
| 187 | * Number of sub-translation tables to allocate. |
| 188 | * Would typically be MAX_XLAT_TABLES for the translation context describing |
| 189 | * the BL image currently executing. |
| 190 | * Note that this is only for sub-tables ; at the initial lookup level, there |
| 191 | * is always a single table. |
| 192 | * |
| 193 | * _virt_addr_space_size, _phy_addr_space_size: |
| 194 | * Size (in bytes) of the virtual (resp. physical) address space. |
| 195 | * Would typically be PLAT_VIRT_ADDR_SPACE_SIZE |
| 196 | * (resp. PLAT_PHY_ADDR_SPACE_SIZE) for the translation context describing the |
| 197 | * BL image currently executing. |
| 198 | */ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 199 | #define REGISTER_XLAT_CONTEXT(_ctx_name, _mmap_count, _xlat_tables_count, \ |
Masahiro Yamada | f5f203a | 2020-03-26 13:18:48 +0900 | [diff] [blame] | 200 | _virt_addr_space_size, _phy_addr_space_size) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 201 | REGISTER_XLAT_CONTEXT_FULL_SPEC(_ctx_name, (_mmap_count), \ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 202 | (_xlat_tables_count), \ |
| 203 | (_virt_addr_space_size), \ |
| 204 | (_phy_addr_space_size), \ |
Masahiro Yamada | 0db2375 | 2020-03-06 19:21:26 +0900 | [diff] [blame] | 205 | EL_REGIME_INVALID, \ |
Chris Kay | 33bfc5e | 2023-02-14 11:30:04 +0000 | [diff] [blame] | 206 | ".xlat_table", ".base_xlat_table") |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 207 | |
| 208 | /* |
Antonio Nino Diaz | 086fbd6 | 2017-11-17 11:48:55 +0000 | [diff] [blame] | 209 | * Same as REGISTER_XLAT_CONTEXT plus the additional parameters: |
| 210 | * |
| 211 | * _xlat_regime: |
| 212 | * Specify the translation regime managed by this xlat_ctx_t instance. The |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 213 | * values are the one from the EL*_REGIME definitions. |
Antonio Nino Diaz | 086fbd6 | 2017-11-17 11:48:55 +0000 | [diff] [blame] | 214 | * |
| 215 | * _section_name: |
| 216 | * Specify the name of the section where the translation tables have to be |
| 217 | * placed by the linker. |
Masahisa Kojima | 813b50b | 2020-06-02 05:54:13 +0900 | [diff] [blame] | 218 | * |
| 219 | * _base_table_section_name: |
| 220 | * Specify the name of the section where the base translation tables have to |
| 221 | * be placed by the linker. |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 222 | */ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 223 | #define REGISTER_XLAT_CONTEXT2(_ctx_name, _mmap_count, _xlat_tables_count, \ |
| 224 | _virt_addr_space_size, _phy_addr_space_size, \ |
Masahisa Kojima | 813b50b | 2020-06-02 05:54:13 +0900 | [diff] [blame] | 225 | _xlat_regime, _section_name, _base_table_section_name) \ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 226 | REGISTER_XLAT_CONTEXT_FULL_SPEC(_ctx_name, (_mmap_count), \ |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 227 | (_xlat_tables_count), \ |
| 228 | (_virt_addr_space_size), \ |
| 229 | (_phy_addr_space_size), \ |
Masahiro Yamada | 0db2375 | 2020-03-06 19:21:26 +0900 | [diff] [blame] | 230 | (_xlat_regime), \ |
Masahisa Kojima | 813b50b | 2020-06-02 05:54:13 +0900 | [diff] [blame] | 231 | (_section_name), (_base_table_section_name) \ |
Masahiro Yamada | 0db2375 | 2020-03-06 19:21:26 +0900 | [diff] [blame] | 232 | ) |
Sandrine Bailleux | 3120ea2 | 2017-07-10 13:37:48 +0100 | [diff] [blame] | 233 | |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 234 | /****************************************************************************** |
| 235 | * Generic translation table APIs. |
| 236 | * Each API comes in 2 variants: |
| 237 | * - one that acts on the current translation context for this BL image |
| 238 | * - another that acts on the given translation context instead. This variant |
| 239 | * is named after the 1st version, with an additional '_ctx' suffix. |
| 240 | *****************************************************************************/ |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 241 | |
| 242 | /* |
| 243 | * Initialize translation tables from the current list of mmap regions. Calling |
| 244 | * this function marks the transition point after which static regions can no |
| 245 | * longer be added. |
| 246 | */ |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 247 | void init_xlat_tables(void); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 248 | void init_xlat_tables_ctx(xlat_ctx_t *ctx); |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 249 | |
| 250 | /* |
Antonio Nino Diaz | 675d155 | 2018-10-30 11:36:47 +0000 | [diff] [blame] | 251 | * Fill all fields of a dynamic translation tables context. It must be done |
| 252 | * either statically with REGISTER_XLAT_CONTEXT() or at runtime with this |
| 253 | * function. |
| 254 | */ |
| 255 | void xlat_setup_dynamic_ctx(xlat_ctx_t *ctx, unsigned long long pa_max, |
| 256 | uintptr_t va_max, struct mmap_region *mmap, |
| 257 | unsigned int mmap_num, uint64_t **tables, |
| 258 | unsigned int tables_num, uint64_t *base_table, |
| 259 | int xlat_regime, int *mapped_regions); |
| 260 | |
| 261 | /* |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 262 | * Add a static region with defined base PA and base VA. This function can only |
| 263 | * be used before initializing the translation tables. The region cannot be |
| 264 | * removed afterwards. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 265 | */ |
| 266 | void mmap_add_region(unsigned long long base_pa, uintptr_t base_va, |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 267 | size_t size, unsigned int attr); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 268 | void mmap_add_region_ctx(xlat_ctx_t *ctx, const mmap_region_t *mm); |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 269 | |
| 270 | /* |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 271 | * Add an array of static regions with defined base PA and base VA. This |
| 272 | * function can only be used before initializing the translation tables. The |
| 273 | * regions cannot be removed afterwards. |
| 274 | */ |
| 275 | void mmap_add(const mmap_region_t *mm); |
| 276 | void mmap_add_ctx(xlat_ctx_t *ctx, const mmap_region_t *mm); |
| 277 | |
Antonio Nino Diaz | c003328 | 2018-11-20 16:03:11 +0000 | [diff] [blame] | 278 | /* |
| 279 | * Add a region with defined base PA. Returns base VA calculated using the |
| 280 | * highest existing region in the mmap array even if it fails to allocate the |
| 281 | * region. |
| 282 | */ |
| 283 | void mmap_add_region_alloc_va(unsigned long long base_pa, uintptr_t *base_va, |
| 284 | size_t size, unsigned int attr); |
| 285 | void mmap_add_region_alloc_va_ctx(xlat_ctx_t *ctx, mmap_region_t *mm); |
| 286 | |
| 287 | /* |
| 288 | * Add an array of static regions with defined base PA, and fill the base VA |
| 289 | * field on the array of structs. This function can only be used before |
| 290 | * initializing the translation tables. The regions cannot be removed afterwards. |
| 291 | */ |
| 292 | void mmap_add_alloc_va(mmap_region_t *mm); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 293 | |
| 294 | #if PLAT_XLAT_TABLES_DYNAMIC |
| 295 | /* |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 296 | * Add a dynamic region with defined base PA and base VA. This type of region |
| 297 | * can be added and removed even after the translation tables are initialized. |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 298 | * |
| 299 | * Returns: |
| 300 | * 0: Success. |
| 301 | * EINVAL: Invalid values were used as arguments. |
| 302 | * ERANGE: Memory limits were surpassed. |
| 303 | * ENOMEM: Not enough space in the mmap array or not enough free xlat tables. |
| 304 | * EPERM: It overlaps another region in an invalid way. |
| 305 | */ |
| 306 | int mmap_add_dynamic_region(unsigned long long base_pa, uintptr_t base_va, |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 307 | size_t size, unsigned int attr); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 308 | int mmap_add_dynamic_region_ctx(xlat_ctx_t *ctx, mmap_region_t *mm); |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 309 | |
| 310 | /* |
Antonio Nino Diaz | c003328 | 2018-11-20 16:03:11 +0000 | [diff] [blame] | 311 | * Add a dynamic region with defined base PA. Returns base VA calculated using |
| 312 | * the highest existing region in the mmap array even if it fails to allocate |
| 313 | * the region. |
| 314 | * |
| 315 | * mmap_add_dynamic_region_alloc_va() returns the allocated VA in 'base_va'. |
| 316 | * mmap_add_dynamic_region_alloc_va_ctx() returns it in 'mm->base_va'. |
| 317 | * |
| 318 | * It returns the same error values as mmap_add_dynamic_region(). |
| 319 | */ |
| 320 | int mmap_add_dynamic_region_alloc_va(unsigned long long base_pa, |
| 321 | uintptr_t *base_va, |
| 322 | size_t size, unsigned int attr); |
| 323 | int mmap_add_dynamic_region_alloc_va_ctx(xlat_ctx_t *ctx, mmap_region_t *mm); |
| 324 | |
| 325 | /* |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 326 | * Remove a region with the specified base VA and size. Only dynamic regions can |
Antonio Nino Diaz | 9b11f39 | 2017-05-08 16:43:53 +0100 | [diff] [blame] | 327 | * be removed, and they can be removed even if the translation tables are |
| 328 | * initialized. |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 329 | * |
| 330 | * Returns: |
| 331 | * 0: Success. |
| 332 | * EINVAL: The specified region wasn't found. |
| 333 | * EPERM: Trying to remove a static region. |
| 334 | */ |
| 335 | int mmap_remove_dynamic_region(uintptr_t base_va, size_t size); |
Sandrine Bailleux | 6634293 | 2017-07-18 13:26:36 +0100 | [diff] [blame] | 336 | int mmap_remove_dynamic_region_ctx(xlat_ctx_t *ctx, |
| 337 | uintptr_t base_va, |
| 338 | size_t size); |
| 339 | |
| 340 | #endif /* PLAT_XLAT_TABLES_DYNAMIC */ |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 341 | |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 342 | /* |
Sandrine Bailleux | 439c901 | 2017-10-17 12:02:03 +0100 | [diff] [blame] | 343 | * Change the memory attributes of the memory region starting from a given |
| 344 | * virtual address in a set of translation tables. |
| 345 | * |
| 346 | * This function can only be used after the translation tables have been |
| 347 | * initialized. |
| 348 | * |
| 349 | * The base address of the memory region must be aligned on a page boundary. |
| 350 | * The size of this memory region must be a multiple of a page size. |
| 351 | * The memory region must be already mapped by the given translation tables |
| 352 | * and it must be mapped at the granularity of a page. |
| 353 | * |
| 354 | * Return 0 on success, a negative value on error. |
| 355 | * |
| 356 | * In case of error, the memory attributes remain unchanged and this function |
| 357 | * has no effect. |
| 358 | * |
| 359 | * ctx |
| 360 | * Translation context to work on. |
| 361 | * base_va: |
| 362 | * Virtual address of the 1st page to change the attributes of. |
| 363 | * size: |
| 364 | * Size in bytes of the memory region. |
| 365 | * attr: |
| 366 | * New attributes of the page tables. The attributes that can be changed are |
| 367 | * data access (MT_RO/MT_RW), instruction access (MT_EXECUTE_NEVER/MT_EXECUTE) |
| 368 | * and user/privileged access (MT_USER/MT_PRIVILEGED) in the case of contexts |
| 369 | * that are used in the EL1&0 translation regime. Also, note that this |
| 370 | * function doesn't allow to remap a region as RW and executable, or to remap |
| 371 | * device memory as executable. |
| 372 | * |
| 373 | * NOTE: The caller of this function must be able to write to the translation |
| 374 | * tables, i.e. the memory where they are stored must be mapped with read-write |
| 375 | * access permissions. This function assumes it is the case. If this is not |
| 376 | * the case then this function might trigger a data abort exception. |
| 377 | * |
| 378 | * NOTE2: The caller is responsible for making sure that the targeted |
| 379 | * translation tables are not modified by any other code while this function is |
| 380 | * executing. |
| 381 | */ |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 382 | int xlat_change_mem_attributes_ctx(const xlat_ctx_t *ctx, uintptr_t base_va, |
| 383 | size_t size, uint32_t attr); |
| 384 | int xlat_change_mem_attributes(uintptr_t base_va, size_t size, uint32_t attr); |
Sandrine Bailleux | 439c901 | 2017-10-17 12:02:03 +0100 | [diff] [blame] | 385 | |
Petre-Ionut Tudor | e5a6fef | 2019-11-07 15:18:03 +0000 | [diff] [blame] | 386 | #if PLAT_RO_XLAT_TABLES |
| 387 | /* |
| 388 | * Change the memory attributes of the memory region encompassing the higher |
| 389 | * level translation tables to secure read-only data. |
| 390 | * |
| 391 | * Return 0 on success, a negative error code on error. |
| 392 | */ |
| 393 | int xlat_make_tables_readonly(void); |
| 394 | #endif |
| 395 | |
Sandrine Bailleux | 439c901 | 2017-10-17 12:02:03 +0100 | [diff] [blame] | 396 | /* |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 397 | * Query the memory attributes of a memory page in a set of translation tables. |
| 398 | * |
| 399 | * Return 0 on success, a negative error code on error. |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 400 | * On success, the attributes are stored into *attr. |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 401 | * |
| 402 | * ctx |
| 403 | * Translation context to work on. |
| 404 | * base_va |
| 405 | * Virtual address of the page to get the attributes of. |
| 406 | * There are no alignment restrictions on this address. The attributes of the |
| 407 | * memory page it lies within are returned. |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 408 | * attr |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 409 | * Output parameter where to store the attributes of the targeted memory page. |
| 410 | */ |
Antonio Nino Diaz | 6c4c9ee | 2018-08-05 15:34:10 +0100 | [diff] [blame] | 411 | int xlat_get_mem_attributes_ctx(const xlat_ctx_t *ctx, uintptr_t base_va, |
| 412 | uint32_t *attr); |
| 413 | int xlat_get_mem_attributes(uintptr_t base_va, uint32_t *attr); |
Sandrine Bailleux | c3708e2 | 2017-10-13 14:17:09 +0100 | [diff] [blame] | 414 | |
Julius Werner | 53456fc | 2019-07-09 13:49:11 -0700 | [diff] [blame] | 415 | #endif /*__ASSEMBLER__*/ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 416 | #endif /* XLAT_TABLES_V2_H */ |