2 * File managing the MMU for ARMv7 architecture
4 * Copyright (c) 2011-2013, ARM Limited. All rights reserved.
6 * This program and the accompanying materials
7 * are licensed and made available under the terms and conditions of the BSD License
8 * which accompanies this distribution. The full text of the license may be found at
9 * http://opensource.org/licenses/bsd-license.php
11 * THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
17 #include <Chipset/ArmV7.h>
18 #include <Library/BaseMemoryLib.h>
19 #include <Library/MemoryAllocationLib.h>
20 #include <Library/ArmLib.h>
21 #include <Library/BaseLib.h>
22 #include <Library/DebugLib.h>
24 #include "ArmLibPrivate.h"
28 PopulateLevel2PageTable (
29 IN UINT32
*SectionEntry
,
30 IN UINT32 PhysicalBase
,
31 IN UINT32 RemainLength
,
32 IN ARM_MEMORY_REGION_ATTRIBUTES Attributes
38 UINT32 PageAttributes
;
39 UINT32 SectionDescriptor
;
40 UINT32 TranslationTable
;
41 UINT32 BaseSectionAddress
;
44 case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK
:
45 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK
:
46 PageAttributes
= TT_DESCRIPTOR_PAGE_WRITE_BACK
;
48 case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_THROUGH
:
49 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_THROUGH
:
50 PageAttributes
= TT_DESCRIPTOR_PAGE_WRITE_THROUGH
;
52 case ARM_MEMORY_REGION_ATTRIBUTE_DEVICE
:
53 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_DEVICE
:
54 PageAttributes
= TT_DESCRIPTOR_PAGE_DEVICE
;
56 case ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED
:
57 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_UNCACHED_UNBUFFERED
:
58 PageAttributes
= TT_DESCRIPTOR_PAGE_UNCACHED
;
61 PageAttributes
= TT_DESCRIPTOR_PAGE_UNCACHED
;
65 // Check if the Section Entry has already been populated. Otherwise attach a
66 // Level 2 Translation Table to it
67 if (*SectionEntry
!= 0) {
68 // The entry must be a page table. Otherwise it exists an overlapping in the memory map
69 if (TT_DESCRIPTOR_SECTION_TYPE_IS_PAGE_TABLE(*SectionEntry
)) {
70 TranslationTable
= *SectionEntry
& TT_DESCRIPTOR_SECTION_PAGETABLE_ADDRESS_MASK
;
71 } else if ((*SectionEntry
& TT_DESCRIPTOR_SECTION_TYPE_MASK
) == TT_DESCRIPTOR_SECTION_TYPE_SECTION
) {
72 // Case where a virtual memory map descriptor overlapped a section entry
74 // Allocate a Level2 Page Table for this Section
75 TranslationTable
= (UINTN
)AllocatePages(EFI_SIZE_TO_PAGES(TRANSLATION_TABLE_PAGE_SIZE
+ TRANSLATION_TABLE_PAGE_ALIGNMENT
));
76 TranslationTable
= ((UINTN
)TranslationTable
+ TRANSLATION_TABLE_PAGE_ALIGNMENT_MASK
) & ~TRANSLATION_TABLE_PAGE_ALIGNMENT_MASK
;
78 // Translate the Section Descriptor into Page Descriptor
79 SectionDescriptor
= TT_DESCRIPTOR_PAGE_TYPE_PAGE
;
80 SectionDescriptor
|= TT_DESCRIPTOR_CONVERT_TO_PAGE_CACHE_POLICY(*SectionEntry
,0);
81 SectionDescriptor
|= TT_DESCRIPTOR_CONVERT_TO_PAGE_AP(*SectionEntry
);
82 SectionDescriptor
|= TT_DESCRIPTOR_CONVERT_TO_PAGE_XN(*SectionEntry
,0);
83 SectionDescriptor
|= TT_DESCRIPTOR_CONVERT_TO_PAGE_NG(*SectionEntry
);
84 SectionDescriptor
|= TT_DESCRIPTOR_CONVERT_TO_PAGE_S(*SectionEntry
);
86 BaseSectionAddress
= TT_DESCRIPTOR_SECTION_BASE_ADDRESS(*SectionEntry
);
88 // Populate the new Level2 Page Table for the section
89 PageEntry
= (UINT32
*)TranslationTable
;
90 for (Index
= 0; Index
< TRANSLATION_TABLE_PAGE_COUNT
; Index
++) {
91 PageEntry
[Index
] = TT_DESCRIPTOR_PAGE_BASE_ADDRESS(BaseSectionAddress
+ (Index
<< 12)) | SectionDescriptor
;
94 // Overwrite the section entry to point to the new Level2 Translation Table
95 *SectionEntry
= (TranslationTable
& TT_DESCRIPTOR_SECTION_PAGETABLE_ADDRESS_MASK
) |
96 (IS_ARM_MEMORY_REGION_ATTRIBUTES_SECURE(Attributes
) ? (1 << 3) : 0) |
97 TT_DESCRIPTOR_SECTION_TYPE_PAGE_TABLE
;
99 // We do not support the other section type (16MB Section)
104 TranslationTable
= (UINTN
)AllocatePages(EFI_SIZE_TO_PAGES(TRANSLATION_TABLE_PAGE_SIZE
+ TRANSLATION_TABLE_PAGE_ALIGNMENT
));
105 TranslationTable
= ((UINTN
)TranslationTable
+ TRANSLATION_TABLE_PAGE_ALIGNMENT_MASK
) & ~TRANSLATION_TABLE_PAGE_ALIGNMENT_MASK
;
107 ZeroMem ((VOID
*)TranslationTable
, TRANSLATION_TABLE_PAGE_SIZE
);
109 *SectionEntry
= (TranslationTable
& TT_DESCRIPTOR_SECTION_PAGETABLE_ADDRESS_MASK
) |
110 (IS_ARM_MEMORY_REGION_ATTRIBUTES_SECURE(Attributes
) ? (1 << 3) : 0) |
111 TT_DESCRIPTOR_SECTION_TYPE_PAGE_TABLE
;
114 PageEntry
= ((UINT32
*)(TranslationTable
) + ((PhysicalBase
& TT_DESCRIPTOR_PAGE_INDEX_MASK
) >> TT_DESCRIPTOR_PAGE_BASE_SHIFT
));
115 Pages
= RemainLength
/ TT_DESCRIPTOR_PAGE_SIZE
;
117 for (Index
= 0; Index
< Pages
; Index
++) {
118 *PageEntry
++ = TT_DESCRIPTOR_PAGE_BASE_ADDRESS(PhysicalBase
) | PageAttributes
;
119 PhysicalBase
+= TT_DESCRIPTOR_PAGE_SIZE
;
126 FillTranslationTable (
127 IN UINT32
*TranslationTable
,
128 IN ARM_MEMORY_REGION_DESCRIPTOR
*MemoryRegion
131 UINT32
*SectionEntry
;
133 UINT32 PhysicalBase
= MemoryRegion
->PhysicalBase
;
134 UINT32 RemainLength
= MemoryRegion
->Length
;
136 ASSERT(MemoryRegion
->Length
> 0);
138 switch (MemoryRegion
->Attributes
) {
139 case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK
:
140 Attributes
= TT_DESCRIPTOR_SECTION_WRITE_BACK(0);
142 case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_THROUGH
:
143 Attributes
= TT_DESCRIPTOR_SECTION_WRITE_THROUGH(0);
145 case ARM_MEMORY_REGION_ATTRIBUTE_DEVICE
:
146 Attributes
= TT_DESCRIPTOR_SECTION_DEVICE(0);
148 case ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED
:
149 Attributes
= TT_DESCRIPTOR_SECTION_UNCACHED(0);
151 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK
:
152 Attributes
= TT_DESCRIPTOR_SECTION_WRITE_BACK(1);
154 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_THROUGH
:
155 Attributes
= TT_DESCRIPTOR_SECTION_WRITE_THROUGH(1);
157 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_DEVICE
:
158 Attributes
= TT_DESCRIPTOR_SECTION_DEVICE(1);
160 case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_UNCACHED_UNBUFFERED
:
161 Attributes
= TT_DESCRIPTOR_SECTION_UNCACHED(1);
164 Attributes
= TT_DESCRIPTOR_SECTION_UNCACHED(0);
168 // Get the first section entry for this mapping
169 SectionEntry
= TRANSLATION_TABLE_ENTRY_FOR_VIRTUAL_ADDRESS(TranslationTable
, MemoryRegion
->VirtualBase
);
171 while (RemainLength
!= 0) {
172 if (PhysicalBase
% TT_DESCRIPTOR_SECTION_SIZE
== 0) {
173 if (RemainLength
>= TT_DESCRIPTOR_SECTION_SIZE
) {
174 // Case: Physical address aligned on the Section Size (1MB) && the length is greater than the Section Size
175 *SectionEntry
++ = TT_DESCRIPTOR_SECTION_BASE_ADDRESS(PhysicalBase
) | Attributes
;
176 PhysicalBase
+= TT_DESCRIPTOR_SECTION_SIZE
;
178 // Case: Physical address aligned on the Section Size (1MB) && the length does not fill a section
179 PopulateLevel2PageTable (SectionEntry
++, PhysicalBase
, RemainLength
, MemoryRegion
->Attributes
);
181 // It must be the last entry
185 // Case: Physical address NOT aligned on the Section Size (1MB)
186 PopulateLevel2PageTable (SectionEntry
++, PhysicalBase
, RemainLength
, MemoryRegion
->Attributes
);
187 // Aligned the address
188 PhysicalBase
= (PhysicalBase
+ TT_DESCRIPTOR_SECTION_SIZE
) & ~(TT_DESCRIPTOR_SECTION_SIZE
-1);
190 // If it is the last entry
191 if (RemainLength
< TT_DESCRIPTOR_SECTION_SIZE
) {
195 RemainLength
-= TT_DESCRIPTOR_SECTION_SIZE
;
202 IN ARM_MEMORY_REGION_DESCRIPTOR
*MemoryTable
,
203 OUT VOID
**TranslationTableBase OPTIONAL
,
204 OUT UINTN
*TranslationTableSize OPTIONAL
207 VOID
* TranslationTable
;
208 ARM_MEMORY_REGION_ATTRIBUTES TranslationTableAttribute
;
209 UINT32 TTBRAttributes
;
211 // Allocate pages for translation table.
212 TranslationTable
= AllocatePages (EFI_SIZE_TO_PAGES (TRANSLATION_TABLE_SECTION_SIZE
+ TRANSLATION_TABLE_SECTION_ALIGNMENT
));
213 if (TranslationTable
== NULL
) {
214 return RETURN_OUT_OF_RESOURCES
;
216 TranslationTable
= (VOID
*)(((UINTN
)TranslationTable
+ TRANSLATION_TABLE_SECTION_ALIGNMENT_MASK
) & ~TRANSLATION_TABLE_SECTION_ALIGNMENT_MASK
);
218 if (TranslationTableBase
!= NULL
) {
219 *TranslationTableBase
= TranslationTable
;
222 if (TranslationTableSize
!= NULL
) {
223 *TranslationTableSize
= TRANSLATION_TABLE_SECTION_SIZE
;
226 ZeroMem (TranslationTable
, TRANSLATION_TABLE_SECTION_SIZE
);
228 ArmCleanInvalidateDataCache ();
229 ArmInvalidateInstructionCache ();
231 ArmDisableDataCache ();
232 ArmDisableInstructionCache();
233 // TLBs are also invalidated when calling ArmDisableMmu()
236 // Make sure nothing sneaked into the cache
237 ArmCleanInvalidateDataCache ();
238 ArmInvalidateInstructionCache ();
240 // By default, mark the translation table as belonging to a uncached region
241 TranslationTableAttribute
= ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED
;
242 while (MemoryTable
->Length
!= 0) {
243 // Find the memory attribute for the Translation Table
244 if (((UINTN
)TranslationTable
>= MemoryTable
->PhysicalBase
) && ((UINTN
)TranslationTable
<= MemoryTable
->PhysicalBase
- 1 + MemoryTable
->Length
)) {
245 TranslationTableAttribute
= MemoryTable
->Attributes
;
248 FillTranslationTable (TranslationTable
, MemoryTable
);
252 // Translate the Memory Attributes into Translation Table Register Attributes
253 if ((TranslationTableAttribute
== ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED
) ||
254 (TranslationTableAttribute
== ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_UNCACHED_UNBUFFERED
)) {
255 TTBRAttributes
= TTBR_NON_CACHEABLE
;
256 } else if ((TranslationTableAttribute
== ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK
) ||
257 (TranslationTableAttribute
== ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK
)) {
258 TTBRAttributes
= TTBR_WRITE_BACK_ALLOC
;
259 } else if ((TranslationTableAttribute
== ARM_MEMORY_REGION_ATTRIBUTE_WRITE_THROUGH
) ||
260 (TranslationTableAttribute
== ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_THROUGH
)) {
261 TTBRAttributes
= TTBR_WRITE_THROUGH_NO_ALLOC
;
263 ASSERT (0); // No support has been found for the attributes of the memory region that the translation table belongs to.
264 return RETURN_UNSUPPORTED
;
267 ArmSetTTBR0 ((VOID
*)(UINTN
)(((UINTN
)TranslationTable
& ~TRANSLATION_TABLE_SECTION_ALIGNMENT_MASK
) | (TTBRAttributes
& 0x7F)));
269 ArmSetDomainAccessControl (DOMAIN_ACCESS_CONTROL_NONE(15) |
270 DOMAIN_ACCESS_CONTROL_NONE(14) |
271 DOMAIN_ACCESS_CONTROL_NONE(13) |
272 DOMAIN_ACCESS_CONTROL_NONE(12) |
273 DOMAIN_ACCESS_CONTROL_NONE(11) |
274 DOMAIN_ACCESS_CONTROL_NONE(10) |
275 DOMAIN_ACCESS_CONTROL_NONE( 9) |
276 DOMAIN_ACCESS_CONTROL_NONE( 8) |
277 DOMAIN_ACCESS_CONTROL_NONE( 7) |
278 DOMAIN_ACCESS_CONTROL_NONE( 6) |
279 DOMAIN_ACCESS_CONTROL_NONE( 5) |
280 DOMAIN_ACCESS_CONTROL_NONE( 4) |
281 DOMAIN_ACCESS_CONTROL_NONE( 3) |
282 DOMAIN_ACCESS_CONTROL_NONE( 2) |
283 DOMAIN_ACCESS_CONTROL_NONE( 1) |
284 DOMAIN_ACCESS_CONTROL_MANAGER(0));
286 ArmEnableInstructionCache();
287 ArmEnableDataCache();
289 return RETURN_SUCCESS
;