From nobody Mon Sep 16 19:20:26 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+101118+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101118+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1678727893; cv=none; d=zohomail.com; s=zohoarc; b=aUQ2lSrKvy7ScPObkutomZmEtcabZ5MHxZkUaj/iP7NIvO6kOlFrf8KhcB7hzu2UHfkZEMj7VdVFxhStrnIYwGRScAG1OZsD4Zb/GXRlEUyxCKrRqq+UwchP90qJOll1/BY6uel4IIuCGPJzK3LwCPq0zcI21PGstaPQCD5l+0k= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1678727893; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=VZi5YIn7TMevM25WepiPhQfu4Goc69giPtRYh1rKuq4=; b=PeUjh7SXnCo+uvnFl19BkB+WpdQkv3fkXNi8g/6QxMmepPwAFzR8BgScw5ivTSG9cdthIKPCsAGLV8zD45d09cMZffpOW0CowoAkiilRDbLeBx/msCV+27WPVGZPDN2HbBjqETICmiqoY1AjY2nhm+m0q+IjY56uLKz5fRQkxjE= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+101118+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1678727893560327.06371367306485; Mon, 13 Mar 2023 10:18:13 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id 5Uu4YY1788612xAMW0bfUdJF; Mon, 13 Mar 2023 10:18:13 -0700 X-Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web11.26488.1678727892428838331 for ; Mon, 13 Mar 2023 10:18:12 -0700 X-Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id E182061456; Mon, 13 Mar 2023 17:18:11 +0000 (UTC) X-Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6F729C4339B; Mon, 13 Mar 2023 17:18:08 +0000 (UTC) From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Michael Kinney , Liming Gao , Jiewen Yao , Michael Kubacki , Sean Brogan , Rebecca Cran , Leif Lindholm , Sami Mujawar , Taylor Beebe Subject: [edk2-devel] [PATCH v5 14/38] ArmPkg/Mmu: Remove handling of NONSECURE memory regions Date: Mon, 13 Mar 2023 18:16:50 +0100 Message-Id: <20230313171714.3866151-15-ardb@kernel.org> In-Reply-To: <20230313171714.3866151-1-ardb@kernel.org> References: <20230313171714.3866151-1-ardb@kernel.org> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ardb@kernel.org X-Gm-Message-State: bo1nNIEbgxMNKE096ZQ11Zl9x1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1678727893; bh=OjdEV4nUdrphr63UNAjVxMBp4nbkGWXmkRpeWnHO+BY=; h=Cc:Date:From:Reply-To:Subject:To; b=ntC0H2bXNgyxN47XhHLjY/NYE/CMaC4au36gGJ4SgBdFQvkVp33tfPGPdgr2faGap24 8bv2DgBCwlAdyXYjMbQ/fpcXVt57PmoWyXZesX89EtBYssBh6Tru1g5lGHI67XtqhM0wQ wehqOF6lNEAnyfF/9f4QbeetW51tWBYJoEc= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1678727894224100001 Content-Type: text/plain; charset="utf-8" Non-secure memory is a distinction that only matters when executing code in the secure world that reasons about the secure vs non-secure address spaces. EDK2 was not designed for that, and the AArch64 version of the MMU handling library already treats them as identical, so let's just drop the ARM memory region types that mark memory as 'non-secure' explicitly. Signed-off-by: Ard Biesheuvel --- ArmPkg/Include/Chipset/ArmV7Mmu.h | 51 +++++++------------- ArmPkg/Include/Library/ArmLib.h | 11 ----- ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c | 5 -- ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c | 33 +++---------- 4 files changed, 24 insertions(+), 76 deletions(-) diff --git a/ArmPkg/Include/Chipset/ArmV7Mmu.h b/ArmPkg/Include/Chipset/Arm= V7Mmu.h index da4f3160f8ff..89b81e33d004 100644 --- a/ArmPkg/Include/Chipset/ArmV7Mmu.h +++ b/ArmPkg/Include/Chipset/ArmV7Mmu.h @@ -157,39 +157,24 @@ #define TT_DESCRIPTOR_PAGE_BASE_ADDRESS(a) ((a) & TT_DESCRIPTOR_PAGE_BASE= _ADDRESS_MASK) #define TT_DESCRIPTOR_PAGE_BASE_SHIFT 12 =20 -#define TT_DESCRIPTOR_SECTION_WRITE_BACK(NonSecure) (TT_DESCRIPTOR_SEC= TION_TYPE_SECTION = | \ - ((NonSecure) ?= TT_DESCRIPTOR_SECTION_NS : 0) | \ - TT_DESCRIPTOR_= SECTION_NG_GLOBAL | \ - TT_DESCRIPTOR_= SECTION_S_SHARED | \ - TT_DESCRIPTOR_= SECTION_DOMAIN(0) | \ - TT_DESCRIPTOR_= SECTION_AP_RW_RW | \ - TT_DESCRIPTOR_= SECTION_AF | \ - TT_DESCRIPTOR_= SECTION_CACHE_POLICY_WRITE_BACK_ALLOC) -#define TT_DESCRIPTOR_SECTION_WRITE_THROUGH(NonSecure) (TT_DESCRIPTOR_SEC= TION_TYPE_SECTION = | \ - ((NonSecure) ?= TT_DESCRIPTOR_SECTION_NS : 0) | \ - TT_DESCRIPTOR_= SECTION_NG_GLOBAL | \ - TT_DESCRIPTOR_= SECTION_S_SHARED | \ - TT_DESCRIPTOR_= SECTION_DOMAIN(0) | \ - TT_DESCRIPTOR_= SECTION_AP_RW_RW | \ - TT_DESCRIPTOR_= SECTION_AF | \ - TT_DESCRIPTOR_= SECTION_CACHE_POLICY_WRITE_THROUGH_NO_ALLOC) -#define TT_DESCRIPTOR_SECTION_DEVICE(NonSecure) (TT_DESCRIPTOR_SEC= TION_TYPE_SECTION = | \ - ((NonSecure) ?= TT_DESCRIPTOR_SECTION_NS : 0) | \ - TT_DESCRIPTOR_= SECTION_NG_GLOBAL | \ - TT_DESCRIPTOR_= SECTION_S_NOT_SHARED | \ - TT_DESCRIPTOR_= SECTION_DOMAIN(0) | \ - TT_DESCRIPTOR_= SECTION_AP_RW_RW | \ - TT_DESCRIPTOR_= SECTION_XN_MASK | \ - TT_DESCRIPTOR_= SECTION_AF | \ - TT_DESCRIPTOR_= SECTION_CACHE_POLICY_SHAREABLE_DEVICE) -#define TT_DESCRIPTOR_SECTION_UNCACHED(NonSecure) (TT_DESCRIPTOR_SEC= TION_TYPE_SECTION = | \ - ((NonSecure) ? = TT_DESCRIPTOR_SECTION_NS : 0) | \ - TT_DESCRIPTOR_S= ECTION_NG_GLOBAL | \ - TT_DESCRIPTOR_S= ECTION_S_NOT_SHARED | \ - TT_DESCRIPTOR_S= ECTION_DOMAIN(0) | \ - TT_DESCRIPTOR_S= ECTION_AP_RW_RW | \ - TT_DESCRIPTOR_= SECTION_AF | \ - TT_DESCRIPTOR_S= ECTION_CACHE_POLICY_NON_CACHEABLE) +#define TT_DESCRIPTOR_SECTION_DEFAULT (TT_DESCRIPTOR_SECTION_TYPE_SECTION= | \ + TT_DESCRIPTOR_SECTION_NG_GLOBAL = | \ + TT_DESCRIPTOR_SECTION_S_SHARED = | \ + TT_DESCRIPTOR_SECTION_DOMAIN(0) = | \ + TT_DESCRIPTOR_SECTION_AP_RW_RW = | \ + TT_DESCRIPTOR_SECTION_AF) + +#define TT_DESCRIPTOR_SECTION_WRITE_BACK (TT_DESCRIPTOR_SECTION_DEFAULT |= \ + TT_DESCRIPTOR_SECTION_CACHE_POL= ICY_WRITE_BACK_ALLOC) + +#define TT_DESCRIPTOR_SECTION_WRITE_THROUGH (TT_DESCRIPTOR_SECTION_DEFAUL= T | \ + TT_DESCRIPTOR_SECTION_CACHE_= POLICY_WRITE_THROUGH_NO_ALLOC) + +#define TT_DESCRIPTOR_SECTION_DEVICE (TT_DESCRIPTOR_SECTION_DEFAULT | \ + TT_DESCRIPTOR_SECTION_CACHE_POLICY_= SHAREABLE_DEVICE) + +#define TT_DESCRIPTOR_SECTION_UNCACHED (TT_DESCRIPTOR_SECTION_DEFAULT | \ + TT_DESCRIPTOR_SECTION_CACHE_POLIC= Y_NON_CACHEABLE) =20 #define TT_DESCRIPTOR_PAGE_WRITE_BACK (TT_DESCRIPTOR_PAGE_TYPE_PAGE = | \ TT_DESCRIPTOR_PAGE= _NG_GLOBAL | \ diff --git a/ArmPkg/Include/Library/ArmLib.h b/ArmPkg/Include/Library/ArmLi= b.h index fa605f128bfd..a53f60d98852 100644 --- a/ArmPkg/Include/Library/ArmLib.h +++ b/ArmPkg/Include/Library/ArmLib.h @@ -25,29 +25,18 @@ EFI_MEMORY_WT | EFI_MEMORY_WB | \ EFI_MEMORY_UCE) =20 -/** - * The UEFI firmware must not use the ARM_MEMORY_REGION_ATTRIBUTE_NONSECUR= E_* attributes. - * - * The Non Secure memory attribute (ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_= *) should only - * be used in Secure World to distinguished Secure to Non-Secure memory. - */ typedef enum { ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED =3D 0, - ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_UNCACHED_UNBUFFERED, ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK, - ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK, =20 // On some platforms, memory mapped flash region is designed as not supp= orting // shareable attribute, so WRITE_BACK_NONSHAREABLE is added for such spe= cial // need. // Do NOT use below two attributes if you are not sure. ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK_NONSHAREABLE, - ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK_NONSHAREABLE, =20 ARM_MEMORY_REGION_ATTRIBUTE_WRITE_THROUGH, - ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_THROUGH, ARM_MEMORY_REGION_ATTRIBUTE_DEVICE, - ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_DEVICE } ARM_MEMORY_REGION_ATTRIBUTES; =20 #define IS_ARM_MEMORY_REGION_ATTRIBUTES_SECURE(attr) ((UINT32)(attr) & 1) diff --git a/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c b/ArmPkg/Libr= ary/ArmMmuLib/AArch64/ArmMmuLibCore.c index 1ce200c43c72..ee4c5c995ce8 100644 --- a/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c +++ b/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c @@ -39,26 +39,21 @@ ArmMemoryAttributeToPageAttribute ( { switch (Attributes) { case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK_NONSHAREABLE: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK_NONSHAREABLE: return TT_ATTR_INDX_MEMORY_WRITE_BACK; =20 case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK: return TT_ATTR_INDX_MEMORY_WRITE_BACK | TT_SH_INNER_SHAREABLE; =20 case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_THROUGH: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_THROUGH: return TT_ATTR_INDX_MEMORY_WRITE_THROUGH | TT_SH_INNER_SHAREABLE; =20 // Uncached and device mappings are treated as outer shareable by defa= ult, case ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_UNCACHED_UNBUFFERED: return TT_ATTR_INDX_MEMORY_NON_CACHEABLE; =20 default: ASSERT (0); case ARM_MEMORY_REGION_ATTRIBUTE_DEVICE: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_DEVICE: if (ArmReadCurrentEL () =3D=3D AARCH64_EL2) { return TT_ATTR_INDX_DEVICE_MEMORY | TT_XN_MASK; } else { diff --git a/ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c b/ArmPkg/Library/= ArmMmuLib/Arm/ArmMmuLibCore.c index 28cc9b2fe058..154298357460 100644 --- a/ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c +++ b/ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c @@ -100,24 +100,19 @@ PopulateLevel2PageTable ( =20 switch (Attributes) { case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK: PageAttributes =3D TT_DESCRIPTOR_PAGE_WRITE_BACK; break; case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK_NONSHAREABLE: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK_NONSHAREABLE: PageAttributes =3D TT_DESCRIPTOR_PAGE_WRITE_BACK; PageAttributes &=3D ~TT_DESCRIPTOR_PAGE_S_SHARED; break; case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_THROUGH: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_THROUGH: PageAttributes =3D TT_DESCRIPTOR_PAGE_WRITE_THROUGH; break; case ARM_MEMORY_REGION_ATTRIBUTE_DEVICE: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_DEVICE: PageAttributes =3D TT_DESCRIPTOR_PAGE_DEVICE; break; case ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED: - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_UNCACHED_UNBUFFERED: PageAttributes =3D TT_DESCRIPTOR_PAGE_UNCACHED; break; default: @@ -239,39 +234,23 @@ FillTranslationTable ( =20 switch (MemoryRegion->Attributes) { case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK: - Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_BACK (0); + Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_BACK; break; case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK_NONSHAREABLE: - Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_BACK (0); + Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_BACK; Attributes &=3D ~TT_DESCRIPTOR_SECTION_S_SHARED; break; case ARM_MEMORY_REGION_ATTRIBUTE_WRITE_THROUGH: - Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_THROUGH (0); + Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_THROUGH; break; case ARM_MEMORY_REGION_ATTRIBUTE_DEVICE: - Attributes =3D TT_DESCRIPTOR_SECTION_DEVICE (0); + Attributes =3D TT_DESCRIPTOR_SECTION_DEVICE; break; case ARM_MEMORY_REGION_ATTRIBUTE_UNCACHED_UNBUFFERED: - Attributes =3D TT_DESCRIPTOR_SECTION_UNCACHED (0); - break; - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK: - Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_BACK (1); - break; - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_BACK_NONSHAREABLE: - Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_BACK (1); - Attributes &=3D ~TT_DESCRIPTOR_SECTION_S_SHARED; - break; - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_WRITE_THROUGH: - Attributes =3D TT_DESCRIPTOR_SECTION_WRITE_THROUGH (1); - break; - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_DEVICE: - Attributes =3D TT_DESCRIPTOR_SECTION_DEVICE (1); - break; - case ARM_MEMORY_REGION_ATTRIBUTE_NONSECURE_UNCACHED_UNBUFFERED: - Attributes =3D TT_DESCRIPTOR_SECTION_UNCACHED (1); + Attributes =3D TT_DESCRIPTOR_SECTION_UNCACHED; break; default: - Attributes =3D TT_DESCRIPTOR_SECTION_UNCACHED (0); + Attributes =3D TT_DESCRIPTOR_SECTION_UNCACHED; break; } =20 --=20 2.39.2 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#101118): https://edk2.groups.io/g/devel/message/101118 Mute This Topic: https://groups.io/mt/97586013/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-