blob: d23246d8fc759dcf703b341c2d4e9b9b5eb6c157 [file] [log] [blame]
/* ARMv8-M Security Extensions routines.
Copyright (C) 2015-2021 Free Software Foundation, Inc.
Contributed by ARM Ltd.
This file is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the
Free Software Foundation; either version 3, or (at your option) any
later version.
This file is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
Under Section 7 of GPL version 3, you are granted additional
permissions described in the GCC Runtime Library Exception, version
3.1, as published by the Free Software Foundation.
You should have received a copy of the GNU General Public License and
a copy of the GCC Runtime Library Exception along with this program;
see the files COPYING3 and COPYING.RUNTIME respectively. If not, see
<http://www.gnu.org/licenses/>. */
#if __ARM_FEATURE_CMSE & 1
#include <arm_cmse.h>
/* ARM intrinsic function to perform a permission check on a given
address range. See ACLE changes for ARMv8-M. */
void *
__attribute__ ((warn_unused_result))
cmse_check_address_range (void *p, size_t size, int flags)
{
cmse_address_info_t permb, perme;
char *pb = (char *) p, *pe;
/* Check if the range wraps around. */
if (__UINTPTR_MAX__ - (__UINTPTR_TYPE__) p < size)
return NULL;
/* Check if an unknown flag is present. */
int known = CMSE_MPU_UNPRIV | CMSE_MPU_READWRITE | CMSE_MPU_READ;
int known_secure_level = CMSE_MPU_UNPRIV;
#if __ARM_FEATURE_CMSE & 2
known |= CMSE_AU_NONSECURE | CMSE_MPU_NONSECURE;
known_secure_level |= CMSE_MPU_NONSECURE;
#endif
if (flags & (~known))
return NULL;
/* Execute the right variant of the TT instructions. */
pe = pb + size - 1;
const int singleCheck
= (((__UINTPTR_TYPE__) pb ^ (__UINTPTR_TYPE__) pe) < 32);
switch (flags & known_secure_level)
{
case 0:
permb = cmse_TT (pb);
perme = singleCheck ? permb : cmse_TT (pe);
break;
case CMSE_MPU_UNPRIV:
permb = cmse_TTT (pb);
perme = singleCheck ? permb : cmse_TTT (pe);
break;
#if __ARM_FEATURE_CMSE & 2
case CMSE_MPU_NONSECURE:
permb = cmse_TTA (pb);
perme = singleCheck ? permb : cmse_TTA (pe);
break;
case CMSE_MPU_UNPRIV | CMSE_MPU_NONSECURE:
permb = cmse_TTAT (pb);
perme = singleCheck ? permb : cmse_TTAT (pe);
break;
#endif
default:
/* Invalid flag, eg. CMSE_MPU_NONSECURE specified but
__ARM_FEATURE_CMSE & 2 == 0. */
return NULL;
}
/* Check that the range does not cross MPU, SAU, or IDAU boundaries. */
if (permb.value != perme.value)
return NULL;
/* Check the permissions on the range. */
switch (flags & (~known_secure_level))
{
#if __ARM_FEATURE_CMSE & 2
case CMSE_MPU_READ | CMSE_MPU_READWRITE | CMSE_AU_NONSECURE:
case CMSE_MPU_READWRITE | CMSE_AU_NONSECURE:
return permb.flags.nonsecure_readwrite_ok ? p : NULL;
case CMSE_MPU_READ | CMSE_AU_NONSECURE:
return permb.flags.nonsecure_read_ok ? p : NULL;
case CMSE_AU_NONSECURE:
return permb.flags.secure ? NULL : p;
#endif
case CMSE_MPU_READ | CMSE_MPU_READWRITE:
case CMSE_MPU_READWRITE:
return permb.flags.readwrite_ok ? p : NULL;
case CMSE_MPU_READ:
return permb.flags.read_ok ? p : NULL;
default:
return NULL;
}
}
#endif /* __ARM_FEATURE_CMSE & 1. */