xlat_tables_private.h 3.04 KB
Newer Older
1
/*
2
 * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
3
 *
dp-arm's avatar
dp-arm committed
4
 * SPDX-License-Identifier: BSD-3-Clause
5
6
 */

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
7
8
#ifndef XLAT_TABLES_PRIVATE_H
#define XLAT_TABLES_PRIVATE_H
9

10
#include <stdbool.h>
11
12
13
14

#include <platform_def.h>

#include <lib/xlat_tables/xlat_tables_defs.h>
15

16
17
#if PLAT_XLAT_TABLES_DYNAMIC
/*
18
 * Private shifts and masks to access fields of an mmap attribute
19
20
 */
/* Dynamic or static */
21
#define MT_DYN_SHIFT		U(31)
22
23
24
25

/*
 * Memory mapping private attributes
 *
26
 * Private attributes not exposed in the public header.
27
 */
28
29
30
31
32
33
34
35
36
37

/*
 * Regions mapped before the MMU can't be unmapped dynamically (they are
 * static) and regions mapped with MMU enabled can be unmapped. This
 * behaviour can't be overridden.
 *
 * Static regions can overlap each other, dynamic regions can't.
 */
#define MT_STATIC	(U(0) << MT_DYN_SHIFT)
#define MT_DYNAMIC	(U(1) << MT_DYN_SHIFT)
38

39
40
#endif /* PLAT_XLAT_TABLES_DYNAMIC */

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
41
42
extern uint64_t mmu_cfg_params[MMU_CFG_PARAM_MAX];

43
44
45
46
47
48
/*
 * Return the execute-never mask that will prevent instruction fetch at the
 * given translation regime.
 */
uint64_t xlat_arch_regime_get_xn_desc(int xlat_regime);

49
/*
50
51
52
 * Invalidate all TLB entries that match the given virtual address. This
 * operation applies to all PEs in the same Inner Shareable domain as the PE
 * that executes this function. This functions must be called for every
53
54
 * translation table entry that is modified. It only affects the specified
 * translation regime.
55
56
57
58
 *
 * Note, however, that it is architecturally UNDEFINED to invalidate TLB entries
 * pertaining to a higher exception level, e.g. invalidating EL3 entries from
 * S-EL1.
59
 */
60
void xlat_arch_tlbi_va(uintptr_t va, int xlat_regime);
61
62
63
64
65
66
67

/*
 * This function has to be called at the end of any code that uses the function
 * xlat_arch_tlbi_va().
 */
void xlat_arch_tlbi_va_sync(void);

68
/* Print VA, PA, size and attributes of all regions in the mmap array. */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
69
void xlat_mmap_print(const mmap_region_t *mmap);
70
71
72
73
74
75
76

/*
 * Print the current state of the translation tables by reading them from
 * memory.
 */
void xlat_tables_print(xlat_ctx_t *ctx);

77
78
79
80
/*
 * Returns a block/page table descriptor for the given level and attributes.
 */
uint64_t xlat_desc(const xlat_ctx_t *ctx, uint32_t attr,
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
81
		   unsigned long long addr_pa, unsigned int level);
82

83
84
85
86
/*
 * Architecture-specific initialization code.
 */

87
/* Returns the current Exception Level. The returned EL must be 1 or higher. */
Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
88
unsigned int xlat_arch_current_el(void);
89

90
91
92
93
94
/*
 * Return the maximum physical address supported by the hardware.
 * This value depends on the execution state (AArch32/AArch64).
 */
unsigned long long xlat_arch_get_max_supported_pa(void);
95

96
/*
97
98
 * Returns true if the MMU of the translation regime managed by the given
 * xlat_ctx_t is enabled, false otherwise.
99
 */
100
bool is_mmu_enabled_ctx(const xlat_ctx_t *ctx);
101

102
103
104
/* Returns true if the data cache is enabled at the current EL. */
bool is_dcache_enabled(void);

105
106
107
108
109
/*
 * Returns minimum virtual address space size supported by the architecture
 */
uintptr_t xlat_get_min_virt_addr_space_size(void);

Antonio Nino Diaz's avatar
Antonio Nino Diaz committed
110
#endif /* XLAT_TABLES_PRIVATE_H */