Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 1 | /* |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame^] | 2 | * Copyright (c) 2017-2021, Arm Limited and Contributors. All rights reserved. |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 7 | #ifndef XLAT_TABLES_PRIVATE_H |
| 8 | #define XLAT_TABLES_PRIVATE_H |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 9 | |
Antonio Nino Diaz | 5c97bd1 | 2018-08-02 09:57:29 +0100 | [diff] [blame] | 10 | #include <stdbool.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 11 | |
| 12 | #include <platform_def.h> |
| 13 | |
| 14 | #include <lib/xlat_tables/xlat_tables_defs.h> |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 15 | |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 16 | #if PLAT_XLAT_TABLES_DYNAMIC |
| 17 | /* |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 18 | * Private shifts and masks to access fields of an mmap attribute |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 19 | */ |
| 20 | /* Dynamic or static */ |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 21 | #define MT_DYN_SHIFT U(31) |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 22 | |
| 23 | /* |
| 24 | * Memory mapping private attributes |
| 25 | * |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 26 | * Private attributes not exposed in the public header. |
| 27 | */ |
| 28 | |
| 29 | /* |
| 30 | * Regions mapped before the MMU can't be unmapped dynamically (they are |
| 31 | * static) and regions mapped with MMU enabled can be unmapped. This |
| 32 | * behaviour can't be overridden. |
| 33 | * |
| 34 | * Static regions can overlap each other, dynamic regions can't. |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 35 | */ |
Antonio Nino Diaz | 8643a81 | 2018-06-21 14:39:16 +0100 | [diff] [blame] | 36 | #define MT_STATIC (U(0) << MT_DYN_SHIFT) |
| 37 | #define MT_DYNAMIC (U(1) << MT_DYN_SHIFT) |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 38 | |
Sandrine Bailleux | 3383554 | 2017-04-25 14:09:47 +0100 | [diff] [blame] | 39 | #endif /* PLAT_XLAT_TABLES_DYNAMIC */ |
| 40 | |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 41 | extern uint64_t mmu_cfg_params[MMU_CFG_PARAM_MAX]; |
| 42 | |
Zelalem Aweke | 173c6a2 | 2021-07-08 17:23:04 -0500 | [diff] [blame^] | 43 | /* Determine the physical address space encoded in the 'attr' parameter. */ |
| 44 | uint32_t xlat_arch_get_pas(uint32_t attr); |
| 45 | |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 46 | /* |
Antonio Nino Diaz | 44d3c21 | 2018-07-05 08:11:48 +0100 | [diff] [blame] | 47 | * Return the execute-never mask that will prevent instruction fetch at the |
| 48 | * given translation regime. |
| 49 | */ |
| 50 | uint64_t xlat_arch_regime_get_xn_desc(int xlat_regime); |
| 51 | |
| 52 | /* |
Douglas Raillard | 2d54579 | 2017-09-25 15:23:22 +0100 | [diff] [blame] | 53 | * Invalidate all TLB entries that match the given virtual address. This |
| 54 | * operation applies to all PEs in the same Inner Shareable domain as the PE |
| 55 | * that executes this function. This functions must be called for every |
Antonio Nino Diaz | ad5dc7f | 2018-07-11 09:46:45 +0100 | [diff] [blame] | 56 | * translation table entry that is modified. It only affects the specified |
| 57 | * translation regime. |
Douglas Raillard | 2d54579 | 2017-09-25 15:23:22 +0100 | [diff] [blame] | 58 | * |
| 59 | * Note, however, that it is architecturally UNDEFINED to invalidate TLB entries |
| 60 | * pertaining to a higher exception level, e.g. invalidating EL3 entries from |
| 61 | * S-EL1. |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 62 | */ |
Antonio Nino Diaz | ad5dc7f | 2018-07-11 09:46:45 +0100 | [diff] [blame] | 63 | void xlat_arch_tlbi_va(uintptr_t va, int xlat_regime); |
Antonio Nino Diaz | ac99803 | 2017-02-27 17:23:54 +0000 | [diff] [blame] | 64 | |
| 65 | /* |
| 66 | * This function has to be called at the end of any code that uses the function |
| 67 | * xlat_arch_tlbi_va(). |
| 68 | */ |
| 69 | void xlat_arch_tlbi_va_sync(void); |
| 70 | |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 71 | /* Print VA, PA, size and attributes of all regions in the mmap array. */ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 72 | void xlat_mmap_print(const mmap_region_t *mmap); |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 73 | |
| 74 | /* |
| 75 | * Print the current state of the translation tables by reading them from |
| 76 | * memory. |
| 77 | */ |
| 78 | void xlat_tables_print(xlat_ctx_t *ctx); |
| 79 | |
| 80 | /* |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 81 | * Returns a block/page table descriptor for the given level and attributes. |
| 82 | */ |
| 83 | uint64_t xlat_desc(const xlat_ctx_t *ctx, uint32_t attr, |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 84 | unsigned long long addr_pa, unsigned int level); |
Antonio Nino Diaz | f1b84f6 | 2018-07-03 11:58:49 +0100 | [diff] [blame] | 85 | |
| 86 | /* |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 87 | * Architecture-specific initialization code. |
| 88 | */ |
Antonio Nino Diaz | efabaa9 | 2017-04-27 13:30:22 +0100 | [diff] [blame] | 89 | |
| 90 | /* Returns the current Exception Level. The returned EL must be 1 or higher. */ |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 91 | unsigned int xlat_arch_current_el(void); |
Antonio Nino Diaz | efabaa9 | 2017-04-27 13:30:22 +0100 | [diff] [blame] | 92 | |
| 93 | /* |
Sandrine Bailleux | c5b6377 | 2017-05-31 13:31:48 +0100 | [diff] [blame] | 94 | * Return the maximum physical address supported by the hardware. |
| 95 | * This value depends on the execution state (AArch32/AArch64). |
| 96 | */ |
| 97 | unsigned long long xlat_arch_get_max_supported_pa(void); |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 98 | |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 99 | /* |
Antonio Nino Diaz | 5c97bd1 | 2018-08-02 09:57:29 +0100 | [diff] [blame] | 100 | * Returns true if the MMU of the translation regime managed by the given |
| 101 | * xlat_ctx_t is enabled, false otherwise. |
Antonio Nino Diaz | dcf9d92 | 2017-10-04 16:52:15 +0100 | [diff] [blame] | 102 | */ |
Antonio Nino Diaz | 5c97bd1 | 2018-08-02 09:57:29 +0100 | [diff] [blame] | 103 | bool is_mmu_enabled_ctx(const xlat_ctx_t *ctx); |
Antonio Nino Diaz | 233c7c1 | 2017-03-08 14:40:23 +0000 | [diff] [blame] | 104 | |
Sathees Balya | 7415597 | 2019-01-25 11:36:01 +0000 | [diff] [blame] | 105 | /* |
| 106 | * Returns minimum virtual address space size supported by the architecture |
| 107 | */ |
| 108 | uintptr_t xlat_get_min_virt_addr_space_size(void); |
| 109 | |
Antonio Nino Diaz | 50eb374 | 2018-07-24 10:20:53 +0100 | [diff] [blame] | 110 | #endif /* XLAT_TABLES_PRIVATE_H */ |