blob: 47c5ae8db34da3b70fdb6d4fb24e0dcee8bae5cc [file] [log] [blame]
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +00001/*
Roberto Vargas777dd432018-02-12 12:36:17 +00002 * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +00005 */
6
Antonio Nino Diaz50eb3742018-07-24 10:20:53 +01007#ifndef XLAT_TABLES_PRIVATE_H
8#define XLAT_TABLES_PRIVATE_H
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +00009
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000010#include <platform_def.h>
Sandrine Bailleux090c8492017-05-19 09:59:37 +010011#include <xlat_tables_defs.h>
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000012
Antonio Nino Diazac998032017-02-27 17:23:54 +000013#if PLAT_XLAT_TABLES_DYNAMIC
14/*
Antonio Nino Diaz8643a812018-06-21 14:39:16 +010015 * Private shifts and masks to access fields of an mmap attribute
Antonio Nino Diazac998032017-02-27 17:23:54 +000016 */
17/* Dynamic or static */
Antonio Nino Diaz8643a812018-06-21 14:39:16 +010018#define MT_DYN_SHIFT U(31)
Antonio Nino Diazac998032017-02-27 17:23:54 +000019
20/*
21 * Memory mapping private attributes
22 *
Antonio Nino Diaz8643a812018-06-21 14:39:16 +010023 * Private attributes not exposed in the public header.
24 */
25
26/*
27 * Regions mapped before the MMU can't be unmapped dynamically (they are
28 * static) and regions mapped with MMU enabled can be unmapped. This
29 * behaviour can't be overridden.
30 *
31 * Static regions can overlap each other, dynamic regions can't.
Antonio Nino Diazac998032017-02-27 17:23:54 +000032 */
Antonio Nino Diaz8643a812018-06-21 14:39:16 +010033#define MT_STATIC (U(0) << MT_DYN_SHIFT)
34#define MT_DYNAMIC (U(1) << MT_DYN_SHIFT)
Antonio Nino Diazac998032017-02-27 17:23:54 +000035
Sandrine Bailleux33835542017-04-25 14:09:47 +010036#endif /* PLAT_XLAT_TABLES_DYNAMIC */
37
Antonio Nino Diaz50eb3742018-07-24 10:20:53 +010038extern uint64_t mmu_cfg_params[MMU_CFG_PARAM_MAX];
39
Antonio Nino Diazac998032017-02-27 17:23:54 +000040/*
Antonio Nino Diaz44d3c212018-07-05 08:11:48 +010041 * Return the execute-never mask that will prevent instruction fetch at the
42 * given translation regime.
43 */
44uint64_t xlat_arch_regime_get_xn_desc(int xlat_regime);
45
46/*
Douglas Raillard2d545792017-09-25 15:23:22 +010047 * Invalidate all TLB entries that match the given virtual address. This
48 * operation applies to all PEs in the same Inner Shareable domain as the PE
49 * that executes this function. This functions must be called for every
Antonio Nino Diazad5dc7f2018-07-11 09:46:45 +010050 * translation table entry that is modified. It only affects the specified
51 * translation regime.
Douglas Raillard2d545792017-09-25 15:23:22 +010052 *
53 * Note, however, that it is architecturally UNDEFINED to invalidate TLB entries
54 * pertaining to a higher exception level, e.g. invalidating EL3 entries from
55 * S-EL1.
Antonio Nino Diazac998032017-02-27 17:23:54 +000056 */
Antonio Nino Diazad5dc7f2018-07-11 09:46:45 +010057void xlat_arch_tlbi_va(uintptr_t va, int xlat_regime);
Antonio Nino Diazac998032017-02-27 17:23:54 +000058
59/*
60 * This function has to be called at the end of any code that uses the function
61 * xlat_arch_tlbi_va().
62 */
63void xlat_arch_tlbi_va_sync(void);
64
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000065/* Print VA, PA, size and attributes of all regions in the mmap array. */
Antonio Nino Diaz50eb3742018-07-24 10:20:53 +010066void xlat_mmap_print(const mmap_region_t *mmap);
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000067
68/*
69 * Print the current state of the translation tables by reading them from
70 * memory.
71 */
72void xlat_tables_print(xlat_ctx_t *ctx);
73
74/*
Antonio Nino Diazf1b84f62018-07-03 11:58:49 +010075 * Returns a block/page table descriptor for the given level and attributes.
76 */
77uint64_t xlat_desc(const xlat_ctx_t *ctx, uint32_t attr,
Antonio Nino Diaz50eb3742018-07-24 10:20:53 +010078 unsigned long long addr_pa, unsigned int level);
Antonio Nino Diazf1b84f62018-07-03 11:58:49 +010079
80/*
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000081 * Architecture-specific initialization code.
82 */
Antonio Nino Diazefabaa92017-04-27 13:30:22 +010083
84/* Returns the current Exception Level. The returned EL must be 1 or higher. */
Antonio Nino Diaz50eb3742018-07-24 10:20:53 +010085unsigned int xlat_arch_current_el(void);
Antonio Nino Diazefabaa92017-04-27 13:30:22 +010086
87/*
Sandrine Bailleuxc5b63772017-05-31 13:31:48 +010088 * Return the maximum physical address supported by the hardware.
89 * This value depends on the execution state (AArch32/AArch64).
90 */
91unsigned long long xlat_arch_get_max_supported_pa(void);
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000092
Antonio Nino Diazdcf9d922017-10-04 16:52:15 +010093/*
94 * Return 1 if the MMU of the translation regime managed by the given xlat_ctx_t
95 * is enabled, 0 otherwise.
96 */
97int is_mmu_enabled_ctx(const xlat_ctx_t *ctx);
Antonio Nino Diaz233c7c12017-03-08 14:40:23 +000098
Antonio Nino Diaz50eb3742018-07-24 10:20:53 +010099#endif /* XLAT_TABLES_PRIVATE_H */