xlat_tables_private.h 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. /*
  2. * Copyright (c) 2017-2021, Arm Limited and Contributors. All rights reserved.
  3. *
  4. * SPDX-License-Identifier: BSD-3-Clause
  5. */
  6. #ifndef XLAT_TABLES_PRIVATE_H
  7. #define XLAT_TABLES_PRIVATE_H
  8. #include <stdbool.h>
  9. #include <platform_def.h>
  10. #include <lib/xlat_tables/xlat_tables_defs.h>
  11. #if PLAT_XLAT_TABLES_DYNAMIC
  12. /*
  13. * Private shifts and masks to access fields of an mmap attribute
  14. */
  15. /* Dynamic or static */
  16. #define MT_DYN_SHIFT U(31)
  17. /*
  18. * Memory mapping private attributes
  19. *
  20. * Private attributes not exposed in the public header.
  21. */
  22. /*
  23. * Regions mapped before the MMU can't be unmapped dynamically (they are
  24. * static) and regions mapped with MMU enabled can be unmapped. This
  25. * behaviour can't be overridden.
  26. *
  27. * Static regions can overlap each other, dynamic regions can't.
  28. */
  29. #define MT_STATIC (U(0) << MT_DYN_SHIFT)
  30. #define MT_DYNAMIC (U(1) << MT_DYN_SHIFT)
  31. #endif /* PLAT_XLAT_TABLES_DYNAMIC */
  32. extern uint64_t mmu_cfg_params[MMU_CFG_PARAM_MAX];
  33. /* Determine the physical address space encoded in the 'attr' parameter. */
  34. uint32_t xlat_arch_get_pas(uint32_t attr);
  35. /*
  36. * Return the execute-never mask that will prevent instruction fetch at the
  37. * given translation regime.
  38. */
  39. uint64_t xlat_arch_regime_get_xn_desc(int xlat_regime);
  40. /*
  41. * Invalidate all TLB entries that match the given virtual address. This
  42. * operation applies to all PEs in the same Inner Shareable domain as the PE
  43. * that executes this function. This functions must be called for every
  44. * translation table entry that is modified. It only affects the specified
  45. * translation regime.
  46. *
  47. * Note, however, that it is architecturally UNDEFINED to invalidate TLB entries
  48. * pertaining to a higher exception level, e.g. invalidating EL3 entries from
  49. * S-EL1.
  50. */
  51. void xlat_arch_tlbi_va(uintptr_t va, int xlat_regime);
  52. /*
  53. * This function has to be called at the end of any code that uses the function
  54. * xlat_arch_tlbi_va().
  55. */
  56. void xlat_arch_tlbi_va_sync(void);
  57. /* Print VA, PA, size and attributes of all regions in the mmap array. */
  58. void xlat_mmap_print(const mmap_region_t *mmap);
  59. /*
  60. * Print the current state of the translation tables by reading them from
  61. * memory.
  62. */
  63. void xlat_tables_print(xlat_ctx_t *ctx);
  64. /*
  65. * Returns a block/page table descriptor for the given level and attributes.
  66. */
  67. uint64_t xlat_desc(const xlat_ctx_t *ctx, uint32_t attr,
  68. unsigned long long addr_pa, unsigned int level);
  69. /*
  70. * Architecture-specific initialization code.
  71. */
  72. /* Returns the current Exception Level. The returned EL must be 1 or higher. */
  73. unsigned int xlat_arch_current_el(void);
  74. /*
  75. * Return the maximum physical address supported by the hardware.
  76. * This value depends on the execution state (AArch32/AArch64).
  77. */
  78. unsigned long long xlat_arch_get_max_supported_pa(void);
  79. /*
  80. * Returns true if the MMU of the translation regime managed by the given
  81. * xlat_ctx_t is enabled, false otherwise.
  82. */
  83. bool is_mmu_enabled_ctx(const xlat_ctx_t *ctx);
  84. /*
  85. * Returns minimum virtual address space size supported by the architecture
  86. */
  87. uintptr_t xlat_get_min_virt_addr_space_size(void);
  88. #endif /* XLAT_TABLES_PRIVATE_H */