17bb01fb2SAntonio Nino Diaz /* 29fb8af33SRoberto Vargas * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved. 37bb01fb2SAntonio Nino Diaz * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 57bb01fb2SAntonio Nino Diaz */ 67bb01fb2SAntonio Nino Diaz 77bb01fb2SAntonio Nino Diaz #ifndef __XLAT_TABLES_PRIVATE_H__ 87bb01fb2SAntonio Nino Diaz #define __XLAT_TABLES_PRIVATE_H__ 97bb01fb2SAntonio Nino Diaz 107bb01fb2SAntonio Nino Diaz #include <platform_def.h> 118933c34bSSandrine Bailleux #include <xlat_tables_defs.h> 127bb01fb2SAntonio Nino Diaz 130b64f4efSAntonio Nino Diaz #if PLAT_XLAT_TABLES_DYNAMIC 140b64f4efSAntonio Nino Diaz /* 153a1b7b10SAntonio Nino Diaz * Private shifts and masks to access fields of an mmap attribute 160b64f4efSAntonio Nino Diaz */ 170b64f4efSAntonio Nino Diaz /* Dynamic or static */ 183a1b7b10SAntonio Nino Diaz #define MT_DYN_SHIFT U(31) 190b64f4efSAntonio Nino Diaz 200b64f4efSAntonio Nino Diaz /* 210b64f4efSAntonio Nino Diaz * Memory mapping private attributes 220b64f4efSAntonio Nino Diaz * 233a1b7b10SAntonio Nino Diaz * Private attributes not exposed in the public header. 240b64f4efSAntonio Nino Diaz */ 253a1b7b10SAntonio Nino Diaz 260b64f4efSAntonio Nino Diaz /* 270b64f4efSAntonio Nino Diaz * Regions mapped before the MMU can't be unmapped dynamically (they are 280b64f4efSAntonio Nino Diaz * static) and regions mapped with MMU enabled can be unmapped. This 290b64f4efSAntonio Nino Diaz * behaviour can't be overridden. 300b64f4efSAntonio Nino Diaz * 310b64f4efSAntonio Nino Diaz * Static regions can overlap each other, dynamic regions can't. 320b64f4efSAntonio Nino Diaz */ 333a1b7b10SAntonio Nino Diaz #define MT_STATIC (U(0) << MT_DYN_SHIFT) 343a1b7b10SAntonio Nino Diaz #define MT_DYNAMIC (U(1) << MT_DYN_SHIFT) 350b64f4efSAntonio Nino Diaz 36f301da44SSandrine Bailleux #endif /* PLAT_XLAT_TABLES_DYNAMIC */ 37f301da44SSandrine Bailleux 380b64f4efSAntonio Nino Diaz /* 39468e2382SAntonio Nino Diaz * Return the execute-never mask that will prevent instruction fetch at the 40468e2382SAntonio Nino Diaz * given translation regime. 41468e2382SAntonio Nino Diaz */ 42468e2382SAntonio Nino Diaz uint64_t xlat_arch_regime_get_xn_desc(int xlat_regime); 43468e2382SAntonio Nino Diaz 44468e2382SAntonio Nino Diaz /* 45b4ae615bSDouglas Raillard * Invalidate all TLB entries that match the given virtual address. This 46b4ae615bSDouglas Raillard * operation applies to all PEs in the same Inner Shareable domain as the PE 47b4ae615bSDouglas Raillard * that executes this function. This functions must be called for every 48*8d164bc6SAntonio Nino Diaz * translation table entry that is modified. It only affects the specified 49*8d164bc6SAntonio Nino Diaz * translation regime. 50b4ae615bSDouglas Raillard * 51b4ae615bSDouglas Raillard * Note, however, that it is architecturally UNDEFINED to invalidate TLB entries 52b4ae615bSDouglas Raillard * pertaining to a higher exception level, e.g. invalidating EL3 entries from 53b4ae615bSDouglas Raillard * S-EL1. 540b64f4efSAntonio Nino Diaz */ 55*8d164bc6SAntonio Nino Diaz void xlat_arch_tlbi_va(uintptr_t va, int xlat_regime); 560b64f4efSAntonio Nino Diaz 570b64f4efSAntonio Nino Diaz /* 580b64f4efSAntonio Nino Diaz * This function has to be called at the end of any code that uses the function 590b64f4efSAntonio Nino Diaz * xlat_arch_tlbi_va(). 600b64f4efSAntonio Nino Diaz */ 610b64f4efSAntonio Nino Diaz void xlat_arch_tlbi_va_sync(void); 620b64f4efSAntonio Nino Diaz 637bb01fb2SAntonio Nino Diaz /* Print VA, PA, size and attributes of all regions in the mmap array. */ 64fd2299e6SAntonio Nino Diaz void xlat_mmap_print(mmap_region_t *const mmap); 657bb01fb2SAntonio Nino Diaz 667bb01fb2SAntonio Nino Diaz /* 677bb01fb2SAntonio Nino Diaz * Print the current state of the translation tables by reading them from 687bb01fb2SAntonio Nino Diaz * memory. 697bb01fb2SAntonio Nino Diaz */ 707bb01fb2SAntonio Nino Diaz void xlat_tables_print(xlat_ctx_t *ctx); 717bb01fb2SAntonio Nino Diaz 727bb01fb2SAntonio Nino Diaz /* 73fd2299e6SAntonio Nino Diaz * Returns a block/page table descriptor for the given level and attributes. 74fd2299e6SAntonio Nino Diaz */ 75fd2299e6SAntonio Nino Diaz uint64_t xlat_desc(const xlat_ctx_t *ctx, uint32_t attr, 76fd2299e6SAntonio Nino Diaz unsigned long long addr_pa, int level); 77fd2299e6SAntonio Nino Diaz 78fd2299e6SAntonio Nino Diaz /* 797bb01fb2SAntonio Nino Diaz * Architecture-specific initialization code. 807bb01fb2SAntonio Nino Diaz */ 817bb01fb2SAntonio Nino Diaz 82a5640252SAntonio Nino Diaz /* Returns the current Exception Level. The returned EL must be 1 or higher. */ 83a5640252SAntonio Nino Diaz int xlat_arch_current_el(void); 84a5640252SAntonio Nino Diaz 85a5640252SAntonio Nino Diaz /* 8699f60798SSandrine Bailleux * Return the maximum physical address supported by the hardware. 8799f60798SSandrine Bailleux * This value depends on the execution state (AArch32/AArch64). 8899f60798SSandrine Bailleux */ 8999f60798SSandrine Bailleux unsigned long long xlat_arch_get_max_supported_pa(void); 907bb01fb2SAntonio Nino Diaz 917bb01fb2SAntonio Nino Diaz /* Enable MMU and configure it to use the specified translation tables. */ 920cc7aa89SJeenu Viswambharan void setup_mmu_cfg(unsigned int flags, const uint64_t *base_table, 939fb8af33SRoberto Vargas unsigned long long max_pa, uintptr_t max_va); 947bb01fb2SAntonio Nino Diaz 95609c9191SAntonio Nino Diaz /* 96609c9191SAntonio Nino Diaz * Return 1 if the MMU of the translation regime managed by the given xlat_ctx_t 97609c9191SAntonio Nino Diaz * is enabled, 0 otherwise. 98609c9191SAntonio Nino Diaz */ 99609c9191SAntonio Nino Diaz int is_mmu_enabled_ctx(const xlat_ctx_t *ctx); 1007bb01fb2SAntonio Nino Diaz 1017bb01fb2SAntonio Nino Diaz #endif /* __XLAT_TABLES_PRIVATE_H__ */ 102