xref: /rk3399_ARM-atf/lib/xlat_tables_v2/xlat_tables_private.h (revision 99f607989133b12ef28b41aeb1251784b3a7052c)
17bb01fb2SAntonio Nino Diaz /*
27bb01fb2SAntonio Nino Diaz  * Copyright (c) 2017, ARM Limited and Contributors. All rights reserved.
37bb01fb2SAntonio Nino Diaz  *
482cb2c1aSdp-arm  * SPDX-License-Identifier: BSD-3-Clause
57bb01fb2SAntonio Nino Diaz  */
67bb01fb2SAntonio Nino Diaz 
77bb01fb2SAntonio Nino Diaz #ifndef __XLAT_TABLES_PRIVATE_H__
87bb01fb2SAntonio Nino Diaz #define __XLAT_TABLES_PRIVATE_H__
97bb01fb2SAntonio Nino Diaz 
107bb01fb2SAntonio Nino Diaz #include <platform_def.h>
118933c34bSSandrine Bailleux #include <xlat_tables_defs.h>
127bb01fb2SAntonio Nino Diaz 
130b64f4efSAntonio Nino Diaz #if PLAT_XLAT_TABLES_DYNAMIC
140b64f4efSAntonio Nino Diaz /*
150b64f4efSAntonio Nino Diaz  * Shifts and masks to access fields of an mmap_attr_t
160b64f4efSAntonio Nino Diaz  */
170b64f4efSAntonio Nino Diaz /* Dynamic or static */
180b64f4efSAntonio Nino Diaz #define MT_DYN_SHIFT		30 /* 31 would cause undefined behaviours */
190b64f4efSAntonio Nino Diaz 
200b64f4efSAntonio Nino Diaz /*
210b64f4efSAntonio Nino Diaz  * Memory mapping private attributes
220b64f4efSAntonio Nino Diaz  *
230b64f4efSAntonio Nino Diaz  * Private attributes not exposed in the mmap_attr_t enum.
240b64f4efSAntonio Nino Diaz  */
250b64f4efSAntonio Nino Diaz typedef enum  {
260b64f4efSAntonio Nino Diaz 	/*
270b64f4efSAntonio Nino Diaz 	 * Regions mapped before the MMU can't be unmapped dynamically (they are
280b64f4efSAntonio Nino Diaz 	 * static) and regions mapped with MMU enabled can be unmapped. This
290b64f4efSAntonio Nino Diaz 	 * behaviour can't be overridden.
300b64f4efSAntonio Nino Diaz 	 *
310b64f4efSAntonio Nino Diaz 	 * Static regions can overlap each other, dynamic regions can't.
320b64f4efSAntonio Nino Diaz 	 */
330b64f4efSAntonio Nino Diaz 	MT_STATIC	= 0 << MT_DYN_SHIFT,
340b64f4efSAntonio Nino Diaz 	MT_DYNAMIC	= 1 << MT_DYN_SHIFT
350b64f4efSAntonio Nino Diaz } mmap_priv_attr_t;
360b64f4efSAntonio Nino Diaz 
370b64f4efSAntonio Nino Diaz /*
380b64f4efSAntonio Nino Diaz  * Function used to invalidate all levels of the translation walk for a given
390b64f4efSAntonio Nino Diaz  * virtual address. It must be called for every translation table entry that is
400b64f4efSAntonio Nino Diaz  * modified.
410b64f4efSAntonio Nino Diaz  */
420b64f4efSAntonio Nino Diaz void xlat_arch_tlbi_va(uintptr_t va);
430b64f4efSAntonio Nino Diaz 
440b64f4efSAntonio Nino Diaz /*
450b64f4efSAntonio Nino Diaz  * This function has to be called at the end of any code that uses the function
460b64f4efSAntonio Nino Diaz  * xlat_arch_tlbi_va().
470b64f4efSAntonio Nino Diaz  */
480b64f4efSAntonio Nino Diaz void xlat_arch_tlbi_va_sync(void);
490b64f4efSAntonio Nino Diaz 
500b64f4efSAntonio Nino Diaz #endif /* PLAT_XLAT_TABLES_DYNAMIC */
510b64f4efSAntonio Nino Diaz 
527bb01fb2SAntonio Nino Diaz /* Print VA, PA, size and attributes of all regions in the mmap array. */
537bb01fb2SAntonio Nino Diaz void print_mmap(mmap_region_t *const mmap);
547bb01fb2SAntonio Nino Diaz 
557bb01fb2SAntonio Nino Diaz /*
567bb01fb2SAntonio Nino Diaz  * Print the current state of the translation tables by reading them from
577bb01fb2SAntonio Nino Diaz  * memory.
587bb01fb2SAntonio Nino Diaz  */
597bb01fb2SAntonio Nino Diaz void xlat_tables_print(xlat_ctx_t *ctx);
607bb01fb2SAntonio Nino Diaz 
617bb01fb2SAntonio Nino Diaz /*
627bb01fb2SAntonio Nino Diaz  * Architecture-specific initialization code.
637bb01fb2SAntonio Nino Diaz  */
647bb01fb2SAntonio Nino Diaz 
65a5640252SAntonio Nino Diaz /* Returns the current Exception Level. The returned EL must be 1 or higher. */
66a5640252SAntonio Nino Diaz int xlat_arch_current_el(void);
67a5640252SAntonio Nino Diaz 
68a5640252SAntonio Nino Diaz /*
69a5640252SAntonio Nino Diaz  * Returns the bit mask that has to be ORed to the rest of a translation table
70a5640252SAntonio Nino Diaz  * descriptor so that execution of code is prohibited at the given Exception
71a5640252SAntonio Nino Diaz  * Level.
72a5640252SAntonio Nino Diaz  */
73a5640252SAntonio Nino Diaz uint64_t xlat_arch_get_xn_desc(int el);
74a5640252SAntonio Nino Diaz 
75*99f60798SSandrine Bailleux /*
76*99f60798SSandrine Bailleux  * Return the maximum physical address supported by the hardware.
77*99f60798SSandrine Bailleux  * This value depends on the execution state (AArch32/AArch64).
78*99f60798SSandrine Bailleux  */
79*99f60798SSandrine Bailleux unsigned long long xlat_arch_get_max_supported_pa(void);
807bb01fb2SAntonio Nino Diaz 
817bb01fb2SAntonio Nino Diaz /* Enable MMU and configure it to use the specified translation tables. */
82*99f60798SSandrine Bailleux void enable_mmu_arch(unsigned int flags,
83*99f60798SSandrine Bailleux 		uint64_t *base_table,
84*99f60798SSandrine Bailleux 		unsigned long long max_pa);
857bb01fb2SAntonio Nino Diaz 
867bb01fb2SAntonio Nino Diaz /* Return 1 if the MMU of this Exception Level is enabled, 0 otherwise. */
877bb01fb2SAntonio Nino Diaz int is_mmu_enabled(void);
887bb01fb2SAntonio Nino Diaz 
897bb01fb2SAntonio Nino Diaz #endif /* __XLAT_TABLES_PRIVATE_H__ */
90