mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-19 02:54:24 +00:00

xlat_arch_tlbi_va_regime() isn't used, so it has been renamed to xlat_arch_tlbi_va() and the previous implementation has been removed. Change-Id: Ic118bed3fb68234748d86b2e9e95b25650289276 Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
101 lines
2.9 KiB
C
101 lines
2.9 KiB
C
/*
|
|
* Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#ifndef __XLAT_TABLES_PRIVATE_H__
|
|
#define __XLAT_TABLES_PRIVATE_H__
|
|
|
|
#include <platform_def.h>
|
|
#include <xlat_tables_defs.h>
|
|
|
|
#if PLAT_XLAT_TABLES_DYNAMIC
|
|
/*
|
|
* Private shifts and masks to access fields of an mmap attribute
|
|
*/
|
|
/* Dynamic or static */
|
|
#define MT_DYN_SHIFT U(31)
|
|
|
|
/*
|
|
* Memory mapping private attributes
|
|
*
|
|
* Private attributes not exposed in the public header.
|
|
*/
|
|
|
|
/*
|
|
* Regions mapped before the MMU can't be unmapped dynamically (they are
|
|
* static) and regions mapped with MMU enabled can be unmapped. This
|
|
* behaviour can't be overridden.
|
|
*
|
|
* Static regions can overlap each other, dynamic regions can't.
|
|
*/
|
|
#define MT_STATIC (U(0) << MT_DYN_SHIFT)
|
|
#define MT_DYNAMIC (U(1) << MT_DYN_SHIFT)
|
|
|
|
#endif /* PLAT_XLAT_TABLES_DYNAMIC */
|
|
|
|
/*
|
|
* Return the execute-never mask that will prevent instruction fetch at the
|
|
* given translation regime.
|
|
*/
|
|
uint64_t xlat_arch_regime_get_xn_desc(int xlat_regime);
|
|
|
|
/*
|
|
* Invalidate all TLB entries that match the given virtual address. This
|
|
* operation applies to all PEs in the same Inner Shareable domain as the PE
|
|
* that executes this function. This functions must be called for every
|
|
* translation table entry that is modified. It only affects the specified
|
|
* translation regime.
|
|
*
|
|
* Note, however, that it is architecturally UNDEFINED to invalidate TLB entries
|
|
* pertaining to a higher exception level, e.g. invalidating EL3 entries from
|
|
* S-EL1.
|
|
*/
|
|
void xlat_arch_tlbi_va(uintptr_t va, int xlat_regime);
|
|
|
|
/*
|
|
* This function has to be called at the end of any code that uses the function
|
|
* xlat_arch_tlbi_va().
|
|
*/
|
|
void xlat_arch_tlbi_va_sync(void);
|
|
|
|
/* Print VA, PA, size and attributes of all regions in the mmap array. */
|
|
void xlat_mmap_print(mmap_region_t *const mmap);
|
|
|
|
/*
|
|
* Print the current state of the translation tables by reading them from
|
|
* memory.
|
|
*/
|
|
void xlat_tables_print(xlat_ctx_t *ctx);
|
|
|
|
/*
|
|
* Returns a block/page table descriptor for the given level and attributes.
|
|
*/
|
|
uint64_t xlat_desc(const xlat_ctx_t *ctx, uint32_t attr,
|
|
unsigned long long addr_pa, int level);
|
|
|
|
/*
|
|
* Architecture-specific initialization code.
|
|
*/
|
|
|
|
/* Returns the current Exception Level. The returned EL must be 1 or higher. */
|
|
int xlat_arch_current_el(void);
|
|
|
|
/*
|
|
* Return the maximum physical address supported by the hardware.
|
|
* This value depends on the execution state (AArch32/AArch64).
|
|
*/
|
|
unsigned long long xlat_arch_get_max_supported_pa(void);
|
|
|
|
/* Enable MMU and configure it to use the specified translation tables. */
|
|
void setup_mmu_cfg(unsigned int flags, const uint64_t *base_table,
|
|
unsigned long long max_pa, uintptr_t max_va);
|
|
|
|
/*
|
|
* Return 1 if the MMU of the translation regime managed by the given xlat_ctx_t
|
|
* is enabled, 0 otherwise.
|
|
*/
|
|
int is_mmu_enabled_ctx(const xlat_ctx_t *ctx);
|
|
|
|
#endif /* __XLAT_TABLES_PRIVATE_H__ */
|