Subversion Repositories HelenOS

Rev

Rev 2465 | Rev 3233 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 2465 Rev 2467
1
/*
1
/*
2
 * Copyright (c) 2007 Pavel Jancik, Michal Kebrt
2
 * Copyright (c) 2007 Pavel Jancik, Michal Kebrt
3
 * All rights reserved.
3
 * All rights reserved.
4
 *
4
 *
5
 * Redistribution and use in source and binary forms, with or without
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
6
 * modification, are permitted provided that the following conditions
7
 * are met:
7
 * are met:
8
 *
8
 *
9
 * - Redistributions of source code must retain the above copyright
9
 * - Redistributions of source code must retain the above copyright
10
 *   notice, this list of conditions and the following disclaimer.
10
 *   notice, this list of conditions and the following disclaimer.
11
 * - Redistributions in binary form must reproduce the above copyright
11
 * - Redistributions in binary form must reproduce the above copyright
12
 *   notice, this list of conditions and the following disclaimer in the
12
 *   notice, this list of conditions and the following disclaimer in the
13
 *   documentation and/or other materials provided with the distribution.
13
 *   documentation and/or other materials provided with the distribution.
14
 * - The name of the author may not be used to endorse or promote products
14
 * - The name of the author may not be used to endorse or promote products
15
 *   derived from this software without specific prior written permission.
15
 *   derived from this software without specific prior written permission.
16
 *
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
 */
27
 */
28
 
28
 
29
/** @addtogroup arm32mm
29
/** @addtogroup arm32mm
30
 * @{
30
 * @{
31
 */
31
 */
32
/** @file
32
/** @file
33
 *  @brief Paging related declarations.
33
 *  @brief Paging related declarations.
34
 */
34
 */
35
 
35
 
36
#ifndef KERN_arm32_PAGE_H_
36
#ifndef KERN_arm32_PAGE_H_
37
#define KERN_arm32_PAGE_H_
37
#define KERN_arm32_PAGE_H_
38
 
38
 
39
#include <arch/mm/frame.h>
39
#include <arch/mm/frame.h>
40
#include <mm/mm.h>
40
#include <mm/mm.h>
41
#include <arch/exception.h>
41
#include <arch/exception.h>
42
 
42
 
43
#define PAGE_WIDTH  FRAME_WIDTH
43
#define PAGE_WIDTH  FRAME_WIDTH
44
#define PAGE_SIZE   FRAME_SIZE
44
#define PAGE_SIZE   FRAME_SIZE
45
 
45
 
46
#define PAGE_COLOR_BITS 0           /* dummy */
46
#define PAGE_COLOR_BITS 0           /* dummy */
47
 
47
 
48
#ifndef __ASM__
48
#ifndef __ASM__
49
#   define KA2PA(x) (((uintptr_t) (x)) - 0x80000000)
49
#   define KA2PA(x) (((uintptr_t) (x)) - 0x80000000)
50
#   define PA2KA(x) (((uintptr_t) (x)) + 0x80000000)
50
#   define PA2KA(x) (((uintptr_t) (x)) + 0x80000000)
51
#else
51
#else
52
#   define KA2PA(x) ((x) - 0x80000000)
52
#   define KA2PA(x) ((x) - 0x80000000)
53
#   define PA2KA(x) ((x) + 0x80000000)
53
#   define PA2KA(x) ((x) + 0x80000000)
54
#endif
54
#endif
55
 
55
 
56
#ifdef KERNEL
56
#ifdef KERNEL
57
 
57
 
-
 
58
/* Number of entries in each level. */
58
#define PTL0_ENTRIES_ARCH   (2 << 12)   /* 4096 */
59
#define PTL0_ENTRIES_ARCH   (2 << 12)   /* 4096 */
59
#define PTL1_ENTRIES_ARCH   0
60
#define PTL1_ENTRIES_ARCH   0
60
#define PTL2_ENTRIES_ARCH   0
61
#define PTL2_ENTRIES_ARCH   0
61
 
-
 
62
/* coarse page tables used (256 * 4 = 1KB per page) */
62
/* coarse page tables used (256 * 4 = 1KB per page) */
63
#define PTL3_ENTRIES_ARCH   (2 << 8)    /* 256 */
63
#define PTL3_ENTRIES_ARCH   (2 << 8)    /* 256 */
64
 
64
 
-
 
65
/* Page table sizes for each level. */
65
#define PTL0_SIZE_ARCH      FOUR_FRAMES
66
#define PTL0_SIZE_ARCH      FOUR_FRAMES
66
#define PTL1_SIZE_ARCH      0
67
#define PTL1_SIZE_ARCH      0
67
#define PTL2_SIZE_ARCH      0
68
#define PTL2_SIZE_ARCH      0
68
#define PTL3_SIZE_ARCH      ONE_FRAME
69
#define PTL3_SIZE_ARCH      ONE_FRAME
69
 
70
 
-
 
71
/* Macros calculating indices into page tables for each level. */
70
#define PTL0_INDEX_ARCH(vaddr)  (((vaddr) >> 20) & 0xfff)
72
#define PTL0_INDEX_ARCH(vaddr)  (((vaddr) >> 20) & 0xfff)
71
#define PTL1_INDEX_ARCH(vaddr)  0
73
#define PTL1_INDEX_ARCH(vaddr)  0
72
#define PTL2_INDEX_ARCH(vaddr)  0
74
#define PTL2_INDEX_ARCH(vaddr)  0
73
#define PTL3_INDEX_ARCH(vaddr)  (((vaddr) >> 12) & 0x0ff)
75
#define PTL3_INDEX_ARCH(vaddr)  (((vaddr) >> 12) & 0x0ff)
74
 
76
 
-
 
77
/* Get PTE address accessors for each level. */
75
#define GET_PTL1_ADDRESS_ARCH(ptl0, i) \
78
#define GET_PTL1_ADDRESS_ARCH(ptl0, i) \
76
    ((pte_t *) ((((pte_level0_t *)(ptl0))[(i)]).coarse_table_addr << 10))
79
    ((pte_t *) ((((pte_level0_t *)(ptl0))[(i)]).coarse_table_addr << 10))
77
#define GET_PTL2_ADDRESS_ARCH(ptl1, i) \
80
#define GET_PTL2_ADDRESS_ARCH(ptl1, i) \
78
    (ptl1)
81
    (ptl1)
79
#define GET_PTL3_ADDRESS_ARCH(ptl2, i) \
82
#define GET_PTL3_ADDRESS_ARCH(ptl2, i) \
80
    (ptl2)
83
    (ptl2)
81
#define GET_FRAME_ADDRESS_ARCH(ptl3, i) \
84
#define GET_FRAME_ADDRESS_ARCH(ptl3, i) \
82
    ((uintptr_t) ((((pte_level1_t *)(ptl3))[(i)]).frame_base_addr << 12))
85
    ((uintptr_t) ((((pte_level1_t *)(ptl3))[(i)]).frame_base_addr << 12))
83
 
86
 
-
 
87
/* Set PTE address accessors for each level. */
84
#define SET_PTL0_ADDRESS_ARCH(ptl0) \
88
#define SET_PTL0_ADDRESS_ARCH(ptl0) \
85
    (set_ptl0_addr((pte_level0_t *) (ptl0)))
89
    (set_ptl0_addr((pte_level0_t *) (ptl0)))
86
#define SET_PTL1_ADDRESS_ARCH(ptl0, i, a) \
90
#define SET_PTL1_ADDRESS_ARCH(ptl0, i, a) \
87
    (((pte_level0_t *) (ptl0))[(i)].coarse_table_addr = (a) >> 10)
91
    (((pte_level0_t *) (ptl0))[(i)].coarse_table_addr = (a) >> 10)
88
#define SET_PTL2_ADDRESS_ARCH(ptl1, i, a)
92
#define SET_PTL2_ADDRESS_ARCH(ptl1, i, a)
89
#define SET_PTL3_ADDRESS_ARCH(ptl2, i, a)
93
#define SET_PTL3_ADDRESS_ARCH(ptl2, i, a)
90
#define SET_FRAME_ADDRESS_ARCH(ptl3, i, a) \
94
#define SET_FRAME_ADDRESS_ARCH(ptl3, i, a) \
91
    (((pte_level1_t *) (ptl3))[(i)].frame_base_addr = (a) >> 12)
95
    (((pte_level1_t *) (ptl3))[(i)].frame_base_addr = (a) >> 12)
92
 
96
 
-
 
97
/* Get PTE flags accessors for each level. */
93
#define GET_PTL1_FLAGS_ARCH(ptl0, i) \
98
#define GET_PTL1_FLAGS_ARCH(ptl0, i) \
94
    get_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i))
99
    get_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i))
95
#define GET_PTL2_FLAGS_ARCH(ptl1, i) \
100
#define GET_PTL2_FLAGS_ARCH(ptl1, i) \
96
    PAGE_PRESENT
101
    PAGE_PRESENT
97
#define GET_PTL3_FLAGS_ARCH(ptl2, i) \
102
#define GET_PTL3_FLAGS_ARCH(ptl2, i) \
98
    PAGE_PRESENT
103
    PAGE_PRESENT
99
#define GET_FRAME_FLAGS_ARCH(ptl3, i) \
104
#define GET_FRAME_FLAGS_ARCH(ptl3, i) \
100
    get_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i))
105
    get_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i))
101
 
106
 
-
 
107
/* Set PTE flags accessors for each level. */
102
#define SET_PTL1_FLAGS_ARCH(ptl0, i, x) \
108
#define SET_PTL1_FLAGS_ARCH(ptl0, i, x) \
103
    set_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i), (x))
109
    set_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i), (x))
104
#define SET_PTL2_FLAGS_ARCH(ptl1, i, x)
110
#define SET_PTL2_FLAGS_ARCH(ptl1, i, x)
105
#define SET_PTL3_FLAGS_ARCH(ptl2, i, x)
111
#define SET_PTL3_FLAGS_ARCH(ptl2, i, x)
106
#define SET_FRAME_FLAGS_ARCH(ptl3, i, x) \
112
#define SET_FRAME_FLAGS_ARCH(ptl3, i, x) \
107
    set_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i), (x))
113
    set_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i), (x))
108
 
114
 
-
 
115
/* Macros for querying the last-level PTE entries. */
109
#define PTE_VALID_ARCH(pte) \
116
#define PTE_VALID_ARCH(pte) \
110
    (*((uint32_t *) (pte)) != 0)
117
    (*((uint32_t *) (pte)) != 0)
111
#define PTE_PRESENT_ARCH(pte) \
118
#define PTE_PRESENT_ARCH(pte) \
112
    (((pte_level0_t *) (pte))->descriptor_type != 0)
119
    (((pte_level0_t *) (pte))->descriptor_type != 0)
113
 
-
 
114
/* pte should point into ptl3 */
-
 
115
#define PTE_GET_FRAME_ARCH(pte) \
120
#define PTE_GET_FRAME_ARCH(pte) \
116
    (((pte_level1_t *) (pte))->frame_base_addr << FRAME_WIDTH)
121
    (((pte_level1_t *) (pte))->frame_base_addr << FRAME_WIDTH)
117
 
-
 
118
/* pte should point into ptl3 */
-
 
119
#define PTE_WRITABLE_ARCH(pte) \
122
#define PTE_WRITABLE_ARCH(pte) \
120
    (((pte_level1_t *) (pte))->access_permission_0 == \
123
    (((pte_level1_t *) (pte))->access_permission_0 == \
121
        PTE_AP_USER_RW_KERNEL_RW)
124
        PTE_AP_USER_RW_KERNEL_RW)
122
 
-
 
123
#define PTE_EXECUTABLE_ARCH(pte) \
125
#define PTE_EXECUTABLE_ARCH(pte) \
124
    1
126
    1
125
 
127
 
126
#ifndef __ASM__
128
#ifndef __ASM__
127
 
129
 
128
/** Level 0 page table entry. */
130
/** Level 0 page table entry. */
129
typedef struct {
131
typedef struct {
130
    /* 0b01 for coarse tables, see below for details */
132
    /* 0b01 for coarse tables, see below for details */
131
    unsigned descriptor_type     : 2;
133
    unsigned descriptor_type : 2;
132
    unsigned impl_specific       : 3;
134
    unsigned impl_specific : 3;
133
    unsigned domain              : 4;
135
    unsigned domain : 4;
134
    unsigned should_be_zero      : 1;
136
    unsigned should_be_zero : 1;
135
 
137
 
136
    /* Pointer to the coarse 2nd level page table (holding entries for small
138
    /* Pointer to the coarse 2nd level page table (holding entries for small
137
     * (4KB) or large (64KB) pages. ARM also supports fine 2nd level page
139
     * (4KB) or large (64KB) pages. ARM also supports fine 2nd level page
138
     * tables that may hold even tiny pages (1KB) but they are bigger (4KB
140
     * tables that may hold even tiny pages (1KB) but they are bigger (4KB
139
     * per table in comparison with 1KB per the coarse table)
141
     * per table in comparison with 1KB per the coarse table)
140
     */
142
     */
141
    unsigned coarse_table_addr   : 22;
143
    unsigned coarse_table_addr : 22;
142
} ATTRIBUTE_PACKED pte_level0_t;
144
} ATTRIBUTE_PACKED pte_level0_t;
143
 
145
 
144
/** Level 1 page table entry (small (4KB) pages used). */
146
/** Level 1 page table entry (small (4KB) pages used). */
145
typedef struct {
147
typedef struct {
146
 
148
 
147
    /* 0b10 for small pages */
149
    /* 0b10 for small pages */
148
    unsigned descriptor_type     : 2;
150
    unsigned descriptor_type : 2;
149
    unsigned bufferable          : 1;
151
    unsigned bufferable : 1;
150
    unsigned cacheable           : 1;
152
    unsigned cacheable : 1;
151
 
153
 
152
    /* access permissions for each of 4 subparts of a page
154
    /* access permissions for each of 4 subparts of a page
153
     * (for each 1KB when small pages used */
155
     * (for each 1KB when small pages used */
154
    unsigned access_permission_0 : 2;
156
    unsigned access_permission_0 : 2;
155
    unsigned access_permission_1 : 2;
157
    unsigned access_permission_1 : 2;
156
    unsigned access_permission_2 : 2;
158
    unsigned access_permission_2 : 2;
157
    unsigned access_permission_3 : 2;
159
    unsigned access_permission_3 : 2;
158
    unsigned frame_base_addr     : 20;
160
    unsigned frame_base_addr : 20;
159
} ATTRIBUTE_PACKED pte_level1_t;
161
} ATTRIBUTE_PACKED pte_level1_t;
160
 
162
 
161
 
163
 
162
/* Level 1 page tables access permissions */
164
/* Level 1 page tables access permissions */
163
 
165
 
164
/** User mode: no access, privileged mode: no access. */
166
/** User mode: no access, privileged mode: no access. */
165
#define PTE_AP_USER_NO_KERNEL_NO    0
167
#define PTE_AP_USER_NO_KERNEL_NO    0
166
 
168
 
167
/** User mode: no access, privileged mode: read/write. */
169
/** User mode: no access, privileged mode: read/write. */
168
#define PTE_AP_USER_NO_KERNEL_RW    1
170
#define PTE_AP_USER_NO_KERNEL_RW    1
169
 
171
 
170
/** User mode: read only, privileged mode: read/write. */
172
/** User mode: read only, privileged mode: read/write. */
171
#define PTE_AP_USER_RO_KERNEL_RW    2
173
#define PTE_AP_USER_RO_KERNEL_RW    2
172
 
174
 
173
/** User mode: read/write, privileged mode: read/write. */
175
/** User mode: read/write, privileged mode: read/write. */
174
#define PTE_AP_USER_RW_KERNEL_RW    3
176
#define PTE_AP_USER_RW_KERNEL_RW    3
175
 
177
 
176
 
178
 
177
/* pte_level0_t and pte_level1_t descriptor_type flags */
179
/* pte_level0_t and pte_level1_t descriptor_type flags */
178
 
180
 
179
/** pte_level0_t and pte_level1_t "not present" flag (used in descriptor_type). */
181
/** pte_level0_t and pte_level1_t "not present" flag (used in descriptor_type). */
180
#define PTE_DESCRIPTOR_NOT_PRESENT  0
182
#define PTE_DESCRIPTOR_NOT_PRESENT  0
181
 
183
 
182
/** pte_level0_t coarse page table flag (used in descriptor_type). */
184
/** pte_level0_t coarse page table flag (used in descriptor_type). */
183
#define PTE_DESCRIPTOR_COARSE_TABLE 1
185
#define PTE_DESCRIPTOR_COARSE_TABLE 1
184
 
186
 
185
/** pte_level1_t small page table flag (used in descriptor type). */
187
/** pte_level1_t small page table flag (used in descriptor type). */
186
#define PTE_DESCRIPTOR_SMALL_PAGE   2
188
#define PTE_DESCRIPTOR_SMALL_PAGE   2
187
 
189
 
188
 
190
 
189
/** Sets the address of level 0 page table.
191
/** Sets the address of level 0 page table.
190
 *
192
 *
191
 * @param pt    Pointer to the page table to set.
193
 * @param pt    Pointer to the page table to set.
192
 */  
194
 */  
193
static inline void set_ptl0_addr( pte_level0_t *pt)
195
static inline void set_ptl0_addr(pte_level0_t *pt)
194
{
196
{
195
    asm volatile (
197
    asm volatile (
196
        "mcr p15, 0, %0, c2, c0, 0 \n"
198
        "mcr p15, 0, %0, c2, c0, 0 \n"
197
        :
199
        :
198
        : "r"(pt)
200
        : "r"(pt)
199
    );
201
    );
200
}
202
}
201
 
203
 
202
 
204
 
203
/** Returns level 0 page table entry flags.
205
/** Returns level 0 page table entry flags.
204
 *
206
 *
205
 *  @param pt     Level 0 page table.
207
 *  @param pt     Level 0 page table.
206
 *  @param i      Index of the entry to return.
208
 *  @param i      Index of the entry to return.
207
 */
209
 */
208
static inline int get_pt_level0_flags(pte_level0_t *pt, index_t i)
210
static inline int get_pt_level0_flags(pte_level0_t *pt, index_t i)
209
{
211
{
210
    pte_level0_t *p = &pt[i];
212
    pte_level0_t *p = &pt[i];
211
    int np = (p->descriptor_type == PTE_DESCRIPTOR_NOT_PRESENT);
213
    int np = (p->descriptor_type == PTE_DESCRIPTOR_NOT_PRESENT);
212
 
214
 
213
    return (np << PAGE_PRESENT_SHIFT) | (1 << PAGE_USER_SHIFT) |
215
    return (np << PAGE_PRESENT_SHIFT) | (1 << PAGE_USER_SHIFT) |
214
        (1 << PAGE_READ_SHIFT) | (1 << PAGE_WRITE_SHIFT) |
216
        (1 << PAGE_READ_SHIFT) | (1 << PAGE_WRITE_SHIFT) |
215
        (1 << PAGE_EXEC_SHIFT) | (1 << PAGE_CACHEABLE_SHIFT);
217
        (1 << PAGE_EXEC_SHIFT) | (1 << PAGE_CACHEABLE_SHIFT);
216
}
218
}
217
 
219
 
218
/** Returns level 1 page table entry flags.
220
/** Returns level 1 page table entry flags.
219
 *
221
 *
220
 *  @param pt     Level 1 page table.
222
 *  @param pt     Level 1 page table.
221
 *  @param i      Index of the entry to return.
223
 *  @param i      Index of the entry to return.
222
 */
224
 */
223
static inline int get_pt_level1_flags(pte_level1_t *pt, index_t i)
225
static inline int get_pt_level1_flags(pte_level1_t *pt, index_t i)
224
{
226
{
225
    pte_level1_t *p = &pt[i];
227
    pte_level1_t *p = &pt[i];
226
 
228
 
227
    int dt = p->descriptor_type;
229
    int dt = p->descriptor_type;
228
    int ap = p->access_permission_0;
230
    int ap = p->access_permission_0;
229
 
231
 
230
    return ((dt == PTE_DESCRIPTOR_NOT_PRESENT) << PAGE_PRESENT_SHIFT) |
232
    return ((dt == PTE_DESCRIPTOR_NOT_PRESENT) << PAGE_PRESENT_SHIFT) |
231
        ((ap == PTE_AP_USER_RO_KERNEL_RW) << PAGE_READ_SHIFT) |
233
        ((ap == PTE_AP_USER_RO_KERNEL_RW) << PAGE_READ_SHIFT) |
232
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_READ_SHIFT) |
234
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_READ_SHIFT) |
233
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_WRITE_SHIFT) |
235
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_WRITE_SHIFT) |
234
        ((ap != PTE_AP_USER_NO_KERNEL_RW) << PAGE_USER_SHIFT) |
236
        ((ap != PTE_AP_USER_NO_KERNEL_RW) << PAGE_USER_SHIFT) |
235
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_READ_SHIFT) |
237
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_READ_SHIFT) |
236
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_WRITE_SHIFT) |
238
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_WRITE_SHIFT) |
237
        (1 << PAGE_EXEC_SHIFT) |
239
        (1 << PAGE_EXEC_SHIFT) |
238
        (p->bufferable << PAGE_CACHEABLE);
240
        (p->bufferable << PAGE_CACHEABLE);
239
}
241
}
240
 
242
 
241
 
243
 
242
/** Sets flags of level 0 page table entry.
244
/** Sets flags of level 0 page table entry.
243
 *
245
 *
244
 *  @param pt     level 0 page table
246
 *  @param pt     level 0 page table
245
 *  @param i      index of the entry to be changed
247
 *  @param i      index of the entry to be changed
246
 *  @param flags  new flags
248
 *  @param flags  new flags
247
 */
249
 */
248
static inline void set_pt_level0_flags(pte_level0_t *pt, index_t i, int flags)
250
static inline void set_pt_level0_flags(pte_level0_t *pt, index_t i, int flags)
249
{
251
{
250
    pte_level0_t *p = &pt[i];
252
    pte_level0_t *p = &pt[i];
251
 
253
 
252
    if (flags & PAGE_NOT_PRESENT) {
254
    if (flags & PAGE_NOT_PRESENT) {
253
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
255
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
254
        /*
256
        /*
255
         * Ensures that the entry will be recognized as valid when
257
         * Ensures that the entry will be recognized as valid when
256
         * PTE_VALID_ARCH applied.
258
         * PTE_VALID_ARCH applied.
257
         */
259
         */
258
        p->should_be_zero = 1;
260
        p->should_be_zero = 1;
259
    } else {
261
    } else {
260
        p->descriptor_type = PTE_DESCRIPTOR_COARSE_TABLE;
262
        p->descriptor_type = PTE_DESCRIPTOR_COARSE_TABLE;
261
        p->should_be_zero = 0;
263
        p->should_be_zero = 0;
262
    }
264
    }
263
}
265
}
264
 
266
 
265
 
267
 
266
/** Sets flags of level 1 page table entry.
268
/** Sets flags of level 1 page table entry.
267
 *
269
 *
268
 *  We use same access rights for the whole page. When page is not preset we
270
 *  We use same access rights for the whole page. When page is not preset we
269
 *  store 1 in acess_rigts_3 so that at least one bit is 1 (to mark correct
271
 *  store 1 in acess_rigts_3 so that at least one bit is 1 (to mark correct
270
 *  page entry, see #PAGE_VALID_ARCH).
272
 *  page entry, see #PAGE_VALID_ARCH).
271
 *
273
 *
272
 *  @param pt     Level 1 page table.
274
 *  @param pt     Level 1 page table.
273
 *  @param i      Index of the entry to be changed.
275
 *  @param i      Index of the entry to be changed.
274
 *  @param flags  New flags.
276
 *  @param flags  New flags.
275
 */  
277
 */  
276
static inline void set_pt_level1_flags(pte_level1_t *pt, index_t i, int flags)
278
static inline void set_pt_level1_flags(pte_level1_t *pt, index_t i, int flags)
277
{
279
{
278
    pte_level1_t *p = &pt[i];
280
    pte_level1_t *p = &pt[i];
279
   
281
   
280
    if (flags & PAGE_NOT_PRESENT) {
282
    if (flags & PAGE_NOT_PRESENT) {
281
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
283
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
282
        p->access_permission_3 = 1;
284
        p->access_permission_3 = 1;
283
    } else {
285
    } else {
284
        p->descriptor_type = PTE_DESCRIPTOR_SMALL_PAGE;
286
        p->descriptor_type = PTE_DESCRIPTOR_SMALL_PAGE;
285
        p->access_permission_3 = p->access_permission_0;
287
        p->access_permission_3 = p->access_permission_0;
286
    }
288
    }
287
 
289
 
288
    p->cacheable = p->bufferable = (flags & PAGE_CACHEABLE) != 0;
290
    p->cacheable = p->bufferable = (flags & PAGE_CACHEABLE) != 0;
289
 
291
 
290
    /* default access permission */
292
    /* default access permission */
291
    p->access_permission_0 = p->access_permission_1 =
293
    p->access_permission_0 = p->access_permission_1 =
292
        p->access_permission_2 = p->access_permission_3 =
294
        p->access_permission_2 = p->access_permission_3 =
293
        PTE_AP_USER_NO_KERNEL_RW;
295
        PTE_AP_USER_NO_KERNEL_RW;
294
 
296
 
295
    if (flags & PAGE_USER)  {
297
    if (flags & PAGE_USER)  {
296
        if (flags & PAGE_READ) {
298
        if (flags & PAGE_READ) {
297
            p->access_permission_0 = p->access_permission_1 =
299
            p->access_permission_0 = p->access_permission_1 =
298
                p->access_permission_2 = p->access_permission_3 =
300
                p->access_permission_2 = p->access_permission_3 =
299
                PTE_AP_USER_RO_KERNEL_RW;
301
                PTE_AP_USER_RO_KERNEL_RW;
300
        }
302
        }
301
        if (flags & PAGE_WRITE) {
303
        if (flags & PAGE_WRITE) {
302
            p->access_permission_0 = p->access_permission_1 =
304
            p->access_permission_0 = p->access_permission_1 =
303
                p->access_permission_2 = p->access_permission_3 =
305
                p->access_permission_2 = p->access_permission_3 =
304
                PTE_AP_USER_RW_KERNEL_RW;
306
                PTE_AP_USER_RW_KERNEL_RW;
305
        }
307
        }
306
    }
308
    }
307
}
309
}
308
 
310
 
309
 
311
 
310
extern void page_arch_init(void);
312
extern void page_arch_init(void);
311
 
313
 
312
 
314
 
313
#endif /* __ASM__ */
315
#endif /* __ASM__ */
314
 
316
 
315
#endif /* KERNEL */
317
#endif /* KERNEL */
316
 
318
 
317
#endif
319
#endif
318
 
320
 
319
/** @}
321
/** @}
320
 */
322
 */
321
 
323