Subversion Repositories HelenOS

Rev

Rev 3403 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 3403 Rev 4345
1
/*
1
/*
2
 * Copyright (c) 2007 Pavel Jancik, Michal Kebrt
2
 * Copyright (c) 2007 Pavel Jancik, Michal Kebrt
3
 * All rights reserved.
3
 * All rights reserved.
4
 *
4
 *
5
 * Redistribution and use in source and binary forms, with or without
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
6
 * modification, are permitted provided that the following conditions
7
 * are met:
7
 * are met:
8
 *
8
 *
9
 * - Redistributions of source code must retain the above copyright
9
 * - Redistributions of source code must retain the above copyright
10
 *   notice, this list of conditions and the following disclaimer.
10
 *   notice, this list of conditions and the following disclaimer.
11
 * - Redistributions in binary form must reproduce the above copyright
11
 * - Redistributions in binary form must reproduce the above copyright
12
 *   notice, this list of conditions and the following disclaimer in the
12
 *   notice, this list of conditions and the following disclaimer in the
13
 *   documentation and/or other materials provided with the distribution.
13
 *   documentation and/or other materials provided with the distribution.
14
 * - The name of the author may not be used to endorse or promote products
14
 * - The name of the author may not be used to endorse or promote products
15
 *   derived from this software without specific prior written permission.
15
 *   derived from this software without specific prior written permission.
16
 *
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
 */
27
 */
28
 
28
 
29
/** @addtogroup arm32mm
29
/** @addtogroup arm32mm
30
 * @{
30
 * @{
31
 */
31
 */
32
/** @file
32
/** @file
33
 *  @brief Paging related declarations.
33
 *  @brief Paging related declarations.
34
 */
34
 */
35
 
35
 
36
#ifndef KERN_arm32_PAGE_H_
36
#ifndef KERN_arm32_PAGE_H_
37
#define KERN_arm32_PAGE_H_
37
#define KERN_arm32_PAGE_H_
38
 
38
 
39
#include <arch/mm/frame.h>
39
#include <arch/mm/frame.h>
40
#include <mm/mm.h>
40
#include <mm/mm.h>
41
#include <arch/exception.h>
41
#include <arch/exception.h>
42
 
42
 
43
#define PAGE_WIDTH  FRAME_WIDTH
43
#define PAGE_WIDTH  FRAME_WIDTH
44
#define PAGE_SIZE   FRAME_SIZE
44
#define PAGE_SIZE   FRAME_SIZE
45
 
45
 
46
#ifndef __ASM__
46
#ifndef __ASM__
47
#   define KA2PA(x) (((uintptr_t) (x)) - 0x80000000)
47
#   define KA2PA(x) (((uintptr_t) (x)) - 0x80000000)
48
#   define PA2KA(x) (((uintptr_t) (x)) + 0x80000000)
48
#   define PA2KA(x) (((uintptr_t) (x)) + 0x80000000)
49
#else
49
#else
50
#   define KA2PA(x) ((x) - 0x80000000)
50
#   define KA2PA(x) ((x) - 0x80000000)
51
#   define PA2KA(x) ((x) + 0x80000000)
51
#   define PA2KA(x) ((x) + 0x80000000)
52
#endif
52
#endif
53
 
53
 
54
#ifdef KERNEL
54
#ifdef KERNEL
55
 
55
 
56
/* Number of entries in each level. */
56
/* Number of entries in each level. */
57
#define PTL0_ENTRIES_ARCH   (2 << 12)   /* 4096 */
57
#define PTL0_ENTRIES_ARCH   (2 << 12)   /* 4096 */
58
#define PTL1_ENTRIES_ARCH   0
58
#define PTL1_ENTRIES_ARCH   0
59
#define PTL2_ENTRIES_ARCH   0
59
#define PTL2_ENTRIES_ARCH   0
60
/* coarse page tables used (256 * 4 = 1KB per page) */
60
/* coarse page tables used (256 * 4 = 1KB per page) */
61
#define PTL3_ENTRIES_ARCH   (2 << 8)    /* 256 */
61
#define PTL3_ENTRIES_ARCH   (2 << 8)    /* 256 */
62
 
62
 
63
/* Page table sizes for each level. */
63
/* Page table sizes for each level. */
64
#define PTL0_SIZE_ARCH      FOUR_FRAMES
64
#define PTL0_SIZE_ARCH      FOUR_FRAMES
65
#define PTL1_SIZE_ARCH      0
65
#define PTL1_SIZE_ARCH      0
66
#define PTL2_SIZE_ARCH      0
66
#define PTL2_SIZE_ARCH      0
67
#define PTL3_SIZE_ARCH      ONE_FRAME
67
#define PTL3_SIZE_ARCH      ONE_FRAME
68
 
68
 
69
/* Macros calculating indices into page tables for each level. */
69
/* Macros calculating indices into page tables for each level. */
70
#define PTL0_INDEX_ARCH(vaddr)  (((vaddr) >> 20) & 0xfff)
70
#define PTL0_INDEX_ARCH(vaddr)  (((vaddr) >> 20) & 0xfff)
71
#define PTL1_INDEX_ARCH(vaddr)  0
71
#define PTL1_INDEX_ARCH(vaddr)  0
72
#define PTL2_INDEX_ARCH(vaddr)  0
72
#define PTL2_INDEX_ARCH(vaddr)  0
73
#define PTL3_INDEX_ARCH(vaddr)  (((vaddr) >> 12) & 0x0ff)
73
#define PTL3_INDEX_ARCH(vaddr)  (((vaddr) >> 12) & 0x0ff)
74
 
74
 
75
/* Get PTE address accessors for each level. */
75
/* Get PTE address accessors for each level. */
76
#define GET_PTL1_ADDRESS_ARCH(ptl0, i) \
76
#define GET_PTL1_ADDRESS_ARCH(ptl0, i) \
77
    ((pte_t *) ((((pte_level0_t *)(ptl0))[(i)]).coarse_table_addr << 10))
77
    ((pte_t *) ((((pte_level0_t *)(ptl0))[(i)]).coarse_table_addr << 10))
78
#define GET_PTL2_ADDRESS_ARCH(ptl1, i) \
78
#define GET_PTL2_ADDRESS_ARCH(ptl1, i) \
79
    (ptl1)
79
    (ptl1)
80
#define GET_PTL3_ADDRESS_ARCH(ptl2, i) \
80
#define GET_PTL3_ADDRESS_ARCH(ptl2, i) \
81
    (ptl2)
81
    (ptl2)
82
#define GET_FRAME_ADDRESS_ARCH(ptl3, i) \
82
#define GET_FRAME_ADDRESS_ARCH(ptl3, i) \
83
    ((uintptr_t) ((((pte_level1_t *)(ptl3))[(i)]).frame_base_addr << 12))
83
    ((uintptr_t) ((((pte_level1_t *)(ptl3))[(i)]).frame_base_addr << 12))
84
 
84
 
85
/* Set PTE address accessors for each level. */
85
/* Set PTE address accessors for each level. */
86
#define SET_PTL0_ADDRESS_ARCH(ptl0) \
86
#define SET_PTL0_ADDRESS_ARCH(ptl0) \
87
    (set_ptl0_addr((pte_level0_t *) (ptl0)))
87
    (set_ptl0_addr((pte_level0_t *) (ptl0)))
88
#define SET_PTL1_ADDRESS_ARCH(ptl0, i, a) \
88
#define SET_PTL1_ADDRESS_ARCH(ptl0, i, a) \
89
    (((pte_level0_t *) (ptl0))[(i)].coarse_table_addr = (a) >> 10)
89
    (((pte_level0_t *) (ptl0))[(i)].coarse_table_addr = (a) >> 10)
90
#define SET_PTL2_ADDRESS_ARCH(ptl1, i, a)
90
#define SET_PTL2_ADDRESS_ARCH(ptl1, i, a)
91
#define SET_PTL3_ADDRESS_ARCH(ptl2, i, a)
91
#define SET_PTL3_ADDRESS_ARCH(ptl2, i, a)
92
#define SET_FRAME_ADDRESS_ARCH(ptl3, i, a) \
92
#define SET_FRAME_ADDRESS_ARCH(ptl3, i, a) \
93
    (((pte_level1_t *) (ptl3))[(i)].frame_base_addr = (a) >> 12)
93
    (((pte_level1_t *) (ptl3))[(i)].frame_base_addr = (a) >> 12)
94
 
94
 
95
/* Get PTE flags accessors for each level. */
95
/* Get PTE flags accessors for each level. */
96
#define GET_PTL1_FLAGS_ARCH(ptl0, i) \
96
#define GET_PTL1_FLAGS_ARCH(ptl0, i) \
97
    get_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i))
97
    get_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i))
98
#define GET_PTL2_FLAGS_ARCH(ptl1, i) \
98
#define GET_PTL2_FLAGS_ARCH(ptl1, i) \
99
    PAGE_PRESENT
99
    PAGE_PRESENT
100
#define GET_PTL3_FLAGS_ARCH(ptl2, i) \
100
#define GET_PTL3_FLAGS_ARCH(ptl2, i) \
101
    PAGE_PRESENT
101
    PAGE_PRESENT
102
#define GET_FRAME_FLAGS_ARCH(ptl3, i) \
102
#define GET_FRAME_FLAGS_ARCH(ptl3, i) \
103
    get_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i))
103
    get_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i))
104
 
104
 
105
/* Set PTE flags accessors for each level. */
105
/* Set PTE flags accessors for each level. */
106
#define SET_PTL1_FLAGS_ARCH(ptl0, i, x) \
106
#define SET_PTL1_FLAGS_ARCH(ptl0, i, x) \
107
    set_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i), (x))
107
    set_pt_level0_flags((pte_level0_t *) (ptl0), (index_t) (i), (x))
108
#define SET_PTL2_FLAGS_ARCH(ptl1, i, x)
108
#define SET_PTL2_FLAGS_ARCH(ptl1, i, x)
109
#define SET_PTL3_FLAGS_ARCH(ptl2, i, x)
109
#define SET_PTL3_FLAGS_ARCH(ptl2, i, x)
110
#define SET_FRAME_FLAGS_ARCH(ptl3, i, x) \
110
#define SET_FRAME_FLAGS_ARCH(ptl3, i, x) \
111
    set_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i), (x))
111
    set_pt_level1_flags((pte_level1_t *) (ptl3), (index_t) (i), (x))
112
 
112
 
113
/* Macros for querying the last-level PTE entries. */
113
/* Macros for querying the last-level PTE entries. */
114
#define PTE_VALID_ARCH(pte) \
114
#define PTE_VALID_ARCH(pte) \
115
    (*((uint32_t *) (pte)) != 0)
115
    (*((uint32_t *) (pte)) != 0)
116
#define PTE_PRESENT_ARCH(pte) \
116
#define PTE_PRESENT_ARCH(pte) \
117
    (((pte_level0_t *) (pte))->descriptor_type != 0)
117
    (((pte_level0_t *) (pte))->descriptor_type != 0)
118
#define PTE_GET_FRAME_ARCH(pte) \
118
#define PTE_GET_FRAME_ARCH(pte) \
119
    (((pte_level1_t *) (pte))->frame_base_addr << FRAME_WIDTH)
119
    (((pte_level1_t *) (pte))->frame_base_addr << FRAME_WIDTH)
120
#define PTE_WRITABLE_ARCH(pte) \
120
#define PTE_WRITABLE_ARCH(pte) \
121
    (((pte_level1_t *) (pte))->access_permission_0 == \
121
    (((pte_level1_t *) (pte))->access_permission_0 == \
122
        PTE_AP_USER_RW_KERNEL_RW)
122
        PTE_AP_USER_RW_KERNEL_RW)
123
#define PTE_EXECUTABLE_ARCH(pte) \
123
#define PTE_EXECUTABLE_ARCH(pte) \
124
    1
124
    1
125
 
125
 
126
#ifndef __ASM__
126
#ifndef __ASM__
127
 
127
 
128
/** Level 0 page table entry. */
128
/** Level 0 page table entry. */
129
typedef struct {
129
typedef struct {
130
    /* 0b01 for coarse tables, see below for details */
130
    /* 0b01 for coarse tables, see below for details */
131
    unsigned descriptor_type : 2;
131
    unsigned descriptor_type : 2;
132
    unsigned impl_specific : 3;
132
    unsigned impl_specific : 3;
133
    unsigned domain : 4;
133
    unsigned domain : 4;
134
    unsigned should_be_zero : 1;
134
    unsigned should_be_zero : 1;
135
 
135
 
136
    /* Pointer to the coarse 2nd level page table (holding entries for small
136
    /* Pointer to the coarse 2nd level page table (holding entries for small
137
     * (4KB) or large (64KB) pages. ARM also supports fine 2nd level page
137
     * (4KB) or large (64KB) pages. ARM also supports fine 2nd level page
138
     * tables that may hold even tiny pages (1KB) but they are bigger (4KB
138
     * tables that may hold even tiny pages (1KB) but they are bigger (4KB
139
     * per table in comparison with 1KB per the coarse table)
139
     * per table in comparison with 1KB per the coarse table)
140
     */
140
     */
141
    unsigned coarse_table_addr : 22;
141
    unsigned coarse_table_addr : 22;
142
} ATTRIBUTE_PACKED pte_level0_t;
142
} ATTRIBUTE_PACKED pte_level0_t;
143
 
143
 
144
/** Level 1 page table entry (small (4KB) pages used). */
144
/** Level 1 page table entry (small (4KB) pages used). */
145
typedef struct {
145
typedef struct {
146
 
146
 
147
    /* 0b10 for small pages */
147
    /* 0b10 for small pages */
148
    unsigned descriptor_type : 2;
148
    unsigned descriptor_type : 2;
149
    unsigned bufferable : 1;
149
    unsigned bufferable : 1;
150
    unsigned cacheable : 1;
150
    unsigned cacheable : 1;
151
 
151
 
152
    /* access permissions for each of 4 subparts of a page
152
    /* access permissions for each of 4 subparts of a page
153
     * (for each 1KB when small pages used */
153
     * (for each 1KB when small pages used */
154
    unsigned access_permission_0 : 2;
154
    unsigned access_permission_0 : 2;
155
    unsigned access_permission_1 : 2;
155
    unsigned access_permission_1 : 2;
156
    unsigned access_permission_2 : 2;
156
    unsigned access_permission_2 : 2;
157
    unsigned access_permission_3 : 2;
157
    unsigned access_permission_3 : 2;
158
    unsigned frame_base_addr : 20;
158
    unsigned frame_base_addr : 20;
159
} ATTRIBUTE_PACKED pte_level1_t;
159
} ATTRIBUTE_PACKED pte_level1_t;
160
 
160
 
161
 
161
 
162
/* Level 1 page tables access permissions */
162
/* Level 1 page tables access permissions */
163
 
163
 
164
/** User mode: no access, privileged mode: no access. */
164
/** User mode: no access, privileged mode: no access. */
165
#define PTE_AP_USER_NO_KERNEL_NO    0
165
#define PTE_AP_USER_NO_KERNEL_NO    0
166
 
166
 
167
/** User mode: no access, privileged mode: read/write. */
167
/** User mode: no access, privileged mode: read/write. */
168
#define PTE_AP_USER_NO_KERNEL_RW    1
168
#define PTE_AP_USER_NO_KERNEL_RW    1
169
 
169
 
170
/** User mode: read only, privileged mode: read/write. */
170
/** User mode: read only, privileged mode: read/write. */
171
#define PTE_AP_USER_RO_KERNEL_RW    2
171
#define PTE_AP_USER_RO_KERNEL_RW    2
172
 
172
 
173
/** User mode: read/write, privileged mode: read/write. */
173
/** User mode: read/write, privileged mode: read/write. */
174
#define PTE_AP_USER_RW_KERNEL_RW    3
174
#define PTE_AP_USER_RW_KERNEL_RW    3
175
 
175
 
176
 
176
 
177
/* pte_level0_t and pte_level1_t descriptor_type flags */
177
/* pte_level0_t and pte_level1_t descriptor_type flags */
178
 
178
 
179
/** pte_level0_t and pte_level1_t "not present" flag (used in descriptor_type). */
179
/** pte_level0_t and pte_level1_t "not present" flag (used in descriptor_type). */
180
#define PTE_DESCRIPTOR_NOT_PRESENT  0
180
#define PTE_DESCRIPTOR_NOT_PRESENT  0
181
 
181
 
182
/** pte_level0_t coarse page table flag (used in descriptor_type). */
182
/** pte_level0_t coarse page table flag (used in descriptor_type). */
183
#define PTE_DESCRIPTOR_COARSE_TABLE 1
183
#define PTE_DESCRIPTOR_COARSE_TABLE 1
184
 
184
 
185
/** pte_level1_t small page table flag (used in descriptor type). */
185
/** pte_level1_t small page table flag (used in descriptor type). */
186
#define PTE_DESCRIPTOR_SMALL_PAGE   2
186
#define PTE_DESCRIPTOR_SMALL_PAGE   2
187
 
187
 
188
 
188
 
189
/** Sets the address of level 0 page table.
189
/** Sets the address of level 0 page table.
190
 *
190
 *
191
 * @param pt    Pointer to the page table to set.
191
 * @param pt    Pointer to the page table to set.
192
 */  
192
 */  
193
static inline void set_ptl0_addr(pte_level0_t *pt)
193
static inline void set_ptl0_addr(pte_level0_t *pt)
194
{
194
{
195
    asm volatile (
195
    asm volatile (
196
        "mcr p15, 0, %0, c2, c0, 0 \n"
196
        "mcr p15, 0, %[pt], c2, c0, 0\n"
197
        :
-
 
198
        : "r"(pt)
197
        :: [pt] "r" (pt)
199
    );
198
    );
200
}
199
}
201
 
200
 
202
 
201
 
203
/** Returns level 0 page table entry flags.
202
/** Returns level 0 page table entry flags.
204
 *
203
 *
205
 *  @param pt     Level 0 page table.
204
 *  @param pt     Level 0 page table.
206
 *  @param i      Index of the entry to return.
205
 *  @param i      Index of the entry to return.
207
 */
206
 */
208
static inline int get_pt_level0_flags(pte_level0_t *pt, index_t i)
207
static inline int get_pt_level0_flags(pte_level0_t *pt, index_t i)
209
{
208
{
210
    pte_level0_t *p = &pt[i];
209
    pte_level0_t *p = &pt[i];
211
    int np = (p->descriptor_type == PTE_DESCRIPTOR_NOT_PRESENT);
210
    int np = (p->descriptor_type == PTE_DESCRIPTOR_NOT_PRESENT);
212
 
211
 
213
    return (np << PAGE_PRESENT_SHIFT) | (1 << PAGE_USER_SHIFT) |
212
    return (np << PAGE_PRESENT_SHIFT) | (1 << PAGE_USER_SHIFT) |
214
        (1 << PAGE_READ_SHIFT) | (1 << PAGE_WRITE_SHIFT) |
213
        (1 << PAGE_READ_SHIFT) | (1 << PAGE_WRITE_SHIFT) |
215
        (1 << PAGE_EXEC_SHIFT) | (1 << PAGE_CACHEABLE_SHIFT);
214
        (1 << PAGE_EXEC_SHIFT) | (1 << PAGE_CACHEABLE_SHIFT);
216
}
215
}
217
 
216
 
218
/** Returns level 1 page table entry flags.
217
/** Returns level 1 page table entry flags.
219
 *
218
 *
220
 *  @param pt     Level 1 page table.
219
 *  @param pt     Level 1 page table.
221
 *  @param i      Index of the entry to return.
220
 *  @param i      Index of the entry to return.
222
 */
221
 */
223
static inline int get_pt_level1_flags(pte_level1_t *pt, index_t i)
222
static inline int get_pt_level1_flags(pte_level1_t *pt, index_t i)
224
{
223
{
225
    pte_level1_t *p = &pt[i];
224
    pte_level1_t *p = &pt[i];
226
 
225
 
227
    int dt = p->descriptor_type;
226
    int dt = p->descriptor_type;
228
    int ap = p->access_permission_0;
227
    int ap = p->access_permission_0;
229
 
228
 
230
    return ((dt == PTE_DESCRIPTOR_NOT_PRESENT) << PAGE_PRESENT_SHIFT) |
229
    return ((dt == PTE_DESCRIPTOR_NOT_PRESENT) << PAGE_PRESENT_SHIFT) |
231
        ((ap == PTE_AP_USER_RO_KERNEL_RW) << PAGE_READ_SHIFT) |
230
        ((ap == PTE_AP_USER_RO_KERNEL_RW) << PAGE_READ_SHIFT) |
232
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_READ_SHIFT) |
231
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_READ_SHIFT) |
233
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_WRITE_SHIFT) |
232
        ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_WRITE_SHIFT) |
234
        ((ap != PTE_AP_USER_NO_KERNEL_RW) << PAGE_USER_SHIFT) |
233
        ((ap != PTE_AP_USER_NO_KERNEL_RW) << PAGE_USER_SHIFT) |
235
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_READ_SHIFT) |
234
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_READ_SHIFT) |
236
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_WRITE_SHIFT) |
235
        ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_WRITE_SHIFT) |
237
        (1 << PAGE_EXEC_SHIFT) |
236
        (1 << PAGE_EXEC_SHIFT) |
238
        (p->bufferable << PAGE_CACHEABLE);
237
        (p->bufferable << PAGE_CACHEABLE);
239
}
238
}
240
 
239
 
241
 
240
 
242
/** Sets flags of level 0 page table entry.
241
/** Sets flags of level 0 page table entry.
243
 *
242
 *
244
 *  @param pt     level 0 page table
243
 *  @param pt     level 0 page table
245
 *  @param i      index of the entry to be changed
244
 *  @param i      index of the entry to be changed
246
 *  @param flags  new flags
245
 *  @param flags  new flags
247
 */
246
 */
248
static inline void set_pt_level0_flags(pte_level0_t *pt, index_t i, int flags)
247
static inline void set_pt_level0_flags(pte_level0_t *pt, index_t i, int flags)
249
{
248
{
250
    pte_level0_t *p = &pt[i];
249
    pte_level0_t *p = &pt[i];
251
 
250
 
252
    if (flags & PAGE_NOT_PRESENT) {
251
    if (flags & PAGE_NOT_PRESENT) {
253
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
252
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
254
        /*
253
        /*
255
         * Ensures that the entry will be recognized as valid when
254
         * Ensures that the entry will be recognized as valid when
256
         * PTE_VALID_ARCH applied.
255
         * PTE_VALID_ARCH applied.
257
         */
256
         */
258
        p->should_be_zero = 1;
257
        p->should_be_zero = 1;
259
    } else {
258
    } else {
260
        p->descriptor_type = PTE_DESCRIPTOR_COARSE_TABLE;
259
        p->descriptor_type = PTE_DESCRIPTOR_COARSE_TABLE;
261
        p->should_be_zero = 0;
260
        p->should_be_zero = 0;
262
    }
261
    }
263
}
262
}
264
 
263
 
265
 
264
 
266
/** Sets flags of level 1 page table entry.
265
/** Sets flags of level 1 page table entry.
267
 *
266
 *
268
 *  We use same access rights for the whole page. When page is not preset we
267
 *  We use same access rights for the whole page. When page is not preset we
269
 *  store 1 in acess_rigts_3 so that at least one bit is 1 (to mark correct
268
 *  store 1 in acess_rigts_3 so that at least one bit is 1 (to mark correct
270
 *  page entry, see #PAGE_VALID_ARCH).
269
 *  page entry, see #PAGE_VALID_ARCH).
271
 *
270
 *
272
 *  @param pt     Level 1 page table.
271
 *  @param pt     Level 1 page table.
273
 *  @param i      Index of the entry to be changed.
272
 *  @param i      Index of the entry to be changed.
274
 *  @param flags  New flags.
273
 *  @param flags  New flags.
275
 */  
274
 */  
276
static inline void set_pt_level1_flags(pte_level1_t *pt, index_t i, int flags)
275
static inline void set_pt_level1_flags(pte_level1_t *pt, index_t i, int flags)
277
{
276
{
278
    pte_level1_t *p = &pt[i];
277
    pte_level1_t *p = &pt[i];
279
   
278
   
280
    if (flags & PAGE_NOT_PRESENT) {
279
    if (flags & PAGE_NOT_PRESENT) {
281
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
280
        p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
282
        p->access_permission_3 = 1;
281
        p->access_permission_3 = 1;
283
    } else {
282
    } else {
284
        p->descriptor_type = PTE_DESCRIPTOR_SMALL_PAGE;
283
        p->descriptor_type = PTE_DESCRIPTOR_SMALL_PAGE;
285
        p->access_permission_3 = p->access_permission_0;
284
        p->access_permission_3 = p->access_permission_0;
286
    }
285
    }
287
 
286
 
288
    p->cacheable = p->bufferable = (flags & PAGE_CACHEABLE) != 0;
287
    p->cacheable = p->bufferable = (flags & PAGE_CACHEABLE) != 0;
289
 
288
 
290
    /* default access permission */
289
    /* default access permission */
291
    p->access_permission_0 = p->access_permission_1 =
290
    p->access_permission_0 = p->access_permission_1 =
292
        p->access_permission_2 = p->access_permission_3 =
291
        p->access_permission_2 = p->access_permission_3 =
293
        PTE_AP_USER_NO_KERNEL_RW;
292
        PTE_AP_USER_NO_KERNEL_RW;
294
 
293
 
295
    if (flags & PAGE_USER)  {
294
    if (flags & PAGE_USER)  {
296
        if (flags & PAGE_READ) {
295
        if (flags & PAGE_READ) {
297
            p->access_permission_0 = p->access_permission_1 =
296
            p->access_permission_0 = p->access_permission_1 =
298
                p->access_permission_2 = p->access_permission_3 =
297
                p->access_permission_2 = p->access_permission_3 =
299
                PTE_AP_USER_RO_KERNEL_RW;
298
                PTE_AP_USER_RO_KERNEL_RW;
300
        }
299
        }
301
        if (flags & PAGE_WRITE) {
300
        if (flags & PAGE_WRITE) {
302
            p->access_permission_0 = p->access_permission_1 =
301
            p->access_permission_0 = p->access_permission_1 =
303
                p->access_permission_2 = p->access_permission_3 =
302
                p->access_permission_2 = p->access_permission_3 =
304
                PTE_AP_USER_RW_KERNEL_RW;
303
                PTE_AP_USER_RW_KERNEL_RW;
305
        }
304
        }
306
    }
305
    }
307
}
306
}
308
 
307
 
309
 
308
 
310
extern void page_arch_init(void);
309
extern void page_arch_init(void);
311
 
310
 
312
 
311
 
313
#endif /* __ASM__ */
312
#endif /* __ASM__ */
314
 
313
 
315
#endif /* KERNEL */
314
#endif /* KERNEL */
316
 
315
 
317
#endif
316
#endif
318
 
317
 
319
/** @}
318
/** @}
320
 */
319
 */
321
 
320