source: mainline/kernel/arch/arm32/include/mm/page.h@ 3b71e84d

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 3b71e84d was 3b71e84d, checked in by Jakub Jermar <jakub@…>, 14 years ago

Get the number of PTL0 and PTL3 entries right on arm32.

  • Property mode set to 100644
File size: 9.7 KB
RevLine 
[d630139]1/*
[6b781c0]2 * Copyright (c) 2007 Pavel Jancik, Michal Kebrt
[d630139]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[7a0359b]29/** @addtogroup arm32mm
[d630139]30 * @{
31 */
32/** @file
[6b781c0]33 * @brief Paging related declarations.
[d630139]34 */
35
36#ifndef KERN_arm32_PAGE_H_
37#define KERN_arm32_PAGE_H_
38
39#include <arch/mm/frame.h>
[6b781c0]40#include <mm/mm.h>
41#include <arch/exception.h>
[7a0359b]42#include <trace.h>
[d630139]43
44#define PAGE_WIDTH FRAME_WIDTH
45#define PAGE_SIZE FRAME_SIZE
46
47#ifndef __ASM__
48# define KA2PA(x) (((uintptr_t) (x)) - 0x80000000)
49# define PA2KA(x) (((uintptr_t) (x)) + 0x80000000)
50#else
51# define KA2PA(x) ((x) - 0x80000000)
52# define PA2KA(x) ((x) + 0x80000000)
53#endif
54
[c03ee1c]55/* Number of entries in each level. */
[3b71e84d]56#define PTL0_ENTRIES_ARCH (1 << 12) /* 4096 */
[6b781c0]57#define PTL1_ENTRIES_ARCH 0
58#define PTL2_ENTRIES_ARCH 0
59/* coarse page tables used (256 * 4 = 1KB per page) */
[3b71e84d]60#define PTL3_ENTRIES_ARCH (1 << 8) /* 256 */
[6b781c0]61
[c03ee1c]62/* Page table sizes for each level. */
[6b781c0]63#define PTL0_SIZE_ARCH FOUR_FRAMES
64#define PTL1_SIZE_ARCH 0
65#define PTL2_SIZE_ARCH 0
66#define PTL3_SIZE_ARCH ONE_FRAME
[d630139]67
[c03ee1c]68/* Macros calculating indices into page tables for each level. */
[6b781c0]69#define PTL0_INDEX_ARCH(vaddr) (((vaddr) >> 20) & 0xfff)
70#define PTL1_INDEX_ARCH(vaddr) 0
71#define PTL2_INDEX_ARCH(vaddr) 0
72#define PTL3_INDEX_ARCH(vaddr) (((vaddr) >> 12) & 0x0ff)
[d630139]73
[c03ee1c]74/* Get PTE address accessors for each level. */
[6b781c0]75#define GET_PTL1_ADDRESS_ARCH(ptl0, i) \
[c09adc10]76 ((pte_t *) ((((pte_t *)(ptl0))[(i)].l0).coarse_table_addr << 10))
[6b781c0]77#define GET_PTL2_ADDRESS_ARCH(ptl1, i) \
78 (ptl1)
79#define GET_PTL3_ADDRESS_ARCH(ptl2, i) \
80 (ptl2)
81#define GET_FRAME_ADDRESS_ARCH(ptl3, i) \
[c09adc10]82 ((uintptr_t) ((((pte_t *)(ptl3))[(i)].l1).frame_base_addr << 12))
[d630139]83
[c03ee1c]84/* Set PTE address accessors for each level. */
[6b781c0]85#define SET_PTL0_ADDRESS_ARCH(ptl0) \
[c09adc10]86 (set_ptl0_addr((pte_t *) (ptl0)))
[6b781c0]87#define SET_PTL1_ADDRESS_ARCH(ptl0, i, a) \
[c09adc10]88 (((pte_t *) (ptl0))[(i)].l0.coarse_table_addr = (a) >> 10)
[6b781c0]89#define SET_PTL2_ADDRESS_ARCH(ptl1, i, a)
90#define SET_PTL3_ADDRESS_ARCH(ptl2, i, a)
91#define SET_FRAME_ADDRESS_ARCH(ptl3, i, a) \
[c09adc10]92 (((pte_t *) (ptl3))[(i)].l1.frame_base_addr = (a) >> 12)
[d630139]93
[c03ee1c]94/* Get PTE flags accessors for each level. */
[6b781c0]95#define GET_PTL1_FLAGS_ARCH(ptl0, i) \
[c09adc10]96 get_pt_level0_flags((pte_t *) (ptl0), (size_t) (i))
[6b781c0]97#define GET_PTL2_FLAGS_ARCH(ptl1, i) \
98 PAGE_PRESENT
99#define GET_PTL3_FLAGS_ARCH(ptl2, i) \
100 PAGE_PRESENT
101#define GET_FRAME_FLAGS_ARCH(ptl3, i) \
[c09adc10]102 get_pt_level1_flags((pte_t *) (ptl3), (size_t) (i))
[d630139]103
[c03ee1c]104/* Set PTE flags accessors for each level. */
[6b781c0]105#define SET_PTL1_FLAGS_ARCH(ptl0, i, x) \
[c09adc10]106 set_pt_level0_flags((pte_t *) (ptl0), (size_t) (i), (x))
[6b781c0]107#define SET_PTL2_FLAGS_ARCH(ptl1, i, x)
108#define SET_PTL3_FLAGS_ARCH(ptl2, i, x)
109#define SET_FRAME_FLAGS_ARCH(ptl3, i, x) \
[c09adc10]110 set_pt_level1_flags((pte_t *) (ptl3), (size_t) (i), (x))
[d630139]111
[c03ee1c]112/* Macros for querying the last-level PTE entries. */
[6b781c0]113#define PTE_VALID_ARCH(pte) \
114 (*((uint32_t *) (pte)) != 0)
115#define PTE_PRESENT_ARCH(pte) \
[c09adc10]116 (((pte_t *) (pte))->l0.descriptor_type != 0)
[6b781c0]117#define PTE_GET_FRAME_ARCH(pte) \
[c09adc10]118 (((pte_t *) (pte))->l1.frame_base_addr << FRAME_WIDTH)
[6b781c0]119#define PTE_WRITABLE_ARCH(pte) \
[c09adc10]120 (((pte_t *) (pte))->l1.access_permission_0 == PTE_AP_USER_RW_KERNEL_RW)
[6b781c0]121#define PTE_EXECUTABLE_ARCH(pte) \
122 1
[d630139]123
124#ifndef __ASM__
125
[6b781c0]126/** Level 0 page table entry. */
127typedef struct {
128 /* 0b01 for coarse tables, see below for details */
[c03ee1c]129 unsigned descriptor_type : 2;
130 unsigned impl_specific : 3;
131 unsigned domain : 4;
132 unsigned should_be_zero : 1;
[6b781c0]133
134 /* Pointer to the coarse 2nd level page table (holding entries for small
135 * (4KB) or large (64KB) pages. ARM also supports fine 2nd level page
136 * tables that may hold even tiny pages (1KB) but they are bigger (4KB
137 * per table in comparison with 1KB per the coarse table)
138 */
[c03ee1c]139 unsigned coarse_table_addr : 22;
[6b781c0]140} ATTRIBUTE_PACKED pte_level0_t;
141
142/** Level 1 page table entry (small (4KB) pages used). */
143typedef struct {
144
145 /* 0b10 for small pages */
[c03ee1c]146 unsigned descriptor_type : 2;
147 unsigned bufferable : 1;
148 unsigned cacheable : 1;
[6b781c0]149
150 /* access permissions for each of 4 subparts of a page
151 * (for each 1KB when small pages used */
152 unsigned access_permission_0 : 2;
153 unsigned access_permission_1 : 2;
154 unsigned access_permission_2 : 2;
155 unsigned access_permission_3 : 2;
[c03ee1c]156 unsigned frame_base_addr : 20;
[6b781c0]157} ATTRIBUTE_PACKED pte_level1_t;
158
[c09adc10]159typedef union {
160 pte_level0_t l0;
161 pte_level1_t l1;
162} pte_t;
[6b781c0]163
164/* Level 1 page tables access permissions */
[d630139]165
[6b781c0]166/** User mode: no access, privileged mode: no access. */
167#define PTE_AP_USER_NO_KERNEL_NO 0
168
169/** User mode: no access, privileged mode: read/write. */
170#define PTE_AP_USER_NO_KERNEL_RW 1
171
172/** User mode: read only, privileged mode: read/write. */
173#define PTE_AP_USER_RO_KERNEL_RW 2
174
175/** User mode: read/write, privileged mode: read/write. */
176#define PTE_AP_USER_RW_KERNEL_RW 3
177
178
179/* pte_level0_t and pte_level1_t descriptor_type flags */
180
181/** pte_level0_t and pte_level1_t "not present" flag (used in descriptor_type). */
182#define PTE_DESCRIPTOR_NOT_PRESENT 0
183
184/** pte_level0_t coarse page table flag (used in descriptor_type). */
185#define PTE_DESCRIPTOR_COARSE_TABLE 1
186
187/** pte_level1_t small page table flag (used in descriptor type). */
188#define PTE_DESCRIPTOR_SMALL_PAGE 2
189
190
191/** Sets the address of level 0 page table.
192 *
[7a0359b]193 * @param pt Pointer to the page table to set.
194 *
195 */
196NO_TRACE static inline void set_ptl0_addr(pte_t *pt)
[d630139]197{
[6b781c0]198 asm volatile (
[e762b43]199 "mcr p15, 0, %[pt], c2, c0, 0\n"
200 :: [pt] "r" (pt)
[6b781c0]201 );
[d630139]202}
203
[6b781c0]204
205/** Returns level 0 page table entry flags.
206 *
[7a0359b]207 * @param pt Level 0 page table.
208 * @param i Index of the entry to return.
209 *
[6b781c0]210 */
[7a0359b]211NO_TRACE static inline int get_pt_level0_flags(pte_t *pt, size_t i)
[6b781c0]212{
[c09adc10]213 pte_level0_t *p = &pt[i].l0;
[6b781c0]214 int np = (p->descriptor_type == PTE_DESCRIPTOR_NOT_PRESENT);
[7a0359b]215
[6b781c0]216 return (np << PAGE_PRESENT_SHIFT) | (1 << PAGE_USER_SHIFT) |
217 (1 << PAGE_READ_SHIFT) | (1 << PAGE_WRITE_SHIFT) |
218 (1 << PAGE_EXEC_SHIFT) | (1 << PAGE_CACHEABLE_SHIFT);
219}
220
221/** Returns level 1 page table entry flags.
222 *
[7a0359b]223 * @param pt Level 1 page table.
224 * @param i Index of the entry to return.
225 *
[6b781c0]226 */
[7a0359b]227NO_TRACE static inline int get_pt_level1_flags(pte_t *pt, size_t i)
[6b781c0]228{
[c09adc10]229 pte_level1_t *p = &pt[i].l1;
[7a0359b]230
[6b781c0]231 int dt = p->descriptor_type;
232 int ap = p->access_permission_0;
[7a0359b]233
[6b781c0]234 return ((dt == PTE_DESCRIPTOR_NOT_PRESENT) << PAGE_PRESENT_SHIFT) |
235 ((ap == PTE_AP_USER_RO_KERNEL_RW) << PAGE_READ_SHIFT) |
236 ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_READ_SHIFT) |
237 ((ap == PTE_AP_USER_RW_KERNEL_RW) << PAGE_WRITE_SHIFT) |
238 ((ap != PTE_AP_USER_NO_KERNEL_RW) << PAGE_USER_SHIFT) |
239 ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_READ_SHIFT) |
240 ((ap == PTE_AP_USER_NO_KERNEL_RW) << PAGE_WRITE_SHIFT) |
241 (1 << PAGE_EXEC_SHIFT) |
242 (p->bufferable << PAGE_CACHEABLE);
243}
244
245/** Sets flags of level 0 page table entry.
246 *
[7a0359b]247 * @param pt level 0 page table
248 * @param i index of the entry to be changed
249 * @param flags new flags
250 *
[6b781c0]251 */
[7a0359b]252NO_TRACE static inline void set_pt_level0_flags(pte_t *pt, size_t i, int flags)
[d630139]253{
[c09adc10]254 pte_level0_t *p = &pt[i].l0;
[7a0359b]255
[6b781c0]256 if (flags & PAGE_NOT_PRESENT) {
257 p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
258 /*
259 * Ensures that the entry will be recognized as valid when
260 * PTE_VALID_ARCH applied.
261 */
262 p->should_be_zero = 1;
263 } else {
264 p->descriptor_type = PTE_DESCRIPTOR_COARSE_TABLE;
265 p->should_be_zero = 0;
[7a0359b]266 }
[d630139]267}
268
[6b781c0]269
270/** Sets flags of level 1 page table entry.
271 *
[7a0359b]272 * We use same access rights for the whole page. When page
273 * is not preset we store 1 in acess_rigts_3 so that at least
274 * one bit is 1 (to mark correct page entry, see #PAGE_VALID_ARCH).
275 *
276 * @param pt Level 1 page table.
277 * @param i Index of the entry to be changed.
278 * @param flags New flags.
[6b781c0]279 *
[7a0359b]280 */
281NO_TRACE static inline void set_pt_level1_flags(pte_t *pt, size_t i, int flags)
[6b781c0]282{
[c09adc10]283 pte_level1_t *p = &pt[i].l1;
[6b781c0]284
285 if (flags & PAGE_NOT_PRESENT) {
286 p->descriptor_type = PTE_DESCRIPTOR_NOT_PRESENT;
287 p->access_permission_3 = 1;
288 } else {
289 p->descriptor_type = PTE_DESCRIPTOR_SMALL_PAGE;
290 p->access_permission_3 = p->access_permission_0;
291 }
[7a0359b]292
[6b781c0]293 p->cacheable = p->bufferable = (flags & PAGE_CACHEABLE) != 0;
[7a0359b]294
[6b781c0]295 /* default access permission */
296 p->access_permission_0 = p->access_permission_1 =
297 p->access_permission_2 = p->access_permission_3 =
298 PTE_AP_USER_NO_KERNEL_RW;
[7a0359b]299
[6b781c0]300 if (flags & PAGE_USER) {
301 if (flags & PAGE_READ) {
302 p->access_permission_0 = p->access_permission_1 =
303 p->access_permission_2 = p->access_permission_3 =
304 PTE_AP_USER_RO_KERNEL_RW;
305 }
306 if (flags & PAGE_WRITE) {
307 p->access_permission_0 = p->access_permission_1 =
308 p->access_permission_2 = p->access_permission_3 =
309 PTE_AP_USER_RW_KERNEL_RW;
310 }
311 }
312}
313
314
[d630139]315extern void page_arch_init(void);
316
[6b781c0]317
[d630139]318#endif /* __ASM__ */
319
320#endif
321
322/** @}
323 */
Note: See TracBrowser for help on using the repository browser.