Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | #ifndef _I386_PGTABLE_H |
2 | #define _I386_PGTABLE_H | |
3 | ||
1da177e4 LT |
4 | |
5 | /* | |
6 | * The Linux memory management assumes a three-level page table setup. On | |
7 | * the i386, we use that, but "fold" the mid level into the top-level page | |
8 | * table, so that we physically have the same two-level page table as the | |
9 | * i386 mmu expects. | |
10 | * | |
11 | * This file contains the functions and defines necessary to modify and use | |
12 | * the i386 page table tree. | |
13 | */ | |
14 | #ifndef __ASSEMBLY__ | |
15 | #include <asm/processor.h> | |
16 | #include <asm/fixmap.h> | |
17 | #include <linux/threads.h> | |
da181a8b | 18 | #include <asm/paravirt.h> |
1da177e4 LT |
19 | |
20 | #ifndef _I386_BITOPS_H | |
21 | #include <asm/bitops.h> | |
22 | #endif | |
23 | ||
24 | #include <linux/slab.h> | |
25 | #include <linux/list.h> | |
26 | #include <linux/spinlock.h> | |
27 | ||
8c65b4a6 TS |
28 | struct mm_struct; |
29 | struct vm_area_struct; | |
30 | ||
1da177e4 LT |
31 | /* |
32 | * ZERO_PAGE is a global shared page that is always zero: used | |
33 | * for zero-mapped memory areas etc.. | |
34 | */ | |
35 | #define ZERO_PAGE(vaddr) (virt_to_page(empty_zero_page)) | |
36 | extern unsigned long empty_zero_page[1024]; | |
37 | extern pgd_t swapper_pg_dir[1024]; | |
e18b890b CL |
38 | extern struct kmem_cache *pgd_cache; |
39 | extern struct kmem_cache *pmd_cache; | |
1da177e4 LT |
40 | extern spinlock_t pgd_lock; |
41 | extern struct page *pgd_list; | |
42 | ||
e18b890b CL |
43 | void pmd_ctor(void *, struct kmem_cache *, unsigned long); |
44 | void pgd_ctor(void *, struct kmem_cache *, unsigned long); | |
45 | void pgd_dtor(void *, struct kmem_cache *, unsigned long); | |
1da177e4 LT |
46 | void pgtable_cache_init(void); |
47 | void paging_init(void); | |
48 | ||
49 | /* | |
50 | * The Linux x86 paging architecture is 'compile-time dual-mode', it | |
51 | * implements both the traditional 2-level x86 page tables and the | |
52 | * newer 3-level PAE-mode page tables. | |
53 | */ | |
54 | #ifdef CONFIG_X86_PAE | |
55 | # include <asm/pgtable-3level-defs.h> | |
56 | # define PMD_SIZE (1UL << PMD_SHIFT) | |
57 | # define PMD_MASK (~(PMD_SIZE-1)) | |
58 | #else | |
59 | # include <asm/pgtable-2level-defs.h> | |
60 | #endif | |
61 | ||
62 | #define PGDIR_SIZE (1UL << PGDIR_SHIFT) | |
63 | #define PGDIR_MASK (~(PGDIR_SIZE-1)) | |
64 | ||
65 | #define USER_PTRS_PER_PGD (TASK_SIZE/PGDIR_SIZE) | |
d455a369 | 66 | #define FIRST_USER_ADDRESS 0 |
1da177e4 LT |
67 | |
68 | #define USER_PGD_PTRS (PAGE_OFFSET >> PGDIR_SHIFT) | |
69 | #define KERNEL_PGD_PTRS (PTRS_PER_PGD-USER_PGD_PTRS) | |
70 | ||
71 | #define TWOLEVEL_PGDIR_SHIFT 22 | |
72 | #define BOOT_USER_PGD_PTRS (__PAGE_OFFSET >> TWOLEVEL_PGDIR_SHIFT) | |
73 | #define BOOT_KERNEL_PGD_PTRS (1024-BOOT_USER_PGD_PTRS) | |
74 | ||
75 | /* Just any arbitrary offset to the start of the vmalloc VM area: the | |
76 | * current 8MB value just means that there will be a 8MB "hole" after the | |
77 | * physical memory until the kernel virtual memory starts. That means that | |
78 | * any out-of-bounds memory accesses will hopefully be caught. | |
79 | * The vmalloc() routines leaves a hole of 4kB between each vmalloced | |
80 | * area for the same reason. ;) | |
81 | */ | |
82 | #define VMALLOC_OFFSET (8*1024*1024) | |
83 | #define VMALLOC_START (((unsigned long) high_memory + vmalloc_earlyreserve + \ | |
84 | 2*VMALLOC_OFFSET-1) & ~(VMALLOC_OFFSET-1)) | |
85 | #ifdef CONFIG_HIGHMEM | |
86 | # define VMALLOC_END (PKMAP_BASE-2*PAGE_SIZE) | |
87 | #else | |
88 | # define VMALLOC_END (FIXADDR_START-2*PAGE_SIZE) | |
89 | #endif | |
90 | ||
91 | /* | |
9b4ee40e | 92 | * _PAGE_PSE set in the page directory entry just means that |
1da177e4 LT |
93 | * the page directory entry points directly to a 4MB-aligned block of |
94 | * memory. | |
95 | */ | |
96 | #define _PAGE_BIT_PRESENT 0 | |
97 | #define _PAGE_BIT_RW 1 | |
98 | #define _PAGE_BIT_USER 2 | |
99 | #define _PAGE_BIT_PWT 3 | |
100 | #define _PAGE_BIT_PCD 4 | |
101 | #define _PAGE_BIT_ACCESSED 5 | |
102 | #define _PAGE_BIT_DIRTY 6 | |
103 | #define _PAGE_BIT_PSE 7 /* 4 MB (or 2MB) page, Pentium+, if present.. */ | |
104 | #define _PAGE_BIT_GLOBAL 8 /* Global TLB entry PPro+ */ | |
105 | #define _PAGE_BIT_UNUSED1 9 /* available for programmer */ | |
106 | #define _PAGE_BIT_UNUSED2 10 | |
107 | #define _PAGE_BIT_UNUSED3 11 | |
108 | #define _PAGE_BIT_NX 63 | |
109 | ||
110 | #define _PAGE_PRESENT 0x001 | |
111 | #define _PAGE_RW 0x002 | |
112 | #define _PAGE_USER 0x004 | |
113 | #define _PAGE_PWT 0x008 | |
114 | #define _PAGE_PCD 0x010 | |
115 | #define _PAGE_ACCESSED 0x020 | |
116 | #define _PAGE_DIRTY 0x040 | |
117 | #define _PAGE_PSE 0x080 /* 4 MB (or 2MB) page, Pentium+, if present.. */ | |
118 | #define _PAGE_GLOBAL 0x100 /* Global TLB entry PPro+ */ | |
119 | #define _PAGE_UNUSED1 0x200 /* available for programmer */ | |
120 | #define _PAGE_UNUSED2 0x400 | |
121 | #define _PAGE_UNUSED3 0x800 | |
122 | ||
9b4ee40e PBG |
123 | /* If _PAGE_PRESENT is clear, we use these: */ |
124 | #define _PAGE_FILE 0x040 /* nonlinear file mapping, saved PTE; unset:swap */ | |
125 | #define _PAGE_PROTNONE 0x080 /* if the user mapped it with PROT_NONE; | |
126 | pte_present gives true */ | |
1da177e4 LT |
127 | #ifdef CONFIG_X86_PAE |
128 | #define _PAGE_NX (1ULL<<_PAGE_BIT_NX) | |
129 | #else | |
130 | #define _PAGE_NX 0 | |
131 | #endif | |
132 | ||
133 | #define _PAGE_TABLE (_PAGE_PRESENT | _PAGE_RW | _PAGE_USER | _PAGE_ACCESSED | _PAGE_DIRTY) | |
134 | #define _KERNPG_TABLE (_PAGE_PRESENT | _PAGE_RW | _PAGE_ACCESSED | _PAGE_DIRTY) | |
135 | #define _PAGE_CHG_MASK (PTE_MASK | _PAGE_ACCESSED | _PAGE_DIRTY) | |
136 | ||
137 | #define PAGE_NONE \ | |
138 | __pgprot(_PAGE_PROTNONE | _PAGE_ACCESSED) | |
139 | #define PAGE_SHARED \ | |
140 | __pgprot(_PAGE_PRESENT | _PAGE_RW | _PAGE_USER | _PAGE_ACCESSED) | |
141 | ||
142 | #define PAGE_SHARED_EXEC \ | |
143 | __pgprot(_PAGE_PRESENT | _PAGE_RW | _PAGE_USER | _PAGE_ACCESSED) | |
144 | #define PAGE_COPY_NOEXEC \ | |
145 | __pgprot(_PAGE_PRESENT | _PAGE_USER | _PAGE_ACCESSED | _PAGE_NX) | |
146 | #define PAGE_COPY_EXEC \ | |
147 | __pgprot(_PAGE_PRESENT | _PAGE_USER | _PAGE_ACCESSED) | |
148 | #define PAGE_COPY \ | |
149 | PAGE_COPY_NOEXEC | |
150 | #define PAGE_READONLY \ | |
151 | __pgprot(_PAGE_PRESENT | _PAGE_USER | _PAGE_ACCESSED | _PAGE_NX) | |
152 | #define PAGE_READONLY_EXEC \ | |
153 | __pgprot(_PAGE_PRESENT | _PAGE_USER | _PAGE_ACCESSED) | |
154 | ||
155 | #define _PAGE_KERNEL \ | |
156 | (_PAGE_PRESENT | _PAGE_RW | _PAGE_DIRTY | _PAGE_ACCESSED | _PAGE_NX) | |
157 | #define _PAGE_KERNEL_EXEC \ | |
158 | (_PAGE_PRESENT | _PAGE_RW | _PAGE_DIRTY | _PAGE_ACCESSED) | |
159 | ||
160 | extern unsigned long long __PAGE_KERNEL, __PAGE_KERNEL_EXEC; | |
161 | #define __PAGE_KERNEL_RO (__PAGE_KERNEL & ~_PAGE_RW) | |
d01ad8dd | 162 | #define __PAGE_KERNEL_RX (__PAGE_KERNEL_EXEC & ~_PAGE_RW) |
1da177e4 LT |
163 | #define __PAGE_KERNEL_NOCACHE (__PAGE_KERNEL | _PAGE_PCD) |
164 | #define __PAGE_KERNEL_LARGE (__PAGE_KERNEL | _PAGE_PSE) | |
165 | #define __PAGE_KERNEL_LARGE_EXEC (__PAGE_KERNEL_EXEC | _PAGE_PSE) | |
166 | ||
167 | #define PAGE_KERNEL __pgprot(__PAGE_KERNEL) | |
168 | #define PAGE_KERNEL_RO __pgprot(__PAGE_KERNEL_RO) | |
169 | #define PAGE_KERNEL_EXEC __pgprot(__PAGE_KERNEL_EXEC) | |
d01ad8dd | 170 | #define PAGE_KERNEL_RX __pgprot(__PAGE_KERNEL_RX) |
1da177e4 LT |
171 | #define PAGE_KERNEL_NOCACHE __pgprot(__PAGE_KERNEL_NOCACHE) |
172 | #define PAGE_KERNEL_LARGE __pgprot(__PAGE_KERNEL_LARGE) | |
173 | #define PAGE_KERNEL_LARGE_EXEC __pgprot(__PAGE_KERNEL_LARGE_EXEC) | |
174 | ||
175 | /* | |
176 | * The i386 can't do page protection for execute, and considers that | |
177 | * the same are read. Also, write permissions imply read permissions. | |
178 | * This is the closest we can get.. | |
179 | */ | |
180 | #define __P000 PAGE_NONE | |
181 | #define __P001 PAGE_READONLY | |
182 | #define __P010 PAGE_COPY | |
183 | #define __P011 PAGE_COPY | |
184 | #define __P100 PAGE_READONLY_EXEC | |
185 | #define __P101 PAGE_READONLY_EXEC | |
186 | #define __P110 PAGE_COPY_EXEC | |
187 | #define __P111 PAGE_COPY_EXEC | |
188 | ||
189 | #define __S000 PAGE_NONE | |
190 | #define __S001 PAGE_READONLY | |
191 | #define __S010 PAGE_SHARED | |
192 | #define __S011 PAGE_SHARED | |
193 | #define __S100 PAGE_READONLY_EXEC | |
194 | #define __S101 PAGE_READONLY_EXEC | |
195 | #define __S110 PAGE_SHARED_EXEC | |
196 | #define __S111 PAGE_SHARED_EXEC | |
197 | ||
198 | /* | |
199 | * Define this if things work differently on an i386 and an i486: | |
200 | * it will (on an i486) warn about kernel memory accesses that are | |
e49332bd | 201 | * done without a 'access_ok(VERIFY_WRITE,..)' |
1da177e4 | 202 | */ |
e49332bd | 203 | #undef TEST_ACCESS_OK |
1da177e4 LT |
204 | |
205 | /* The boot page tables (all created as a single array) */ | |
206 | extern unsigned long pg0[]; | |
207 | ||
208 | #define pte_present(x) ((x).pte_low & (_PAGE_PRESENT | _PAGE_PROTNONE)) | |
1da177e4 | 209 | |
705e87c0 HD |
210 | /* To avoid harmful races, pmd_none(x) should check only the lower when PAE */ |
211 | #define pmd_none(x) (!(unsigned long)pmd_val(x)) | |
1da177e4 | 212 | #define pmd_present(x) (pmd_val(x) & _PAGE_PRESENT) |
1da177e4 LT |
213 | #define pmd_bad(x) ((pmd_val(x) & (~PAGE_MASK & ~_PAGE_USER)) != _KERNPG_TABLE) |
214 | ||
215 | ||
216 | #define pages_to_mb(x) ((x) >> (20-PAGE_SHIFT)) | |
217 | ||
218 | /* | |
219 | * The following only work if pte_present() is true. | |
220 | * Undefined behaviour if not.. | |
221 | */ | |
222 | static inline int pte_user(pte_t pte) { return (pte).pte_low & _PAGE_USER; } | |
223 | static inline int pte_read(pte_t pte) { return (pte).pte_low & _PAGE_USER; } | |
224 | static inline int pte_dirty(pte_t pte) { return (pte).pte_low & _PAGE_DIRTY; } | |
225 | static inline int pte_young(pte_t pte) { return (pte).pte_low & _PAGE_ACCESSED; } | |
226 | static inline int pte_write(pte_t pte) { return (pte).pte_low & _PAGE_RW; } | |
8f860591 | 227 | static inline int pte_huge(pte_t pte) { return (pte).pte_low & _PAGE_PSE; } |
1da177e4 LT |
228 | |
229 | /* | |
230 | * The following only works if pte_present() is not true. | |
231 | */ | |
232 | static inline int pte_file(pte_t pte) { return (pte).pte_low & _PAGE_FILE; } | |
233 | ||
234 | static inline pte_t pte_rdprotect(pte_t pte) { (pte).pte_low &= ~_PAGE_USER; return pte; } | |
235 | static inline pte_t pte_exprotect(pte_t pte) { (pte).pte_low &= ~_PAGE_USER; return pte; } | |
236 | static inline pte_t pte_mkclean(pte_t pte) { (pte).pte_low &= ~_PAGE_DIRTY; return pte; } | |
237 | static inline pte_t pte_mkold(pte_t pte) { (pte).pte_low &= ~_PAGE_ACCESSED; return pte; } | |
238 | static inline pte_t pte_wrprotect(pte_t pte) { (pte).pte_low &= ~_PAGE_RW; return pte; } | |
239 | static inline pte_t pte_mkread(pte_t pte) { (pte).pte_low |= _PAGE_USER; return pte; } | |
240 | static inline pte_t pte_mkexec(pte_t pte) { (pte).pte_low |= _PAGE_USER; return pte; } | |
241 | static inline pte_t pte_mkdirty(pte_t pte) { (pte).pte_low |= _PAGE_DIRTY; return pte; } | |
242 | static inline pte_t pte_mkyoung(pte_t pte) { (pte).pte_low |= _PAGE_ACCESSED; return pte; } | |
243 | static inline pte_t pte_mkwrite(pte_t pte) { (pte).pte_low |= _PAGE_RW; return pte; } | |
8f860591 | 244 | static inline pte_t pte_mkhuge(pte_t pte) { (pte).pte_low |= _PAGE_PSE; return pte; } |
1da177e4 | 245 | |
5311ab62 JF |
246 | extern void vmalloc_sync_all(void); |
247 | ||
1da177e4 LT |
248 | #ifdef CONFIG_X86_PAE |
249 | # include <asm/pgtable-3level.h> | |
250 | #else | |
251 | # include <asm/pgtable-2level.h> | |
252 | #endif | |
253 | ||
da181a8b | 254 | #ifndef CONFIG_PARAVIRT |
789e6ac0 ZA |
255 | /* |
256 | * Rules for using pte_update - it must be called after any PTE update which | |
257 | * has not been done using the set_pte / clear_pte interfaces. It is used by | |
258 | * shadow mode hypervisors to resynchronize the shadow page tables. Kernel PTE | |
259 | * updates should either be sets, clears, or set_pte_atomic for P->P | |
260 | * transitions, which means this hook should only be called for user PTEs. | |
261 | * This hook implies a P->P protection or access change has taken place, which | |
262 | * requires a subsequent TLB flush. The notification can optionally be delayed | |
263 | * until the TLB flush event by using the pte_update_defer form of the | |
264 | * interface, but care must be taken to assure that the flush happens while | |
265 | * still holding the same page table lock so that the shadow and primary pages | |
266 | * do not become out of sync on SMP. | |
267 | */ | |
268 | #define pte_update(mm, addr, ptep) do { } while (0) | |
269 | #define pte_update_defer(mm, addr, ptep) do { } while (0) | |
9a1c13e9 | 270 | #define paravirt_map_pt_hook(slot, va, pfn) do { } while (0) |
3dc494e8 JF |
271 | |
272 | #define raw_ptep_get_and_clear(xp) native_ptep_get_and_clear(xp) | |
da181a8b | 273 | #endif |
789e6ac0 | 274 | |
2965a0e6 RR |
275 | /* |
276 | * We only update the dirty/accessed state if we set | |
277 | * the dirty bit by hand in the kernel, since the hardware | |
278 | * will do the accessed bit for us, and we don't want to | |
279 | * race with other CPU's that might be updating the dirty | |
280 | * bit at the same time. | |
281 | */ | |
282 | #define __HAVE_ARCH_PTEP_SET_ACCESS_FLAGS | |
283 | #define ptep_set_access_flags(vma, address, ptep, entry, dirty) \ | |
284 | do { \ | |
285 | if (dirty) { \ | |
286 | (ptep)->pte_low = (entry).pte_low; \ | |
dfbea0ad | 287 | pte_update_defer((vma)->vm_mm, (address), (ptep)); \ |
2965a0e6 RR |
288 | flush_tlb_page(vma, address); \ |
289 | } \ | |
290 | } while (0) | |
291 | ||
25e4df5b ZA |
292 | /* |
293 | * We don't actually have these, but we want to advertise them so that | |
294 | * we can encompass the flush here. | |
295 | */ | |
6049742d | 296 | #define __HAVE_ARCH_PTEP_TEST_AND_CLEAR_DIRTY |
6049742d | 297 | #define __HAVE_ARCH_PTEP_TEST_AND_CLEAR_YOUNG |
25e4df5b | 298 | |
d6d861e3 ZA |
299 | /* |
300 | * Rules for using ptep_establish: the pte MUST be a user pte, and | |
301 | * must be a present->present transition. | |
302 | */ | |
303 | #define __HAVE_ARCH_PTEP_ESTABLISH | |
304 | #define ptep_establish(vma, address, ptep, pteval) \ | |
305 | do { \ | |
306 | set_pte_present((vma)->vm_mm, address, ptep, pteval); \ | |
307 | flush_tlb_page(vma, address); \ | |
308 | } while (0) | |
309 | ||
25e4df5b ZA |
310 | #define __HAVE_ARCH_PTEP_CLEAR_DIRTY_FLUSH |
311 | #define ptep_clear_flush_dirty(vma, address, ptep) \ | |
312 | ({ \ | |
313 | int __dirty; \ | |
314 | __dirty = pte_dirty(*(ptep)); \ | |
315 | if (__dirty) { \ | |
316 | clear_bit(_PAGE_BIT_DIRTY, &(ptep)->pte_low); \ | |
dfbea0ad | 317 | pte_update_defer((vma)->vm_mm, (address), (ptep)); \ |
25e4df5b ZA |
318 | flush_tlb_page(vma, address); \ |
319 | } \ | |
320 | __dirty; \ | |
321 | }) | |
322 | ||
323 | #define __HAVE_ARCH_PTEP_CLEAR_YOUNG_FLUSH | |
324 | #define ptep_clear_flush_young(vma, address, ptep) \ | |
325 | ({ \ | |
326 | int __young; \ | |
327 | __young = pte_young(*(ptep)); \ | |
328 | if (__young) { \ | |
329 | clear_bit(_PAGE_BIT_ACCESSED, &(ptep)->pte_low); \ | |
dfbea0ad | 330 | pte_update_defer((vma)->vm_mm, (address), (ptep)); \ |
25e4df5b ZA |
331 | flush_tlb_page(vma, address); \ |
332 | } \ | |
333 | __young; \ | |
334 | }) | |
1da177e4 | 335 | |
8ecb8950 ZA |
336 | #define __HAVE_ARCH_PTEP_GET_AND_CLEAR |
337 | static inline pte_t ptep_get_and_clear(struct mm_struct *mm, unsigned long addr, pte_t *ptep) | |
338 | { | |
339 | pte_t pte = raw_ptep_get_and_clear(ptep); | |
340 | pte_update(mm, addr, ptep); | |
341 | return pte; | |
342 | } | |
343 | ||
6049742d | 344 | #define __HAVE_ARCH_PTEP_GET_AND_CLEAR_FULL |
a600388d ZA |
345 | static inline pte_t ptep_get_and_clear_full(struct mm_struct *mm, unsigned long addr, pte_t *ptep, int full) |
346 | { | |
347 | pte_t pte; | |
348 | if (full) { | |
349 | pte = *ptep; | |
6e5882cf | 350 | pte_clear(mm, addr, ptep); |
a600388d ZA |
351 | } else { |
352 | pte = ptep_get_and_clear(mm, addr, ptep); | |
353 | } | |
354 | return pte; | |
355 | } | |
356 | ||
6049742d | 357 | #define __HAVE_ARCH_PTEP_SET_WRPROTECT |
1da177e4 LT |
358 | static inline void ptep_set_wrprotect(struct mm_struct *mm, unsigned long addr, pte_t *ptep) |
359 | { | |
360 | clear_bit(_PAGE_BIT_RW, &ptep->pte_low); | |
789e6ac0 | 361 | pte_update(mm, addr, ptep); |
1da177e4 LT |
362 | } |
363 | ||
d7271b14 ZA |
364 | /* |
365 | * clone_pgd_range(pgd_t *dst, pgd_t *src, int count); | |
366 | * | |
367 | * dst - pointer to pgd range anwhere on a pgd page | |
368 | * src - "" | |
369 | * count - the number of pgds to copy. | |
370 | * | |
371 | * dst and src can be on the same page, but the range must not overlap, | |
372 | * and must not cross a page boundary. | |
373 | */ | |
374 | static inline void clone_pgd_range(pgd_t *dst, pgd_t *src, int count) | |
375 | { | |
376 | memcpy(dst, src, count * sizeof(pgd_t)); | |
377 | } | |
378 | ||
1da177e4 LT |
379 | /* |
380 | * Macro to mark a page protection value as "uncacheable". On processors which do not support | |
381 | * it, this is a no-op. | |
382 | */ | |
383 | #define pgprot_noncached(prot) ((boot_cpu_data.x86 > 3) \ | |
384 | ? (__pgprot(pgprot_val(prot) | _PAGE_PCD | _PAGE_PWT)) : (prot)) | |
385 | ||
386 | /* | |
387 | * Conversion functions: convert a page and protection to a page entry, | |
388 | * and a page entry and page directory to the page they refer to. | |
389 | */ | |
390 | ||
391 | #define mk_pte(page, pgprot) pfn_pte(page_to_pfn(page), (pgprot)) | |
1da177e4 LT |
392 | |
393 | static inline pte_t pte_modify(pte_t pte, pgprot_t newprot) | |
394 | { | |
395 | pte.pte_low &= _PAGE_CHG_MASK; | |
396 | pte.pte_low |= pgprot_val(newprot); | |
397 | #ifdef CONFIG_X86_PAE | |
398 | /* | |
399 | * Chop off the NX bit (if present), and add the NX portion of | |
400 | * the newprot (if present): | |
401 | */ | |
402 | pte.pte_high &= ~(1 << (_PAGE_BIT_NX - 32)); | |
403 | pte.pte_high |= (pgprot_val(newprot) >> 32) & \ | |
404 | (__supported_pte_mask >> 32); | |
405 | #endif | |
406 | return pte; | |
407 | } | |
408 | ||
1da177e4 LT |
409 | #define pmd_large(pmd) \ |
410 | ((pmd_val(pmd) & (_PAGE_PSE|_PAGE_PRESENT)) == (_PAGE_PSE|_PAGE_PRESENT)) | |
411 | ||
412 | /* | |
413 | * the pgd page can be thought of an array like this: pgd_t[PTRS_PER_PGD] | |
414 | * | |
415 | * this macro returns the index of the entry in the pgd page which would | |
416 | * control the given virtual address | |
417 | */ | |
418 | #define pgd_index(address) (((address) >> PGDIR_SHIFT) & (PTRS_PER_PGD-1)) | |
419 | #define pgd_index_k(addr) pgd_index(addr) | |
420 | ||
421 | /* | |
422 | * pgd_offset() returns a (pgd_t *) | |
423 | * pgd_index() is used get the offset into the pgd page's array of pgd_t's; | |
424 | */ | |
425 | #define pgd_offset(mm, address) ((mm)->pgd+pgd_index(address)) | |
426 | ||
427 | /* | |
428 | * a shortcut which implies the use of the kernel's pgd, instead | |
429 | * of a process's | |
430 | */ | |
431 | #define pgd_offset_k(address) pgd_offset(&init_mm, address) | |
432 | ||
433 | /* | |
434 | * the pmd page can be thought of an array like this: pmd_t[PTRS_PER_PMD] | |
435 | * | |
436 | * this macro returns the index of the entry in the pmd page which would | |
437 | * control the given virtual address | |
438 | */ | |
439 | #define pmd_index(address) \ | |
440 | (((address) >> PMD_SHIFT) & (PTRS_PER_PMD-1)) | |
441 | ||
442 | /* | |
443 | * the pte page can be thought of an array like this: pte_t[PTRS_PER_PTE] | |
444 | * | |
445 | * this macro returns the index of the entry in the pte page which would | |
446 | * control the given virtual address | |
447 | */ | |
448 | #define pte_index(address) \ | |
449 | (((address) >> PAGE_SHIFT) & (PTRS_PER_PTE - 1)) | |
450 | #define pte_offset_kernel(dir, address) \ | |
46a82b2d | 451 | ((pte_t *) pmd_page_vaddr(*(dir)) + pte_index(address)) |
1da177e4 | 452 | |
ca140fda PBG |
453 | #define pmd_page(pmd) (pfn_to_page(pmd_val(pmd) >> PAGE_SHIFT)) |
454 | ||
46a82b2d | 455 | #define pmd_page_vaddr(pmd) \ |
ca140fda PBG |
456 | ((unsigned long) __va(pmd_val(pmd) & PAGE_MASK)) |
457 | ||
1da177e4 LT |
458 | /* |
459 | * Helper function that returns the kernel pagetable entry controlling | |
460 | * the virtual address 'address'. NULL means no pagetable entry present. | |
461 | * NOTE: the return type is pte_t but if the pmd is PSE then we return it | |
462 | * as a pte too. | |
463 | */ | |
464 | extern pte_t *lookup_address(unsigned long address); | |
465 | ||
466 | /* | |
467 | * Make a given kernel text page executable/non-executable. | |
468 | * Returns the previous executability setting of that page (which | |
469 | * is used to restore the previous state). Used by the SMP bootup code. | |
470 | * NOTE: this is an __init function for security reasons. | |
471 | */ | |
472 | #ifdef CONFIG_X86_PAE | |
473 | extern int set_kernel_exec(unsigned long vaddr, int enable); | |
474 | #else | |
475 | static inline int set_kernel_exec(unsigned long vaddr, int enable) { return 0;} | |
476 | #endif | |
477 | ||
1da177e4 | 478 | #if defined(CONFIG_HIGHPTE) |
9a1c13e9 ZA |
479 | #define pte_offset_map(dir, address) \ |
480 | ({ \ | |
481 | pte_t *__ptep; \ | |
482 | unsigned pfn = pmd_val(*(dir)) >> PAGE_SHIFT; \ | |
483 | __ptep = (pte_t *)kmap_atomic(pfn_to_page(pfn),KM_PTE0);\ | |
484 | paravirt_map_pt_hook(KM_PTE0,__ptep, pfn); \ | |
485 | __ptep = __ptep + pte_index(address); \ | |
486 | __ptep; \ | |
487 | }) | |
488 | #define pte_offset_map_nested(dir, address) \ | |
489 | ({ \ | |
490 | pte_t *__ptep; \ | |
491 | unsigned pfn = pmd_val(*(dir)) >> PAGE_SHIFT; \ | |
492 | __ptep = (pte_t *)kmap_atomic(pfn_to_page(pfn),KM_PTE1);\ | |
493 | paravirt_map_pt_hook(KM_PTE1,__ptep, pfn); \ | |
494 | __ptep = __ptep + pte_index(address); \ | |
495 | __ptep; \ | |
496 | }) | |
1da177e4 LT |
497 | #define pte_unmap(pte) kunmap_atomic(pte, KM_PTE0) |
498 | #define pte_unmap_nested(pte) kunmap_atomic(pte, KM_PTE1) | |
499 | #else | |
500 | #define pte_offset_map(dir, address) \ | |
501 | ((pte_t *)page_address(pmd_page(*(dir))) + pte_index(address)) | |
502 | #define pte_offset_map_nested(dir, address) pte_offset_map(dir, address) | |
503 | #define pte_unmap(pte) do { } while (0) | |
504 | #define pte_unmap_nested(pte) do { } while (0) | |
505 | #endif | |
506 | ||
23002d88 ZA |
507 | /* Clear a kernel PTE and flush it from the TLB */ |
508 | #define kpte_clear_flush(ptep, vaddr) \ | |
509 | do { \ | |
510 | pte_clear(&init_mm, vaddr, ptep); \ | |
511 | __flush_tlb_one(vaddr); \ | |
512 | } while (0) | |
513 | ||
1da177e4 LT |
514 | /* |
515 | * The i386 doesn't have any external MMU info: the kernel page | |
516 | * tables contain all the necessary information. | |
1da177e4 LT |
517 | */ |
518 | #define update_mmu_cache(vma,address,pte) do { } while (0) | |
b239fb25 JF |
519 | |
520 | void native_pagetable_setup_start(pgd_t *base); | |
521 | void native_pagetable_setup_done(pgd_t *base); | |
522 | ||
523 | #ifndef CONFIG_PARAVIRT | |
524 | static inline void paravirt_pagetable_setup_start(pgd_t *base) | |
525 | { | |
526 | native_pagetable_setup_start(base); | |
527 | } | |
528 | ||
529 | static inline void paravirt_pagetable_setup_done(pgd_t *base) | |
530 | { | |
531 | native_pagetable_setup_done(base); | |
532 | } | |
533 | #endif /* !CONFIG_PARAVIRT */ | |
534 | ||
1da177e4 LT |
535 | #endif /* !__ASSEMBLY__ */ |
536 | ||
05b79bdc | 537 | #ifdef CONFIG_FLATMEM |
1da177e4 | 538 | #define kern_addr_valid(addr) (1) |
05b79bdc | 539 | #endif /* CONFIG_FLATMEM */ |
1da177e4 | 540 | |
1da177e4 LT |
541 | #define io_remap_pfn_range(vma, vaddr, pfn, size, prot) \ |
542 | remap_pfn_range(vma, vaddr, pfn, size, prot) | |
543 | ||
544 | #define MK_IOSPACE_PFN(space, pfn) (pfn) | |
545 | #define GET_IOSPACE(pfn) 0 | |
546 | #define GET_PFN(pfn) (pfn) | |
547 | ||
1da177e4 LT |
548 | #include <asm-generic/pgtable.h> |
549 | ||
550 | #endif /* _I386_PGTABLE_H */ |