source: mainline/kernel/arch/sparc64/src/mm/sun4u/as.c

Last change on this file was b169619, checked in by Jiří Zárevúcky <zarevucky.jiri@…>, 21 months ago

Deduplicate mem functions

There are a number of functions which are copied between
kernel, libc, and potentially boot too. mem*() functions
are first such offenders. All this duplicate code will
be moved to directory 'common'.

  • Property mode set to 100644
File size: 5.8 KB
Line 
1/*
2 * Copyright (c) 2006 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup kernel_sparc64_mm
30 * @{
31 */
32/** @file
33 */
34
35#include <arch/mm/as.h>
36#include <arch/mm/tlb.h>
37#include <assert.h>
38#include <config.h>
39#include <genarch/mm/page_ht.h>
40#include <genarch/mm/asid_fifo.h>
41
42#ifdef CONFIG_TSB
43
44#include <arch/mm/tsb.h>
45#include <arch/asm.h>
46#include <mm/frame.h>
47#include <bitops.h>
48#include <macros.h>
49#include <memw.h>
50
51#endif /* CONFIG_TSB */
52
53/** Architecture dependent address space init. */
54void as_arch_init(void)
55{
56 if (config.cpu_active == 1) {
57 as_operations = &as_ht_operations;
58 asid_fifo_init();
59 }
60}
61
62errno_t as_constructor_arch(as_t *as, unsigned int flags)
63{
64#ifdef CONFIG_TSB
65 uintptr_t tsb_base = frame_alloc(TSB_FRAMES, FRAME_LOWMEM | flags,
66 TSB_SIZE - 1);
67 if (!tsb_base)
68 return ENOMEM;
69
70 tsb_entry_t *tsb = (tsb_entry_t *) PA2KA(tsb_base);
71 memsetb(tsb, TSB_SIZE, 0);
72
73 as->arch.itsb = tsb;
74 as->arch.dtsb = tsb + ITSB_ENTRY_COUNT;
75#endif
76
77 return EOK;
78}
79
80int as_destructor_arch(as_t *as)
81{
82#ifdef CONFIG_TSB
83 frame_free(KA2PA((uintptr_t) as->arch.itsb), TSB_FRAMES);
84
85 return TSB_FRAMES;
86#else
87 return 0;
88#endif
89}
90
91errno_t as_create_arch(as_t *as, unsigned int flags)
92{
93#ifdef CONFIG_TSB
94 tsb_invalidate(as, 0, (size_t) -1);
95#endif
96
97 return 0;
98}
99
100/** Perform sparc64-specific tasks when an address space becomes active on the
101 * processor.
102 *
103 * Install ASID and map TSBs.
104 *
105 * @param as Address space.
106 */
107void as_install_arch(as_t *as)
108{
109 tlb_context_reg_t ctx;
110
111 /*
112 * Note that we don't and may not lock the address space. That's ok
113 * since we only read members that are currently read-only.
114 *
115 * Moreover, the as->asid is protected by asidlock, which is being held.
116 *
117 */
118
119 /*
120 * Write ASID to secondary context register. The primary context
121 * register has to be set from TL>0 so it will be filled from the
122 * secondary context register from the TL=1 code just before switch to
123 * userspace.
124 *
125 */
126 ctx.v = 0;
127 ctx.context = as->asid;
128 mmu_secondary_context_write(ctx.v);
129
130#ifdef CONFIG_TSB
131 uintptr_t base = ALIGN_DOWN(config.base, 1 << KERNEL_PAGE_WIDTH);
132
133 assert(as->arch.itsb);
134 assert(as->arch.dtsb);
135
136 uintptr_t tsb = (uintptr_t) as->arch.itsb;
137
138 if (!overlaps(tsb, TSB_SIZE, base, 1 << KERNEL_PAGE_WIDTH)) {
139 /*
140 * TSBs were allocated from memory not covered
141 * by the locked 4M kernel DTLB entry. We need
142 * to map both TSBs explicitly.
143 *
144 */
145 dtlb_demap(TLB_DEMAP_PAGE, TLB_DEMAP_NUCLEUS, tsb);
146 dtlb_insert_mapping(tsb, KA2PA(tsb), PAGESIZE_64K, true, true);
147 }
148
149 /*
150 * Setup TSB Base registers.
151 *
152 */
153 tsb_base_reg_t tsb_base_reg;
154
155 tsb_base_reg.value = 0;
156 tsb_base_reg.size = TSB_BASE_REG_SIZE;
157 tsb_base_reg.split = 0;
158
159 tsb_base_reg.base = ((uintptr_t) as->arch.itsb) >> MMU_PAGE_WIDTH;
160 itsb_base_write(tsb_base_reg.value);
161 tsb_base_reg.base = ((uintptr_t) as->arch.dtsb) >> MMU_PAGE_WIDTH;
162 dtsb_base_write(tsb_base_reg.value);
163
164#if defined (US3)
165 /*
166 * Clear the extension registers.
167 * In HelenOS, primary and secondary context registers contain
168 * equal values and kernel misses (context 0, ie. the nucleus context)
169 * are excluded from the TSB miss handler, so it makes no sense
170 * to have separate TSBs for primary, secondary and nucleus contexts.
171 * Clearing the extension registers will ensure that the value of the
172 * TSB Base register will be used as an address of TSB, making the code
173 * compatible with the US port.
174 *
175 */
176 itsb_primary_extension_write(0);
177 itsb_nucleus_extension_write(0);
178 dtsb_primary_extension_write(0);
179 dtsb_secondary_extension_write(0);
180 dtsb_nucleus_extension_write(0);
181#endif
182#endif
183}
184
185/** Perform sparc64-specific tasks when an address space is removed from the
186 * processor.
187 *
188 * Demap TSBs.
189 *
190 * @param as Address space.
191 */
192void as_deinstall_arch(as_t *as)
193{
194 /*
195 * Note that we don't and may not lock the address space. That's ok
196 * since we only read members that are currently read-only.
197 *
198 * Moreover, the as->asid is protected by asidlock, which is being held.
199 *
200 */
201
202#ifdef CONFIG_TSB
203 uintptr_t base = ALIGN_DOWN(config.base, 1 << KERNEL_PAGE_WIDTH);
204
205 assert(as->arch.itsb);
206 assert(as->arch.dtsb);
207
208 uintptr_t tsb = (uintptr_t) as->arch.itsb;
209
210 if (!overlaps(tsb, TSB_SIZE, base, 1 << KERNEL_PAGE_WIDTH)) {
211 /*
212 * TSBs were allocated from memory not covered
213 * by the locked 4M kernel DTLB entry. We need
214 * to demap the entry installed by as_install_arch().
215 */
216 dtlb_demap(TLB_DEMAP_PAGE, TLB_DEMAP_NUCLEUS, tsb);
217 }
218#endif
219}
220
221/** @}
222 */
Note: See TracBrowser for help on using the repository browser.