source: mainline/kernel/generic/include/mm/as.h@ c15b374

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since c15b374 was c15b374, checked in by Jakub Jermar <jakub@…>, 15 years ago

Introduce PF_ACCESS_UNKNOWN to be used by the debuging/panicking code in
situations in which the trap handler does not know the exact access type.

Do not pass context-specific messages of only minimal information value to
panic_memtrap().

  • Property mode set to 100644
File size: 8.6 KB
RevLine 
[f761f1eb]1/*
[9150781]2 * Copyright (c) 2010 Jakub Jermar
[f761f1eb]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[f47fd19]29/** @addtogroup genericmm
[b45c443]30 * @{
31 */
32/** @file
33 */
34
[06e1e95]35#ifndef KERN_AS_H_
36#define KERN_AS_H_
[f761f1eb]37
[336db295]38#ifdef KERNEL
[d99c1d2]39 #include <typedefs.h>
[336db295]40#else
[d99c1d2]41 #include <sys/types.h>
[336db295]42#endif
43
[7c23af9]44/** Address space area flags. */
[da1bafb]45#define AS_AREA_READ 1
46#define AS_AREA_WRITE 2
47#define AS_AREA_EXEC 4
48#define AS_AREA_CACHEABLE 8
[7c23af9]49
[336db295]50/** Address space area info exported to userspace. */
51typedef struct {
52 /** Starting address */
53 uintptr_t start_addr;
[da1bafb]54
[336db295]55 /** Area size */
56 size_t size;
[da1bafb]57
[336db295]58 /** Area flags */
[da1bafb]59 unsigned int flags;
[336db295]60} as_area_info_t;
61
[7c23af9]62#ifdef KERNEL
63
[a1a03f9]64#include <arch/mm/page.h>
[20d50a1]65#include <arch/mm/as.h>
[1084a784]66#include <arch/mm/asid.h>
[d99c1d2]67#include <typedefs.h>
[f761f1eb]68#include <synch/spinlock.h>
[1068f6a]69#include <synch/mutex.h>
[5c9a08b]70#include <adt/list.h>
[252127e]71#include <adt/btree.h>
[d4b5542]72#include <lib/elf.h>
[f761f1eb]73
[80bcaed]74/**
75 * Defined to be true if user address space and kernel address space shadow each
76 * other.
[da1bafb]77 *
[80bcaed]78 */
[da1bafb]79#define KERNEL_ADDRESS_SPACE_SHADOWED KERNEL_ADDRESS_SPACE_SHADOWED_ARCH
[5a7d9d1]80
[da1bafb]81#define KERNEL_ADDRESS_SPACE_START KERNEL_ADDRESS_SPACE_START_ARCH
82#define KERNEL_ADDRESS_SPACE_END KERNEL_ADDRESS_SPACE_END_ARCH
83#define USER_ADDRESS_SPACE_START USER_ADDRESS_SPACE_START_ARCH
84#define USER_ADDRESS_SPACE_END USER_ADDRESS_SPACE_END_ARCH
[f761f1eb]85
[da1bafb]86#define USTACK_ADDRESS USTACK_ADDRESS_ARCH
[f761f1eb]87
[80bcaed]88/** Kernel address space. */
[da1bafb]89#define FLAG_AS_KERNEL (1 << 0)
[4512d7e]90
[80bcaed]91/* Address space area attributes. */
[da1bafb]92#define AS_AREA_ATTR_NONE 0
93#define AS_AREA_ATTR_PARTIAL 1 /**< Not fully initialized area. */
[8182031]94
[80bcaed]95/** The page fault was not resolved by as_page_fault(). */
[da1bafb]96#define AS_PF_FAULT 0
97
[80bcaed]98/** The page fault was resolved by as_page_fault(). */
[da1bafb]99#define AS_PF_OK 1
100
[80bcaed]101/** The page fault was caused by memcpy_from_uspace() or memcpy_to_uspace(). */
[da1bafb]102#define AS_PF_DEFER 2
[80bcaed]103
104/** Address space structure.
105 *
106 * as_t contains the list of as_areas of userspace accessible
107 * pages for one or more tasks. Ranges of kernel memory pages are not
108 * supposed to figure in the list as they are shared by all tasks and
109 * set up during system initialization.
[da1bafb]110 *
[80bcaed]111 */
112typedef struct as {
113 /** Protected by asidlock. */
114 link_t inactive_as_with_asid_link;
[da1bafb]115
[879585a3]116 /**
117 * Number of processors on wich is this address space active.
118 * Protected by asidlock.
119 */
[98000fb]120 size_t cpu_refcount;
[da1bafb]121
[879585a3]122 /**
123 * Address space identifier.
124 * Constant on architectures that do not support ASIDs.
125 * Protected by asidlock.
126 */
127 asid_t asid;
[da1bafb]128
[80bcaed]129 /** Number of references (i.e tasks that reference this as). */
[31d8e10]130 atomic_t refcount;
[da1bafb]131
[31d8e10]132 mutex_t lock;
[da1bafb]133
[80bcaed]134 /** B+tree of address space areas. */
135 btree_t as_area_btree;
136
137 /** Non-generic content. */
138 as_genarch_t genarch;
[da1bafb]139
[80bcaed]140 /** Architecture specific content. */
141 as_arch_t arch;
142} as_t;
[b3f8fb7]143
144typedef struct {
[da1bafb]145 pte_t *(* page_table_create)(unsigned int);
146 void (* page_table_destroy)(pte_t *);
147 void (* page_table_lock)(as_t *, bool);
148 void (* page_table_unlock)(as_t *, bool);
[ada559c]149 bool (* page_table_locked)(as_t *);
[b3f8fb7]150} as_operations_t;
[8182031]151
[80bcaed]152/**
153 * This structure contains information associated with the shared address space
154 * area.
[da1bafb]155 *
[80bcaed]156 */
[0ee077ee]157typedef struct {
[80bcaed]158 /** This lock must be acquired only when the as_area lock is held. */
[da1bafb]159 mutex_t lock;
[80bcaed]160 /** This structure can be deallocated if refcount drops to 0. */
[98000fb]161 size_t refcount;
[da1bafb]162
[80bcaed]163 /**
164 * B+tree containing complete map of anonymous pages of the shared area.
165 */
166 btree_t pagemap;
[0ee077ee]167} share_info_t;
168
[b3f8fb7]169/** Page fault access type. */
170typedef enum {
171 PF_ACCESS_READ,
172 PF_ACCESS_WRITE,
[c15b374]173 PF_ACCESS_EXEC,
174 PF_ACCESS_UNKNOWN
[b3f8fb7]175} pf_access_t;
176
177struct mem_backend;
[0ee077ee]178
179/** Backend data stored in address space area. */
[b3f8fb7]180typedef union mem_backend_data {
[da1bafb]181 /** elf_backend members */
182 struct {
[127c957b]183 elf_header_t *elf;
184 elf_segment_header_t *segment;
185 };
[da1bafb]186
187 /** phys_backend members */
188 struct {
[7f1c620]189 uintptr_t base;
[98000fb]190 size_t frames;
[127c957b]191 };
[0ee077ee]192} mem_backend_data_t;
[8182031]193
194/** Address space area structure.
195 *
196 * Each as_area_t structure describes one contiguous area of virtual memory.
[da1bafb]197 *
[8182031]198 */
[b3f8fb7]199typedef struct {
[8182031]200 mutex_t lock;
[80bcaed]201 /** Containing address space. */
[da1bafb]202 as_t *as;
203
[f619ec11]204 /**
205 * Flags related to the memory represented by the address space area.
206 */
[da1bafb]207 unsigned int flags;
208
[80bcaed]209 /** Attributes related to the address space area itself. */
[da1bafb]210 unsigned int attributes;
[80bcaed]211 /** Size of this area in multiples of PAGE_SIZE. */
[98000fb]212 size_t pages;
[80bcaed]213 /** Base address of this area. */
214 uintptr_t base;
215 /** Map of used space. */
216 btree_t used_space;
[da1bafb]217
[80bcaed]218 /**
[f619ec11]219 * If the address space area has been shared, this pointer will
220 * reference the share info structure.
[80bcaed]221 */
222 share_info_t *sh_info;
[da1bafb]223
[80bcaed]224 /** Memory backend backing this address space area. */
225 struct mem_backend *backend;
[da1bafb]226
[0ee077ee]227 /** Data to be used by the backend. */
228 mem_backend_data_t backend_data;
[b3f8fb7]229} as_area_t;
230
231/** Address space area backend structure. */
232typedef struct mem_backend {
[da1bafb]233 int (* page_fault)(as_area_t *, uintptr_t, pf_access_t);
234 void (* frame_free)(as_area_t *, uintptr_t, uintptr_t);
235 void (* share)(as_area_t *);
[b3f8fb7]236} mem_backend_t;
[8182031]237
[fc1e4f6]238extern as_t *AS_KERNEL;
[bd1deed]239
[ef67bab]240extern as_operations_t *as_operations;
[7e4e532]241extern link_t inactive_as_with_asid_head;
242
[ef67bab]243extern void as_init(void);
[482826d]244
[da1bafb]245extern as_t *as_create(unsigned int);
[9150781]246extern void as_destroy(as_t *);
[0321109]247extern void as_hold(as_t *);
248extern void as_release(as_t *);
[9150781]249extern void as_switch(as_t *, as_t *);
250extern int as_page_fault(uintptr_t, pf_access_t, istate_t *);
[482826d]251
[da1bafb]252extern as_area_t *as_area_create(as_t *, unsigned int, size_t, uintptr_t,
253 unsigned int, mem_backend_t *, mem_backend_data_t *);
[9150781]254extern int as_area_destroy(as_t *, uintptr_t);
[da1bafb]255extern int as_area_resize(as_t *, uintptr_t, size_t, unsigned int);
256extern int as_area_share(as_t *, uintptr_t, size_t, as_t *, uintptr_t,
257 unsigned int);
258extern int as_area_change_flags(as_t *, unsigned int, uintptr_t);
[482826d]259
[da1bafb]260extern unsigned int as_area_get_flags(as_area_t *);
[9150781]261extern bool as_area_check_access(as_area_t *, pf_access_t);
262extern size_t as_area_get_size(uintptr_t);
263extern int used_space_insert(as_area_t *, uintptr_t, size_t);
264extern int used_space_remove(as_area_t *, uintptr_t, size_t);
[f761f1eb]265
[29b2bbf]266
[4512d7e]267/* Interface to be implemented by architectures. */
[da1bafb]268
[29b2bbf]269#ifndef as_constructor_arch
[da1bafb]270extern int as_constructor_arch(as_t *, unsigned int);
[29b2bbf]271#endif /* !def as_constructor_arch */
[da1bafb]272
[29b2bbf]273#ifndef as_destructor_arch
[9150781]274extern int as_destructor_arch(as_t *);
[29b2bbf]275#endif /* !def as_destructor_arch */
[da1bafb]276
[29b2bbf]277#ifndef as_create_arch
[da1bafb]278extern int as_create_arch(as_t *, unsigned int);
[29b2bbf]279#endif /* !def as_create_arch */
[da1bafb]280
[20d50a1]281#ifndef as_install_arch
[9150781]282extern void as_install_arch(as_t *);
[20d50a1]283#endif /* !def as_install_arch */
[da1bafb]284
[57da95c]285#ifndef as_deinstall_arch
[9150781]286extern void as_deinstall_arch(as_t *);
[57da95c]287#endif /* !def as_deinstall_arch */
[f761f1eb]288
[b3f8fb7]289/* Backend declarations and functions. */
[8182031]290extern mem_backend_t anon_backend;
291extern mem_backend_t elf_backend;
[0ee077ee]292extern mem_backend_t phys_backend;
[8182031]293
[da1bafb]294/**
[c98e6ee]295 * This flags is passed when running the loader, otherwise elf_load()
296 * would return with a EE_LOADER error code.
[da1bafb]297 *
[c98e6ee]298 */
[da1bafb]299#define ELD_F_NONE 0
300#define ELD_F_LOADER 1
[c98e6ee]301
[da1bafb]302extern unsigned int elf_load(elf_header_t *, as_t *, unsigned int);
[b3f8fb7]303
[df0103f7]304/* Address space area related syscalls. */
[da1bafb]305extern unative_t sys_as_area_create(uintptr_t, size_t, unsigned int);
306extern unative_t sys_as_area_resize(uintptr_t, size_t, unsigned int);
307extern unative_t sys_as_area_change_flags(uintptr_t, unsigned int);
[9150781]308extern unative_t sys_as_area_destroy(uintptr_t);
[7c23af9]309
[64c2ad5]310/* Introspection functions. */
[9150781]311extern void as_get_area_info(as_t *, as_area_info_t **, size_t *);
312extern void as_print(as_t *);
[64c2ad5]313
[7c23af9]314#endif /* KERNEL */
[df0103f7]315
[f761f1eb]316#endif
[b45c443]317
[f47fd19]318/** @}
[b45c443]319 */
Note: See TracBrowser for help on using the repository browser.