source: mainline/kernel/generic/src/mm/km.c

Last change on this file was cd0a38e, checked in by Jakub Jermář <jakub@…>, 3 years ago

Make km_unmap() right also on the other CPUs

The TLB shootdown sequence must not invalidate the entire kernel ASID
either on the non-current CPUs.

  • Property mode set to 100644
File size: 7.6 KB
RevLine 
[622f409]1/*
2 * Copyright (c) 2011 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[174156fd]29/** @addtogroup kernel_generic_mm
[622f409]30 * @{
31 */
32
33/**
34 * @file
35 * @brief Kernel virtual memory setup.
36 */
37
38#include <mm/km.h>
[55896b6]39#include <arch/mm/km.h>
[63e27ef]40#include <assert.h>
[c868e2d]41#include <mm/page.h>
[f7f47a7]42#include <mm/frame.h>
43#include <mm/asid.h>
[55896b6]44#include <config.h>
[29938b2]45#include <typedefs.h>
[7c3e482]46#include <lib/ra.h>
[f7f47a7]47#include <arch.h>
[d4673296]48#include <align.h>
49#include <macros.h>
50#include <bitops.h>
[1066041]51#include <proc/thread.h>
[7c3e482]52
53static ra_arena_t *km_ni_arena;
[622f409]54
[1b20da0]55#define DEFERRED_PAGES_MAX (PAGE_SIZE / sizeof(uintptr_t))
[f7f47a7]56
57/** Number of freed pages in the deferred buffer. */
58static volatile unsigned deferred_pages;
59/** Buffer of deferred freed pages. */
60static uintptr_t deferred_page[DEFERRED_PAGES_MAX];
61
62/** Flush the buffer of deferred freed pages.
63 *
64 * @return Number of freed pages.
65 */
66static unsigned km_flush_deferred(void)
67{
68 unsigned i = 0;
69 ipl_t ipl;
70
71 ipl = tlb_shootdown_start(TLB_INVL_ASID, ASID_KERNEL, 0, 0);
72
73 for (i = 0; i < deferred_pages; i++) {
74 page_mapping_remove(AS_KERNEL, deferred_page[i]);
75 km_page_free(deferred_page[i], PAGE_SIZE);
76 }
77
78 tlb_invalidate_asid(ASID_KERNEL);
79
80 as_invalidate_translation_cache(AS_KERNEL, 0, -1);
81 tlb_shootdown_finalize(ipl);
82
83 return i;
84}
85
[622f409]86/** Architecture dependent setup of identity-mapped kernel memory. */
87void km_identity_init(void)
88{
[55896b6]89 km_identity_arch_init();
90 config.identity_configured = true;
[622f409]91}
92
93/** Architecture dependent setup of non-identity-mapped kernel memory. */
94void km_non_identity_init(void)
95{
[7c3e482]96 km_ni_arena = ra_arena_create();
[63e27ef]97 assert(km_ni_arena != NULL);
[55896b6]98 km_non_identity_arch_init();
99 config.non_identity_configured = true;
[622f409]100}
101
[1b478f6]102bool km_is_non_identity(uintptr_t addr)
103{
104 return km_is_non_identity_arch(addr);
105}
106
[29938b2]107void km_non_identity_span_add(uintptr_t base, size_t size)
108{
[7c3e482]109 bool span_added;
110
[c868e2d]111 page_mapping_make_global(base, size);
112
[7c3e482]113 span_added = ra_span_add(km_ni_arena, base, size);
[63e27ef]114 assert(span_added);
[0705fc5]115 (void) span_added;
[7c3e482]116}
117
118uintptr_t km_page_alloc(size_t size, size_t align)
119{
[300f4c4]120 uintptr_t base;
121 if (ra_alloc(km_ni_arena, size, align, &base))
122 return base;
123 else
[482f968]124 panic("Kernel ran out of virtual address space.");
[29938b2]125}
126
[7c3e482]127void km_page_free(uintptr_t page, size_t size)
128{
129 ra_free(km_ni_arena, page, size);
130}
131
[bf3dd35]132static uintptr_t
[a1b9f63]133km_map_aligned(uintptr_t paddr, size_t size, size_t align, unsigned int flags)
[d4673296]134{
[adec5b45]135 uintptr_t vaddr;
136 uintptr_t offs;
[d4673296]137
[a1b9f63]138 if (align == KM_NATURAL_ALIGNMENT)
139 align = ispwr2(size) ? size : (1U << (fnzb(size) + 1));
140
[63e27ef]141 assert(ALIGN_DOWN(paddr, FRAME_SIZE) == paddr);
142 assert(ALIGN_UP(size, FRAME_SIZE) == size);
[a1b9f63]143 assert(ispwr2(align));
[03cdd2b]144
[a1b9f63]145 /* Enforce at least PAGE_SIZE alignment. */
[03cdd2b]146 vaddr = km_page_alloc(size, max(PAGE_SIZE, align));
[d4673296]147
148 page_table_lock(AS_KERNEL, true);
[03cdd2b]149 for (offs = 0; offs < size; offs += PAGE_SIZE) {
[adec5b45]150 page_mapping_insert(AS_KERNEL, vaddr + offs, paddr + offs,
151 flags);
[d4673296]152 }
153 page_table_unlock(AS_KERNEL, true);
[a35b458]154
[adec5b45]155 return vaddr;
[d4673296]156}
157
[03cdd2b]158static void km_unmap_aligned(uintptr_t vaddr, size_t size)
159{
160 uintptr_t offs;
161 ipl_t ipl;
162
[63e27ef]163 assert(ALIGN_DOWN(vaddr, PAGE_SIZE) == vaddr);
164 assert(ALIGN_UP(size, PAGE_SIZE) == size);
[03cdd2b]165
166 page_table_lock(AS_KERNEL, true);
167
[cd0a38e]168 size_t pages = size >> PAGE_WIDTH;
169 ipl = tlb_shootdown_start(TLB_INVL_PAGES, ASID_KERNEL, vaddr, pages);
[03cdd2b]170
171 for (offs = 0; offs < size; offs += PAGE_SIZE)
172 page_mapping_remove(AS_KERNEL, vaddr + offs);
173
[cd0a38e]174 tlb_invalidate_pages(ASID_KERNEL, vaddr, pages);
[03cdd2b]175
176 as_invalidate_translation_cache(AS_KERNEL, 0, -1);
177 tlb_shootdown_finalize(ipl);
178 page_table_unlock(AS_KERNEL, true);
179
[96d9cdd]180 km_page_free(vaddr, size);
[03cdd2b]181}
182
183/** Map a piece of physical address space into the virtual address space.
184 *
185 * @param paddr Physical address to be mapped. May be unaligned.
186 * @param size Size of area starting at paddr to be mapped.
187 * @param flags Protection flags to be used for the mapping.
188 *
189 * @return New virtual address mapped to paddr.
190 */
[a1b9f63]191uintptr_t km_map(uintptr_t paddr, size_t size, size_t align, unsigned int flags)
[babb57e]192{
193 uintptr_t page;
[1b20da0]194 size_t offs;
[03cdd2b]195
[1b20da0]196 offs = paddr - ALIGN_DOWN(paddr, FRAME_SIZE);
[03cdd2b]197 page = km_map_aligned(ALIGN_DOWN(paddr, FRAME_SIZE),
[a1b9f63]198 ALIGN_UP(size + offs, FRAME_SIZE), align, flags);
[babb57e]199
200 return page + offs;
201}
[d4673296]202
[03cdd2b]203/** Unmap a piece of virtual address space.
204 *
205 * @param vaddr Virtual address to be unmapped. May be unaligned, but
[6ddd7f8]206 * it must be a value previously returned by km_map().
[03cdd2b]207 * @param size Size of area starting at vaddr to be unmapped.
208 */
209void km_unmap(uintptr_t vaddr, size_t size)
210{
[1b20da0]211 size_t offs;
[03cdd2b]212
[1b20da0]213 offs = vaddr - ALIGN_DOWN(vaddr, PAGE_SIZE);
[03cdd2b]214 km_unmap_aligned(ALIGN_DOWN(vaddr, PAGE_SIZE),
215 ALIGN_UP(size + offs, PAGE_SIZE));
216}
217
218/** Unmap kernel non-identity page.
[f7f47a7]219 *
220 * @param[in] page Non-identity page to be unmapped.
221 */
222static void km_unmap_deferred(uintptr_t page)
223{
224 page_table_lock(AS_KERNEL, true);
225
226 if (deferred_pages == DEFERRED_PAGES_MAX) {
227 (void) km_flush_deferred();
228 deferred_pages = 0;
229 }
230
231 deferred_page[deferred_pages++] = page;
232
233 page_table_unlock(AS_KERNEL, true);
234}
235
236/** Create a temporary page.
237 *
238 * The page is mapped read/write to a newly allocated frame of physical memory.
239 * The page must be returned back to the system by a call to
240 * km_temporary_page_put().
241 *
242 * @param[inout] framep Pointer to a variable which will receive the physical
243 * address of the allocated frame.
[338810f]244 * @param[in] flags Frame allocation flags. FRAME_NONE, FRAME_NO_RESERVE
245 * and FRAME_ATOMIC bits are allowed.
[f7f47a7]246 * @return Virtual address of the allocated frame.
247 */
248uintptr_t km_temporary_page_get(uintptr_t *framep, frame_flags_t flags)
249{
[63e27ef]250 assert(THREAD);
251 assert(framep);
252 assert(!(flags & ~(FRAME_NO_RESERVE | FRAME_ATOMIC)));
[a35b458]253
[f7f47a7]254 /*
255 * Allocate a frame, preferably from high memory.
256 */
[e2a0d76]257 uintptr_t page;
[5c7be3e]258 uintptr_t frame;
259
[482f968]260 frame = frame_alloc(1, FRAME_HIGHMEM | flags, 0);
261 if (frame >= config.identity_size) {
[a1b9f63]262 page = km_map(frame, PAGE_SIZE, PAGE_SIZE,
[1ccd0aa]263 PAGE_READ | PAGE_WRITE | PAGE_CACHEABLE);
[f7f47a7]264 } else {
265 page = PA2KA(frame);
266 }
[a35b458]267
[f7f47a7]268 *framep = frame;
[e2a0d76]269 return page;
[f7f47a7]270}
271
272/** Destroy a temporary page.
273 *
274 * This function destroys a temporary page previously created by
275 * km_temporary_page_get(). The page destruction may be immediate or deferred.
276 * The frame mapped by the destroyed page is not freed.
277 *
278 * @param[in] page Temporary page to be destroyed.
279 */
280void km_temporary_page_put(uintptr_t page)
281{
[63e27ef]282 assert(THREAD);
[f7f47a7]283
284 if (km_is_non_identity(page))
285 km_unmap_deferred(page);
286}
[7c3e482]287
[622f409]288/** @}
289 */
Note: See TracBrowser for help on using the repository browser.