source: mainline/kernel/generic/src/mm/km.c@ 6ddd7f8

ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 6ddd7f8 was 6ddd7f8, checked in by Jakub Jermář <jakub@…>, 3 years ago

Don't unmap the entire kernel ASID during km_unmap

  • Property mode set to 100644
File size: 7.6 KB
RevLine 
[622f409]1/*
2 * Copyright (c) 2011 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[174156fd]29/** @addtogroup kernel_generic_mm
[622f409]30 * @{
31 */
32
33/**
34 * @file
35 * @brief Kernel virtual memory setup.
36 */
37
38#include <mm/km.h>
[55896b6]39#include <arch/mm/km.h>
[63e27ef]40#include <assert.h>
[c868e2d]41#include <mm/page.h>
[f7f47a7]42#include <mm/frame.h>
43#include <mm/asid.h>
[55896b6]44#include <config.h>
[29938b2]45#include <typedefs.h>
[7c3e482]46#include <lib/ra.h>
[f7f47a7]47#include <arch.h>
[d4673296]48#include <align.h>
49#include <macros.h>
50#include <bitops.h>
[1066041]51#include <proc/thread.h>
[7c3e482]52
53static ra_arena_t *km_ni_arena;
[622f409]54
[1b20da0]55#define DEFERRED_PAGES_MAX (PAGE_SIZE / sizeof(uintptr_t))
[f7f47a7]56
57/** Number of freed pages in the deferred buffer. */
58static volatile unsigned deferred_pages;
59/** Buffer of deferred freed pages. */
60static uintptr_t deferred_page[DEFERRED_PAGES_MAX];
61
62/** Flush the buffer of deferred freed pages.
63 *
64 * @return Number of freed pages.
65 */
66static unsigned km_flush_deferred(void)
67{
68 unsigned i = 0;
69 ipl_t ipl;
70
71 ipl = tlb_shootdown_start(TLB_INVL_ASID, ASID_KERNEL, 0, 0);
72
73 for (i = 0; i < deferred_pages; i++) {
74 page_mapping_remove(AS_KERNEL, deferred_page[i]);
75 km_page_free(deferred_page[i], PAGE_SIZE);
76 }
77
78 tlb_invalidate_asid(ASID_KERNEL);
79
80 as_invalidate_translation_cache(AS_KERNEL, 0, -1);
81 tlb_shootdown_finalize(ipl);
82
83 return i;
84}
85
[622f409]86/** Architecture dependent setup of identity-mapped kernel memory. */
87void km_identity_init(void)
88{
[55896b6]89 km_identity_arch_init();
90 config.identity_configured = true;
[622f409]91}
92
93/** Architecture dependent setup of non-identity-mapped kernel memory. */
94void km_non_identity_init(void)
95{
[7c3e482]96 km_ni_arena = ra_arena_create();
[63e27ef]97 assert(km_ni_arena != NULL);
[55896b6]98 km_non_identity_arch_init();
99 config.non_identity_configured = true;
[622f409]100}
101
[1b478f6]102bool km_is_non_identity(uintptr_t addr)
103{
104 return km_is_non_identity_arch(addr);
105}
106
[29938b2]107void km_non_identity_span_add(uintptr_t base, size_t size)
108{
[7c3e482]109 bool span_added;
110
[c868e2d]111 page_mapping_make_global(base, size);
112
[7c3e482]113 span_added = ra_span_add(km_ni_arena, base, size);
[63e27ef]114 assert(span_added);
[0705fc5]115 (void) span_added;
[7c3e482]116}
117
118uintptr_t km_page_alloc(size_t size, size_t align)
119{
[300f4c4]120 uintptr_t base;
121 if (ra_alloc(km_ni_arena, size, align, &base))
122 return base;
123 else
[482f968]124 panic("Kernel ran out of virtual address space.");
[29938b2]125}
126
[7c3e482]127void km_page_free(uintptr_t page, size_t size)
128{
129 ra_free(km_ni_arena, page, size);
130}
131
[bf3dd35]132static uintptr_t
[a1b9f63]133km_map_aligned(uintptr_t paddr, size_t size, size_t align, unsigned int flags)
[d4673296]134{
[adec5b45]135 uintptr_t vaddr;
136 uintptr_t offs;
[d4673296]137
[a1b9f63]138 if (align == KM_NATURAL_ALIGNMENT)
139 align = ispwr2(size) ? size : (1U << (fnzb(size) + 1));
140
[63e27ef]141 assert(ALIGN_DOWN(paddr, FRAME_SIZE) == paddr);
142 assert(ALIGN_UP(size, FRAME_SIZE) == size);
[a1b9f63]143 assert(ispwr2(align));
[03cdd2b]144
[a1b9f63]145 /* Enforce at least PAGE_SIZE alignment. */
[03cdd2b]146 vaddr = km_page_alloc(size, max(PAGE_SIZE, align));
[d4673296]147
148 page_table_lock(AS_KERNEL, true);
[03cdd2b]149 for (offs = 0; offs < size; offs += PAGE_SIZE) {
[adec5b45]150 page_mapping_insert(AS_KERNEL, vaddr + offs, paddr + offs,
151 flags);
[d4673296]152 }
153 page_table_unlock(AS_KERNEL, true);
[a35b458]154
[adec5b45]155 return vaddr;
[d4673296]156}
157
[03cdd2b]158static void km_unmap_aligned(uintptr_t vaddr, size_t size)
159{
160 uintptr_t offs;
161 ipl_t ipl;
162
[63e27ef]163 assert(ALIGN_DOWN(vaddr, PAGE_SIZE) == vaddr);
164 assert(ALIGN_UP(size, PAGE_SIZE) == size);
[03cdd2b]165
166 page_table_lock(AS_KERNEL, true);
167
168 ipl = tlb_shootdown_start(TLB_INVL_ASID, ASID_KERNEL, 0, 0);
169
170 for (offs = 0; offs < size; offs += PAGE_SIZE)
171 page_mapping_remove(AS_KERNEL, vaddr + offs);
172
[6ddd7f8]173 tlb_invalidate_pages(ASID_KERNEL, vaddr, size >> PAGE_WIDTH);
[03cdd2b]174
175 as_invalidate_translation_cache(AS_KERNEL, 0, -1);
176 tlb_shootdown_finalize(ipl);
177 page_table_unlock(AS_KERNEL, true);
178
[96d9cdd]179 km_page_free(vaddr, size);
[03cdd2b]180}
181
182/** Map a piece of physical address space into the virtual address space.
183 *
184 * @param paddr Physical address to be mapped. May be unaligned.
185 * @param size Size of area starting at paddr to be mapped.
186 * @param flags Protection flags to be used for the mapping.
187 *
188 * @return New virtual address mapped to paddr.
189 */
[a1b9f63]190uintptr_t km_map(uintptr_t paddr, size_t size, size_t align, unsigned int flags)
[babb57e]191{
192 uintptr_t page;
[1b20da0]193 size_t offs;
[03cdd2b]194
[1b20da0]195 offs = paddr - ALIGN_DOWN(paddr, FRAME_SIZE);
[03cdd2b]196 page = km_map_aligned(ALIGN_DOWN(paddr, FRAME_SIZE),
[a1b9f63]197 ALIGN_UP(size + offs, FRAME_SIZE), align, flags);
[babb57e]198
199 return page + offs;
200}
[d4673296]201
[03cdd2b]202/** Unmap a piece of virtual address space.
203 *
204 * @param vaddr Virtual address to be unmapped. May be unaligned, but
[6ddd7f8]205 * it must be a value previously returned by km_map().
[03cdd2b]206 * @param size Size of area starting at vaddr to be unmapped.
207 */
208void km_unmap(uintptr_t vaddr, size_t size)
209{
[1b20da0]210 size_t offs;
[03cdd2b]211
[1b20da0]212 offs = vaddr - ALIGN_DOWN(vaddr, PAGE_SIZE);
[03cdd2b]213 km_unmap_aligned(ALIGN_DOWN(vaddr, PAGE_SIZE),
214 ALIGN_UP(size + offs, PAGE_SIZE));
215}
216
217/** Unmap kernel non-identity page.
[f7f47a7]218 *
219 * @param[in] page Non-identity page to be unmapped.
220 */
221static void km_unmap_deferred(uintptr_t page)
222{
223 page_table_lock(AS_KERNEL, true);
224
225 if (deferred_pages == DEFERRED_PAGES_MAX) {
226 (void) km_flush_deferred();
227 deferred_pages = 0;
228 }
229
230 deferred_page[deferred_pages++] = page;
231
232 page_table_unlock(AS_KERNEL, true);
233}
234
235/** Create a temporary page.
236 *
237 * The page is mapped read/write to a newly allocated frame of physical memory.
238 * The page must be returned back to the system by a call to
239 * km_temporary_page_put().
240 *
241 * @param[inout] framep Pointer to a variable which will receive the physical
242 * address of the allocated frame.
[338810f]243 * @param[in] flags Frame allocation flags. FRAME_NONE, FRAME_NO_RESERVE
244 * and FRAME_ATOMIC bits are allowed.
[f7f47a7]245 * @return Virtual address of the allocated frame.
246 */
247uintptr_t km_temporary_page_get(uintptr_t *framep, frame_flags_t flags)
248{
[63e27ef]249 assert(THREAD);
250 assert(framep);
251 assert(!(flags & ~(FRAME_NO_RESERVE | FRAME_ATOMIC)));
[a35b458]252
[f7f47a7]253 /*
254 * Allocate a frame, preferably from high memory.
255 */
[e2a0d76]256 uintptr_t page;
[5c7be3e]257 uintptr_t frame;
258
[482f968]259 frame = frame_alloc(1, FRAME_HIGHMEM | flags, 0);
260 if (frame >= config.identity_size) {
[a1b9f63]261 page = km_map(frame, PAGE_SIZE, PAGE_SIZE,
[1ccd0aa]262 PAGE_READ | PAGE_WRITE | PAGE_CACHEABLE);
[f7f47a7]263 } else {
264 page = PA2KA(frame);
265 }
[a35b458]266
[f7f47a7]267 *framep = frame;
[e2a0d76]268 return page;
[f7f47a7]269}
270
271/** Destroy a temporary page.
272 *
273 * This function destroys a temporary page previously created by
274 * km_temporary_page_get(). The page destruction may be immediate or deferred.
275 * The frame mapped by the destroyed page is not freed.
276 *
277 * @param[in] page Temporary page to be destroyed.
278 */
279void km_temporary_page_put(uintptr_t page)
280{
[63e27ef]281 assert(THREAD);
[f7f47a7]282
283 if (km_is_non_identity(page))
284 km_unmap_deferred(page);
285}
[7c3e482]286
[622f409]287/** @}
288 */
Note: See TracBrowser for help on using the repository browser.