|
[ source navigation ] [ diff markup ] [ identifier search ] [ general search ] |
|||
|
001 /* Copyright (C) 2004 David Decotigny 001 /* Copyright (C) 2004 David Decotigny 002 002 003 This program is free software; you can redi 003 This program is free software; you can redistribute it and/or 004 modify it under the terms of the GNU Genera 004 modify it under the terms of the GNU General Public License 005 as published by the Free Software Foundatio 005 as published by the Free Software Foundation; either version 2 006 of the License, or (at your option) any lat 006 of the License, or (at your option) any later version. 007 007 008 This program is distributed in the hope tha 008 This program is distributed in the hope that it will be useful, 009 but WITHOUT ANY WARRANTY; without even the 009 but WITHOUT ANY WARRANTY; without even the implied warranty of 010 MERCHANTABILITY or FITNESS FOR A PARTICULAR 010 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 011 GNU General Public License for more details 011 GNU General Public License for more details. 012 012 013 You should have received a copy of the GNU 013 You should have received a copy of the GNU General Public License 014 along with this program; if not, write to t 014 along with this program; if not, write to the Free Software 015 Foundation, Inc., 59 Temple Place - Suite 3 015 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, 016 USA. 016 USA. 017 */ 017 */ 018 #ifndef _SOS_PAGING_H_ 018 #ifndef _SOS_PAGING_H_ 019 #define _SOS_PAGING_H_ 019 #define _SOS_PAGING_H_ 020 020 021 /** 021 /** 022 * @file paging.h 022 * @file paging.h 023 * 023 * 024 * MMU management routines (arch-dependent). S 024 * MMU management routines (arch-dependent). Setup the MMU without 025 * identity-mapping physical<->virtual address 025 * identity-mapping physical<->virtual addresses over the whole 026 * physical address space: a single, restricte 026 * physical address space: a single, restricted and known, area is 027 * identity-mapped, the remaining kernel/user 027 * identity-mapped, the remaining kernel/user space is not. To access 028 * and manage the MMU translation tables (PD/P 028 * and manage the MMU translation tables (PD/PT on x86), we rely on a 029 * particular configuration, called "mirroring 029 * particular configuration, called "mirroring", where the top-level 030 * translation table (PD on x86) maps itself a 030 * translation table (PD on x86) maps itself at a known and fixed (virtual) 031 * address. The only assumption for this to be 031 * address. The only assumption for this to be possible is that the 032 * structure of the translation table entries 032 * structure of the translation table entries are compatible at the 033 * different levels of vadddr->paddr translati 033 * different levels of vadddr->paddr translation process (PDE and PTE 034 * on x86 are Ok). Credits go to Christophe Av 034 * on x86 are Ok). Credits go to Christophe Avoinne for that. 035 */ 035 */ 036 036 037 #include <sos/types.h> 037 #include <sos/types.h> 038 #include <sos/errno.h> 038 #include <sos/errno.h> 039 039 040 << 041 /** << 042 * Basic SOS virtual memory organization << 043 */ << 044 /** Frontier between kernel and user space vir << 045 #define SOS_PAGING_BASE_USER_ADDRESS (0x400000 << 046 #define SOS_PAGING_TOP_USER_ADDRESS (0xFFFFFF << 047 #define SOS_PAGING_USER_SPACE_SIZE (0xc00000 << 048 << 049 /** Length of the space reserved for the mirro << 050 virtual space */ << 051 #define SOS_PAGING_MIRROR_SIZE (1 << 22) /* << 052 << 053 /** Virtual address where the mirroring takes << 054 #define SOS_PAGING_MIRROR_VADDR \ << 055 (SOS_PAGING_BASE_USER_ADDRESS - SOS_PAGING_ << 056 << 057 << 058 /** 040 /** 059 * sos_paging_map flags 041 * sos_paging_map flags 060 */ 042 */ 061 /** Usual virtual memory access rights */ 043 /** Usual virtual memory access rights */ 062 #define SOS_VM_MAP_PROT_NONE 0 044 #define SOS_VM_MAP_PROT_NONE 0 063 #define SOS_VM_MAP_PROT_READ (1<<0) 045 #define SOS_VM_MAP_PROT_READ (1<<0) 064 #define SOS_VM_MAP_PROT_WRITE (1<<1) 046 #define SOS_VM_MAP_PROT_WRITE (1<<1) 065 #define SOS_VM_MAP_PROT_EXEC (1<<2) /* Not su !! 047 /* EXEC not supported */ 066 << 067 /** Mapping a page may involve an physical pag 048 /** Mapping a page may involve an physical page allocation (for a new 068 PT), hence may potentially block */ 049 PT), hence may potentially block */ 069 #define SOS_VM_MAP_ATOMIC (1<<31) 050 #define SOS_VM_MAP_ATOMIC (1<<31) 070 051 >> 052 /** Virtual address where the mirroring takes place */ >> 053 #define SOS_PAGING_MIRROR_VADDR 0x3fc00000 /* 1GB - 4MB */ >> 054 /** Length of the space reserved for the mirroring in the kernel >> 055 virtual space */ >> 056 #define SOS_PAGING_MIRROR_SIZE (1 << 22) /* 1 PD = 1024 Page Tables = 4MB */ 071 057 072 /** 058 /** 073 * Setup initial page directory structure wher 059 * Setup initial page directory structure where the kernel is 074 * identically-mapped, and the mirroring. This 060 * identically-mapped, and the mirroring. This routine also 075 * identity-maps the BIOS and video areas, to 061 * identity-maps the BIOS and video areas, to allow some debugging 076 * text to be printed to the console. Finally, 062 * text to be printed to the console. Finally, this routine installs 077 * the whole configuration into the MMU. 063 * the whole configuration into the MMU. 078 */ 064 */ 079 sos_ret_t sos_paging_subsystem_setup(sos_paddr !! 065 sos_ret_t sos_paging_setup(sos_paddr_t identity_mapping_base, 080 sos_paddr !! 066 sos_paddr_t identity_mapping_top); 081 067 082 /** 068 /** 083 * Map the given physical page at the given vi 069 * Map the given physical page at the given virtual address in the 084 * current address space. 070 * current address space. 085 * 071 * 086 * @note *IMPORTANT*: The physical page ppage_ 072 * @note *IMPORTANT*: The physical page ppage_paddr *MUST* have been 087 * referenced by the caller through either a c 073 * referenced by the caller through either a call to 088 * sos_physmem_ref_physpage_new() or sos_physm 074 * sos_physmem_ref_physpage_new() or sos_physmem_ref_physpage_at(). It 089 * would work if this were untrue, but this wo 075 * would work if this were untrue, but this would be INCORRECT (it is 090 * expected that one is owning the page before 076 * expected that one is owning the page before mapping it, or 091 * otherwise the page could have been stolen b 077 * otherwise the page could have been stolen by an interrupt or 092 * another thread). 078 * another thread). 093 * 079 * 094 * @param ppage_paddr The address of a physic 080 * @param ppage_paddr The address of a physical page (page-aligned) 095 * @param vpage_vaddr The address of the virt 081 * @param vpage_vaddr The address of the virtual page (page-aligned) 096 * @param is_user_page TRUE when the page is a 082 * @param is_user_page TRUE when the page is available from user space 097 * @param flags A mask made of SOS_VM_* 083 * @param flags A mask made of SOS_VM_* bits 098 * 084 * 099 * @note Unless the SOS_VM_MAP_ATOMIC bit is s 085 * @note Unless the SOS_VM_MAP_ATOMIC bit is set in the flags, the 100 * function may potentially block, because a p 086 * function may potentially block, because a physical page may be 101 * allocated for a new PT. 087 * allocated for a new PT. 102 */ 088 */ 103 sos_ret_t sos_paging_map(sos_paddr_t ppage_pad 089 sos_ret_t sos_paging_map(sos_paddr_t ppage_paddr, 104 sos_vaddr_t vpage_vad 090 sos_vaddr_t vpage_vaddr, 105 sos_bool_t is_user_pa 091 sos_bool_t is_user_page, 106 sos_ui32_t flags); !! 092 int flags); 107 093 108 /** 094 /** 109 * Undo the mapping from vaddr to the underlyi 095 * Undo the mapping from vaddr to the underlying physical page (if any) 110 * @param vpage_vaddr The address of the virt 096 * @param vpage_vaddr The address of the virtual page (page-aligned) 111 * << 112 * @return >= 0 when OK (the number of bytes o << 113 */ 097 */ 114 sos_ret_t sos_paging_unmap(sos_vaddr_t vpage_v 098 sos_ret_t sos_paging_unmap(sos_vaddr_t vpage_vaddr); 115 099 116 /** 100 /** 117 * Undo the mapping from [vaddr .. vaddr + siz << 118 * physical pages (if any) << 119 * @param vpage_vaddr The address of the virtu << 120 * @param size The size (in bytes) to u << 121 */ << 122 sos_ret_t sos_paging_unmap_interval(sos_vaddr_ << 123 sos_size_t << 124 << 125 /** << 126 * Return the page protection flags (SOS_VM_MA 101 * Return the page protection flags (SOS_VM_MAP_PROT_*) associated 127 * with the address, or SOS_VM_MAP_PROT_NONE w 102 * with the address, or SOS_VM_MAP_PROT_NONE when page is not mapped 128 */ 103 */ 129 sos_ui32_t sos_paging_get_prot(sos_vaddr_t vad !! 104 int sos_paging_get_prot(sos_vaddr_t vaddr); 130 << 131 /** << 132 * Change the page access rights << 133 */ << 134 sos_ret_t sos_paging_set_prot(sos_vaddr_t vadd << 135 sos_ui32_t new_ << 136 << 137 /** << 138 * Change the access rights of the mapping fro << 139 * size[ to the underlying physical pages (if << 140 * @param vpage_vaddr The address of the virtu << 141 * @param size The size (in bytes) to u << 142 */ << 143 sos_ret_t sos_paging_set_prot_of_interval(sos_ << 144 sos_ << 145 sos_ << 146 105 147 /** 106 /** 148 * Return the physical address of the given vi 107 * Return the physical address of the given virtual address. Since page 149 * at physical addr 0 is not mapped, the NULL 108 * at physical addr 0 is not mapped, the NULL result means "page not 150 * mapped". 109 * mapped". 151 */ 110 */ 152 sos_paddr_t sos_paging_get_paddr(sos_vaddr_t v 111 sos_paddr_t sos_paging_get_paddr(sos_vaddr_t vaddr); 153 112 154 /** 113 /** 155 * Tell whether the address is physically mapp 114 * Tell whether the address is physically mapped 156 */ 115 */ 157 #define sos_paging_check_present(vaddr) \ 116 #define sos_paging_check_present(vaddr) \ 158 (sos_paging_get_paddr(vaddr) != NULL) 117 (sos_paging_get_paddr(vaddr) != NULL) 159 118 160 << 161 /* ******************************************* << 162 * Functions restricted to mm_context module << 163 */ << 164 << 165 << 166 /** << 167 * Release the references to all the reference << 168 * x86). On x86, this applies only to the USER << 169 */ << 170 sos_ret_t sos_paging_dispose(sos_vaddr_t vaddr << 171 << 172 << 173 /** << 174 * Copy the MMU configuration related to the k << 175 */ << 176 sos_ret_t sos_paging_copy_kernel_space(sos_vad << 177 sos_vad << 178 << 179 << 180 /** << 181 * Copy the MMU configuration related to the u << 182 */ << 183 sos_ret_t sos_paging_copy_user_space(sos_vaddr << 184 sos_vaddr << 185 << 186 << 187 /** << 188 * Prepare the *current* address space for COW << 189 * mapping << 190 */ << 191 sos_ret_t sos_paging_prepare_COW(sos_uaddr_t b << 192 sos_size_t le << 193 << 194 << 195 /** << 196 * Try to resolve the given page fault excepti << 197 * << 198 * @param uaddr The user-space address (of the << 199 * the faulting access << 200 * << 201 * @return TRUE if the page fault was a real C << 202 * FALSE if the page fault is not subject to C << 203 * mapped at this address). <0 in case the giv << 204 * COW BUT could not be resolved due to runtim << 205 */ << 206 sos_ret_t sos_paging_try_resolve_COW(sos_uaddr << 207 << 208 << 209 /** << 210 * Retrieve the current physical address of th << 211 */ << 212 sos_paddr_t sos_paging_get_current_PD_paddr(); << 213 << 214 << 215 /** << 216 * Change the current MMU configuration. << 217 * << 218 * @note DANGEROUS. Don't use it unless you kn << 219 * doing ! << 220 */ << 221 sos_ret_t sos_paging_set_current_PD_paddr(sos_ << 222 119 223 #endif /* _SOS_PAGING_H_ */ 120 #endif /* _SOS_PAGING_H_ */
[ source navigation ] | [ diff markup ] | [ identifier search ] | [ general search ] |