mirror of
https://github.com/oliverschmidt/contiki.git
synced 2024-12-23 01:29:33 +00:00
4cdb7ba9b6
This patch extends the protection domain framework with an additional plugin to use Task-State Segment (TSS) structures to offload much of the work of switching protection domains to the CPU. This can save space compared to paging, since paging requires two 4KiB page tables and one 32-byte page table plus one whole-system TSS and an additional 32-byte data structure for each protection domain, whereas the approach implemented by this patch just requires a 128-byte data structure for each protection domain. Only a small number of protection domains will typically be used, so n * 128 < 8328 + (n * 32). For additional information, please refer to cpu/x86/mm/README.md. GCC 6 is introducing named address spaces for the FS and GS segments [1]. LLVM Clang also provides address spaces for the FS and GS segments [2]. This patch also adds support to the multi-segment X86 memory management subsystem for using these features instead of inline assembly blocks, which enables type checking to detect some address space mismatches. [1] https://gcc.gnu.org/onlinedocs/gcc/Named-Address-Spaces.html [2] http://llvm.org/releases/3.3/tools/clang/docs/LanguageExtensions.html#target-specific-extensions
162 lines
5.9 KiB
C
162 lines
5.9 KiB
C
/*
|
|
* Copyright (C) 2015-2016, Intel Corporation. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. Neither the name of the copyright holder nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include "gdt.h"
|
|
#include "helpers.h"
|
|
#include "idt.h"
|
|
#include "prot-domains.h"
|
|
#include "stacks.h"
|
|
#include "syscalls.h"
|
|
#include "tss.h"
|
|
|
|
uint32_t prot_domains_main_esp;
|
|
syscalls_entrypoint_t ATTR_KERN_ADDR_SPACE *prot_domains_syscall;
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
void app_main(void);
|
|
void
|
|
prot_domains_reg(dom_client_data_t ATTR_KERN_ADDR_SPACE *dcd,
|
|
uintptr_t mmio, size_t mmio_sz,
|
|
uintptr_t meta, size_t meta_sz,
|
|
bool pio)
|
|
{
|
|
segment_desc_t desc;
|
|
uint32_t eflags;
|
|
dom_id_t dom_id;
|
|
volatile struct dom_kern_data ATTR_KERN_ADDR_SPACE *dkd;
|
|
|
|
KERN_READL(dom_id, dcd->dom_id);
|
|
|
|
dkd = prot_domains_kern_data + dom_id;
|
|
|
|
prot_domains_reg_multi_seg(dkd, mmio, mmio_sz, meta, meta_sz);
|
|
|
|
/* Only the kernel protection domain requires port I/O access outside of the
|
|
* interrupt handlers.
|
|
*/
|
|
eflags = EFLAGS_IOPL(pio ? PRIV_LVL_USER : PRIV_LVL_INT);
|
|
if(dom_id == DOM_ID_app) {
|
|
eflags |= EFLAGS_IF;
|
|
}
|
|
|
|
/* Keep this initialization in sync with the register definitions in
|
|
* tss-prot-domains-asm.S.
|
|
*/
|
|
KERN_WRITEL(dkd->tss.ebp, 0);
|
|
KERN_WRITEL(dkd->tss.ebx, 0);
|
|
KERN_WRITEL(dkd->tss.esi, BIT(dom_id));
|
|
KERN_WRITEL(dkd->tss.eip,
|
|
(dom_id == DOM_ID_app) ?
|
|
(uint32_t)app_main :
|
|
(uint32_t)prot_domains_syscall_dispatcher);
|
|
KERN_WRITEL(dkd->tss.cs, GDT_SEL_CODE);
|
|
KERN_WRITEL(dkd->tss.ds, GDT_SEL_DATA);
|
|
KERN_WRITEL(dkd->tss.es, GDT_SEL_DATA);
|
|
KERN_WRITEL(dkd->tss.fs, LDT_SEL_KERN);
|
|
KERN_WRITEL(dkd->tss.gs,
|
|
(meta_sz == 0) ? GDT_SEL_NULL : LDT_SEL_META);
|
|
KERN_WRITEL(dkd->tss.ss, GDT_SEL_STK);
|
|
/* This stack pointer is only actually used in application protection domain.
|
|
* Other domains enter at system call dispatcher, which switches to main
|
|
* stack.
|
|
*/
|
|
KERN_WRITEL(dkd->tss.esp,
|
|
/* Two return addresses have been consumed: */
|
|
STACKS_INIT_TOP + (2 * sizeof(uintptr_t)));
|
|
KERN_WRITEL(dkd->tss.eflags, eflags);
|
|
KERN_WRITEL(dkd->tss.ldt, GDT_SEL_LDT(dom_id));
|
|
KERN_WRITEL(dkd->tss.esp2, STACKS_SIZE_MAIN + STACKS_SIZE_INT);
|
|
KERN_WRITEL(dkd->tss.ss2, GDT_SEL_STK_INT);
|
|
KERN_WRITEL(dkd->tss.esp0,
|
|
STACKS_SIZE_MAIN + STACKS_SIZE_INT + STACKS_SIZE_EXC);
|
|
KERN_WRITEL(dkd->tss.ss0, GDT_SEL_STK_EXC);
|
|
KERN_WRITEW(dkd->tss.t, 0);
|
|
KERN_WRITEW(dkd->tss.iomap_base, sizeof(tss_t));
|
|
KERN_WRITEL(dkd->tss.cr3, 0);
|
|
|
|
segment_desc_init(&desc,
|
|
KERN_DATA_OFF_TO_PHYS_ADDR((uint32_t)&(dkd->tss)),
|
|
sizeof(dkd->tss),
|
|
/* It should be possible for code at any privilege level to invoke the task's
|
|
* system call dispatcher.
|
|
*/
|
|
SEG_FLAG(DPL, PRIV_LVL_USER) | SEG_TYPE_TSS32_AVAIL);
|
|
|
|
gdt_insert(GDT_IDX_TSS(dom_id), desc);
|
|
|
|
KERN_WRITEW(dcd->tss_sel, GDT_SEL(GDT_IDX_TSS(dom_id), PRIV_LVL_USER));
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
void dev_not_avail_isr(void);
|
|
void
|
|
prot_domains_impl_init(void)
|
|
{
|
|
__asm__ __volatile__ ("ltr %0" :: "r" ((uint16_t)GDT_SEL_TSS(DOM_ID_kern)));
|
|
__asm__ __volatile__ ("lldt %0" :: "r" ((uint16_t)GDT_SEL_LDT(DOM_ID_kern)));
|
|
|
|
idt_set_intr_gate_desc(7,
|
|
(uint32_t)dev_not_avail_isr,
|
|
GDT_SEL_CODE_EXC, PRIV_LVL_EXC);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
int main();
|
|
void
|
|
prot_domains_launch_kernel(void)
|
|
{
|
|
multi_segment_launch_kernel();
|
|
|
|
/* Activate kernel protection domain, entering the kernel at main. */
|
|
__asm__ __volatile__ (
|
|
"pushl %[_ss_]\n\t"
|
|
"pushl %[_top_of_stk_]\n\t"
|
|
"pushl %[_eflags_]\n\t"
|
|
"pushl %[_cs_]\n\t"
|
|
"pushl %[_kern_start_]\n\t"
|
|
"iretl\n\t"
|
|
:
|
|
: [_ss_] "g" (GDT_SEL_STK),
|
|
[_eflags_] "g" (EFLAGS_IOPL(PRIV_LVL_USER)),
|
|
[_cs_] "g" (GDT_SEL_CODE),
|
|
[_kern_start_] "g" (main),
|
|
/* one address has already been consumed */
|
|
[_top_of_stk_] "g" (STACKS_INIT_TOP + sizeof(uint32_t))
|
|
);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
void
|
|
prot_domains_launch_app()
|
|
{
|
|
far_pointer_t app_ptr = { 0, GDT_SEL_TSS(DOM_ID_app) };
|
|
__asm__ __volatile__ ("ljmp *%0" :: "m" (app_ptr));
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|