Merge pull request #103 from ia0/no_wfr
Do not use writeable flash regions for persistent storage
This commit is contained in:
51
deploy.py
51
deploy.py
@@ -60,6 +60,10 @@ OpenSKBoard = collections.namedtuple(
|
||||
"app_ldscript",
|
||||
# Flash address at which the app should be written
|
||||
"app_address",
|
||||
# Flash address of the storage
|
||||
"storage_address",
|
||||
# Size of the storage
|
||||
"storage_size",
|
||||
# Target name for flashing the board using pyOCD
|
||||
"pyocd_target",
|
||||
# The cfg file in OpenOCD board folder
|
||||
@@ -89,6 +93,8 @@ SUPPORTED_BOARDS = {
|
||||
padding_address=0x30000,
|
||||
app_ldscript="nrf52840_layout.ld",
|
||||
app_address=0x40000,
|
||||
storage_address=0xC0000,
|
||||
storage_size=0x40000,
|
||||
pyocd_target="nrf52840",
|
||||
openocd_board="nordic_nrf52840_dongle.cfg",
|
||||
openocd_options=[],
|
||||
@@ -106,6 +112,8 @@ SUPPORTED_BOARDS = {
|
||||
padding_address=0x30000,
|
||||
app_ldscript="nrf52840_layout.ld",
|
||||
app_address=0x40000,
|
||||
storage_address=0xC0000,
|
||||
storage_size=0x40000,
|
||||
pyocd_target="nrf52840",
|
||||
openocd_board="nordic_nrf52840_dongle.cfg",
|
||||
openocd_options=[],
|
||||
@@ -123,6 +131,8 @@ SUPPORTED_BOARDS = {
|
||||
padding_address=0x30000,
|
||||
app_ldscript="nrf52840_layout.ld",
|
||||
app_address=0x40000,
|
||||
storage_address=0xC0000,
|
||||
storage_size=0x40000,
|
||||
pyocd_target="nrf52840",
|
||||
openocd_board="nordic_nrf52840_dongle.cfg",
|
||||
openocd_options=[],
|
||||
@@ -140,6 +150,8 @@ SUPPORTED_BOARDS = {
|
||||
padding_address=0x30000,
|
||||
app_ldscript="nrf52840_layout.ld",
|
||||
app_address=0x40000,
|
||||
storage_address=0xC0000,
|
||||
storage_size=0x40000,
|
||||
pyocd_target="nrf52840",
|
||||
openocd_board="nordic_nrf52840_dongle.cfg",
|
||||
openocd_options=[],
|
||||
@@ -493,6 +505,30 @@ class OpenSKInstaller:
|
||||
info(("A non-critical error occurred while erasing "
|
||||
"apps: {}".format(str(e))))
|
||||
|
||||
def clear_storage(self):
|
||||
if self.args.programmer == "none":
|
||||
return 0
|
||||
info("Erasing the persistent storage")
|
||||
board_props = SUPPORTED_BOARDS[self.args.board]
|
||||
# Use tockloader if possible
|
||||
if self.args.programmer in ("jlink", "openocd"):
|
||||
storage = bytes([0xFF] * board_props.storage_size)
|
||||
tock = loader.TockLoader(self.tockloader_default_args)
|
||||
tock.open()
|
||||
try:
|
||||
tock.flash_binary(storage, board_props.storage_address)
|
||||
except TockLoaderException as e:
|
||||
fatal("Couldn't erase the persistent storage: {}".format(str(e)))
|
||||
return 0
|
||||
if self.args.programmer == "pyocd":
|
||||
self.checked_command([
|
||||
"pyocd", "erase", "--target={}".format(board_props.pyocd_target),
|
||||
"--sector", "{}+{}".format(board_props.storage_address,
|
||||
board_props.storage_size)
|
||||
])
|
||||
return 0
|
||||
fatal("Programmer {} is not supported.".format(self.args.programmer))
|
||||
|
||||
# pylint: disable=protected-access
|
||||
def verify_flashed_app(self, expected_app):
|
||||
if self.args.programmer not in ("jlink", "openocd"):
|
||||
@@ -594,7 +630,8 @@ class OpenSKInstaller:
|
||||
self.check_prerequisites()
|
||||
self.update_rustc_if_needed()
|
||||
|
||||
if not self.args.tockos and not self.args.application:
|
||||
if not (self.args.tockos or self.args.application or
|
||||
self.args.clear_storage):
|
||||
info("Nothing to do.")
|
||||
return 0
|
||||
|
||||
@@ -610,6 +647,10 @@ class OpenSKInstaller:
|
||||
else:
|
||||
self.build_example()
|
||||
|
||||
# Erase persistent storage
|
||||
if self.args.clear_storage:
|
||||
self.clear_storage()
|
||||
|
||||
# Flashing
|
||||
board_props = SUPPORTED_BOARDS[self.args.board]
|
||||
if self.args.programmer in ("jlink", "openocd"):
|
||||
@@ -717,6 +758,14 @@ if __name__ == "__main__":
|
||||
help=("When installing an application, previously installed "
|
||||
"applications won't be erased from the board."),
|
||||
)
|
||||
main_parser.add_argument(
|
||||
"--clear-storage",
|
||||
action="store_true",
|
||||
default=False,
|
||||
dest="clear_storage",
|
||||
help=("Erases the persistent storage when installing an application. "
|
||||
"All stored data will be permanently lost."),
|
||||
)
|
||||
main_parser.add_argument(
|
||||
"--programmer",
|
||||
metavar="METHOD",
|
||||
|
||||
12
layout.ld
12
layout.ld
@@ -71,18 +71,6 @@ SECTIONS {
|
||||
. = ALIGN(32);
|
||||
} > FLASH =0xFF
|
||||
|
||||
/* App state section. Used for persistent app data.
|
||||
* We put this first because this is what libtock-c does. They provide the
|
||||
* following explanation: if the app code changes but the persistent data
|
||||
* doesn't, the app_state can be preserved.
|
||||
*/
|
||||
.wfr.app_state :
|
||||
{
|
||||
. = ALIGN(4K);
|
||||
KEEP (*(.app_state))
|
||||
. = ALIGN(4K);
|
||||
} > FLASH =0xFFFFFFFF
|
||||
|
||||
/* Text section, Code! */
|
||||
.text :
|
||||
{
|
||||
|
||||
@@ -3,8 +3,10 @@
|
||||
*/
|
||||
|
||||
MEMORY {
|
||||
/* The application region is 64 bytes (0x40) */
|
||||
FLASH (rx) : ORIGIN = 0x00040040, LENGTH = 0x000BFFC0
|
||||
/* The application region is 64 bytes (0x40) and we reserve 0x40000 at the end
|
||||
* of the flash for the persistent storage.
|
||||
*/
|
||||
FLASH (rx) : ORIGIN = 0x00040040, LENGTH = 0x0007FFC0
|
||||
SRAM (rwx) : ORIGIN = 0x20020000, LENGTH = 128K
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,33 @@
|
||||
diff --git a/boards/nordic/nrf52840dk/src/main.rs b/boards/nordic/nrf52840dk/src/main.rs
|
||||
index 44a6c1cc..2ebc2868 100644
|
||||
--- a/boards/nordic/nrf52840dk/src/main.rs
|
||||
+++ b/boards/nordic/nrf52840dk/src/main.rs
|
||||
@@ -117,6 +117,11 @@ static mut APP_MEMORY: [u8; 0x3C000] = [0; 0x3C000];
|
||||
static mut PROCESSES: [Option<&'static dyn kernel::procs::ProcessType>; NUM_PROCS] =
|
||||
[None, None, None, None, None, None, None, None];
|
||||
|
||||
+static mut STORAGE_LOCATIONS: [kernel::StorageLocation; 1] = [kernel::StorageLocation {
|
||||
+ address: 0xC0000,
|
||||
+ size: 0x40000,
|
||||
+}];
|
||||
+
|
||||
static mut CHIP: Option<&'static nrf52840::chip::Chip> = None;
|
||||
|
||||
/// Dummy buffer that causes the linker to reserve enough space for the stack.
|
||||
@@ -146,7 +151,10 @@ pub unsafe fn reset_handler() {
|
||||
UartChannel::Pins(UartPins::new(UART_RTS, UART_TXD, UART_CTS, UART_RXD))
|
||||
};
|
||||
|
||||
- let board_kernel = static_init!(kernel::Kernel, kernel::Kernel::new(&PROCESSES));
|
||||
+ let board_kernel = static_init!(
|
||||
+ kernel::Kernel,
|
||||
+ kernel::Kernel::new_with_storage(&PROCESSES, &STORAGE_LOCATIONS)
|
||||
+ );
|
||||
let gpio = components::gpio::GpioComponent::new(board_kernel).finalize(
|
||||
components::gpio_component_helper!(
|
||||
&nrf52840::gpio::PORT[Pin::P1_01],
|
||||
diff --git a/boards/nordic/nrf52dk_base/src/lib.rs b/boards/nordic/nrf52dk_base/src/lib.rs
|
||||
index fe493727..105f7120 100644
|
||||
index 5dd4328e..a117d35f 100644
|
||||
--- a/boards/nordic/nrf52dk_base/src/lib.rs
|
||||
+++ b/boards/nordic/nrf52dk_base/src/lib.rs
|
||||
@@ -104,6 +104,7 @@ pub struct Platform {
|
||||
@@ -10,7 +38,7 @@ index fe493727..105f7120 100644
|
||||
}
|
||||
|
||||
impl kernel::Platform for Platform {
|
||||
@@ -128,6 +129,7 @@ impl kernel::Platform for Platform {
|
||||
@@ -128,10 +129,30 @@ impl kernel::Platform for Platform {
|
||||
capsules::nonvolatile_storage_driver::DRIVER_NUM => {
|
||||
f(self.nonvolatile_storage.map_or(None, |nv| Some(nv)))
|
||||
}
|
||||
@@ -18,7 +46,30 @@ index fe493727..105f7120 100644
|
||||
kernel::ipc::DRIVER_NUM => f(Some(&self.ipc)),
|
||||
_ => f(None),
|
||||
}
|
||||
@@ -405,6 +407,14 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
}
|
||||
+
|
||||
+ fn filter_syscall(
|
||||
+ &self,
|
||||
+ process: &dyn kernel::procs::ProcessType,
|
||||
+ syscall: &kernel::syscall::Syscall,
|
||||
+ ) -> Result<(), kernel::ReturnCode> {
|
||||
+ use kernel::syscall::Syscall;
|
||||
+ match *syscall {
|
||||
+ Syscall::COMMAND {
|
||||
+ driver_number: nrf52::nvmc::DRIVER_NUM,
|
||||
+ subdriver_number: cmd,
|
||||
+ arg0: ptr,
|
||||
+ arg1: len,
|
||||
+ } if (cmd == 2 || cmd == 3) && !process.fits_in_storage_location(ptr, len) => {
|
||||
+ Err(kernel::ReturnCode::EINVAL)
|
||||
+ }
|
||||
+ _ => Ok(()),
|
||||
+ }
|
||||
+ }
|
||||
}
|
||||
|
||||
/// Generic function for starting an nrf52dk board.
|
||||
@@ -405,6 +426,14 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
);
|
||||
nrf52::acomp::ACOMP.set_client(analog_comparator);
|
||||
|
||||
@@ -26,14 +77,14 @@ index fe493727..105f7120 100644
|
||||
+ nrf52::nvmc::SyscallDriver,
|
||||
+ nrf52::nvmc::SyscallDriver::new(
|
||||
+ &nrf52::nvmc::NVMC,
|
||||
+ board_kernel.create_grant(&memory_allocation_capability)
|
||||
+ board_kernel.create_grant(&memory_allocation_capability),
|
||||
+ )
|
||||
+ );
|
||||
+
|
||||
// Start all of the clocks. Low power operation will require a better
|
||||
// approach than this.
|
||||
nrf52::clock::CLOCK.low_stop();
|
||||
@@ -439,6 +449,7 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
@@ -431,6 +460,7 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
analog_comparator: analog_comparator,
|
||||
nonvolatile_storage: nonvolatile_storage,
|
||||
ipc: kernel::ipc::IPC::new(board_kernel, &memory_allocation_capability),
|
||||
@@ -42,7 +93,7 @@ index fe493727..105f7120 100644
|
||||
|
||||
platform.pconsole.start();
|
||||
diff --git a/chips/nrf52/src/nvmc.rs b/chips/nrf52/src/nvmc.rs
|
||||
index 5abd2d84..5a726fdb 100644
|
||||
index 60fc2da8..ca41b899 100644
|
||||
--- a/chips/nrf52/src/nvmc.rs
|
||||
+++ b/chips/nrf52/src/nvmc.rs
|
||||
@@ -3,6 +3,7 @@
|
||||
@@ -97,7 +148,7 @@ index 5abd2d84..5a726fdb 100644
|
||||
while !self.is_ready() {}
|
||||
}
|
||||
|
||||
@@ -314,7 +326,7 @@ impl Nvmc {
|
||||
@@ -322,7 +334,7 @@ impl Nvmc {
|
||||
// Put the NVMC in write mode.
|
||||
regs.config.write(Configuration::WEN::Wen);
|
||||
|
||||
@@ -106,7 +157,7 @@ index 5abd2d84..5a726fdb 100644
|
||||
let word: u32 = (data[i + 0] as u32) << 0
|
||||
| (data[i + 1] as u32) << 8
|
||||
| (data[i + 2] as u32) << 16
|
||||
@@ -374,3 +386,178 @@ impl hil::flash::Flash for Nvmc {
|
||||
@@ -390,3 +402,180 @@ impl hil::flash::Flash for Nvmc {
|
||||
self.erase_page(page_number)
|
||||
}
|
||||
}
|
||||
@@ -138,12 +189,12 @@ index 5abd2d84..5a726fdb 100644
|
||||
+/// - COMMAND(1, 2): Get the maximum number of word writes between page erasures (always 2).
|
||||
+/// - COMMAND(1, 3): Get the maximum number page erasures in the lifetime of the flash (always
|
||||
+/// 10000).
|
||||
+/// - COMMAND(2, ptr): Write the allow slice to the flash region starting at `ptr`.
|
||||
+/// - COMMAND(2, ptr, len): Write the allow slice to the flash region starting at `ptr`.
|
||||
+/// - `ptr` must be word-aligned.
|
||||
+/// - The allow slice length must be word aligned.
|
||||
+/// - The region starting at `ptr` of the same length as the allow slice must be in a writeable
|
||||
+/// flash region.
|
||||
+/// - COMMAND(3, ptr): Erase a page.
|
||||
+/// - COMMAND(3, ptr, len): Erase a page.
|
||||
+/// - `ptr` must be page-aligned.
|
||||
+/// - The page starting at `ptr` must be in a writeable flash region.
|
||||
+/// - ALLOW(0): The allow slice for COMMAND(2).
|
||||
@@ -189,11 +240,8 @@ index 5abd2d84..5a726fdb 100644
|
||||
+ /// Fails with `EINVAL` if any of the following conditions does not hold:
|
||||
+ /// - `ptr` must be word-aligned.
|
||||
+ /// - `slice.len()` must be word-aligned.
|
||||
+ /// - The slice starting at `ptr` of length `slice.len()` must fit in a writeable flash region.
|
||||
+ fn write_slice(&self, appid: AppId, ptr: usize, slice: &[u8]) -> ReturnCode {
|
||||
+ if !appid.in_writeable_flash_region(ptr, slice.len()) {
|
||||
+ return ReturnCode::EINVAL;
|
||||
+ }
|
||||
+ /// - The slice starting at `ptr` of length `slice.len()` must fit in the storage.
|
||||
+ fn write_slice(&self, ptr: usize, slice: &[u8]) -> ReturnCode {
|
||||
+ if ptr & WORD_MASK != 0 || slice.len() & WORD_MASK != 0 {
|
||||
+ return ReturnCode::EINVAL;
|
||||
+ }
|
||||
@@ -217,11 +265,8 @@ index 5abd2d84..5a726fdb 100644
|
||||
+ ///
|
||||
+ /// Fails with `EINVAL` if any of the following conditions does not hold:
|
||||
+ /// - `ptr` must be page-aligned.
|
||||
+ /// - The slice starting at `ptr` of length `PAGE_SIZE` must fit in a writeable flash region.
|
||||
+ fn erase_page(&self, appid: AppId, ptr: usize) -> ReturnCode {
|
||||
+ if !appid.in_writeable_flash_region(ptr, PAGE_SIZE) {
|
||||
+ return ReturnCode::EINVAL;
|
||||
+ }
|
||||
+ /// - The slice starting at `ptr` of length `PAGE_SIZE` must fit in the storage.
|
||||
+ fn erase_page(&self, ptr: usize) -> ReturnCode {
|
||||
+ if ptr & PAGE_MASK != 0 {
|
||||
+ return ReturnCode::EINVAL;
|
||||
+ }
|
||||
@@ -236,32 +281,40 @@ index 5abd2d84..5a726fdb 100644
|
||||
+ ReturnCode::ENOSUPPORT
|
||||
+ }
|
||||
+
|
||||
+ fn command(&self, cmd: usize, arg: usize, _: usize, appid: AppId) -> ReturnCode {
|
||||
+ match (cmd, arg) {
|
||||
+ (0, _) => ReturnCode::SUCCESS,
|
||||
+ fn command(&self, cmd: usize, arg0: usize, arg1: usize, appid: AppId) -> ReturnCode {
|
||||
+ match (cmd, arg0, arg1) {
|
||||
+ (0, _, _) => ReturnCode::SUCCESS,
|
||||
+
|
||||
+ (1, 0) => ReturnCode::SuccessWithValue { value: WORD_SIZE },
|
||||
+ (1, 1) => ReturnCode::SuccessWithValue { value: PAGE_SIZE },
|
||||
+ (1, 2) => ReturnCode::SuccessWithValue {
|
||||
+ (1, 0, _) => ReturnCode::SuccessWithValue { value: WORD_SIZE },
|
||||
+ (1, 1, _) => ReturnCode::SuccessWithValue { value: PAGE_SIZE },
|
||||
+ (1, 2, _) => ReturnCode::SuccessWithValue {
|
||||
+ value: MAX_WORD_WRITES,
|
||||
+ },
|
||||
+ (1, 3) => ReturnCode::SuccessWithValue {
|
||||
+ (1, 3, _) => ReturnCode::SuccessWithValue {
|
||||
+ value: MAX_PAGE_ERASES,
|
||||
+ },
|
||||
+ (1, _) => ReturnCode::EINVAL,
|
||||
+ (1, _, _) => ReturnCode::EINVAL,
|
||||
+
|
||||
+ (2, ptr) => self
|
||||
+ (2, ptr, len) => self
|
||||
+ .apps
|
||||
+ .enter(appid, |app, _| {
|
||||
+ let slice = match app.slice.take() {
|
||||
+ None => return ReturnCode::EINVAL,
|
||||
+ Some(slice) => slice,
|
||||
+ };
|
||||
+ self.write_slice(appid, ptr, slice.as_ref())
|
||||
+ if len != slice.len() {
|
||||
+ return ReturnCode::EINVAL;
|
||||
+ }
|
||||
+ self.write_slice(ptr, slice.as_ref())
|
||||
+ })
|
||||
+ .unwrap_or_else(|err| err.into()),
|
||||
+
|
||||
+ (3, ptr) => self.erase_page(appid, ptr),
|
||||
+ (3, ptr, len) => {
|
||||
+ if len != PAGE_SIZE {
|
||||
+ return ReturnCode::EINVAL;
|
||||
+ }
|
||||
+ self.erase_page(ptr)
|
||||
+ }
|
||||
+
|
||||
+ _ => ReturnCode::ENOSUPPORT,
|
||||
+ }
|
||||
@@ -285,39 +338,187 @@ index 5abd2d84..5a726fdb 100644
|
||||
+ }
|
||||
+ }
|
||||
+}
|
||||
diff --git a/kernel/src/callback.rs b/kernel/src/callback.rs
|
||||
index c812e0bf..bd1613b3 100644
|
||||
--- a/kernel/src/callback.rs
|
||||
+++ b/kernel/src/callback.rs
|
||||
@@ -130,6 +130,31 @@ impl AppId {
|
||||
(start, end)
|
||||
})
|
||||
}
|
||||
+
|
||||
+ pub fn in_writeable_flash_region(&self, ptr: usize, len: usize) -> bool {
|
||||
+ self.kernel.process_map_or(false, *self, |process| {
|
||||
+ let ptr = match ptr.checked_sub(process.flash_start() as usize) {
|
||||
+ None => return false,
|
||||
+ Some(ptr) => ptr,
|
||||
+ };
|
||||
+ (0..process.number_writeable_flash_regions()).any(|i| {
|
||||
+ let (region_ptr, region_len) = process.get_writeable_flash_region(i);
|
||||
+ let region_ptr = region_ptr as usize;
|
||||
+ let region_len = region_len as usize;
|
||||
+ // We want to check the 2 following inequalities:
|
||||
+ // (1) `region_ptr <= ptr`
|
||||
+ // (2) `ptr + len <= region_ptr + region_len`
|
||||
+ // However, the second one may overflow written as is. We introduce a third
|
||||
+ // inequality to solve this issue:
|
||||
+ // (3) `len <= region_len`
|
||||
+ // Using this third inequality, we can rewrite the second one as:
|
||||
+ // (4) `ptr - region_ptr <= region_len - len`
|
||||
+ // This fourth inequality is equivalent to the second one but doesn't overflow when
|
||||
+ // the first and third inequalities hold.
|
||||
+ region_ptr <= ptr && len <= region_len && ptr - region_ptr <= region_len - len
|
||||
+ })
|
||||
+ })
|
||||
+ }
|
||||
diff --git a/kernel/src/lib.rs b/kernel/src/lib.rs
|
||||
index ebe8052a..a6dcd278 100644
|
||||
--- a/kernel/src/lib.rs
|
||||
+++ b/kernel/src/lib.rs
|
||||
@@ -47,7 +47,7 @@ pub use crate::platform::systick::SysTick;
|
||||
pub use crate::platform::{mpu, Chip, Platform};
|
||||
pub use crate::platform::{ClockInterface, NoClockControl, NO_CLOCK_CONTROL};
|
||||
pub use crate::returncode::ReturnCode;
|
||||
-pub use crate::sched::Kernel;
|
||||
+pub use crate::sched::{Kernel, StorageLocation};
|
||||
|
||||
// Export only select items from the process module. To remove the name conflict
|
||||
// this cannot be called `process`, so we use a shortened version. These
|
||||
diff --git a/kernel/src/memop.rs b/kernel/src/memop.rs
|
||||
index 7537d2b4..61870ccd 100644
|
||||
--- a/kernel/src/memop.rs
|
||||
+++ b/kernel/src/memop.rs
|
||||
@@ -108,6 +108,25 @@ crate fn memop(process: &dyn ProcessType, op_type: usize, r1: usize) -> ReturnCo
|
||||
ReturnCode::SUCCESS
|
||||
}
|
||||
|
||||
/// Type to uniquely identify a callback subscription across all drivers.
|
||||
+ // Op Type 12: Number of storage locations.
|
||||
+ 12 => ReturnCode::SuccessWithValue { value: process.number_storage_locations() },
|
||||
+
|
||||
+ // Op Type 13: The start address of the storage location indexed by r1.
|
||||
+ 13 => {
|
||||
+ match process.get_storage_location(r1) {
|
||||
+ None => ReturnCode::FAIL,
|
||||
+ Some(x) => ReturnCode::SuccessWithValue { value: x.address }
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
+ // Op Type 14: The size of the storage location indexed by r1.
|
||||
+ 14 => {
|
||||
+ match process.get_storage_location(r1) {
|
||||
+ None => ReturnCode::FAIL,
|
||||
+ Some(x) => ReturnCode::SuccessWithValue { value: x.size }
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
_ => ReturnCode::ENOSUPPORT,
|
||||
}
|
||||
}
|
||||
diff --git a/kernel/src/process.rs b/kernel/src/process.rs
|
||||
index eb00f274..41243c8e 100644
|
||||
--- a/kernel/src/process.rs
|
||||
+++ b/kernel/src/process.rs
|
||||
@@ -281,6 +281,15 @@ pub trait ProcessType {
|
||||
/// writeable flash region.
|
||||
fn get_writeable_flash_region(&self, region_index: usize) -> (u32, u32);
|
||||
|
||||
+ /// How many storage locations are defined for this process.
|
||||
+ fn number_storage_locations(&self) -> usize;
|
||||
+
|
||||
+ /// Get the i-th storage location.
|
||||
+ fn get_storage_location(&self, index: usize) -> Option<&crate::StorageLocation>;
|
||||
+
|
||||
+ /// Whether a slice fits in a storage location.
|
||||
+ fn fits_in_storage_location(&self, ptr: usize, len: usize) -> bool;
|
||||
+
|
||||
/// Debug function to update the kernel on where the stack starts for this
|
||||
/// process. Processes are not required to call this through the memop
|
||||
/// system call, but it aids in debugging the process.
|
||||
@@ -999,6 +1008,32 @@ impl<C: Chip> ProcessType for Process<'a, C> {
|
||||
self.header.get_writeable_flash_region(region_index)
|
||||
}
|
||||
|
||||
+ fn number_storage_locations(&self) -> usize {
|
||||
+ self.kernel.storage_locations().len()
|
||||
+ }
|
||||
+
|
||||
+ fn get_storage_location(&self, index: usize) -> Option<&crate::StorageLocation> {
|
||||
+ self.kernel.storage_locations().get(index)
|
||||
+ }
|
||||
+
|
||||
+ fn fits_in_storage_location(&self, ptr: usize, len: usize) -> bool {
|
||||
+ self.kernel.storage_locations().iter().any(|storage_location| {
|
||||
+ let storage_ptr = storage_location.address;
|
||||
+ let storage_len = storage_location.size;
|
||||
+ // We want to check the 2 following inequalities:
|
||||
+ // (1) `storage_ptr <= ptr`
|
||||
+ // (2) `ptr + len <= storage_ptr + storage_len`
|
||||
+ // However, the second one may overflow written as is. We introduce a third
|
||||
+ // inequality to solve this issue:
|
||||
+ // (3) `len <= storage_len`
|
||||
+ // Using this third inequality, we can rewrite the second one as:
|
||||
+ // (4) `ptr - storage_ptr <= storage_len - len`
|
||||
+ // This fourth inequality is equivalent to the second one but doesn't overflow when
|
||||
+ // the first and third inequalities hold.
|
||||
+ storage_ptr <= ptr && len <= storage_len && ptr - storage_ptr <= storage_len - len
|
||||
+ })
|
||||
+ }
|
||||
+
|
||||
fn update_stack_start_pointer(&self, stack_pointer: *const u8) {
|
||||
if stack_pointer >= self.mem_start() && stack_pointer < self.mem_end() {
|
||||
self.debug.map(|debug| {
|
||||
@@ -1604,6 +1639,33 @@ impl<C: 'static + Chip> Process<'a, C> {
|
||||
return Ok((None, 0));
|
||||
}
|
||||
|
||||
+ // Allocate MPU region for the storage locations. The storage locations are currently
|
||||
+ // readable by all processes due to lack of stable app id.
|
||||
+ for storage_location in kernel.storage_locations() {
|
||||
+ if chip
|
||||
+ .mpu()
|
||||
+ .allocate_region(
|
||||
+ storage_location.address as *const u8,
|
||||
+ storage_location.size,
|
||||
+ storage_location.size,
|
||||
+ mpu::Permissions::ReadOnly,
|
||||
+ &mut mpu_config,
|
||||
+ )
|
||||
+ .is_some()
|
||||
+ {
|
||||
+ continue;
|
||||
+ }
|
||||
+ if config::CONFIG.debug_load_processes {
|
||||
+ debug!(
|
||||
+ "[!] flash=[{:#010X}:{:#010X}] process={:?} - couldn't allocate flash region",
|
||||
+ storage_location.address,
|
||||
+ storage_location.address + storage_location.size,
|
||||
+ process_name
|
||||
+ );
|
||||
+ }
|
||||
+ return Ok((None, 0));
|
||||
+ }
|
||||
+
|
||||
// Determine how much space we need in the application's
|
||||
// memory space just for kernel and grant state. We need to make
|
||||
// sure we allocate enough memory just for that.
|
||||
diff --git a/kernel/src/sched.rs b/kernel/src/sched.rs
|
||||
index fbd68319..43cce76f 100644
|
||||
--- a/kernel/src/sched.rs
|
||||
+++ b/kernel/src/sched.rs
|
||||
@@ -24,6 +24,12 @@ const KERNEL_TICK_DURATION_US: u32 = 10000;
|
||||
/// Skip re-scheduling a process if its quanta is nearly exhausted
|
||||
const MIN_QUANTA_THRESHOLD_US: u32 = 500;
|
||||
|
||||
+/// Represents a storage location in flash.
|
||||
+pub struct StorageLocation {
|
||||
+ pub address: usize,
|
||||
+ pub size: usize,
|
||||
+}
|
||||
+
|
||||
/// Main object for the kernel. Each board will need to create one.
|
||||
pub struct Kernel {
|
||||
/// How many "to-do" items exist at any given time. These include
|
||||
@@ -33,6 +39,9 @@ pub struct Kernel {
|
||||
/// This holds a pointer to the static array of Process pointers.
|
||||
processes: &'static [Option<&'static dyn process::ProcessType>],
|
||||
|
||||
+ /// List of storage locations.
|
||||
+ storage_locations: &'static [StorageLocation],
|
||||
+
|
||||
/// A counter which keeps track of how many process identifiers have been
|
||||
/// created. This is used to create new unique identifiers for processes.
|
||||
process_identifier_max: Cell<usize>,
|
||||
@@ -51,9 +60,17 @@ pub struct Kernel {
|
||||
|
||||
impl Kernel {
|
||||
pub fn new(processes: &'static [Option<&'static dyn process::ProcessType>]) -> Kernel {
|
||||
+ Kernel::new_with_storage(processes, &[])
|
||||
+ }
|
||||
+
|
||||
+ pub fn new_with_storage(
|
||||
+ processes: &'static [Option<&'static dyn process::ProcessType>],
|
||||
+ storage_locations: &'static [StorageLocation],
|
||||
+ ) -> Kernel {
|
||||
Kernel {
|
||||
work: Cell::new(0),
|
||||
processes: processes,
|
||||
+ storage_locations: storage_locations,
|
||||
process_identifier_max: Cell::new(0),
|
||||
grant_counter: Cell::new(0),
|
||||
grants_finalized: Cell::new(false),
|
||||
@@ -599,4 +616,8 @@ impl Kernel {
|
||||
}
|
||||
systick.reset();
|
||||
}
|
||||
+
|
||||
+ pub fn storage_locations(&self) -> &'static [StorageLocation] {
|
||||
+ self.storage_locations
|
||||
+ }
|
||||
}
|
||||
|
||||
@@ -14,7 +14,7 @@ diff --git a/boards/nordic/nrf52840dk/src/main.rs b/boards/nordic/nrf52840dk/src
|
||||
index 127c4f2f..a5847805 100644
|
||||
--- a/boards/nordic/nrf52840dk/src/main.rs
|
||||
+++ b/boards/nordic/nrf52840dk/src/main.rs
|
||||
@@ -236,6 +236,7 @@ pub unsafe fn reset_handler() {
|
||||
@@ -244,6 +244,7 @@ pub unsafe fn reset_handler() {
|
||||
FAULT_RESPONSE,
|
||||
nrf52840::uicr::Regulator0Output::DEFAULT,
|
||||
false,
|
||||
@@ -62,7 +62,7 @@ index 105f7120..535e5cd8 100644
|
||||
kernel::ipc::DRIVER_NUM => f(Some(&self.ipc)),
|
||||
_ => f(None),
|
||||
}
|
||||
@@ -157,6 +167,7 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
@@ -176,6 +186,7 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
app_fault_response: kernel::procs::FaultResponse,
|
||||
reg_vout: Regulator0Output,
|
||||
nfc_as_gpios: bool,
|
||||
@@ -70,7 +70,7 @@ index 105f7120..535e5cd8 100644
|
||||
chip: &'static nrf52::chip::NRF52<I>,
|
||||
) {
|
||||
// Make non-volatile memory writable and activate the reset button
|
||||
@@ -415,6 +426,44 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
@@ -434,6 +445,44 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
)
|
||||
);
|
||||
|
||||
@@ -115,7 +115,7 @@ index 105f7120..535e5cd8 100644
|
||||
// Start all of the clocks. Low power operation will require a better
|
||||
// approach than this.
|
||||
nrf52::clock::CLOCK.low_stop();
|
||||
@@ -447,6 +496,7 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
@@ -458,6 +507,7 @@ pub unsafe fn setup_board<I: nrf52::interrupt_service::InterruptService>(
|
||||
temp: temp,
|
||||
alarm: alarm,
|
||||
analog_comparator: analog_comparator,
|
||||
|
||||
@@ -1,9 +1,9 @@
|
||||
b113945b033eb229e3821542f5889769e5fd2e2ae3cb85c6d13a4e05a44a9866 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840dk.bin
|
||||
13d923f9efad028c9fa5d14920f940ad0108b290088a84ca82f08a3e09a4e569 target/nrf52840dk_merged.hex
|
||||
346016903ddf244a239162b7c703aafe7ec70a115175e2204892e874f930f6be third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle.bin
|
||||
f1f0de2e54c0dc88fd503271322a985f9c769fc26a72e651f84b834cd623c09c target/nrf52840_dongle_merged.hex
|
||||
adcc4caaea86f7b0d54111d3080802e7389a4e69a8f17945d026ee732ea8daa4 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle_dfu.bin
|
||||
d080c9267370b4a69e64e6098391cded7d3532feaa123c6331b12608aacd0112 target/nrf52840_dongle_dfu_merged.hex
|
||||
97a7dbdb7c3caa345307d5ff7f7607dad5c2cdc523b43c68d3b741ddce318e92 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_mdk_dfu.bin
|
||||
5bdcfa69ff5e86cd8175e0d78912e54e803c284502e035416333a8da2eaa1616 target/nrf52840_mdk_dfu_merged.hex
|
||||
c68c723d21264b54a7167d999ad18294d10b05d48412595ccbe596865e166e5d target/tab/ctap2.tab
|
||||
1003863864e06553e730eec6df4bf8d30c99f697ef9380efdc35eba679b4db78 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840dk.bin
|
||||
84d97929d7592d89c7f321ffccafa4148263607e28918e53d9286be8ca55c209 target/nrf52840dk_merged.hex
|
||||
88f00a5e1dae6ab3f7571c254ac75f5f3e29ebea7f3ca46c16cfdc3708e804fc third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle.bin
|
||||
02009688b6ef8583f78f9b94ba8af65dfa3749b20516972cdb0d8ea7ac409268 target/nrf52840_dongle_merged.hex
|
||||
1bc69b48a2c48da55db8b322902e1fe3f2e095c0dd8517db28837d86e0addc85 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle_dfu.bin
|
||||
a24e7459b93eea1fc7557ecd9e4271a2ed729425990d6198be6791f364b1384b target/nrf52840_dongle_dfu_merged.hex
|
||||
f38ee31d3a09e7e11848e78b5318f95517b6dcd076afcb37e6e3d3e5e9995cc7 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_mdk_dfu.bin
|
||||
5315b77b997952de10e239289e54b44c24105646f2411074332bb46f4b686ae6 target/nrf52840_mdk_dfu_merged.hex
|
||||
9012744b93f8bac122fa18916cf8c22d1b8f729a284366802ed222bbc985e3f0 target/tab/ctap2.tab
|
||||
|
||||
@@ -1,9 +1,9 @@
|
||||
921d6fc31f7235456dd41abc7e634a37ee87b5016b80c979d20ac5d3fcfc6b6b third_party/tock/target/thumbv7em-none-eabi/release/nrf52840dk.bin
|
||||
e8e6b802722bf41eb5054ec94e87332fa996e954aad7d02db09beb798d7e381c target/nrf52840dk_merged.hex
|
||||
aab5bdc406b1e874b83872c9358d310070b3ce948ec0e20c054fb923ec879249 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle.bin
|
||||
aab3193acc08bc38c4219968da5e9d99f6f73b78fe91d74e8cbc3b94166c7dd3 target/nrf52840_dongle_merged.hex
|
||||
26b8513e76058e86a01a4b408411ce429834eb2843993eb1671f2487b160bc9a third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle_dfu.bin
|
||||
99a71cc0622f7cc0abdce686ff6581ec8b9fee6075b7cd771a68c08717e4198f target/nrf52840_dongle_dfu_merged.hex
|
||||
7cc558a66505e8cf8170aab50e6ddcb28f349fd7ced35ce841ccec33a533bea1 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_mdk_dfu.bin
|
||||
810f3ef6353177742bba06618bdc865efd819e97cbed605769f12f9d66831671 target/nrf52840_mdk_dfu_merged.hex
|
||||
54e05927ab650c2ccf10cde165e992e48869888609cc6e8b4429a5c7a420f145 target/tab/ctap2.tab
|
||||
c182bb4902fff51b2f56810fc2a27df3646cd66ba21359162354d53445623ab8 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840dk.bin
|
||||
805ca30b898b41a091cc136ab9b78b4e566e10c5469902d18c326c132ed4193e target/nrf52840dk_merged.hex
|
||||
0a9929ba8fa57e8a502a49fc7c53177397202e1b11f4c7c3cb6ed68b2b99dd46 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle.bin
|
||||
960dce1eb78f34a3c4cfdb543314da8ce211dced41f34da053669c8773926e1d target/nrf52840_dongle_merged.hex
|
||||
cca9086c9149c607589b23ffa599a5e4c26db7c20bd3700b79528bd3a5df991d third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_dongle_dfu.bin
|
||||
1755746cb3a28162a0bbd0b994332fa9ffaedca684803dfd9ef584040cea73ca target/nrf52840_dongle_dfu_merged.hex
|
||||
8857488ba6a69e366f0da229bbfc012a2ad291d3a88d9494247d600c10bb19b7 third_party/tock/target/thumbv7em-none-eabi/release/nrf52840_mdk_dfu.bin
|
||||
04b94cd65bf83fa12030c4deaa831e0251f5f8b9684ec972d03a46e8f32e98b4 target/nrf52840_mdk_dfu_merged.hex
|
||||
69dd51b947013b77e3577784384c935ed76930d1fb3ba46e9a5b6b5d71941057 target/tab/ctap2.tab
|
||||
|
||||
@@ -133,17 +133,6 @@ pub struct PersistentStore {
|
||||
store: embedded_flash::Store<Storage, Config>,
|
||||
}
|
||||
|
||||
#[cfg(feature = "ram_storage")]
|
||||
const PAGE_SIZE: usize = 0x100;
|
||||
#[cfg(not(feature = "ram_storage"))]
|
||||
const PAGE_SIZE: usize = 0x1000;
|
||||
|
||||
const STORE_SIZE: usize = NUM_PAGES * PAGE_SIZE;
|
||||
|
||||
#[cfg(not(any(test, feature = "ram_storage")))]
|
||||
#[link_section = ".app_state"]
|
||||
static STORE: [u8; STORE_SIZE] = [0xff; STORE_SIZE];
|
||||
|
||||
impl PersistentStore {
|
||||
/// Gives access to the persistent store.
|
||||
///
|
||||
@@ -164,19 +153,16 @@ impl PersistentStore {
|
||||
|
||||
#[cfg(not(any(test, feature = "ram_storage")))]
|
||||
fn new_prod_storage() -> Storage {
|
||||
let store = unsafe {
|
||||
// Safety: The store cannot alias because this function is called only once.
|
||||
core::slice::from_raw_parts_mut(STORE.as_ptr() as *mut u8, STORE_SIZE)
|
||||
};
|
||||
unsafe {
|
||||
// Safety: The store is in a writeable flash region.
|
||||
Storage::new(store).unwrap()
|
||||
}
|
||||
Storage::new(NUM_PAGES).unwrap()
|
||||
}
|
||||
|
||||
#[cfg(any(test, feature = "ram_storage"))]
|
||||
fn new_test_storage() -> Storage {
|
||||
let store = vec![0xff; STORE_SIZE].into_boxed_slice();
|
||||
#[cfg(not(test))]
|
||||
const PAGE_SIZE: usize = 0x100;
|
||||
#[cfg(test)]
|
||||
const PAGE_SIZE: usize = 0x1000;
|
||||
let store = vec![0xff; NUM_PAGES * PAGE_SIZE].into_boxed_slice();
|
||||
let options = embedded_flash::BufferOptions {
|
||||
word_size: 4,
|
||||
page_size: PAGE_SIZE,
|
||||
|
||||
@@ -13,6 +13,7 @@
|
||||
// limitations under the License.
|
||||
|
||||
use super::{Index, Storage, StorageError, StorageResult};
|
||||
use alloc::vec::Vec;
|
||||
use libtock::syscalls;
|
||||
|
||||
const DRIVER_NUMBER: usize = 0x50003;
|
||||
@@ -33,8 +34,23 @@ mod allow_nr {
|
||||
pub const WRITE_SLICE: usize = 0;
|
||||
}
|
||||
|
||||
fn get_info(nr: usize) -> StorageResult<usize> {
|
||||
let code = unsafe { syscalls::command(DRIVER_NUMBER, command_nr::GET_INFO, nr, 0) };
|
||||
mod memop_nr {
|
||||
pub const STORAGE_CNT: u32 = 12;
|
||||
pub const STORAGE_PTR: u32 = 13;
|
||||
pub const STORAGE_LEN: u32 = 14;
|
||||
}
|
||||
|
||||
fn get_info(nr: usize, arg: usize) -> StorageResult<usize> {
|
||||
let code = unsafe { syscalls::command(DRIVER_NUMBER, command_nr::GET_INFO, nr, arg) };
|
||||
if code < 0 {
|
||||
Err(StorageError::KernelError { code })
|
||||
} else {
|
||||
Ok(code as usize)
|
||||
}
|
||||
}
|
||||
|
||||
fn memop(nr: u32, arg: usize) -> StorageResult<usize> {
|
||||
let code = unsafe { syscalls::memop(nr, arg) };
|
||||
if code < 0 {
|
||||
Err(StorageError::KernelError { code })
|
||||
} else {
|
||||
@@ -45,70 +61,56 @@ fn get_info(nr: usize) -> StorageResult<usize> {
|
||||
pub struct SyscallStorage {
|
||||
word_size: usize,
|
||||
page_size: usize,
|
||||
num_pages: usize,
|
||||
max_word_writes: usize,
|
||||
max_page_erases: usize,
|
||||
storage: &'static mut [u8],
|
||||
storage_locations: Vec<&'static [u8]>,
|
||||
}
|
||||
|
||||
impl SyscallStorage {
|
||||
/// Provides access to the embedded flash if available.
|
||||
///
|
||||
/// # Safety
|
||||
///
|
||||
/// The `storage` must be in a writeable flash region.
|
||||
///
|
||||
/// # Errors
|
||||
///
|
||||
/// Returns `BadFlash` if any of the following conditions do not hold:
|
||||
/// - The word size is not a power of two.
|
||||
/// - The page size is not a power of two.
|
||||
/// - The page size is not a multiple of the word size.
|
||||
/// - The word size is a power of two.
|
||||
/// - The page size is a power of two.
|
||||
/// - The page size is a multiple of the word size.
|
||||
/// - The storage is page-aligned.
|
||||
///
|
||||
/// Returns `NotAligned` if any of the following conditions do not hold:
|
||||
/// - `storage` is page-aligned.
|
||||
/// - `storage.len()` is a multiple of the page size.
|
||||
///
|
||||
/// # Examples
|
||||
///
|
||||
/// ```rust
|
||||
/// # extern crate ctap2;
|
||||
/// # use ctap2::embedded_flash::SyscallStorage;
|
||||
/// # use ctap2::embedded_flash::StorageResult;
|
||||
/// # const NUM_PAGES: usize = 1;
|
||||
/// # const PAGE_SIZE: usize = 1;
|
||||
/// #[link_section = ".app_state"]
|
||||
/// static mut STORAGE: [u8; NUM_PAGES * PAGE_SIZE] = [0xff; NUM_PAGES * PAGE_SIZE];
|
||||
/// # fn foo() -> StorageResult<SyscallStorage> {
|
||||
/// // This is safe because this is the only use of `STORAGE` in the whole program and this is
|
||||
/// // called only once.
|
||||
/// unsafe { SyscallStorage::new(&mut STORAGE) }
|
||||
/// # }
|
||||
/// ```
|
||||
pub unsafe fn new(storage: &'static mut [u8]) -> StorageResult<SyscallStorage> {
|
||||
let word_size = get_info(command_nr::get_info_nr::WORD_SIZE)?;
|
||||
let page_size = get_info(command_nr::get_info_nr::PAGE_SIZE)?;
|
||||
let max_word_writes = get_info(command_nr::get_info_nr::MAX_WORD_WRITES)?;
|
||||
let max_page_erases = get_info(command_nr::get_info_nr::MAX_PAGE_ERASES)?;
|
||||
if !word_size.is_power_of_two() || !page_size.is_power_of_two() {
|
||||
return Err(StorageError::BadFlash);
|
||||
}
|
||||
let syscall = SyscallStorage {
|
||||
word_size,
|
||||
page_size,
|
||||
max_word_writes,
|
||||
max_page_erases,
|
||||
storage,
|
||||
/// Returns `OutOfBounds` the number of pages does not fit in the storage.
|
||||
pub fn new(mut num_pages: usize) -> StorageResult<SyscallStorage> {
|
||||
let mut syscall = SyscallStorage {
|
||||
word_size: get_info(command_nr::get_info_nr::WORD_SIZE, 0)?,
|
||||
page_size: get_info(command_nr::get_info_nr::PAGE_SIZE, 0)?,
|
||||
num_pages,
|
||||
max_word_writes: get_info(command_nr::get_info_nr::MAX_WORD_WRITES, 0)?,
|
||||
max_page_erases: get_info(command_nr::get_info_nr::MAX_PAGE_ERASES, 0)?,
|
||||
storage_locations: Vec::new(),
|
||||
};
|
||||
if !syscall.is_word_aligned(page_size) {
|
||||
if !syscall.word_size.is_power_of_two()
|
||||
|| !syscall.page_size.is_power_of_two()
|
||||
|| !syscall.is_word_aligned(syscall.page_size)
|
||||
{
|
||||
return Err(StorageError::BadFlash);
|
||||
}
|
||||
if syscall.is_page_aligned(syscall.storage.as_ptr() as usize)
|
||||
&& syscall.is_page_aligned(syscall.storage.len())
|
||||
{
|
||||
Ok(syscall)
|
||||
} else {
|
||||
Err(StorageError::NotAligned)
|
||||
for i in 0..memop(memop_nr::STORAGE_CNT, 0)? {
|
||||
let storage_ptr = memop(memop_nr::STORAGE_PTR, i)?;
|
||||
let max_storage_len = memop(memop_nr::STORAGE_LEN, i)?;
|
||||
if !syscall.is_page_aligned(storage_ptr) || !syscall.is_page_aligned(max_storage_len) {
|
||||
return Err(StorageError::BadFlash);
|
||||
}
|
||||
let storage_len = core::cmp::min(num_pages * syscall.page_size, max_storage_len);
|
||||
num_pages -= storage_len / syscall.page_size;
|
||||
syscall
|
||||
.storage_locations
|
||||
.push(unsafe { core::slice::from_raw_parts(storage_ptr as *mut u8, storage_len) });
|
||||
}
|
||||
if num_pages > 0 {
|
||||
// The storage locations don't have enough pages.
|
||||
return Err(StorageError::OutOfBounds);
|
||||
}
|
||||
Ok(syscall)
|
||||
}
|
||||
|
||||
fn is_word_aligned(&self, x: usize) -> bool {
|
||||
@@ -130,7 +132,7 @@ impl Storage for SyscallStorage {
|
||||
}
|
||||
|
||||
fn num_pages(&self) -> usize {
|
||||
self.storage.len() / self.page_size
|
||||
self.num_pages
|
||||
}
|
||||
|
||||
fn max_word_writes(&self) -> usize {
|
||||
@@ -142,14 +144,15 @@ impl Storage for SyscallStorage {
|
||||
}
|
||||
|
||||
fn read_slice(&self, index: Index, length: usize) -> StorageResult<&[u8]> {
|
||||
Ok(&self.storage[index.range(length, self)?])
|
||||
let start = index.range(length, self)?.start;
|
||||
find_slice(&self.storage_locations, start, length)
|
||||
}
|
||||
|
||||
fn write_slice(&mut self, index: Index, value: &[u8]) -> StorageResult<()> {
|
||||
if !self.is_word_aligned(index.byte) || !self.is_word_aligned(value.len()) {
|
||||
return Err(StorageError::NotAligned);
|
||||
}
|
||||
let range = index.range(value.len(), self)?;
|
||||
let ptr = self.read_slice(index, value.len())?.as_ptr() as usize;
|
||||
let code = unsafe {
|
||||
syscalls::allow_ptr(
|
||||
DRIVER_NUMBER,
|
||||
@@ -163,14 +166,8 @@ impl Storage for SyscallStorage {
|
||||
if code < 0 {
|
||||
return Err(StorageError::KernelError { code });
|
||||
}
|
||||
let code = unsafe {
|
||||
syscalls::command(
|
||||
DRIVER_NUMBER,
|
||||
command_nr::WRITE_SLICE,
|
||||
self.storage[range].as_ptr() as usize,
|
||||
0,
|
||||
)
|
||||
};
|
||||
let code =
|
||||
unsafe { syscalls::command(DRIVER_NUMBER, command_nr::WRITE_SLICE, ptr, value.len()) };
|
||||
if code < 0 {
|
||||
return Err(StorageError::KernelError { code });
|
||||
}
|
||||
@@ -178,18 +175,59 @@ impl Storage for SyscallStorage {
|
||||
}
|
||||
|
||||
fn erase_page(&mut self, page: usize) -> StorageResult<()> {
|
||||
let range = Index { page, byte: 0 }.range(self.page_size(), self)?;
|
||||
let code = unsafe {
|
||||
syscalls::command(
|
||||
DRIVER_NUMBER,
|
||||
command_nr::ERASE_PAGE,
|
||||
self.storage[range].as_ptr() as usize,
|
||||
0,
|
||||
)
|
||||
};
|
||||
let index = Index { page, byte: 0 };
|
||||
let length = self.page_size();
|
||||
let ptr = self.read_slice(index, length)?.as_ptr() as usize;
|
||||
let code = unsafe { syscalls::command(DRIVER_NUMBER, command_nr::ERASE_PAGE, ptr, length) };
|
||||
if code < 0 {
|
||||
return Err(StorageError::KernelError { code });
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
fn find_slice<'a>(
|
||||
slices: &'a [&'a [u8]],
|
||||
mut start: usize,
|
||||
length: usize,
|
||||
) -> StorageResult<&'a [u8]> {
|
||||
for slice in slices {
|
||||
if start >= slice.len() {
|
||||
start -= slice.len();
|
||||
continue;
|
||||
}
|
||||
if start + length > slice.len() {
|
||||
break;
|
||||
}
|
||||
return Ok(&slice[start..][..length]);
|
||||
}
|
||||
Err(StorageError::OutOfBounds)
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
|
||||
#[test]
|
||||
fn find_slice_ok() {
|
||||
assert_eq!(
|
||||
find_slice(&[&[1, 2, 3, 4]], 0, 4).ok(),
|
||||
Some(&[1u8, 2, 3, 4] as &[u8])
|
||||
);
|
||||
assert_eq!(
|
||||
find_slice(&[&[1, 2, 3, 4], &[5, 6]], 1, 2).ok(),
|
||||
Some(&[2u8, 3] as &[u8])
|
||||
);
|
||||
assert_eq!(
|
||||
find_slice(&[&[1, 2, 3, 4], &[5, 6]], 4, 2).ok(),
|
||||
Some(&[5u8, 6] as &[u8])
|
||||
);
|
||||
assert_eq!(
|
||||
find_slice(&[&[1, 2, 3, 4], &[5, 6]], 4, 0).ok(),
|
||||
Some(&[] as &[u8])
|
||||
);
|
||||
assert!(find_slice(&[], 0, 1).is_err());
|
||||
assert!(find_slice(&[&[1, 2, 3, 4], &[5, 6]], 6, 0).is_err());
|
||||
assert!(find_slice(&[&[1, 2, 3, 4], &[5, 6]], 3, 2).is_err());
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user