
October 13 1995, Draft 1
354
Addendum to –– Evaluating and Programming the 29K RISC Family
Target hardware can often have additional UART or parallel port hardware
available for communication. If OS–boot is not completely replaced with a new OS,
then these devices should be accessed via the normal library/HIF interface. OS–boot
can be extended to include a driver to support any new peripheral device. Each device
should be pre–allocated a file descriptor value starting with number 3. All access to
peripherals can then be to the pre–allocated file descriptors. If the application code
calls open() then the HIF
open
service should initially return 4, or some larger num-
ber depending on the number of peripheral devices added.
The Metaware libraries, supplied with the High C 29K compiler package, pre–
allocate buffer and MODE settings for file descriptors 0, 1 and 2. Assuming no access
to the library source file
_iob.c
, then calls to open() should be placed inside the
crt0.s
file. These open() calls should be for each of the pre–allocated file descriptors and
will result in library initialization. The code inside
crt0.o
runs before the application
main() code. Note, the MODE value for the open() calls may be restricted due to driv-
er or peripheral limitations. And communication with the devices may be required in
RAW mode rather than any buffered mode supported by the library when a device is
opened in COOKED mode.
When library calls, or HIF calls such as _read() or _write(), are issued for the
file descriptor associated with a peripheral the OS–boot trapware for the HIF ser-
vices shall call upon the required device driver to perform the requested task.
7.4.5 Memory Access Protection
The OS–boot operating system includes an optional memory access protection
scheme which is useful with embedded system debugging. It only functions with
29K family members which contain TLB hardware. When used, the operating sys-
tem runs application programs in User mode with address translation turned on.
Thus, all application addresses are virtual, but the memory management hardware is
configured to map virtual to physical addresses with a one–to–one scheme. No
memory paging takes place and the entire program is at all times located in the avail-
able target system memory.
The benefit of the system is that
bad
addresses, generated by unexpected pro-
gram execution, can be detected immediately. The operation of the 29K Translation
Look–aside Buffer (TLB) used to construct the management scheme was briefly de-
scribed in previous section 7.2.2 entitled
Memory Access Protection.
This section
deals with the OS–boot code implementation. For more information about operation
of TLB hardware see Chapter 6 (
Memory Management Unit
)