source: mainline/kernel/generic/src/mm/backend_elf.c@ 8f6c6264

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 8f6c6264 was 8f6c6264, checked in by Jakub Jermar <jakub@…>, 14 years ago

More precise elf_nonanon_pages_get() wrt. elf_page_fault().

  • Property mode set to 100644
File size: 11.4 KB
RevLine 
[0ee077ee]1/*
[df4ed85]2 * Copyright (c) 2006 Jakub Jermar
[0ee077ee]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[cc73a8a1]29/** @addtogroup genericmm
[b45c443]30 * @{
31 */
32
[0ee077ee]33/**
[b45c443]34 * @file
[0ee077ee]35 * @brief Backend for address space areas backed by an ELF image.
36 */
37
[d4b5542]38#include <lib/elf.h>
[0ee077ee]39#include <debug.h>
[d99c1d2]40#include <typedefs.h>
[0ee077ee]41#include <mm/as.h>
42#include <mm/frame.h>
43#include <mm/slab.h>
[00b595b]44#include <mm/page.h>
[03523dc]45#include <mm/reserve.h>
[00b595b]46#include <genarch/mm/page_pt.h>
47#include <genarch/mm/page_ht.h>
[0ee077ee]48#include <align.h>
49#include <memstr.h>
50#include <macros.h>
51#include <arch.h>
[36e86862]52#include <arch/barrier.h>
[0ee077ee]53
[03523dc]54static bool elf_create(as_area_t *);
55static bool elf_resize(as_area_t *, size_t);
56static void elf_share(as_area_t *);
57static void elf_destroy(as_area_t *);
58
[cda1378]59static int elf_page_fault(as_area_t *, uintptr_t, pf_access_t);
60static void elf_frame_free(as_area_t *, uintptr_t, uintptr_t);
[0ee077ee]61
62mem_backend_t elf_backend = {
[03523dc]63 .create = elf_create,
64 .resize = elf_resize,
65 .share = elf_share,
66 .destroy = elf_destroy,
67
[0ee077ee]68 .page_fault = elf_page_fault,
69 .frame_free = elf_frame_free,
70};
71
[3ac69647]72static size_t elf_nonanon_pages_get(as_area_t *area)
[03523dc]73{
[9dd730d1]74 elf_segment_header_t *entry = area->backend_data.segment;
[8f6c6264]75 uintptr_t first = ALIGN_UP(entry->p_vaddr, PAGE_SIZE);
76 uintptr_t last = ALIGN_DOWN(entry->p_vaddr + entry->p_filesz,
77 PAGE_SIZE);
[9dd730d1]78
[2c86f81]79 if (entry->p_flags & PF_W)
[3ac69647]80 return 0;
81
[8f6c6264]82 if (last < first)
83 return 0;
84
85 return last - first;
[3ac69647]86}
87
88bool elf_create(as_area_t *area)
89{
90 size_t nonanon_pages = elf_nonanon_pages_get(area);
[2c86f81]91
[9dd730d1]92 if (area->pages <= nonanon_pages)
93 return true;
94
95 return reserve_try_alloc(area->pages - nonanon_pages);
[03523dc]96}
97
98bool elf_resize(as_area_t *area, size_t new_pages)
99{
[3ac69647]100 size_t nonanon_pages = elf_nonanon_pages_get(area);
[2c86f81]101
[9dd730d1]102 if (new_pages > area->pages) {
103 /* The area is growing. */
104 if (area->pages >= nonanon_pages)
105 return reserve_try_alloc(new_pages - area->pages);
106 else if (new_pages > nonanon_pages)
107 return reserve_try_alloc(new_pages - nonanon_pages);
108 } else if (new_pages < area->pages) {
109 /* The area is shrinking. */
110 if (new_pages >= nonanon_pages)
111 reserve_free(area->pages - new_pages);
112 else if (area->pages > nonanon_pages)
113 reserve_free(nonanon_pages - new_pages);
114 }
[03523dc]115
116 return true;
117}
118
119/** Share ELF image backed address space area.
120 *
121 * If the area is writable, then all mapped pages are duplicated in the pagemap.
122 * Otherwise only portions of the area that are not backed by the ELF image
123 * are put into the pagemap.
124 *
125 * @param area Address space area.
126 */
127void elf_share(as_area_t *area)
128{
129 elf_segment_header_t *entry = area->backend_data.segment;
130 link_t *cur;
131 btree_node_t *leaf, *node;
132 uintptr_t start_anon = entry->p_vaddr + entry->p_filesz;
133
134 ASSERT(mutex_locked(&area->as->lock));
135 ASSERT(mutex_locked(&area->lock));
136
137 /*
138 * Find the node in which to start linear search.
139 */
140 if (area->flags & AS_AREA_WRITE) {
141 node = list_get_instance(area->used_space.leaf_head.next,
142 btree_node_t, leaf_link);
143 } else {
144 (void) btree_search(&area->sh_info->pagemap, start_anon, &leaf);
145 node = btree_leaf_node_left_neighbour(&area->sh_info->pagemap,
146 leaf);
147 if (!node)
148 node = leaf;
149 }
150
151 /*
152 * Copy used anonymous portions of the area to sh_info's page map.
153 */
154 mutex_lock(&area->sh_info->lock);
155 for (cur = &node->leaf_link; cur != &area->used_space.leaf_head;
156 cur = cur->next) {
157 unsigned int i;
158
159 node = list_get_instance(cur, btree_node_t, leaf_link);
160
161 for (i = 0; i < node->keys; i++) {
162 uintptr_t base = node->key[i];
163 size_t count = (size_t) node->value[i];
164 unsigned int j;
165
166 /*
167 * Skip read-only areas of used space that are backed
168 * by the ELF image.
169 */
170 if (!(area->flags & AS_AREA_WRITE))
171 if (base >= entry->p_vaddr &&
172 base + count * PAGE_SIZE <= start_anon)
173 continue;
174
175 for (j = 0; j < count; j++) {
176 pte_t *pte;
177
178 /*
179 * Skip read-only pages that are backed by the
180 * ELF image.
181 */
182 if (!(area->flags & AS_AREA_WRITE))
183 if (base >= entry->p_vaddr &&
184 base + (j + 1) * PAGE_SIZE <=
185 start_anon)
186 continue;
187
188 page_table_lock(area->as, false);
189 pte = page_mapping_find(area->as,
190 base + j * PAGE_SIZE);
191 ASSERT(pte && PTE_VALID(pte) &&
192 PTE_PRESENT(pte));
193 btree_insert(&area->sh_info->pagemap,
194 (base + j * PAGE_SIZE) - area->base,
195 (void *) PTE_GET_FRAME(pte), NULL);
196 page_table_unlock(area->as, false);
197
198 pfn_t pfn = ADDR2PFN(PTE_GET_FRAME(pte));
199 frame_reference_add(pfn);
200 }
201
202 }
203 }
204 mutex_unlock(&area->sh_info->lock);
205}
206
207void elf_destroy(as_area_t *area)
208{
[3ac69647]209 size_t nonanon_pages = elf_nonanon_pages_get(area);
[2c86f81]210
[9dd730d1]211 if (area->pages > nonanon_pages)
212 reserve_free(area->pages - nonanon_pages);
[03523dc]213}
214
[0ee077ee]215/** Service a page fault in the ELF backend address space area.
216 *
217 * The address space area and page tables must be already locked.
218 *
[36e86862]219 * @param area Pointer to the address space area.
220 * @param addr Faulting virtual address.
221 * @param access Access mode that caused the fault (i.e.
222 * read/write/exec).
[0ee077ee]223 *
[36e86862]224 * @return AS_PF_FAULT on failure (i.e. page fault) or AS_PF_OK
225 * on success (i.e. serviced).
[0ee077ee]226 */
[7f1c620]227int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access)
[0ee077ee]228{
[127c957b]229 elf_header_t *elf = area->backend_data.elf;
230 elf_segment_header_t *entry = area->backend_data.segment;
[00b595b]231 btree_node_t *leaf;
[1cc2974]232 uintptr_t base, frame, page, start_anon;
[98000fb]233 size_t i;
[454f1da]234 bool dirty = false;
[0ee077ee]235
[1d432f9]236 ASSERT(page_table_locked(AS));
237 ASSERT(mutex_locked(&area->lock));
238
[0ee077ee]239 if (!as_area_check_access(area, access))
240 return AS_PF_FAULT;
[917a8c8]241
242 if (addr < ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE))
243 return AS_PF_FAULT;
244
245 if (addr >= entry->p_vaddr + entry->p_memsz)
246 return AS_PF_FAULT;
247
[1cc2974]248 i = (addr - ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) >> PAGE_WIDTH;
249 base = (uintptr_t)
250 (((void *) elf) + ALIGN_DOWN(entry->p_offset, PAGE_SIZE));
251
252 /* Virtual address of faulting page*/
253 page = ALIGN_DOWN(addr, PAGE_SIZE);
254
255 /* Virtual address of the end of initialized part of segment */
256 start_anon = entry->p_vaddr + entry->p_filesz;
[00b595b]257
258 if (area->sh_info) {
259 bool found = false;
260
261 /*
262 * The address space area is shared.
263 */
[1cc2974]264
[00b595b]265 mutex_lock(&area->sh_info->lock);
[7f1c620]266 frame = (uintptr_t) btree_search(&area->sh_info->pagemap,
[1cc2974]267 page - area->base, &leaf);
[00b595b]268 if (!frame) {
[6c441cf8]269 unsigned int i;
[00b595b]270
271 /*
272 * Workaround for valid NULL address.
273 */
274
275 for (i = 0; i < leaf->keys; i++) {
[6461d286]276 if (leaf->key[i] == page - area->base) {
[00b595b]277 found = true;
278 break;
279 }
280 }
281 }
282 if (frame || found) {
[c9d2235b]283 frame_reference_add(ADDR2PFN(frame));
[d5bd8d7]284 page_mapping_insert(AS, addr, frame,
285 as_area_get_flags(area));
[1cc2974]286 if (!used_space_insert(area, page, 1))
[f651e80]287 panic("Cannot insert used space.");
[00b595b]288 mutex_unlock(&area->sh_info->lock);
289 return AS_PF_OK;
290 }
291 }
[1cc2974]292
[00b595b]293 /*
[d5bd8d7]294 * The area is either not shared or the pagemap does not contain the
295 * mapping.
[00b595b]296 */
[1cc2974]297 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]298 /*
299 * Initialized portion of the segment. The memory is backed
300 * directly by the content of the ELF image. Pages are
301 * only copied if the segment is writable so that there
302 * can be more instantions of the same memory ELF image
303 * used at a time. Note that this could be later done
304 * as COW.
305 */
306 if (entry->p_flags & PF_W) {
[b838fdf]307 frame = (uintptr_t)frame_alloc_noreserve(ONE_FRAME, 0);
[d5bd8d7]308 memcpy((void *) PA2KA(frame),
309 (void *) (base + i * FRAME_SIZE), FRAME_SIZE);
[62cd66f]310 if (entry->p_flags & PF_X) {
[3759681]311 smc_coherence_block((void *) PA2KA(frame),
312 FRAME_SIZE);
[62cd66f]313 }
[454f1da]314 dirty = true;
[0ee077ee]315 } else {
[1cc2974]316 frame = KA2PA(base + i * FRAME_SIZE);
[0ee077ee]317 }
[1cc2974]318 } else if (page >= start_anon) {
[0ee077ee]319 /*
320 * This is the uninitialized portion of the segment.
321 * It is not physically present in the ELF image.
322 * To resolve the situation, a frame must be allocated
323 * and cleared.
324 */
[b838fdf]325 frame = (uintptr_t) frame_alloc_noreserve(ONE_FRAME, 0);
[e32e092]326 memsetb((void *) PA2KA(frame), FRAME_SIZE, 0);
[454f1da]327 dirty = true;
[0ee077ee]328 } else {
[1cc2974]329 size_t pad_lo, pad_hi;
[0ee077ee]330 /*
331 * The mixed case.
[1cc2974]332 *
333 * The middle part is backed by the ELF image and
334 * the lower and upper parts are anonymous memory.
335 * (The segment can be and often is shorter than 1 page).
[0ee077ee]336 */
[1cc2974]337 if (page < entry->p_vaddr)
338 pad_lo = entry->p_vaddr - page;
339 else
340 pad_lo = 0;
341
342 if (start_anon < page + PAGE_SIZE)
343 pad_hi = page + PAGE_SIZE - start_anon;
344 else
345 pad_hi = 0;
346
[b838fdf]347 frame = (uintptr_t) frame_alloc_noreserve(ONE_FRAME, 0);
[1cc2974]348 memcpy((void *) (PA2KA(frame) + pad_lo),
349 (void *) (base + i * FRAME_SIZE + pad_lo),
350 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]351 if (entry->p_flags & PF_X) {
[3759681]352 smc_coherence_block((void *) (PA2KA(frame) + pad_lo),
353 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]354 }
[e32e092]355 memsetb((void *) PA2KA(frame), pad_lo, 0);
[36e86862]356 memsetb((void *) (PA2KA(frame) + FRAME_SIZE - pad_hi), pad_hi,
357 0);
[454f1da]358 dirty = true;
[1cc2974]359 }
[00b595b]360
[1cc2974]361 if (dirty && area->sh_info) {
362 frame_reference_add(ADDR2PFN(frame));
363 btree_insert(&area->sh_info->pagemap, page - area->base,
364 (void *) frame, leaf);
[0ee077ee]365 }
[1cc2974]366
[00b595b]367 if (area->sh_info)
368 mutex_unlock(&area->sh_info->lock);
[1cc2974]369
[0ee077ee]370 page_mapping_insert(AS, addr, frame, as_area_get_flags(area));
[1cc2974]371 if (!used_space_insert(area, page, 1))
[f651e80]372 panic("Cannot insert used space.");
[0ee077ee]373
374 return AS_PF_OK;
375}
376
377/** Free a frame that is backed by the ELF backend.
378 *
379 * The address space area and page tables must be already locked.
380 *
[36e86862]381 * @param area Pointer to the address space area.
382 * @param page Page that is mapped to frame. Must be aligned to
383 * PAGE_SIZE.
384 * @param frame Frame to be released.
[0ee077ee]385 *
386 */
[7f1c620]387void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame)
[0ee077ee]388{
[127c957b]389 elf_segment_header_t *entry = area->backend_data.segment;
[137691a]390 uintptr_t start_anon;
[1cc2974]391
[1d432f9]392 ASSERT(page_table_locked(area->as));
393 ASSERT(mutex_locked(&area->lock));
394
395 ASSERT(page >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE));
396 ASSERT(page < entry->p_vaddr + entry->p_memsz);
397
[1cc2974]398 start_anon = entry->p_vaddr + entry->p_filesz;
399
400 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]401 if (entry->p_flags & PF_W) {
402 /*
[d5bd8d7]403 * Free the frame with the copy of writable segment
404 * data.
[0ee077ee]405 */
[b838fdf]406 frame_free_noreserve(frame);
[0ee077ee]407 }
408 } else {
409 /*
[d5bd8d7]410 * The frame is either anonymous memory or the mixed case (i.e.
411 * lower part is backed by the ELF image and the upper is
412 * anonymous). In any case, a frame needs to be freed.
[137691a]413 */
[b838fdf]414 frame_free_noreserve(frame);
[0ee077ee]415 }
416}
[00b595b]417
[cc73a8a1]418/** @}
[b45c443]419 */
Note: See TracBrowser for help on using the repository browser.