source: mainline/kernel/generic/src/mm/backend_elf.c@ 939e9c1

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 939e9c1 was 3759681, checked in by Jiri Svoboda <jirik.svoboda@…>, 17 years ago

Implement smc_coherence[_block]() for ppc32

  • Property mode set to 100644
File size: 10.0 KB
RevLine 
[0ee077ee]1/*
[df4ed85]2 * Copyright (c) 2006 Jakub Jermar
[0ee077ee]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[cc73a8a1]29/** @addtogroup genericmm
[b45c443]30 * @{
31 */
32
[0ee077ee]33/**
[b45c443]34 * @file
[0ee077ee]35 * @brief Backend for address space areas backed by an ELF image.
36 */
37
[d4b5542]38#include <lib/elf.h>
[0ee077ee]39#include <debug.h>
40#include <arch/types.h>
41#include <mm/as.h>
42#include <mm/frame.h>
43#include <mm/slab.h>
[00b595b]44#include <mm/page.h>
45#include <genarch/mm/page_pt.h>
46#include <genarch/mm/page_ht.h>
[0ee077ee]47#include <align.h>
48#include <memstr.h>
49#include <macros.h>
50#include <arch.h>
[36e86862]51#include <arch/barrier.h>
[0ee077ee]52
[9f63a83]53#ifdef CONFIG_VIRT_IDX_DCACHE
54#include <arch/mm/cache.h>
55#endif
56
[7f1c620]57static int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access);
58static void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame);
[00b595b]59static void elf_share(as_area_t *area);
[0ee077ee]60
61mem_backend_t elf_backend = {
62 .page_fault = elf_page_fault,
63 .frame_free = elf_frame_free,
[00b595b]64 .share = elf_share
[0ee077ee]65};
66
67/** Service a page fault in the ELF backend address space area.
68 *
69 * The address space area and page tables must be already locked.
70 *
[36e86862]71 * @param area Pointer to the address space area.
72 * @param addr Faulting virtual address.
73 * @param access Access mode that caused the fault (i.e.
74 * read/write/exec).
[0ee077ee]75 *
[36e86862]76 * @return AS_PF_FAULT on failure (i.e. page fault) or AS_PF_OK
77 * on success (i.e. serviced).
[0ee077ee]78 */
[7f1c620]79int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access)
[0ee077ee]80{
[127c957b]81 elf_header_t *elf = area->backend_data.elf;
82 elf_segment_header_t *entry = area->backend_data.segment;
[00b595b]83 btree_node_t *leaf;
[1cc2974]84 uintptr_t base, frame, page, start_anon;
[0ee077ee]85 index_t i;
[454f1da]86 bool dirty = false;
[0ee077ee]87
88 if (!as_area_check_access(area, access))
89 return AS_PF_FAULT;
90
[1cc2974]91 ASSERT((addr >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) &&
[d5bd8d7]92 (addr < entry->p_vaddr + entry->p_memsz));
[1cc2974]93 i = (addr - ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) >> PAGE_WIDTH;
94 base = (uintptr_t)
95 (((void *) elf) + ALIGN_DOWN(entry->p_offset, PAGE_SIZE));
96
97 /* Virtual address of faulting page*/
98 page = ALIGN_DOWN(addr, PAGE_SIZE);
99
100 /* Virtual address of the end of initialized part of segment */
101 start_anon = entry->p_vaddr + entry->p_filesz;
[00b595b]102
103 if (area->sh_info) {
104 bool found = false;
105
106 /*
107 * The address space area is shared.
108 */
[1cc2974]109
[00b595b]110 mutex_lock(&area->sh_info->lock);
[7f1c620]111 frame = (uintptr_t) btree_search(&area->sh_info->pagemap,
[1cc2974]112 page - area->base, &leaf);
[00b595b]113 if (!frame) {
[6c441cf8]114 unsigned int i;
[00b595b]115
116 /*
117 * Workaround for valid NULL address.
118 */
119
120 for (i = 0; i < leaf->keys; i++) {
[1cc2974]121 if (leaf->key[i] == page) {
[00b595b]122 found = true;
123 break;
124 }
125 }
126 }
127 if (frame || found) {
[c9d2235b]128 frame_reference_add(ADDR2PFN(frame));
[d5bd8d7]129 page_mapping_insert(AS, addr, frame,
130 as_area_get_flags(area));
[1cc2974]131 if (!used_space_insert(area, page, 1))
[00b595b]132 panic("Could not insert used space.\n");
133 mutex_unlock(&area->sh_info->lock);
134 return AS_PF_OK;
135 }
136 }
[1cc2974]137
[00b595b]138 /*
[d5bd8d7]139 * The area is either not shared or the pagemap does not contain the
140 * mapping.
[00b595b]141 */
[1cc2974]142 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]143 /*
144 * Initialized portion of the segment. The memory is backed
145 * directly by the content of the ELF image. Pages are
146 * only copied if the segment is writable so that there
147 * can be more instantions of the same memory ELF image
148 * used at a time. Note that this could be later done
149 * as COW.
150 */
151 if (entry->p_flags & PF_W) {
[7f1c620]152 frame = (uintptr_t)frame_alloc(ONE_FRAME, 0);
[d5bd8d7]153 memcpy((void *) PA2KA(frame),
154 (void *) (base + i * FRAME_SIZE), FRAME_SIZE);
[62cd66f]155 if (entry->p_flags & PF_X) {
[3759681]156 smc_coherence_block((void *) PA2KA(frame),
157 FRAME_SIZE);
[62cd66f]158 }
[454f1da]159 dirty = true;
[0ee077ee]160 } else {
[1cc2974]161 frame = KA2PA(base + i * FRAME_SIZE);
[0ee077ee]162 }
[1cc2974]163 } else if (page >= start_anon) {
[0ee077ee]164 /*
165 * This is the uninitialized portion of the segment.
166 * It is not physically present in the ELF image.
167 * To resolve the situation, a frame must be allocated
168 * and cleared.
169 */
[7f1c620]170 frame = (uintptr_t)frame_alloc(ONE_FRAME, 0);
[e32e092]171 memsetb((void *) PA2KA(frame), FRAME_SIZE, 0);
[454f1da]172 dirty = true;
[0ee077ee]173 } else {
[1cc2974]174 size_t pad_lo, pad_hi;
[0ee077ee]175 /*
176 * The mixed case.
[1cc2974]177 *
178 * The middle part is backed by the ELF image and
179 * the lower and upper parts are anonymous memory.
180 * (The segment can be and often is shorter than 1 page).
[0ee077ee]181 */
[1cc2974]182 if (page < entry->p_vaddr)
183 pad_lo = entry->p_vaddr - page;
184 else
185 pad_lo = 0;
186
187 if (start_anon < page + PAGE_SIZE)
188 pad_hi = page + PAGE_SIZE - start_anon;
189 else
190 pad_hi = 0;
191
[7f1c620]192 frame = (uintptr_t)frame_alloc(ONE_FRAME, 0);
[1cc2974]193 memcpy((void *) (PA2KA(frame) + pad_lo),
194 (void *) (base + i * FRAME_SIZE + pad_lo),
195 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]196 if (entry->p_flags & PF_X) {
[3759681]197 smc_coherence_block((void *) (PA2KA(frame) + pad_lo),
198 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]199 }
[e32e092]200 memsetb((void *) PA2KA(frame), pad_lo, 0);
[36e86862]201 memsetb((void *) (PA2KA(frame) + FRAME_SIZE - pad_hi), pad_hi,
202 0);
[454f1da]203 dirty = true;
[1cc2974]204 }
[00b595b]205
[1cc2974]206 if (dirty && area->sh_info) {
207 frame_reference_add(ADDR2PFN(frame));
208 btree_insert(&area->sh_info->pagemap, page - area->base,
209 (void *) frame, leaf);
[0ee077ee]210 }
[1cc2974]211
[00b595b]212 if (area->sh_info)
213 mutex_unlock(&area->sh_info->lock);
[1cc2974]214
[0ee077ee]215 page_mapping_insert(AS, addr, frame, as_area_get_flags(area));
[1cc2974]216 if (!used_space_insert(area, page, 1))
[00b595b]217 panic("Could not insert used space.\n");
[0ee077ee]218
219 return AS_PF_OK;
220}
221
222/** Free a frame that is backed by the ELF backend.
223 *
224 * The address space area and page tables must be already locked.
225 *
[36e86862]226 * @param area Pointer to the address space area.
227 * @param page Page that is mapped to frame. Must be aligned to
228 * PAGE_SIZE.
229 * @param frame Frame to be released.
[0ee077ee]230 *
231 */
[7f1c620]232void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame)
[0ee077ee]233{
[127c957b]234 elf_header_t *elf = area->backend_data.elf;
235 elf_segment_header_t *entry = area->backend_data.segment;
[1cc2974]236 uintptr_t base, start_anon;
[0ee077ee]237 index_t i;
[1cc2974]238
239 ASSERT((page >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) &&
[d5bd8d7]240 (page < entry->p_vaddr + entry->p_memsz));
[1cc2974]241 i = (page - ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) >> PAGE_WIDTH;
242 base = (uintptr_t) (((void *) elf) +
243 ALIGN_DOWN(entry->p_offset, FRAME_SIZE));
244 start_anon = entry->p_vaddr + entry->p_filesz;
245
246 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]247 if (entry->p_flags & PF_W) {
248 /*
[d5bd8d7]249 * Free the frame with the copy of writable segment
250 * data.
[0ee077ee]251 */
[2e9eae2]252 frame_free(frame);
[0ee077ee]253 }
254 } else {
255 /*
[d5bd8d7]256 * The frame is either anonymous memory or the mixed case (i.e.
257 * lower part is backed by the ELF image and the upper is
258 * anonymous). In any case, a frame needs to be freed.
[454f1da]259 */
260 frame_free(frame);
[0ee077ee]261 }
262}
[00b595b]263
264/** Share ELF image backed address space area.
265 *
266 * If the area is writable, then all mapped pages are duplicated in the pagemap.
267 * Otherwise only portions of the area that are not backed by the ELF image
268 * are put into the pagemap.
269 *
270 * The address space and address space area must be locked prior to the call.
271 *
[36e86862]272 * @param area Address space area.
[00b595b]273 */
274void elf_share(as_area_t *area)
275{
276 elf_segment_header_t *entry = area->backend_data.segment;
277 link_t *cur;
278 btree_node_t *leaf, *node;
[7f1c620]279 uintptr_t start_anon = entry->p_vaddr + entry->p_filesz;
[00b595b]280
281 /*
282 * Find the node in which to start linear search.
283 */
284 if (area->flags & AS_AREA_WRITE) {
[d5bd8d7]285 node = list_get_instance(area->used_space.leaf_head.next,
286 btree_node_t, leaf_link);
[00b595b]287 } else {
288 (void) btree_search(&area->sh_info->pagemap, start_anon, &leaf);
[d5bd8d7]289 node = btree_leaf_node_left_neighbour(&area->sh_info->pagemap,
290 leaf);
[00b595b]291 if (!node)
292 node = leaf;
293 }
294
295 /*
296 * Copy used anonymous portions of the area to sh_info's page map.
297 */
298 mutex_lock(&area->sh_info->lock);
[d5bd8d7]299 for (cur = &node->leaf_link; cur != &area->used_space.leaf_head;
300 cur = cur->next) {
[6c441cf8]301 unsigned int i;
[00b595b]302
303 node = list_get_instance(cur, btree_node_t, leaf_link);
304
305 for (i = 0; i < node->keys; i++) {
[7f1c620]306 uintptr_t base = node->key[i];
[00b595b]307 count_t count = (count_t) node->value[i];
[6c441cf8]308 unsigned int j;
[00b595b]309
310 /*
311 * Skip read-only areas of used space that are backed
312 * by the ELF image.
313 */
314 if (!(area->flags & AS_AREA_WRITE))
[1cc2974]315 if (base >= entry->p_vaddr &&
316 base + count * PAGE_SIZE <= start_anon)
[00b595b]317 continue;
318
319 for (j = 0; j < count; j++) {
320 pte_t *pte;
321
322 /*
[d5bd8d7]323 * Skip read-only pages that are backed by the
324 * ELF image.
[00b595b]325 */
326 if (!(area->flags & AS_AREA_WRITE))
[1cc2974]327 if (base >= entry->p_vaddr &&
328 base + (j + 1) * PAGE_SIZE <=
[d5bd8d7]329 start_anon)
[00b595b]330 continue;
331
332 page_table_lock(area->as, false);
[d5bd8d7]333 pte = page_mapping_find(area->as,
334 base + j * PAGE_SIZE);
335 ASSERT(pte && PTE_VALID(pte) &&
336 PTE_PRESENT(pte));
337 btree_insert(&area->sh_info->pagemap,
338 (base + j * PAGE_SIZE) - area->base,
[c03ee1c]339 (void *) PTE_GET_FRAME(pte), NULL);
[00b595b]340 page_table_unlock(area->as, false);
[d5bd8d7]341
342 pfn_t pfn = ADDR2PFN(PTE_GET_FRAME(pte));
343 frame_reference_add(pfn);
[00b595b]344 }
345
346 }
347 }
348 mutex_unlock(&area->sh_info->lock);
349}
[b45c443]350
[cc73a8a1]351/** @}
[b45c443]352 */
Note: See TracBrowser for help on using the repository browser.