source: mainline/kernel/generic/src/mm/backend_elf.c@ b4ffe5bc

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since b4ffe5bc was b4ffe5bc, checked in by Jakub Jermar <jakub@…>, 14 years ago

Use the P2SZ() macro in address space area backends.

  • Property mode set to 100644
File size: 11.4 KB
RevLine 
[0ee077ee]1/*
[df4ed85]2 * Copyright (c) 2006 Jakub Jermar
[0ee077ee]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[cc73a8a1]29/** @addtogroup genericmm
[b45c443]30 * @{
31 */
32
[0ee077ee]33/**
[b45c443]34 * @file
[0ee077ee]35 * @brief Backend for address space areas backed by an ELF image.
36 */
37
[d4b5542]38#include <lib/elf.h>
[0ee077ee]39#include <debug.h>
[d99c1d2]40#include <typedefs.h>
[0ee077ee]41#include <mm/as.h>
42#include <mm/frame.h>
43#include <mm/slab.h>
[00b595b]44#include <mm/page.h>
[03523dc]45#include <mm/reserve.h>
[00b595b]46#include <genarch/mm/page_pt.h>
47#include <genarch/mm/page_ht.h>
[0ee077ee]48#include <align.h>
49#include <memstr.h>
50#include <macros.h>
51#include <arch.h>
[36e86862]52#include <arch/barrier.h>
[0ee077ee]53
[03523dc]54static bool elf_create(as_area_t *);
55static bool elf_resize(as_area_t *, size_t);
56static void elf_share(as_area_t *);
57static void elf_destroy(as_area_t *);
58
[cda1378]59static int elf_page_fault(as_area_t *, uintptr_t, pf_access_t);
60static void elf_frame_free(as_area_t *, uintptr_t, uintptr_t);
[0ee077ee]61
62mem_backend_t elf_backend = {
[03523dc]63 .create = elf_create,
64 .resize = elf_resize,
65 .share = elf_share,
66 .destroy = elf_destroy,
67
[0ee077ee]68 .page_fault = elf_page_fault,
69 .frame_free = elf_frame_free,
70};
71
[3ac69647]72static size_t elf_nonanon_pages_get(as_area_t *area)
[03523dc]73{
[9dd730d1]74 elf_segment_header_t *entry = area->backend_data.segment;
[8f6c6264]75 uintptr_t first = ALIGN_UP(entry->p_vaddr, PAGE_SIZE);
76 uintptr_t last = ALIGN_DOWN(entry->p_vaddr + entry->p_filesz,
77 PAGE_SIZE);
[9dd730d1]78
[2c86f81]79 if (entry->p_flags & PF_W)
[3ac69647]80 return 0;
81
[8f6c6264]82 if (last < first)
83 return 0;
84
85 return last - first;
[3ac69647]86}
87
88bool elf_create(as_area_t *area)
89{
90 size_t nonanon_pages = elf_nonanon_pages_get(area);
[2c86f81]91
[9dd730d1]92 if (area->pages <= nonanon_pages)
93 return true;
94
95 return reserve_try_alloc(area->pages - nonanon_pages);
[03523dc]96}
97
98bool elf_resize(as_area_t *area, size_t new_pages)
99{
[3ac69647]100 size_t nonanon_pages = elf_nonanon_pages_get(area);
[2c86f81]101
[9dd730d1]102 if (new_pages > area->pages) {
103 /* The area is growing. */
104 if (area->pages >= nonanon_pages)
105 return reserve_try_alloc(new_pages - area->pages);
106 else if (new_pages > nonanon_pages)
107 return reserve_try_alloc(new_pages - nonanon_pages);
108 } else if (new_pages < area->pages) {
109 /* The area is shrinking. */
110 if (new_pages >= nonanon_pages)
111 reserve_free(area->pages - new_pages);
112 else if (area->pages > nonanon_pages)
113 reserve_free(nonanon_pages - new_pages);
114 }
[03523dc]115
116 return true;
117}
118
119/** Share ELF image backed address space area.
120 *
121 * If the area is writable, then all mapped pages are duplicated in the pagemap.
122 * Otherwise only portions of the area that are not backed by the ELF image
123 * are put into the pagemap.
124 *
125 * @param area Address space area.
126 */
127void elf_share(as_area_t *area)
128{
129 elf_segment_header_t *entry = area->backend_data.segment;
130 link_t *cur;
131 btree_node_t *leaf, *node;
132 uintptr_t start_anon = entry->p_vaddr + entry->p_filesz;
133
134 ASSERT(mutex_locked(&area->as->lock));
135 ASSERT(mutex_locked(&area->lock));
136
137 /*
138 * Find the node in which to start linear search.
139 */
140 if (area->flags & AS_AREA_WRITE) {
141 node = list_get_instance(area->used_space.leaf_head.next,
142 btree_node_t, leaf_link);
143 } else {
144 (void) btree_search(&area->sh_info->pagemap, start_anon, &leaf);
145 node = btree_leaf_node_left_neighbour(&area->sh_info->pagemap,
146 leaf);
147 if (!node)
148 node = leaf;
149 }
150
151 /*
152 * Copy used anonymous portions of the area to sh_info's page map.
153 */
154 mutex_lock(&area->sh_info->lock);
155 for (cur = &node->leaf_link; cur != &area->used_space.leaf_head;
156 cur = cur->next) {
157 unsigned int i;
158
159 node = list_get_instance(cur, btree_node_t, leaf_link);
160
161 for (i = 0; i < node->keys; i++) {
162 uintptr_t base = node->key[i];
163 size_t count = (size_t) node->value[i];
164 unsigned int j;
165
166 /*
167 * Skip read-only areas of used space that are backed
168 * by the ELF image.
169 */
170 if (!(area->flags & AS_AREA_WRITE))
171 if (base >= entry->p_vaddr &&
[b4ffe5bc]172 base + P2SZ(count) <= start_anon)
[03523dc]173 continue;
174
175 for (j = 0; j < count; j++) {
176 pte_t *pte;
177
178 /*
179 * Skip read-only pages that are backed by the
180 * ELF image.
181 */
182 if (!(area->flags & AS_AREA_WRITE))
183 if (base >= entry->p_vaddr &&
[b4ffe5bc]184 base + P2SZ(j + 1) <= start_anon)
[03523dc]185 continue;
186
187 page_table_lock(area->as, false);
188 pte = page_mapping_find(area->as,
[b4ffe5bc]189 base + P2SZ(j), false);
[03523dc]190 ASSERT(pte && PTE_VALID(pte) &&
191 PTE_PRESENT(pte));
192 btree_insert(&area->sh_info->pagemap,
[b4ffe5bc]193 (base + P2SZ(j)) - area->base,
[03523dc]194 (void *) PTE_GET_FRAME(pte), NULL);
195 page_table_unlock(area->as, false);
196
197 pfn_t pfn = ADDR2PFN(PTE_GET_FRAME(pte));
198 frame_reference_add(pfn);
199 }
200
201 }
202 }
203 mutex_unlock(&area->sh_info->lock);
204}
205
206void elf_destroy(as_area_t *area)
207{
[3ac69647]208 size_t nonanon_pages = elf_nonanon_pages_get(area);
[2c86f81]209
[9dd730d1]210 if (area->pages > nonanon_pages)
211 reserve_free(area->pages - nonanon_pages);
[03523dc]212}
213
[0ee077ee]214/** Service a page fault in the ELF backend address space area.
215 *
216 * The address space area and page tables must be already locked.
217 *
[36e86862]218 * @param area Pointer to the address space area.
219 * @param addr Faulting virtual address.
220 * @param access Access mode that caused the fault (i.e.
221 * read/write/exec).
[0ee077ee]222 *
[36e86862]223 * @return AS_PF_FAULT on failure (i.e. page fault) or AS_PF_OK
224 * on success (i.e. serviced).
[0ee077ee]225 */
[7f1c620]226int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access)
[0ee077ee]227{
[127c957b]228 elf_header_t *elf = area->backend_data.elf;
229 elf_segment_header_t *entry = area->backend_data.segment;
[00b595b]230 btree_node_t *leaf;
[1cc2974]231 uintptr_t base, frame, page, start_anon;
[98000fb]232 size_t i;
[454f1da]233 bool dirty = false;
[0ee077ee]234
[1d432f9]235 ASSERT(page_table_locked(AS));
236 ASSERT(mutex_locked(&area->lock));
237
[0ee077ee]238 if (!as_area_check_access(area, access))
239 return AS_PF_FAULT;
[917a8c8]240
241 if (addr < ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE))
242 return AS_PF_FAULT;
243
244 if (addr >= entry->p_vaddr + entry->p_memsz)
245 return AS_PF_FAULT;
246
[1cc2974]247 i = (addr - ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) >> PAGE_WIDTH;
248 base = (uintptr_t)
249 (((void *) elf) + ALIGN_DOWN(entry->p_offset, PAGE_SIZE));
250
251 /* Virtual address of faulting page*/
252 page = ALIGN_DOWN(addr, PAGE_SIZE);
253
254 /* Virtual address of the end of initialized part of segment */
255 start_anon = entry->p_vaddr + entry->p_filesz;
[00b595b]256
257 if (area->sh_info) {
258 bool found = false;
259
260 /*
261 * The address space area is shared.
262 */
[1cc2974]263
[00b595b]264 mutex_lock(&area->sh_info->lock);
[7f1c620]265 frame = (uintptr_t) btree_search(&area->sh_info->pagemap,
[1cc2974]266 page - area->base, &leaf);
[00b595b]267 if (!frame) {
[6c441cf8]268 unsigned int i;
[00b595b]269
270 /*
271 * Workaround for valid NULL address.
272 */
273
274 for (i = 0; i < leaf->keys; i++) {
[6461d286]275 if (leaf->key[i] == page - area->base) {
[00b595b]276 found = true;
277 break;
278 }
279 }
280 }
281 if (frame || found) {
[c9d2235b]282 frame_reference_add(ADDR2PFN(frame));
[d5bd8d7]283 page_mapping_insert(AS, addr, frame,
284 as_area_get_flags(area));
[1cc2974]285 if (!used_space_insert(area, page, 1))
[f651e80]286 panic("Cannot insert used space.");
[00b595b]287 mutex_unlock(&area->sh_info->lock);
288 return AS_PF_OK;
289 }
290 }
[1cc2974]291
[00b595b]292 /*
[d5bd8d7]293 * The area is either not shared or the pagemap does not contain the
294 * mapping.
[00b595b]295 */
[1cc2974]296 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]297 /*
298 * Initialized portion of the segment. The memory is backed
299 * directly by the content of the ELF image. Pages are
300 * only copied if the segment is writable so that there
301 * can be more instantions of the same memory ELF image
302 * used at a time. Note that this could be later done
303 * as COW.
304 */
305 if (entry->p_flags & PF_W) {
[b838fdf]306 frame = (uintptr_t)frame_alloc_noreserve(ONE_FRAME, 0);
[d5bd8d7]307 memcpy((void *) PA2KA(frame),
308 (void *) (base + i * FRAME_SIZE), FRAME_SIZE);
[62cd66f]309 if (entry->p_flags & PF_X) {
[3759681]310 smc_coherence_block((void *) PA2KA(frame),
311 FRAME_SIZE);
[62cd66f]312 }
[454f1da]313 dirty = true;
[0ee077ee]314 } else {
[1cc2974]315 frame = KA2PA(base + i * FRAME_SIZE);
[0ee077ee]316 }
[1cc2974]317 } else if (page >= start_anon) {
[0ee077ee]318 /*
319 * This is the uninitialized portion of the segment.
320 * It is not physically present in the ELF image.
321 * To resolve the situation, a frame must be allocated
322 * and cleared.
323 */
[b838fdf]324 frame = (uintptr_t) frame_alloc_noreserve(ONE_FRAME, 0);
[e32e092]325 memsetb((void *) PA2KA(frame), FRAME_SIZE, 0);
[454f1da]326 dirty = true;
[0ee077ee]327 } else {
[1cc2974]328 size_t pad_lo, pad_hi;
[0ee077ee]329 /*
330 * The mixed case.
[1cc2974]331 *
332 * The middle part is backed by the ELF image and
333 * the lower and upper parts are anonymous memory.
334 * (The segment can be and often is shorter than 1 page).
[0ee077ee]335 */
[1cc2974]336 if (page < entry->p_vaddr)
337 pad_lo = entry->p_vaddr - page;
338 else
339 pad_lo = 0;
340
341 if (start_anon < page + PAGE_SIZE)
342 pad_hi = page + PAGE_SIZE - start_anon;
343 else
344 pad_hi = 0;
345
[b838fdf]346 frame = (uintptr_t) frame_alloc_noreserve(ONE_FRAME, 0);
[1cc2974]347 memcpy((void *) (PA2KA(frame) + pad_lo),
348 (void *) (base + i * FRAME_SIZE + pad_lo),
349 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]350 if (entry->p_flags & PF_X) {
[3759681]351 smc_coherence_block((void *) (PA2KA(frame) + pad_lo),
352 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]353 }
[e32e092]354 memsetb((void *) PA2KA(frame), pad_lo, 0);
[36e86862]355 memsetb((void *) (PA2KA(frame) + FRAME_SIZE - pad_hi), pad_hi,
356 0);
[454f1da]357 dirty = true;
[1cc2974]358 }
[00b595b]359
[1cc2974]360 if (dirty && area->sh_info) {
361 frame_reference_add(ADDR2PFN(frame));
362 btree_insert(&area->sh_info->pagemap, page - area->base,
363 (void *) frame, leaf);
[0ee077ee]364 }
[1cc2974]365
[00b595b]366 if (area->sh_info)
367 mutex_unlock(&area->sh_info->lock);
[1cc2974]368
[0ee077ee]369 page_mapping_insert(AS, addr, frame, as_area_get_flags(area));
[1cc2974]370 if (!used_space_insert(area, page, 1))
[f651e80]371 panic("Cannot insert used space.");
[0ee077ee]372
373 return AS_PF_OK;
374}
375
376/** Free a frame that is backed by the ELF backend.
377 *
378 * The address space area and page tables must be already locked.
379 *
[36e86862]380 * @param area Pointer to the address space area.
381 * @param page Page that is mapped to frame. Must be aligned to
382 * PAGE_SIZE.
383 * @param frame Frame to be released.
[0ee077ee]384 *
385 */
[7f1c620]386void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame)
[0ee077ee]387{
[127c957b]388 elf_segment_header_t *entry = area->backend_data.segment;
[137691a]389 uintptr_t start_anon;
[1cc2974]390
[1d432f9]391 ASSERT(page_table_locked(area->as));
392 ASSERT(mutex_locked(&area->lock));
393
394 ASSERT(page >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE));
395 ASSERT(page < entry->p_vaddr + entry->p_memsz);
396
[1cc2974]397 start_anon = entry->p_vaddr + entry->p_filesz;
398
399 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]400 if (entry->p_flags & PF_W) {
401 /*
[d5bd8d7]402 * Free the frame with the copy of writable segment
403 * data.
[0ee077ee]404 */
[b838fdf]405 frame_free_noreserve(frame);
[0ee077ee]406 }
407 } else {
408 /*
[d5bd8d7]409 * The frame is either anonymous memory or the mixed case (i.e.
410 * lower part is backed by the ELF image and the upper is
411 * anonymous). In any case, a frame needs to be freed.
[137691a]412 */
[b838fdf]413 frame_free_noreserve(frame);
[0ee077ee]414 }
415}
[00b595b]416
[cc73a8a1]417/** @}
[b45c443]418 */
Note: See TracBrowser for help on using the repository browser.