source: mainline/kernel/generic/src/mm/backend_elf.c@ b838fdf

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since b838fdf was b838fdf, checked in by Jakub Jermar <jakub@…>, 14 years ago

Deploy the noreserve functions in address space area backends that allocate physical memory.

  • Property mode set to 100644
File size: 10.0 KB
RevLine 
[0ee077ee]1/*
[df4ed85]2 * Copyright (c) 2006 Jakub Jermar
[0ee077ee]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[cc73a8a1]29/** @addtogroup genericmm
[b45c443]30 * @{
31 */
32
[0ee077ee]33/**
[b45c443]34 * @file
[0ee077ee]35 * @brief Backend for address space areas backed by an ELF image.
36 */
37
[d4b5542]38#include <lib/elf.h>
[0ee077ee]39#include <debug.h>
[d99c1d2]40#include <typedefs.h>
[0ee077ee]41#include <mm/as.h>
42#include <mm/frame.h>
43#include <mm/slab.h>
[00b595b]44#include <mm/page.h>
45#include <genarch/mm/page_pt.h>
46#include <genarch/mm/page_ht.h>
[0ee077ee]47#include <align.h>
48#include <memstr.h>
49#include <macros.h>
50#include <arch.h>
[36e86862]51#include <arch/barrier.h>
[0ee077ee]52
[9f63a83]53#ifdef CONFIG_VIRT_IDX_DCACHE
54#include <arch/mm/cache.h>
55#endif
56
[7f1c620]57static int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access);
58static void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame);
[00b595b]59static void elf_share(as_area_t *area);
[0ee077ee]60
61mem_backend_t elf_backend = {
62 .page_fault = elf_page_fault,
63 .frame_free = elf_frame_free,
[00b595b]64 .share = elf_share
[0ee077ee]65};
66
67/** Service a page fault in the ELF backend address space area.
68 *
69 * The address space area and page tables must be already locked.
70 *
[36e86862]71 * @param area Pointer to the address space area.
72 * @param addr Faulting virtual address.
73 * @param access Access mode that caused the fault (i.e.
74 * read/write/exec).
[0ee077ee]75 *
[36e86862]76 * @return AS_PF_FAULT on failure (i.e. page fault) or AS_PF_OK
77 * on success (i.e. serviced).
[0ee077ee]78 */
[7f1c620]79int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access)
[0ee077ee]80{
[127c957b]81 elf_header_t *elf = area->backend_data.elf;
82 elf_segment_header_t *entry = area->backend_data.segment;
[00b595b]83 btree_node_t *leaf;
[1cc2974]84 uintptr_t base, frame, page, start_anon;
[98000fb]85 size_t i;
[454f1da]86 bool dirty = false;
[0ee077ee]87
[1d432f9]88 ASSERT(page_table_locked(AS));
89 ASSERT(mutex_locked(&area->lock));
90
[0ee077ee]91 if (!as_area_check_access(area, access))
92 return AS_PF_FAULT;
93
[1cc2974]94 ASSERT((addr >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) &&
[d5bd8d7]95 (addr < entry->p_vaddr + entry->p_memsz));
[1cc2974]96 i = (addr - ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) >> PAGE_WIDTH;
97 base = (uintptr_t)
98 (((void *) elf) + ALIGN_DOWN(entry->p_offset, PAGE_SIZE));
99
100 /* Virtual address of faulting page*/
101 page = ALIGN_DOWN(addr, PAGE_SIZE);
102
103 /* Virtual address of the end of initialized part of segment */
104 start_anon = entry->p_vaddr + entry->p_filesz;
[00b595b]105
106 if (area->sh_info) {
107 bool found = false;
108
109 /*
110 * The address space area is shared.
111 */
[1cc2974]112
[00b595b]113 mutex_lock(&area->sh_info->lock);
[7f1c620]114 frame = (uintptr_t) btree_search(&area->sh_info->pagemap,
[1cc2974]115 page - area->base, &leaf);
[00b595b]116 if (!frame) {
[6c441cf8]117 unsigned int i;
[00b595b]118
119 /*
120 * Workaround for valid NULL address.
121 */
122
123 for (i = 0; i < leaf->keys; i++) {
[6461d286]124 if (leaf->key[i] == page - area->base) {
[00b595b]125 found = true;
126 break;
127 }
128 }
129 }
130 if (frame || found) {
[c9d2235b]131 frame_reference_add(ADDR2PFN(frame));
[d5bd8d7]132 page_mapping_insert(AS, addr, frame,
133 as_area_get_flags(area));
[1cc2974]134 if (!used_space_insert(area, page, 1))
[f651e80]135 panic("Cannot insert used space.");
[00b595b]136 mutex_unlock(&area->sh_info->lock);
137 return AS_PF_OK;
138 }
139 }
[1cc2974]140
[00b595b]141 /*
[d5bd8d7]142 * The area is either not shared or the pagemap does not contain the
143 * mapping.
[00b595b]144 */
[1cc2974]145 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]146 /*
147 * Initialized portion of the segment. The memory is backed
148 * directly by the content of the ELF image. Pages are
149 * only copied if the segment is writable so that there
150 * can be more instantions of the same memory ELF image
151 * used at a time. Note that this could be later done
152 * as COW.
153 */
154 if (entry->p_flags & PF_W) {
[b838fdf]155 frame = (uintptr_t)frame_alloc_noreserve(ONE_FRAME, 0);
[d5bd8d7]156 memcpy((void *) PA2KA(frame),
157 (void *) (base + i * FRAME_SIZE), FRAME_SIZE);
[62cd66f]158 if (entry->p_flags & PF_X) {
[3759681]159 smc_coherence_block((void *) PA2KA(frame),
160 FRAME_SIZE);
[62cd66f]161 }
[454f1da]162 dirty = true;
[0ee077ee]163 } else {
[1cc2974]164 frame = KA2PA(base + i * FRAME_SIZE);
[0ee077ee]165 }
[1cc2974]166 } else if (page >= start_anon) {
[0ee077ee]167 /*
168 * This is the uninitialized portion of the segment.
169 * It is not physically present in the ELF image.
170 * To resolve the situation, a frame must be allocated
171 * and cleared.
172 */
[b838fdf]173 frame = (uintptr_t) frame_alloc_noreserve(ONE_FRAME, 0);
[e32e092]174 memsetb((void *) PA2KA(frame), FRAME_SIZE, 0);
[454f1da]175 dirty = true;
[0ee077ee]176 } else {
[1cc2974]177 size_t pad_lo, pad_hi;
[0ee077ee]178 /*
179 * The mixed case.
[1cc2974]180 *
181 * The middle part is backed by the ELF image and
182 * the lower and upper parts are anonymous memory.
183 * (The segment can be and often is shorter than 1 page).
[0ee077ee]184 */
[1cc2974]185 if (page < entry->p_vaddr)
186 pad_lo = entry->p_vaddr - page;
187 else
188 pad_lo = 0;
189
190 if (start_anon < page + PAGE_SIZE)
191 pad_hi = page + PAGE_SIZE - start_anon;
192 else
193 pad_hi = 0;
194
[b838fdf]195 frame = (uintptr_t) frame_alloc_noreserve(ONE_FRAME, 0);
[1cc2974]196 memcpy((void *) (PA2KA(frame) + pad_lo),
197 (void *) (base + i * FRAME_SIZE + pad_lo),
198 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]199 if (entry->p_flags & PF_X) {
[3759681]200 smc_coherence_block((void *) (PA2KA(frame) + pad_lo),
201 FRAME_SIZE - pad_lo - pad_hi);
[62cd66f]202 }
[e32e092]203 memsetb((void *) PA2KA(frame), pad_lo, 0);
[36e86862]204 memsetb((void *) (PA2KA(frame) + FRAME_SIZE - pad_hi), pad_hi,
205 0);
[454f1da]206 dirty = true;
[1cc2974]207 }
[00b595b]208
[1cc2974]209 if (dirty && area->sh_info) {
210 frame_reference_add(ADDR2PFN(frame));
211 btree_insert(&area->sh_info->pagemap, page - area->base,
212 (void *) frame, leaf);
[0ee077ee]213 }
[1cc2974]214
[00b595b]215 if (area->sh_info)
216 mutex_unlock(&area->sh_info->lock);
[1cc2974]217
[0ee077ee]218 page_mapping_insert(AS, addr, frame, as_area_get_flags(area));
[1cc2974]219 if (!used_space_insert(area, page, 1))
[f651e80]220 panic("Cannot insert used space.");
[0ee077ee]221
222 return AS_PF_OK;
223}
224
225/** Free a frame that is backed by the ELF backend.
226 *
227 * The address space area and page tables must be already locked.
228 *
[36e86862]229 * @param area Pointer to the address space area.
230 * @param page Page that is mapped to frame. Must be aligned to
231 * PAGE_SIZE.
232 * @param frame Frame to be released.
[0ee077ee]233 *
234 */
[7f1c620]235void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame)
[0ee077ee]236{
[127c957b]237 elf_segment_header_t *entry = area->backend_data.segment;
[137691a]238 uintptr_t start_anon;
[1cc2974]239
[1d432f9]240 ASSERT(page_table_locked(area->as));
241 ASSERT(mutex_locked(&area->lock));
242
243 ASSERT(page >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE));
244 ASSERT(page < entry->p_vaddr + entry->p_memsz);
245
[1cc2974]246 start_anon = entry->p_vaddr + entry->p_filesz;
247
248 if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) {
[0ee077ee]249 if (entry->p_flags & PF_W) {
250 /*
[d5bd8d7]251 * Free the frame with the copy of writable segment
252 * data.
[0ee077ee]253 */
[b838fdf]254 frame_free_noreserve(frame);
[0ee077ee]255 }
256 } else {
257 /*
[d5bd8d7]258 * The frame is either anonymous memory or the mixed case (i.e.
259 * lower part is backed by the ELF image and the upper is
260 * anonymous). In any case, a frame needs to be freed.
[137691a]261 */
[b838fdf]262 frame_free_noreserve(frame);
[0ee077ee]263 }
264}
[00b595b]265
266/** Share ELF image backed address space area.
267 *
268 * If the area is writable, then all mapped pages are duplicated in the pagemap.
269 * Otherwise only portions of the area that are not backed by the ELF image
270 * are put into the pagemap.
271 *
[36e86862]272 * @param area Address space area.
[00b595b]273 */
274void elf_share(as_area_t *area)
275{
276 elf_segment_header_t *entry = area->backend_data.segment;
277 link_t *cur;
278 btree_node_t *leaf, *node;
[7f1c620]279 uintptr_t start_anon = entry->p_vaddr + entry->p_filesz;
[00b595b]280
[1d432f9]281 ASSERT(mutex_locked(&area->as->lock));
282 ASSERT(mutex_locked(&area->lock));
283
[00b595b]284 /*
285 * Find the node in which to start linear search.
286 */
287 if (area->flags & AS_AREA_WRITE) {
[d5bd8d7]288 node = list_get_instance(area->used_space.leaf_head.next,
289 btree_node_t, leaf_link);
[00b595b]290 } else {
291 (void) btree_search(&area->sh_info->pagemap, start_anon, &leaf);
[d5bd8d7]292 node = btree_leaf_node_left_neighbour(&area->sh_info->pagemap,
293 leaf);
[00b595b]294 if (!node)
295 node = leaf;
296 }
297
298 /*
299 * Copy used anonymous portions of the area to sh_info's page map.
300 */
301 mutex_lock(&area->sh_info->lock);
[d5bd8d7]302 for (cur = &node->leaf_link; cur != &area->used_space.leaf_head;
303 cur = cur->next) {
[6c441cf8]304 unsigned int i;
[00b595b]305
306 node = list_get_instance(cur, btree_node_t, leaf_link);
307
308 for (i = 0; i < node->keys; i++) {
[7f1c620]309 uintptr_t base = node->key[i];
[98000fb]310 size_t count = (size_t) node->value[i];
[6c441cf8]311 unsigned int j;
[00b595b]312
313 /*
314 * Skip read-only areas of used space that are backed
315 * by the ELF image.
316 */
317 if (!(area->flags & AS_AREA_WRITE))
[1cc2974]318 if (base >= entry->p_vaddr &&
319 base + count * PAGE_SIZE <= start_anon)
[00b595b]320 continue;
321
322 for (j = 0; j < count; j++) {
323 pte_t *pte;
324
325 /*
[d5bd8d7]326 * Skip read-only pages that are backed by the
327 * ELF image.
[00b595b]328 */
329 if (!(area->flags & AS_AREA_WRITE))
[1cc2974]330 if (base >= entry->p_vaddr &&
331 base + (j + 1) * PAGE_SIZE <=
[d5bd8d7]332 start_anon)
[00b595b]333 continue;
334
335 page_table_lock(area->as, false);
[d5bd8d7]336 pte = page_mapping_find(area->as,
337 base + j * PAGE_SIZE);
338 ASSERT(pte && PTE_VALID(pte) &&
339 PTE_PRESENT(pte));
340 btree_insert(&area->sh_info->pagemap,
341 (base + j * PAGE_SIZE) - area->base,
[c03ee1c]342 (void *) PTE_GET_FRAME(pte), NULL);
[00b595b]343 page_table_unlock(area->as, false);
[d5bd8d7]344
345 pfn_t pfn = ADDR2PFN(PTE_GET_FRAME(pte));
346 frame_reference_add(pfn);
[00b595b]347 }
348
349 }
350 }
351 mutex_unlock(&area->sh_info->lock);
352}
[b45c443]353
[cc73a8a1]354/** @}
[b45c443]355 */
Note: See TracBrowser for help on using the repository browser.