Rev 2927 | Rev 3153 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 2927 | Rev 3009 | ||
---|---|---|---|
1 | /* |
1 | /* |
2 | * Copyright (c) 2006 Jakub Jermar |
2 | * Copyright (c) 2006 Jakub Jermar |
3 | * All rights reserved. |
3 | * All rights reserved. |
4 | * |
4 | * |
5 | * Redistribution and use in source and binary forms, with or without |
5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions |
6 | * modification, are permitted provided that the following conditions |
7 | * are met: |
7 | * are met: |
8 | * |
8 | * |
9 | * - Redistributions of source code must retain the above copyright |
9 | * - Redistributions of source code must retain the above copyright |
10 | * notice, this list of conditions and the following disclaimer. |
10 | * notice, this list of conditions and the following disclaimer. |
11 | * - Redistributions in binary form must reproduce the above copyright |
11 | * - Redistributions in binary form must reproduce the above copyright |
12 | * notice, this list of conditions and the following disclaimer in the |
12 | * notice, this list of conditions and the following disclaimer in the |
13 | * documentation and/or other materials provided with the distribution. |
13 | * documentation and/or other materials provided with the distribution. |
14 | * - The name of the author may not be used to endorse or promote products |
14 | * - The name of the author may not be used to endorse or promote products |
15 | * derived from this software without specific prior written permission. |
15 | * derived from this software without specific prior written permission. |
16 | * |
16 | * |
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
27 | */ |
27 | */ |
28 | 28 | ||
29 | /** @addtogroup genericmm |
29 | /** @addtogroup genericmm |
30 | * @{ |
30 | * @{ |
31 | */ |
31 | */ |
32 | 32 | ||
33 | /** |
33 | /** |
34 | * @file |
34 | * @file |
35 | * @brief Backend for address space areas backed by an ELF image. |
35 | * @brief Backend for address space areas backed by an ELF image. |
36 | */ |
36 | */ |
37 | 37 | ||
38 | #include <lib/elf.h> |
38 | #include <lib/elf.h> |
39 | #include <debug.h> |
39 | #include <debug.h> |
40 | #include <arch/types.h> |
40 | #include <arch/types.h> |
41 | #include <mm/as.h> |
41 | #include <mm/as.h> |
42 | #include <mm/frame.h> |
42 | #include <mm/frame.h> |
43 | #include <mm/slab.h> |
43 | #include <mm/slab.h> |
44 | #include <mm/page.h> |
44 | #include <mm/page.h> |
45 | #include <genarch/mm/page_pt.h> |
45 | #include <genarch/mm/page_pt.h> |
46 | #include <genarch/mm/page_ht.h> |
46 | #include <genarch/mm/page_ht.h> |
47 | #include <align.h> |
47 | #include <align.h> |
48 | #include <memstr.h> |
48 | #include <memstr.h> |
49 | #include <macros.h> |
49 | #include <macros.h> |
50 | #include <arch.h> |
50 | #include <arch.h> |
51 | 51 | ||
52 | #ifdef CONFIG_VIRT_IDX_DCACHE |
52 | #ifdef CONFIG_VIRT_IDX_DCACHE |
53 | #include <arch/mm/cache.h> |
53 | #include <arch/mm/cache.h> |
54 | #endif |
54 | #endif |
55 | 55 | ||
56 | static int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access); |
56 | static int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access); |
57 | static void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame); |
57 | static void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame); |
58 | static void elf_share(as_area_t *area); |
58 | static void elf_share(as_area_t *area); |
59 | 59 | ||
60 | mem_backend_t elf_backend = { |
60 | mem_backend_t elf_backend = { |
61 | .page_fault = elf_page_fault, |
61 | .page_fault = elf_page_fault, |
62 | .frame_free = elf_frame_free, |
62 | .frame_free = elf_frame_free, |
63 | .share = elf_share |
63 | .share = elf_share |
64 | }; |
64 | }; |
65 | 65 | ||
66 | /** Service a page fault in the ELF backend address space area. |
66 | /** Service a page fault in the ELF backend address space area. |
67 | * |
67 | * |
68 | * The address space area and page tables must be already locked. |
68 | * The address space area and page tables must be already locked. |
69 | * |
69 | * |
70 | * @param area Pointer to the address space area. |
70 | * @param area Pointer to the address space area. |
71 | * @param addr Faulting virtual address. |
71 | * @param addr Faulting virtual address. |
72 | * @param access Access mode that caused the fault (i.e. read/write/exec). |
72 | * @param access Access mode that caused the fault (i.e. read/write/exec). |
73 | * |
73 | * |
74 | * @return AS_PF_FAULT on failure (i.e. page fault) or AS_PF_OK on success (i.e. |
74 | * @return AS_PF_FAULT on failure (i.e. page fault) or AS_PF_OK on success (i.e. |
75 | * serviced). |
75 | * serviced). |
76 | */ |
76 | */ |
77 | int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access) |
77 | int elf_page_fault(as_area_t *area, uintptr_t addr, pf_access_t access) |
78 | { |
78 | { |
79 | elf_header_t *elf = area->backend_data.elf; |
79 | elf_header_t *elf = area->backend_data.elf; |
80 | elf_segment_header_t *entry = area->backend_data.segment; |
80 | elf_segment_header_t *entry = area->backend_data.segment; |
81 | btree_node_t *leaf; |
81 | btree_node_t *leaf; |
82 | uintptr_t base, frame; |
82 | uintptr_t base, frame, page, start_anon; |
83 | index_t i; |
83 | index_t i; |
84 | bool dirty = false; |
84 | bool dirty = false; |
85 | 85 | ||
86 | if (!as_area_check_access(area, access)) |
86 | if (!as_area_check_access(area, access)) |
87 | return AS_PF_FAULT; |
87 | return AS_PF_FAULT; |
88 | 88 | ||
89 | ASSERT((addr >= entry->p_vaddr) && |
89 | ASSERT((addr >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) && |
90 | (addr < entry->p_vaddr + entry->p_memsz)); |
90 | (addr < entry->p_vaddr + entry->p_memsz)); |
91 | i = (addr - entry->p_vaddr) >> PAGE_WIDTH; |
91 | i = (addr - ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) >> PAGE_WIDTH; |
- | 92 | base = (uintptr_t) |
|
92 | base = (uintptr_t) (((void *) elf) + entry->p_offset); |
93 | (((void *) elf) + ALIGN_DOWN(entry->p_offset, PAGE_SIZE)); |
- | 94 | ||
- | 95 | /* Virtual address of faulting page*/ |
|
93 | ASSERT(ALIGN_UP(base, FRAME_SIZE) == base); |
96 | page = ALIGN_DOWN(addr, PAGE_SIZE); |
- | 97 | ||
- | 98 | /* Virtual address of the end of initialized part of segment */ |
|
- | 99 | start_anon = entry->p_vaddr + entry->p_filesz; |
|
94 | 100 | ||
95 | if (area->sh_info) { |
101 | if (area->sh_info) { |
96 | bool found = false; |
102 | bool found = false; |
97 | 103 | ||
98 | /* |
104 | /* |
99 | * The address space area is shared. |
105 | * The address space area is shared. |
100 | */ |
106 | */ |
101 | 107 | ||
102 | mutex_lock(&area->sh_info->lock); |
108 | mutex_lock(&area->sh_info->lock); |
103 | frame = (uintptr_t) btree_search(&area->sh_info->pagemap, |
109 | frame = (uintptr_t) btree_search(&area->sh_info->pagemap, |
104 | ALIGN_DOWN(addr, PAGE_SIZE) - area->base, &leaf); |
110 | page - area->base, &leaf); |
105 | if (!frame) { |
111 | if (!frame) { |
106 | unsigned int i; |
112 | unsigned int i; |
107 | 113 | ||
108 | /* |
114 | /* |
109 | * Workaround for valid NULL address. |
115 | * Workaround for valid NULL address. |
110 | */ |
116 | */ |
111 | 117 | ||
112 | for (i = 0; i < leaf->keys; i++) { |
118 | for (i = 0; i < leaf->keys; i++) { |
113 | if (leaf->key[i] == |
119 | if (leaf->key[i] == page) { |
114 | ALIGN_DOWN(addr, PAGE_SIZE)) { |
- | |
115 | found = true; |
120 | found = true; |
116 | break; |
121 | break; |
117 | } |
122 | } |
118 | } |
123 | } |
119 | } |
124 | } |
120 | if (frame || found) { |
125 | if (frame || found) { |
121 | frame_reference_add(ADDR2PFN(frame)); |
126 | frame_reference_add(ADDR2PFN(frame)); |
122 | page_mapping_insert(AS, addr, frame, |
127 | page_mapping_insert(AS, addr, frame, |
123 | as_area_get_flags(area)); |
128 | as_area_get_flags(area)); |
124 | if (!used_space_insert(area, |
129 | if (!used_space_insert(area, page, 1)) |
125 | ALIGN_DOWN(addr, PAGE_SIZE), 1)) |
- | |
126 | panic("Could not insert used space.\n"); |
130 | panic("Could not insert used space.\n"); |
127 | mutex_unlock(&area->sh_info->lock); |
131 | mutex_unlock(&area->sh_info->lock); |
128 | return AS_PF_OK; |
132 | return AS_PF_OK; |
129 | } |
133 | } |
130 | } |
134 | } |
131 | 135 | ||
132 | /* |
136 | /* |
133 | * The area is either not shared or the pagemap does not contain the |
137 | * The area is either not shared or the pagemap does not contain the |
134 | * mapping. |
138 | * mapping. |
135 | */ |
139 | */ |
136 | - | ||
137 | if (ALIGN_DOWN(addr, PAGE_SIZE) + PAGE_SIZE < |
- | |
138 | entry->p_vaddr + entry->p_filesz) { |
140 | if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) { |
139 | /* |
141 | /* |
140 | * Initialized portion of the segment. The memory is backed |
142 | * Initialized portion of the segment. The memory is backed |
141 | * directly by the content of the ELF image. Pages are |
143 | * directly by the content of the ELF image. Pages are |
142 | * only copied if the segment is writable so that there |
144 | * only copied if the segment is writable so that there |
143 | * can be more instantions of the same memory ELF image |
145 | * can be more instantions of the same memory ELF image |
144 | * used at a time. Note that this could be later done |
146 | * used at a time. Note that this could be later done |
145 | * as COW. |
147 | * as COW. |
146 | */ |
148 | */ |
147 | if (entry->p_flags & PF_W) { |
149 | if (entry->p_flags & PF_W) { |
148 | frame = (uintptr_t)frame_alloc(ONE_FRAME, 0); |
150 | frame = (uintptr_t)frame_alloc(ONE_FRAME, 0); |
149 | memcpy((void *) PA2KA(frame), |
151 | memcpy((void *) PA2KA(frame), |
150 | (void *) (base + i * FRAME_SIZE), FRAME_SIZE); |
152 | (void *) (base + i * FRAME_SIZE), FRAME_SIZE); |
151 | dirty = true; |
153 | dirty = true; |
152 | - | ||
153 | if (area->sh_info) { |
- | |
154 | frame_reference_add(ADDR2PFN(frame)); |
- | |
155 | btree_insert(&area->sh_info->pagemap, |
- | |
156 | ALIGN_DOWN(addr, PAGE_SIZE) - area->base, |
- | |
157 | (void *) frame, leaf); |
- | |
158 | } |
- | |
159 | - | ||
160 | } else { |
154 | } else { |
161 | frame = KA2PA(base + i*FRAME_SIZE); |
155 | frame = KA2PA(base + i * FRAME_SIZE); |
162 | } |
156 | } |
163 | } else if (ALIGN_DOWN(addr, PAGE_SIZE) >= |
157 | } else if (page >= start_anon) { |
164 | ALIGN_UP(entry->p_vaddr + entry->p_filesz, PAGE_SIZE)) { |
- | |
165 | /* |
158 | /* |
166 | * This is the uninitialized portion of the segment. |
159 | * This is the uninitialized portion of the segment. |
167 | * It is not physically present in the ELF image. |
160 | * It is not physically present in the ELF image. |
168 | * To resolve the situation, a frame must be allocated |
161 | * To resolve the situation, a frame must be allocated |
169 | * and cleared. |
162 | * and cleared. |
170 | */ |
163 | */ |
171 | frame = (uintptr_t)frame_alloc(ONE_FRAME, 0); |
164 | frame = (uintptr_t)frame_alloc(ONE_FRAME, 0); |
172 | memsetb(PA2KA(frame), FRAME_SIZE, 0); |
165 | memsetb(PA2KA(frame), FRAME_SIZE, 0); |
173 | dirty = true; |
166 | dirty = true; |
174 | - | ||
175 | if (area->sh_info) { |
- | |
176 | frame_reference_add(ADDR2PFN(frame)); |
- | |
177 | btree_insert(&area->sh_info->pagemap, |
- | |
178 | ALIGN_DOWN(addr, PAGE_SIZE) - area->base, |
- | |
179 | (void *) frame, leaf); |
- | |
180 | } |
- | |
181 | - | ||
182 | } else { |
167 | } else { |
183 | size_t size; |
168 | size_t pad_lo, pad_hi; |
184 | /* |
169 | /* |
185 | * The mixed case. |
170 | * The mixed case. |
- | 171 | * |
|
186 | * The lower part is backed by the ELF image and |
172 | * The middle part is backed by the ELF image and |
187 | * the upper part is anonymous memory. |
173 | * the lower and upper parts are anonymous memory. |
- | 174 | * (The segment can be and often is shorter than 1 page). |
|
188 | */ |
175 | */ |
- | 176 | if (page < entry->p_vaddr) |
|
189 | size = entry->p_filesz - (i<<PAGE_WIDTH); |
177 | pad_lo = entry->p_vaddr - page; |
- | 178 | else |
|
- | 179 | pad_lo = 0; |
|
- | 180 | ||
- | 181 | if (start_anon < page + PAGE_SIZE) |
|
- | 182 | pad_hi = page + PAGE_SIZE - start_anon; |
|
- | 183 | else |
|
- | 184 | pad_hi = 0; |
|
- | 185 | ||
190 | frame = (uintptr_t)frame_alloc(ONE_FRAME, 0); |
186 | frame = (uintptr_t)frame_alloc(ONE_FRAME, 0); |
191 | memsetb(PA2KA(frame) + size, FRAME_SIZE - size, 0); |
187 | memcpy((void *) (PA2KA(frame) + pad_lo), |
192 | memcpy((void *) PA2KA(frame), (void *) (base + i * FRAME_SIZE), |
188 | (void *) (base + i * FRAME_SIZE + pad_lo), |
193 | size); |
189 | FRAME_SIZE - pad_lo - pad_hi); |
- | 190 | memsetb(PA2KA(frame), pad_lo, 0); |
|
- | 191 | memsetb(PA2KA(frame) + FRAME_SIZE - pad_hi, pad_hi, 0); |
|
194 | dirty = true; |
192 | dirty = true; |
- | 193 | } |
|
195 | 194 | ||
196 | if (area->sh_info) { |
195 | if (dirty && area->sh_info) { |
197 | frame_reference_add(ADDR2PFN(frame)); |
196 | frame_reference_add(ADDR2PFN(frame)); |
198 | btree_insert(&area->sh_info->pagemap, |
197 | btree_insert(&area->sh_info->pagemap, page - area->base, |
199 | ALIGN_DOWN(addr, PAGE_SIZE) - area->base, |
- | |
200 | (void *) frame, leaf); |
198 | (void *) frame, leaf); |
201 | } |
- | |
202 | - | ||
203 | } |
199 | } |
204 | 200 | ||
205 | if (area->sh_info) |
201 | if (area->sh_info) |
206 | mutex_unlock(&area->sh_info->lock); |
202 | mutex_unlock(&area->sh_info->lock); |
207 | 203 | ||
208 | page_mapping_insert(AS, addr, frame, as_area_get_flags(area)); |
204 | page_mapping_insert(AS, addr, frame, as_area_get_flags(area)); |
209 | if (!used_space_insert(area, ALIGN_DOWN(addr, PAGE_SIZE), 1)) |
205 | if (!used_space_insert(area, page, 1)) |
210 | panic("Could not insert used space.\n"); |
206 | panic("Could not insert used space.\n"); |
211 | 207 | ||
212 | return AS_PF_OK; |
208 | return AS_PF_OK; |
213 | } |
209 | } |
214 | 210 | ||
215 | /** Free a frame that is backed by the ELF backend. |
211 | /** Free a frame that is backed by the ELF backend. |
216 | * |
212 | * |
217 | * The address space area and page tables must be already locked. |
213 | * The address space area and page tables must be already locked. |
218 | * |
214 | * |
219 | * @param area Pointer to the address space area. |
215 | * @param area Pointer to the address space area. |
220 | * @param page Page that is mapped to frame. Must be aligned to PAGE_SIZE. |
216 | * @param page Page that is mapped to frame. Must be aligned to PAGE_SIZE. |
221 | * @param frame Frame to be released. |
217 | * @param frame Frame to be released. |
222 | * |
218 | * |
223 | */ |
219 | */ |
224 | void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame) |
220 | void elf_frame_free(as_area_t *area, uintptr_t page, uintptr_t frame) |
225 | { |
221 | { |
226 | elf_header_t *elf = area->backend_data.elf; |
222 | elf_header_t *elf = area->backend_data.elf; |
227 | elf_segment_header_t *entry = area->backend_data.segment; |
223 | elf_segment_header_t *entry = area->backend_data.segment; |
228 | uintptr_t base; |
224 | uintptr_t base, start_anon; |
229 | index_t i; |
225 | index_t i; |
230 | 226 | ||
231 | ASSERT((page >= entry->p_vaddr) && |
227 | ASSERT((page >= ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) && |
232 | (page < entry->p_vaddr + entry->p_memsz)); |
228 | (page < entry->p_vaddr + entry->p_memsz)); |
233 | i = (page - entry->p_vaddr) >> PAGE_WIDTH; |
229 | i = (page - ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE)) >> PAGE_WIDTH; |
234 | base = (uintptr_t) (((void *) elf) + entry->p_offset); |
230 | base = (uintptr_t) (((void *) elf) + |
235 | ASSERT(ALIGN_UP(base, FRAME_SIZE) == base); |
231 | ALIGN_DOWN(entry->p_offset, FRAME_SIZE)); |
- | 232 | start_anon = entry->p_vaddr + entry->p_filesz; |
|
236 | 233 | ||
237 | if (page + PAGE_SIZE < |
- | |
238 | ALIGN_UP(entry->p_vaddr + entry->p_filesz, PAGE_SIZE)) { |
234 | if (page >= entry->p_vaddr && page + PAGE_SIZE <= start_anon) { |
239 | if (entry->p_flags & PF_W) { |
235 | if (entry->p_flags & PF_W) { |
240 | /* |
236 | /* |
241 | * Free the frame with the copy of writable segment |
237 | * Free the frame with the copy of writable segment |
242 | * data. |
238 | * data. |
243 | */ |
239 | */ |
244 | frame_free(frame); |
240 | frame_free(frame); |
245 | } |
241 | } |
246 | } else { |
242 | } else { |
247 | /* |
243 | /* |
248 | * The frame is either anonymous memory or the mixed case (i.e. |
244 | * The frame is either anonymous memory or the mixed case (i.e. |
249 | * lower part is backed by the ELF image and the upper is |
245 | * lower part is backed by the ELF image and the upper is |
250 | * anonymous). In any case, a frame needs to be freed. |
246 | * anonymous). In any case, a frame needs to be freed. |
251 | */ |
247 | */ |
252 | frame_free(frame); |
248 | frame_free(frame); |
253 | } |
249 | } |
254 | } |
250 | } |
255 | 251 | ||
256 | /** Share ELF image backed address space area. |
252 | /** Share ELF image backed address space area. |
257 | * |
253 | * |
258 | * If the area is writable, then all mapped pages are duplicated in the pagemap. |
254 | * If the area is writable, then all mapped pages are duplicated in the pagemap. |
259 | * Otherwise only portions of the area that are not backed by the ELF image |
255 | * Otherwise only portions of the area that are not backed by the ELF image |
260 | * are put into the pagemap. |
256 | * are put into the pagemap. |
261 | * |
257 | * |
262 | * The address space and address space area must be locked prior to the call. |
258 | * The address space and address space area must be locked prior to the call. |
263 | * |
259 | * |
264 | * @param area Address space area. |
260 | * @param area Address space area. |
265 | */ |
261 | */ |
266 | void elf_share(as_area_t *area) |
262 | void elf_share(as_area_t *area) |
267 | { |
263 | { |
268 | elf_segment_header_t *entry = area->backend_data.segment; |
264 | elf_segment_header_t *entry = area->backend_data.segment; |
269 | link_t *cur; |
265 | link_t *cur; |
270 | btree_node_t *leaf, *node; |
266 | btree_node_t *leaf, *node; |
271 | uintptr_t start_anon = entry->p_vaddr + entry->p_filesz; |
267 | uintptr_t start_anon = entry->p_vaddr + entry->p_filesz; |
272 | 268 | ||
273 | /* |
269 | /* |
274 | * Find the node in which to start linear search. |
270 | * Find the node in which to start linear search. |
275 | */ |
271 | */ |
276 | if (area->flags & AS_AREA_WRITE) { |
272 | if (area->flags & AS_AREA_WRITE) { |
277 | node = list_get_instance(area->used_space.leaf_head.next, |
273 | node = list_get_instance(area->used_space.leaf_head.next, |
278 | btree_node_t, leaf_link); |
274 | btree_node_t, leaf_link); |
279 | } else { |
275 | } else { |
280 | (void) btree_search(&area->sh_info->pagemap, start_anon, &leaf); |
276 | (void) btree_search(&area->sh_info->pagemap, start_anon, &leaf); |
281 | node = btree_leaf_node_left_neighbour(&area->sh_info->pagemap, |
277 | node = btree_leaf_node_left_neighbour(&area->sh_info->pagemap, |
282 | leaf); |
278 | leaf); |
283 | if (!node) |
279 | if (!node) |
284 | node = leaf; |
280 | node = leaf; |
285 | } |
281 | } |
286 | 282 | ||
287 | /* |
283 | /* |
288 | * Copy used anonymous portions of the area to sh_info's page map. |
284 | * Copy used anonymous portions of the area to sh_info's page map. |
289 | */ |
285 | */ |
290 | mutex_lock(&area->sh_info->lock); |
286 | mutex_lock(&area->sh_info->lock); |
291 | for (cur = &node->leaf_link; cur != &area->used_space.leaf_head; |
287 | for (cur = &node->leaf_link; cur != &area->used_space.leaf_head; |
292 | cur = cur->next) { |
288 | cur = cur->next) { |
293 | unsigned int i; |
289 | unsigned int i; |
294 | 290 | ||
295 | node = list_get_instance(cur, btree_node_t, leaf_link); |
291 | node = list_get_instance(cur, btree_node_t, leaf_link); |
296 | 292 | ||
297 | for (i = 0; i < node->keys; i++) { |
293 | for (i = 0; i < node->keys; i++) { |
298 | uintptr_t base = node->key[i]; |
294 | uintptr_t base = node->key[i]; |
299 | count_t count = (count_t) node->value[i]; |
295 | count_t count = (count_t) node->value[i]; |
300 | unsigned int j; |
296 | unsigned int j; |
301 | 297 | ||
302 | /* |
298 | /* |
303 | * Skip read-only areas of used space that are backed |
299 | * Skip read-only areas of used space that are backed |
304 | * by the ELF image. |
300 | * by the ELF image. |
305 | */ |
301 | */ |
306 | if (!(area->flags & AS_AREA_WRITE)) |
302 | if (!(area->flags & AS_AREA_WRITE)) |
- | 303 | if (base >= entry->p_vaddr && |
|
307 | if (base + count * PAGE_SIZE <= start_anon) |
304 | base + count * PAGE_SIZE <= start_anon) |
308 | continue; |
305 | continue; |
309 | 306 | ||
310 | for (j = 0; j < count; j++) { |
307 | for (j = 0; j < count; j++) { |
311 | pte_t *pte; |
308 | pte_t *pte; |
312 | 309 | ||
313 | /* |
310 | /* |
314 | * Skip read-only pages that are backed by the |
311 | * Skip read-only pages that are backed by the |
315 | * ELF image. |
312 | * ELF image. |
316 | */ |
313 | */ |
317 | if (!(area->flags & AS_AREA_WRITE)) |
314 | if (!(area->flags & AS_AREA_WRITE)) |
- | 315 | if (base >= entry->p_vaddr && |
|
318 | if (base + (j + 1) * PAGE_SIZE <= |
316 | base + (j + 1) * PAGE_SIZE <= |
319 | start_anon) |
317 | start_anon) |
320 | continue; |
318 | continue; |
321 | 319 | ||
322 | page_table_lock(area->as, false); |
320 | page_table_lock(area->as, false); |
323 | pte = page_mapping_find(area->as, |
321 | pte = page_mapping_find(area->as, |
324 | base + j * PAGE_SIZE); |
322 | base + j * PAGE_SIZE); |
325 | ASSERT(pte && PTE_VALID(pte) && |
323 | ASSERT(pte && PTE_VALID(pte) && |
326 | PTE_PRESENT(pte)); |
324 | PTE_PRESENT(pte)); |
327 | btree_insert(&area->sh_info->pagemap, |
325 | btree_insert(&area->sh_info->pagemap, |
328 | (base + j * PAGE_SIZE) - area->base, |
326 | (base + j * PAGE_SIZE) - area->base, |
329 | (void *) PTE_GET_FRAME(pte), NULL); |
327 | (void *) PTE_GET_FRAME(pte), NULL); |
330 | page_table_unlock(area->as, false); |
328 | page_table_unlock(area->as, false); |
331 | 329 | ||
332 | pfn_t pfn = ADDR2PFN(PTE_GET_FRAME(pte)); |
330 | pfn_t pfn = ADDR2PFN(PTE_GET_FRAME(pte)); |
333 | frame_reference_add(pfn); |
331 | frame_reference_add(pfn); |
334 | } |
332 | } |
335 | 333 | ||
336 | } |
334 | } |
337 | } |
335 | } |
338 | mutex_unlock(&area->sh_info->lock); |
336 | mutex_unlock(&area->sh_info->lock); |
339 | } |
337 | } |
340 | 338 | ||
341 | /** @} |
339 | /** @} |
342 | */ |
340 | */ |
343 | 341 |