source: trunk/kernel/mm/vmm.h @ 430

Last change on this file since 430 was 429, checked in by alain, 7 years ago

blap

File size: 26.5 KB
RevLine 
[1]1/*
2 * vmm.h - virtual memory management related operations
3 *
4 * Authors   Ghassan Almaless (2008,2009,2010,2011, 2012)
5 *           Mohamed Lamine Karaoui (2015)
[23]6 *           Alain Greiner (2016,2017)
[18]7 *
[1]8 * Copyright (c) UPMC Sorbonne Universites
9 *
10 * This file is part of ALMOS-MKH.
11 *
12 * ALMOS-MKH is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; version 2.0 of the License.
15 *
16 * ALMOS-MKH is distributed in the hope that it will be useful, but
17 * WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
19 * General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with ALMOS-MKH; if not, write to the Free Software Foundation,
23 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
24 */
25
26#ifndef _VMM_H_
27#define _VMM_H_
28
29#include <hal_types.h>
30#include <bits.h>
31#include <list.h>
32#include <spinlock.h>
33#include <hal_gpt.h>
34#include <vseg.h>
35#include <page.h>
36
37/****  Forward declarations  ****/
38
39struct process_s;
40
41/*********************************************************************************************
[407]42 * This structure defines the STACK allocator used by the VMM to dynamically handle
43 * a STACK vseg requested or released by an user process.
44 * This allocator handles a fixed size array of fixed size slots in the STACK zone.
[1]45 * The stack size and the number of slots are defined by the CONFIG_VMM_STACK_SIZE, and
[407]46 * CONFIG_VMM_STACK_BASE parameters.
[1]47 * Each slot can contain one user stack vseg. The first page in the slot is not allocated
48 * to detect stack overflow.
49 * The slot index can be computed form the slot base address, and reversely.
50 * All allocation / release operations are registered in the stack_bitmap, that completely
[18]51 * define the STACK zone state.
[1]52 ********************************************************************************************/
53
54typedef struct stack_mgr_s
55{
56    spinlock_t     lock;               /*! lock protecting STACK allocator                  */
57    vpn_t          vpn_base;           /*! first page of STACK zone                         */
58    bitmap_t       bitmap;             /*! bit bector of allocated stacks                   */
59}
60stack_mgr_t;
61
62/*********************************************************************************************
[407]63 * This structure defines the MMAP allocator used by the VMM to dynamically handle 
[1]64 * MMAP vsegs requested or released by an user process.
[18]65 * This allocator should be only used in the reference cluster.
66 * - allocation policy : all allocated vsegs occupy an integer number of pages that is
[1]67 *   power of 2, and are aligned on a page boundary. The requested number of pages is
[18]68 *   rounded if required. The first_free_vpn variable defines completely the MMAP zone state.
[1]69 *   It is never decremented, as the released vsegs are simply registered in a zombi_list.
[18]70 *   The relevant zombi_list is checked first for each allocation request.
[1]71 * - release policy : a released MMAP vseg is registered in an array of zombi_lists.
72 *   This array is indexed by ln(number of pages), and each entry contains the root of
73 *   a local list of zombi vsegs that have the same size. The physical memory allocated
74 *   for a zombi vseg descriptor is not released, to use the "list" field.
75 *   This physical memory allocated for MMAP vseg descriptors is actually released
76 *   when the VMM is destroyed.
77 ********************************************************************************************/
78
79typedef struct mmap_mgr_s
80{
81    spinlock_t     lock;               /*! lock protecting MMAP allocator                   */
82    vpn_t          vpn_base;           /*! first page of MMAP zone                          */
83    vpn_t          vpn_size;           /*! number of pages in MMAP zone                     */
84    vpn_t          first_free_vpn;     /*! first free page in MMAP zone                     */
85    list_entry_t   zombi_list[32];     /*! array of roots of released vsegs lists           */
86}
87mmap_mgr_t;
88
89/*********************************************************************************************
90 * This structure defines the Virtual Memory Manager for a given process in a given cluster.
[408]91 * This local VMM provides four main services:
92 * 1) It registers all vsegs in the local copy of the vseg list (VSL).
93 * 2) It contains the local copy of the generic page table (GPT).
94 * 3) The stack manager dynamically allocates virtual memory space for the STACK vsegs.
95 * 4) The mmap manager dynamically allocates virtual memory for the (FILE/ANON/REMOTE) vsegs.
96 ******************************************************a**************************************
97 * Implementation notes:
98 * 1. The VSL contains only local vsegs, but it is implemented as an xlist, and protected by
99 *    a remote_rwlock, because it can be accessed by a thread running in a remote cluster.
100 *    An exemple is the vmm_fork_copy() function.
101 * 2. In most custers, the VSL and GPT are only partial copies of the reference VSL and GPT
102 *    structures, stored in the reference cluster.
[1]103 ********************************************************************************************/
104
105typedef struct vmm_s
106{
[408]107        remote_rwlock_t  vsegs_lock;         /*! lock protecting the vsegs list                 */
108        xlist_entry_t    vsegs_root;         /*! VSL root (VSL only complete in reference)      */
109        uint32_t         vsegs_nr;           /*! total number of local vsegs                    */
[1]110
[408]111    gpt_t            gpt;                /*! Generic Page Table (complete in reference)     */
[1]112
[408]113    stack_mgr_t      stack_mgr;          /*! embedded STACK vsegs allocator                 */
114    mmap_mgr_t       mmap_mgr;           /*! embedded MMAP vsegs allocator                  */
[1]115
[408]116        uint32_t         pgfault_nr;         /*! page fault counter (instrumentation)           */
[1]117
[408]118    vpn_t            kent_vpn_base;      /*! kentry vseg first page                         */
119    vpn_t            args_vpn_base;      /*! args vseg first page                           */
120    vpn_t            envs_vpn_base;      /*! envs zone first page                           */
121    vpn_t            heap_vpn_base;      /*! envs zone first page                           */
122        vpn_t            code_vpn_base;      /*! code zone first page                           */
123        vpn_t            data_vpn_base;      /*! data zone first page                           */
[1]124
[408]125        intptr_t         entry_point;        /*! main thread entry point                        */
[1]126}
127vmm_t;
128
129/*********************************************************************************************
[406]130 * This function initialises the virtual memory manager attached to an user process.
[407]131 * - It initializes the STACK and MMAP allocators.
132 * - It registers the "kentry", "args", "envs" vsegs in the VSL.
[409]133 * - It initializes the generic page table, calling the HAL specific hal_gpt_init() function.
134 * - For TSAR it map all pages for the "kentry" vseg, that must be identity mapping.
135 * Note:
[407]136 * - The "code" and "data" vsegs are registered by the elf_load_process() function.
137 * - The "stack" vsegs are dynamically created by the thread_user_create() function.
[409]138 * - The "file", "anon", "remote" vsegs are dynamically created by the mmap() syscall.
[1]139 *********************************************************************************************
140 * @ process   : pointer on process descriptor
[415]141 * @ return 0 if success / return -1 if failure.
[1]142 ********************************************************************************************/
[415]143error_t vmm_init( struct process_s * process );
[1]144
145/*********************************************************************************************
[407]146 * This function displays on TXY0 the list or registered vsegs for a given <process>.
[429]147 * It must be executed by a thread running in reference cluster.
148 * If the <mapping> argument is true, it displays for each vseg all mapped PTEs in GPT.
[23]149 *********************************************************************************************
[407]150 * @ process   : pointer on process descriptor.
151 * @ mapping   : detailed mapping if true.
152 ********************************************************************************************/
153void vmm_display( struct process_s * process,
154                  bool_t             mapping );
155
156/*********************************************************************************************
[408]157 * This function is called by the process_fork_create() function. It partially copies
158 * the content of a remote parent process VMM to the local child process VMM:
159 * - all DATA, MMAP, REMOTE vsegs registered in the parent VSL are registered in the child
160 *   VSL, and all valid GPT entries in parent GPT are copied to the child GPT.
161 *   The WRITABLE flag is reset and the COW flag is set in child GPT.
162 * - all CODE vsegs registered in the parent VSL are registered in the child VSL, but the
163 *   GPT entries are not copied in the chilf GPT, that will be dynamically updated from
164 *   the .elf file when a page fault is reported.
165 * - all FILE vsegs registered in the parent VSL are registered in the child VSL, and all
166 *   valid GPT entries in parent GPT are copied to the child GPT. The COW flag is not set.
167 * - no STACK vseg is copied from  parent VMM to child VMM, because the child STACK vseg
168 *   must be copied from the cluster containing the user thread requesting the fork().
[407]169 *********************************************************************************************
[408]170 * @ child_process     : local pointer on local child process descriptor.
171 * @ parent_process_xp : extended pointer on remote parent process descriptor.
[415]172 * @ return 0 if success / return -1 if failure.
[23]173 ********************************************************************************************/
[408]174error_t vmm_fork_copy( struct process_s * child_process,
175                       xptr_t             parent_process_xp );
[23]176
177/*********************************************************************************************
[408]178 * This function is called by the process_make_fork() function to handle the fork syscall.
179 * It set the COW flag, and reset the WRITABLE flag of all GPT entries of the DATA, MMAP,
180 * and REMOTE vsegs of a process identified by the <process> argument.
181 * It must be called by a thread running in the reference cluster, that contains the complete
182 * list of vsegs. Use the rpc_vmm_set_cow_client() when the calling thread client is remote.
183 * It updates all copies of the process in all clusters, to maintain coherence in GPT copies,
184 * using the list of copies stored in the owner process, and using remote_write accesses to
185 * update the remote GPTs. It cannot fail, as only mapped entries in GPT copies are updated.
[1]186 *********************************************************************************************
[408]187 * @ process   : local pointer on local reference process descriptor.
188 ********************************************************************************************/
189void vmm_set_cow( struct process_s * process );
190
191/*********************************************************************************************
192 * This function is called by the vmm_get_pte() function in case of COW exception.
193 * It modifies both the PPN an the attributes for a GPT entry identified by the <process>
194 * and <vpn> arguments.
195 * It updates all copies of the process in all clusters, to maintain coherence in GPT copies,
196 * using the list of copies stored in the owner process, and using remote_write accesses to
197 * update the remote GPTs. It cannot fail, as only mapped entries in GPT copies are updated.
198 *********************************************************************************************
199 * @ process   : local pointer on local process descriptor.
200 * @ vpn       : PTE index.
201 * @ attr      : PTE / attributes.
202 * @ ppn       : PTE / physical page index.
203 ********************************************************************************************/
204void vmm_update_pte( struct process_s * process,
205                     vpn_t              vpn,
206                     uint32_t           attr,
207                     ppn_t              ppn );
208
209/*********************************************************************************************
[409]210 * This function scan the list of vsegs registered in the VSL of the process
211 * identified by the <process> argument, and for each vseg:
212 * - it unmap from the GPT and releases all mapped pages in vseg.
213 * - it removes the vseg from the process VSL.
214 * - It releases the memory allocated to the vseg descriptor.
215 * Finally, it releases the memory allocated to the GPT itself.
[408]216 *********************************************************************************************
[23]217 * @ process   : pointer on process descriptor.
[1]218 ********************************************************************************************/
219void vmm_destroy( struct process_s * process );
220
221/*********************************************************************************************
[18]222 * This function scans the list of vsegs registered in the VMM of a given process descriptor
[1]223 * to check if a given virtual region (defined by a base and size) overlap an existing vseg.
224 *********************************************************************************************
225 * @ process  : pointer on process descriptor.
226 * @ base     : region virtual base address.
227 * @ size     : region size (bytes).
228 * @ returns NULL if no conflict / return conflicting vseg pointer if conflict.
229 ********************************************************************************************/
230vseg_t * vmm_check_conflict( struct process_s * process,
231                             vpn_t              base,
232                             vpn_t              size );
233
234/*********************************************************************************************
[18]235 * This function allocates memory for a vseg descriptor, initialises it, and register it
[407]236 * in the VMM of the local process descriptor, that should be the reference process.
237 * For the 'stack", "file", "anon", & "remote" types, it does not use the <base> argument,
238 * but uses the STACK and MMAP virtual memory allocators.
239 * It checks collision with all pre-existing vsegs.
240 * To comply with the "on-demand" paging policy, this function does NOT modify the page table,
241 * and does not allocate physical memory for vseg data.
242 * It should be called by a local thread (could be a RPC thread if the client thread is not
243 * running in the regerence cluster).
[1]244 *********************************************************************************************
[407]245 * @ process     : pointer on local processor descriptor.
246 * @ type        : vseg type.
247 * @ base        : vseg base address (not used for dynamically allocated vsegs).
248 * @ size        : vseg size (bytes).
249 * @ file_offset : offset in file for CODE, DATA, FILE types.
250 * @ file_size   : can be smaller than "size" for DATA type.
251 * @ mapper_xp   : extended pointer on mapper for CODE, DATA, FILE types.
252 * @ cxy         : physical mapping cluster (for non distributed vsegs).
253 * @ returns pointer on vseg if success / returns NULL if no memory, or conflict.
[1]254 ********************************************************************************************/
255vseg_t * vmm_create_vseg( struct process_s * process,
[407]256                          vseg_type_t        type,
[18]257                          intptr_t           base,
[407]258                              uint32_t           size,
259                          uint32_t           file_offset,
260                          uint32_t           file_size,
261                          xptr_t             mapper_xp,
262                          cxy_t              cxy );
[1]263
264/*********************************************************************************************
[18]265 * This function removes a vseg identified by it's pointer from the VMM of the calling process.
[1]266 * - If the vseg has not the STACK or MMAP type, it is removed from the vsegs list,
267 *   and the physical memory allocated to vseg descriptor is released to KMEM.
268 * - If the vseg has the STACK type, it is removed from the vsegs list, the physical memory
269 *   allocated to vseg descriptor is released to KMEM, and the stack slot is returned to the
270 *   VMM STACK allocator.
271 * - If the vseg has the MMAP type, it is removed from the vsegs list and is registered
272 *   in the zombi_list of the VMM MMAP allocator for future reuse. The physical memory
273 *   allocated to vseg descriptor is NOT released to KMEM.
274 *********************************************************************************************
275 * @ vseg      : pointer on vseg to be removed.
276 ********************************************************************************************/
277void vmm_remove_vseg( vseg_t * vseg );
278
279/*********************************************************************************************
[18]280 * This function allocates physical memory from the local cluster to map all PTEs
[1]281 * of a "kernel" vseg (type KCODE , KDATA, or KDEV) in the page table of process_zero.
[68]282 * WARNING : It should not be used for "user" vsegs, that must be mapped using the
[1]283 * "on-demand-paging" policy.
284 *********************************************************************************************
285 * @ vseg     : pointer on the vseg to be mapped.
286 * @ attr     : GPT attributes to be set for all vseg pages.
287 * @ returns 0 if success / returns ENOMEM if no memory
288 ********************************************************************************************/
[68]289error_t vmm_map_kernel_vseg( vseg_t           * vseg,
290                             uint32_t           attr );
[1]291
292/*********************************************************************************************
[409]293 * This function unmaps all mapped PTEs of a given vseg, from the generic page table
294 * associated to a given process descriptor, and releases the physical memory allocated
295 * to all mapped GPT entries.  It can be used for any type of vseg.
[1]296 *********************************************************************************************
297 * @ process  : pointer on process descriptor.
298 * @ vseg     : pointer on the vseg to be unmapped.
299 ********************************************************************************************/
300void vmm_unmap_vseg( struct process_s * process,
301                     vseg_t           * vseg );
302
303/*********************************************************************************************
[18]304 * This function removes a given region (defined by a base address and a size) from
[407]305 * the VMM of a given process descriptor. This can modify the number of vsegs:
[1]306 * (a) if the region is not entirely mapped in an existing vseg, it's an error.
307 * (b) if the region has same base and size as an existing vseg, the vseg is removed.
[406]308 * (c) if the removed region cut the vseg in two parts, it is modified.
309 * (d) if the removed region cut the vseg in three parts, it is modified, and a new
310 *     vseg is created with same type.
[407]311 * FIXME [AG] this function must be called by a thread running in the reference cluster,
312 * and the VMM must be updated in all process descriptors copies.
[1]313 *********************************************************************************************
314 * @ process   : pointer on process descriptor
315 * @ base      : vseg base address
316 * @ size      : vseg size (bytes)
317 ********************************************************************************************/
318error_t vmm_resize_vseg( struct process_s * process,
319                         intptr_t           base,
320                         intptr_t           size );
321
322/*********************************************************************************************
[388]323 * This function checks that a given virtual address is contained in a registered vseg.
[399]324 * It can be called by any thread running in any cluster:
325 * - if the vseg is registered in the local process VMM, it returns the local vseg pointer.
[388]326 * - if the vseg is missing in local VMM, it uses a RPC to get it from the reference cluster,
327 *   register it in local VMM and returns the local vseg pointer, if success.
[406]328 * - it returns an user error if the vseg is missing in the reference VMM, or if there is
329 *   not enough memory for a new vseg descriptor in cluster containing the calling thread.
[1]330 *********************************************************************************************
[388]331 * @ process   : [in] pointer on process descriptor
332 * @ vaddr     : [in] virtual address
333 * @ vseg      : [out] pointer on found vseg
334 * @ returns 0 if success / returns -1 if user error.
[1]335 *********************************************************************************************/
[388]336error_t vmm_get_vseg( struct process_s  * process,
337                      intptr_t            vaddr,
[394]338                      vseg_t           ** vseg );           
[1]339
340/*********************************************************************************************
[407]341 * This function is called by the generic exception handler when a page-fault event
[23]342 * has been detected in a given cluster.
[407]343 * - If the local cluster is the reference, it call directly the vmm_get_pte() function.
[401]344 * - If the local cluster is not the reference cluster, it send a RPC_VMM_GET_PTE
[407]345 *   to the reference cluster to get the missing PTE attributes and PPN,
346 *   and update the local page table.
[1]347 *********************************************************************************************
348 * @ process   : pointer on process descriptor.
349 * @ vpn       : VPN of the missing PTE.
350 * @ returns 0 if success / returns ENOMEM if no memory.
351 ********************************************************************************************/
352error_t vmm_handle_page_fault( struct process_s * process,
[18]353                               vpn_t              vpn );
[1]354
355/*********************************************************************************************
[407]356 * This function is called by the generic exception handler when a copy-on-write event
357 * has been detected in a given cluster.
358 * - If the local cluster is the reference, it call directly the vmm_get_pte() function.
359 * - If the local cluster is not the reference cluster, it send a RPC_VMM_GET_PTE
360 *   to the reference cluster to get the missing PTE attributes and PPN,
361 *   and update the local page table.
[1]362 *********************************************************************************************
[407]363 * @ process   : pointer on process descriptor.
364 * @ vpn       : VPN of the missing PTE.
365 * @ returns 0 if success / returns ENOMEM if no memory.
366 ********************************************************************************************/
[408]367error_t vmm_handle_cow( struct process_s * process,
368                        vpn_t              vpn );
[407]369
370/*********************************************************************************************
371 * This function is called when a new PTE (GPT entry) is required because a "page-fault",
372 * or "copy-on_write" event has been detected for a given <vpn> in a given <process>.
373 * The <cow> argument defines the type of event to be handled.
374 * This function must be called by a thread running in reference cluster, and the vseg
375 * containing the searched VPN should be registered in the reference VMM.
376 * - for an actual page-fault, it allocates the missing physical page from the target cluster
377 *   defined by the vseg type, initialize it, and update the reference page table.
378 * - for a copy-on-write, it allocates a new physical page from the target cluster,
379 *   initialise it from the old physical page, and update the reference page table.
380 * In both cases, it calls the RPC_PMEM_GET_PAGES to get the new physical page if the
381 * target cluster is not the reference cluster.
382 * It returns in the <attr> and <ppn> arguments the accessed or modified PTE.
383 *********************************************************************************************
[1]384 * @ process   : [in] pointer on process descriptor.
385 * @ vpn       : [in] VPN defining the missing PTE.
[407]386 * @ cow       : [in] "copy_on_write" if true / "page_fault" if false.
[1]387 * @ attr      : [out] PTE attributes.
388 * @ ppn       : [out] PTE ppn.
389 * @ returns 0 if success / returns ENOMEM if error.
390 ********************************************************************************************/
391error_t vmm_get_pte( struct process_s * process,
392                     vpn_t              vpn,
[407]393                     bool_t             cow,
[1]394                     uint32_t         * attr,
395                     ppn_t            * ppn );
396
397/*********************************************************************************************
[401]398 * This function is called by the vmm_get_pte() function when a page is unmapped.
[313]399 * Depending on the vseg type, defined by the <vseg> argument, it returns the PPN
400 * (Physical Page Number) associated to a missing page defined by the <vpn> argument.
[406]401 * - For the FILE type, it returns directly the physical page from the file mapper.
402 * - For the CODE and DATA types, it allocates a new phsical page from the cluster defined
403 *   by the <vseg->cxy> field, or by the <vpn> MSB bits for a distributed vseg,
404 *   and initialize this page from the .elf file mapper.
405 * - For all other types, it allocates a new physical page from the cluster defined
406 *   by the <vseg->cxy> field, or by the <vpn> MSB bits for a distributed vseg,
407 *   but the new page is not initialized.
[313]408 *********************************************************************************************
409 * @ vseg   : local pointer on vseg containing the mising page.
410 * @ vpn    : Virtual Page Number identifying the missing page.
411 * @ ppn    : [out] returned Physical Page Number.
[401]412 * return 0 if success / return EINVAL or ENOMEM if error.
[313]413 ********************************************************************************************/
414error_t vmm_get_one_ppn( vseg_t * vseg,
415                         vpn_t    vpn,
416                         ppn_t  * ppn );
417
418/*********************************************************************************************
[18]419 * This function makes the virtual to physical address translation, using the calling
[68]420 * process page table. It uses identity mapping if required by the <ident> argument.
[23]421 * This address translation is required to configure the peripherals having a DMA
422 * capability, or to implement the software L2/L3 cache cohérence, using the MMC device
423 * synchronisation primitives.
424 * WARNING : the <ident> value must be defined by the CONFIG_KERNEL_IDENTITY_MAP parameter.
[1]425 *********************************************************************************************
426 * @ ident     : [in] uses identity mapping if true.
427 * @ ptr       : [in] virtual address.
428 * @ paddr     : [out] pointer on buffer for physical address.
429 * @ returns 0 if success / returns ENOMEM if error.
430 ********************************************************************************************/
431error_t vmm_v2p_translate( bool_t    ident,
432                           void    * ptr,
433                           paddr_t * paddr );
434
435
436
437#endif /* _VMM_H_ */
Note: See TracBrowser for help on using the repository browser.