Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 1 | // Copyright 2022, The Android Open Source Project |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | |
| 15 | //! Low-level allocation and tracking of main memory. |
| 16 | |
Pierre-Clément Tosi | 462bdf4 | 2024-10-30 17:46:23 +0000 | [diff] [blame] | 17 | use crate::entry::RebootReason; |
| 18 | use crate::fdt; |
Alice Wang | 4be4dd0 | 2023-06-07 07:50:40 +0000 | [diff] [blame] | 19 | use crate::helpers::PVMFW_PAGE_SIZE; |
Alice Wang | a3931aa | 2023-07-05 12:52:09 +0000 | [diff] [blame] | 20 | use aarch64_paging::paging::VirtualAddress; |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 21 | use aarch64_paging::MapError; |
Pierre-Clément Tosi | 462bdf4 | 2024-10-30 17:46:23 +0000 | [diff] [blame] | 22 | use core::num::NonZeroUsize; |
Alice Wang | a3931aa | 2023-07-05 12:52:09 +0000 | [diff] [blame] | 23 | use core::ops::Range; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 24 | use core::result; |
Pierre-Clément Tosi | 462bdf4 | 2024-10-30 17:46:23 +0000 | [diff] [blame] | 25 | use core::slice; |
Per Larsen | 7ec45d3 | 2024-11-02 00:56:46 +0000 | [diff] [blame] | 26 | use hypervisor_backends::get_mem_sharer; |
Pierre-Clément Tosi | 462bdf4 | 2024-10-30 17:46:23 +0000 | [diff] [blame] | 27 | use log::debug; |
Alice Wang | 93ee98a | 2023-06-08 08:20:39 +0000 | [diff] [blame] | 28 | use log::error; |
Pierre-Clément Tosi | 462bdf4 | 2024-10-30 17:46:23 +0000 | [diff] [blame] | 29 | use log::info; |
| 30 | use log::warn; |
Pierre-Clément Tosi | 3d4c5c3 | 2023-05-31 16:57:06 +0000 | [diff] [blame] | 31 | use vmbase::{ |
Pierre-Clément Tosi | 462bdf4 | 2024-10-30 17:46:23 +0000 | [diff] [blame] | 32 | layout::{self, crosvm}, |
| 33 | memory::{PageTable, MEMORY, SIZE_2MB, SIZE_4KB}, |
Alice Wang | 93ee98a | 2023-06-08 08:20:39 +0000 | [diff] [blame] | 34 | util::align_up, |
Pierre-Clément Tosi | 3d4c5c3 | 2023-05-31 16:57:06 +0000 | [diff] [blame] | 35 | }; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 36 | |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 37 | /// Returns memory range reserved for the appended payload. |
Alice Wang | a3931aa | 2023-07-05 12:52:09 +0000 | [diff] [blame] | 38 | pub fn appended_payload_range() -> Range<VirtualAddress> { |
Alice Wang | 8b09704 | 2023-07-06 14:56:58 +0000 | [diff] [blame] | 39 | let start = align_up(layout::binary_end().0, SIZE_4KB).unwrap(); |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 40 | // pvmfw is contained in a 2MiB region so the payload can't be larger than the 2MiB alignment. |
Alice Wang | eacb738 | 2023-06-05 12:53:54 +0000 | [diff] [blame] | 41 | let end = align_up(start, SIZE_2MB).unwrap(); |
Alice Wang | a3931aa | 2023-07-05 12:52:09 +0000 | [diff] [blame] | 42 | VirtualAddress(start)..VirtualAddress(end) |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 43 | } |
| 44 | |
| 45 | /// Region allocated for the stack. |
Alice Wang | a3931aa | 2023-07-05 12:52:09 +0000 | [diff] [blame] | 46 | pub fn stack_range() -> Range<VirtualAddress> { |
Pierre-Clément Tosi | 9ddfab5 | 2024-04-24 23:03:46 +0100 | [diff] [blame] | 47 | const STACK_PAGES: usize = 12; |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 48 | |
| 49 | layout::stack_range(STACK_PAGES * PVMFW_PAGE_SIZE) |
| 50 | } |
| 51 | |
| 52 | pub fn init_page_table() -> result::Result<PageTable, MapError> { |
Alice Wang | ee5b180 | 2023-06-07 07:41:54 +0000 | [diff] [blame] | 53 | let mut page_table = PageTable::default(); |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 54 | |
| 55 | // Stack and scratch ranges are explicitly zeroed and flushed before jumping to payload, |
| 56 | // so dirty state management can be omitted. |
Pierre-Clément Tosi | 0b02a2b | 2024-11-28 22:48:27 +0000 | [diff] [blame^] | 57 | page_table.map_data(&layout::data_bss_range().into())?; |
| 58 | page_table.map_data(&layout::eh_stack_range().into())?; |
Alice Wang | a3931aa | 2023-07-05 12:52:09 +0000 | [diff] [blame] | 59 | page_table.map_data(&stack_range().into())?; |
| 60 | page_table.map_code(&layout::text_range().into())?; |
| 61 | page_table.map_rodata(&layout::rodata_range().into())?; |
| 62 | page_table.map_data_dbm(&appended_payload_range().into())?; |
Pierre-Clément Tosi | 38a3621 | 2024-06-06 11:30:39 +0100 | [diff] [blame] | 63 | if let Err(e) = page_table.map_device(&layout::console_uart_page().into()) { |
Alice Wang | 807fa59 | 2023-06-02 09:54:43 +0000 | [diff] [blame] | 64 | error!("Failed to remap the UART as a dynamic page table entry: {e}"); |
| 65 | return Err(e); |
| 66 | } |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 67 | Ok(page_table) |
| 68 | } |
Pierre-Clément Tosi | 462bdf4 | 2024-10-30 17:46:23 +0000 | [diff] [blame] | 69 | |
| 70 | pub(crate) struct MemorySlices<'a> { |
| 71 | pub fdt: &'a mut libfdt::Fdt, |
| 72 | pub kernel: &'a [u8], |
| 73 | pub ramdisk: Option<&'a [u8]>, |
| 74 | } |
| 75 | |
| 76 | impl<'a> MemorySlices<'a> { |
| 77 | pub fn new( |
| 78 | fdt: usize, |
| 79 | kernel: usize, |
| 80 | kernel_size: usize, |
| 81 | vm_dtbo: Option<&mut [u8]>, |
| 82 | vm_ref_dt: Option<&[u8]>, |
| 83 | ) -> Result<Self, RebootReason> { |
| 84 | let fdt_size = NonZeroUsize::new(crosvm::FDT_MAX_SIZE).unwrap(); |
| 85 | // TODO - Only map the FDT as read-only, until we modify it right before jump_to_payload() |
| 86 | // e.g. by generating a DTBO for a template DT in main() and, on return, re-map DT as RW, |
| 87 | // overwrite with the template DT and apply the DTBO. |
| 88 | let range = MEMORY.lock().as_mut().unwrap().alloc_mut(fdt, fdt_size).map_err(|e| { |
| 89 | error!("Failed to allocate the FDT range: {e}"); |
| 90 | RebootReason::InternalError |
| 91 | })?; |
| 92 | |
| 93 | // SAFETY: The tracker validated the range to be in main memory, mapped, and not overlap. |
| 94 | let fdt = unsafe { slice::from_raw_parts_mut(range.start as *mut u8, range.len()) }; |
| 95 | |
| 96 | let info = fdt::sanitize_device_tree(fdt, vm_dtbo, vm_ref_dt)?; |
| 97 | let fdt = libfdt::Fdt::from_mut_slice(fdt).map_err(|e| { |
| 98 | error!("Failed to load sanitized FDT: {e}"); |
| 99 | RebootReason::InvalidFdt |
| 100 | })?; |
| 101 | debug!("Fdt passed validation!"); |
| 102 | |
| 103 | let memory_range = info.memory_range; |
| 104 | debug!("Resizing MemoryTracker to range {memory_range:#x?}"); |
| 105 | MEMORY.lock().as_mut().unwrap().shrink(&memory_range).map_err(|e| { |
| 106 | error!("Failed to use memory range value from DT: {memory_range:#x?}: {e}"); |
| 107 | RebootReason::InvalidFdt |
| 108 | })?; |
| 109 | |
| 110 | if let Some(mem_sharer) = get_mem_sharer() { |
| 111 | let granule = mem_sharer.granule().map_err(|e| { |
| 112 | error!("Failed to get memory protection granule: {e}"); |
| 113 | RebootReason::InternalError |
| 114 | })?; |
| 115 | MEMORY.lock().as_mut().unwrap().init_dynamic_shared_pool(granule).map_err(|e| { |
| 116 | error!("Failed to initialize dynamically shared pool: {e}"); |
| 117 | RebootReason::InternalError |
| 118 | })?; |
| 119 | } else { |
| 120 | let range = info.swiotlb_info.fixed_range().ok_or_else(|| { |
| 121 | error!("Pre-shared pool range not specified in swiotlb node"); |
| 122 | RebootReason::InvalidFdt |
| 123 | })?; |
| 124 | |
| 125 | MEMORY.lock().as_mut().unwrap().init_static_shared_pool(range).map_err(|e| { |
| 126 | error!("Failed to initialize pre-shared pool {e}"); |
| 127 | RebootReason::InvalidFdt |
| 128 | })?; |
| 129 | } |
| 130 | |
| 131 | let kernel_range = if let Some(r) = info.kernel_range { |
| 132 | MEMORY.lock().as_mut().unwrap().alloc_range(&r).map_err(|e| { |
| 133 | error!("Failed to obtain the kernel range with DT range: {e}"); |
| 134 | RebootReason::InternalError |
| 135 | })? |
| 136 | } else if cfg!(feature = "legacy") { |
| 137 | warn!("Failed to find the kernel range in the DT; falling back to legacy ABI"); |
| 138 | |
| 139 | let kernel_size = NonZeroUsize::new(kernel_size).ok_or_else(|| { |
| 140 | error!("Invalid kernel size: {kernel_size:#x}"); |
| 141 | RebootReason::InvalidPayload |
| 142 | })?; |
| 143 | |
| 144 | MEMORY.lock().as_mut().unwrap().alloc(kernel, kernel_size).map_err(|e| { |
| 145 | error!("Failed to obtain the kernel range with legacy range: {e}"); |
| 146 | RebootReason::InternalError |
| 147 | })? |
| 148 | } else { |
| 149 | error!("Failed to locate the kernel from the DT"); |
| 150 | return Err(RebootReason::InvalidPayload); |
| 151 | }; |
| 152 | |
| 153 | let kernel = kernel_range.start as *const u8; |
| 154 | // SAFETY: The tracker validated the range to be in main memory, mapped, and not overlap. |
| 155 | let kernel = unsafe { slice::from_raw_parts(kernel, kernel_range.len()) }; |
| 156 | |
| 157 | let ramdisk = if let Some(r) = info.initrd_range { |
| 158 | debug!("Located ramdisk at {r:?}"); |
| 159 | let r = MEMORY.lock().as_mut().unwrap().alloc_range(&r).map_err(|e| { |
| 160 | error!("Failed to obtain the initrd range: {e}"); |
| 161 | RebootReason::InvalidRamdisk |
| 162 | })?; |
| 163 | |
| 164 | // SAFETY: The region was validated by memory to be in main memory, mapped, and |
| 165 | // not overlap. |
| 166 | Some(unsafe { slice::from_raw_parts(r.start as *const u8, r.len()) }) |
| 167 | } else { |
| 168 | info!("Couldn't locate the ramdisk from the device tree"); |
| 169 | None |
| 170 | }; |
| 171 | |
| 172 | Ok(Self { fdt, kernel, ramdisk }) |
| 173 | } |
| 174 | } |