Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 1 | // Copyright 2022, The Android Open Source Project |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | |
| 15 | //! Low-level allocation and tracking of main memory. |
| 16 | |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 17 | #![deny(unsafe_op_in_unsafe_fn)] |
| 18 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 19 | use crate::helpers::{self, page_4kb_of, RangeExt, SIZE_4KB, SIZE_4MB}; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 20 | use crate::mmu; |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 21 | use alloc::alloc::alloc_zeroed; |
| 22 | use alloc::alloc::dealloc; |
| 23 | use alloc::alloc::handle_alloc_error; |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 24 | use alloc::boxed::Box; |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 25 | use alloc::vec::Vec; |
| 26 | use buddy_system_allocator::Heap; |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 27 | use buddy_system_allocator::LockedHeap; |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 28 | use core::alloc::Layout; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 29 | use core::cmp::max; |
| 30 | use core::cmp::min; |
| 31 | use core::fmt; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 32 | use core::num::NonZeroUsize; |
| 33 | use core::ops::Range; |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 34 | use core::ptr::NonNull; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 35 | use core::result; |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 36 | use hyp::get_hypervisor; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 37 | use log::error; |
Pierre-Clément Tosi | 90238c5 | 2023-04-27 17:59:10 +0000 | [diff] [blame] | 38 | use log::trace; |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 39 | use once_cell::race::OnceBox; |
Jakob Vukalovic | 85a00d7 | 2023-04-20 09:51:10 +0100 | [diff] [blame] | 40 | use spin::mutex::SpinMutex; |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 41 | use tinyvec::ArrayVec; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 42 | |
Jiyong Park | 0ee6539 | 2023-03-27 20:52:45 +0900 | [diff] [blame] | 43 | /// Base of the system's contiguous "main" memory. |
| 44 | pub const BASE_ADDR: usize = 0x8000_0000; |
| 45 | /// First address that can't be translated by a level 1 TTBR0_EL1. |
| 46 | pub const MAX_ADDR: usize = 1 << 40; |
| 47 | |
Andrew Walbran | 0d8b54d | 2022-12-08 16:32:33 +0000 | [diff] [blame] | 48 | pub type MemoryRange = Range<usize>; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 49 | |
Jakob Vukalovic | 85a00d7 | 2023-04-20 09:51:10 +0100 | [diff] [blame] | 50 | pub static MEMORY: SpinMutex<Option<MemoryTracker>> = SpinMutex::new(None); |
| 51 | unsafe impl Send for MemoryTracker {} |
| 52 | |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 53 | #[derive(Clone, Copy, Debug, Default)] |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 54 | enum MemoryType { |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 55 | #[default] |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 56 | ReadOnly, |
| 57 | ReadWrite, |
| 58 | } |
| 59 | |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 60 | #[derive(Clone, Debug, Default)] |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 61 | struct MemoryRegion { |
| 62 | range: MemoryRange, |
| 63 | mem_type: MemoryType, |
| 64 | } |
| 65 | |
| 66 | impl MemoryRegion { |
| 67 | /// True if the instance overlaps with the passed range. |
| 68 | pub fn overlaps(&self, range: &MemoryRange) -> bool { |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 69 | overlaps(&self.range, range) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 70 | } |
| 71 | |
| 72 | /// True if the instance is fully contained within the passed range. |
| 73 | pub fn is_within(&self, range: &MemoryRange) -> bool { |
Srivatsa Vaddagiri | c25d68e | 2023-04-19 22:56:33 -0700 | [diff] [blame] | 74 | self.as_ref().is_within(range) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 75 | } |
| 76 | } |
| 77 | |
| 78 | impl AsRef<MemoryRange> for MemoryRegion { |
| 79 | fn as_ref(&self) -> &MemoryRange { |
| 80 | &self.range |
| 81 | } |
| 82 | } |
| 83 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 84 | /// Returns true if one range overlaps with the other at all. |
| 85 | fn overlaps<T: Copy + Ord>(a: &Range<T>, b: &Range<T>) -> bool { |
| 86 | max(a.start, b.start) < min(a.end, b.end) |
| 87 | } |
| 88 | |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 89 | /// Tracks non-overlapping slices of main memory. |
| 90 | pub struct MemoryTracker { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 91 | total: MemoryRange, |
| 92 | page_table: mmu::PageTable, |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 93 | regions: ArrayVec<[MemoryRegion; MemoryTracker::CAPACITY]>, |
| 94 | mmio_regions: ArrayVec<[MemoryRange; MemoryTracker::MMIO_CAPACITY]>, |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 95 | } |
| 96 | |
| 97 | /// Errors for MemoryTracker operations. |
| 98 | #[derive(Debug, Clone)] |
| 99 | pub enum MemoryTrackerError { |
| 100 | /// Tried to modify the memory base address. |
| 101 | DifferentBaseAddress, |
| 102 | /// Tried to shrink to a larger memory size. |
| 103 | SizeTooLarge, |
| 104 | /// Tracked regions would not fit in memory size. |
| 105 | SizeTooSmall, |
| 106 | /// Reached limit number of tracked regions. |
| 107 | Full, |
| 108 | /// Region is out of the tracked memory address space. |
| 109 | OutOfRange, |
| 110 | /// New region overlaps with tracked regions. |
| 111 | Overlaps, |
| 112 | /// Region couldn't be mapped. |
| 113 | FailedToMap, |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 114 | /// Error from the interaction with the hypervisor. |
| 115 | Hypervisor(hyp::Error), |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 116 | /// Failure to set `SHARED_MEMORY`. |
| 117 | SharedMemorySetFailure, |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 118 | /// Failure to set `SHARED_POOL`. |
| 119 | SharedPoolSetFailure, |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 120 | } |
| 121 | |
| 122 | impl fmt::Display for MemoryTrackerError { |
| 123 | fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { |
| 124 | match self { |
| 125 | Self::DifferentBaseAddress => write!(f, "Received different base address"), |
| 126 | Self::SizeTooLarge => write!(f, "Tried to shrink to a larger memory size"), |
| 127 | Self::SizeTooSmall => write!(f, "Tracked regions would not fit in memory size"), |
| 128 | Self::Full => write!(f, "Reached limit number of tracked regions"), |
| 129 | Self::OutOfRange => write!(f, "Region is out of the tracked memory address space"), |
| 130 | Self::Overlaps => write!(f, "New region overlaps with tracked regions"), |
| 131 | Self::FailedToMap => write!(f, "Failed to map the new region"), |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 132 | Self::Hypervisor(e) => e.fmt(f), |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 133 | Self::SharedMemorySetFailure => write!(f, "Failed to set SHARED_MEMORY"), |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 134 | Self::SharedPoolSetFailure => write!(f, "Failed to set SHARED_POOL"), |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 135 | } |
| 136 | } |
| 137 | } |
| 138 | |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 139 | impl From<hyp::Error> for MemoryTrackerError { |
| 140 | fn from(e: hyp::Error) -> Self { |
| 141 | Self::Hypervisor(e) |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 142 | } |
| 143 | } |
| 144 | |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 145 | type Result<T> = result::Result<T, MemoryTrackerError>; |
| 146 | |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 147 | static SHARED_POOL: OnceBox<LockedHeap<32>> = OnceBox::new(); |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 148 | static SHARED_MEMORY: SpinMutex<Option<MemorySharer>> = SpinMutex::new(None); |
| 149 | |
| 150 | /// Allocates memory on the heap and shares it with the host. |
| 151 | /// |
| 152 | /// Unshares all pages when dropped. |
| 153 | pub struct MemorySharer { |
| 154 | granule: usize, |
| 155 | shared_regions: Vec<(usize, Layout)>, |
| 156 | } |
| 157 | |
| 158 | impl MemorySharer { |
| 159 | const INIT_CAP: usize = 10; |
| 160 | |
| 161 | pub fn new(granule: usize) -> Self { |
| 162 | assert!(granule.is_power_of_two()); |
| 163 | Self { granule, shared_regions: Vec::with_capacity(Self::INIT_CAP) } |
| 164 | } |
| 165 | |
| 166 | /// Get from the global allocator a granule-aligned region that suits `hint` and share it. |
| 167 | pub fn refill(&mut self, pool: &mut Heap<32>, hint: Layout) { |
| 168 | let layout = hint.align_to(self.granule).unwrap().pad_to_align(); |
| 169 | assert_ne!(layout.size(), 0); |
| 170 | // SAFETY - layout has non-zero size. |
| 171 | let Some(shared) = NonNull::new(unsafe { alloc_zeroed(layout) }) else { |
| 172 | handle_alloc_error(layout); |
| 173 | }; |
| 174 | |
| 175 | let base = shared.as_ptr() as usize; |
| 176 | let end = base.checked_add(layout.size()).unwrap(); |
| 177 | trace!("Sharing memory region {:#x?}", base..end); |
| 178 | for vaddr in (base..end).step_by(self.granule) { |
| 179 | let vaddr = NonNull::new(vaddr as *mut _).unwrap(); |
| 180 | get_hypervisor().mem_share(virt_to_phys(vaddr).try_into().unwrap()).unwrap(); |
| 181 | } |
| 182 | self.shared_regions.push((base, layout)); |
| 183 | |
| 184 | // SAFETY - The underlying memory range is owned by self and reserved for this pool. |
| 185 | unsafe { pool.add_to_heap(base, end) }; |
| 186 | } |
| 187 | } |
| 188 | |
| 189 | impl Drop for MemorySharer { |
| 190 | fn drop(&mut self) { |
| 191 | while let Some((base, layout)) = self.shared_regions.pop() { |
| 192 | let end = base.checked_add(layout.size()).unwrap(); |
| 193 | trace!("Unsharing memory region {:#x?}", base..end); |
| 194 | for vaddr in (base..end).step_by(self.granule) { |
| 195 | let vaddr = NonNull::new(vaddr as *mut _).unwrap(); |
| 196 | get_hypervisor().mem_unshare(virt_to_phys(vaddr).try_into().unwrap()).unwrap(); |
| 197 | } |
| 198 | |
| 199 | // SAFETY - The region was obtained from alloc_zeroed() with the recorded layout. |
| 200 | unsafe { dealloc(base as *mut _, layout) }; |
| 201 | } |
| 202 | } |
| 203 | } |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 204 | |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 205 | impl MemoryTracker { |
| 206 | const CAPACITY: usize = 5; |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 207 | const MMIO_CAPACITY: usize = 5; |
Pierre-Clément Tosi | 164a6f5 | 2023-04-18 19:29:11 +0100 | [diff] [blame] | 208 | const PVMFW_RANGE: MemoryRange = (BASE_ADDR - SIZE_4MB)..BASE_ADDR; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 209 | |
| 210 | /// Create a new instance from an active page table, covering the maximum RAM size. |
| 211 | pub fn new(page_table: mmu::PageTable) -> Self { |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 212 | Self { |
Jiyong Park | 0ee6539 | 2023-03-27 20:52:45 +0900 | [diff] [blame] | 213 | total: BASE_ADDR..MAX_ADDR, |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 214 | page_table, |
| 215 | regions: ArrayVec::new(), |
| 216 | mmio_regions: ArrayVec::new(), |
| 217 | } |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 218 | } |
| 219 | |
| 220 | /// Resize the total RAM size. |
| 221 | /// |
| 222 | /// This function fails if it contains regions that are not included within the new size. |
| 223 | pub fn shrink(&mut self, range: &MemoryRange) -> Result<()> { |
| 224 | if range.start != self.total.start { |
| 225 | return Err(MemoryTrackerError::DifferentBaseAddress); |
| 226 | } |
| 227 | if self.total.end < range.end { |
| 228 | return Err(MemoryTrackerError::SizeTooLarge); |
| 229 | } |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 230 | if !self.regions.iter().all(|r| r.is_within(range)) { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 231 | return Err(MemoryTrackerError::SizeTooSmall); |
| 232 | } |
| 233 | |
| 234 | self.total = range.clone(); |
| 235 | Ok(()) |
| 236 | } |
| 237 | |
| 238 | /// Allocate the address range for a const slice; returns None if failed. |
| 239 | pub fn alloc_range(&mut self, range: &MemoryRange) -> Result<MemoryRange> { |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 240 | let region = MemoryRegion { range: range.clone(), mem_type: MemoryType::ReadOnly }; |
| 241 | self.check(®ion)?; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 242 | self.page_table.map_rodata(range).map_err(|e| { |
| 243 | error!("Error during range allocation: {e}"); |
| 244 | MemoryTrackerError::FailedToMap |
| 245 | })?; |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 246 | self.add(region) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 247 | } |
| 248 | |
| 249 | /// Allocate the address range for a mutable slice; returns None if failed. |
| 250 | pub fn alloc_range_mut(&mut self, range: &MemoryRange) -> Result<MemoryRange> { |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 251 | let region = MemoryRegion { range: range.clone(), mem_type: MemoryType::ReadWrite }; |
| 252 | self.check(®ion)?; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 253 | self.page_table.map_data(range).map_err(|e| { |
| 254 | error!("Error during mutable range allocation: {e}"); |
| 255 | MemoryTrackerError::FailedToMap |
| 256 | })?; |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 257 | self.add(region) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 258 | } |
| 259 | |
| 260 | /// Allocate the address range for a const slice; returns None if failed. |
| 261 | pub fn alloc(&mut self, base: usize, size: NonZeroUsize) -> Result<MemoryRange> { |
| 262 | self.alloc_range(&(base..(base + size.get()))) |
| 263 | } |
| 264 | |
| 265 | /// Allocate the address range for a mutable slice; returns None if failed. |
| 266 | pub fn alloc_mut(&mut self, base: usize, size: NonZeroUsize) -> Result<MemoryRange> { |
| 267 | self.alloc_range_mut(&(base..(base + size.get()))) |
| 268 | } |
| 269 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 270 | /// Checks that the given range of addresses is within the MMIO region, and then maps it |
| 271 | /// appropriately. |
| 272 | pub fn map_mmio_range(&mut self, range: MemoryRange) -> Result<()> { |
| 273 | // MMIO space is below the main memory region. |
Pierre-Clément Tosi | 164a6f5 | 2023-04-18 19:29:11 +0100 | [diff] [blame] | 274 | if range.end > self.total.start || overlaps(&Self::PVMFW_RANGE, &range) { |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 275 | return Err(MemoryTrackerError::OutOfRange); |
| 276 | } |
| 277 | if self.mmio_regions.iter().any(|r| overlaps(r, &range)) { |
| 278 | return Err(MemoryTrackerError::Overlaps); |
| 279 | } |
| 280 | if self.mmio_regions.len() == self.mmio_regions.capacity() { |
| 281 | return Err(MemoryTrackerError::Full); |
| 282 | } |
| 283 | |
| 284 | self.page_table.map_device(&range).map_err(|e| { |
| 285 | error!("Error during MMIO device mapping: {e}"); |
| 286 | MemoryTrackerError::FailedToMap |
| 287 | })?; |
| 288 | |
| 289 | for page_base in page_iterator(&range) { |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 290 | get_hypervisor().mmio_guard_map(page_base)?; |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 291 | } |
| 292 | |
| 293 | if self.mmio_regions.try_push(range).is_some() { |
| 294 | return Err(MemoryTrackerError::Full); |
| 295 | } |
| 296 | |
| 297 | Ok(()) |
| 298 | } |
| 299 | |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 300 | /// Checks that the given region is within the range of the `MemoryTracker` and doesn't overlap |
| 301 | /// with any other previously allocated regions, and that the regions ArrayVec has capacity to |
| 302 | /// add it. |
| 303 | fn check(&self, region: &MemoryRegion) -> Result<()> { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 304 | if !region.is_within(&self.total) { |
| 305 | return Err(MemoryTrackerError::OutOfRange); |
| 306 | } |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 307 | if self.regions.iter().any(|r| r.overlaps(®ion.range)) { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 308 | return Err(MemoryTrackerError::Overlaps); |
| 309 | } |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 310 | if self.regions.len() == self.regions.capacity() { |
| 311 | return Err(MemoryTrackerError::Full); |
| 312 | } |
| 313 | Ok(()) |
| 314 | } |
| 315 | |
| 316 | fn add(&mut self, region: MemoryRegion) -> Result<MemoryRange> { |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 317 | if self.regions.try_push(region).is_some() { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 318 | return Err(MemoryTrackerError::Full); |
| 319 | } |
| 320 | |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 321 | Ok(self.regions.last().unwrap().as_ref().clone()) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 322 | } |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 323 | |
| 324 | /// Unmaps all tracked MMIO regions from the MMIO guard. |
| 325 | /// |
| 326 | /// Note that they are not unmapped from the page table. |
| 327 | pub fn mmio_unmap_all(&self) -> Result<()> { |
| 328 | for region in &self.mmio_regions { |
| 329 | for page_base in page_iterator(region) { |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 330 | get_hypervisor().mmio_guard_unmap(page_base)?; |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 331 | } |
| 332 | } |
| 333 | |
| 334 | Ok(()) |
| 335 | } |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 336 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 337 | /// Initialize the shared heap to dynamically share memory from the global allocator. |
| 338 | pub fn init_dynamic_shared_pool(&mut self) -> Result<()> { |
| 339 | let granule = get_hypervisor().memory_protection_granule()?; |
| 340 | let previous = SHARED_MEMORY.lock().replace(MemorySharer::new(granule)); |
| 341 | if previous.is_some() { |
| 342 | return Err(MemoryTrackerError::SharedMemorySetFailure); |
| 343 | } |
| 344 | |
| 345 | SHARED_POOL |
| 346 | .set(Box::new(LockedHeap::empty())) |
| 347 | .map_err(|_| MemoryTrackerError::SharedPoolSetFailure)?; |
| 348 | |
| 349 | Ok(()) |
| 350 | } |
| 351 | |
| 352 | /// Initialize the shared heap from a static region of memory. |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 353 | /// |
| 354 | /// Some hypervisors such as Gunyah do not support a MemShare API for guest |
| 355 | /// to share its memory with host. Instead they allow host to designate part |
| 356 | /// of guest memory as "shared" ahead of guest starting its execution. The |
| 357 | /// shared memory region is indicated in swiotlb node. On such platforms use |
| 358 | /// a separate heap to allocate buffers that can be shared with host. |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 359 | pub fn init_static_shared_pool(&mut self, range: Range<usize>) -> Result<()> { |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 360 | let size = NonZeroUsize::new(range.len()).unwrap(); |
| 361 | let range = self.alloc_mut(range.start, size)?; |
| 362 | let shared_pool = LockedHeap::<32>::new(); |
| 363 | |
| 364 | // SAFETY - `range` should be a valid region of memory as validated by |
| 365 | // `validate_swiotlb_info` and not used by any other rust code. |
| 366 | unsafe { |
| 367 | shared_pool.lock().init(range.start, range.len()); |
| 368 | } |
| 369 | |
| 370 | SHARED_POOL |
| 371 | .set(Box::new(shared_pool)) |
| 372 | .map_err(|_| MemoryTrackerError::SharedPoolSetFailure)?; |
| 373 | |
| 374 | Ok(()) |
| 375 | } |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 376 | |
| 377 | /// Unshares any memory that may have been shared. |
| 378 | pub fn unshare_all_memory(&mut self) { |
| 379 | drop(SHARED_MEMORY.lock().take()); |
| 380 | } |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 381 | } |
| 382 | |
| 383 | impl Drop for MemoryTracker { |
| 384 | fn drop(&mut self) { |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 385 | for region in &self.regions { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 386 | match region.mem_type { |
| 387 | MemoryType::ReadWrite => { |
Pierre-Clément Tosi | 73c2d64 | 2023-02-17 14:56:48 +0000 | [diff] [blame] | 388 | // TODO(b/269738062): Use PT's dirty bit to only flush pages that were touched. |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 389 | helpers::flush_region(region.range.start, region.range.len()) |
| 390 | } |
| 391 | MemoryType::ReadOnly => {} |
| 392 | } |
| 393 | } |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 394 | self.unshare_all_memory() |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 395 | } |
| 396 | } |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 397 | |
Andrew Walbran | 2b0c7fb | 2023-05-09 12:16:20 +0000 | [diff] [blame^] | 398 | /// Allocates a memory range of at least the given size and alignment that is shared with the host. |
| 399 | /// Returns a pointer to the buffer. |
Pierre-Clément Tosi | 2d5bc58 | 2023-05-03 11:23:11 +0000 | [diff] [blame] | 400 | pub fn alloc_shared(layout: Layout) -> hyp::Result<NonNull<u8>> { |
| 401 | assert_ne!(layout.size(), 0); |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 402 | let Some(buffer) = try_shared_alloc(layout) else { |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 403 | handle_alloc_error(layout); |
| 404 | }; |
| 405 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 406 | trace!("Allocated shared buffer at {buffer:?} with {layout:?}"); |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 407 | Ok(buffer) |
| 408 | } |
| 409 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 410 | fn try_shared_alloc(layout: Layout) -> Option<NonNull<u8>> { |
| 411 | let mut shared_pool = SHARED_POOL.get().unwrap().lock(); |
| 412 | |
| 413 | if let Ok(buffer) = shared_pool.alloc(layout) { |
| 414 | Some(buffer) |
| 415 | } else if let Some(shared_memory) = SHARED_MEMORY.lock().as_mut() { |
| 416 | shared_memory.refill(&mut shared_pool, layout); |
| 417 | shared_pool.alloc(layout).ok() |
| 418 | } else { |
| 419 | None |
| 420 | } |
| 421 | } |
| 422 | |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 423 | /// Unshares and deallocates a memory range which was previously allocated by `alloc_shared`. |
| 424 | /// |
Andrew Walbran | 2b0c7fb | 2023-05-09 12:16:20 +0000 | [diff] [blame^] | 425 | /// The layout passed in must be the same layout passed to the original `alloc_shared` call. |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 426 | /// |
| 427 | /// # Safety |
| 428 | /// |
Andrew Walbran | 2b0c7fb | 2023-05-09 12:16:20 +0000 | [diff] [blame^] | 429 | /// The memory must have been allocated by `alloc_shared` with the same layout, and not yet |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 430 | /// deallocated. |
Pierre-Clément Tosi | 2d5bc58 | 2023-05-03 11:23:11 +0000 | [diff] [blame] | 431 | pub unsafe fn dealloc_shared(vaddr: NonNull<u8>, layout: Layout) -> hyp::Result<()> { |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 432 | SHARED_POOL.get().unwrap().lock().dealloc(vaddr, layout); |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 433 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 434 | trace!("Deallocated shared buffer at {vaddr:?} with {layout:?}"); |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 435 | Ok(()) |
| 436 | } |
| 437 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 438 | /// Returns an iterator which yields the base address of each 4 KiB page within the given range. |
| 439 | fn page_iterator(range: &MemoryRange) -> impl Iterator<Item = usize> { |
| 440 | (page_4kb_of(range.start)..range.end).step_by(SIZE_4KB) |
| 441 | } |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 442 | |
| 443 | /// Returns the intermediate physical address corresponding to the given virtual address. |
| 444 | /// |
Andrew Walbran | 272bd7a | 2023-01-24 14:02:36 +0000 | [diff] [blame] | 445 | /// As we use identity mapping for everything, this is just a cast, but it's useful to use it to be |
| 446 | /// explicit about where we are converting from virtual to physical address. |
| 447 | pub fn virt_to_phys(vaddr: NonNull<u8>) -> usize { |
| 448 | vaddr.as_ptr() as _ |
| 449 | } |
| 450 | |
| 451 | /// Returns a pointer for the virtual address corresponding to the given non-zero intermediate |
| 452 | /// physical address. |
| 453 | /// |
| 454 | /// Panics if `paddr` is 0. |
| 455 | pub fn phys_to_virt(paddr: usize) -> NonNull<u8> { |
| 456 | NonNull::new(paddr as _).unwrap() |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 457 | } |