Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 1 | // Copyright 2022, The Android Open Source Project |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | |
| 15 | //! Low-level allocation and tracking of main memory. |
| 16 | |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 17 | #![deny(unsafe_op_in_unsafe_fn)] |
| 18 | |
Alice Wang | 4dd2093 | 2023-05-26 13:47:16 +0000 | [diff] [blame] | 19 | use crate::helpers::{self, page_4kb_of, RangeExt, PVMFW_PAGE_SIZE, SIZE_4MB}; |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 20 | use aarch64_paging::idmap::IdMap; |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 21 | use aarch64_paging::paging::{Attributes, Descriptor, MemoryRegion as VaRange}; |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 22 | use aarch64_paging::MapError; |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 23 | use alloc::alloc::handle_alloc_error; |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 24 | use alloc::boxed::Box; |
Alice Wang | f47b234 | 2023-06-02 11:51:57 +0000 | [diff] [blame] | 25 | use buddy_system_allocator::LockedFrameAllocator; |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 26 | use core::alloc::Layout; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 27 | use core::cmp::max; |
| 28 | use core::cmp::min; |
| 29 | use core::fmt; |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 30 | use core::iter::once; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 31 | use core::num::NonZeroUsize; |
| 32 | use core::ops::Range; |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 33 | use core::ptr::NonNull; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 34 | use core::result; |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 35 | use hyp::get_hypervisor; |
Pierre-Clément Tosi | 90238c5 | 2023-04-27 17:59:10 +0000 | [diff] [blame] | 36 | use log::trace; |
Jakob Vukalovic | 4c1edbe | 2023-04-17 19:10:57 +0100 | [diff] [blame] | 37 | use log::{debug, error}; |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 38 | use once_cell::race::OnceBox; |
Jakob Vukalovic | 85a00d7 | 2023-04-20 09:51:10 +0100 | [diff] [blame] | 39 | use spin::mutex::SpinMutex; |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 40 | use tinyvec::ArrayVec; |
Pierre-Clément Tosi | 3d4c5c3 | 2023-05-31 16:57:06 +0000 | [diff] [blame] | 41 | use vmbase::{ |
| 42 | dsb, isb, layout, |
Alice Wang | f47b234 | 2023-06-02 11:51:57 +0000 | [diff] [blame] | 43 | memory::{set_dbm_enabled, MemorySharer, PageTable, MMIO_LAZY_MAP_FLAG}, |
Pierre-Clément Tosi | 3d4c5c3 | 2023-05-31 16:57:06 +0000 | [diff] [blame] | 44 | tlbi, |
| 45 | }; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 46 | |
Jiyong Park | 0ee6539 | 2023-03-27 20:52:45 +0900 | [diff] [blame] | 47 | /// Base of the system's contiguous "main" memory. |
| 48 | pub const BASE_ADDR: usize = 0x8000_0000; |
| 49 | /// First address that can't be translated by a level 1 TTBR0_EL1. |
| 50 | pub const MAX_ADDR: usize = 1 << 40; |
| 51 | |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 52 | const PT_ROOT_LEVEL: usize = 1; |
| 53 | const PT_ASID: usize = 1; |
| 54 | |
Andrew Walbran | 0d8b54d | 2022-12-08 16:32:33 +0000 | [diff] [blame] | 55 | pub type MemoryRange = Range<usize>; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 56 | |
Jakob Vukalovic | 85a00d7 | 2023-04-20 09:51:10 +0100 | [diff] [blame] | 57 | pub static MEMORY: SpinMutex<Option<MemoryTracker>> = SpinMutex::new(None); |
| 58 | unsafe impl Send for MemoryTracker {} |
| 59 | |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 60 | #[derive(Clone, Copy, Debug, Default, PartialEq)] |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 61 | enum MemoryType { |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 62 | #[default] |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 63 | ReadOnly, |
| 64 | ReadWrite, |
| 65 | } |
| 66 | |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 67 | #[derive(Clone, Debug, Default)] |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 68 | struct MemoryRegion { |
| 69 | range: MemoryRange, |
| 70 | mem_type: MemoryType, |
| 71 | } |
| 72 | |
| 73 | impl MemoryRegion { |
| 74 | /// True if the instance overlaps with the passed range. |
| 75 | pub fn overlaps(&self, range: &MemoryRange) -> bool { |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 76 | overlaps(&self.range, range) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 77 | } |
| 78 | |
| 79 | /// True if the instance is fully contained within the passed range. |
| 80 | pub fn is_within(&self, range: &MemoryRange) -> bool { |
Srivatsa Vaddagiri | c25d68e | 2023-04-19 22:56:33 -0700 | [diff] [blame] | 81 | self.as_ref().is_within(range) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 82 | } |
| 83 | } |
| 84 | |
| 85 | impl AsRef<MemoryRange> for MemoryRegion { |
| 86 | fn as_ref(&self) -> &MemoryRange { |
| 87 | &self.range |
| 88 | } |
| 89 | } |
| 90 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 91 | /// Returns true if one range overlaps with the other at all. |
| 92 | fn overlaps<T: Copy + Ord>(a: &Range<T>, b: &Range<T>) -> bool { |
| 93 | max(a.start, b.start) < min(a.end, b.end) |
| 94 | } |
| 95 | |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 96 | /// Tracks non-overlapping slices of main memory. |
| 97 | pub struct MemoryTracker { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 98 | total: MemoryRange, |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 99 | page_table: PageTable, |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 100 | regions: ArrayVec<[MemoryRegion; MemoryTracker::CAPACITY]>, |
| 101 | mmio_regions: ArrayVec<[MemoryRange; MemoryTracker::MMIO_CAPACITY]>, |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 102 | } |
| 103 | |
| 104 | /// Errors for MemoryTracker operations. |
| 105 | #[derive(Debug, Clone)] |
| 106 | pub enum MemoryTrackerError { |
| 107 | /// Tried to modify the memory base address. |
| 108 | DifferentBaseAddress, |
| 109 | /// Tried to shrink to a larger memory size. |
| 110 | SizeTooLarge, |
| 111 | /// Tracked regions would not fit in memory size. |
| 112 | SizeTooSmall, |
| 113 | /// Reached limit number of tracked regions. |
| 114 | Full, |
| 115 | /// Region is out of the tracked memory address space. |
| 116 | OutOfRange, |
| 117 | /// New region overlaps with tracked regions. |
| 118 | Overlaps, |
| 119 | /// Region couldn't be mapped. |
| 120 | FailedToMap, |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 121 | /// Region couldn't be unmapped. |
| 122 | FailedToUnmap, |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 123 | /// Error from the interaction with the hypervisor. |
| 124 | Hypervisor(hyp::Error), |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 125 | /// Failure to set `SHARED_MEMORY`. |
| 126 | SharedMemorySetFailure, |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 127 | /// Failure to set `SHARED_POOL`. |
| 128 | SharedPoolSetFailure, |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 129 | /// Invalid page table entry. |
| 130 | InvalidPte, |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 131 | /// Failed to flush memory region. |
| 132 | FlushRegionFailed, |
| 133 | /// Failed to set PTE dirty state. |
| 134 | SetPteDirtyFailed, |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 135 | } |
| 136 | |
| 137 | impl fmt::Display for MemoryTrackerError { |
| 138 | fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { |
| 139 | match self { |
| 140 | Self::DifferentBaseAddress => write!(f, "Received different base address"), |
| 141 | Self::SizeTooLarge => write!(f, "Tried to shrink to a larger memory size"), |
| 142 | Self::SizeTooSmall => write!(f, "Tracked regions would not fit in memory size"), |
| 143 | Self::Full => write!(f, "Reached limit number of tracked regions"), |
| 144 | Self::OutOfRange => write!(f, "Region is out of the tracked memory address space"), |
| 145 | Self::Overlaps => write!(f, "New region overlaps with tracked regions"), |
| 146 | Self::FailedToMap => write!(f, "Failed to map the new region"), |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 147 | Self::FailedToUnmap => write!(f, "Failed to unmap the new region"), |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 148 | Self::Hypervisor(e) => e.fmt(f), |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 149 | Self::SharedMemorySetFailure => write!(f, "Failed to set SHARED_MEMORY"), |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 150 | Self::SharedPoolSetFailure => write!(f, "Failed to set SHARED_POOL"), |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 151 | Self::InvalidPte => write!(f, "Page table entry is not valid"), |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 152 | Self::FlushRegionFailed => write!(f, "Failed to flush memory region"), |
| 153 | Self::SetPteDirtyFailed => write!(f, "Failed to set PTE dirty state"), |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 154 | } |
| 155 | } |
| 156 | } |
| 157 | |
Alice Wang | 90e6f16 | 2023-04-17 13:49:45 +0000 | [diff] [blame] | 158 | impl From<hyp::Error> for MemoryTrackerError { |
| 159 | fn from(e: hyp::Error) -> Self { |
| 160 | Self::Hypervisor(e) |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 161 | } |
| 162 | } |
| 163 | |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 164 | type Result<T> = result::Result<T, MemoryTrackerError>; |
| 165 | |
Andrew Walbran | 87933f3 | 2023-05-09 15:29:06 +0000 | [diff] [blame] | 166 | static SHARED_POOL: OnceBox<LockedFrameAllocator<32>> = OnceBox::new(); |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 167 | static SHARED_MEMORY: SpinMutex<Option<MemorySharer>> = SpinMutex::new(None); |
| 168 | |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 169 | impl MemoryTracker { |
| 170 | const CAPACITY: usize = 5; |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 171 | const MMIO_CAPACITY: usize = 5; |
Pierre-Clément Tosi | 164a6f5 | 2023-04-18 19:29:11 +0100 | [diff] [blame] | 172 | const PVMFW_RANGE: MemoryRange = (BASE_ADDR - SIZE_4MB)..BASE_ADDR; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 173 | |
| 174 | /// Create a new instance from an active page table, covering the maximum RAM size. |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 175 | pub fn new(mut page_table: PageTable) -> Self { |
Jakob Vukalovic | 4c1edbe | 2023-04-17 19:10:57 +0100 | [diff] [blame] | 176 | // Activate dirty state management first, otherwise we may get permission faults immediately |
| 177 | // after activating the new page table. This has no effect before the new page table is |
| 178 | // activated because none of the entries in the initial idmap have the DBM flag. |
Alice Wang | 4dd2093 | 2023-05-26 13:47:16 +0000 | [diff] [blame] | 179 | set_dbm_enabled(true); |
Jakob Vukalovic | 4c1edbe | 2023-04-17 19:10:57 +0100 | [diff] [blame] | 180 | |
| 181 | debug!("Activating dynamic page table..."); |
| 182 | // SAFETY - page_table duplicates the static mappings for everything that the Rust code is |
| 183 | // aware of so activating it shouldn't have any visible effect. |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 184 | unsafe { page_table.activate() } |
Jakob Vukalovic | 4c1edbe | 2023-04-17 19:10:57 +0100 | [diff] [blame] | 185 | debug!("... Success!"); |
| 186 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 187 | Self { |
Jiyong Park | 0ee6539 | 2023-03-27 20:52:45 +0900 | [diff] [blame] | 188 | total: BASE_ADDR..MAX_ADDR, |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 189 | page_table, |
| 190 | regions: ArrayVec::new(), |
| 191 | mmio_regions: ArrayVec::new(), |
| 192 | } |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 193 | } |
| 194 | |
| 195 | /// Resize the total RAM size. |
| 196 | /// |
| 197 | /// This function fails if it contains regions that are not included within the new size. |
| 198 | pub fn shrink(&mut self, range: &MemoryRange) -> Result<()> { |
| 199 | if range.start != self.total.start { |
| 200 | return Err(MemoryTrackerError::DifferentBaseAddress); |
| 201 | } |
| 202 | if self.total.end < range.end { |
| 203 | return Err(MemoryTrackerError::SizeTooLarge); |
| 204 | } |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 205 | if !self.regions.iter().all(|r| r.is_within(range)) { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 206 | return Err(MemoryTrackerError::SizeTooSmall); |
| 207 | } |
| 208 | |
| 209 | self.total = range.clone(); |
| 210 | Ok(()) |
| 211 | } |
| 212 | |
| 213 | /// Allocate the address range for a const slice; returns None if failed. |
| 214 | pub fn alloc_range(&mut self, range: &MemoryRange) -> Result<MemoryRange> { |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 215 | let region = MemoryRegion { range: range.clone(), mem_type: MemoryType::ReadOnly }; |
| 216 | self.check(®ion)?; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 217 | self.page_table.map_rodata(range).map_err(|e| { |
| 218 | error!("Error during range allocation: {e}"); |
| 219 | MemoryTrackerError::FailedToMap |
| 220 | })?; |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 221 | self.add(region) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 222 | } |
| 223 | |
| 224 | /// Allocate the address range for a mutable slice; returns None if failed. |
| 225 | pub fn alloc_range_mut(&mut self, range: &MemoryRange) -> Result<MemoryRange> { |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 226 | let region = MemoryRegion { range: range.clone(), mem_type: MemoryType::ReadWrite }; |
| 227 | self.check(®ion)?; |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 228 | self.page_table.map_data_dbm(range).map_err(|e| { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 229 | error!("Error during mutable range allocation: {e}"); |
| 230 | MemoryTrackerError::FailedToMap |
| 231 | })?; |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 232 | self.add(region) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 233 | } |
| 234 | |
| 235 | /// Allocate the address range for a const slice; returns None if failed. |
| 236 | pub fn alloc(&mut self, base: usize, size: NonZeroUsize) -> Result<MemoryRange> { |
| 237 | self.alloc_range(&(base..(base + size.get()))) |
| 238 | } |
| 239 | |
| 240 | /// Allocate the address range for a mutable slice; returns None if failed. |
| 241 | pub fn alloc_mut(&mut self, base: usize, size: NonZeroUsize) -> Result<MemoryRange> { |
| 242 | self.alloc_range_mut(&(base..(base + size.get()))) |
| 243 | } |
| 244 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 245 | /// Checks that the given range of addresses is within the MMIO region, and then maps it |
| 246 | /// appropriately. |
| 247 | pub fn map_mmio_range(&mut self, range: MemoryRange) -> Result<()> { |
| 248 | // MMIO space is below the main memory region. |
Pierre-Clément Tosi | 164a6f5 | 2023-04-18 19:29:11 +0100 | [diff] [blame] | 249 | if range.end > self.total.start || overlaps(&Self::PVMFW_RANGE, &range) { |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 250 | return Err(MemoryTrackerError::OutOfRange); |
| 251 | } |
| 252 | if self.mmio_regions.iter().any(|r| overlaps(r, &range)) { |
| 253 | return Err(MemoryTrackerError::Overlaps); |
| 254 | } |
| 255 | if self.mmio_regions.len() == self.mmio_regions.capacity() { |
| 256 | return Err(MemoryTrackerError::Full); |
| 257 | } |
| 258 | |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 259 | self.page_table.map_device_lazy(&range).map_err(|e| { |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 260 | error!("Error during MMIO device mapping: {e}"); |
| 261 | MemoryTrackerError::FailedToMap |
| 262 | })?; |
| 263 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 264 | if self.mmio_regions.try_push(range).is_some() { |
| 265 | return Err(MemoryTrackerError::Full); |
| 266 | } |
| 267 | |
| 268 | Ok(()) |
| 269 | } |
| 270 | |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 271 | /// Checks that the given region is within the range of the `MemoryTracker` and doesn't overlap |
| 272 | /// with any other previously allocated regions, and that the regions ArrayVec has capacity to |
| 273 | /// add it. |
| 274 | fn check(&self, region: &MemoryRegion) -> Result<()> { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 275 | if !region.is_within(&self.total) { |
| 276 | return Err(MemoryTrackerError::OutOfRange); |
| 277 | } |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 278 | if self.regions.iter().any(|r| r.overlaps(®ion.range)) { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 279 | return Err(MemoryTrackerError::Overlaps); |
| 280 | } |
Andrew Walbran | da65ab1 | 2022-12-07 15:10:13 +0000 | [diff] [blame] | 281 | if self.regions.len() == self.regions.capacity() { |
| 282 | return Err(MemoryTrackerError::Full); |
| 283 | } |
| 284 | Ok(()) |
| 285 | } |
| 286 | |
| 287 | fn add(&mut self, region: MemoryRegion) -> Result<MemoryRange> { |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 288 | if self.regions.try_push(region).is_some() { |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 289 | return Err(MemoryTrackerError::Full); |
| 290 | } |
| 291 | |
Pierre-Clément Tosi | 328dfb6 | 2022-11-25 18:20:42 +0000 | [diff] [blame] | 292 | Ok(self.regions.last().unwrap().as_ref().clone()) |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 293 | } |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 294 | |
| 295 | /// Unmaps all tracked MMIO regions from the MMIO guard. |
| 296 | /// |
| 297 | /// Note that they are not unmapped from the page table. |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 298 | pub fn mmio_unmap_all(&mut self) -> Result<()> { |
| 299 | for range in &self.mmio_regions { |
| 300 | self.page_table |
| 301 | .modify_range(range, &mmio_guard_unmap_page) |
| 302 | .map_err(|_| MemoryTrackerError::FailedToUnmap)?; |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 303 | } |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 304 | Ok(()) |
| 305 | } |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 306 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 307 | /// Initialize the shared heap to dynamically share memory from the global allocator. |
| 308 | pub fn init_dynamic_shared_pool(&mut self) -> Result<()> { |
Alice Wang | f47b234 | 2023-06-02 11:51:57 +0000 | [diff] [blame] | 309 | const INIT_CAP: usize = 10; |
| 310 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 311 | let granule = get_hypervisor().memory_protection_granule()?; |
Alice Wang | f47b234 | 2023-06-02 11:51:57 +0000 | [diff] [blame] | 312 | let previous = SHARED_MEMORY.lock().replace(MemorySharer::new(granule, INIT_CAP)); |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 313 | if previous.is_some() { |
| 314 | return Err(MemoryTrackerError::SharedMemorySetFailure); |
| 315 | } |
| 316 | |
| 317 | SHARED_POOL |
Andrew Walbran | 87933f3 | 2023-05-09 15:29:06 +0000 | [diff] [blame] | 318 | .set(Box::new(LockedFrameAllocator::new())) |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 319 | .map_err(|_| MemoryTrackerError::SharedPoolSetFailure)?; |
| 320 | |
| 321 | Ok(()) |
| 322 | } |
| 323 | |
| 324 | /// Initialize the shared heap from a static region of memory. |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 325 | /// |
| 326 | /// Some hypervisors such as Gunyah do not support a MemShare API for guest |
| 327 | /// to share its memory with host. Instead they allow host to designate part |
| 328 | /// of guest memory as "shared" ahead of guest starting its execution. The |
| 329 | /// shared memory region is indicated in swiotlb node. On such platforms use |
| 330 | /// a separate heap to allocate buffers that can be shared with host. |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 331 | pub fn init_static_shared_pool(&mut self, range: Range<usize>) -> Result<()> { |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 332 | let size = NonZeroUsize::new(range.len()).unwrap(); |
| 333 | let range = self.alloc_mut(range.start, size)?; |
Andrew Walbran | 87933f3 | 2023-05-09 15:29:06 +0000 | [diff] [blame] | 334 | let shared_pool = LockedFrameAllocator::<32>::new(); |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 335 | |
Andrew Walbran | 87933f3 | 2023-05-09 15:29:06 +0000 | [diff] [blame] | 336 | shared_pool.lock().insert(range); |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 337 | |
| 338 | SHARED_POOL |
| 339 | .set(Box::new(shared_pool)) |
| 340 | .map_err(|_| MemoryTrackerError::SharedPoolSetFailure)?; |
| 341 | |
| 342 | Ok(()) |
| 343 | } |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 344 | |
| 345 | /// Unshares any memory that may have been shared. |
| 346 | pub fn unshare_all_memory(&mut self) { |
| 347 | drop(SHARED_MEMORY.lock().take()); |
| 348 | } |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 349 | |
| 350 | /// Handles translation fault for blocks flagged for lazy MMIO mapping by enabling the page |
| 351 | /// table entry and MMIO guard mapping the block. Breaks apart a block entry if required. |
| 352 | pub fn handle_mmio_fault(&mut self, addr: usize) -> Result<()> { |
| 353 | let page_range = page_4kb_of(addr)..page_4kb_of(addr) + PVMFW_PAGE_SIZE; |
| 354 | self.page_table |
| 355 | .modify_range(&page_range, &verify_lazy_mapped_block) |
| 356 | .map_err(|_| MemoryTrackerError::InvalidPte)?; |
| 357 | get_hypervisor().mmio_guard_map(page_range.start)?; |
| 358 | // Maps a single device page, breaking up block mappings if necessary. |
| 359 | self.page_table.map_device(&page_range).map_err(|_| MemoryTrackerError::FailedToMap) |
| 360 | } |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 361 | |
| 362 | /// Flush all memory regions marked as writable-dirty. |
| 363 | fn flush_dirty_pages(&mut self) -> Result<()> { |
| 364 | // Collect memory ranges for which dirty state is tracked. |
| 365 | let writable_regions = |
| 366 | self.regions.iter().filter(|r| r.mem_type == MemoryType::ReadWrite).map(|r| &r.range); |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 367 | let payload_range = appended_payload_range(); |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 368 | // Execute a barrier instruction to ensure all hardware updates to the page table have been |
| 369 | // observed before reading PTE flags to determine dirty state. |
| 370 | dsb!("ish"); |
| 371 | // Now flush writable-dirty pages in those regions. |
| 372 | for range in writable_regions.chain(once(&payload_range)) { |
| 373 | self.page_table |
| 374 | .modify_range(range, &flush_dirty_range) |
| 375 | .map_err(|_| MemoryTrackerError::FlushRegionFailed)?; |
| 376 | } |
| 377 | Ok(()) |
| 378 | } |
| 379 | |
| 380 | /// Handles permission fault for read-only blocks by setting writable-dirty state. |
| 381 | /// In general, this should be called from the exception handler when hardware dirty |
| 382 | /// state management is disabled or unavailable. |
| 383 | pub fn handle_permission_fault(&mut self, addr: usize) -> Result<()> { |
| 384 | self.page_table |
| 385 | .modify_range(&(addr..addr + 1), &mark_dirty_block) |
| 386 | .map_err(|_| MemoryTrackerError::SetPteDirtyFailed) |
| 387 | } |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 388 | } |
| 389 | |
| 390 | impl Drop for MemoryTracker { |
| 391 | fn drop(&mut self) { |
Alice Wang | 4dd2093 | 2023-05-26 13:47:16 +0000 | [diff] [blame] | 392 | set_dbm_enabled(false); |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 393 | self.flush_dirty_pages().unwrap(); |
Jakob Vukalovic | 4c1edbe | 2023-04-17 19:10:57 +0100 | [diff] [blame] | 394 | self.unshare_all_memory(); |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 395 | } |
| 396 | } |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 397 | |
Andrew Walbran | 2b0c7fb | 2023-05-09 12:16:20 +0000 | [diff] [blame] | 398 | /// Allocates a memory range of at least the given size and alignment that is shared with the host. |
| 399 | /// Returns a pointer to the buffer. |
Pierre-Clément Tosi | 2d5bc58 | 2023-05-03 11:23:11 +0000 | [diff] [blame] | 400 | pub fn alloc_shared(layout: Layout) -> hyp::Result<NonNull<u8>> { |
| 401 | assert_ne!(layout.size(), 0); |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 402 | let Some(buffer) = try_shared_alloc(layout) else { |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 403 | handle_alloc_error(layout); |
| 404 | }; |
| 405 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 406 | trace!("Allocated shared buffer at {buffer:?} with {layout:?}"); |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 407 | Ok(buffer) |
| 408 | } |
| 409 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 410 | fn try_shared_alloc(layout: Layout) -> Option<NonNull<u8>> { |
| 411 | let mut shared_pool = SHARED_POOL.get().unwrap().lock(); |
| 412 | |
Andrew Walbran | 87933f3 | 2023-05-09 15:29:06 +0000 | [diff] [blame] | 413 | if let Some(buffer) = shared_pool.alloc_aligned(layout) { |
| 414 | Some(NonNull::new(buffer as _).unwrap()) |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 415 | } else if let Some(shared_memory) = SHARED_MEMORY.lock().as_mut() { |
| 416 | shared_memory.refill(&mut shared_pool, layout); |
Andrew Walbran | 87933f3 | 2023-05-09 15:29:06 +0000 | [diff] [blame] | 417 | shared_pool.alloc_aligned(layout).map(|buffer| NonNull::new(buffer as _).unwrap()) |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 418 | } else { |
| 419 | None |
| 420 | } |
| 421 | } |
| 422 | |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 423 | /// Unshares and deallocates a memory range which was previously allocated by `alloc_shared`. |
| 424 | /// |
Andrew Walbran | 2b0c7fb | 2023-05-09 12:16:20 +0000 | [diff] [blame] | 425 | /// The layout passed in must be the same layout passed to the original `alloc_shared` call. |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 426 | /// |
| 427 | /// # Safety |
| 428 | /// |
Andrew Walbran | 2b0c7fb | 2023-05-09 12:16:20 +0000 | [diff] [blame] | 429 | /// The memory must have been allocated by `alloc_shared` with the same layout, and not yet |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 430 | /// deallocated. |
Pierre-Clément Tosi | 2d5bc58 | 2023-05-03 11:23:11 +0000 | [diff] [blame] | 431 | pub unsafe fn dealloc_shared(vaddr: NonNull<u8>, layout: Layout) -> hyp::Result<()> { |
Andrew Walbran | 87933f3 | 2023-05-09 15:29:06 +0000 | [diff] [blame] | 432 | SHARED_POOL.get().unwrap().lock().dealloc_aligned(vaddr.as_ptr() as usize, layout); |
Srivatsa Vaddagiri | 37713ec | 2023-04-20 04:04:08 -0700 | [diff] [blame] | 433 | |
Pierre-Clément Tosi | f19c0e6 | 2023-05-02 13:56:58 +0000 | [diff] [blame] | 434 | trace!("Deallocated shared buffer at {vaddr:?} with {layout:?}"); |
Andrew Walbran | 848decf | 2022-12-15 14:39:38 +0000 | [diff] [blame] | 435 | Ok(()) |
| 436 | } |
| 437 | |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 438 | /// Checks whether a PTE at given level is a page or block descriptor. |
| 439 | #[inline] |
| 440 | fn is_leaf_pte(flags: &Attributes, level: usize) -> bool { |
| 441 | const LEAF_PTE_LEVEL: usize = 3; |
| 442 | if flags.contains(Attributes::TABLE_OR_PAGE) { |
| 443 | level == LEAF_PTE_LEVEL |
| 444 | } else { |
| 445 | level < LEAF_PTE_LEVEL |
| 446 | } |
| 447 | } |
| 448 | |
| 449 | /// Checks whether block flags indicate it should be MMIO guard mapped. |
| 450 | fn verify_lazy_mapped_block( |
| 451 | _range: &VaRange, |
| 452 | desc: &mut Descriptor, |
| 453 | level: usize, |
| 454 | ) -> result::Result<(), ()> { |
| 455 | let flags = desc.flags().expect("Unsupported PTE flags set"); |
| 456 | if !is_leaf_pte(&flags, level) { |
| 457 | return Ok(()); // Skip table PTEs as they aren't tagged with MMIO_LAZY_MAP_FLAG. |
| 458 | } |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 459 | if flags.contains(MMIO_LAZY_MAP_FLAG) && !flags.contains(Attributes::VALID) { |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 460 | Ok(()) |
| 461 | } else { |
| 462 | Err(()) |
| 463 | } |
| 464 | } |
| 465 | |
| 466 | /// MMIO guard unmaps page |
| 467 | fn mmio_guard_unmap_page( |
| 468 | va_range: &VaRange, |
| 469 | desc: &mut Descriptor, |
| 470 | level: usize, |
| 471 | ) -> result::Result<(), ()> { |
| 472 | let flags = desc.flags().expect("Unsupported PTE flags set"); |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 473 | if !is_leaf_pte(&flags, level) { |
| 474 | return Ok(()); |
| 475 | } |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 476 | // This function will be called on an address range that corresponds to a device. Only if a |
| 477 | // page has been accessed (written to or read from), will it contain the VALID flag and be MMIO |
| 478 | // guard mapped. Therefore, we can skip unmapping invalid pages, they were never MMIO guard |
| 479 | // mapped anyway. |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 480 | if flags.contains(Attributes::VALID) { |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 481 | assert!( |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 482 | flags.contains(MMIO_LAZY_MAP_FLAG), |
Jakob Vukalovic | b99905d | 2023-04-20 15:46:02 +0100 | [diff] [blame] | 483 | "Attempting MMIO guard unmap for non-device pages" |
| 484 | ); |
| 485 | assert_eq!( |
| 486 | va_range.len(), |
| 487 | PVMFW_PAGE_SIZE, |
| 488 | "Failed to break down block mapping before MMIO guard mapping" |
| 489 | ); |
| 490 | let page_base = va_range.start().0; |
| 491 | assert_eq!(page_base % PVMFW_PAGE_SIZE, 0); |
| 492 | // Since mmio_guard_map takes IPAs, if pvmfw moves non-ID address mapping, page_base |
| 493 | // should be converted to IPA. However, since 0x0 is a valid MMIO address, we don't use |
| 494 | // virt_to_phys here, and just pass page_base instead. |
| 495 | get_hypervisor().mmio_guard_unmap(page_base).map_err(|e| { |
| 496 | error!("Error MMIO guard unmapping: {e}"); |
| 497 | })?; |
| 498 | } |
| 499 | Ok(()) |
| 500 | } |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 501 | |
| 502 | /// Flushes a memory range the descriptor refers to, if the descriptor is in writable-dirty state. |
| 503 | fn flush_dirty_range( |
| 504 | va_range: &VaRange, |
| 505 | desc: &mut Descriptor, |
| 506 | level: usize, |
| 507 | ) -> result::Result<(), ()> { |
| 508 | // Only flush ranges corresponding to dirty leaf PTEs. |
| 509 | let flags = desc.flags().ok_or(())?; |
| 510 | if !is_leaf_pte(&flags, level) { |
| 511 | return Ok(()); |
| 512 | } |
| 513 | if !flags.contains(Attributes::READ_ONLY) { |
| 514 | helpers::flush_region(va_range.start().0, va_range.len()); |
| 515 | } |
| 516 | Ok(()) |
| 517 | } |
| 518 | |
| 519 | /// Clears read-only flag on a PTE, making it writable-dirty. Used when dirty state is managed |
| 520 | /// in software to handle permission faults on read-only descriptors. |
| 521 | fn mark_dirty_block( |
| 522 | va_range: &VaRange, |
| 523 | desc: &mut Descriptor, |
| 524 | level: usize, |
| 525 | ) -> result::Result<(), ()> { |
| 526 | let flags = desc.flags().ok_or(())?; |
| 527 | if !is_leaf_pte(&flags, level) { |
| 528 | return Ok(()); |
| 529 | } |
| 530 | if flags.contains(Attributes::DBM) { |
| 531 | assert!(flags.contains(Attributes::READ_ONLY), "unexpected PTE writable state"); |
| 532 | desc.modify_flags(Attributes::empty(), Attributes::READ_ONLY); |
| 533 | // Updating the read-only bit of a PTE requires TLB invalidation. |
| 534 | // A TLB maintenance instruction is only guaranteed to be complete after a DSB instruction. |
| 535 | // An ISB instruction is required to ensure the effects of completed TLB maintenance |
| 536 | // instructions are visible to instructions fetched afterwards. |
| 537 | // See ARM ARM E2.3.10, and G5.9. |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 538 | tlbi!("vale1", PT_ASID, va_range.start().0); |
Jakob Vukalovic | 44b1ce3 | 2023-04-17 19:10:10 +0100 | [diff] [blame] | 539 | dsb!("ish"); |
| 540 | isb!(); |
| 541 | Ok(()) |
| 542 | } else { |
| 543 | Err(()) |
| 544 | } |
| 545 | } |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 546 | |
| 547 | /// Returns memory range reserved for the appended payload. |
| 548 | pub fn appended_payload_range() -> Range<usize> { |
| 549 | let start = helpers::align_up(layout::binary_end(), helpers::SIZE_4KB).unwrap(); |
| 550 | // pvmfw is contained in a 2MiB region so the payload can't be larger than the 2MiB alignment. |
| 551 | let end = helpers::align_up(start, helpers::SIZE_2MB).unwrap(); |
| 552 | start..end |
| 553 | } |
| 554 | |
| 555 | /// Region allocated for the stack. |
| 556 | pub fn stack_range() -> Range<usize> { |
| 557 | const STACK_PAGES: usize = 8; |
| 558 | |
| 559 | layout::stack_range(STACK_PAGES * PVMFW_PAGE_SIZE) |
| 560 | } |
| 561 | |
| 562 | pub fn init_page_table() -> result::Result<PageTable, MapError> { |
| 563 | let mut page_table: PageTable = IdMap::new(PT_ASID, PT_ROOT_LEVEL).into(); |
| 564 | |
| 565 | // Stack and scratch ranges are explicitly zeroed and flushed before jumping to payload, |
| 566 | // so dirty state management can be omitted. |
| 567 | page_table.map_data(&layout::scratch_range())?; |
| 568 | page_table.map_data(&stack_range())?; |
| 569 | page_table.map_code(&layout::text_range())?; |
| 570 | page_table.map_rodata(&layout::rodata_range())?; |
| 571 | page_table.map_data_dbm(&appended_payload_range())?; |
Alice Wang | 807fa59 | 2023-06-02 09:54:43 +0000 | [diff] [blame] | 572 | if let Err(e) = page_table.map_device(&layout::console_uart_range()) { |
| 573 | error!("Failed to remap the UART as a dynamic page table entry: {e}"); |
| 574 | return Err(e); |
| 575 | } |
Pierre-Clément Tosi | ad1fc75 | 2023-05-31 16:56:56 +0000 | [diff] [blame] | 576 | Ok(page_table) |
| 577 | } |