2 * Copyright (c) 2012 ARM Limited
5 * The license below extends only to copyright in the software and shall
6 * not be construed as granting a license to any other intellectual
7 * property including but not limited to intellectual property relating
8 * to a hardware implementation of the functionality of the software
9 * licensed hereunder. You may use the software subject to the license
10 * terms below provided that you ensure that this notice is replicated
11 * unmodified and in its entirety in all distributions of the software,
12 * modified or unmodified, in source code or in binary form.
14 * Redistribution and use in source and binary forms, with or without
15 * modification, are permitted provided that the following conditions are
16 * met: redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer;
18 * redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution;
21 * neither the name of the copyright holders nor the names of its
22 * contributors may be used to endorse or promote products derived from
23 * this software without specific prior written permission.
25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
26 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
27 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
28 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
29 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
30 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
31 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
35 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37 * Authors: Andreas Hansson
41 #include <sys/types.h>
53 #include "base/trace.hh"
54 #include "debug/BusAddrRanges.hh"
55 #include "debug/Checkpoint.hh"
56 #include "mem/abstract_mem.hh"
57 #include "mem/physical.hh"
61 PhysicalMemory::PhysicalMemory(const string
& _name
,
62 const vector
<AbstractMemory
*>& _memories
) :
65 // add the memories from the system to the address map as
67 for (vector
<AbstractMemory
*>::const_iterator m
= _memories
.begin();
68 m
!= _memories
.end(); ++m
) {
69 // only add the memory if it is part of the global address map
70 if ((*m
)->isInAddrMap()) {
71 memories
.push_back(*m
);
73 // calculate the total size once and for all
76 // add the range to our interval tree and make sure it does not
77 // intersect an existing range
78 if (addrMap
.insert((*m
)->getAddrRange(), *m
) == addrMap
.end())
79 fatal("Memory address range for %s is overlapping\n",
82 DPRINTF(BusAddrRanges
,
83 "Skipping memory %s that is not in global address map\n",
85 // this type of memory is used e.g. as reference memory by
86 // Ruby, and they also needs a backing store, but should
87 // not be part of the global address map
89 // simply do it independently, also note that this kind of
90 // memories are allowed to overlap in the logic address
92 vector
<AbstractMemory
*> unmapped_mems
;
93 unmapped_mems
.push_back(*m
);
94 createBackingStore((*m
)->getAddrRange(), unmapped_mems
);
98 // iterate over the increasing addresses and chunks of contigous
99 // space to be mapped to backing store, also remember what
100 // memories constitute the range so we can go and find out if we
101 // have to init their parts to zero
102 vector
<AbstractMemory
*> curr_memories
;
103 for (AddrRangeMap
<AbstractMemory
*>::const_iterator r
= addrMap
.begin();
104 r
!= addrMap
.end(); ++r
) {
105 // simply skip past all memories that are null and hence do
106 // not need any backing store
107 if (!r
->second
->isNull()) {
108 // this will eventually be extended to support merging of
109 // interleaved address ranges, and although it might seem
110 // overly complicated at this point it will all be used
111 curr_memories
.push_back(r
->second
);
112 createBackingStore(r
->first
, curr_memories
);
113 curr_memories
.clear();
119 PhysicalMemory::createBackingStore(AddrRange range
,
120 const vector
<AbstractMemory
*>& _memories
)
122 // perform the actual mmap
123 DPRINTF(BusAddrRanges
, "Creating backing store for range %s\n",
125 int map_flags
= MAP_ANON
| MAP_PRIVATE
;
126 uint8_t* pmem
= (uint8_t*) mmap(NULL
, range
.size(),
127 PROT_READ
| PROT_WRITE
,
130 if (pmem
== (uint8_t*) MAP_FAILED
) {
132 fatal("Could not mmap %d bytes for range %s!\n", range
.size(),
136 // remember this backing store so we can checkpoint it and unmap
138 backingStore
.push_back(make_pair(range
, pmem
));
140 // count how many of the memories are to be zero initialized so we
141 // can see if some but not all have this parameter set
142 uint32_t init_to_zero
= 0;
144 // point the memories to their backing store, and if requested,
145 // initialize the memory range to 0
146 for (vector
<AbstractMemory
*>::const_iterator m
= _memories
.begin();
147 m
!= _memories
.end(); ++m
) {
148 DPRINTF(BusAddrRanges
, "Mapping memory %s to backing store\n",
150 (*m
)->setBackingStore(pmem
);
152 // if it should be zero, then go and make it so
153 if ((*m
)->initToZero()) {
158 if (init_to_zero
!= 0) {
159 if (init_to_zero
!= _memories
.size())
160 fatal("Some, but not all memories in range %s are set zero\n",
163 memset(pmem
, 0, range
.size());
167 PhysicalMemory::~PhysicalMemory()
169 // unmap the backing store
170 for (vector
<pair
<AddrRange
, uint8_t*> >::iterator s
= backingStore
.begin();
171 s
!= backingStore
.end(); ++s
)
172 munmap((char*)s
->second
, s
->first
.size());
176 PhysicalMemory::isMemAddr(Addr addr
) const
178 // see if the address is within the last matched range
179 if (!rangeCache
.contains(addr
)) {
180 // lookup in the interval tree
181 AddrRangeMap
<AbstractMemory
*>::const_iterator r
= addrMap
.find(addr
);
182 if (r
== addrMap
.end()) {
183 // not in the cache, and not in the tree
186 // the range is in the tree, update the cache
187 rangeCache
= r
->first
;
190 assert(addrMap
.find(addr
) != addrMap
.end());
192 // either matched the cache or found in the tree
197 PhysicalMemory::getConfAddrRanges() const
199 // this could be done once in the constructor, but since it is unlikely to
200 // be called more than once the iteration should not be a problem
201 AddrRangeList ranges
;
202 for (vector
<AbstractMemory
*>::const_iterator m
= memories
.begin();
203 m
!= memories
.end(); ++m
) {
204 if ((*m
)->isConfReported()) {
205 ranges
.push_back((*m
)->getAddrRange());
213 PhysicalMemory::access(PacketPtr pkt
)
215 assert(pkt
->isRequest());
216 Addr addr
= pkt
->getAddr();
217 AddrRangeMap
<AbstractMemory
*>::const_iterator m
= addrMap
.find(addr
);
218 assert(m
!= addrMap
.end());
219 m
->second
->access(pkt
);
223 PhysicalMemory::functionalAccess(PacketPtr pkt
)
225 assert(pkt
->isRequest());
226 Addr addr
= pkt
->getAddr();
227 AddrRangeMap
<AbstractMemory
*>::const_iterator m
= addrMap
.find(addr
);
228 assert(m
!= addrMap
.end());
229 m
->second
->functionalAccess(pkt
);
233 PhysicalMemory::serialize(ostream
& os
)
235 // serialize all the locked addresses and their context ids
236 vector
<Addr
> lal_addr
;
239 for (vector
<AbstractMemory
*>::iterator m
= memories
.begin();
240 m
!= memories
.end(); ++m
) {
241 const list
<LockedAddr
>& locked_addrs
= (*m
)->getLockedAddrList();
242 for (list
<LockedAddr
>::const_iterator l
= locked_addrs
.begin();
243 l
!= locked_addrs
.end(); ++l
) {
244 lal_addr
.push_back(l
->addr
);
245 lal_cid
.push_back(l
->contextId
);
249 arrayParamOut(os
, "lal_addr", lal_addr
);
250 arrayParamOut(os
, "lal_cid", lal_cid
);
252 // serialize the backing stores
253 unsigned int nbr_of_stores
= backingStore
.size();
254 SERIALIZE_SCALAR(nbr_of_stores
);
256 unsigned int store_id
= 0;
257 // store each backing store memory segment in a file
258 for (vector
<pair
<AddrRange
, uint8_t*> >::iterator s
= backingStore
.begin();
259 s
!= backingStore
.end(); ++s
) {
260 nameOut(os
, csprintf("%s.store%d", name(), store_id
));
261 serializeStore(os
, store_id
++, s
->first
, s
->second
);
266 PhysicalMemory::serializeStore(ostream
& os
, unsigned int store_id
,
267 AddrRange range
, uint8_t* pmem
)
269 // we cannot use the address range for the name as the
270 // memories that are not part of the address map can overlap
271 string filename
= name() + ".store" + to_string(store_id
) + ".pmem";
272 long range_size
= range
.size();
274 DPRINTF(Checkpoint
, "Serializing physical memory %s with size %d\n",
275 filename
, range_size
);
277 SERIALIZE_SCALAR(store_id
);
278 SERIALIZE_SCALAR(filename
);
279 SERIALIZE_SCALAR(range_size
);
282 string filepath
= Checkpoint::dir() + "/" + filename
.c_str();
283 int fd
= creat(filepath
.c_str(), 0664);
286 fatal("Can't open physical memory checkpoint file '%s'\n",
290 gzFile compressed_mem
= gzdopen(fd
, "wb");
291 if (compressed_mem
== NULL
)
292 fatal("Insufficient memory to allocate compression state for %s\n",
295 uint64_t pass_size
= 0;
297 // gzwrite fails if (int)len < 0 (gzwrite returns int)
298 for (uint64_t written
= 0; written
< range
.size();
299 written
+= pass_size
) {
300 pass_size
= (uint64_t)INT_MAX
< (range
.size() - written
) ?
301 (uint64_t)INT_MAX
: (range
.size() - written
);
303 if (gzwrite(compressed_mem
, pmem
+ written
,
304 (unsigned int) pass_size
) != (int) pass_size
) {
305 fatal("Write failed on physical memory checkpoint file '%s'\n",
310 // close the compressed stream and check that the exit status
312 if (gzclose(compressed_mem
))
313 fatal("Close failed on physical memory checkpoint file '%s'\n",
319 PhysicalMemory::unserialize(Checkpoint
* cp
, const string
& section
)
321 // unserialize the locked addresses and map them to the
322 // appropriate memory controller
323 vector
<Addr
> lal_addr
;
325 arrayParamIn(cp
, section
, "lal_addr", lal_addr
);
326 arrayParamIn(cp
, section
, "lal_cid", lal_cid
);
327 for(size_t i
= 0; i
< lal_addr
.size(); ++i
) {
328 AddrRangeMap
<AbstractMemory
*>::const_iterator m
=
329 addrMap
.find(lal_addr
[i
]);
330 m
->second
->addLockedAddr(LockedAddr(lal_addr
[i
], lal_cid
[i
]));
333 // unserialize the backing stores
334 unsigned int nbr_of_stores
;
335 UNSERIALIZE_SCALAR(nbr_of_stores
);
337 for (unsigned int i
= 0; i
< nbr_of_stores
; ++i
) {
338 unserializeStore(cp
, csprintf("%s.store%d", section
, i
));
344 PhysicalMemory::unserializeStore(Checkpoint
* cp
, const string
& section
)
346 const uint32_t chunk_size
= 16384;
348 unsigned int store_id
;
349 UNSERIALIZE_SCALAR(store_id
);
352 UNSERIALIZE_SCALAR(filename
);
353 string filepath
= cp
->cptDir
+ "/" + filename
;
356 int fd
= open(filepath
.c_str(), O_RDONLY
);
359 fatal("Can't open physical memory checkpoint file '%s'", filename
);
362 gzFile compressed_mem
= gzdopen(fd
, "rb");
363 if (compressed_mem
== NULL
)
364 fatal("Insufficient memory to allocate compression state for %s\n",
367 uint8_t* pmem
= backingStore
[store_id
].second
;
368 AddrRange range
= backingStore
[store_id
].first
;
370 // unmap file that was mmapped in the constructor, this is
371 // done here to make sure that gzip and open don't muck with
372 // our nice large space of memory before we reallocate it
373 munmap((char*) pmem
, range
.size());
376 UNSERIALIZE_SCALAR(range_size
);
378 DPRINTF(Checkpoint
, "Unserializing physical memory %s with size %d\n",
379 filename
, range_size
);
381 if (range_size
!= range
.size())
382 fatal("Memory range size has changed! Saw %lld, expected %lld\n",
383 range_size
, range
.size());
385 pmem
= (uint8_t*) mmap(NULL
, range
.size(), PROT_READ
| PROT_WRITE
,
386 MAP_ANON
| MAP_PRIVATE
, -1, 0);
388 if (pmem
== (void*) MAP_FAILED
) {
390 fatal("Could not mmap physical memory!\n");
393 uint64_t curr_size
= 0;
394 long* temp_page
= new long[chunk_size
];
397 while (curr_size
< range
.size()) {
398 bytes_read
= gzread(compressed_mem
, temp_page
, chunk_size
);
402 assert(bytes_read
% sizeof(long) == 0);
404 for (uint32_t x
= 0; x
< bytes_read
/ sizeof(long); x
++) {
405 // Only copy bytes that are non-zero, so we don't give
406 // the VM system hell
407 if (*(temp_page
+ x
) != 0) {
408 pmem_current
= (long*)(pmem
+ curr_size
+ x
* sizeof(long));
409 *pmem_current
= *(temp_page
+ x
);
412 curr_size
+= bytes_read
;
417 if (gzclose(compressed_mem
))
418 fatal("Close failed on physical memory checkpoint file '%s'\n",