Back to home page

OSCL-LXR

 
 

    


0001 =============================
0002 No-MMU memory mapping support
0003 =============================
0004 
0005 The kernel has limited support for memory mapping under no-MMU conditions, such
0006 as are used in uClinux environments. From the userspace point of view, memory
0007 mapping is made use of in conjunction with the mmap() system call, the shmat()
0008 call and the execve() system call. From the kernel's point of view, execve()
0009 mapping is actually performed by the binfmt drivers, which call back into the
0010 mmap() routines to do the actual work.
0011 
0012 Memory mapping behaviour also involves the way fork(), vfork(), clone() and
0013 ptrace() work. Under uClinux there is no fork(), and clone() must be supplied
0014 the CLONE_VM flag.
0015 
0016 The behaviour is similar between the MMU and no-MMU cases, but not identical;
0017 and it's also much more restricted in the latter case:
0018 
0019  (#) Anonymous mapping, MAP_PRIVATE
0020 
0021         In the MMU case: VM regions backed by arbitrary pages; copy-on-write
0022         across fork.
0023 
0024         In the no-MMU case: VM regions backed by arbitrary contiguous runs of
0025         pages.
0026 
0027  (#) Anonymous mapping, MAP_SHARED
0028 
0029         These behave very much like private mappings, except that they're
0030         shared across fork() or clone() without CLONE_VM in the MMU case. Since
0031         the no-MMU case doesn't support these, behaviour is identical to
0032         MAP_PRIVATE there.
0033 
0034  (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, !PROT_WRITE
0035 
0036         In the MMU case: VM regions backed by pages read from file; changes to
0037         the underlying file are reflected in the mapping; copied across fork.
0038 
0039         In the no-MMU case:
0040 
0041          - If one exists, the kernel will re-use an existing mapping to the
0042            same segment of the same file if that has compatible permissions,
0043            even if this was created by another process.
0044 
0045          - If possible, the file mapping will be directly on the backing device
0046            if the backing device has the NOMMU_MAP_DIRECT capability and
0047            appropriate mapping protection capabilities. Ramfs, romfs, cramfs
0048            and mtd might all permit this.
0049 
0050          - If the backing device can't or won't permit direct sharing,
0051            but does have the NOMMU_MAP_COPY capability, then a copy of the
0052            appropriate bit of the file will be read into a contiguous bit of
0053            memory and any extraneous space beyond the EOF will be cleared
0054 
0055          - Writes to the file do not affect the mapping; writes to the mapping
0056            are visible in other processes (no MMU protection), but should not
0057            happen.
0058 
0059  (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, PROT_WRITE
0060 
0061         In the MMU case: like the non-PROT_WRITE case, except that the pages in
0062         question get copied before the write actually happens. From that point
0063         on writes to the file underneath that page no longer get reflected into
0064         the mapping's backing pages. The page is then backed by swap instead.
0065 
0066         In the no-MMU case: works much like the non-PROT_WRITE case, except
0067         that a copy is always taken and never shared.
0068 
0069  (#) Regular file / blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE
0070 
0071         In the MMU case: VM regions backed by pages read from file; changes to
0072         pages written back to file; writes to file reflected into pages backing
0073         mapping; shared across fork.
0074 
0075         In the no-MMU case: not supported.
0076 
0077  (#) Memory backed regular file, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE
0078 
0079         In the MMU case: As for ordinary regular files.
0080 
0081         In the no-MMU case: The filesystem providing the memory-backed file
0082         (such as ramfs or tmpfs) may choose to honour an open, truncate, mmap
0083         sequence by providing a contiguous sequence of pages to map. In that
0084         case, a shared-writable memory mapping will be possible. It will work
0085         as for the MMU case. If the filesystem does not provide any such
0086         support, then the mapping request will be denied.
0087 
0088  (#) Memory backed blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE
0089 
0090         In the MMU case: As for ordinary regular files.
0091 
0092         In the no-MMU case: As for memory backed regular files, but the
0093         blockdev must be able to provide a contiguous run of pages without
0094         truncate being called. The ramdisk driver could do this if it allocated
0095         all its memory as a contiguous array upfront.
0096 
0097  (#) Memory backed chardev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE
0098 
0099         In the MMU case: As for ordinary regular files.
0100 
0101         In the no-MMU case: The character device driver may choose to honour
0102         the mmap() by providing direct access to the underlying device if it
0103         provides memory or quasi-memory that can be accessed directly. Examples
0104         of such are frame buffers and flash devices. If the driver does not
0105         provide any such support, then the mapping request will be denied.
0106 
0107 
0108 Further notes on no-MMU MMAP
0109 ============================
0110 
0111  (#) A request for a private mapping of a file may return a buffer that is not
0112      page-aligned.  This is because XIP may take place, and the data may not be
0113      paged aligned in the backing store.
0114 
0115  (#) A request for an anonymous mapping will always be page aligned.  If
0116      possible the size of the request should be a power of two otherwise some
0117      of the space may be wasted as the kernel must allocate a power-of-2
0118      granule but will only discard the excess if appropriately configured as
0119      this has an effect on fragmentation.
0120 
0121  (#) The memory allocated by a request for an anonymous mapping will normally
0122      be cleared by the kernel before being returned in accordance with the
0123      Linux man pages (ver 2.22 or later).
0124 
0125      In the MMU case this can be achieved with reasonable performance as
0126      regions are backed by virtual pages, with the contents only being mapped
0127      to cleared physical pages when a write happens on that specific page
0128      (prior to which, the pages are effectively mapped to the global zero page
0129      from which reads can take place).  This spreads out the time it takes to
0130      initialize the contents of a page - depending on the write-usage of the
0131      mapping.
0132 
0133      In the no-MMU case, however, anonymous mappings are backed by physical
0134      pages, and the entire map is cleared at allocation time.  This can cause
0135      significant delays during a userspace malloc() as the C library does an
0136      anonymous mapping and the kernel then does a memset for the entire map.
0137 
0138      However, for memory that isn't required to be precleared - such as that
0139      returned by malloc() - mmap() can take a MAP_UNINITIALIZED flag to
0140      indicate to the kernel that it shouldn't bother clearing the memory before
0141      returning it.  Note that CONFIG_MMAP_ALLOW_UNINITIALIZED must be enabled
0142      to permit this, otherwise the flag will be ignored.
0143 
0144      uClibc uses this to speed up malloc(), and the ELF-FDPIC binfmt uses this
0145      to allocate the brk and stack region.
0146 
0147  (#) A list of all the private copy and anonymous mappings on the system is
0148      visible through /proc/maps in no-MMU mode.
0149 
0150  (#) A list of all the mappings in use by a process is visible through
0151      /proc/<pid>/maps in no-MMU mode.
0152 
0153  (#) Supplying MAP_FIXED or a requesting a particular mapping address will
0154      result in an error.
0155 
0156  (#) Files mapped privately usually have to have a read method provided by the
0157      driver or filesystem so that the contents can be read into the memory
0158      allocated if mmap() chooses not to map the backing device directly. An
0159      error will result if they don't. This is most likely to be encountered
0160      with character device files, pipes, fifos and sockets.
0161 
0162 
0163 Interprocess shared memory
0164 ==========================
0165 
0166 Both SYSV IPC SHM shared memory and POSIX shared memory is supported in NOMMU
0167 mode.  The former through the usual mechanism, the latter through files created
0168 on ramfs or tmpfs mounts.
0169 
0170 
0171 Futexes
0172 =======
0173 
0174 Futexes are supported in NOMMU mode if the arch supports them.  An error will
0175 be given if an address passed to the futex system call lies outside the
0176 mappings made by a process or if the mapping in which the address lies does not
0177 support futexes (such as an I/O chardev mapping).
0178 
0179 
0180 No-MMU mremap
0181 =============
0182 
0183 The mremap() function is partially supported.  It may change the size of a
0184 mapping, and may move it [#]_ if MREMAP_MAYMOVE is specified and if the new size
0185 of the mapping exceeds the size of the slab object currently occupied by the
0186 memory to which the mapping refers, or if a smaller slab object could be used.
0187 
0188 MREMAP_FIXED is not supported, though it is ignored if there's no change of
0189 address and the object does not need to be moved.
0190 
0191 Shared mappings may not be moved.  Shareable mappings may not be moved either,
0192 even if they are not currently shared.
0193 
0194 The mremap() function must be given an exact match for base address and size of
0195 a previously mapped object.  It may not be used to create holes in existing
0196 mappings, move parts of existing mappings or resize parts of mappings.  It must
0197 act on a complete mapping.
0198 
0199 .. [#] Not currently supported.
0200 
0201 
0202 Providing shareable character device support
0203 ============================================
0204 
0205 To provide shareable character device support, a driver must provide a
0206 file->f_op->get_unmapped_area() operation. The mmap() routines will call this
0207 to get a proposed address for the mapping. This may return an error if it
0208 doesn't wish to honour the mapping because it's too long, at a weird offset,
0209 under some unsupported combination of flags or whatever.
0210 
0211 The driver should also provide backing device information with capabilities set
0212 to indicate the permitted types of mapping on such devices. The default is
0213 assumed to be readable and writable, not executable, and only shareable
0214 directly (can't be copied).
0215 
0216 The file->f_op->mmap() operation will be called to actually inaugurate the
0217 mapping. It can be rejected at that point. Returning the ENOSYS error will
0218 cause the mapping to be copied instead if NOMMU_MAP_COPY is specified.
0219 
0220 The vm_ops->close() routine will be invoked when the last mapping on a chardev
0221 is removed. An existing mapping will be shared, partially or not, if possible
0222 without notifying the driver.
0223 
0224 It is permitted also for the file->f_op->get_unmapped_area() operation to
0225 return -ENOSYS. This will be taken to mean that this operation just doesn't
0226 want to handle it, despite the fact it's got an operation. For instance, it
0227 might try directing the call to a secondary driver which turns out not to
0228 implement it. Such is the case for the framebuffer driver which attempts to
0229 direct the call to the device-specific driver. Under such circumstances, the
0230 mapping request will be rejected if NOMMU_MAP_COPY is not specified, and a
0231 copy mapped otherwise.
0232 
0233 .. important::
0234 
0235         Some types of device may present a different appearance to anyone
0236         looking at them in certain modes. Flash chips can be like this; for
0237         instance if they're in programming or erase mode, you might see the
0238         status reflected in the mapping, instead of the data.
0239 
0240         In such a case, care must be taken lest userspace see a shared or a
0241         private mapping showing such information when the driver is busy
0242         controlling the device. Remember especially: private executable
0243         mappings may still be mapped directly off the device under some
0244         circumstances!
0245 
0246 
0247 Providing shareable memory-backed file support
0248 ==============================================
0249 
0250 Provision of shared mappings on memory backed files is similar to the provision
0251 of support for shared mapped character devices. The main difference is that the
0252 filesystem providing the service will probably allocate a contiguous collection
0253 of pages and permit mappings to be made on that.
0254 
0255 It is recommended that a truncate operation applied to such a file that
0256 increases the file size, if that file is empty, be taken as a request to gather
0257 enough pages to honour a mapping. This is required to support POSIX shared
0258 memory.
0259 
0260 Memory backed devices are indicated by the mapping's backing device info having
0261 the memory_backed flag set.
0262 
0263 
0264 Providing shareable block device support
0265 ========================================
0266 
0267 Provision of shared mappings on block device files is exactly the same as for
0268 character devices. If there isn't a real device underneath, then the driver
0269 should allocate sufficient contiguous memory to honour any supported mapping.
0270 
0271 
0272 Adjusting page trimming behaviour
0273 =================================
0274 
0275 NOMMU mmap automatically rounds up to the nearest power-of-2 number of pages
0276 when performing an allocation.  This can have adverse effects on memory
0277 fragmentation, and as such, is left configurable.  The default behaviour is to
0278 aggressively trim allocations and discard any excess pages back in to the page
0279 allocator.  In order to retain finer-grained control over fragmentation, this
0280 behaviour can either be disabled completely, or bumped up to a higher page
0281 watermark where trimming begins.
0282 
0283 Page trimming behaviour is configurable via the sysctl ``vm.nr_trim_pages``.