Go to the documentation of this file.
42 #include <sys/types.h>
54 #include "debug/AddrRanges.hh"
55 #include "debug/Checkpoint.hh"
65 #if defined(__APPLE__) || defined(__FreeBSD__)
67 #define MAP_NORESERVE 0
79 bool mmap_using_noreserve,
80 const std::string& shared_backstore) :
81 _name(_name), size(0), mmapUsingNoReserve(mmap_using_noreserve),
82 sharedBackstore(shared_backstore)
84 if (mmap_using_noreserve)
85 warn(
"Not reserving swap space. May cause SIGSEGV on actual usage\n");
89 for (
const auto&
m : _memories) {
91 if (
m->isInAddrMap()) {
100 "Memory address range for %s is overlapping\n",
107 "Skipping memory %s that is not in global address map\n",
111 fatal_if(
m->getAddrRange().interleaved(),
112 "Memory %s that is not in the global address map cannot "
113 "be interleaved\n",
m->name());
120 m->isConfReported(),
m->isInAddrMap(),
133 if (!
r.second->isNull()) {
135 if (
r.first.interleaved()) {
139 if (!intlv_ranges.empty() &&
140 !intlv_ranges.back().mergesWith(
r.first)) {
144 for (
const auto&
c : curr_memories)
145 if (
f->isConfReported() !=
c->isConfReported() ||
146 f->isInAddrMap() !=
c->isInAddrMap() ||
147 f->isKvmMap() !=
c->isKvmMap())
148 fatal(
"Inconsistent flags in an interleaved "
152 f->isConfReported(),
f->isInAddrMap(),
155 intlv_ranges.clear();
156 curr_memories.clear();
158 intlv_ranges.push_back(
r.first);
159 curr_memories.push_back(
r.second);
163 r.second->isConfReported(),
164 r.second->isInAddrMap(),
165 r.second->isKvmMap());
172 if (!intlv_ranges.empty()) {
176 for (
const auto&
c : curr_memories)
177 if (
f->isConfReported() !=
c->isConfReported() ||
178 f->isInAddrMap() !=
c->isInAddrMap() ||
179 f->isKvmMap() !=
c->isKvmMap())
180 fatal(
"Inconsistent flags in an interleaved "
184 f->isConfReported(),
f->isInAddrMap(),
192 bool conf_table_reported,
bool in_addr_map,
bool kvm_map)
195 "Cannot create backing store for interleaved range %s\n",
199 DPRINTF(AddrRanges,
"Creating backing store for range %s with size %d\n",
207 map_flags = MAP_ANON | MAP_PRIVATE;
209 DPRINTF(AddrRanges,
"Sharing backing store as %s\n",
213 panic(
"Shared memory failed");
214 if (ftruncate(shm_fd, range.
size()))
215 panic(
"Setting size of shared memory failed");
216 map_flags = MAP_SHARED;
222 map_flags |= MAP_NORESERVE;
225 uint8_t* pmem = (uint8_t*) mmap(NULL, range.
size(),
226 PROT_READ | PROT_WRITE,
227 map_flags, shm_fd, 0);
229 if (pmem == (uint8_t*) MAP_FAILED) {
231 fatal(
"Could not mmap %d bytes for range %s!\n", range.
size(),
238 conf_table_reported, in_addr_map, kvm_map);
241 for (
const auto&
m : _memories) {
242 DPRINTF(AddrRanges,
"Mapping memory %s to backing store\n",
244 m->setBackingStore(pmem);
252 munmap((
char*)
s.pmem,
s.range.size());
269 if (
r.second->isConfReported()) {
271 if (
r.first.interleaved()) {
275 if (!intlv_ranges.empty() &&
276 !intlv_ranges.back().mergesWith(
r.first)) {
277 ranges.push_back(
AddrRange(intlv_ranges));
278 intlv_ranges.clear();
280 intlv_ranges.push_back(
r.first);
283 ranges.push_back(
r.first);
290 if (!intlv_ranges.empty()) {
291 ranges.push_back(
AddrRange(intlv_ranges));
303 m->second->access(pkt);
312 m->second->functionalAccess(pkt);
325 lal_addr.push_back(
l.addr);
326 lal_cid.push_back(
l.contextId);
337 unsigned int store_id = 0;
351 std::string filename =
353 long range_size = range.
size();
355 DPRINTF(Checkpoint,
"Serializing physical memory %s with size %d\n",
356 filename, range_size);
364 gzFile compressed_mem = gzopen(filepath.c_str(),
"wb");
365 if (compressed_mem == NULL)
366 fatal(
"Can't open physical memory checkpoint file '%s'\n",
369 uint64_t pass_size = 0;
372 for (uint64_t written = 0; written < range.
size();
373 written += pass_size) {
374 pass_size = (uint64_t)INT_MAX < (range.
size() - written) ?
375 (uint64_t)INT_MAX : (range.
size() - written);
377 if (gzwrite(compressed_mem, pmem + written,
378 (
unsigned int) pass_size) != (
int) pass_size) {
379 fatal(
"Write failed on physical memory checkpoint file '%s'\n",
386 if (gzclose(compressed_mem))
387 fatal(
"Close failed on physical memory checkpoint file '%s'\n",
401 for (
size_t i = 0;
i < lal_addr.size(); ++
i) {
402 const auto&
m =
addrMap.contains(lal_addr[
i]);
403 m->second->addLockedAddr(
LockedAddr(lal_addr[
i], lal_cid[
i]));
407 unsigned int nbr_of_stores;
410 for (
unsigned int i = 0;
i < nbr_of_stores; ++
i) {
420 const uint32_t chunk_size = 16384;
422 unsigned int store_id;
425 std::string filename;
427 std::string filepath = cp.
getCptDir() +
"/" + filename;
430 gzFile compressed_mem = gzopen(filepath.c_str(),
"rb");
431 if (compressed_mem == NULL)
432 fatal(
"Can't open physical memory checkpoint file '%s'", filename);
441 DPRINTF(Checkpoint,
"Unserializing physical memory %s with size %d\n",
442 filename, range_size);
444 if (range_size != range.
size())
445 fatal(
"Memory range size has changed! Saw %lld, expected %lld\n",
446 range_size, range.
size());
448 uint64_t curr_size = 0;
449 long* temp_page =
new long[chunk_size];
452 while (curr_size < range.
size()) {
453 bytes_read = gzread(compressed_mem, temp_page, chunk_size);
457 assert(bytes_read %
sizeof(
long) == 0);
459 for (uint32_t
x = 0;
x < bytes_read /
sizeof(long);
x++) {
462 if (*(temp_page +
x) != 0) {
463 pmem_current = (
long*)(pmem + curr_size +
x *
sizeof(
long));
464 *pmem_current = *(temp_page +
x);
467 curr_size += bytes_read;
472 if (gzclose(compressed_mem))
473 fatal(
"Close failed on physical memory checkpoint file '%s'\n",
#define fatal(...)
This implements a cprintf based fatal() function.
std::string to_string() const
Get a string representation of the range.
void serialize(CheckpointOut &cp) const override
Serialize all the memories in the system.
static std::string dir()
Get the current checkout directory name.
#define UNSERIALIZE_SCALAR(scalar)
#define UNSERIALIZE_CONTAINER(member)
void access(PacketPtr pkt)
Perform an untimed memory access and update all the state (e.g.
void unserialize(CheckpointIn &cp) override
Unserialize the memories in the system.
std::vector< BackingStoreEntry > backingStore
void unserializeStore(CheckpointIn &cp)
Unserialize a specific backing store, identified by a section.
const std::string to_string(sc_enc enc)
void serializeStore(CheckpointOut &cp, unsigned int store_id, AddrRange range, uint8_t *pmem) const
Serialize a specific store.
std::string csprintf(const char *format, const Args &...args)
std::unordered_map< int, std::stack< Addr > > locked_addrs
PhysicalMemory(const PhysicalMemory &)
AddrRangeMap< AbstractMemory *, 1 > addrMap
bool interleaved() const
Determine if the range is interleaved or not.
A Packet is used to encapsulate a transfer between two objects in the memory system (e....
~PhysicalMemory()
Unmap all the backing store we have used.
const bool mmapUsingNoReserve
An abstract memory represents a contiguous block of physical memory, with an associated address range...
const std::string sharedBackstore
std::vector< AbstractMemory * > memories
Addr size() const
Get the size of the address range.
uint64_t Addr
Address type This will probably be moved somewhere else in the near future.
void functionalAccess(PacketPtr pkt)
Perform an untimed memory read or write without changing anything but the memory itself.
#define SERIALIZE_SCALAR(scalar)
const std::string name() const
Return the name for debugging and for creation of sections for checkpointing.
const std::string getCptDir()
#define panic_if(cond,...)
Conditional panic macro that checks the supplied condition and only panics if the condition is true a...
#define SERIALIZE_CONTAINER(member)
Locked address class that represents a physical address and a context id.
bool isMemAddr(Addr addr) const
Check if a physical address is within a range of a memory that is part of the global address map.
std::ostream CheckpointOut
The AddrRange class encapsulates an address range, and supports a number of tests to check if two ran...
#define fatal_if(cond,...)
Conditional fatal macro that checks the supplied condition and only causes a fatal error if the condi...
Reference material can be found at the JEDEC website: UFS standard http://www.jedec....
AddrRange getAddrRange() const
Get address range to which this packet belongs.
AddrRangeList getConfAddrRanges() const
Get the memory ranges for all memories that are to be reported to the configuration table.
void createBackingStore(AddrRange range, const std::vector< AbstractMemory * > &_memories, bool conf_table_reported, bool in_addr_map, bool kvm_map)
Create the memory region providing the backing store for a given address range that corresponds to a ...
#define panic(...)
This implements a cprintf based panic() function.
Generated on Wed May 4 2022 12:14:00 for gem5 by doxygen 1.8.17