| [1] | 1 | /* | 
|---|
| [23] | 2 | * sys_exec.c - Kernel function implementing the "exec" system call. | 
|---|
| [302] | 3 | * | 
|---|
| [23] | 4 | * Authors   Alain Greiner (2016,2017) | 
|---|
| [1] | 5 | * | 
|---|
|  | 6 | * Copyright (c) UPMC Sorbonne Universites | 
|---|
|  | 7 | * | 
|---|
|  | 8 | * This file is part of ALMOS-MKH. | 
|---|
|  | 9 | * | 
|---|
|  | 10 | * ALMOS-MKH is free software; you can redistribute it and/or modify it | 
|---|
|  | 11 | * under the terms of the GNU General Public License as published by | 
|---|
|  | 12 | * the Free Software Foundation; version 2.0 of the License. | 
|---|
|  | 13 | * | 
|---|
|  | 14 | * ALMOS-MKH is distributed in the hope that it will be useful, but | 
|---|
|  | 15 | * WITHOUT ANY WARRANTY; without even the implied warranty of | 
|---|
|  | 16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|---|
|  | 17 | * General Public License for more details. | 
|---|
|  | 18 | * | 
|---|
|  | 19 | * You should have received a copy of the GNU General Public License | 
|---|
|  | 20 | * along with ALMOS-MKH; if not, write to the Free Software Foundation, | 
|---|
|  | 21 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | 
|---|
|  | 22 | */ | 
|---|
|  | 23 |  | 
|---|
| [14] | 24 | #include <kernel_config.h> | 
|---|
| [457] | 25 | #include <hal_kernel_types.h> | 
|---|
| [23] | 26 | #include <hal_uspace.h> | 
|---|
| [1] | 27 | #include <errno.h> | 
|---|
|  | 28 | #include <printk.h> | 
|---|
|  | 29 | #include <core.h> | 
|---|
|  | 30 | #include <vfs.h> | 
|---|
|  | 31 | #include <cluster.h> | 
|---|
|  | 32 | #include <process.h> | 
|---|
|  | 33 | #include <thread.h> | 
|---|
|  | 34 | #include <vmm.h> | 
|---|
|  | 35 | #include <ppm.h> | 
|---|
|  | 36 | #include <rpc.h> | 
|---|
|  | 37 |  | 
|---|
| [506] | 38 | #include <syscalls.h> | 
|---|
| [1] | 39 |  | 
|---|
| [302] | 40 | ////////////////////////////////////////////////i////////////////////////////////////// | 
|---|
| [1] | 41 | // This static function is called twice by the sys_exec() function : | 
|---|
|  | 42 | // - to register the main() arguments (args) in the exec_info structure. | 
|---|
|  | 43 | // - to register the environment variables (envs) in the exec_info structure. | 
|---|
|  | 44 | // In both cases the input is an array of string pointers in user space, | 
|---|
| [302] | 45 | // and a set of strings in user space. | 
|---|
| [1] | 46 | // We allocate one physical page to store a kernel copy of the array of pointers, | 
|---|
|  | 47 | // we allocate one or several physical pages to store the strings themselve, | 
|---|
|  | 48 | // and register these buffers and the number of strings in the exec_info structure. | 
|---|
| [302] | 49 | // The max number of strings is 1024 (for both args and envs). The numbers of pages | 
|---|
| [1] | 50 | // to store the (args) and (envs) strings are configuration parameters. | 
|---|
| [302] | 51 | /////////////////////////////////////////////////////////////////////////////////////// | 
|---|
| [407] | 52 | // @ exec_info   : pointer on the exec_info structure. | 
|---|
|  | 53 | // @ is_args     : true if called for (args) / false if called for (envs). | 
|---|
|  | 54 | // @ u_pointers  : array of pointers on the strings (in user space). | 
|---|
| [302] | 55 | // @ return 0 if success / non-zero if too many strings or no more memory. | 
|---|
| [1] | 56 | /////////////////////////////////////////////////////////////////////////////////////// | 
|---|
|  | 57 | static error_t process_exec_get_strings( exec_info_t  * exec_info, | 
|---|
|  | 58 | bool_t         is_args, | 
|---|
| [302] | 59 | char        ** u_pointers ) | 
|---|
| [1] | 60 | { | 
|---|
|  | 61 | uint32_t     index;       // string index | 
|---|
|  | 62 | uint32_t     found_null;  // NULL pointer found in array of pointers | 
|---|
|  | 63 | uint32_t     length;      // string length | 
|---|
|  | 64 | kmem_req_t   req;         // kmem request | 
|---|
|  | 65 | page_t     * page;        // page descriptor | 
|---|
| [315] | 66 | xptr_t       base_xp;     // extended pointer on page base | 
|---|
| [1] | 67 | uint32_t     order;       // ln2( number of pages to store strings ) | 
|---|
| [23] | 68 | char      ** k_pointers;  // base of kernel array of pointers | 
|---|
|  | 69 | char       * k_buf_ptr;   // pointer on first empty slot in kernel strings buffer | 
|---|
|  | 70 | char       * k_buf_base;  // base address of the kernel strings buffer | 
|---|
| [1] | 71 |  | 
|---|
|  | 72 | // compute ln2( number of pages for kernel strings buffer ) | 
|---|
| [23] | 73 | if( is_args ) order = bits_log2( CONFIG_VMM_ARGS_SIZE ); | 
|---|
|  | 74 | else          order = bits_log2( CONFIG_VMM_ENVS_SIZE ); | 
|---|
| [1] | 75 |  | 
|---|
| [302] | 76 | req.type   = KMEM_PAGE; | 
|---|
|  | 77 | req.flags  = AF_KERNEL | AF_ZERO; | 
|---|
| [1] | 78 |  | 
|---|
|  | 79 | // allocate one physical page for kernel array of pointers | 
|---|
|  | 80 | req.type   = 0; | 
|---|
|  | 81 | page       = kmem_alloc( &req ); | 
|---|
| [23] | 82 |  | 
|---|
|  | 83 | if( page == NULL ) return ENOMEM; | 
|---|
|  | 84 |  | 
|---|
| [315] | 85 | base_xp = ppm_page2base( XPTR( local_cxy , page ) ); | 
|---|
|  | 86 | k_pointers = (char **)GET_PTR( base_xp ); | 
|---|
| [302] | 87 |  | 
|---|
| [1] | 88 | // allocate several physical pages to store the strings themselve | 
|---|
|  | 89 | req.type   = order; | 
|---|
|  | 90 | page       = kmem_alloc( &req ); | 
|---|
| [23] | 91 |  | 
|---|
|  | 92 | if( page == NULL ) return ENOMEM; | 
|---|
|  | 93 |  | 
|---|
| [315] | 94 | base_xp = ppm_page2base( XPTR( local_cxy , page ) ); | 
|---|
|  | 95 | k_buf_base = (char *)GET_PTR( base_xp ); | 
|---|
| [302] | 96 |  | 
|---|
|  | 97 | // copy the array of pointers to kernel buffer | 
|---|
|  | 98 | hal_copy_from_uspace( k_pointers, | 
|---|
| [1] | 99 | u_pointers, | 
|---|
|  | 100 | CONFIG_PPM_PAGE_SIZE ); | 
|---|
|  | 101 |  | 
|---|
| [23] | 102 | // scan kernel array of pointers to copy the strings | 
|---|
| [1] | 103 | found_null = 0; | 
|---|
| [23] | 104 | k_buf_ptr  = k_buf_base; | 
|---|
| [1] | 105 | for( index = 0 ; index < 1024 ; index++ ) | 
|---|
|  | 106 | { | 
|---|
| [302] | 107 | if( k_pointers[index] == NULL ) | 
|---|
| [1] | 108 | { | 
|---|
|  | 109 | found_null = 1; | 
|---|
|  | 110 | break; | 
|---|
|  | 111 | } | 
|---|
|  | 112 |  | 
|---|
|  | 113 | // compute string length | 
|---|
| [302] | 114 | length = hal_strlen_from_uspace( k_pointers[index] ); | 
|---|
|  | 115 |  | 
|---|
| [1] | 116 | // copy the user string to kernel buffer | 
|---|
| [23] | 117 | hal_copy_from_uspace( k_buf_ptr, | 
|---|
|  | 118 | k_pointers[index], | 
|---|
| [1] | 119 | length ); | 
|---|
|  | 120 |  | 
|---|
|  | 121 | // update k_pointer[index] entry | 
|---|
| [23] | 122 | k_pointers[index] = k_buf_ptr; | 
|---|
| [1] | 123 |  | 
|---|
|  | 124 | // increment pointer on kernel strings buffer | 
|---|
| [23] | 125 | k_buf_ptr += (length + 1); | 
|---|
| [1] | 126 | } | 
|---|
|  | 127 |  | 
|---|
| [302] | 128 | // update into exec_info structure | 
|---|
| [1] | 129 | if( found_null && is_args ) | 
|---|
|  | 130 | { | 
|---|
|  | 131 | exec_info->args_pointers  =  k_pointers; | 
|---|
| [23] | 132 | exec_info->args_buf_base  =  k_buf_base; | 
|---|
| [1] | 133 | exec_info->args_nr        =  index; | 
|---|
|  | 134 | } | 
|---|
|  | 135 | else if( found_null && !is_args ) | 
|---|
|  | 136 | { | 
|---|
|  | 137 | exec_info->envs_pointers  =  k_pointers; | 
|---|
| [23] | 138 | exec_info->envs_buf_base  =  k_buf_base; | 
|---|
|  | 139 | exec_info->envs_buf_free  =  k_buf_ptr; | 
|---|
| [1] | 140 | exec_info->envs_nr        =  index; | 
|---|
|  | 141 | } | 
|---|
| [302] | 142 | else | 
|---|
| [1] | 143 | { | 
|---|
|  | 144 | return EINVAL; | 
|---|
|  | 145 | } | 
|---|
|  | 146 |  | 
|---|
|  | 147 | return 0; | 
|---|
|  | 148 | } // end process_exec_get_strings() | 
|---|
|  | 149 |  | 
|---|
|  | 150 | ///////////////////////////////////////////////////////////////////////////////////////// | 
|---|
|  | 151 | // Implementation note: | 
|---|
| [433] | 152 | // This function must be called by the main thread (thread 0 in owner cluster). | 
|---|
| [441] | 153 | // It build an exec_info_t structure containing all informations | 
|---|
| [408] | 154 | // required to initialize the new process descriptor and the associated thread. | 
|---|
| [457] | 155 | // It includes the new process main() arguments, the environment variables, | 
|---|
| [408] | 156 | // and the pathname to the new process .elf file. | 
|---|
| [407] | 157 | // It calls the process_exec_get_strings() functions to copy the main() arguments and | 
|---|
|  | 158 | // the environment variables from user buffers to the exec_info_t structure, allocate | 
|---|
|  | 159 | // and call the process_make_exec() function. | 
|---|
| [566] | 160 | // As it must destroy all process copies, and all other threads in all clusters, | 
|---|
| [457] | 161 | // the process_make_exec() function must be executed in the owner cluster. | 
|---|
| [408] | 162 | // | 
|---|
| [416] | 163 | // TODO : the args & envs arguments are not supported yet : both must be NULL  [AG] | 
|---|
| [1] | 164 | ///////////////////////////////////////////////////////////////////////////////////////// | 
|---|
| [566] | 165 | int sys_exec( char  * pathname,       // .elf file pathname | 
|---|
| [506] | 166 | char ** args,           // process arguments | 
|---|
|  | 167 | char ** envs )          // environment variables | 
|---|
| [1] | 168 | { | 
|---|
| [566] | 169 | exec_info_t   exec_info;          // structure to pass to process_make_exec() | 
|---|
| [407] | 170 | error_t       error; | 
|---|
| [1] | 171 |  | 
|---|
| [433] | 172 | // get calling thread, process, & pid | 
|---|
| [421] | 173 | thread_t    * this    = CURRENT_THREAD; | 
|---|
|  | 174 | process_t   * process = this->process; | 
|---|
|  | 175 | pid_t         pid     = process->pid; | 
|---|
| [23] | 176 |  | 
|---|
| [566] | 177 | #if DEBUG_SYS_EXEC | 
|---|
|  | 178 | uint64_t     tm_start = hal_get_cycles(); | 
|---|
|  | 179 | #endif | 
|---|
|  | 180 |  | 
|---|
| [492] | 181 | assert( (CXY_FROM_PID( pid ) == local_cxy) , | 
|---|
| [433] | 182 | "must be called in the owner cluster\n"); | 
|---|
| [23] | 183 |  | 
|---|
| [492] | 184 | assert( (LTID_FROM_TRDID( this->trdid ) == 0) , | 
|---|
| [433] | 185 | "must be called by the main thread\n"); | 
|---|
|  | 186 |  | 
|---|
| [492] | 187 | assert( (args == NULL) , | 
|---|
| [433] | 188 | "args not supported yet\n" ); | 
|---|
|  | 189 |  | 
|---|
| [492] | 190 | assert( (envs == NULL) , | 
|---|
| [433] | 191 | "args not supported yet\n" ); | 
|---|
|  | 192 |  | 
|---|
| [407] | 193 | // check pathname length | 
|---|
|  | 194 | if( hal_strlen_from_uspace( pathname ) >= CONFIG_VFS_MAX_PATH_LENGTH ) | 
|---|
| [23] | 195 | { | 
|---|
| [433] | 196 |  | 
|---|
| [438] | 197 | #if DEBUG_SYSCALLS_ERROR | 
|---|
| [584] | 198 | printk("\n[ERROR] in %s : thread[%x,%x] pathname too long\n", | 
|---|
|  | 199 | __FUNCTION__, pid, this->trdid ); | 
|---|
| [433] | 200 | #endif | 
|---|
| [407] | 201 | this->errno = ENFILE; | 
|---|
| [23] | 202 | return -1; | 
|---|
|  | 203 | } | 
|---|
|  | 204 |  | 
|---|
| [407] | 205 | // copy pathname in exec_info structure (kernel space) | 
|---|
|  | 206 | hal_strcpy_from_uspace( exec_info.path , pathname , CONFIG_VFS_MAX_PATH_LENGTH ); | 
|---|
| [408] | 207 |  | 
|---|
| [438] | 208 | #if DEBUG_SYS_EXEC | 
|---|
|  | 209 | if( DEBUG_SYS_EXEC < tm_start ) | 
|---|
| [584] | 210 | printk("\n[DBG] %s : thread[%x,%x] enter for path <%s> / cycle = %d\n", | 
|---|
|  | 211 | __FUNCTION__, pid, this->trdid, exec_info.path, (uint32_t)tm_start ); | 
|---|
| [433] | 212 | #endif | 
|---|
| [23] | 213 |  | 
|---|
| [407] | 214 | // check and store args in exec_info structure if required | 
|---|
|  | 215 | if( args != NULL ) | 
|---|
| [1] | 216 | { | 
|---|
| [407] | 217 | if( process_exec_get_strings( &exec_info , true , args ) ) | 
|---|
|  | 218 | { | 
|---|
| [433] | 219 |  | 
|---|
| [438] | 220 | #if DEBUG_SYSCALLS_ERROR | 
|---|
| [584] | 221 | printk("\n[ERROR] in %s : thread[%x,%x] cannot access args for <%s>\n", | 
|---|
|  | 222 | __FUNCTION__, pid, this->trdid, exec_info.path ); | 
|---|
| [433] | 223 | #endif | 
|---|
| [435] | 224 | this->errno = EINVAL; | 
|---|
| [407] | 225 | return -1; | 
|---|
|  | 226 | } | 
|---|
| [23] | 227 | } | 
|---|
| [1] | 228 |  | 
|---|
| [407] | 229 | // check and store envs in exec_info structure if required | 
|---|
|  | 230 | if( envs != NULL ) | 
|---|
| [23] | 231 | { | 
|---|
| [407] | 232 | if( process_exec_get_strings( &exec_info , false , envs ) ) | 
|---|
|  | 233 | { | 
|---|
| [433] | 234 |  | 
|---|
| [509] | 235 | #if DEBUG_SYSCALLS_ERROR | 
|---|
| [584] | 236 | printk("\n[ERROR] in %s : thread[%x,%x] cannot access envs for <%s>\n", | 
|---|
|  | 237 | __FUNCTION__ , pid, this->trdid, exec_info.path ); | 
|---|
| [433] | 238 | #endif | 
|---|
| [435] | 239 | this->errno = EINVAL; | 
|---|
| [407] | 240 | return -1; | 
|---|
|  | 241 | } | 
|---|
| [1] | 242 | } | 
|---|
| [23] | 243 |  | 
|---|
| [433] | 244 | // call relevant kernel function | 
|---|
|  | 245 | error = process_make_exec( &exec_info ); | 
|---|
| [408] | 246 |  | 
|---|
| [433] | 247 | if( error ) | 
|---|
| [1] | 248 | { | 
|---|
| [302] | 249 |  | 
|---|
| [438] | 250 | #if DEBUG_SYSCALLS_ERROR | 
|---|
| [584] | 251 | printk("\n[ERROR] in %s : thread[%x,%x] cannot create process for <%s>\n", | 
|---|
|  | 252 | __FUNCTION__, pid, this->trdid, exec_info.path ); | 
|---|
| [433] | 253 | #endif | 
|---|
| [23] | 254 | this->errno = error; | 
|---|
|  | 255 | return -1; | 
|---|
| [1] | 256 | } | 
|---|
|  | 257 |  | 
|---|
| [492] | 258 | assert( false , "we should not execute this code" ); | 
|---|
| [1] | 259 |  | 
|---|
| [433] | 260 | return 0; | 
|---|
|  | 261 |  | 
|---|
| [1] | 262 | } // end sys_exec() | 
|---|
|  | 263 |  | 
|---|