[1] | 1 | /* |
---|
[23] | 2 | * sys_exec.c - Kernel function implementing the "exec" system call. |
---|
[302] | 3 | * |
---|
[625] | 4 | * Authors Alain Greiner (2016,2017,2017,2019) |
---|
[1] | 5 | * |
---|
| 6 | * Copyright (c) UPMC Sorbonne Universites |
---|
| 7 | * |
---|
| 8 | * This file is part of ALMOS-MKH. |
---|
| 9 | * |
---|
| 10 | * ALMOS-MKH is free software; you can redistribute it and/or modify it |
---|
| 11 | * under the terms of the GNU General Public License as published by |
---|
| 12 | * the Free Software Foundation; version 2.0 of the License. |
---|
| 13 | * |
---|
| 14 | * ALMOS-MKH is distributed in the hope that it will be useful, but |
---|
| 15 | * WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
| 16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
---|
| 17 | * General Public License for more details. |
---|
| 18 | * |
---|
| 19 | * You should have received a copy of the GNU General Public License |
---|
| 20 | * along with ALMOS-MKH; if not, write to the Free Software Foundation, |
---|
| 21 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
---|
| 22 | */ |
---|
| 23 | |
---|
[14] | 24 | #include <kernel_config.h> |
---|
[457] | 25 | #include <hal_kernel_types.h> |
---|
[23] | 26 | #include <hal_uspace.h> |
---|
[1] | 27 | #include <errno.h> |
---|
| 28 | #include <printk.h> |
---|
| 29 | #include <core.h> |
---|
| 30 | #include <vfs.h> |
---|
| 31 | #include <cluster.h> |
---|
| 32 | #include <process.h> |
---|
| 33 | #include <thread.h> |
---|
| 34 | #include <vmm.h> |
---|
| 35 | #include <ppm.h> |
---|
| 36 | #include <rpc.h> |
---|
| 37 | |
---|
[506] | 38 | #include <syscalls.h> |
---|
[1] | 39 | |
---|
[302] | 40 | ////////////////////////////////////////////////i////////////////////////////////////// |
---|
[1] | 41 | // This static function is called twice by the sys_exec() function : |
---|
| 42 | // - to register the main() arguments (args) in the exec_info structure. |
---|
| 43 | // - to register the environment variables (envs) in the exec_info structure. |
---|
| 44 | // In both cases the input is an array of string pointers in user space, |
---|
[302] | 45 | // and a set of strings in user space. |
---|
[1] | 46 | // We allocate one physical page to store a kernel copy of the array of pointers, |
---|
| 47 | // we allocate one or several physical pages to store the strings themselve, |
---|
| 48 | // and register these buffers and the number of strings in the exec_info structure. |
---|
[302] | 49 | // The max number of strings is 1024 (for both args and envs). The numbers of pages |
---|
[1] | 50 | // to store the (args) and (envs) strings are configuration parameters. |
---|
[302] | 51 | /////////////////////////////////////////////////////////////////////////////////////// |
---|
[407] | 52 | // @ exec_info : pointer on the exec_info structure. |
---|
| 53 | // @ is_args : true if called for (args) / false if called for (envs). |
---|
| 54 | // @ u_pointers : array of pointers on the strings (in user space). |
---|
[302] | 55 | // @ return 0 if success / non-zero if too many strings or no more memory. |
---|
[1] | 56 | /////////////////////////////////////////////////////////////////////////////////////// |
---|
| 57 | static error_t process_exec_get_strings( exec_info_t * exec_info, |
---|
| 58 | bool_t is_args, |
---|
[302] | 59 | char ** u_pointers ) |
---|
[1] | 60 | { |
---|
| 61 | uint32_t index; // string index |
---|
| 62 | uint32_t found_null; // NULL pointer found in array of pointers |
---|
| 63 | uint32_t length; // string length |
---|
| 64 | kmem_req_t req; // kmem request |
---|
| 65 | page_t * page; // page descriptor |
---|
[315] | 66 | xptr_t base_xp; // extended pointer on page base |
---|
[1] | 67 | uint32_t order; // ln2( number of pages to store strings ) |
---|
[23] | 68 | char ** k_pointers; // base of kernel array of pointers |
---|
| 69 | char * k_buf_ptr; // pointer on first empty slot in kernel strings buffer |
---|
| 70 | char * k_buf_base; // base address of the kernel strings buffer |
---|
[1] | 71 | |
---|
| 72 | // compute ln2( number of pages for kernel strings buffer ) |
---|
[23] | 73 | if( is_args ) order = bits_log2( CONFIG_VMM_ARGS_SIZE ); |
---|
| 74 | else order = bits_log2( CONFIG_VMM_ENVS_SIZE ); |
---|
[1] | 75 | |
---|
[302] | 76 | req.type = KMEM_PAGE; |
---|
| 77 | req.flags = AF_KERNEL | AF_ZERO; |
---|
[1] | 78 | |
---|
| 79 | // allocate one physical page for kernel array of pointers |
---|
| 80 | req.type = 0; |
---|
| 81 | page = kmem_alloc( &req ); |
---|
[23] | 82 | |
---|
| 83 | if( page == NULL ) return ENOMEM; |
---|
| 84 | |
---|
[315] | 85 | base_xp = ppm_page2base( XPTR( local_cxy , page ) ); |
---|
| 86 | k_pointers = (char **)GET_PTR( base_xp ); |
---|
[302] | 87 | |
---|
[1] | 88 | // allocate several physical pages to store the strings themselve |
---|
| 89 | req.type = order; |
---|
| 90 | page = kmem_alloc( &req ); |
---|
[23] | 91 | |
---|
| 92 | if( page == NULL ) return ENOMEM; |
---|
| 93 | |
---|
[315] | 94 | base_xp = ppm_page2base( XPTR( local_cxy , page ) ); |
---|
| 95 | k_buf_base = (char *)GET_PTR( base_xp ); |
---|
[302] | 96 | |
---|
| 97 | // copy the array of pointers to kernel buffer |
---|
[626] | 98 | hal_copy_from_uspace( local_cxy, |
---|
| 99 | k_pointers, |
---|
[1] | 100 | u_pointers, |
---|
| 101 | CONFIG_PPM_PAGE_SIZE ); |
---|
| 102 | |
---|
[23] | 103 | // scan kernel array of pointers to copy the strings |
---|
[1] | 104 | found_null = 0; |
---|
[23] | 105 | k_buf_ptr = k_buf_base; |
---|
[1] | 106 | for( index = 0 ; index < 1024 ; index++ ) |
---|
| 107 | { |
---|
[302] | 108 | if( k_pointers[index] == NULL ) |
---|
[1] | 109 | { |
---|
| 110 | found_null = 1; |
---|
| 111 | break; |
---|
| 112 | } |
---|
| 113 | |
---|
| 114 | // compute string length |
---|
[302] | 115 | length = hal_strlen_from_uspace( k_pointers[index] ); |
---|
| 116 | |
---|
[1] | 117 | // copy the user string to kernel buffer |
---|
[626] | 118 | hal_copy_from_uspace( local_cxy, |
---|
| 119 | k_buf_ptr, |
---|
[23] | 120 | k_pointers[index], |
---|
[1] | 121 | length ); |
---|
| 122 | |
---|
| 123 | // update k_pointer[index] entry |
---|
[23] | 124 | k_pointers[index] = k_buf_ptr; |
---|
[1] | 125 | |
---|
| 126 | // increment pointer on kernel strings buffer |
---|
[23] | 127 | k_buf_ptr += (length + 1); |
---|
[1] | 128 | } |
---|
| 129 | |
---|
[302] | 130 | // update into exec_info structure |
---|
[1] | 131 | if( found_null && is_args ) |
---|
| 132 | { |
---|
| 133 | exec_info->args_pointers = k_pointers; |
---|
[23] | 134 | exec_info->args_buf_base = k_buf_base; |
---|
[1] | 135 | exec_info->args_nr = index; |
---|
| 136 | } |
---|
| 137 | else if( found_null && !is_args ) |
---|
| 138 | { |
---|
| 139 | exec_info->envs_pointers = k_pointers; |
---|
[23] | 140 | exec_info->envs_buf_base = k_buf_base; |
---|
| 141 | exec_info->envs_buf_free = k_buf_ptr; |
---|
[1] | 142 | exec_info->envs_nr = index; |
---|
| 143 | } |
---|
[302] | 144 | else |
---|
[1] | 145 | { |
---|
| 146 | return EINVAL; |
---|
| 147 | } |
---|
| 148 | |
---|
| 149 | return 0; |
---|
| 150 | } // end process_exec_get_strings() |
---|
| 151 | |
---|
| 152 | ///////////////////////////////////////////////////////////////////////////////////////// |
---|
| 153 | // Implementation note: |
---|
[433] | 154 | // This function must be called by the main thread (thread 0 in owner cluster). |
---|
[441] | 155 | // It build an exec_info_t structure containing all informations |
---|
[408] | 156 | // required to initialize the new process descriptor and the associated thread. |
---|
[457] | 157 | // It includes the new process main() arguments, the environment variables, |
---|
[408] | 158 | // and the pathname to the new process .elf file. |
---|
[407] | 159 | // It calls the process_exec_get_strings() functions to copy the main() arguments and |
---|
| 160 | // the environment variables from user buffers to the exec_info_t structure, allocate |
---|
| 161 | // and call the process_make_exec() function. |
---|
[566] | 162 | // As it must destroy all process copies, and all other threads in all clusters, |
---|
[457] | 163 | // the process_make_exec() function must be executed in the owner cluster. |
---|
[408] | 164 | // |
---|
[416] | 165 | // TODO : the args & envs arguments are not supported yet : both must be NULL [AG] |
---|
[1] | 166 | ///////////////////////////////////////////////////////////////////////////////////////// |
---|
[566] | 167 | int sys_exec( char * pathname, // .elf file pathname |
---|
[506] | 168 | char ** args, // process arguments |
---|
| 169 | char ** envs ) // environment variables |
---|
[1] | 170 | { |
---|
[566] | 171 | exec_info_t exec_info; // structure to pass to process_make_exec() |
---|
[407] | 172 | error_t error; |
---|
[1] | 173 | |
---|
[433] | 174 | // get calling thread, process, & pid |
---|
[421] | 175 | thread_t * this = CURRENT_THREAD; |
---|
| 176 | process_t * process = this->process; |
---|
| 177 | pid_t pid = process->pid; |
---|
[23] | 178 | |
---|
[566] | 179 | #if DEBUG_SYS_EXEC |
---|
| 180 | uint64_t tm_start = hal_get_cycles(); |
---|
| 181 | #endif |
---|
| 182 | |
---|
[492] | 183 | assert( (CXY_FROM_PID( pid ) == local_cxy) , |
---|
[433] | 184 | "must be called in the owner cluster\n"); |
---|
[23] | 185 | |
---|
[492] | 186 | assert( (LTID_FROM_TRDID( this->trdid ) == 0) , |
---|
[433] | 187 | "must be called by the main thread\n"); |
---|
| 188 | |
---|
[492] | 189 | assert( (args == NULL) , |
---|
[433] | 190 | "args not supported yet\n" ); |
---|
| 191 | |
---|
[492] | 192 | assert( (envs == NULL) , |
---|
[433] | 193 | "args not supported yet\n" ); |
---|
| 194 | |
---|
[407] | 195 | // check pathname length |
---|
| 196 | if( hal_strlen_from_uspace( pathname ) >= CONFIG_VFS_MAX_PATH_LENGTH ) |
---|
[23] | 197 | { |
---|
[433] | 198 | |
---|
[438] | 199 | #if DEBUG_SYSCALLS_ERROR |
---|
[584] | 200 | printk("\n[ERROR] in %s : thread[%x,%x] pathname too long\n", |
---|
| 201 | __FUNCTION__, pid, this->trdid ); |
---|
[433] | 202 | #endif |
---|
[407] | 203 | this->errno = ENFILE; |
---|
[23] | 204 | return -1; |
---|
| 205 | } |
---|
| 206 | |
---|
[407] | 207 | // copy pathname in exec_info structure (kernel space) |
---|
| 208 | hal_strcpy_from_uspace( exec_info.path , pathname , CONFIG_VFS_MAX_PATH_LENGTH ); |
---|
[408] | 209 | |
---|
[438] | 210 | #if DEBUG_SYS_EXEC |
---|
| 211 | if( DEBUG_SYS_EXEC < tm_start ) |
---|
[625] | 212 | printk("\n[%s] thread[%x,%x] enter for path <%s> / cycle = %d\n", |
---|
[584] | 213 | __FUNCTION__, pid, this->trdid, exec_info.path, (uint32_t)tm_start ); |
---|
[433] | 214 | #endif |
---|
[23] | 215 | |
---|
[407] | 216 | // check and store args in exec_info structure if required |
---|
| 217 | if( args != NULL ) |
---|
[1] | 218 | { |
---|
[407] | 219 | if( process_exec_get_strings( &exec_info , true , args ) ) |
---|
| 220 | { |
---|
[433] | 221 | |
---|
[438] | 222 | #if DEBUG_SYSCALLS_ERROR |
---|
[584] | 223 | printk("\n[ERROR] in %s : thread[%x,%x] cannot access args for <%s>\n", |
---|
| 224 | __FUNCTION__, pid, this->trdid, exec_info.path ); |
---|
[433] | 225 | #endif |
---|
[435] | 226 | this->errno = EINVAL; |
---|
[407] | 227 | return -1; |
---|
| 228 | } |
---|
[23] | 229 | } |
---|
[1] | 230 | |
---|
[407] | 231 | // check and store envs in exec_info structure if required |
---|
| 232 | if( envs != NULL ) |
---|
[23] | 233 | { |
---|
[407] | 234 | if( process_exec_get_strings( &exec_info , false , envs ) ) |
---|
| 235 | { |
---|
[433] | 236 | |
---|
[509] | 237 | #if DEBUG_SYSCALLS_ERROR |
---|
[584] | 238 | printk("\n[ERROR] in %s : thread[%x,%x] cannot access envs for <%s>\n", |
---|
| 239 | __FUNCTION__ , pid, this->trdid, exec_info.path ); |
---|
[433] | 240 | #endif |
---|
[435] | 241 | this->errno = EINVAL; |
---|
[407] | 242 | return -1; |
---|
| 243 | } |
---|
[1] | 244 | } |
---|
[23] | 245 | |
---|
[433] | 246 | // call relevant kernel function |
---|
| 247 | error = process_make_exec( &exec_info ); |
---|
[408] | 248 | |
---|
[433] | 249 | if( error ) |
---|
[1] | 250 | { |
---|
[302] | 251 | |
---|
[438] | 252 | #if DEBUG_SYSCALLS_ERROR |
---|
[584] | 253 | printk("\n[ERROR] in %s : thread[%x,%x] cannot create process for <%s>\n", |
---|
| 254 | __FUNCTION__, pid, this->trdid, exec_info.path ); |
---|
[433] | 255 | #endif |
---|
[23] | 256 | this->errno = error; |
---|
| 257 | return -1; |
---|
[1] | 258 | } |
---|
| 259 | |
---|
[625] | 260 | assert( false , "we should never execute this code" ); |
---|
[1] | 261 | |
---|
[433] | 262 | return 0; |
---|
| 263 | |
---|
[1] | 264 | } // end sys_exec() |
---|
| 265 | |
---|