| [1] | 1 | /* | 
|---|
|  | 2 | * sys_exec.c - Kernel function implementing the "exec" syscall | 
|---|
|  | 3 | * | 
|---|
|  | 4 | * Authors    Mohamed Lamine Karaoui (2015) | 
|---|
|  | 5 | *            Alain Greiner          (2016) | 
|---|
|  | 6 | * | 
|---|
|  | 7 | * Copyright (c) UPMC Sorbonne Universites | 
|---|
|  | 8 | * | 
|---|
|  | 9 | * This file is part of ALMOS-MKH. | 
|---|
|  | 10 | * | 
|---|
|  | 11 | * ALMOS-MKH is free software; you can redistribute it and/or modify it | 
|---|
|  | 12 | * under the terms of the GNU General Public License as published by | 
|---|
|  | 13 | * the Free Software Foundation; version 2.0 of the License. | 
|---|
|  | 14 | * | 
|---|
|  | 15 | * ALMOS-MKH is distributed in the hope that it will be useful, but | 
|---|
|  | 16 | * WITHOUT ANY WARRANTY; without even the implied warranty of | 
|---|
|  | 17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|---|
|  | 18 | * General Public License for more details. | 
|---|
|  | 19 | * | 
|---|
|  | 20 | * You should have received a copy of the GNU General Public License | 
|---|
|  | 21 | * along with ALMOS-MKH; if not, write to the Free Software Foundation, | 
|---|
|  | 22 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | 
|---|
|  | 23 | */ | 
|---|
|  | 24 |  | 
|---|
|  | 25 | #include <almos_config.h> | 
|---|
|  | 26 | #include <hal_types.h> | 
|---|
|  | 27 | #include <errno.h> | 
|---|
|  | 28 | #include <printk.h> | 
|---|
|  | 29 | #include <core.h> | 
|---|
|  | 30 | #include <vfs.h> | 
|---|
|  | 31 | #include <cluster.h> | 
|---|
|  | 32 | #include <process.h> | 
|---|
|  | 33 | #include <thread.h> | 
|---|
|  | 34 | #include <vmm.h> | 
|---|
|  | 35 | #include <ppm.h> | 
|---|
|  | 36 | #include <rpc.h> | 
|---|
|  | 37 |  | 
|---|
|  | 38 |  | 
|---|
|  | 39 | ////////////////////////////////////////////////i////////////////////////////////////// | 
|---|
|  | 40 | // This static function is called by the sys_exec() function to register the .elf | 
|---|
|  | 41 | // pathname in the exec_info  structure, from a string stored in user space. | 
|---|
|  | 42 | ////////////////////////////////////////////////i////////////////////////////////////// | 
|---|
|  | 43 | // @ exec_info : pointer on the exec_info structure. | 
|---|
|  | 44 | // @ pathname  : string containing the path to the .elf file (user space). | 
|---|
|  | 45 | // return 0 if success / non-zero if one string too long, or too many strings. | 
|---|
|  | 46 | /////////////////////////////////////////////////////////////////////////////////////// | 
|---|
|  | 47 | static error_t process_exec_get_path( exec_info_t  * exec_info, | 
|---|
|  | 48 | char         * pathname ) | 
|---|
|  | 49 | { | 
|---|
|  | 50 | uint32_t length; | 
|---|
|  | 51 |  | 
|---|
|  | 52 | // get string length | 
|---|
|  | 53 | hal_strlen_from_uspace( pathname , &length ); | 
|---|
|  | 54 | if( length > 255 ) | 
|---|
|  | 55 | { | 
|---|
|  | 56 | printk(ERROR, "%s: elf file pathname larger than 255 bytes\n", __FUNCTION__ ); | 
|---|
|  | 57 | return EINVAL; | 
|---|
|  | 58 | } | 
|---|
|  | 59 |  | 
|---|
|  | 60 | // copy string to exec_info | 
|---|
|  | 61 | hal_copy_from_uspace( &exec_info->path[0] , pathname , length ); | 
|---|
|  | 62 |  | 
|---|
|  | 63 | return 0; | 
|---|
|  | 64 | } | 
|---|
|  | 65 |  | 
|---|
|  | 66 | ////////////////////////////////////////////////i////////////////////////////////////// | 
|---|
|  | 67 | // This static function is called twice by the sys_exec() function : | 
|---|
|  | 68 | // - to register the main() arguments (args) in the exec_info structure. | 
|---|
|  | 69 | // - to register the environment variables (envs) in the exec_info structure. | 
|---|
|  | 70 | // In both cases the input is an array of string pointers in user space, | 
|---|
|  | 71 | // and a set of strings in user space. | 
|---|
|  | 72 | // We allocate one physical page to store a kernel copy of the array of pointers, | 
|---|
|  | 73 | // we allocate one or several physical pages to store the strings themselve, | 
|---|
|  | 74 | // and register these buffers and the number of strings in the exec_info structure. | 
|---|
|  | 75 | // The max number of strings is 1024 (for both args and envs). The numbers of pages | 
|---|
|  | 76 | // to store the (args) and (envs) strings are configuration parameters. | 
|---|
|  | 77 | ////////////////////////////////////////////////i////////////////////////////////////// | 
|---|
|  | 78 | // @ exec_info : pointer on the exec_info structure. | 
|---|
|  | 79 | // @ is_args   : true if called for (args) / false if called for (envs). | 
|---|
|  | 80 | // @ pointers  : array of pointers on the strings (in user space). | 
|---|
|  | 81 | // @ return 0 if success / non-zero if too many strings or no more memory. | 
|---|
|  | 82 | /////////////////////////////////////////////////////////////////////////////////////// | 
|---|
|  | 83 | static error_t process_exec_get_strings( exec_info_t  * exec_info, | 
|---|
|  | 84 | bool_t         is_args, | 
|---|
|  | 85 | char        ** u_pointers ) | 
|---|
|  | 86 | { | 
|---|
|  | 87 | uint32_t     index;       // string index | 
|---|
|  | 88 | uint32_t     found_null;  // NULL pointer found in array of pointers | 
|---|
|  | 89 | uint32_t     length;      // string length | 
|---|
|  | 90 | uint32_t     strings;     // actual number of strings | 
|---|
|  | 91 | kmem_req_t   req;         // kmem request | 
|---|
|  | 92 | page_t     * page;        // page descriptor | 
|---|
|  | 93 | uint32_t     order;       // ln2( number of pages to store strings ) | 
|---|
|  | 94 | char      ** k_pointers;  // base of kernel buffer containing array of pointers | 
|---|
|  | 95 | char       * buf_ptr;     // pointer on first empty slot in kernel strings buffer | 
|---|
|  | 96 | char       * buf_base;    // base address of the kernel strings buffer | 
|---|
|  | 97 |  | 
|---|
|  | 98 | // compute ln2( number of pages for kernel strings buffer ) | 
|---|
|  | 99 | if( is_args ) order = CONFIG_PROCESS_ARGS_ORDER; | 
|---|
|  | 100 | else          order = CONFIG_PROCESS_ENVS_ORDER; | 
|---|
|  | 101 |  | 
|---|
|  | 102 | req.type   = KMEM_PAGE; | 
|---|
|  | 103 | req.flags  = AF_KERNEL | AF_ZERO; | 
|---|
|  | 104 |  | 
|---|
|  | 105 | // allocate one physical page for kernel array of pointers | 
|---|
|  | 106 | req.type   = 0; | 
|---|
|  | 107 | page       = kmem_alloc( &req ); | 
|---|
|  | 108 | if( page == NULL ) | 
|---|
|  | 109 | { | 
|---|
|  | 110 | printk("ERROR in %s : cannot allocate memory for pointers\n", __FUNCTION__ ); | 
|---|
|  | 111 | return ENOMEM; | 
|---|
|  | 112 | } | 
|---|
|  | 113 | k_pointers = ppm_page2base( page ); | 
|---|
|  | 114 |  | 
|---|
|  | 115 | // allocate several physical pages to store the strings themselve | 
|---|
|  | 116 | req.type   = order; | 
|---|
|  | 117 | page       = kmem_alloc( &req ); | 
|---|
|  | 118 | if( page == NULL ) | 
|---|
|  | 119 | { | 
|---|
|  | 120 | printk("ERROR in %s : cannot allocate memory for strings\n", __FUNCTION__ ); | 
|---|
|  | 121 | return ENOMEM; | 
|---|
|  | 122 | } | 
|---|
|  | 123 | buf_base    = ppm_page2base( page ); | 
|---|
|  | 124 |  | 
|---|
|  | 125 | // copy the array of pointers to kernel buffer | 
|---|
|  | 126 | hal_copy_from_uspace( k_pointers, | 
|---|
|  | 127 | u_pointers, | 
|---|
|  | 128 | CONFIG_PPM_PAGE_SIZE ); | 
|---|
|  | 129 |  | 
|---|
|  | 130 | // scan local copy of array of pointers to copy the strings | 
|---|
|  | 131 | found_null = 0; | 
|---|
|  | 132 | buf_ptr    = buf_base; | 
|---|
|  | 133 | for( index = 0 ; index < 1024 ; index++ ) | 
|---|
|  | 134 | { | 
|---|
|  | 135 | if( k_pointers[index] == NULL ) | 
|---|
|  | 136 | { | 
|---|
|  | 137 | found_null = 1; | 
|---|
|  | 138 | break; | 
|---|
|  | 139 | } | 
|---|
|  | 140 |  | 
|---|
|  | 141 | // compute string length | 
|---|
|  | 142 | hal_strlen_from_uspace( k_pointers[index] , &length ); | 
|---|
|  | 143 |  | 
|---|
|  | 144 | // copy the user string to kernel buffer | 
|---|
|  | 145 | hal_copy_from_uspace( k_strings, | 
|---|
|  | 146 | k_pointers[index]; | 
|---|
|  | 147 | length ); | 
|---|
|  | 148 |  | 
|---|
|  | 149 | // update k_pointer[index] entry | 
|---|
|  | 150 | k_pointers[index] = buf_ptr; | 
|---|
|  | 151 |  | 
|---|
|  | 152 | // increment pointer on kernel strings buffer | 
|---|
|  | 153 | buf_ptr += (length + 1); | 
|---|
|  | 154 | } | 
|---|
|  | 155 |  | 
|---|
|  | 156 | // update into exec_info structure | 
|---|
|  | 157 | if( found_null && is_args ) | 
|---|
|  | 158 | { | 
|---|
|  | 159 | exec_info->args_pointers  =  k_pointers; | 
|---|
|  | 160 | exec_info->args_buf_base  =  buf_base; | 
|---|
|  | 161 | exec_info->args_nr        =  index; | 
|---|
|  | 162 | } | 
|---|
|  | 163 | else if( found_null && !is_args ) | 
|---|
|  | 164 | { | 
|---|
|  | 165 | exec_info->envs_pointers  =  k_pointers; | 
|---|
|  | 166 | exec_info->envs_buf_base  =  buf_base; | 
|---|
|  | 167 | exec_info->envs_buf_free  =  buf_ptr; | 
|---|
|  | 168 | exec_info->envs_nr        =  index; | 
|---|
|  | 169 | } | 
|---|
|  | 170 | else | 
|---|
|  | 171 | { | 
|---|
|  | 172 | printk("ERROR in %s : number of strings larger than 1024\n", __FUNCTION__ ); | 
|---|
|  | 173 | return EINVAL; | 
|---|
|  | 174 | } | 
|---|
|  | 175 |  | 
|---|
|  | 176 | return 0; | 
|---|
|  | 177 | } // end process_exec_get_strings() | 
|---|
|  | 178 |  | 
|---|
|  | 179 | ///////////////////////////////////////////////////////////////////////////////////////// | 
|---|
|  | 180 | // This function is executed in a "client" cluster by a process whose PID can belong | 
|---|
|  | 181 | // to another "server" cluster (defined by the MSB bits of the calling process PID). | 
|---|
|  | 182 | // A new process descriptor, and the associated main thread descriptor must be created | 
|---|
|  | 183 | // in the "server" cluster, using directly the process_make_exec() function if local, | 
|---|
|  | 184 | // or the rpc_process_exec_client() function if server is remote. | 
|---|
|  | 185 | ///////////////////////////////////////////////////////////////////////////////////////// | 
|---|
|  | 186 | // Implementation note: | 
|---|
|  | 187 | // This function build an exec_info_t structure containing all informations | 
|---|
|  | 188 | // required to create the new process descriptor and the associated thread. | 
|---|
|  | 189 | // It calls the static process_exec_get_path() and process_exec_get_strings() functions | 
|---|
|  | 190 | // to copy the .elf pathname, the main() arguments and the environment variables from | 
|---|
|  | 191 | // user buffers to the exec_info_t, and calls the static process_make_exec() function. | 
|---|
|  | 192 | ///////////////////////////////////////////////////////////////////////////////////////// | 
|---|
|  | 193 | int sys_exec( char  * filename,     // .elf file pathname | 
|---|
|  | 194 | char ** argv,         // process arguments | 
|---|
|  | 195 | char ** envp )        // environment variables | 
|---|
|  | 196 | { | 
|---|
|  | 197 | exec_info_t  exec_info;         // structure to pass to process_make_exec() | 
|---|
|  | 198 | thread_t   * thread;            // pointer on thread created in server cluster | 
|---|
|  | 199 | error_t      error   = 0; | 
|---|
|  | 200 | process_t  * process = CURRENT_PROCESS; | 
|---|
|  | 201 |  | 
|---|
|  | 202 | // check arguments | 
|---|
|  | 203 | if((filename == NULL) || (argv == NULL) || (envp == NULL)) | 
|---|
|  | 204 | { | 
|---|
|  | 205 | printk("\n[ERROR] in %s : missing arguments / file = %x / argv = %x / envp = %x\n", | 
|---|
|  | 206 | __FUNCTION__ , filename , argv , envp ); | 
|---|
|  | 207 | return EINVAL; | 
|---|
|  | 208 | } | 
|---|
|  | 209 |  | 
|---|
|  | 210 | // compute client_cxy (local cluster) and server_cxy (target cluster) | 
|---|
|  | 211 | cxy_t     cxy_server = CXY_FROM_PID( process->pid ); | 
|---|
|  | 212 | cxy_t     cxy_client = local_cxy; | 
|---|
|  | 213 | bool_t    is_local   = (cxy_server == cxy_client); | 
|---|
|  | 214 |  | 
|---|
|  | 215 | exec_dmsg("\n[INFO] %s starts for process %x on core %d in cluster %x" | 
|---|
|  | 216 | " / target_cluster = %x / cycle %d\n", | 
|---|
|  | 217 | __FUNCTION__, process->pid , CURRENT_CORE->lid, | 
|---|
|  | 218 | cxy_client, cxy_server, hal_time_stamp()); | 
|---|
|  | 219 |  | 
|---|
|  | 220 | // Change process's state to prevent any concurent access TODO ??? [AG] | 
|---|
|  | 221 |  | 
|---|
|  | 222 | // initialize exec_info structure | 
|---|
|  | 223 | exec_info->pid      = process->pid; | 
|---|
|  | 224 | exec_info->ppid     = process->ppid; | 
|---|
|  | 225 | exec_info->fd_array = &process->fd_array; | 
|---|
|  | 226 | exec_info->vfs_root = &process->vfs_root; | 
|---|
|  | 227 | exec_info->vfs_cwd  = &process->vfs_cwd; | 
|---|
|  | 228 | exec_info->vfs_bin  = &process->vfs_bin; | 
|---|
|  | 229 |  | 
|---|
|  | 230 | // check pathname and store it in exec_info structure | 
|---|
|  | 231 | error = process_exec_get_path( &exec_info , filename ); | 
|---|
|  | 232 | if ( error ) return EINVAL; | 
|---|
|  | 233 |  | 
|---|
|  | 234 | // check and store argv in exec_info structure | 
|---|
|  | 235 | error = process_exec_get_strings( &exec_info , true , argv ); | 
|---|
|  | 236 | if( error )  return EINVAL; | 
|---|
|  | 237 |  | 
|---|
|  | 238 | // check and store envp in exec_info structure | 
|---|
|  | 239 | error = process_exec_get_strings( &exec_info , false , envp ); | 
|---|
|  | 240 | if( error )  return EINVAL; | 
|---|
|  | 241 |  | 
|---|
|  | 242 | if( is_local )  ////////////// local exec ////////////////////////// | 
|---|
|  | 243 | { | 
|---|
|  | 244 | exec_dmsg("\n[INFO] %s starts local exec for process %x at cycle %d\n", | 
|---|
|  | 245 | __FUNCTION__, process->pid, hal_time_stamp()); | 
|---|
|  | 246 |  | 
|---|
|  | 247 | // call directly the local process_make_exec() function | 
|---|
|  | 248 | error = process_make_exec( &exec_info , &thread ); | 
|---|
|  | 249 | if error | 
|---|
|  | 250 | { | 
|---|
|  | 251 | printk("\n[ERROR] in %s : failed in local exec for process %x\n", | 
|---|
|  | 252 | __FUNCTION__ , process->pid ); | 
|---|
|  | 253 | return EINVAL; | 
|---|
|  | 254 | } | 
|---|
|  | 255 |  | 
|---|
|  | 256 | exec_dmsg("\n[INFO] %s completes local exec for process %x at cycle %d\n", | 
|---|
|  | 257 | __FUNCTION__, process->pid , hal_time_stamp() ); | 
|---|
|  | 258 | } | 
|---|
|  | 259 | else             ///////////// remote exec ///////////////////////// | 
|---|
|  | 260 | { | 
|---|
|  | 261 | exec_dmsg("\n[INFO] %s starts remote exec for process %x at cycle %d\n", | 
|---|
|  | 262 | __FUNCTION__, process->pid, hal_time_stamp() ); | 
|---|
|  | 263 |  | 
|---|
|  | 264 | // call the rpc_process_exec_client() function | 
|---|
|  | 265 | rpc_process_exec_client( cxy_server , &exec_info , &thread , &error ); | 
|---|
|  | 266 |  | 
|---|
|  | 267 | if( error ) | 
|---|
|  | 268 | { | 
|---|
|  | 269 | printk("\n[ERROR] in %s : failed in remote exec for process %x\n", | 
|---|
|  | 270 | __FUNCTION__ , process->pid ); | 
|---|
|  | 271 | return EINVAL; | 
|---|
|  | 272 | } | 
|---|
|  | 273 |  | 
|---|
|  | 274 | exec_dmsg("\n[INFO] %s completes remote exec for process %x at cycle %d\n", | 
|---|
|  | 275 | __FUNCTION__, process->pid , hal_time_stamp() ); | 
|---|
|  | 276 | } | 
|---|
|  | 277 |  | 
|---|
|  | 278 | // If no error, delete the current thread an process descriptors. | 
|---|
|  | 279 | thread_kill( CURRENT_THREAD ); | 
|---|
|  | 280 | process_kill( CURRENT_PROCESS ); | 
|---|
|  | 281 |  | 
|---|
|  | 282 | return 0; | 
|---|
|  | 283 | } // end sys_exec() | 
|---|
|  | 284 |  | 
|---|