1 #include <klibc/string.h>
2 #include <lunaix/clock.h>
3 #include <lunaix/common.h>
4 #include <lunaix/mm/pmm.h>
5 #include <lunaix/mm/region.h>
6 #include <lunaix/mm/vmm.h>
7 #include <lunaix/process.h>
8 #include <lunaix/spike.h>
9 #include <lunaix/status.h>
10 #include <lunaix/syscall.h>
11 #include <lunaix/syslog.h>
16 __dup_pagetable(pid_t pid, uintptr_t mount_point)
18 void* ptd_pp = pmm_alloc_page(pid, PP_FGPERSIST);
19 vmm_set_mapping(PD_REFERENCED, PG_MOUNT_1, ptd_pp, PG_PREM_RW, VMAP_NULL);
21 x86_page_table* ptd = PG_MOUNT_1;
22 x86_page_table* pptd = (x86_page_table*)(mount_point | (0x3FF << 12));
24 size_t kspace_l1inx = L1_INDEX(KERNEL_MM_BASE);
26 for (size_t i = 0; i < PG_MAX_ENTRIES - 1; i++) {
28 x86_pte_t ptde = pptd->entry[i];
29 // 空或者是未在内存中的L1页表项直接照搬过去。
31 if (!ptde || i >= kspace_l1inx || !(ptde & PG_PRESENT)) {
37 void* pt_pp = pmm_alloc_page(pid, PP_FGPERSIST);
39 PD_REFERENCED, PG_MOUNT_2, pt_pp, PG_PREM_RW, VMAP_NULL);
41 x86_page_table* ppt = (x86_page_table*)(mount_point | (i << 12));
42 x86_page_table* pt = PG_MOUNT_2;
44 for (size_t j = 0; j < PG_MAX_ENTRIES; j++) {
45 x86_pte_t pte = ppt->entry[j];
46 pmm_ref_page(pid, PG_ENTRY_ADDR(pte));
50 ptd->entry[i] = (uintptr_t)pt_pp | PG_ENTRY_FLAGS(ptde);
53 ptd->entry[PG_MAX_ENTRIES - 1] = NEW_L1_ENTRY(T_SELF_REF_PERM, ptd_pp);
59 __del_pagetable(pid_t pid, uintptr_t mount_point)
61 x86_page_table* pptd = (x86_page_table*)(mount_point | (0x3FF << 12));
63 // only remove user address space
64 for (size_t i = 0; i < L1_INDEX(KERNEL_MM_BASE); i++) {
65 x86_pte_t ptde = pptd->entry[i];
66 if (!ptde || !(ptde & PG_PRESENT)) {
70 x86_page_table* ppt = (x86_page_table*)(mount_point | (i << 12));
72 for (size_t j = 0; j < PG_MAX_ENTRIES; j++) {
73 x86_pte_t pte = ppt->entry[j];
74 // free the 4KB data page
75 if ((pte & PG_PRESENT)) {
76 pmm_free_page(pid, PG_ENTRY_ADDR(pte));
79 // free the L2 page table
80 pmm_free_page(pid, PG_ENTRY_ADDR(ptde));
82 // free the L1 directory
83 pmm_free_page(pid, PG_ENTRY_ADDR(pptd->entry[PG_MAX_ENTRIES - 1]));
87 vmm_dup_vmspace(pid_t pid)
89 return __dup_pagetable(pid, PD_REFERENCED);
92 __DEFINE_LXSYSCALL(pid_t, fork)
97 __DEFINE_LXSYSCALL(pid_t, getpid)
99 return __current->pid;
102 __DEFINE_LXSYSCALL(pid_t, getppid)
104 return __current->parent->pid;
107 __DEFINE_LXSYSCALL(pid_t, getpgid)
109 return __current->pgid;
112 __DEFINE_LXSYSCALL2(int, setpgid, pid_t, pid, pid_t, pgid)
114 struct proc_info* proc = pid ? get_process(pid) : __current;
117 __current->k_status = LXINVL;
121 pgid = pgid ? pgid : proc->pid;
123 struct proc_info* gruppenfuhrer = get_process(pgid);
125 if (!gruppenfuhrer || proc->pgid == proc->pid) {
126 __current->k_status = LXINVL;
130 llist_delete(&proc->grp_member);
131 llist_append(&gruppenfuhrer->grp_member, &proc->grp_member);
138 init_proc_user_space(struct proc_info* pcb)
140 vmm_mount_pd(PD_MOUNT_1, pcb->page_table);
146 &pcb->mm.regions, USTACK_END, USTACK_TOP, REGION_RW | REGION_RSHARED);
148 // 预留地址空间,具体物理页将由Page Fault Handler按需分配。
149 for (uintptr_t i = PG_ALIGN(USTACK_END); i < USTACK_TOP; i += PG_SIZE) {
150 vmm_set_mapping(PD_MOUNT_1, i, 0, PG_ALLOW_USER | PG_WRITE, VMAP_NULL);
153 // todo: other uspace initialization stuff
155 vmm_unmount_pd(PD_MOUNT_1);
159 __mark_region(uintptr_t start_vpn, uintptr_t end_vpn, int attr)
161 for (size_t i = start_vpn; i <= end_vpn; i++) {
162 x86_pte_t* curproc = &PTE_MOUNTED(PD_REFERENCED, i);
163 x86_pte_t* newproc = &PTE_MOUNTED(PD_MOUNT_1, i);
166 if ((attr & REGION_MODE_MASK) == REGION_RSHARED) {
167 // 如果读共享,则将两者的都标注为只读,那么任何写入都将会应用COW策略。
170 *curproc = *curproc & ~PG_WRITE;
171 *newproc = *newproc & ~PG_WRITE;
173 // 如果是私有页,则将该页从新进程中移除。
182 struct proc_info* pcb = alloc_process();
183 pcb->mm.u_heap = __current->mm.u_heap;
184 pcb->intr_ctx = __current->intr_ctx;
185 pcb->parent = __current;
187 region_copy(&__current->mm.regions, &pcb->mm.regions);
189 setup_proc_mem(pcb, PD_REFERENCED);
191 // 根据 mm_region 进一步配置页表
193 struct mm_region *pos, *n;
194 llist_for_each(pos, n, &pcb->mm.regions.head, head)
197 if ((pos->attr & REGION_WSHARED)) {
201 uintptr_t start_vpn = pos->start >> 12;
202 uintptr_t end_vpn = pos->end >> 12;
203 __mark_region(start_vpn, end_vpn, pos->attr);
206 vmm_unmount_pd(PD_MOUNT_1);
209 pcb->intr_ctx.registers.eax = 0;
216 extern void __kernel_end;
219 setup_proc_mem(struct proc_info* proc, uintptr_t usedMnt)
221 // copy the entire kernel page table
222 pid_t pid = proc->pid;
223 void* pt_copy = __dup_pagetable(pid, usedMnt);
225 vmm_mount_pd(PD_MOUNT_1, pt_copy); // 将新进程的页表挂载到挂载点#2
227 // copy the kernel stack
228 for (size_t i = KSTACK_START >> 12; i <= KSTACK_TOP >> 12; i++) {
229 volatile x86_pte_t* ppte = &PTE_MOUNTED(PD_MOUNT_1, i);
232 This is a fucking nightmare, the TLB caching keep the rewrite to PTE
233 from updating. Even the Nightmare Moon the Evil is far less nasty
234 than this. It took me hours of debugging to figure this out.
236 In the name of Celestia our glorious goddess, I will fucking HATE
237 the TLB for the rest of my LIFE!
242 void* ppa = vmm_dup_page(pid, PG_ENTRY_ADDR(p));
243 pmm_free_page(pid, PG_ENTRY_ADDR(p));
244 *ppte = (p & 0xfff) | (uintptr_t)ppa;
247 // 我们不需要分配内核的区域,因为所有的内核代码和数据段只能通过系统调用来访问,任何非法的访问
248 // 都会导致eip落在区域外面,从而segmentation fault.
250 // 至于其他的区域我们暂时没有办法知道,因为那需要知道用户程序的信息。我们留到之后在处理。
251 proc->page_table = pt_copy;