xref: /DragonOS/kernel/src/mm/syscall.rs (revision 886ce28516f9e3e5940840d1ae64ec3e9c8875fa)
1 use core::{intrinsics::unlikely, slice::from_raw_parts};
2 
3 use alloc::sync::Arc;
4 use log::error;
5 use system_error::SystemError;
6 
7 use crate::{
8     arch::MMArch,
9     driver::base::block::SeekFrom,
10     ipc::shm::ShmFlags,
11     libs::align::{check_aligned, page_align_up},
12     mm::MemoryManagementArch,
13     syscall::Syscall,
14 };
15 
16 use super::{
17     allocator::page_frame::{PageFrameCount, VirtPageFrame},
18     ucontext::{AddressSpace, DEFAULT_MMAP_MIN_ADDR},
19     verify_area, MsFlags, VirtAddr, VmFlags,
20 };
21 
22 bitflags! {
23     /// Memory protection flags
24     pub struct ProtFlags: u64 {
25         const PROT_NONE = 0x0;
26         const PROT_READ = 0x1;
27         const PROT_WRITE = 0x2;
28         const PROT_EXEC = 0x4;
29     }
30 
31     /// Memory mapping flags
32     pub struct MapFlags: u64 {
33         const MAP_NONE = 0x0;
34         /// share changes
35         const MAP_SHARED = 0x1;
36         /// changes are private
37         const MAP_PRIVATE = 0x2;
38         /// Interpret addr exactly
39         const MAP_FIXED = 0x10;
40         /// don't use a file
41         const MAP_ANONYMOUS = 0x20;
42         // linux-6.1-rc5/include/uapi/asm-generic/mman.h#7
43         /// stack-like segment
44         const MAP_GROWSDOWN = 0x100;
45         /// ETXTBSY
46         const MAP_DENYWRITE = 0x800;
47         /// Mark it as an executable
48         const MAP_EXECUTABLE = 0x1000;
49         /// Pages are locked
50         const MAP_LOCKED = 0x2000;
51         /// don't check for reservations
52         const MAP_NORESERVE = 0x4000;
53         /// populate (prefault) pagetables
54         const MAP_POPULATE = 0x8000;
55         /// do not block on IO
56         const MAP_NONBLOCK = 0x10000;
57         /// give out an address that is best suited for process/thread stacks
58         const MAP_STACK = 0x20000;
59         /// create a huge page mapping
60         const MAP_HUGETLB = 0x40000;
61         /// perform synchronous page faults for the mapping
62         const MAP_SYNC = 0x80000;
63         /// MAP_FIXED which doesn't unmap underlying mapping
64         const MAP_FIXED_NOREPLACE = 0x100000;
65 
66         /// For anonymous mmap, memory could be uninitialized
67         const MAP_UNINITIALIZED = 0x4000000;
68     }
69 
70     /// Memory mremapping flags
71     pub struct MremapFlags: u8 {
72         const MREMAP_MAYMOVE = 1;
73         const MREMAP_FIXED = 2;
74         const MREMAP_DONTUNMAP = 4;
75     }
76 
77 
78     pub struct MadvFlags: u64 {
79         /// 默认行为,系统会进行一定的预读和预写,适用于一般读取场景
80         const MADV_NORMAL = 0;
81         /// 随机访问模式,系统会尽量最小化数据读取量,适用于随机访问的场景
82         const MADV_RANDOM = 1;
83         /// 顺序访问模式,系统会进行积极的预读,访问后的页面可以尽快释放,适用于顺序读取场景
84         const MADV_SEQUENTIAL = 2;
85         /// 通知系统预读某些页面,用于应用程序提前准备数据
86         const MADV_WILLNEED = 3;
87         /// 通知系统应用程序不再需要某些页面,内核可以释放相关资源
88         const MADV_DONTNEED = 4;
89 
90         /// 将指定范围的页面标记为延迟释放,真正的释放会延迟至内存压力发生时
91         const MADV_FREE = 8;
92         /// 应用程序请求释放指定范围的页面和相关的后备存储
93         const MADV_REMOVE = 9;
94         /// 在 fork 时排除指定区域
95         const MADV_DONTFORK = 10;
96         /// 取消 MADV_DONTFORK 的效果,不再在 fork 时排除指定区域
97         const MADV_DOFORK = 11;
98         /// 模拟内存硬件错误,触发内存错误处理器处理
99         const MADV_HWPOISON = 100;
100         /// 尝试软下线指定的内存范围
101         const MADV_SOFT_OFFLINE = 101;
102 
103         /// 应用程序建议内核尝试合并指定范围内内容相同的页面
104         const MADV_MERGEABLE = 12;
105         /// 取消 MADV_MERGEABLE 的效果,不再合并页面
106         const MADV_UNMERGEABLE = 13;
107 
108         /// 应用程序希望将指定范围以透明大页方式支持
109         const MADV_HUGEPAGE = 14;
110         /// 将指定范围标记为不值得用透明大页支持
111         const MADV_NOHUGEPAGE = 15;
112 
113         /// 应用程序请求在核心转储时排除指定范围内的页面
114         const MADV_DONTDUMP = 16;
115         /// 取消 MADV_DONTDUMP 的效果,不再排除核心转储时的页面
116         const MADV_DODUMP = 17;
117 
118         /// 在 fork 时将子进程的该区域内存填充为零
119         const MADV_WIPEONFORK = 18;
120         /// 取消 `MADV_WIPEONFORK` 的效果,不再在 fork 时填充子进程的内存
121         const MADV_KEEPONFORK = 19;
122 
123         /// 应用程序不会立刻使用这些内存,内核将页面设置为非活动状态以便在内存压力发生时轻松回收
124         const MADV_COLD = 20;
125         /// 应用程序不会立刻使用这些内存,内核立即将这些页面换出
126         const MADV_PAGEOUT = 21;
127 
128         /// 预先填充页面表,可读,通过触发读取故障
129         const MADV_POPULATE_READ = 22;
130         /// 预先填充页面表,可写,通过触发写入故障
131         const MADV_POPULATE_WRITE = 23;
132 
133         /// 与 `MADV_DONTNEED` 类似,会将被锁定的页面释放
134         const MADV_DONTNEED_LOCKED = 24;
135 
136         /// 同步将页面合并为新的透明大页
137         const MADV_COLLAPSE = 25;
138 
139     }
140 }
141 
142 impl From<MapFlags> for VmFlags {
143     fn from(map_flags: MapFlags) -> Self {
144         let mut vm_flags = VmFlags::VM_NONE;
145 
146         if map_flags.contains(MapFlags::MAP_GROWSDOWN) {
147             vm_flags |= VmFlags::VM_GROWSDOWN;
148         }
149 
150         if map_flags.contains(MapFlags::MAP_LOCKED) {
151             vm_flags |= VmFlags::VM_LOCKED;
152         }
153 
154         if map_flags.contains(MapFlags::MAP_SYNC) {
155             vm_flags |= VmFlags::VM_SYNC;
156         }
157 
158         if map_flags.contains(MapFlags::MAP_SHARED) {
159             vm_flags |= VmFlags::VM_SHARED;
160         }
161 
162         vm_flags
163     }
164 }
165 
166 impl From<ProtFlags> for VmFlags {
167     fn from(prot_flags: ProtFlags) -> Self {
168         let mut vm_flags = VmFlags::VM_NONE;
169 
170         if prot_flags.contains(ProtFlags::PROT_READ) {
171             vm_flags |= VmFlags::VM_READ;
172         }
173 
174         if prot_flags.contains(ProtFlags::PROT_WRITE) {
175             vm_flags |= VmFlags::VM_WRITE;
176         }
177 
178         if prot_flags.contains(ProtFlags::PROT_EXEC) {
179             vm_flags |= VmFlags::VM_EXEC;
180         }
181 
182         vm_flags
183     }
184 }
185 
186 impl From<ShmFlags> for VmFlags {
187     fn from(shm_flags: ShmFlags) -> Self {
188         let mut vm_flags = VmFlags::VM_NONE;
189 
190         if shm_flags.contains(ShmFlags::SHM_RDONLY) {
191             vm_flags |= VmFlags::VM_READ;
192         } else {
193             vm_flags |= VmFlags::VM_READ | VmFlags::VM_WRITE;
194         }
195 
196         if shm_flags.contains(ShmFlags::SHM_EXEC) {
197             vm_flags |= VmFlags::VM_EXEC;
198         }
199 
200         if shm_flags.contains(ShmFlags::SHM_HUGETLB) {
201             vm_flags |= VmFlags::VM_HUGETLB;
202         }
203 
204         vm_flags
205     }
206 }
207 
208 impl From<VmFlags> for MapFlags {
209     fn from(value: VmFlags) -> Self {
210         let mut map_flags = MapFlags::MAP_NONE;
211 
212         if value.contains(VmFlags::VM_GROWSDOWN) {
213             map_flags |= MapFlags::MAP_GROWSDOWN;
214         }
215 
216         if value.contains(VmFlags::VM_LOCKED) {
217             map_flags |= MapFlags::MAP_LOCKED;
218         }
219 
220         if value.contains(VmFlags::VM_SYNC) {
221             map_flags |= MapFlags::MAP_SYNC;
222         }
223 
224         if value.contains(VmFlags::VM_MAYSHARE) {
225             map_flags |= MapFlags::MAP_SHARED;
226         }
227 
228         map_flags
229     }
230 }
231 
232 impl From<VmFlags> for ProtFlags {
233     fn from(value: VmFlags) -> Self {
234         let mut prot_flags = ProtFlags::PROT_NONE;
235 
236         if value.contains(VmFlags::VM_READ) {
237             prot_flags |= ProtFlags::PROT_READ;
238         }
239 
240         if value.contains(VmFlags::VM_WRITE) {
241             prot_flags |= ProtFlags::PROT_WRITE;
242         }
243 
244         if value.contains(VmFlags::VM_EXEC) {
245             prot_flags |= ProtFlags::PROT_EXEC;
246         }
247 
248         prot_flags
249     }
250 }
251 
252 impl Syscall {
253     pub fn brk(new_addr: VirtAddr) -> Result<VirtAddr, SystemError> {
254         // debug!("brk: new_addr={:?}", new_addr);
255         let address_space = AddressSpace::current()?;
256         let mut address_space = address_space.write();
257 
258         if new_addr < address_space.brk_start || new_addr >= MMArch::USER_END_VADDR {
259             return Ok(address_space.brk);
260         }
261         if new_addr == address_space.brk {
262             return Ok(address_space.brk);
263         }
264 
265         unsafe {
266             address_space
267                 .set_brk(VirtAddr::new(page_align_up(new_addr.data())))
268                 .ok();
269 
270             return Ok(address_space.sbrk(0).unwrap());
271         }
272     }
273 
274     pub fn sbrk(incr: isize) -> Result<VirtAddr, SystemError> {
275         let address_space = AddressSpace::current()?;
276         assert!(address_space.read().user_mapper.utable.is_current());
277         let mut address_space = address_space.write();
278         let r = unsafe { address_space.sbrk(incr) };
279 
280         return r;
281     }
282 
283     /// ## mmap系统调用
284     ///
285     /// 该函数的实现参考了Linux内核的实现,但是并不完全相同。因为有些功能咱们还没实现
286     ///
287     /// ## 参数
288     ///
289     /// - `start_vaddr`:映射的起始地址
290     /// - `len`:映射的长度
291     /// - `prot`:保护标志
292     /// - `flags`:映射标志
293     /// - `fd`:文件描述符(暂时不支持)
294     /// - `offset`:文件偏移量 (暂时不支持)
295     ///
296     /// ## 返回值
297     ///
298     /// 成功时返回映射的起始地址,失败时返回错误码
299     pub fn mmap(
300         start_vaddr: VirtAddr,
301         len: usize,
302         prot_flags: usize,
303         map_flags: usize,
304         fd: i32,
305         offset: usize,
306     ) -> Result<usize, SystemError> {
307         let map_flags = MapFlags::from_bits_truncate(map_flags as u64);
308         let prot_flags = ProtFlags::from_bits_truncate(prot_flags as u64);
309 
310         if start_vaddr < VirtAddr::new(DEFAULT_MMAP_MIN_ADDR)
311             && map_flags.contains(MapFlags::MAP_FIXED)
312         {
313             error!(
314                 "mmap: MAP_FIXED is not supported for address below {}",
315                 DEFAULT_MMAP_MIN_ADDR
316             );
317             return Err(SystemError::EINVAL);
318         }
319 
320         // 暂时不支持巨页映射
321         if map_flags.contains(MapFlags::MAP_HUGETLB) {
322             error!("mmap: not support huge page mapping");
323             return Err(SystemError::ENOSYS);
324         }
325         let current_address_space = AddressSpace::current()?;
326         let start_page = if map_flags.contains(MapFlags::MAP_ANONYMOUS) {
327             // 匿名映射
328             current_address_space.write().map_anonymous(
329                 start_vaddr,
330                 len,
331                 prot_flags,
332                 map_flags,
333                 true,
334                 false,
335             )?
336         } else {
337             // 文件映射
338             current_address_space.write().file_mapping(
339                 start_vaddr,
340                 len,
341                 prot_flags,
342                 map_flags,
343                 fd,
344                 offset,
345                 true,
346                 false,
347             )?
348         };
349 
350         return Ok(start_page.virt_address().data());
351     }
352 
353     /// ## mremap系统调用
354     ///
355     ///
356     /// ## 参数
357     ///
358     /// - `old_vaddr`:原映射的起始地址
359     /// - `old_len`:原映射的长度
360     /// - `new_len`:重新映射的长度
361     /// - `mremap_flags`:重映射标志
362     /// - `new_vaddr`:重新映射的起始地址
363     ///
364     /// ## 返回值
365     ///
366     /// 成功时返回重映射的起始地址,失败时返回错误码
367     pub fn mremap(
368         old_vaddr: VirtAddr,
369         old_len: usize,
370         new_len: usize,
371         mremap_flags: MremapFlags,
372         new_vaddr: VirtAddr,
373     ) -> Result<usize, SystemError> {
374         // 需要重映射到新内存区域的情况下,必须包含MREMAP_MAYMOVE并且指定新地址
375         if mremap_flags.contains(MremapFlags::MREMAP_FIXED)
376             && (!mremap_flags.contains(MremapFlags::MREMAP_MAYMOVE)
377                 || new_vaddr == VirtAddr::new(0))
378         {
379             return Err(SystemError::EINVAL);
380         }
381 
382         // 不取消旧映射的情况下,必须包含MREMAP_MAYMOVE并且新内存大小等于旧内存大小
383         if mremap_flags.contains(MremapFlags::MREMAP_DONTUNMAP)
384             && (!mremap_flags.contains(MremapFlags::MREMAP_MAYMOVE) || old_len != new_len)
385         {
386             return Err(SystemError::EINVAL);
387         }
388 
389         // 旧内存地址必须对齐
390         if !old_vaddr.check_aligned(MMArch::PAGE_SIZE) {
391             return Err(SystemError::EINVAL);
392         }
393 
394         // 将old_len、new_len 对齐页面大小
395         let old_len = page_align_up(old_len);
396         let new_len = page_align_up(new_len);
397 
398         // 不允许重映射内存区域大小为0
399         if new_len == 0 {
400             return Err(SystemError::EINVAL);
401         }
402 
403         let current_address_space = AddressSpace::current()?;
404         let vma = current_address_space.read().mappings.contains(old_vaddr);
405         if vma.is_none() {
406             return Err(SystemError::EINVAL);
407         }
408         let vma = vma.unwrap();
409         let vm_flags = *vma.lock_irqsave().vm_flags();
410 
411         // 暂时不支持巨页映射
412         if vm_flags.contains(VmFlags::VM_HUGETLB) {
413             error!("mmap: not support huge page mapping");
414             return Err(SystemError::ENOSYS);
415         }
416 
417         // 缩小旧内存映射区域
418         if old_len > new_len {
419             Self::munmap(old_vaddr + new_len, old_len - new_len)?;
420             return Ok(old_vaddr.data());
421         }
422 
423         // 重映射到新内存区域
424         let r = current_address_space.write().mremap(
425             old_vaddr,
426             old_len,
427             new_len,
428             mremap_flags,
429             new_vaddr,
430             vm_flags,
431         )?;
432 
433         if !mremap_flags.contains(MremapFlags::MREMAP_DONTUNMAP) {
434             Self::munmap(old_vaddr, old_len)?;
435         }
436 
437         return Ok(r.data());
438     }
439 
440     /// ## munmap系统调用
441     ///
442     /// ## 参数
443     ///
444     /// - `start_vaddr`:取消映射的起始地址(已经对齐到页)
445     /// - `len`:取消映射的字节数(已经对齐到页)
446     ///
447     /// ## 返回值
448     ///
449     /// 成功时返回0,失败时返回错误码
450     pub fn munmap(start_vaddr: VirtAddr, len: usize) -> Result<usize, SystemError> {
451         assert!(start_vaddr.check_aligned(MMArch::PAGE_SIZE));
452         assert!(check_aligned(len, MMArch::PAGE_SIZE));
453 
454         if unlikely(verify_area(start_vaddr, len).is_err()) {
455             return Err(SystemError::EINVAL);
456         }
457         if unlikely(len == 0) {
458             return Err(SystemError::EINVAL);
459         }
460 
461         let current_address_space: Arc<AddressSpace> = AddressSpace::current()?;
462         let start_frame = VirtPageFrame::new(start_vaddr);
463         let page_count = PageFrameCount::new(len / MMArch::PAGE_SIZE);
464 
465         current_address_space
466             .write()
467             .munmap(start_frame, page_count)
468             .map_err(|_| SystemError::EINVAL)?;
469 
470         return Ok(0);
471     }
472 
473     /// ## mprotect系统调用
474     ///
475     /// ## 参数
476     ///
477     /// - `start_vaddr`:起始地址(已经对齐到页)
478     /// - `len`:长度(已经对齐到页)
479     /// - `prot_flags`:保护标志
480     pub fn mprotect(
481         start_vaddr: VirtAddr,
482         len: usize,
483         prot_flags: usize,
484     ) -> Result<usize, SystemError> {
485         assert!(start_vaddr.check_aligned(MMArch::PAGE_SIZE));
486         assert!(check_aligned(len, MMArch::PAGE_SIZE));
487 
488         if unlikely(verify_area(start_vaddr, len).is_err()) {
489             return Err(SystemError::EINVAL);
490         }
491         if unlikely(len == 0) {
492             return Err(SystemError::EINVAL);
493         }
494 
495         let prot_flags = ProtFlags::from_bits(prot_flags as u64).ok_or(SystemError::EINVAL)?;
496 
497         let current_address_space: Arc<AddressSpace> = AddressSpace::current()?;
498         let start_frame = VirtPageFrame::new(start_vaddr);
499         let page_count = PageFrameCount::new(len / MMArch::PAGE_SIZE);
500 
501         current_address_space
502             .write()
503             .mprotect(start_frame, page_count, prot_flags)
504             .map_err(|_| SystemError::EINVAL)?;
505         return Ok(0);
506     }
507 
508     /// ## madvise系统调用
509     ///
510     /// ## 参数
511     ///
512     /// - `start_vaddr`:起始地址(已经对齐到页)
513     /// - `len`:长度(已经对齐到页)
514     /// - `madv_flags`:建议标志
515     pub fn madvise(
516         start_vaddr: VirtAddr,
517         len: usize,
518         madv_flags: usize,
519     ) -> Result<usize, SystemError> {
520         if !start_vaddr.check_aligned(MMArch::PAGE_SIZE) || !check_aligned(len, MMArch::PAGE_SIZE) {
521             return Err(SystemError::EINVAL);
522         }
523 
524         if unlikely(verify_area(start_vaddr, len).is_err()) {
525             return Err(SystemError::EINVAL);
526         }
527         if unlikely(len == 0) {
528             return Err(SystemError::EINVAL);
529         }
530 
531         let madv_flags = MadvFlags::from_bits(madv_flags as u64).ok_or(SystemError::EINVAL)?;
532 
533         let current_address_space: Arc<AddressSpace> = AddressSpace::current()?;
534         let start_frame = VirtPageFrame::new(start_vaddr);
535         let page_count = PageFrameCount::new(len / MMArch::PAGE_SIZE);
536 
537         current_address_space
538             .write()
539             .madvise(start_frame, page_count, madv_flags)
540             .map_err(|_| SystemError::EINVAL)?;
541         return Ok(0);
542     }
543 
544     /// ## msync系统调用
545     ///
546     /// ## 参数
547     ///
548     /// - `start`:起始地址(已经对齐到页)
549     /// - `len`:长度(已经对齐到页)
550     /// - `flags`:标志
551     pub fn msync(start: VirtAddr, len: usize, flags: usize) -> Result<usize, SystemError> {
552         if !start.check_aligned(MMArch::PAGE_SIZE) || !check_aligned(len, MMArch::PAGE_SIZE) {
553             return Err(SystemError::EINVAL);
554         }
555 
556         if unlikely(verify_area(start, len).is_err()) {
557             return Err(SystemError::EINVAL);
558         }
559         if unlikely(len == 0) {
560             return Err(SystemError::EINVAL);
561         }
562 
563         let mut start = start.data();
564         let end = start + len;
565         let flags = MsFlags::from_bits_truncate(flags);
566         let mut unmapped_error = Ok(0);
567 
568         if !flags.intersects(MsFlags::MS_ASYNC | MsFlags::MS_INVALIDATE | MsFlags::MS_SYNC) {
569             return Err(SystemError::EINVAL);
570         }
571 
572         if flags.contains(MsFlags::MS_ASYNC | MsFlags::MS_SYNC) {
573             return Err(SystemError::EINVAL);
574         }
575 
576         if end < start {
577             return Err(SystemError::ENOMEM);
578         }
579 
580         if start == end {
581             return Ok(0);
582         }
583 
584         let current_address_space = AddressSpace::current()?;
585         let mut err = Err(SystemError::ENOMEM);
586         let mut next_vma = current_address_space
587             .read()
588             .mappings
589             .find_nearest(VirtAddr::new(start));
590         loop {
591             if let Some(vma) = next_vma.clone() {
592                 let guard = vma.lock_irqsave();
593                 let vm_start = guard.region().start().data();
594                 let vm_end = guard.region().end().data();
595                 if start < vm_start {
596                     if flags == MsFlags::MS_ASYNC {
597                         break;
598                     }
599                     start = vm_start;
600                     if start >= vm_end {
601                         break;
602                     }
603                     unmapped_error = Err(SystemError::ENOMEM);
604                 }
605                 let vm_flags = *guard.vm_flags();
606                 if flags.contains(MsFlags::MS_INVALIDATE) && vm_flags.contains(VmFlags::VM_LOCKED) {
607                     err = Err(SystemError::EBUSY);
608                     break;
609                 }
610                 let file = guard.vm_file();
611                 let fstart = (start - vm_start)
612                     + (guard.file_page_offset().unwrap_or(0) << MMArch::PAGE_SHIFT);
613                 let fend = fstart + (core::cmp::min(end, vm_end) - start) - 1;
614                 let old_start = start;
615                 start = vm_end;
616                 // log::info!("flags: {:?}", flags);
617                 // log::info!("vm_flags: {:?}", vm_flags);
618                 // log::info!("file: {:?}", file);
619                 if flags.contains(MsFlags::MS_SYNC) && vm_flags.contains(VmFlags::VM_SHARED) {
620                     if let Some(file) = file {
621                         let old_pos = file.lseek(SeekFrom::SeekCurrent(0)).unwrap();
622                         file.lseek(SeekFrom::SeekSet(fstart as i64)).unwrap();
623                         err = file.write(len, unsafe {
624                             from_raw_parts(old_start as *mut u8, fend - fstart + 1)
625                         });
626                         file.lseek(SeekFrom::SeekSet(old_pos as i64)).unwrap();
627                         if err.is_err() {
628                             break;
629                         } else if start >= end {
630                             err = unmapped_error;
631                             break;
632                         }
633                         next_vma = current_address_space
634                             .read()
635                             .mappings
636                             .find_nearest(VirtAddr::new(start));
637                     }
638                 } else {
639                     if start >= end {
640                         err = unmapped_error;
641                         break;
642                     }
643                     next_vma = current_address_space
644                         .read()
645                         .mappings
646                         .find_nearest(VirtAddr::new(vm_end));
647                 }
648             } else {
649                 return Err(SystemError::ENOMEM);
650             }
651         }
652         return err;
653     }
654 }
655