Process.h 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428
  1. #pragma once
  2. #include "types.h"
  3. #include "InlineLinkedList.h"
  4. #include <AK/String.h>
  5. #include "TSS.h"
  6. #include <AK/Vector.h>
  7. #include "i386.h"
  8. #include <VirtualFileSystem/VirtualFileSystem.h>
  9. #include <VirtualFileSystem/UnixTypes.h>
  10. #include "TTY.h"
  11. #include "Syscall.h"
  12. class FileDescriptor;
  13. class PageDirectory;
  14. class Region;
  15. class VMObject;
  16. class Zone;
  17. #define COOL_GLOBALS
  18. #ifdef COOL_GLOBALS
  19. struct CoolGlobals {
  20. pid_t current_pid;
  21. };
  22. extern CoolGlobals* g_cool_globals;
  23. #endif
  24. struct SignalActionData {
  25. LinearAddress handler_or_sigaction;
  26. dword mask { 0 };
  27. int flags { 0 };
  28. LinearAddress restorer;
  29. };
  30. class Process : public InlineLinkedListNode<Process> {
  31. friend class InlineLinkedListNode<Process>;
  32. public:
  33. static Process* create_kernel_process(void (*entry)(), String&& name);
  34. static Process* create_user_process(const String& path, uid_t, gid_t, pid_t ppid, int& error, Vector<String>&& arguments = Vector<String>(), Vector<String>&& environment = Vector<String>(), TTY* = nullptr);
  35. ~Process();
  36. static Vector<Process*> allProcesses();
  37. enum State {
  38. Invalid = 0,
  39. Runnable,
  40. Running,
  41. Skip1SchedulerPass,
  42. Skip0SchedulerPasses,
  43. Dead,
  44. BeingInspected,
  45. BlockedSleep,
  46. BlockedWait,
  47. BlockedRead,
  48. BlockedWrite,
  49. BlockedSignal,
  50. };
  51. enum RingLevel {
  52. Ring0 = 0,
  53. Ring3 = 3,
  54. };
  55. bool isRing0() const { return m_ring == Ring0; }
  56. bool isRing3() const { return m_ring == Ring3; }
  57. bool is_blocked() const
  58. {
  59. return m_state == BlockedSleep || m_state == BlockedWait || m_state == BlockedRead || m_state == BlockedSignal;
  60. }
  61. PageDirectory& page_directory() { return *m_page_directory; }
  62. const PageDirectory& page_directory() const { return *m_page_directory; }
  63. bool in_kernel() const { return (m_tss.cs & 0x03) == 0; }
  64. static Process* from_pid(pid_t);
  65. const String& name() const { return m_name; }
  66. pid_t pid() const { return m_pid; }
  67. pid_t sid() const { return m_sid; }
  68. pid_t pgid() const { return m_pgid; }
  69. DWORD ticks() const { return m_ticks; }
  70. WORD selector() const { return m_farPtr.selector; }
  71. TSS32& tss() { return m_tss; }
  72. State state() const { return m_state; }
  73. uid_t uid() const { return m_uid; }
  74. gid_t gid() const { return m_gid; }
  75. uid_t euid() const { return m_euid; }
  76. gid_t egid() const { return m_egid; }
  77. pid_t ppid() const { return m_ppid; }
  78. const FarPtr& farPtr() const { return m_farPtr; }
  79. FileDescriptor* file_descriptor(int fd);
  80. const FileDescriptor* file_descriptor(int fd) const;
  81. void block(Process::State);
  82. void unblock();
  83. void setWakeupTime(DWORD t) { m_wakeupTime = t; }
  84. DWORD wakeupTime() const { return m_wakeupTime; }
  85. template<typename Callback> static void for_each(Callback);
  86. template<typename Callback> static void for_each_in_pgrp(pid_t, Callback);
  87. template<typename Callback> static void for_each_in_state(State, Callback);
  88. template<typename Callback> static void for_each_not_in_state(State, Callback);
  89. template<typename Callback> void for_each_child(Callback);
  90. bool tick() { ++m_ticks; return --m_ticksLeft; }
  91. void set_ticks_left(dword t) { m_ticksLeft = t; }
  92. void setSelector(WORD s) { m_farPtr.selector = s; }
  93. void set_state(State s) { m_state = s; }
  94. pid_t sys$setsid();
  95. pid_t sys$getsid(pid_t);
  96. int sys$setpgid(pid_t pid, pid_t pgid);
  97. pid_t sys$getpgrp();
  98. pid_t sys$getpgid(pid_t);
  99. uid_t sys$getuid();
  100. gid_t sys$getgid();
  101. uid_t sys$geteuid();
  102. gid_t sys$getegid();
  103. pid_t sys$getpid();
  104. pid_t sys$getppid();
  105. mode_t sys$umask(mode_t);
  106. int sys$open(const char* path, int options);
  107. int sys$close(int fd);
  108. ssize_t sys$read(int fd, void* outbuf, size_t nread);
  109. ssize_t sys$write(int fd, const void*, size_t);
  110. int sys$fstat(int fd, Unix::stat*);
  111. int sys$lstat(const char*, Unix::stat*);
  112. int sys$stat(const char*, Unix::stat*);
  113. int sys$lseek(int fd, off_t, int whence);
  114. int sys$kill(pid_t pid, int sig);
  115. int sys$geterror() { return m_error; }
  116. void sys$exit(int status) NORETURN;
  117. void sys$sigreturn() NORETURN;
  118. pid_t sys$waitpid(pid_t, int* wstatus, int options);
  119. void* sys$mmap(const Syscall::SC_mmap_params*);
  120. int sys$munmap(void*, size_t size);
  121. int sys$set_mmap_name(void*, size_t, const char*);
  122. int sys$get_dir_entries(int fd, void*, size_t);
  123. int sys$getcwd(char*, size_t);
  124. int sys$chdir(const char*);
  125. int sys$sleep(unsigned seconds);
  126. int sys$gettimeofday(timeval*);
  127. int sys$gethostname(char* name, size_t length);
  128. int sys$get_arguments(int* argc, char*** argv);
  129. int sys$get_environment(char*** environ);
  130. int sys$uname(utsname*);
  131. int sys$readlink(const char*, char*, size_t);
  132. int sys$ttyname_r(int fd, char*, size_t);
  133. pid_t sys$fork(RegisterDump&);
  134. int sys$execve(const char* filename, const char** argv, const char** envp);
  135. Unix::sighandler_t sys$signal(int signum, Unix::sighandler_t);
  136. int sys$isatty(int fd);
  137. int sys$getdtablesize();
  138. int sys$dup(int oldfd);
  139. int sys$dup2(int oldfd, int newfd);
  140. int sys$sigaction(int signum, const Unix::sigaction* act, Unix::sigaction* old_act);
  141. int sys$sigprocmask(int how, const Unix::sigset_t* set, Unix::sigset_t* old_set);
  142. int sys$sigpending(Unix::sigset_t*);
  143. int sys$getgroups(int size, gid_t*);
  144. int sys$setgroups(size_t, const gid_t*);
  145. int sys$pipe(int* pipefd);
  146. int sys$killpg(int pgrp, int sig);
  147. int sys$setgid(gid_t);
  148. int sys$setuid(uid_t);
  149. unsigned sys$alarm(unsigned seconds);
  150. int sys$access(const char* pathname, int mode);
  151. int sys$fcntl(int fd, int cmd, dword extra_arg);
  152. int sys$ioctl(int fd, unsigned request, unsigned arg);
  153. static void initialize();
  154. void crash() NORETURN;
  155. static void reap(Process&);
  156. const TTY* tty() const { return m_tty; }
  157. size_t regionCount() const { return m_regions.size(); }
  158. const Vector<RetainPtr<Region>>& regions() const { return m_regions; }
  159. void dumpRegions();
  160. void did_schedule() { ++m_timesScheduled; }
  161. dword timesScheduled() const { return m_timesScheduled; }
  162. pid_t waitee() const { return m_waitee; }
  163. dword framePtr() const { return m_tss.ebp; }
  164. dword stackPtr() const { return m_tss.esp; }
  165. dword stackTop() const { return m_tss.ss == 0x10 ? m_stackTop0 : m_stackTop3; }
  166. bool isValidAddressForKernel(LinearAddress) const;
  167. bool validate_read(const void*, size_t) const;
  168. bool validate_write(void*, size_t) const;
  169. bool validate_read_str(const char* str) { return validate_read(str, strlen(str) + 1); }
  170. template<typename T> bool validate_read_typed(T* value, size_t count = 1) { return validate_read(value, sizeof(T) * count); }
  171. template<typename T> bool validate_write_typed(T* value, size_t count = 1) { return validate_write(value, sizeof(T) * count); }
  172. CoreInode* cwd_inode() { return m_cwd ? m_cwd->core_inode() : nullptr; }
  173. CoreInode* executable_inode() { return m_executable ? m_executable->core_inode() : nullptr; }
  174. size_t number_of_open_file_descriptors() const;
  175. size_t max_open_file_descriptors() const { return m_max_open_file_descriptors; }
  176. void send_signal(byte signal, Process* sender);
  177. void dispatch_one_pending_signal();
  178. void dispatch_signal(byte signal);
  179. bool has_unmasked_pending_signals() const;
  180. void terminate_due_to_signal(byte signal);
  181. Process* fork(RegisterDump&);
  182. int exec(const String& path, Vector<String>&& arguments, Vector<String>&& environment);
  183. bool is_root() const { return m_euid == 0; }
  184. private:
  185. friend class MemoryManager;
  186. friend class Scheduler;
  187. friend class Region;
  188. Process(String&& name, uid_t, gid_t, pid_t ppid, RingLevel, RetainPtr<Vnode>&& cwd = nullptr, RetainPtr<Vnode>&& executable = nullptr, TTY* = nullptr, Process* fork_parent = nullptr);
  189. int do_exec(const String& path, Vector<String>&& arguments, Vector<String>&& environment);
  190. void push_value_on_stack(dword);
  191. int alloc_fd();
  192. PageDirectory* m_page_directory { nullptr };
  193. Process* m_prev { nullptr };
  194. Process* m_next { nullptr };
  195. String m_name;
  196. void (*m_entry)() { nullptr };
  197. pid_t m_pid { 0 };
  198. uid_t m_uid { 0 };
  199. gid_t m_gid { 0 };
  200. uid_t m_euid { 0 };
  201. gid_t m_egid { 0 };
  202. pid_t m_sid { 0 };
  203. pid_t m_pgid { 0 };
  204. DWORD m_ticks { 0 };
  205. DWORD m_ticksLeft { 0 };
  206. DWORD m_stackTop0 { 0 };
  207. DWORD m_stackTop3 { 0 };
  208. FarPtr m_farPtr;
  209. State m_state { Invalid };
  210. DWORD m_wakeupTime { 0 };
  211. TSS32 m_tss;
  212. TSS32 m_tss_to_resume_kernel;
  213. struct FileDescriptorAndFlags {
  214. operator bool() const { return !!descriptor; }
  215. void clear() { descriptor = nullptr; flags = 0; }
  216. void set(RetainPtr<FileDescriptor>&& d, dword f = 0) { descriptor = move(d), flags = f; }
  217. RetainPtr<FileDescriptor> descriptor;
  218. dword flags { 0 };
  219. };
  220. Vector<FileDescriptorAndFlags> m_fds;
  221. RingLevel m_ring { Ring0 };
  222. int m_error { 0 };
  223. void* m_kernelStack { nullptr };
  224. dword m_timesScheduled { 0 };
  225. pid_t m_waitee { -1 };
  226. int m_waitee_status { 0 };
  227. int m_fdBlockedOnRead { -1 };
  228. int m_blocked_fd { -1 };
  229. size_t m_max_open_file_descriptors { 16 };
  230. SignalActionData m_signal_action_data[32];
  231. dword m_pending_signals { 0 };
  232. dword m_signal_mask { 0xffffffff };
  233. byte m_termination_status { 0 };
  234. byte m_termination_signal { 0 };
  235. RetainPtr<Vnode> m_cwd;
  236. RetainPtr<Vnode> m_executable;
  237. TTY* m_tty { nullptr };
  238. Region* allocate_region(LinearAddress, size_t, String&& name, bool is_readable = true, bool is_writable = true);
  239. Region* allocate_file_backed_region(LinearAddress, size_t, RetainPtr<Vnode>&& vnode, String&& name, bool is_readable, bool is_writable);
  240. Region* allocate_region_with_vmo(LinearAddress, size_t, RetainPtr<VMObject>&&, size_t offset_in_vmo, String&& name, bool is_readable, bool is_writable);
  241. bool deallocate_region(Region& region);
  242. Region* regionFromRange(LinearAddress, size_t);
  243. Vector<RetainPtr<Region>> m_regions;
  244. // FIXME: Implement some kind of ASLR?
  245. LinearAddress m_nextRegion;
  246. LinearAddress m_return_to_ring3_from_signal_trampoline;
  247. LinearAddress m_return_to_ring0_from_signal_trampoline;
  248. pid_t m_ppid { 0 };
  249. mode_t m_umask { 022 };
  250. bool m_was_interrupted_while_blocked { false };
  251. static void notify_waiters(pid_t waitee, int exit_status, int signal);
  252. Vector<String> m_arguments;
  253. Vector<String> m_initialEnvironment;
  254. HashTable<gid_t> m_gids;
  255. Region* m_stack_region { nullptr };
  256. Region* m_signal_stack_user_region { nullptr };
  257. Region* m_signal_stack_kernel_region { nullptr };
  258. };
  259. extern Process* current;
  260. class ProcessInspectionHandle {
  261. public:
  262. ProcessInspectionHandle(Process& process)
  263. : m_process(process)
  264. , m_original_state(process.state())
  265. {
  266. if (&process != current)
  267. m_process.set_state(Process::BeingInspected);
  268. }
  269. ~ProcessInspectionHandle()
  270. {
  271. m_process.set_state(m_original_state);
  272. }
  273. Process* operator->() { return &m_process; }
  274. Process& operator*() { return m_process; }
  275. private:
  276. Process& m_process;
  277. Process::State m_original_state { Process::Invalid };
  278. };
  279. static inline const char* toString(Process::State state)
  280. {
  281. switch (state) {
  282. case Process::Invalid: return "Invalid";
  283. case Process::Runnable: return "Runnable";
  284. case Process::Running: return "Running";
  285. case Process::Dead: return "Dead";
  286. case Process::Skip1SchedulerPass: return "Skip1";
  287. case Process::Skip0SchedulerPasses: return "Skip0";
  288. case Process::BlockedSleep: return "Sleep";
  289. case Process::BlockedWait: return "Wait";
  290. case Process::BlockedRead: return "Read";
  291. case Process::BlockedWrite: return "Write";
  292. case Process::BlockedSignal: return "Signal";
  293. case Process::BeingInspected: return "Inspect";
  294. }
  295. ASSERT_NOT_REACHED();
  296. return nullptr;
  297. }
  298. extern void block(Process::State);
  299. extern void sleep(DWORD ticks);
  300. extern InlineLinkedList<Process>* g_processes;
  301. template<typename Callback>
  302. inline void Process::for_each(Callback callback)
  303. {
  304. ASSERT_INTERRUPTS_DISABLED();
  305. for (auto* process = g_processes->head(); process;) {
  306. auto* next_process = process->next();
  307. if (!callback(*process))
  308. break;
  309. process = next_process;
  310. }
  311. }
  312. template<typename Callback>
  313. inline void Process::for_each_child(Callback callback)
  314. {
  315. ASSERT_INTERRUPTS_DISABLED();
  316. pid_t my_pid = pid();
  317. for (auto* process = g_processes->head(); process;) {
  318. auto* next_process = process->next();
  319. if (process->ppid() == my_pid) {
  320. if (!callback(*process))
  321. break;
  322. }
  323. process = next_process;
  324. }
  325. }
  326. template<typename Callback>
  327. inline void Process::for_each_in_pgrp(pid_t pgid, Callback callback)
  328. {
  329. ASSERT_INTERRUPTS_DISABLED();
  330. for (auto* process = g_processes->head(); process;) {
  331. auto* next_process = process->next();
  332. if (process->pgid() == pgid) {
  333. if (!callback(*process))
  334. break;
  335. }
  336. process = next_process;
  337. }
  338. }
  339. template<typename Callback>
  340. inline void Process::for_each_in_state(State state, Callback callback)
  341. {
  342. ASSERT_INTERRUPTS_DISABLED();
  343. for (auto* process = g_processes->head(); process;) {
  344. auto* next_process = process->next();
  345. if (process->state() == state)
  346. callback(*process);
  347. process = next_process;
  348. }
  349. }
  350. template<typename Callback>
  351. inline void Process::for_each_not_in_state(State state, Callback callback)
  352. {
  353. ASSERT_INTERRUPTS_DISABLED();
  354. for (auto* process = g_processes->head(); process;) {
  355. auto* next_process = process->next();
  356. if (process->state() != state)
  357. callback(*process);
  358. process = next_process;
  359. }
  360. }