MemoryManager.cpp 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758
  1. #include "MemoryManager.h"
  2. #include <AK/Assertions.h>
  3. #include <AK/kstdio.h>
  4. #include <AK/kmalloc.h>
  5. #include "i386.h"
  6. #include "StdLib.h"
  7. #include "Process.h"
  8. #include <LibC/errno_numbers.h>
  9. //#define MM_DEBUG
  10. //#define PAGE_FAULT_DEBUG
  11. #define SCRUB_DEALLOCATED_PAGE_TABLES
  12. static MemoryManager* s_the;
  13. MemoryManager& MM
  14. {
  15. return *s_the;
  16. }
  17. MemoryManager::MemoryManager()
  18. {
  19. m_kernel_page_directory = (PageDirectory*)0x4000;
  20. m_pageTableZero = (dword*)0x6000;
  21. m_pageTableOne = (dword*)0x7000;
  22. m_next_laddr.set(0xd0000000);
  23. initializePaging();
  24. }
  25. MemoryManager::~MemoryManager()
  26. {
  27. }
  28. void MemoryManager::populate_page_directory(PageDirectory& page_directory)
  29. {
  30. memset(&page_directory, 0, sizeof(PageDirectory));
  31. page_directory.entries[0] = m_kernel_page_directory->entries[0];
  32. page_directory.entries[1] = m_kernel_page_directory->entries[1];
  33. }
  34. void MemoryManager::release_page_directory(PageDirectory& page_directory)
  35. {
  36. ASSERT_INTERRUPTS_DISABLED();
  37. #ifdef MM_DEBUG
  38. dbgprintf("MM: release_page_directory for PD K%x\n", &page_directory);
  39. #endif
  40. for (size_t i = 0; i < 1024; ++i) {
  41. auto& page_table = page_directory.physical_pages[i];
  42. if (!page_table.is_null()) {
  43. #ifdef MM_DEBUG
  44. dbgprintf("MM: deallocating user page table P%x\n", page_table->paddr().get());
  45. #endif
  46. deallocate_page_table(page_directory, i);
  47. }
  48. }
  49. #ifdef SCRUB_DEALLOCATED_PAGE_TABLES
  50. memset(&page_directory, 0xc9, sizeof(PageDirectory));
  51. #endif
  52. }
  53. void MemoryManager::initializePaging()
  54. {
  55. static_assert(sizeof(MemoryManager::PageDirectoryEntry) == 4);
  56. static_assert(sizeof(MemoryManager::PageTableEntry) == 4);
  57. memset(m_pageTableZero, 0, PAGE_SIZE);
  58. memset(m_pageTableOne, 0, PAGE_SIZE);
  59. memset(m_kernel_page_directory, 0, sizeof(PageDirectory));
  60. #ifdef MM_DEBUG
  61. dbgprintf("MM: Kernel page directory @ %p\n", m_kernel_page_directory);
  62. #endif
  63. // Make null dereferences crash.
  64. protectMap(LinearAddress(0), PAGE_SIZE);
  65. // The bottom 4 MB are identity mapped & supervisor only. Every process shares these mappings.
  66. create_identity_mapping(LinearAddress(PAGE_SIZE), 4 * MB);
  67. // The physical pages 4 MB through 8 MB are available for allocation.
  68. for (size_t i = (4 * MB) + PAGE_SIZE; i < (8 * MB); i += PAGE_SIZE)
  69. m_free_physical_pages.append(adopt(*new PhysicalPage(PhysicalAddress(i))));
  70. asm volatile("movl %%eax, %%cr3"::"a"(m_kernel_page_directory));
  71. asm volatile(
  72. "movl %cr0, %eax\n"
  73. "orl $0x80000001, %eax\n"
  74. "movl %eax, %cr0\n"
  75. );
  76. }
  77. RetainPtr<PhysicalPage> MemoryManager::allocate_page_table(PageDirectory& page_directory, unsigned index)
  78. {
  79. auto& page_directory_physical_ptr = page_directory.physical_pages[index];
  80. ASSERT(!page_directory_physical_ptr);
  81. auto physical_page = allocate_physical_page();
  82. if (!physical_page)
  83. return nullptr;
  84. dword address = physical_page->paddr().get();
  85. create_identity_mapping(LinearAddress(address), PAGE_SIZE);
  86. memset((void*)address, 0, PAGE_SIZE);
  87. page_directory.physical_pages[index] = move(physical_page);
  88. return page_directory.physical_pages[index];
  89. }
  90. void MemoryManager::deallocate_page_table(PageDirectory& page_directory, unsigned index)
  91. {
  92. auto& physical_page = page_directory.physical_pages[index];
  93. ASSERT(physical_page);
  94. //FIXME: This line is buggy and effectful somehow :(
  95. //ASSERT(!m_free_physical_pages.contains_slow(physical_page));
  96. for (size_t i = 0; i < MM.m_free_physical_pages.size(); ++i) {
  97. ASSERT(MM.m_free_physical_pages[i].ptr() != physical_page.ptr());
  98. }
  99. remove_identity_mapping(LinearAddress(physical_page->paddr().get()), PAGE_SIZE);
  100. page_directory.physical_pages[index] = nullptr;
  101. }
  102. void MemoryManager::remove_identity_mapping(LinearAddress laddr, size_t size)
  103. {
  104. InterruptDisabler disabler;
  105. // FIXME: ASSERT(laddr is 4KB aligned);
  106. for (dword offset = 0; offset < size; offset += PAGE_SIZE) {
  107. auto pte_address = laddr.offset(offset);
  108. auto pte = ensurePTE(m_kernel_page_directory, pte_address);
  109. pte.setPhysicalPageBase(0);
  110. pte.setUserAllowed(false);
  111. pte.setPresent(true);
  112. pte.setWritable(true);
  113. flushTLB(pte_address);
  114. }
  115. }
  116. auto MemoryManager::ensurePTE(PageDirectory* page_directory, LinearAddress laddr) -> PageTableEntry
  117. {
  118. ASSERT_INTERRUPTS_DISABLED();
  119. dword page_directory_index = (laddr.get() >> 22) & 0x3ff;
  120. dword page_table_index = (laddr.get() >> 12) & 0x3ff;
  121. PageDirectoryEntry pde = PageDirectoryEntry(&page_directory->entries[page_directory_index]);
  122. if (!pde.isPresent()) {
  123. #ifdef MM_DEBUG
  124. dbgprintf("MM: PDE %u not present, allocating\n", page_directory_index);
  125. #endif
  126. if (page_directory_index == 0) {
  127. ASSERT(page_directory == m_kernel_page_directory);
  128. pde.setPageTableBase((dword)m_pageTableZero);
  129. pde.setUserAllowed(false);
  130. pde.setPresent(true);
  131. pde.setWritable(true);
  132. } else if (page_directory_index == 1) {
  133. ASSERT(page_directory == m_kernel_page_directory);
  134. pde.setPageTableBase((dword)m_pageTableOne);
  135. pde.setUserAllowed(false);
  136. pde.setPresent(true);
  137. pde.setWritable(true);
  138. } else {
  139. auto page_table = allocate_page_table(*page_directory, page_directory_index);
  140. #ifdef MM_DEBUG
  141. dbgprintf("MM: PD K%x (%s) allocated page table #%u (for L%x) at P%x\n",
  142. page_directory,
  143. page_directory == m_kernel_page_directory ? "Kernel" : "User",
  144. page_directory_index,
  145. laddr.get(),
  146. page_table->paddr().get());
  147. #endif
  148. pde.setPageTableBase(page_table->paddr().get());
  149. pde.setUserAllowed(true);
  150. pde.setPresent(true);
  151. pde.setWritable(true);
  152. page_directory->physical_pages[page_directory_index] = move(page_table);
  153. }
  154. }
  155. return PageTableEntry(&pde.pageTableBase()[page_table_index]);
  156. }
  157. void MemoryManager::protectMap(LinearAddress linearAddress, size_t length)
  158. {
  159. InterruptDisabler disabler;
  160. // FIXME: ASSERT(linearAddress is 4KB aligned);
  161. for (dword offset = 0; offset < length; offset += PAGE_SIZE) {
  162. auto pteAddress = linearAddress.offset(offset);
  163. auto pte = ensurePTE(m_kernel_page_directory, pteAddress);
  164. pte.setPhysicalPageBase(pteAddress.get());
  165. pte.setUserAllowed(false);
  166. pte.setPresent(false);
  167. pte.setWritable(false);
  168. flushTLB(pteAddress);
  169. }
  170. }
  171. void MemoryManager::create_identity_mapping(LinearAddress laddr, size_t size)
  172. {
  173. InterruptDisabler disabler;
  174. // FIXME: ASSERT(laddr is 4KB aligned);
  175. for (dword offset = 0; offset < size; offset += PAGE_SIZE) {
  176. auto pteAddress = laddr.offset(offset);
  177. auto pte = ensurePTE(m_kernel_page_directory, pteAddress);
  178. pte.setPhysicalPageBase(pteAddress.get());
  179. pte.setUserAllowed(false);
  180. pte.setPresent(true);
  181. pte.setWritable(true);
  182. flushTLB(pteAddress);
  183. }
  184. }
  185. void MemoryManager::initialize()
  186. {
  187. s_the = new MemoryManager;
  188. }
  189. Region* MemoryManager::region_from_laddr(Process& process, LinearAddress laddr)
  190. {
  191. ASSERT_INTERRUPTS_DISABLED();
  192. // FIXME: Use a binary search tree (maybe red/black?) or some other more appropriate data structure!
  193. for (auto& region : process.m_regions) {
  194. if (region->contains(laddr))
  195. return region.ptr();
  196. }
  197. kprintf("%s(%u) Couldn't find region for L%x\n", process.name().characters(), process.pid(), laddr.get());
  198. return nullptr;
  199. }
  200. bool MemoryManager::copy_on_write(Process& process, Region& region, unsigned page_index_in_region)
  201. {
  202. ASSERT_INTERRUPTS_DISABLED();
  203. auto& vmo = region.vmo();
  204. if (vmo.physical_pages()[page_index_in_region]->retain_count() == 1) {
  205. #ifdef PAGE_FAULT_DEBUG
  206. dbgprintf(" >> It's a COW page but nobody is sharing it anymore. Remap r/w\n");
  207. #endif
  208. region.cow_map.set(page_index_in_region, false);
  209. remap_region_page(process.m_page_directory, region, page_index_in_region, true);
  210. return true;
  211. }
  212. #ifdef PAGE_FAULT_DEBUG
  213. dbgprintf(" >> It's a COW page and it's time to COW!\n");
  214. #endif
  215. auto physical_page_to_copy = move(vmo.physical_pages()[page_index_in_region]);
  216. auto physical_page = allocate_physical_page();
  217. byte* dest_ptr = quickmap_page(*physical_page);
  218. const byte* src_ptr = region.linearAddress.offset(page_index_in_region * PAGE_SIZE).asPtr();
  219. #ifdef PAGE_FAULT_DEBUG
  220. dbgprintf(" >> COW P%x <- P%x\n", physical_page->paddr().get(), physical_page_to_copy->paddr().get());
  221. #endif
  222. memcpy(dest_ptr, src_ptr, PAGE_SIZE);
  223. vmo.physical_pages()[page_index_in_region] = move(physical_page);
  224. unquickmap_page();
  225. region.cow_map.set(page_index_in_region, false);
  226. remap_region_page(process.m_page_directory, region, page_index_in_region, true);
  227. return true;
  228. }
  229. bool Region::page_in(PageDirectory& page_directory)
  230. {
  231. ASSERT(!vmo().is_anonymous());
  232. ASSERT(vmo().vnode());
  233. #ifdef MM_DEBUG
  234. dbgprintf("MM: page_in %u pages\n", page_count());
  235. #endif
  236. for (size_t i = 0; i < page_count(); ++i) {
  237. auto& vmo_page = vmo().physical_pages()[first_page_index() + i];
  238. if (vmo_page.is_null()) {
  239. bool success = MM.page_in_from_vnode(page_directory, *this, i);
  240. if (!success)
  241. return false;
  242. }
  243. MM.remap_region_page(&page_directory, *this, i, true);
  244. }
  245. return true;
  246. }
  247. bool MemoryManager::page_in_from_vnode(PageDirectory& page_directory, Region& region, unsigned page_index_in_region)
  248. {
  249. auto& vmo = region.vmo();
  250. ASSERT(!vmo.is_anonymous());
  251. ASSERT(vmo.vnode());
  252. auto& vnode = *vmo.vnode();
  253. auto& vmo_page = vmo.physical_pages()[region.first_page_index() + page_index_in_region];
  254. ASSERT(vmo_page.is_null());
  255. vmo_page = allocate_physical_page();
  256. if (vmo_page.is_null()) {
  257. kprintf("MM: page_in_from_vnode was unable to allocate a physical page\n");
  258. return false;
  259. }
  260. remap_region_page(&page_directory, region, page_index_in_region, true);
  261. byte* dest_ptr = region.linearAddress.offset(page_index_in_region * PAGE_SIZE).asPtr();
  262. dbgprintf("MM: page_in_from_vnode ready to read from vnode, will write to L%x!\n", dest_ptr);
  263. sti(); // Oh god here we go...
  264. auto nread = vnode.fileSystem()->readInodeBytes(vnode.inode, vmo.vnode_offset() + ((region.first_page_index() + page_index_in_region) * PAGE_SIZE), PAGE_SIZE, dest_ptr, nullptr);
  265. if (nread < 0) {
  266. kprintf("MM: page_in_form_vnode had error (%d) while reading!\n", nread);
  267. return false;
  268. }
  269. if (nread < PAGE_SIZE) {
  270. // If we read less than a page, zero out the rest to avoid leaking uninitialized data.
  271. memset(dest_ptr + nread, 0, PAGE_SIZE - nread);
  272. }
  273. cli();
  274. return true;
  275. }
  276. PageFaultResponse MemoryManager::handle_page_fault(const PageFault& fault)
  277. {
  278. ASSERT_INTERRUPTS_DISABLED();
  279. #ifdef PAGE_FAULT_DEBUG
  280. dbgprintf("MM: handle_page_fault(%w) at L%x\n", fault.code(), fault.laddr().get());
  281. #endif
  282. auto* region = region_from_laddr(*current, fault.laddr());
  283. if (!region) {
  284. kprintf("NP(error) fault at invalid address L%x\n", fault.laddr().get());
  285. return PageFaultResponse::ShouldCrash;
  286. }
  287. auto page_index_in_region = region->page_index_from_address(fault.laddr());
  288. if (fault.is_not_present()) {
  289. if (region->vmo().vnode()) {
  290. dbgprintf("NP(vnode) fault in Region{%p}[%u]\n", region, page_index_in_region);
  291. page_in_from_vnode(*current->m_page_directory, *region, page_index_in_region);
  292. return PageFaultResponse::Continue;
  293. } else {
  294. kprintf("NP(error) fault in Region{%p}[%u]\n", region, page_index_in_region);
  295. }
  296. } else if (fault.is_protection_violation()) {
  297. if (region->cow_map.get(page_index_in_region)) {
  298. dbgprintf("PV(cow) fault in Region{%p}[%u]\n", region, page_index_in_region);
  299. bool success = copy_on_write(*current, *region, page_index_in_region);
  300. ASSERT(success);
  301. return PageFaultResponse::Continue;
  302. }
  303. kprintf("PV(error) fault in Region{%p}[%u]\n", region, page_index_in_region);
  304. } else {
  305. ASSERT_NOT_REACHED();
  306. }
  307. return PageFaultResponse::ShouldCrash;
  308. }
  309. RetainPtr<PhysicalPage> MemoryManager::allocate_physical_page()
  310. {
  311. InterruptDisabler disabler;
  312. if (1 > m_free_physical_pages.size())
  313. return { };
  314. #ifdef MM_DEBUG
  315. dbgprintf("MM: allocate_physical_page vending P%x\n", m_free_physical_pages.last()->paddr().get());
  316. #endif
  317. return m_free_physical_pages.takeLast();
  318. }
  319. void MemoryManager::enter_kernel_paging_scope()
  320. {
  321. InterruptDisabler disabler;
  322. current->m_tss.cr3 = (dword)m_kernel_page_directory;
  323. asm volatile("movl %%eax, %%cr3"::"a"(m_kernel_page_directory):"memory");
  324. }
  325. void MemoryManager::enter_process_paging_scope(Process& process)
  326. {
  327. InterruptDisabler disabler;
  328. current->m_tss.cr3 = (dword)process.m_page_directory;
  329. asm volatile("movl %%eax, %%cr3"::"a"(process.m_page_directory):"memory");
  330. }
  331. void MemoryManager::flushEntireTLB()
  332. {
  333. asm volatile(
  334. "mov %cr3, %eax\n"
  335. "mov %eax, %cr3\n"
  336. );
  337. }
  338. void MemoryManager::flushTLB(LinearAddress laddr)
  339. {
  340. asm volatile("invlpg %0": :"m" (*(char*)laddr.get()) : "memory");
  341. }
  342. byte* MemoryManager::quickmap_page(PhysicalPage& physical_page)
  343. {
  344. ASSERT_INTERRUPTS_DISABLED();
  345. auto page_laddr = LinearAddress(4 * MB);
  346. auto pte = ensurePTE(m_kernel_page_directory, page_laddr);
  347. pte.setPhysicalPageBase(physical_page.paddr().get());
  348. pte.setPresent(true); // FIXME: Maybe we should use the is_readable flag here?
  349. pte.setWritable(true);
  350. pte.setUserAllowed(false);
  351. flushTLB(page_laddr);
  352. #ifdef MM_DEBUG
  353. dbgprintf("MM: >> quickmap_page L%x => P%x\n", page_laddr, physical_page.paddr().get());
  354. #endif
  355. return page_laddr.asPtr();
  356. }
  357. void MemoryManager::unquickmap_page()
  358. {
  359. ASSERT_INTERRUPTS_DISABLED();
  360. auto page_laddr = LinearAddress(4 * MB);
  361. auto pte = ensurePTE(m_kernel_page_directory, page_laddr);
  362. #ifdef MM_DEBUG
  363. auto old_physical_address = pte.physicalPageBase();
  364. #endif
  365. pte.setPhysicalPageBase(0);
  366. pte.setPresent(false);
  367. pte.setWritable(false);
  368. pte.setUserAllowed(false);
  369. flushTLB(page_laddr);
  370. #ifdef MM_DEBUG
  371. dbgprintf("MM: >> unquickmap_page L%x =/> P%x\n", page_laddr, old_physical_address);
  372. #endif
  373. }
  374. void MemoryManager::remap_region_page(PageDirectory* page_directory, Region& region, unsigned page_index_in_region, bool user_allowed)
  375. {
  376. InterruptDisabler disabler;
  377. auto page_laddr = region.linearAddress.offset(page_index_in_region * PAGE_SIZE);
  378. auto pte = ensurePTE(page_directory, page_laddr);
  379. auto& physical_page = region.vmo().physical_pages()[page_index_in_region];
  380. ASSERT(physical_page);
  381. pte.setPhysicalPageBase(physical_page->paddr().get());
  382. pte.setPresent(true); // FIXME: Maybe we should use the is_readable flag here?
  383. if (region.cow_map.get(page_index_in_region))
  384. pte.setWritable(false);
  385. else
  386. pte.setWritable(region.is_writable);
  387. pte.setUserAllowed(user_allowed);
  388. if (page_directory->is_active())
  389. flushTLB(page_laddr);
  390. #ifdef MM_DEBUG
  391. dbgprintf("MM: >> remap_region_page (PD=%x) '%s' L%x => P%x (@%p)\n", page_directory, region.name.characters(), page_laddr.get(), physical_page->paddr().get(), physical_page.ptr());
  392. #endif
  393. }
  394. void MemoryManager::remap_region(Process& process, Region& region)
  395. {
  396. InterruptDisabler disabler;
  397. map_region_at_address(process.m_page_directory, region, region.linearAddress, true);
  398. }
  399. void MemoryManager::map_region_at_address(PageDirectory* page_directory, Region& region, LinearAddress laddr, bool user_allowed)
  400. {
  401. InterruptDisabler disabler;
  402. auto& vmo = region.vmo();
  403. dbgprintf("MM: map_region_at_address will map VMO pages %u - %u (VMO page count: %u)\n", region.first_page_index(), region.last_page_index(), vmo.page_count());
  404. for (size_t i = region.first_page_index(); i <= region.last_page_index(); ++i) {
  405. auto page_laddr = laddr.offset(i * PAGE_SIZE);
  406. auto pte = ensurePTE(page_directory, page_laddr);
  407. auto& physical_page = vmo.physical_pages()[i];
  408. if (physical_page) {
  409. pte.setPhysicalPageBase(physical_page->paddr().get());
  410. pte.setPresent(true); // FIXME: Maybe we should use the is_readable flag here?
  411. if (region.cow_map.get(i))
  412. pte.setWritable(false);
  413. else
  414. pte.setWritable(region.is_writable);
  415. } else {
  416. pte.setPhysicalPageBase(0);
  417. pte.setPresent(false);
  418. pte.setWritable(region.is_writable);
  419. }
  420. pte.setUserAllowed(user_allowed);
  421. if (page_directory->is_active())
  422. flushTLB(page_laddr);
  423. #ifdef MM_DEBUG
  424. dbgprintf("MM: >> map_region_at_address (PD=%x) '%s' L%x => P%x (@%p)\n", page_directory, region.name.characters(), page_laddr, physical_page ? physical_page->paddr().get() : 0, physical_page.ptr());
  425. #endif
  426. }
  427. }
  428. void MemoryManager::unmap_range(PageDirectory* page_directory, LinearAddress laddr, size_t size)
  429. {
  430. ASSERT((size % PAGE_SIZE) == 0);
  431. InterruptDisabler disabler;
  432. size_t numPages = size / PAGE_SIZE;
  433. for (size_t i = 0; i < numPages; ++i) {
  434. auto page_laddr = laddr.offset(i * PAGE_SIZE);
  435. auto pte = ensurePTE(page_directory, page_laddr);
  436. pte.setPhysicalPageBase(0);
  437. pte.setPresent(false);
  438. pte.setWritable(false);
  439. pte.setUserAllowed(false);
  440. if (page_directory->is_active())
  441. flushTLB(page_laddr);
  442. #ifdef MM_DEBUG
  443. dbgprintf("MM: << unmap_range L%x =/> 0\n", page_laddr);
  444. #endif
  445. }
  446. }
  447. LinearAddress MemoryManager::allocate_linear_address_range(size_t size)
  448. {
  449. ASSERT((size % PAGE_SIZE) == 0);
  450. // FIXME: Recycle ranges!
  451. auto laddr = m_next_laddr;
  452. m_next_laddr.set(m_next_laddr.get() + size);
  453. return laddr;
  454. }
  455. byte* MemoryManager::create_kernel_alias_for_region(Region& region)
  456. {
  457. InterruptDisabler disabler;
  458. #ifdef MM_DEBUG
  459. dbgprintf("MM: create_kernel_alias_for_region region=%p (L%x size=%u)\n", &region, region.linearAddress.get(), region.size);
  460. #endif
  461. auto laddr = allocate_linear_address_range(region.size);
  462. map_region_at_address(m_kernel_page_directory, region, laddr, false);
  463. #ifdef MM_DEBUG
  464. dbgprintf("MM: Created alias L%x for L%x\n", laddr.get(), region.linearAddress.get());
  465. #endif
  466. return laddr.asPtr();
  467. }
  468. void MemoryManager::remove_kernel_alias_for_region(Region& region, byte* addr)
  469. {
  470. #ifdef MM_DEBUG
  471. dbgprintf("remove_kernel_alias_for_region region=%p, addr=L%x\n", &region, addr);
  472. #endif
  473. unmap_range(m_kernel_page_directory, LinearAddress((dword)addr), region.size);
  474. }
  475. bool MemoryManager::unmapRegion(Process& process, Region& region)
  476. {
  477. InterruptDisabler disabler;
  478. for (size_t i = 0; i < region.page_count(); ++i) {
  479. auto laddr = region.linearAddress.offset(i * PAGE_SIZE);
  480. auto pte = ensurePTE(process.m_page_directory, laddr);
  481. pte.setPhysicalPageBase(0);
  482. pte.setPresent(false);
  483. pte.setWritable(false);
  484. pte.setUserAllowed(false);
  485. if (process.m_page_directory->is_active())
  486. flushTLB(laddr);
  487. #ifdef MM_DEBUG
  488. auto& physical_page = region.vmo().physical_pages()[region.first_page_index() + i];
  489. dbgprintf("MM: >> Unmapped L%x => P%x <<\n", laddr, physical_page ? physical_page->paddr().get() : 0);
  490. #endif
  491. }
  492. return true;
  493. }
  494. bool MemoryManager::mapRegion(Process& process, Region& region)
  495. {
  496. map_region_at_address(process.m_page_directory, region, region.linearAddress, true);
  497. return true;
  498. }
  499. bool MemoryManager::validate_user_read(const Process& process, LinearAddress laddr) const
  500. {
  501. dword pageDirectoryIndex = (laddr.get() >> 22) & 0x3ff;
  502. dword pageTableIndex = (laddr.get() >> 12) & 0x3ff;
  503. auto pde = PageDirectoryEntry(&process.m_page_directory->entries[pageDirectoryIndex]);
  504. if (!pde.isPresent())
  505. return false;
  506. auto pte = PageTableEntry(&pde.pageTableBase()[pageTableIndex]);
  507. if (!pte.isPresent())
  508. return false;
  509. if (!pte.isUserAllowed())
  510. return false;
  511. return true;
  512. }
  513. bool MemoryManager::validate_user_write(const Process& process, LinearAddress laddr) const
  514. {
  515. dword pageDirectoryIndex = (laddr.get() >> 22) & 0x3ff;
  516. dword pageTableIndex = (laddr.get() >> 12) & 0x3ff;
  517. auto pde = PageDirectoryEntry(&process.m_page_directory->entries[pageDirectoryIndex]);
  518. if (!pde.isPresent())
  519. return false;
  520. auto pte = PageTableEntry(&pde.pageTableBase()[pageTableIndex]);
  521. if (!pte.isPresent())
  522. return false;
  523. if (!pte.isUserAllowed())
  524. return false;
  525. if (!pte.isWritable())
  526. return false;
  527. return true;
  528. }
  529. RetainPtr<Region> Region::clone()
  530. {
  531. InterruptDisabler disabler;
  532. if (is_readable && !is_writable) {
  533. // Create a new region backed by the same VMObject.
  534. return adopt(*new Region(linearAddress, size, m_vmo.copyRef(), m_offset_in_vmo, String(name), is_readable, is_writable));
  535. }
  536. // Set up a COW region. The parent (this) region becomes COW as well!
  537. for (size_t i = 0; i < page_count(); ++i)
  538. cow_map.set(i, true);
  539. MM.remap_region(*current, *this);
  540. return adopt(*new Region(linearAddress, size, m_vmo->clone(), m_offset_in_vmo, String(name), is_readable, is_writable, true));
  541. }
  542. Region::Region(LinearAddress a, size_t s, String&& n, bool r, bool w, bool cow)
  543. : linearAddress(a)
  544. , size(s)
  545. , m_vmo(VMObject::create_anonymous(s))
  546. , name(move(n))
  547. , is_readable(r)
  548. , is_writable(w)
  549. , cow_map(Bitmap::create(m_vmo->page_count(), cow))
  550. {
  551. m_vmo->set_name(name);
  552. MM.register_region(*this);
  553. }
  554. Region::Region(LinearAddress a, size_t s, RetainPtr<VirtualFileSystem::Node>&& vnode, String&& n, bool r, bool w)
  555. : linearAddress(a)
  556. , size(s)
  557. , m_vmo(VMObject::create_file_backed(move(vnode), s))
  558. , name(move(n))
  559. , is_readable(r)
  560. , is_writable(w)
  561. , cow_map(Bitmap::create(m_vmo->page_count()))
  562. {
  563. MM.register_region(*this);
  564. }
  565. Region::Region(LinearAddress a, size_t s, RetainPtr<VMObject>&& vmo, size_t offset_in_vmo, String&& n, bool r, bool w, bool cow)
  566. : linearAddress(a)
  567. , size(s)
  568. , m_offset_in_vmo(offset_in_vmo)
  569. , m_vmo(move(vmo))
  570. , name(move(n))
  571. , is_readable(r)
  572. , is_writable(w)
  573. , cow_map(Bitmap::create(m_vmo->page_count(), cow))
  574. {
  575. MM.register_region(*this);
  576. }
  577. Region::~Region()
  578. {
  579. MM.unregister_region(*this);
  580. }
  581. void PhysicalPage::return_to_freelist()
  582. {
  583. InterruptDisabler disabler;
  584. m_retain_count = 1;
  585. MM.m_free_physical_pages.append(adopt(*this));
  586. #ifdef MM_DEBUG
  587. dbgprintf("MM: P%x released to freelist\n", m_paddr.get());
  588. #endif
  589. }
  590. RetainPtr<VMObject> VMObject::create_file_backed(RetainPtr<VirtualFileSystem::Node>&& vnode, size_t size)
  591. {
  592. InterruptDisabler disabler;
  593. if (vnode->vmo())
  594. return static_cast<VMObject*>(vnode->vmo());
  595. size = ceilDiv(size, PAGE_SIZE) * PAGE_SIZE;
  596. auto vmo = adopt(*new VMObject(move(vnode), size));
  597. vmo->vnode()->set_vmo(vmo.ptr());
  598. return vmo;
  599. }
  600. RetainPtr<VMObject> VMObject::create_anonymous(size_t size)
  601. {
  602. size = ceilDiv(size, PAGE_SIZE) * PAGE_SIZE;
  603. return adopt(*new VMObject(size));
  604. }
  605. RetainPtr<VMObject> VMObject::clone()
  606. {
  607. return adopt(*new VMObject(*this));
  608. }
  609. VMObject::VMObject(VMObject& other)
  610. : m_name(other.m_name)
  611. , m_anonymous(other.m_anonymous)
  612. , m_vnode_offset(other.m_vnode_offset)
  613. , m_size(other.m_size)
  614. , m_vnode(other.m_vnode)
  615. , m_physical_pages(other.m_physical_pages)
  616. {
  617. MM.register_vmo(*this);
  618. }
  619. VMObject::VMObject(size_t size)
  620. : m_anonymous(true)
  621. , m_size(size)
  622. {
  623. MM.register_vmo(*this);
  624. m_physical_pages.resize(page_count());
  625. }
  626. VMObject::VMObject(RetainPtr<VirtualFileSystem::Node>&& vnode, size_t size)
  627. : m_size(size)
  628. , m_vnode(move(vnode))
  629. {
  630. m_physical_pages.resize(page_count());
  631. MM.register_vmo(*this);
  632. }
  633. VMObject::~VMObject()
  634. {
  635. if (m_vnode) {
  636. ASSERT(m_vnode->vmo() == this);
  637. m_vnode->set_vmo(nullptr);
  638. }
  639. MM.unregister_vmo(*this);
  640. }
  641. int Region::commit(Process& process)
  642. {
  643. InterruptDisabler disabler;
  644. #ifdef MM_DEBUG
  645. dbgprintf("MM: commit %u pages in at L%x\n", vmo().page_count(), linearAddress.get());
  646. #endif
  647. for (size_t i = first_page_index(); i <= last_page_index(); ++i) {
  648. if (!vmo().physical_pages()[i].is_null())
  649. continue;
  650. auto physical_page = MM.allocate_physical_page();
  651. if (!physical_page) {
  652. kprintf("MM: commit was unable to allocate a physical page\n");
  653. return -ENOMEM;
  654. }
  655. vmo().physical_pages()[i] = move(physical_page);
  656. MM.remap_region_page(process.m_page_directory, *this, i, true);
  657. }
  658. return 0;
  659. }
  660. void MemoryManager::register_vmo(VMObject& vmo)
  661. {
  662. InterruptDisabler disabler;
  663. m_vmos.set(&vmo);
  664. }
  665. void MemoryManager::unregister_vmo(VMObject& vmo)
  666. {
  667. InterruptDisabler disabler;
  668. m_vmos.remove(&vmo);
  669. }
  670. void MemoryManager::register_region(Region& region)
  671. {
  672. InterruptDisabler disabler;
  673. m_regions.set(&region);
  674. }
  675. void MemoryManager::unregister_region(Region& region)
  676. {
  677. InterruptDisabler disabler;
  678. m_regions.remove(&region);
  679. }
  680. inline bool PageDirectory::is_active() const
  681. {
  682. return &current->page_directory() == this;
  683. }