2020-01-18 11:38:21 +03:00
|
|
|
/*
|
2021-03-10 00:09:07 +03:00
|
|
|
* Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
|
2020-01-18 11:38:21 +03:00
|
|
|
*
|
2021-04-22 11:24:48 +03:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
2020-01-18 11:38:21 +03:00
|
|
|
*/
|
|
|
|
|
2020-03-08 14:33:14 +03:00
|
|
|
#include <AK/Memory.h>
|
2020-08-25 04:35:19 +03:00
|
|
|
#include <AK/Singleton.h>
|
2021-07-18 15:47:32 +03:00
|
|
|
#include <Kernel/Prekernel/Prekernel.h>
|
2019-04-03 16:13:07 +03:00
|
|
|
#include <Kernel/Process.h>
|
2020-01-18 01:05:37 +03:00
|
|
|
#include <Kernel/Random.h>
|
2021-06-22 18:40:16 +03:00
|
|
|
#include <Kernel/Sections.h>
|
2019-06-07 12:43:58 +03:00
|
|
|
#include <Kernel/VM/MemoryManager.h>
|
|
|
|
#include <Kernel/VM/PageDirectory.h>
|
2019-04-03 16:13:07 +03:00
|
|
|
|
2021-07-18 15:47:32 +03:00
|
|
|
extern u8* end_of_kernel_image;
|
|
|
|
|
2020-02-16 03:27:42 +03:00
|
|
|
namespace Kernel {
|
|
|
|
|
2021-06-28 04:23:21 +03:00
|
|
|
static AK::Singleton<HashMap<FlatPtr, PageDirectory*>> s_cr3_map;
|
2020-08-25 04:35:19 +03:00
|
|
|
|
2021-06-28 04:23:21 +03:00
|
|
|
static HashMap<FlatPtr, PageDirectory*>& cr3_map()
|
2019-08-06 12:19:16 +03:00
|
|
|
{
|
2021-02-23 22:42:32 +03:00
|
|
|
VERIFY_INTERRUPTS_DISABLED();
|
2020-08-25 04:35:19 +03:00
|
|
|
return *s_cr3_map;
|
2019-08-06 12:19:16 +03:00
|
|
|
}
|
|
|
|
|
2021-06-28 04:23:21 +03:00
|
|
|
RefPtr<PageDirectory> PageDirectory::find_by_cr3(FlatPtr cr3)
|
2019-08-06 12:19:16 +03:00
|
|
|
{
|
2020-07-06 18:11:52 +03:00
|
|
|
ScopedSpinLock lock(s_mm_lock);
|
2019-12-25 04:46:17 +03:00
|
|
|
return cr3_map().get(cr3).value_or({});
|
2019-08-06 12:19:16 +03:00
|
|
|
}
|
|
|
|
|
2021-07-18 15:47:32 +03:00
|
|
|
extern "C" FlatPtr kernel_base;
|
2021-06-26 02:00:40 +03:00
|
|
|
#if ARCH(X86_64)
|
2021-07-18 15:47:32 +03:00
|
|
|
extern "C" void* boot_pml4t;
|
2021-06-26 02:00:40 +03:00
|
|
|
#endif
|
2021-07-18 15:47:32 +03:00
|
|
|
extern "C" void* boot_pdpt;
|
|
|
|
extern "C" void* boot_pd0;
|
|
|
|
extern "C" void* boot_pd_kernel;
|
2019-12-25 13:22:16 +03:00
|
|
|
|
2021-02-19 20:41:50 +03:00
|
|
|
UNMAP_AFTER_INIT PageDirectory::PageDirectory()
|
2020-01-17 21:59:20 +03:00
|
|
|
{
|
2021-07-18 15:47:32 +03:00
|
|
|
// make sure this starts in a new page directory to make MemoryManager::initialize_physical_pages() happy
|
|
|
|
FlatPtr start_of_range = ((FlatPtr)&end_of_kernel_image & ~(FlatPtr)0x1fffff) + 0x200000;
|
|
|
|
m_range_allocator.initialize_with_range(VirtualAddress(start_of_range), KERNEL_PD_END - start_of_range);
|
2020-06-02 07:55:09 +03:00
|
|
|
m_identity_range_allocator.initialize_with_range(VirtualAddress(FlatPtr(0x00000000)), 0x00200000);
|
2021-07-08 04:50:05 +03:00
|
|
|
}
|
2020-01-18 01:05:37 +03:00
|
|
|
|
2021-07-08 04:50:05 +03:00
|
|
|
UNMAP_AFTER_INIT void PageDirectory::allocate_kernel_directory()
|
|
|
|
{
|
2020-01-17 21:59:20 +03:00
|
|
|
// Adopt the page tables already set up by boot.S
|
2021-06-26 02:00:40 +03:00
|
|
|
#if ARCH(X86_64)
|
|
|
|
PhysicalAddress boot_pml4t_paddr(virtual_to_low_physical((FlatPtr)boot_pml4t));
|
|
|
|
dmesgln("MM: boot_pml4t @ {}", boot_pml4t_paddr);
|
2021-07-17 14:30:47 +03:00
|
|
|
m_pml4t = PhysicalPage::create(boot_pml4t_paddr, MayReturnToFreeList::No);
|
2021-06-26 02:00:40 +03:00
|
|
|
#endif
|
2020-03-08 12:36:51 +03:00
|
|
|
PhysicalAddress boot_pdpt_paddr(virtual_to_low_physical((FlatPtr)boot_pdpt));
|
|
|
|
PhysicalAddress boot_pd0_paddr(virtual_to_low_physical((FlatPtr)boot_pd0));
|
2021-07-18 15:47:32 +03:00
|
|
|
PhysicalAddress boot_pd_kernel_paddr(virtual_to_low_physical((FlatPtr)boot_pd_kernel));
|
2021-03-10 00:09:07 +03:00
|
|
|
dmesgln("MM: boot_pdpt @ {}", boot_pdpt_paddr);
|
|
|
|
dmesgln("MM: boot_pd0 @ {}", boot_pd0_paddr);
|
2021-07-18 15:47:32 +03:00
|
|
|
dmesgln("MM: boot_pd_kernel @ {}", boot_pd_kernel_paddr);
|
2021-07-17 14:30:47 +03:00
|
|
|
m_directory_table = PhysicalPage::create(boot_pdpt_paddr, MayReturnToFreeList::No);
|
|
|
|
m_directory_pages[0] = PhysicalPage::create(boot_pd0_paddr, MayReturnToFreeList::No);
|
2021-07-18 15:47:32 +03:00
|
|
|
m_directory_pages[(kernel_base >> 30) & 0x1ff] = PhysicalPage::create(boot_pd_kernel_paddr, MayReturnToFreeList::No);
|
2019-04-03 16:13:07 +03:00
|
|
|
}
|
|
|
|
|
2021-02-08 17:45:40 +03:00
|
|
|
PageDirectory::PageDirectory(const RangeAllocator* parent_range_allocator)
|
2019-04-03 16:13:07 +03:00
|
|
|
{
|
2021-05-19 17:35:09 +03:00
|
|
|
constexpr FlatPtr userspace_range_base = 0x00800000;
|
2021-07-07 05:25:22 +03:00
|
|
|
constexpr FlatPtr userspace_range_ceiling = USER_RANGE_CEILING;
|
2021-05-19 17:35:09 +03:00
|
|
|
|
2020-07-06 18:11:52 +03:00
|
|
|
ScopedSpinLock lock(s_mm_lock);
|
2020-01-18 01:05:37 +03:00
|
|
|
if (parent_range_allocator) {
|
|
|
|
m_range_allocator.initialize_from_parent(*parent_range_allocator);
|
|
|
|
} else {
|
AK: Rename KB, MB, GB to KiB, MiB, GiB
The SI prefixes "k", "M", "G" mean "10^3", "10^6", "10^9".
The IEC prefixes "Ki", "Mi", "Gi" mean "2^10", "2^20", "2^30".
Let's use the correct name, at least in code.
Only changes the name of the constants, no other behavior change.
2020-08-15 20:55:00 +03:00
|
|
|
size_t random_offset = (get_fast_random<u8>() % 32 * MiB) & PAGE_MASK;
|
2020-01-18 01:05:37 +03:00
|
|
|
u32 base = userspace_range_base + random_offset;
|
|
|
|
m_range_allocator.initialize_with_range(VirtualAddress(base), userspace_range_ceiling - base);
|
|
|
|
}
|
|
|
|
|
2019-12-25 13:22:16 +03:00
|
|
|
// Set up a userspace page directory
|
2021-06-26 02:00:40 +03:00
|
|
|
#if ARCH(X86_64)
|
|
|
|
m_pml4t = MM.allocate_user_physical_page();
|
|
|
|
if (!m_pml4t)
|
|
|
|
return;
|
|
|
|
#endif
|
2020-01-18 00:30:52 +03:00
|
|
|
m_directory_table = MM.allocate_user_physical_page();
|
2020-09-27 17:10:10 +03:00
|
|
|
if (!m_directory_table)
|
|
|
|
return;
|
2021-07-18 15:47:32 +03:00
|
|
|
auto kernel_pd_index = (kernel_base >> 30) & 0x1ffu;
|
|
|
|
for (size_t i = 0; i < kernel_pd_index; i++) {
|
2021-07-17 03:42:59 +03:00
|
|
|
m_directory_pages[i] = MM.allocate_user_physical_page();
|
|
|
|
if (!m_directory_pages[i])
|
|
|
|
return;
|
|
|
|
}
|
2021-07-18 15:47:32 +03:00
|
|
|
// Share the top 1 GiB of kernel-only mappings (>=kernel_base)
|
2021-07-17 03:42:59 +03:00
|
|
|
m_directory_pages[kernel_pd_index] = MM.kernel_page_directory().m_directory_pages[kernel_pd_index];
|
2019-12-25 13:22:16 +03:00
|
|
|
|
2021-06-26 02:00:40 +03:00
|
|
|
#if ARCH(X86_64)
|
|
|
|
{
|
|
|
|
auto& table = *(PageDirectoryPointerTable*)MM.quickmap_page(*m_pml4t);
|
2021-06-28 18:03:08 +03:00
|
|
|
table.raw[0] = (FlatPtr)m_directory_table->paddr().as_ptr() | 7;
|
2021-06-26 02:00:40 +03:00
|
|
|
MM.unquickmap_page();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-01-18 00:30:52 +03:00
|
|
|
{
|
|
|
|
auto& table = *(PageDirectoryPointerTable*)MM.quickmap_page(*m_directory_table);
|
2021-07-17 03:42:59 +03:00
|
|
|
for (size_t i = 0; i < sizeof(m_directory_pages) / sizeof(m_directory_pages[0]); i++) {
|
|
|
|
if (m_directory_pages[i]) {
|
2021-06-26 02:00:40 +03:00
|
|
|
#if ARCH(I386)
|
2021-07-17 03:42:59 +03:00
|
|
|
table.raw[i] = (FlatPtr)m_directory_pages[i]->paddr().as_ptr() | 1;
|
2021-06-26 02:00:40 +03:00
|
|
|
#else
|
2021-07-17 03:42:59 +03:00
|
|
|
table.raw[i] = (FlatPtr)m_directory_pages[i]->paddr().as_ptr() | 7;
|
2021-06-26 02:00:40 +03:00
|
|
|
#endif
|
2021-07-17 03:42:59 +03:00
|
|
|
}
|
|
|
|
}
|
2020-12-30 20:31:25 +03:00
|
|
|
|
|
|
|
// 2 ** MAXPHYADDR - 1
|
|
|
|
// Where MAXPHYADDR = physical_address_bit_width
|
|
|
|
u64 max_physical_address = (1ULL << Processor::current().physical_address_bit_width()) - 1;
|
|
|
|
|
|
|
|
// bit 63 = no execute
|
|
|
|
// bit 7 = page size
|
|
|
|
// bit 5 = accessed
|
|
|
|
// bit 4 = cache disable
|
|
|
|
// bit 3 = write through
|
|
|
|
// bit 2 = user/supervisor
|
|
|
|
// bit 1 = read/write
|
|
|
|
// bit 0 = present
|
|
|
|
constexpr u64 pdpte_bit_flags = 0x80000000000000BF;
|
|
|
|
|
|
|
|
// This is to notify us of bugs where we're:
|
|
|
|
// 1. Going over what the processor is capable of.
|
|
|
|
// 2. Writing into the reserved bits (51:MAXPHYADDR), where doing so throws a GPF
|
|
|
|
// when writing out the PDPT pointer to CR3.
|
|
|
|
// The reason we're not checking the page directory's physical address directly is because
|
|
|
|
// we're checking for sign extension when putting it into a PDPTE. See issue #4584.
|
2021-07-17 03:42:59 +03:00
|
|
|
for (auto table_entry : table.raw)
|
|
|
|
VERIFY((table_entry & ~pdpte_bit_flags) <= max_physical_address);
|
2020-12-30 20:31:25 +03:00
|
|
|
|
2020-01-18 00:30:52 +03:00
|
|
|
MM.unquickmap_page();
|
|
|
|
}
|
2019-12-25 13:22:16 +03:00
|
|
|
|
2021-01-31 21:00:53 +03:00
|
|
|
// Clone bottom 2 MiB of mappings from kernel_page_directory
|
|
|
|
PageDirectoryEntry buffer;
|
|
|
|
auto* kernel_pd = MM.quickmap_pd(MM.kernel_page_directory(), 0);
|
|
|
|
memcpy(&buffer, kernel_pd, sizeof(PageDirectoryEntry));
|
|
|
|
auto* new_pd = MM.quickmap_pd(*this, 0);
|
|
|
|
memcpy(new_pd, &buffer, sizeof(PageDirectoryEntry));
|
|
|
|
|
2021-02-08 17:45:40 +03:00
|
|
|
// If we got here, we successfully created it. Set m_space now
|
|
|
|
m_valid = true;
|
2020-09-27 17:10:10 +03:00
|
|
|
|
2019-12-25 04:46:17 +03:00
|
|
|
cr3_map().set(cr3(), this);
|
2019-04-03 16:13:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
PageDirectory::~PageDirectory()
|
|
|
|
{
|
2020-07-06 18:11:52 +03:00
|
|
|
ScopedSpinLock lock(s_mm_lock);
|
2021-02-08 17:45:40 +03:00
|
|
|
if (m_space)
|
2020-09-27 17:10:10 +03:00
|
|
|
cr3_map().remove(cr3());
|
2020-01-17 21:59:20 +03:00
|
|
|
}
|
2020-02-16 03:27:42 +03:00
|
|
|
|
|
|
|
}
|