Rewrite of boot process
KERNEL CHANGES: - The kernel only knows about privileges of kernel tasks and the root system process (now RS). - Kernel tasks and the root system process are the only processes that are made schedulable by the kernel at startup. All the other processes in the boot image don't get their privileges set at startup and are inhibited from running by the RTS_NO_PRIV flag. - Removed the assumption on the ordering of processes in the boot image table. System processes can now appear in any order in the boot image table. - Privilege ids can now be assigned both statically or dynamically. The kernel assigns static privilege ids to kernel tasks and the root system process. Each id is directly derived from the process number. - User processes now all share the static privilege id of the root user process (now INIT). - sys_privctl split: we have more calls now to let RS set privileges for system processes. SYS_PRIV_ALLOW / SYS_PRIV_DISALLOW are only used to flip the RTS_NO_PRIV flag and allow / disallow a process from running. SYS_PRIV_SET_SYS / SYS_PRIV_SET_USER are used to set privileges for a system / user process. - boot image table flags split: PROC_FULLVM is the only flag that has been moved out of the privilege flags and is still maintained in the boot image table. All the other privilege flags are out of the kernel now. RS CHANGES: - RS is the only user-space process who gets to run right after in-kernel startup. - RS uses the boot image table from the kernel and three additional boot image info table (priv table, sys table, dev table) to complete the initialization of the system. - RS checks that the entries in the priv table match the entries in the boot image table to make sure that every process in the boot image gets schedulable. - RS only uses static privilege ids to set privileges for system services in the boot image. - RS includes basic memory management support to allocate the boot image buffer dynamically during initialization. The buffer shall contain the executable image of all the system services we would like to restart after a crash. - First step towards decoupling between resource provisioning and resource requirements in RS: RS must know what resources it needs to restart a process and what resources it has currently available. This is useful to tradeoff reliability and resource consumption. When required resources are missing, the process cannot be restarted. In that case, in the future, a system flag will tell RS what to do. For example, if CORE_PROC is set, RS should trigger a system-wide panic because the system can no longer function correctly without a core system process. PM CHANGES: - The process tree built at initialization time is changed to have INIT as root with pid 0, RS child of INIT and all the system services children of RS. This is required to make RS in control of all the system services. - PM no longer registers labels for system services in the boot image. This is now part of RS's initialization process.
This commit is contained in:
@@ -22,6 +22,7 @@
|
||||
* clear_endpoint: remove a process' ability to send and receive messages
|
||||
*
|
||||
* Changes:
|
||||
* Nov 22, 2009 get_priv supports static priv ids (Cristiano Giuffrida)
|
||||
* Aug 04, 2005 check if system call is allowed (Jorrit N. Herder)
|
||||
* Jul 20, 2005 send signal to services with message (Jorrit N. Herder)
|
||||
* Jan 15, 2005 new, generalized virtual copy function (Jorrit N. Herder)
|
||||
@@ -238,32 +239,36 @@ PRIVATE void initialize(void)
|
||||
/*===========================================================================*
|
||||
* get_priv *
|
||||
*===========================================================================*/
|
||||
PUBLIC int get_priv(rc, proc_type)
|
||||
PUBLIC int get_priv(rc, priv_id)
|
||||
register struct proc *rc; /* new (child) process pointer */
|
||||
int proc_type; /* system or user process flag */
|
||||
int priv_id; /* privilege id */
|
||||
{
|
||||
/* Get a privilege structure. All user processes share the same privilege
|
||||
* structure. System processes get their own privilege structure.
|
||||
/* Allocate a new privilege structure for a system process. Privilege ids
|
||||
* can be assigned either statically or dynamically.
|
||||
*/
|
||||
register struct priv *sp; /* privilege structure */
|
||||
register struct priv *sp; /* privilege structure */
|
||||
|
||||
if (proc_type == SYS_PROC) { /* find a new slot */
|
||||
for (sp = BEG_PRIV_ADDR; sp < END_PRIV_ADDR; ++sp)
|
||||
if (sp->s_proc_nr == NONE && sp->s_id != USER_PRIV_ID) break;
|
||||
if (sp >= END_PRIV_ADDR) return(ENOSPC);
|
||||
rc->p_priv = sp; /* assign new slot */
|
||||
rc->p_priv->s_proc_nr = proc_nr(rc); /* set association */
|
||||
rc->p_priv->s_flags = SYS_PROC; /* mark as privileged */
|
||||
|
||||
/* Clear some fields */
|
||||
sp->s_asyntab= -1;
|
||||
sp->s_asynsize= 0;
|
||||
} else {
|
||||
rc->p_priv = &priv[USER_PRIV_ID]; /* use shared slot */
|
||||
rc->p_priv->s_proc_nr = INIT_PROC_NR; /* set association */
|
||||
|
||||
/* s_flags of this shared structure are to be once at system startup. */
|
||||
if(priv_id == NULL_PRIV_ID) { /* allocate slot dynamically */
|
||||
for (sp = BEG_DYN_PRIV_ADDR; sp < END_DYN_PRIV_ADDR; ++sp)
|
||||
if (sp->s_proc_nr == NONE) break;
|
||||
if (sp >= END_DYN_PRIV_ADDR) return(ENOSPC);
|
||||
}
|
||||
else { /* allocate slot from id */
|
||||
if(!is_static_priv_id(priv_id)) {
|
||||
return EINVAL; /* invalid static priv id */
|
||||
}
|
||||
if(priv[priv_id].s_proc_nr != NONE) {
|
||||
return EBUSY; /* slot already in use */
|
||||
}
|
||||
sp = &priv[priv_id];
|
||||
}
|
||||
rc->p_priv = sp; /* assign new slot */
|
||||
rc->p_priv->s_proc_nr = proc_nr(rc); /* set association */
|
||||
|
||||
/* Clear some fields */
|
||||
sp->s_asyntab= -1;
|
||||
sp->s_asynsize= 0;
|
||||
|
||||
return(OK);
|
||||
}
|
||||
|
||||
@@ -275,22 +280,24 @@ PUBLIC void set_sendto_bit(struct proc *rp, int id)
|
||||
/* Allow a process to send messages to the process(es) associated with the
|
||||
* system privilege structure with the given ID.
|
||||
*/
|
||||
struct proc *rrp; /* receiver process */
|
||||
|
||||
/* Disallow the process from sending to a system privilege structure with no
|
||||
/* Disallow the process from sending to a process privilege structure with no
|
||||
* associated process, and disallow the process from sending to itself.
|
||||
*/
|
||||
if (id_to_nr(id) == NONE || priv_id(rp) == id)
|
||||
if (id_to_nr(id) == NONE || priv_id(rp) == id) {
|
||||
unset_sys_bit(priv(rp)->s_ipc_to, id);
|
||||
return;
|
||||
}
|
||||
|
||||
set_sys_bit(priv(rp)->s_ipc_to, id);
|
||||
|
||||
/* The process that this process can now send to, must be able to reply.
|
||||
* Therefore, its send mask should be updated as well.
|
||||
/* The process that this process can now send to, must be able to reply (or
|
||||
* vice versa). Therefore, its send mask should be updated as well. Ignore
|
||||
* receivers that don't support traps other than RECEIVE, they can't reply
|
||||
* or send messages anyway.
|
||||
*/
|
||||
rrp = proc_addr(id_to_nr(id));
|
||||
if (!iskernelp(rrp))
|
||||
set_sys_bit(priv(rrp)->s_ipc_to, priv_id(rp));
|
||||
if (priv_addr(id)->s_trap_mask & ~((1 << RECEIVE)))
|
||||
set_sys_bit(priv_addr(id)->s_ipc_to, priv_id(rp));
|
||||
}
|
||||
|
||||
/*===========================================================================*
|
||||
|
||||
Reference in New Issue
Block a user