Merge branch 'vm/stack-growth/saleh' into vm/virtual-memory/saleh

# Conflicts:
#	src/userprog/exception.c
#	src/userprog/process.c
#	src/userprog/syscall.c
#	src/vm/frame.c
#	src/vm/page.c
#	src/vm/page.h
This commit is contained in:
sBubshait
2024-12-05 00:51:03 +00:00
3 changed files with 149 additions and 64 deletions

View File

@@ -145,6 +145,8 @@ struct thread
struct hash open_files; /* Hash Table of FD -> Struct File. */ struct hash open_files; /* Hash Table of FD -> Struct File. */
#endif #endif
void *curr_esp;
/* Owned by thread.c. */ /* Owned by thread.c. */
unsigned magic; /* Detects stack overflow. */ unsigned magic; /* Detects stack overflow. */
}; };

View File

@@ -3,16 +3,24 @@
#include <stdio.h> #include <stdio.h>
#include "userprog/gdt.h" #include "userprog/gdt.h"
#include "userprog/pagedir.h" #include "userprog/pagedir.h"
#include "userprog/process.h"
#include "threads/interrupt.h" #include "threads/interrupt.h"
#include "threads/palloc.h"
#include "threads/thread.h" #include "threads/thread.h"
#include "threads/vaddr.h" #include "threads/vaddr.h"
#include "vm/page.h" #include "vm/page.h"
#define MAX_STACK_SIZE (8 * 1024 * 1024) // 8MB
#define MAX_STACK_OFFSET 32 // 32 bytes offset below stack pointer (ESP)
/* Number of page faults processed. */ /* Number of page faults processed. */
static long long page_fault_cnt; static long long page_fault_cnt;
static void kill (struct intr_frame *); static void kill (struct intr_frame *);
static void page_fault (struct intr_frame *); static void page_fault (struct intr_frame *);
static bool is_valid_stack_access (const void *fault_addr, const void *esp);
static bool grow_stack (void *upage);
bool try_fetch_page (void *upage, bool write); bool try_fetch_page (void *upage, bool write);
/* Registers handlers for interrupts that can be caused by user /* Registers handlers for interrupts that can be caused by user
@@ -149,20 +157,26 @@ page_fault (struct intr_frame *f)
write = (f->error_code & PF_W) != 0; write = (f->error_code & PF_W) != 0;
user = (f->error_code & PF_U) != 0; user = (f->error_code & PF_U) != 0;
if (!user) if (!user || !not_present)
{ {
f->eip = (void *)f->eax; f->eip = (void *)f->eax;
f->eax = 0xffffffff; f->eax = 0xffffffff;
return; return;
} }
/* If the fault address is in a user page that is not present, then it might /* If the fault address is in a user page that is not present, then it might
just need to be lazily loaded. So, we check our SPT to see if the page be just that the stack needs to grow or that it needs to be lazily loaded.
So we attempt to grow the stack. If this does not work, we check our SPT to see if the page
is expected to have data loaded in memory. */ is expected to have data loaded in memory. */
void *upage = pg_round_down (fault_addr); void *upage = pg_round_down (fault_addr);
if (not_present && is_user_vaddr (upage) && upage != NULL) if (not_present && is_user_vaddr (upage) && upage != NULL)
{ {
if (is_valid_stack_access (fault_addr, f->esp))
{
if (grow_stack (upage))
return;
}
if (try_fetch_page (upage, write)) if (try_fetch_page (upage, write))
return; return;
} }
@@ -178,6 +192,54 @@ page_fault (struct intr_frame *f)
kill (f); kill (f);
} }
/* Validates whether the fault address is a valid stack access. Access is a
valid stack access under the following two conditions:
1. The fault address must be within MAX_STACK_OFFSET (32) bytes below
the current stack pointer. (Accounts for both PUSH and PUSHA instructions)
2. Growing this stack to this address does not cause it to exceed the
MAX_STACK_SIZE (8MB) limit.
Returns true if both conditions are met, false otherwise.
Pre: fault_addr is a valid user virtual address (so also not NULL). */
static bool
is_valid_stack_access (const void *fault_addr, const void *esp)
{
uint32_t new_stack_size = PHYS_BASE - pg_round_down (fault_addr);
uint32_t *lowest_valid_push_addr = (uint32_t *)esp - MAX_STACK_OFFSET;
bool is_within_push_range = (uint32_t *)fault_addr >= lowest_valid_push_addr;
return is_within_push_range && new_stack_size <= MAX_STACK_SIZE;
}
/* Attempts to grow the stack by allocating and mapping a new page.
This involves:
1. Allocating a zeroed page from the user pool
2. Installing it into the page table with write permissions
Returns true if the stack was successfully grown, false if either
allocation or installation fails.
Pre: upage is a valid page-aligned address (so also not NULL). */
static bool
grow_stack (void *upage)
{
/* Allocate new page for stack */
void *kpage = palloc_get_page (PAL_USER | PAL_ZERO);
if (kpage == NULL)
return false;
/* Install the page into user page table */
if (!install_page (upage, kpage, true))
{
palloc_free_page (kpage);
return false;
}
return true;
}
bool bool
try_fetch_page (void *upage, bool write) try_fetch_page (void *upage, bool write)
{ {

View File

@@ -1,5 +1,4 @@
#include "userprog/syscall.h" #include "userprog/syscall.h"
#include "userprog/exception.h"
#include "devices/shutdown.h" #include "devices/shutdown.h"
#include "devices/input.h" #include "devices/input.h"
#include "filesys/file.h" #include "filesys/file.h"
@@ -12,6 +11,7 @@
#include "userprog/process.h" #include "userprog/process.h"
#include "userprog/pagedir.h" #include "userprog/pagedir.h"
#include <stdio.h> #include <stdio.h>
#include <stdbool.h>
#include <syscall-nr.h> #include <syscall-nr.h>
#define MAX_SYSCALL_ARGS 3 #define MAX_SYSCALL_ARGS 3
@@ -47,8 +47,11 @@ static unsigned syscall_tell (int fd);
static void syscall_close (int fd); static void syscall_close (int fd);
static struct open_file *fd_get_file (int fd); static struct open_file *fd_get_file (int fd);
static void validate_user_pointer (const void *start, size_t size, bool write); static void validate_user_pointer (const void *ptr, size_t size,
static void validate_user_string (const char *str); bool check_write);
static void validate_user_string (const char *str, bool check_write);
static int get_user (const uint8_t *);
static bool put_user (uint8_t *, uint8_t);
/* A struct defining a syscall_function pointer along with its arity. */ /* A struct defining a syscall_function pointer along with its arity. */
struct syscall_arguments struct syscall_arguments
@@ -99,6 +102,7 @@ syscall_handler (struct intr_frame *f)
/* First, read the system call number from the stack. */ /* First, read the system call number from the stack. */
validate_user_pointer (f->esp, sizeof (uintptr_t), false); validate_user_pointer (f->esp, sizeof (uintptr_t), false);
uintptr_t syscall_number = *(int *)f->esp; uintptr_t syscall_number = *(int *)f->esp;
thread_current ()->curr_esp = f->esp;
/* Ensures the number corresponds to a system call that can be handled. */ /* Ensures the number corresponds to a system call that can be handled. */
if (syscall_number >= LOOKUP_SIZE) if (syscall_number >= LOOKUP_SIZE)
@@ -109,7 +113,6 @@ syscall_handler (struct intr_frame *f)
/* Next, read and copy the arguments from the stack pointer. */ /* Next, read and copy the arguments from the stack pointer. */
validate_user_pointer (f->esp + sizeof (uintptr_t), validate_user_pointer (f->esp + sizeof (uintptr_t),
syscall.arity * sizeof (uintptr_t), false); syscall.arity * sizeof (uintptr_t), false);
uintptr_t args[MAX_SYSCALL_ARGS] = { 0 }; uintptr_t args[MAX_SYSCALL_ARGS] = { 0 };
for (int i = 0; i < syscall.arity && i < MAX_SYSCALL_ARGS; i++) for (int i = 0; i < syscall.arity && i < MAX_SYSCALL_ARGS; i++)
args[i] = *(uintptr_t *)(f->esp + sizeof (uintptr_t) * (i + 1)); args[i] = *(uintptr_t *)(f->esp + sizeof (uintptr_t) * (i + 1));
@@ -141,8 +144,7 @@ syscall_exit (int status)
static pid_t static pid_t
syscall_exec (const char *cmd_line) syscall_exec (const char *cmd_line)
{ {
/* Validate the user string before executing the process. */ validate_user_string (cmd_line, false);
validate_user_string (cmd_line);
return process_execute (cmd_line); /* Returns the PID of the new process */ return process_execute (cmd_line); /* Returns the PID of the new process */
} }
@@ -161,8 +163,7 @@ syscall_wait (pid_t pid)
static bool static bool
syscall_create (const char *file, unsigned initial_size) syscall_create (const char *file, unsigned initial_size)
{ {
/* Validate the user string before creating the file. */ validate_user_string (file, false);
validate_user_string (file);
/* Acquire the file system lock to prevent race conditions. */ /* Acquire the file system lock to prevent race conditions. */
lock_acquire (&filesys_lock); lock_acquire (&filesys_lock);
@@ -179,8 +180,7 @@ syscall_create (const char *file, unsigned initial_size)
static bool static bool
syscall_remove (const char *file) syscall_remove (const char *file)
{ {
/* Validate the user string before removing the file. */ validate_user_string (file, false);
validate_user_string (file);
/* Acquire the file system lock to prevent race conditions. */ /* Acquire the file system lock to prevent race conditions. */
lock_acquire (&filesys_lock); lock_acquire (&filesys_lock);
@@ -198,8 +198,7 @@ syscall_remove (const char *file)
static int static int
syscall_open (const char *file) syscall_open (const char *file)
{ {
/* Validate the user string before opening the file. */ validate_user_string (file, false);
validate_user_string (file);
/* Acquire the file system lock to prevent race conditions. */ /* Acquire the file system lock to prevent race conditions. */
lock_acquire (&filesys_lock); lock_acquire (&filesys_lock);
@@ -265,7 +264,6 @@ syscall_read (int fd, void *buffer, unsigned size)
if (fd < STDIN_FILENO || fd == STDOUT_FILENO) if (fd < STDIN_FILENO || fd == STDOUT_FILENO)
return EXIT_FAILURE; return EXIT_FAILURE;
/* Validate the user buffer for the provided size before reading. */
validate_user_pointer (buffer, size, true); validate_user_pointer (buffer, size, true);
if (fd == STDIN_FILENO) if (fd == STDIN_FILENO)
@@ -309,7 +307,6 @@ syscall_write (int fd, const void *buffer, unsigned size)
if (fd <= 0) if (fd <= 0)
return 0; return 0;
/* Validate the user buffer for the provided size before writing. */
validate_user_pointer (buffer, size, false); validate_user_pointer (buffer, size, false);
if (fd == STDOUT_FILENO) if (fd == STDOUT_FILENO)
@@ -452,67 +449,91 @@ fd_get_file (int fd)
return hash_entry (e, struct open_file, elem); return hash_entry (e, struct open_file, elem);
} }
/* Validates if a block of memory starting at START and of size SIZE bytes is /* Validates if a block of memory starting at PTR and of size SIZE bytes is
fully contained within user virtual memory. Kills the thread (by exiting with fully contained within valid user virtual memory. thread_exit () if the
failure) if the memory is invalid. Otherwise, returns (nothing) normally. memory is invalid.
If the size is 0, the function does no checks and returns the given ptr. */ If the size is 0, the function does no checks and returns PTR. */
static void static void
validate_user_pointer (const void *start, size_t size, bool write) validate_user_pointer (const void *ptr, size_t size, bool check_write)
{ {
/* If the size is 0, we do not need to check anything. */
if (size == 0) if (size == 0)
return; return;
/* ptr < ptr + size - 1, so sufficient to check that (ptr + size -1) is a
const void *end = start + size - 1; valid user virtual memory address. */
void *last = ptr + size - 1;
/* Check if the start and end pointers are valid user virtual addresses. */ if (!is_user_vaddr (last))
if (start == NULL || !is_user_vaddr (start) || !is_user_vaddr (end))
syscall_exit (EXIT_FAILURE); syscall_exit (EXIT_FAILURE);
ptr = pg_round_down (ptr);
/* We no longer check if the memory is mapped to physical memory. This is while (ptr <= last)
because the data may not necessarily be there at the time of the syscall, {
but it may be lazily loaded later. In such case, we try to preload the int result;
page. If that fails, we exit the thread. */ /* Check read access to pointer. */
for (void *ptr = pg_round_down (start); ptr <= end; ptr += PGSIZE) if ((result = get_user (ptr)) == -1)
if (pagedir_get_page (thread_current ()->pagedir, ptr) == NULL &&
!try_fetch_page (ptr, write))
syscall_exit (EXIT_FAILURE); syscall_exit (EXIT_FAILURE);
/* Check write access to pointer (if required). */
if (check_write && !put_user (ptr, result))
syscall_exit (EXIT_FAILURE);
ptr += PGSIZE;
}
} }
/* Validates if a string is fully contained within user virtual memory. Kills /* Validates of a C-string starting at ptr is fully contained within valid
the thread (by exiting with failure) if the memory is invalid. Otherwise, user virtual memory. thread_exit () if the memory is invalid. */
returns (nothing) normally. */
static void static void
validate_user_string (const char *str) validate_user_string (const char *ptr, bool check_write)
{ {
/* Check if the string pointer is a valid user virtual address. */ size_t offset = (uintptr_t) ptr % PGSIZE;
if (str == NULL || !is_user_vaddr (str))
syscall_exit (EXIT_FAILURE);
/* Calculate the offset of the string within the (first) page. */
size_t offset = (uintptr_t) str % PGSIZE;
/* We move page by page, checking if the page is mapped to physical memory. */
for (;;) for (;;)
{ {
void *page = pg_round_down (str); void *page = pg_round_down (ptr);
/* If we reach addresses that are not mapped to physical memory before the if (!is_user_vaddr (page))
end of the string, the thread is terminated. */ syscall_exit (EXIT_FAILURE);
if (!is_user_vaddr(page) || if (!is_user_vaddr (ptr))
(pagedir_get_page (thread_current ()->pagedir, page) == NULL && syscall_exit (EXIT_FAILURE);
!try_fetch_page (page, false))) int result;
if ((result = get_user ((const uint8_t *)ptr)) == -1)
syscall_exit (EXIT_FAILURE);
if (check_write && !put_user ((uint8_t *)ptr, result))
syscall_exit (EXIT_FAILURE); syscall_exit (EXIT_FAILURE);
while (offset < PGSIZE) while (offset < PGSIZE)
{ {
if (*str == '\0') if (*ptr == '\0')
return; /* We reached the end of the string without issues. */ return; /* We reached the end of the string without issues. */
str++; ptr++;
offset++; offset++;
} }
offset = 0; /* Next page will start at the beginning. */ offset = 0;
} }
} }
/* PROVIDED BY SPEC.
Reads a byte at user virtual address UADDR.
UADDR must be below PHYS_BASE.
Returns the byte value if successful, -1 if a segfault occurred. */
static int
get_user (const uint8_t *uaddr)
{
int result;
asm ("movl $1f, %0; movzbl %1, %0; 1:" : "=&a"(result) : "m"(*uaddr));
return result;
}
/* PROVIDED BY SPEC.
Writes BYTE to user address UDST.
UDST must be below PHYS_BASE.
Returns true if successful, false if a segfault occurred. */
static bool
put_user (uint8_t *udst, uint8_t byte)
{
int error_code;
asm ("movl $1f, %0; movb %b2, %1; 1:"
: "=&a"(error_code), "=m"(*udst)
: "q"(byte));
return error_code != -1;
}