yuzu/src/core/hle/kernel/k_process.h

545 lines
17 KiB
C++
Raw Normal View History

chore: make yuzu REUSE compliant [REUSE] is a specification that aims at making file copyright information consistent, so that it can be both human and machine readable. It basically requires that all files have a header containing copyright and licensing information. When this isn't possible, like when dealing with binary assets, generated files or embedded third-party dependencies, it is permitted to insert copyright information in the `.reuse/dep5` file. Oh, and it also requires that all the licenses used in the project are present in the `LICENSES` folder, that's why the diff is so huge. This can be done automatically with `reuse download --all`. The `reuse` tool also contains a handy subcommand that analyzes the project and tells whether or not the project is (still) compliant, `reuse lint`. Following REUSE has a few advantages over the current approach: - Copyright information is easy to access for users / downstream - Files like `dist/license.md` do not need to exist anymore, as `.reuse/dep5` is used instead - `reuse lint` makes it easy to ensure that copyright information of files like binary assets / images is always accurate and up to date To add copyright information of files that didn't have it I looked up who committed what and when, for each file. As yuzu contributors do not have to sign a CLA or similar I couldn't assume that copyright ownership was of the "yuzu Emulator Project", so I used the name and/or email of the commit author instead. [REUSE]: https://reuse.software Follow-up to 01cf05bc75b1e47beb08937439f3ed9339e7b254
2022-05-15 02:06:02 +02:00
// SPDX-FileCopyrightText: 2015 Citra Emulator Project
// SPDX-License-Identifier: GPL-2.0-or-later
#pragma once
#include <array>
2015-06-21 16:44:11 +02:00
#include <cstddef>
#include <list>
#include <map>
2015-06-21 16:44:11 +02:00
#include <string>
#include "common/common_types.h"
#include "core/hle/kernel/k_address_arbiter.h"
#include "core/hle/kernel/k_auto_object.h"
#include "core/hle/kernel/k_condition_variable.h"
2021-04-24 11:40:31 +02:00
#include "core/hle/kernel/k_handle_table.h"
#include "core/hle/kernel/k_page_table.h"
#include "core/hle/kernel/k_synchronization_object.h"
#include "core/hle/kernel/k_thread_local_page.h"
#include "core/hle/kernel/k_worker_task.h"
#include "core/hle/kernel/process_capability.h"
#include "core/hle/kernel/slab_helpers.h"
#include "core/hle/result.h"
namespace Core {
class System;
}
namespace FileSys {
class ProgramMetadata;
}
namespace Kernel {
class KernelCore;
class KResourceLimit;
class KThread;
2021-09-25 17:01:53 +02:00
class KSharedMemoryInfo;
class TLSPage;
struct CodeSet;
enum class MemoryRegion : u16 {
APPLICATION = 1,
SYSTEM = 2,
BASE = 3,
};
2022-06-14 00:36:30 +02:00
enum class ProcessActivity : u32 {
Runnable,
Paused,
};
enum class DebugWatchpointType : u8 {
None = 0,
Read = 1 << 0,
Write = 1 << 1,
ReadOrWrite = Read | Write,
};
DECLARE_ENUM_FLAG_OPERATORS(DebugWatchpointType);
struct DebugWatchpoint {
VAddr start_address;
VAddr end_address;
DebugWatchpointType type;
};
class KProcess final : public KAutoObjectWithSlabHeapAndContainer<KProcess, KWorkerTask> {
KERNEL_AUTOOBJECT_TRAITS(KProcess, KSynchronizationObject);
public:
2023-03-07 16:49:41 +01:00
explicit KProcess(KernelCore& kernel);
~KProcess() override;
enum class State {
Created = static_cast<u32>(Svc::ProcessState::Created),
CreatedAttached = static_cast<u32>(Svc::ProcessState::CreatedAttached),
Running = static_cast<u32>(Svc::ProcessState::Running),
Crashed = static_cast<u32>(Svc::ProcessState::Crashed),
RunningAttached = static_cast<u32>(Svc::ProcessState::RunningAttached),
Terminating = static_cast<u32>(Svc::ProcessState::Terminating),
Terminated = static_cast<u32>(Svc::ProcessState::Terminated),
DebugBreak = static_cast<u32>(Svc::ProcessState::DebugBreak),
};
enum : u64 {
/// Lowest allowed process ID for a kernel initial process.
InitialKIPIDMin = 1,
/// Highest allowed process ID for a kernel initial process.
InitialKIPIDMax = 80,
/// Lowest allowed process ID for a userland process.
ProcessIDMin = 81,
/// Highest allowed process ID for a userland process.
ProcessIDMax = 0xFFFFFFFFFFFFFFFF,
};
// Used to determine how process IDs are assigned.
enum class ProcessType {
KernelInternal,
Userland,
};
static constexpr std::size_t RANDOM_ENTROPY_SIZE = 4;
static Result Initialize(KProcess* process, Core::System& system, std::string process_name,
ProcessType type, KResourceLimit* res_limit);
2020-04-09 04:19:12 +02:00
/// Gets a reference to the process' page table.
KPageTable& PageTable() {
2023-03-07 22:45:13 +01:00
return m_page_table;
}
2020-04-09 04:19:12 +02:00
/// Gets const a reference to the process' page table.
const KPageTable& PageTable() const {
2023-03-07 22:45:13 +01:00
return m_page_table;
}
/// Gets a reference to the process' page table.
KPageTable& GetPageTable() {
return m_page_table;
}
/// Gets const a reference to the process' page table.
const KPageTable& GetPageTable() const {
return m_page_table;
}
/// Gets a reference to the process' handle table.
2021-04-24 11:40:31 +02:00
KHandleTable& GetHandleTable() {
2023-03-07 22:45:13 +01:00
return m_handle_table;
}
/// Gets a const reference to the process' handle table.
2021-04-24 11:40:31 +02:00
const KHandleTable& GetHandleTable() const {
2023-03-07 22:45:13 +01:00
return m_handle_table;
}
Result SignalToAddress(VAddr address) {
2023-03-07 22:45:13 +01:00
return m_condition_var.SignalToAddress(address);
}
Result WaitForAddress(Handle handle, VAddr address, u32 tag) {
2023-03-07 22:45:13 +01:00
return m_condition_var.WaitForAddress(handle, address, tag);
}
void SignalConditionVariable(u64 cv_key, int32_t count) {
2023-03-07 22:45:13 +01:00
return m_condition_var.Signal(cv_key, count);
}
Result WaitConditionVariable(VAddr address, u64 cv_key, u32 tag, s64 ns) {
2023-03-07 22:45:13 +01:00
R_RETURN(m_condition_var.Wait(address, cv_key, tag, ns));
}
Result SignalAddressArbiter(VAddr address, Svc::SignalType signal_type, s32 value, s32 count) {
2023-03-07 22:45:13 +01:00
R_RETURN(m_address_arbiter.SignalToAddress(address, signal_type, value, count));
}
Result WaitAddressArbiter(VAddr address, Svc::ArbitrationType arb_type, s32 value,
s64 timeout) {
2023-03-07 22:45:13 +01:00
R_RETURN(m_address_arbiter.WaitForAddress(address, arb_type, value, timeout));
}
VAddr GetProcessLocalRegionAddress() const {
2023-03-07 22:45:13 +01:00
return m_plr_address;
}
/// Gets the current status of the process
State GetState() const {
2023-03-07 22:45:13 +01:00
return m_state;
}
/// Gets the unique ID that identifies this particular process.
2023-03-07 22:45:13 +01:00
u64 GetProcessId() const {
return m_process_id;
}
/// Gets the program ID corresponding to this process.
2023-03-07 22:45:13 +01:00
u64 GetProgramId() const {
return m_program_id;
}
/// Gets the resource limit descriptor for this process
KResourceLimit* GetResourceLimit() const;
/// Gets the ideal CPU core ID for this process
u8 GetIdealCoreId() const {
2023-03-07 22:45:13 +01:00
return m_ideal_core;
}
/// Checks if the specified thread priority is valid.
bool CheckThreadPriority(s32 prio) const {
return ((1ULL << prio) & GetPriorityMask()) != 0;
}
/// Gets the bitmask of allowed cores that this process' threads can run on.
u64 GetCoreMask() const {
2023-03-07 22:45:13 +01:00
return m_capabilities.GetCoreMask();
}
/// Gets the bitmask of allowed thread priorities.
u64 GetPriorityMask() const {
2023-03-07 22:45:13 +01:00
return m_capabilities.GetPriorityMask();
}
/// Gets the amount of secure memory to allocate for memory management.
u32 GetSystemResourceSize() const {
2023-03-07 22:45:13 +01:00
return m_system_resource_size;
}
2019-07-07 20:48:11 +02:00
/// Gets the amount of secure memory currently in use for memory management.
u32 GetSystemResourceUsage() const {
// On hardware, this returns the amount of system resource memory that has
// been used by the kernel. This is problematic for Yuzu to emulate, because
// system resource memory is used for page tables -- and yuzu doesn't really
// have a way to calculate how much memory is required for page tables for
// the current process at any given time.
// TODO: Is this even worth implementing? Games may retrieve this value via
// an SDK function that gets used + available system resource size for debug
// or diagnostic purposes. However, it seems unlikely that a game would make
// decisions based on how much system memory is dedicated to its page tables.
// Is returning a value other than zero wise?
return 0;
}
/// Whether this process is an AArch64 or AArch32 process.
bool Is64BitProcess() const {
2023-03-07 22:45:13 +01:00
return m_is_64bit_process;
}
2023-03-07 22:45:13 +01:00
bool IsSuspended() const {
return m_is_suspended;
}
void SetSuspended(bool suspended) {
2023-03-07 22:45:13 +01:00
m_is_suspended = suspended;
}
/// Gets the total running time of the process instance in ticks.
u64 GetCPUTimeTicks() const {
2023-03-07 22:45:13 +01:00
return m_total_process_running_time_ticks;
}
/// Updates the total running time, adding the given ticks to it.
void UpdateCPUTimeTicks(u64 ticks) {
2023-03-07 22:45:13 +01:00
m_total_process_running_time_ticks += ticks;
}
2023-03-12 04:10:38 +01:00
/// Gets the process schedule count, used for thread yielding
s64 GetScheduledCount() const {
2023-03-07 22:45:13 +01:00
return m_schedule_count;
}
/// Increments the process schedule count, used for thread yielding.
void IncrementScheduledCount() {
2023-03-07 22:45:13 +01:00
++m_schedule_count;
}
void IncrementRunningThreadCount();
void DecrementRunningThreadCount();
void SetRunningThread(s32 core, KThread* thread, u64 idle_count) {
2023-03-07 22:45:13 +01:00
m_running_threads[core] = thread;
m_running_thread_idle_counts[core] = idle_count;
}
void ClearRunningThread(KThread* thread) {
2023-03-07 22:45:13 +01:00
for (size_t i = 0; i < m_running_threads.size(); ++i) {
if (m_running_threads[i] == thread) {
m_running_threads[i] = nullptr;
}
}
}
[[nodiscard]] KThread* GetRunningThread(s32 core) const {
2023-03-07 22:45:13 +01:00
return m_running_threads[core];
}
bool ReleaseUserException(KThread* thread);
[[nodiscard]] KThread* GetPinnedThread(s32 core_id) const {
ASSERT(0 <= core_id && core_id < static_cast<s32>(Core::Hardware::NUM_CPU_CORES));
2023-03-07 22:45:13 +01:00
return m_pinned_threads[core_id];
}
/// Gets 8 bytes of random data for svcGetInfo RandomEntropy
u64 GetRandomEntropy(std::size_t index) const {
2023-03-07 22:45:13 +01:00
return m_random_entropy.at(index);
}
/// Retrieves the total physical memory available to this process in bytes.
u64 GetTotalPhysicalMemoryAvailable();
/// Retrieves the total physical memory available to this process in bytes,
2019-07-07 20:48:11 +02:00
/// without the size of the personal system resource heap added to it.
u64 GetTotalPhysicalMemoryAvailableWithoutSystemResource();
/// Retrieves the total physical memory used by this process in bytes.
u64 GetTotalPhysicalMemoryUsed();
/// Retrieves the total physical memory used by this process in bytes,
2019-07-07 20:48:11 +02:00
/// without the size of the personal system resource heap added to it.
u64 GetTotalPhysicalMemoryUsedWithoutSystemResource();
/// Gets the list of all threads created with this process as their owner.
2022-06-14 00:36:30 +02:00
std::list<KThread*>& GetThreadList() {
2023-03-07 22:45:13 +01:00
return m_thread_list;
}
/// Registers a thread as being created under this process,
/// adding it to this process' thread list.
2022-06-14 00:36:30 +02:00
void RegisterThread(KThread* thread);
/// Unregisters a thread from this process, removing it
/// from this process' thread list.
2022-06-14 00:36:30 +02:00
void UnregisterThread(KThread* thread);
/// Retrieves the number of available threads for this process.
u64 GetFreeThreadCount() const;
/// Clears the signaled state of the process if and only if it's signaled.
///
/// @pre The process must not be already terminated. If this is called on a
2023-03-07 01:04:12 +01:00
/// terminated process, then ResultInvalidState will be returned.
///
/// @pre The process must be in a signaled state. If this is called on a
2023-03-07 01:04:12 +01:00
/// process instance that is not signaled, ResultInvalidState will be
/// returned.
Result Reset();
/**
* Loads process-specifics configuration info with metadata provided
* by an executable.
*
* @param metadata The provided metadata to load process specific info from.
*
* @returns ResultSuccess if all relevant metadata was able to be
* loaded and parsed. Otherwise, an error code is returned.
*/
Result LoadFromMetadata(const FileSys::ProgramMetadata& metadata, std::size_t code_size);
/**
* Starts the main application thread for this process.
*
* @param main_thread_priority The priority for the main thread.
* @param stack_size The stack size for the main thread in bytes.
*/
void Run(s32 main_thread_priority, u64 stack_size);
/**
* Prepares a process for termination by stopping all of its threads
* and clearing any other resources.
*/
void PrepareForTermination();
2020-04-09 04:19:12 +02:00
void LoadModule(CodeSet code_set, VAddr base_addr);
bool IsInitialized() const override {
2023-03-07 22:45:13 +01:00
return m_is_initialized;
}
2023-03-07 22:45:13 +01:00
static void PostDestroy(uintptr_t arg) {}
void Finalize() override;
u64 GetId() const override {
2023-03-07 22:45:13 +01:00
return GetProcessId();
}
bool IsSignaled() const override;
void DoWorkerTaskImpl();
Result SetActivity(ProcessActivity activity);
2022-06-14 00:36:30 +02:00
void PinCurrentThread(s32 core_id);
void UnpinCurrentThread(s32 core_id);
void UnpinThread(KThread* thread);
2021-01-25 07:54:37 +01:00
KLightLock& GetStateLock() {
2023-03-07 22:45:13 +01:00
return m_state_lock;
2021-01-25 07:54:37 +01:00
}
Result AddSharedMemory(KSharedMemory* shmem, VAddr address, size_t size);
void RemoveSharedMemory(KSharedMemory* shmem, VAddr address, size_t size);
///////////////////////////////////////////////////////////////////////////////////////////////
// Thread-local storage management
// Marks the next available region as used and returns the address of the slot.
[[nodiscard]] Result CreateThreadLocalRegion(VAddr* out);
// Frees a used TLS slot identified by the given address
Result DeleteThreadLocalRegion(VAddr addr);
///////////////////////////////////////////////////////////////////////////////////////////////
// Debug watchpoint management
// Attempts to insert a watchpoint into a free slot. Returns false if none are available.
bool InsertWatchpoint(Core::System& system, VAddr addr, u64 size, DebugWatchpointType type);
// Attempts to remove the watchpoint specified by the given parameters.
bool RemoveWatchpoint(Core::System& system, VAddr addr, u64 size, DebugWatchpointType type);
const std::array<DebugWatchpoint, Core::Hardware::NUM_WATCHPOINTS>& GetWatchpoints() const {
2023-03-07 22:45:13 +01:00
return m_watchpoints;
}
2023-03-07 02:34:25 +01:00
const std::string& GetName() {
return name;
}
private:
void PinThread(s32 core_id, KThread* thread) {
ASSERT(0 <= core_id && core_id < static_cast<s32>(Core::Hardware::NUM_CPU_CORES));
ASSERT(thread != nullptr);
2023-03-07 22:45:13 +01:00
ASSERT(m_pinned_threads[core_id] == nullptr);
m_pinned_threads[core_id] = thread;
}
void UnpinThread(s32 core_id, KThread* thread) {
ASSERT(0 <= core_id && core_id < static_cast<s32>(Core::Hardware::NUM_CPU_CORES));
ASSERT(thread != nullptr);
2023-03-07 22:45:13 +01:00
ASSERT(m_pinned_threads[core_id] == thread);
m_pinned_threads[core_id] = nullptr;
}
void FinalizeHandleTable() {
// Finalize the table.
2023-03-07 22:45:13 +01:00
m_handle_table.Finalize();
// Note that the table is finalized.
2023-03-07 22:45:13 +01:00
m_is_handle_table_initialized = false;
}
void ChangeState(State new_state);
/// Allocates the main thread stack for the process, given the stack size in bytes.
Result AllocateMainThreadStack(std::size_t stack_size);
2020-04-09 04:19:12 +02:00
/// Memory manager for this process
2023-03-07 22:45:13 +01:00
KPageTable m_page_table;
/// Current status of the process
2023-03-07 22:45:13 +01:00
State m_state{};
/// The ID of this process
2023-03-07 22:45:13 +01:00
u64 m_process_id = 0;
/// Title ID corresponding to the process
2023-03-07 22:45:13 +01:00
u64 m_program_id = 0;
/// Specifies additional memory to be reserved for the process's memory management by the
/// system. When this is non-zero, secure memory is allocated and used for page table allocation
/// instead of using the normal global page tables/memory block management.
2023-03-07 22:45:13 +01:00
u32 m_system_resource_size = 0;
/// Resource limit descriptor for this process
2023-03-07 22:45:13 +01:00
KResourceLimit* m_resource_limit{};
2023-03-07 22:45:13 +01:00
VAddr m_system_resource_address{};
/// The ideal CPU core for this process, threads are scheduled on this core by default.
2023-03-07 22:45:13 +01:00
u8 m_ideal_core = 0;
/// Contains the parsed process capability descriptors.
2023-03-07 22:45:13 +01:00
ProcessCapabilities m_capabilities;
/// Whether or not this process is AArch64, or AArch32.
/// By default, we currently assume this is true, unless otherwise
/// specified by metadata provided to the process during loading.
2023-03-07 22:45:13 +01:00
bool m_is_64bit_process = true;
/// Total running time for the process in ticks.
2023-03-07 22:45:13 +01:00
std::atomic<u64> m_total_process_running_time_ticks = 0;
/// Per-process handle table for storing created object handles in.
2023-03-07 22:45:13 +01:00
KHandleTable m_handle_table;
/// Per-process address arbiter.
2023-03-07 22:45:13 +01:00
KAddressArbiter m_address_arbiter;
/// The per-process mutex lock instance used for handling various
/// forms of services, such as lock arbitration, and condition
/// variable related facilities.
2023-03-07 22:45:13 +01:00
KConditionVariable m_condition_var;
/// Address indicating the location of the process' dedicated TLS region.
2023-03-07 22:45:13 +01:00
VAddr m_plr_address = 0;
/// Random values for svcGetInfo RandomEntropy
2023-03-07 22:45:13 +01:00
std::array<u64, RANDOM_ENTROPY_SIZE> m_random_entropy{};
/// List of threads that are running with this process as their owner.
2023-03-07 22:45:13 +01:00
std::list<KThread*> m_thread_list;
2021-09-25 17:01:53 +02:00
/// List of shared memory that are running with this process as their owner.
2023-03-07 22:45:13 +01:00
std::list<KSharedMemoryInfo*> m_shared_memory_list;
2021-09-25 17:01:53 +02:00
2020-04-09 04:19:12 +02:00
/// Address of the top of the main thread's stack
2023-03-07 22:45:13 +01:00
VAddr m_main_thread_stack_top{};
2020-04-09 04:19:12 +02:00
/// Size of the main thread's stack
2023-03-07 22:45:13 +01:00
std::size_t m_main_thread_stack_size{};
2020-04-09 04:19:12 +02:00
/// Memory usage capacity for the process
2023-03-07 22:45:13 +01:00
std::size_t m_memory_usage_capacity{};
2020-04-09 04:19:12 +02:00
/// Process total image size
2023-03-07 22:45:13 +01:00
std::size_t m_image_size{};
/// Schedule count of this process
2023-03-07 22:45:13 +01:00
s64 m_schedule_count{};
2023-03-07 22:45:13 +01:00
size_t m_memory_release_hint{};
2023-03-07 02:34:25 +01:00
std::string name{};
2023-03-07 22:45:13 +01:00
bool m_is_signaled{};
bool m_is_suspended{};
bool m_is_immortal{};
bool m_is_handle_table_initialized{};
bool m_is_initialized{};
2023-03-07 22:45:13 +01:00
std::atomic<u16> m_num_running_threads{};
2023-03-07 22:45:13 +01:00
std::array<KThread*, Core::Hardware::NUM_CPU_CORES> m_running_threads{};
std::array<u64, Core::Hardware::NUM_CPU_CORES> m_running_thread_idle_counts{};
std::array<KThread*, Core::Hardware::NUM_CPU_CORES> m_pinned_threads{};
std::array<DebugWatchpoint, Core::Hardware::NUM_WATCHPOINTS> m_watchpoints{};
std::map<VAddr, u64> m_debug_page_refcounts;
2023-03-07 22:45:13 +01:00
KThread* m_exception_thread{};
2023-03-07 22:45:13 +01:00
KLightLock m_state_lock;
KLightLock m_list_lock;
using TLPTree =
Common::IntrusiveRedBlackTreeBaseTraits<KThreadLocalPage>::TreeType<KThreadLocalPage>;
using TLPIterator = TLPTree::iterator;
2023-03-07 22:45:13 +01:00
TLPTree m_fully_used_tlp_tree;
TLPTree m_partially_used_tlp_tree;
};
2018-01-01 20:38:34 +01:00
} // namespace Kernel