Process Model
The process model defines how capOS represents isolated user programs, how they receive authority, how they enter and leave the scheduler, and how a parent can observe a child.
Status: Partially implemented. Processes, isolated address spaces, ELF loading, fixed bootstrap ABI, exit cleanup, process handles, init-driven child spawning, and default init-side manifest graph execution are implemented. Restart policy, kill, and generic post-spawn grants remain open.
Current Behavior
A Process owns a user address space, a per-process capability table, a ring
scratch area, a kernel stack, a saved CPU context, a mapped capability ring, and
an optional read-only CapSet page. Process IDs are assigned by an atomic counter.
ELF images are loaded into fresh user address spaces. PT_LOAD segments are
mapped with page permissions derived from ELF flags, the user stack is fixed at
0x60_0000 with a linker-enforced image limit below it, and PT_TLS data is
mapped into a per-process TLS area below the ring page. The process starts from
a synthetic CpuContext that returns to Ring 3 with iretq.
ProcessSpawner lets a holder spawn packaged boot binaries, grant selected
caps to the child, and receive a non-transferable ProcessHandle result cap.
ProcessHandle.wait either completes immediately for an already-exited child
or registers one waiter.
Design
Process construction separates image loading from capability-table assembly.
Default boot maps only init in the kernel and gives it a bootstrap CapSet.
Spawned children use the same image loading and Process creation helpers, but
their grants are supplied by the calling process through ProcessSpawner.
Init resolves service-sourced manifest imports against previously recorded
exports before asking ProcessSpawner to create each child.
Each process starts with three machine arguments:
RDI- fixed ring virtual address (RING_VADDR).RSI- process ID.RDX- fixed CapSet virtual address, or zero if no CapSet is mapped.
Exit releases authority before the Process storage is dropped. The scheduler
switches to the kernel page table before address-space teardown, cancels
endpoint state for the exiting pid, completes any pending process waiter, and
defers the final process drop until execution is on another kernel stack.
Future process lifecycle work should keep authority transfer explicit: parents should not gain ambient access to child internals, and child grants should come from named caps plus interface checks.
Invariants
- A process cannot access a resource unless its local
CapTableholds a cap. - Bootstrap CapSet metadata is immutable from userspace.
- A stale
CapIdgeneration must not name a reused cap-table slot. ProcessSpawnerraw grants require a copy-transferable cap or an endpoint owner cap; client-endpoint grants attenuate endpoint authority.ProcessSpawnerkernel-source grants are limited to fresh child-local address-space-bound caps; they cannot be badged or exported from init.ProcessHandlecaps are non-transferable.- At most one waiter may be registered on a
ProcessHandle. - Process exit releases cap-table authority before the kernel stack frame is freed.
Code Map
kernel/src/process.rs-Process, bootstrap CPU context, ring/CapSet mapping, exit capability cleanup.kernel/src/spawn.rs- ELF mapping, stack mapping, TLS mapping, process construction helpers.kernel/src/sched.rs- process table, process handles, wait completion, exit path.kernel/src/cap/process_spawner.rs-ProcessSpawnerCap,ProcessHandleCap, spawn grant validation, child-local kernel grants, child CapSet construction.capos-lib/src/cap_table.rs-CapIdgeneration and cap-table operations.capos-config/src/capset.rs- fixed CapSet page ABI.schema/capos.capnp-ProcessSpawner,ProcessHandle, andCapGrant.init/src/main.rs- BootPackage manifest validation, generic spawn loop, child waits, and hostile spawn checks.
Validation
make runvalidates init-owned default service startup,ProcessSpawner,ProcessHandle.wait, child grants, exit cleanup, and clean halt.make run-spawnvalidates the narrower ProcessSpawner graph for endpoint, IPC, VirtualMemory, FrameAllocator cleanup, and hostile spawn failures.cargo test-libcoversCapTablegeneration, stale-slot, and transfer primitives.cargo test-configcovers CapSet and manifest metadata used to build process grants.cargo build --features qemuverifies the kernel and QEMU-only paths compile.
Open Work
- Resolve shared endpoint-owner grant semantics before long-lived child services depend on endpoints that may outlive init.
- Add lifecycle operations such as kill and post-spawn grants only after their authority semantics are explicit.
- Implement restart policy outside the kernel-side static boot graph.