Compare commits
No commits in common. "main" and "ch6" have entirely different histories.
154 changed files with 1385 additions and 7291 deletions
9
.github/workflows/doc-and-test.yml
vendored
9
.github/workflows/doc-and-test.yml
vendored
|
@ -4,7 +4,7 @@ on: [push]
|
||||||
|
|
||||||
env:
|
env:
|
||||||
CARGO_TERM_COLOR: always
|
CARGO_TERM_COLOR: always
|
||||||
rust_toolchain: nightly-2024-01-18
|
rust_toolchain: nightly-2025-02-18
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build-doc:
|
build-doc:
|
||||||
|
@ -49,7 +49,10 @@ jobs:
|
||||||
- name: Install QEMU
|
- name: Install QEMU
|
||||||
run: |
|
run: |
|
||||||
sudo apt-get update
|
sudo apt-get update
|
||||||
sudo apt-get install ninja-build -y
|
sudo apt-get install autoconf automake autotools-dev curl libmpc-dev libmpfr-dev libgmp-dev \
|
||||||
|
gawk build-essential bison flex texinfo gperf libtool patchutils bc \
|
||||||
|
zlib1g-dev libexpat-dev pkg-config libglib2.0-dev libpixman-1-dev libsdl2-dev libslirp-dev \
|
||||||
|
python3 python3-pip ninja-build -y
|
||||||
if [ ! -d qemu-7.0.0 ]; then
|
if [ ! -d qemu-7.0.0 ]; then
|
||||||
wget https://download.qemu.org/qemu-7.0.0.tar.xz
|
wget https://download.qemu.org/qemu-7.0.0.tar.xz
|
||||||
tar -xf qemu-7.0.0.tar.xz
|
tar -xf qemu-7.0.0.tar.xz
|
||||||
|
@ -65,4 +68,4 @@ jobs:
|
||||||
- name: Run usertests
|
- name: Run usertests
|
||||||
run: cd os && make run TEST=1
|
run: cd os && make run TEST=1
|
||||||
timeout-minutes: 10
|
timeout-minutes: 10
|
||||||
|
|
||||||
|
|
14
.gitignore
vendored
14
.gitignore
vendored
|
@ -3,14 +3,22 @@
|
||||||
!.vscode/settings.json
|
!.vscode/settings.json
|
||||||
!.devcontainer/devcontainer.json
|
!.devcontainer/devcontainer.json
|
||||||
|
|
||||||
**/target/
|
.idea
|
||||||
**/Cargo.lock
|
**/Cargo.lock
|
||||||
|
**/target/
|
||||||
|
|
||||||
os/src/link_app.S
|
os/src/link_app.S
|
||||||
os/src/linker.ld
|
os/src/linker.ld
|
||||||
os/last-*
|
os/last-*
|
||||||
|
os/Cargo.lock
|
||||||
os/.gdb_history
|
os/.gdb_history
|
||||||
os/virt.out
|
user/build
|
||||||
|
user/target/*
|
||||||
|
user/.idea/*
|
||||||
|
user/Cargo.lock
|
||||||
|
easy-fs/Cargo.lock
|
||||||
|
easy-fs/target/*
|
||||||
|
easy-fs-fuse/Cargo.lock
|
||||||
|
easy-fs-fuse/target/*
|
||||||
tools/
|
tools/
|
||||||
pushall.sh
|
pushall.sh
|
||||||
.vscode/*.log
|
|
||||||
|
|
|
@ -50,7 +50,7 @@ Here we manually compile and install Qemu 7.0.0. For example, on Ubuntu 18.04:
|
||||||
# install dependency packages
|
# install dependency packages
|
||||||
$ sudo apt install autoconf automake autotools-dev curl libmpc-dev libmpfr-dev libgmp-dev \
|
$ sudo apt install autoconf automake autotools-dev curl libmpc-dev libmpfr-dev libgmp-dev \
|
||||||
gawk build-essential bison flex texinfo gperf libtool patchutils bc \
|
gawk build-essential bison flex texinfo gperf libtool patchutils bc \
|
||||||
zlib1g-dev libexpat-dev pkg-config libglib2.0-dev libpixman-1-dev git tmux python3 python3-pip ninja-build
|
zlib1g-dev libexpat-dev pkg-config libglib2.0-dev libpixman-1-dev git tmux python3 python3-pip
|
||||||
# download Qemu source code
|
# download Qemu source code
|
||||||
$ wget https://download.qemu.org/qemu-7.0.0.tar.xz
|
$ wget https://download.qemu.org/qemu-7.0.0.tar.xz
|
||||||
# extract to qemu-7.0.0/
|
# extract to qemu-7.0.0/
|
||||||
|
@ -64,7 +64,9 @@ $ make -j$(nproc)
|
||||||
Then, add following contents to `~/.bashrc`(please adjust these paths according to your environment):
|
Then, add following contents to `~/.bashrc`(please adjust these paths according to your environment):
|
||||||
|
|
||||||
```
|
```
|
||||||
export PATH=$PATH:/path/to/qemu-7.0.0/build
|
export PATH=$PATH:/home/shinbokuow/Downloads/built/qemu-7.0.0
|
||||||
|
export PATH=$PATH:/home/shinbokuow/Downloads/built/qemu-7.0.0/riscv64-softmmu
|
||||||
|
export PATH=$PATH:/home/shinbokuow/Downloads/built/qemu-7.0.0/riscv64-linux-user
|
||||||
```
|
```
|
||||||
|
|
||||||
Finally, update the current shell:
|
Finally, update the current shell:
|
||||||
|
|
3
easy-fs-fuse/.gitignore
vendored
Normal file
3
easy-fs-fuse/.gitignore
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
.idea/
|
||||||
|
target/
|
||||||
|
Cargo.lock
|
|
@ -13,4 +13,4 @@ rand = "0.8.0"
|
||||||
|
|
||||||
# [features]
|
# [features]
|
||||||
# board_qemu = []
|
# board_qemu = []
|
||||||
# board_k210 = []
|
# board_k210 = []
|
|
@ -23,10 +23,6 @@ impl BlockDevice for BlockFile {
|
||||||
.expect("Error when seeking!");
|
.expect("Error when seeking!");
|
||||||
assert_eq!(file.write(buf).unwrap(), BLOCK_SZ, "Not a complete block!");
|
assert_eq!(file.write(buf).unwrap(), BLOCK_SZ, "Not a complete block!");
|
||||||
}
|
}
|
||||||
|
|
||||||
fn handle_irq(&self) {
|
|
||||||
unimplemented!();
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
fn main() {
|
fn main() {
|
||||||
|
@ -59,11 +55,11 @@ fn easy_fs_pack() -> std::io::Result<()> {
|
||||||
.write(true)
|
.write(true)
|
||||||
.create(true)
|
.create(true)
|
||||||
.open(format!("{}{}", target_path, "fs.img"))?;
|
.open(format!("{}{}", target_path, "fs.img"))?;
|
||||||
f.set_len(32 * 2048 * 512).unwrap();
|
f.set_len(16 * 2048 * 512).unwrap();
|
||||||
f
|
f
|
||||||
})));
|
})));
|
||||||
// 32MiB, at most 4095 files
|
// 16MiB, at most 4095 files
|
||||||
let efs = EasyFileSystem::create(block_file, 32 * 2048, 1);
|
let efs = EasyFileSystem::create(block_file, 16 * 2048, 1);
|
||||||
let root_inode = Arc::new(EasyFileSystem::root_inode(&efs));
|
let root_inode = Arc::new(EasyFileSystem::root_inode(&efs));
|
||||||
let apps: Vec<_> = read_dir(src_path)
|
let apps: Vec<_> = read_dir(src_path)
|
||||||
.unwrap()
|
.unwrap()
|
||||||
|
@ -153,3 +149,59 @@ fn efs_test() -> std::io::Result<()> {
|
||||||
|
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn mac_test() -> std::io::Result<()> {
|
||||||
|
const BLOCK_SZ: usize = 512;
|
||||||
|
|
||||||
|
let block_file = Arc::new(BlockFile(Mutex::new({
|
||||||
|
let f = OpenOptions::new()
|
||||||
|
.read(true)
|
||||||
|
.write(true)
|
||||||
|
.create(true)
|
||||||
|
.open("target/fs_mac.img")?;
|
||||||
|
f.set_len(8192 * BLOCK_SZ).unwrap();
|
||||||
|
f
|
||||||
|
})));
|
||||||
|
|
||||||
|
EasyFileSystem::create(block_file.clone(), 4096, 1);
|
||||||
|
let efs = EasyFileSystem::open(block_file.clone());
|
||||||
|
let root_inode = EasyFileSystem::root_inode(&efs);
|
||||||
|
|
||||||
|
root_inode.create("root_file");
|
||||||
|
root_inode.create("public_file");
|
||||||
|
|
||||||
|
let secret_inode = root_inode.find("root_file").unwrap();
|
||||||
|
secret_inode.write_at(0, b"TOP SECRET: root only!");
|
||||||
|
let public_inode = root_inode.find("public_file").unwrap();
|
||||||
|
public_inode.write_at(0, b"This file is public.");
|
||||||
|
|
||||||
|
let check_permission = |user: &str, filename: &str| -> bool {
|
||||||
|
if filename == "root_file" && user != "root" {
|
||||||
|
false
|
||||||
|
} else {
|
||||||
|
true
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let users = ["root", "nonroot"];
|
||||||
|
for user in users.iter() {
|
||||||
|
println!("{} task:", user);
|
||||||
|
|
||||||
|
for filename in ["root_file", "public_file"].iter() {
|
||||||
|
if check_permission(user, filename) {
|
||||||
|
let inode = root_inode.find(filename).unwrap();
|
||||||
|
let mut buf = [0u8; 128];
|
||||||
|
let len = inode.read_at(0, &mut buf);
|
||||||
|
let content = core::str::from_utf8(&buf[..len]).unwrap();
|
||||||
|
println!("{}: Opened successfully");
|
||||||
|
} else {
|
||||||
|
println!("{}: Permission denied");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
println!();
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
|
@ -1,16 +1,16 @@
|
||||||
use super::{get_block_cache, BlockDevice, BLOCK_SZ};
|
use super::{get_block_cache, BlockDevice, BLOCK_SZ};
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
|
/// A bitmap block
|
||||||
type BitmapBlock = [u64; 64];
|
type BitmapBlock = [u64; 64];
|
||||||
|
/// Number of bits in a block
|
||||||
const BLOCK_BITS: usize = BLOCK_SZ * 8;
|
const BLOCK_BITS: usize = BLOCK_SZ * 8;
|
||||||
|
/// A bitmap
|
||||||
pub struct Bitmap {
|
pub struct Bitmap {
|
||||||
start_block_id: usize,
|
start_block_id: usize,
|
||||||
blocks: usize,
|
blocks: usize,
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Return (block_pos, bits64_pos, inner_pos)
|
/// Decompose bits into (block_pos, bits64_pos, inner_pos)
|
||||||
fn decomposition(mut bit: usize) -> (usize, usize, usize) {
|
fn decomposition(mut bit: usize) -> (usize, usize, usize) {
|
||||||
let block_pos = bit / BLOCK_BITS;
|
let block_pos = bit / BLOCK_BITS;
|
||||||
bit %= BLOCK_BITS;
|
bit %= BLOCK_BITS;
|
||||||
|
@ -18,13 +18,14 @@ fn decomposition(mut bit: usize) -> (usize, usize, usize) {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Bitmap {
|
impl Bitmap {
|
||||||
|
/// A new bitmap from start block id and number of blocks
|
||||||
pub fn new(start_block_id: usize, blocks: usize) -> Self {
|
pub fn new(start_block_id: usize, blocks: usize) -> Self {
|
||||||
Self {
|
Self {
|
||||||
start_block_id,
|
start_block_id,
|
||||||
blocks,
|
blocks,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Allocate a new block from a block device
|
||||||
pub fn alloc(&self, block_device: &Arc<dyn BlockDevice>) -> Option<usize> {
|
pub fn alloc(&self, block_device: &Arc<dyn BlockDevice>) -> Option<usize> {
|
||||||
for block_id in 0..self.blocks {
|
for block_id in 0..self.blocks {
|
||||||
let pos = get_block_cache(
|
let pos = get_block_cache(
|
||||||
|
@ -52,7 +53,7 @@ impl Bitmap {
|
||||||
}
|
}
|
||||||
None
|
None
|
||||||
}
|
}
|
||||||
|
/// Deallocate a block
|
||||||
pub fn dealloc(&self, block_device: &Arc<dyn BlockDevice>, bit: usize) {
|
pub fn dealloc(&self, block_device: &Arc<dyn BlockDevice>, bit: usize) {
|
||||||
let (block_pos, bits64_pos, inner_pos) = decomposition(bit);
|
let (block_pos, bits64_pos, inner_pos) = decomposition(bit);
|
||||||
get_block_cache(block_pos + self.start_block_id, Arc::clone(block_device))
|
get_block_cache(block_pos + self.start_block_id, Arc::clone(block_device))
|
||||||
|
@ -62,7 +63,7 @@ impl Bitmap {
|
||||||
bitmap_block[bits64_pos] -= 1u64 << inner_pos;
|
bitmap_block[bits64_pos] -= 1u64 << inner_pos;
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
/// Get the max number of allocatable blocks
|
||||||
pub fn maximum(&self) -> usize {
|
pub fn maximum(&self) -> usize {
|
||||||
self.blocks * BLOCK_BITS
|
self.blocks * BLOCK_BITS
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,15 +1,61 @@
|
||||||
use super::{BlockDevice, BLOCK_SZ};
|
use super::{BlockDevice, BLOCK_SZ};
|
||||||
|
use alloc::boxed::Box;
|
||||||
use alloc::collections::VecDeque;
|
use alloc::collections::VecDeque;
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use alloc::vec;
|
use core::alloc::Layout;
|
||||||
use alloc::vec::Vec;
|
use core::mem::ManuallyDrop;
|
||||||
|
use core::ptr::{addr_of, addr_of_mut};
|
||||||
|
use core::slice;
|
||||||
use lazy_static::*;
|
use lazy_static::*;
|
||||||
use spin::Mutex;
|
use spin::Mutex;
|
||||||
|
|
||||||
|
/// Use `ManuallyDrop` to ensure data is deallocated with an alignment of `BLOCK_SZ`
|
||||||
|
struct CacheData(ManuallyDrop<Box<[u8; BLOCK_SZ]>>);
|
||||||
|
|
||||||
|
impl CacheData {
|
||||||
|
pub fn new() -> Self {
|
||||||
|
let data = unsafe {
|
||||||
|
let raw = alloc::alloc::alloc(Self::layout());
|
||||||
|
Box::from_raw(raw as *mut [u8; BLOCK_SZ])
|
||||||
|
};
|
||||||
|
Self(ManuallyDrop::new(data))
|
||||||
|
}
|
||||||
|
|
||||||
|
fn layout() -> Layout {
|
||||||
|
Layout::from_size_align(BLOCK_SZ, BLOCK_SZ).unwrap()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Drop for CacheData {
|
||||||
|
fn drop(&mut self) {
|
||||||
|
let ptr = self.0.as_mut_ptr();
|
||||||
|
unsafe { alloc::alloc::dealloc(ptr, Self::layout()) };
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AsRef<[u8]> for CacheData {
|
||||||
|
fn as_ref(&self) -> &[u8] {
|
||||||
|
let ptr = self.0.as_ptr() as *const u8;
|
||||||
|
unsafe { slice::from_raw_parts(ptr, BLOCK_SZ) }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AsMut<[u8]> for CacheData {
|
||||||
|
fn as_mut(&mut self) -> &mut [u8] {
|
||||||
|
let ptr = self.0.as_mut_ptr() as *mut u8;
|
||||||
|
unsafe { slice::from_raw_parts_mut(ptr, BLOCK_SZ) }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Cached block inside memory
|
||||||
pub struct BlockCache {
|
pub struct BlockCache {
|
||||||
cache: Vec<u8>,
|
/// cached block data
|
||||||
|
cache: CacheData,
|
||||||
|
/// underlying block id
|
||||||
block_id: usize,
|
block_id: usize,
|
||||||
|
/// underlying block device
|
||||||
block_device: Arc<dyn BlockDevice>,
|
block_device: Arc<dyn BlockDevice>,
|
||||||
|
/// whether the block is dirty
|
||||||
modified: bool,
|
modified: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -17,8 +63,8 @@ impl BlockCache {
|
||||||
/// Load a new BlockCache from disk.
|
/// Load a new BlockCache from disk.
|
||||||
pub fn new(block_id: usize, block_device: Arc<dyn BlockDevice>) -> Self {
|
pub fn new(block_id: usize, block_device: Arc<dyn BlockDevice>) -> Self {
|
||||||
// for alignment and move effciency
|
// for alignment and move effciency
|
||||||
let mut cache = vec![0u8; BLOCK_SZ];
|
let mut cache = CacheData::new();
|
||||||
block_device.read_block(block_id, &mut cache);
|
block_device.read_block(block_id, cache.as_mut());
|
||||||
Self {
|
Self {
|
||||||
cache,
|
cache,
|
||||||
block_id,
|
block_id,
|
||||||
|
@ -26,9 +72,13 @@ impl BlockCache {
|
||||||
modified: false,
|
modified: false,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Get the address of an offset inside the cached block data
|
||||||
|
fn addr_of_offset(&self, offset: usize) -> *const u8 {
|
||||||
|
addr_of!(self.cache.as_ref()[offset])
|
||||||
|
}
|
||||||
|
|
||||||
fn addr_of_offset(&self, offset: usize) -> usize {
|
fn addr_of_offset_mut(&mut self, offset: usize) -> *mut u8 {
|
||||||
&self.cache[offset] as *const _ as usize
|
addr_of_mut!(self.cache.as_mut()[offset])
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn get_ref<T>(&self, offset: usize) -> &T
|
pub fn get_ref<T>(&self, offset: usize) -> &T
|
||||||
|
@ -37,8 +87,8 @@ impl BlockCache {
|
||||||
{
|
{
|
||||||
let type_size = core::mem::size_of::<T>();
|
let type_size = core::mem::size_of::<T>();
|
||||||
assert!(offset + type_size <= BLOCK_SZ);
|
assert!(offset + type_size <= BLOCK_SZ);
|
||||||
let addr = self.addr_of_offset(offset);
|
let addr = self.addr_of_offset(offset) as *const T;
|
||||||
unsafe { &*(addr as *const T) }
|
unsafe { &*addr }
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn get_mut<T>(&mut self, offset: usize) -> &mut T
|
pub fn get_mut<T>(&mut self, offset: usize) -> &mut T
|
||||||
|
@ -48,8 +98,8 @@ impl BlockCache {
|
||||||
let type_size = core::mem::size_of::<T>();
|
let type_size = core::mem::size_of::<T>();
|
||||||
assert!(offset + type_size <= BLOCK_SZ);
|
assert!(offset + type_size <= BLOCK_SZ);
|
||||||
self.modified = true;
|
self.modified = true;
|
||||||
let addr = self.addr_of_offset(offset);
|
let addr = self.addr_of_offset_mut(offset) as *mut T;
|
||||||
unsafe { &mut *(addr as *mut T) }
|
unsafe { &mut *addr }
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn read<T, V>(&self, offset: usize, f: impl FnOnce(&T) -> V) -> V {
|
pub fn read<T, V>(&self, offset: usize, f: impl FnOnce(&T) -> V) -> V {
|
||||||
|
@ -63,7 +113,8 @@ impl BlockCache {
|
||||||
pub fn sync(&mut self) {
|
pub fn sync(&mut self) {
|
||||||
if self.modified {
|
if self.modified {
|
||||||
self.modified = false;
|
self.modified = false;
|
||||||
self.block_device.write_block(self.block_id, &self.cache);
|
self.block_device
|
||||||
|
.write_block(self.block_id, self.cache.as_ref());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -73,7 +124,7 @@ impl Drop for BlockCache {
|
||||||
self.sync()
|
self.sync()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Use a block cache of 16 blocks
|
||||||
const BLOCK_CACHE_SIZE: usize = 16;
|
const BLOCK_CACHE_SIZE: usize = 16;
|
||||||
|
|
||||||
pub struct BlockCacheManager {
|
pub struct BlockCacheManager {
|
||||||
|
@ -121,10 +172,11 @@ impl BlockCacheManager {
|
||||||
}
|
}
|
||||||
|
|
||||||
lazy_static! {
|
lazy_static! {
|
||||||
|
/// The global block cache manager
|
||||||
pub static ref BLOCK_CACHE_MANAGER: Mutex<BlockCacheManager> =
|
pub static ref BLOCK_CACHE_MANAGER: Mutex<BlockCacheManager> =
|
||||||
Mutex::new(BlockCacheManager::new());
|
Mutex::new(BlockCacheManager::new());
|
||||||
}
|
}
|
||||||
|
/// Get the block cache corresponding to the given block id and block device
|
||||||
pub fn get_block_cache(
|
pub fn get_block_cache(
|
||||||
block_id: usize,
|
block_id: usize,
|
||||||
block_device: Arc<dyn BlockDevice>,
|
block_device: Arc<dyn BlockDevice>,
|
||||||
|
@ -133,7 +185,7 @@ pub fn get_block_cache(
|
||||||
.lock()
|
.lock()
|
||||||
.get_block_cache(block_id, block_device)
|
.get_block_cache(block_id, block_device)
|
||||||
}
|
}
|
||||||
|
/// Sync all block cache to block device
|
||||||
pub fn block_cache_sync_all() {
|
pub fn block_cache_sync_all() {
|
||||||
let manager = BLOCK_CACHE_MANAGER.lock();
|
let manager = BLOCK_CACHE_MANAGER.lock();
|
||||||
for (_, cache) in manager.queue.iter() {
|
for (_, cache) in manager.queue.iter() {
|
||||||
|
|
|
@ -1,7 +1,9 @@
|
||||||
use core::any::Any;
|
use core::any::Any;
|
||||||
|
/// Trait for block devices
|
||||||
|
/// which reads and writes data in the unit of blocks
|
||||||
pub trait BlockDevice: Send + Sync + Any {
|
pub trait BlockDevice: Send + Sync + Any {
|
||||||
|
///Read data form block to buffer
|
||||||
fn read_block(&self, block_id: usize, buf: &mut [u8]);
|
fn read_block(&self, block_id: usize, buf: &mut [u8]);
|
||||||
|
///Write data from buffer to block
|
||||||
fn write_block(&self, block_id: usize, buf: &[u8]);
|
fn write_block(&self, block_id: usize, buf: &[u8]);
|
||||||
fn handle_irq(&self);
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,18 +5,22 @@ use super::{
|
||||||
use crate::BLOCK_SZ;
|
use crate::BLOCK_SZ;
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use spin::Mutex;
|
use spin::Mutex;
|
||||||
|
///An easy file system on block
|
||||||
pub struct EasyFileSystem {
|
pub struct EasyFileSystem {
|
||||||
|
///Real device
|
||||||
pub block_device: Arc<dyn BlockDevice>,
|
pub block_device: Arc<dyn BlockDevice>,
|
||||||
|
///Inode bitmap
|
||||||
pub inode_bitmap: Bitmap,
|
pub inode_bitmap: Bitmap,
|
||||||
|
///Data bitmap
|
||||||
pub data_bitmap: Bitmap,
|
pub data_bitmap: Bitmap,
|
||||||
inode_area_start_block: u32,
|
inode_area_start_block: u32,
|
||||||
data_area_start_block: u32,
|
data_area_start_block: u32,
|
||||||
}
|
}
|
||||||
|
|
||||||
type DataBlock = [u8; BLOCK_SZ];
|
type DataBlock = [u8; BLOCK_SZ];
|
||||||
|
/// An easy fs over a block device
|
||||||
impl EasyFileSystem {
|
impl EasyFileSystem {
|
||||||
|
/// A data block of block size
|
||||||
pub fn create(
|
pub fn create(
|
||||||
block_device: Arc<dyn BlockDevice>,
|
block_device: Arc<dyn BlockDevice>,
|
||||||
total_blocks: u32,
|
total_blocks: u32,
|
||||||
|
@ -32,7 +36,7 @@ impl EasyFileSystem {
|
||||||
let data_bitmap_blocks = (data_total_blocks + 4096) / 4097;
|
let data_bitmap_blocks = (data_total_blocks + 4096) / 4097;
|
||||||
let data_area_blocks = data_total_blocks - data_bitmap_blocks;
|
let data_area_blocks = data_total_blocks - data_bitmap_blocks;
|
||||||
let data_bitmap = Bitmap::new(
|
let data_bitmap = Bitmap::new(
|
||||||
(1 + inode_bitmap_blocks + inode_area_blocks) as usize,
|
(1 + inode_total_blocks) as usize,
|
||||||
data_bitmap_blocks as usize,
|
data_bitmap_blocks as usize,
|
||||||
);
|
);
|
||||||
let mut efs = Self {
|
let mut efs = Self {
|
||||||
|
@ -77,7 +81,7 @@ impl EasyFileSystem {
|
||||||
block_cache_sync_all();
|
block_cache_sync_all();
|
||||||
Arc::new(Mutex::new(efs))
|
Arc::new(Mutex::new(efs))
|
||||||
}
|
}
|
||||||
|
/// Open a block device as a filesystem
|
||||||
pub fn open(block_device: Arc<dyn BlockDevice>) -> Arc<Mutex<Self>> {
|
pub fn open(block_device: Arc<dyn BlockDevice>) -> Arc<Mutex<Self>> {
|
||||||
// read SuperBlock
|
// read SuperBlock
|
||||||
get_block_cache(0, Arc::clone(&block_device))
|
get_block_cache(0, Arc::clone(&block_device))
|
||||||
|
@ -99,7 +103,7 @@ impl EasyFileSystem {
|
||||||
Arc::new(Mutex::new(efs))
|
Arc::new(Mutex::new(efs))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
/// Get the root inode of the filesystem
|
||||||
pub fn root_inode(efs: &Arc<Mutex<Self>>) -> Inode {
|
pub fn root_inode(efs: &Arc<Mutex<Self>>) -> Inode {
|
||||||
let block_device = Arc::clone(&efs.lock().block_device);
|
let block_device = Arc::clone(&efs.lock().block_device);
|
||||||
// acquire efs lock temporarily
|
// acquire efs lock temporarily
|
||||||
|
@ -107,7 +111,7 @@ impl EasyFileSystem {
|
||||||
// release efs lock
|
// release efs lock
|
||||||
Inode::new(block_id, block_offset, Arc::clone(efs), block_device)
|
Inode::new(block_id, block_offset, Arc::clone(efs), block_device)
|
||||||
}
|
}
|
||||||
|
/// Get inode by id
|
||||||
pub fn get_disk_inode_pos(&self, inode_id: u32) -> (u32, usize) {
|
pub fn get_disk_inode_pos(&self, inode_id: u32) -> (u32, usize) {
|
||||||
let inode_size = core::mem::size_of::<DiskInode>();
|
let inode_size = core::mem::size_of::<DiskInode>();
|
||||||
let inodes_per_block = (BLOCK_SZ / inode_size) as u32;
|
let inodes_per_block = (BLOCK_SZ / inode_size) as u32;
|
||||||
|
@ -117,20 +121,20 @@ impl EasyFileSystem {
|
||||||
(inode_id % inodes_per_block) as usize * inode_size,
|
(inode_id % inodes_per_block) as usize * inode_size,
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
/// Get data block by id
|
||||||
pub fn get_data_block_id(&self, data_block_id: u32) -> u32 {
|
pub fn get_data_block_id(&self, data_block_id: u32) -> u32 {
|
||||||
self.data_area_start_block + data_block_id
|
self.data_area_start_block + data_block_id
|
||||||
}
|
}
|
||||||
|
/// Allocate a new inode
|
||||||
pub fn alloc_inode(&mut self) -> u32 {
|
pub fn alloc_inode(&mut self) -> u32 {
|
||||||
self.inode_bitmap.alloc(&self.block_device).unwrap() as u32
|
self.inode_bitmap.alloc(&self.block_device).unwrap() as u32
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Return a block ID not ID in the data area.
|
/// Allocate a data block
|
||||||
pub fn alloc_data(&mut self) -> u32 {
|
pub fn alloc_data(&mut self) -> u32 {
|
||||||
self.data_bitmap.alloc(&self.block_device).unwrap() as u32 + self.data_area_start_block
|
self.data_bitmap.alloc(&self.block_device).unwrap() as u32 + self.data_area_start_block
|
||||||
}
|
}
|
||||||
|
/// Deallocate a data block
|
||||||
pub fn dealloc_data(&mut self, block_id: u32) {
|
pub fn dealloc_data(&mut self, block_id: u32) {
|
||||||
get_block_cache(block_id as usize, Arc::clone(&self.block_device))
|
get_block_cache(block_id as usize, Arc::clone(&self.block_device))
|
||||||
.lock()
|
.lock()
|
||||||
|
|
|
@ -3,16 +3,24 @@ use alloc::sync::Arc;
|
||||||
use alloc::vec::Vec;
|
use alloc::vec::Vec;
|
||||||
use core::fmt::{Debug, Formatter, Result};
|
use core::fmt::{Debug, Formatter, Result};
|
||||||
|
|
||||||
|
/// Magic number for sanity check
|
||||||
const EFS_MAGIC: u32 = 0x3b800001;
|
const EFS_MAGIC: u32 = 0x3b800001;
|
||||||
|
/// The max number of direct inodes
|
||||||
const INODE_DIRECT_COUNT: usize = 28;
|
const INODE_DIRECT_COUNT: usize = 28;
|
||||||
|
/// The max length of inode name
|
||||||
const NAME_LENGTH_LIMIT: usize = 27;
|
const NAME_LENGTH_LIMIT: usize = 27;
|
||||||
|
/// The max number of indirect1 inodes
|
||||||
const INODE_INDIRECT1_COUNT: usize = BLOCK_SZ / 4;
|
const INODE_INDIRECT1_COUNT: usize = BLOCK_SZ / 4;
|
||||||
|
/// The max number of indirect2 inodes
|
||||||
const INODE_INDIRECT2_COUNT: usize = INODE_INDIRECT1_COUNT * INODE_INDIRECT1_COUNT;
|
const INODE_INDIRECT2_COUNT: usize = INODE_INDIRECT1_COUNT * INODE_INDIRECT1_COUNT;
|
||||||
|
/// The upper bound of direct inode index
|
||||||
const DIRECT_BOUND: usize = INODE_DIRECT_COUNT;
|
const DIRECT_BOUND: usize = INODE_DIRECT_COUNT;
|
||||||
|
/// The upper bound of indirect1 inode index
|
||||||
const INDIRECT1_BOUND: usize = DIRECT_BOUND + INODE_INDIRECT1_COUNT;
|
const INDIRECT1_BOUND: usize = DIRECT_BOUND + INODE_INDIRECT1_COUNT;
|
||||||
|
/// The upper bound of indirect2 inode indexs
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
const INDIRECT2_BOUND: usize = INDIRECT1_BOUND + INODE_INDIRECT2_COUNT;
|
const INDIRECT2_BOUND: usize = INDIRECT1_BOUND + INODE_INDIRECT2_COUNT;
|
||||||
|
/// Super block of a filesystem
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
pub struct SuperBlock {
|
pub struct SuperBlock {
|
||||||
magic: u32,
|
magic: u32,
|
||||||
|
@ -36,6 +44,7 @@ impl Debug for SuperBlock {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl SuperBlock {
|
impl SuperBlock {
|
||||||
|
/// Initialize a super block
|
||||||
pub fn initialize(
|
pub fn initialize(
|
||||||
&mut self,
|
&mut self,
|
||||||
total_blocks: u32,
|
total_blocks: u32,
|
||||||
|
@ -53,20 +62,23 @@ impl SuperBlock {
|
||||||
data_area_blocks,
|
data_area_blocks,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Check if a super block is valid using efs magic
|
||||||
pub fn is_valid(&self) -> bool {
|
pub fn is_valid(&self) -> bool {
|
||||||
self.magic == EFS_MAGIC
|
self.magic == EFS_MAGIC
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Type of a disk inode
|
||||||
#[derive(PartialEq)]
|
#[derive(PartialEq)]
|
||||||
pub enum DiskInodeType {
|
pub enum DiskInodeType {
|
||||||
File,
|
File,
|
||||||
Directory,
|
Directory,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// A indirect block
|
||||||
type IndirectBlock = [u32; BLOCK_SZ / 4];
|
type IndirectBlock = [u32; BLOCK_SZ / 4];
|
||||||
|
/// A data block
|
||||||
type DataBlock = [u8; BLOCK_SZ];
|
type DataBlock = [u8; BLOCK_SZ];
|
||||||
|
/// A disk inode
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
pub struct DiskInode {
|
pub struct DiskInode {
|
||||||
pub size: u32,
|
pub size: u32,
|
||||||
|
@ -77,7 +89,8 @@ pub struct DiskInode {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl DiskInode {
|
impl DiskInode {
|
||||||
/// indirect1 and indirect2 block are allocated only when they are needed.
|
/// Initialize a disk inode, as well as all direct inodes under it
|
||||||
|
/// indirect1 and indirect2 block are allocated only when they are needed
|
||||||
pub fn initialize(&mut self, type_: DiskInodeType) {
|
pub fn initialize(&mut self, type_: DiskInodeType) {
|
||||||
self.size = 0;
|
self.size = 0;
|
||||||
self.direct.iter_mut().for_each(|v| *v = 0);
|
self.direct.iter_mut().for_each(|v| *v = 0);
|
||||||
|
@ -85,9 +98,11 @@ impl DiskInode {
|
||||||
self.indirect2 = 0;
|
self.indirect2 = 0;
|
||||||
self.type_ = type_;
|
self.type_ = type_;
|
||||||
}
|
}
|
||||||
|
/// Whether this inode is a directory
|
||||||
pub fn is_dir(&self) -> bool {
|
pub fn is_dir(&self) -> bool {
|
||||||
self.type_ == DiskInodeType::Directory
|
self.type_ == DiskInodeType::Directory
|
||||||
}
|
}
|
||||||
|
/// Whether this inode is a file
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
pub fn is_file(&self) -> bool {
|
pub fn is_file(&self) -> bool {
|
||||||
self.type_ == DiskInodeType::File
|
self.type_ == DiskInodeType::File
|
||||||
|
@ -116,10 +131,12 @@ impl DiskInode {
|
||||||
}
|
}
|
||||||
total as u32
|
total as u32
|
||||||
}
|
}
|
||||||
|
/// Get the number of data blocks that have to be allocated given the new size of data
|
||||||
pub fn blocks_num_needed(&self, new_size: u32) -> u32 {
|
pub fn blocks_num_needed(&self, new_size: u32) -> u32 {
|
||||||
assert!(new_size >= self.size);
|
assert!(new_size >= self.size);
|
||||||
Self::total_blocks(new_size) - Self::total_blocks(self.size)
|
Self::total_blocks(new_size) - Self::total_blocks(self.size)
|
||||||
}
|
}
|
||||||
|
/// Get id of block given inner id
|
||||||
pub fn get_block_id(&self, inner_id: u32, block_device: &Arc<dyn BlockDevice>) -> u32 {
|
pub fn get_block_id(&self, inner_id: u32, block_device: &Arc<dyn BlockDevice>) -> u32 {
|
||||||
let inner_id = inner_id as usize;
|
let inner_id = inner_id as usize;
|
||||||
if inner_id < INODE_DIRECT_COUNT {
|
if inner_id < INODE_DIRECT_COUNT {
|
||||||
|
@ -144,6 +161,7 @@ impl DiskInode {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Inncrease the size of current disk inode
|
||||||
pub fn increase_size(
|
pub fn increase_size(
|
||||||
&mut self,
|
&mut self,
|
||||||
new_size: u32,
|
new_size: u32,
|
||||||
|
@ -218,7 +236,6 @@ impl DiskInode {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Clear size to zero and return blocks that should be deallocated.
|
/// Clear size to zero and return blocks that should be deallocated.
|
||||||
///
|
|
||||||
/// We will clear the block contents to zero later.
|
/// We will clear the block contents to zero later.
|
||||||
pub fn clear_size(&mut self, block_device: &Arc<dyn BlockDevice>) -> Vec<u32> {
|
pub fn clear_size(&mut self, block_device: &Arc<dyn BlockDevice>) -> Vec<u32> {
|
||||||
let mut v: Vec<u32> = Vec::new();
|
let mut v: Vec<u32> = Vec::new();
|
||||||
|
@ -291,6 +308,7 @@ impl DiskInode {
|
||||||
self.indirect2 = 0;
|
self.indirect2 = 0;
|
||||||
v
|
v
|
||||||
}
|
}
|
||||||
|
/// Read data from current disk inode
|
||||||
pub fn read_at(
|
pub fn read_at(
|
||||||
&self,
|
&self,
|
||||||
offset: usize,
|
offset: usize,
|
||||||
|
@ -330,7 +348,8 @@ impl DiskInode {
|
||||||
}
|
}
|
||||||
read_size
|
read_size
|
||||||
}
|
}
|
||||||
/// File size must be adjusted before.
|
/// Write data into current disk inode
|
||||||
|
/// size must be adjusted properly beforehand
|
||||||
pub fn write_at(
|
pub fn write_at(
|
||||||
&mut self,
|
&mut self,
|
||||||
offset: usize,
|
offset: usize,
|
||||||
|
@ -369,22 +388,24 @@ impl DiskInode {
|
||||||
write_size
|
write_size
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// A directory entry
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
pub struct DirEntry {
|
pub struct DirEntry {
|
||||||
name: [u8; NAME_LENGTH_LIMIT + 1],
|
name: [u8; NAME_LENGTH_LIMIT + 1],
|
||||||
inode_number: u32,
|
inode_number: u32,
|
||||||
}
|
}
|
||||||
|
/// Size of a directory entry
|
||||||
pub const DIRENT_SZ: usize = 32;
|
pub const DIRENT_SZ: usize = 32;
|
||||||
|
|
||||||
impl DirEntry {
|
impl DirEntry {
|
||||||
|
/// Create an empty directory entry
|
||||||
pub fn empty() -> Self {
|
pub fn empty() -> Self {
|
||||||
Self {
|
Self {
|
||||||
name: [0u8; NAME_LENGTH_LIMIT + 1],
|
name: [0u8; NAME_LENGTH_LIMIT + 1],
|
||||||
inode_number: 0,
|
inode_number: 0,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Crate a directory entry from name and inode number
|
||||||
pub fn new(name: &str, inode_number: u32) -> Self {
|
pub fn new(name: &str, inode_number: u32) -> Self {
|
||||||
let mut bytes = [0u8; NAME_LENGTH_LIMIT + 1];
|
let mut bytes = [0u8; NAME_LENGTH_LIMIT + 1];
|
||||||
bytes[..name.len()].copy_from_slice(name.as_bytes());
|
bytes[..name.len()].copy_from_slice(name.as_bytes());
|
||||||
|
@ -393,16 +414,20 @@ impl DirEntry {
|
||||||
inode_number,
|
inode_number,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Serialize into bytes
|
||||||
pub fn as_bytes(&self) -> &[u8] {
|
pub fn as_bytes(&self) -> &[u8] {
|
||||||
unsafe { core::slice::from_raw_parts(self as *const _ as usize as *const u8, DIRENT_SZ) }
|
unsafe { core::slice::from_raw_parts(self as *const _ as usize as *const u8, DIRENT_SZ) }
|
||||||
}
|
}
|
||||||
|
/// Serialize into mutable bytes
|
||||||
pub fn as_bytes_mut(&mut self) -> &mut [u8] {
|
pub fn as_bytes_mut(&mut self) -> &mut [u8] {
|
||||||
unsafe { core::slice::from_raw_parts_mut(self as *mut _ as usize as *mut u8, DIRENT_SZ) }
|
unsafe { core::slice::from_raw_parts_mut(self as *mut _ as usize as *mut u8, DIRENT_SZ) }
|
||||||
}
|
}
|
||||||
|
/// Get name of the entry
|
||||||
pub fn name(&self) -> &str {
|
pub fn name(&self) -> &str {
|
||||||
let len = (0usize..).find(|i| self.name[*i] == 0).unwrap();
|
let len = (0usize..).find(|i| self.name[*i] == 0).unwrap();
|
||||||
core::str::from_utf8(&self.name[..len]).unwrap()
|
core::str::from_utf8(&self.name[..len]).unwrap()
|
||||||
}
|
}
|
||||||
|
/// Get inode number of the entry
|
||||||
pub fn inode_number(&self) -> u32 {
|
pub fn inode_number(&self) -> u32 {
|
||||||
self.inode_number
|
self.inode_number
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,14 +1,14 @@
|
||||||
|
//!An easy file system isolated from the kernel
|
||||||
#![no_std]
|
#![no_std]
|
||||||
|
#![deny(missing_docs)]
|
||||||
extern crate alloc;
|
extern crate alloc;
|
||||||
|
|
||||||
mod bitmap;
|
mod bitmap;
|
||||||
mod block_cache;
|
mod block_cache;
|
||||||
mod block_dev;
|
mod block_dev;
|
||||||
mod efs;
|
mod efs;
|
||||||
mod layout;
|
mod layout;
|
||||||
mod vfs;
|
mod vfs;
|
||||||
|
/// Use a block size of 512 bytes
|
||||||
pub const BLOCK_SZ: usize = 512;
|
pub const BLOCK_SZ: usize = 512;
|
||||||
use bitmap::Bitmap;
|
use bitmap::Bitmap;
|
||||||
use block_cache::{block_cache_sync_all, get_block_cache};
|
use block_cache::{block_cache_sync_all, get_block_cache};
|
||||||
|
|
|
@ -6,7 +6,7 @@ use alloc::string::String;
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use alloc::vec::Vec;
|
use alloc::vec::Vec;
|
||||||
use spin::{Mutex, MutexGuard};
|
use spin::{Mutex, MutexGuard};
|
||||||
|
/// Virtual filesystem layer over easy-fs
|
||||||
pub struct Inode {
|
pub struct Inode {
|
||||||
block_id: usize,
|
block_id: usize,
|
||||||
block_offset: usize,
|
block_offset: usize,
|
||||||
|
@ -15,7 +15,7 @@ pub struct Inode {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Inode {
|
impl Inode {
|
||||||
/// We should not acquire efs lock here.
|
/// Create a vfs inode
|
||||||
pub fn new(
|
pub fn new(
|
||||||
block_id: u32,
|
block_id: u32,
|
||||||
block_offset: usize,
|
block_offset: usize,
|
||||||
|
@ -29,19 +29,19 @@ impl Inode {
|
||||||
block_device,
|
block_device,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Call a function over a disk inode to read it
|
||||||
fn read_disk_inode<V>(&self, f: impl FnOnce(&DiskInode) -> V) -> V {
|
fn read_disk_inode<V>(&self, f: impl FnOnce(&DiskInode) -> V) -> V {
|
||||||
get_block_cache(self.block_id, Arc::clone(&self.block_device))
|
get_block_cache(self.block_id, Arc::clone(&self.block_device))
|
||||||
.lock()
|
.lock()
|
||||||
.read(self.block_offset, f)
|
.read(self.block_offset, f)
|
||||||
}
|
}
|
||||||
|
/// Call a function over a disk inode to modify it
|
||||||
fn modify_disk_inode<V>(&self, f: impl FnOnce(&mut DiskInode) -> V) -> V {
|
fn modify_disk_inode<V>(&self, f: impl FnOnce(&mut DiskInode) -> V) -> V {
|
||||||
get_block_cache(self.block_id, Arc::clone(&self.block_device))
|
get_block_cache(self.block_id, Arc::clone(&self.block_device))
|
||||||
.lock()
|
.lock()
|
||||||
.modify(self.block_offset, f)
|
.modify(self.block_offset, f)
|
||||||
}
|
}
|
||||||
|
/// Find inode under a disk inode by name
|
||||||
fn find_inode_id(&self, name: &str, disk_inode: &DiskInode) -> Option<u32> {
|
fn find_inode_id(&self, name: &str, disk_inode: &DiskInode) -> Option<u32> {
|
||||||
// assert it is a directory
|
// assert it is a directory
|
||||||
assert!(disk_inode.is_dir());
|
assert!(disk_inode.is_dir());
|
||||||
|
@ -58,7 +58,7 @@ impl Inode {
|
||||||
}
|
}
|
||||||
None
|
None
|
||||||
}
|
}
|
||||||
|
/// Find inode under current inode by name
|
||||||
pub fn find(&self, name: &str) -> Option<Arc<Inode>> {
|
pub fn find(&self, name: &str) -> Option<Arc<Inode>> {
|
||||||
let fs = self.fs.lock();
|
let fs = self.fs.lock();
|
||||||
self.read_disk_inode(|disk_inode| {
|
self.read_disk_inode(|disk_inode| {
|
||||||
|
@ -73,7 +73,7 @@ impl Inode {
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
/// Increase the size of a disk inode
|
||||||
fn increase_size(
|
fn increase_size(
|
||||||
&self,
|
&self,
|
||||||
new_size: u32,
|
new_size: u32,
|
||||||
|
@ -90,16 +90,16 @@ impl Inode {
|
||||||
}
|
}
|
||||||
disk_inode.increase_size(new_size, v, &self.block_device);
|
disk_inode.increase_size(new_size, v, &self.block_device);
|
||||||
}
|
}
|
||||||
|
/// Create inode under current inode by name
|
||||||
pub fn create(&self, name: &str) -> Option<Arc<Inode>> {
|
pub fn create(&self, name: &str) -> Option<Arc<Inode>> {
|
||||||
let mut fs = self.fs.lock();
|
let mut fs = self.fs.lock();
|
||||||
let op = |root_inode: &mut DiskInode| {
|
let op = |root_inode: &DiskInode| {
|
||||||
// assert it is a directory
|
// assert it is a directory
|
||||||
assert!(root_inode.is_dir());
|
assert!(root_inode.is_dir());
|
||||||
// has the file been created?
|
// has the file been created?
|
||||||
self.find_inode_id(name, root_inode)
|
self.find_inode_id(name, root_inode)
|
||||||
};
|
};
|
||||||
if self.modify_disk_inode(op).is_some() {
|
if self.read_disk_inode(op).is_some() {
|
||||||
return None;
|
return None;
|
||||||
}
|
}
|
||||||
// create a new file
|
// create a new file
|
||||||
|
@ -138,7 +138,7 @@ impl Inode {
|
||||||
)))
|
)))
|
||||||
// release efs lock automatically by compiler
|
// release efs lock automatically by compiler
|
||||||
}
|
}
|
||||||
|
/// List inodes under current inode
|
||||||
pub fn ls(&self) -> Vec<String> {
|
pub fn ls(&self) -> Vec<String> {
|
||||||
let _fs = self.fs.lock();
|
let _fs = self.fs.lock();
|
||||||
self.read_disk_inode(|disk_inode| {
|
self.read_disk_inode(|disk_inode| {
|
||||||
|
@ -155,12 +155,12 @@ impl Inode {
|
||||||
v
|
v
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
/// Read data from current inode
|
||||||
pub fn read_at(&self, offset: usize, buf: &mut [u8]) -> usize {
|
pub fn read_at(&self, offset: usize, buf: &mut [u8]) -> usize {
|
||||||
let _fs = self.fs.lock();
|
let _fs = self.fs.lock();
|
||||||
self.read_disk_inode(|disk_inode| disk_inode.read_at(offset, buf, &self.block_device))
|
self.read_disk_inode(|disk_inode| disk_inode.read_at(offset, buf, &self.block_device))
|
||||||
}
|
}
|
||||||
|
/// Write data to current inode
|
||||||
pub fn write_at(&self, offset: usize, buf: &[u8]) -> usize {
|
pub fn write_at(&self, offset: usize, buf: &[u8]) -> usize {
|
||||||
let mut fs = self.fs.lock();
|
let mut fs = self.fs.lock();
|
||||||
let size = self.modify_disk_inode(|disk_inode| {
|
let size = self.modify_disk_inode(|disk_inode| {
|
||||||
|
@ -170,7 +170,7 @@ impl Inode {
|
||||||
block_cache_sync_all();
|
block_cache_sync_all();
|
||||||
size
|
size
|
||||||
}
|
}
|
||||||
|
/// Clear the data in current inode
|
||||||
pub fn clear(&self) {
|
pub fn clear(&self) {
|
||||||
let mut fs = self.fs.lock();
|
let mut fs = self.fs.lock();
|
||||||
self.modify_disk_inode(|disk_inode| {
|
self.modify_disk_inode(|disk_inode| {
|
||||||
|
|
BIN
figures/logo.png
BIN
figures/logo.png
Binary file not shown.
Before Width: | Height: | Size: 54 KiB |
|
@ -2,7 +2,7 @@
|
||||||
name = "os"
|
name = "os"
|
||||||
version = "0.1.0"
|
version = "0.1.0"
|
||||||
authors = ["Yifan Wu <shinbokuow@163.com>"]
|
authors = ["Yifan Wu <shinbokuow@163.com>"]
|
||||||
edition = "2021"
|
edition = "2024"
|
||||||
|
|
||||||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||||
|
|
||||||
|
@ -12,12 +12,8 @@ lazy_static = { version = "1.4.0", features = ["spin_no_std"] }
|
||||||
buddy_system_allocator = "0.6"
|
buddy_system_allocator = "0.6"
|
||||||
bitflags = "1.2.1"
|
bitflags = "1.2.1"
|
||||||
xmas-elf = "0.7.0"
|
xmas-elf = "0.7.0"
|
||||||
volatile = "0.3"
|
|
||||||
virtio-drivers = { git = "https://github.com/rcore-os/virtio-drivers", rev = "4ee80e5" }
|
virtio-drivers = { git = "https://github.com/rcore-os/virtio-drivers", rev = "4ee80e5" }
|
||||||
lose-net-stack = { git = "https://github.com/yfblock/lose-net-stack", rev = "db42380" }
|
|
||||||
easy-fs = { path = "../easy-fs" }
|
easy-fs = { path = "../easy-fs" }
|
||||||
embedded-graphics = "0.7.1"
|
|
||||||
tinybmp = "0.3.1"
|
|
||||||
log = "0.4"
|
log = "0.4"
|
||||||
sbi-rt = { version = "0.0.2", features = ["legacy"] }
|
sbi-rt = { version = "0.0.2", features = ["legacy"] }
|
||||||
|
|
||||||
|
|
24
os/Makefile
24
os/Makefile
|
@ -12,12 +12,6 @@ BOARD := qemu
|
||||||
SBI ?= rustsbi
|
SBI ?= rustsbi
|
||||||
BOOTLOADER := ../bootloader/$(SBI)-$(BOARD).bin
|
BOOTLOADER := ../bootloader/$(SBI)-$(BOARD).bin
|
||||||
|
|
||||||
# GUI
|
|
||||||
GUI ?= off
|
|
||||||
ifeq ($(GUI), off)
|
|
||||||
GUI_OPTION := -display none
|
|
||||||
endif
|
|
||||||
|
|
||||||
# Building mode argument
|
# Building mode argument
|
||||||
ifeq ($(MODE), release)
|
ifeq ($(MODE), release)
|
||||||
MODE_ARG := --release
|
MODE_ARG := --release
|
||||||
|
@ -68,27 +62,17 @@ disasm: kernel
|
||||||
|
|
||||||
disasm-vim: kernel
|
disasm-vim: kernel
|
||||||
@$(OBJDUMP) $(DISASM) $(KERNEL_ELF) > $(DISASM_TMP)
|
@$(OBJDUMP) $(DISASM) $(KERNEL_ELF) > $(DISASM_TMP)
|
||||||
@nvim $(DISASM_TMP)
|
@vim $(DISASM_TMP)
|
||||||
@rm $(DISASM_TMP)
|
@rm $(DISASM_TMP)
|
||||||
|
|
||||||
run: run-inner
|
run: run-inner
|
||||||
|
|
||||||
QEMU_ARGS := -machine virt \
|
QEMU_ARGS := -machine virt \
|
||||||
|
-nographic \
|
||||||
-bios $(BOOTLOADER) \
|
-bios $(BOOTLOADER) \
|
||||||
-serial stdio \
|
|
||||||
$(GUI_OPTION) \
|
|
||||||
-device loader,file=$(KERNEL_BIN),addr=$(KERNEL_ENTRY_PA) \
|
-device loader,file=$(KERNEL_BIN),addr=$(KERNEL_ENTRY_PA) \
|
||||||
-drive file=$(FS_IMG),if=none,format=raw,id=x0 \
|
-drive file=$(FS_IMG),if=none,format=raw,id=x0 \
|
||||||
-device virtio-blk-device,drive=x0 \
|
-device virtio-blk-device,drive=x0,bus=virtio-mmio-bus.0
|
||||||
-device virtio-gpu-device \
|
|
||||||
-device virtio-keyboard-device \
|
|
||||||
-device virtio-mouse-device \
|
|
||||||
-device virtio-net-device,netdev=net0 \
|
|
||||||
-netdev user,id=net0,hostfwd=udp::6200-:2000,hostfwd=tcp::6201-:80
|
|
||||||
|
|
||||||
fdt:
|
|
||||||
@qemu-system-riscv64 -M 128m -machine virt,dumpdtb=virt.out
|
|
||||||
fdtdump virt.out
|
|
||||||
|
|
||||||
QEMU_NAME := qemu-system-riscv64
|
QEMU_NAME := qemu-system-riscv64
|
||||||
qemu-version-check:
|
qemu-version-check:
|
||||||
|
@ -109,4 +93,4 @@ gdbserver: qemu-version-check build
|
||||||
gdbclient:
|
gdbclient:
|
||||||
@riscv64-unknown-elf-gdb -ex 'file $(KERNEL_ELF)' -ex 'set arch riscv:rv64' -ex 'target remote localhost:1234'
|
@riscv64-unknown-elf-gdb -ex 'file $(KERNEL_ELF)' -ex 'set arch riscv:rv64' -ex 'target remote localhost:1234'
|
||||||
|
|
||||||
.PHONY: build env kernel clean disasm disasm-vim run-inner fs-img gdbserver gdbclient fdt qemu-version-check
|
.PHONY: build env kernel clean disasm disasm-vim run-inner fs-img gdbserver gdbclient qemu-version-check
|
||||||
|
|
2
os/scripts/qemu-ver-check.sh
Normal file → Executable file
2
os/scripts/qemu-ver-check.sh
Normal file → Executable file
|
@ -13,7 +13,7 @@ then
|
||||||
exit 1
|
exit 1
|
||||||
else
|
else
|
||||||
QEMU_VERSION=$($1 --version|head -n 1|awk '{print $4}')
|
QEMU_VERSION=$($1 --version|head -n 1|awk '{print $4}')
|
||||||
MAJOR_VERSION=$(echo $QEMU_VERSION|cut -c1-1)
|
MAJOR_VERSION=$(echo $QEMU_VERSION | awk -F '.' '{print $1}')
|
||||||
if [ $MAJOR_VERSION -lt $MINIMUM_MAJOR_VERSION ]
|
if [ $MAJOR_VERSION -lt $MINIMUM_MAJOR_VERSION ]
|
||||||
then
|
then
|
||||||
echo "${RED}Error: Required major version of QEMU is ${MINIMUM_MAJOR_VERSION}, " \
|
echo "${RED}Error: Required major version of QEMU is ${MINIMUM_MAJOR_VERSION}, " \
|
||||||
|
|
Binary file not shown.
Before Width: | Height: | Size: 2.9 MiB |
Binary file not shown.
Before Width: | Height: | Size: 12 KiB |
Binary file not shown.
Before Width: | Height: | Size: 12 KiB |
Binary file not shown.
Before Width: | Height: | Size: 12 KiB |
|
@ -3,53 +3,7 @@ pub const MEMORY_END: usize = 0x8800_0000;
|
||||||
|
|
||||||
pub const MMIO: &[(usize, usize)] = &[
|
pub const MMIO: &[(usize, usize)] = &[
|
||||||
(0x0010_0000, 0x00_2000), // VIRT_TEST/RTC in virt machine
|
(0x0010_0000, 0x00_2000), // VIRT_TEST/RTC in virt machine
|
||||||
(0x2000000, 0x10000), // core local interrupter (CLINT)
|
(0x1000_1000, 0x00_1000), // Virtio Block in virt machine
|
||||||
(0xc000000, 0x210000), // VIRT_PLIC in virt machine
|
|
||||||
(0x10000000, 0x9000), // VIRT_UART0 with GPU in virt machine
|
|
||||||
];
|
];
|
||||||
|
|
||||||
pub type BlockDeviceImpl = crate::drivers::block::VirtIOBlock;
|
pub type BlockDeviceImpl = crate::drivers::block::VirtIOBlock;
|
||||||
pub type CharDeviceImpl = crate::drivers::chardev::NS16550a<VIRT_UART>;
|
|
||||||
|
|
||||||
pub const VIRT_PLIC: usize = 0xC00_0000;
|
|
||||||
pub const VIRT_UART: usize = 0x1000_0000;
|
|
||||||
#[allow(unused)]
|
|
||||||
pub const VIRTGPU_XRES: u32 = 1280;
|
|
||||||
#[allow(unused)]
|
|
||||||
pub const VIRTGPU_YRES: u32 = 800;
|
|
||||||
|
|
||||||
use crate::drivers::block::BLOCK_DEVICE;
|
|
||||||
use crate::drivers::chardev::{CharDevice, UART};
|
|
||||||
use crate::drivers::plic::{IntrTargetPriority, PLIC};
|
|
||||||
use crate::drivers::{KEYBOARD_DEVICE, MOUSE_DEVICE};
|
|
||||||
|
|
||||||
pub fn device_init() {
|
|
||||||
use riscv::register::sie;
|
|
||||||
let mut plic = unsafe { PLIC::new(VIRT_PLIC) };
|
|
||||||
let hart_id: usize = 0;
|
|
||||||
let supervisor = IntrTargetPriority::Supervisor;
|
|
||||||
let machine = IntrTargetPriority::Machine;
|
|
||||||
plic.set_threshold(hart_id, supervisor, 0);
|
|
||||||
plic.set_threshold(hart_id, machine, 1);
|
|
||||||
//irq nums: 5 keyboard, 6 mouse, 8 block, 10 uart
|
|
||||||
for intr_src_id in [5usize, 6, 8, 10] {
|
|
||||||
plic.enable(hart_id, supervisor, intr_src_id);
|
|
||||||
plic.set_priority(intr_src_id, 1);
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
sie::set_sext();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn irq_handler() {
|
|
||||||
let mut plic = unsafe { PLIC::new(VIRT_PLIC) };
|
|
||||||
let intr_src_id = plic.claim(0, IntrTargetPriority::Supervisor);
|
|
||||||
match intr_src_id {
|
|
||||||
5 => KEYBOARD_DEVICE.handle_irq(),
|
|
||||||
6 => MOUSE_DEVICE.handle_irq(),
|
|
||||||
8 => BLOCK_DEVICE.handle_irq(),
|
|
||||||
10 => UART.handle_irq(),
|
|
||||||
_ => panic!("unsupported IRQ {}", intr_src_id),
|
|
||||||
}
|
|
||||||
plic.complete(0, IntrTargetPriority::Supervisor, intr_src_id);
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,12 +1,14 @@
|
||||||
|
//! Constants used in rCore
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
|
|
||||||
pub const USER_STACK_SIZE: usize = 4096 * 2;
|
pub const USER_STACK_SIZE: usize = 4096 * 2;
|
||||||
pub const KERNEL_STACK_SIZE: usize = 4096 * 2;
|
pub const KERNEL_STACK_SIZE: usize = 4096 * 2;
|
||||||
pub const KERNEL_HEAP_SIZE: usize = 0x100_0000;
|
pub const KERNEL_HEAP_SIZE: usize = 0x20_0000;
|
||||||
|
|
||||||
pub const PAGE_SIZE: usize = 0x1000;
|
pub const PAGE_SIZE: usize = 0x1000;
|
||||||
pub const PAGE_SIZE_BITS: usize = 0xc;
|
pub const PAGE_SIZE_BITS: usize = 0xc;
|
||||||
|
|
||||||
pub const TRAMPOLINE: usize = usize::MAX - PAGE_SIZE + 1;
|
pub const TRAMPOLINE: usize = usize::MAX - PAGE_SIZE + 1;
|
||||||
pub const TRAP_CONTEXT_BASE: usize = TRAMPOLINE - PAGE_SIZE;
|
pub const TRAP_CONTEXT: usize = TRAMPOLINE - PAGE_SIZE;
|
||||||
|
|
||||||
pub use crate::board::{CLOCK_FREQ, MEMORY_END, MMIO};
|
pub use crate::board::{CLOCK_FREQ, MEMORY_END, MMIO};
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
use crate::drivers::chardev::CharDevice;
|
//! SBI console driver, for text output
|
||||||
use crate::drivers::chardev::UART;
|
use crate::sbi::console_putchar;
|
||||||
use core::fmt::{self, Write};
|
use core::fmt::{self, Write};
|
||||||
|
|
||||||
struct Stdout;
|
struct Stdout;
|
||||||
|
@ -7,7 +7,7 @@ struct Stdout;
|
||||||
impl Write for Stdout {
|
impl Write for Stdout {
|
||||||
fn write_str(&mut self, s: &str) -> fmt::Result {
|
fn write_str(&mut self, s: &str) -> fmt::Result {
|
||||||
for c in s.chars() {
|
for c in s.chars() {
|
||||||
UART.write(c as u8);
|
console_putchar(c as usize);
|
||||||
}
|
}
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
@ -18,15 +18,17 @@ pub fn print(args: fmt::Arguments) {
|
||||||
}
|
}
|
||||||
|
|
||||||
#[macro_export]
|
#[macro_export]
|
||||||
|
/// print string macro
|
||||||
macro_rules! print {
|
macro_rules! print {
|
||||||
($fmt: literal $(, $($arg: tt)+)?) => {
|
($fmt: literal $(, $($arg: tt)+)?) => {
|
||||||
$crate::console::print(format_args!($fmt $(, $($arg)+)?))
|
$crate::console::print(format_args!($fmt $(, $($arg)+)?));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[macro_export]
|
#[macro_export]
|
||||||
|
/// println string macro
|
||||||
macro_rules! println {
|
macro_rules! println {
|
||||||
($fmt: literal $(, $($arg: tt)+)?) => {
|
($fmt: literal $(, $($arg: tt)+)?) => {
|
||||||
$crate::console::print(format_args!(concat!($fmt, "\n") $(, $($arg)+)?))
|
$crate::console::print(format_args!(concat!($fmt, "\n") $(, $($arg)+)?));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,87 +1,83 @@
|
||||||
use super::BlockDevice;
|
use super::BlockDevice;
|
||||||
use crate::drivers::bus::virtio::VirtioHal;
|
use crate::mm::{
|
||||||
use crate::sync::{Condvar, UPIntrFreeCell};
|
FrameTracker, PageTable, PhysAddr, PhysPageNum, StepByOne, VirtAddr, frame_alloc,
|
||||||
use crate::task::schedule;
|
frame_dealloc, kernel_token,
|
||||||
use crate::DEV_NON_BLOCKING_ACCESS;
|
};
|
||||||
use alloc::collections::BTreeMap;
|
use crate::sync::UPSafeCell;
|
||||||
use virtio_drivers::{BlkResp, RespStatus, VirtIOBlk, VirtIOHeader};
|
use alloc::vec::Vec;
|
||||||
|
use lazy_static::*;
|
||||||
|
use virtio_drivers::{Hal, VirtIOBlk, VirtIOHeader};
|
||||||
|
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
const VIRTIO0: usize = 0x10008000;
|
const VIRTIO0: usize = 0x10001000;
|
||||||
|
|
||||||
pub struct VirtIOBlock {
|
pub struct VirtIOBlock(UPSafeCell<VirtIOBlk<'static, VirtioHal>>);
|
||||||
virtio_blk: UPIntrFreeCell<VirtIOBlk<'static, VirtioHal>>,
|
|
||||||
condvars: BTreeMap<u16, Condvar>,
|
lazy_static! {
|
||||||
|
static ref QUEUE_FRAMES: UPSafeCell<Vec<FrameTracker>> = unsafe { UPSafeCell::new(Vec::new()) };
|
||||||
}
|
}
|
||||||
|
|
||||||
impl BlockDevice for VirtIOBlock {
|
impl BlockDevice for VirtIOBlock {
|
||||||
fn read_block(&self, block_id: usize, buf: &mut [u8]) {
|
fn read_block(&self, block_id: usize, buf: &mut [u8]) {
|
||||||
let nb = *DEV_NON_BLOCKING_ACCESS.exclusive_access();
|
self.0
|
||||||
if nb {
|
.exclusive_access()
|
||||||
let mut resp = BlkResp::default();
|
.read_block(block_id, buf)
|
||||||
let task_cx_ptr = self.virtio_blk.exclusive_session(|blk| {
|
.expect("Error when reading VirtIOBlk");
|
||||||
let token = unsafe { blk.read_block_nb(block_id, buf, &mut resp).unwrap() };
|
|
||||||
self.condvars.get(&token).unwrap().wait_no_sched()
|
|
||||||
});
|
|
||||||
schedule(task_cx_ptr);
|
|
||||||
assert_eq!(
|
|
||||||
resp.status(),
|
|
||||||
RespStatus::Ok,
|
|
||||||
"Error when reading VirtIOBlk"
|
|
||||||
);
|
|
||||||
} else {
|
|
||||||
self.virtio_blk
|
|
||||||
.exclusive_access()
|
|
||||||
.read_block(block_id, buf)
|
|
||||||
.expect("Error when reading VirtIOBlk");
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
fn write_block(&self, block_id: usize, buf: &[u8]) {
|
fn write_block(&self, block_id: usize, buf: &[u8]) {
|
||||||
let nb = *DEV_NON_BLOCKING_ACCESS.exclusive_access();
|
self.0
|
||||||
if nb {
|
.exclusive_access()
|
||||||
let mut resp = BlkResp::default();
|
.write_block(block_id, buf)
|
||||||
let task_cx_ptr = self.virtio_blk.exclusive_session(|blk| {
|
.expect("Error when writing VirtIOBlk");
|
||||||
let token = unsafe { blk.write_block_nb(block_id, buf, &mut resp).unwrap() };
|
|
||||||
self.condvars.get(&token).unwrap().wait_no_sched()
|
|
||||||
});
|
|
||||||
schedule(task_cx_ptr);
|
|
||||||
assert_eq!(
|
|
||||||
resp.status(),
|
|
||||||
RespStatus::Ok,
|
|
||||||
"Error when writing VirtIOBlk"
|
|
||||||
);
|
|
||||||
} else {
|
|
||||||
self.virtio_blk
|
|
||||||
.exclusive_access()
|
|
||||||
.write_block(block_id, buf)
|
|
||||||
.expect("Error when writing VirtIOBlk");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
fn handle_irq(&self) {
|
|
||||||
self.virtio_blk.exclusive_session(|blk| {
|
|
||||||
while let Ok(token) = blk.pop_used() {
|
|
||||||
self.condvars.get(&token).unwrap().signal();
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl VirtIOBlock {
|
impl VirtIOBlock {
|
||||||
|
#[allow(unused)]
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
let virtio_blk = unsafe {
|
unsafe {
|
||||||
UPIntrFreeCell::new(
|
Self(UPSafeCell::new(
|
||||||
VirtIOBlk::<VirtioHal>::new(&mut *(VIRTIO0 as *mut VirtIOHeader)).unwrap(),
|
VirtIOBlk::<VirtioHal>::new(&mut *(VIRTIO0 as *mut VirtIOHeader)).unwrap(),
|
||||||
)
|
))
|
||||||
};
|
|
||||||
let mut condvars = BTreeMap::new();
|
|
||||||
let channels = virtio_blk.exclusive_access().virt_queue_size();
|
|
||||||
for i in 0..channels {
|
|
||||||
let condvar = Condvar::new();
|
|
||||||
condvars.insert(i, condvar);
|
|
||||||
}
|
|
||||||
Self {
|
|
||||||
virtio_blk,
|
|
||||||
condvars,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub struct VirtioHal;
|
||||||
|
|
||||||
|
impl Hal for VirtioHal {
|
||||||
|
fn dma_alloc(pages: usize) -> usize {
|
||||||
|
let mut ppn_base = PhysPageNum(0);
|
||||||
|
for i in 0..pages {
|
||||||
|
let frame = frame_alloc().unwrap();
|
||||||
|
if i == 0 {
|
||||||
|
ppn_base = frame.ppn;
|
||||||
|
}
|
||||||
|
assert_eq!(frame.ppn.0, ppn_base.0 + i);
|
||||||
|
QUEUE_FRAMES.exclusive_access().push(frame);
|
||||||
|
}
|
||||||
|
let pa: PhysAddr = ppn_base.into();
|
||||||
|
pa.0
|
||||||
|
}
|
||||||
|
|
||||||
|
fn dma_dealloc(pa: usize, pages: usize) -> i32 {
|
||||||
|
let pa = PhysAddr::from(pa);
|
||||||
|
let mut ppn_base: PhysPageNum = pa.into();
|
||||||
|
for _ in 0..pages {
|
||||||
|
frame_dealloc(ppn_base);
|
||||||
|
ppn_base.step();
|
||||||
|
}
|
||||||
|
0
|
||||||
|
}
|
||||||
|
|
||||||
|
fn phys_to_virt(addr: usize) -> usize {
|
||||||
|
addr
|
||||||
|
}
|
||||||
|
|
||||||
|
fn virt_to_phys(vaddr: usize) -> usize {
|
||||||
|
PageTable::from_token(kernel_token())
|
||||||
|
.translate_va(VirtAddr::from(vaddr))
|
||||||
|
.unwrap()
|
||||||
|
.0
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -1 +0,0 @@
|
||||||
pub mod virtio;
|
|
|
@ -1,48 +0,0 @@
|
||||||
use crate::mm::{
|
|
||||||
frame_alloc_more, frame_dealloc, kernel_token, FrameTracker, PageTable, PhysAddr, PhysPageNum,
|
|
||||||
StepByOne, VirtAddr,
|
|
||||||
};
|
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use lazy_static::*;
|
|
||||||
use virtio_drivers::Hal;
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref QUEUE_FRAMES: UPIntrFreeCell<Vec<FrameTracker>> =
|
|
||||||
unsafe { UPIntrFreeCell::new(Vec::new()) };
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct VirtioHal;
|
|
||||||
|
|
||||||
impl Hal for VirtioHal {
|
|
||||||
fn dma_alloc(pages: usize) -> usize {
|
|
||||||
let trakcers = frame_alloc_more(pages);
|
|
||||||
let ppn_base = trakcers.as_ref().unwrap().last().unwrap().ppn;
|
|
||||||
QUEUE_FRAMES
|
|
||||||
.exclusive_access()
|
|
||||||
.append(&mut trakcers.unwrap());
|
|
||||||
let pa: PhysAddr = ppn_base.into();
|
|
||||||
pa.0
|
|
||||||
}
|
|
||||||
|
|
||||||
fn dma_dealloc(pa: usize, pages: usize) -> i32 {
|
|
||||||
let pa = PhysAddr::from(pa);
|
|
||||||
let mut ppn_base: PhysPageNum = pa.into();
|
|
||||||
for _ in 0..pages {
|
|
||||||
frame_dealloc(ppn_base);
|
|
||||||
ppn_base.step();
|
|
||||||
}
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
fn phys_to_virt(addr: usize) -> usize {
|
|
||||||
addr
|
|
||||||
}
|
|
||||||
|
|
||||||
fn virt_to_phys(vaddr: usize) -> usize {
|
|
||||||
PageTable::from_token(kernel_token())
|
|
||||||
.translate_va(VirtAddr::from(vaddr))
|
|
||||||
.unwrap()
|
|
||||||
.0
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,17 +0,0 @@
|
||||||
mod ns16550a;
|
|
||||||
|
|
||||||
use crate::board::CharDeviceImpl;
|
|
||||||
use alloc::sync::Arc;
|
|
||||||
use lazy_static::*;
|
|
||||||
pub use ns16550a::NS16550a;
|
|
||||||
|
|
||||||
pub trait CharDevice {
|
|
||||||
fn init(&self);
|
|
||||||
fn read(&self) -> u8;
|
|
||||||
fn write(&self, ch: u8);
|
|
||||||
fn handle_irq(&self);
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
pub static ref UART: Arc<CharDeviceImpl> = Arc::new(CharDeviceImpl::new());
|
|
||||||
}
|
|
|
@ -1,186 +0,0 @@
|
||||||
///! Ref: https://www.lammertbies.nl/comm/info/serial-uart
|
|
||||||
///! Ref: ns16550a datasheet: https://datasheetspdf.com/pdf-file/605590/NationalSemiconductor/NS16550A/1
|
|
||||||
///! Ref: ns16450 datasheet: https://datasheetspdf.com/pdf-file/1311818/NationalSemiconductor/NS16450/1
|
|
||||||
use super::CharDevice;
|
|
||||||
use crate::sync::{Condvar, UPIntrFreeCell};
|
|
||||||
use crate::task::schedule;
|
|
||||||
use alloc::collections::VecDeque;
|
|
||||||
use bitflags::*;
|
|
||||||
use volatile::{ReadOnly, Volatile, WriteOnly};
|
|
||||||
|
|
||||||
bitflags! {
|
|
||||||
/// InterruptEnableRegister
|
|
||||||
pub struct IER: u8 {
|
|
||||||
const RX_AVAILABLE = 1 << 0;
|
|
||||||
const TX_EMPTY = 1 << 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
/// LineStatusRegister
|
|
||||||
pub struct LSR: u8 {
|
|
||||||
const DATA_AVAILABLE = 1 << 0;
|
|
||||||
const THR_EMPTY = 1 << 5;
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Model Control Register
|
|
||||||
pub struct MCR: u8 {
|
|
||||||
const DATA_TERMINAL_READY = 1 << 0;
|
|
||||||
const REQUEST_TO_SEND = 1 << 1;
|
|
||||||
const AUX_OUTPUT1 = 1 << 2;
|
|
||||||
const AUX_OUTPUT2 = 1 << 3;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[repr(C)]
|
|
||||||
#[allow(dead_code)]
|
|
||||||
struct ReadWithoutDLAB {
|
|
||||||
/// receiver buffer register
|
|
||||||
pub rbr: ReadOnly<u8>,
|
|
||||||
/// interrupt enable register
|
|
||||||
pub ier: Volatile<IER>,
|
|
||||||
/// interrupt identification register
|
|
||||||
pub iir: ReadOnly<u8>,
|
|
||||||
/// line control register
|
|
||||||
pub lcr: Volatile<u8>,
|
|
||||||
/// model control register
|
|
||||||
pub mcr: Volatile<MCR>,
|
|
||||||
/// line status register
|
|
||||||
pub lsr: ReadOnly<LSR>,
|
|
||||||
/// ignore MSR
|
|
||||||
_padding1: ReadOnly<u8>,
|
|
||||||
/// ignore SCR
|
|
||||||
_padding2: ReadOnly<u8>,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[repr(C)]
|
|
||||||
#[allow(dead_code)]
|
|
||||||
struct WriteWithoutDLAB {
|
|
||||||
/// transmitter holding register
|
|
||||||
pub thr: WriteOnly<u8>,
|
|
||||||
/// interrupt enable register
|
|
||||||
pub ier: Volatile<IER>,
|
|
||||||
/// ignore FCR
|
|
||||||
_padding0: ReadOnly<u8>,
|
|
||||||
/// line control register
|
|
||||||
pub lcr: Volatile<u8>,
|
|
||||||
/// modem control register
|
|
||||||
pub mcr: Volatile<MCR>,
|
|
||||||
/// line status register
|
|
||||||
pub lsr: ReadOnly<LSR>,
|
|
||||||
/// ignore other registers
|
|
||||||
_padding1: ReadOnly<u16>,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct NS16550aRaw {
|
|
||||||
base_addr: usize,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl NS16550aRaw {
|
|
||||||
fn read_end(&mut self) -> &mut ReadWithoutDLAB {
|
|
||||||
unsafe { &mut *(self.base_addr as *mut ReadWithoutDLAB) }
|
|
||||||
}
|
|
||||||
|
|
||||||
fn write_end(&mut self) -> &mut WriteWithoutDLAB {
|
|
||||||
unsafe { &mut *(self.base_addr as *mut WriteWithoutDLAB) }
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn new(base_addr: usize) -> Self {
|
|
||||||
Self { base_addr }
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn init(&mut self) {
|
|
||||||
let read_end = self.read_end();
|
|
||||||
let mut mcr = MCR::empty();
|
|
||||||
mcr |= MCR::DATA_TERMINAL_READY;
|
|
||||||
mcr |= MCR::REQUEST_TO_SEND;
|
|
||||||
mcr |= MCR::AUX_OUTPUT2;
|
|
||||||
read_end.mcr.write(mcr);
|
|
||||||
let ier = IER::RX_AVAILABLE;
|
|
||||||
read_end.ier.write(ier);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn read(&mut self) -> Option<u8> {
|
|
||||||
let read_end = self.read_end();
|
|
||||||
let lsr = read_end.lsr.read();
|
|
||||||
if lsr.contains(LSR::DATA_AVAILABLE) {
|
|
||||||
Some(read_end.rbr.read())
|
|
||||||
} else {
|
|
||||||
None
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn write(&mut self, ch: u8) {
|
|
||||||
let write_end = self.write_end();
|
|
||||||
loop {
|
|
||||||
if write_end.lsr.read().contains(LSR::THR_EMPTY) {
|
|
||||||
write_end.thr.write(ch);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
struct NS16550aInner {
|
|
||||||
ns16550a: NS16550aRaw,
|
|
||||||
read_buffer: VecDeque<u8>,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct NS16550a<const BASE_ADDR: usize> {
|
|
||||||
inner: UPIntrFreeCell<NS16550aInner>,
|
|
||||||
condvar: Condvar,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<const BASE_ADDR: usize> NS16550a<BASE_ADDR> {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
let inner = NS16550aInner {
|
|
||||||
ns16550a: NS16550aRaw::new(BASE_ADDR),
|
|
||||||
read_buffer: VecDeque::new(),
|
|
||||||
};
|
|
||||||
//inner.ns16550a.init();
|
|
||||||
Self {
|
|
||||||
inner: unsafe { UPIntrFreeCell::new(inner) },
|
|
||||||
condvar: Condvar::new(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn read_buffer_is_empty(&self) -> bool {
|
|
||||||
self.inner
|
|
||||||
.exclusive_session(|inner| inner.read_buffer.is_empty())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<const BASE_ADDR: usize> CharDevice for NS16550a<BASE_ADDR> {
|
|
||||||
fn init(&self) {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
inner.ns16550a.init();
|
|
||||||
drop(inner);
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read(&self) -> u8 {
|
|
||||||
loop {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
if let Some(ch) = inner.read_buffer.pop_front() {
|
|
||||||
return ch;
|
|
||||||
} else {
|
|
||||||
let task_cx_ptr = self.condvar.wait_no_sched();
|
|
||||||
drop(inner);
|
|
||||||
schedule(task_cx_ptr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
fn write(&self, ch: u8) {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
inner.ns16550a.write(ch);
|
|
||||||
}
|
|
||||||
fn handle_irq(&self) {
|
|
||||||
let mut count = 0;
|
|
||||||
self.inner.exclusive_session(|inner| {
|
|
||||||
while let Some(ch) = inner.ns16550a.read() {
|
|
||||||
count += 1;
|
|
||||||
inner.read_buffer.push_back(ch);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
if count > 0 {
|
|
||||||
self.condvar.signal();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,68 +0,0 @@
|
||||||
use crate::drivers::bus::virtio::VirtioHal;
|
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use alloc::{sync::Arc, vec::Vec};
|
|
||||||
use core::any::Any;
|
|
||||||
use embedded_graphics::pixelcolor::Rgb888;
|
|
||||||
use tinybmp::Bmp;
|
|
||||||
use virtio_drivers::{VirtIOGpu, VirtIOHeader};
|
|
||||||
const VIRTIO7: usize = 0x10007000;
|
|
||||||
pub trait GpuDevice: Send + Sync + Any {
|
|
||||||
fn update_cursor(&self);
|
|
||||||
fn get_framebuffer(&self) -> &mut [u8];
|
|
||||||
fn flush(&self);
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static::lazy_static!(
|
|
||||||
pub static ref GPU_DEVICE: Arc<dyn GpuDevice> = Arc::new(VirtIOGpuWrapper::new());
|
|
||||||
);
|
|
||||||
|
|
||||||
pub struct VirtIOGpuWrapper {
|
|
||||||
gpu: UPIntrFreeCell<VirtIOGpu<'static, VirtioHal>>,
|
|
||||||
fb: &'static [u8],
|
|
||||||
}
|
|
||||||
static BMP_DATA: &[u8] = include_bytes!("../../assert/mouse.bmp");
|
|
||||||
impl VirtIOGpuWrapper {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
unsafe {
|
|
||||||
let mut virtio =
|
|
||||||
VirtIOGpu::<VirtioHal>::new(&mut *(VIRTIO7 as *mut VirtIOHeader)).unwrap();
|
|
||||||
|
|
||||||
let fbuffer = virtio.setup_framebuffer().unwrap();
|
|
||||||
let len = fbuffer.len();
|
|
||||||
let ptr = fbuffer.as_mut_ptr();
|
|
||||||
let fb = core::slice::from_raw_parts_mut(ptr, len);
|
|
||||||
|
|
||||||
let bmp = Bmp::<Rgb888>::from_slice(BMP_DATA).unwrap();
|
|
||||||
let raw = bmp.as_raw();
|
|
||||||
let mut b = Vec::new();
|
|
||||||
for i in raw.image_data().chunks(3) {
|
|
||||||
let mut v = i.to_vec();
|
|
||||||
b.append(&mut v);
|
|
||||||
if i == [255, 255, 255] {
|
|
||||||
b.push(0x0)
|
|
||||||
} else {
|
|
||||||
b.push(0xff)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
virtio.setup_cursor(b.as_slice(), 50, 50, 50, 50).unwrap();
|
|
||||||
|
|
||||||
Self {
|
|
||||||
gpu: UPIntrFreeCell::new(virtio),
|
|
||||||
fb,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl GpuDevice for VirtIOGpuWrapper {
|
|
||||||
fn flush(&self) {
|
|
||||||
self.gpu.exclusive_access().flush().unwrap();
|
|
||||||
}
|
|
||||||
fn get_framebuffer(&self) -> &mut [u8] {
|
|
||||||
unsafe {
|
|
||||||
let ptr = self.fb.as_ptr() as *const _ as *mut u8;
|
|
||||||
core::slice::from_raw_parts_mut(ptr, self.fb.len())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
fn update_cursor(&self) {}
|
|
||||||
}
|
|
|
@ -1,83 +0,0 @@
|
||||||
use crate::drivers::bus::virtio::VirtioHal;
|
|
||||||
use crate::sync::{Condvar, UPIntrFreeCell};
|
|
||||||
use crate::task::schedule;
|
|
||||||
use alloc::collections::VecDeque;
|
|
||||||
use alloc::sync::Arc;
|
|
||||||
use core::any::Any;
|
|
||||||
use virtio_drivers::{VirtIOHeader, VirtIOInput};
|
|
||||||
|
|
||||||
const VIRTIO5: usize = 0x10005000;
|
|
||||||
const VIRTIO6: usize = 0x10006000;
|
|
||||||
|
|
||||||
struct VirtIOInputInner {
|
|
||||||
virtio_input: VirtIOInput<'static, VirtioHal>,
|
|
||||||
events: VecDeque<u64>,
|
|
||||||
}
|
|
||||||
|
|
||||||
struct VirtIOInputWrapper {
|
|
||||||
inner: UPIntrFreeCell<VirtIOInputInner>,
|
|
||||||
condvar: Condvar,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub trait InputDevice: Send + Sync + Any {
|
|
||||||
fn read_event(&self) -> u64;
|
|
||||||
fn handle_irq(&self);
|
|
||||||
fn is_empty(&self) -> bool;
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static::lazy_static!(
|
|
||||||
pub static ref KEYBOARD_DEVICE: Arc<dyn InputDevice> = Arc::new(VirtIOInputWrapper::new(VIRTIO5));
|
|
||||||
pub static ref MOUSE_DEVICE: Arc<dyn InputDevice> = Arc::new(VirtIOInputWrapper::new(VIRTIO6));
|
|
||||||
);
|
|
||||||
|
|
||||||
impl VirtIOInputWrapper {
|
|
||||||
pub fn new(addr: usize) -> Self {
|
|
||||||
let inner = VirtIOInputInner {
|
|
||||||
virtio_input: unsafe {
|
|
||||||
VirtIOInput::<VirtioHal>::new(&mut *(addr as *mut VirtIOHeader)).unwrap()
|
|
||||||
},
|
|
||||||
events: VecDeque::new(),
|
|
||||||
};
|
|
||||||
Self {
|
|
||||||
inner: unsafe { UPIntrFreeCell::new(inner) },
|
|
||||||
condvar: Condvar::new(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl InputDevice for VirtIOInputWrapper {
|
|
||||||
fn is_empty(&self) -> bool {
|
|
||||||
self.inner.exclusive_access().events.is_empty()
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read_event(&self) -> u64 {
|
|
||||||
loop {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
if let Some(event) = inner.events.pop_front() {
|
|
||||||
return event;
|
|
||||||
} else {
|
|
||||||
let task_cx_ptr = self.condvar.wait_no_sched();
|
|
||||||
drop(inner);
|
|
||||||
schedule(task_cx_ptr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn handle_irq(&self) {
|
|
||||||
let mut count = 0;
|
|
||||||
let mut result = 0;
|
|
||||||
self.inner.exclusive_session(|inner| {
|
|
||||||
inner.virtio_input.ack_interrupt();
|
|
||||||
while let Some(event) = inner.virtio_input.pop_pending_event() {
|
|
||||||
count += 1;
|
|
||||||
result = (event.event_type as u64) << 48
|
|
||||||
| (event.code as u64) << 32
|
|
||||||
| (event.value) as u64;
|
|
||||||
inner.events.push_back(result);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
if count > 0 {
|
|
||||||
self.condvar.signal();
|
|
||||||
};
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,13 +1,3 @@
|
||||||
pub mod block;
|
pub mod block;
|
||||||
pub mod bus;
|
|
||||||
pub mod chardev;
|
|
||||||
pub mod gpu;
|
|
||||||
pub mod input;
|
|
||||||
pub mod net;
|
|
||||||
pub mod plic;
|
|
||||||
|
|
||||||
pub use block::BLOCK_DEVICE;
|
pub use block::BLOCK_DEVICE;
|
||||||
pub use bus::*;
|
|
||||||
pub use gpu::*;
|
|
||||||
pub use input::*;
|
|
||||||
pub use net::*;
|
|
||||||
|
|
|
@ -1,46 +0,0 @@
|
||||||
use core::any::Any;
|
|
||||||
|
|
||||||
use crate::drivers::virtio::VirtioHal;
|
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use alloc::sync::Arc;
|
|
||||||
use lazy_static::*;
|
|
||||||
use virtio_drivers::{VirtIOHeader, VirtIONet};
|
|
||||||
|
|
||||||
const VIRTIO8: usize = 0x10004000;
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
pub static ref NET_DEVICE: Arc<dyn NetDevice> = Arc::new(VirtIONetWrapper::new());
|
|
||||||
}
|
|
||||||
|
|
||||||
pub trait NetDevice: Send + Sync + Any {
|
|
||||||
fn transmit(&self, data: &[u8]);
|
|
||||||
fn receive(&self, data: &mut [u8]) -> usize;
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct VirtIONetWrapper(UPIntrFreeCell<VirtIONet<'static, VirtioHal>>);
|
|
||||||
|
|
||||||
impl NetDevice for VirtIONetWrapper {
|
|
||||||
fn transmit(&self, data: &[u8]) {
|
|
||||||
self.0
|
|
||||||
.exclusive_access()
|
|
||||||
.send(data)
|
|
||||||
.expect("can't send data")
|
|
||||||
}
|
|
||||||
|
|
||||||
fn receive(&self, data: &mut [u8]) -> usize {
|
|
||||||
self.0
|
|
||||||
.exclusive_access()
|
|
||||||
.recv(data)
|
|
||||||
.expect("can't receive data")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl VirtIONetWrapper {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
unsafe {
|
|
||||||
let virtio = VirtIONet::<VirtioHal>::new(&mut *(VIRTIO8 as *mut VirtIOHeader))
|
|
||||||
.expect("can't create net device by virtio");
|
|
||||||
VirtIONetWrapper(UPIntrFreeCell::new(virtio))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,124 +0,0 @@
|
||||||
#[allow(clippy::upper_case_acronyms)]
|
|
||||||
pub struct PLIC {
|
|
||||||
base_addr: usize,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Copy, Clone)]
|
|
||||||
pub enum IntrTargetPriority {
|
|
||||||
Machine = 0,
|
|
||||||
Supervisor = 1,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl IntrTargetPriority {
|
|
||||||
pub fn supported_number() -> usize {
|
|
||||||
2
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl PLIC {
|
|
||||||
fn priority_ptr(&self, intr_source_id: usize) -> *mut u32 {
|
|
||||||
assert!(intr_source_id > 0 && intr_source_id <= 132);
|
|
||||||
(self.base_addr + intr_source_id * 4) as *mut u32
|
|
||||||
}
|
|
||||||
fn hart_id_with_priority(hart_id: usize, target_priority: IntrTargetPriority) -> usize {
|
|
||||||
let priority_num = IntrTargetPriority::supported_number();
|
|
||||||
hart_id * priority_num + target_priority as usize
|
|
||||||
}
|
|
||||||
fn enable_ptr(
|
|
||||||
&self,
|
|
||||||
hart_id: usize,
|
|
||||||
target_priority: IntrTargetPriority,
|
|
||||||
intr_source_id: usize,
|
|
||||||
) -> (*mut u32, usize) {
|
|
||||||
let id = Self::hart_id_with_priority(hart_id, target_priority);
|
|
||||||
let (reg_id, reg_shift) = (intr_source_id / 32, intr_source_id % 32);
|
|
||||||
(
|
|
||||||
(self.base_addr + 0x2000 + 0x80 * id + 0x4 * reg_id) as *mut u32,
|
|
||||||
reg_shift,
|
|
||||||
)
|
|
||||||
}
|
|
||||||
fn threshold_ptr_of_hart_with_priority(
|
|
||||||
&self,
|
|
||||||
hart_id: usize,
|
|
||||||
target_priority: IntrTargetPriority,
|
|
||||||
) -> *mut u32 {
|
|
||||||
let id = Self::hart_id_with_priority(hart_id, target_priority);
|
|
||||||
(self.base_addr + 0x20_0000 + 0x1000 * id) as *mut u32
|
|
||||||
}
|
|
||||||
fn claim_comp_ptr_of_hart_with_priority(
|
|
||||||
&self,
|
|
||||||
hart_id: usize,
|
|
||||||
target_priority: IntrTargetPriority,
|
|
||||||
) -> *mut u32 {
|
|
||||||
let id = Self::hart_id_with_priority(hart_id, target_priority);
|
|
||||||
(self.base_addr + 0x20_0004 + 0x1000 * id) as *mut u32
|
|
||||||
}
|
|
||||||
pub unsafe fn new(base_addr: usize) -> Self {
|
|
||||||
Self { base_addr }
|
|
||||||
}
|
|
||||||
pub fn set_priority(&mut self, intr_source_id: usize, priority: u32) {
|
|
||||||
assert!(priority < 8);
|
|
||||||
unsafe {
|
|
||||||
self.priority_ptr(intr_source_id).write_volatile(priority);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn get_priority(&mut self, intr_source_id: usize) -> u32 {
|
|
||||||
unsafe { self.priority_ptr(intr_source_id).read_volatile() & 7 }
|
|
||||||
}
|
|
||||||
pub fn enable(
|
|
||||||
&mut self,
|
|
||||||
hart_id: usize,
|
|
||||||
target_priority: IntrTargetPriority,
|
|
||||||
intr_source_id: usize,
|
|
||||||
) {
|
|
||||||
let (reg_ptr, shift) = self.enable_ptr(hart_id, target_priority, intr_source_id);
|
|
||||||
unsafe {
|
|
||||||
reg_ptr.write_volatile(reg_ptr.read_volatile() | 1 << shift);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn disable(
|
|
||||||
&mut self,
|
|
||||||
hart_id: usize,
|
|
||||||
target_priority: IntrTargetPriority,
|
|
||||||
intr_source_id: usize,
|
|
||||||
) {
|
|
||||||
let (reg_ptr, shift) = self.enable_ptr(hart_id, target_priority, intr_source_id);
|
|
||||||
unsafe {
|
|
||||||
reg_ptr.write_volatile(reg_ptr.read_volatile() & (!(1u32 << shift)));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn set_threshold(
|
|
||||||
&mut self,
|
|
||||||
hart_id: usize,
|
|
||||||
target_priority: IntrTargetPriority,
|
|
||||||
threshold: u32,
|
|
||||||
) {
|
|
||||||
assert!(threshold < 8);
|
|
||||||
let threshold_ptr = self.threshold_ptr_of_hart_with_priority(hart_id, target_priority);
|
|
||||||
unsafe {
|
|
||||||
threshold_ptr.write_volatile(threshold);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn get_threshold(&mut self, hart_id: usize, target_priority: IntrTargetPriority) -> u32 {
|
|
||||||
let threshold_ptr = self.threshold_ptr_of_hart_with_priority(hart_id, target_priority);
|
|
||||||
unsafe { threshold_ptr.read_volatile() & 7 }
|
|
||||||
}
|
|
||||||
pub fn claim(&mut self, hart_id: usize, target_priority: IntrTargetPriority) -> u32 {
|
|
||||||
let claim_comp_ptr = self.claim_comp_ptr_of_hart_with_priority(hart_id, target_priority);
|
|
||||||
unsafe { claim_comp_ptr.read_volatile() }
|
|
||||||
}
|
|
||||||
pub fn complete(
|
|
||||||
&mut self,
|
|
||||||
hart_id: usize,
|
|
||||||
target_priority: IntrTargetPriority,
|
|
||||||
completion: u32,
|
|
||||||
) {
|
|
||||||
let claim_comp_ptr = self.claim_comp_ptr_of_hart_with_priority(hart_id, target_priority);
|
|
||||||
unsafe {
|
|
||||||
claim_comp_ptr.write_volatile(completion);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -9,4 +9,4 @@ _start:
|
||||||
boot_stack_lower_bound:
|
boot_stack_lower_bound:
|
||||||
.space 4096 * 16
|
.space 4096 * 16
|
||||||
.globl boot_stack_top
|
.globl boot_stack_top
|
||||||
boot_stack_top:
|
boot_stack_top:
|
|
@ -1,32 +1,41 @@
|
||||||
|
//! `Arc<Inode>` -> `OSInodeInner`: In order to open files concurrently
|
||||||
|
//! we need to wrap `Inode` into `Arc`,but `Mutex` in `Inode` prevents
|
||||||
|
//! file systems from being accessed simultaneously
|
||||||
|
//!
|
||||||
|
//! `UPSafeCell<OSInodeInner>` -> `OSInode`: for static `ROOT_INODE`,we
|
||||||
|
//! need to wrap `OSInodeInner` into `UPSafeCell`
|
||||||
use super::File;
|
use super::File;
|
||||||
use crate::drivers::BLOCK_DEVICE;
|
use crate::drivers::BLOCK_DEVICE;
|
||||||
use crate::mm::UserBuffer;
|
use crate::mm::UserBuffer;
|
||||||
use crate::sync::UPIntrFreeCell;
|
use crate::sync::UPSafeCell;
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use alloc::vec::Vec;
|
use alloc::vec::Vec;
|
||||||
use bitflags::*;
|
use bitflags::*;
|
||||||
use easy_fs::{EasyFileSystem, Inode};
|
use easy_fs::{EasyFileSystem, Inode};
|
||||||
use lazy_static::*;
|
use lazy_static::*;
|
||||||
|
/// A wrapper around a filesystem inode
|
||||||
|
/// to implement File trait atop
|
||||||
pub struct OSInode {
|
pub struct OSInode {
|
||||||
readable: bool,
|
readable: bool,
|
||||||
writable: bool,
|
writable: bool,
|
||||||
inner: UPIntrFreeCell<OSInodeInner>,
|
inner: UPSafeCell<OSInodeInner>,
|
||||||
}
|
}
|
||||||
|
/// The OS inode inner in 'UPSafeCell'
|
||||||
pub struct OSInodeInner {
|
pub struct OSInodeInner {
|
||||||
offset: usize,
|
offset: usize,
|
||||||
inode: Arc<Inode>,
|
inode: Arc<Inode>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl OSInode {
|
impl OSInode {
|
||||||
|
/// Construct an OS inode from a inode
|
||||||
pub fn new(readable: bool, writable: bool, inode: Arc<Inode>) -> Self {
|
pub fn new(readable: bool, writable: bool, inode: Arc<Inode>) -> Self {
|
||||||
Self {
|
Self {
|
||||||
readable,
|
readable,
|
||||||
writable,
|
writable,
|
||||||
inner: unsafe { UPIntrFreeCell::new(OSInodeInner { offset: 0, inode }) },
|
inner: unsafe { UPSafeCell::new(OSInodeInner { offset: 0, inode }) },
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Read all data inside a inode into vector
|
||||||
pub fn read_all(&self) -> Vec<u8> {
|
pub fn read_all(&self) -> Vec<u8> {
|
||||||
let mut inner = self.inner.exclusive_access();
|
let mut inner = self.inner.exclusive_access();
|
||||||
let mut buffer = [0u8; 512];
|
let mut buffer = [0u8; 512];
|
||||||
|
@ -49,21 +58,27 @@ lazy_static! {
|
||||||
Arc::new(EasyFileSystem::root_inode(&efs))
|
Arc::new(EasyFileSystem::root_inode(&efs))
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
/// List all files in the filesystems
|
||||||
pub fn list_apps() {
|
pub fn list_apps() {
|
||||||
println!("/**** APPS ****");
|
println!("/**** APPS ****");
|
||||||
for app in ROOT_INODE.ls() {
|
for app in ROOT_INODE.ls() {
|
||||||
println!("{}", app);
|
println!("{}", app);
|
||||||
}
|
}
|
||||||
println!("**************/")
|
println!("**************/");
|
||||||
}
|
}
|
||||||
|
|
||||||
bitflags! {
|
bitflags! {
|
||||||
|
///Open file flags
|
||||||
pub struct OpenFlags: u32 {
|
pub struct OpenFlags: u32 {
|
||||||
|
///Read only
|
||||||
const RDONLY = 0;
|
const RDONLY = 0;
|
||||||
|
///Write only
|
||||||
const WRONLY = 1 << 0;
|
const WRONLY = 1 << 0;
|
||||||
|
///Read & Write
|
||||||
const RDWR = 1 << 1;
|
const RDWR = 1 << 1;
|
||||||
|
///Allow create
|
||||||
const CREATE = 1 << 9;
|
const CREATE = 1 << 9;
|
||||||
|
///Clear file and return an empty one
|
||||||
const TRUNC = 1 << 10;
|
const TRUNC = 1 << 10;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -81,7 +96,7 @@ impl OpenFlags {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Open file with flags
|
||||||
pub fn open_file(name: &str, flags: OpenFlags) -> Option<Arc<OSInode>> {
|
pub fn open_file(name: &str, flags: OpenFlags) -> Option<Arc<OSInode>> {
|
||||||
let (readable, writable) = flags.read_write();
|
let (readable, writable) = flags.read_write();
|
||||||
if flags.contains(OpenFlags::CREATE) {
|
if flags.contains(OpenFlags::CREATE) {
|
||||||
|
|
|
@ -1,16 +1,19 @@
|
||||||
|
//! File system in os
|
||||||
mod inode;
|
mod inode;
|
||||||
mod pipe;
|
|
||||||
mod stdio;
|
mod stdio;
|
||||||
|
|
||||||
use crate::mm::UserBuffer;
|
use crate::mm::UserBuffer;
|
||||||
|
/// File trait
|
||||||
pub trait File: Send + Sync {
|
pub trait File: Send + Sync {
|
||||||
|
/// If readable
|
||||||
fn readable(&self) -> bool;
|
fn readable(&self) -> bool;
|
||||||
|
/// If writable
|
||||||
fn writable(&self) -> bool;
|
fn writable(&self) -> bool;
|
||||||
|
/// Read file to `UserBuffer`
|
||||||
fn read(&self, buf: UserBuffer) -> usize;
|
fn read(&self, buf: UserBuffer) -> usize;
|
||||||
|
/// Write `UserBuffer` to file
|
||||||
fn write(&self, buf: UserBuffer) -> usize;
|
fn write(&self, buf: UserBuffer) -> usize;
|
||||||
}
|
}
|
||||||
|
|
||||||
pub use inode::{list_apps, open_file, OpenFlags};
|
pub use inode::{OSInode, OpenFlags, list_apps, open_file};
|
||||||
pub use pipe::make_pipe;
|
|
||||||
pub use stdio::{Stdin, Stdout};
|
pub use stdio::{Stdin, Stdout};
|
||||||
|
|
|
@ -1,173 +0,0 @@
|
||||||
use super::File;
|
|
||||||
use crate::mm::UserBuffer;
|
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use alloc::sync::{Arc, Weak};
|
|
||||||
|
|
||||||
use crate::task::suspend_current_and_run_next;
|
|
||||||
|
|
||||||
pub struct Pipe {
|
|
||||||
readable: bool,
|
|
||||||
writable: bool,
|
|
||||||
buffer: Arc<UPIntrFreeCell<PipeRingBuffer>>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Pipe {
|
|
||||||
pub fn read_end_with_buffer(buffer: Arc<UPIntrFreeCell<PipeRingBuffer>>) -> Self {
|
|
||||||
Self {
|
|
||||||
readable: true,
|
|
||||||
writable: false,
|
|
||||||
buffer,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn write_end_with_buffer(buffer: Arc<UPIntrFreeCell<PipeRingBuffer>>) -> Self {
|
|
||||||
Self {
|
|
||||||
readable: false,
|
|
||||||
writable: true,
|
|
||||||
buffer,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const RING_BUFFER_SIZE: usize = 32;
|
|
||||||
|
|
||||||
#[derive(Copy, Clone, PartialEq)]
|
|
||||||
enum RingBufferStatus {
|
|
||||||
Full,
|
|
||||||
Empty,
|
|
||||||
Normal,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct PipeRingBuffer {
|
|
||||||
arr: [u8; RING_BUFFER_SIZE],
|
|
||||||
head: usize,
|
|
||||||
tail: usize,
|
|
||||||
status: RingBufferStatus,
|
|
||||||
write_end: Option<Weak<Pipe>>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl PipeRingBuffer {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
Self {
|
|
||||||
arr: [0; RING_BUFFER_SIZE],
|
|
||||||
head: 0,
|
|
||||||
tail: 0,
|
|
||||||
status: RingBufferStatus::Empty,
|
|
||||||
write_end: None,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn set_write_end(&mut self, write_end: &Arc<Pipe>) {
|
|
||||||
self.write_end = Some(Arc::downgrade(write_end));
|
|
||||||
}
|
|
||||||
pub fn write_byte(&mut self, byte: u8) {
|
|
||||||
self.status = RingBufferStatus::Normal;
|
|
||||||
self.arr[self.tail] = byte;
|
|
||||||
self.tail = (self.tail + 1) % RING_BUFFER_SIZE;
|
|
||||||
if self.tail == self.head {
|
|
||||||
self.status = RingBufferStatus::Full;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn read_byte(&mut self) -> u8 {
|
|
||||||
self.status = RingBufferStatus::Normal;
|
|
||||||
let c = self.arr[self.head];
|
|
||||||
self.head = (self.head + 1) % RING_BUFFER_SIZE;
|
|
||||||
if self.head == self.tail {
|
|
||||||
self.status = RingBufferStatus::Empty;
|
|
||||||
}
|
|
||||||
c
|
|
||||||
}
|
|
||||||
pub fn available_read(&self) -> usize {
|
|
||||||
if self.status == RingBufferStatus::Empty {
|
|
||||||
0
|
|
||||||
} else if self.tail > self.head {
|
|
||||||
self.tail - self.head
|
|
||||||
} else {
|
|
||||||
self.tail + RING_BUFFER_SIZE - self.head
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn available_write(&self) -> usize {
|
|
||||||
if self.status == RingBufferStatus::Full {
|
|
||||||
0
|
|
||||||
} else {
|
|
||||||
RING_BUFFER_SIZE - self.available_read()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn all_write_ends_closed(&self) -> bool {
|
|
||||||
self.write_end.as_ref().unwrap().upgrade().is_none()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Return (read_end, write_end)
|
|
||||||
pub fn make_pipe() -> (Arc<Pipe>, Arc<Pipe>) {
|
|
||||||
let buffer = Arc::new(unsafe { UPIntrFreeCell::new(PipeRingBuffer::new()) });
|
|
||||||
let read_end = Arc::new(Pipe::read_end_with_buffer(buffer.clone()));
|
|
||||||
let write_end = Arc::new(Pipe::write_end_with_buffer(buffer.clone()));
|
|
||||||
buffer.exclusive_access().set_write_end(&write_end);
|
|
||||||
(read_end, write_end)
|
|
||||||
}
|
|
||||||
|
|
||||||
impl File for Pipe {
|
|
||||||
fn readable(&self) -> bool {
|
|
||||||
self.readable
|
|
||||||
}
|
|
||||||
fn writable(&self) -> bool {
|
|
||||||
self.writable
|
|
||||||
}
|
|
||||||
fn read(&self, buf: UserBuffer) -> usize {
|
|
||||||
assert!(self.readable());
|
|
||||||
let want_to_read = buf.len();
|
|
||||||
let mut buf_iter = buf.into_iter();
|
|
||||||
let mut already_read = 0usize;
|
|
||||||
loop {
|
|
||||||
let mut ring_buffer = self.buffer.exclusive_access();
|
|
||||||
let loop_read = ring_buffer.available_read();
|
|
||||||
if loop_read == 0 {
|
|
||||||
if ring_buffer.all_write_ends_closed() {
|
|
||||||
return already_read;
|
|
||||||
}
|
|
||||||
drop(ring_buffer);
|
|
||||||
suspend_current_and_run_next();
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
for _ in 0..loop_read {
|
|
||||||
if let Some(byte_ref) = buf_iter.next() {
|
|
||||||
unsafe {
|
|
||||||
*byte_ref = ring_buffer.read_byte();
|
|
||||||
}
|
|
||||||
already_read += 1;
|
|
||||||
if already_read == want_to_read {
|
|
||||||
return want_to_read;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return already_read;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
fn write(&self, buf: UserBuffer) -> usize {
|
|
||||||
assert!(self.writable());
|
|
||||||
let want_to_write = buf.len();
|
|
||||||
let mut buf_iter = buf.into_iter();
|
|
||||||
let mut already_write = 0usize;
|
|
||||||
loop {
|
|
||||||
let mut ring_buffer = self.buffer.exclusive_access();
|
|
||||||
let loop_write = ring_buffer.available_write();
|
|
||||||
if loop_write == 0 {
|
|
||||||
drop(ring_buffer);
|
|
||||||
suspend_current_and_run_next();
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
// write at most loop_write bytes
|
|
||||||
for _ in 0..loop_write {
|
|
||||||
if let Some(byte_ref) = buf_iter.next() {
|
|
||||||
ring_buffer.write_byte(unsafe { *byte_ref });
|
|
||||||
already_write += 1;
|
|
||||||
if already_write == want_to_write {
|
|
||||||
return want_to_write;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return already_write;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,9 +1,11 @@
|
||||||
|
//!Stdin & Stdout
|
||||||
use super::File;
|
use super::File;
|
||||||
use crate::drivers::chardev::CharDevice;
|
|
||||||
use crate::drivers::chardev::UART;
|
|
||||||
use crate::mm::UserBuffer;
|
use crate::mm::UserBuffer;
|
||||||
|
use crate::sbi::console_getchar;
|
||||||
|
use crate::task::suspend_current_and_run_next;
|
||||||
|
///Standard input
|
||||||
pub struct Stdin;
|
pub struct Stdin;
|
||||||
|
///Standard output
|
||||||
pub struct Stdout;
|
pub struct Stdout;
|
||||||
|
|
||||||
impl File for Stdin {
|
impl File for Stdin {
|
||||||
|
@ -15,8 +17,18 @@ impl File for Stdin {
|
||||||
}
|
}
|
||||||
fn read(&self, mut user_buf: UserBuffer) -> usize {
|
fn read(&self, mut user_buf: UserBuffer) -> usize {
|
||||||
assert_eq!(user_buf.len(), 1);
|
assert_eq!(user_buf.len(), 1);
|
||||||
//println!("before UART.read() in Stdin::read()");
|
// busy loop
|
||||||
let ch = UART.read();
|
let mut c: usize;
|
||||||
|
loop {
|
||||||
|
c = console_getchar();
|
||||||
|
if c == 0 {
|
||||||
|
suspend_current_and_run_next();
|
||||||
|
continue;
|
||||||
|
} else {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
let ch = c as u8;
|
||||||
unsafe {
|
unsafe {
|
||||||
user_buf.buffers[0].as_mut_ptr().write_volatile(ch);
|
user_buf.buffers[0].as_mut_ptr().write_volatile(ch);
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
|
//! The panic handler
|
||||||
use crate::sbi::shutdown;
|
use crate::sbi::shutdown;
|
||||||
use crate::task::current_kstack_top;
|
|
||||||
use core::arch::asm;
|
|
||||||
use core::panic::PanicInfo;
|
use core::panic::PanicInfo;
|
||||||
use log::*;
|
use log::*;
|
||||||
|
|
||||||
|
@ -11,28 +10,10 @@ fn panic(info: &PanicInfo) -> ! {
|
||||||
"[kernel] Panicked at {}:{} {}",
|
"[kernel] Panicked at {}:{} {}",
|
||||||
location.file(),
|
location.file(),
|
||||||
location.line(),
|
location.line(),
|
||||||
info.message().unwrap()
|
info.message()
|
||||||
);
|
);
|
||||||
} else {
|
} else {
|
||||||
error!("[kernel] Panicked: {}", info.message().unwrap());
|
error!("[kernel] Panicked: {}", info.message());
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
backtrace();
|
|
||||||
}
|
}
|
||||||
shutdown(true)
|
shutdown(true)
|
||||||
}
|
}
|
||||||
|
|
||||||
unsafe fn backtrace() {
|
|
||||||
let mut fp: usize;
|
|
||||||
let stop = current_kstack_top();
|
|
||||||
asm!("mv {}, s0", out(reg) fp);
|
|
||||||
println!("---START BACKTRACE---");
|
|
||||||
for i in 0..10 {
|
|
||||||
if fp == stop {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
println!("#{}:ra={:#x}", i, *((fp - 8) as *const usize));
|
|
||||||
fp = *((fp - 16) as *const usize);
|
|
||||||
}
|
|
||||||
println!("---END BACKTRACE---");
|
|
||||||
}
|
|
||||||
|
|
47
os/src/logging.rs
Normal file
47
os/src/logging.rs
Normal file
|
@ -0,0 +1,47 @@
|
||||||
|
/*!
|
||||||
|
|
||||||
|
本模块利用 log crate 为你提供了日志功能,使用方式见 main.rs.
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
use log::{self, Level, LevelFilter, Log, Metadata, Record};
|
||||||
|
|
||||||
|
struct SimpleLogger;
|
||||||
|
|
||||||
|
impl Log for SimpleLogger {
|
||||||
|
fn enabled(&self, _metadata: &Metadata) -> bool {
|
||||||
|
true
|
||||||
|
}
|
||||||
|
fn log(&self, record: &Record) {
|
||||||
|
if !self.enabled(record.metadata()) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
let color = match record.level() {
|
||||||
|
Level::Error => 31, // Red
|
||||||
|
Level::Warn => 93, // BrightYellow
|
||||||
|
Level::Info => 34, // Blue
|
||||||
|
Level::Debug => 32, // Green
|
||||||
|
Level::Trace => 90, // BrightBlack
|
||||||
|
};
|
||||||
|
println!(
|
||||||
|
"\u{1B}[{}m[{:>5}] {}\u{1B}[0m",
|
||||||
|
color,
|
||||||
|
record.level(),
|
||||||
|
record.args(),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
fn flush(&self) {}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn init() {
|
||||||
|
static LOGGER: SimpleLogger = SimpleLogger;
|
||||||
|
log::set_logger(&LOGGER).unwrap();
|
||||||
|
log::set_max_level(match option_env!("LOG") {
|
||||||
|
Some("ERROR") => LevelFilter::Error,
|
||||||
|
Some("WARN") => LevelFilter::Warn,
|
||||||
|
Some("INFO") => LevelFilter::Info,
|
||||||
|
Some("DEBUG") => LevelFilter::Debug,
|
||||||
|
Some("TRACE") => LevelFilter::Trace,
|
||||||
|
_ => LevelFilter::Info,
|
||||||
|
});
|
||||||
|
}
|
|
@ -1,15 +1,37 @@
|
||||||
|
//! The main module and entrypoint
|
||||||
|
//!
|
||||||
|
//! Various facilities of the kernels are implemented as submodules. The most
|
||||||
|
//! important ones are:
|
||||||
|
//!
|
||||||
|
//! - [`trap`]: Handles all cases of switching from userspace to the kernel
|
||||||
|
//! - [`task`]: Task management
|
||||||
|
//! - [`syscall`]: System call handling and implementation
|
||||||
|
//! - [`mm`]: Address map using SV39
|
||||||
|
//! - [`sync`]: Wrap a static data structure inside it so that we are able to access it without any `unsafe`.
|
||||||
|
//! - [`fs`]: Separate user from file system with some structures
|
||||||
|
//!
|
||||||
|
//! The operating system also starts in this module. Kernel code starts
|
||||||
|
//! executing from `entry.asm`, after which [`rust_main()`] is called to
|
||||||
|
//! initialize various pieces of functionality. (See its source code for
|
||||||
|
//! details.)
|
||||||
|
//!
|
||||||
|
//! We then call [`task::run_tasks()`] and for the first time go to
|
||||||
|
//! userspace.
|
||||||
|
|
||||||
|
#![deny(missing_docs)]
|
||||||
|
#![deny(warnings)]
|
||||||
|
#![allow(unused_imports)]
|
||||||
#![no_std]
|
#![no_std]
|
||||||
#![no_main]
|
#![no_main]
|
||||||
#![feature(panic_info_message)]
|
|
||||||
#![feature(alloc_error_handler)]
|
#![feature(alloc_error_handler)]
|
||||||
|
|
||||||
//use crate::drivers::{GPU_DEVICE, KEYBOARD_DEVICE, MOUSE_DEVICE, INPUT_CONDVAR};
|
|
||||||
use crate::drivers::{GPU_DEVICE, KEYBOARD_DEVICE, MOUSE_DEVICE};
|
|
||||||
extern crate alloc;
|
extern crate alloc;
|
||||||
|
|
||||||
#[macro_use]
|
#[macro_use]
|
||||||
extern crate bitflags;
|
extern crate bitflags;
|
||||||
|
|
||||||
|
use log::*;
|
||||||
|
|
||||||
#[path = "boards/qemu.rs"]
|
#[path = "boards/qemu.rs"]
|
||||||
mod board;
|
mod board;
|
||||||
|
|
||||||
|
@ -17,26 +39,25 @@ mod board;
|
||||||
mod console;
|
mod console;
|
||||||
mod config;
|
mod config;
|
||||||
mod drivers;
|
mod drivers;
|
||||||
mod fs;
|
pub mod fs;
|
||||||
mod lang_items;
|
pub mod lang_items;
|
||||||
mod mm;
|
mod logging;
|
||||||
mod net;
|
pub mod mm;
|
||||||
mod sbi;
|
pub mod sbi;
|
||||||
mod sync;
|
pub mod sync;
|
||||||
mod syscall;
|
pub mod syscall;
|
||||||
mod task;
|
pub mod task;
|
||||||
mod timer;
|
pub mod timer;
|
||||||
mod trap;
|
pub mod trap;
|
||||||
|
|
||||||
use crate::drivers::chardev::CharDevice;
|
use core::arch::global_asm;
|
||||||
use crate::drivers::chardev::UART;
|
|
||||||
|
|
||||||
core::arch::global_asm!(include_str!("entry.asm"));
|
|
||||||
|
|
||||||
|
global_asm!(include_str!("entry.asm"));
|
||||||
|
/// clear BSS segment
|
||||||
fn clear_bss() {
|
fn clear_bss() {
|
||||||
extern "C" {
|
unsafe extern "C" {
|
||||||
fn sbss();
|
safe fn sbss();
|
||||||
fn ebss();
|
safe fn ebss();
|
||||||
}
|
}
|
||||||
unsafe {
|
unsafe {
|
||||||
core::slice::from_raw_parts_mut(sbss as usize as *mut u8, ebss as usize - sbss as usize)
|
core::slice::from_raw_parts_mut(sbss as usize as *mut u8, ebss as usize - sbss as usize)
|
||||||
|
@ -44,33 +65,19 @@ fn clear_bss() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
use lazy_static::*;
|
/// the rust entry-point of os
|
||||||
use sync::UPIntrFreeCell;
|
#[unsafe(no_mangle)]
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
pub static ref DEV_NON_BLOCKING_ACCESS: UPIntrFreeCell<bool> =
|
|
||||||
unsafe { UPIntrFreeCell::new(false) };
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn rust_main() -> ! {
|
pub fn rust_main() -> ! {
|
||||||
clear_bss();
|
clear_bss();
|
||||||
|
logging::init();
|
||||||
|
info!("[kernel] Hello, world!");
|
||||||
mm::init();
|
mm::init();
|
||||||
UART.init();
|
mm::remap_test();
|
||||||
println!("KERN: init gpu");
|
|
||||||
let _gpu = GPU_DEVICE.clone();
|
|
||||||
println!("KERN: init keyboard");
|
|
||||||
let _keyboard = KEYBOARD_DEVICE.clone();
|
|
||||||
println!("KERN: init mouse");
|
|
||||||
let _mouse = MOUSE_DEVICE.clone();
|
|
||||||
println!("KERN: init trap");
|
|
||||||
trap::init();
|
trap::init();
|
||||||
trap::enable_timer_interrupt();
|
trap::enable_timer_interrupt();
|
||||||
timer::set_next_trigger();
|
timer::set_next_trigger();
|
||||||
board::device_init();
|
|
||||||
fs::list_apps();
|
fs::list_apps();
|
||||||
task::add_initproc();
|
task::add_initproc();
|
||||||
*DEV_NON_BLOCKING_ACCESS.exclusive_access() = true;
|
|
||||||
task::run_tasks();
|
task::run_tasks();
|
||||||
panic!("Unreachable in rust_main!");
|
panic!("Unreachable in rust_main!");
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
//! Implementation of physical and virtual address and page number.
|
||||||
use super::PageTableEntry;
|
use super::PageTableEntry;
|
||||||
use crate::config::{PAGE_SIZE, PAGE_SIZE_BITS};
|
use crate::config::{PAGE_SIZE, PAGE_SIZE_BITS};
|
||||||
use core::fmt::{self, Debug, Formatter};
|
use core::fmt::{self, Debug, Formatter};
|
||||||
|
@ -14,14 +15,17 @@ pub struct PhysAddr(pub usize);
|
||||||
|
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
#[derive(Copy, Clone, Ord, PartialOrd, Eq, PartialEq)]
|
#[derive(Copy, Clone, Ord, PartialOrd, Eq, PartialEq)]
|
||||||
|
///virtual address
|
||||||
pub struct VirtAddr(pub usize);
|
pub struct VirtAddr(pub usize);
|
||||||
|
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
#[derive(Copy, Clone, Ord, PartialOrd, Eq, PartialEq)]
|
#[derive(Copy, Clone, Ord, PartialOrd, Eq, PartialEq)]
|
||||||
|
///phiscal page number
|
||||||
pub struct PhysPageNum(pub usize);
|
pub struct PhysPageNum(pub usize);
|
||||||
|
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
#[derive(Copy, Clone, Ord, PartialOrd, Eq, PartialEq)]
|
#[derive(Copy, Clone, Ord, PartialOrd, Eq, PartialEq)]
|
||||||
|
///virtual page number
|
||||||
pub struct VirtPageNum(pub usize);
|
pub struct VirtPageNum(pub usize);
|
||||||
|
|
||||||
/// Debugging
|
/// Debugging
|
||||||
|
@ -95,11 +99,13 @@ impl From<VirtPageNum> for usize {
|
||||||
v.0
|
v.0
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///
|
||||||
impl VirtAddr {
|
impl VirtAddr {
|
||||||
|
///`VirtAddr`->`VirtPageNum`
|
||||||
pub fn floor(&self) -> VirtPageNum {
|
pub fn floor(&self) -> VirtPageNum {
|
||||||
VirtPageNum(self.0 / PAGE_SIZE)
|
VirtPageNum(self.0 / PAGE_SIZE)
|
||||||
}
|
}
|
||||||
|
///`VirtAddr`->`VirtPageNum`
|
||||||
pub fn ceil(&self) -> VirtPageNum {
|
pub fn ceil(&self) -> VirtPageNum {
|
||||||
if self.0 == 0 {
|
if self.0 == 0 {
|
||||||
VirtPageNum(0)
|
VirtPageNum(0)
|
||||||
|
@ -107,9 +113,11 @@ impl VirtAddr {
|
||||||
VirtPageNum((self.0 - 1 + PAGE_SIZE) / PAGE_SIZE)
|
VirtPageNum((self.0 - 1 + PAGE_SIZE) / PAGE_SIZE)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Get page offset
|
||||||
pub fn page_offset(&self) -> usize {
|
pub fn page_offset(&self) -> usize {
|
||||||
self.0 & (PAGE_SIZE - 1)
|
self.0 & (PAGE_SIZE - 1)
|
||||||
}
|
}
|
||||||
|
///Check page aligned
|
||||||
pub fn aligned(&self) -> bool {
|
pub fn aligned(&self) -> bool {
|
||||||
self.page_offset() == 0
|
self.page_offset() == 0
|
||||||
}
|
}
|
||||||
|
@ -126,9 +134,11 @@ impl From<VirtPageNum> for VirtAddr {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
impl PhysAddr {
|
impl PhysAddr {
|
||||||
|
///`PhysAddr`->`PhysPageNum`
|
||||||
pub fn floor(&self) -> PhysPageNum {
|
pub fn floor(&self) -> PhysPageNum {
|
||||||
PhysPageNum(self.0 / PAGE_SIZE)
|
PhysPageNum(self.0 / PAGE_SIZE)
|
||||||
}
|
}
|
||||||
|
///`PhysAddr`->`PhysPageNum`
|
||||||
pub fn ceil(&self) -> PhysPageNum {
|
pub fn ceil(&self) -> PhysPageNum {
|
||||||
if self.0 == 0 {
|
if self.0 == 0 {
|
||||||
PhysPageNum(0)
|
PhysPageNum(0)
|
||||||
|
@ -136,9 +146,11 @@ impl PhysAddr {
|
||||||
PhysPageNum((self.0 - 1 + PAGE_SIZE) / PAGE_SIZE)
|
PhysPageNum((self.0 - 1 + PAGE_SIZE) / PAGE_SIZE)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Get page offset
|
||||||
pub fn page_offset(&self) -> usize {
|
pub fn page_offset(&self) -> usize {
|
||||||
self.0 & (PAGE_SIZE - 1)
|
self.0 & (PAGE_SIZE - 1)
|
||||||
}
|
}
|
||||||
|
///Check page aligned
|
||||||
pub fn aligned(&self) -> bool {
|
pub fn aligned(&self) -> bool {
|
||||||
self.page_offset() == 0
|
self.page_offset() == 0
|
||||||
}
|
}
|
||||||
|
@ -156,6 +168,7 @@ impl From<PhysPageNum> for PhysAddr {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl VirtPageNum {
|
impl VirtPageNum {
|
||||||
|
///Return VPN 3 level index
|
||||||
pub fn indexes(&self) -> [usize; 3] {
|
pub fn indexes(&self) -> [usize; 3] {
|
||||||
let mut vpn = self.0;
|
let mut vpn = self.0;
|
||||||
let mut idx = [0usize; 3];
|
let mut idx = [0usize; 3];
|
||||||
|
@ -168,29 +181,35 @@ impl VirtPageNum {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl PhysAddr {
|
impl PhysAddr {
|
||||||
|
///Get reference to `PhysAddr` value
|
||||||
pub fn get_ref<T>(&self) -> &'static T {
|
pub fn get_ref<T>(&self) -> &'static T {
|
||||||
unsafe { (self.0 as *const T).as_ref().unwrap() }
|
unsafe { (self.0 as *const T).as_ref().unwrap() }
|
||||||
}
|
}
|
||||||
|
///Get mutable reference to `PhysAddr` value
|
||||||
pub fn get_mut<T>(&self) -> &'static mut T {
|
pub fn get_mut<T>(&self) -> &'static mut T {
|
||||||
unsafe { (self.0 as *mut T).as_mut().unwrap() }
|
unsafe { (self.0 as *mut T).as_mut().unwrap() }
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
impl PhysPageNum {
|
impl PhysPageNum {
|
||||||
|
///Get `PageTableEntry` on `PhysPageNum`
|
||||||
pub fn get_pte_array(&self) -> &'static mut [PageTableEntry] {
|
pub fn get_pte_array(&self) -> &'static mut [PageTableEntry] {
|
||||||
let pa: PhysAddr = (*self).into();
|
let pa: PhysAddr = (*self).into();
|
||||||
unsafe { core::slice::from_raw_parts_mut(pa.0 as *mut PageTableEntry, 512) }
|
unsafe { core::slice::from_raw_parts_mut(pa.0 as *mut PageTableEntry, 512) }
|
||||||
}
|
}
|
||||||
|
///Get u8 array on `PhysPageNum`
|
||||||
pub fn get_bytes_array(&self) -> &'static mut [u8] {
|
pub fn get_bytes_array(&self) -> &'static mut [u8] {
|
||||||
let pa: PhysAddr = (*self).into();
|
let pa: PhysAddr = (*self).into();
|
||||||
unsafe { core::slice::from_raw_parts_mut(pa.0 as *mut u8, 4096) }
|
unsafe { core::slice::from_raw_parts_mut(pa.0 as *mut u8, 4096) }
|
||||||
}
|
}
|
||||||
|
///Get Get mutable reference to `PhysAddr` value on `PhysPageNum`
|
||||||
pub fn get_mut<T>(&self) -> &'static mut T {
|
pub fn get_mut<T>(&self) -> &'static mut T {
|
||||||
let pa: PhysAddr = (*self).into();
|
let pa: PhysAddr = (*self).into();
|
||||||
pa.get_mut()
|
pa.get_mut()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Add value by one
|
||||||
pub trait StepByOne {
|
pub trait StepByOne {
|
||||||
|
///Add value by one
|
||||||
fn step(&mut self);
|
fn step(&mut self);
|
||||||
}
|
}
|
||||||
impl StepByOne for VirtPageNum {
|
impl StepByOne for VirtPageNum {
|
||||||
|
@ -205,6 +224,7 @@ impl StepByOne for PhysPageNum {
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Copy, Clone)]
|
#[derive(Copy, Clone)]
|
||||||
|
/// a simple range structure for type T
|
||||||
pub struct SimpleRange<T>
|
pub struct SimpleRange<T>
|
||||||
where
|
where
|
||||||
T: StepByOne + Copy + PartialEq + PartialOrd + Debug,
|
T: StepByOne + Copy + PartialEq + PartialOrd + Debug,
|
||||||
|
@ -237,6 +257,7 @@ where
|
||||||
SimpleRangeIterator::new(self.l, self.r)
|
SimpleRangeIterator::new(self.l, self.r)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// iterator for the simple range structure
|
||||||
pub struct SimpleRangeIterator<T>
|
pub struct SimpleRangeIterator<T>
|
||||||
where
|
where
|
||||||
T: StepByOne + Copy + PartialEq + PartialOrd + Debug,
|
T: StepByOne + Copy + PartialEq + PartialOrd + Debug,
|
||||||
|
@ -267,4 +288,5 @@ where
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// a simple range structure for virtual page number
|
||||||
pub type VPNRange = SimpleRange<VirtPageNum>;
|
pub type VPNRange = SimpleRange<VirtPageNum>;
|
||||||
|
|
|
@ -1,15 +1,20 @@
|
||||||
|
//! Implementation of [`FrameAllocator`] which
|
||||||
|
//! controls all the frames in the operating system.
|
||||||
use super::{PhysAddr, PhysPageNum};
|
use super::{PhysAddr, PhysPageNum};
|
||||||
use crate::config::MEMORY_END;
|
use crate::config::MEMORY_END;
|
||||||
use crate::sync::UPIntrFreeCell;
|
use crate::sync::UPSafeCell;
|
||||||
use alloc::vec::Vec;
|
use alloc::vec::Vec;
|
||||||
use core::fmt::{self, Debug, Formatter};
|
use core::fmt::{self, Debug, Formatter};
|
||||||
use lazy_static::*;
|
use lazy_static::*;
|
||||||
|
|
||||||
|
/// manage a frame which has the same lifecycle as the tracker
|
||||||
pub struct FrameTracker {
|
pub struct FrameTracker {
|
||||||
|
///
|
||||||
pub ppn: PhysPageNum,
|
pub ppn: PhysPageNum,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl FrameTracker {
|
impl FrameTracker {
|
||||||
|
///Create an empty `FrameTracker`
|
||||||
pub fn new(ppn: PhysPageNum) -> Self {
|
pub fn new(ppn: PhysPageNum) -> Self {
|
||||||
// page cleaning
|
// page cleaning
|
||||||
let bytes_array = ppn.get_bytes_array();
|
let bytes_array = ppn.get_bytes_array();
|
||||||
|
@ -35,10 +40,9 @@ impl Drop for FrameTracker {
|
||||||
trait FrameAllocator {
|
trait FrameAllocator {
|
||||||
fn new() -> Self;
|
fn new() -> Self;
|
||||||
fn alloc(&mut self) -> Option<PhysPageNum>;
|
fn alloc(&mut self) -> Option<PhysPageNum>;
|
||||||
fn alloc_more(&mut self, pages: usize) -> Option<Vec<PhysPageNum>>;
|
|
||||||
fn dealloc(&mut self, ppn: PhysPageNum);
|
fn dealloc(&mut self, ppn: PhysPageNum);
|
||||||
}
|
}
|
||||||
|
/// an implementation for frame allocator
|
||||||
pub struct StackFrameAllocator {
|
pub struct StackFrameAllocator {
|
||||||
current: usize,
|
current: usize,
|
||||||
end: usize,
|
end: usize,
|
||||||
|
@ -49,7 +53,7 @@ impl StackFrameAllocator {
|
||||||
pub fn init(&mut self, l: PhysPageNum, r: PhysPageNum) {
|
pub fn init(&mut self, l: PhysPageNum, r: PhysPageNum) {
|
||||||
self.current = l.0;
|
self.current = l.0;
|
||||||
self.end = r.0;
|
self.end = r.0;
|
||||||
// println!("last {} Physical Frames.", self.end - self.current);
|
println!("last {} Physical Frames.", self.end - self.current);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
impl FrameAllocator for StackFrameAllocator {
|
impl FrameAllocator for StackFrameAllocator {
|
||||||
|
@ -70,16 +74,6 @@ impl FrameAllocator for StackFrameAllocator {
|
||||||
Some((self.current - 1).into())
|
Some((self.current - 1).into())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
fn alloc_more(&mut self, pages: usize) -> Option<Vec<PhysPageNum>> {
|
|
||||||
if self.current + pages >= self.end {
|
|
||||||
None
|
|
||||||
} else {
|
|
||||||
self.current += pages;
|
|
||||||
let arr: Vec<usize> = (1..pages + 1).collect();
|
|
||||||
let v = arr.iter().map(|x| (self.current - x).into()).collect();
|
|
||||||
Some(v)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
fn dealloc(&mut self, ppn: PhysPageNum) {
|
fn dealloc(&mut self, ppn: PhysPageNum) {
|
||||||
let ppn = ppn.0;
|
let ppn = ppn.0;
|
||||||
// validity check
|
// validity check
|
||||||
|
@ -94,39 +88,34 @@ impl FrameAllocator for StackFrameAllocator {
|
||||||
type FrameAllocatorImpl = StackFrameAllocator;
|
type FrameAllocatorImpl = StackFrameAllocator;
|
||||||
|
|
||||||
lazy_static! {
|
lazy_static! {
|
||||||
pub static ref FRAME_ALLOCATOR: UPIntrFreeCell<FrameAllocatorImpl> =
|
/// frame allocator instance through lazy_static!
|
||||||
unsafe { UPIntrFreeCell::new(FrameAllocatorImpl::new()) };
|
pub static ref FRAME_ALLOCATOR: UPSafeCell<FrameAllocatorImpl> =
|
||||||
|
unsafe { UPSafeCell::new(FrameAllocatorImpl::new()) };
|
||||||
}
|
}
|
||||||
|
/// initiate the frame allocator using `ekernel` and `MEMORY_END`
|
||||||
pub fn init_frame_allocator() {
|
pub fn init_frame_allocator() {
|
||||||
extern "C" {
|
unsafe extern "C" {
|
||||||
fn ekernel();
|
safe fn ekernel();
|
||||||
}
|
}
|
||||||
FRAME_ALLOCATOR.exclusive_access().init(
|
FRAME_ALLOCATOR.exclusive_access().init(
|
||||||
PhysAddr::from(ekernel as usize).ceil(),
|
PhysAddr::from(ekernel as usize).ceil(),
|
||||||
PhysAddr::from(MEMORY_END).floor(),
|
PhysAddr::from(MEMORY_END).floor(),
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
/// allocate a frame
|
||||||
pub fn frame_alloc() -> Option<FrameTracker> {
|
pub fn frame_alloc() -> Option<FrameTracker> {
|
||||||
FRAME_ALLOCATOR
|
FRAME_ALLOCATOR
|
||||||
.exclusive_access()
|
.exclusive_access()
|
||||||
.alloc()
|
.alloc()
|
||||||
.map(FrameTracker::new)
|
.map(FrameTracker::new)
|
||||||
}
|
}
|
||||||
|
/// deallocate a frame
|
||||||
pub fn frame_alloc_more(num: usize) -> Option<Vec<FrameTracker>> {
|
|
||||||
FRAME_ALLOCATOR
|
|
||||||
.exclusive_access()
|
|
||||||
.alloc_more(num)
|
|
||||||
.map(|x| x.iter().map(|&t| FrameTracker::new(t)).collect())
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn frame_dealloc(ppn: PhysPageNum) {
|
pub fn frame_dealloc(ppn: PhysPageNum) {
|
||||||
FRAME_ALLOCATOR.exclusive_access().dealloc(ppn);
|
FRAME_ALLOCATOR.exclusive_access().dealloc(ppn);
|
||||||
}
|
}
|
||||||
|
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
|
/// a simple test for frame allocator
|
||||||
pub fn frame_allocator_test() {
|
pub fn frame_allocator_test() {
|
||||||
let mut v: Vec<FrameTracker> = Vec::new();
|
let mut v: Vec<FrameTracker> = Vec::new();
|
||||||
for i in 0..5 {
|
for i in 0..5 {
|
||||||
|
@ -143,20 +132,3 @@ pub fn frame_allocator_test() {
|
||||||
drop(v);
|
drop(v);
|
||||||
println!("frame_allocator_test passed!");
|
println!("frame_allocator_test passed!");
|
||||||
}
|
}
|
||||||
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn frame_allocator_alloc_more_test() {
|
|
||||||
let mut v: Vec<FrameTracker> = Vec::new();
|
|
||||||
let frames = frame_alloc_more(5).unwrap();
|
|
||||||
for frame in &frames {
|
|
||||||
println!("{:?}", frame);
|
|
||||||
}
|
|
||||||
v.extend(frames);
|
|
||||||
v.clear();
|
|
||||||
let frames = frame_alloc_more(5).unwrap();
|
|
||||||
for frame in &frames {
|
|
||||||
println!("{:?}", frame);
|
|
||||||
}
|
|
||||||
drop(v);
|
|
||||||
println!("frame_allocator_test passed!");
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,21 +1,25 @@
|
||||||
|
//! The global allocator
|
||||||
use crate::config::KERNEL_HEAP_SIZE;
|
use crate::config::KERNEL_HEAP_SIZE;
|
||||||
use buddy_system_allocator::LockedHeap;
|
use buddy_system_allocator::LockedHeap;
|
||||||
|
use core::ptr::addr_of_mut;
|
||||||
|
|
||||||
#[global_allocator]
|
#[global_allocator]
|
||||||
|
/// heap allocator instance
|
||||||
static HEAP_ALLOCATOR: LockedHeap = LockedHeap::empty();
|
static HEAP_ALLOCATOR: LockedHeap = LockedHeap::empty();
|
||||||
|
|
||||||
#[alloc_error_handler]
|
#[alloc_error_handler]
|
||||||
|
/// panic when heap allocation error occurs
|
||||||
pub fn handle_alloc_error(layout: core::alloc::Layout) -> ! {
|
pub fn handle_alloc_error(layout: core::alloc::Layout) -> ! {
|
||||||
panic!("Heap allocation error, layout = {:?}", layout);
|
panic!("Heap allocation error, layout = {:?}", layout);
|
||||||
}
|
}
|
||||||
|
/// heap space ([u8; KERNEL_HEAP_SIZE])
|
||||||
static mut HEAP_SPACE: [u8; KERNEL_HEAP_SIZE] = [0; KERNEL_HEAP_SIZE];
|
static mut HEAP_SPACE: [u8; KERNEL_HEAP_SIZE] = [0; KERNEL_HEAP_SIZE];
|
||||||
|
/// initiate heap allocator
|
||||||
pub fn init_heap() {
|
pub fn init_heap() {
|
||||||
unsafe {
|
unsafe {
|
||||||
HEAP_ALLOCATOR
|
HEAP_ALLOCATOR
|
||||||
.lock()
|
.lock()
|
||||||
.init(HEAP_SPACE.as_ptr() as usize, KERNEL_HEAP_SIZE);
|
.init(addr_of_mut!(HEAP_SPACE) as usize, KERNEL_HEAP_SIZE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -23,9 +27,9 @@ pub fn init_heap() {
|
||||||
pub fn heap_test() {
|
pub fn heap_test() {
|
||||||
use alloc::boxed::Box;
|
use alloc::boxed::Box;
|
||||||
use alloc::vec::Vec;
|
use alloc::vec::Vec;
|
||||||
extern "C" {
|
unsafe extern "C" {
|
||||||
fn sbss();
|
safe fn sbss();
|
||||||
fn ebss();
|
safe fn ebss();
|
||||||
}
|
}
|
||||||
let bss_range = sbss as usize..ebss as usize;
|
let bss_range = sbss as usize..ebss as usize;
|
||||||
let a = Box::new(5);
|
let a = Box::new(5);
|
||||||
|
|
|
@ -1,9 +1,11 @@
|
||||||
use super::{frame_alloc, FrameTracker};
|
//! Implementation of [`MapArea`] and [`MemorySet`].
|
||||||
|
|
||||||
|
use super::{FrameTracker, frame_alloc};
|
||||||
use super::{PTEFlags, PageTable, PageTableEntry};
|
use super::{PTEFlags, PageTable, PageTableEntry};
|
||||||
use super::{PhysAddr, PhysPageNum, VirtAddr, VirtPageNum};
|
use super::{PhysAddr, PhysPageNum, VirtAddr, VirtPageNum};
|
||||||
use super::{StepByOne, VPNRange};
|
use super::{StepByOne, VPNRange};
|
||||||
use crate::config::{MEMORY_END, MMIO, PAGE_SIZE, TRAMPOLINE};
|
use crate::config::{MEMORY_END, MMIO, PAGE_SIZE, TRAMPOLINE, TRAP_CONTEXT, USER_STACK_SIZE};
|
||||||
use crate::sync::UPIntrFreeCell;
|
use crate::sync::UPSafeCell;
|
||||||
use alloc::collections::BTreeMap;
|
use alloc::collections::BTreeMap;
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use alloc::vec::Vec;
|
use alloc::vec::Vec;
|
||||||
|
@ -11,40 +13,43 @@ use core::arch::asm;
|
||||||
use lazy_static::*;
|
use lazy_static::*;
|
||||||
use riscv::register::satp;
|
use riscv::register::satp;
|
||||||
|
|
||||||
extern "C" {
|
unsafe extern "C" {
|
||||||
fn stext();
|
safe fn stext();
|
||||||
fn etext();
|
safe fn etext();
|
||||||
fn srodata();
|
safe fn srodata();
|
||||||
fn erodata();
|
safe fn erodata();
|
||||||
fn sdata();
|
safe fn sdata();
|
||||||
fn edata();
|
safe fn edata();
|
||||||
fn sbss_with_stack();
|
safe fn sbss_with_stack();
|
||||||
fn ebss();
|
safe fn ebss();
|
||||||
fn ekernel();
|
safe fn ekernel();
|
||||||
fn strampoline();
|
safe fn strampoline();
|
||||||
}
|
}
|
||||||
|
|
||||||
lazy_static! {
|
lazy_static! {
|
||||||
pub static ref KERNEL_SPACE: Arc<UPIntrFreeCell<MemorySet>> =
|
/// a memory set instance through lazy_static! managing kernel space
|
||||||
Arc::new(unsafe { UPIntrFreeCell::new(MemorySet::new_kernel()) });
|
pub static ref KERNEL_SPACE: Arc<UPSafeCell<MemorySet>> =
|
||||||
|
Arc::new(unsafe { UPSafeCell::new(MemorySet::new_kernel()) });
|
||||||
}
|
}
|
||||||
|
///Get kernelspace root ppn
|
||||||
pub fn kernel_token() -> usize {
|
pub fn kernel_token() -> usize {
|
||||||
KERNEL_SPACE.exclusive_access().token()
|
KERNEL_SPACE.exclusive_access().token()
|
||||||
}
|
}
|
||||||
|
/// memory set structure, controls virtual-memory space
|
||||||
pub struct MemorySet {
|
pub struct MemorySet {
|
||||||
page_table: PageTable,
|
page_table: PageTable,
|
||||||
areas: Vec<MapArea>,
|
areas: Vec<MapArea>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl MemorySet {
|
impl MemorySet {
|
||||||
|
///Create an empty `MemorySet`
|
||||||
pub fn new_bare() -> Self {
|
pub fn new_bare() -> Self {
|
||||||
Self {
|
Self {
|
||||||
page_table: PageTable::new(),
|
page_table: PageTable::new(),
|
||||||
areas: Vec::new(),
|
areas: Vec::new(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Get pagetable `root_ppn`
|
||||||
pub fn token(&self) -> usize {
|
pub fn token(&self) -> usize {
|
||||||
self.page_table.token()
|
self.page_table.token()
|
||||||
}
|
}
|
||||||
|
@ -60,6 +65,7 @@ impl MemorySet {
|
||||||
None,
|
None,
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
///Remove `MapArea` that starts with `start_vpn`
|
||||||
pub fn remove_area_with_start_vpn(&mut self, start_vpn: VirtPageNum) {
|
pub fn remove_area_with_start_vpn(&mut self, start_vpn: VirtPageNum) {
|
||||||
if let Some((idx, area)) = self
|
if let Some((idx, area)) = self
|
||||||
.areas
|
.areas
|
||||||
|
@ -71,10 +77,7 @@ impl MemorySet {
|
||||||
self.areas.remove(idx);
|
self.areas.remove(idx);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
/// Add a new MapArea into this MemorySet.
|
fn push(&mut self, mut map_area: MapArea, data: Option<&[u8]>) {
|
||||||
/// Assuming that there are no conflicts in the virtual address
|
|
||||||
/// space.
|
|
||||||
pub fn push(&mut self, mut map_area: MapArea, data: Option<&[u8]>) {
|
|
||||||
map_area.map(&mut self.page_table);
|
map_area.map(&mut self.page_table);
|
||||||
if let Some(data) = data {
|
if let Some(data) = data {
|
||||||
map_area.copy_data(&self.page_table, data);
|
map_area.copy_data(&self.page_table, data);
|
||||||
|
@ -95,14 +98,14 @@ impl MemorySet {
|
||||||
// map trampoline
|
// map trampoline
|
||||||
memory_set.map_trampoline();
|
memory_set.map_trampoline();
|
||||||
// map kernel sections
|
// map kernel sections
|
||||||
// println!(".text [{:#x}, {:#x})", stext as usize, etext as usize);
|
println!(".text [{:#x}, {:#x})", stext as usize, etext as usize);
|
||||||
// println!(".rodata [{:#x}, {:#x})", srodata as usize, erodata as usize);
|
println!(".rodata [{:#x}, {:#x})", srodata as usize, erodata as usize);
|
||||||
// println!(".data [{:#x}, {:#x})", sdata as usize, edata as usize);
|
println!(".data [{:#x}, {:#x})", sdata as usize, edata as usize);
|
||||||
// println!(
|
println!(
|
||||||
// ".bss [{:#x}, {:#x})",
|
".bss [{:#x}, {:#x})",
|
||||||
// sbss_with_stack as usize, ebss as usize
|
sbss_with_stack as usize, ebss as usize
|
||||||
// );
|
);
|
||||||
// println!("mapping .text section");
|
println!("mapping .text section");
|
||||||
memory_set.push(
|
memory_set.push(
|
||||||
MapArea::new(
|
MapArea::new(
|
||||||
(stext as usize).into(),
|
(stext as usize).into(),
|
||||||
|
@ -112,7 +115,7 @@ impl MemorySet {
|
||||||
),
|
),
|
||||||
None,
|
None,
|
||||||
);
|
);
|
||||||
// println!("mapping .rodata section");
|
println!("mapping .rodata section");
|
||||||
memory_set.push(
|
memory_set.push(
|
||||||
MapArea::new(
|
MapArea::new(
|
||||||
(srodata as usize).into(),
|
(srodata as usize).into(),
|
||||||
|
@ -122,7 +125,7 @@ impl MemorySet {
|
||||||
),
|
),
|
||||||
None,
|
None,
|
||||||
);
|
);
|
||||||
// println!("mapping .data section");
|
println!("mapping .data section");
|
||||||
memory_set.push(
|
memory_set.push(
|
||||||
MapArea::new(
|
MapArea::new(
|
||||||
(sdata as usize).into(),
|
(sdata as usize).into(),
|
||||||
|
@ -132,7 +135,7 @@ impl MemorySet {
|
||||||
),
|
),
|
||||||
None,
|
None,
|
||||||
);
|
);
|
||||||
// println!("mapping .bss section");
|
println!("mapping .bss section");
|
||||||
memory_set.push(
|
memory_set.push(
|
||||||
MapArea::new(
|
MapArea::new(
|
||||||
(sbss_with_stack as usize).into(),
|
(sbss_with_stack as usize).into(),
|
||||||
|
@ -142,7 +145,7 @@ impl MemorySet {
|
||||||
),
|
),
|
||||||
None,
|
None,
|
||||||
);
|
);
|
||||||
// println!("mapping physical memory");
|
println!("mapping physical memory");
|
||||||
memory_set.push(
|
memory_set.push(
|
||||||
MapArea::new(
|
MapArea::new(
|
||||||
(ekernel as usize).into(),
|
(ekernel as usize).into(),
|
||||||
|
@ -152,7 +155,7 @@ impl MemorySet {
|
||||||
),
|
),
|
||||||
None,
|
None,
|
||||||
);
|
);
|
||||||
//println!("mapping memory-mapped registers");
|
println!("mapping memory-mapped registers");
|
||||||
for pair in MMIO {
|
for pair in MMIO {
|
||||||
memory_set.push(
|
memory_set.push(
|
||||||
MapArea::new(
|
MapArea::new(
|
||||||
|
@ -166,8 +169,8 @@ impl MemorySet {
|
||||||
}
|
}
|
||||||
memory_set
|
memory_set
|
||||||
}
|
}
|
||||||
/// Include sections in elf and trampoline,
|
/// Include sections in elf and trampoline and TrapContext and user stack,
|
||||||
/// also returns user_sp_base and entry point.
|
/// also returns user_sp and entry point.
|
||||||
pub fn from_elf(elf_data: &[u8]) -> (Self, usize, usize) {
|
pub fn from_elf(elf_data: &[u8]) -> (Self, usize, usize) {
|
||||||
let mut memory_set = Self::new_bare();
|
let mut memory_set = Self::new_bare();
|
||||||
// map trampoline
|
// map trampoline
|
||||||
|
@ -203,15 +206,38 @@ impl MemorySet {
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
// map user stack with U flags
|
||||||
let max_end_va: VirtAddr = max_end_vpn.into();
|
let max_end_va: VirtAddr = max_end_vpn.into();
|
||||||
let mut user_stack_base: usize = max_end_va.into();
|
let mut user_stack_bottom: usize = max_end_va.into();
|
||||||
user_stack_base += PAGE_SIZE;
|
// guard page
|
||||||
|
user_stack_bottom += PAGE_SIZE;
|
||||||
|
let user_stack_top = user_stack_bottom + USER_STACK_SIZE;
|
||||||
|
memory_set.push(
|
||||||
|
MapArea::new(
|
||||||
|
user_stack_bottom.into(),
|
||||||
|
user_stack_top.into(),
|
||||||
|
MapType::Framed,
|
||||||
|
MapPermission::R | MapPermission::W | MapPermission::U,
|
||||||
|
),
|
||||||
|
None,
|
||||||
|
);
|
||||||
|
// map TrapContext
|
||||||
|
memory_set.push(
|
||||||
|
MapArea::new(
|
||||||
|
TRAP_CONTEXT.into(),
|
||||||
|
TRAMPOLINE.into(),
|
||||||
|
MapType::Framed,
|
||||||
|
MapPermission::R | MapPermission::W,
|
||||||
|
),
|
||||||
|
None,
|
||||||
|
);
|
||||||
(
|
(
|
||||||
memory_set,
|
memory_set,
|
||||||
user_stack_base,
|
user_stack_top,
|
||||||
elf.header.pt2.entry_point() as usize,
|
elf.header.pt2.entry_point() as usize,
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
///Clone a same `MemorySet`
|
||||||
pub fn from_existed_user(user_space: &MemorySet) -> MemorySet {
|
pub fn from_existed_user(user_space: &MemorySet) -> MemorySet {
|
||||||
let mut memory_set = Self::new_bare();
|
let mut memory_set = Self::new_bare();
|
||||||
// map trampoline
|
// map trampoline
|
||||||
|
@ -231,6 +257,7 @@ impl MemorySet {
|
||||||
}
|
}
|
||||||
memory_set
|
memory_set
|
||||||
}
|
}
|
||||||
|
///Refresh TLB with `sfence.vma`
|
||||||
pub fn activate(&self) {
|
pub fn activate(&self) {
|
||||||
let satp = self.page_table.token();
|
let satp = self.page_table.token();
|
||||||
unsafe {
|
unsafe {
|
||||||
|
@ -238,15 +265,17 @@ impl MemorySet {
|
||||||
asm!("sfence.vma");
|
asm!("sfence.vma");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Translate throuth pagetable
|
||||||
pub fn translate(&self, vpn: VirtPageNum) -> Option<PageTableEntry> {
|
pub fn translate(&self, vpn: VirtPageNum) -> Option<PageTableEntry> {
|
||||||
self.page_table.translate(vpn)
|
self.page_table.translate(vpn)
|
||||||
}
|
}
|
||||||
|
///Remove all `MapArea`
|
||||||
pub fn recycle_data_pages(&mut self) {
|
pub fn recycle_data_pages(&mut self) {
|
||||||
//*self = Self::new_bare();
|
//*self = Self::new_bare();
|
||||||
self.areas.clear();
|
self.areas.clear();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// map area structure, controls a contiguous piece of virtual memory
|
||||||
pub struct MapArea {
|
pub struct MapArea {
|
||||||
vpn_range: VPNRange,
|
vpn_range: VPNRange,
|
||||||
data_frames: BTreeMap<VirtPageNum, FrameTracker>,
|
data_frames: BTreeMap<VirtPageNum, FrameTracker>,
|
||||||
|
@ -289,11 +318,6 @@ impl MapArea {
|
||||||
ppn = frame.ppn;
|
ppn = frame.ppn;
|
||||||
self.data_frames.insert(vpn, frame);
|
self.data_frames.insert(vpn, frame);
|
||||||
}
|
}
|
||||||
MapType::Linear(pn_offset) => {
|
|
||||||
// check for sv39
|
|
||||||
assert!(vpn.0 < (1usize << 27));
|
|
||||||
ppn = PhysPageNum((vpn.0 as isize + pn_offset) as usize);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
let pte_flags = PTEFlags::from_bits(self.map_perm.bits).unwrap();
|
let pte_flags = PTEFlags::from_bits(self.map_perm.bits).unwrap();
|
||||||
page_table.map(vpn, ppn, pte_flags);
|
page_table.map(vpn, ppn, pte_flags);
|
||||||
|
@ -339,42 +363,53 @@ impl MapArea {
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Copy, Clone, PartialEq, Debug)]
|
#[derive(Copy, Clone, PartialEq, Debug)]
|
||||||
|
/// map type for memory set: identical or framed
|
||||||
pub enum MapType {
|
pub enum MapType {
|
||||||
Identical,
|
Identical,
|
||||||
Framed,
|
Framed,
|
||||||
/// offset of page num
|
|
||||||
Linear(isize),
|
|
||||||
}
|
}
|
||||||
|
|
||||||
bitflags! {
|
bitflags! {
|
||||||
|
/// map permission corresponding to that in pte: `R W X U`
|
||||||
pub struct MapPermission: u8 {
|
pub struct MapPermission: u8 {
|
||||||
|
///Readable
|
||||||
const R = 1 << 1;
|
const R = 1 << 1;
|
||||||
|
///Writable
|
||||||
const W = 1 << 2;
|
const W = 1 << 2;
|
||||||
|
///Excutable
|
||||||
const X = 1 << 3;
|
const X = 1 << 3;
|
||||||
|
///Accessible in U mode
|
||||||
const U = 1 << 4;
|
const U = 1 << 4;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
|
///Check PageTable running correctly
|
||||||
pub fn remap_test() {
|
pub fn remap_test() {
|
||||||
let mut kernel_space = KERNEL_SPACE.exclusive_access();
|
let mut kernel_space = KERNEL_SPACE.exclusive_access();
|
||||||
let mid_text: VirtAddr = ((stext as usize + etext as usize) / 2).into();
|
let mid_text: VirtAddr = ((stext as usize + etext as usize) / 2).into();
|
||||||
let mid_rodata: VirtAddr = ((srodata as usize + erodata as usize) / 2).into();
|
let mid_rodata: VirtAddr = ((srodata as usize + erodata as usize) / 2).into();
|
||||||
let mid_data: VirtAddr = ((sdata as usize + edata as usize) / 2).into();
|
let mid_data: VirtAddr = ((sdata as usize + edata as usize) / 2).into();
|
||||||
assert!(!kernel_space
|
assert!(
|
||||||
.page_table
|
!kernel_space
|
||||||
.translate(mid_text.floor())
|
.page_table
|
||||||
.unwrap()
|
.translate(mid_text.floor())
|
||||||
.writable(),);
|
.unwrap()
|
||||||
assert!(!kernel_space
|
.writable(),
|
||||||
.page_table
|
);
|
||||||
.translate(mid_rodata.floor())
|
assert!(
|
||||||
.unwrap()
|
!kernel_space
|
||||||
.writable(),);
|
.page_table
|
||||||
assert!(!kernel_space
|
.translate(mid_rodata.floor())
|
||||||
.page_table
|
.unwrap()
|
||||||
.translate(mid_data.floor())
|
.writable(),
|
||||||
.unwrap()
|
);
|
||||||
.executable(),);
|
assert!(
|
||||||
|
!kernel_space
|
||||||
|
.page_table
|
||||||
|
.translate(mid_data.floor())
|
||||||
|
.unwrap()
|
||||||
|
.executable(),
|
||||||
|
);
|
||||||
println!("remap_test passed!");
|
println!("remap_test passed!");
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,19 +1,27 @@
|
||||||
|
//! Memory management implementation
|
||||||
|
//!
|
||||||
|
//! SV39 page-based virtual-memory architecture for RV64 systems, and
|
||||||
|
//! everything about memory management, like frame allocator, page table,
|
||||||
|
//! map area and memory set, is implemented here.
|
||||||
|
//!
|
||||||
|
//! Every task or process has a memory_set to control its virtual memory.
|
||||||
mod address;
|
mod address;
|
||||||
mod frame_allocator;
|
mod frame_allocator;
|
||||||
mod heap_allocator;
|
mod heap_allocator;
|
||||||
mod memory_set;
|
mod memory_set;
|
||||||
mod page_table;
|
mod page_table;
|
||||||
|
|
||||||
pub use address::VPNRange;
|
use address::VPNRange;
|
||||||
pub use address::{PhysAddr, PhysPageNum, StepByOne, VirtAddr, VirtPageNum};
|
pub use address::{PhysAddr, PhysPageNum, StepByOne, VirtAddr, VirtPageNum};
|
||||||
pub use frame_allocator::{frame_alloc, frame_alloc_more, frame_dealloc, FrameTracker};
|
pub use frame_allocator::{FrameTracker, frame_alloc, frame_dealloc};
|
||||||
pub use memory_set::{kernel_token, MapArea, MapPermission, MapType, MemorySet, KERNEL_SPACE};
|
pub use memory_set::remap_test;
|
||||||
|
pub use memory_set::{KERNEL_SPACE, MapPermission, MemorySet, kernel_token};
|
||||||
use page_table::PTEFlags;
|
use page_table::PTEFlags;
|
||||||
pub use page_table::{
|
pub use page_table::{
|
||||||
translated_byte_buffer, translated_ref, translated_refmut, translated_str, PageTable,
|
PageTable, PageTableEntry, UserBuffer, UserBufferIterator, translated_byte_buffer,
|
||||||
PageTableEntry, UserBuffer,
|
translated_ref, translated_refmut, translated_str,
|
||||||
};
|
};
|
||||||
|
/// initiate heap allocator, frame allocator and kernel space
|
||||||
pub fn init() {
|
pub fn init() {
|
||||||
heap_allocator::init_heap();
|
heap_allocator::init_heap();
|
||||||
frame_allocator::init_frame_allocator();
|
frame_allocator::init_frame_allocator();
|
||||||
|
|
|
@ -1,4 +1,6 @@
|
||||||
use super::{frame_alloc, FrameTracker, PhysAddr, PhysPageNum, StepByOne, VirtAddr, VirtPageNum};
|
//! Implementation of [`PageTableEntry`] and [`PageTable`].
|
||||||
|
|
||||||
|
use super::{FrameTracker, PhysAddr, PhysPageNum, StepByOne, VirtAddr, VirtPageNum, frame_alloc};
|
||||||
use alloc::string::String;
|
use alloc::string::String;
|
||||||
use alloc::vec;
|
use alloc::vec;
|
||||||
use alloc::vec::Vec;
|
use alloc::vec::Vec;
|
||||||
|
@ -19,39 +21,49 @@ bitflags! {
|
||||||
|
|
||||||
#[derive(Copy, Clone)]
|
#[derive(Copy, Clone)]
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
|
/// page table entry structure
|
||||||
pub struct PageTableEntry {
|
pub struct PageTableEntry {
|
||||||
|
///PTE
|
||||||
pub bits: usize,
|
pub bits: usize,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl PageTableEntry {
|
impl PageTableEntry {
|
||||||
|
///Create a PTE from ppn
|
||||||
pub fn new(ppn: PhysPageNum, flags: PTEFlags) -> Self {
|
pub fn new(ppn: PhysPageNum, flags: PTEFlags) -> Self {
|
||||||
PageTableEntry {
|
PageTableEntry {
|
||||||
bits: ppn.0 << 10 | flags.bits as usize,
|
bits: ppn.0 << 10 | flags.bits as usize,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Return an empty PTE
|
||||||
pub fn empty() -> Self {
|
pub fn empty() -> Self {
|
||||||
PageTableEntry { bits: 0 }
|
PageTableEntry { bits: 0 }
|
||||||
}
|
}
|
||||||
|
///Return 44bit ppn
|
||||||
pub fn ppn(&self) -> PhysPageNum {
|
pub fn ppn(&self) -> PhysPageNum {
|
||||||
(self.bits >> 10 & ((1usize << 44) - 1)).into()
|
(self.bits >> 10 & ((1usize << 44) - 1)).into()
|
||||||
}
|
}
|
||||||
|
///Return 10bit flag
|
||||||
pub fn flags(&self) -> PTEFlags {
|
pub fn flags(&self) -> PTEFlags {
|
||||||
PTEFlags::from_bits(self.bits as u8).unwrap()
|
PTEFlags::from_bits(self.bits as u8).unwrap()
|
||||||
}
|
}
|
||||||
|
///Check PTE valid
|
||||||
pub fn is_valid(&self) -> bool {
|
pub fn is_valid(&self) -> bool {
|
||||||
(self.flags() & PTEFlags::V) != PTEFlags::empty()
|
(self.flags() & PTEFlags::V) != PTEFlags::empty()
|
||||||
}
|
}
|
||||||
|
///Check PTE readable
|
||||||
pub fn readable(&self) -> bool {
|
pub fn readable(&self) -> bool {
|
||||||
(self.flags() & PTEFlags::R) != PTEFlags::empty()
|
(self.flags() & PTEFlags::R) != PTEFlags::empty()
|
||||||
}
|
}
|
||||||
|
///Check PTE writable
|
||||||
pub fn writable(&self) -> bool {
|
pub fn writable(&self) -> bool {
|
||||||
(self.flags() & PTEFlags::W) != PTEFlags::empty()
|
(self.flags() & PTEFlags::W) != PTEFlags::empty()
|
||||||
}
|
}
|
||||||
|
///Check PTE executable
|
||||||
pub fn executable(&self) -> bool {
|
pub fn executable(&self) -> bool {
|
||||||
(self.flags() & PTEFlags::X) != PTEFlags::empty()
|
(self.flags() & PTEFlags::X) != PTEFlags::empty()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Record root ppn and has the same lifetime as 1 and 2 level `PageTableEntry`
|
||||||
pub struct PageTable {
|
pub struct PageTable {
|
||||||
root_ppn: PhysPageNum,
|
root_ppn: PhysPageNum,
|
||||||
frames: Vec<FrameTracker>,
|
frames: Vec<FrameTracker>,
|
||||||
|
@ -59,6 +71,7 @@ pub struct PageTable {
|
||||||
|
|
||||||
/// Assume that it won't oom when creating/mapping.
|
/// Assume that it won't oom when creating/mapping.
|
||||||
impl PageTable {
|
impl PageTable {
|
||||||
|
/// Create an empty `PageTable`
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
let frame = frame_alloc().unwrap();
|
let frame = frame_alloc().unwrap();
|
||||||
PageTable {
|
PageTable {
|
||||||
|
@ -73,6 +86,7 @@ impl PageTable {
|
||||||
frames: Vec::new(),
|
frames: Vec::new(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Find phsical address by virtual address, create a frame if not exist
|
||||||
fn find_pte_create(&mut self, vpn: VirtPageNum) -> Option<&mut PageTableEntry> {
|
fn find_pte_create(&mut self, vpn: VirtPageNum) -> Option<&mut PageTableEntry> {
|
||||||
let idxs = vpn.indexes();
|
let idxs = vpn.indexes();
|
||||||
let mut ppn = self.root_ppn;
|
let mut ppn = self.root_ppn;
|
||||||
|
@ -92,6 +106,7 @@ impl PageTable {
|
||||||
}
|
}
|
||||||
result
|
result
|
||||||
}
|
}
|
||||||
|
/// Find phsical address by virtual address
|
||||||
fn find_pte(&self, vpn: VirtPageNum) -> Option<&mut PageTableEntry> {
|
fn find_pte(&self, vpn: VirtPageNum) -> Option<&mut PageTableEntry> {
|
||||||
let idxs = vpn.indexes();
|
let idxs = vpn.indexes();
|
||||||
let mut ppn = self.root_ppn;
|
let mut ppn = self.root_ppn;
|
||||||
|
@ -110,20 +125,24 @@ impl PageTable {
|
||||||
result
|
result
|
||||||
}
|
}
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
|
/// Create a mapping form `vpn` to `ppn`
|
||||||
pub fn map(&mut self, vpn: VirtPageNum, ppn: PhysPageNum, flags: PTEFlags) {
|
pub fn map(&mut self, vpn: VirtPageNum, ppn: PhysPageNum, flags: PTEFlags) {
|
||||||
let pte = self.find_pte_create(vpn).unwrap();
|
let pte = self.find_pte_create(vpn).unwrap();
|
||||||
assert!(!pte.is_valid(), "vpn {:?} is mapped before mapping", vpn);
|
assert!(!pte.is_valid(), "vpn {:?} is mapped before mapping", vpn);
|
||||||
*pte = PageTableEntry::new(ppn, flags | PTEFlags::V);
|
*pte = PageTableEntry::new(ppn, flags | PTEFlags::V);
|
||||||
}
|
}
|
||||||
#[allow(unused)]
|
#[allow(unused)]
|
||||||
|
/// Delete a mapping form `vpn`
|
||||||
pub fn unmap(&mut self, vpn: VirtPageNum) {
|
pub fn unmap(&mut self, vpn: VirtPageNum) {
|
||||||
let pte = self.find_pte(vpn).unwrap();
|
let pte = self.find_pte(vpn).unwrap();
|
||||||
assert!(pte.is_valid(), "vpn {:?} is invalid before unmapping", vpn);
|
assert!(pte.is_valid(), "vpn {:?} is invalid before unmapping", vpn);
|
||||||
*pte = PageTableEntry::empty();
|
*pte = PageTableEntry::empty();
|
||||||
}
|
}
|
||||||
|
/// Translate `VirtPageNum` to `PageTableEntry`
|
||||||
pub fn translate(&self, vpn: VirtPageNum) -> Option<PageTableEntry> {
|
pub fn translate(&self, vpn: VirtPageNum) -> Option<PageTableEntry> {
|
||||||
self.find_pte(vpn).map(|pte| *pte)
|
self.find_pte(vpn).map(|pte| *pte)
|
||||||
}
|
}
|
||||||
|
/// Translate `VirtAddr` to `PhysAddr`
|
||||||
pub fn translate_va(&self, va: VirtAddr) -> Option<PhysAddr> {
|
pub fn translate_va(&self, va: VirtAddr) -> Option<PhysAddr> {
|
||||||
self.find_pte(va.clone().floor()).map(|pte| {
|
self.find_pte(va.clone().floor()).map(|pte| {
|
||||||
let aligned_pa: PhysAddr = pte.ppn().into();
|
let aligned_pa: PhysAddr = pte.ppn().into();
|
||||||
|
@ -132,11 +151,12 @@ impl PageTable {
|
||||||
(aligned_pa_usize + offset).into()
|
(aligned_pa_usize + offset).into()
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
/// Get root ppn
|
||||||
pub fn token(&self) -> usize {
|
pub fn token(&self) -> usize {
|
||||||
8usize << 60 | self.root_ppn.0
|
8usize << 60 | self.root_ppn.0
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Translate a pointer to a mutable u8 Vec through page table
|
||||||
pub fn translated_byte_buffer(token: usize, ptr: *const u8, len: usize) -> Vec<&'static mut [u8]> {
|
pub fn translated_byte_buffer(token: usize, ptr: *const u8, len: usize) -> Vec<&'static mut [u8]> {
|
||||||
let page_table = PageTable::from_token(token);
|
let page_table = PageTable::from_token(token);
|
||||||
let mut start = ptr as usize;
|
let mut start = ptr as usize;
|
||||||
|
@ -159,7 +179,7 @@ pub fn translated_byte_buffer(token: usize, ptr: *const u8, len: usize) -> Vec<&
|
||||||
v
|
v
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Load a string from other address spaces into kernel space without an end `\0`.
|
/// Translate a pointer to a mutable u8 Vec end with `\0` through page table to a `String`
|
||||||
pub fn translated_str(token: usize, ptr: *const u8) -> String {
|
pub fn translated_str(token: usize, ptr: *const u8) -> String {
|
||||||
let page_table = PageTable::from_token(token);
|
let page_table = PageTable::from_token(token);
|
||||||
let mut string = String::new();
|
let mut string = String::new();
|
||||||
|
@ -178,6 +198,8 @@ pub fn translated_str(token: usize, ptr: *const u8) -> String {
|
||||||
string
|
string
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[allow(unused)]
|
||||||
|
///Translate a generic through page table and return a reference
|
||||||
pub fn translated_ref<T>(token: usize, ptr: *const T) -> &'static T {
|
pub fn translated_ref<T>(token: usize, ptr: *const T) -> &'static T {
|
||||||
let page_table = PageTable::from_token(token);
|
let page_table = PageTable::from_token(token);
|
||||||
page_table
|
page_table
|
||||||
|
@ -185,7 +207,7 @@ pub fn translated_ref<T>(token: usize, ptr: *const T) -> &'static T {
|
||||||
.unwrap()
|
.unwrap()
|
||||||
.get_ref()
|
.get_ref()
|
||||||
}
|
}
|
||||||
|
///Translate a generic through page table and return a mutable reference
|
||||||
pub fn translated_refmut<T>(token: usize, ptr: *mut T) -> &'static mut T {
|
pub fn translated_refmut<T>(token: usize, ptr: *mut T) -> &'static mut T {
|
||||||
let page_table = PageTable::from_token(token);
|
let page_table = PageTable::from_token(token);
|
||||||
let va = ptr as usize;
|
let va = ptr as usize;
|
||||||
|
@ -194,15 +216,18 @@ pub fn translated_refmut<T>(token: usize, ptr: *mut T) -> &'static mut T {
|
||||||
.unwrap()
|
.unwrap()
|
||||||
.get_mut()
|
.get_mut()
|
||||||
}
|
}
|
||||||
|
///Array of u8 slice that user communicate with os
|
||||||
pub struct UserBuffer {
|
pub struct UserBuffer {
|
||||||
|
///U8 vec
|
||||||
pub buffers: Vec<&'static mut [u8]>,
|
pub buffers: Vec<&'static mut [u8]>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl UserBuffer {
|
impl UserBuffer {
|
||||||
|
///Create a `UserBuffer` by parameter
|
||||||
pub fn new(buffers: Vec<&'static mut [u8]>) -> Self {
|
pub fn new(buffers: Vec<&'static mut [u8]>) -> Self {
|
||||||
Self { buffers }
|
Self { buffers }
|
||||||
}
|
}
|
||||||
|
///Length of `UserBuffer`
|
||||||
pub fn len(&self) -> usize {
|
pub fn len(&self) -> usize {
|
||||||
let mut total: usize = 0;
|
let mut total: usize = 0;
|
||||||
for b in self.buffers.iter() {
|
for b in self.buffers.iter() {
|
||||||
|
@ -223,7 +248,7 @@ impl IntoIterator for UserBuffer {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// Iterator of `UserBuffer`
|
||||||
pub struct UserBufferIterator {
|
pub struct UserBufferIterator {
|
||||||
buffers: Vec<&'static mut [u8]>,
|
buffers: Vec<&'static mut [u8]>,
|
||||||
current_buffer: usize,
|
current_buffer: usize,
|
||||||
|
|
|
@ -1,136 +0,0 @@
|
||||||
pub mod port_table;
|
|
||||||
pub mod socket;
|
|
||||||
pub mod tcp;
|
|
||||||
pub mod udp;
|
|
||||||
|
|
||||||
pub use lose_net_stack::IPv4;
|
|
||||||
|
|
||||||
use alloc::{sync::Arc, vec};
|
|
||||||
use lose_net_stack::{results::Packet, LoseStack, MacAddress, TcpFlags};
|
|
||||||
|
|
||||||
use crate::{
|
|
||||||
drivers::NET_DEVICE,
|
|
||||||
net::socket::{get_socket, push_data},
|
|
||||||
sync::UPIntrFreeCell,
|
|
||||||
};
|
|
||||||
|
|
||||||
use self::{port_table::check_accept, socket::set_s_a_by_index};
|
|
||||||
|
|
||||||
pub struct NetStack(UPIntrFreeCell<LoseStack>);
|
|
||||||
|
|
||||||
impl NetStack {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
unsafe {
|
|
||||||
NetStack(UPIntrFreeCell::new(LoseStack::new(
|
|
||||||
IPv4::new(10, 0, 2, 15),
|
|
||||||
MacAddress::new([0x52, 0x54, 0x00, 0x12, 0x34, 0x56]),
|
|
||||||
)))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static::lazy_static! {
|
|
||||||
static ref LOSE_NET_STACK: Arc<NetStack> = Arc::new(NetStack::new());
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn net_interrupt_handler() {
|
|
||||||
let mut recv_buf = vec![0u8; 1024];
|
|
||||||
|
|
||||||
let len = NET_DEVICE.receive(&mut recv_buf);
|
|
||||||
|
|
||||||
let packet = LOSE_NET_STACK
|
|
||||||
.0
|
|
||||||
.exclusive_access()
|
|
||||||
.analysis(&recv_buf[..len]);
|
|
||||||
|
|
||||||
// println!("[kernel] receive a packet");
|
|
||||||
// hexdump(&recv_buf[..len]);
|
|
||||||
|
|
||||||
match packet {
|
|
||||||
Packet::ARP(arp_packet) => {
|
|
||||||
let lose_stack = LOSE_NET_STACK.0.exclusive_access();
|
|
||||||
let reply_packet = arp_packet
|
|
||||||
.reply_packet(lose_stack.ip, lose_stack.mac)
|
|
||||||
.expect("can't build reply");
|
|
||||||
let reply_data = reply_packet.build_data();
|
|
||||||
NET_DEVICE.transmit(&reply_data)
|
|
||||||
}
|
|
||||||
|
|
||||||
Packet::UDP(udp_packet) => {
|
|
||||||
let target = udp_packet.source_ip;
|
|
||||||
let lport = udp_packet.dest_port;
|
|
||||||
let rport = udp_packet.source_port;
|
|
||||||
|
|
||||||
if let Some(socket_index) = get_socket(target, lport, rport) {
|
|
||||||
push_data(socket_index, udp_packet.data.to_vec());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
Packet::TCP(tcp_packet) => {
|
|
||||||
let target = tcp_packet.source_ip;
|
|
||||||
let lport = tcp_packet.dest_port;
|
|
||||||
let rport = tcp_packet.source_port;
|
|
||||||
let flags = tcp_packet.flags;
|
|
||||||
|
|
||||||
if flags.contains(TcpFlags::S) {
|
|
||||||
// if it has a port to accept, then response the request
|
|
||||||
if check_accept(lport, &tcp_packet).is_some() {
|
|
||||||
let mut reply_packet = tcp_packet.ack();
|
|
||||||
reply_packet.flags = TcpFlags::S | TcpFlags::A;
|
|
||||||
NET_DEVICE.transmit(&reply_packet.build_data());
|
|
||||||
}
|
|
||||||
return;
|
|
||||||
} else if tcp_packet.flags.contains(TcpFlags::F) {
|
|
||||||
// tcp disconnected
|
|
||||||
let reply_packet = tcp_packet.ack();
|
|
||||||
NET_DEVICE.transmit(&reply_packet.build_data());
|
|
||||||
|
|
||||||
let mut end_packet = reply_packet.ack();
|
|
||||||
end_packet.flags |= TcpFlags::F;
|
|
||||||
NET_DEVICE.transmit(&end_packet.build_data());
|
|
||||||
} else if tcp_packet.flags.contains(TcpFlags::A) && tcp_packet.data_len == 0 {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if let Some(socket_index) = get_socket(target, lport, rport) {
|
|
||||||
push_data(socket_index, tcp_packet.data.to_vec());
|
|
||||||
set_s_a_by_index(socket_index, tcp_packet.seq, tcp_packet.ack);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
_ => {}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn hexdump(data: &[u8]) {
|
|
||||||
const PRELAND_WIDTH: usize = 70;
|
|
||||||
println!("[kernel] {:-^1$}", " hexdump ", PRELAND_WIDTH);
|
|
||||||
for offset in (0..data.len()).step_by(16) {
|
|
||||||
print!("[kernel] ");
|
|
||||||
for i in 0..16 {
|
|
||||||
if offset + i < data.len() {
|
|
||||||
print!("{:02x} ", data[offset + i]);
|
|
||||||
} else {
|
|
||||||
print!("{:02} ", "");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
print!("{:>6}", ' ');
|
|
||||||
|
|
||||||
for i in 0..16 {
|
|
||||||
if offset + i < data.len() {
|
|
||||||
let c = data[offset + i];
|
|
||||||
if c >= 0x20 && c <= 0x7e {
|
|
||||||
print!("{}", c as char);
|
|
||||||
} else {
|
|
||||||
print!(".");
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
print!("{:02} ", "");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
println!("");
|
|
||||||
}
|
|
||||||
println!("[kernel] {:-^1$}", " hexdump end ", PRELAND_WIDTH);
|
|
||||||
}
|
|
|
@ -1,141 +0,0 @@
|
||||||
use alloc::{sync::Arc, vec::Vec};
|
|
||||||
use lazy_static::lazy_static;
|
|
||||||
use lose_net_stack::packets::tcp::TCPPacket;
|
|
||||||
|
|
||||||
use crate::fs::File;
|
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use crate::task::TaskControlBlock;
|
|
||||||
|
|
||||||
use super::tcp::TCP;
|
|
||||||
|
|
||||||
pub struct Port {
|
|
||||||
pub port: u16,
|
|
||||||
pub receivable: bool,
|
|
||||||
pub schedule: Option<Arc<TaskControlBlock>>,
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref LISTEN_TABLE: UPIntrFreeCell<Vec<Option<Port>>> =
|
|
||||||
unsafe { UPIntrFreeCell::new(Vec::new()) };
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn listen(port: u16) -> Option<usize> {
|
|
||||||
let mut listen_table = LISTEN_TABLE.exclusive_access();
|
|
||||||
let mut index = usize::MAX;
|
|
||||||
for i in 0..listen_table.len() {
|
|
||||||
if listen_table[i].is_none() {
|
|
||||||
index = i;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
let listen_port = Port {
|
|
||||||
port,
|
|
||||||
receivable: false,
|
|
||||||
schedule: None,
|
|
||||||
};
|
|
||||||
|
|
||||||
if index == usize::MAX {
|
|
||||||
listen_table.push(Some(listen_port));
|
|
||||||
Some(listen_table.len() - 1)
|
|
||||||
} else {
|
|
||||||
listen_table[index] = Some(listen_port);
|
|
||||||
Some(index)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// can accept request
|
|
||||||
pub fn accept(listen_index: usize, task: Arc<TaskControlBlock>) {
|
|
||||||
let mut listen_table = LISTEN_TABLE.exclusive_access();
|
|
||||||
assert!(listen_index < listen_table.len());
|
|
||||||
let listen_port = listen_table[listen_index].as_mut();
|
|
||||||
assert!(listen_port.is_some());
|
|
||||||
let listen_port = listen_port.unwrap();
|
|
||||||
listen_port.receivable = true;
|
|
||||||
listen_port.schedule = Some(task);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn port_acceptable(listen_index: usize) -> bool {
|
|
||||||
let mut listen_table = LISTEN_TABLE.exclusive_access();
|
|
||||||
assert!(listen_index < listen_table.len());
|
|
||||||
|
|
||||||
let listen_port = listen_table[listen_index].as_mut();
|
|
||||||
listen_port.map_or(false, |x| x.receivable)
|
|
||||||
}
|
|
||||||
|
|
||||||
// check whether it can accept request
|
|
||||||
pub fn check_accept(port: u16, tcp_packet: &TCPPacket) -> Option<()> {
|
|
||||||
LISTEN_TABLE.exclusive_session(|listen_table| {
|
|
||||||
let mut listen_ports: Vec<&mut Option<Port>> = listen_table
|
|
||||||
.iter_mut()
|
|
||||||
.filter(|x| match x {
|
|
||||||
Some(t) => t.port == port && t.receivable == true,
|
|
||||||
None => false,
|
|
||||||
})
|
|
||||||
.collect();
|
|
||||||
if listen_ports.len() == 0 {
|
|
||||||
None
|
|
||||||
} else {
|
|
||||||
let listen_port = listen_ports[0].as_mut().unwrap();
|
|
||||||
let task = listen_port.schedule.clone().unwrap();
|
|
||||||
// wakeup_task(Arc::clone(&listen_port.schedule.clone().unwrap()));
|
|
||||||
listen_port.schedule = None;
|
|
||||||
listen_port.receivable = false;
|
|
||||||
|
|
||||||
accept_connection(port, tcp_packet, task);
|
|
||||||
Some(())
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn accept_connection(_port: u16, tcp_packet: &TCPPacket, task: Arc<TaskControlBlock>) {
|
|
||||||
let process = task.process.upgrade().unwrap();
|
|
||||||
let mut inner = process.inner_exclusive_access();
|
|
||||||
let fd = inner.alloc_fd();
|
|
||||||
|
|
||||||
let tcp_socket = TCP::new(
|
|
||||||
tcp_packet.source_ip,
|
|
||||||
tcp_packet.dest_port,
|
|
||||||
tcp_packet.source_port,
|
|
||||||
tcp_packet.seq,
|
|
||||||
tcp_packet.ack,
|
|
||||||
);
|
|
||||||
|
|
||||||
inner.fd_table[fd] = Some(Arc::new(tcp_socket));
|
|
||||||
|
|
||||||
let cx = task.inner_exclusive_access().get_trap_cx();
|
|
||||||
cx.x[10] = fd;
|
|
||||||
}
|
|
||||||
|
|
||||||
// store in the fd_table, delete the listen table when close the application.
|
|
||||||
pub struct PortFd(usize);
|
|
||||||
|
|
||||||
impl PortFd {
|
|
||||||
pub fn new(port_index: usize) -> Self {
|
|
||||||
PortFd(port_index)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Drop for PortFd {
|
|
||||||
fn drop(&mut self) {
|
|
||||||
LISTEN_TABLE.exclusive_access()[self.0] = None
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl File for PortFd {
|
|
||||||
fn readable(&self) -> bool {
|
|
||||||
false
|
|
||||||
}
|
|
||||||
|
|
||||||
fn writable(&self) -> bool {
|
|
||||||
false
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read(&self, _buf: crate::mm::UserBuffer) -> usize {
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
fn write(&self, _buf: crate::mm::UserBuffer) -> usize {
|
|
||||||
0
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,123 +0,0 @@
|
||||||
use alloc::collections::VecDeque;
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use lazy_static::lazy_static;
|
|
||||||
use lose_net_stack::IPv4;
|
|
||||||
|
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
|
|
||||||
// TODO: specify the protocol, TCP or UDP
|
|
||||||
pub struct Socket {
|
|
||||||
pub raddr: IPv4, // remote address
|
|
||||||
pub lport: u16, // local port
|
|
||||||
pub rport: u16, // rempote port
|
|
||||||
pub buffers: VecDeque<Vec<u8>>, // datas
|
|
||||||
pub seq: u32,
|
|
||||||
pub ack: u32,
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref SOCKET_TABLE: UPIntrFreeCell<Vec<Option<Socket>>> =
|
|
||||||
unsafe { UPIntrFreeCell::new(Vec::new()) };
|
|
||||||
}
|
|
||||||
|
|
||||||
/// get the seq and ack by socket index
|
|
||||||
pub fn get_s_a_by_index(index: usize) -> Option<(u32, u32)> {
|
|
||||||
let socket_table = SOCKET_TABLE.exclusive_access();
|
|
||||||
|
|
||||||
assert!(index < socket_table.len());
|
|
||||||
|
|
||||||
socket_table.get(index).map_or(None, |x| match x {
|
|
||||||
Some(x) => Some((x.seq, x.ack)),
|
|
||||||
None => None,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn set_s_a_by_index(index: usize, seq: u32, ack: u32) {
|
|
||||||
let mut socket_table = SOCKET_TABLE.exclusive_access();
|
|
||||||
|
|
||||||
assert!(socket_table.len() > index);
|
|
||||||
assert!(socket_table[index].is_some());
|
|
||||||
|
|
||||||
let sock = socket_table[index].as_mut().unwrap();
|
|
||||||
|
|
||||||
sock.ack = ack;
|
|
||||||
sock.seq = seq;
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn get_socket(raddr: IPv4, lport: u16, rport: u16) -> Option<usize> {
|
|
||||||
let socket_table = SOCKET_TABLE.exclusive_access();
|
|
||||||
for i in 0..socket_table.len() {
|
|
||||||
let sock = &socket_table[i];
|
|
||||||
if sock.is_none() {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
let sock = sock.as_ref().unwrap();
|
|
||||||
if sock.raddr == raddr && sock.lport == lport && sock.rport == rport {
|
|
||||||
return Some(i);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
None
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn add_socket(raddr: IPv4, lport: u16, rport: u16) -> Option<usize> {
|
|
||||||
if get_socket(raddr, lport, rport).is_some() {
|
|
||||||
return None;
|
|
||||||
}
|
|
||||||
|
|
||||||
let mut socket_table = SOCKET_TABLE.exclusive_access();
|
|
||||||
let mut index = usize::MAX;
|
|
||||||
for i in 0..socket_table.len() {
|
|
||||||
if socket_table[i].is_none() {
|
|
||||||
index = i;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
let socket = Socket {
|
|
||||||
raddr,
|
|
||||||
lport,
|
|
||||||
rport,
|
|
||||||
buffers: VecDeque::new(),
|
|
||||||
seq: 0,
|
|
||||||
ack: 0,
|
|
||||||
};
|
|
||||||
|
|
||||||
if index == usize::MAX {
|
|
||||||
socket_table.push(Some(socket));
|
|
||||||
Some(socket_table.len() - 1)
|
|
||||||
} else {
|
|
||||||
socket_table[index] = Some(socket);
|
|
||||||
Some(index)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn remove_socket(index: usize) {
|
|
||||||
let mut socket_table = SOCKET_TABLE.exclusive_access();
|
|
||||||
|
|
||||||
assert!(socket_table.len() > index);
|
|
||||||
|
|
||||||
socket_table[index] = None;
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn push_data(index: usize, data: Vec<u8>) {
|
|
||||||
let mut socket_table = SOCKET_TABLE.exclusive_access();
|
|
||||||
|
|
||||||
assert!(socket_table.len() > index);
|
|
||||||
assert!(socket_table[index].is_some());
|
|
||||||
|
|
||||||
socket_table[index]
|
|
||||||
.as_mut()
|
|
||||||
.unwrap()
|
|
||||||
.buffers
|
|
||||||
.push_back(data);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn pop_data(index: usize) -> Option<Vec<u8>> {
|
|
||||||
let mut socket_table = SOCKET_TABLE.exclusive_access();
|
|
||||||
|
|
||||||
assert!(socket_table.len() > index);
|
|
||||||
assert!(socket_table[index].is_some());
|
|
||||||
|
|
||||||
socket_table[index].as_mut().unwrap().buffers.pop_front()
|
|
||||||
}
|
|
|
@ -1,113 +0,0 @@
|
||||||
use alloc::vec;
|
|
||||||
use lose_net_stack::packets::tcp::TCPPacket;
|
|
||||||
use lose_net_stack::IPv4;
|
|
||||||
use lose_net_stack::MacAddress;
|
|
||||||
use lose_net_stack::TcpFlags;
|
|
||||||
|
|
||||||
use crate::{drivers::NET_DEVICE, fs::File};
|
|
||||||
|
|
||||||
use super::socket::get_s_a_by_index;
|
|
||||||
use super::{
|
|
||||||
net_interrupt_handler,
|
|
||||||
socket::{add_socket, pop_data, remove_socket},
|
|
||||||
LOSE_NET_STACK,
|
|
||||||
};
|
|
||||||
|
|
||||||
// add tcp packet info to this structure
|
|
||||||
pub struct TCP {
|
|
||||||
pub target: IPv4,
|
|
||||||
pub sport: u16,
|
|
||||||
pub dport: u16,
|
|
||||||
pub seq: u32,
|
|
||||||
pub ack: u32,
|
|
||||||
pub socket_index: usize,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl TCP {
|
|
||||||
pub fn new(target: IPv4, sport: u16, dport: u16, seq: u32, ack: u32) -> Self {
|
|
||||||
let index = add_socket(target, sport, dport).expect("can't add socket");
|
|
||||||
|
|
||||||
Self {
|
|
||||||
target,
|
|
||||||
sport,
|
|
||||||
dport,
|
|
||||||
seq,
|
|
||||||
ack,
|
|
||||||
socket_index: index,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl File for TCP {
|
|
||||||
fn readable(&self) -> bool {
|
|
||||||
true
|
|
||||||
}
|
|
||||||
|
|
||||||
fn writable(&self) -> bool {
|
|
||||||
true
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read(&self, mut buf: crate::mm::UserBuffer) -> usize {
|
|
||||||
loop {
|
|
||||||
if let Some(data) = pop_data(self.socket_index) {
|
|
||||||
let data_len = data.len();
|
|
||||||
let mut left = 0;
|
|
||||||
for i in 0..buf.buffers.len() {
|
|
||||||
let buffer_i_len = buf.buffers[i].len().min(data_len - left);
|
|
||||||
|
|
||||||
buf.buffers[i][..buffer_i_len]
|
|
||||||
.copy_from_slice(&data[left..(left + buffer_i_len)]);
|
|
||||||
|
|
||||||
left += buffer_i_len;
|
|
||||||
if left == data_len {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return left;
|
|
||||||
} else {
|
|
||||||
net_interrupt_handler();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn write(&self, buf: crate::mm::UserBuffer) -> usize {
|
|
||||||
let lose_net_stack = LOSE_NET_STACK.0.exclusive_access();
|
|
||||||
|
|
||||||
let mut data = vec![0u8; buf.len()];
|
|
||||||
|
|
||||||
let mut left = 0;
|
|
||||||
for i in 0..buf.buffers.len() {
|
|
||||||
data[left..(left + buf.buffers[i].len())].copy_from_slice(buf.buffers[i]);
|
|
||||||
left += buf.buffers[i].len();
|
|
||||||
}
|
|
||||||
|
|
||||||
let len = data.len();
|
|
||||||
|
|
||||||
// get sock and sequence
|
|
||||||
let (ack, seq) = get_s_a_by_index(self.socket_index).map_or((0, 0), |x| x);
|
|
||||||
|
|
||||||
let tcp_packet = TCPPacket {
|
|
||||||
source_ip: lose_net_stack.ip,
|
|
||||||
source_mac: lose_net_stack.mac,
|
|
||||||
source_port: self.sport,
|
|
||||||
dest_ip: self.target,
|
|
||||||
dest_mac: MacAddress::new([0xff, 0xff, 0xff, 0xff, 0xff, 0xff]),
|
|
||||||
dest_port: self.dport,
|
|
||||||
data_len: len,
|
|
||||||
seq,
|
|
||||||
ack,
|
|
||||||
flags: TcpFlags::A,
|
|
||||||
win: 65535,
|
|
||||||
urg: 0,
|
|
||||||
data: data.as_ref(),
|
|
||||||
};
|
|
||||||
NET_DEVICE.transmit(&tcp_packet.build_data());
|
|
||||||
len
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Drop for TCP {
|
|
||||||
fn drop(&mut self) {
|
|
||||||
remove_socket(self.socket_index)
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,95 +0,0 @@
|
||||||
use super::net_interrupt_handler;
|
|
||||||
use super::socket::{add_socket, pop_data, remove_socket};
|
|
||||||
use super::LOSE_NET_STACK;
|
|
||||||
use super::NET_DEVICE;
|
|
||||||
use crate::fs::File;
|
|
||||||
use alloc::vec;
|
|
||||||
use lose_net_stack::packets::udp::UDPPacket;
|
|
||||||
use lose_net_stack::IPv4;
|
|
||||||
use lose_net_stack::MacAddress;
|
|
||||||
|
|
||||||
pub struct UDP {
|
|
||||||
pub target: IPv4,
|
|
||||||
pub sport: u16,
|
|
||||||
pub dport: u16,
|
|
||||||
pub socket_index: usize,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl UDP {
|
|
||||||
pub fn new(target: IPv4, sport: u16, dport: u16) -> Self {
|
|
||||||
let index = add_socket(target, sport, dport).expect("can't add socket");
|
|
||||||
|
|
||||||
Self {
|
|
||||||
target,
|
|
||||||
sport,
|
|
||||||
dport,
|
|
||||||
socket_index: index,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl File for UDP {
|
|
||||||
fn readable(&self) -> bool {
|
|
||||||
true
|
|
||||||
}
|
|
||||||
|
|
||||||
fn writable(&self) -> bool {
|
|
||||||
true
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read(&self, mut buf: crate::mm::UserBuffer) -> usize {
|
|
||||||
loop {
|
|
||||||
if let Some(data) = pop_data(self.socket_index) {
|
|
||||||
let data_len = data.len();
|
|
||||||
let mut left = 0;
|
|
||||||
for i in 0..buf.buffers.len() {
|
|
||||||
let buffer_i_len = buf.buffers[i].len().min(data_len - left);
|
|
||||||
|
|
||||||
buf.buffers[i][..buffer_i_len]
|
|
||||||
.copy_from_slice(&data[left..(left + buffer_i_len)]);
|
|
||||||
|
|
||||||
left += buffer_i_len;
|
|
||||||
if left == data_len {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return left;
|
|
||||||
} else {
|
|
||||||
net_interrupt_handler();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn write(&self, buf: crate::mm::UserBuffer) -> usize {
|
|
||||||
let lose_net_stack = LOSE_NET_STACK.0.exclusive_access();
|
|
||||||
|
|
||||||
let mut data = vec![0u8; buf.len()];
|
|
||||||
|
|
||||||
let mut left = 0;
|
|
||||||
for i in 0..buf.buffers.len() {
|
|
||||||
data[left..(left + buf.buffers[i].len())].copy_from_slice(buf.buffers[i]);
|
|
||||||
left += buf.buffers[i].len();
|
|
||||||
}
|
|
||||||
|
|
||||||
let len = data.len();
|
|
||||||
|
|
||||||
let udp_packet = UDPPacket::new(
|
|
||||||
lose_net_stack.ip,
|
|
||||||
lose_net_stack.mac,
|
|
||||||
self.sport,
|
|
||||||
self.target,
|
|
||||||
MacAddress::new([0xff, 0xff, 0xff, 0xff, 0xff, 0xff]),
|
|
||||||
self.dport,
|
|
||||||
len,
|
|
||||||
data.as_ref(),
|
|
||||||
);
|
|
||||||
NET_DEVICE.transmit(&udp_packet.build_data());
|
|
||||||
len
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Drop for UDP {
|
|
||||||
fn drop(&mut self) {
|
|
||||||
remove_socket(self.socket_index)
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,3 +1,18 @@
|
||||||
|
//! SBI call wrappers
|
||||||
|
#![allow(unused)]
|
||||||
|
|
||||||
|
/// use sbi call to putchar in console (qemu uart handler)
|
||||||
|
pub fn console_putchar(c: usize) {
|
||||||
|
#[allow(deprecated)]
|
||||||
|
sbi_rt::legacy::console_putchar(c);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// use sbi call to getchar from console (qemu uart handler)
|
||||||
|
pub fn console_getchar() -> usize {
|
||||||
|
#[allow(deprecated)]
|
||||||
|
sbi_rt::legacy::console_getchar()
|
||||||
|
}
|
||||||
|
|
||||||
/// use sbi call to set timer
|
/// use sbi call to set timer
|
||||||
pub fn set_timer(timer: usize) {
|
pub fn set_timer(timer: usize) {
|
||||||
sbi_rt::set_timer(timer as _);
|
sbi_rt::set_timer(timer as _);
|
||||||
|
@ -5,7 +20,7 @@ pub fn set_timer(timer: usize) {
|
||||||
|
|
||||||
/// use sbi call to shutdown the kernel
|
/// use sbi call to shutdown the kernel
|
||||||
pub fn shutdown(failure: bool) -> ! {
|
pub fn shutdown(failure: bool) -> ! {
|
||||||
use sbi_rt::{system_reset, NoReason, Shutdown, SystemFailure};
|
use sbi_rt::{NoReason, Shutdown, SystemFailure, system_reset};
|
||||||
if !failure {
|
if !failure {
|
||||||
system_reset(Shutdown, NoReason);
|
system_reset(Shutdown, NoReason);
|
||||||
} else {
|
} else {
|
||||||
|
|
|
@ -1,58 +0,0 @@
|
||||||
use crate::sync::{Mutex, UPIntrFreeCell};
|
|
||||||
use crate::task::{
|
|
||||||
block_current_and_run_next, block_current_task, current_task, wakeup_task, TaskContext,
|
|
||||||
TaskControlBlock,
|
|
||||||
};
|
|
||||||
use alloc::{collections::VecDeque, sync::Arc};
|
|
||||||
|
|
||||||
pub struct Condvar {
|
|
||||||
pub inner: UPIntrFreeCell<CondvarInner>,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct CondvarInner {
|
|
||||||
pub wait_queue: VecDeque<Arc<TaskControlBlock>>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Condvar {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
Self {
|
|
||||||
inner: unsafe {
|
|
||||||
UPIntrFreeCell::new(CondvarInner {
|
|
||||||
wait_queue: VecDeque::new(),
|
|
||||||
})
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn signal(&self) {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
if let Some(task) = inner.wait_queue.pop_front() {
|
|
||||||
wakeup_task(task);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
pub fn wait(&self) {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
inner.wait_queue.push_back(current_task().unwrap());
|
|
||||||
drop(inner);
|
|
||||||
block_current_and_run_next();
|
|
||||||
}
|
|
||||||
*/
|
|
||||||
|
|
||||||
pub fn wait_no_sched(&self) -> *mut TaskContext {
|
|
||||||
self.inner.exclusive_session(|inner| {
|
|
||||||
inner.wait_queue.push_back(current_task().unwrap());
|
|
||||||
});
|
|
||||||
block_current_task()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn wait_with_mutex(&self, mutex: Arc<dyn Mutex>) {
|
|
||||||
mutex.unlock();
|
|
||||||
self.inner.exclusive_session(|inner| {
|
|
||||||
inner.wait_queue.push_back(current_task().unwrap());
|
|
||||||
});
|
|
||||||
block_current_and_run_next();
|
|
||||||
mutex.lock();
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,9 +1,4 @@
|
||||||
mod condvar;
|
//! Synchronization and interior mutability primitives
|
||||||
mod mutex;
|
|
||||||
mod semaphore;
|
|
||||||
mod up;
|
mod up;
|
||||||
|
|
||||||
pub use condvar::Condvar;
|
pub use up::UPSafeCell;
|
||||||
pub use mutex::{Mutex, MutexBlocking, MutexSpin};
|
|
||||||
pub use semaphore::Semaphore;
|
|
||||||
pub use up::{UPIntrFreeCell, UPIntrRefMut};
|
|
||||||
|
|
|
@ -1,88 +0,0 @@
|
||||||
use super::UPIntrFreeCell;
|
|
||||||
use crate::task::TaskControlBlock;
|
|
||||||
use crate::task::{block_current_and_run_next, suspend_current_and_run_next};
|
|
||||||
use crate::task::{current_task, wakeup_task};
|
|
||||||
use alloc::{collections::VecDeque, sync::Arc};
|
|
||||||
|
|
||||||
pub trait Mutex: Sync + Send {
|
|
||||||
fn lock(&self);
|
|
||||||
fn unlock(&self);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct MutexSpin {
|
|
||||||
locked: UPIntrFreeCell<bool>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl MutexSpin {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
Self {
|
|
||||||
locked: unsafe { UPIntrFreeCell::new(false) },
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Mutex for MutexSpin {
|
|
||||||
fn lock(&self) {
|
|
||||||
loop {
|
|
||||||
let mut locked = self.locked.exclusive_access();
|
|
||||||
if *locked {
|
|
||||||
drop(locked);
|
|
||||||
suspend_current_and_run_next();
|
|
||||||
continue;
|
|
||||||
} else {
|
|
||||||
*locked = true;
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn unlock(&self) {
|
|
||||||
let mut locked = self.locked.exclusive_access();
|
|
||||||
*locked = false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct MutexBlocking {
|
|
||||||
inner: UPIntrFreeCell<MutexBlockingInner>,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct MutexBlockingInner {
|
|
||||||
locked: bool,
|
|
||||||
wait_queue: VecDeque<Arc<TaskControlBlock>>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl MutexBlocking {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
Self {
|
|
||||||
inner: unsafe {
|
|
||||||
UPIntrFreeCell::new(MutexBlockingInner {
|
|
||||||
locked: false,
|
|
||||||
wait_queue: VecDeque::new(),
|
|
||||||
})
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Mutex for MutexBlocking {
|
|
||||||
fn lock(&self) {
|
|
||||||
let mut mutex_inner = self.inner.exclusive_access();
|
|
||||||
if mutex_inner.locked {
|
|
||||||
mutex_inner.wait_queue.push_back(current_task().unwrap());
|
|
||||||
drop(mutex_inner);
|
|
||||||
block_current_and_run_next();
|
|
||||||
} else {
|
|
||||||
mutex_inner.locked = true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn unlock(&self) {
|
|
||||||
let mut mutex_inner = self.inner.exclusive_access();
|
|
||||||
assert!(mutex_inner.locked);
|
|
||||||
if let Some(waking_task) = mutex_inner.wait_queue.pop_front() {
|
|
||||||
wakeup_task(waking_task);
|
|
||||||
} else {
|
|
||||||
mutex_inner.locked = false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,45 +0,0 @@
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use crate::task::{block_current_and_run_next, current_task, wakeup_task, TaskControlBlock};
|
|
||||||
use alloc::{collections::VecDeque, sync::Arc};
|
|
||||||
|
|
||||||
pub struct Semaphore {
|
|
||||||
pub inner: UPIntrFreeCell<SemaphoreInner>,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct SemaphoreInner {
|
|
||||||
pub count: isize,
|
|
||||||
pub wait_queue: VecDeque<Arc<TaskControlBlock>>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Semaphore {
|
|
||||||
pub fn new(res_count: usize) -> Self {
|
|
||||||
Self {
|
|
||||||
inner: unsafe {
|
|
||||||
UPIntrFreeCell::new(SemaphoreInner {
|
|
||||||
count: res_count as isize,
|
|
||||||
wait_queue: VecDeque::new(),
|
|
||||||
})
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn up(&self) {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
inner.count += 1;
|
|
||||||
if inner.count <= 0 {
|
|
||||||
if let Some(task) = inner.wait_queue.pop_front() {
|
|
||||||
wakeup_task(task);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn down(&self) {
|
|
||||||
let mut inner = self.inner.exclusive_access();
|
|
||||||
inner.count -= 1;
|
|
||||||
if inner.count < 0 {
|
|
||||||
inner.wait_queue.push_back(current_task().unwrap());
|
|
||||||
drop(inner);
|
|
||||||
block_current_and_run_next();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,9 +1,6 @@
|
||||||
use core::cell::{RefCell, RefMut, UnsafeCell};
|
//! Uniprocessor interior mutability primitives
|
||||||
use core::ops::{Deref, DerefMut};
|
use core::cell::{RefCell, RefMut};
|
||||||
use lazy_static::*;
|
|
||||||
use riscv::register::sstatus;
|
|
||||||
|
|
||||||
/*
|
|
||||||
/// Wrap a static data structure inside it so that we are
|
/// Wrap a static data structure inside it so that we are
|
||||||
/// able to access it without any `unsafe`.
|
/// able to access it without any `unsafe`.
|
||||||
///
|
///
|
||||||
|
@ -26,115 +23,8 @@ impl<T> UPSafeCell<T> {
|
||||||
inner: RefCell::new(value),
|
inner: RefCell::new(value),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
/// Panic if the data has been borrowed.
|
/// Exclusive access inner data in UPSafeCell. Panic if the data has been borrowed.
|
||||||
pub fn exclusive_access(&self) -> RefMut<'_, T> {
|
pub fn exclusive_access(&self) -> RefMut<'_, T> {
|
||||||
self.inner.borrow_mut()
|
self.inner.borrow_mut()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
*/
|
|
||||||
|
|
||||||
pub struct UPSafeCellRaw<T> {
|
|
||||||
inner: UnsafeCell<T>,
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe impl<T> Sync for UPSafeCellRaw<T> {}
|
|
||||||
|
|
||||||
impl<T> UPSafeCellRaw<T> {
|
|
||||||
pub unsafe fn new(value: T) -> Self {
|
|
||||||
Self {
|
|
||||||
inner: UnsafeCell::new(value),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn get_mut(&self) -> &mut T {
|
|
||||||
unsafe { &mut (*self.inner.get()) }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct IntrMaskingInfo {
|
|
||||||
nested_level: usize,
|
|
||||||
sie_before_masking: bool,
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref INTR_MASKING_INFO: UPSafeCellRaw<IntrMaskingInfo> =
|
|
||||||
unsafe { UPSafeCellRaw::new(IntrMaskingInfo::new()) };
|
|
||||||
}
|
|
||||||
|
|
||||||
impl IntrMaskingInfo {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
Self {
|
|
||||||
nested_level: 0,
|
|
||||||
sie_before_masking: false,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn enter(&mut self) {
|
|
||||||
let sie = sstatus::read().sie();
|
|
||||||
unsafe {
|
|
||||||
sstatus::clear_sie();
|
|
||||||
}
|
|
||||||
if self.nested_level == 0 {
|
|
||||||
self.sie_before_masking = sie;
|
|
||||||
}
|
|
||||||
self.nested_level += 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn exit(&mut self) {
|
|
||||||
self.nested_level -= 1;
|
|
||||||
if self.nested_level == 0 && self.sie_before_masking {
|
|
||||||
unsafe {
|
|
||||||
sstatus::set_sie();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct UPIntrFreeCell<T> {
|
|
||||||
/// inner data
|
|
||||||
inner: RefCell<T>,
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe impl<T> Sync for UPIntrFreeCell<T> {}
|
|
||||||
|
|
||||||
pub struct UPIntrRefMut<'a, T>(Option<RefMut<'a, T>>);
|
|
||||||
|
|
||||||
impl<T> UPIntrFreeCell<T> {
|
|
||||||
pub unsafe fn new(value: T) -> Self {
|
|
||||||
Self {
|
|
||||||
inner: RefCell::new(value),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Panic if the data has been borrowed.
|
|
||||||
pub fn exclusive_access(&self) -> UPIntrRefMut<'_, T> {
|
|
||||||
INTR_MASKING_INFO.get_mut().enter();
|
|
||||||
UPIntrRefMut(Some(self.inner.borrow_mut()))
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn exclusive_session<F, V>(&self, f: F) -> V
|
|
||||||
where
|
|
||||||
F: FnOnce(&mut T) -> V,
|
|
||||||
{
|
|
||||||
let mut inner = self.exclusive_access();
|
|
||||||
f(inner.deref_mut())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<'a, T> Drop for UPIntrRefMut<'a, T> {
|
|
||||||
fn drop(&mut self) {
|
|
||||||
self.0 = None;
|
|
||||||
INTR_MASKING_INFO.get_mut().exit();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<'a, T> Deref for UPIntrRefMut<'a, T> {
|
|
||||||
type Target = T;
|
|
||||||
fn deref(&self) -> &Self::Target {
|
|
||||||
self.0.as_ref().unwrap().deref()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
impl<'a, T> DerefMut for UPIntrRefMut<'a, T> {
|
|
||||||
fn deref_mut(&mut self) -> &mut Self::Target {
|
|
||||||
self.0.as_mut().unwrap().deref_mut()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
use crate::fs::{make_pipe, open_file, OpenFlags};
|
//! File and filesystem-related syscalls
|
||||||
use crate::mm::{translated_byte_buffer, translated_refmut, translated_str, UserBuffer};
|
use crate::fs::{OpenFlags, open_file};
|
||||||
use crate::task::{current_process, current_user_token};
|
use crate::mm::{UserBuffer, translated_byte_buffer, translated_str};
|
||||||
use alloc::sync::Arc;
|
use crate::task::{current_task, current_user_token};
|
||||||
|
|
||||||
pub fn sys_write(fd: usize, buf: *const u8, len: usize) -> isize {
|
pub fn sys_write(fd: usize, buf: *const u8, len: usize) -> isize {
|
||||||
let token = current_user_token();
|
let token = current_user_token();
|
||||||
let process = current_process();
|
let task = current_task().unwrap();
|
||||||
let inner = process.inner_exclusive_access();
|
let inner = task.inner_exclusive_access();
|
||||||
if fd >= inner.fd_table.len() {
|
if fd >= inner.fd_table.len() {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
@ -25,8 +25,8 @@ pub fn sys_write(fd: usize, buf: *const u8, len: usize) -> isize {
|
||||||
|
|
||||||
pub fn sys_read(fd: usize, buf: *const u8, len: usize) -> isize {
|
pub fn sys_read(fd: usize, buf: *const u8, len: usize) -> isize {
|
||||||
let token = current_user_token();
|
let token = current_user_token();
|
||||||
let process = current_process();
|
let task = current_task().unwrap();
|
||||||
let inner = process.inner_exclusive_access();
|
let inner = task.inner_exclusive_access();
|
||||||
if fd >= inner.fd_table.len() {
|
if fd >= inner.fd_table.len() {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
@ -44,11 +44,18 @@ pub fn sys_read(fd: usize, buf: *const u8, len: usize) -> isize {
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn sys_open(path: *const u8, flags: u32) -> isize {
|
pub fn sys_open(path: *const u8, flags: u32) -> isize {
|
||||||
let process = current_process();
|
let task = current_task().unwrap();
|
||||||
let token = current_user_token();
|
let token = current_user_token();
|
||||||
let path = translated_str(token, path);
|
let path = translated_str(token, path);
|
||||||
|
|
||||||
|
// 简单用户检查示例:非 root 用户不能打开 /root 下文件
|
||||||
|
let username = task.inner_exclusive_access().user.clone();
|
||||||
|
if path.starts_with("/root") && username != "root" {
|
||||||
|
return -1; // Permission denied
|
||||||
|
}
|
||||||
|
|
||||||
if let Some(inode) = open_file(path.as_str(), OpenFlags::from_bits(flags).unwrap()) {
|
if let Some(inode) = open_file(path.as_str(), OpenFlags::from_bits(flags).unwrap()) {
|
||||||
let mut inner = process.inner_exclusive_access();
|
let mut inner = task.inner_exclusive_access();
|
||||||
let fd = inner.alloc_fd();
|
let fd = inner.alloc_fd();
|
||||||
inner.fd_table[fd] = Some(inode);
|
inner.fd_table[fd] = Some(inode);
|
||||||
fd as isize
|
fd as isize
|
||||||
|
@ -57,9 +64,10 @@ pub fn sys_open(path: *const u8, flags: u32) -> isize {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
pub fn sys_close(fd: usize) -> isize {
|
pub fn sys_close(fd: usize) -> isize {
|
||||||
let process = current_process();
|
let task = current_task().unwrap();
|
||||||
let mut inner = process.inner_exclusive_access();
|
let mut inner = task.inner_exclusive_access();
|
||||||
if fd >= inner.fd_table.len() {
|
if fd >= inner.fd_table.len() {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
@ -69,31 +77,3 @@ pub fn sys_close(fd: usize) -> isize {
|
||||||
inner.fd_table[fd].take();
|
inner.fd_table[fd].take();
|
||||||
0
|
0
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn sys_pipe(pipe: *mut usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let token = current_user_token();
|
|
||||||
let mut inner = process.inner_exclusive_access();
|
|
||||||
let (pipe_read, pipe_write) = make_pipe();
|
|
||||||
let read_fd = inner.alloc_fd();
|
|
||||||
inner.fd_table[read_fd] = Some(pipe_read);
|
|
||||||
let write_fd = inner.alloc_fd();
|
|
||||||
inner.fd_table[write_fd] = Some(pipe_write);
|
|
||||||
*translated_refmut(token, pipe) = read_fd;
|
|
||||||
*translated_refmut(token, unsafe { pipe.add(1) }) = write_fd;
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_dup(fd: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let mut inner = process.inner_exclusive_access();
|
|
||||||
if fd >= inner.fd_table.len() {
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
if inner.fd_table[fd].is_none() {
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
let new_fd = inner.alloc_fd();
|
|
||||||
inner.fd_table[new_fd] = Some(Arc::clone(inner.fd_table[fd].as_ref().unwrap()));
|
|
||||||
new_fd as isize
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,34 +0,0 @@
|
||||||
use crate::drivers::GPU_DEVICE;
|
|
||||||
use crate::mm::{MapArea, MapPermission, MapType, PhysAddr, VirtAddr};
|
|
||||||
use crate::task::current_process;
|
|
||||||
|
|
||||||
const FB_VADDR: usize = 0x10000000;
|
|
||||||
|
|
||||||
pub fn sys_framebuffer() -> isize {
|
|
||||||
let fb = GPU_DEVICE.get_framebuffer();
|
|
||||||
let len = fb.len();
|
|
||||||
// println!("[kernel] FrameBuffer: addr 0x{:X}, len {}", fb.as_ptr() as usize , len);
|
|
||||||
let fb_start_pa = PhysAddr::from(fb.as_ptr() as usize);
|
|
||||||
assert!(fb_start_pa.aligned());
|
|
||||||
let fb_start_ppn = fb_start_pa.floor();
|
|
||||||
let fb_start_vpn = VirtAddr::from(FB_VADDR).floor();
|
|
||||||
let pn_offset = fb_start_ppn.0 as isize - fb_start_vpn.0 as isize;
|
|
||||||
|
|
||||||
let current_process = current_process();
|
|
||||||
let mut inner = current_process.inner_exclusive_access();
|
|
||||||
inner.memory_set.push(
|
|
||||||
MapArea::new(
|
|
||||||
(FB_VADDR as usize).into(),
|
|
||||||
(FB_VADDR + len as usize).into(),
|
|
||||||
MapType::Linear(pn_offset),
|
|
||||||
MapPermission::R | MapPermission::W | MapPermission::U,
|
|
||||||
),
|
|
||||||
None,
|
|
||||||
);
|
|
||||||
FB_VADDR as isize
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_framebuffer_flush() -> isize {
|
|
||||||
GPU_DEVICE.flush();
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,28 +0,0 @@
|
||||||
//use crate::drivers::{KEYBOARD_DEVICE,MOUSE_DEVICE,INPUT_CONDVAR,read_input_event};
|
|
||||||
use crate::drivers::{KEYBOARD_DEVICE, MOUSE_DEVICE};
|
|
||||||
|
|
||||||
pub fn sys_event_get() -> isize {
|
|
||||||
let kb = KEYBOARD_DEVICE.clone();
|
|
||||||
let mouse = MOUSE_DEVICE.clone();
|
|
||||||
//let input=INPUT_CONDVAR.clone();
|
|
||||||
//read_input_event() as isize
|
|
||||||
if !kb.is_empty() {
|
|
||||||
kb.read_event() as isize
|
|
||||||
} else if !mouse.is_empty() {
|
|
||||||
mouse.read_event() as isize
|
|
||||||
} else {
|
|
||||||
0
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
use crate::drivers::chardev::UART;
|
|
||||||
|
|
||||||
/// check UART's read-buffer is empty or not
|
|
||||||
pub fn sys_key_pressed() -> isize {
|
|
||||||
let res = !UART.read_buffer_is_empty();
|
|
||||||
if res {
|
|
||||||
1
|
|
||||||
} else {
|
|
||||||
0
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,90 +1,45 @@
|
||||||
const SYSCALL_DUP: usize = 24;
|
//! Implementation of syscalls
|
||||||
const SYSCALL_CONNECT: usize = 29;
|
//!
|
||||||
const SYSCALL_LISTEN: usize = 30;
|
//! The single entry point to all system calls, [`syscall()`], is called
|
||||||
const SYSCALL_ACCEPT: usize = 31;
|
//! whenever userspace wishes to perform a system call using the `ecall`
|
||||||
|
//! instruction. In this case, the processor raises an 'Environment call from
|
||||||
|
//! U-mode' exception, which is handled as one of the cases in
|
||||||
|
//! [`crate::trap::trap_handler`].
|
||||||
|
//!
|
||||||
|
//! For clarity, each single syscall is implemented as its own function, named
|
||||||
|
//! `sys_` then the name of the syscall. You can find functions like this in
|
||||||
|
//! submodules, and you should also implement syscalls this way.
|
||||||
const SYSCALL_OPEN: usize = 56;
|
const SYSCALL_OPEN: usize = 56;
|
||||||
const SYSCALL_CLOSE: usize = 57;
|
const SYSCALL_CLOSE: usize = 57;
|
||||||
const SYSCALL_PIPE: usize = 59;
|
|
||||||
const SYSCALL_READ: usize = 63;
|
const SYSCALL_READ: usize = 63;
|
||||||
const SYSCALL_WRITE: usize = 64;
|
const SYSCALL_WRITE: usize = 64;
|
||||||
const SYSCALL_EXIT: usize = 93;
|
const SYSCALL_EXIT: usize = 93;
|
||||||
const SYSCALL_SLEEP: usize = 101;
|
|
||||||
const SYSCALL_YIELD: usize = 124;
|
const SYSCALL_YIELD: usize = 124;
|
||||||
const SYSCALL_KILL: usize = 129;
|
|
||||||
const SYSCALL_GET_TIME: usize = 169;
|
const SYSCALL_GET_TIME: usize = 169;
|
||||||
const SYSCALL_GETPID: usize = 172;
|
const SYSCALL_GETPID: usize = 172;
|
||||||
const SYSCALL_FORK: usize = 220;
|
const SYSCALL_FORK: usize = 220;
|
||||||
const SYSCALL_EXEC: usize = 221;
|
const SYSCALL_EXEC: usize = 221;
|
||||||
const SYSCALL_WAITPID: usize = 260;
|
const SYSCALL_WAITPID: usize = 260;
|
||||||
const SYSCALL_THREAD_CREATE: usize = 1000;
|
|
||||||
const SYSCALL_GETTID: usize = 1001;
|
|
||||||
const SYSCALL_WAITTID: usize = 1002;
|
|
||||||
const SYSCALL_MUTEX_CREATE: usize = 1010;
|
|
||||||
const SYSCALL_MUTEX_LOCK: usize = 1011;
|
|
||||||
const SYSCALL_MUTEX_UNLOCK: usize = 1012;
|
|
||||||
const SYSCALL_SEMAPHORE_CREATE: usize = 1020;
|
|
||||||
const SYSCALL_SEMAPHORE_UP: usize = 1021;
|
|
||||||
const SYSCALL_SEMAPHORE_DOWN: usize = 1022;
|
|
||||||
const SYSCALL_CONDVAR_CREATE: usize = 1030;
|
|
||||||
const SYSCALL_CONDVAR_SIGNAL: usize = 1031;
|
|
||||||
const SYSCALL_CONDVAR_WAIT: usize = 1032;
|
|
||||||
const SYSCALL_FRAMEBUFFER: usize = 2000;
|
|
||||||
const SYSCALL_FRAMEBUFFER_FLUSH: usize = 2001;
|
|
||||||
const SYSCALL_EVENT_GET: usize = 3000;
|
|
||||||
const SYSCALL_KEY_PRESSED: usize = 3001;
|
|
||||||
|
|
||||||
mod fs;
|
mod fs;
|
||||||
mod gui;
|
|
||||||
mod input;
|
|
||||||
mod net;
|
|
||||||
mod process;
|
mod process;
|
||||||
mod sync;
|
|
||||||
mod thread;
|
|
||||||
|
|
||||||
use fs::*;
|
use fs::*;
|
||||||
use gui::*;
|
|
||||||
use input::*;
|
|
||||||
use net::*;
|
|
||||||
use process::*;
|
use process::*;
|
||||||
use sync::*;
|
/// handle syscall exception with `syscall_id` and other arguments
|
||||||
use thread::*;
|
|
||||||
|
|
||||||
pub fn syscall(syscall_id: usize, args: [usize; 3]) -> isize {
|
pub fn syscall(syscall_id: usize, args: [usize; 3]) -> isize {
|
||||||
match syscall_id {
|
match syscall_id {
|
||||||
SYSCALL_DUP => sys_dup(args[0]),
|
|
||||||
SYSCALL_CONNECT => sys_connect(args[0] as _, args[1] as _, args[2] as _),
|
|
||||||
SYSCALL_LISTEN => sys_listen(args[0] as _),
|
|
||||||
SYSCALL_ACCEPT => sys_accept(args[0] as _),
|
|
||||||
SYSCALL_OPEN => sys_open(args[0] as *const u8, args[1] as u32),
|
SYSCALL_OPEN => sys_open(args[0] as *const u8, args[1] as u32),
|
||||||
SYSCALL_CLOSE => sys_close(args[0]),
|
SYSCALL_CLOSE => sys_close(args[0]),
|
||||||
SYSCALL_PIPE => sys_pipe(args[0] as *mut usize),
|
|
||||||
SYSCALL_READ => sys_read(args[0], args[1] as *const u8, args[2]),
|
SYSCALL_READ => sys_read(args[0], args[1] as *const u8, args[2]),
|
||||||
SYSCALL_WRITE => sys_write(args[0], args[1] as *const u8, args[2]),
|
SYSCALL_WRITE => sys_write(args[0], args[1] as *const u8, args[2]),
|
||||||
SYSCALL_EXIT => sys_exit(args[0] as i32),
|
SYSCALL_EXIT => sys_exit(args[0] as i32),
|
||||||
SYSCALL_SLEEP => sys_sleep(args[0]),
|
|
||||||
SYSCALL_YIELD => sys_yield(),
|
SYSCALL_YIELD => sys_yield(),
|
||||||
SYSCALL_KILL => sys_kill(args[0], args[1] as u32),
|
|
||||||
SYSCALL_GET_TIME => sys_get_time(),
|
SYSCALL_GET_TIME => sys_get_time(),
|
||||||
SYSCALL_GETPID => sys_getpid(),
|
SYSCALL_GETPID => sys_getpid(),
|
||||||
SYSCALL_FORK => sys_fork(),
|
SYSCALL_FORK => sys_fork(),
|
||||||
SYSCALL_EXEC => sys_exec(args[0] as *const u8, args[1] as *const usize),
|
SYSCALL_EXEC => sys_exec(args[0] as *const u8),
|
||||||
SYSCALL_WAITPID => sys_waitpid(args[0] as isize, args[1] as *mut i32),
|
SYSCALL_WAITPID => sys_waitpid(args[0] as isize, args[1] as *mut i32),
|
||||||
SYSCALL_THREAD_CREATE => sys_thread_create(args[0], args[1]),
|
|
||||||
SYSCALL_GETTID => sys_gettid(),
|
|
||||||
SYSCALL_WAITTID => sys_waittid(args[0]) as isize,
|
|
||||||
SYSCALL_MUTEX_CREATE => sys_mutex_create(args[0] == 1),
|
|
||||||
SYSCALL_MUTEX_LOCK => sys_mutex_lock(args[0]),
|
|
||||||
SYSCALL_MUTEX_UNLOCK => sys_mutex_unlock(args[0]),
|
|
||||||
SYSCALL_SEMAPHORE_CREATE => sys_semaphore_create(args[0]),
|
|
||||||
SYSCALL_SEMAPHORE_UP => sys_semaphore_up(args[0]),
|
|
||||||
SYSCALL_SEMAPHORE_DOWN => sys_semaphore_down(args[0]),
|
|
||||||
SYSCALL_CONDVAR_CREATE => sys_condvar_create(),
|
|
||||||
SYSCALL_CONDVAR_SIGNAL => sys_condvar_signal(args[0]),
|
|
||||||
SYSCALL_CONDVAR_WAIT => sys_condvar_wait(args[0], args[1]),
|
|
||||||
SYSCALL_FRAMEBUFFER => sys_framebuffer(),
|
|
||||||
SYSCALL_FRAMEBUFFER_FLUSH => sys_framebuffer_flush(),
|
|
||||||
SYSCALL_EVENT_GET => sys_event_get(),
|
|
||||||
SYSCALL_KEY_PRESSED => sys_key_pressed(),
|
|
||||||
_ => panic!("Unsupported syscall_id: {}", syscall_id),
|
_ => panic!("Unsupported syscall_id: {}", syscall_id),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,53 +0,0 @@
|
||||||
use crate::net::port_table::{accept, listen, port_acceptable, PortFd};
|
|
||||||
use crate::net::udp::UDP;
|
|
||||||
use crate::net::{net_interrupt_handler, IPv4};
|
|
||||||
use crate::task::{current_process, current_task, current_trap_cx};
|
|
||||||
use alloc::sync::Arc;
|
|
||||||
|
|
||||||
// just support udp
|
|
||||||
pub fn sys_connect(raddr: u32, lport: u16, rport: u16) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let mut inner = process.inner_exclusive_access();
|
|
||||||
let fd = inner.alloc_fd();
|
|
||||||
let udp_node = UDP::new(IPv4::from_u32(raddr), lport, rport);
|
|
||||||
inner.fd_table[fd] = Some(Arc::new(udp_node));
|
|
||||||
fd as isize
|
|
||||||
}
|
|
||||||
|
|
||||||
// listen a port
|
|
||||||
pub fn sys_listen(port: u16) -> isize {
|
|
||||||
match listen(port) {
|
|
||||||
Some(port_index) => {
|
|
||||||
let process = current_process();
|
|
||||||
let mut inner = process.inner_exclusive_access();
|
|
||||||
let fd = inner.alloc_fd();
|
|
||||||
let port_fd = PortFd::new(port_index);
|
|
||||||
inner.fd_table[fd] = Some(Arc::new(port_fd));
|
|
||||||
|
|
||||||
// NOTICE: this return the port index, not the fd
|
|
||||||
port_index as isize
|
|
||||||
}
|
|
||||||
None => -1,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// accept a tcp connection
|
|
||||||
pub fn sys_accept(port_index: usize) -> isize {
|
|
||||||
println!("accepting port {}", port_index);
|
|
||||||
|
|
||||||
let task = current_task().unwrap();
|
|
||||||
accept(port_index, task);
|
|
||||||
// block_current_and_run_next();
|
|
||||||
|
|
||||||
// NOTICE: There does not have interrupt handler, just call it munually.
|
|
||||||
loop {
|
|
||||||
net_interrupt_handler();
|
|
||||||
|
|
||||||
if !port_acceptable(port_index) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
let cx = current_trap_cx();
|
|
||||||
cx.x[10] as isize
|
|
||||||
}
|
|
|
@ -1,13 +1,11 @@
|
||||||
use crate::fs::{open_file, OpenFlags};
|
use crate::fs::{OpenFlags, open_file};
|
||||||
use crate::mm::{translated_ref, translated_refmut, translated_str};
|
use crate::mm::{translated_refmut, translated_str};
|
||||||
use crate::task::{
|
use crate::task::{
|
||||||
current_process, current_task, current_user_token, exit_current_and_run_next, pid2process,
|
add_task, current_task, current_user_token, exit_current_and_run_next,
|
||||||
suspend_current_and_run_next, SignalFlags,
|
suspend_current_and_run_next,
|
||||||
};
|
};
|
||||||
use crate::timer::get_time_ms;
|
use crate::timer::get_time_ms;
|
||||||
use alloc::string::String;
|
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use alloc::vec::Vec;
|
|
||||||
|
|
||||||
pub fn sys_exit(exit_code: i32) -> ! {
|
pub fn sys_exit(exit_code: i32) -> ! {
|
||||||
exit_current_and_run_next(exit_code);
|
exit_current_and_run_next(exit_code);
|
||||||
|
@ -24,44 +22,31 @@ pub fn sys_get_time() -> isize {
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn sys_getpid() -> isize {
|
pub fn sys_getpid() -> isize {
|
||||||
current_task().unwrap().process.upgrade().unwrap().getpid() as isize
|
current_task().unwrap().pid.0 as isize
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn sys_fork() -> isize {
|
pub fn sys_fork() -> isize {
|
||||||
let current_process = current_process();
|
let current_task = current_task().unwrap();
|
||||||
let new_process = current_process.fork();
|
let new_task = current_task.fork();
|
||||||
let new_pid = new_process.getpid();
|
let new_pid = new_task.pid.0;
|
||||||
// modify trap context of new_task, because it returns immediately after switching
|
// modify trap context of new_task, because it returns immediately after switching
|
||||||
let new_process_inner = new_process.inner_exclusive_access();
|
let trap_cx = new_task.inner_exclusive_access().get_trap_cx();
|
||||||
let task = new_process_inner.tasks[0].as_ref().unwrap();
|
|
||||||
let trap_cx = task.inner_exclusive_access().get_trap_cx();
|
|
||||||
// we do not have to move to next instruction since we have done it before
|
// we do not have to move to next instruction since we have done it before
|
||||||
// for child process, fork returns 0
|
// for child process, fork returns 0
|
||||||
trap_cx.x[10] = 0;
|
trap_cx.x[10] = 0;
|
||||||
|
// add new task to scheduler
|
||||||
|
add_task(new_task);
|
||||||
new_pid as isize
|
new_pid as isize
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn sys_exec(path: *const u8, mut args: *const usize) -> isize {
|
pub fn sys_exec(path: *const u8) -> isize {
|
||||||
let token = current_user_token();
|
let token = current_user_token();
|
||||||
let path = translated_str(token, path);
|
let path = translated_str(token, path);
|
||||||
let mut args_vec: Vec<String> = Vec::new();
|
|
||||||
loop {
|
|
||||||
let arg_str_ptr = *translated_ref(token, args);
|
|
||||||
if arg_str_ptr == 0 {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
args_vec.push(translated_str(token, arg_str_ptr as *const u8));
|
|
||||||
unsafe {
|
|
||||||
args = args.add(1);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if let Some(app_inode) = open_file(path.as_str(), OpenFlags::RDONLY) {
|
if let Some(app_inode) = open_file(path.as_str(), OpenFlags::RDONLY) {
|
||||||
let all_data = app_inode.read_all();
|
let all_data = app_inode.read_all();
|
||||||
let process = current_process();
|
let task = current_task().unwrap();
|
||||||
let argc = args_vec.len();
|
task.exec(all_data.as_slice());
|
||||||
process.exec(all_data.as_slice(), args_vec);
|
0
|
||||||
// return argc because cx.x[10] will be covered with it later
|
|
||||||
argc as isize
|
|
||||||
} else {
|
} else {
|
||||||
-1
|
-1
|
||||||
}
|
}
|
||||||
|
@ -70,10 +55,11 @@ pub fn sys_exec(path: *const u8, mut args: *const usize) -> isize {
|
||||||
/// If there is not a child process whose pid is same as given, return -1.
|
/// If there is not a child process whose pid is same as given, return -1.
|
||||||
/// Else if there is a child process but it is still running, return -2.
|
/// Else if there is a child process but it is still running, return -2.
|
||||||
pub fn sys_waitpid(pid: isize, exit_code_ptr: *mut i32) -> isize {
|
pub fn sys_waitpid(pid: isize, exit_code_ptr: *mut i32) -> isize {
|
||||||
let process = current_process();
|
let task = current_task().unwrap();
|
||||||
// find a child process
|
// find a child process
|
||||||
|
|
||||||
let mut inner = process.inner_exclusive_access();
|
// ---- access current PCB exclusively
|
||||||
|
let mut inner = task.inner_exclusive_access();
|
||||||
if !inner
|
if !inner
|
||||||
.children
|
.children
|
||||||
.iter()
|
.iter()
|
||||||
|
@ -84,7 +70,7 @@ pub fn sys_waitpid(pid: isize, exit_code_ptr: *mut i32) -> isize {
|
||||||
}
|
}
|
||||||
let pair = inner.children.iter().enumerate().find(|(_, p)| {
|
let pair = inner.children.iter().enumerate().find(|(_, p)| {
|
||||||
// ++++ temporarily access child PCB exclusively
|
// ++++ temporarily access child PCB exclusively
|
||||||
p.inner_exclusive_access().is_zombie && (pid == -1 || pid as usize == p.getpid())
|
p.inner_exclusive_access().is_zombie() && (pid == -1 || pid as usize == p.getpid())
|
||||||
// ++++ release child PCB
|
// ++++ release child PCB
|
||||||
});
|
});
|
||||||
if let Some((idx, _)) = pair {
|
if let Some((idx, _)) = pair {
|
||||||
|
@ -102,16 +88,3 @@ pub fn sys_waitpid(pid: isize, exit_code_ptr: *mut i32) -> isize {
|
||||||
}
|
}
|
||||||
// ---- release current PCB automatically
|
// ---- release current PCB automatically
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn sys_kill(pid: usize, signal: u32) -> isize {
|
|
||||||
if let Some(process) = pid2process(pid) {
|
|
||||||
if let Some(flag) = SignalFlags::from_bits(signal) {
|
|
||||||
process.inner_exclusive_access().signals |= flag;
|
|
||||||
0
|
|
||||||
} else {
|
|
||||||
-1
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
-1
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,134 +0,0 @@
|
||||||
use crate::sync::{Condvar, Mutex, MutexBlocking, MutexSpin, Semaphore};
|
|
||||||
use crate::task::{block_current_and_run_next, current_process, current_task};
|
|
||||||
use crate::timer::{add_timer, get_time_ms};
|
|
||||||
use alloc::sync::Arc;
|
|
||||||
|
|
||||||
pub fn sys_sleep(ms: usize) -> isize {
|
|
||||||
let expire_ms = get_time_ms() + ms;
|
|
||||||
let task = current_task().unwrap();
|
|
||||||
add_timer(expire_ms, task);
|
|
||||||
block_current_and_run_next();
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_mutex_create(blocking: bool) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let mutex: Option<Arc<dyn Mutex>> = if !blocking {
|
|
||||||
Some(Arc::new(MutexSpin::new()))
|
|
||||||
} else {
|
|
||||||
Some(Arc::new(MutexBlocking::new()))
|
|
||||||
};
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
if let Some(id) = process_inner
|
|
||||||
.mutex_list
|
|
||||||
.iter()
|
|
||||||
.enumerate()
|
|
||||||
.find(|(_, item)| item.is_none())
|
|
||||||
.map(|(id, _)| id)
|
|
||||||
{
|
|
||||||
process_inner.mutex_list[id] = mutex;
|
|
||||||
id as isize
|
|
||||||
} else {
|
|
||||||
process_inner.mutex_list.push(mutex);
|
|
||||||
process_inner.mutex_list.len() as isize - 1
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_mutex_lock(mutex_id: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
let mutex = Arc::clone(process_inner.mutex_list[mutex_id].as_ref().unwrap());
|
|
||||||
drop(process_inner);
|
|
||||||
drop(process);
|
|
||||||
mutex.lock();
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_mutex_unlock(mutex_id: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
let mutex = Arc::clone(process_inner.mutex_list[mutex_id].as_ref().unwrap());
|
|
||||||
drop(process_inner);
|
|
||||||
drop(process);
|
|
||||||
mutex.unlock();
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_semaphore_create(res_count: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
let id = if let Some(id) = process_inner
|
|
||||||
.semaphore_list
|
|
||||||
.iter()
|
|
||||||
.enumerate()
|
|
||||||
.find(|(_, item)| item.is_none())
|
|
||||||
.map(|(id, _)| id)
|
|
||||||
{
|
|
||||||
process_inner.semaphore_list[id] = Some(Arc::new(Semaphore::new(res_count)));
|
|
||||||
id
|
|
||||||
} else {
|
|
||||||
process_inner
|
|
||||||
.semaphore_list
|
|
||||||
.push(Some(Arc::new(Semaphore::new(res_count))));
|
|
||||||
process_inner.semaphore_list.len() - 1
|
|
||||||
};
|
|
||||||
id as isize
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_semaphore_up(sem_id: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
let sem = Arc::clone(process_inner.semaphore_list[sem_id].as_ref().unwrap());
|
|
||||||
drop(process_inner);
|
|
||||||
sem.up();
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_semaphore_down(sem_id: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
let sem = Arc::clone(process_inner.semaphore_list[sem_id].as_ref().unwrap());
|
|
||||||
drop(process_inner);
|
|
||||||
sem.down();
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_condvar_create() -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
let id = if let Some(id) = process_inner
|
|
||||||
.condvar_list
|
|
||||||
.iter()
|
|
||||||
.enumerate()
|
|
||||||
.find(|(_, item)| item.is_none())
|
|
||||||
.map(|(id, _)| id)
|
|
||||||
{
|
|
||||||
process_inner.condvar_list[id] = Some(Arc::new(Condvar::new()));
|
|
||||||
id
|
|
||||||
} else {
|
|
||||||
process_inner
|
|
||||||
.condvar_list
|
|
||||||
.push(Some(Arc::new(Condvar::new())));
|
|
||||||
process_inner.condvar_list.len() - 1
|
|
||||||
};
|
|
||||||
id as isize
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_condvar_signal(condvar_id: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
let condvar = Arc::clone(process_inner.condvar_list[condvar_id].as_ref().unwrap());
|
|
||||||
drop(process_inner);
|
|
||||||
condvar.signal();
|
|
||||||
0
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_condvar_wait(condvar_id: usize, mutex_id: usize) -> isize {
|
|
||||||
let process = current_process();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
let condvar = Arc::clone(process_inner.condvar_list[condvar_id].as_ref().unwrap());
|
|
||||||
let mutex = Arc::clone(process_inner.mutex_list[mutex_id].as_ref().unwrap());
|
|
||||||
drop(process_inner);
|
|
||||||
condvar.wait_with_mutex(mutex);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,85 +0,0 @@
|
||||||
use crate::{
|
|
||||||
mm::kernel_token,
|
|
||||||
task::{add_task, current_task, TaskControlBlock},
|
|
||||||
trap::{trap_handler, TrapContext},
|
|
||||||
};
|
|
||||||
use alloc::sync::Arc;
|
|
||||||
|
|
||||||
pub fn sys_thread_create(entry: usize, arg: usize) -> isize {
|
|
||||||
let task = current_task().unwrap();
|
|
||||||
let process = task.process.upgrade().unwrap();
|
|
||||||
// create a new thread
|
|
||||||
let new_task = Arc::new(TaskControlBlock::new(
|
|
||||||
Arc::clone(&process),
|
|
||||||
task.inner_exclusive_access()
|
|
||||||
.res
|
|
||||||
.as_ref()
|
|
||||||
.unwrap()
|
|
||||||
.ustack_base,
|
|
||||||
true,
|
|
||||||
));
|
|
||||||
// add new task to scheduler
|
|
||||||
add_task(Arc::clone(&new_task));
|
|
||||||
let new_task_inner = new_task.inner_exclusive_access();
|
|
||||||
let new_task_res = new_task_inner.res.as_ref().unwrap();
|
|
||||||
let new_task_tid = new_task_res.tid;
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
// add new thread to current process
|
|
||||||
let tasks = &mut process_inner.tasks;
|
|
||||||
while tasks.len() < new_task_tid + 1 {
|
|
||||||
tasks.push(None);
|
|
||||||
}
|
|
||||||
tasks[new_task_tid] = Some(Arc::clone(&new_task));
|
|
||||||
let new_task_trap_cx = new_task_inner.get_trap_cx();
|
|
||||||
*new_task_trap_cx = TrapContext::app_init_context(
|
|
||||||
entry,
|
|
||||||
new_task_res.ustack_top(),
|
|
||||||
kernel_token(),
|
|
||||||
new_task.kstack.get_top(),
|
|
||||||
trap_handler as usize,
|
|
||||||
);
|
|
||||||
(*new_task_trap_cx).x[10] = arg;
|
|
||||||
new_task_tid as isize
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn sys_gettid() -> isize {
|
|
||||||
current_task()
|
|
||||||
.unwrap()
|
|
||||||
.inner_exclusive_access()
|
|
||||||
.res
|
|
||||||
.as_ref()
|
|
||||||
.unwrap()
|
|
||||||
.tid as isize
|
|
||||||
}
|
|
||||||
|
|
||||||
/// thread does not exist, return -1
|
|
||||||
/// thread has not exited yet, return -2
|
|
||||||
/// otherwise, return thread's exit code
|
|
||||||
pub fn sys_waittid(tid: usize) -> i32 {
|
|
||||||
let task = current_task().unwrap();
|
|
||||||
let process = task.process.upgrade().unwrap();
|
|
||||||
let task_inner = task.inner_exclusive_access();
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
// a thread cannot wait for itself
|
|
||||||
if task_inner.res.as_ref().unwrap().tid == tid {
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
let mut exit_code: Option<i32> = None;
|
|
||||||
let waited_task = process_inner.tasks[tid].as_ref();
|
|
||||||
if let Some(waited_task) = waited_task {
|
|
||||||
if let Some(waited_exit_code) = waited_task.inner_exclusive_access().exit_code {
|
|
||||||
exit_code = Some(waited_exit_code);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
// waited thread does not exist
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
if let Some(exit_code) = exit_code {
|
|
||||||
// dealloc the exited thread
|
|
||||||
process_inner.tasks[tid] = None;
|
|
||||||
exit_code
|
|
||||||
} else {
|
|
||||||
// waited thread has not exited
|
|
||||||
-2
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,13 +1,19 @@
|
||||||
|
//! Implementation of [`TaskContext`]
|
||||||
use crate::trap::trap_return;
|
use crate::trap::trap_return;
|
||||||
|
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
|
/// task context structure containing some registers
|
||||||
pub struct TaskContext {
|
pub struct TaskContext {
|
||||||
|
/// return address ( e.g. __restore ) of __switch ASM function
|
||||||
ra: usize,
|
ra: usize,
|
||||||
|
/// kernel stack pointer of app
|
||||||
sp: usize,
|
sp: usize,
|
||||||
|
/// s0-11 register, callee saved
|
||||||
s: [usize; 12],
|
s: [usize; 12],
|
||||||
}
|
}
|
||||||
|
|
||||||
impl TaskContext {
|
impl TaskContext {
|
||||||
|
/// init task context
|
||||||
pub fn zero_init() -> Self {
|
pub fn zero_init() -> Self {
|
||||||
Self {
|
Self {
|
||||||
ra: 0,
|
ra: 0,
|
||||||
|
@ -15,6 +21,7 @@ impl TaskContext {
|
||||||
s: [0; 12],
|
s: [0; 12],
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// set Task Context{__restore ASM funciton: trap_return, sp: kstack_ptr, s: s_0..12}
|
||||||
pub fn goto_trap_return(kstack_ptr: usize) -> Self {
|
pub fn goto_trap_return(kstack_ptr: usize) -> Self {
|
||||||
Self {
|
Self {
|
||||||
ra: trap_return as usize,
|
ra: trap_return as usize,
|
||||||
|
|
|
@ -1,226 +0,0 @@
|
||||||
use super::ProcessControlBlock;
|
|
||||||
use crate::config::{KERNEL_STACK_SIZE, PAGE_SIZE, TRAMPOLINE, TRAP_CONTEXT_BASE, USER_STACK_SIZE};
|
|
||||||
use crate::mm::{MapPermission, PhysPageNum, VirtAddr, KERNEL_SPACE};
|
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use alloc::{
|
|
||||||
sync::{Arc, Weak},
|
|
||||||
vec::Vec,
|
|
||||||
};
|
|
||||||
use lazy_static::*;
|
|
||||||
|
|
||||||
pub struct RecycleAllocator {
|
|
||||||
current: usize,
|
|
||||||
recycled: Vec<usize>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl RecycleAllocator {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
RecycleAllocator {
|
|
||||||
current: 0,
|
|
||||||
recycled: Vec::new(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn alloc(&mut self) -> usize {
|
|
||||||
if let Some(id) = self.recycled.pop() {
|
|
||||||
id
|
|
||||||
} else {
|
|
||||||
self.current += 1;
|
|
||||||
self.current - 1
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn dealloc(&mut self, id: usize) {
|
|
||||||
assert!(id < self.current);
|
|
||||||
assert!(
|
|
||||||
!self.recycled.iter().any(|i| *i == id),
|
|
||||||
"id {} has been deallocated!",
|
|
||||||
id
|
|
||||||
);
|
|
||||||
self.recycled.push(id);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref PID_ALLOCATOR: UPIntrFreeCell<RecycleAllocator> =
|
|
||||||
unsafe { UPIntrFreeCell::new(RecycleAllocator::new()) };
|
|
||||||
static ref KSTACK_ALLOCATOR: UPIntrFreeCell<RecycleAllocator> =
|
|
||||||
unsafe { UPIntrFreeCell::new(RecycleAllocator::new()) };
|
|
||||||
}
|
|
||||||
|
|
||||||
pub const IDLE_PID: usize = 0;
|
|
||||||
|
|
||||||
pub struct PidHandle(pub usize);
|
|
||||||
|
|
||||||
pub fn pid_alloc() -> PidHandle {
|
|
||||||
PidHandle(PID_ALLOCATOR.exclusive_access().alloc())
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Drop for PidHandle {
|
|
||||||
fn drop(&mut self) {
|
|
||||||
PID_ALLOCATOR.exclusive_access().dealloc(self.0);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Return (bottom, top) of a kernel stack in kernel space.
|
|
||||||
pub fn kernel_stack_position(kstack_id: usize) -> (usize, usize) {
|
|
||||||
let top = TRAMPOLINE - kstack_id * (KERNEL_STACK_SIZE + PAGE_SIZE);
|
|
||||||
let bottom = top - KERNEL_STACK_SIZE;
|
|
||||||
(bottom, top)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct KernelStack(pub usize);
|
|
||||||
|
|
||||||
pub fn kstack_alloc() -> KernelStack {
|
|
||||||
let kstack_id = KSTACK_ALLOCATOR.exclusive_access().alloc();
|
|
||||||
let (kstack_bottom, kstack_top) = kernel_stack_position(kstack_id);
|
|
||||||
KERNEL_SPACE.exclusive_access().insert_framed_area(
|
|
||||||
kstack_bottom.into(),
|
|
||||||
kstack_top.into(),
|
|
||||||
MapPermission::R | MapPermission::W,
|
|
||||||
);
|
|
||||||
KernelStack(kstack_id)
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Drop for KernelStack {
|
|
||||||
fn drop(&mut self) {
|
|
||||||
let (kernel_stack_bottom, _) = kernel_stack_position(self.0);
|
|
||||||
let kernel_stack_bottom_va: VirtAddr = kernel_stack_bottom.into();
|
|
||||||
KERNEL_SPACE
|
|
||||||
.exclusive_access()
|
|
||||||
.remove_area_with_start_vpn(kernel_stack_bottom_va.into());
|
|
||||||
KSTACK_ALLOCATOR.exclusive_access().dealloc(self.0);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl KernelStack {
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn push_on_top<T>(&self, value: T) -> *mut T
|
|
||||||
where
|
|
||||||
T: Sized,
|
|
||||||
{
|
|
||||||
let kernel_stack_top = self.get_top();
|
|
||||||
let ptr_mut = (kernel_stack_top - core::mem::size_of::<T>()) as *mut T;
|
|
||||||
unsafe {
|
|
||||||
*ptr_mut = value;
|
|
||||||
}
|
|
||||||
ptr_mut
|
|
||||||
}
|
|
||||||
pub fn get_top(&self) -> usize {
|
|
||||||
let (_, kernel_stack_top) = kernel_stack_position(self.0);
|
|
||||||
kernel_stack_top
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct TaskUserRes {
|
|
||||||
pub tid: usize,
|
|
||||||
pub ustack_base: usize,
|
|
||||||
pub process: Weak<ProcessControlBlock>,
|
|
||||||
}
|
|
||||||
|
|
||||||
fn trap_cx_bottom_from_tid(tid: usize) -> usize {
|
|
||||||
TRAP_CONTEXT_BASE - tid * PAGE_SIZE
|
|
||||||
}
|
|
||||||
|
|
||||||
fn ustack_bottom_from_tid(ustack_base: usize, tid: usize) -> usize {
|
|
||||||
ustack_base + tid * (PAGE_SIZE + USER_STACK_SIZE)
|
|
||||||
}
|
|
||||||
|
|
||||||
impl TaskUserRes {
|
|
||||||
pub fn new(
|
|
||||||
process: Arc<ProcessControlBlock>,
|
|
||||||
ustack_base: usize,
|
|
||||||
alloc_user_res: bool,
|
|
||||||
) -> Self {
|
|
||||||
let tid = process.inner_exclusive_access().alloc_tid();
|
|
||||||
let task_user_res = Self {
|
|
||||||
tid,
|
|
||||||
ustack_base,
|
|
||||||
process: Arc::downgrade(&process),
|
|
||||||
};
|
|
||||||
if alloc_user_res {
|
|
||||||
task_user_res.alloc_user_res();
|
|
||||||
}
|
|
||||||
task_user_res
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn alloc_user_res(&self) {
|
|
||||||
let process = self.process.upgrade().unwrap();
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
// alloc user stack
|
|
||||||
let ustack_bottom = ustack_bottom_from_tid(self.ustack_base, self.tid);
|
|
||||||
let ustack_top = ustack_bottom + USER_STACK_SIZE;
|
|
||||||
process_inner.memory_set.insert_framed_area(
|
|
||||||
ustack_bottom.into(),
|
|
||||||
ustack_top.into(),
|
|
||||||
MapPermission::R | MapPermission::W | MapPermission::U,
|
|
||||||
);
|
|
||||||
// alloc trap_cx
|
|
||||||
let trap_cx_bottom = trap_cx_bottom_from_tid(self.tid);
|
|
||||||
let trap_cx_top = trap_cx_bottom + PAGE_SIZE;
|
|
||||||
process_inner.memory_set.insert_framed_area(
|
|
||||||
trap_cx_bottom.into(),
|
|
||||||
trap_cx_top.into(),
|
|
||||||
MapPermission::R | MapPermission::W,
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
fn dealloc_user_res(&self) {
|
|
||||||
// dealloc tid
|
|
||||||
let process = self.process.upgrade().unwrap();
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
// dealloc ustack manually
|
|
||||||
let ustack_bottom_va: VirtAddr = ustack_bottom_from_tid(self.ustack_base, self.tid).into();
|
|
||||||
process_inner
|
|
||||||
.memory_set
|
|
||||||
.remove_area_with_start_vpn(ustack_bottom_va.into());
|
|
||||||
// dealloc trap_cx manually
|
|
||||||
let trap_cx_bottom_va: VirtAddr = trap_cx_bottom_from_tid(self.tid).into();
|
|
||||||
process_inner
|
|
||||||
.memory_set
|
|
||||||
.remove_area_with_start_vpn(trap_cx_bottom_va.into());
|
|
||||||
}
|
|
||||||
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn alloc_tid(&mut self) {
|
|
||||||
self.tid = self
|
|
||||||
.process
|
|
||||||
.upgrade()
|
|
||||||
.unwrap()
|
|
||||||
.inner_exclusive_access()
|
|
||||||
.alloc_tid();
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn dealloc_tid(&self) {
|
|
||||||
let process = self.process.upgrade().unwrap();
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
process_inner.dealloc_tid(self.tid);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn trap_cx_user_va(&self) -> usize {
|
|
||||||
trap_cx_bottom_from_tid(self.tid)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn trap_cx_ppn(&self) -> PhysPageNum {
|
|
||||||
let process = self.process.upgrade().unwrap();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
let trap_cx_bottom_va: VirtAddr = trap_cx_bottom_from_tid(self.tid).into();
|
|
||||||
process_inner
|
|
||||||
.memory_set
|
|
||||||
.translate(trap_cx_bottom_va.into())
|
|
||||||
.unwrap()
|
|
||||||
.ppn()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn ustack_base(&self) -> usize {
|
|
||||||
self.ustack_base
|
|
||||||
}
|
|
||||||
pub fn ustack_top(&self) -> usize {
|
|
||||||
ustack_bottom_from_tid(self.ustack_base, self.tid) + USER_STACK_SIZE
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Drop for TaskUserRes {
|
|
||||||
fn drop(&mut self) {
|
|
||||||
self.dealloc_tid();
|
|
||||||
self.dealloc_user_res();
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,62 +1,41 @@
|
||||||
use super::{ProcessControlBlock, TaskControlBlock, TaskStatus};
|
//!Implementation of [`TaskManager`]
|
||||||
use crate::sync::UPIntrFreeCell;
|
use super::TaskControlBlock;
|
||||||
use alloc::collections::{BTreeMap, VecDeque};
|
use crate::sync::UPSafeCell;
|
||||||
|
use alloc::collections::VecDeque;
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use lazy_static::*;
|
use lazy_static::*;
|
||||||
|
///A array of `TaskControlBlock` that is thread-safe
|
||||||
pub struct TaskManager {
|
pub struct TaskManager {
|
||||||
ready_queue: VecDeque<Arc<TaskControlBlock>>,
|
ready_queue: VecDeque<Arc<TaskControlBlock>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
/// A simple FIFO scheduler.
|
/// A simple FIFO scheduler.
|
||||||
impl TaskManager {
|
impl TaskManager {
|
||||||
|
///Creat an empty TaskManager
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
Self {
|
Self {
|
||||||
ready_queue: VecDeque::new(),
|
ready_queue: VecDeque::new(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Add a task to `TaskManager`
|
||||||
pub fn add(&mut self, task: Arc<TaskControlBlock>) {
|
pub fn add(&mut self, task: Arc<TaskControlBlock>) {
|
||||||
self.ready_queue.push_back(task);
|
self.ready_queue.push_back(task);
|
||||||
}
|
}
|
||||||
|
///Remove the first task and return it,or `None` if `TaskManager` is empty
|
||||||
pub fn fetch(&mut self) -> Option<Arc<TaskControlBlock>> {
|
pub fn fetch(&mut self) -> Option<Arc<TaskControlBlock>> {
|
||||||
self.ready_queue.pop_front()
|
self.ready_queue.pop_front()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
lazy_static! {
|
lazy_static! {
|
||||||
pub static ref TASK_MANAGER: UPIntrFreeCell<TaskManager> =
|
pub static ref TASK_MANAGER: UPSafeCell<TaskManager> =
|
||||||
unsafe { UPIntrFreeCell::new(TaskManager::new()) };
|
unsafe { UPSafeCell::new(TaskManager::new()) };
|
||||||
pub static ref PID2PCB: UPIntrFreeCell<BTreeMap<usize, Arc<ProcessControlBlock>>> =
|
|
||||||
unsafe { UPIntrFreeCell::new(BTreeMap::new()) };
|
|
||||||
}
|
}
|
||||||
|
///Interface offered to add task
|
||||||
pub fn add_task(task: Arc<TaskControlBlock>) {
|
pub fn add_task(task: Arc<TaskControlBlock>) {
|
||||||
TASK_MANAGER.exclusive_access().add(task);
|
TASK_MANAGER.exclusive_access().add(task);
|
||||||
}
|
}
|
||||||
|
///Interface offered to pop the first task
|
||||||
pub fn wakeup_task(task: Arc<TaskControlBlock>) {
|
|
||||||
let mut task_inner = task.inner_exclusive_access();
|
|
||||||
task_inner.task_status = TaskStatus::Ready;
|
|
||||||
drop(task_inner);
|
|
||||||
add_task(task);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn fetch_task() -> Option<Arc<TaskControlBlock>> {
|
pub fn fetch_task() -> Option<Arc<TaskControlBlock>> {
|
||||||
TASK_MANAGER.exclusive_access().fetch()
|
TASK_MANAGER.exclusive_access().fetch()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn pid2process(pid: usize) -> Option<Arc<ProcessControlBlock>> {
|
|
||||||
let map = PID2PCB.exclusive_access();
|
|
||||||
map.get(&pid).map(Arc::clone)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn insert_into_pid2process(pid: usize, process: Arc<ProcessControlBlock>) {
|
|
||||||
PID2PCB.exclusive_access().insert(pid, process);
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn remove_from_pid2process(pid: usize) {
|
|
||||||
let mut map = PID2PCB.exclusive_access();
|
|
||||||
if map.remove(&pid).is_none() {
|
|
||||||
panic!("cannot find pid {} in pid2task!", pid);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,32 +1,44 @@
|
||||||
|
//! Task management implementation
|
||||||
|
//!
|
||||||
|
//! Everything about task management, like starting and switching tasks is
|
||||||
|
//! implemented here.
|
||||||
|
//!
|
||||||
|
//! A single global instance of [`TaskManager`] called `TASK_MANAGER` controls
|
||||||
|
//! all the tasks in the whole operating system.
|
||||||
|
//!
|
||||||
|
//! A single global instance of [`Processor`] called `PROCESSOR` monitors running
|
||||||
|
//! task(s) for each core.
|
||||||
|
//!
|
||||||
|
//! A single global instance of [`PidAllocator`] called `PID_ALLOCATOR` allocates
|
||||||
|
//! pid for user apps.
|
||||||
|
//!
|
||||||
|
//! Be careful when you see `__switch` ASM function in `switch.S`. Control flow around this function
|
||||||
|
//! might not be what you expect.
|
||||||
mod context;
|
mod context;
|
||||||
mod id;
|
|
||||||
mod manager;
|
mod manager;
|
||||||
mod process;
|
mod pid;
|
||||||
mod processor;
|
mod processor;
|
||||||
mod signal;
|
|
||||||
mod switch;
|
mod switch;
|
||||||
#[allow(clippy::module_inception)]
|
#[allow(clippy::module_inception)]
|
||||||
|
#[allow(rustdoc::private_intra_doc_links)]
|
||||||
mod task;
|
mod task;
|
||||||
|
|
||||||
use self::id::TaskUserRes;
|
use crate::fs::{OpenFlags, open_file};
|
||||||
use crate::fs::{open_file, OpenFlags};
|
|
||||||
use crate::sbi::shutdown;
|
use crate::sbi::shutdown;
|
||||||
use alloc::{sync::Arc, vec::Vec};
|
use alloc::sync::Arc;
|
||||||
use lazy_static::*;
|
|
||||||
use manager::fetch_task;
|
|
||||||
use process::ProcessControlBlock;
|
|
||||||
use switch::__switch;
|
|
||||||
|
|
||||||
pub use context::TaskContext;
|
pub use context::TaskContext;
|
||||||
pub use id::{kstack_alloc, pid_alloc, KernelStack, PidHandle, IDLE_PID};
|
use lazy_static::*;
|
||||||
pub use manager::{add_task, pid2process, remove_from_pid2process, wakeup_task};
|
pub use manager::{TaskManager, fetch_task};
|
||||||
pub use processor::{
|
use switch::__switch;
|
||||||
current_kstack_top, current_process, current_task, current_trap_cx, current_trap_cx_user_va,
|
use task::{TaskControlBlock, TaskStatus};
|
||||||
current_user_token, run_tasks, schedule, take_current_task,
|
|
||||||
};
|
|
||||||
pub use signal::SignalFlags;
|
|
||||||
pub use task::{TaskControlBlock, TaskStatus};
|
|
||||||
|
|
||||||
|
pub use manager::add_task;
|
||||||
|
pub use pid::{KernelStack, PidAllocator, PidHandle, pid_alloc};
|
||||||
|
pub use processor::{
|
||||||
|
Processor, current_task, current_trap_cx, current_user_token, run_tasks, schedule,
|
||||||
|
take_current_task,
|
||||||
|
};
|
||||||
|
/// Suspend the current 'Running' task and run the next task in task list.
|
||||||
pub fn suspend_current_and_run_next() {
|
pub fn suspend_current_and_run_next() {
|
||||||
// There must be an application running.
|
// There must be an application running.
|
||||||
let task = take_current_task().unwrap();
|
let task = take_current_task().unwrap();
|
||||||
|
@ -37,7 +49,7 @@ pub fn suspend_current_and_run_next() {
|
||||||
// Change status to Ready
|
// Change status to Ready
|
||||||
task_inner.task_status = TaskStatus::Ready;
|
task_inner.task_status = TaskStatus::Ready;
|
||||||
drop(task_inner);
|
drop(task_inner);
|
||||||
// ---- release current TCB
|
// ---- release current PCB
|
||||||
|
|
||||||
// push back to ready queue.
|
// push back to ready queue.
|
||||||
add_task(task);
|
add_task(task);
|
||||||
|
@ -45,122 +57,68 @@ pub fn suspend_current_and_run_next() {
|
||||||
schedule(task_cx_ptr);
|
schedule(task_cx_ptr);
|
||||||
}
|
}
|
||||||
|
|
||||||
/// This function must be followed by a schedule
|
/// pid of usertests app in make run TEST=1
|
||||||
pub fn block_current_task() -> *mut TaskContext {
|
pub const IDLE_PID: usize = 0;
|
||||||
let task = take_current_task().unwrap();
|
|
||||||
let mut task_inner = task.inner_exclusive_access();
|
|
||||||
task_inner.task_status = TaskStatus::Blocked;
|
|
||||||
&mut task_inner.task_cx as *mut TaskContext
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn block_current_and_run_next() {
|
|
||||||
let task_cx_ptr = block_current_task();
|
|
||||||
schedule(task_cx_ptr);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Exit the current 'Running' task and run the next task in task list.
|
/// Exit the current 'Running' task and run the next task in task list.
|
||||||
pub fn exit_current_and_run_next(exit_code: i32) {
|
pub fn exit_current_and_run_next(exit_code: i32) {
|
||||||
|
// take from Processor
|
||||||
let task = take_current_task().unwrap();
|
let task = take_current_task().unwrap();
|
||||||
let mut task_inner = task.inner_exclusive_access();
|
|
||||||
let process = task.process.upgrade().unwrap();
|
|
||||||
let tid = task_inner.res.as_ref().unwrap().tid;
|
|
||||||
// record exit code
|
|
||||||
task_inner.exit_code = Some(exit_code);
|
|
||||||
task_inner.res = None;
|
|
||||||
// here we do not remove the thread since we are still using the kstack
|
|
||||||
// it will be deallocated when sys_waittid is called
|
|
||||||
drop(task_inner);
|
|
||||||
drop(task);
|
|
||||||
// however, if this is the main thread of current process
|
|
||||||
// the process should terminate at once
|
|
||||||
if tid == 0 {
|
|
||||||
let pid = process.getpid();
|
|
||||||
if pid == IDLE_PID {
|
|
||||||
println!(
|
|
||||||
"[kernel] Idle process exit with exit_code {} ...",
|
|
||||||
exit_code
|
|
||||||
);
|
|
||||||
if exit_code != 0 {
|
|
||||||
//crate::sbi::shutdown(255); //255 == -1 for err hint
|
|
||||||
shutdown(true);
|
|
||||||
} else {
|
|
||||||
//crate::sbi::shutdown(0); //0 for success hint
|
|
||||||
shutdown(false);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
remove_from_pid2process(pid);
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
// mark this process as a zombie process
|
|
||||||
process_inner.is_zombie = true;
|
|
||||||
// record exit code of main process
|
|
||||||
process_inner.exit_code = exit_code;
|
|
||||||
|
|
||||||
{
|
let pid = task.getpid();
|
||||||
// move all child processes under init process
|
if pid == IDLE_PID {
|
||||||
let mut initproc_inner = INITPROC.inner_exclusive_access();
|
println!(
|
||||||
for child in process_inner.children.iter() {
|
"[kernel] Idle process exit with exit_code {} ...",
|
||||||
child.inner_exclusive_access().parent = Some(Arc::downgrade(&INITPROC));
|
exit_code
|
||||||
initproc_inner.children.push(child.clone());
|
);
|
||||||
}
|
if exit_code != 0 {
|
||||||
}
|
//crate::sbi::shutdown(255); //255 == -1 for err hint
|
||||||
|
shutdown(true)
|
||||||
// deallocate user res (including tid/trap_cx/ustack) of all threads
|
} else {
|
||||||
// it has to be done before we dealloc the whole memory_set
|
//crate::sbi::shutdown(0); //0 for success hint
|
||||||
// otherwise they will be deallocated twice
|
shutdown(false)
|
||||||
let mut recycle_res = Vec::<TaskUserRes>::new();
|
|
||||||
for task in process_inner.tasks.iter().filter(|t| t.is_some()) {
|
|
||||||
let task = task.as_ref().unwrap();
|
|
||||||
let mut task_inner = task.inner_exclusive_access();
|
|
||||||
if let Some(res) = task_inner.res.take() {
|
|
||||||
recycle_res.push(res);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// dealloc_tid and dealloc_user_res require access to PCB inner, so we
|
|
||||||
// need to collect those user res first, then release process_inner
|
|
||||||
// for now to avoid deadlock/double borrow problem.
|
|
||||||
drop(process_inner);
|
|
||||||
recycle_res.clear();
|
|
||||||
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
process_inner.children.clear();
|
|
||||||
// deallocate other data in user space i.e. program code/data section
|
|
||||||
process_inner.memory_set.recycle_data_pages();
|
|
||||||
// drop file descriptors
|
|
||||||
process_inner.fd_table.clear();
|
|
||||||
// Remove all tasks except for the main thread itself.
|
|
||||||
// This is because we are still using the kstack under the TCB
|
|
||||||
// of the main thread. This TCB, including its kstack, will be
|
|
||||||
// deallocated when the process is reaped via waitpid.
|
|
||||||
while process_inner.tasks.len() > 1 {
|
|
||||||
process_inner.tasks.pop();
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
drop(process);
|
|
||||||
|
// **** access current TCB exclusively
|
||||||
|
let mut inner = task.inner_exclusive_access();
|
||||||
|
// Change status to Zombie
|
||||||
|
inner.task_status = TaskStatus::Zombie;
|
||||||
|
// Record exit code
|
||||||
|
inner.exit_code = exit_code;
|
||||||
|
// do not move to its parent but under initproc
|
||||||
|
|
||||||
|
// ++++++ access initproc TCB exclusively
|
||||||
|
{
|
||||||
|
let mut initproc_inner = INITPROC.inner_exclusive_access();
|
||||||
|
for child in inner.children.iter() {
|
||||||
|
child.inner_exclusive_access().parent = Some(Arc::downgrade(&INITPROC));
|
||||||
|
initproc_inner.children.push(child.clone());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// ++++++ release parent PCB
|
||||||
|
|
||||||
|
inner.children.clear();
|
||||||
|
// deallocate user space
|
||||||
|
inner.memory_set.recycle_data_pages();
|
||||||
|
drop(inner);
|
||||||
|
// **** release current PCB
|
||||||
|
// drop task manually to maintain rc correctly
|
||||||
|
drop(task);
|
||||||
// we do not have to save task context
|
// we do not have to save task context
|
||||||
let mut _unused = TaskContext::zero_init();
|
let mut _unused = TaskContext::zero_init();
|
||||||
schedule(&mut _unused as *mut _);
|
schedule(&mut _unused as *mut _);
|
||||||
}
|
}
|
||||||
|
|
||||||
lazy_static! {
|
lazy_static! {
|
||||||
pub static ref INITPROC: Arc<ProcessControlBlock> = {
|
///Globle process that init user shell
|
||||||
|
pub static ref INITPROC: Arc<TaskControlBlock> = Arc::new({
|
||||||
let inode = open_file("initproc", OpenFlags::RDONLY).unwrap();
|
let inode = open_file("initproc", OpenFlags::RDONLY).unwrap();
|
||||||
let v = inode.read_all();
|
let v = inode.read_all();
|
||||||
ProcessControlBlock::new(v.as_slice())
|
TaskControlBlock::new(v.as_slice())
|
||||||
};
|
});
|
||||||
}
|
}
|
||||||
|
///Add init process to the manager
|
||||||
pub fn add_initproc() {
|
pub fn add_initproc() {
|
||||||
let _initproc = INITPROC.clone();
|
add_task(INITPROC.clone());
|
||||||
}
|
|
||||||
|
|
||||||
pub fn check_signals_of_current() -> Option<(i32, &'static str)> {
|
|
||||||
let process = current_process();
|
|
||||||
let process_inner = process.inner_exclusive_access();
|
|
||||||
process_inner.signals.check_error()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn current_add_signal(signal: SignalFlags) {
|
|
||||||
let process = current_process();
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
process_inner.signals |= signal;
|
|
||||||
}
|
}
|
||||||
|
|
111
os/src/task/pid.rs
Normal file
111
os/src/task/pid.rs
Normal file
|
@ -0,0 +1,111 @@
|
||||||
|
//!Implementation of [`PidAllocator`]
|
||||||
|
use crate::config::{KERNEL_STACK_SIZE, PAGE_SIZE, TRAMPOLINE};
|
||||||
|
use crate::mm::{KERNEL_SPACE, MapPermission, VirtAddr};
|
||||||
|
use crate::sync::UPSafeCell;
|
||||||
|
use alloc::vec::Vec;
|
||||||
|
use lazy_static::*;
|
||||||
|
///Pid Allocator struct
|
||||||
|
pub struct PidAllocator {
|
||||||
|
current: usize,
|
||||||
|
recycled: Vec<usize>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl PidAllocator {
|
||||||
|
///Create an empty `PidAllocator`
|
||||||
|
pub fn new() -> Self {
|
||||||
|
PidAllocator {
|
||||||
|
current: 0,
|
||||||
|
recycled: Vec::new(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
///Allocate a pid
|
||||||
|
pub fn alloc(&mut self) -> PidHandle {
|
||||||
|
if let Some(pid) = self.recycled.pop() {
|
||||||
|
PidHandle(pid)
|
||||||
|
} else {
|
||||||
|
self.current += 1;
|
||||||
|
PidHandle(self.current - 1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
///Recycle a pid
|
||||||
|
pub fn dealloc(&mut self, pid: usize) {
|
||||||
|
assert!(pid < self.current);
|
||||||
|
assert!(
|
||||||
|
!self.recycled.iter().any(|ppid| *ppid == pid),
|
||||||
|
"pid {} has been deallocated!",
|
||||||
|
pid
|
||||||
|
);
|
||||||
|
self.recycled.push(pid);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
lazy_static! {
|
||||||
|
pub static ref PID_ALLOCATOR: UPSafeCell<PidAllocator> =
|
||||||
|
unsafe { UPSafeCell::new(PidAllocator::new()) };
|
||||||
|
}
|
||||||
|
///Bind pid lifetime to `PidHandle`
|
||||||
|
pub struct PidHandle(pub usize);
|
||||||
|
|
||||||
|
impl Drop for PidHandle {
|
||||||
|
fn drop(&mut self) {
|
||||||
|
//println!("drop pid {}", self.0);
|
||||||
|
PID_ALLOCATOR.exclusive_access().dealloc(self.0);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
///Allocate a pid from PID_ALLOCATOR
|
||||||
|
pub fn pid_alloc() -> PidHandle {
|
||||||
|
PID_ALLOCATOR.exclusive_access().alloc()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Return (bottom, top) of a kernel stack in kernel space.
|
||||||
|
pub fn kernel_stack_position(app_id: usize) -> (usize, usize) {
|
||||||
|
let top = TRAMPOLINE - app_id * (KERNEL_STACK_SIZE + PAGE_SIZE);
|
||||||
|
let bottom = top - KERNEL_STACK_SIZE;
|
||||||
|
(bottom, top)
|
||||||
|
}
|
||||||
|
///Kernelstack for app
|
||||||
|
pub struct KernelStack {
|
||||||
|
pid: usize,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl KernelStack {
|
||||||
|
///Create a kernelstack from pid
|
||||||
|
pub fn new(pid_handle: &PidHandle) -> Self {
|
||||||
|
let pid = pid_handle.0;
|
||||||
|
let (kernel_stack_bottom, kernel_stack_top) = kernel_stack_position(pid);
|
||||||
|
KERNEL_SPACE.exclusive_access().insert_framed_area(
|
||||||
|
kernel_stack_bottom.into(),
|
||||||
|
kernel_stack_top.into(),
|
||||||
|
MapPermission::R | MapPermission::W,
|
||||||
|
);
|
||||||
|
KernelStack { pid: pid_handle.0 }
|
||||||
|
}
|
||||||
|
#[allow(unused)]
|
||||||
|
///Push a value on top of kernelstack
|
||||||
|
pub fn push_on_top<T>(&self, value: T) -> *mut T
|
||||||
|
where
|
||||||
|
T: Sized,
|
||||||
|
{
|
||||||
|
let kernel_stack_top = self.get_top();
|
||||||
|
let ptr_mut = (kernel_stack_top - core::mem::size_of::<T>()) as *mut T;
|
||||||
|
unsafe {
|
||||||
|
*ptr_mut = value;
|
||||||
|
}
|
||||||
|
ptr_mut
|
||||||
|
}
|
||||||
|
///Get the value on the top of kernelstack
|
||||||
|
pub fn get_top(&self) -> usize {
|
||||||
|
let (_, kernel_stack_top) = kernel_stack_position(self.pid);
|
||||||
|
kernel_stack_top
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Drop for KernelStack {
|
||||||
|
fn drop(&mut self) {
|
||||||
|
let (kernel_stack_bottom, _) = kernel_stack_position(self.pid);
|
||||||
|
let kernel_stack_bottom_va: VirtAddr = kernel_stack_bottom.into();
|
||||||
|
KERNEL_SPACE
|
||||||
|
.exclusive_access()
|
||||||
|
.remove_area_with_start_vpn(kernel_stack_bottom_va.into());
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,258 +0,0 @@
|
||||||
use super::id::RecycleAllocator;
|
|
||||||
use super::manager::insert_into_pid2process;
|
|
||||||
use super::TaskControlBlock;
|
|
||||||
use super::{add_task, SignalFlags};
|
|
||||||
use super::{pid_alloc, PidHandle};
|
|
||||||
use crate::fs::{File, Stdin, Stdout};
|
|
||||||
use crate::mm::{translated_refmut, MemorySet, KERNEL_SPACE};
|
|
||||||
use crate::sync::{Condvar, Mutex, Semaphore, UPIntrFreeCell, UPIntrRefMut};
|
|
||||||
use crate::trap::{trap_handler, TrapContext};
|
|
||||||
use alloc::string::String;
|
|
||||||
use alloc::sync::{Arc, Weak};
|
|
||||||
use alloc::vec;
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
|
|
||||||
pub struct ProcessControlBlock {
|
|
||||||
// immutable
|
|
||||||
pub pid: PidHandle,
|
|
||||||
// mutable
|
|
||||||
inner: UPIntrFreeCell<ProcessControlBlockInner>,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct ProcessControlBlockInner {
|
|
||||||
pub is_zombie: bool,
|
|
||||||
pub memory_set: MemorySet,
|
|
||||||
pub parent: Option<Weak<ProcessControlBlock>>,
|
|
||||||
pub children: Vec<Arc<ProcessControlBlock>>,
|
|
||||||
pub exit_code: i32,
|
|
||||||
pub fd_table: Vec<Option<Arc<dyn File + Send + Sync>>>,
|
|
||||||
pub signals: SignalFlags,
|
|
||||||
pub tasks: Vec<Option<Arc<TaskControlBlock>>>,
|
|
||||||
pub task_res_allocator: RecycleAllocator,
|
|
||||||
pub mutex_list: Vec<Option<Arc<dyn Mutex>>>,
|
|
||||||
pub semaphore_list: Vec<Option<Arc<Semaphore>>>,
|
|
||||||
pub condvar_list: Vec<Option<Arc<Condvar>>>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl ProcessControlBlockInner {
|
|
||||||
#[allow(unused)]
|
|
||||||
pub fn get_user_token(&self) -> usize {
|
|
||||||
self.memory_set.token()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn alloc_fd(&mut self) -> usize {
|
|
||||||
if let Some(fd) = (0..self.fd_table.len()).find(|fd| self.fd_table[*fd].is_none()) {
|
|
||||||
fd
|
|
||||||
} else {
|
|
||||||
self.fd_table.push(None);
|
|
||||||
self.fd_table.len() - 1
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn alloc_tid(&mut self) -> usize {
|
|
||||||
self.task_res_allocator.alloc()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn dealloc_tid(&mut self, tid: usize) {
|
|
||||||
self.task_res_allocator.dealloc(tid)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn thread_count(&self) -> usize {
|
|
||||||
self.tasks.len()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn get_task(&self, tid: usize) -> Arc<TaskControlBlock> {
|
|
||||||
self.tasks[tid].as_ref().unwrap().clone()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl ProcessControlBlock {
|
|
||||||
pub fn inner_exclusive_access(&self) -> UPIntrRefMut<'_, ProcessControlBlockInner> {
|
|
||||||
self.inner.exclusive_access()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn new(elf_data: &[u8]) -> Arc<Self> {
|
|
||||||
// memory_set with elf program headers/trampoline/trap context/user stack
|
|
||||||
let (memory_set, ustack_base, entry_point) = MemorySet::from_elf(elf_data);
|
|
||||||
// allocate a pid
|
|
||||||
let pid_handle = pid_alloc();
|
|
||||||
let process = Arc::new(Self {
|
|
||||||
pid: pid_handle,
|
|
||||||
inner: unsafe {
|
|
||||||
UPIntrFreeCell::new(ProcessControlBlockInner {
|
|
||||||
is_zombie: false,
|
|
||||||
memory_set,
|
|
||||||
parent: None,
|
|
||||||
children: Vec::new(),
|
|
||||||
exit_code: 0,
|
|
||||||
fd_table: vec![
|
|
||||||
// 0 -> stdin
|
|
||||||
Some(Arc::new(Stdin)),
|
|
||||||
// 1 -> stdout
|
|
||||||
Some(Arc::new(Stdout)),
|
|
||||||
// 2 -> stderr
|
|
||||||
Some(Arc::new(Stdout)),
|
|
||||||
],
|
|
||||||
signals: SignalFlags::empty(),
|
|
||||||
tasks: Vec::new(),
|
|
||||||
task_res_allocator: RecycleAllocator::new(),
|
|
||||||
mutex_list: Vec::new(),
|
|
||||||
semaphore_list: Vec::new(),
|
|
||||||
condvar_list: Vec::new(),
|
|
||||||
})
|
|
||||||
},
|
|
||||||
});
|
|
||||||
// create a main thread, we should allocate ustack and trap_cx here
|
|
||||||
let task = Arc::new(TaskControlBlock::new(
|
|
||||||
Arc::clone(&process),
|
|
||||||
ustack_base,
|
|
||||||
true,
|
|
||||||
));
|
|
||||||
// prepare trap_cx of main thread
|
|
||||||
let task_inner = task.inner_exclusive_access();
|
|
||||||
let trap_cx = task_inner.get_trap_cx();
|
|
||||||
let ustack_top = task_inner.res.as_ref().unwrap().ustack_top();
|
|
||||||
let kstack_top = task.kstack.get_top();
|
|
||||||
drop(task_inner);
|
|
||||||
*trap_cx = TrapContext::app_init_context(
|
|
||||||
entry_point,
|
|
||||||
ustack_top,
|
|
||||||
KERNEL_SPACE.exclusive_access().token(),
|
|
||||||
kstack_top,
|
|
||||||
trap_handler as usize,
|
|
||||||
);
|
|
||||||
// add main thread to the process
|
|
||||||
let mut process_inner = process.inner_exclusive_access();
|
|
||||||
process_inner.tasks.push(Some(Arc::clone(&task)));
|
|
||||||
drop(process_inner);
|
|
||||||
insert_into_pid2process(process.getpid(), Arc::clone(&process));
|
|
||||||
// add main thread to scheduler
|
|
||||||
add_task(task);
|
|
||||||
process
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Only support processes with a single thread.
|
|
||||||
pub fn exec(self: &Arc<Self>, elf_data: &[u8], args: Vec<String>) {
|
|
||||||
assert_eq!(self.inner_exclusive_access().thread_count(), 1);
|
|
||||||
// memory_set with elf program headers/trampoline/trap context/user stack
|
|
||||||
let (memory_set, ustack_base, entry_point) = MemorySet::from_elf(elf_data);
|
|
||||||
let new_token = memory_set.token();
|
|
||||||
// substitute memory_set
|
|
||||||
self.inner_exclusive_access().memory_set = memory_set;
|
|
||||||
// then we alloc user resource for main thread again
|
|
||||||
// since memory_set has been changed
|
|
||||||
let task = self.inner_exclusive_access().get_task(0);
|
|
||||||
let mut task_inner = task.inner_exclusive_access();
|
|
||||||
task_inner.res.as_mut().unwrap().ustack_base = ustack_base;
|
|
||||||
task_inner.res.as_mut().unwrap().alloc_user_res();
|
|
||||||
task_inner.trap_cx_ppn = task_inner.res.as_mut().unwrap().trap_cx_ppn();
|
|
||||||
// push arguments on user stack
|
|
||||||
let mut user_sp = task_inner.res.as_mut().unwrap().ustack_top();
|
|
||||||
user_sp -= (args.len() + 1) * core::mem::size_of::<usize>();
|
|
||||||
let argv_base = user_sp;
|
|
||||||
let mut argv: Vec<_> = (0..=args.len())
|
|
||||||
.map(|arg| {
|
|
||||||
translated_refmut(
|
|
||||||
new_token,
|
|
||||||
(argv_base + arg * core::mem::size_of::<usize>()) as *mut usize,
|
|
||||||
)
|
|
||||||
})
|
|
||||||
.collect();
|
|
||||||
*argv[args.len()] = 0;
|
|
||||||
for i in 0..args.len() {
|
|
||||||
user_sp -= args[i].len() + 1;
|
|
||||||
*argv[i] = user_sp;
|
|
||||||
let mut p = user_sp;
|
|
||||||
for c in args[i].as_bytes() {
|
|
||||||
*translated_refmut(new_token, p as *mut u8) = *c;
|
|
||||||
p += 1;
|
|
||||||
}
|
|
||||||
*translated_refmut(new_token, p as *mut u8) = 0;
|
|
||||||
}
|
|
||||||
// make the user_sp aligned to 8B for k210 platform
|
|
||||||
user_sp -= user_sp % core::mem::size_of::<usize>();
|
|
||||||
// initialize trap_cx
|
|
||||||
let mut trap_cx = TrapContext::app_init_context(
|
|
||||||
entry_point,
|
|
||||||
user_sp,
|
|
||||||
KERNEL_SPACE.exclusive_access().token(),
|
|
||||||
task.kstack.get_top(),
|
|
||||||
trap_handler as usize,
|
|
||||||
);
|
|
||||||
trap_cx.x[10] = args.len();
|
|
||||||
trap_cx.x[11] = argv_base;
|
|
||||||
*task_inner.get_trap_cx() = trap_cx;
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Only support processes with a single thread.
|
|
||||||
pub fn fork(self: &Arc<Self>) -> Arc<Self> {
|
|
||||||
let mut parent = self.inner_exclusive_access();
|
|
||||||
assert_eq!(parent.thread_count(), 1);
|
|
||||||
// clone parent's memory_set completely including trampoline/ustacks/trap_cxs
|
|
||||||
let memory_set = MemorySet::from_existed_user(&parent.memory_set);
|
|
||||||
// alloc a pid
|
|
||||||
let pid = pid_alloc();
|
|
||||||
// copy fd table
|
|
||||||
let mut new_fd_table: Vec<Option<Arc<dyn File + Send + Sync>>> = Vec::new();
|
|
||||||
for fd in parent.fd_table.iter() {
|
|
||||||
if let Some(file) = fd {
|
|
||||||
new_fd_table.push(Some(file.clone()));
|
|
||||||
} else {
|
|
||||||
new_fd_table.push(None);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// create child process pcb
|
|
||||||
let child = Arc::new(Self {
|
|
||||||
pid,
|
|
||||||
inner: unsafe {
|
|
||||||
UPIntrFreeCell::new(ProcessControlBlockInner {
|
|
||||||
is_zombie: false,
|
|
||||||
memory_set,
|
|
||||||
parent: Some(Arc::downgrade(self)),
|
|
||||||
children: Vec::new(),
|
|
||||||
exit_code: 0,
|
|
||||||
fd_table: new_fd_table,
|
|
||||||
signals: SignalFlags::empty(),
|
|
||||||
tasks: Vec::new(),
|
|
||||||
task_res_allocator: RecycleAllocator::new(),
|
|
||||||
mutex_list: Vec::new(),
|
|
||||||
semaphore_list: Vec::new(),
|
|
||||||
condvar_list: Vec::new(),
|
|
||||||
})
|
|
||||||
},
|
|
||||||
});
|
|
||||||
// add child
|
|
||||||
parent.children.push(Arc::clone(&child));
|
|
||||||
// create main thread of child process
|
|
||||||
let task = Arc::new(TaskControlBlock::new(
|
|
||||||
Arc::clone(&child),
|
|
||||||
parent
|
|
||||||
.get_task(0)
|
|
||||||
.inner_exclusive_access()
|
|
||||||
.res
|
|
||||||
.as_ref()
|
|
||||||
.unwrap()
|
|
||||||
.ustack_base(),
|
|
||||||
// here we do not allocate trap_cx or ustack again
|
|
||||||
// but mention that we allocate a new kstack here
|
|
||||||
false,
|
|
||||||
));
|
|
||||||
// attach task to child process
|
|
||||||
let mut child_inner = child.inner_exclusive_access();
|
|
||||||
child_inner.tasks.push(Some(Arc::clone(&task)));
|
|
||||||
drop(child_inner);
|
|
||||||
// modify kstack_top in trap_cx of this thread
|
|
||||||
let task_inner = task.inner_exclusive_access();
|
|
||||||
let trap_cx = task_inner.get_trap_cx();
|
|
||||||
trap_cx.kernel_sp = task.kstack.get_top();
|
|
||||||
drop(task_inner);
|
|
||||||
insert_into_pid2process(child.getpid(), Arc::clone(&child));
|
|
||||||
// add this thread to scheduler
|
|
||||||
add_task(task);
|
|
||||||
child
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn getpid(&self) -> usize {
|
|
||||||
self.pid.0
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,110 +1,92 @@
|
||||||
|
//!Implementation of [`Processor`] and Intersection of control flow
|
||||||
use super::__switch;
|
use super::__switch;
|
||||||
use super::{fetch_task, TaskStatus};
|
use super::{TaskContext, TaskControlBlock};
|
||||||
use super::{ProcessControlBlock, TaskContext, TaskControlBlock};
|
use super::{TaskStatus, fetch_task};
|
||||||
use crate::sync::UPIntrFreeCell;
|
use crate::sync::UPSafeCell;
|
||||||
use crate::trap::TrapContext;
|
use crate::trap::TrapContext;
|
||||||
use alloc::sync::Arc;
|
use alloc::sync::Arc;
|
||||||
use core::arch::asm;
|
|
||||||
use lazy_static::*;
|
use lazy_static::*;
|
||||||
|
///Processor management structure
|
||||||
pub struct Processor {
|
pub struct Processor {
|
||||||
|
///The task currently executing on the current processor
|
||||||
current: Option<Arc<TaskControlBlock>>,
|
current: Option<Arc<TaskControlBlock>>,
|
||||||
|
///The basic control flow of each core, helping to select and switch process
|
||||||
idle_task_cx: TaskContext,
|
idle_task_cx: TaskContext,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Processor {
|
impl Processor {
|
||||||
|
///Create an empty Processor
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
Self {
|
Self {
|
||||||
current: None,
|
current: None,
|
||||||
idle_task_cx: TaskContext::zero_init(),
|
idle_task_cx: TaskContext::zero_init(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Get mutable reference to `idle_task_cx`
|
||||||
fn get_idle_task_cx_ptr(&mut self) -> *mut TaskContext {
|
fn get_idle_task_cx_ptr(&mut self) -> *mut TaskContext {
|
||||||
&mut self.idle_task_cx as *mut _
|
&mut self.idle_task_cx as *mut _
|
||||||
}
|
}
|
||||||
|
///Get current task in moving semanteme
|
||||||
pub fn take_current(&mut self) -> Option<Arc<TaskControlBlock>> {
|
pub fn take_current(&mut self) -> Option<Arc<TaskControlBlock>> {
|
||||||
self.current.take()
|
self.current.take()
|
||||||
}
|
}
|
||||||
|
///Get current task in cloning semanteme
|
||||||
pub fn current(&self) -> Option<Arc<TaskControlBlock>> {
|
pub fn current(&self) -> Option<Arc<TaskControlBlock>> {
|
||||||
self.current.as_ref().map(Arc::clone)
|
self.current.as_ref().map(Arc::clone)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
lazy_static! {
|
lazy_static! {
|
||||||
pub static ref PROCESSOR: UPIntrFreeCell<Processor> =
|
pub static ref PROCESSOR: UPSafeCell<Processor> = unsafe { UPSafeCell::new(Processor::new()) };
|
||||||
unsafe { UPIntrFreeCell::new(Processor::new()) };
|
|
||||||
}
|
}
|
||||||
|
///The main part of process execution and scheduling
|
||||||
|
///Loop `fetch_task` to get the process that needs to run, and switch the process through `__switch`
|
||||||
pub fn run_tasks() {
|
pub fn run_tasks() {
|
||||||
loop {
|
loop {
|
||||||
let mut processor = PROCESSOR.exclusive_access();
|
let mut processor = PROCESSOR.exclusive_access();
|
||||||
if let Some(task) = fetch_task() {
|
if let Some(task) = fetch_task() {
|
||||||
let idle_task_cx_ptr = processor.get_idle_task_cx_ptr();
|
let idle_task_cx_ptr = processor.get_idle_task_cx_ptr();
|
||||||
// access coming task TCB exclusively
|
// access coming task TCB exclusively
|
||||||
let next_task_cx_ptr = task.inner.exclusive_session(|task_inner| {
|
let mut task_inner = task.inner_exclusive_access();
|
||||||
task_inner.task_status = TaskStatus::Running;
|
let next_task_cx_ptr = &task_inner.task_cx as *const TaskContext;
|
||||||
&task_inner.task_cx as *const TaskContext
|
task_inner.task_status = TaskStatus::Running;
|
||||||
});
|
drop(task_inner);
|
||||||
|
// release coming task TCB manually
|
||||||
processor.current = Some(task);
|
processor.current = Some(task);
|
||||||
// release processor manually
|
// release processor manually
|
||||||
drop(processor);
|
drop(processor);
|
||||||
unsafe {
|
unsafe {
|
||||||
__switch(idle_task_cx_ptr, next_task_cx_ptr);
|
__switch(idle_task_cx_ptr, next_task_cx_ptr);
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
println!("no tasks available in run_tasks");
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
///Take the current task,leaving a None in its place
|
||||||
pub fn take_current_task() -> Option<Arc<TaskControlBlock>> {
|
pub fn take_current_task() -> Option<Arc<TaskControlBlock>> {
|
||||||
PROCESSOR.exclusive_access().take_current()
|
PROCESSOR.exclusive_access().take_current()
|
||||||
}
|
}
|
||||||
|
///Get running task
|
||||||
pub fn current_task() -> Option<Arc<TaskControlBlock>> {
|
pub fn current_task() -> Option<Arc<TaskControlBlock>> {
|
||||||
PROCESSOR.exclusive_access().current()
|
PROCESSOR.exclusive_access().current()
|
||||||
}
|
}
|
||||||
|
///Get token of the address space of current task
|
||||||
pub fn current_process() -> Arc<ProcessControlBlock> {
|
|
||||||
current_task().unwrap().process.upgrade().unwrap()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn current_user_token() -> usize {
|
pub fn current_user_token() -> usize {
|
||||||
let task = current_task().unwrap();
|
let task = current_task().unwrap();
|
||||||
task.get_user_token()
|
let token = task.inner_exclusive_access().get_user_token();
|
||||||
|
token
|
||||||
}
|
}
|
||||||
|
///Get the mutable reference to trap context of current task
|
||||||
pub fn current_trap_cx() -> &'static mut TrapContext {
|
pub fn current_trap_cx() -> &'static mut TrapContext {
|
||||||
current_task()
|
current_task()
|
||||||
.unwrap()
|
.unwrap()
|
||||||
.inner_exclusive_access()
|
.inner_exclusive_access()
|
||||||
.get_trap_cx()
|
.get_trap_cx()
|
||||||
}
|
}
|
||||||
|
///Return to idle control flow for new scheduling
|
||||||
pub fn current_trap_cx_user_va() -> usize {
|
|
||||||
current_task()
|
|
||||||
.unwrap()
|
|
||||||
.inner_exclusive_access()
|
|
||||||
.res
|
|
||||||
.as_ref()
|
|
||||||
.unwrap()
|
|
||||||
.trap_cx_user_va()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn current_kstack_top() -> usize {
|
|
||||||
if let Some(task) = current_task() {
|
|
||||||
task.kstack.get_top()
|
|
||||||
} else {
|
|
||||||
let mut boot_stack_top;
|
|
||||||
unsafe { asm!("la {},boot_stack_top",out(reg) boot_stack_top) };
|
|
||||||
boot_stack_top
|
|
||||||
}
|
|
||||||
// current_task().unwrap().kstack.get_top()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn schedule(switched_task_cx_ptr: *mut TaskContext) {
|
pub fn schedule(switched_task_cx_ptr: *mut TaskContext) {
|
||||||
let idle_task_cx_ptr =
|
let mut processor = PROCESSOR.exclusive_access();
|
||||||
PROCESSOR.exclusive_session(|processor| processor.get_idle_task_cx_ptr());
|
let idle_task_cx_ptr = processor.get_idle_task_cx_ptr();
|
||||||
|
drop(processor);
|
||||||
unsafe {
|
unsafe {
|
||||||
__switch(switched_task_cx_ptr, idle_task_cx_ptr);
|
__switch(switched_task_cx_ptr, idle_task_cx_ptr);
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,29 +0,0 @@
|
||||||
use bitflags::*;
|
|
||||||
|
|
||||||
bitflags! {
|
|
||||||
pub struct SignalFlags: u32 {
|
|
||||||
const SIGINT = 1 << 2;
|
|
||||||
const SIGILL = 1 << 4;
|
|
||||||
const SIGABRT = 1 << 6;
|
|
||||||
const SIGFPE = 1 << 8;
|
|
||||||
const SIGSEGV = 1 << 11;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl SignalFlags {
|
|
||||||
pub fn check_error(&self) -> Option<(i32, &'static str)> {
|
|
||||||
if self.contains(Self::SIGINT) {
|
|
||||||
Some((-2, "Killed, SIGINT=2"))
|
|
||||||
} else if self.contains(Self::SIGILL) {
|
|
||||||
Some((-4, "Illegal Instruction, SIGILL=4"))
|
|
||||||
} else if self.contains(Self::SIGABRT) {
|
|
||||||
Some((-6, "Aborted, SIGABRT=6"))
|
|
||||||
} else if self.contains(Self::SIGFPE) {
|
|
||||||
Some((-8, "Erroneous Arithmetic Operation, SIGFPE=8"))
|
|
||||||
} else if self.contains(Self::SIGSEGV) {
|
|
||||||
Some((-11, "Segmentation Fault, SIGSEGV=11"))
|
|
||||||
} else {
|
|
||||||
None
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,8 +1,14 @@
|
||||||
|
//!Wrap `switch.S` as a function
|
||||||
use super::TaskContext;
|
use super::TaskContext;
|
||||||
use core::arch::global_asm;
|
use core::arch::global_asm;
|
||||||
|
|
||||||
global_asm!(include_str!("switch.S"));
|
global_asm!(include_str!("switch.S"));
|
||||||
|
|
||||||
extern "C" {
|
unsafe extern "C" {
|
||||||
pub fn __switch(current_task_cx_ptr: *mut TaskContext, next_task_cx_ptr: *const TaskContext);
|
/// Switch to the context of `next_task_cx_ptr`, saving the current context
|
||||||
|
/// in `current_task_cx_ptr`.
|
||||||
|
pub unsafe fn __switch(
|
||||||
|
current_task_cx_ptr: *mut TaskContext,
|
||||||
|
next_task_cx_ptr: *const TaskContext,
|
||||||
|
);
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,74 +1,191 @@
|
||||||
use super::id::TaskUserRes;
|
//!Implementation of [`TaskControlBlock`]
|
||||||
use super::{kstack_alloc, KernelStack, ProcessControlBlock, TaskContext};
|
use super::TaskContext;
|
||||||
use crate::trap::TrapContext;
|
use super::{KernelStack, PidHandle, pid_alloc};
|
||||||
use crate::{
|
use crate::config::TRAP_CONTEXT;
|
||||||
mm::PhysPageNum,
|
use crate::fs::{File, Stdin, Stdout};
|
||||||
sync::{UPIntrFreeCell, UPIntrRefMut},
|
use crate::mm::{KERNEL_SPACE, MemorySet, PhysPageNum, VirtAddr};
|
||||||
};
|
use crate::sync::UPSafeCell;
|
||||||
|
use crate::trap::{TrapContext, trap_handler};
|
||||||
use alloc::sync::{Arc, Weak};
|
use alloc::sync::{Arc, Weak};
|
||||||
|
use alloc::vec;
|
||||||
|
use alloc::vec::Vec;
|
||||||
|
use core::cell::RefMut;
|
||||||
|
|
||||||
pub struct TaskControlBlock {
|
pub struct TaskControlBlock {
|
||||||
// immutable
|
// immutable
|
||||||
pub process: Weak<ProcessControlBlock>,
|
pub pid: PidHandle,
|
||||||
pub kstack: KernelStack,
|
pub kernel_stack: KernelStack,
|
||||||
// mutable
|
// mutable
|
||||||
pub inner: UPIntrFreeCell<TaskControlBlockInner>,
|
inner: UPSafeCell<TaskControlBlockInner>,
|
||||||
}
|
|
||||||
|
|
||||||
impl TaskControlBlock {
|
|
||||||
pub fn inner_exclusive_access(&self) -> UPIntrRefMut<'_, TaskControlBlockInner> {
|
|
||||||
self.inner.exclusive_access()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn get_user_token(&self) -> usize {
|
|
||||||
let process = self.process.upgrade().unwrap();
|
|
||||||
let inner = process.inner_exclusive_access();
|
|
||||||
inner.memory_set.token()
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub struct TaskControlBlockInner {
|
pub struct TaskControlBlockInner {
|
||||||
pub res: Option<TaskUserRes>,
|
|
||||||
pub trap_cx_ppn: PhysPageNum,
|
pub trap_cx_ppn: PhysPageNum,
|
||||||
|
#[allow(unused)]
|
||||||
|
pub base_size: usize,
|
||||||
pub task_cx: TaskContext,
|
pub task_cx: TaskContext,
|
||||||
pub task_status: TaskStatus,
|
pub task_status: TaskStatus,
|
||||||
pub exit_code: Option<i32>,
|
pub memory_set: MemorySet,
|
||||||
|
pub parent: Option<Weak<TaskControlBlock>>,
|
||||||
|
pub children: Vec<Arc<TaskControlBlock>>,
|
||||||
|
pub exit_code: i32,
|
||||||
|
pub fd_table: Vec<Option<Arc<dyn File + Send + Sync>>>,
|
||||||
|
|
||||||
|
// New: User
|
||||||
|
pub user: String,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl TaskControlBlockInner {
|
impl TaskControlBlockInner {
|
||||||
pub fn get_trap_cx(&self) -> &'static mut TrapContext {
|
pub fn get_trap_cx(&self) -> &'static mut TrapContext {
|
||||||
self.trap_cx_ppn.get_mut()
|
self.trap_cx_ppn.get_mut()
|
||||||
}
|
}
|
||||||
|
pub fn get_user_token(&self) -> usize {
|
||||||
#[allow(unused)]
|
self.memory_set.token()
|
||||||
|
}
|
||||||
fn get_status(&self) -> TaskStatus {
|
fn get_status(&self) -> TaskStatus {
|
||||||
self.task_status
|
self.task_status
|
||||||
}
|
}
|
||||||
|
pub fn is_zombie(&self) -> bool {
|
||||||
|
self.get_status() == TaskStatus::Zombie
|
||||||
|
}
|
||||||
|
pub fn alloc_fd(&mut self) -> usize {
|
||||||
|
if let Some(fd) = (0..self.fd_table.len()).find(|fd| self.fd_table[*fd].is_none()) {
|
||||||
|
fd
|
||||||
|
} else {
|
||||||
|
self.fd_table.push(None);
|
||||||
|
self.fd_table.len() - 1
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl TaskControlBlock {
|
impl TaskControlBlock {
|
||||||
pub fn new(
|
pub fn inner_exclusive_access(&self) -> RefMut<'_, TaskControlBlockInner> {
|
||||||
process: Arc<ProcessControlBlock>,
|
self.inner.exclusive_access()
|
||||||
ustack_base: usize,
|
}
|
||||||
alloc_user_res: bool,
|
pub fn new(elf_data: &[u8]) -> Self {
|
||||||
) -> Self {
|
// memory_set with elf program headers/trampoline/trap context/user stack
|
||||||
let res = TaskUserRes::new(Arc::clone(&process), ustack_base, alloc_user_res);
|
let (memory_set, user_sp, entry_point) = MemorySet::from_elf(elf_data);
|
||||||
let trap_cx_ppn = res.trap_cx_ppn();
|
let trap_cx_ppn = memory_set
|
||||||
let kstack = kstack_alloc();
|
.translate(VirtAddr::from(TRAP_CONTEXT).into())
|
||||||
let kstack_top = kstack.get_top();
|
.unwrap()
|
||||||
Self {
|
.ppn();
|
||||||
process: Arc::downgrade(&process),
|
// alloc a pid and a kernel stack in kernel space
|
||||||
kstack,
|
let pid_handle = pid_alloc();
|
||||||
|
let kernel_stack = KernelStack::new(&pid_handle);
|
||||||
|
let kernel_stack_top = kernel_stack.get_top();
|
||||||
|
let task_control_block = Self {
|
||||||
|
pid: pid_handle,
|
||||||
|
kernel_stack,
|
||||||
inner: unsafe {
|
inner: unsafe {
|
||||||
UPIntrFreeCell::new(TaskControlBlockInner {
|
UPSafeCell::new(TaskControlBlockInner {
|
||||||
res: Some(res),
|
|
||||||
trap_cx_ppn,
|
trap_cx_ppn,
|
||||||
task_cx: TaskContext::goto_trap_return(kstack_top),
|
base_size: user_sp,
|
||||||
|
task_cx: TaskContext::goto_trap_return(kernel_stack_top),
|
||||||
task_status: TaskStatus::Ready,
|
task_status: TaskStatus::Ready,
|
||||||
exit_code: None,
|
memory_set,
|
||||||
|
parent: None,
|
||||||
|
children: Vec::new(),
|
||||||
|
exit_code: 0,
|
||||||
|
fd_table: vec![
|
||||||
|
// 0 -> stdin
|
||||||
|
Some(Arc::new(Stdin)),
|
||||||
|
// 1 -> stdout
|
||||||
|
Some(Arc::new(Stdout)),
|
||||||
|
// 2 -> stderr
|
||||||
|
Some(Arc::new(Stdout)),
|
||||||
|
],
|
||||||
})
|
})
|
||||||
},
|
},
|
||||||
|
};
|
||||||
|
// prepare TrapContext in user space
|
||||||
|
let trap_cx = task_control_block.inner_exclusive_access().get_trap_cx();
|
||||||
|
*trap_cx = TrapContext::app_init_context(
|
||||||
|
entry_point,
|
||||||
|
user_sp,
|
||||||
|
KERNEL_SPACE.exclusive_access().token(),
|
||||||
|
kernel_stack_top,
|
||||||
|
trap_handler as usize,
|
||||||
|
);
|
||||||
|
task_control_block
|
||||||
|
}
|
||||||
|
pub fn exec(&self, elf_data: &[u8]) {
|
||||||
|
// memory_set with elf program headers/trampoline/trap context/user stack
|
||||||
|
let (memory_set, user_sp, entry_point) = MemorySet::from_elf(elf_data);
|
||||||
|
let trap_cx_ppn = memory_set
|
||||||
|
.translate(VirtAddr::from(TRAP_CONTEXT).into())
|
||||||
|
.unwrap()
|
||||||
|
.ppn();
|
||||||
|
|
||||||
|
// **** access current TCB exclusively
|
||||||
|
let mut inner = self.inner_exclusive_access();
|
||||||
|
// substitute memory_set
|
||||||
|
inner.memory_set = memory_set;
|
||||||
|
// update trap_cx ppn
|
||||||
|
inner.trap_cx_ppn = trap_cx_ppn;
|
||||||
|
// initialize trap_cx
|
||||||
|
let trap_cx = TrapContext::app_init_context(
|
||||||
|
entry_point,
|
||||||
|
user_sp,
|
||||||
|
KERNEL_SPACE.exclusive_access().token(),
|
||||||
|
self.kernel_stack.get_top(),
|
||||||
|
trap_handler as usize,
|
||||||
|
);
|
||||||
|
*inner.get_trap_cx() = trap_cx;
|
||||||
|
// **** release current PCB
|
||||||
|
}
|
||||||
|
pub fn fork(self: &Arc<TaskControlBlock>) -> Arc<TaskControlBlock> {
|
||||||
|
// ---- hold parent PCB lock
|
||||||
|
let mut parent_inner = self.inner_exclusive_access();
|
||||||
|
// copy user space(include trap context)
|
||||||
|
let memory_set = MemorySet::from_existed_user(&parent_inner.memory_set);
|
||||||
|
let trap_cx_ppn = memory_set
|
||||||
|
.translate(VirtAddr::from(TRAP_CONTEXT).into())
|
||||||
|
.unwrap()
|
||||||
|
.ppn();
|
||||||
|
// alloc a pid and a kernel stack in kernel space
|
||||||
|
let pid_handle = pid_alloc();
|
||||||
|
let kernel_stack = KernelStack::new(&pid_handle);
|
||||||
|
let kernel_stack_top = kernel_stack.get_top();
|
||||||
|
// copy fd table
|
||||||
|
let mut new_fd_table: Vec<Option<Arc<dyn File + Send + Sync>>> = Vec::new();
|
||||||
|
for fd in parent_inner.fd_table.iter() {
|
||||||
|
if let Some(file) = fd {
|
||||||
|
new_fd_table.push(Some(file.clone()));
|
||||||
|
} else {
|
||||||
|
new_fd_table.push(None);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
let task_control_block = Arc::new(TaskControlBlock {
|
||||||
|
pid: pid_handle,
|
||||||
|
kernel_stack,
|
||||||
|
inner: unsafe {
|
||||||
|
UPSafeCell::new(TaskControlBlockInner {
|
||||||
|
trap_cx_ppn,
|
||||||
|
base_size: parent_inner.base_size,
|
||||||
|
task_cx: TaskContext::goto_trap_return(kernel_stack_top),
|
||||||
|
task_status: TaskStatus::Ready,
|
||||||
|
memory_set,
|
||||||
|
parent: Some(Arc::downgrade(self)),
|
||||||
|
children: Vec::new(),
|
||||||
|
exit_code: 0,
|
||||||
|
fd_table: new_fd_table,
|
||||||
|
user: username.to_string(), // Init User name
|
||||||
|
})
|
||||||
|
},
|
||||||
|
});
|
||||||
|
// add child
|
||||||
|
parent_inner.children.push(task_control_block.clone());
|
||||||
|
// modify kernel_sp in trap_cx
|
||||||
|
// **** access child PCB exclusively
|
||||||
|
let trap_cx = task_control_block.inner_exclusive_access().get_trap_cx();
|
||||||
|
trap_cx.kernel_sp = kernel_stack_top;
|
||||||
|
// return
|
||||||
|
task_control_block
|
||||||
|
// **** release child PCB
|
||||||
|
// ---- release parent PCB
|
||||||
|
}
|
||||||
|
pub fn getpid(&self) -> usize {
|
||||||
|
self.pid.0
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -76,5 +193,5 @@ impl TaskControlBlock {
|
||||||
pub enum TaskStatus {
|
pub enum TaskStatus {
|
||||||
Ready,
|
Ready,
|
||||||
Running,
|
Running,
|
||||||
Blocked,
|
Zombie,
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,74 +1,20 @@
|
||||||
use core::cmp::Ordering;
|
//! RISC-V timer-related functionality
|
||||||
|
|
||||||
use crate::config::CLOCK_FREQ;
|
use crate::config::CLOCK_FREQ;
|
||||||
use crate::sbi::set_timer;
|
use crate::sbi::set_timer;
|
||||||
use crate::sync::UPIntrFreeCell;
|
|
||||||
use crate::task::{wakeup_task, TaskControlBlock};
|
|
||||||
use alloc::collections::BinaryHeap;
|
|
||||||
use alloc::sync::Arc;
|
|
||||||
use lazy_static::*;
|
|
||||||
use riscv::register::time;
|
use riscv::register::time;
|
||||||
|
|
||||||
const TICKS_PER_SEC: usize = 100;
|
const TICKS_PER_SEC: usize = 100;
|
||||||
const MSEC_PER_SEC: usize = 1000;
|
const MSEC_PER_SEC: usize = 1000;
|
||||||
|
///get current time
|
||||||
pub fn get_time() -> usize {
|
pub fn get_time() -> usize {
|
||||||
time::read()
|
time::read()
|
||||||
}
|
}
|
||||||
|
/// get current time in microseconds
|
||||||
pub fn get_time_ms() -> usize {
|
pub fn get_time_ms() -> usize {
|
||||||
time::read() / (CLOCK_FREQ / MSEC_PER_SEC)
|
time::read() / (CLOCK_FREQ / MSEC_PER_SEC)
|
||||||
}
|
}
|
||||||
|
/// set the next timer interrupt
|
||||||
pub fn set_next_trigger() {
|
pub fn set_next_trigger() {
|
||||||
set_timer(get_time() + CLOCK_FREQ / TICKS_PER_SEC);
|
set_timer(get_time() + CLOCK_FREQ / TICKS_PER_SEC);
|
||||||
}
|
}
|
||||||
|
|
||||||
pub struct TimerCondVar {
|
|
||||||
pub expire_ms: usize,
|
|
||||||
pub task: Arc<TaskControlBlock>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl PartialEq for TimerCondVar {
|
|
||||||
fn eq(&self, other: &Self) -> bool {
|
|
||||||
self.expire_ms == other.expire_ms
|
|
||||||
}
|
|
||||||
}
|
|
||||||
impl Eq for TimerCondVar {}
|
|
||||||
impl PartialOrd for TimerCondVar {
|
|
||||||
fn partial_cmp(&self, other: &Self) -> Option<Ordering> {
|
|
||||||
let a = -(self.expire_ms as isize);
|
|
||||||
let b = -(other.expire_ms as isize);
|
|
||||||
Some(a.cmp(&b))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Ord for TimerCondVar {
|
|
||||||
fn cmp(&self, other: &Self) -> Ordering {
|
|
||||||
self.partial_cmp(other).unwrap()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref TIMERS: UPIntrFreeCell<BinaryHeap<TimerCondVar>> =
|
|
||||||
unsafe { UPIntrFreeCell::new(BinaryHeap::<TimerCondVar>::new()) };
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn add_timer(expire_ms: usize, task: Arc<TaskControlBlock>) {
|
|
||||||
let mut timers = TIMERS.exclusive_access();
|
|
||||||
timers.push(TimerCondVar { expire_ms, task });
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn check_timer() {
|
|
||||||
let current_ms = get_time_ms();
|
|
||||||
TIMERS.exclusive_session(|timers| {
|
|
||||||
while let Some(timer) = timers.peek() {
|
|
||||||
if timer.expire_ms <= current_ms {
|
|
||||||
wakeup_task(Arc::clone(&timer.task));
|
|
||||||
timers.pop();
|
|
||||||
} else {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,20 +1,30 @@
|
||||||
use riscv::register::sstatus::{self, Sstatus, SPP};
|
//! Implementation of [`TrapContext`]
|
||||||
|
use riscv::register::sstatus::{self, SPP, Sstatus};
|
||||||
|
|
||||||
#[repr(C)]
|
#[repr(C)]
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
|
///trap context structure containing sstatus, sepc and registers
|
||||||
pub struct TrapContext {
|
pub struct TrapContext {
|
||||||
|
/// general regs[0..31]
|
||||||
pub x: [usize; 32],
|
pub x: [usize; 32],
|
||||||
|
/// CSR sstatus
|
||||||
pub sstatus: Sstatus,
|
pub sstatus: Sstatus,
|
||||||
|
/// CSR sepc
|
||||||
pub sepc: usize,
|
pub sepc: usize,
|
||||||
|
/// Addr of Page Table
|
||||||
pub kernel_satp: usize,
|
pub kernel_satp: usize,
|
||||||
|
/// kernel stack
|
||||||
pub kernel_sp: usize,
|
pub kernel_sp: usize,
|
||||||
|
/// Addr of trap_handler function
|
||||||
pub trap_handler: usize,
|
pub trap_handler: usize,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl TrapContext {
|
impl TrapContext {
|
||||||
|
///set stack pointer to x_2 reg (sp)
|
||||||
pub fn set_sp(&mut self, sp: usize) {
|
pub fn set_sp(&mut self, sp: usize) {
|
||||||
self.x[2] = sp;
|
self.x[2] = sp;
|
||||||
}
|
}
|
||||||
|
///init app context
|
||||||
pub fn app_init_context(
|
pub fn app_init_context(
|
||||||
entry: usize,
|
entry: usize,
|
||||||
sp: usize,
|
sp: usize,
|
||||||
|
|
|
@ -1,34 +1,40 @@
|
||||||
|
//! Trap handling functionality
|
||||||
|
//!
|
||||||
|
//! For rCore, we have a single trap entry point, namely `__alltraps`. At
|
||||||
|
//! initialization in [`init()`], we set the `stvec` CSR to point to it.
|
||||||
|
//!
|
||||||
|
//! All traps go through `__alltraps`, which is defined in `trap.S`. The
|
||||||
|
//! assembly language code does just enough work restore the kernel space
|
||||||
|
//! context, ensuring that Rust code safely runs, and transfers control to
|
||||||
|
//! [`trap_handler()`].
|
||||||
|
//!
|
||||||
|
//! It then calls different functionality based on what exactly the exception
|
||||||
|
//! was. For example, timer interrupts trigger task preemption, and syscalls go
|
||||||
|
//! to [`syscall()`].
|
||||||
mod context;
|
mod context;
|
||||||
|
|
||||||
use crate::config::TRAMPOLINE;
|
use crate::config::{TRAMPOLINE, TRAP_CONTEXT};
|
||||||
use crate::syscall::syscall;
|
use crate::syscall::syscall;
|
||||||
use crate::task::{
|
use crate::task::{
|
||||||
check_signals_of_current, current_add_signal, current_trap_cx, current_trap_cx_user_va,
|
current_trap_cx, current_user_token, exit_current_and_run_next, suspend_current_and_run_next,
|
||||||
current_user_token, exit_current_and_run_next, suspend_current_and_run_next, SignalFlags,
|
|
||||||
};
|
};
|
||||||
use crate::timer::{check_timer, set_next_trigger};
|
use crate::timer::set_next_trigger;
|
||||||
use core::arch::{asm, global_asm};
|
use core::arch::{asm, global_asm};
|
||||||
use riscv::register::{
|
use riscv::register::{
|
||||||
mtvec::TrapMode,
|
mtvec::TrapMode,
|
||||||
scause::{self, Exception, Interrupt, Trap},
|
scause::{self, Exception, Interrupt, Trap},
|
||||||
sie, sip, sscratch, sstatus, stval, stvec,
|
sie, stval, stvec,
|
||||||
};
|
};
|
||||||
|
|
||||||
global_asm!(include_str!("trap.S"));
|
global_asm!(include_str!("trap.S"));
|
||||||
|
/// initialize CSR `stvec` as the entry of `__alltraps`
|
||||||
pub fn init() {
|
pub fn init() {
|
||||||
set_kernel_trap_entry();
|
set_kernel_trap_entry();
|
||||||
}
|
}
|
||||||
|
|
||||||
fn set_kernel_trap_entry() {
|
fn set_kernel_trap_entry() {
|
||||||
extern "C" {
|
|
||||||
fn __alltraps();
|
|
||||||
fn __alltraps_k();
|
|
||||||
}
|
|
||||||
let __alltraps_k_va = __alltraps_k as usize - __alltraps as usize + TRAMPOLINE;
|
|
||||||
unsafe {
|
unsafe {
|
||||||
stvec::write(__alltraps_k_va, TrapMode::Direct);
|
stvec::write(trap_from_kernel as usize, TrapMode::Direct);
|
||||||
sscratch::write(trap_from_kernel as usize);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -37,39 +43,24 @@ fn set_user_trap_entry() {
|
||||||
stvec::write(TRAMPOLINE as usize, TrapMode::Direct);
|
stvec::write(TRAMPOLINE as usize, TrapMode::Direct);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
/// enable timer interrupt in sie CSR
|
||||||
pub fn enable_timer_interrupt() {
|
pub fn enable_timer_interrupt() {
|
||||||
unsafe {
|
unsafe {
|
||||||
sie::set_stimer();
|
sie::set_stimer();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn enable_supervisor_interrupt() {
|
#[unsafe(no_mangle)]
|
||||||
unsafe {
|
/// handle an interrupt, exception, or system call from user space
|
||||||
sstatus::set_sie();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn disable_supervisor_interrupt() {
|
|
||||||
unsafe {
|
|
||||||
sstatus::clear_sie();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn trap_handler() -> ! {
|
pub fn trap_handler() -> ! {
|
||||||
set_kernel_trap_entry();
|
set_kernel_trap_entry();
|
||||||
let scause = scause::read();
|
let scause = scause::read();
|
||||||
let stval = stval::read();
|
let stval = stval::read();
|
||||||
// println!("into {:?}", scause.cause());
|
|
||||||
match scause.cause() {
|
match scause.cause() {
|
||||||
Trap::Exception(Exception::UserEnvCall) => {
|
Trap::Exception(Exception::UserEnvCall) => {
|
||||||
// jump to next instruction anyway
|
// jump to next instruction anyway
|
||||||
let mut cx = current_trap_cx();
|
let mut cx = current_trap_cx();
|
||||||
cx.sepc += 4;
|
cx.sepc += 4;
|
||||||
|
|
||||||
enable_supervisor_interrupt();
|
|
||||||
|
|
||||||
// get system call return value
|
// get system call return value
|
||||||
let result = syscall(cx.x[17], [cx.x[10], cx.x[11], cx.x[12]]);
|
let result = syscall(cx.x[17], [cx.x[10], cx.x[11], cx.x[12]]);
|
||||||
// cx is changed during sys_exec, so we have to call it again
|
// cx is changed during sys_exec, so we have to call it again
|
||||||
|
@ -82,27 +73,24 @@ pub fn trap_handler() -> ! {
|
||||||
| Trap::Exception(Exception::InstructionPageFault)
|
| Trap::Exception(Exception::InstructionPageFault)
|
||||||
| Trap::Exception(Exception::LoadFault)
|
| Trap::Exception(Exception::LoadFault)
|
||||||
| Trap::Exception(Exception::LoadPageFault) => {
|
| Trap::Exception(Exception::LoadPageFault) => {
|
||||||
/*
|
|
||||||
println!(
|
println!(
|
||||||
"[kernel] {:?} in application, bad addr = {:#x}, bad instruction = {:#x}, kernel killed it.",
|
"[kernel] {:?} in application, bad addr = {:#x}, bad instruction = {:#x}, kernel killed it.",
|
||||||
scause.cause(),
|
scause.cause(),
|
||||||
stval,
|
stval,
|
||||||
current_trap_cx().sepc,
|
current_trap_cx().sepc,
|
||||||
);
|
);
|
||||||
*/
|
// page fault exit code
|
||||||
current_add_signal(SignalFlags::SIGSEGV);
|
exit_current_and_run_next(-2);
|
||||||
}
|
}
|
||||||
Trap::Exception(Exception::IllegalInstruction) => {
|
Trap::Exception(Exception::IllegalInstruction) => {
|
||||||
current_add_signal(SignalFlags::SIGILL);
|
println!("[kernel] IllegalInstruction in application, kernel killed it.");
|
||||||
|
// illegal instruction exit code
|
||||||
|
exit_current_and_run_next(-3);
|
||||||
}
|
}
|
||||||
Trap::Interrupt(Interrupt::SupervisorTimer) => {
|
Trap::Interrupt(Interrupt::SupervisorTimer) => {
|
||||||
set_next_trigger();
|
set_next_trigger();
|
||||||
check_timer();
|
|
||||||
suspend_current_and_run_next();
|
suspend_current_and_run_next();
|
||||||
}
|
}
|
||||||
Trap::Interrupt(Interrupt::SupervisorExternal) => {
|
|
||||||
crate::board::irq_handler();
|
|
||||||
}
|
|
||||||
_ => {
|
_ => {
|
||||||
panic!(
|
panic!(
|
||||||
"Unsupported trap {:?}, stval = {:#x}!",
|
"Unsupported trap {:?}, stval = {:#x}!",
|
||||||
|
@ -111,59 +99,42 @@ pub fn trap_handler() -> ! {
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// check signals
|
//println!("before trap_return");
|
||||||
if let Some((errno, msg)) = check_signals_of_current() {
|
|
||||||
println!("[kernel] {}", msg);
|
|
||||||
exit_current_and_run_next(errno);
|
|
||||||
}
|
|
||||||
trap_return();
|
trap_return();
|
||||||
}
|
}
|
||||||
|
|
||||||
#[no_mangle]
|
#[unsafe(no_mangle)]
|
||||||
|
/// set the new addr of __restore asm function in TRAMPOLINE page,
|
||||||
|
/// set the reg a0 = trap_cx_ptr, reg a1 = phy addr of usr page table,
|
||||||
|
/// finally, jump to new addr of __restore asm function
|
||||||
pub fn trap_return() -> ! {
|
pub fn trap_return() -> ! {
|
||||||
disable_supervisor_interrupt();
|
|
||||||
set_user_trap_entry();
|
set_user_trap_entry();
|
||||||
let trap_cx_user_va = current_trap_cx_user_va();
|
let trap_cx_ptr = TRAP_CONTEXT;
|
||||||
let user_satp = current_user_token();
|
let user_satp = current_user_token();
|
||||||
extern "C" {
|
unsafe extern "C" {
|
||||||
fn __alltraps();
|
unsafe fn __alltraps();
|
||||||
fn __restore();
|
unsafe fn __restore();
|
||||||
}
|
}
|
||||||
let restore_va = __restore as usize - __alltraps as usize + TRAMPOLINE;
|
let restore_va = __restore as usize - __alltraps as usize + TRAMPOLINE;
|
||||||
//println!("before return");
|
|
||||||
unsafe {
|
unsafe {
|
||||||
asm!(
|
asm!(
|
||||||
"fence.i",
|
"fence.i",
|
||||||
"jr {restore_va}",
|
"jr {restore_va}",
|
||||||
restore_va = in(reg) restore_va,
|
restore_va = in(reg) restore_va,
|
||||||
in("a0") trap_cx_user_va,
|
in("a0") trap_cx_ptr,
|
||||||
in("a1") user_satp,
|
in("a1") user_satp,
|
||||||
options(noreturn)
|
options(noreturn)
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[no_mangle]
|
#[unsafe(no_mangle)]
|
||||||
pub fn trap_from_kernel(_trap_cx: &TrapContext) {
|
/// Unimplement: traps/interrupts/exceptions from kernel mode
|
||||||
let scause = scause::read();
|
/// Todo: Chapter 9: I/O device
|
||||||
let stval = stval::read();
|
pub fn trap_from_kernel() -> ! {
|
||||||
match scause.cause() {
|
use riscv::register::sepc;
|
||||||
Trap::Interrupt(Interrupt::SupervisorExternal) => {
|
println!("stval = {:#x}, sepc = {:#x}", stval::read(), sepc::read());
|
||||||
crate::board::irq_handler();
|
panic!("a trap {:?} from kernel!", scause::read().cause());
|
||||||
}
|
|
||||||
Trap::Interrupt(Interrupt::SupervisorTimer) => {
|
|
||||||
set_next_trigger();
|
|
||||||
check_timer();
|
|
||||||
// do not schedule now
|
|
||||||
}
|
|
||||||
_ => {
|
|
||||||
panic!(
|
|
||||||
"Unsupported trap from kernel: {:?}, stval = {:#x}!",
|
|
||||||
scause.cause(),
|
|
||||||
stval
|
|
||||||
);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub use context::TrapContext;
|
pub use context::TrapContext;
|
||||||
|
|
|
@ -8,8 +8,6 @@
|
||||||
.section .text.trampoline
|
.section .text.trampoline
|
||||||
.globl __alltraps
|
.globl __alltraps
|
||||||
.globl __restore
|
.globl __restore
|
||||||
.globl __alltraps_k
|
|
||||||
.globl __restore_k
|
|
||||||
.align 2
|
.align 2
|
||||||
__alltraps:
|
__alltraps:
|
||||||
csrrw sp, sscratch, sp
|
csrrw sp, sscratch, sp
|
||||||
|
@ -69,36 +67,3 @@ __restore:
|
||||||
# back to user stack
|
# back to user stack
|
||||||
ld sp, 2*8(sp)
|
ld sp, 2*8(sp)
|
||||||
sret
|
sret
|
||||||
|
|
||||||
.align 2
|
|
||||||
__alltraps_k:
|
|
||||||
addi sp, sp, -34*8
|
|
||||||
sd x1, 1*8(sp)
|
|
||||||
sd x3, 3*8(sp)
|
|
||||||
.set n, 5
|
|
||||||
.rept 27
|
|
||||||
SAVE_GP %n
|
|
||||||
.set n, n+1
|
|
||||||
.endr
|
|
||||||
csrr t0, sstatus
|
|
||||||
csrr t1, sepc
|
|
||||||
sd t0, 32*8(sp)
|
|
||||||
sd t1, 33*8(sp)
|
|
||||||
mv a0, sp
|
|
||||||
csrr t2, sscratch
|
|
||||||
jalr t2
|
|
||||||
|
|
||||||
__restore_k:
|
|
||||||
ld t0, 32*8(sp)
|
|
||||||
ld t1, 33*8(sp)
|
|
||||||
csrw sstatus, t0
|
|
||||||
csrw sepc, t1
|
|
||||||
ld x1, 1*8(sp)
|
|
||||||
ld x3, 3*8(sp)
|
|
||||||
.set n, 5
|
|
||||||
.rept 27
|
|
||||||
LOAD_GP %n
|
|
||||||
.set n, n+1
|
|
||||||
.endr
|
|
||||||
addi sp, sp, 34*8
|
|
||||||
sret
|
|
||||||
|
|
18
ping.py
18
ping.py
|
@ -1,18 +0,0 @@
|
||||||
import socket
|
|
||||||
import sys
|
|
||||||
import time
|
|
||||||
|
|
||||||
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
||||||
addr = ('localhost', 26099)
|
|
||||||
sock.bind(addr)
|
|
||||||
|
|
||||||
|
|
||||||
print("pinging...", file=sys.stderr)
|
|
||||||
while True:
|
|
||||||
buf, raddr = sock.recvfrom(4096)
|
|
||||||
print("receive: " + buf.decode("utf-8"))
|
|
||||||
buf = "this is a ping to port 6200!".encode('utf-8')
|
|
||||||
sock.sendto(buf, ("127.0.0.1", 6200))
|
|
||||||
buf = "this is a ping to reply!".encode('utf-8')
|
|
||||||
sock.sendto(buf, raddr)
|
|
||||||
time.sleep(1)
|
|
|
@ -1,6 +1,6 @@
|
||||||
[toolchain]
|
[toolchain]
|
||||||
profile = "minimal"
|
profile = "minimal"
|
||||||
# use the nightly version of the last stable toolchain, see <https://forge.rust-lang.org/>
|
# use the nightly version of the last stable toolchain, see <https://forge.rust-lang.org/>
|
||||||
channel = "nightly-2024-05-01"
|
channel = "nightly-2025-02-18"
|
||||||
components = ["rust-src", "llvm-tools", "rustfmt", "clippy"]
|
components = ["rust-src", "llvm-tools", "rustfmt", "clippy"]
|
||||||
targets = ["riscv64gc-unknown-none-elf"]
|
targets = ["riscv64gc-unknown-none-elf"]
|
||||||
|
|
|
@ -1,2 +0,0 @@
|
||||||
export PATH=$(rustc --print sysroot)/bin:$PATH
|
|
||||||
export RUST_SRC_PATH=$(rustc --print sysroot)/lib/rustlib/src/rust/library/
|
|
|
@ -2,18 +2,17 @@
|
||||||
name = "user_lib"
|
name = "user_lib"
|
||||||
version = "0.1.0"
|
version = "0.1.0"
|
||||||
authors = ["Yifan Wu <shinbokuow@163.com>"]
|
authors = ["Yifan Wu <shinbokuow@163.com>"]
|
||||||
edition = "2018"
|
edition = "2024"
|
||||||
|
|
||||||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
buddy_system_allocator = "0.6"
|
buddy_system_allocator = "0.6"
|
||||||
bitflags = "1.2.1"
|
bitflags = "1.2.1"
|
||||||
riscv = { git = "https://github.com/rcore-os/riscv", features = ["inline-asm"] }
|
|
||||||
lazy_static = { version = "1.4.0", features = ["spin_no_std"] }
|
|
||||||
embedded-graphics = "0.7.1"
|
|
||||||
oorandom ="11"
|
|
||||||
virtio-input-decoder = "0.1.4"
|
|
||||||
|
|
||||||
[profile.release]
|
[profile.release]
|
||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
|
# [features]
|
||||||
|
# board_qemu = []
|
||||||
|
# board_k210 = []
|
|
@ -1,58 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::ptr::addr_of_mut;
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
const PER_THREAD_DEFAULT: usize = 10000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 16;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn f() -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _ in 0..PER_THREAD {
|
|
||||||
critical_section(&mut t);
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
let start = get_time();
|
|
||||||
let mut v = Vec::new();
|
|
||||||
for _ in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, 0) as usize);
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid);
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,75 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::ptr::addr_of_mut;
|
|
||||||
use core::sync::atomic::{AtomicBool, Ordering};
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid, yield_};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
static OCCUPIED: AtomicBool = AtomicBool::new(false);
|
|
||||||
const PER_THREAD_DEFAULT: usize = 10000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 16;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
fn lock() {
|
|
||||||
while OCCUPIED
|
|
||||||
.compare_exchange(false, true, Ordering::Relaxed, Ordering::Relaxed)
|
|
||||||
.is_err()
|
|
||||||
{
|
|
||||||
yield_();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn unlock() {
|
|
||||||
OCCUPIED.store(false, Ordering::Relaxed);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn f() -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _ in 0..PER_THREAD {
|
|
||||||
lock();
|
|
||||||
critical_section(&mut t);
|
|
||||||
unlock();
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
let start = get_time();
|
|
||||||
let mut v = Vec::new();
|
|
||||||
for _ in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, 0) as usize);
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid);
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,62 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::ptr::addr_of_mut;
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid};
|
|
||||||
use user_lib::{mutex_blocking_create, mutex_lock, mutex_unlock};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
const PER_THREAD_DEFAULT: usize = 10000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 16;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
unsafe fn f() -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _ in 0..PER_THREAD {
|
|
||||||
mutex_lock(0);
|
|
||||||
critical_section(&mut t);
|
|
||||||
mutex_unlock(0);
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
|
|
||||||
let start = get_time();
|
|
||||||
assert_eq!(mutex_blocking_create(), 0);
|
|
||||||
let mut v = Vec::new();
|
|
||||||
for _ in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, 0) as usize);
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid);
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,63 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::ptr::addr_of_mut;
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid};
|
|
||||||
use user_lib::{mutex_create, mutex_lock, mutex_unlock};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
const PER_THREAD_DEFAULT: usize = 10000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 16;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn f() -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _ in 0..PER_THREAD {
|
|
||||||
mutex_lock(0);
|
|
||||||
critical_section(&mut t);
|
|
||||||
mutex_unlock(0);
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
|
|
||||||
let start = get_time();
|
|
||||||
assert_eq!(mutex_create(), 0);
|
|
||||||
let mut v = Vec::new();
|
|
||||||
for _ in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, 0) as usize);
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid);
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,95 +0,0 @@
|
||||||
//! It only works on a single CPU!
|
|
||||||
|
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::ptr::addr_of_mut;
|
|
||||||
use core::sync::atomic::{compiler_fence, Ordering};
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
static mut FLAG: [bool; 2] = [false; 2];
|
|
||||||
static mut TURN: usize = 0;
|
|
||||||
const PER_THREAD_DEFAULT: usize = 2000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 2;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn lock(id: usize) {
|
|
||||||
FLAG[id] = true;
|
|
||||||
let j = 1 - id;
|
|
||||||
TURN = j;
|
|
||||||
// Tell the compiler not to reorder memory operations
|
|
||||||
// across this fence.
|
|
||||||
compiler_fence(Ordering::SeqCst);
|
|
||||||
// Why do we need to use volatile_read here?
|
|
||||||
// Otherwise the compiler will assume that they will never
|
|
||||||
// be changed on this thread. Thus, they will be accessed
|
|
||||||
// only once!
|
|
||||||
while vload!(FLAG[j]) && vload!(TURN) == j {}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn unlock(id: usize) {
|
|
||||||
FLAG[id] = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn f(id: usize) -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _iter in 0..PER_THREAD {
|
|
||||||
lock(id);
|
|
||||||
critical_section(&mut t);
|
|
||||||
unlock(id);
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
|
|
||||||
// uncomment this if you want to check the assembly
|
|
||||||
// println!(
|
|
||||||
// "addr: lock={:#x}, unlock={:#x}",
|
|
||||||
// lock as usize,
|
|
||||||
// unlock as usize
|
|
||||||
// );
|
|
||||||
let start = get_time();
|
|
||||||
let mut v = Vec::new();
|
|
||||||
assert_eq!(
|
|
||||||
thread_count, 2,
|
|
||||||
"Peterson works when there are only 2 threads."
|
|
||||||
);
|
|
||||||
for id in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, id) as usize);
|
|
||||||
}
|
|
||||||
let mut time_cost = Vec::new();
|
|
||||||
for tid in v.iter() {
|
|
||||||
time_cost.push(waittid(*tid));
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,96 +0,0 @@
|
||||||
//! It only works on a single CPU!
|
|
||||||
|
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::{
|
|
||||||
ptr::addr_of_mut,
|
|
||||||
sync::atomic::{compiler_fence, Ordering},
|
|
||||||
};
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid, yield_};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
static mut FLAG: [bool; 2] = [false; 2];
|
|
||||||
static mut TURN: usize = 0;
|
|
||||||
const PER_THREAD_DEFAULT: usize = 2000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 2;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn lock(id: usize) {
|
|
||||||
FLAG[id] = true;
|
|
||||||
let j = 1 - id;
|
|
||||||
TURN = j;
|
|
||||||
// Tell the compiler not to reorder memory operations
|
|
||||||
// across this fence.
|
|
||||||
compiler_fence(Ordering::SeqCst);
|
|
||||||
while FLAG[j] && TURN == j {
|
|
||||||
yield_();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn unlock(id: usize) {
|
|
||||||
FLAG[id] = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn f(id: usize) -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _iter in 0..PER_THREAD {
|
|
||||||
lock(id);
|
|
||||||
critical_section(&mut t);
|
|
||||||
unlock(id);
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
|
|
||||||
// uncomment this if you want to check the assembly
|
|
||||||
// println!(
|
|
||||||
// "addr: lock={:#x}, unlock={:#x}",
|
|
||||||
// lock as usize,
|
|
||||||
// unlock as usize
|
|
||||||
// );
|
|
||||||
|
|
||||||
let start = get_time();
|
|
||||||
let mut v = Vec::new();
|
|
||||||
assert_eq!(
|
|
||||||
thread_count, 2,
|
|
||||||
"Peterson works when there are only 2 threads."
|
|
||||||
);
|
|
||||||
for id in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, id) as usize);
|
|
||||||
}
|
|
||||||
let mut time_cost = Vec::new();
|
|
||||||
for tid in v.iter() {
|
|
||||||
time_cost.push(waittid(*tid));
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,70 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::ptr::addr_of_mut;
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
static mut OCCUPIED: bool = false;
|
|
||||||
const PER_THREAD_DEFAULT: usize = 10000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 16;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn lock() {
|
|
||||||
while vload!(OCCUPIED) {}
|
|
||||||
OCCUPIED = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn unlock() {
|
|
||||||
OCCUPIED = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn f() -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _ in 0..PER_THREAD {
|
|
||||||
lock();
|
|
||||||
critical_section(&mut t);
|
|
||||||
unlock();
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
let start = get_time();
|
|
||||||
let mut v = Vec::new();
|
|
||||||
for _ in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, 0) as usize);
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid);
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,72 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::ptr::addr_of_mut;
|
|
||||||
use user_lib::{exit, get_time, thread_create, waittid, yield_};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
static mut OCCUPIED: bool = false;
|
|
||||||
const PER_THREAD_DEFAULT: usize = 10000;
|
|
||||||
const THREAD_COUNT_DEFAULT: usize = 16;
|
|
||||||
static mut PER_THREAD: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn critical_section(t: &mut usize) {
|
|
||||||
let a = addr_of_mut!(A);
|
|
||||||
let cur = a.read_volatile();
|
|
||||||
for _ in 0..500 {
|
|
||||||
*t = (*t) * (*t) % 10007;
|
|
||||||
}
|
|
||||||
a.write_volatile(cur + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn lock() {
|
|
||||||
while OCCUPIED {
|
|
||||||
yield_();
|
|
||||||
}
|
|
||||||
OCCUPIED = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn unlock() {
|
|
||||||
OCCUPIED = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn f() -> ! {
|
|
||||||
let mut t = 2usize;
|
|
||||||
for _ in 0..PER_THREAD {
|
|
||||||
lock();
|
|
||||||
critical_section(&mut t);
|
|
||||||
unlock();
|
|
||||||
}
|
|
||||||
exit(t as i32)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
let mut thread_count = THREAD_COUNT_DEFAULT;
|
|
||||||
let mut per_thread = PER_THREAD_DEFAULT;
|
|
||||||
if argc >= 2 {
|
|
||||||
thread_count = argv[1].parse().unwrap();
|
|
||||||
if argc >= 3 {
|
|
||||||
per_thread = argv[2].parse().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe {
|
|
||||||
PER_THREAD = per_thread;
|
|
||||||
}
|
|
||||||
let start = get_time();
|
|
||||||
let mut v = Vec::new();
|
|
||||||
for _ in 0..thread_count {
|
|
||||||
v.push(thread_create(f as usize, 0) as usize);
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid);
|
|
||||||
}
|
|
||||||
println!("time cost is {}ms", get_time() - start);
|
|
||||||
assert_eq!(unsafe { A }, unsafe { PER_THREAD } * thread_count);
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,83 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use core::cell::UnsafeCell;
|
|
||||||
use lazy_static::*;
|
|
||||||
use user_lib::{
|
|
||||||
condvar_create, condvar_signal, condvar_wait, exit, mutex_create, mutex_lock, mutex_unlock,
|
|
||||||
thread_create, waittid,
|
|
||||||
};
|
|
||||||
|
|
||||||
const THREAD_NUM: usize = 3;
|
|
||||||
|
|
||||||
struct Barrier {
|
|
||||||
mutex_id: usize,
|
|
||||||
condvar_id: usize,
|
|
||||||
count: UnsafeCell<usize>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Barrier {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
Self {
|
|
||||||
mutex_id: mutex_create() as usize,
|
|
||||||
condvar_id: condvar_create() as usize,
|
|
||||||
count: UnsafeCell::new(0),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn block(&self) {
|
|
||||||
mutex_lock(self.mutex_id);
|
|
||||||
let count = self.count.get();
|
|
||||||
// SAFETY: Here, the accesses of the count is in the
|
|
||||||
// critical section protected by the mutex.
|
|
||||||
unsafe {
|
|
||||||
*count = *count + 1;
|
|
||||||
}
|
|
||||||
if unsafe { *count } == THREAD_NUM {
|
|
||||||
condvar_signal(self.condvar_id);
|
|
||||||
} else {
|
|
||||||
condvar_wait(self.condvar_id, self.mutex_id);
|
|
||||||
condvar_signal(self.condvar_id);
|
|
||||||
}
|
|
||||||
mutex_unlock(self.mutex_id);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe impl Sync for Barrier {}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref BARRIER_AB: Barrier = Barrier::new();
|
|
||||||
static ref BARRIER_BC: Barrier = Barrier::new();
|
|
||||||
}
|
|
||||||
|
|
||||||
fn thread_fn() {
|
|
||||||
for _ in 0..300 {
|
|
||||||
print!("a");
|
|
||||||
}
|
|
||||||
BARRIER_AB.block();
|
|
||||||
for _ in 0..300 {
|
|
||||||
print!("b");
|
|
||||||
}
|
|
||||||
BARRIER_BC.block();
|
|
||||||
for _ in 0..300 {
|
|
||||||
print!("c");
|
|
||||||
}
|
|
||||||
exit(0)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main() -> i32 {
|
|
||||||
let mut v: Vec<isize> = Vec::new();
|
|
||||||
for _ in 0..THREAD_NUM {
|
|
||||||
v.push(thread_create(thread_fn as usize, 0));
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid as usize);
|
|
||||||
}
|
|
||||||
println!("\nOK!");
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,33 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec::Vec;
|
|
||||||
use user_lib::{exit, thread_create, waittid};
|
|
||||||
|
|
||||||
const THREAD_NUM: usize = 3;
|
|
||||||
|
|
||||||
fn thread_fn() {
|
|
||||||
for ch in 'a'..='c' {
|
|
||||||
for _ in 0..300 {
|
|
||||||
print!("{}", ch);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
exit(0)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main() -> i32 {
|
|
||||||
let mut v: Vec<isize> = Vec::new();
|
|
||||||
for _ in 0..THREAD_NUM {
|
|
||||||
v.push(thread_create(thread_fn as usize, 0));
|
|
||||||
}
|
|
||||||
for tid in v.into_iter() {
|
|
||||||
waittid(tid as usize);
|
|
||||||
}
|
|
||||||
println!("\nOK!");
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,32 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use user_lib::{close, open, read, OpenFlags};
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
println!("argc = {}", argc);
|
|
||||||
for (i, arg) in argv.iter().enumerate() {
|
|
||||||
println!("argv[{}] = {}", i, arg);
|
|
||||||
}
|
|
||||||
assert!(argc == 2);
|
|
||||||
let fd = open(argv[1], OpenFlags::RDONLY);
|
|
||||||
if fd == -1 {
|
|
||||||
panic!("Error occurred when opening file");
|
|
||||||
}
|
|
||||||
let fd = fd as usize;
|
|
||||||
let mut buf = [0u8; 256];
|
|
||||||
loop {
|
|
||||||
let size = read(fd, &mut buf) as usize;
|
|
||||||
if size == 0 {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
print!("{}", core::str::from_utf8(&buf[..size]).unwrap());
|
|
||||||
}
|
|
||||||
close(fd);
|
|
||||||
0
|
|
||||||
}
|
|
27
user/src/bin/cat_filea.rs
Normal file
27
user/src/bin/cat_filea.rs
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
#![no_std]
|
||||||
|
#![no_main]
|
||||||
|
|
||||||
|
#[macro_use]
|
||||||
|
extern crate user_lib;
|
||||||
|
extern crate alloc;
|
||||||
|
|
||||||
|
use user_lib::{OpenFlags, close, open, read};
|
||||||
|
|
||||||
|
#[unsafe(no_mangle)]
|
||||||
|
pub fn main() -> i32 {
|
||||||
|
let fd = open("filea\0", OpenFlags::RDONLY);
|
||||||
|
if fd == -1 {
|
||||||
|
panic!("Error occured when opening file");
|
||||||
|
}
|
||||||
|
let fd = fd as usize;
|
||||||
|
let mut buf = [0u8; 256];
|
||||||
|
loop {
|
||||||
|
let size = read(fd, &mut buf) as usize;
|
||||||
|
if size == 0 {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
println!("{}", core::str::from_utf8(&buf[..size]).unwrap());
|
||||||
|
}
|
||||||
|
close(fd);
|
||||||
|
0
|
||||||
|
}
|
|
@ -1,16 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main(argc: usize, argv: &[&str]) -> i32 {
|
|
||||||
println!("argc = {}", argc);
|
|
||||||
for (i, arg) in argv.iter().enumerate() {
|
|
||||||
println!("argv[{}] = {}", i, arg);
|
|
||||||
}
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,59 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec;
|
|
||||||
use user_lib::exit;
|
|
||||||
use user_lib::{
|
|
||||||
condvar_create, condvar_signal, condvar_wait, mutex_blocking_create, mutex_lock, mutex_unlock,
|
|
||||||
};
|
|
||||||
use user_lib::{sleep, thread_create, waittid};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
|
|
||||||
const CONDVAR_ID: usize = 0;
|
|
||||||
const MUTEX_ID: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn first() -> ! {
|
|
||||||
sleep(10);
|
|
||||||
println!("First work, Change A --> 1 and wakeup Second");
|
|
||||||
mutex_lock(MUTEX_ID);
|
|
||||||
A = 1;
|
|
||||||
condvar_signal(CONDVAR_ID);
|
|
||||||
mutex_unlock(MUTEX_ID);
|
|
||||||
exit(0)
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn second() -> ! {
|
|
||||||
println!("Second want to continue,but need to wait A=1");
|
|
||||||
mutex_lock(MUTEX_ID);
|
|
||||||
while A == 0 {
|
|
||||||
println!("Second: A is {}", A);
|
|
||||||
condvar_wait(CONDVAR_ID, MUTEX_ID);
|
|
||||||
}
|
|
||||||
println!("A is {}, Second can work now", A);
|
|
||||||
mutex_unlock(MUTEX_ID);
|
|
||||||
exit(0)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main() -> i32 {
|
|
||||||
// create condvar & mutex
|
|
||||||
assert_eq!(condvar_create() as usize, CONDVAR_ID);
|
|
||||||
assert_eq!(mutex_blocking_create() as usize, MUTEX_ID);
|
|
||||||
// create threads
|
|
||||||
let threads = vec![
|
|
||||||
thread_create(first as usize, 0),
|
|
||||||
thread_create(second as usize, 0),
|
|
||||||
];
|
|
||||||
// wait for all threads to complete
|
|
||||||
for thread in threads.iter() {
|
|
||||||
waittid(*thread as usize);
|
|
||||||
}
|
|
||||||
println!("test_condvar passed!");
|
|
||||||
0
|
|
||||||
}
|
|
|
@ -1,64 +0,0 @@
|
||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
|
|
||||||
#[macro_use]
|
|
||||||
extern crate user_lib;
|
|
||||||
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::vec;
|
|
||||||
use user_lib::exit;
|
|
||||||
use user_lib::{
|
|
||||||
mutex_blocking_create, mutex_lock, mutex_unlock, semaphore_create, semaphore_down, semaphore_up,
|
|
||||||
};
|
|
||||||
use user_lib::{sleep, thread_create, waittid};
|
|
||||||
|
|
||||||
static mut A: usize = 0;
|
|
||||||
|
|
||||||
const SEM_ID: usize = 0;
|
|
||||||
const MUTEX_ID: usize = 0;
|
|
||||||
|
|
||||||
unsafe fn first() -> ! {
|
|
||||||
sleep(10);
|
|
||||||
println!("First work, Change A --> 1 and wakeup Second");
|
|
||||||
mutex_lock(MUTEX_ID);
|
|
||||||
A = 1;
|
|
||||||
semaphore_up(SEM_ID);
|
|
||||||
mutex_unlock(MUTEX_ID);
|
|
||||||
exit(0)
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn second() -> ! {
|
|
||||||
println!("Second want to continue,but need to wait A=1");
|
|
||||||
loop {
|
|
||||||
mutex_lock(MUTEX_ID);
|
|
||||||
if A == 0 {
|
|
||||||
println!("Second: A is {}", A);
|
|
||||||
mutex_unlock(MUTEX_ID);
|
|
||||||
semaphore_down(SEM_ID);
|
|
||||||
} else {
|
|
||||||
mutex_unlock(MUTEX_ID);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
println!("A is {}, Second can work now", A);
|
|
||||||
exit(0)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[no_mangle]
|
|
||||||
pub fn main() -> i32 {
|
|
||||||
// create semaphore & mutex
|
|
||||||
assert_eq!(semaphore_create(0) as usize, SEM_ID);
|
|
||||||
assert_eq!(mutex_blocking_create() as usize, MUTEX_ID);
|
|
||||||
// create threads
|
|
||||||
let threads = vec![
|
|
||||||
thread_create(first as usize, 0),
|
|
||||||
thread_create(second as usize, 0),
|
|
||||||
];
|
|
||||||
// wait for all threads to complete
|
|
||||||
for thread in threads.iter() {
|
|
||||||
waittid(*thread as usize);
|
|
||||||
}
|
|
||||||
println!("test_condvar passed!");
|
|
||||||
0
|
|
||||||
}
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue