c41f1de5d4
pipes
171 lines
4.2 KiB
C
171 lines
4.2 KiB
C
#include "types.h"
|
|
#include "mmu.h"
|
|
#include "x86.h"
|
|
#include "param.h"
|
|
#include "fd.h"
|
|
#include "proc.h"
|
|
#include "defs.h"
|
|
|
|
struct proc proc[NPROC];
|
|
struct proc *curproc[NCPU];
|
|
int next_pid = 1;
|
|
|
|
/*
|
|
* set up a process's task state and segment descriptors
|
|
* correctly, given its current size and address in memory.
|
|
* this should be called whenever the latter change.
|
|
* doesn't change the cpu's current segmentation setup.
|
|
*/
|
|
void
|
|
setupsegs(struct proc *p)
|
|
{
|
|
memset(&p->ts, 0, sizeof(struct Taskstate));
|
|
p->ts.ts_ss0 = SEG_KDATA << 3;
|
|
p->ts.ts_esp0 = (unsigned)(p->kstack + KSTACKSIZE);
|
|
|
|
// XXX it may be wrong to modify the current segment table!
|
|
|
|
p->gdt[0] = SEG_NULL;
|
|
p->gdt[SEG_KCODE] = SEG(STA_X|STA_R, 0, 0xffffffff, 0);
|
|
p->gdt[SEG_KDATA] = SEG(STA_W, 0, 0xffffffff, 0);
|
|
p->gdt[SEG_TSS] = SEG16(STS_T32A, (unsigned) &p->ts,
|
|
sizeof(p->ts), 0);
|
|
p->gdt[SEG_TSS].sd_s = 0;
|
|
p->gdt[SEG_UCODE] = SEG(STA_X|STA_R, (unsigned)p->mem, p->sz, 3);
|
|
p->gdt[SEG_UDATA] = SEG(STA_W, (unsigned)p->mem, p->sz, 3);
|
|
p->gdt_pd.pd__garbage = 0;
|
|
p->gdt_pd.pd_lim = sizeof(p->gdt) - 1;
|
|
p->gdt_pd.pd_base = (unsigned) p->gdt;
|
|
}
|
|
|
|
extern void trapret();
|
|
|
|
/*
|
|
* internal fork(). does not copy kernel stack; instead,
|
|
* sets up the stack to return as if from system call.
|
|
*/
|
|
struct proc *
|
|
newproc()
|
|
{
|
|
struct proc *np;
|
|
struct proc *op = curproc[cpu()];
|
|
unsigned *sp;
|
|
int fd;
|
|
|
|
for(np = &proc[1]; np < &proc[NPROC]; np++)
|
|
if(np->state == UNUSED)
|
|
break;
|
|
if(np >= &proc[NPROC])
|
|
return 0;
|
|
|
|
np->pid = next_pid++;
|
|
np->ppid = op->pid;
|
|
np->sz = op->sz;
|
|
np->mem = kalloc(op->sz);
|
|
if(np->mem == 0)
|
|
return 0;
|
|
memcpy(np->mem, op->mem, np->sz);
|
|
np->kstack = kalloc(KSTACKSIZE);
|
|
if(np->kstack == 0){
|
|
kfree(np->mem, op->sz);
|
|
return 0;
|
|
}
|
|
setupsegs(np);
|
|
|
|
// set up kernel stack to return to user space
|
|
np->tf = (struct Trapframe *) (np->kstack + KSTACKSIZE - sizeof(struct Trapframe));
|
|
*(np->tf) = *(op->tf);
|
|
np->tf->tf_regs.reg_eax = 0; // so fork() returns 0 in child
|
|
sp = (unsigned *) np->tf;
|
|
*(--sp) = (unsigned) &trapret; // for return from swtch()
|
|
*(--sp) = 0; // previous bp for leave in swtch()
|
|
np->esp = (unsigned) sp;
|
|
np->ebp = (unsigned) sp;
|
|
|
|
// copy file descriptors
|
|
for(fd = 0; fd < NOFILE; fd++){
|
|
np->fds[fd] = op->fds[fd];
|
|
if(np->fds[fd])
|
|
np->fds[fd]->count += 1;
|
|
}
|
|
|
|
np->state = RUNNABLE;
|
|
|
|
cprintf("newproc %x\n", np);
|
|
|
|
return np;
|
|
}
|
|
|
|
/*
|
|
* find a runnable process and switch to it.
|
|
*/
|
|
void
|
|
swtch()
|
|
{
|
|
struct proc *np;
|
|
struct proc *op = curproc[cpu()];
|
|
|
|
while(1){
|
|
np = op + 1;
|
|
while(np != op){
|
|
if(np->state == RUNNABLE)
|
|
break;
|
|
np++;
|
|
if(np == &proc[NPROC])
|
|
np = &proc[0];
|
|
}
|
|
if(np->state == RUNNABLE)
|
|
break;
|
|
// cprintf("swtch: nothing to run\n");
|
|
release_spinlock(&kernel_lock);
|
|
acquire_spinlock(&kernel_lock);
|
|
}
|
|
|
|
// XXX this may be too late, should probably save on the way
|
|
// in, in case some other CPU decided to run curproc
|
|
// before we got here. in fact setting state=WAITING and
|
|
// setting these variables had better be atomic w.r.t. other CPUs.
|
|
op->ebp = read_ebp();
|
|
op->esp = read_esp();
|
|
|
|
cprintf("cpu %d swtch %x -> %x\n", cpu(), op, np);
|
|
|
|
curproc[cpu()] = np;
|
|
np->state = RUNNING;
|
|
|
|
// XXX callee-saved registers?
|
|
|
|
// h/w sets busy bit in TSS descriptor sometimes, and faults
|
|
// if it's set in LTR. so clear tss descriptor busy bit.
|
|
np->gdt[SEG_TSS].sd_type = STS_T32A;
|
|
|
|
// XXX probably ought to lgdt on trap return too, in case
|
|
// a system call has moved a program or changed its size.
|
|
|
|
asm volatile("lgdt %0" : : "g" (np->gdt_pd.pd_lim));
|
|
ltr(SEG_TSS << 3);
|
|
|
|
// this happens to work, but probably isn't safe:
|
|
// it's not clear that np->ebp is guaranteed to evaluate
|
|
// correctly after changing the stack pointer.
|
|
asm volatile("movl %0, %%esp" : : "g" (np->esp));
|
|
asm volatile("movl %0, %%ebp" : : "g" (np->ebp));
|
|
}
|
|
|
|
void
|
|
sleep(void *chan)
|
|
{
|
|
curproc[cpu()]->chan = chan;
|
|
curproc[cpu()]->state = WAITING;
|
|
swtch();
|
|
}
|
|
|
|
void
|
|
wakeup(void *chan)
|
|
{
|
|
struct proc *p;
|
|
|
|
for(p = proc; p < &proc[NPROC]; p++)
|
|
if(p->state == WAITING && p->chan == chan)
|
|
p->state = RUNNABLE;
|
|
}
|