process.c 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977
  1. #include "process.h"
  2. #include "../exception/gate.h"
  3. #include "../common/printk.h"
  4. #include "../common/kprint.h"
  5. #include "../syscall/syscall.h"
  6. #include "../syscall/syscall_num.h"
  7. #include <mm/slab.h>
  8. #include <sched/sched.h>
  9. #include <filesystem/fat32/fat32.h>
  10. #include <common/stdio.h>
  11. #include <process/spinlock.h>
  12. spinlock_t process_global_pid_write_lock; // 增加pid的写锁
  13. long process_global_pid = 1; // 系统中最大的pid
  14. extern void system_call(void);
  15. extern void kernel_thread_func(void);
  16. /**
  17. * @brief 将进程加入到调度器的就绪队列中
  18. *
  19. * @param pcb 进程的pcb
  20. */
  21. static inline void process_wakeup(struct process_control_block *pcb);
  22. ul _stack_start; // initial proc的栈基地址(虚拟地址)
  23. struct mm_struct initial_mm = {0};
  24. struct thread_struct initial_thread =
  25. {
  26. .rbp = (ul)(initial_proc_union.stack + STACK_SIZE / sizeof(ul)),
  27. .rsp = (ul)(initial_proc_union.stack + STACK_SIZE / sizeof(ul)),
  28. .fs = KERNEL_DS,
  29. .gs = KERNEL_DS,
  30. .cr2 = 0,
  31. .trap_num = 0,
  32. .err_code = 0};
  33. // 初始化 初始进程的union ,并将其链接到.data.init_proc段内
  34. union proc_union initial_proc_union __attribute__((__section__(".data.init_proc_union"))) = {INITIAL_PROC(initial_proc_union.pcb)};
  35. struct process_control_block *initial_proc[MAX_CPU_NUM] = {&initial_proc_union.pcb, 0};
  36. // 为每个核心初始化初始进程的tss
  37. struct tss_struct initial_tss[MAX_CPU_NUM] = {[0 ... MAX_CPU_NUM - 1] = INITIAL_TSS};
  38. /**
  39. * @brief 拷贝当前进程的标志位
  40. *
  41. * @param clone_flags 克隆标志位
  42. * @param pcb 新的进程的pcb
  43. * @return uint64_t
  44. */
  45. uint64_t process_copy_flags(uint64_t clone_flags, struct process_control_block *pcb);
  46. /**
  47. * @brief 拷贝当前进程的文件描述符等信息
  48. *
  49. * @param clone_flags 克隆标志位
  50. * @param pcb 新的进程的pcb
  51. * @return uint64_t
  52. */
  53. uint64_t process_copy_files(uint64_t clone_flags, struct process_control_block *pcb);
  54. /**
  55. * @brief 回收进程的所有文件描述符
  56. *
  57. * @param pcb 要被回收的进程的pcb
  58. * @return uint64_t
  59. */
  60. uint64_t process_exit_files(struct process_control_block *pcb);
  61. /**
  62. * @brief 拷贝当前进程的内存空间分布结构体信息
  63. *
  64. * @param clone_flags 克隆标志位
  65. * @param pcb 新的进程的pcb
  66. * @return uint64_t
  67. */
  68. uint64_t process_copy_mm(uint64_t clone_flags, struct process_control_block *pcb);
  69. /**
  70. * @brief 释放进程的页表
  71. *
  72. * @param pcb 要被释放页表的进程
  73. * @return uint64_t
  74. */
  75. uint64_t process_exit_mm(struct process_control_block *pcb);
  76. /**
  77. * @brief 拷贝当前进程的线程结构体
  78. *
  79. * @param clone_flags 克隆标志位
  80. * @param pcb 新的进程的pcb
  81. * @return uint64_t
  82. */
  83. uint64_t process_copy_thread(uint64_t clone_flags, struct process_control_block *pcb, uint64_t stack_start, uint64_t stack_size, struct pt_regs *current_regs);
  84. void process_exit_thread(struct process_control_block *pcb);
  85. /**
  86. * @brief 切换进程
  87. *
  88. * @param prev 上一个进程的pcb
  89. * @param next 将要切换到的进程的pcb
  90. * 由于程序在进入内核的时候已经保存了寄存器,因此这里不需要保存寄存器。
  91. * 这里切换fs和gs寄存器
  92. */
  93. void __switch_to(struct process_control_block *prev, struct process_control_block *next)
  94. {
  95. initial_tss[proc_current_cpu_id].rsp0 = next->thread->rbp;
  96. // kdebug("next_rsp = %#018lx ", next->thread->rsp);
  97. // set_tss64((uint *)phys_2_virt(TSS64_Table), initial_tss[0].rsp0, initial_tss[0].rsp1, initial_tss[0].rsp2, initial_tss[0].ist1,
  98. // initial_tss[0].ist2, initial_tss[0].ist3, initial_tss[0].ist4, initial_tss[0].ist5, initial_tss[0].ist6, initial_tss[0].ist7);
  99. __asm__ __volatile__("movq %%fs, %0 \n\t"
  100. : "=a"(prev->thread->fs));
  101. __asm__ __volatile__("movq %%gs, %0 \n\t"
  102. : "=a"(prev->thread->gs));
  103. __asm__ __volatile__("movq %0, %%fs \n\t" ::"a"(next->thread->fs));
  104. __asm__ __volatile__("movq %0, %%gs \n\t" ::"a"(next->thread->gs));
  105. // wrmsr(0x175, next->thread->rbp);
  106. }
  107. /**
  108. * @brief 这是一个用户态的程序
  109. *
  110. */
  111. void user_level_function()
  112. {
  113. // kinfo("Program (user_level_function) is runing...");
  114. // kinfo("Try to enter syscall id 15...");
  115. // enter_syscall(15, 0, 0, 0, 0, 0, 0, 0, 0);
  116. // enter_syscall(SYS_PRINTF, (ul) "test_sys_printf\n", 0, 0, 0, 0, 0, 0, 0);
  117. // while(1);
  118. long ret = 0;
  119. // printk_color(RED,BLACK,"user_level_function task is running\n");
  120. /*
  121. // 测试sys put string
  122. char string[] = "User level process.\n";
  123. long err_code = 1;
  124. ul addr = (ul)string;
  125. __asm__ __volatile__(
  126. "movq %2, %%r8 \n\t"
  127. "int $0x80 \n\t"
  128. : "=a"(err_code)
  129. : "a"(SYS_PUT_STRING), "m"(addr)
  130. : "memory", "r8");
  131. */
  132. while (1)
  133. {
  134. // 测试sys_open
  135. char string[] = "333.txt";
  136. long err_code = 1;
  137. int zero = 0;
  138. uint64_t addr = (ul)string;
  139. __asm__ __volatile__(
  140. "movq %2, %%r8 \n\t"
  141. "movq %3, %%r9 \n\t"
  142. "movq %4, %%r10 \n\t"
  143. "movq %5, %%r11 \n\t"
  144. "movq %6, %%r12 \n\t"
  145. "movq %7, %%r13 \n\t"
  146. "movq %8, %%r14 \n\t"
  147. "movq %9, %%r15 \n\t"
  148. "int $0x80 \n\t"
  149. : "=a"(err_code)
  150. : "a"(SYS_OPEN), "m"(addr), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  151. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  152. int fd_num = err_code;
  153. int count = 128;
  154. // while (count)
  155. //{
  156. uchar buf[128] = {0};
  157. // Test sys_read
  158. addr = (uint64_t)&buf;
  159. __asm__ __volatile__(
  160. "movq %2, %%r8 \n\t"
  161. "movq %3, %%r9 \n\t"
  162. "movq %4, %%r10 \n\t"
  163. "movq %5, %%r11 \n\t"
  164. "movq %6, %%r12 \n\t"
  165. "movq %7, %%r13 \n\t"
  166. "movq %8, %%r14 \n\t"
  167. "movq %9, %%r15 \n\t"
  168. "int $0x80 \n\t"
  169. : "=a"(err_code)
  170. : "a"(SYS_READ), "m"(fd_num), "m"(addr), "m"(count), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  171. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  172. count = err_code;
  173. // 将读取到的数据打印出来
  174. addr = (ul)buf;
  175. __asm__ __volatile__(
  176. "movq %2, %%r8 \n\t"
  177. "int $0x80 \n\t"
  178. : "=a"(err_code)
  179. : "a"(SYS_PUT_STRING), "m"(addr)
  180. : "memory", "r8");
  181. // SYS_WRITE
  182. char test1[] = "GGGGHHHHHHHHh112343";
  183. addr = (uint64_t)&test1;
  184. count = 19;
  185. __asm__ __volatile__(
  186. "movq %2, %%r8 \n\t"
  187. "movq %3, %%r9 \n\t"
  188. "movq %4, %%r10 \n\t"
  189. "movq %5, %%r11 \n\t"
  190. "movq %6, %%r12 \n\t"
  191. "movq %7, %%r13 \n\t"
  192. "movq %8, %%r14 \n\t"
  193. "movq %9, %%r15 \n\t"
  194. "int $0x80 \n\t"
  195. : "=a"(err_code)
  196. : "a"(SYS_WRITE), "m"(fd_num), "m"(addr), "m"(count), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  197. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  198. addr = 1;
  199. count = SEEK_SET;
  200. fd_num = 0;
  201. // Test lseek
  202. __asm__ __volatile__(
  203. "movq %2, %%r8 \n\t"
  204. "movq %3, %%r9 \n\t"
  205. "movq %4, %%r10 \n\t"
  206. "movq %5, %%r11 \n\t"
  207. "movq %6, %%r12 \n\t"
  208. "movq %7, %%r13 \n\t"
  209. "movq %8, %%r14 \n\t"
  210. "movq %9, %%r15 \n\t"
  211. "int $0x80 \n\t"
  212. : "=a"(err_code)
  213. : "a"(SYS_LSEEK), "m"(fd_num), "m"(addr), "m"(count), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  214. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  215. // SYS_WRITE
  216. char test2[] = "K123456789K";
  217. addr = (uint64_t)&test2;
  218. count = 11;
  219. __asm__ __volatile__(
  220. "movq %2, %%r8 \n\t"
  221. "movq %3, %%r9 \n\t"
  222. "movq %4, %%r10 \n\t"
  223. "movq %5, %%r11 \n\t"
  224. "movq %6, %%r12 \n\t"
  225. "movq %7, %%r13 \n\t"
  226. "movq %8, %%r14 \n\t"
  227. "movq %9, %%r15 \n\t"
  228. "int $0x80 \n\t"
  229. : "=a"(err_code)
  230. : "a"(SYS_WRITE), "m"(fd_num), "m"(addr), "m"(count), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  231. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  232. // Test sys_close
  233. __asm__ __volatile__(
  234. "movq %2, %%r8 \n\t"
  235. "movq %3, %%r9 \n\t"
  236. "movq %4, %%r10 \n\t"
  237. "movq %5, %%r11 \n\t"
  238. "movq %6, %%r12 \n\t"
  239. "movq %7, %%r13 \n\t"
  240. "movq %8, %%r14 \n\t"
  241. "movq %9, %%r15 \n\t"
  242. "int $0x80 \n\t"
  243. : "=a"(err_code)
  244. : "a"(SYS_CLOSE), "m"(fd_num), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  245. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  246. addr = (ul)string;
  247. __asm__ __volatile__(
  248. "movq %2, %%r8 \n\t"
  249. "movq %3, %%r9 \n\t"
  250. "movq %4, %%r10 \n\t"
  251. "movq %5, %%r11 \n\t"
  252. "movq %6, %%r12 \n\t"
  253. "movq %7, %%r13 \n\t"
  254. "movq %8, %%r14 \n\t"
  255. "movq %9, %%r15 \n\t"
  256. "int $0x80 \n\t"
  257. : "=a"(err_code)
  258. : "a"(SYS_OPEN), "m"(addr), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  259. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  260. fd_num = err_code;
  261. count = 128;
  262. // Test sys_read
  263. addr = (uint64_t)&buf;
  264. __asm__ __volatile__(
  265. "movq %2, %%r8 \n\t"
  266. "movq %3, %%r9 \n\t"
  267. "movq %4, %%r10 \n\t"
  268. "movq %5, %%r11 \n\t"
  269. "movq %6, %%r12 \n\t"
  270. "movq %7, %%r13 \n\t"
  271. "movq %8, %%r14 \n\t"
  272. "movq %9, %%r15 \n\t"
  273. "int $0x80 \n\t"
  274. : "=a"(err_code)
  275. : "a"(SYS_READ), "m"(fd_num), "m"(addr), "m"(count), "m"(zero), "m"(zero), "m"(zero), "m"(zero), "m"(zero)
  276. : "memory", "r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15", "rcx", "rdx");
  277. count = err_code;
  278. // 将读取到的数据打印出来
  279. addr = (ul)buf;
  280. __asm__ __volatile__(
  281. "movq %2, %%r8 \n\t"
  282. "int $0x80 \n\t"
  283. : "=a"(err_code)
  284. : "a"(SYS_PUT_STRING), "m"(addr)
  285. : "memory", "r8");
  286. // Test Sys
  287. //}
  288. while (1)
  289. pause();
  290. }
  291. while (1)
  292. pause();
  293. }
  294. /**
  295. * @brief 打开要执行的程序文件
  296. *
  297. * @param path
  298. * @return struct vfs_file_t*
  299. */
  300. struct vfs_file_t *process_open_exec_file(char *path)
  301. {
  302. struct vfs_dir_entry_t *dentry = NULL;
  303. struct vfs_file_t *filp = NULL;
  304. dentry = vfs_path_walk(path, 0);
  305. if (dentry == NULL)
  306. return (void *)-ENOENT;
  307. if (dentry->dir_inode->attribute == VFS_ATTR_DIR)
  308. return (void *)-ENOTDIR;
  309. filp = (struct vfs_file_t *)kmalloc(sizeof(struct vfs_file_t), 0);
  310. if (filp == NULL)
  311. return (void *)-ENOMEM;
  312. filp->position = 0;
  313. filp->mode = 0;
  314. filp->dEntry = dentry;
  315. filp->mode = ATTR_READ_ONLY;
  316. filp->file_ops = dentry->dir_inode->file_ops;
  317. return filp;
  318. }
  319. /**
  320. * @brief 使当前进程去执行新的代码
  321. *
  322. * @param regs 当前进程的寄存器
  323. * @param path 可执行程序的路径
  324. * @return ul 错误码
  325. */
  326. ul do_execve(struct pt_regs *regs, char *path)
  327. {
  328. // 选择这两个寄存器是对应了sysexit指令的需要
  329. regs->rip = 0x800000; // rip 应用层程序的入口地址 这里的地址选择没有特殊要求,只要是未使用的内存区域即可。
  330. regs->rsp = 0xa00000; // rsp 应用层程序的栈顶地址
  331. regs->cs = USER_CS | 3;
  332. regs->ds = USER_DS | 3;
  333. regs->ss = USER_DS | 0x3;
  334. regs->rflags = 0x200246;
  335. regs->rax = 1;
  336. regs->es = 0;
  337. kdebug("do_execve is running...");
  338. // 当前进程正在与父进程共享地址空间,需要创建
  339. // 独立的地址空间才能使新程序正常运行
  340. if (current_pcb->flags & PF_VFORK)
  341. {
  342. kdebug("proc:%d creating new mem space", current_pcb->pid);
  343. // 分配新的内存空间分布结构体
  344. struct mm_struct *new_mms = (struct mm_struct *)kmalloc(sizeof(struct mm_struct), 0);
  345. memset(new_mms, 0, sizeof(struct mm_struct));
  346. current_pcb->mm = new_mms;
  347. // 分配顶层页表, 并设置顶层页表的物理地址
  348. new_mms->pgd = (pml4t_t *)virt_2_phys(kmalloc(PAGE_4K_SIZE, 0));
  349. // 由于高2K部分为内核空间,在接下来需要覆盖其数据,因此不用清零
  350. memset(phys_2_virt(new_mms->pgd), 0, PAGE_4K_SIZE / 2);
  351. // 拷贝内核空间的页表指针
  352. memcpy(phys_2_virt(new_mms->pgd) + 256, phys_2_virt(initial_proc[proc_current_cpu_id]) + 256, PAGE_4K_SIZE / 2);
  353. }
  354. /**
  355. * @todo: 加载elf文件并映射对应的页
  356. *
  357. */
  358. // 映射1个2MB的物理页
  359. unsigned long code_start_addr = 0x800000;
  360. unsigned long stack_start_addr = 0xa00000;
  361. uint64_t brk_start_addr = 0xc00000;
  362. mm_map_proc_page_table((uint64_t)current_pcb->mm->pgd, true, code_start_addr, alloc_pages(ZONE_NORMAL, 1, PAGE_PGT_MAPPED)->addr_phys, PAGE_2M_SIZE, PAGE_USER_PAGE, true);
  363. process_switch_mm(current_pcb);
  364. // 为用户态程序设置地址边界
  365. if (!(current_pcb->flags & PF_KTHREAD))
  366. current_pcb->addr_limit = USER_MAX_LINEAR_ADDR;
  367. current_pcb->mm->code_addr_start = code_start_addr;
  368. current_pcb->mm->code_addr_end = 0;
  369. current_pcb->mm->data_addr_start = 0;
  370. current_pcb->mm->data_addr_end = 0;
  371. current_pcb->mm->rodata_addr_start = 0;
  372. current_pcb->mm->rodata_addr_end = 0;
  373. current_pcb->mm->bss_start = 0;
  374. current_pcb->mm->bss_end = 0;
  375. current_pcb->mm->brk_start = brk_start_addr;
  376. current_pcb->mm->brk_end = brk_start_addr;
  377. current_pcb->mm->stack_start = stack_start_addr;
  378. // 关闭之前的文件描述符
  379. process_exit_files(current_pcb);
  380. // 清除进程的vfork标志位
  381. current_pcb->flags &= ~PF_VFORK;
  382. struct vfs_file_t *filp = process_open_exec_file(path);
  383. if ((unsigned long)filp <= 0)
  384. return (unsigned long)filp;
  385. memset((void *)code_start_addr, 0, PAGE_2M_SIZE);
  386. uint64_t pos = 0;
  387. int retval = filp->file_ops->read(filp, (char *)code_start_addr, PAGE_2M_SIZE, &pos);
  388. kdebug("execve ok");
  389. return 0;
  390. }
  391. /**
  392. * @brief 内核init进程
  393. *
  394. * @param arg
  395. * @return ul 参数
  396. */
  397. ul initial_kernel_thread(ul arg)
  398. {
  399. // kinfo("initial proc running...\targ:%#018lx", arg);
  400. fat32_init();
  401. struct pt_regs *regs;
  402. current_pcb->thread->rip = (ul)ret_from_system_call;
  403. current_pcb->thread->rsp = (ul)current_pcb + STACK_SIZE - sizeof(struct pt_regs);
  404. current_pcb->thread->fs = USER_DS | 0x3;
  405. current_pcb->thread->gs = USER_DS | 0x3;
  406. // 主动放弃内核线程身份
  407. current_pcb->flags &= (~PF_KTHREAD);
  408. // current_pcb->mm->pgd = kmalloc(PAGE_4K_SIZE, 0);
  409. // memset((void*)current_pcb->mm->pgd, 0, PAGE_4K_SIZE);
  410. regs = (struct pt_regs *)current_pcb->thread->rsp;
  411. // kdebug("current_pcb->thread->rsp=%#018lx", current_pcb->thread->rsp);
  412. current_pcb->flags = 0;
  413. // 将返回用户层的代码压入堆栈,向rdx传入regs的地址,然后jmp到do_execve这个系统调用api的处理函数 这里的设计思路和switch_proc类似
  414. // 加载用户态程序:init.bin
  415. char init_path[] = "/init.bin";
  416. uint64_t addr = (uint64_t)&init_path;
  417. __asm__ __volatile__("movq %1, %%rsp \n\t"
  418. "pushq %2 \n\t"
  419. "jmp do_execve \n\t" ::"D"(current_pcb->thread->rsp),
  420. "m"(current_pcb->thread->rsp), "m"(current_pcb->thread->rip), "S"("/init.bin")
  421. : "memory");
  422. return 1;
  423. }
  424. /**
  425. * @brief 进程退出时执行的函数
  426. *
  427. * @param code 返回码
  428. * @return ul
  429. */
  430. ul process_thread_do_exit(ul code)
  431. {
  432. kinfo("thread_exiting..., code is %#018lx.", code);
  433. while (1)
  434. ;
  435. }
  436. /**
  437. * @brief 初始化内核进程
  438. *
  439. * @param fn 目标程序的地址
  440. * @param arg 向目标程序传入的参数
  441. * @param flags
  442. * @return int
  443. */
  444. int kernel_thread(unsigned long (*fn)(unsigned long), unsigned long arg, unsigned long flags)
  445. {
  446. struct pt_regs regs;
  447. memset(&regs, 0, sizeof(regs));
  448. // 在rbx寄存器中保存进程的入口地址
  449. regs.rbx = (ul)fn;
  450. // 在rdx寄存器中保存传入的参数
  451. regs.rdx = (ul)arg;
  452. regs.ds = KERNEL_DS;
  453. regs.es = KERNEL_DS;
  454. regs.cs = KERNEL_CS;
  455. regs.ss = KERNEL_DS;
  456. // 置位中断使能标志位
  457. regs.rflags = (1 << 9);
  458. // rip寄存器指向内核线程的引导程序
  459. regs.rip = (ul)kernel_thread_func;
  460. // kdebug("kernel_thread_func=%#018lx", kernel_thread_func);
  461. // kdebug("&kernel_thread_func=%#018lx", &kernel_thread_func);
  462. // kdebug("1111\tregs.rip = %#018lx", regs.rip);
  463. return do_fork(&regs, flags | CLONE_VM, 0, 0);
  464. }
  465. /**
  466. * @brief 初始化进程模块
  467. * ☆前置条件:已完成系统调用模块的初始化
  468. */
  469. void process_init()
  470. {
  471. kinfo("Initializing process...");
  472. initial_mm.pgd = (pml4t_t *)global_CR3;
  473. initial_mm.code_addr_start = memory_management_struct.kernel_code_start;
  474. initial_mm.code_addr_end = memory_management_struct.kernel_code_end;
  475. initial_mm.data_addr_start = (ul)&_data;
  476. initial_mm.data_addr_end = memory_management_struct.kernel_data_end;
  477. initial_mm.rodata_addr_start = (ul)&_rodata;
  478. initial_mm.rodata_addr_end = (ul)&_erodata;
  479. initial_mm.bss_start = (uint64_t)&_bss;
  480. initial_mm.bss_end = (uint64_t)&_ebss;
  481. initial_mm.brk_start = memory_management_struct.start_brk;
  482. initial_mm.brk_end = current_pcb->addr_limit;
  483. initial_mm.stack_start = _stack_start;
  484. initial_tss[proc_current_cpu_id].rsp0 = initial_thread.rbp;
  485. // ========= 在IDLE进程的顶层页表中添加对内核地址空间的映射 =====================
  486. // 由于IDLE进程的顶层页表的高地址部分会被后续进程所复制,为了使所有进程能够共享相同的内核空间,
  487. // 因此需要先在IDLE进程的顶层页表内映射二级页表
  488. uint64_t *idle_pml4t_vaddr = (uint64_t *)phys_2_virt((uint64_t)get_CR3() & (~0xfffUL));
  489. for (int i = 256; i < 512; ++i)
  490. {
  491. uint64_t *tmp = idle_pml4t_vaddr + i;
  492. if (*tmp == 0)
  493. {
  494. void *pdpt = kmalloc(PAGE_4K_SIZE, 0);
  495. memset(pdpt, 0, PAGE_4K_SIZE);
  496. set_pml4t(tmp, mk_pml4t(virt_2_phys(pdpt), PAGE_KERNEL_PGT));
  497. }
  498. }
  499. /*
  500. kdebug("initial_thread.rbp=%#018lx", initial_thread.rbp);
  501. kdebug("initial_tss[0].rsp1=%#018lx", initial_tss[0].rsp1);
  502. kdebug("initial_tss[0].ist1=%#018lx", initial_tss[0].ist1);
  503. */
  504. // 初始化pid的写锁
  505. spin_init(&process_global_pid_write_lock);
  506. // 初始化进程的循环链表
  507. list_init(&initial_proc_union.pcb.list);
  508. kernel_thread(initial_kernel_thread, 10, CLONE_FS | CLONE_SIGNAL); // 初始化内核进程
  509. initial_proc_union.pcb.state = PROC_RUNNING;
  510. initial_proc_union.pcb.preempt_count = 0;
  511. initial_proc_union.pcb.cpu_id = 0;
  512. }
  513. /**
  514. * @brief fork当前进程
  515. *
  516. * @param regs 新的寄存器值
  517. * @param clone_flags 克隆标志
  518. * @param stack_start 堆栈开始地址
  519. * @param stack_size 堆栈大小
  520. * @return unsigned long
  521. */
  522. unsigned long do_fork(struct pt_regs *regs, unsigned long clone_flags, unsigned long stack_start, unsigned long stack_size)
  523. {
  524. int retval = 0;
  525. struct process_control_block *tsk = NULL;
  526. // kdebug("222\tregs.rip = %#018lx", regs->rip);
  527. // 为新的进程分配栈空间,并将pcb放置在底部
  528. tsk = (struct process_control_block *)kmalloc(STACK_SIZE, 0);
  529. // kdebug("struct process_control_block ADDRESS=%#018lx", (uint64_t)tsk);
  530. if (tsk == NULL)
  531. {
  532. retval = -ENOMEM;
  533. return retval;
  534. }
  535. memset(tsk, 0, sizeof(struct process_control_block));
  536. // 将当前进程的pcb复制到新的pcb内
  537. memcpy(tsk, current_pcb, sizeof(struct process_control_block));
  538. // kdebug("current_pcb->flags=%#010lx", current_pcb->flags);
  539. // 将进程加入循环链表
  540. list_init(&tsk->list);
  541. // list_add(&initial_proc_union.pcb.list, &tsk->list);
  542. tsk->priority = 2;
  543. tsk->preempt_count = 0;
  544. // 增加全局的pid并赋值给新进程的pid
  545. spin_lock(&process_global_pid_write_lock);
  546. tsk->pid = process_global_pid++;
  547. // 加入到进程链表中
  548. tsk->next_pcb = initial_proc_union.pcb.next_pcb;
  549. initial_proc_union.pcb.next_pcb = tsk;
  550. tsk->parent_pcb = current_pcb;
  551. spin_unlock(&process_global_pid_write_lock);
  552. tsk->cpu_id = proc_current_cpu_id;
  553. tsk->state = PROC_UNINTERRUPTIBLE;
  554. list_init(&tsk->list);
  555. // list_add(&initial_proc_union.pcb.list, &tsk->list);
  556. retval = -ENOMEM;
  557. // 拷贝标志位
  558. if (process_copy_flags(clone_flags, tsk))
  559. goto copy_flags_failed;
  560. // 拷贝内存空间分布结构体
  561. if (process_copy_mm(clone_flags, tsk))
  562. goto copy_mm_failed;
  563. // 拷贝文件
  564. if (process_copy_files(clone_flags, tsk))
  565. goto copy_files_failed;
  566. // 拷贝线程结构体
  567. if (process_copy_thread(clone_flags, tsk, stack_start, stack_size, regs))
  568. goto copy_thread_failed;
  569. // 拷贝成功
  570. retval = tsk->pid;
  571. // 唤醒进程
  572. process_wakeup(tsk);
  573. return retval;
  574. copy_thread_failed:;
  575. // 回收线程
  576. process_exit_thread(tsk);
  577. copy_files_failed:;
  578. // 回收文件
  579. process_exit_files(tsk);
  580. copy_mm_failed:;
  581. // 回收内存空间分布结构体
  582. process_exit_mm(tsk);
  583. copy_flags_failed:;
  584. kfree(tsk);
  585. return retval;
  586. return 0;
  587. }
  588. /**
  589. * @brief 根据pid获取进程的pcb
  590. *
  591. * @param pid
  592. * @return struct process_control_block*
  593. */
  594. struct process_control_block *process_get_pcb(long pid)
  595. {
  596. struct process_control_block *pcb = initial_proc_union.pcb.next_pcb;
  597. // 使用蛮力法搜索指定pid的pcb
  598. // todo: 使用哈希表来管理pcb
  599. for (; pcb != &initial_proc_union.pcb; pcb = pcb->next_pcb)
  600. {
  601. if (pcb->pid == pid)
  602. return pcb;
  603. }
  604. return NULL;
  605. }
  606. /**
  607. * @brief 将进程加入到调度器的就绪队列中
  608. *
  609. * @param pcb 进程的pcb
  610. */
  611. static inline void process_wakeup(struct process_control_block *pcb)
  612. {
  613. pcb->state = PROC_RUNNING;
  614. sched_cfs_enqueue(pcb);
  615. }
  616. /**
  617. * @brief 拷贝当前进程的标志位
  618. *
  619. * @param clone_flags 克隆标志位
  620. * @param pcb 新的进程的pcb
  621. * @return uint64_t
  622. */
  623. uint64_t process_copy_flags(uint64_t clone_flags, struct process_control_block *pcb)
  624. {
  625. if (clone_flags & CLONE_VM)
  626. pcb->flags |= PF_VFORK;
  627. return 0;
  628. }
  629. /**
  630. * @brief 拷贝当前进程的文件描述符等信息
  631. *
  632. * @param clone_flags 克隆标志位
  633. * @param pcb 新的进程的pcb
  634. * @return uint64_t
  635. */
  636. uint64_t process_copy_files(uint64_t clone_flags, struct process_control_block *pcb)
  637. {
  638. int retval = 0;
  639. // 如果CLONE_FS被置位,那么子进程与父进程共享文件描述符
  640. // 文件描述符已经在复制pcb时被拷贝
  641. if (clone_flags & CLONE_FS)
  642. return retval;
  643. // 为新进程拷贝新的文件描述符
  644. for (int i = 0; i < PROC_MAX_FD_NUM; ++i)
  645. {
  646. if (current_pcb->fds[i] == NULL)
  647. continue;
  648. pcb->fds[i] = (struct vfs_file_t *)kmalloc(sizeof(struct vfs_file_t), 0);
  649. memcpy(pcb->fds[i], current_pcb->fds[i], sizeof(struct vfs_file_t));
  650. }
  651. return retval;
  652. }
  653. /**
  654. * @brief 回收进程的所有文件描述符
  655. *
  656. * @param pcb 要被回收的进程的pcb
  657. * @return uint64_t
  658. */
  659. uint64_t process_exit_files(struct process_control_block *pcb)
  660. {
  661. // 不与父进程共享文件描述符
  662. if (!(pcb->flags & PF_VFORK))
  663. {
  664. for (int i = 0; i < PROC_MAX_FD_NUM; ++i)
  665. {
  666. if (pcb->fds[i] == NULL)
  667. continue;
  668. kfree(pcb->fds[i]);
  669. }
  670. }
  671. // 清空当前进程的文件描述符列表
  672. memset(pcb->fds, 0, sizeof(struct vfs_file_t *) * PROC_MAX_FD_NUM);
  673. }
  674. /**
  675. * @brief 拷贝当前进程的内存空间分布结构体信息
  676. *
  677. * @param clone_flags 克隆标志位
  678. * @param pcb 新的进程的pcb
  679. * @return uint64_t
  680. */
  681. uint64_t process_copy_mm(uint64_t clone_flags, struct process_control_block *pcb)
  682. {
  683. int retval = 0;
  684. // 与父进程共享内存空间
  685. if (clone_flags & CLONE_VM)
  686. {
  687. // kdebug("copy_vm\t current_pcb->mm->pgd=%#018lx", current_pcb->mm->pgd);
  688. pcb->mm = current_pcb->mm;
  689. return retval;
  690. }
  691. // 分配新的内存空间分布结构体
  692. struct mm_struct *new_mms = (struct mm_struct *)kmalloc(sizeof(struct mm_struct), 0);
  693. memset(new_mms, 0, sizeof(struct mm_struct));
  694. memcpy(new_mms, current_pcb->mm, sizeof(struct mm_struct));
  695. pcb->mm = new_mms;
  696. // 分配顶层页表, 并设置顶层页表的物理地址
  697. new_mms->pgd = (pml4t_t *)virt_2_phys(kmalloc(PAGE_4K_SIZE, 0));
  698. // 由于高2K部分为内核空间,在接下来需要覆盖其数据,因此不用清零
  699. memset(phys_2_virt(new_mms->pgd), 0, PAGE_4K_SIZE / 2);
  700. // 拷贝内核空间的页表指针
  701. memcpy(phys_2_virt(new_mms->pgd) + 256, phys_2_virt(initial_proc[proc_current_cpu_id]->mm->pgd) + 256, PAGE_4K_SIZE / 2);
  702. uint64_t *current_pgd = (uint64_t *)phys_2_virt(current_pcb->mm->pgd);
  703. uint64_t *new_pml4t = (uint64_t *)phys_2_virt(new_mms->pgd);
  704. // 迭代地拷贝用户空间
  705. for (int i = 0; i <= 255; ++i)
  706. {
  707. // 当前页表项为空
  708. if ((*(uint64_t *)(current_pgd + i)) == 0)
  709. continue;
  710. // 分配新的二级页表
  711. pdpt_t *new_pdpt = (pdpt_t *)kmalloc(PAGE_4K_SIZE, 0);
  712. memset(new_pdpt, 0, PAGE_4K_SIZE);
  713. // 在新的一级页表中设置新的二级页表表项
  714. set_pml4t(new_pml4t + i, mk_pml4t(virt_2_phys(new_pdpt), (*(current_pgd + i)) & 0xfffUL));
  715. pdpt_t *current_pdpt = (pdpt_t *)phys_2_virt(*(uint64_t *)(current_pgd + i) & (~0xfffUL));
  716. // kdebug("current pdpt=%#018lx \t (current_pgd + i)->pml4t=%#018lx", current_pdpt, *(uint64_t *)(current_pgd+i));
  717. // 设置二级页表
  718. for (int j = 0; j < 512; ++j)
  719. {
  720. if (*(uint64_t *)(current_pdpt + j) == 0)
  721. continue;
  722. // 分配新的三级页表
  723. pdt_t *new_pdt = (pdt_t *)kmalloc(PAGE_4K_SIZE, 0);
  724. memset(new_pdt, 0, PAGE_4K_SIZE);
  725. // 在新的二级页表中设置三级页表的表项
  726. set_pdpt((uint64_t *)(new_pdpt + j), mk_pdpt(virt_2_phys(new_pdt), (*(uint64_t *)(current_pdpt + j)) & 0xfffUL));
  727. pdt_t *current_pdt = (pdt_t *)phys_2_virt((*(uint64_t *)(current_pdpt + j)) & (~0xfffUL));
  728. // 拷贝内存页
  729. for (int k = 0; k < 512; ++k)
  730. {
  731. if ((current_pdt + k)->pdt == 0)
  732. continue;
  733. // 获取一个新页
  734. struct Page *pg = alloc_pages(ZONE_NORMAL, 1, PAGE_PGT_MAPPED);
  735. set_pdt((uint64_t *)(new_pdt + k), mk_pdt(pg->addr_phys, (current_pdt + k)->pdt & 0x1fffUL));
  736. // 拷贝数据
  737. memcpy(phys_2_virt(pg->addr_phys), phys_2_virt((current_pdt + k)->pdt & (~0x1fffUL)), PAGE_2M_SIZE);
  738. }
  739. }
  740. }
  741. return retval;
  742. }
  743. /**
  744. * @brief 释放进程的页表
  745. *
  746. * @param pcb 要被释放页表的进程
  747. * @return uint64_t
  748. */
  749. uint64_t process_exit_mm(struct process_control_block *pcb)
  750. {
  751. if (pcb->flags & CLONE_VM)
  752. return 0;
  753. if (pcb->mm == NULL)
  754. {
  755. kdebug("pcb->mm==NULL");
  756. return 0;
  757. }
  758. if (pcb->mm->pgd == NULL)
  759. {
  760. kdebug("pcb->mm->pgd==NULL");
  761. return 0;
  762. }
  763. // 获取顶层页表
  764. pml4t_t *current_pgd = (pml4t_t *)phys_2_virt(pcb->mm->pgd);
  765. // 迭代地释放用户空间
  766. for (int i = 0; i <= 255; ++i)
  767. {
  768. // 当前页表项为空
  769. if ((current_pgd + i)->pml4t == 0)
  770. continue;
  771. // 二级页表entry
  772. pdpt_t *current_pdpt = (pdpt_t *)phys_2_virt((current_pgd + i)->pml4t & (~0xfffUL));
  773. // 遍历二级页表
  774. for (int j = 0; j < 512; ++j)
  775. {
  776. if ((current_pdpt + j)->pdpt == 0)
  777. continue;
  778. // 三级页表的entry
  779. pdt_t *current_pdt = (pdt_t *)phys_2_virt((current_pdpt + j)->pdpt & (~0xfffUL));
  780. // 释放三级页表的内存页
  781. for (int k = 0; k < 512; ++k)
  782. {
  783. if ((current_pdt + k)->pdt == 0)
  784. continue;
  785. // 释放内存页
  786. free_pages(Phy_to_2M_Page((current_pdt + k)->pdt & (~0x1fffUL)), 1);
  787. }
  788. // 释放三级页表
  789. kfree(current_pdt);
  790. }
  791. // 释放二级页表
  792. kfree(current_pdpt);
  793. }
  794. // 释放顶层页表
  795. kfree(current_pgd);
  796. // 释放内存空间分布结构体
  797. kfree(pcb->mm);
  798. return 0;
  799. }
  800. /**
  801. * @brief 拷贝当前进程的线程结构体
  802. *
  803. * @param clone_flags 克隆标志位
  804. * @param pcb 新的进程的pcb
  805. * @return uint64_t
  806. */
  807. uint64_t process_copy_thread(uint64_t clone_flags, struct process_control_block *pcb, uint64_t stack_start, uint64_t stack_size, struct pt_regs *current_regs)
  808. {
  809. // 将线程结构体放置在pcb后方
  810. struct thread_struct *thd = (struct thread_struct *)(pcb + 1);
  811. memset(thd, 0, sizeof(struct thread_struct));
  812. pcb->thread = thd;
  813. // 拷贝栈空间
  814. struct pt_regs *child_regs = (struct pt_regs *)((uint64_t)pcb + STACK_SIZE - sizeof(struct pt_regs));
  815. memcpy(child_regs, current_regs, sizeof(struct pt_regs));
  816. // 设置子进程的返回值为0
  817. child_regs->rax = 0;
  818. child_regs->rsp = stack_start;
  819. thd->rbp = (uint64_t)pcb + STACK_SIZE;
  820. thd->rsp = (uint64_t)child_regs;
  821. thd->fs = current_pcb->thread->fs;
  822. thd->gs = current_pcb->thread->gs;
  823. // 根据是否为内核线程,设置进程的开始执行的地址
  824. if (pcb->flags & PF_KTHREAD)
  825. thd->rip = (uint64_t)kernel_thread_func;
  826. else
  827. thd->rip = (uint64_t)ret_from_system_call;
  828. kdebug("new proc's ret addr = %#018lx\tchild_regs->rsp = %#018lx", child_regs->rbx, child_regs->rsp);
  829. return 0;
  830. }
  831. /**
  832. * @brief todo: 回收线程结构体
  833. *
  834. * @param pcb
  835. */
  836. void process_exit_thread(struct process_control_block *pcb)
  837. {
  838. }