1
0
mirror of https://github.com/rcore-os/rCore.git synced 2024-11-27 10:13:28 +04:00
rCore/kernel/src/process/context.rs

147 lines
5.1 KiB
Rust
Raw Normal View History

2018-07-16 20:23:02 +04:00
use arch::interrupt::{TrapFrame, Context as ArchContext};
2018-06-03 19:05:43 +04:00
use memory::{MemoryArea, MemoryAttr, MemorySet};
2018-07-14 07:56:55 +04:00
use xmas_elf::{ElfFile, header, program::{Flags, ProgramHeader, Type}};
2018-07-16 20:23:02 +04:00
use core::fmt::{Debug, Error, Formatter};
2018-10-23 20:38:22 +04:00
use ucore_process::Context;
use alloc::boxed::Box;
pub struct ContextImpl {
2018-07-16 20:23:02 +04:00
arch: ArchContext,
memory_set: MemorySet,
}
impl Context for ContextImpl {
unsafe fn switch_to(&mut self, target: &mut Context) {
use core::mem::transmute;
2018-10-24 17:29:31 +04:00
let (target, _): (&mut ContextImpl, *const ()) = transmute(target);
self.arch.switch(&mut target.arch);
2018-07-17 15:06:30 +04:00
}
2018-07-16 21:56:28 +04:00
}
impl ContextImpl {
pub unsafe fn new_init() -> Box<Context> {
Box::new(ContextImpl {
2018-07-16 20:23:02 +04:00
arch: ArchContext::null(),
memory_set: MemorySet::new(),
})
}
pub fn new_kernel(entry: extern fn(usize) -> !, arg: usize) -> Box<Context> {
let ms = MemorySet::new();
Box::new(ContextImpl {
arch: unsafe { ArchContext::new_kernel_thread(entry, arg, ms.kstack_top(), ms.token()) },
memory_set: ms,
})
}
2018-07-14 07:56:55 +04:00
/// Make a new user thread from ELF data
pub fn new_user(data: &[u8]) -> Box<Context> {
// Parse elf
let elf = ElfFile::new(data).expect("failed to read elf");
2018-05-17 17:06:13 +04:00
let is32 = match elf.header.pt2 {
2018-07-14 07:56:55 +04:00
header::HeaderPt2::Header32(_) => true,
header::HeaderPt2::Header64(_) => false,
2018-05-17 17:06:13 +04:00
};
2018-07-14 07:56:55 +04:00
assert_eq!(elf.header.pt2.type_().as_type(), header::Type::Executable, "ELF is not executable");
2018-05-17 17:06:13 +04:00
// User stack
use consts::{USER_STACK_OFFSET, USER_STACK_SIZE, USER32_STACK_OFFSET};
2018-05-19 12:32:18 +04:00
let (user_stack_buttom, user_stack_top) = match is32 {
true => (USER32_STACK_OFFSET, USER32_STACK_OFFSET + USER_STACK_SIZE),
2018-05-17 17:06:13 +04:00
false => (USER_STACK_OFFSET, USER_STACK_OFFSET + USER_STACK_SIZE),
};
// Make page table
2018-07-10 20:53:40 +04:00
let mut memory_set = memory_set_from(&elf);
memory_set.push(MemoryArea::new(user_stack_buttom, user_stack_top, MemoryAttr::default().user(), "user_stack"));
trace!("{:#x?}", memory_set);
2018-07-14 07:56:55 +04:00
let entry_addr = elf.header.pt2.entry_point() as usize;
2018-05-17 17:06:13 +04:00
// Temporary switch to it, in order to copy data
2018-07-10 20:53:40 +04:00
unsafe {
memory_set.with(|| {
for ph in elf.program_iter() {
2018-07-14 07:56:55 +04:00
let virt_addr = ph.virtual_addr() as usize;
let offset = ph.offset() as usize;
let file_size = ph.file_size() as usize;
2018-07-17 07:45:55 +04:00
if file_size == 0 {
return;
}
2018-07-10 20:53:40 +04:00
use core::slice;
let target = unsafe { slice::from_raw_parts_mut(virt_addr as *mut u8, file_size) };
target.copy_from_slice(&data[offset..offset + file_size]);
2018-05-17 17:06:13 +04:00
}
2018-07-10 20:53:40 +04:00
if is32 {
unsafe {
// TODO: full argc & argv
*(user_stack_top as *mut u32).offset(-1) = 0; // argv
*(user_stack_top as *mut u32).offset(-2) = 0; // argc
}
}
});
}
Box::new(ContextImpl {
2018-07-16 20:23:02 +04:00
arch: unsafe {
ArchContext::new_user_thread(
entry_addr, user_stack_top - 8, memory_set.kstack_top(), is32, memory_set.token())
},
memory_set,
})
}
2018-05-13 11:06:44 +04:00
/// Fork
pub fn fork(&self, tf: &TrapFrame) -> Box<Context> {
// Clone memory set, make a new page table
2018-07-10 20:53:40 +04:00
let memory_set = self.memory_set.clone();
// Copy data to temp space
2018-07-16 20:23:02 +04:00
use alloc::vec::Vec;
let datas: Vec<Vec<u8>> = memory_set.iter().map(|area| {
Vec::from(unsafe { area.as_slice() })
}).collect();
// Temporary switch to it, in order to copy data
2018-07-10 20:53:40 +04:00
unsafe {
memory_set.with(|| {
for (area, data) in memory_set.iter().zip(datas.iter()) {
unsafe { area.as_slice_mut() }.copy_from_slice(data.as_slice())
}
});
}
Box::new(ContextImpl {
2018-07-16 20:23:02 +04:00
arch: unsafe { ArchContext::new_fork(tf, memory_set.kstack_top(), memory_set.token()) },
memory_set,
})
2018-05-13 11:06:44 +04:00
}
2018-07-16 20:23:02 +04:00
}
2018-05-19 12:32:18 +04:00
impl Debug for ContextImpl {
2018-07-16 20:23:02 +04:00
fn fmt(&self, f: &mut Formatter) -> Result<(), Error> {
2018-07-17 07:45:55 +04:00
write!(f, "{:x?}", self.arch)
2018-05-19 12:32:18 +04:00
}
}
2018-07-10 20:53:40 +04:00
fn memory_set_from<'a>(elf: &'a ElfFile<'a>) -> MemorySet {
let mut set = MemorySet::new();
for ph in elf.program_iter() {
2018-07-14 07:56:55 +04:00
if ph.get_type() != Ok(Type::Load) {
continue;
}
2018-07-10 20:53:40 +04:00
let (virt_addr, mem_size, flags) = match ph {
ProgramHeader::Ph32(ph) => (ph.virtual_addr as usize, ph.mem_size as usize, ph.flags),
ProgramHeader::Ph64(ph) => (ph.virtual_addr as usize, ph.mem_size as usize, ph.flags),
};
set.push(MemoryArea::new(virt_addr, virt_addr + mem_size, memory_attr_from(flags), ""));
}
2018-07-10 20:53:40 +04:00
set
}
2018-07-10 20:53:40 +04:00
fn memory_attr_from(elf_flags: Flags) -> MemoryAttr {
let mut flags = MemoryAttr::default().user();
// TODO: handle readonly
if elf_flags.is_execute() { flags = flags.execute(); }
flags
}