/*******************************************************************************/ /* COS2000 - Compatible Operating System - LGPL v3 - Hordé Nicolas */ /* */ #include "types.h" #include "process.h" #include "memory.h" #include "gdt.h" process *processes; process *current; u32 lastpid; static u8 elf_errors1[]="Aucune signature ELF"; static u8 elf_errors2[]="Fichier au format ELF mais non 32 bits"; static u8 elf_errors3[]="ELF non LSB"; static u8 elf_errors4[]="ELF mauvaise version"; static u8 elf_errors5[]="ELF pour OS ne correspondant pas"; static u8 elf_errors6[]="Mauvais type de machine"; static u8 *elf_errors[]={&elf_errors1,&elf_errors2,&elf_errors3,&elf_errors4,&elf_errors5,&elf_errors6}; /*******************************************************************************/ /* Vérifie la signature ELF 0 - RAS 1 - Pas la signature ELF 2 - pas ELF32 3 - pas bon organisation LSB/MSB 4 - pas bonne version ELF 5 - pas bon OS 6 - pas bon type machine */ u32 elf_test(u8 *src) { elf32 *header=(elf32 *) src; if (header->e_ident[EI_MAG0] == ELFMAG0 && header->e_ident[EI_MAG1] == ELFMAG1 && header->e_ident[EI_MAG2] == ELFMAG2 && header->e_ident[EI_MAG3] == ELFMAG3) { if (header->e_ident[EI_CLASS]!=ELFCLASS32) return 2; if (header->e_ident[EI_DATA]!=ELFDATA2LSB) return 3; if (header->e_ident[EI_VERSION]!=EV_CURRENT || header->e_version!=EV_CURRENT) return 4; if (header->e_ident[EI_OSABI]!=ELFOSABI_COS2000) return 5; if (header->e_machine!=EM_386) return 6; return 0; } else return 1; } /*******************************************************************************/ /* Charge le fichier ELF en mémoire et mets à jour les informations sur le processus */ u32 elf_load(u8 *src, u32 pid) { u8 *ptr; u8 code; u32 v_begin, v_end; elf32 *header; elf32p *program; u32 i; header = (elf32 *) src; program = (elf32p *) (src + header->e_phoff); code=elf_test(src); if (code!=0) { printf("Erreur de chargement ELF, %s !\r\n",elf_errors[code-1]); return NULL; } for (i = 0; i < header->e_phnum; i++, program++) { if (program->p_type == PT_LOAD) { v_begin = program->p_vaddr; v_end = program->p_vaddr + program->p_memsz; if (v_begin < USER_CODE) { printf ("Ne peut charger l'executable en desssous de l'adresse %X\r\n", USER_CODE); return 0; } if (v_end > USER_STACK) { printf ("Ne peut charger l'executable au desssus de l'adresse %X\r\n", USER_STACK); return 0; } if (program->p_flags == PF_X + PF_R) { processes[pid].exec_low = (u8*) v_begin; processes[pid].exec_high = (u8*) v_end; } if (program->p_flags == PF_W + PF_R) { processes[pid].bss_low = (u8*) v_begin; processes[pid].bss_high = (u8*) v_end; } memcpy((u8 *) (src + program->p_offset),(u8 *) v_begin , program->p_filesz,0); if (program->p_memsz > program->p_filesz) for (i = program->p_filesz, ptr = (u8 *) program->p_vaddr; i < program->p_memsz; i++) ptr[i] = 0; } } processes[pid].entry=header->e_entry; return header->e_entry; } /*******************************************************************************/ /* Initialise la liste des processus */ void task_init() { u32 i=0; processes=(process*)vmalloc(sizeof(process)*MAXNUMPROCESS); while (i++ < MAXNUMPROCESS) { processes[i].pid=NULL; processes[i].status=STATUS_FREE; } processes[0].dump.ss = SEL_KERNEL_STACK; processes[0].dump.esp = KERNEL_STACK_ADDR; processes[0].dump.eflags = 0x0; processes[0].dump.cs = SEL_KERNEL_CODE; processes[0].dump.eip = getinitretry(); processes[0].dump.ds = SEL_KERNEL_DATA; processes[0].dump.es = SEL_KERNEL_DATA; processes[0].dump.fs = SEL_KERNEL_DATA; processes[0].dump.gs = SEL_KERNEL_DATA; processes[0].dump.cr3 = KERNEL_PD_ADDR; processes[0].dump.eax = 0; processes[0].dump.ecx = 0; processes[0].dump.edx = 0; processes[0].dump.ebx = 0; processes[0].dump.ebp = 0; processes[0].dump.esi = 0; processes[0].dump.edi = 0; processes[0].result = 0; processes[0].status = STATUS_READY; processes[0].kernel = true; current=&processes[0]; lastpid=NULL; } /*******************************************************************************/ /* Récupère un emplacement dans la liste des processus */ u32 task_getfreePID () { u32 i = lastpid; u32 parsed = 0; while (processes[++i].status != STATUS_FREE && ++parsed < MAXNUMPROCESS) { if (i>=MAXNUMPROCESS) i=0; } if (parsed>MAXNUMPROCESS) { printf("PANIC: plus d'emplacement disponible pour un novueau processus\n"); return NULL; } return i; } /*******************************************************************************/ /* Récupère les informations sur le processus courant */ process *getcurrentprocess() { return current; } /*******************************************************************************/ /* Determine le dernier PID occupé */ u32 task_usePID (u32 pid) { lastpid=pid; } /*******************************************************************************/ /* Bascule vers une tâche */ void task_switch(u32 pid, bool fromkernelmode) { process *previous=current; current = &processes[pid]; if (!current->kernel) setTSS(current->kstack.ss0,current->kstack.esp0); else setTSS(0x0,0x0); current->dump.eflags = (current->dump.eflags | 0x200) & 0xFFFFBFFF; createdump(current->dump); restdebugcpu(); iret(); } /*******************************************************************************/ /* Execute une tâche */ void task_run(u32 pid) { processes[pid].status = STATUS_RUN; task_switch(pid, false); } /*******************************************************************************/ /* Initialise une tâche */ u32 task_create(u8 *code,bool kerneltask) { process *previous=current; u32 pid=task_getfreePID(); task_usePID(pid); page *kstack; processes[pid].pid = pid; processes[pid].pdd = virtual_pd_create(); TAILQ_INIT(&processes[pid].page_head); if (kerneltask) { processes[pid].dump.ss = SEL_KERNEL_STACK; processes[pid].dump.esp = (u32) kstack->vaddr + PAGESIZE - 16; processes[pid].dump.eflags = 0x0; processes[pid].dump.cs = SEL_KERNEL_CODE; processes[pid].dump.eip = elf_load(code,pid); if (processes[pid].dump.eip==NULL) return NULL; processes[pid].dump.ds = SEL_KERNEL_DATA; processes[pid].dump.es = SEL_KERNEL_DATA; processes[pid].dump.fs = SEL_KERNEL_DATA; processes[pid].dump.gs = SEL_KERNEL_DATA; processes[pid].dump.cr3 = KERNEL_PD_ADDR; processes[pid].dump.eax = 0; processes[pid].dump.ecx = 0; processes[pid].dump.edx = 0; processes[pid].dump.ebx = 0; processes[pid].dump.ebp = 0; processes[pid].dump.esi = 0; processes[pid].dump.edi = 0; processes[pid].result = 0; processes[pid].status = STATUS_READY; processes[pid].kernel = true; current = previous; } else { current = &processes[pid]; setcr3(processes[pid].pdd->addr->paddr); kstack = virtual_page_getfree(); processes[pid].dump.ss = SEL_USER_STACK | RPL_RING3; processes[pid].dump.esp = USER_STACK-16; processes[pid].dump.eflags = 0x0; processes[pid].dump.cs = SEL_USER_CODE | RPL_RING3; processes[pid].dump.eip = elf_load(code,pid); if (processes[pid].dump.eip==NULL) return NULL; processes[pid].dump.ds = SEL_USER_DATA | RPL_RING3; processes[pid].dump.es = SEL_USER_DATA | RPL_RING3; processes[pid].dump.fs = SEL_USER_DATA | RPL_RING3; processes[pid].dump.gs = SEL_USER_DATA | RPL_RING3; processes[pid].dump.cr3 = (u32) processes[pid].pdd->addr->paddr; processes[pid].kstack.ss0 = SEL_KERNEL_STACK; processes[pid].kstack.esp0 = (u32) kstack->vaddr + PAGESIZE - 16; processes[pid].dump.eax = 0; processes[pid].dump.ecx = 0; processes[pid].dump.edx = 0; processes[pid].dump.ebx = 0; processes[pid].dump.ebp = 0; processes[pid].dump.esi = 0; processes[pid].dump.edi = 0; processes[pid].result = 0; processes[pid].status = STATUS_READY; processes[pid].kernel = false; current = previous; setcr3(current->dump.cr3); } return pid; }