xref: /DragonOS/kernel/src/arch/x86_64/process/kthread.rs (revision 81294aa2e6b257f0de5e3c28c3f3c89798330836)
1 use core::arch::asm;
2 
3 use alloc::sync::Arc;
4 use system_error::SystemError;
5 
6 use crate::{
7     arch::{
8         interrupt::TrapFrame,
9         process::table::{KERNEL_CS, KERNEL_DS},
10     },
11     process::{
12         fork::CloneFlags,
13         kthread::{kernel_thread_bootstrap_stage2, KernelThreadCreateInfo, KernelThreadMechanism},
14         Pid, ProcessManager,
15     },
16 };
17 
18 impl KernelThreadMechanism {
19     /// 伪造trapframe,创建内核线程
20     ///
21     /// ## 返回值
22     ///
23     /// 返回创建的内核线程的pid
24     pub fn __inner_create(
25         info: &Arc<KernelThreadCreateInfo>,
26         clone_flags: CloneFlags,
27     ) -> Result<Pid, SystemError> {
28         // WARNING: If create failed, we must drop the info manually or it will cause memory leak. (refcount will not decrease when create failed)
29         let create_info: *const KernelThreadCreateInfo =
30             KernelThreadCreateInfo::generate_unsafe_arc_ptr(info.clone());
31 
32         let mut frame = TrapFrame::new();
33         frame.rbx = create_info as usize as u64;
34         frame.ds = KERNEL_DS.bits() as u64;
35         frame.es = KERNEL_DS.bits() as u64;
36         frame.cs = KERNEL_CS.bits() as u64;
37         frame.ss = KERNEL_DS.bits() as u64;
38 
39         // 使能中断
40         frame.rflags |= 1 << 9;
41 
42         frame.rip = kernel_thread_bootstrap_stage1 as usize as u64;
43 
44         // fork失败的话,子线程不会执行。否则将导致内存安全问题。
45         let pid = ProcessManager::fork(&mut frame, clone_flags).map_err(|e| {
46             unsafe { KernelThreadCreateInfo::parse_unsafe_arc_ptr(create_info) };
47             e
48         })?;
49 
50         ProcessManager::find(pid)
51             .unwrap()
52             .set_name(info.name().clone());
53 
54         return Ok(pid);
55     }
56 }
57 
58 /// 内核线程引导函数的第一阶段
59 ///
60 /// 当内核线程开始执行时,会先执行这个函数,这个函数会将伪造的trapframe中的数据弹出,然后跳转到第二阶段
61 ///
62 /// 跳转之后,指向Box<KernelThreadClosure>的指针将传入到stage2的函数
63 #[naked]
64 pub(super) unsafe extern "sysv64" fn kernel_thread_bootstrap_stage1() {
65     asm!(
66         concat!(
67             "
68 
69             pop r15
70             pop r14
71             pop r13
72             pop r12
73             pop r11
74             pop r10
75             pop r9
76             pop r8
77             pop rbx
78             pop rcx
79             pop rdx
80             pop rsi
81             pop rdi
82             pop rbp
83             pop rax
84             mov ds, ax
85             pop rax
86             mov es, ax
87             pop rax
88             add rsp, 0x20
89             popfq
90             add rsp, 0x10
91             mov rdi, rbx
92             jmp {stage2_func}
93             "
94         ),
95         stage2_func = sym kernel_thread_bootstrap_stage2,
96         options(noreturn)
97     )
98 }
99