xv6-cs450/syscall.c

146 lines
2.5 KiB
C
Raw Normal View History

2006-06-15 18:02:20 +02:00
#include "types.h"
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "defs.h"
#include "x86.h"
#include "traps.h"
#include "syscall.h"
/*
* User code makes a system call with INT T_SYSCALL.
* System call number in %eax.
2006-06-26 17:11:19 +02:00
* Arguments on the stack, from the user call to the C
* library system call function. The saved user %esp points
* to a saved frame pointer, a program counter, and then
* the first argument.
2006-06-15 18:02:20 +02:00
*
* Return value? Error indication? Errno?
*/
2006-06-26 17:11:19 +02:00
/*
* fetch 32 bits from a user-supplied pointer.
* returns 1 if addr was OK, 0 if illegal.
*/
int
fetchint(struct proc *p, unsigned addr, int *ip)
{
*ip = 0;
if(addr > p->sz - 4)
return 0;
memcpy(ip, p->mem + addr, 4);
return 1;
}
int
fetcharg(int argno, int *ip)
{
unsigned esp;
esp = (unsigned) curproc[cpu()]->tf->tf_esp;
return fetchint(curproc[cpu()], esp + 8 + 4*argno, ip);
}
int
2006-06-15 18:02:20 +02:00
sys_fork()
{
struct proc *np;
np = newproc();
return np->pid;
2006-06-15 18:02:20 +02:00
}
int
2006-06-15 18:02:20 +02:00
sys_exit()
{
2006-06-15 21:58:01 +02:00
struct proc *p;
2006-06-22 22:47:23 +02:00
struct proc *cp = curproc[cpu()];
2006-06-15 21:58:01 +02:00
2006-06-22 22:47:23 +02:00
cp->state = ZOMBIE;
2006-06-15 21:58:01 +02:00
// wake up parent
for(p = proc; p < &proc[NPROC]; p++)
2006-06-22 22:47:23 +02:00
if(p->pid == cp->ppid)
2006-06-15 21:58:01 +02:00
wakeup(p);
// abandon children
for(p = proc; p < &proc[NPROC]; p++)
2006-06-22 22:47:23 +02:00
if(p->ppid == cp->pid)
2006-06-15 21:58:01 +02:00
p->pid = 1;
2006-06-15 18:02:20 +02:00
swtch();
return 0;
2006-06-15 18:02:20 +02:00
}
int
2006-06-15 21:58:01 +02:00
sys_wait()
{
struct proc *p;
2006-06-22 22:47:23 +02:00
struct proc *cp = curproc[cpu()];
int any, pid;
2006-06-15 21:58:01 +02:00
2006-06-22 22:47:23 +02:00
cprintf("waid pid %d ppid %d\n", cp->pid, cp->ppid);
2006-06-15 21:58:01 +02:00
while(1){
any = 0;
for(p = proc; p < &proc[NPROC]; p++){
2006-06-22 22:47:23 +02:00
if(p->state == ZOMBIE && p->ppid == cp->pid){
2006-06-15 21:58:01 +02:00
kfree(p->mem, p->sz);
kfree(p->kstack, KSTACKSIZE);
pid = p->pid;
2006-06-15 21:58:01 +02:00
p->state = UNUSED;
2006-06-22 22:47:23 +02:00
cprintf("%x collected %x\n", cp, p);
return pid;
2006-06-15 21:58:01 +02:00
}
2006-06-22 22:47:23 +02:00
if(p->state != UNUSED && p->ppid == cp->pid)
2006-06-15 21:58:01 +02:00
any = 1;
}
if(any == 0){
2006-06-22 22:47:23 +02:00
cprintf("%x nothing to wait for\n", cp);
return -1;
2006-06-15 21:58:01 +02:00
}
2006-06-22 22:47:23 +02:00
sleep(cp);
2006-06-15 21:58:01 +02:00
}
}
int
2006-06-26 17:11:19 +02:00
sys_cons_putc()
{
int c;
fetcharg(0, &c);
cons_putc(c & 0xff);
return 0;
2006-06-26 17:11:19 +02:00
}
2006-06-15 18:02:20 +02:00
void
syscall()
{
2006-06-22 22:47:23 +02:00
struct proc *cp = curproc[cpu()];
int num = cp->tf->tf_regs.reg_eax;
int ret = -1;
2006-06-15 18:02:20 +02:00
2006-06-22 22:47:23 +02:00
cprintf("%x sys %d\n", cp, num);
2006-06-15 18:02:20 +02:00
switch(num){
case SYS_fork:
ret = sys_fork();
2006-06-15 18:02:20 +02:00
break;
case SYS_exit:
ret = sys_exit();
2006-06-15 18:02:20 +02:00
break;
2006-06-15 21:58:01 +02:00
case SYS_wait:
ret = sys_wait();
2006-06-15 21:58:01 +02:00
break;
2006-06-26 17:11:19 +02:00
case SYS_cons_putc:
ret = sys_cons_putc();
2006-06-26 17:11:19 +02:00
break;
2006-06-15 18:02:20 +02:00
default:
cprintf("unknown sys call %d\n", num);
// XXX fault
break;
}
cp->tf->tf_regs.reg_eax = ret;
2006-06-15 18:02:20 +02:00
}