diff --git a/.cargo/config.toml b/.cargo/config.toml new file mode 100644 index 0000000..0953166 --- /dev/null +++ b/.cargo/config.toml @@ -0,0 +1,6 @@ +[build] +target = "targets/i686.json" + +[unstable] +build-std = ["core"] +build-std-features = ["compiler-builtins-mem"] diff --git a/.gdbinit.tmpl b/.gdbinit.tmpl index f71681a..1dfd173 100644 --- a/.gdbinit.tmpl +++ b/.gdbinit.tmpl @@ -25,3 +25,4 @@ target remote localhost:1234 echo + symbol-file kernel\n symbol-file kernel +layout split \ No newline at end of file diff --git a/Cargo.toml b/Cargo.toml index 2dd5beb..6c2171c 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -2,6 +2,7 @@ name = "xv6" version = "0.1.0" edition = "2021" +autobins = false [lib] name = "kernel" diff --git a/Makefile b/Makefile index fa7b33b..c4a3ef4 100644 --- a/Makefile +++ b/Makefile @@ -3,31 +3,24 @@ RS = src/*.rs # Cross-compiling (e.g., on Mac OS X) #TOOLPREFIX = i386-jos-elf -#TOOLPREFIX = i386-elf- +# TOOLPREFIX = i686-elf- # Using native tools (e.g., on X86 Linux) -#TOOLPREFIX = +#TOOLPREFIX = # Try to infer the correct TOOLPREFIX if not set ifndef TOOLPREFIX -TOOLPREFIX := $(shell if i386-jos-elf-objdump -i 2>&1 | grep '^elf32-i386$$' >/dev/null 2>&1; \ +TOOLPREFIX := $(shell if command -v i386-jos-elf-gcc >/dev/null 2>&1 && i386-jos-elf-objdump -i 2>&1 | grep '^elf32-i386$$' >/dev/null 2>&1; \ then echo 'i386-jos-elf-'; \ - elif objdump -i 2>&1 | grep 'elf32-i386' >/dev/null 2>&1; \ + elif command -v i686-elf-gcc >/dev/null 2>&1 && i686-elf-objdump -i 2>&1 | grep 'elf32-i386' >/dev/null 2>&1; \ + then echo 'i686-elf-'; \ + elif command -v gcc >/dev/null 2>&1 && objdump -i 2>&1 | grep 'elf32-i386' >/dev/null 2>&1; \ then echo ''; \ else echo "***" 1>&2; \ echo "*** Error: Couldn't find an i386-*-elf version of GCC/binutils." 1>&2; \ - echo "*** Is the directory with i386-jos-elf-gcc in your PATH?" 1>&2; \ - echo "*** If your i386-*-elf toolchain is installed with a command" 1>&2; \ - echo "*** prefix other than 'i386-jos-elf-', set your TOOLPREFIX" 1>&2; \ - echo "*** environment variable to that prefix and run 'make' again." 1>&2; \ - echo "*** To turn off this error, run 'gmake TOOLPREFIX= ...'." 1>&2; \ - echo "***" 1>&2; exit 1; fi) + exit 1; fi) endif -# If the makefile can't find QEMU, specify its path here -# QEMU = qemu-system-i386 - -# Try to infer the correct QEMU ifndef QEMU QEMU = $(shell if which qemu > /dev/null; \ then echo qemu; exit; \ @@ -35,14 +28,7 @@ QEMU = $(shell if which qemu > /dev/null; \ then echo qemu-system-i386; exit; \ elif which qemu-system-x86_64 > /dev/null; \ then echo qemu-system-x86_64; exit; \ - else \ - qemu=/Applications/Q.app/Contents/MacOS/i386-softmmu.app/Contents/MacOS/i386-softmmu; \ - if test -x $$qemu; then echo $$qemu; exit; fi; fi; \ - echo "***" 1>&2; \ - echo "*** Error: Couldn't find a working QEMU executable." 1>&2; \ - echo "*** Is the directory containing the qemu binary in your PATH" 1>&2; \ - echo "*** or have you tried setting the QEMU variable in Makefile?" 1>&2; \ - echo "***" 1>&2; exit 1) + else echo "*** Error: Couldn't find QEMU." 1>&2; exit 1; fi) endif CC = $(TOOLPREFIX)gcc @@ -50,13 +36,13 @@ AS = $(TOOLPREFIX)gas LD = $(TOOLPREFIX)ld OBJCOPY = $(TOOLPREFIX)objcopy OBJDUMP = $(TOOLPREFIX)objdump + CFLAGS = -fno-pic -static -fno-builtin -fno-strict-aliasing -O2 -Wall -MD -ggdb -m32 -Werror -fno-omit-frame-pointer CFLAGS += $(shell $(CC) -fno-stack-protector -E -x c /dev/null >/dev/null 2>&1 && echo -fno-stack-protector) + ASFLAGS = -m32 -gdwarf-2 -Wa,-divide -# FreeBSD ld wants ``elf_i386_fbsd'' LDFLAGS += -m $(shell $(LD) -V | grep elf_i386 2>/dev/null | head -n 1) -# Disable PIE when possible (for Ubuntu 16.10 toolchain) ifneq ($(shell $(CC) -dumpspecs 2>/dev/null | grep -e '[^f]no-pie'),) CFLAGS += -fno-pie -no-pie endif @@ -64,30 +50,44 @@ ifneq ($(shell $(CC) -dumpspecs 2>/dev/null | grep -e '[^f]nopie'),) CFLAGS += -fno-pie -nopie endif +# Disk image with bootblock + kernel xv6.img: bootblock kernel dd if=/dev/zero of=xv6.img count=10000 dd if=bootblock of=xv6.img conv=notrunc dd if=kernel of=xv6.img seek=1 conv=notrunc -bootblock: bootasm.S bootmain.c +# Build mkfs utility and create filesystem image +mkfs: src/mkfs.rs + rustc -W warnings -o mkfs src/mkfs.rs + +fs.img: mkfs *.txt + ./mkfs fs.img *.txt + +bootblock: bootasm.S bootmain.c linkers/bootblock.ld $(CC) $(CFLAGS) -fno-pic -O -nostdinc -I. -c bootmain.c $(CC) $(CFLAGS) -fno-pic -nostdinc -I. -c bootasm.S - $(LD) $(LDFLAGS) -N -e start -Ttext 0x7C00 -o bootblock.o bootasm.o bootmain.o - $(OBJDUMP) -S -D bootblock.o > bootblock.asm - $(OBJCOPY) -S -O binary -j .text bootblock.o bootblock - ./sign.pl bootblock + $(LD) $(LDFLAGS) -T linkers/bootblock.ld -o bootblock.o bootasm.o bootmain.o + $(OBJDUMP) -S bootblock.o > bootblock.asm + $(OBJCOPY) -S -O binary bootblock.o bootblock kernel.a: $(RS) - cargo rustc -Z build-std=core -Z build-std-features=compiler-builtins-mem --target ./targets/i686.json --lib --release -- -A warnings --emit link=kernel.a + cargo build -Z build-std=core -Z build-std-features=compiler-builtins-mem -Z json-target-spec \ + --target ./targets/i686.json --release + @tdir=$$(cargo metadata --format-version=1 --no-deps | sed -n 's/.*"target_directory":"\([^"]*\)".*/\1/p'); \ + lib=$$(find "$$tdir" -maxdepth 4 -type f -name 'libkernel.a' | head -n 1); \ + if [ -z "$$lib" ]; then echo "ERROR: libkernel.a not found"; exit 1; fi; \ + cp "$$lib" kernel.a + kernel: kernel.a $(OBJS) ./linkers/kernel.ld - ld -m elf_i386 -T ./linkers/kernel.ld -o kernel $(OBJS) kernel.a + $(LD) -m elf_i386 -T ./linkers/kernel.ld -o kernel $(OBJS) kernel.a $(OBJDUMP) -S -D kernel > kernel.asm $(OBJDUMP) -t kernel | sed '1,/SYMBOL TABLE/d; s/ .* / /; /^$$/d' > kernel.sym vectors.S: vectors.pl ./vectors.pl > vectors.S + # $(LD) $(LDFLAGS) -T kernel.ld -o kernel entry.o kernel.a -b binary # ld -m elf_i386 -T kernel.ld -o kernel entry.o kernel.a -b binary # Prevent deletion of intermediate files, e.g. cat.o, after first build, so @@ -95,35 +95,34 @@ vectors.S: vectors.pl # details: # http://www.gnu.org/software/make/manual/html_node/Chained-Rules.html .PRECIOUS: %.o - -include *.d -clean: +clean: rm -f *.tex *.dvi *.idx *.aux *.log *.ind *.ilg \ - *.a *.o *.d *.asm *.sym bootblock kernel xv6.img .gdbinit vectors.S - rm -r target + *.a *.o *.d *.asm *.sym bootblock kernel xv6.img fs.img mkfs .gdbinit vectors.S + rm -rf target # run in emulators -# try to generate a unique GDB port GDBPORT = $(shell expr `id -u` % 5000 + 25000) -# QEMU's gdb stub command line changed in 0.11 QEMUGDB = $(shell if $(QEMU) -help | grep -q '^-gdb'; \ then echo "-gdb tcp::$(GDBPORT)"; \ else echo "-s -p $(GDBPORT)"; fi) + ifndef CPUS - CPUS := 1 +CPUS := 1 endif -# For debugging -# QEMUEXTRA = -no-reboot -d int,cpu_reset -QEMUOPTS = -drive file=xv6.img,index=0,media=disk,format=raw -smp $(CPUS) -m 512 $(QEMUEXTRA) +# Attach fs.img as disk1 (index=1), like the C version +QEMUOPTS = -drive file=xv6.img,index=0,media=disk,format=raw \ + -drive file=fs.img,index=1,media=disk,format=raw \ + -smp $(CPUS) -m 512 $(QEMUEXTRA) -qemu: xv6.img +qemu: xv6.img fs.img $(QEMU) -nographic $(QEMUOPTS) .gdbinit: .gdbinit.tmpl sed "s/localhost:1234/localhost:$(GDBPORT)/" < $^ > $@ -qemu-gdb: xv6.img .gdbinit +qemu-gdb: xv6.img .gdbinit fs.img @echo "*** Now run 'gdb'." 1>&2 - $(QEMU) -nographic $(QEMUOPTS) -S $(QEMUGDB) \ No newline at end of file + $(QEMU) -nographic $(QEMUOPTS) -S $(QEMUGDB) diff --git a/README b/README deleted file mode 100644 index 14ca193..0000000 --- a/README +++ /dev/null @@ -1,5 +0,0 @@ -For the COL331 course - - -1. The next step to make things look good is to remove perl script , and that may be done using a separate linker script. -2. Or may be use inclbin inside assembly. \ No newline at end of file diff --git a/README.md b/README.md new file mode 100644 index 0000000..dddf7be --- /dev/null +++ b/README.md @@ -0,0 +1 @@ +# col331rs: p12-file-layer (Rust) \ No newline at end of file diff --git a/bootasm.S b/bootasm.S index 81c0d52..26f81d0 100644 --- a/bootasm.S +++ b/bootasm.S @@ -83,4 +83,6 @@ gdt: gdtdesc: .word (gdtdesc - gdt - 1) # sizeof(gdt) - 1 - .long gdt # address gdt \ No newline at end of file + .long gdt # address gdt + +.section .note.GNU-stack,"",@progbits \ No newline at end of file diff --git a/entry.S b/entry.S index a7f6755..26000a2 100644 --- a/entry.S +++ b/entry.S @@ -48,3 +48,6 @@ entry: call entryofrust .comm stack, KSTACKSIZE + +# Add .note.GNU-stack section for non-executable stack marking +.section .note.GNU-stack,"",@progbits diff --git a/linkers/bootblock.ld b/linkers/bootblock.ld new file mode 100644 index 0000000..6ac5c34 --- /dev/null +++ b/linkers/bootblock.ld @@ -0,0 +1,29 @@ +OUTPUT_FORMAT("elf32-i386", "elf32-i386", "elf32-i386") +OUTPUT_ARCH(i386) +ENTRY(start) + +SECTIONS +{ + . = 0x7c00; + + .text : { + *(.text .text.*) + } + + .rodata : { + *(.rodata .rodata.*) + } + + .data : { + *(.data .data.*) + } + + /DISCARD/ : { + *(.eh_frame .note.GNU-stack .comment) + } + + . = 0x7c00 + 510; + .signature : { + SHORT(0xaa55) + } +} diff --git a/rust-toolchain.toml b/rust-toolchain.toml index 5d56faf..87b5402 100644 --- a/rust-toolchain.toml +++ b/rust-toolchain.toml @@ -1,2 +1,3 @@ [toolchain] channel = "nightly" +components = ["rust-src"] \ No newline at end of file diff --git a/src/bio.rs b/src/bio.rs new file mode 100644 index 0000000..30e6d81 --- /dev/null +++ b/src/bio.rs @@ -0,0 +1,148 @@ +use core::sync::atomic::Ordering; + +use crate::buf::{Buf, B_DIRTY, B_VALID, NBUF}; + +const HEAD: usize = NBUF; // sentinel index + +struct BCache { + buf: [Buf; NBUF], + head_prev: usize, + head_next: usize, +} + +impl BCache { + pub const fn new() -> Self { + Self { + buf: [const { Buf::new() }; NBUF], + head_prev: HEAD, + head_next: HEAD, + } + } +} + +static mut BCACHE: BCache = BCache::new(); + +pub fn binit() { + unsafe { + // empty list + BCACHE.head_prev = HEAD; + BCACHE.head_next = HEAD; + + // insert all buffers at head (MRU side) + for i in 0..NBUF { + insert_at_head(i); + } + } +} + +#[inline] +fn insert_at_head(i: usize) { + unsafe { + let first = BCACHE.head_next; + + BCACHE.buf[i].prev = HEAD; + BCACHE.buf[i].next = first; + + if first == HEAD { + // list was empty + BCACHE.head_prev = i; + } else { + BCACHE.buf[first].prev = i; + } + + BCACHE.head_next = i; + } +} + +#[inline] +fn remove_from_list(i: usize) { + unsafe { + let prev = BCACHE.buf[i].prev; + let next = BCACHE.buf[i].next; + + if prev == HEAD { + BCACHE.head_next = next; + } else { + BCACHE.buf[prev].next = next; + } + + if next == HEAD { + BCACHE.head_prev = prev; + } else { + BCACHE.buf[next].prev = prev; + } + } +} + +// Return mutable buf by index. +// Safe to call only when you “own” the buffer logically (like xv6 “locked buf”). +pub fn buf_mut(idx: usize) -> &'static mut Buf { + unsafe { &mut BCACHE.buf[idx] } +} + +// Look for cached block; else recycle an unused non-dirty buffer. +fn bget(dev: u32, blockno: u32) -> usize { + unsafe { + // Is the block already cached? + let mut b = BCACHE.head_next; + while b != HEAD { + if BCACHE.buf[b].dev == dev && BCACHE.buf[b].blockno == blockno { + BCACHE.buf[b].refcnt += 1; + return b; + } + b = BCACHE.buf[b].next; + } + + // Not cached; recycle from LRU end. + let mut b = BCACHE.head_prev; + while b != HEAD { + let flags = BCACHE.buf[b].flags.load(Ordering::Acquire); + if BCACHE.buf[b].refcnt == 0 && (flags & B_DIRTY) == 0 { + BCACHE.buf[b].dev = dev; + BCACHE.buf[b].blockno = blockno; + BCACHE.buf[b].flags.store(0, Ordering::Release); + BCACHE.buf[b].refcnt = 1; + BCACHE.buf[b].qnext = None; + return b; + } + b = BCACHE.buf[b].prev; + } + + panic!("bget: no buffers"); + } +} + +// Return buffer index with contents of block. +pub fn bread(dev: u32, blockno: u32) -> usize { + let idx = bget(dev, blockno); + + let flags = buf_mut(idx).flags.load(Ordering::Acquire); + if (flags & B_VALID) == 0 { + crate::ide::iderw(idx); + } + + idx +} + +// Mark dirty + write to disk. +pub fn bwrite(idx: usize) { + let b = buf_mut(idx); + b.flags.fetch_or(B_DIRTY, Ordering::AcqRel); + crate::ide::iderw(idx); +} + +// Release buffer. If refcnt hits 0, move to MRU head. +pub fn brelse(idx: usize) { + unsafe { + let b = &mut BCACHE.buf[idx]; + if b.refcnt == 0 { + panic!("brelse: refcnt underflow"); + } + + b.refcnt -= 1; + if b.refcnt == 0 { + remove_from_list(idx); + insert_at_head(idx); + } + } +} \ No newline at end of file diff --git a/src/buf.rs b/src/buf.rs new file mode 100644 index 0000000..75d0792 --- /dev/null +++ b/src/buf.rs @@ -0,0 +1,41 @@ +use core::sync::atomic::AtomicU32; + +// Re-export filesystem constants from constants.rs for convenience +// (other modules currently import BSIZE and NBUF from buf) +pub use crate::constants::{BSIZE, NBUF}; + +// Buffer flags +pub const B_VALID: u32 = 0x2; // buffer has been read from disk +pub const B_DIRTY: u32 = 0x4; // buffer needs to be written to disk + +#[repr(C)] +pub struct Buf { + pub flags: AtomicU32, + pub dev: u32, + pub blockno: u32, + pub refcnt: u32, + + // LRU list (intrusive, by index) + pub prev: usize, + pub next: usize, + + // disk queue (by index) + pub qnext: Option, + + pub data: [u8; BSIZE], +} + +impl Buf { + pub const fn new() -> Self { + Self { + flags: AtomicU32::new(0), + dev: 0, + blockno: 0, + refcnt: 0, + prev: 0, + next: 0, + qnext: None, + data: [0; BSIZE], + } + } +} \ No newline at end of file diff --git a/src/console.rs b/src/console.rs index 0f62712..69b0669 100644 --- a/src/console.rs +++ b/src/console.rs @@ -5,20 +5,80 @@ pub struct Console {} impl Write for Console { fn write_str(&mut self, s: &str) -> Result { for c in s.chars() { - consputc(c); + consputc(c as i32); } Ok(()) } } -const BACKSPACE: char = '\x08'; +const BACKSPACE: i32 = 0x100; +const INPUT_BUF: usize = 128; +const CTRL_D: i32 = C('D'); -fn consputc(c: char) { +#[allow(non_snake_case)] +const fn C(c: char) -> i32 { + (c as i32) - ('@' as i32) +} + +#[derive(Clone, Copy)] +struct Input { + buf: [u8; INPUT_BUF], + r: usize, + w: usize, + e: usize, +} + +static mut INPUT: Input = Input { + buf: [0; INPUT_BUF], + r: 0, + w: 0, + e: 0, +}; + +pub fn consputc(c: i32) { if c == BACKSPACE { - uartputc(BACKSPACE); - uartputc(' '); - uartputc(BACKSPACE); + uartputc('\x08' as i32); + uartputc(' ' as i32); + uartputc('\x08' as i32); } else { uartputc(c); } -} \ No newline at end of file +} + +pub fn consoleintr(getc: fn() -> i32) { + loop { + let c = getc(); + if c < 0 { + break; + } + + unsafe { + let input = &raw mut INPUT; + match c { + x if x == C('U') => { + while (*input).e != (*input).w && (*input).buf[((*input).e - 1) % INPUT_BUF] != b'\n' { + (*input).e -= 1; + consputc(BACKSPACE); + } + } + x if x == C('H') || x == 0x7f => { + if (*input).e != (*input).w { + (*input).e -= 1; + consputc(BACKSPACE); + } + } + _ => { + if c != 0 && (*input).e.wrapping_sub((*input).r) < INPUT_BUF { + let c = if c == '\r' as i32 { '\n' as i32 } else { c }; + (*input).buf[(*input).e % INPUT_BUF] = c as u8; + (*input).e += 1; + consputc(c); + if c == '\n' as i32 || c == CTRL_D || (*input).e == (*input).r + INPUT_BUF { + (*input).w = (*input).e; + } + } + } + } + } + } +} diff --git a/src/constants.rs b/src/constants.rs index d06b826..618fa7b 100644 --- a/src/constants.rs +++ b/src/constants.rs @@ -17,11 +17,6 @@ pub const STS_T32A: u8 = 0x9; // Available 32-bit TSS pub const STS_IG32: u8 = 0xE; // 32-bit Interrupt Gate pub const STS_TG32: u8 = 0xF; // 32-bit Trap Gate - -// ----------------------------------------------------- CPU RELATED ---------------------------------------------- -pub const KSTACKSIZE: usize = 4096; // size of per-process kernel stack -pub const NCPU: usize = 8; // maximum number of CPUs - // ----------------------------------------------- TRAPS ------------------------------------------------------- // x86 trap and interrupt constants @@ -51,17 +46,14 @@ pub const T_SIMDERR: u32 = 19; // SIMD floating point error // processor defined exceptions or interrupt vectors pub const T_SYSCALL: u32 = 64; // system call pub const T_DEFAULT: u32 = 500; // catchall - -pub const T_IRQ0: u32 = 32; // IRQ 0 corresponds to int T_IRQ - +pub const T_IRQ0: u32 = 32; pub const IRQ_TIMER: u32 = 0; pub const IRQ_KBD: u32 = 1; pub const IRQ_COM1: u32 = 4; pub const IRQ_IDE: u32 = 14; pub const IRQ_ERROR: u32 = 19; pub const IRQ_SPURIOUS: u32 = 31; - - +pub const IDE_TRAP: u32 = T_IRQ0 + IRQ_IDE; // ------------------------------------------------------ MP RELATED ------------------------------------------------------- // Processor flags @@ -116,4 +108,44 @@ pub const X1: u32 = 0x0000000B; // divide counts by 1 pub const PERIODIC: u32 = 0x00020000; // Periodic // Error handling -pub const MASKED: u32 = 0x00010000; // Interrupt masked \ No newline at end of file +pub const MASKED: u32 = 0x00010000; // Interrupt masked + +// ------------------------------------------------------ FILE SYSTEM (fs.h) ---------------------------------------------- +// On-disk file system format constants +// Both the kernel and user programs (mkfs) use these definitions + +pub const ROOTINO: u32 = 1; // root i-number +pub const BSIZE: usize = 512; // block size + +// File structure +pub const NDIRECT: usize = 12; // number of direct block pointers +pub const NINDIRECT: usize = BSIZE / core::mem::size_of::(); // number of indirect block pointers (BSIZE / sizeof(uint)) +pub const MAXFILE: usize = NDIRECT + NINDIRECT; // max file size in blocks + +// Directory entry +pub const DIRSIZ: usize = 14; // directory name length +pub const DIRENT_SIZE: usize = 2 + DIRSIZ; // sizeof(struct dirent) = 2 bytes for uint16_t + 14 bytes for name + +// Inode calculations +// Note: In C these are macros. IPB = (BSIZE / sizeof(struct dinode)) +// For Rust: sizeof(dinode) = 2+2+2+2+4+(13*4) = 64 bytes +// So IPB = 512/64 = 8 inodes per block +pub const DINODE_SIZE: usize = 64; // sizeof(struct dinode) +pub const IPB: usize = BSIZE / DINODE_SIZE; // inodes per block + +// Bitmap calculations +pub const BPB: usize = BSIZE * 8; // bitmap bits per block + +// ------------------------------------------------------ SYSTEM PARAMETERS (param.h) ---------------------------------------------- +// System-wide parameters +pub const MAXOPBLOCKS: usize = 10; // max # of blocks any FS op writes +pub const NBUF: usize = MAXOPBLOCKS * 3; // size of disk block cache +pub const FSSIZE: u32 = 1000; // size of file system in blocks (C version: 1000, extended: 10000) +pub const NINODES: u32 = 200; // number of inodes in file system + +// ------------------------------------------------------ FILE TYPES (stat.h) ---------------------------------------------- +// File type constants for inode.type field + +pub const T_DIR: u16 = 1; // Directory +pub const T_FILE: u16 = 2; // File +pub const T_DEV: u16 = 3; // Device \ No newline at end of file diff --git a/src/fcntl.rs b/src/fcntl.rs new file mode 100644 index 0000000..2e76613 --- /dev/null +++ b/src/fcntl.rs @@ -0,0 +1,4 @@ +pub const O_RDONLY: i32 = 0x000; +pub const O_WRONLY: i32 = 0x001; +pub const O_RDWR: i32 = 0x002; +pub const O_CREATE: i32 = 0x200; diff --git a/src/file.rs b/src/file.rs new file mode 100644 index 0000000..8f2d079 --- /dev/null +++ b/src/file.rs @@ -0,0 +1,412 @@ +use core::str; + +use crate::buf::BSIZE; +use crate::constants::{T_DIR, T_FILE, DIRSIZ, DIRENT_SIZE}; +use crate::fcntl::{O_CREATE, O_RDONLY, O_RDWR, O_WRONLY}; +use crate::fs; +use crate::param::{MAXOPBLOCKS, NFILE}; + +#[derive(Copy, Clone, PartialEq, Eq)] +pub enum FileType { + None, + Inode, +} + +#[derive(Copy, Clone)] +pub struct File { + pub type_: FileType, + pub refcnt: i32, + pub readable: bool, + pub writable: bool, + pub ip: usize, + pub off: u32, +} + +impl File { + pub const fn new() -> Self { + Self { + type_: FileType::None, + refcnt: 0, + readable: false, + writable: false, + ip: 0, + off: 0, + } + } +} + +struct FTable { + file: [File; NFILE], +} + +impl FTable { + const fn new() -> Self { + Self { + file: [const { File::new() }; NFILE], + } + } +} + +static mut FTABLE: FTable = FTable::new(); + +fn dirsiz_to_str(name: &[u8; DIRSIZ]) -> &str { + let len = name.iter().position(|&b| b == 0).unwrap_or(DIRSIZ); + str::from_utf8(&name[..len]).unwrap_or("") +} + +pub fn fileinit() { + unsafe { + for i in 0..NFILE { + FTABLE.file[i] = File::new(); + } + } +} + +pub fn filealloc() -> Option { + unsafe { + for i in 0..NFILE { + if FTABLE.file[i].refcnt == 0 { + FTABLE.file[i].refcnt = 1; + return Some(i); + } + } + } + None +} + +pub fn filedup(f_idx: usize) -> usize { + unsafe { + if f_idx >= NFILE { + panic!("filedup: bad file index"); + } + if FTABLE.file[f_idx].refcnt < 1 { + panic!("filedup"); + } + FTABLE.file[f_idx].refcnt += 1; + } + f_idx +} + +pub fn fileclose(f_idx: usize) { + let ff: File; + unsafe { + if f_idx >= NFILE { + panic!("fileclose: bad file index"); + } + + let f = &mut FTABLE.file[f_idx]; + if f.refcnt < 1 { + panic!("fileclose"); + } + f.refcnt -= 1; + if f.refcnt > 0 { + return; + } + + ff = *f; + *f = File::new(); + } + + if ff.type_ == FileType::Inode { + crate::log::begin_op(); + fs::iput(ff.ip); + crate::log::end_op(); + } +} + +pub fn filestat(f_idx: usize, st: &mut fs::Stat) -> i32 { + let f: File; + unsafe { + if f_idx >= NFILE { + panic!("filestat: bad file index"); + } + f = FTABLE.file[f_idx]; + } + + if f.type_ == FileType::Inode { + fs::iread(f.ip); + fs::stati(f.ip, st); + return 0; + } + + -1 +} + +pub fn fileread(f_idx: usize, dst: &mut [u8], n: i32) -> i32 { + if n < 0 || (n as usize) > dst.len() { + return -1; + } + + let f: File; + unsafe { + if f_idx >= NFILE { + panic!("fileread: bad file index"); + } + f = FTABLE.file[f_idx]; + } + + if !f.readable { + return -1; + } + + if f.type_ == FileType::Inode { + fs::iread(f.ip); + let r = fs::readi(f.ip, dst, f.off, n as u32); + if r > 0 { + unsafe { + FTABLE.file[f_idx].off += r as u32; + } + } + return r; + } + + panic!("fileread"); +} + +pub fn filewrite(f_idx: usize, src: &[u8], n: i32) -> i32 { + if n < 0 || (n as usize) > src.len() { + return -1; + } + + let f: File; + unsafe { + if f_idx >= NFILE { + panic!("filewrite: bad file index"); + } + f = FTABLE.file[f_idx]; + } + + if !f.writable { + return -1; + } + + if f.type_ == FileType::Inode { + let max = (((MAXOPBLOCKS - 1 - 1 - 2) / 2) * BSIZE) as i32; + let mut i = 0i32; + + while i < n { + let mut n1 = n - i; + if n1 > max { + n1 = max; + } + + crate::log::begin_op(); + fs::iread(f.ip); + let off = unsafe { FTABLE.file[f_idx].off }; + let r = fs::writei(f.ip, &src[i as usize..], off, n1 as u32); + if r > 0 { + unsafe { + FTABLE.file[f_idx].off += r as u32; + } + } + crate::log::end_op(); + + if r < 0 { + break; + } + if r != n1 { + panic!("short filewrite"); + } + i += r; + } + + if i == n { + n + } else { + -1 + } + } else { + panic!("filewrite"); + } +} + +pub fn isdirempty(dp_idx: usize) -> bool { + fs::iread(dp_idx); + + let mut off = (2 * DIRENT_SIZE) as u32; + while off < fs::inode_size(dp_idx) { + let mut raw = [0u8; DIRENT_SIZE]; + if fs::readi(dp_idx, &mut raw, off, DIRENT_SIZE as u32) != DIRENT_SIZE as i32 { + panic!("isdirempty: readi"); + } + let de = fs::parse_dirent(&raw); + if de.inum != 0 { + return false; + } + off += DIRENT_SIZE as u32; + } + + true +} + +pub fn unlink(path: &str, name: &mut [u8; DIRSIZ]) -> i32 { + crate::log::begin_op(); + + let dp = match fs::nameiparent(path, name) { + Some(idx) => idx, + None => { + crate::log::end_op(); + return -1; + } + }; + + fs::iread(dp); + + let name_str = dirsiz_to_str(name); + + if name_str == "." || name_str == ".." { + fs::iput(dp); + crate::log::end_op(); + return -1; + } + + let mut off = 0u32; + let ip = match fs::dirlookup(dp, name_str, Some(&mut off)) { + Some(idx) => idx, + None => { + fs::iput(dp); + crate::log::end_op(); + return -1; + } + }; + + fs::iread(ip); + + if fs::inode_nlink(ip) < 1 { + panic!("unlink: nlink < 1"); + } + + if fs::inode_type(ip) == T_DIR && !isdirempty(ip) { + fs::iput(ip); + fs::iput(dp); + crate::log::end_op(); + return -1; + } + + let de = [0u8; DIRENT_SIZE]; + if fs::writei(dp, &de, off, DIRENT_SIZE as u32) != DIRENT_SIZE as i32 { + panic!("unlink: writei"); + } + + if fs::inode_type(ip) == T_DIR { + fs::inode_dec_nlink(dp); + fs::iupdate(dp); + } + fs::iput(dp); + + fs::inode_dec_nlink(ip); + fs::iupdate(ip); + fs::iput(ip); + + crate::log::end_op(); + 0 +} + +fn create(path: &str, type_: i16, major: i16, minor: i16) -> Option { + let mut name = [0u8; DIRSIZ]; + + let dp = fs::nameiparent(path, &mut name)?; + fs::iread(dp); + + let name_str = dirsiz_to_str(&name); + + if let Some(ip) = fs::dirlookup(dp, name_str, None) { + fs::iput(dp); + fs::iread(ip); + if (type_ as u16) == T_FILE && fs::inode_type(ip) == T_FILE { + return Some(ip); + } + fs::iput(ip); + return None; + } + + let ip = fs::ialloc(fs::inode_dev(dp), type_); + + fs::iread(ip); + fs::inode_set_meta(ip, major, minor, 1); + fs::iupdate(ip); + + if (type_ as u16) == T_DIR { + fs::inode_inc_nlink(dp); + fs::iupdate(dp); + + if fs::dirlink(ip, ".", fs::inode_inum(ip)) < 0 || fs::dirlink(ip, "..", fs::inode_inum(dp)) < 0 { + panic!("create dots"); + } + } + + if fs::dirlink(dp, name_str, fs::inode_inum(ip)) < 0 { + panic!("create: dirlink"); + } + + fs::iput(dp); + + Some(ip) +} + +pub fn open(path: &str, omode: i32) -> Option { + crate::log::begin_op(); + + let ip = if (omode & O_CREATE) != 0 { + let ip = match create(path, T_FILE as i16, 0, 0) { + Some(ip) => ip, + None => { + crate::log::end_op(); + return None; + } + }; + ip + } else { + let ip = match fs::namei(path) { + Some(ip) => ip, + None => { + crate::log::end_op(); + return None; + } + }; + fs::iread(ip); + if fs::inode_type(ip) == T_DIR && omode != O_RDONLY { + fs::iput(ip); + crate::log::end_op(); + return None; + } + ip + }; + + let f_idx = match filealloc() { + Some(idx) => idx, + None => { + fs::iput(ip); + crate::log::end_op(); + return None; + } + }; + + unsafe { + let f = &mut FTABLE.file[f_idx]; + f.type_ = FileType::Inode; + f.ip = ip; + f.off = 0; + f.readable = (omode & O_WRONLY) == 0; + f.writable = (omode & O_WRONLY) != 0 || (omode & O_RDWR) != 0; + } + + crate::log::end_op(); + Some(f_idx) +} + +pub fn mkdir(path: &str) -> i32 { + crate::log::begin_op(); + + let ip = match create(path, T_DIR as i16, 0, 0) { + Some(ip) => ip, + None => { + crate::log::end_op(); + return -1; + } + }; + + fs::iput(ip); + crate::log::end_op(); + 0 +} diff --git a/src/fs.rs b/src/fs.rs new file mode 100644 index 0000000..6d56bdd --- /dev/null +++ b/src/fs.rs @@ -0,0 +1,818 @@ +use core::cmp::min; + +use crate::bio; +use crate::buf::BSIZE; +use crate::log; +use crate::param::{NINODE, ROOTDEV}; +use crate::println; +use crate::constants::{NDIRECT, NINDIRECT, DIRSIZ, DIRENT_SIZE, DINODE_SIZE, IPB, BPB, MAXFILE}; +use crate::constants::{ROOTINO}; + +pub use crate::constants::T_DIR; + +#[derive(Copy, Clone)] +#[repr(C)] +pub struct Superblock { + pub size: u32, + pub nblocks: u32, + pub ninodes: u32, + pub nlog: u32, + pub logstart: u32, + pub inodestart: u32, + pub bmapstart: u32, +} + +impl Superblock { + pub const fn new() -> Self { + Self { + size: 0, + nblocks: 0, + ninodes: 0, + nlog: 0, + logstart: 0, + inodestart: 0, + bmapstart: 0, + } + } +} + +#[repr(C)] +pub struct Inode { + pub dev: u32, + pub inum: u32, + pub refcnt: i32, + pub valid: i32, + + pub type_: i16, + pub major: i16, + pub minor: i16, + pub nlink: i16, + pub size: u32, + pub addrs: [u32; NDIRECT + 1], +} + +impl Inode { + pub const fn new() -> Self { + Self { + dev: 0, + inum: 0, + refcnt: 0, + valid: 0, + type_: 0, + major: 0, + minor: 0, + nlink: 0, + size: 0, + addrs: [0; NDIRECT + 1], + } + } +} + +#[repr(C)] +pub struct Stat { + pub type_: i16, + pub dev: i32, + pub ino: u32, + pub nlink: i16, + pub size: u32, +} + +impl Stat { + pub const fn new() -> Self { + Self { + type_: 0, + dev: 0, + ino: 0, + nlink: 0, + size: 0, + } + } +} + +#[derive(Copy, Clone)] +#[repr(C)] +pub struct Dirent { + pub inum: u16, + pub name: [u8; DIRSIZ], +} + +impl Dirent { + pub const fn new() -> Self { + Self { + inum: 0, + name: [0; DIRSIZ], + } + } +} + +struct ICache { + inode: [Inode; NINODE], +} + +impl ICache { + const fn new() -> Self { + Self { + inode: [const { Inode::new() }; NINODE], + } + } +} + +static mut SB: Superblock = Superblock::new(); +static mut ICACHE: ICache = ICache::new(); + +#[inline] +fn read_u16_le(data: &[u8], off: usize) -> u16 { + u16::from_le_bytes([data[off], data[off + 1]]) +} + +#[inline] +fn read_i16_le(data: &[u8], off: usize) -> i16 { + i16::from_le_bytes([data[off], data[off + 1]]) +} + +#[inline] +fn read_u32_le(data: &[u8], off: usize) -> u32 { + u32::from_le_bytes([data[off], data[off + 1], data[off + 2], data[off + 3]]) +} + +#[inline] +fn write_u16_le(data: &mut [u8], off: usize, val: u16) { + data[off..off + 2].copy_from_slice(&val.to_le_bytes()); +} + +#[inline] +fn write_i16_le(data: &mut [u8], off: usize, val: i16) { + data[off..off + 2].copy_from_slice(&val.to_le_bytes()); +} + +#[inline] +fn write_u32_le(data: &mut [u8], off: usize, val: u32) { + data[off..off + 4].copy_from_slice(&val.to_le_bytes()); +} + +#[inline] +fn iblock(inum: u32, sb: &Superblock) -> u32 { + inum / (IPB as u32) + sb.inodestart +} + +#[inline] +fn bblock(b: u32, sb: &Superblock) -> u32 { + b / (BPB as u32) + sb.bmapstart +} + +#[inline] +fn name_to_dirsiz(name: &str) -> [u8; DIRSIZ] { + let mut out = [0u8; DIRSIZ]; + let bytes = name.as_bytes(); + let n = min(bytes.len(), DIRSIZ); + out[..n].copy_from_slice(&bytes[..n]); + out +} + +pub fn parse_dirent(raw: &[u8]) -> Dirent { + let mut de = Dirent::new(); + de.inum = read_u16_le(raw, 0); + de.name.copy_from_slice(&raw[2..2 + DIRSIZ]); + de +} + +pub fn readsb(dev: u32, sb: &mut Superblock) { + let bp = bio::bread(dev, 1); + let data = &bio::buf_mut(bp).data; + + sb.size = read_u32_le(data, 0); + sb.nblocks = read_u32_le(data, 4); + sb.ninodes = read_u32_le(data, 8); + sb.nlog = read_u32_le(data, 12); + sb.logstart = read_u32_le(data, 16); + sb.inodestart = read_u32_le(data, 20); + sb.bmapstart = read_u32_le(data, 24); + + bio::brelse(bp); +} + +pub fn iinit(dev: u32) { + unsafe { + readsb(dev, &mut *(&raw mut SB)); + let sb = &*(&raw const SB); + println!( + "sb: size {} nblocks {} ninodes {} nlog {} logstart {} inodestart {} bmap start {}", + sb.size, sb.nblocks, sb.ninodes, sb.nlog, sb.logstart, sb.inodestart, sb.bmapstart + ); + } +} + +fn bzero(dev: u32, bno: u32) { + let bp = bio::bread(dev, bno); + bio::buf_mut(bp).data.fill(0); + log::log_write(bp); + bio::brelse(bp); +} + +fn balloc(dev: u32) -> u32 { + unsafe { + let mut b = 0u32; + while b < SB.size { + let bp = bio::bread(dev, bblock(b, &*(&raw const SB))); + let mut found: Option = None; + { + let data = &mut bio::buf_mut(bp).data; + let mut bi = 0u32; + while bi < (BPB as u32) && b + bi < SB.size { + let m: u8 = 1u8 << (bi % 8); + let idx = (bi / 8) as usize; + if (data[idx] & m) == 0 { + data[idx] |= m; + found = Some(b + bi); + break; + } + bi += 1; + } + } + + if let Some(blockno) = found { + log::log_write(bp); + bio::brelse(bp); + bzero(dev, blockno); + return blockno; + } + + bio::brelse(bp); + b += BPB as u32; + } + } + + panic!("balloc: out of blocks"); +} + +fn bfree(dev: u32, b: u32) { + unsafe { + let bp = bio::bread(dev, bblock(b, &*(&raw const SB))); + let bi = b % (BPB as u32); + let m: u8 = 1u8 << (bi % 8); + let idx = (bi / 8) as usize; + + { + let data = &mut bio::buf_mut(bp).data; + if (data[idx] & m) == 0 { + panic!("freeing free block"); + } + data[idx] &= !m; + } + + log::log_write(bp); + bio::brelse(bp); + } +} + +pub fn ialloc(dev: u32, type_: i16) -> usize { + unsafe { + let mut inum = 1u32; + while inum < SB.ninodes { + let bp = bio::bread(dev, iblock(inum, &*(&raw const SB))); + let off = (inum % (IPB as u32)) as usize * DINODE_SIZE; + + let free = { + let data = &bio::buf_mut(bp).data; + read_i16_le(data, off) == 0 + }; + + if free { + { + let data = &mut bio::buf_mut(bp).data; + data[off..off + DINODE_SIZE].fill(0); + write_i16_le(data, off, type_); + } + log::log_write(bp); + bio::brelse(bp); + return iget(dev, inum); + } + + bio::brelse(bp); + inum += 1; + } + } + + panic!("ialloc: no inodes"); +} + +fn itrunc(idx: usize) { + unsafe { + if idx >= NINODE { + panic!("itrunc: bad inode index"); + } + + let dev = ICACHE.inode[idx].dev; + for i in 0..NDIRECT { + let addr = ICACHE.inode[idx].addrs[i]; + if addr != 0 { + bfree(dev, addr); + ICACHE.inode[idx].addrs[i] = 0; + } + } + + let indirect = ICACHE.inode[idx].addrs[NDIRECT]; + if indirect != 0 { + let bp = bio::bread(dev, indirect); + for j in 0..NINDIRECT { + let off = j * 4; + let a = { + let data = &bio::buf_mut(bp).data; + read_u32_le(data, off) + }; + if a != 0 { + bfree(dev, a); + } + } + bio::brelse(bp); + bfree(dev, indirect); + ICACHE.inode[idx].addrs[NDIRECT] = 0; + } + + ICACHE.inode[idx].size = 0; + } + + iupdate(idx); +} + +pub fn iput(idx: usize) { + unsafe { + if idx >= NINODE { + panic!("iput: bad inode index"); + } + if ICACHE.inode[idx].refcnt < 1 { + panic!("iput: ref underflow"); + } + + if ICACHE.inode[idx].valid != 0 && ICACHE.inode[idx].nlink == 0 && ICACHE.inode[idx].refcnt == 1 { + itrunc(idx); + ICACHE.inode[idx].type_ = 0; + iupdate(idx); + ICACHE.inode[idx].valid = 0; + } + + ICACHE.inode[idx].refcnt -= 1; + } +} + +pub fn irelease(idx: usize) { + iput(idx); +} + +pub fn iupdate(idx: usize) { + unsafe { + if idx >= NINODE { + panic!("iupdate: bad inode index"); + } + + let ip = &ICACHE.inode[idx]; + let bp = bio::bread(ip.dev, iblock(ip.inum, &*(&raw const SB))); + let off = (ip.inum % (IPB as u32)) as usize * DINODE_SIZE; + + { + let data = &mut bio::buf_mut(bp).data; + write_i16_le(data, off, ip.type_); + write_i16_le(data, off + 2, ip.major); + write_i16_le(data, off + 4, ip.minor); + write_i16_le(data, off + 6, ip.nlink); + write_u32_le(data, off + 8, ip.size); + for i in 0..(NDIRECT + 1) { + write_u32_le(data, off + 12 + (i * 4), ip.addrs[i]); + } + } + + log::log_write(bp); + bio::brelse(bp); + } +} + +pub fn iget(dev: u32, inum: u32) -> usize { + unsafe { + let mut empty: Option = None; + + for i in 0..NINODE { + let ip = &mut ICACHE.inode[i]; + + if ip.refcnt > 0 && ip.dev == dev && ip.inum == inum { + ip.refcnt += 1; + return i; + } + + if empty.is_none() && ip.refcnt == 0 { + empty = Some(i); + } + } + + let idx = empty.unwrap_or_else(|| panic!("iget: no inodes")); + let ip = &mut ICACHE.inode[idx]; + + ip.dev = dev; + ip.inum = inum; + ip.refcnt = 1; + ip.valid = 0; + + idx + } +} + +pub fn iread(idx: usize) { + unsafe { + if idx >= NINODE { + panic!("iread: bad inode index"); + } + + let ip = &mut ICACHE.inode[idx]; + if ip.refcnt < 1 { + panic!("iread"); + } + + if ip.valid == 0 { + let bp = bio::bread(ip.dev, iblock(ip.inum, &*(&raw const SB))); + let data = &bio::buf_mut(bp).data; + + let off = (ip.inum % (IPB as u32)) as usize * DINODE_SIZE; + ip.type_ = read_i16_le(data, off); + ip.major = read_i16_le(data, off + 2); + ip.minor = read_i16_le(data, off + 4); + ip.nlink = read_i16_le(data, off + 6); + ip.size = read_u32_le(data, off + 8); + + for i in 0..(NDIRECT + 1) { + ip.addrs[i] = read_u32_le(data, off + 12 + (i * 4)); + } + + bio::brelse(bp); + + ip.valid = 1; + if ip.type_ == 0 { + panic!("iread: no type"); + } + } + } +} + +fn bmap(idx: usize, bn: u32) -> u32 { + unsafe { + if idx >= NINODE { + panic!("bmap: bad inode index"); + } + + let ip = &mut ICACHE.inode[idx]; + + if (bn as usize) < NDIRECT { + let direct = &mut ip.addrs[bn as usize]; + if *direct == 0 { + *direct = balloc(ip.dev); + } + return *direct; + } + + let bn = bn - (NDIRECT as u32); + if (bn as usize) < NINDIRECT { + if ip.addrs[NDIRECT] == 0 { + ip.addrs[NDIRECT] = balloc(ip.dev); + } + + let bp = bio::bread(ip.dev, ip.addrs[NDIRECT]); + let mut addr = { + let data = &bio::buf_mut(bp).data; + read_u32_le(data, (bn as usize) * 4) + }; + if addr == 0 { + addr = balloc(ip.dev); + { + let data = &mut bio::buf_mut(bp).data; + write_u32_le(data, (bn as usize) * 4, addr); + } + log::log_write(bp); + } + bio::brelse(bp); + return addr; + } + } + + panic!("bmap: out of range"); +} + +pub fn stati(idx: usize, st: &mut Stat) { + unsafe { + if idx >= NINODE { + panic!("stati: bad inode index"); + } + + let ip = &ICACHE.inode[idx]; + st.dev = ip.dev as i32; + st.ino = ip.inum; + st.type_ = ip.type_; + st.nlink = ip.nlink; + st.size = ip.size; + } +} + +pub fn readi(idx: usize, dst: &mut [u8], off: u32, n: u32) -> i32 { + unsafe { + if idx >= NINODE { + panic!("readi: bad inode index"); + } + + let ip = &ICACHE.inode[idx]; + if off > ip.size || off.checked_add(n).is_none() || ip.nlink < 1 { + return -1; + } + + let mut n = n; + if off + n > ip.size { + n = ip.size - off; + } + + if (n as usize) > dst.len() { + panic!("readi: destination too small"); + } + + let mut tot: u32 = 0; + let mut cur_off = off; + let dev = ip.dev; + + while tot < n { + let bp = bio::bread(dev, bmap(idx, cur_off / (BSIZE as u32))); + + let m = min((n - tot) as usize, BSIZE - (cur_off as usize % BSIZE)); + let boff = cur_off as usize % BSIZE; + dst[tot as usize..tot as usize + m] + .copy_from_slice(&bio::buf_mut(bp).data[boff..boff + m]); + bio::brelse(bp); + + tot += m as u32; + cur_off += m as u32; + } + + n as i32 + } +} + +pub fn writei(idx: usize, src: &[u8], off: u32, n: u32) -> i32 { + unsafe { + if idx >= NINODE { + panic!("writei: bad inode index"); + } + + let ip = &ICACHE.inode[idx]; + if off > ip.size || off.checked_add(n).is_none() { + return -1; + } + if off + n > (MAXFILE * BSIZE) as u32 { + return -1; + } + if (n as usize) > src.len() { + panic!("writei: source too small"); + } + + let dev = ip.dev; + let mut tot: u32 = 0; + let mut cur_off = off; + + while tot < n { + let bp = bio::bread(dev, bmap(idx, cur_off / (BSIZE as u32))); + let m = min((n - tot) as usize, BSIZE - (cur_off as usize % BSIZE)); + let boff = cur_off as usize % BSIZE; + bio::buf_mut(bp).data[boff..boff + m] + .copy_from_slice(&src[tot as usize..tot as usize + m]); + log::log_write(bp); + bio::brelse(bp); + + tot += m as u32; + cur_off += m as u32; + } + + if n > 0 && cur_off > ICACHE.inode[idx].size { + ICACHE.inode[idx].size = cur_off; + iupdate(idx); + } + + n as i32 + } +} + +pub fn inode_inum(idx: usize) -> u32 { + unsafe { + if idx >= NINODE { + panic!("inode_inum: bad inode index"); + } + ICACHE.inode[idx].inum + } +} + +pub fn inode_dev(idx: usize) -> u32 { + unsafe { + if idx >= NINODE { + panic!("inode_dev: bad inode index"); + } + ICACHE.inode[idx].dev + } +} + +pub fn inode_type(idx: usize) -> u16 { + unsafe { + if idx >= NINODE { + panic!("inode_type: bad inode index"); + } + ICACHE.inode[idx].type_ as u16 + } +} + +pub fn inode_nlink(idx: usize) -> u16 { + unsafe { + if idx >= NINODE { + panic!("inode_nlink: bad inode index"); + } + ICACHE.inode[idx].nlink as u16 + } +} + +pub fn inode_size(idx: usize) -> u32 { + unsafe { + if idx >= NINODE { + panic!("inode_size: bad inode index"); + } + ICACHE.inode[idx].size + } +} + +pub fn inode_set_meta(idx: usize, major: i16, minor: i16, nlink: i16) { + unsafe { + if idx >= NINODE { + panic!("inode_set_meta: bad inode index"); + } + ICACHE.inode[idx].major = major; + ICACHE.inode[idx].minor = minor; + ICACHE.inode[idx].nlink = nlink; + } +} + +pub fn inode_inc_nlink(idx: usize) { + unsafe { + if idx >= NINODE { + panic!("inode_inc_nlink: bad inode index"); + } + ICACHE.inode[idx].nlink += 1; + } +} + +pub fn inode_dec_nlink(idx: usize) { + unsafe { + if idx >= NINODE { + panic!("inode_dec_nlink: bad inode index"); + } + ICACHE.inode[idx].nlink -= 1; + } +} + +pub fn namecmp(s: &str, t: &[u8; DIRSIZ]) -> bool { + name_to_dirsiz(s) == *t +} + +pub fn dirlookup(dp_idx: usize, name: &str, mut poff: Option<&mut u32>) -> Option { + if dp_idx >= NINODE { + panic!("dirlookup: bad inode index"); + } + iread(dp_idx); + + unsafe { + let dp = &ICACHE.inode[dp_idx]; + if (dp.type_ as u16) != T_DIR { + panic!("dirlookup not DIR"); + } + + let mut off = 0u32; + while off < dp.size { + let mut raw = [0u8; DIRENT_SIZE]; + if readi(dp_idx, &mut raw, off, DIRENT_SIZE as u32) != DIRENT_SIZE as i32 { + panic!("dirlookup read"); + } + let de = parse_dirent(&raw); + if de.inum != 0 && namecmp(name, &de.name) { + if let Some(ref mut out_off) = poff { + **out_off = off; + } + return Some(iget(dp.dev, de.inum as u32)); + } + off += DIRENT_SIZE as u32; + } + } + + None +} + +pub fn dirlink(dp_idx: usize, name: &str, inum: u32) -> i32 { + if let Some(ip_idx) = dirlookup(dp_idx, name, None) { + iput(ip_idx); + return -1; + } + + let mut off = 0u32; + unsafe { + if dp_idx >= NINODE { + panic!("dirlink: bad inode index"); + } + while off < ICACHE.inode[dp_idx].size { + let mut raw = [0u8; DIRENT_SIZE]; + if readi(dp_idx, &mut raw, off, DIRENT_SIZE as u32) != DIRENT_SIZE as i32 { + panic!("dirlink read"); + } + let de = parse_dirent(&raw); + if de.inum == 0 { + break; + } + off += DIRENT_SIZE as u32; + } + } + + let mut raw = [0u8; DIRENT_SIZE]; + write_u16_le(&mut raw, 0, inum as u16); + raw[2..2 + DIRSIZ].copy_from_slice(&name_to_dirsiz(name)); + if writei(dp_idx, &raw, off, DIRENT_SIZE as u32) != DIRENT_SIZE as i32 { + panic!("dirlink"); + } + + 0 +} + +fn skipelem(path: &[u8], mut i: usize, name: &mut [u8; DIRSIZ]) -> Option { + while i < path.len() && path[i] == b'/' { + i += 1; + } + if i == path.len() { + return None; + } + + let start = i; + // Find end of this path element + while i < path.len() && path[i] != b'/' && path[i] != 0 { + i += 1; + } + let len = i - start; + + name.fill(0); + if len >= DIRSIZ { + name.copy_from_slice(&path[start..start + DIRSIZ]); + } else { + name[..len].copy_from_slice(&path[start..i]); + } + + while i < path.len() && path[i] == b'/' { + i += 1; + } + Some(i) +} + +fn namex(path: &str, nameiparent: bool, name: &mut [u8; DIRSIZ]) -> Option { + let bytes = path.as_bytes(); + let mut path_idx = 0usize; + let mut ip = iget(ROOTDEV, ROOTINO); + + while let Some(next_idx) = skipelem(bytes, path_idx, name) { + path_idx = next_idx; + iread(ip); + + unsafe { + if ICACHE.inode[ip].type_ as u16 != T_DIR { + iput(ip); + return None; + } + } + + if nameiparent && path_idx == bytes.len() { + return Some(ip); + } + + let elem = core::str::from_utf8(name).unwrap_or(""); + let trimmed = elem.trim_end_matches('\0'); + let next = match dirlookup(ip, trimmed, None) { + Some(x) => x, + None => { + iput(ip); + return None; + } + }; + iput(ip); + ip = next; + } + + if nameiparent { + iput(ip); + return None; + } + Some(ip) +} + +/// Look up the inode for a path name. +pub fn namei(path: &str) -> Option { + let mut name = [0u8; DIRSIZ]; + namex(path, false, &mut name) +} + +/// Look up the parent inode for a path name. +/// Copy the final path element into name. +pub fn nameiparent(path: &str, name: &mut [u8; DIRSIZ]) -> Option { + namex(path, true, name) +} diff --git a/src/ide.rs b/src/ide.rs new file mode 100644 index 0000000..99619f2 --- /dev/null +++ b/src/ide.rs @@ -0,0 +1,181 @@ +use core::sync::atomic::Ordering; +use crate::constants::BSIZE; +use crate::buf::{B_DIRTY, B_VALID}; +use crate::x86; + +const SECTOR_SIZE: usize = 512; + +const IDE_BSY: u8 = 0x80; +const IDE_DRDY: u8 = 0x40; +const IDE_DF: u8 = 0x20; +const IDE_ERR: u8 = 0x01; + +const IDE_CMD_READ: u8 = 0x20; +const IDE_CMD_WRITE: u8 = 0x30; +const IDE_CMD_RDMUL: u8 = 0xC4; +const IDE_CMD_WRMUL: u8 = 0xC5; + +// If you later build a real FS image, keep this consistent with your mkfs. +// xv6 uses 1000. +const FSSIZE: u32 = 1000; + +static mut IDEQUEUE: Option = None; +static mut HAVEDISK1: bool = false; + +fn idewait(checkerr: bool) -> i32 { + let mut r: u8; + loop { + r = x86::inb(0x1F7); + if (r & (IDE_BSY | IDE_DRDY)) == IDE_DRDY { + break; + } + } + if checkerr && (r & (IDE_DF | IDE_ERR)) != 0 { + return -1; + } + 0 +} + +pub fn ideinit() { + // Route IDE IRQ somewhere; simplest is CPU 0 for now. + crate::ioapic::ioapic_enable(crate::constants::IRQ_IDE, 0); + + idewait(false); + + // Check if disk 1 is present + unsafe { + x86::outb(0x1F6, 0xE0 | (1 << 4)); + for _ in 0..1000 { + if x86::inb(0x1F7) != 0 { + HAVEDISK1 = true; + break; + } + } + // Switch back to disk 0 + x86::outb(0x1F6, 0xE0 | (0 << 4)); + } +} + +fn idestart(idx: usize) { + let b = crate::bio::buf_mut(idx); + + if b.blockno >= FSSIZE { + panic!("idestart: incorrect blockno"); + } + + let sector_per_block = BSIZE / SECTOR_SIZE; // usually 1 + let sector = (b.blockno as usize) * sector_per_block; + + let read_cmd = if sector_per_block == 1 { IDE_CMD_READ } else { IDE_CMD_RDMUL }; + let write_cmd = if sector_per_block == 1 { IDE_CMD_WRITE } else { IDE_CMD_WRMUL }; + + if sector_per_block > 7 { + panic!("idestart: sector_per_block > 7"); + } + + idewait(false); + x86::outb(0x3F6, 0); // generate interrupt + + x86::outb(0x1F2, sector_per_block as u8); // number of sectors + x86::outb(0x1F3, (sector & 0xFF) as u8); + x86::outb(0x1F4, ((sector >> 8) & 0xFF) as u8); + x86::outb(0x1F5, ((sector >> 16) & 0xFF) as u8); + x86::outb( + 0x1F6, + 0xE0 | (((b.dev & 1) as u8) << 4) | (((sector >> 24) & 0x0F) as u8), + ); + + let flags = b.flags.load(Ordering::Acquire); + if (flags & B_DIRTY) != 0 { + x86::outb(0x1F7, write_cmd); + + // write BSIZE bytes as u32 words + unsafe { + x86::outsl(0x1F0, b.data.as_ptr() as *const u32, BSIZE / 4); + } + } else { + x86::outb(0x1F7, read_cmd); + } +} + +// Interrupt handler. +pub fn ideintr() { + let idx = unsafe { + match IDEQUEUE { + None => return, + Some(i) => { + let b = crate::bio::buf_mut(i); + IDEQUEUE = b.qnext; + b.qnext = None; + i + } + } + }; + + let b = crate::bio::buf_mut(idx); + + let flags = b.flags.load(Ordering::Acquire); + + // Read data if needed. + if (flags & B_DIRTY) == 0 && idewait(true) >= 0 { + unsafe { + x86::insl(0x1F0, b.data.as_mut_ptr() as *mut u32, BSIZE / 4); + } + } + + b.flags.fetch_or(B_VALID, Ordering::AcqRel); + b.flags.fetch_and(!B_DIRTY, Ordering::AcqRel); + + // Start next buffer in queue. + unsafe { + if let Some(next) = IDEQUEUE { + idestart(next); + } + } +} + +// Sync buf with disk. +// If B_DIRTY is set, write buf to disk, clear B_DIRTY, set B_VALID. +// Else if B_VALID is not set, read buf from disk, set B_VALID. +pub fn iderw(idx: usize) { + let b = crate::bio::buf_mut(idx); + + let flags = b.flags.load(Ordering::Acquire); + if (flags & (B_VALID | B_DIRTY)) == B_VALID { + panic!("iderw: nothing to do"); + } + + unsafe { + if b.dev != 0 && !HAVEDISK1 { + panic!("iderw: ide disk 1 not present"); + } + } + + // Append b to idequeue. + b.qnext = None; + unsafe { + let mut pp: *mut Option = &raw mut IDEQUEUE; + while let Some(next_idx) = *pp { + pp = &raw mut crate::bio::buf_mut(next_idx).qnext; + } + *pp = Some(idx); + } + + // Start disk if necessary. + unsafe { + if IDEQUEUE == Some(idx) { + idestart(idx); + } + } + + // Wait for request to finish. + // The interrupt handler will set B_VALID when done. + loop { + let flags = b.flags.load(Ordering::Acquire); + if (flags & (B_VALID | B_DIRTY)) == B_VALID { + break; + } + // Force compiler to re-read b->flags which is modified by ideintr() + x86::noop(); + } +} \ No newline at end of file diff --git a/src/ioapic.rs b/src/ioapic.rs index 15cf837..eaf9d70 100644 --- a/src/ioapic.rs +++ b/src/ioapic.rs @@ -1,7 +1,7 @@ use core::ptr::{read_volatile, write_volatile}; use crate::mp::MP_ONCE; -use crate::console::Console; -use core::fmt::Write; +// use crate::console::Console; +// use core::fmt::Write; use crate::println; // I/O APIC default physical address @@ -14,9 +14,9 @@ const REG_TABLE: u32 = 0x10; // Redirection table base (0x10 / 4) // Redirection table configuration bits const INT_DISABLED: u32 = 0x00010000; // Interrupt disabled -const INT_LEVEL: u32 = 0x00008000; // Level-triggered -const INT_ACTIVELOW: u32 = 0x00002000; // Active low -const INT_LOGICAL: u32 = 0x00000800; // Destination is CPU ID +// const INT_LEVEL: u32 = 0x00008000; // Unused in p3 - Level-triggered +// const INT_ACTIVELOW: u32 = 0x00002000; // Unused in p3 - Active low +// const INT_LOGICAL: u32 = 0x00000800; // Unused in p3 - Destination is CPU ID pub const T_IRQ0: u32 = 32; diff --git a/src/lapic.rs b/src/lapic.rs index 1ce725f..fc3dbca 100644 --- a/src/lapic.rs +++ b/src/lapic.rs @@ -1,6 +1,6 @@ use core::ptr::{read_volatile, write_volatile}; use crate::mp::MP_ONCE; -use crate::traps::{T_IRQ0, IRQ_TIMER, IRQ_SPURIOUS, IRQ_ERROR}; +use crate::constants::{IRQ_ERROR, IRQ_SPURIOUS, IRQ_TIMER, T_IRQ0}; const ID: isize = 0x0020 / 4; const VER: isize = 0x0030 / 4; @@ -14,14 +14,14 @@ const ESR: isize = 0x0280 / 4; const ICRLO: isize = 0x0300 / 4; const INIT: u32 = 0x00000500; -const STARTUP: u32 = 0x00000600; +// const STARTUP: u32 = 0x00000600; // Unused in p3 - for AP startup const DELIVS: u32 = 0x00001000; -const ASSERT: u32 = 0x00004000; -const DEASSERT: u32 = 0x00000000; +// const ASSERT: u32 = 0x00004000; // Unused in p3 - for IPI +// const DEASSERT: u32 = 0x00000000; // Unused in p3 - for IPI const LEVEL: u32 = 0x00008000; const BCAST: u32 = 0x00080000; -const BUSY: u32 = 0x00001000; -const FIXED: u32 = 0x00000000; +// const BUSY: u32 = 0x00001000; // Unused in p3 +// const FIXED: u32 = 0x00000000; // Unused in p3 const ICRHI: isize = 0x0310 / 4; const TIMER: isize = 0x0320 / 4; @@ -35,7 +35,7 @@ const ERROR: isize = 0x0370 / 4; const MASKED: u32 = 0x00010000; const TICR: isize = 0x0380 / 4; -const TCCR: isize = 0x0390 / 4; +// const TCCR: isize = 0x0390 / 4; // Unused in p3 - timer current count const TDCR: isize = 0x03E0 / 4; // Volatile write to LAPIC @@ -70,7 +70,7 @@ pub fn lapicinit() { // TICR would be calibrated using an external time source. lapicw(TDCR, X1); lapicw(TIMER, PERIODIC | (T_IRQ0 + IRQ_TIMER)); - lapicw(TICR, 1000000000); + lapicw(TICR, 10000000); // Disable logical interrupt lines. diff --git a/src/lib.rs b/src/lib.rs index aa34772..211a050 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -1,7 +1,10 @@ #![no_std] // No standard library #![no_main] // No main function +#![allow(dead_code)] use core::panic::PanicInfo; +use crate::x86::cli; +use crate::lapic::lapicid; mod param; mod x86; @@ -13,8 +16,14 @@ mod picirq; mod mp; mod proc; mod traps; -mod constants; - +mod constants; +mod buf; +mod bio; +mod ide; +mod fs; +mod fcntl; +mod file; +mod log; use crate::traps::*; #[macro_export] @@ -30,13 +39,63 @@ macro_rules! println { fn halt() -> ! { println!("Bye COL{}\n\0", 331); loop { - x86::outw(0x604, 0x2000); - x86::outw(0xB004, 0x2000); + x86::outw(0x604, 0x2000); // QEMU isa-debug-exit device + x86::outw(0xB004, 0x2000); // VirtualBox shutdown port + } +} + +fn print_cstr(bytes: &[u8]) { + for &ch in bytes { + if ch == 0 { + break; + } + console::consputc(ch as i32); } } +fn welcome() { + // Create and write /foo/hello.txt + file::mkdir("/foo"); + + let gtxt = file::open("/foo/hello.txt", fcntl::O_CREATE | fcntl::O_WRONLY) + .unwrap_or_else(|| panic!("Failed to create /foo/hello.txt")); + let n = file::filewrite(gtxt, b"hello\0", 6); + println!("Wrote {} characters to /foo/hello.txt", n); + file::fileclose(gtxt); + + let gtxt = file::open("/foo/hello.txt", fcntl::O_RDONLY) + .unwrap_or_else(|| panic!("Unable to open /foo/hello.txt")); + let mut welcome = [0u8; 512]; + let n = file::fileread(gtxt, &mut welcome, 6); + println!("Read {} chars from /foo/hello.txt: ", n); + print_cstr(&welcome); + console::consputc('\n' as i32); + file::fileclose(gtxt); + + // Delete /foo/hello.txt + let mut name = [0u8; constants::DIRSIZ]; + file::unlink("/foo/hello.txt", &mut name); + + let foo = fs::namei("/foo").unwrap_or_else(|| panic!("unable to open /foo")); + if !file::isdirempty(foo) { + panic!("/foo should be empty"); + } + + if let Some(_gtxt) = file::open("/foo/hello.txt", fcntl::O_RDONLY) { + panic!("Could open /foo/hello.txt after unlinking"); + } + + // Print welcome message + let wtxt = file::open("/welcome.txt", fcntl::O_RDONLY) + .unwrap_or_else(|| panic!("Unable to open /welcome.txt")); + let n = file::fileread(wtxt, &mut welcome, 512); + println!("Read {} chars from /welcome.txt:\n", n); + print_cstr(&welcome); + file::fileclose(wtxt); +} + extern "C" { - pub static alltraps: fn(); + pub fn alltraps(); } #[no_mangle] @@ -46,16 +105,29 @@ pub extern "C" fn entryofrust() -> ! { picirq::picinit(); ioapic::ioapic_init(); uart::uartinit(); + ide::ideinit(); tvinit(); + bio::binit(); idtinit(); x86::sti(); + fs::iinit(param::ROOTDEV); + log::initlog(param::ROOTDEV); + welcome(); + loop { x86::wfi(); } } +static mut PANICKED: bool = false; + #[panic_handler] fn panic(info: &PanicInfo) -> ! { - println!("Kernel Panic: {:?}", info); + // Disable interrupts to prevent interrupt handlers from interfering + cli(); + // Print panic message with LAPIC ID to identify which CPU panicked + println!("lapicid {}:\n{:#?}", lapicid(), info); + unsafe { PANICKED = true; } + // Halt the system loop {} -} \ No newline at end of file +} diff --git a/src/log.rs b/src/log.rs new file mode 100644 index 0000000..36bd892 --- /dev/null +++ b/src/log.rs @@ -0,0 +1,189 @@ +use core::mem::size_of; +use core::sync::atomic::Ordering; + +use crate::bio; +use crate::buf::{B_DIRTY, BSIZE}; +use crate::fs; +use crate::param::LOGSIZE; + +#[derive(Copy, Clone)] +struct LogHeader { + n: i32, + block: [u32; LOGSIZE], +} + +impl LogHeader { + const fn new() -> Self { + Self { + n: 0, + block: [0; LOGSIZE], + } + } +} + +struct Log { + start: u32, + size: u32, + committing: bool, + dev: u32, + lh: LogHeader, +} + +impl Log { + const fn new() -> Self { + Self { + start: 0, + size: 0, + committing: false, + dev: 0, + lh: LogHeader::new(), + } + } +} + +static mut LOG: Log = Log::new(); + +#[inline] +fn read_i32_le(data: &[u8], off: usize) -> i32 { + i32::from_le_bytes([data[off], data[off + 1], data[off + 2], data[off + 3]]) +} + +#[inline] +fn write_i32_le(data: &mut [u8], off: usize, val: i32) { + data[off..off + 4].copy_from_slice(&val.to_le_bytes()); +} + +#[inline] +fn read_u32_le(data: &[u8], off: usize) -> u32 { + u32::from_le_bytes([data[off], data[off + 1], data[off + 2], data[off + 3]]) +} + +#[inline] +fn write_u32_le(data: &mut [u8], off: usize, val: u32) { + data[off..off + 4].copy_from_slice(&val.to_le_bytes()); +} + +fn read_head() { + unsafe { + let buf = bio::bread(LOG.dev, LOG.start); + let data = &bio::buf_mut(buf).data; + LOG.lh.n = read_i32_le(data, 0); + for i in 0..(LOG.lh.n as usize) { + LOG.lh.block[i] = read_u32_le(data, 4 + i * 4); + } + bio::brelse(buf); + } +} + +fn write_head() { + unsafe { + let buf = bio::bread(LOG.dev, LOG.start); + let data = &mut bio::buf_mut(buf).data; + data.fill(0); + write_i32_le(data, 0, LOG.lh.n); + for i in 0..(LOG.lh.n as usize) { + write_u32_le(data, 4 + i * 4, LOG.lh.block[i]); + } + bio::bwrite(buf); + bio::brelse(buf); + } +} + +fn install_trans() { + unsafe { + for tail in 0..(LOG.lh.n as usize) { + let lbuf = bio::bread(LOG.dev, LOG.start + tail as u32 + 1); + let dbuf = bio::bread(LOG.dev, LOG.lh.block[tail]); + let src = bio::buf_mut(lbuf).data; + bio::buf_mut(dbuf).data.copy_from_slice(&src); + bio::bwrite(dbuf); + bio::brelse(lbuf); + bio::brelse(dbuf); + } + } +} + +fn recover_from_log() { + read_head(); + install_trans(); + unsafe { + LOG.lh.n = 0; + } + write_head(); +} + +fn write_log() { + unsafe { + for tail in 0..(LOG.lh.n as usize) { + let to = bio::bread(LOG.dev, LOG.start + tail as u32 + 1); + let from = bio::bread(LOG.dev, LOG.lh.block[tail]); + let src = bio::buf_mut(from).data; + bio::buf_mut(to).data.copy_from_slice(&src); + bio::bwrite(to); + bio::brelse(from); + bio::brelse(to); + } + } +} + +fn commit() { + unsafe { + if LOG.committing { + panic!("commit"); + } + LOG.committing = true; + if LOG.lh.n > 0 { + write_log(); + write_head(); + install_trans(); + LOG.lh.n = 0; + write_head(); + } + LOG.committing = false; + } +} + +pub fn initlog(dev: u32) { + if size_of::() >= BSIZE { + panic!("initlog: too big logheader"); + } + + let mut sb = fs::Superblock::new(); + fs::readsb(dev, &mut sb); + unsafe { + LOG.start = sb.logstart; + LOG.size = sb.nlog; + LOG.dev = dev; + } + recover_from_log(); +} + +pub fn begin_op() {} + +pub fn end_op() { + commit(); +} + +pub fn log_write(idx: usize) { + unsafe { + let blockno = bio::buf_mut(idx).blockno; + if LOG.lh.n as usize >= LOGSIZE || LOG.lh.n as u32 >= LOG.size.saturating_sub(1) { + panic!("too big a transaction"); + } + + let mut i = 0usize; + while i < LOG.lh.n as usize { + if LOG.lh.block[i] == blockno { + break; + } + i += 1; + } + + LOG.lh.block[i] = blockno; + if i == LOG.lh.n as usize { + LOG.lh.n += 1; + } + + bio::buf_mut(idx).flags.fetch_or(B_DIRTY, Ordering::AcqRel); + } +} diff --git a/src/mkfs.rs b/src/mkfs.rs new file mode 100644 index 0000000..6289e66 --- /dev/null +++ b/src/mkfs.rs @@ -0,0 +1,388 @@ +use std::env; +use std::fs::{File, OpenOptions}; +use std::io::{Read, Seek, SeekFrom, Write}; +use std::mem::size_of; +use std::path::Path; + + +// ============================================================================ +// FILE SYSTEM CONSTANTS AND STRUCTURES +// ============================================================================ +// NOTE: These definitions are duplicated from the kernel codebase. +// +// WHY STANDALONE? +// In the C version, mkfs.c is compiled standalone with `gcc -o mkfs mkfs.c` +// and shares definitions via header files (fs.h, param.h, stat.h). +// +// Rust cannot use header files, so we duplicate the definitions here. +// This matches C's semantic model: mkfs is a host-side utility that runs +// on Linux/Mac (with std) to create fs.img BEFORE the kernel boots. +// +// The kernel (src/*) runs bare-metal x86 (no_std) and cannot share compiled +// code with host programs. +// +// MAINTENANCE: Keep synchronized with: +// - src/constants.rs (constants) +// - src/fs.rs (structs) - once created +// ============================================================================ + +// From fs.h (On-disk file system format) +const ROOTINO: u32 = 1; // root i-number +const BSIZE: usize = 512; // block size +const NDIRECT: usize = 12; // number of direct block pointers +const NINDIRECT: usize = BSIZE / size_of::(); // indirect pointers +const MAXFILE: usize = NDIRECT + NINDIRECT; // max file size in blocks +const DIRSIZ: usize = 14; // directory name length + +// From param.h (System parameters) +const FSSIZE: u32 = 1_000; // size of file system in blocks +const NINODES: u32 = 200; // number of inodes +const LOGSIZE: u32 = 30; // max data blocks in on-disk log + +// From stat.h (File types) +const T_DIR: u16 = 1; // Directory +const T_FILE: u16 = 2; // File + +// ============================================================================ +// FILESYSTEM STRUCTURES (Duplicated from src/fs.rs) +// ============================================================================ +// In C: These are defined in fs.h and included by both kernel and mkfs.c +// In Rust: Canonical definitions are in src/fs.rs (for kernel) +// Duplicated here because mkfs is a standalone host binary +// ============================================================================ + +#[repr(C)] +#[derive(Clone, Copy, Default)] +struct Superblock { + size: u32, + nblocks: u32, + ninodes: u32, + nlog: u32, + logstart: u32, + inodestart: u32, + bmapstart: u32, +} + +#[repr(C)] +#[derive(Clone, Copy)] +struct Dinode { + typ: u16, + major: u16, + minor: u16, + nlink: u16, + size: u32, + addrs: [u32; NDIRECT + 1], +} + +impl Default for Dinode { + fn default() -> Self { + Self { + typ: 0, + major: 0, + minor: 0, + nlink: 0, + size: 0, + addrs: [0; NDIRECT + 1], + } + } +} + +#[repr(C)] +#[derive(Clone, Copy)] +struct Dirent { + inum: u16, + name: [u8; DIRSIZ], +} + +impl Default for Dirent { + fn default() -> Self { + Self { + inum: 0, + name: [0; DIRSIZ], + } + } +} + +struct Mkfs { + fsfd: File, + sb: Superblock, + freeinode: u32, + freeblock: u32, +} + +fn as_bytes(val: &T) -> &[u8] { + unsafe { std::slice::from_raw_parts((val as *const T).cast::(), size_of::()) } +} + +fn from_bytes(bytes: &[u8]) -> T { + assert_eq!(bytes.len(), size_of::()); + let mut out = std::mem::MaybeUninit::::uninit(); + unsafe { + std::ptr::copy_nonoverlapping(bytes.as_ptr(), out.as_mut_ptr().cast::(), bytes.len()); + out.assume_init() + } +} + +fn name_to_dirent(name: &str, inum: u16) -> Dirent { + let mut de = Dirent { + inum: inum.to_le(), + ..Default::default() + }; + let name_bytes = name.as_bytes(); + let copy_len = name_bytes.len().min(DIRSIZ); + de.name[..copy_len].copy_from_slice(&name_bytes[..copy_len]); + de +} + +impl Mkfs { + fn new(fsfd: File, sb: Superblock, freeblock: u32) -> Self { + Self { + fsfd, + sb, + freeinode: 1, + freeblock, + } + } + + fn wsect(&mut self, sec: u32, buf: &[u8; BSIZE]) { + let off = (sec as u64) * (BSIZE as u64); + self.fsfd + .seek(SeekFrom::Start(off)) + .expect("lseek(write) failed"); + self.fsfd.write_all(buf).expect("write failed"); + } + + fn rsect(&mut self, sec: u32, buf: &mut [u8; BSIZE]) { + let off = (sec as u64) * (BSIZE as u64); + self.fsfd + .seek(SeekFrom::Start(off)) + .expect("lseek(read) failed"); + self.fsfd.read_exact(buf).expect("read failed"); + } + + fn iblock(&self, inum: u32) -> u32 { + (inum / ipb() as u32) + u32::from_le(self.sb.inodestart) + } + + fn winode(&mut self, inum: u32, ip: &Dinode) { + let mut buf = [0u8; BSIZE]; + let bn = self.iblock(inum); + self.rsect(bn, &mut buf); + + let off = (inum as usize % ipb()) * size_of::(); + let src = as_bytes(ip); + buf[off..off + size_of::()].copy_from_slice(src); + self.wsect(bn, &buf); + } + + fn rinode(&mut self, inum: u32) -> Dinode { + let mut buf = [0u8; BSIZE]; + let bn = self.iblock(inum); + self.rsect(bn, &mut buf); + + let off = (inum as usize % ipb()) * size_of::(); + from_bytes::(&buf[off..off + size_of::()]) + } + + fn ialloc(&mut self, typ: u16) -> u32 { + let inum = self.freeinode; + self.freeinode += 1; + + let din = Dinode { + typ: typ.to_le(), + nlink: 1u16.to_le(), + size: 0u32.to_le(), + ..Default::default() + }; + self.winode(inum, &din); + inum + } + + fn balloc(&mut self, used: u32) { + assert!(used < (BSIZE * 8) as u32); + println!("balloc: first {} blocks have been allocated", used); + + let mut buf = [0u8; BSIZE]; + for i in 0..used { + let idx = (i / 8) as usize; + let bit = (i % 8) as u8; + buf[idx] |= 1u8 << bit; + } + + let bmapstart = u32::from_le(self.sb.bmapstart); + println!("balloc: write bitmap block at sector {}", bmapstart); + self.wsect(bmapstart, &buf); + } + + fn iappend(&mut self, inum: u32, mut p: &[u8]) { + let mut din = self.rinode(inum); + let mut off = u32::from_le(din.size); + + while !p.is_empty() { + let fbn = (off as usize) / BSIZE; + assert!(fbn < MAXFILE); + + let x: u32; + if fbn < NDIRECT { + if u32::from_le(din.addrs[fbn]) == 0 { + din.addrs[fbn] = self.freeblock.to_le(); + self.freeblock += 1; + } + x = u32::from_le(din.addrs[fbn]); + } else { + if u32::from_le(din.addrs[NDIRECT]) == 0 { + din.addrs[NDIRECT] = self.freeblock.to_le(); + self.freeblock += 1; + } + + let mut indirect_sector = [0u8; BSIZE]; + let indirect_blockno = u32::from_le(din.addrs[NDIRECT]); + self.rsect(indirect_blockno, &mut indirect_sector); + + let indirect_idx = fbn - NDIRECT; + let byte_off = indirect_idx * size_of::(); + let mut indirect_entry = u32::from_le(from_bytes::( + &indirect_sector[byte_off..byte_off + size_of::()], + )); + + if indirect_entry == 0 { + indirect_entry = self.freeblock; + self.freeblock += 1; + let le = indirect_entry.to_le(); + indirect_sector[byte_off..byte_off + size_of::()].copy_from_slice(as_bytes(&le)); + self.wsect(indirect_blockno, &indirect_sector); + } + + x = indirect_entry; + } + + let mut buf = [0u8; BSIZE]; + self.rsect(x, &mut buf); + + let n1 = p + .len() + .min((fbn as u32 + 1) as usize * BSIZE - off as usize); + let block_off = off as usize - (fbn * BSIZE); + buf[block_off..block_off + n1].copy_from_slice(&p[..n1]); + self.wsect(x, &buf); + + off += n1 as u32; + p = &p[n1..]; + } + + din.size = off.to_le(); + self.winode(inum, &din); + } +} + +fn ipb() -> usize { + BSIZE / size_of::() +} + +fn main() { + assert_eq!(size_of::(), 4, "Integers must be 4 bytes"); + assert_eq!(BSIZE % size_of::(), 0); + assert_eq!(BSIZE % size_of::(), 0); + + let mut args = env::args().collect::>(); + if args.len() < 2 { + eprintln!("Usage: mkfs fs.img files..."); + std::process::exit(1); + } + + let fs_img = args.remove(1); + + let nbitmap = FSSIZE / (BSIZE as u32 * 8) + 1; + let ninodeblocks = NINODES / ipb() as u32 + 1; + let nlog = LOGSIZE; + let nmeta = 2 + nlog + ninodeblocks + nbitmap; + let nblocks = FSSIZE - nmeta; + + let sb = Superblock { + size: FSSIZE.to_le(), + nblocks: nblocks.to_le(), + ninodes: NINODES.to_le(), + nlog: nlog.to_le(), + logstart: 2u32.to_le(), + inodestart: (2 + nlog).to_le(), + bmapstart: (2 + nlog + ninodeblocks).to_le(), + }; + + println!( + "nmeta {} (boot, super, log blocks {} inode blocks {}, bitmap blocks {}) blocks {} total {}", + nmeta, nlog, ninodeblocks, nbitmap, nblocks, FSSIZE + ); + + let fsfd = OpenOptions::new() + .read(true) + .write(true) + .create(true) + .truncate(true) + .open(&fs_img) + .unwrap_or_else(|e| { + eprintln!("{}: {}", fs_img, e); + std::process::exit(1); + }); + + let mut mkfs = Mkfs::new(fsfd, sb, nmeta); + + let zeroes = [0u8; BSIZE]; + for i in 0..FSSIZE { + mkfs.wsect(i, &zeroes); + } + + let mut sb_buf = [0u8; BSIZE]; + sb_buf[..size_of::()].copy_from_slice(as_bytes(&mkfs.sb)); + mkfs.wsect(1, &sb_buf); + + let rootino = mkfs.ialloc(T_DIR); + assert_eq!(rootino, ROOTINO); + + let dot = name_to_dirent(".", rootino as u16); + mkfs.iappend(rootino, as_bytes(&dot)); + + let dotdot = name_to_dirent("..", rootino as u16); + mkfs.iappend(rootino, as_bytes(&dotdot)); + + for path in &args[1..] { + if path.contains('/') { + eprintln!("{}: must be a basename (no /)", path); + std::process::exit(1); + } + + let mut host_file = File::open(path).unwrap_or_else(|e| { + eprintln!("{}: {}", path, e); + std::process::exit(1); + }); + + let file_name = if let Some(stripped) = path.strip_prefix('_') { + stripped + } else { + Path::new(path) + .file_name() + .and_then(|s| s.to_str()) + .unwrap_or(path) + }; + + let inum = mkfs.ialloc(T_FILE); + let de = name_to_dirent(file_name, inum as u16); + mkfs.iappend(rootino, as_bytes(&de)); + + let mut buf = [0u8; BSIZE]; + loop { + let cc = host_file.read(&mut buf).expect("read input file failed"); + if cc == 0 { + break; + } + mkfs.iappend(inum, &buf[..cc]); + } + } + + let mut din = mkfs.rinode(rootino); + let mut off = u32::from_le(din.size); + off = ((off / BSIZE as u32) + 1) * BSIZE as u32; + din.size = off.to_le(); + mkfs.winode(rootino, &din); + + mkfs.balloc(mkfs.freeblock); +} diff --git a/src/mp.rs b/src/mp.rs index 9684f51..1b5117e 100644 --- a/src/mp.rs +++ b/src/mp.rs @@ -4,7 +4,8 @@ use crate::x86::{outb, inb}; use crate::proc::Cpu; use core::cell::OnceCell; -pub static mut IOAPICID: u8 = 0; +// Removed: replaced by MP_ONCE.ioapic_id OnceCell pattern +// pub static mut IOAPICID: u8 = 0; #[derive(Debug, Clone, Copy)] #[repr(C)] @@ -59,7 +60,7 @@ pub struct MpIoApic { } // Processor flags -pub const MPBOOT: u8 = 0x02; // This proc is the bootstrap processor +// pub const MPBOOT: u8 = 0x02; // Unused in p3 - This proc is the bootstrap processor // Table entry types pub const MPPROC: u8 = 0x00; // One per processor @@ -194,7 +195,8 @@ pub fn mpinit() { let conf = unsafe { *(mp.physaddr as *mut MpConf) }; let mut ismp = true; - MP_ONCE.lapic_base.set(conf.lapicaddr as *mut u32); + MP_ONCE.lapic_base.set(conf.lapicaddr as *mut u32) + .expect("lapic_base already initialized"); let mut p = (mp.physaddr as usize + mem::size_of::()) as *const u8; let e = (mp.physaddr as usize + conf.length as usize) as *const u8; @@ -218,7 +220,8 @@ pub fn mpinit() { MPIOAPIC => { let ioapic = p as *const MpIoApic; let ioapicid = unsafe { (*ioapic).apicno }; - MP_ONCE.ioapic_id.set(ioapicid); + MP_ONCE.ioapic_id.set(ioapicid) + .expect("ioapic_id already initialized"); // p = unsafe{ p.add(mem::size_of::()) }; p = p.wrapping_add(mem::size_of::()); } @@ -236,7 +239,8 @@ pub fn mpinit() { if !ismp { panic!("Didn't find a suitable machine"); } - MP_ONCE.cpus.set(cpus); + MP_ONCE.cpus.set(cpus) + .expect("cpus array already initialized"); if mp.imcrp != 0 { // Bochs doesn't support IMCR, so this doesn't run on Bochs. diff --git a/src/param.rs b/src/param.rs index 4341329..56333d0 100644 --- a/src/param.rs +++ b/src/param.rs @@ -1,2 +1,7 @@ -pub const KSTACKSIZE: usize = 4096; // size of per-process kernel stack +pub const KSTACKSIZE: usize = 4096; // size of per-process kernel stack (unused in p3) pub const NCPU: usize = 8; // maximum number of CPUs +pub const MAXOPBLOCKS: usize = 10; // max # of blocks any FS op writes +pub const NFILE: usize = 100; // open files per system +pub const NINODE: usize = 50; // maximum number of active i-nodes +pub const ROOTDEV: u32 = 1; // device number of file system root disk +pub const LOGSIZE: usize = MAXOPBLOCKS * 3; // max data blocks in on-disk log diff --git a/src/proc.rs b/src/proc.rs index 279364c..f904002 100644 --- a/src/proc.rs +++ b/src/proc.rs @@ -1,7 +1,8 @@ use crate::mp::MP_ONCE; // Import the MP_ONCE static from mp.rs -use core::ptr; +// use core::ptr; use crate::x86::readeflags; -use crate::constants::{FL_IF,NCPU}; +use crate::param::{NCPU}; +use crate::constants::{FL_IF}; use crate::lapic; #[derive(Debug, Clone, Copy)] diff --git a/src/traps.rs b/src/traps.rs index 0643fcc..cd92d13 100644 --- a/src/traps.rs +++ b/src/traps.rs @@ -1,27 +1,22 @@ use modular_bitfield::prelude::*; -use core::cell::{OnceCell, RefCell}; +use core::cell::OnceCell; +use core::sync::atomic::{AtomicU32, Ordering}; +use core::ptr::addr_of_mut; use crate::proc::cpuid; use crate::println; use crate::lapic::lapiceoi; -use crate::x86::{lidt,rcr2}; +use crate::x86::{lidt, rcr2, TrapFrame}; use crate::lapic; - -const SEG_KCODE: u16 = 1; -const STS_IG32: u8 = 0xE; // 32-bit Interrupt Gate -const STS_TG32: u8 = 0xF; // 32-bit Trap Gate - -pub const T_IRQ0: u32 = 32; -pub const IRQ_TIMER: u32 = 0; -pub const IRQ_ERROR: u32 = 19; -pub const IRQ_SPURIOUS: u32 = 31; +use crate::constants::{IRQ_COM1, IRQ_SPURIOUS, IRQ_TIMER, T_IRQ0, SEG_KCODE, STS_IG32, STS_TG32}; +use crate::uart::uartintr; extern "C" { - static vectors: [usize; 256]; // remove assembly. + static vectors: [usize; 256]; // in vectors.S: array of 256 entry pointers } #[bitfield] #[repr(C, packed)] -#[derive(Clone, Copy, Default)] // debug can be removed ? do we need to ? +#[derive(Clone, Copy, Default)] pub struct GateDesc { off_15_0: B16, // low 16 bits of offset in segment cs: B16, // code segment selector @@ -40,7 +35,7 @@ impl GateDesc { self.set_args(0); self.set_rsv1(0); let typ = if is_trap { STS_TG32 } else { STS_IG32 }; - self.set_r_type(typ); // for an interrupt gate, for example. + self.set_r_type(typ); self.set_s(0); self.set_dpl(dpl); self.set_p(1); @@ -49,58 +44,27 @@ impl GateDesc { } -#[repr(C)] -pub struct IDTOnce { - pub idt: OnceCell<[GateDesc; 256]>, - pub ticks: RefCell -} -unsafe impl Sync for IDTOnce {} -pub static IDT: IDTOnce = IDTOnce { idt: OnceCell::new(), ticks: RefCell::new(0) }; - - -#[repr(C)] -pub struct TrapFrame { - // registers as pushed by pusha - pub edi: u32, - pub esi: u32, - pub ebp: u32, - pub oesp: u32, // useless & ignored - pub ebx: u32, - pub edx: u32, - pub ecx: u32, - pub eax: u32, - - pub trapno: u32, - - // below here defined by x86 hardware - pub err: u32, - pub eip: u32, - pub cs: u16, - pub padding5: u16, - pub eflags: u32, - - // below here only when crossing rings, such as from user to kernel - pub esp: u32, - pub ss: u16, - pub padding6: u16, -} - +static mut IDT: OnceCell<[GateDesc; 256]> = OnceCell::new(); +pub static TICKS: AtomicU32 = AtomicU32::new(0); pub fn tvinit() { let mut arr = [GateDesc::default(); 256]; for i in 0..256 { arr[i].set_gate( - false, // Use an interrupt gate. - SEG_KCODE << 3, // Code segment selector (shifted as in the C code). - unsafe { vectors[i] }, // Offset from the external vector table. - 0 // Descriptor privilege level. + false, + SEG_KCODE << 3, + unsafe { vectors[i] }, + 0 ); } - IDT.idt.set(arr); + unsafe { + let _ = (*addr_of_mut!(IDT)).set(arr); + } } pub fn idtinit() { - lidt(IDT.idt.get().unwrap() , core::mem::size_of::<[GateDesc; 256]>() as usize); + let idt = unsafe { (*addr_of_mut!(IDT)).get().expect("IDT not initialized") }; + lidt(idt, core::mem::size_of::<[GateDesc; 256]>() as usize); } @@ -116,22 +80,29 @@ pub extern "C" fn trap(orig_tf: *mut TrapFrame) { const TIMER: u32 = T_IRQ0 + IRQ_TIMER; const SPURIOUS: u32 = T_IRQ0 + IRQ_SPURIOUS; const SEVEN: u32 = T_IRQ0 + 7; - match tf.trapno { - TIMER => { - *IDT.ticks.borrow_mut() += 1; - println!("Tick {}!", IDT.ticks.borrow()); - lapic::lapiceoi(); - } - SEVEN | SPURIOUS => { - println!( - "cpu{}: spurious interrupt at {}:{}\n", - cpuid() , - tf.cs, - tf.eip - ); + TIMER => { + TICKS.fetch_add(1, Ordering::Relaxed); + lapic::lapiceoi(); + } + x if x == T_IRQ0 + IRQ_COM1 => { + uartintr(); + lapiceoi(); + } + SEVEN | SPURIOUS => { + println!( + "cpu{}: spurious interrupt at {:x}:{:x}\n", + cpuid(), + tf.cs, + tf.eip + ); lapiceoi(); } + crate::constants::IDE_TRAP => { + crate::ide::ideintr(); + crate::lapic::lapiceoi(); + } + _ => { println!( "unexpected trap {} from cpu {} eip {} (cr2=0x{:x})\n", @@ -143,4 +114,4 @@ pub extern "C" fn trap(orig_tf: *mut TrapFrame) { panic!("trap happened"); } } -} \ No newline at end of file +} diff --git a/src/uart.rs b/src/uart.rs index 9888088..025b678 100644 --- a/src/uart.rs +++ b/src/uart.rs @@ -1,7 +1,13 @@ -use crate::x86::{outb, inb}; +use crate::console::consoleintr; +use crate::x86::{inb, outb}; use crate::ioapic::ioapic_enable; +use core::sync::atomic::{AtomicBool, Ordering}; + const COM1: u16 = 0x3F8; // COM1 port address pub const IRQ_COM1: u32 = 4; + +static UART_READY: AtomicBool = AtomicBool::new(false); + pub fn uartinit() { // Turn off the FIFO. outb(COM1 + 2, 0); @@ -19,6 +25,7 @@ pub fn uartinit() { if inb(COM1 + 5) == 0xFF { return; } + UART_READY.store(true, Ordering::SeqCst); // Acknowledge pre-existing interrupt conditions; // enable interrupts. @@ -28,15 +35,33 @@ pub fn uartinit() { // Announce that the UART is active. for p in "xv6...\n".chars() { - uartputc(p); + uartputc(p as i32); } } -pub fn uartputc(c: char) { +pub fn uartputc(c: i32) { + if !UART_READY.load(Ordering::SeqCst) { + return; + } + for _ in 0..128 { if inb(COM1 + 5) & 0x20 != 0 { break; } } outb(COM1 + 0, c as u8); -} \ No newline at end of file +} + +fn uartgetc() -> i32 { + if !UART_READY.load(Ordering::SeqCst) { + return -1; + } + if (inb(COM1 + 5) & 0x01) == 0 { + return -1; + } + inb(COM1 + 0) as i32 +} + +pub fn uartintr() { + consoleintr(uartgetc); +} diff --git a/src/x86.rs b/src/x86.rs index ba0598c..e8d8052 100644 --- a/src/x86.rs +++ b/src/x86.rs @@ -25,19 +25,6 @@ pub fn outb(port: u16, value: u8) { } } -pub fn inw(port: u16) -> u16 { - let result: u16; - unsafe { - asm!( - "in ax, dx", - in("dx") port, - out("ax") result, - options(nomem, nostack) - ); - result - } -} - pub fn outw(port: u16, value: u16) { unsafe { asm!( @@ -49,30 +36,6 @@ pub fn outw(port: u16, value: u16) { } } -pub fn inl(port: u16) -> u32 { - unsafe { - let result: u32; - asm!( - "in eax, dx", - in("dx") port, - out("eax") result, - options(nomem, nostack) - ); - result - } -} - -pub fn outl(port: u16, value: u32) { - unsafe { - asm!( - "out dx, eax", - in("dx") port, - in("eax") value, - options(nomem, nostack) - ); - } -} - pub fn readeflags() -> u32 { unsafe { let eflags: u32; @@ -112,6 +75,40 @@ pub fn lidt(gdt: *const [GateDesc; 256], size: usize) { } } +pub fn noop() { + core::sync::atomic::compiler_fence(core::sync::atomic::Ordering::SeqCst); +} + +// x86.rs +pub unsafe fn insl(port: u16, addr: *mut u32, cnt: usize) { + core::arch::asm!( + "cld", + "rep insd", + in("dx") port, + inout("edi") (addr as usize) => _, + inout("ecx") cnt => _, + options(nostack, preserves_flags), + ); +} + + +// Output string of dwords to port using rep outsd instruction. +// Matches the C implementation: outsl(port, addr, cnt) +// Note: ESI must be saved/restored as LLVM restricts its use in 32-bit mode +pub unsafe fn outsl(port: u16, addr: *const u32, cnt: usize) { + let addr_val = addr as u32; + core::arch::asm!( + "push esi", + "mov esi, {addr}", + "cld", + "rep outsd", + "pop esi", + addr = in(reg) addr_val, + in("dx") port, + inout("ecx") cnt => _, + ); +} + /// Halts the CPU until the next interrupt occurs. /// The `hlt` instruction: /// 1. Stops instruction execution and places the processor in a HALT state diff --git a/trapasm.S b/trapasm.S index 414dc20..477a5ee 100644 --- a/trapasm.S +++ b/trapasm.S @@ -17,3 +17,5 @@ trapret: popal addl $0x8, %esp # trapno and errcode iret + +.section .note.GNU-stack,"",@progbits \ No newline at end of file diff --git a/vectors.pl b/vectors.pl index 57b49dd..27d419b 100755 --- a/vectors.pl +++ b/vectors.pl @@ -26,6 +26,8 @@ print " .long vector$i\n"; } +print ".section .note.GNU-stack,\"\",%progbits\n"; + # sample output: # # handlers # .globl alltraps diff --git a/welcome.txt b/welcome.txt new file mode 100644 index 0000000..5809c82 --- /dev/null +++ b/welcome.txt @@ -0,0 +1,7 @@ + ### + # # ###### # #### #### # # ###### ### + # # # # # # # # ## ## # ### + # # ##### # # # # # ## # ##### # + # ## # # # # # # # # # + ## ## # # # # # # # # # ### + # # ###### ###### #### #### # # ###### ###