Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
/*******************************************************************************
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-08-04 14:24:59 -04:00
|
|
|
Copyright(C) Jonas 'Sortie' Termansen 2011, 2012, 2013, 2014.
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-10 09:26:01 -04:00
|
|
|
This file is part of Sortix.
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-10 09:26:01 -04:00
|
|
|
Sortix is free software: you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation, either version 3 of the License, or (at your option) any later
|
|
|
|
version.
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-10 09:26:01 -04:00
|
|
|
Sortix is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
|
|
|
FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
|
|
|
|
details.
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-10 09:26:01 -04:00
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
Sortix. If not, see <http://www.gnu.org/licenses/>.
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-10 09:26:01 -04:00
|
|
|
thread.cpp
|
|
|
|
Describes a thread belonging to a process.
|
2011-09-21 14:52:29 -04:00
|
|
|
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
*******************************************************************************/
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-08-04 14:24:59 -04:00
|
|
|
#include <sys/wait.h>
|
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
2013-08-04 14:24:59 -04:00
|
|
|
#include <signal.h>
|
2014-03-03 18:11:13 -05:00
|
|
|
#include <stdlib.h>
|
2013-07-27 06:56:40 -04:00
|
|
|
#include <string.h>
|
|
|
|
|
2013-08-31 13:35:17 -04:00
|
|
|
#include <sortix/exit.h>
|
2013-07-27 06:56:40 -04:00
|
|
|
#include <sortix/mman.h>
|
|
|
|
#include <sortix/signal.h>
|
|
|
|
|
2013-08-31 13:35:17 -04:00
|
|
|
#include <sortix/kernel/copy.h>
|
2013-07-27 06:56:40 -04:00
|
|
|
#include <sortix/kernel/interrupt.h>
|
2013-10-26 20:42:10 -04:00
|
|
|
#include <sortix/kernel/kernel.h>
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
#include <sortix/kernel/kthread.h>
|
|
|
|
#include <sortix/kernel/memorymanagement.h>
|
2013-05-12 18:41:30 -04:00
|
|
|
#include <sortix/kernel/process.h>
|
2013-07-27 06:56:40 -04:00
|
|
|
#include <sortix/kernel/scheduler.h>
|
|
|
|
#include <sortix/kernel/syscall.h>
|
2013-05-12 18:41:30 -04:00
|
|
|
#include <sortix/kernel/thread.h>
|
2013-07-27 06:56:40 -04:00
|
|
|
#include <sortix/kernel/time.h>
|
2013-01-08 18:41:35 -05:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
void* operator new (size_t /*size*/, void* address) throw()
|
|
|
|
{
|
|
|
|
return address;
|
|
|
|
}
|
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
namespace Sortix {
|
2013-01-08 18:41:35 -05:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
Thread* AllocateThread()
|
|
|
|
{
|
|
|
|
uint8_t* allocation = (uint8_t*) malloc(sizeof(class Thread) + 16);
|
|
|
|
if ( !allocation )
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
uint8_t* aligned = allocation;
|
|
|
|
if ( ((uintptr_t) aligned & 0xFUL) )
|
|
|
|
aligned = (uint8_t*) (((uintptr_t) aligned + 16) & ~0xFUL);
|
|
|
|
|
|
|
|
assert(!((uintptr_t) aligned & 0xFUL));
|
|
|
|
Thread* thread = new (aligned) Thread;
|
|
|
|
assert(!((uintptr_t) thread->registers.fpuenv & 0xFUL));
|
|
|
|
return thread->self_allocation = allocation, thread;
|
|
|
|
}
|
|
|
|
|
|
|
|
void FreeThread(Thread* thread)
|
|
|
|
{
|
|
|
|
uint8_t* allocation = thread->self_allocation;
|
|
|
|
thread->~Thread();
|
|
|
|
free(allocation);
|
|
|
|
}
|
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
Thread::Thread()
|
2011-09-21 14:52:29 -04:00
|
|
|
{
|
2014-03-03 18:11:13 -05:00
|
|
|
assert(!((uintptr_t) registers.fpuenv & 0xFUL));
|
2014-10-02 09:38:06 -04:00
|
|
|
system_tid = (uintptr_t) this;
|
|
|
|
yield_to_tid = 0;
|
2013-07-27 06:56:40 -04:00
|
|
|
id = 0; // TODO: Make a thread id.
|
|
|
|
process = NULL;
|
|
|
|
prevsibling = NULL;
|
|
|
|
nextsibling = NULL;
|
2014-02-21 11:05:10 -05:00
|
|
|
scheduler_list_prev = NULL;
|
|
|
|
scheduler_list_next = NULL;
|
2013-07-27 06:56:40 -04:00
|
|
|
state = NONE;
|
|
|
|
memset(®isters, 0, sizeof(registers));
|
|
|
|
kernelstackpos = 0;
|
|
|
|
kernelstacksize = 0;
|
|
|
|
kernelstackmalloced = false;
|
2013-08-04 14:24:59 -04:00
|
|
|
pledged_destruction = false;
|
|
|
|
sigemptyset(&signal_pending);
|
|
|
|
sigemptyset(&signal_mask);
|
|
|
|
memset(&signal_stack, 0, sizeof(signal_stack));
|
|
|
|
signal_stack.ss_flags = SS_DISABLE;
|
2013-07-27 06:56:40 -04:00
|
|
|
}
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
Thread::~Thread()
|
|
|
|
{
|
|
|
|
if ( process )
|
|
|
|
process->OnThreadDestruction(this);
|
|
|
|
assert(CurrentThread() != this);
|
|
|
|
if ( kernelstackmalloced )
|
|
|
|
delete[] (uint8_t*) kernelstackpos;
|
|
|
|
}
|
2011-11-06 16:00:29 -05:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
Thread* CreateKernelThread(Process* process, struct thread_registers* regs)
|
2014-03-02 18:08:01 -05:00
|
|
|
{
|
2014-03-03 18:11:13 -05:00
|
|
|
assert(process && regs && process->addrspace);
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-09-14 12:59:15 -04:00
|
|
|
#if defined(__x86_64__)
|
2014-03-03 18:11:13 -05:00
|
|
|
if ( regs->fsbase >> 48 != 0x0000 && regs->fsbase >> 48 != 0xFFFF )
|
2013-09-14 12:59:15 -04:00
|
|
|
return errno = EINVAL, (Thread*) NULL;
|
2014-03-03 18:11:13 -05:00
|
|
|
if ( regs->gsbase >> 48 != 0x0000 && regs->gsbase >> 48 != 0xFFFF )
|
2013-09-14 12:59:15 -04:00
|
|
|
return errno = EINVAL, (Thread*) NULL;
|
|
|
|
#endif
|
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
Thread* thread = AllocateThread();
|
2013-07-27 06:56:40 -04:00
|
|
|
if ( !thread )
|
|
|
|
return NULL;
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
memcpy(&thread->registers, regs, sizeof(struct thread_registers));
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
kthread_mutex_lock(&process->threadlock);
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
// Create the family tree.
|
|
|
|
thread->process = process;
|
|
|
|
Thread* firsty = process->firstthread;
|
|
|
|
if ( firsty )
|
|
|
|
firsty->prevsibling = thread;
|
|
|
|
thread->nextsibling = firsty;
|
|
|
|
process->firstthread = thread;
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
kthread_mutex_unlock(&process->threadlock);
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
return thread;
|
|
|
|
}
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
static void SetupKernelThreadRegs(struct thread_registers* regs,
|
|
|
|
Process* process,
|
2014-03-02 18:08:01 -05:00
|
|
|
void (*entry)(void*),
|
|
|
|
void* user,
|
|
|
|
uintptr_t stack,
|
|
|
|
size_t stack_size)
|
|
|
|
{
|
2014-03-03 18:11:13 -05:00
|
|
|
memset(regs, 0, sizeof(*regs));
|
|
|
|
|
|
|
|
size_t stack_alignment = 16;
|
|
|
|
while ( stack & (stack_alignment-1) )
|
|
|
|
{
|
|
|
|
assert(stack_size);
|
|
|
|
stack++;
|
|
|
|
stack_size--;
|
|
|
|
}
|
|
|
|
|
|
|
|
stack_size &= ~(stack_alignment-1);
|
|
|
|
|
2014-03-02 18:08:01 -05:00
|
|
|
#if defined(__i386__)
|
|
|
|
uintptr_t* stack_values = (uintptr_t*) (stack + stack_size);
|
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
assert(5 * sizeof(uintptr_t) <= stack_size);
|
2014-03-02 18:08:01 -05:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
/* -- 16-byte aligned -- */
|
|
|
|
/* -1 padding */
|
|
|
|
stack_values[-2] = (uintptr_t) 0; /* null eip */
|
|
|
|
stack_values[-3] = (uintptr_t) 0; /* null ebp */
|
|
|
|
stack_values[-4] = (uintptr_t) user; /* thread parameter */
|
|
|
|
/* -- 16-byte aligned -- */
|
|
|
|
stack_values[-5] = (uintptr_t) kthread_exit; /* return to kthread_exit */
|
|
|
|
/* upcoming ebp */
|
|
|
|
/* -7 padding */
|
|
|
|
/* -8 padding */
|
|
|
|
/* -- 16-byte aligned -- */
|
2014-03-02 18:08:01 -05:00
|
|
|
|
|
|
|
regs->eip = (uintptr_t) entry;
|
2014-03-03 18:11:13 -05:00
|
|
|
regs->esp = (uintptr_t) (stack_values - 5);
|
2014-03-02 18:08:01 -05:00
|
|
|
regs->eax = 0;
|
|
|
|
regs->ebx = 0;
|
|
|
|
regs->ecx = 0;
|
|
|
|
regs->edx = 0;
|
|
|
|
regs->edi = 0;
|
|
|
|
regs->esi = 0;
|
2014-03-03 18:11:13 -05:00
|
|
|
regs->ebp = (uintptr_t) (stack_values - 3);
|
2014-03-02 18:08:01 -05:00
|
|
|
regs->cs = KCS | KRPL;
|
|
|
|
regs->ds = KDS | KRPL;
|
|
|
|
regs->ss = KDS | KRPL;
|
|
|
|
regs->eflags = FLAGS_RESERVED1 | FLAGS_INTERRUPT | FLAGS_ID;
|
|
|
|
regs->kerrno = 0;
|
|
|
|
regs->signal_pending = 0;
|
2014-03-03 18:11:13 -05:00
|
|
|
regs->kernel_stack = stack + stack_size;
|
|
|
|
regs->cr3 = process->addrspace;
|
2014-03-02 18:08:01 -05:00
|
|
|
#elif defined(__x86_64__)
|
|
|
|
uintptr_t* stack_values = (uintptr_t*) (stack + stack_size);
|
|
|
|
|
|
|
|
assert(3 * sizeof(uintptr_t) <= stack_size);
|
|
|
|
|
|
|
|
stack_values[-1] = (uintptr_t) 0; /* null rip */
|
|
|
|
stack_values[-2] = (uintptr_t) 0; /* null rbp */
|
|
|
|
stack_values[-3] = (uintptr_t) kthread_exit; /* return to kthread_exit */
|
|
|
|
|
|
|
|
regs->rip = (uintptr_t) entry;
|
|
|
|
regs->rsp = (uintptr_t) (stack_values - 3);
|
|
|
|
regs->rax = 0;
|
|
|
|
regs->rbx = 0;
|
|
|
|
regs->rcx = 0;
|
|
|
|
regs->rdx = 0;
|
|
|
|
regs->rdi = (uintptr_t) user;
|
|
|
|
regs->rsi = 0;
|
|
|
|
regs->rbp = 0;
|
|
|
|
regs->r8 = 0;
|
|
|
|
regs->r9 = 0;
|
|
|
|
regs->r10 = 0;
|
|
|
|
regs->r11 = 0;
|
|
|
|
regs->r12 = 0;
|
|
|
|
regs->r13 = 0;
|
|
|
|
regs->r14 = 0;
|
|
|
|
regs->r15 = 0;
|
|
|
|
regs->cs = KCS | KRPL;
|
|
|
|
regs->ds = KDS | KRPL;
|
|
|
|
regs->ss = KDS | KRPL;
|
|
|
|
regs->rflags = FLAGS_RESERVED1 | FLAGS_INTERRUPT | FLAGS_ID;
|
|
|
|
regs->kerrno = 0;
|
|
|
|
regs->signal_pending = 0;
|
2014-03-03 18:11:13 -05:00
|
|
|
regs->kernel_stack = stack + stack_size;
|
|
|
|
regs->cr3 = process->addrspace;
|
2014-03-02 18:08:01 -05:00
|
|
|
#else
|
2014-03-03 18:11:13 -05:00
|
|
|
#warning "You need to add kernel thread register initialization support"
|
2014-03-02 18:08:01 -05:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
Thread* CreateKernelThread(Process* process, void (*entry)(void*), void* user,
|
2013-07-27 06:56:40 -04:00
|
|
|
size_t stacksize)
|
|
|
|
{
|
2013-08-22 10:17:24 -04:00
|
|
|
const size_t DEFAULT_KERNEL_STACK_SIZE = 8 * 1024UL;
|
2013-07-27 06:56:40 -04:00
|
|
|
if ( !stacksize )
|
|
|
|
stacksize = DEFAULT_KERNEL_STACK_SIZE;
|
|
|
|
uint8_t* stack = new uint8_t[stacksize];
|
|
|
|
if ( !stack )
|
|
|
|
return NULL;
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
struct thread_registers regs;
|
|
|
|
SetupKernelThreadRegs(®s, process, entry, user, (uintptr_t) stack, stacksize);
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
Thread* thread = CreateKernelThread(process, ®s);
|
2013-07-27 06:56:40 -04:00
|
|
|
if ( !thread ) { delete[] stack; return NULL; }
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
|
2014-03-02 18:08:01 -05:00
|
|
|
thread->kernelstackpos = (uintptr_t) stack;
|
2013-07-27 06:56:40 -04:00
|
|
|
thread->kernelstacksize = stacksize;
|
|
|
|
thread->kernelstackmalloced = true;
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
return thread;
|
|
|
|
}
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2014-03-02 18:08:01 -05:00
|
|
|
Thread* CreateKernelThread(void (*entry)(void*), void* user, size_t stacksize)
|
2013-07-27 06:56:40 -04:00
|
|
|
{
|
|
|
|
return CreateKernelThread(CurrentProcess(), entry, user, stacksize);
|
|
|
|
}
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
void StartKernelThread(Thread* thread)
|
|
|
|
{
|
|
|
|
Scheduler::SetThreadState(thread, ThreadState::RUNNABLE);
|
|
|
|
}
|
Multithreaded kernel and improvement of signal handling.
Pardon the big ass-commit, this took months to develop and debug and the
refactoring got so far that a clean merge became impossible. The good news
is that this commit does quite a bit of cleaning up and generally improves
the kernel quality.
This makes the kernel fully pre-emptive and multithreaded. This was done
by rewriting the interrupt code, the scheduler, introducing new threading
primitives, and rewriting large parts of the kernel. During the past few
commits the kernel has had its device drivers thread secured; this commit
thread secures large parts of the core kernel. There still remains some
parts of the kernel that is _not_ thread secured, but this is not a problem
at this point. Each user-space thread has an associated kernel stack that
it uses when it goes into kernel mode. This stack is by default 8 KiB since
that value works for me and is also used by Linux. Strange things tends to
happen on x86 in case of a stack overflow - there is no ideal way to catch
such a situation right now.
The system call conventions were changed, too. The %edx register is now
used to provide the errno value of the call, instead of the kernel writing
it into a registered global variable. The system call code has also been
updated to better reflect the native calling conventions: not all registers
have to be preserved. This makes system calls faster and simplifies the
assembly. In the kernel, there is no longer the event.h header or the hacky
method of 'resuming system calls' that closely resembles cooperative
multitasking. If a system call wants to block, it should just block.
The signal handling was also improved significantly. At this point, signals
cannot interrupt kernel threads (but can always interrupt user-space threads
if enabled), which introduces some problems with how a SIGINT could
interrupt a blocking read, for instance. This commit introduces and uses a
number of new primitives such as kthread_lock_mutex_signal() that attempts
to get the lock but fails if a signal is pending. In this manner, the kernel
is safer as kernel threads cannot be shut down inconveniently, but in return
for complexity as blocking operations must check they if they should fail.
Process exiting has also been refactored significantly. The _exit(2) system
call sets the exit code and sends SIGKILL to all the threads in the process.
Once all the threads have cleaned themselves up and exited, a worker thread
calls the process's LastPrayer() method that unmaps memory, deletes the
address space, notifies the parent, etc. This provides a very robust way to
terminate processes as even half-constructed processes (during a failing fork
for instance) can be gracefully terminated.
I have introduced a number of kernel threads to help avoid threading problems
and simplify kernel design. For instance, there is now a functional generic
kernel worker thread that any kernel thread can schedule jobs for. Interrupt
handlers run with interrupts off (hence they cannot call kthread_ functions
as it may deadlock the system if another thread holds the lock) therefore
they cannot use the standard kernel worker threads. Instead, they use a
special purpose interrupt worker thread that works much like the generic one
expect that interrupt handlers can safely queue work with interrupts off.
Note that this also means that interrupt handlers cannot allocate memory or
print to the kernel log/screen as such mechanisms uses locks. I'll introduce
a lock free algorithm for such cases later on.
The boot process has also changed. The original kernel init thread in
kernel.cpp creates a new bootstrap thread and becomes the system idle thread.
Note that pid=0 now means the kernel, as there is no longer a system idle
process. The bootstrap thread launches all the kernel worker threads and then
creates a new process and loads /bin/init into it and then creates a thread
in pid=1, which starts the system. The bootstrap thread then quietly waits
for pid=1 to exit after which it shuts down/reboots/panics the system.
In general, the introduction of race conditions and dead locks have forced me
to revise a lot of the design and make sure it was thread secure. Since early
parts of the kernel was quite hacky, I had to refactor such code. So it seems
that the risk of dead locks forces me to write better code.
Note that a real preemptive multithreaded kernel simplifies the construction
of blocking system calls. My hope is that this will trigger a clean up of
the filesystem code that current is almost beyond repair.
Almost all of the kernel was modified during this refactoring. To the extent
possible, these changes have been backported to older non-multithreaded
kernel, but many changes were tightly coupled and went into this commit.
Of interest is the implementation of the kthread_ api based on the design
of pthreads; this library allows easy synchronization mechanisms and
includes C++-style scoped locks. This commit also introduces new worker
threads and tested mechanisms for interrupt handlers to schedule work in a
kernel worker thread.
A lot of code have been rewritten from scratch and has become a lot more
stable and correct.
Share and enjoy!
2012-08-01 11:30:34 -04:00
|
|
|
|
2014-03-03 18:11:13 -05:00
|
|
|
Thread* RunKernelThread(Process* process, struct thread_registers* regs)
|
2013-07-27 06:56:40 -04:00
|
|
|
{
|
2014-03-03 18:11:13 -05:00
|
|
|
Thread* thread = CreateKernelThread(process, regs);
|
2013-07-27 06:56:40 -04:00
|
|
|
if ( !thread )
|
|
|
|
return NULL;
|
|
|
|
StartKernelThread(thread);
|
|
|
|
return thread;
|
|
|
|
}
|
2011-09-21 14:52:29 -04:00
|
|
|
|
2014-03-02 18:08:01 -05:00
|
|
|
Thread* RunKernelThread(Process* process, void (*entry)(void*), void* user,
|
2013-07-27 06:56:40 -04:00
|
|
|
size_t stacksize)
|
|
|
|
{
|
|
|
|
Thread* thread = CreateKernelThread(process, entry, user, stacksize);
|
|
|
|
if ( !thread )
|
|
|
|
return NULL;
|
|
|
|
StartKernelThread(thread);
|
|
|
|
return thread;
|
|
|
|
}
|
2012-02-10 07:27:11 -05:00
|
|
|
|
2014-03-02 18:08:01 -05:00
|
|
|
Thread* RunKernelThread(void (*entry)(void*), void* user, size_t stacksize)
|
2013-07-27 06:56:40 -04:00
|
|
|
{
|
|
|
|
Thread* thread = CreateKernelThread(entry, user, stacksize);
|
|
|
|
if ( !thread )
|
|
|
|
return NULL;
|
|
|
|
StartKernelThread(thread);
|
|
|
|
return thread;
|
|
|
|
}
|
2011-09-15 16:38:40 -04:00
|
|
|
|
2014-10-16 18:04:47 -04:00
|
|
|
int sys_exit_thread(int requested_exit_code,
|
|
|
|
int flags,
|
|
|
|
const struct exit_thread* user_extended)
|
2013-08-31 13:35:17 -04:00
|
|
|
{
|
|
|
|
if ( flags & ~(EXIT_THREAD_ONLY_IF_OTHERS |
|
|
|
|
EXIT_THREAD_UNMAP |
|
2013-08-04 14:24:59 -04:00
|
|
|
EXIT_THREAD_ZERO |
|
|
|
|
EXIT_THREAD_TLS_UNMAP |
|
|
|
|
EXIT_THREAD_PROCESS |
|
|
|
|
EXIT_THREAD_DUMP_CORE) )
|
|
|
|
return errno = EINVAL, -1;
|
|
|
|
|
|
|
|
if ( (flags & EXIT_THREAD_ONLY_IF_OTHERS) && (flags & EXIT_THREAD_PROCESS) )
|
2013-08-31 13:35:17 -04:00
|
|
|
return errno = EINVAL, -1;
|
|
|
|
|
|
|
|
Thread* thread = CurrentThread();
|
|
|
|
Process* process = CurrentProcess();
|
|
|
|
|
|
|
|
struct exit_thread extended;
|
|
|
|
if ( !user_extended )
|
|
|
|
memset(&extended, 0, sizeof(extended));
|
|
|
|
else if ( !CopyFromUser(&extended, user_extended, sizeof(extended)) )
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
extended.unmap_size = Page::AlignUp(extended.unmap_size);
|
|
|
|
|
|
|
|
kthread_mutex_lock(&thread->process->threadlock);
|
|
|
|
bool is_others = false;
|
|
|
|
for ( Thread* iter = thread->process->firstthread;
|
|
|
|
!is_others && iter;
|
|
|
|
iter = iter->nextsibling )
|
|
|
|
{
|
|
|
|
if ( iter == thread )
|
|
|
|
continue;
|
2013-08-04 14:24:59 -04:00
|
|
|
if ( iter->pledged_destruction )
|
|
|
|
continue;
|
2013-08-31 13:35:17 -04:00
|
|
|
is_others = true;
|
|
|
|
}
|
2013-08-04 14:24:59 -04:00
|
|
|
if ( !(flags & EXIT_THREAD_ONLY_IF_OTHERS) || is_others )
|
|
|
|
thread->pledged_destruction = true;
|
|
|
|
bool are_threads_exiting = false;
|
|
|
|
if ( (flags & EXIT_THREAD_PROCESS) || !is_others )
|
|
|
|
process->threads_exiting = true;
|
|
|
|
else if ( process->threads_exiting )
|
|
|
|
are_threads_exiting = true;
|
2013-08-31 13:35:17 -04:00
|
|
|
kthread_mutex_unlock(&thread->process->threadlock);
|
|
|
|
|
2013-08-04 14:24:59 -04:00
|
|
|
// Self-destruct if another thread began exiting the process.
|
|
|
|
if ( are_threads_exiting )
|
|
|
|
kthread_exit();
|
|
|
|
|
2013-08-31 13:35:17 -04:00
|
|
|
if ( (flags & EXIT_THREAD_ONLY_IF_OTHERS) && !is_others )
|
|
|
|
return errno = ESRCH, -1;
|
|
|
|
|
|
|
|
if ( flags & EXIT_THREAD_UNMAP &&
|
|
|
|
Page::IsAligned((uintptr_t) extended.unmap_from) &&
|
|
|
|
extended.unmap_size )
|
|
|
|
{
|
|
|
|
ScopedLock lock(&process->segment_lock);
|
|
|
|
Memory::UnmapMemory(process, (uintptr_t) extended.unmap_from,
|
|
|
|
extended.unmap_size);
|
2014-06-24 18:42:25 -04:00
|
|
|
Memory::Flush();
|
2013-08-04 14:24:59 -04:00
|
|
|
// TODO: The segment is not actually removed!
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( flags & EXIT_THREAD_TLS_UNMAP &&
|
|
|
|
Page::IsAligned((uintptr_t) extended.tls_unmap_from) &&
|
|
|
|
extended.tls_unmap_size )
|
|
|
|
{
|
|
|
|
ScopedLock lock(&process->segment_lock);
|
|
|
|
Memory::UnmapMemory(process, (uintptr_t) extended.tls_unmap_from,
|
|
|
|
extended.tls_unmap_size);
|
|
|
|
Memory::Flush();
|
2013-08-31 13:35:17 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if ( flags & EXIT_THREAD_ZERO )
|
|
|
|
ZeroUser(extended.zero_from, extended.zero_size);
|
|
|
|
|
|
|
|
if ( !is_others )
|
2013-08-04 14:24:59 -04:00
|
|
|
{
|
|
|
|
// Validate the requested exit code such that the process can't exit
|
|
|
|
// with an impossible exit status or that it wasn't actually terminated.
|
|
|
|
|
|
|
|
int the_nature = WNATURE(requested_exit_code);
|
|
|
|
int the_status = WEXITSTATUS(requested_exit_code);
|
|
|
|
int the_signal = WTERMSIG(requested_exit_code);
|
|
|
|
|
|
|
|
if ( the_nature == WNATURE_EXITED )
|
|
|
|
the_signal = 0;
|
|
|
|
else if ( the_nature == WNATURE_SIGNALED )
|
|
|
|
{
|
|
|
|
if ( the_signal == 0 /* null signal */ ||
|
|
|
|
the_signal == SIGSTOP ||
|
|
|
|
the_signal == SIGTSTP ||
|
|
|
|
the_signal == SIGTTIN ||
|
|
|
|
the_signal == SIGTTOU ||
|
|
|
|
the_signal == SIGCONT )
|
|
|
|
the_signal = SIGKILL;
|
|
|
|
the_status = 128 + the_signal;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
the_nature = WNATURE_SIGNALED;
|
|
|
|
the_signal = SIGKILL;
|
|
|
|
}
|
|
|
|
|
|
|
|
requested_exit_code = WCONSTRUCT(the_nature, the_status, the_signal);
|
|
|
|
|
|
|
|
thread->process->ExitWithCode(requested_exit_code);
|
|
|
|
}
|
2013-08-31 13:35:17 -04:00
|
|
|
|
|
|
|
kthread_exit();
|
|
|
|
}
|
|
|
|
|
2013-07-27 06:56:40 -04:00
|
|
|
} // namespace Sortix
|