Allow userspace to handle IRQs (WIP). Create basic keyboard handler

This commit is contained in:
Jeremy Soller 2016-09-18 20:17:08 -06:00
parent 4bcee99d9f
commit 36fde7c7c5
8 changed files with 115 additions and 24 deletions

View file

@ -26,6 +26,7 @@ clean:
cargo clean --manifest-path libstd/Cargo.toml
cargo clean --manifest-path init/Cargo.toml
cargo clean --manifest-path ion/Cargo.toml
cargo clean --manifest-path drivers/atkbd/Cargo.toml
cargo clean --manifest-path drivers/pcid/Cargo.toml
rm -rf build
@ -133,4 +134,8 @@ $(BUILD)/pcid: drivers/pcid/Cargo.toml drivers/pcid/src/** $(BUILD)/libstd.rlib
$(CARGO) rustc --manifest-path $< $(CARGOFLAGS) -o $@
strip $@
$(BUILD)/initfs.rs: $(BUILD)/init $(BUILD)/ion $(BUILD)/pcid
$(BUILD)/ps2d: drivers/ps2d/Cargo.toml drivers/ps2d/src/** $(BUILD)/libstd.rlib
$(CARGO) rustc --manifest-path $< $(CARGOFLAGS) -o $@
strip $@
$(BUILD)/initfs.rs: $(BUILD)/init $(BUILD)/ion $(BUILD)/pcid $(BUILD)/ps2d

View file

@ -17,6 +17,14 @@ unsafe fn slave_ack() {
master_ack();
}
pub unsafe fn acknowledge(irq: usize) {
if irq >= 8 {
slave_ack();
} else {
master_ack();
}
}
interrupt!(pit, {
COUNTS.lock()[0] += 1;
master_ack();
@ -24,10 +32,6 @@ interrupt!(pit, {
interrupt!(keyboard, {
COUNTS.lock()[1] += 1;
if let Some(ref mut keyboard) = *PS2_KEYBOARD.lock(){
keyboard.on_irq();
}
master_ack();
});
interrupt!(cascade, {

6
drivers/ps2d/Cargo.toml Normal file
View file

@ -0,0 +1,6 @@
[package]
name = "ps2d"
version = "0.1.0"
[dependencies.syscall]
path = "../../syscall/"

59
drivers/ps2d/src/main.rs Normal file
View file

@ -0,0 +1,59 @@
#![feature(asm)]
extern crate syscall;
use std::fs::File;
use std::io::{Read, Write};
use std::thread;
use syscall::iopl;
fn main() {
if true {
unsafe {
iopl(3).expect("pskbd: failed to get I/O permission");
asm!("cli" :::: "intel", "volatile");
}
let mut file = File::open("irq:1").expect("pskbd: failed to open irq:1");
println!("pskbd: Reading keyboard IRQs");
loop {
let mut irqs = [0; 8];
file.read(&mut irqs).expect("pskbd: failed to read irq:1");
let data: u8;
unsafe {
asm!("in al, dx" : "={al}"(data) : "{dx}"(0x60) : : "intel", "volatile");
}
println!("pskbd: IRQ {}: {:X}", unsafe { *(irqs.as_ptr() as *const usize) }, data);
file.write(&irqs).expect("pskbd: failed to write irq:1");
}
} else {
unsafe {
iopl(3).expect("psmsd: failed to get I/O permission");
asm!("cli" :::: "intel", "volatile");
}
let mut file = File::open("irq:12").expect("psmsd: failed to open irq:12");
println!("psmsd: Reading mouse IRQs");
loop {
let mut count = [0; 8];
file.read(&mut count).expect("psmsd: failed to read irq:12");
let data: u8;
unsafe {
asm!("in al, dx" : "={al}"(data) : "{dx}"(0x60) : : "intel", "volatile");
}
println!("psmsd: IRQ: {:X}", data);
file.write(&count).expect("psmsd: failed to write irq:12");
}
}
}

View file

@ -13,7 +13,7 @@ pub struct Memory {
flags: EntryFlags
}
#[derive(Debug)]
#[derive(Clone, Debug)]
pub enum SharedMemory {
Owned(Arc<Mutex<Memory>>),
Borrowed(Weak<Mutex<Memory>>)

View file

@ -21,7 +21,8 @@ impl InitFsScheme {
files.insert(b"bin/init", include_bytes!("../../build/userspace/init"));
files.insert(b"bin/ion", include_bytes!("../../build/userspace/ion"));
files.insert(b"bin/pcid", include_bytes!("../../build/userspace/pcid"));
files.insert(b"etc/init.rc", b"echo testing\ninitfs:bin/pcid\ninitfs:bin/ion");
files.insert(b"bin/ps2d", include_bytes!("../../build/userspace/ps2d"));
files.insert(b"etc/init.rc", b"echo testing\n#initfs:bin/pcid\ninitfs:bin/ps2d\n#initfs:bin/ion");
InitFsScheme {
next_id: 0,

View file

@ -1,6 +1,6 @@
use core::{mem, str};
use arch::interrupt::irq::COUNTS;
use arch::interrupt::irq::{COUNTS, acknowledge};
use context;
use syscall::{Error, Result};
use super::Scheme;
@ -10,7 +10,9 @@ pub struct IrqScheme;
impl Scheme for IrqScheme {
fn open(&mut self, path: &[u8], _flags: usize) -> Result<usize> {
let path_str = str::from_utf8(path).or(Err(Error::NoEntry))?;
let id = path_str.parse::<usize>().or(Err(Error::NoEntry))?;
if id < COUNTS.lock().len() {
Ok(id)
} else {
@ -19,35 +21,49 @@ impl Scheme for IrqScheme {
}
fn dup(&mut self, file: usize) -> Result<usize> {
Ok(file)
Err(Error::NotPermitted)
}
fn read(&mut self, file: usize, buffer: &mut [u8]) -> Result<usize> {
// Ensures that the length of the buffer is larger than the size of a usize
if buffer.len() >= mem::size_of::<usize>() {
let current = COUNTS.lock()[file];
let prev = { COUNTS.lock()[file] };
loop {
let next = COUNTS.lock()[file];
if next != current {
{
let current = COUNTS.lock()[file];
if prev != current {
// Safe if the length of the buffer is larger than the size of a usize
assert!(buffer.len() >= mem::size_of::<usize>());
unsafe { *(buffer.as_mut_ptr() as *mut usize) = next };
unsafe { *(buffer.as_mut_ptr() as *mut usize) = current; }
return Ok(mem::size_of::<usize>());
} else {
}
}
// Safe if all locks have been dropped
unsafe { context::switch(); }
}
}
} else {
Err(Error::InvalidValue)
}
}
fn write(&mut self, _file: usize, _buffer: &[u8]) -> Result<usize> {
Err(Error::NotPermitted)
fn write(&mut self, file: usize, buffer: &[u8]) -> Result<usize> {
if buffer.len() >= mem::size_of::<usize>() {
assert!(buffer.len() >= mem::size_of::<usize>());
let prev = unsafe { *(buffer.as_ptr() as *const usize) };
let current = COUNTS.lock()[file];
if prev == current {
unsafe { acknowledge(file); }
return Ok(mem::size_of::<usize>());
} else {
return Ok(0);
}
} else {
Err(Error::InvalidValue)
}
}
fn fsync(&mut self, file: usize) -> Result<()> {
fn fsync(&mut self, _file: usize) -> Result<()> {
Ok(())
}

View file

@ -96,11 +96,11 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
if flags & CLONE_VM == CLONE_VM {
for memory_shared in context.image.iter() {
image.push(memory_shared.borrow());
image.push(memory_shared.clone());
}
if let Some(ref heap_shared) = context.heap {
heap_option = Some(heap_shared.borrow());
heap_option = Some(heap_shared.clone());
}
} else {
for memory_shared in context.image.iter() {