minix/kernel/exception.c
Jorrit Herder e0a98a4d65 * Fixed bug relating to nested locking in interrupt handlers. The nested lock
caused interrupts to be reenabled (due to unlock), which caused a race. The
problems were especially visible on slower machines.
* Relocated free memory parsing to process manager. This saved quite some
code at the kernel level. Text size was reduced by about 650 bytes.
* Removed locks for updating the realtime in the clock's main loop and the
get_uptime function. Interrupts are no longer reentrant, so realtime is
immediately updated.
2005-06-17 09:09:54 +00:00

74 lines
2.2 KiB
C
Executable file

/* This file contains a simple exception handler. Exceptions in user
* processes are converted to signals. Exceptions in the kernel, MM and
* FS cause a panic.
*/
#include "kernel.h"
#include <signal.h>
#include "proc.h"
#include "debug.h"
/*==========================================================================*
* exception *
*==========================================================================*/
PUBLIC void exception(vec_nr)
unsigned vec_nr;
{
/* An exception or unexpected interrupt has occurred. */
struct ex_s {
char *msg;
int signum;
int minprocessor;
};
static struct ex_s ex_data[] = {
"Divide error", SIGFPE, 86,
"Debug exception", SIGTRAP, 86,
"Nonmaskable interrupt", SIGBUS, 86,
"Breakpoint", SIGEMT, 86,
"Overflow", SIGFPE, 86,
"Bounds check", SIGFPE, 186,
"Invalid opcode", SIGILL, 186,
"Coprocessor not available", SIGFPE, 186,
"Double fault", SIGBUS, 286,
"Copressor segment overrun", SIGSEGV, 286,
"Invalid TSS", SIGSEGV, 286,
"Segment not present", SIGSEGV, 286,
"Stack exception", SIGSEGV, 286, /* STACK_FAULT already used */
"General protection", SIGSEGV, 286,
"Page fault", SIGSEGV, 386, /* not close */
NIL_PTR, SIGILL, 0, /* probably software trap */
"Coprocessor error", SIGFPE, 386,
};
register struct ex_s *ep;
struct proc *saved_proc;
/* Save proc_ptr, because it may be changed by debug statements. */
saved_proc = proc_ptr;
ep = &ex_data[vec_nr];
if (vec_nr == 2) { /* spurious NMI on some machines */
kprintf("got spurious NMI\n",NO_NUM);
return;
}
if (k_reenter == 0 && ! istaskp(saved_proc)) {
unlock(7); /* this is protected like sys_call() */
cause_sig(proc_nr(saved_proc), ep->signum);
return;
}
/* Exception in system code. This is not supposed to happen. */
if (ep->msg == NIL_PTR || machine.processor < ep->minprocessor)
kprintf("\nIntel-reserved exception %d\n", vec_nr);
else
kprintf("\n%s\n", karg(ep->msg));
kprintf("process number %d, ", proc_nr(saved_proc));
kprintf("pc = %d:", (unsigned) saved_proc->p_reg.cs);
kprintf("0x%x\n", (unsigned) saved_proc->p_reg.pc);
kernel_exception = TRUE; /* directly shutdown */
panic("exception in a kernel task", NO_NUM);
}