xv6-cs450/trap.c

135 lines
3.2 KiB
C
Raw Normal View History

2006-06-13 17:50:40 +02:00
#include "types.h"
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "defs.h"
#include "x86.h"
2006-06-15 18:02:20 +02:00
#include "traps.h"
#include "syscall.h"
2006-06-13 17:50:40 +02:00
struct gatedesc idt[256];
extern uint vectors[]; /* vectors.S, array of 256 entry point addresses */
2006-06-13 17:50:40 +02:00
2006-07-17 03:25:22 +02:00
extern void trapenter(void);
extern void trapenter1(void);
2006-06-13 17:50:40 +02:00
void
2006-07-17 03:25:22 +02:00
tvinit(void)
2006-06-13 17:50:40 +02:00
{
int i;
for(i = 0; i < 256; i++){
2006-06-15 18:02:20 +02:00
SETGATE(idt[i], 1, SEG_KCODE << 3, vectors[i], 0);
2006-06-13 17:50:40 +02:00
}
SETGATE(idt[T_SYSCALL], 1, SEG_KCODE << 3, vectors[48], 3);
}
void
2006-07-17 03:25:22 +02:00
idtinit(void)
{
lidt(idt, sizeof idt);
2006-06-13 17:50:40 +02:00
}
void
trap(struct trapframe *tf)
2006-06-13 17:50:40 +02:00
{
int v = tf->trapno;
if(cpus[cpu()].nlock){
cprintf("trap v %d eip %x cpu %d nlock %d\n",
v, tf->eip, cpu(), cpus[cpu()].nlock);
panic("interrupt while holding a lock");
}
2006-06-22 22:47:23 +02:00
if(curproc[cpu()] == 0){
if(&tf < cpus[cpu()].mpstack || &tf > cpus[cpu()].mpstack + MPSTACK){
cprintf("&tf %x mpstack %x\n", &tf, cpus[cpu()].mpstack);
panic("trap cpu stack");
}
} else if(curproc[cpu()]){
if(&tf < curproc[cpu()]->kstack){
panic("trap kstack");
}
}
2006-06-15 18:02:20 +02:00
if(v == T_SYSCALL){
struct proc *cp = curproc[cpu()];
2006-07-17 03:36:39 +02:00
int num = cp->tf->eax;
if((read_eflags() & FL_IF) == 0)
panic("syscall but interrupts now disabled");
2006-07-11 03:07:40 +02:00
if(cp == 0)
panic("syscall with no proc");
if(cp->killed)
proc_exit();
cp->tf = tf;
2006-06-15 18:02:20 +02:00
syscall();
if(cp != curproc[cpu()])
panic("trap ret wrong curproc");
if(cp->state != RUNNING)
panic("trap ret but not RUNNING");
if(tf != cp->tf)
panic("trap ret wrong tf");
if(cpus[cpu()].nlock){
cprintf("num=%d\n", num);
panic("syscall returning locks held");
}
if((read_eflags() & FL_IF) == 0)
panic("syscall returning but FL_IF clear");
if(read_esp() < (uint)cp->kstack ||
read_esp() >= (uint)cp->kstack + KSTACKSIZE)
panic("trap ret esp wrong");
if(cp->killed)
proc_exit();
// XXX probably ought to lgdt on trap return
2006-06-15 18:02:20 +02:00
return;
}
//if(read_eflags() & FL_IF)
//panic("interrupt but interrupts enabled");
2006-06-28 18:35:03 +02:00
if(v == (IRQ_OFFSET + IRQ_TIMER)){
struct proc *cp = curproc[cpu()];
2006-06-28 18:35:03 +02:00
lapic_timerintr();
if(cp){
2006-07-16 04:09:45 +02:00
// Force process exit if it has been killed
// and the interrupt came from user space.
// (If the kernel was executing at time of interrupt,
// don't kill the process. Let the process get back
// out to its regular system call return.)
if((tf->cs&3) == 3 && cp->killed)
proc_exit();
2006-07-16 04:09:45 +02:00
// Force process to give up CPU and let others run.
if(cp->state == RUNNING)
yield();
}
2006-06-15 18:02:20 +02:00
return;
}
if(v == (IRQ_OFFSET + IRQ_IDE)){
ide_intr();
if(cpus[cpu()].nlock)
panic("ide_intr returned while holding a lock");
cli(); // prevent a waiting interrupt from overflowing stack
lapic_eoi();
return;
}
2006-06-15 18:02:20 +02:00
if(v == (IRQ_OFFSET + IRQ_KBD)){
kbd_intr();
if(cpus[cpu()].nlock){
panic("kbd_intr returned while holding a lock");
}
cli(); // prevent a waiting interrupt from overflowing stack
lapic_eoi();
return;
}
cprintf("trap %d from cpu %d eip %x\n", v, cpu(), tf->eip);
if(curproc[cpu()])
cprintf("pid %d\n", curproc[cpu()]->pid);
// panic("trap");
2006-06-28 18:35:03 +02:00
return;
2006-06-13 17:50:40 +02:00
}