2006-06-13 17:50:40 +02:00
|
|
|
#include "types.h"
|
|
|
|
#include "param.h"
|
|
|
|
#include "mmu.h"
|
|
|
|
#include "proc.h"
|
|
|
|
#include "defs.h"
|
|
|
|
#include "x86.h"
|
2006-06-15 18:02:20 +02:00
|
|
|
#include "traps.h"
|
2006-07-12 03:48:35 +02:00
|
|
|
#include "syscall.h"
|
2006-06-13 17:50:40 +02:00
|
|
|
|
2006-07-17 03:58:13 +02:00
|
|
|
struct gatedesc idt[256];
|
2006-07-17 03:52:13 +02:00
|
|
|
extern uint vectors[]; /* vectors.S, array of 256 entry point addresses */
|
2006-06-13 17:50:40 +02:00
|
|
|
|
2006-07-17 03:25:22 +02:00
|
|
|
extern void trapenter(void);
|
|
|
|
extern void trapenter1(void);
|
2006-06-13 17:50:40 +02:00
|
|
|
|
|
|
|
void
|
2006-07-17 03:25:22 +02:00
|
|
|
tvinit(void)
|
2006-06-13 17:50:40 +02:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for(i = 0; i < 256; i++){
|
2006-06-15 18:02:20 +02:00
|
|
|
SETGATE(idt[i], 1, SEG_KCODE << 3, vectors[i], 0);
|
2006-06-13 17:50:40 +02:00
|
|
|
}
|
2006-08-10 04:07:10 +02:00
|
|
|
SETGATE(idt[T_SYSCALL], 1, SEG_KCODE << 3, vectors[48], 3);
|
2006-06-26 22:31:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2006-07-17 03:25:22 +02:00
|
|
|
idtinit(void)
|
2006-06-26 22:31:52 +02:00
|
|
|
{
|
2006-07-16 18:55:52 +02:00
|
|
|
lidt(idt, sizeof idt);
|
2006-06-13 17:50:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2006-07-17 03:58:13 +02:00
|
|
|
trap(struct trapframe *tf)
|
2006-06-13 17:50:40 +02:00
|
|
|
{
|
2006-07-16 17:41:47 +02:00
|
|
|
int v = tf->trapno;
|
2006-08-08 21:58:06 +02:00
|
|
|
|
|
|
|
if(cpus[cpu()].nlock){
|
|
|
|
cprintf("trap v %d eip %x cpu %d nlock %d\n",
|
|
|
|
v, tf->eip, cpu(), cpus[cpu()].nlock);
|
|
|
|
panic("interrupt while holding a lock");
|
|
|
|
}
|
2006-06-22 22:47:23 +02:00
|
|
|
|
2006-08-16 00:18:20 +02:00
|
|
|
if(curproc[cpu()] == 0){
|
|
|
|
if(&tf < cpus[cpu()].mpstack || &tf > cpus[cpu()].mpstack + MPSTACK){
|
2006-08-11 00:08:14 +02:00
|
|
|
cprintf("&tf %x mpstack %x\n", &tf, cpus[cpu()].mpstack);
|
|
|
|
panic("trap cpu stack");
|
|
|
|
}
|
|
|
|
} else if(curproc[cpu()]){
|
|
|
|
if(&tf < curproc[cpu()]->kstack){
|
|
|
|
panic("trap kstack");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-06-15 18:02:20 +02:00
|
|
|
if(v == T_SYSCALL){
|
2006-07-01 23:26:01 +02:00
|
|
|
struct proc *cp = curproc[cpu()];
|
2006-07-17 03:36:39 +02:00
|
|
|
int num = cp->tf->eax;
|
2006-08-10 04:07:10 +02:00
|
|
|
if((read_eflags() & FL_IF) == 0)
|
|
|
|
panic("syscall but interrupts now disabled");
|
Changes to allow use of native x86 ELF compilers, which on my
Linux 2.4 box using gcc 3.4.6 don't seem to follow the same
conventions as the i386-jos-elf-gcc compilers.
Can run make 'TOOLPREFIX=' or edit the Makefile.
curproc[cpu()] can now be NULL, indicating that no proc is running.
This seemed safer to me than having curproc[0] and curproc[1]
both pointing at proc[0] potentially.
The old implementation of swtch depended on the stack frame layout
used inside swtch being okay to return from on the other stack
(exactly the V6 you are not expected to understand this).
It also could be called in two contexts: at boot time, to schedule
the very first process, and later, on behalf of a process, to sleep
or schedule some other process.
I split this into two functions: scheduler and swtch.
The scheduler is now a separate never-returning function, invoked
by each cpu once set up. The scheduler looks like:
scheduler() {
setjmp(cpu.context);
pick proc to schedule
blah blah blah
longjmp(proc.context)
}
The new swtch is intended to be called only when curproc[cpu()] is not NULL,
that is, only on behalf of a user proc. It does:
swtch() {
if(setjmp(proc.context) == 0)
longjmp(cpu.context)
}
to save the current proc context and then jump over to the scheduler,
running on the cpu stack.
Similarly the system call stubs are now in assembly in usys.S to avoid
needing to know the details of stack frame layout used by the compiler.
Also various changes in the debugging prints.
2006-07-11 03:07:40 +02:00
|
|
|
if(cp == 0)
|
|
|
|
panic("syscall with no proc");
|
2006-07-11 19:39:45 +02:00
|
|
|
if(cp->killed)
|
|
|
|
proc_exit();
|
2006-07-01 23:26:01 +02:00
|
|
|
cp->tf = tf;
|
2006-06-15 18:02:20 +02:00
|
|
|
syscall();
|
2006-07-01 23:26:01 +02:00
|
|
|
if(cp != curproc[cpu()])
|
|
|
|
panic("trap ret wrong curproc");
|
|
|
|
if(cp->state != RUNNING)
|
|
|
|
panic("trap ret but not RUNNING");
|
|
|
|
if(tf != cp->tf)
|
|
|
|
panic("trap ret wrong tf");
|
2006-07-16 03:15:28 +02:00
|
|
|
if(cpus[cpu()].nlock){
|
2006-07-15 14:03:57 +02:00
|
|
|
cprintf("num=%d\n", num);
|
|
|
|
panic("syscall returning locks held");
|
|
|
|
}
|
|
|
|
if((read_eflags() & FL_IF) == 0)
|
|
|
|
panic("syscall returning but FL_IF clear");
|
2006-07-17 03:52:13 +02:00
|
|
|
if(read_esp() < (uint)cp->kstack ||
|
|
|
|
read_esp() >= (uint)cp->kstack + KSTACKSIZE)
|
2006-07-01 23:26:01 +02:00
|
|
|
panic("trap ret esp wrong");
|
2006-07-11 19:39:45 +02:00
|
|
|
if(cp->killed)
|
|
|
|
proc_exit();
|
2006-08-08 21:58:06 +02:00
|
|
|
// XXX probably ought to lgdt on trap return
|
2006-06-15 18:02:20 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2006-08-10 04:07:10 +02:00
|
|
|
//if(read_eflags() & FL_IF)
|
|
|
|
//panic("interrupt but interrupts enabled");
|
|
|
|
|
2006-06-28 18:35:03 +02:00
|
|
|
if(v == (IRQ_OFFSET + IRQ_TIMER)){
|
2006-07-11 19:39:45 +02:00
|
|
|
struct proc *cp = curproc[cpu()];
|
2006-06-28 18:35:03 +02:00
|
|
|
lapic_timerintr();
|
2006-07-11 19:39:45 +02:00
|
|
|
if(cp){
|
2006-07-16 04:09:45 +02:00
|
|
|
// Force process exit if it has been killed
|
|
|
|
// and the interrupt came from user space.
|
|
|
|
// (If the kernel was executing at time of interrupt,
|
|
|
|
// don't kill the process. Let the process get back
|
|
|
|
// out to its regular system call return.)
|
2006-07-16 17:41:47 +02:00
|
|
|
if((tf->cs&3) == 3 && cp->killed)
|
2006-07-11 19:39:45 +02:00
|
|
|
proc_exit();
|
2006-07-16 04:09:45 +02:00
|
|
|
|
|
|
|
// Force process to give up CPU and let others run.
|
2006-07-15 14:03:57 +02:00
|
|
|
if(cp->state == RUNNING)
|
|
|
|
yield();
|
2006-07-11 19:39:45 +02:00
|
|
|
}
|
2006-06-15 18:02:20 +02:00
|
|
|
return;
|
|
|
|
}
|
2006-07-12 17:35:33 +02:00
|
|
|
|
2006-07-06 23:47:22 +02:00
|
|
|
if(v == (IRQ_OFFSET + IRQ_IDE)){
|
|
|
|
ide_intr();
|
2006-08-11 00:08:14 +02:00
|
|
|
if(cpus[cpu()].nlock)
|
|
|
|
panic("ide_intr returned while holding a lock");
|
|
|
|
cli(); // prevent a waiting interrupt from overflowing stack
|
|
|
|
lapic_eoi();
|
2006-07-06 23:47:22 +02:00
|
|
|
return;
|
|
|
|
}
|
2006-06-15 18:02:20 +02:00
|
|
|
|
2006-08-10 04:07:10 +02:00
|
|
|
if(v == (IRQ_OFFSET + IRQ_KBD)){
|
|
|
|
kbd_intr();
|
2006-08-11 00:08:14 +02:00
|
|
|
if(cpus[cpu()].nlock){
|
|
|
|
panic("kbd_intr returned while holding a lock");
|
|
|
|
}
|
|
|
|
cli(); // prevent a waiting interrupt from overflowing stack
|
|
|
|
lapic_eoi();
|
2006-08-10 04:07:10 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2006-08-16 00:18:20 +02:00
|
|
|
cprintf("trap %d from cpu %d eip %x\n", v, cpu(), tf->eip);
|
2006-08-25 02:43:17 +02:00
|
|
|
if(curproc[cpu()]) {
|
2006-08-16 03:56:00 +02:00
|
|
|
cprintf("pid %d\n", curproc[cpu()]->pid);
|
2006-08-25 02:43:17 +02:00
|
|
|
proc_exit();
|
|
|
|
}
|
2006-08-20 01:41:34 +02:00
|
|
|
// panic("trap");
|
2006-08-10 04:07:10 +02:00
|
|
|
|
2006-06-28 18:35:03 +02:00
|
|
|
return;
|
2006-06-13 17:50:40 +02:00
|
|
|
}
|