2006-06-13 17:50:40 +02:00
|
|
|
#include "types.h"
|
2007-08-28 01:26:33 +02:00
|
|
|
#include "defs.h"
|
2006-06-13 17:50:40 +02:00
|
|
|
#include "param.h"
|
2011-07-29 13:31:27 +02:00
|
|
|
#include "memlayout.h"
|
2006-06-13 17:50:40 +02:00
|
|
|
#include "mmu.h"
|
|
|
|
#include "proc.h"
|
|
|
|
#include "x86.h"
|
2006-06-15 18:02:20 +02:00
|
|
|
#include "traps.h"
|
2007-08-27 15:34:35 +02:00
|
|
|
#include "spinlock.h"
|
2006-06-13 17:50:40 +02:00
|
|
|
|
2006-09-07 16:12:30 +02:00
|
|
|
// Interrupt descriptor table (shared by all CPUs).
|
2006-07-17 03:58:13 +02:00
|
|
|
struct gatedesc idt[256];
|
2006-09-06 21:08:14 +02:00
|
|
|
extern uint vectors[]; // in vectors.S: array of 256 entry pointers
|
2007-08-27 15:34:35 +02:00
|
|
|
struct spinlock tickslock;
|
2010-08-11 20:34:45 +02:00
|
|
|
uint ticks;
|
2006-06-13 17:50:40 +02:00
|
|
|
|
|
|
|
void
|
2006-07-17 03:25:22 +02:00
|
|
|
tvinit(void)
|
2006-06-13 17:50:40 +02:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2006-09-07 18:53:16 +02:00
|
|
|
for(i = 0; i < 256; i++)
|
2007-08-22 08:01:32 +02:00
|
|
|
SETGATE(idt[i], 0, SEG_KCODE<<3, vectors[i], 0);
|
2007-09-27 23:37:45 +02:00
|
|
|
SETGATE(idt[T_SYSCALL], 1, SEG_KCODE<<3, vectors[T_SYSCALL], DPL_USER);
|
2007-08-27 15:34:35 +02:00
|
|
|
|
|
|
|
initlock(&tickslock, "time");
|
2006-06-26 22:31:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2006-07-17 03:25:22 +02:00
|
|
|
idtinit(void)
|
2006-06-26 22:31:52 +02:00
|
|
|
{
|
2007-08-22 08:01:32 +02:00
|
|
|
lidt(idt, sizeof(idt));
|
2006-06-13 17:50:40 +02:00
|
|
|
}
|
|
|
|
|
2009-08-08 10:07:30 +02:00
|
|
|
//PAGEBREAK: 41
|
2006-06-13 17:50:40 +02:00
|
|
|
void
|
2006-07-17 03:58:13 +02:00
|
|
|
trap(struct trapframe *tf)
|
2006-06-13 17:50:40 +02:00
|
|
|
{
|
2007-08-10 19:17:42 +02:00
|
|
|
if(tf->trapno == T_SYSCALL){
|
2009-08-31 08:02:08 +02:00
|
|
|
if(proc->killed)
|
2007-08-28 21:14:43 +02:00
|
|
|
exit();
|
2009-08-31 08:02:08 +02:00
|
|
|
proc->tf = tf;
|
2006-06-15 18:02:20 +02:00
|
|
|
syscall();
|
2009-08-31 08:02:08 +02:00
|
|
|
if(proc->killed)
|
2007-08-28 21:14:43 +02:00
|
|
|
exit();
|
2006-06-15 18:02:20 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-08-10 19:17:42 +02:00
|
|
|
switch(tf->trapno){
|
2009-07-12 03:17:32 +02:00
|
|
|
case T_IRQ0 + IRQ_TIMER:
|
2009-08-31 08:02:08 +02:00
|
|
|
if(cpu->id == 0){
|
2007-08-27 15:34:35 +02:00
|
|
|
acquire(&tickslock);
|
|
|
|
ticks++;
|
|
|
|
wakeup(&ticks);
|
|
|
|
release(&tickslock);
|
2006-07-11 19:39:45 +02:00
|
|
|
}
|
2009-03-08 23:07:13 +01:00
|
|
|
lapiceoi();
|
2007-08-27 15:34:35 +02:00
|
|
|
break;
|
2009-07-12 03:17:32 +02:00
|
|
|
case T_IRQ0 + IRQ_IDE:
|
2009-03-08 23:07:13 +01:00
|
|
|
ideintr();
|
|
|
|
lapiceoi();
|
2006-09-07 18:53:16 +02:00
|
|
|
break;
|
2011-02-20 03:17:55 +01:00
|
|
|
case T_IRQ0 + IRQ_IDE+1:
|
|
|
|
// Bochs generates spurious IDE1 interrupts.
|
|
|
|
break;
|
2009-07-12 03:17:32 +02:00
|
|
|
case T_IRQ0 + IRQ_KBD:
|
2009-03-08 23:07:13 +01:00
|
|
|
kbdintr();
|
|
|
|
lapiceoi();
|
2006-09-07 18:53:16 +02:00
|
|
|
break;
|
2009-07-12 03:17:32 +02:00
|
|
|
case T_IRQ0 + IRQ_COM1:
|
2009-05-31 02:24:11 +02:00
|
|
|
uartintr();
|
|
|
|
lapiceoi();
|
|
|
|
break;
|
2009-07-12 03:17:32 +02:00
|
|
|
case T_IRQ0 + 7:
|
|
|
|
case T_IRQ0 + IRQ_SPURIOUS:
|
2007-09-27 01:32:00 +02:00
|
|
|
cprintf("cpu%d: spurious interrupt at %x:%x\n",
|
2009-08-31 08:02:08 +02:00
|
|
|
cpu->id, tf->cs, tf->eip);
|
2009-03-08 23:07:13 +01:00
|
|
|
lapiceoi();
|
2006-09-07 18:53:16 +02:00
|
|
|
break;
|
2009-09-03 09:46:15 +02:00
|
|
|
|
|
|
|
//PAGEBREAK: 13
|
2006-09-07 18:53:16 +02:00
|
|
|
default:
|
2009-08-31 08:02:08 +02:00
|
|
|
if(proc == 0 || (tf->cs&3) == 0){
|
2007-09-27 01:32:00 +02:00
|
|
|
// In kernel, it must be our mistake.
|
2010-07-02 20:51:53 +02:00
|
|
|
cprintf("unexpected trap %d from cpu %d eip %x (cr2=0x%x)\n",
|
|
|
|
tf->trapno, cpu->id, tf->eip, rcr2());
|
2007-08-28 06:20:13 +02:00
|
|
|
panic("trap");
|
2006-09-07 18:53:16 +02:00
|
|
|
}
|
2007-09-27 01:32:00 +02:00
|
|
|
// In user space, assume process misbehaved.
|
2010-08-31 22:26:08 +02:00
|
|
|
cprintf("pid %d %s: trap %d err %d on cpu %d "
|
|
|
|
"eip 0x%x addr 0x%x--kill proc\n",
|
2010-07-02 20:51:53 +02:00
|
|
|
proc->pid, proc->name, tf->trapno, tf->err, cpu->id, tf->eip,
|
2010-09-01 06:32:27 +02:00
|
|
|
rcr2());
|
2009-08-31 08:02:08 +02:00
|
|
|
proc->killed = 1;
|
2006-08-25 02:43:17 +02:00
|
|
|
}
|
2007-09-27 21:35:25 +02:00
|
|
|
|
2007-08-28 06:20:13 +02:00
|
|
|
// Force process exit if it has been killed and is in user space.
|
|
|
|
// (If it is still executing in the kernel, let it keep running
|
|
|
|
// until it gets to the regular system call return.)
|
2009-08-31 08:02:08 +02:00
|
|
|
if(proc && proc->killed && (tf->cs&3) == DPL_USER)
|
2007-08-28 21:14:43 +02:00
|
|
|
exit();
|
2007-08-27 15:34:35 +02:00
|
|
|
|
2007-08-28 06:20:13 +02:00
|
|
|
// Force process to give up CPU on clock tick.
|
|
|
|
// If interrupts were on while locks held, would need to check nlock.
|
2009-08-31 08:02:08 +02:00
|
|
|
if(proc && proc->state == RUNNING && tf->trapno == T_IRQ0+IRQ_TIMER)
|
2007-08-28 06:20:13 +02:00
|
|
|
yield();
|
2008-10-15 06:57:02 +02:00
|
|
|
|
|
|
|
// Check if the process has been killed since we yielded
|
2009-08-31 08:02:08 +02:00
|
|
|
if(proc && proc->killed && (tf->cs&3) == DPL_USER)
|
2008-10-15 06:57:02 +02:00
|
|
|
exit();
|
2006-06-13 17:50:40 +02:00
|
|
|
}
|