xv6-65oo2/trap.c

99 lines
2.2 KiB
C
Raw Normal View History

2006-06-13 15:50:40 +00:00
#include "types.h"
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "defs.h"
#include "x86.h"
2006-06-15 16:02:20 +00:00
#include "traps.h"
#include "syscall.h"
2006-06-13 15:50:40 +00:00
2006-09-07 14:12:30 +00:00
// Interrupt descriptor table (shared by all CPUs).
struct gatedesc idt[256];
2006-09-07 14:12:30 +00:00
2006-09-06 19:08:14 +00:00
extern uint vectors[]; // in vectors.S: array of 256 entry pointers
2006-06-13 15:50:40 +00:00
void
2006-07-17 01:25:22 +00:00
tvinit(void)
2006-06-13 15:50:40 +00:00
{
int i;
for(i = 0; i < 256; i++){
2006-06-15 16:02:20 +00:00
SETGATE(idt[i], 1, SEG_KCODE << 3, vectors[i], 0);
2006-06-13 15:50:40 +00:00
}
2006-09-04 12:41:27 +00:00
SETGATE(idt[T_SYSCALL], 1, SEG_KCODE << 3, vectors[T_SYSCALL], 3);
}
void
2006-07-17 01:25:22 +00:00
idtinit(void)
{
lidt(idt, sizeof idt);
2006-06-13 15:50:40 +00:00
}
void
trap(struct trapframe *tf)
2006-06-13 15:50:40 +00:00
{
int v = tf->trapno;
2006-06-15 16:02:20 +00:00
if(v == T_SYSCALL){
struct proc *cp = curproc[cpu()];
if(cp->killed)
proc_exit();
cp->tf = tf;
2006-06-15 16:02:20 +00:00
syscall();
if(cp->killed)
proc_exit();
2006-06-15 16:02:20 +00:00
return;
}
2006-06-28 16:35:03 +00:00
if(v == (IRQ_OFFSET + IRQ_TIMER)){
struct proc *cp = curproc[cpu()];
2006-06-28 16:35:03 +00:00
lapic_timerintr();
if(cp){
2006-07-16 02:09:45 +00:00
// Force process exit if it has been killed
// and the interrupt came from user space.
// (If the kernel was executing at time of interrupt,
// don't kill the process. Let the process get back
// out to its regular system call return.)
if((tf->cs&3) == 3 && cp->killed)
proc_exit();
2006-09-06 17:27:19 +00:00
2006-07-16 02:09:45 +00:00
// Force process to give up CPU and let others run.
if(cp->state == RUNNING)
yield();
}
2006-06-15 16:02:20 +00:00
return;
}
2006-09-07 14:12:30 +00:00
if(v == IRQ_OFFSET + IRQ_IDE){
ide_intr();
cli(); // prevent a waiting interrupt from overflowing stack
lapic_eoi();
return;
}
2006-06-15 16:02:20 +00:00
2006-09-07 14:12:30 +00:00
if(v == IRQ_OFFSET + IRQ_KBD){
kbd_intr();
cli(); // prevent a waiting interrupt from overflowing stack
lapic_eoi();
return;
}
2006-09-07 14:12:30 +00:00
if(v == IRQ_OFFSET + IRQ_SPURIOUS){
2006-09-03 18:32:58 +00:00
cprintf("spurious interrupt from cpu %d eip %x\n", cpu(), tf->eip);
return; // no eoi for this one.
}
if(curproc[cpu()]) {
2006-09-07 14:12:30 +00:00
// assume process caused unexpected trap,
// for example by dividing by zero or dereferencing a bad pointer
2006-09-06 19:08:14 +00:00
cprintf("pid %d: unhandled trap %d on cpu %d eip %x -- kill proc\n",
curproc[cpu()]->pid, v, cpu(), tf->eip);
proc_exit();
}
2006-09-07 14:12:30 +00:00
// otherwise it's our mistake
2006-09-03 18:32:58 +00:00
cprintf("unexpected trap %d from cpu %d eip %x\n", v, cpu(), tf->eip);
panic("trap");
2006-06-13 15:50:40 +00:00
}