xv6-65oo2/trap.c

108 lines
2.4 KiB
C
Raw Normal View History

2006-06-13 15:50:40 +00:00
#include "types.h"
2007-08-27 23:26:33 +00:00
#include "defs.h"
2006-06-13 15:50:40 +00:00
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "x86.h"
2006-06-15 16:02:20 +00:00
#include "traps.h"
2007-08-27 13:34:35 +00:00
#include "spinlock.h"
2006-06-13 15:50:40 +00:00
2006-09-07 14:12:30 +00:00
// Interrupt descriptor table (shared by all CPUs).
struct gatedesc idt[256];
2006-09-06 19:08:14 +00:00
extern uint vectors[]; // in vectors.S: array of 256 entry pointers
2007-08-27 13:34:35 +00:00
struct spinlock tickslock;
uint ticks;
2006-06-13 15:50:40 +00:00
void
2006-07-17 01:25:22 +00:00
tvinit(void)
2006-06-13 15:50:40 +00:00
{
int i;
2006-09-07 16:53:16 +00:00
for(i = 0; i < 256; i++)
SETGATE(idt[i], 0, SEG_KCODE<<3, vectors[i], 0);
SETGATE(idt[T_SYSCALL], 1, SEG_KCODE<<3, vectors[T_SYSCALL], DPL_USER);
2007-08-27 13:34:35 +00:00
initlock(&tickslock, "time");
}
void
2006-07-17 01:25:22 +00:00
idtinit(void)
{
lidt(idt, sizeof(idt));
2006-06-13 15:50:40 +00:00
}
//PAGEBREAK: 41
2006-06-13 15:50:40 +00:00
void
trap(struct trapframe *tf)
2006-06-13 15:50:40 +00:00
{
2007-08-10 17:17:42 +00:00
if(tf->trapno == T_SYSCALL){
if(proc->killed)
exit();
proc->tf = tf;
2006-06-15 16:02:20 +00:00
syscall();
if(proc->killed)
exit();
2006-06-15 16:02:20 +00:00
return;
}
2007-08-10 17:17:42 +00:00
switch(tf->trapno){
case T_IRQ0 + IRQ_TIMER:
if(cpu->id == 0){
2007-08-27 13:34:35 +00:00
acquire(&tickslock);
ticks++;
wakeup(&ticks);
release(&tickslock);
}
lapiceoi();
2007-08-27 13:34:35 +00:00
break;
case T_IRQ0 + IRQ_IDE:
ideintr();
lapiceoi();
2006-09-07 16:53:16 +00:00
break;
case T_IRQ0 + IRQ_KBD:
kbdintr();
lapiceoi();
2006-09-07 16:53:16 +00:00
break;
case T_IRQ0 + IRQ_COM1:
uartintr();
lapiceoi();
break;
case T_IRQ0 + 7:
case T_IRQ0 + IRQ_SPURIOUS:
2007-09-26 23:32:00 +00:00
cprintf("cpu%d: spurious interrupt at %x:%x\n",
cpu->id, tf->cs, tf->eip);
lapiceoi();
2006-09-07 16:53:16 +00:00
break;
2009-09-03 07:46:15 +00:00
//PAGEBREAK: 13
2006-09-07 16:53:16 +00:00
default:
if(proc == 0 || (tf->cs&3) == 0){
2007-09-26 23:32:00 +00:00
// In kernel, it must be our mistake.
cprintf("unexpected trap %d from cpu %d eip %x (cr2=0x%x)\n",
tf->trapno, cpu->id, tf->eip, rcr2());
panic("trap");
2006-09-07 16:53:16 +00:00
}
2007-09-26 23:32:00 +00:00
// In user space, assume process misbehaved.
2010-08-31 20:26:08 +00:00
cprintf("pid %d %s: trap %d err %d on cpu %d "
"eip 0x%x addr 0x%x--kill proc\n",
proc->pid, proc->name, tf->trapno, tf->err, cpu->id, tf->eip,
rcr2());
proc->killed = 1;
}
2007-09-27 19:35:25 +00:00
// Force process exit if it has been killed and is in user space.
// (If it is still executing in the kernel, let it keep running
// until it gets to the regular system call return.)
if(proc && proc->killed && (tf->cs&3) == DPL_USER)
exit();
2007-08-27 13:34:35 +00:00
// Force process to give up CPU on clock tick.
// If interrupts were on while locks held, would need to check nlock.
if(proc && proc->state == RUNNING && tf->trapno == T_IRQ0+IRQ_TIMER)
yield();
// Check if the process has been killed since we yielded
if(proc && proc->killed && (tf->cs&3) == DPL_USER)
exit();
2006-06-13 15:50:40 +00:00
}