2018-09-25 09:22:51 -07:00
|
|
|
#include <inc/mmu.h>
|
|
|
|
#include <inc/x86.h>
|
|
|
|
#include <inc/assert.h>
|
|
|
|
|
|
|
|
#include <kern/pmap.h>
|
|
|
|
#include <kern/trap.h>
|
|
|
|
#include <kern/console.h>
|
|
|
|
#include <kern/monitor.h>
|
|
|
|
#include <kern/env.h>
|
|
|
|
#include <kern/syscall.h>
|
|
|
|
|
|
|
|
static struct Taskstate ts;
|
|
|
|
|
|
|
|
/* For debugging, so print_trapframe can distinguish between printing
|
|
|
|
* a saved trapframe and printing the current trapframe and print some
|
|
|
|
* additional information in the latter case.
|
|
|
|
*/
|
|
|
|
static struct Trapframe *last_tf;
|
|
|
|
|
|
|
|
/* Interrupt descriptor table. (Must be built at run time because
|
|
|
|
* shifted function addresses can't be represented in relocation records.)
|
|
|
|
*/
|
|
|
|
struct Gatedesc idt[256] = { { 0 } };
|
|
|
|
struct Pseudodesc idt_pd = {
|
|
|
|
sizeof(idt) - 1, (uint32_t) idt
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static const char *trapname(int trapno)
|
|
|
|
{
|
|
|
|
static const char * const excnames[] = {
|
|
|
|
"Divide error",
|
|
|
|
"Debug",
|
|
|
|
"Non-Maskable Interrupt",
|
|
|
|
"Breakpoint",
|
|
|
|
"Overflow",
|
|
|
|
"BOUND Range Exceeded",
|
|
|
|
"Invalid Opcode",
|
|
|
|
"Device Not Available",
|
|
|
|
"Double Fault",
|
|
|
|
"Coprocessor Segment Overrun",
|
|
|
|
"Invalid TSS",
|
|
|
|
"Segment Not Present",
|
|
|
|
"Stack Fault",
|
|
|
|
"General Protection",
|
|
|
|
"Page Fault",
|
|
|
|
"(unknown trap)",
|
|
|
|
"x87 FPU Floating-Point Error",
|
|
|
|
"Alignment Check",
|
|
|
|
"Machine-Check",
|
|
|
|
"SIMD Floating-Point Exception"
|
|
|
|
};
|
|
|
|
|
|
|
|
if (trapno < ARRAY_SIZE(excnames))
|
|
|
|
return excnames[trapno];
|
|
|
|
if (trapno == T_SYSCALL)
|
|
|
|
return "System call";
|
|
|
|
return "(unknown trap)";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-04-01 21:22:40 -07:00
|
|
|
// XYZ: write a function declaration here...
|
|
|
|
// e.g., void t_divide();
|
2019-04-23 01:44:23 -07:00
|
|
|
void t_divide();
|
|
|
|
void t_debug();
|
|
|
|
void t_nmi();
|
|
|
|
void t_brkpt();
|
|
|
|
void t_oflow();
|
|
|
|
void t_bound();
|
|
|
|
void t_illop();
|
|
|
|
void t_device();
|
|
|
|
void t_dblflt();
|
|
|
|
void t_tss();
|
|
|
|
void t_segnp();
|
|
|
|
void t_stack();
|
|
|
|
void t_gpflt();
|
|
|
|
void t_pgflt();
|
|
|
|
void t_fperr();
|
|
|
|
void t_align();
|
|
|
|
void t_mchk();
|
|
|
|
void t_simderr();
|
|
|
|
void t_syscall();
|
|
|
|
void t_default();
|
2019-04-01 21:22:40 -07:00
|
|
|
|
2018-09-25 09:22:51 -07:00
|
|
|
void
|
|
|
|
trap_init(void)
|
|
|
|
{
|
|
|
|
extern struct Segdesc gdt[];
|
|
|
|
|
2019-04-01 21:22:40 -07:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* HINT
|
|
|
|
* Do something like this: SETGATE(idt[T_DIVIDE], 0, GD_KT, t_divide, 0);
|
|
|
|
* if your trap handler's name for divide by zero is t_device.
|
|
|
|
* Additionally, you should declare trap handler as a function
|
|
|
|
* to refer that in C code... (see the comment XYZ above)
|
|
|
|
*
|
|
|
|
*/
|
2018-09-25 09:22:51 -07:00
|
|
|
// LAB 3: Your code here.
|
2019-04-23 01:44:23 -07:00
|
|
|
SETGATE(idt[T_DIVIDE], 0, GD_KT, t_divide, 0);
|
|
|
|
SETGATE(idt[T_DEBUG], 0, GD_KT, t_debug, 0);
|
|
|
|
SETGATE(idt[T_NMI], 0, GD_KT, t_nmi, 0);
|
2019-04-23 14:26:02 -07:00
|
|
|
SETGATE(idt[T_BRKPT], 0, GD_KT, t_brkpt, 3);
|
2019-04-23 01:44:23 -07:00
|
|
|
SETGATE(idt[T_OFLOW], 0, GD_KT, t_oflow, 0);
|
|
|
|
SETGATE(idt[T_BOUND], 0, GD_KT, t_bound, 0);
|
|
|
|
SETGATE(idt[T_ILLOP], 0, GD_KT, t_illop, 0);
|
|
|
|
SETGATE(idt[T_DEVICE], 0, GD_KT, t_device, 0);
|
|
|
|
SETGATE(idt[T_DBLFLT], 0, GD_KT, t_dblflt, 0);
|
|
|
|
SETGATE(idt[T_TSS], 0, GD_KT, t_tss, 0);
|
|
|
|
SETGATE(idt[T_SEGNP], 0, GD_KT, t_segnp, 0);
|
|
|
|
SETGATE(idt[T_STACK], 0, GD_KT, t_stack, 0);
|
|
|
|
SETGATE(idt[T_GPFLT], 0, GD_KT, t_gpflt, 0);
|
|
|
|
SETGATE(idt[T_PGFLT], 0, GD_KT, t_pgflt, 0);
|
|
|
|
SETGATE(idt[T_FPERR], 0, GD_KT, t_fperr, 0);
|
|
|
|
SETGATE(idt[T_ALIGN], 0, GD_KT, t_align, 0);
|
|
|
|
SETGATE(idt[T_MCHK], 0, GD_KT, t_mchk, 0);
|
|
|
|
SETGATE(idt[T_SIMDERR], 0, GD_KT, t_simderr, 0);
|
|
|
|
SETGATE(idt[T_SYSCALL], 0, GD_KT, t_syscall, 3);
|
|
|
|
SETGATE(idt[T_DEFAULT], 0, GD_KT, t_default, 0);
|
2018-09-25 09:22:51 -07:00
|
|
|
|
2019-04-01 21:22:40 -07:00
|
|
|
// Per-CPU setup
|
2018-09-25 09:22:51 -07:00
|
|
|
trap_init_percpu();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize and load the per-CPU TSS and IDT
|
|
|
|
void
|
|
|
|
trap_init_percpu(void)
|
|
|
|
{
|
|
|
|
// Setup a TSS so that we get the right stack
|
|
|
|
// when we trap to the kernel.
|
|
|
|
ts.ts_esp0 = KSTACKTOP;
|
|
|
|
ts.ts_ss0 = GD_KD;
|
|
|
|
ts.ts_iomb = sizeof(struct Taskstate);
|
|
|
|
|
|
|
|
// Initialize the TSS slot of the gdt.
|
|
|
|
gdt[GD_TSS0 >> 3] = SEG16(STS_T32A, (uint32_t) (&ts),
|
|
|
|
sizeof(struct Taskstate) - 1, 0);
|
|
|
|
gdt[GD_TSS0 >> 3].sd_s = 0;
|
|
|
|
|
|
|
|
// Load the TSS selector (like other segment selectors, the
|
|
|
|
// bottom three bits are special; we leave them 0)
|
|
|
|
ltr(GD_TSS0);
|
|
|
|
|
|
|
|
// Load the IDT
|
|
|
|
lidt(&idt_pd);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
print_trapframe(struct Trapframe *tf)
|
|
|
|
{
|
|
|
|
cprintf("TRAP frame at %p\n", tf);
|
|
|
|
print_regs(&tf->tf_regs);
|
|
|
|
cprintf(" es 0x----%04x\n", tf->tf_es);
|
|
|
|
cprintf(" ds 0x----%04x\n", tf->tf_ds);
|
|
|
|
cprintf(" trap 0x%08x %s\n", tf->tf_trapno, trapname(tf->tf_trapno));
|
|
|
|
// If this trap was a page fault that just happened
|
|
|
|
// (so %cr2 is meaningful), print the faulting linear address.
|
|
|
|
if (tf == last_tf && tf->tf_trapno == T_PGFLT)
|
|
|
|
cprintf(" cr2 0x%08x\n", rcr2());
|
|
|
|
cprintf(" err 0x%08x", tf->tf_err);
|
|
|
|
// For page faults, print decoded fault error code:
|
|
|
|
// U/K=fault occurred in user/kernel mode
|
|
|
|
// W/R=a write/read caused the fault
|
|
|
|
// PR=a protection violation caused the fault (NP=page not present).
|
|
|
|
if (tf->tf_trapno == T_PGFLT)
|
|
|
|
cprintf(" [%s, %s, %s]\n",
|
|
|
|
tf->tf_err & 4 ? "user" : "kernel",
|
|
|
|
tf->tf_err & 2 ? "write" : "read",
|
|
|
|
tf->tf_err & 1 ? "protection" : "not-present");
|
|
|
|
else
|
|
|
|
cprintf("\n");
|
|
|
|
cprintf(" eip 0x%08x\n", tf->tf_eip);
|
|
|
|
cprintf(" cs 0x----%04x\n", tf->tf_cs);
|
|
|
|
cprintf(" flag 0x%08x\n", tf->tf_eflags);
|
|
|
|
if ((tf->tf_cs & 3) != 0) {
|
|
|
|
cprintf(" esp 0x%08x\n", tf->tf_esp);
|
|
|
|
cprintf(" ss 0x----%04x\n", tf->tf_ss);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
print_regs(struct PushRegs *regs)
|
|
|
|
{
|
|
|
|
cprintf(" edi 0x%08x\n", regs->reg_edi);
|
|
|
|
cprintf(" esi 0x%08x\n", regs->reg_esi);
|
|
|
|
cprintf(" ebp 0x%08x\n", regs->reg_ebp);
|
|
|
|
cprintf(" oesp 0x%08x\n", regs->reg_oesp);
|
|
|
|
cprintf(" ebx 0x%08x\n", regs->reg_ebx);
|
|
|
|
cprintf(" edx 0x%08x\n", regs->reg_edx);
|
|
|
|
cprintf(" ecx 0x%08x\n", regs->reg_ecx);
|
|
|
|
cprintf(" eax 0x%08x\n", regs->reg_eax);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
trap_dispatch(struct Trapframe *tf)
|
|
|
|
{
|
|
|
|
// Handle processor exceptions.
|
|
|
|
// LAB 3: Your code here.
|
2019-04-23 14:26:02 -07:00
|
|
|
if (tf->tf_trapno == T_PGFLT) {
|
|
|
|
page_fault_handler(tf);
|
2019-04-23 16:31:01 -07:00
|
|
|
return;
|
2019-04-23 14:26:02 -07:00
|
|
|
} else if (tf->tf_trapno == T_BRKPT) {
|
|
|
|
monitor(tf);
|
2019-04-23 16:31:01 -07:00
|
|
|
return;
|
2019-04-23 16:14:41 -07:00
|
|
|
} else if (tf->tf_trapno == T_SYSCALL) {
|
2019-04-23 17:10:35 -07:00
|
|
|
int32_t returned = syscall(tf->tf_regs.reg_eax,
|
2019-04-23 16:14:41 -07:00
|
|
|
tf->tf_regs.reg_edx,
|
|
|
|
tf->tf_regs.reg_ecx,
|
|
|
|
tf->tf_regs.reg_ebx,
|
|
|
|
tf->tf_regs.reg_edi,
|
|
|
|
tf->tf_regs.reg_esi);
|
2019-04-23 17:10:35 -07:00
|
|
|
tf->tf_regs.reg_eax = returned;
|
2019-04-23 16:31:01 -07:00
|
|
|
return;
|
2019-04-23 14:26:02 -07:00
|
|
|
}
|
2018-09-25 09:22:51 -07:00
|
|
|
|
|
|
|
// Unexpected trap: The user process or the kernel has a bug.
|
|
|
|
print_trapframe(tf);
|
|
|
|
if (tf->tf_cs == GD_KT)
|
|
|
|
panic("unhandled trap in kernel");
|
|
|
|
else {
|
|
|
|
env_destroy(curenv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
trap(struct Trapframe *tf)
|
|
|
|
{
|
|
|
|
// The environment may have set DF and some versions
|
|
|
|
// of GCC rely on DF being clear
|
|
|
|
asm volatile("cld" ::: "cc");
|
|
|
|
|
|
|
|
// Check that interrupts are disabled. If this assertion
|
|
|
|
// fails, DO NOT be tempted to fix it by inserting a "cli" in
|
|
|
|
// the interrupt path.
|
|
|
|
assert(!(read_eflags() & FL_IF));
|
|
|
|
|
|
|
|
cprintf("Incoming TRAP frame at %p\n", tf);
|
|
|
|
|
|
|
|
if ((tf->tf_cs & 3) == 3) {
|
|
|
|
// Trapped from user mode.
|
|
|
|
assert(curenv);
|
|
|
|
|
|
|
|
// Copy trap frame (which is currently on the stack)
|
|
|
|
// into 'curenv->env_tf', so that running the environment
|
|
|
|
// will restart at the trap point.
|
|
|
|
curenv->env_tf = *tf;
|
|
|
|
// The trapframe on the stack should be ignored from here on.
|
|
|
|
tf = &curenv->env_tf;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Record that tf is the last real trapframe so
|
|
|
|
// print_trapframe can print some additional information.
|
|
|
|
last_tf = tf;
|
|
|
|
|
|
|
|
// Dispatch based on what type of trap occurred
|
|
|
|
trap_dispatch(tf);
|
|
|
|
|
|
|
|
// Return to the current environment, which should be running.
|
|
|
|
assert(curenv && curenv->env_status == ENV_RUNNING);
|
|
|
|
env_run(curenv);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
page_fault_handler(struct Trapframe *tf)
|
|
|
|
{
|
|
|
|
uint32_t fault_va;
|
|
|
|
|
|
|
|
// Read processor's CR2 register to find the faulting address
|
|
|
|
fault_va = rcr2();
|
|
|
|
|
|
|
|
// Handle kernel-mode page faults.
|
|
|
|
|
|
|
|
// LAB 3: Your code here.
|
|
|
|
|
|
|
|
// We've already handled kernel-mode exceptions, so if we get here,
|
|
|
|
// the page fault happened in user mode.
|
|
|
|
|
|
|
|
// Destroy the environment that caused the fault.
|
|
|
|
cprintf("[%08x] user fault va %08x ip %08x\n",
|
|
|
|
curenv->env_id, fault_va, tf->tf_eip);
|
|
|
|
print_trapframe(tf);
|
|
|
|
env_destroy(curenv);
|
|
|
|
}
|
|
|
|
|