source: mainline/kernel/generic/src/interrupt/interrupt.c@ 8f4f444

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 8f4f444 was 8f4f444, checked in by Jakub Jermar <jakub@…>, 13 years ago

Add a variant of fault_if_from_uspace() that doesn't check whether
the istate is from uspace.

  • Property mode set to 100644
File size: 8.7 KB
Line 
1/*
2 * Copyright (c) 2005 Ondrej Palkovsky
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup genericinterrupt
30 * @{
31 */
32/**
33 * @file
34 * @brief Interrupt redirector.
35 *
36 * This file provides means of registering interrupt handlers
37 * by kernel functions and calling the handlers when interrupts
38 * occur.
39 *
40 */
41
42#include <interrupt.h>
43#include <debug.h>
44#include <console/kconsole.h>
45#include <console/console.h>
46#include <console/cmd.h>
47#include <synch/mutex.h>
48#include <time/delay.h>
49#include <macros.h>
50#include <panic.h>
51#include <print.h>
52#include <stdarg.h>
53#include <symtab.h>
54#include <proc/thread.h>
55#include <arch/cycle.h>
56#include <str.h>
57#include <trace.h>
58
59exc_table_t exc_table[IVT_ITEMS];
60IRQ_SPINLOCK_INITIALIZE(exctbl_lock);
61
62/** Register exception handler
63 *
64 * @param n Exception number.
65 * @param name Description.
66 * @param hot Whether the exception is actually handled
67 * in any meaningful way.
68 * @param handler New exception handler.
69 *
70 * @return Previously registered exception handler.
71 *
72 */
73iroutine_t exc_register(unsigned int n, const char *name, bool hot,
74 iroutine_t handler)
75{
76#if (IVT_ITEMS > 0)
77 ASSERT(n < IVT_ITEMS);
78#endif
79
80 irq_spinlock_lock(&exctbl_lock, true);
81
82 iroutine_t old = exc_table[n].handler;
83 exc_table[n].handler = handler;
84 exc_table[n].name = name;
85 exc_table[n].hot = hot;
86 exc_table[n].cycles = 0;
87 exc_table[n].count = 0;
88
89 irq_spinlock_unlock(&exctbl_lock, true);
90
91 return old;
92}
93
94/** Dispatch exception according to exception table
95 *
96 * Called directly from the assembler code.
97 * CPU is interrupts_disable()'d.
98 *
99 */
100NO_TRACE void exc_dispatch(unsigned int n, istate_t *istate)
101{
102#if (IVT_ITEMS > 0)
103 ASSERT(n < IVT_ITEMS);
104#endif
105
106 /* Account user cycles */
107 if (THREAD) {
108 irq_spinlock_lock(&THREAD->lock, false);
109 thread_update_accounting(true);
110 irq_spinlock_unlock(&THREAD->lock, false);
111 }
112
113 /* Account CPU usage if it has waked up from sleep */
114 if (CPU) {
115 irq_spinlock_lock(&CPU->lock, false);
116 if (CPU->idle) {
117 uint64_t now = get_cycle();
118 CPU->idle_cycles += now - CPU->last_cycle;
119 CPU->last_cycle = now;
120 CPU->idle = false;
121 }
122 irq_spinlock_unlock(&CPU->lock, false);
123 }
124
125 uint64_t begin_cycle = get_cycle();
126
127#ifdef CONFIG_UDEBUG
128 if (THREAD)
129 THREAD->udebug.uspace_state = istate;
130#endif
131
132 exc_table[n].handler(n + IVT_FIRST, istate);
133
134#ifdef CONFIG_UDEBUG
135 if (THREAD)
136 THREAD->udebug.uspace_state = NULL;
137#endif
138
139 /* This is a safe place to exit exiting thread */
140 if ((THREAD) && (THREAD->interrupted) && (istate_from_uspace(istate)))
141 thread_exit();
142
143 /* Account exception handling */
144 uint64_t end_cycle = get_cycle();
145
146 irq_spinlock_lock(&exctbl_lock, false);
147 exc_table[n].cycles += end_cycle - begin_cycle;
148 exc_table[n].count++;
149 irq_spinlock_unlock(&exctbl_lock, false);
150
151 /* Do not charge THREAD for exception cycles */
152 if (THREAD) {
153 irq_spinlock_lock(&THREAD->lock, false);
154 THREAD->last_cycle = end_cycle;
155 irq_spinlock_unlock(&THREAD->lock, false);
156 }
157}
158
159/** Default 'null' exception handler
160 *
161 */
162NO_TRACE static void exc_undef(unsigned int n, istate_t *istate)
163{
164 fault_if_from_uspace(istate, "Unhandled exception %u.", n);
165 panic_badtrap(istate, n, "Unhandled exception %u.", n);
166}
167
168static NO_TRACE void fault_from_uspace_core(istate_t *istate, const char *fmt, va_list args)
169{
170 printf("Task %s (%" PRIu64 ") killed due to an exception at "
171 "program counter %p.\n", TASK->name, TASK->taskid,
172 (void *) istate_get_pc(istate));
173
174 istate_decode(istate);
175 stack_trace_istate(istate);
176
177 printf("Kill message: ");
178 vprintf(fmt, args);
179 printf("\n");
180
181 task_kill_self(true);
182}
183
184/** Terminate thread and task after the exception came from userspace.
185 *
186 */
187NO_TRACE void fault_from_uspace(istate_t *istate, const char *fmt, ...)
188{
189 va_list args;
190
191 va_start(args, fmt);
192 fault_from_uspace_core(istate, fmt, args);
193 va_end(args);
194}
195
196/** Terminate thread and task if exception came from userspace.
197 *
198 */
199NO_TRACE void fault_if_from_uspace(istate_t *istate, const char *fmt, ...)
200{
201 if (!istate_from_uspace(istate))
202 return;
203
204 va_list args;
205 va_start(args, fmt);
206 fault_from_uspace_core(istate, fmt, args);
207 va_end(args);
208}
209
210/** Get istate structure of a thread.
211 *
212 * Get pointer to the istate structure at the bottom of the kernel stack.
213 *
214 * This function can be called in interrupt or user context. In interrupt
215 * context the istate structure is created by the low-level exception
216 * handler. In user context the istate structure is created by the
217 * low-level syscall handler.
218 */
219istate_t *istate_get(thread_t *thread)
220{
221 /*
222 * The istate structure should be right at the bottom of the kernel
223 * stack.
224 */
225 return (istate_t *) ((uint8_t *)
226 thread->kstack + STACK_SIZE - sizeof(istate_t));
227}
228
229#ifdef CONFIG_KCONSOLE
230
231static char flag_buf[MAX_CMDLINE + 1];
232
233/** Print all exceptions
234 *
235 */
236NO_TRACE static int cmd_exc_print(cmd_arg_t *argv)
237{
238 bool excs_all;
239
240 if (str_cmp(flag_buf, "-a") == 0)
241 excs_all = true;
242 else if (str_cmp(flag_buf, "") == 0)
243 excs_all = false;
244 else {
245 printf("Unknown argument \"%s\".\n", flag_buf);
246 return 1;
247 }
248
249#if (IVT_ITEMS > 0)
250 unsigned int i;
251 unsigned int rows;
252
253 irq_spinlock_lock(&exctbl_lock, true);
254
255#ifdef __32_BITS__
256 printf("[exc ] [description ] [count ] [cycles ]"
257 " [handler ] [symbol\n");
258 rows = 1;
259#endif
260
261#ifdef __64_BITS__
262 printf("[exc ] [description ] [count ] [cycles ]"
263 " [handler ]\n");
264 printf(" [symbol\n");
265 rows = 2;
266#endif
267
268 for (i = 0; i < IVT_ITEMS; i++) {
269 if ((!excs_all) && (!exc_table[i].hot))
270 continue;
271
272 uint64_t count;
273 char count_suffix;
274
275 order_suffix(exc_table[i].count, &count, &count_suffix);
276
277 uint64_t cycles;
278 char cycles_suffix;
279
280 order_suffix(exc_table[i].cycles, &cycles, &cycles_suffix);
281
282 const char *symbol =
283 symtab_fmt_name_lookup((sysarg_t) exc_table[i].handler);
284
285#ifdef __32_BITS__
286 printf("%-8u %-20s %9" PRIu64 "%c %9" PRIu64 "%c %10p %s\n",
287 i + IVT_FIRST, exc_table[i].name, count, count_suffix,
288 cycles, cycles_suffix, exc_table[i].handler, symbol);
289
290 PAGING(rows, 1, irq_spinlock_unlock(&exctbl_lock, true),
291 irq_spinlock_lock(&exctbl_lock, true));
292#endif
293
294#ifdef __64_BITS__
295 printf("%-8u %-20s %9" PRIu64 "%c %9" PRIu64 "%c %18p\n",
296 i + IVT_FIRST, exc_table[i].name, count, count_suffix,
297 cycles, cycles_suffix, exc_table[i].handler);
298 printf(" %s\n", symbol);
299
300 PAGING(rows, 2, irq_spinlock_unlock(&exctbl_lock, true),
301 irq_spinlock_lock(&exctbl_lock, true));
302#endif
303 }
304
305 irq_spinlock_unlock(&exctbl_lock, true);
306#else /* (IVT_ITEMS > 0) */
307
308 printf("No exception table%s.\n", excs_all ? " (showing all exceptions)" : "");
309
310#endif /* (IVT_ITEMS > 0) */
311
312 return 1;
313}
314
315static cmd_arg_t exc_argv = {
316 .type = ARG_TYPE_STRING_OPTIONAL,
317 .buffer = flag_buf,
318 .len = sizeof(flag_buf)
319};
320
321static cmd_info_t exc_info = {
322 .name = "exc",
323 .description = "Print exception table (use -a for all exceptions).",
324 .func = cmd_exc_print,
325 .help = NULL,
326 .argc = 1,
327 .argv = &exc_argv
328};
329
330#endif /* CONFIG_KCONSOLE */
331
332/** Initialize generic exception handling support
333 *
334 */
335void exc_init(void)
336{
337 (void) exc_undef;
338
339#if (IVT_ITEMS > 0)
340 unsigned int i;
341
342 for (i = 0; i < IVT_ITEMS; i++)
343 exc_register(i, "undef", false, (iroutine_t) exc_undef);
344#endif
345
346#ifdef CONFIG_KCONSOLE
347 cmd_initialize(&exc_info);
348 if (!cmd_register(&exc_info))
349 printf("Cannot register command %s\n", exc_info.name);
350#endif
351}
352
353/** @}
354 */
Note: See TracBrowser for help on using the repository browser.