aboutsummaryrefslogtreecommitdiff
path: root/src/kernel
diff options
context:
space:
mode:
authorAlex Auvolat <alex@adnab.me>2015-03-11 11:51:01 +0100
committerAlex Auvolat <alex@adnab.me>2015-03-11 11:51:01 +0100
commitbde334e6393b142d9953328e9ea2881ce88a1a7b (patch)
treef3ed7bbc6c8a534fccbd2cf653e7ecb1f24b9fd4 /src/kernel
parentaa5e2760711c092e1235105ebf097ac594512370 (diff)
downloadkogata-bde334e6393b142d9953328e9ea2881ce88a1a7b.tar.gz
kogata-bde334e6393b142d9953328e9ea2881ce88a1a7b.zip
Begin work on GIP (Graphics Initiation Protocol)
Diffstat (limited to 'src/kernel')
-rw-r--r--src/kernel/core/idt.c2
-rw-r--r--src/kernel/user/process.c4
2 files changed, 3 insertions, 3 deletions
diff --git a/src/kernel/core/idt.c b/src/kernel/core/idt.c
index b94695f..f99460f 100644
--- a/src/kernel/core/idt.c
+++ b/src/kernel/core/idt.c
@@ -122,7 +122,7 @@ void idt_irq_handler(registers_t *regs) {
if (regs->err_code == 0) {
irq0_handler(regs, st);
} else {
- dbg_printf("irq%d.", regs->err_code);
+ /*dbg_printf("irq%d.", regs->err_code);*/
if (irq_handlers[regs->err_code] != 0) {
irq_handlers[regs->err_code](regs);
diff --git a/src/kernel/user/process.c b/src/kernel/user/process.c
index e46fde8..542c294 100644
--- a/src/kernel/user/process.c
+++ b/src/kernel/user/process.c
@@ -726,7 +726,7 @@ void probe_for_read(const void* addr, size_t len) {
process_t *proc = current_process();
user_region_t *r = find_user_region(proc, addr);
if (r == 0 || addr + len > r->addr + r->size || !(r->mode & MM_READ)) {
- dbg_printf("Access violation on read at 0x%p len 0x%p in process %d : exiting.\n",
+ dbg_printf("Access violation (kernel reading user data) at 0x%p len 0x%p in process %d : exiting.\n",
addr, len, proc->pid);
current_process_exit(PS_FAILURE, FAIL_SC_SEGFAULT);
}
@@ -736,7 +736,7 @@ void probe_for_write(const void* addr, size_t len) {
process_t *proc = current_process();
user_region_t *r = find_user_region(proc, addr);
if (r == 0 || addr + len > r->addr + r->size || !(r->mode & MM_WRITE)) {
- dbg_printf("Access violation on write at 0x%p len 0x%p in process %d : exiting.\n",
+ dbg_printf("Access violation (kernel writing user data) at 0x%p len 0x%p in process %d : exiting.\n",
addr, len, proc->pid);
current_process_exit(PS_FAILURE, FAIL_SC_SEGFAULT);
}