2 * Acess2 - x86 Architecture
10 #define MAX_BACKTRACE 8 //!< Maximum distance to trace the stack backwards
13 extern void MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
14 extern void VM8086_GPF(tRegs *Regs);
15 extern void Threads_Dump();
18 void Error_Backtrace(Uint eip, Uint ebp);
21 const char *csaERROR_NAMES[] = {
22 "Divide By Zero", "Debug", "NMI Exception", "INT3",
23 "INTO", "Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
24 "Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
25 "Stack Fault Exception", "GPF", "#PF", "Reserved",
26 "Floating Point Exception", "Alignment Check Exception", "Machine Check Exception", "Reserved",
27 "Reserved", "Reserved", "Reserved", "Reserved",
28 "Reserved", "Reserved", "Reserved", "Reserved",
29 "Reserved", "Reserved", "Reserved", "Reserved"
33 void __stack_chk_fail()
35 Panic("FATAL ERROR: Stack Check Failed\n");
40 * \fn void ErrorHandler(tRegs *Regs)
41 * \brief General Error Handler
43 void ErrorHandler(tRegs *Regs)
47 //if( Regs && !(Regs->int_num == 13 && Regs->eflags & 0x20000) )
48 // __asm__ __volatile__ ("xchg %bx, %bx");
49 //Log_Debug("X86", "Regs = %p", Regs);
50 //Log_Debug("X86", "Error %i at 0x%08x", Regs->int_num, Regs->eip);
52 __asm__ __volatile__ ("cli");
55 if(Regs->int_num == 14)
57 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
58 MM_PageFault( cr, Regs->err_code, Regs );
63 if(Regs->int_num == 13 && Regs->eflags & 0x20000)
69 Warning("CPU Error %i - %s, Code: 0x%x",
70 Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code);
71 Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
73 Warning(" SS:ESP = 0x0010:%08x", 0x10, (Uint)Regs+sizeof(tRegs));
75 Warning(" SS:ESP = 0x%04x:%08x", Regs->ss, Regs->esp);
76 Warning(" EFLAGS = 0x%08x", Regs->eflags);
77 Warning(" EAX %08x ECX %08x EDX %08x EBX %08x",
78 Regs->eax, Regs->ecx, Regs->edx, Regs->ebx);
79 Warning(" ESP %08x EBP %08x ESI %08x EDI %08x",
80 Regs->esp, Regs->ebp, Regs->esi, Regs->edi);
81 Warning(" DS %04x ES %04x FS %04x GS %04x",
82 Regs->ds, Regs->es, Regs->fs, Regs->gs);
85 __asm__ __volatile__ ("mov %%cr0, %0":"=r"(cr));
86 Warning(" CR0 0x%08x", cr);
87 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
88 Warning(" CR2 0x%08x", cr);
89 __asm__ __volatile__ ("mov %%cr3, %0":"=r"(cr));
90 Warning(" CR3 0x%08x", cr);
92 switch( Regs->int_num )
95 Warning(" Offending bytes: %02x %02x %02x %02x",
96 *(Uint8*)Regs->eip+0, *(Uint8*)Regs->eip+1,
97 *(Uint8*)Regs->eip+2, *(Uint8*)Regs->eip+3);
101 // Print Stack Backtrace
102 Error_Backtrace(Regs->eip, Regs->ebp);
104 // Dump running threads
107 for(;;) __asm__ __volatile__ ("hlt");
110 * \fn void Error_Backtrace(Uint eip, Uint ebp)
111 * \brief Unrolls the stack to trace execution
113 void Error_Backtrace(Uint eip, Uint ebp)
119 //if(eip < 0xC0000000 && eip > 0x1000)
121 // LogF("Backtrace: User - 0x%x\n", eip);
127 LogF("Backtrace: Data Area - 0x%x\n", eip);
133 LogF("Backtrace: Kernel Module - 0x%x\n", eip);
137 //str = Debug_GetSymbol(eip, &delta);
139 LogF("Backtrace: 0x%x", eip);
141 LogF("Backtrace: %s+0x%x", str, delta);
142 if(!MM_GetPhysAddr(ebp))
144 LogF("\nBacktrace: Invalid EBP, stopping\n");
149 while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
151 //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
153 LogF(" >> 0x%x", *(Uint*)(ebp+4));
155 LogF(" >> %s+0x%x", str, delta);
163 * \fn void StartupPrint(char *Str)
165 void StartupPrint(char *Str)
167 Uint16 *buf = (void*)0xC00B8000;
172 buf[line*80 + i++] = *Str | 0x0700;
176 while(i < 80) buf[line*80 + i++] = 0x0720;
182 memcpy(buf, &buf[80], 80*24*2);
183 memset(&buf[80*24], 0, 80*2);
188 EXPORT(__stack_chk_fail);