2 * Acess2 - x86 Architecture
10 #define MAX_BACKTRACE 8 //!< Maximum distance to trace the stack backwards
13 extern void MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
14 extern void VM8086_GPF(tRegs *Regs);
15 extern void Threads_Dump();
18 void Error_Backtrace(Uint eip, Uint ebp);
21 const char *csaERROR_NAMES[] = {
22 "Divide By Zero", "Debug", "NMI Exception", "INT3",
23 "INTO", "Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
24 "Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
25 "Stack Fault Exception", "GPF", "#PF", "Reserved",
26 "Floating Point Exception", "Alignment Check Exception", "Machine Check Exception", "Reserved",
27 "Reserved", "Reserved", "Reserved", "Reserved",
28 "Reserved", "Reserved", "Reserved", "Reserved",
29 "Reserved", "Reserved", "Reserved", "Reserved"
33 void __stack_chk_fail()
35 Panic("FATAL ERROR: Stack Check Failed\n");
40 * \fn void ErrorHandler(tRegs *Regs)
41 * \brief General Error Handler
43 void ErrorHandler(tRegs *Regs)
46 __asm__ __volatile__ ("cli");
48 //Log_Debug("X86", "Error %i at 0x%08x", Regs->int_num, Regs->eip);
51 if(Regs->int_num == 14)
53 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
54 MM_PageFault( cr, Regs->err_code, Regs );
59 if(Regs->int_num == 13 && Regs->eflags & 0x20000)
65 Warning("CPU Error %i - %s, Code: 0x%x",
66 Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code);
67 Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
68 Warning(" SS:ESP = 0x%04x:%08x", Regs->ss, Regs->esp);
69 Warning(" EFLAGS = 0x%08x", Regs->eflags);
70 Warning(" EAX %08x ECX %08x EDX %08x EBX %08x",
71 Regs->eax, Regs->ecx, Regs->edx, Regs->ebx);
72 Warning(" ESP %08x EBP %08x ESI %08x EDI %08x",
73 Regs->esp, Regs->ebp, Regs->esi, Regs->edi);
74 Warning(" DS %04x ES %04x FS %04x GS %04x",
75 Regs->ds, Regs->es, Regs->fs, Regs->gs);
78 __asm__ __volatile__ ("mov %%cr0, %0":"=r"(cr));
79 Warning(" CR0 0x%08x", cr);
80 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
81 Warning(" CR2 0x%08x", cr);
82 __asm__ __volatile__ ("mov %%cr3, %0":"=r"(cr));
83 Warning(" CR3 0x%08x", cr);
85 switch( Regs->int_num )
88 Warning(" Offending bytes: %02x %02x %02x %02x",
89 *(Uint8*)Regs->eip+0, *(Uint8*)Regs->eip+1,
90 *(Uint8*)Regs->eip+2, *(Uint8*)Regs->eip+3);
94 // Print Stack Backtrace
95 Error_Backtrace(Regs->eip, Regs->ebp);
97 // Dump running threads
100 for(;;) __asm__ __volatile__ ("hlt");
103 * \fn void Error_Backtrace(Uint eip, Uint ebp)
104 * \brief Unrolls the stack to trace execution
106 void Error_Backtrace(Uint eip, Uint ebp)
112 //if(eip < 0xC0000000 && eip > 0x1000)
114 // LogF("Backtrace: User - 0x%x\n", eip);
120 LogF("Backtrace: Data Area - 0x%x\n", eip);
126 LogF("Backtrace: Kernel Module - 0x%x\n", eip);
130 //str = Debug_GetSymbol(eip, &delta);
132 LogF("Backtrace: 0x%x", eip);
134 LogF("Backtrace: %s+0x%x", str, delta);
135 if(!MM_GetPhysAddr(ebp))
137 LogF("\nBacktrace: Invalid EBP, stopping\n");
142 while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
144 //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
146 LogF(" >> 0x%x", *(Uint*)(ebp+4));
148 LogF(" >> %s+0x%x", str, delta);
156 * \fn void StartupPrint(char *Str)
158 void StartupPrint(char *Str)
160 Uint16 *buf = (void*)0xC00B8000;
165 buf[line*80 + i++] = *Str | 0x0700;
169 while(i < 80) buf[line*80 + i++] = 0x0720;
175 memcpy(buf, &buf[80], 80*24*2);
176 memset(&buf[80*24], 0, 80*2);
181 EXPORT(__stack_chk_fail);