2 * Acess2 - x86 Architecture
10 #define MAX_BACKTRACE 8 //!< Maximum distance to trace the stack backwards
13 extern void MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
14 extern void Threads_Dump();
17 void Error_Backtrace(Uint eip, Uint ebp);
20 const char *csaERROR_NAMES[] = {
21 "Divide By Zero", "Debug", "NMI Exception", "INT3",
22 "INTO", "Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
23 "Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
24 "Stack Fault Exception", "GPF", "#PF", "Reserved",
25 "Floating Point Exception", "Alignment Check Exception", "Machine Check Exception", "Reserved",
26 "Reserved", "Reserved", "Reserved", "Reserved",
27 "Reserved", "Reserved", "Reserved", "Reserved",
28 "Reserved", "Reserved", "Reserved", "Reserved"
32 void __stack_chk_fail()
34 Panic("FATAL ERROR: Stack Check Failed\n");
39 * \fn void ErrorHandler(tRegs *Regs)
40 * \brief General Error Handler
42 void ErrorHandler(tRegs *Regs)
45 __asm__ __volatile__ ("cli");
47 if(Regs->int_num == 14)
49 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
50 MM_PageFault( cr, Regs->err_code, Regs );
54 Warning("CPU Error %i - %s, Code: 0x%x",
55 Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code);
56 Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
57 Warning(" SS:ESP = 0x%04x:%08x", Regs->ss, Regs->esp);
58 Warning(" EFLAGS = 0x%08x", Regs->eflags);
59 Warning(" EAX %08x ECX %08x EDX %08x EBX %08x",
60 Regs->eax, Regs->ecx, Regs->edx, Regs->ebx);
61 Warning(" ESP %08x EBP %08x ESI %08x EDI %08x",
62 Regs->esp, Regs->ebp, Regs->esi, Regs->edi);
63 Warning(" DS %04x ES %04x FS %04x GS %04x",
64 Regs->ds, Regs->es, Regs->fs, Regs->gs);
67 __asm__ __volatile__ ("mov %%cr0, %0":"=r"(cr));
68 Warning(" CR0 0x%08x", cr);
69 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
70 Warning(" CR2 0x%08x", cr);
71 __asm__ __volatile__ ("mov %%cr3, %0":"=r"(cr));
72 Warning(" CR3 0x%08x", cr);
74 switch( Regs->int_num )
77 Warning(" Offending bytes: %02x %02x %02x %02x",
78 *(Uint8*)Regs->eip+0, *(Uint8*)Regs->eip+1,
79 *(Uint8*)Regs->eip+2, *(Uint8*)Regs->eip+3);
83 // Print Stack Backtrace
84 Error_Backtrace(Regs->eip, Regs->ebp);
86 // Dump running threads
89 for(;;) __asm__ __volatile__ ("hlt");
92 * \fn void Error_Backtrace(Uint eip, Uint ebp)
93 * \brief Unrolls the stack to trace execution
95 void Error_Backtrace(Uint eip, Uint ebp)
101 //if(eip < 0xC0000000 && eip > 0x1000)
103 // LogF("Backtrace: User - 0x%x\n", eip);
109 LogF("Backtrace: Data Area - 0x%x\n", eip);
115 LogF("Backtrace: Kernel Module - 0x%x\n", eip);
119 //str = Debug_GetSymbol(eip, &delta);
121 LogF("Backtrace: 0x%x", eip);
123 LogF("Backtrace: %s+0x%x", str, delta);
124 if(!MM_GetPhysAddr(ebp))
126 LogF("\nBacktrace: Invalid EBP, stopping\n");
131 while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
133 //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
135 LogF(" >> 0x%x", *(Uint*)(ebp+4));
137 LogF(" >> %s+0x%x", str, delta);
145 * \fn void StartupPrint(char *Str)
147 void StartupPrint(char *Str)
149 Uint16 *buf = (void*)0xC00B8000;
154 buf[line*80 + i++] = *Str | 0x0700;
158 while(i < 80) buf[line*80 + i++] = 0x0720;
164 memcpy(buf, &buf[80], 80*24*2);
165 memset(&buf[80*24], 0, 80*2);
170 EXPORT(__stack_chk_fail);