Kernel/x86 - Added SSE/FPU state saving, not fully tested
[tpg/acess2.git] / Kernel / arch / x86 / errors.c
1 /*
2  * Acess2 - x86 Architecture
3  * arch/x86/errors.c
4  * - CPU Error Handler
5  */
6 #include <acess.h>
7 #include <proc.h>
8
9 // === CONSTANTS ===
10 #define MAX_BACKTRACE   8       //!< Maximum distance to trace the stack backwards
11
12 // === IMPORTS ===
13 extern void     MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
14 extern void     VM8086_GPF(tRegs *Regs);
15 extern void     Threads_Dump(void);
16 extern void     Threads_Fault(int Num);
17 extern int      GetCPUNum(void);
18 extern void     MM_DumpTables(tVAddr, tVAddr);
19 extern void     Proc_EnableSSE(void);
20 extern void     Proc_RestoreSSE(Uint32 Data);
21
22 // === PROTOTYPES ===
23 void    __stack_chk_fail(void);
24 void    ErrorHandler(tRegs *Regs);
25 void    Proc_PrintBacktrace(void);
26 void    Error_Backtrace(Uint eip, Uint ebp);
27 void    StartupPrint(char *Str);
28
29 // === GLOBALS ===
30 const char *csaERROR_NAMES[] = {
31         "Divide By Zero", "Debug", "NMI Exception", "INT3",
32         "INTO Instr - Overflow", "BOUND Instr - Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
33         "Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
34         "Stack Fault Exception", "GPF", "#PF", "Reserved",
35         "Floating Point Exception", "Alignment Check Exception", "Machine Check Exception",     "Reserved",
36         "Reserved", "Reserved", "Reserved", "Reserved",
37         "Reserved", "Reserved", "Reserved", "Reserved",
38         "Reserved", "Reserved", "Reserved", "Reserved"
39         };
40
41 // === CODE ===
42 /**
43  * \brief Keeps GCC happy
44  */
45 void __stack_chk_fail(void)
46 {
47         Panic("FATAL ERROR: Stack Check Failed\n");
48         for(;;);
49 }
50
51 /**
52  * \fn void ErrorHandler(tRegs *Regs)
53  * \brief General Error Handler
54  * \param Regs  Register state at error
55  */
56 void ErrorHandler(tRegs *Regs)
57 {
58         Uint    cr;
59         
60         //if( Regs && !(Regs->int_num == 13 && Regs->eflags & 0x20000) )
61         //      __asm__ __volatile__ ("xchg %bx, %bx");
62         //Log_Debug("X86", "Regs = %p", Regs);
63         //Log_Debug("X86", "Error %i at 0x%08x", Regs->int_num, Regs->eip);
64         
65         __asm__ __volatile__ ("cli");
66         
67         // Debug exception (used for single-stepping)
68         if(Regs->int_num == 1)
69         {
70                 static Uint32   lastEIP = 0;
71                 tThread *thread = Proc_GetCurThread();
72                 if( Regs->eip == lastEIP )
73                         return;
74                 Log("%p(%i %s) IP=%08x", thread, thread->TID, thread->ThreadName, Regs->eip);
75                 lastEIP = Regs->eip;
76                 return ;
77         }
78         
79         // Page Fault
80         if(Regs->int_num == 14)
81         {
82                 __asm__ __volatile__ ("sti");   // Should be OK, TODO: Test
83                 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
84                 MM_PageFault( cr, Regs->err_code, Regs );
85                 return ;
86         }
87
88         // #NM - Coprocessor unavaliable
89         if(Regs->int_num == 7)
90         {
91                 tThread *thread = Proc_GetCurThread();
92                 if(!thread->SavedState.bSSEModified)
93                 {
94                         Proc_EnableSSE();
95                         if(!thread->SavedState.SSE)
96                                 thread->SavedState.SSE = malloc(sizeof(tSSEState) + 0xF);
97                         else
98                                 Proc_RestoreSSE( ((Uint)thread->SavedState.SSE + 0xF) & ~0xF );
99                         thread->SavedState.bSSEModified = 1;
100                         __asm__ __volatile__ ("sti");
101                         return ;
102                 }
103                 // oops, SSE enabled but a #NM, bad news
104         }
105         
106         // VM8086 GPF
107         if(Regs->int_num == 13 && Regs->eflags & 0x20000)
108         {
109                 VM8086_GPF(Regs);
110                 return ;
111         }
112         
113         // Check if it's a user mode fault
114         if( Regs->eip < KERNEL_BASE || (Regs->cs & 3) == 3 ) {
115                 Log_Warning("Arch", "User Fault -  %s, Code: 0x%x",
116                         csaERROR_NAMES[Regs->int_num], Regs->err_code);
117                 Log_Warning("Arch", "at CS:EIP %04x:%08x",
118                         Regs->cs, Regs->eip);
119                 MM_DumpTables(0, KERNEL_BASE);
120                 switch( Regs->int_num )
121                 {
122                 // Division by Zero
123                 case  0:        Threads_Fault(FAULT_DIV0);      break;
124                 // Invalid opcode
125                 case  6:        Threads_Fault(FAULT_OPCODE);    break;
126                 // GPF
127                 case 13:        Threads_Fault(FAULT_ACCESS);    break;
128                 // Floating Point Exception
129                 case 16:        Threads_Fault(FAULT_FLOAT);     break;
130                 
131                 default:        Threads_Fault(FAULT_MISC);      break;
132                 }
133                 return ;
134         }
135         
136         Debug_KernelPanic();
137         
138         LogF("CPU %i Error %i - %s, Code: 0x%x - At %08x",
139                 GetCPUNum(),
140                 Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code,
141                 Regs->eip);
142         
143         //Warning("CPU Error %i - %s, Code: 0x%x",
144         //      Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code);
145         //Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
146         __ASM__ ("xchg %bx, %bx");
147         if(Regs->cs == 0x08)
148                 Warning(" SS:ESP = 0x0010:%08x", (Uint)Regs+sizeof(tRegs));
149         else
150                 Warning(" SS:ESP = 0x%04x:%08x", Regs->ss, Regs->esp);
151         Warning(" EFLAGS = 0x%08x", Regs->eflags);
152         Warning(" EAX %08x ECX %08x EDX %08x EBX %08x",
153                 Regs->eax, Regs->ecx, Regs->edx, Regs->ebx);
154         Warning(" ESP %08x EBP %08x ESI %08x EDI %08x",
155                 Regs->esp, Regs->ebp, Regs->esi, Regs->edi);
156         Warning(" DS %04x ES %04x FS %04x GS %04x",
157                 Regs->ds, Regs->es, Regs->fs, Regs->gs);
158         
159         // Control Registers
160         __asm__ __volatile__ ("mov %%cr0, %0":"=r"(cr));
161         Warning(" CR0 0x%08x", cr);
162         __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
163         Warning(" CR2 0x%08x", cr);
164         __asm__ __volatile__ ("mov %%cr3, %0":"=r"(cr));
165         Warning(" CR3 0x%08x", cr);
166         
167         switch( Regs->int_num )
168         {
169         case 6: // #UD
170                 Warning(" Offending bytes: %02x %02x %02x %02x",
171                         *(Uint8*)Regs->eip+0, *(Uint8*)Regs->eip+1,
172                         *(Uint8*)Regs->eip+2, *(Uint8*)Regs->eip+3);
173                 break;
174         }
175         
176         // Print Stack Backtrace
177         Error_Backtrace(Regs->eip, Regs->ebp);
178         
179         // Dump running threads
180         Threads_Dump();
181         
182         for(;;) __asm__ __volatile__ ("hlt");
183 }
184
185 void Proc_PrintBacktrace(void)
186 {
187         Uint32  ebp;
188         __asm__ __volatile__ ("mov %%ebp, %0" : "=r" (ebp));
189         Error_Backtrace( *(Uint32*)(ebp+4), *(Uint32*)ebp );
190 }
191
192 /**
193  * \fn void Error_Backtrace(Uint eip, Uint ebp)
194  * \brief Unrolls the stack to trace execution
195  * \param eip   Current Instruction Pointer
196  * \param ebp   Current Base Pointer (Stack Frame)
197  */
198 void Error_Backtrace(Uint eip, Uint ebp)
199 {
200          int    i = 0;
201         Uint    delta = 0;
202         char    *str = NULL;
203         
204         //if(eip < 0xC0000000 && eip > 0x1000)
205         //{
206         //      LogF("Backtrace: User - 0x%x\n", eip);
207         //      return;
208         //}
209         
210         if(eip > 0xE0000000)
211         {
212                 LogF("Backtrace: Data Area - 0x%x\n", eip);
213                 return;
214         }
215         
216         if(eip > 0xC8000000)
217         {
218                 LogF("Backtrace: Kernel Module - 0x%x\n", eip);
219                 return;
220         }
221         
222         //str = Debug_GetSymbol(eip, &delta);
223         if(str == NULL)
224                 LogF("Backtrace: 0x%x", eip);
225         else
226                 LogF("Backtrace: %s+0x%x", str, delta);
227         if(!MM_GetPhysAddr(ebp))
228         {
229                 LogF("\nBacktrace: Invalid EBP, stopping\n");
230                 return;
231         }
232         
233         
234         while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
235         {
236                 //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
237                 if(str == NULL)
238                         LogF(" >> 0x%x", *(Uint*)(ebp+4));
239                 else
240                         LogF(" >> %s+0x%x", str, delta);
241                 ebp = *(Uint*)ebp;
242                 i++;
243         }
244         LogF("\n");
245 }
246
247 /**
248  * \fn void StartupPrint(char *Str)
249  * \brief Str   String to print
250  * \note WHY IS THIS HERE?!?!
251  */
252 void StartupPrint(char *Str)
253 {
254         Uint16  *buf = (void*)0xC00B8000;
255          int    i = 0;
256         static int      line = 0;
257         while(*Str)
258         {
259                 buf[line*80 + i++] = *Str | 0x0700;
260                 Str ++;
261         }
262         
263         // Clear the rest of the line
264         while(i < 80)
265                 buf[line*80 + i++] = 0x0720;
266         
267         line ++;
268         if(line == 25)
269         {
270                 line --;
271                 memcpy(buf, &buf[80], 80*24*2);
272                 memset(&buf[80*24], 0, 80*2);
273         }
274 }
275
276 // === EXPORTS ===
277 EXPORT(__stack_chk_fail);

UCC git Repository :: git.ucc.asn.au