2 * Acess2 x86_64 Project
9 #define MAX_BACKTRACE 6
12 int MM_PageFault(tVAddr Addr, Uint ErrorCode, tRegs *Regs);
13 void Error_Backtrace(Uint IP, Uint BP);
16 void Error_Handler(tRegs *Regs);
19 const char * const csaERROR_NAMES[] = {
20 "Divide By Zero", "Debug", "NMI Exception", "INT3",
21 "INTO", "Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
22 "Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
23 "Stack Fault Exception", "GPF", "#PF", "Reserved",
24 "Floating Point Exception", "Alignment Check Exception", "Machine Check Exception", "Reserved",
25 "Reserved", "Reserved", "Reserved", "Reserved",
26 "Reserved", "Reserved", "Reserved", "Reserved",
27 "Reserved", "Reserved", "Reserved", "Reserved"
31 void Error_Handler(tRegs *Regs)
35 if( Regs->IntNum == 14 ) {
36 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
37 if( MM_PageFault(cr, Regs->ErrorCode, Regs) == 0 )
43 Error_Backtrace(Regs->RIP, Regs->RBP);
46 Log("CPU Error %x, Code: 0x%x", Regs->IntNum, Regs->ErrorCode);
47 // Log(" - %s", csaERROR_NAMES[Regs->IntNum]);
48 Log(" CS:RIP = 0x%04x:%016llx", Regs->CS, Regs->RIP);
49 Log(" SS:RSP = 0x%04x:%016llx", Regs->SS, Regs->RSP);
50 Log(" RFLAGS = 0x%016llx", Regs->RFlags);
52 Log(" RAX %016llx RCX %016llx RDX %016llx RBX %016llx",
53 Regs->RAX, Regs->RCX, Regs->RDX, Regs->RBX);
54 Log(" RSP %016llx RBP %016llx RSI %016llx RDI %016llx",
55 Regs->RSP, Regs->RBP, Regs->RSP, Regs->RDI);
56 Log(" R8 %016llx R9 %016llx R10 %016llx R11 %016llx",
57 Regs->R8, Regs->R9, Regs->R10, Regs->R11);
58 Log(" R12 %016llx R13 %016llx R14 %016llx R15 %016llx",
59 Regs->R12, Regs->R13, Regs->R14, Regs->R15);
60 Log(" FS %04x GS %04x", Regs->FS, Regs->GS);
64 __asm__ __volatile__ ("mov %%cr0, %0":"=r"(cr));
65 Warning(" CR0 0x%08x", cr);
66 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
67 Warning(" CR2 0x%016llx", cr);
68 __asm__ __volatile__ ("mov %%cr3, %0":"=r"(cr));
69 Warning(" CR3 0x%016llx", cr);
70 __asm__ __volatile__ ("mov %%cr4, %0":"=r"(cr));
71 Warning(" CR4 0x%08x", cr);
73 switch( Regs->IntNum )
76 Warning(" Offending bytes: %02x %02x %02x %02x",
77 *(Uint8*)(Regs->RIP+0), *(Uint8*)(Regs->RIP+1),
78 *(Uint8*)(Regs->RIP+2), *(Uint8*)(Regs->RIP+3)
83 __asm__ __volatile__ ("cli");
85 __asm__ __volatile__ ("hlt");
89 * \fn void Error_Backtrace(Uint eip, Uint ebp)
90 * \brief Unrolls the stack to trace execution
91 * \param eip Current Instruction Pointer
92 * \param ebp Current Base Pointer (Stack Frame)
94 void Error_Backtrace(Uint IP, Uint BP)
98 //if(eip < 0xC0000000 && eip > 0x1000)
100 // LogF("Backtrace: User - 0x%x\n", eip);
104 if( IP > USER_MAX && IP < MM_KERNEL_CODE
105 && (MM_MODULE_MIN > IP || IP > MM_MODULE_MAX)
108 LogF("Backtrace: Data Area - %p\n", IP);
112 //str = Debug_GetSymbol(eip, &delta);
114 LogF("Backtrace: %p", IP);
116 // LogF("Backtrace: %s+0x%x", str, delta);
117 if( !MM_GetPhysAddr(BP) )
119 LogF("\nBacktrace: Invalid BP, stopping\n");
124 while( MM_GetPhysAddr(BP) && MM_GetPhysAddr(BP+8+7) && i < MAX_BACKTRACE )
126 //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
128 LogF(" >> 0x%llx", ((Uint*)BP)[1]);
130 // LogF(" >> %s+0x%x", str, delta);