2 * Acess2 - x86 Architecture
10 #define MAX_BACKTRACE 8 //!< Maximum distance to trace the stack backwards
13 extern void MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
14 extern void Threads_Dump();
17 void Error_Backtrace(Uint eip, Uint ebp);
20 void __stack_chk_fail()
22 Panic("FATAL ERROR: Stack Check Failed\n");
27 * \fn void ErrorHandler(tRegs *Regs)
28 * \brief General Error Handler
30 void ErrorHandler(tRegs *Regs)
33 __asm__ __volatile__ ("cli");
35 if(Regs->int_num == 14)
37 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
38 MM_PageFault( cr, Regs->err_code, Regs );
42 Warning("CPU Error %i, Code: 0x%x", Regs->int_num, Regs->err_code);
43 Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
44 Warning(" SS:ESP = 0x%04x:%08x", Regs->ss, Regs->esp);
45 Warning(" EFLAGS = 0x%08x", Regs->eflags);
46 Warning(" EAX %08x EBX %08x", Regs->eax, Regs->ebx);
47 Warning(" ECX %08x EDX %08x", Regs->ecx, Regs->edx);
48 Warning(" ESP %08x EBP %08x", Regs->esp, Regs->ebp);
49 Warning(" ESI %08x EDI %08x", Regs->esi, Regs->edi);
50 Warning(" DS %04x ES %04x", Regs->ds, Regs->es);
51 Warning(" FS %04x GS %04x", Regs->fs, Regs->gs);
54 __asm__ __volatile__ ("mov %%cr0, %0":"=r"(cr));
55 Warning(" CR0: 0x%08x", cr);
56 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
57 Warning(" CR2: 0x%08x", cr);
58 __asm__ __volatile__ ("mov %%cr3, %0":"=r"(cr));
59 Warning(" CR3: 0x%08x", cr);
61 // Print Stack Backtrace
62 Error_Backtrace(Regs->eip, Regs->ebp);
64 // Dump running threads
67 for(;;) __asm__ __volatile__ ("hlt");
70 * \fn void Error_Backtrace(Uint eip, Uint ebp)
71 * \brief Unrolls the stack to trace execution
73 void Error_Backtrace(Uint eip, Uint ebp)
79 //if(eip < 0xC0000000 && eip > 0x1000)
81 // LogF("Backtrace: User - 0x%x\n", eip);
87 LogF("Backtrace: Data Area - 0x%x\n", eip);
93 LogF("Backtrace: Kernel Module - 0x%x\n", eip);
97 //str = Debug_GetSymbol(eip, &delta);
99 LogF("Backtrace: 0x%x", eip);
101 LogF("Backtrace: %s+0x%x", str, delta);
102 if(!MM_GetPhysAddr(ebp))
104 LogF("\nBacktrace: Invalid EBP, stopping\n");
109 while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
111 //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
113 LogF(" >> 0x%x", *(Uint*)(ebp+4));
115 LogF(" >> %s+0x%x", str, delta);
123 * \fn void StartupPrint(char *Str)
125 void StartupPrint(char *Str)
127 Uint16 *buf = (void*)0xC00B8000;
132 buf[line*80 + i++] = *Str | 0x0700;
136 while(i < 80) buf[line*80 + i++] = 0x0720;
142 memcpy(buf, &buf[80], 80*24*2);
143 memset(&buf[80*24], 0, 80*2);
148 EXPORT(__stack_chk_fail);