// === IMPORTS ===
extern void MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
extern void VM8086_GPF(tRegs *Regs);
-extern void Threads_Dump(void);
+extern void Threads_Dump(void);
extern void Threads_Fault(int Num);
extern int GetCPUNum(void);
+extern void MM_DumpTables(tVAddr, tVAddr);
+extern void Proc_EnableSSE(void);
+extern void Proc_RestoreSSE(Uint32 Data);
// === PROTOTYPES ===
void __stack_chk_fail(void);
void ErrorHandler(tRegs *Regs);
+void Proc_PrintBacktrace(void);
void Error_Backtrace(Uint eip, Uint ebp);
void StartupPrint(char *Str);
// === GLOBALS ===
const char *csaERROR_NAMES[] = {
"Divide By Zero", "Debug", "NMI Exception", "INT3",
- "INTO", "Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
+ "INTO Instr - Overflow", "BOUND Instr - Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
"Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
"Stack Fault Exception", "GPF", "#PF", "Reserved",
"Floating Point Exception", "Alignment Check Exception", "Machine Check Exception", "Reserved",
// Page Fault
if(Regs->int_num == 14)
{
+ __asm__ __volatile__ ("sti"); // Should be OK, TODO: Test
__asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
MM_PageFault( cr, Regs->err_code, Regs );
return ;
}
+
+ // #NM - Coprocessor unavaliable
+ if(Regs->int_num == 7)
+ {
+ tThread *thread = Proc_GetCurThread();
+ if(!thread->SavedState.bSSEModified)
+ {
+ Proc_EnableSSE();
+ if(!thread->SavedState.SSE)
+ thread->SavedState.SSE = malloc(sizeof(tSSEState) + 0xF);
+ else
+ Proc_RestoreSSE( ((Uint)thread->SavedState.SSE + 0xF) & ~0xF );
+ thread->SavedState.bSSEModified = 1;
+ __asm__ __volatile__ ("sti");
+ return ;
+ }
+ // oops, SSE enabled but a #NM, bad news
+ }
// VM8086 GPF
if(Regs->int_num == 13 && Regs->eflags & 0x20000)
csaERROR_NAMES[Regs->int_num], Regs->err_code);
Log_Warning("Arch", "at CS:EIP %04x:%08x",
Regs->cs, Regs->eip);
+ MM_DumpTables(0, KERNEL_BASE);
switch( Regs->int_num )
{
// Division by Zero
for(;;) __asm__ __volatile__ ("hlt");
}
+
+void Proc_PrintBacktrace(void)
+{
+ Uint32 ebp;
+ __asm__ __volatile__ ("mov %%ebp, %0" : "=r" (ebp));
+ Error_Backtrace( *(Uint32*)(ebp+4), *(Uint32*)ebp );
+}
+
/**
* \fn void Error_Backtrace(Uint eip, Uint ebp)
* \brief Unrolls the stack to trace execution