*/
#include <acess.h>
#include <proc.h>
+#include <mm_virt.h>
// === CONSTANTS ===
#define MAX_BACKTRACE 8 //!< Maximum distance to trace the stack backwards
extern void Threads_Fault(int Num);
extern int GetCPUNum(void);
extern void MM_DumpTables(tVAddr, tVAddr);
+extern void Proc_EnableSSE(void);
+extern void Proc_RestoreSSE(Uint32 Data);
// === PROTOTYPES ===
void __stack_chk_fail(void);
MM_PageFault( cr, Regs->err_code, Regs );
return ;
}
+
+ // #NM - Coprocessor unavaliable
+ if(Regs->int_num == 7)
+ {
+ tThread *thread = Proc_GetCurThread();
+ if(!thread->SavedState.bSSEModified)
+ {
+ Proc_EnableSSE();
+ if(!thread->SavedState.SSE)
+ thread->SavedState.SSE = malloc(sizeof(tSSEState) + 0xF);
+ else
+ Proc_RestoreSSE( ((Uint)thread->SavedState.SSE + 0xF) & ~0xF );
+ thread->SavedState.bSSEModified = 1;
+ __asm__ __volatile__ ("sti");
+ return ;
+ }
+ // oops, SSE enabled but a #NM, bad news
+ }
// VM8086 GPF
if(Regs->int_num == 13 && Regs->eflags & 0x20000)
}
// Check if it's a user mode fault
- if( Regs->eip < KERNEL_BASE || (Regs->cs & 3) == 3 ) {
+ if( (Regs->cs & 3) == 3 ) {
Log_Warning("Arch", "User Fault - %s, Code: 0x%x",
csaERROR_NAMES[Regs->int_num], Regs->err_code);
Log_Warning("Arch", "at CS:EIP %04x:%08x",
Debug_KernelPanic();
- LogF("CPU %i Error %i - %s, Code: 0x%x - At %08x",
+ LogF("CPU %i Error %i - %s, Code: 0x%x - At %08x\n",
GetCPUNum(),
Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code,
Regs->eip);
{
case 6: // #UD
Warning(" Offending bytes: %02x %02x %02x %02x",
- *(Uint8*)Regs->eip+0, *(Uint8*)Regs->eip+1,
- *(Uint8*)Regs->eip+2, *(Uint8*)Regs->eip+3);
+ *(Uint8*)(Regs->eip+0), *(Uint8*)(Regs->eip+1),
+ *(Uint8*)(Regs->eip+2), *(Uint8*)(Regs->eip+3));
break;
}
void Error_Backtrace(Uint eip, Uint ebp)
{
int i = 0;
- Uint delta = 0;
- char *str = NULL;
+// Uint delta = 0;
+// char *str = NULL;
//if(eip < 0xC0000000 && eip > 0x1000)
//{
// LogF("Backtrace: User - 0x%x\n", eip);
// return;
//}
-
+
+ #if 0
if(eip > 0xE0000000)
{
LogF("Backtrace: Data Area - 0x%x\n", eip);
LogF("Backtrace: Kernel Module - 0x%x\n", eip);
return;
}
-
+ #endif
+
//str = Debug_GetSymbol(eip, &delta);
- if(str == NULL)
+// if(str == NULL)
LogF("Backtrace: 0x%x", eip);
- else
- LogF("Backtrace: %s+0x%x", str, delta);
+// else
+// LogF("Backtrace: %s+0x%x", str, delta);
if(!MM_GetPhysAddr(ebp))
{
LogF("\nBacktrace: Invalid EBP, stopping\n");
while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
{
+ if( ebp >= MM_KERNEL_STACKS_END ) break;
//str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
- if(str == NULL)
+// if(str == NULL)
LogF(" >> 0x%x", *(Uint*)(ebp+4));
- else
- LogF(" >> %s+0x%x", str, delta);
+// else
+// LogF(" >> %s+0x%x", str, delta);
ebp = *(Uint*)ebp;
i++;
}