*/
#include <acess.h>
#include <proc.h>
+#include <mm_virt.h>
// === CONSTANTS ===
#define MAX_BACKTRACE 8 //!< Maximum distance to trace the stack backwards
// === IMPORTS ===
extern void MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
extern void VM8086_GPF(tRegs *Regs);
-extern void Threads_Dump(void);
+extern void Threads_Dump(void);
extern void Threads_Fault(int Num);
+extern int GetCPUNum(void);
+extern void MM_DumpTables(tVAddr, tVAddr);
+extern void Proc_EnableSSE(void);
+extern void Proc_RestoreSSE(Uint32 Data);
// === PROTOTYPES ===
void __stack_chk_fail(void);
void ErrorHandler(tRegs *Regs);
+void Proc_PrintBacktrace(void);
void Error_Backtrace(Uint eip, Uint ebp);
void StartupPrint(char *Str);
// === GLOBALS ===
const char *csaERROR_NAMES[] = {
"Divide By Zero", "Debug", "NMI Exception", "INT3",
- "INTO", "Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
+ "INTO Instr - Overflow", "BOUND Instr - Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
"Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
"Stack Fault Exception", "GPF", "#PF", "Reserved",
"Floating Point Exception", "Alignment Check Exception", "Machine Check Exception", "Reserved",
__asm__ __volatile__ ("cli");
+ // Debug exception (used for single-stepping)
+ if(Regs->int_num == 1)
+ {
+ static Uint32 lastEIP = 0;
+ tThread *thread = Proc_GetCurThread();
+ if( Regs->eip == lastEIP )
+ return;
+ Log("%p(%i %s) IP=%08x", thread, thread->TID, thread->ThreadName, Regs->eip);
+ lastEIP = Regs->eip;
+ return ;
+ }
+
// Page Fault
if(Regs->int_num == 14)
{
+ __asm__ __volatile__ ("sti"); // Should be OK, TODO: Test
__asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
MM_PageFault( cr, Regs->err_code, Regs );
return ;
}
+
+ // #NM - Coprocessor unavaliable
+ if(Regs->int_num == 7)
+ {
+ tThread *thread = Proc_GetCurThread();
+ if(!thread->SavedState.bSSEModified)
+ {
+ Proc_EnableSSE();
+ if(!thread->SavedState.SSE)
+ thread->SavedState.SSE = malloc(sizeof(tSSEState) + 0xF);
+ else
+ Proc_RestoreSSE( ((Uint)thread->SavedState.SSE + 0xF) & ~0xF );
+ thread->SavedState.bSSEModified = 1;
+ __asm__ __volatile__ ("sti");
+ return ;
+ }
+ // oops, SSE enabled but a #NM, bad news
+ }
// VM8086 GPF
if(Regs->int_num == 13 && Regs->eflags & 0x20000)
}
// Check if it's a user mode fault
- if( Regs->eip < KERNEL_BASE || (Regs->cs & 3) == 3 ) {
+ if( (Regs->cs & 3) == 3 ) {
Log_Warning("Arch", "User Fault - %s, Code: 0x%x",
csaERROR_NAMES[Regs->int_num], Regs->err_code);
Log_Warning("Arch", "at CS:EIP %04x:%08x",
Regs->cs, Regs->eip);
+ MM_DumpTables(0, KERNEL_BASE);
switch( Regs->int_num )
{
// Division by Zero
}
Debug_KernelPanic();
- Warning("CPU Error %i - %s, Code: 0x%x",
- Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code);
- Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
+
+ LogF("CPU %i Error %i - %s, Code: 0x%x - At %08x\n",
+ GetCPUNum(),
+ Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code,
+ Regs->eip);
+
+ //Warning("CPU Error %i - %s, Code: 0x%x",
+ // Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code);
+ //Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
+ __ASM__ ("xchg %bx, %bx");
if(Regs->cs == 0x08)
Warning(" SS:ESP = 0x0010:%08x", (Uint)Regs+sizeof(tRegs));
else
{
case 6: // #UD
Warning(" Offending bytes: %02x %02x %02x %02x",
- *(Uint8*)Regs->eip+0, *(Uint8*)Regs->eip+1,
- *(Uint8*)Regs->eip+2, *(Uint8*)Regs->eip+3);
+ *(Uint8*)(Regs->eip+0), *(Uint8*)(Regs->eip+1),
+ *(Uint8*)(Regs->eip+2), *(Uint8*)(Regs->eip+3));
break;
}
for(;;) __asm__ __volatile__ ("hlt");
}
+
+void Proc_PrintBacktrace(void)
+{
+ Uint32 ebp;
+ __asm__ __volatile__ ("mov %%ebp, %0" : "=r" (ebp));
+ Error_Backtrace( *(Uint32*)(ebp+4), *(Uint32*)ebp );
+}
+
/**
* \fn void Error_Backtrace(Uint eip, Uint ebp)
* \brief Unrolls the stack to trace execution
void Error_Backtrace(Uint eip, Uint ebp)
{
int i = 0;
- Uint delta = 0;
- char *str = NULL;
+// Uint delta = 0;
+// char *str = NULL;
//if(eip < 0xC0000000 && eip > 0x1000)
//{
// LogF("Backtrace: User - 0x%x\n", eip);
// return;
//}
-
+
+ #if 0
if(eip > 0xE0000000)
{
LogF("Backtrace: Data Area - 0x%x\n", eip);
LogF("Backtrace: Kernel Module - 0x%x\n", eip);
return;
}
-
+ #endif
+
//str = Debug_GetSymbol(eip, &delta);
- if(str == NULL)
+// if(str == NULL)
LogF("Backtrace: 0x%x", eip);
- else
- LogF("Backtrace: %s+0x%x", str, delta);
+// else
+// LogF("Backtrace: %s+0x%x", str, delta);
if(!MM_GetPhysAddr(ebp))
{
LogF("\nBacktrace: Invalid EBP, stopping\n");
while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
{
+ if( ebp >= MM_KERNEL_STACKS_END ) break;
//str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
- if(str == NULL)
+// if(str == NULL)
LogF(" >> 0x%x", *(Uint*)(ebp+4));
- else
- LogF(" >> %s+0x%x", str, delta);
+// else
+// LogF(" >> %s+0x%x", str, delta);
ebp = *(Uint*)ebp;
i++;
}