Kernel - Slight reworks to timer code
[tpg/acess2.git] / Kernel / arch / x86 / errors.c
1 /*
2  * Acess2 - x86 Architecture
3  * arch/x86/errors.c
4  * - CPU Error Handler
5  */
6 #include <acess.h>
7 #include <proc.h>
8 #include <mm_virt.h>
9
10 // === CONSTANTS ===
11 #define MAX_BACKTRACE   8       //!< Maximum distance to trace the stack backwards
12
13 // === IMPORTS ===
14 extern void     MM_PageFault(Uint Addr, Uint ErrorCode, tRegs *Regs);
15 extern void     VM8086_GPF(tRegs *Regs);
16 extern void     Threads_Dump(void);
17 extern void     Threads_Fault(int Num);
18 extern int      GetCPUNum(void);
19 extern void     MM_DumpTables(tVAddr, tVAddr);
20 extern void     Proc_EnableSSE(void);
21 extern void     Proc_RestoreSSE(Uint32 Data);
22
23 // === PROTOTYPES ===
24 void    __stack_chk_fail(void);
25 void    ErrorHandler(tRegs *Regs);
26 void    Proc_PrintBacktrace(void);
27 void    Error_Backtrace(Uint eip, Uint ebp);
28 void    StartupPrint(char *Str);
29
30 // === GLOBALS ===
31 const char *csaERROR_NAMES[] = {
32         "Divide By Zero", "Debug", "NMI Exception", "INT3",
33         "INTO Instr - Overflow", "BOUND Instr - Out of Bounds", "Invalid Opcode", "Coprocessor not avaliable",
34         "Double Fault", "Coprocessor Segment Overrun", "Bad TSS", "Segment Not Present",
35         "Stack Fault Exception", "GPF", "#PF", "Reserved",
36         "Floating Point Exception", "Alignment Check Exception", "Machine Check Exception",     "Reserved",
37         "Reserved", "Reserved", "Reserved", "Reserved",
38         "Reserved", "Reserved", "Reserved", "Reserved",
39         "Reserved", "Reserved", "Reserved", "Reserved"
40         };
41
42 // === CODE ===
43 /**
44  * \brief Keeps GCC happy
45  */
46 void __stack_chk_fail(void)
47 {
48         Panic("FATAL ERROR: Stack Check Failed\n");
49         for(;;);
50 }
51
52 /**
53  * \fn void ErrorHandler(tRegs *Regs)
54  * \brief General Error Handler
55  * \param Regs  Register state at error
56  */
57 void ErrorHandler(tRegs *Regs)
58 {
59         Uint    cr;
60         
61         //if( Regs && !(Regs->int_num == 13 && Regs->eflags & 0x20000) )
62         //      __asm__ __volatile__ ("xchg %bx, %bx");
63         //Log_Debug("X86", "Regs = %p", Regs);
64         //Log_Debug("X86", "Error %i at 0x%08x", Regs->int_num, Regs->eip);
65         
66         __asm__ __volatile__ ("cli");
67         
68         // Debug exception (used for single-stepping)
69         if(Regs->int_num == 1)
70         {
71                 static Uint32   lastEIP = 0;
72                 tThread *thread = Proc_GetCurThread();
73                 if( Regs->eip == lastEIP )
74                         return;
75                 Log("%p(%i %s) IP=%08x", thread, thread->TID, thread->ThreadName, Regs->eip);
76                 lastEIP = Regs->eip;
77                 return ;
78         }
79         
80         // Page Fault
81         if(Regs->int_num == 14)
82         {
83                 __asm__ __volatile__ ("sti");   // Should be OK, TODO: Test
84                 __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
85                 MM_PageFault( cr, Regs->err_code, Regs );
86                 return ;
87         }
88
89         // #NM - Coprocessor unavaliable
90         if(Regs->int_num == 7)
91         {
92                 tThread *thread = Proc_GetCurThread();
93                 if(!thread->SavedState.bSSEModified)
94                 {
95                         Proc_EnableSSE();
96                         if(!thread->SavedState.SSE)
97                                 thread->SavedState.SSE = malloc(sizeof(tSSEState) + 0xF);
98                         else
99                                 Proc_RestoreSSE( ((Uint)thread->SavedState.SSE + 0xF) & ~0xF );
100                         thread->SavedState.bSSEModified = 1;
101                         __asm__ __volatile__ ("sti");
102                         return ;
103                 }
104                 // oops, SSE enabled but a #NM, bad news
105         }
106         
107         // VM8086 GPF
108         if(Regs->int_num == 13 && Regs->eflags & 0x20000)
109         {
110                 VM8086_GPF(Regs);
111                 return ;
112         }
113         
114         // Check if it's a user mode fault
115         if( (Regs->cs & 3) == 3 ) {
116                 Log_Warning("Arch", "User Fault -  %s, Code: 0x%x",
117                         csaERROR_NAMES[Regs->int_num], Regs->err_code);
118                 Log_Warning("Arch", "at CS:EIP %04x:%08x",
119                         Regs->cs, Regs->eip);
120                 MM_DumpTables(0, KERNEL_BASE);
121                 switch( Regs->int_num )
122                 {
123                 // Division by Zero
124                 case  0:        Threads_Fault(FAULT_DIV0);      break;
125                 // Invalid opcode
126                 case  6:        Threads_Fault(FAULT_OPCODE);    break;
127                 // GPF
128                 case 13:        Threads_Fault(FAULT_ACCESS);    break;
129                 // Floating Point Exception
130                 case 16:        Threads_Fault(FAULT_FLOAT);     break;
131                 
132                 default:        Threads_Fault(FAULT_MISC);      break;
133                 }
134                 return ;
135         }
136         
137         Debug_KernelPanic();
138         
139         LogF("CPU %i Error %i - %s, Code: 0x%x - At %08x\n",
140                 GetCPUNum(),
141                 Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code,
142                 Regs->eip);
143         
144         //Warning("CPU Error %i - %s, Code: 0x%x",
145         //      Regs->int_num, csaERROR_NAMES[Regs->int_num], Regs->err_code);
146         //Warning(" CS:EIP = 0x%04x:%08x", Regs->cs, Regs->eip);
147         __ASM__ ("xchg %bx, %bx");
148         if(Regs->cs == 0x08)
149                 Warning(" SS:ESP = 0x0010:%08x", (Uint)Regs+sizeof(tRegs));
150         else
151                 Warning(" SS:ESP = 0x%04x:%08x", Regs->ss, Regs->esp);
152         Warning(" EFLAGS = 0x%08x", Regs->eflags);
153         Warning(" EAX %08x ECX %08x EDX %08x EBX %08x",
154                 Regs->eax, Regs->ecx, Regs->edx, Regs->ebx);
155         Warning(" ESP %08x EBP %08x ESI %08x EDI %08x",
156                 Regs->esp, Regs->ebp, Regs->esi, Regs->edi);
157         Warning(" DS %04x ES %04x FS %04x GS %04x",
158                 Regs->ds, Regs->es, Regs->fs, Regs->gs);
159         
160         // Control Registers
161         __asm__ __volatile__ ("mov %%cr0, %0":"=r"(cr));
162         Warning(" CR0 0x%08x", cr);
163         __asm__ __volatile__ ("mov %%cr2, %0":"=r"(cr));
164         Warning(" CR2 0x%08x", cr);
165         __asm__ __volatile__ ("mov %%cr3, %0":"=r"(cr));
166         Warning(" CR3 0x%08x", cr);
167         
168         switch( Regs->int_num )
169         {
170         case 6: // #UD
171                 Warning(" Offending bytes: %02x %02x %02x %02x",
172                         *(Uint8*)(Regs->eip+0), *(Uint8*)(Regs->eip+1),
173                         *(Uint8*)(Regs->eip+2), *(Uint8*)(Regs->eip+3));
174                 break;
175         }
176         
177         // Print Stack Backtrace
178         Error_Backtrace(Regs->eip, Regs->ebp);
179         
180         // Dump running threads
181         Threads_Dump();
182         
183         for(;;) __asm__ __volatile__ ("hlt");
184 }
185
186 void Proc_PrintBacktrace(void)
187 {
188         Uint32  ebp;
189         __asm__ __volatile__ ("mov %%ebp, %0" : "=r" (ebp));
190         Error_Backtrace( *(Uint32*)(ebp+4), *(Uint32*)ebp );
191 }
192
193 /**
194  * \fn void Error_Backtrace(Uint eip, Uint ebp)
195  * \brief Unrolls the stack to trace execution
196  * \param eip   Current Instruction Pointer
197  * \param ebp   Current Base Pointer (Stack Frame)
198  */
199 void Error_Backtrace(Uint eip, Uint ebp)
200 {
201          int    i = 0;
202 //      Uint    delta = 0;
203 //      char    *str = NULL;
204         
205         //if(eip < 0xC0000000 && eip > 0x1000)
206         //{
207         //      LogF("Backtrace: User - 0x%x\n", eip);
208         //      return;
209         //}
210
211         #if 0   
212         if(eip > 0xE0000000)
213         {
214                 LogF("Backtrace: Data Area - 0x%x\n", eip);
215                 return;
216         }
217         
218         if(eip > 0xC8000000)
219         {
220                 LogF("Backtrace: Kernel Module - 0x%x\n", eip);
221                 return;
222         }
223         #endif  
224
225         //str = Debug_GetSymbol(eip, &delta);
226 //      if(str == NULL)
227                 LogF("Backtrace: 0x%x", eip);
228 //      else
229 //              LogF("Backtrace: %s+0x%x", str, delta);
230         if(!MM_GetPhysAddr(ebp))
231         {
232                 LogF("\nBacktrace: Invalid EBP, stopping\n");
233                 return;
234         }
235         
236         
237         while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
238         {
239                 if( ebp >= MM_KERNEL_STACKS_END )       break;
240                 //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
241 //              if(str == NULL)
242                         LogF(" >> 0x%x", *(Uint*)(ebp+4));
243 //              else
244 //                      LogF(" >> %s+0x%x", str, delta);
245                 ebp = *(Uint*)ebp;
246                 i++;
247         }
248         LogF("\n");
249 }
250
251 /**
252  * \fn void StartupPrint(char *Str)
253  * \brief Str   String to print
254  * \note WHY IS THIS HERE?!?!
255  */
256 void StartupPrint(char *Str)
257 {
258         Uint16  *buf = (void*)0xC00B8000;
259          int    i = 0;
260         static int      line = 0;
261         while(*Str)
262         {
263                 buf[line*80 + i++] = *Str | 0x0700;
264                 Str ++;
265         }
266         
267         // Clear the rest of the line
268         while(i < 80)
269                 buf[line*80 + i++] = 0x0720;
270         
271         line ++;
272         if(line == 25)
273         {
274                 line --;
275                 memcpy(buf, &buf[80], 80*24*2);
276                 memset(&buf[80*24], 0, 80*2);
277         }
278 }
279
280 // === EXPORTS ===
281 EXPORT(__stack_chk_fail);

UCC git Repository :: git.ucc.asn.au