[WIN32SS][NTGDI] Strictly check in XFORMOBJ_iSetXform (#1676)
[reactos.git] / ntoskrnl / ke / bug.c
1 /*
2 * PROJECT: ReactOS Kernel
3 * LICENSE: GPL - See COPYING in the top level directory
4 * FILE: ntoskrnl/ke/bug.c
5 * PURPOSE: Bugcheck Support
6 * PROGRAMMERS: Alex Ionescu (alex.ionescu@reactos.org)
7 */
8
9 /* INCLUDES ******************************************************************/
10
11 #include <ntoskrnl.h>
12 #define NDEBUG
13 #include <debug.h>
14
15 #if defined (ALLOC_PRAGMA)
16 #pragma alloc_text(INIT, KiInitializeBugCheck)
17 #endif
18
19 /* GLOBALS *******************************************************************/
20
21 LIST_ENTRY KeBugcheckCallbackListHead;
22 LIST_ENTRY KeBugcheckReasonCallbackListHead;
23 KSPIN_LOCK BugCheckCallbackLock;
24 ULONG KeBugCheckActive, KeBugCheckOwner;
25 LONG KeBugCheckOwnerRecursionCount;
26 PMESSAGE_RESOURCE_DATA KiBugCodeMessages;
27 ULONG KeBugCheckCount = 1;
28 ULONG KiHardwareTrigger;
29 PUNICODE_STRING KiBugCheckDriver;
30 ULONG_PTR KiBugCheckData[5];
31
32 PKNMI_HANDLER_CALLBACK KiNmiCallbackListHead = NULL;
33 KSPIN_LOCK KiNmiCallbackListLock;
34 #define TAG_KNMI 'IMNK'
35
36 /* Bugzilla Reporting */
37 UNICODE_STRING KeRosProcessorName, KeRosBiosDate, KeRosBiosVersion;
38 UNICODE_STRING KeRosVideoBiosDate, KeRosVideoBiosVersion;
39
40 /* PRIVATE FUNCTIONS *********************************************************/
41
42 PVOID
43 NTAPI
44 KiPcToFileHeader(IN PVOID Pc,
45 OUT PLDR_DATA_TABLE_ENTRY *LdrEntry,
46 IN BOOLEAN DriversOnly,
47 OUT PBOOLEAN InKernel)
48 {
49 ULONG i = 0;
50 PVOID ImageBase, PcBase = NULL;
51 PLDR_DATA_TABLE_ENTRY Entry;
52 PLIST_ENTRY ListHead, NextEntry;
53
54 /* Check which list we should use */
55 ListHead = (KeLoaderBlock) ? &KeLoaderBlock->LoadOrderListHead :
56 &PsLoadedModuleList;
57
58 /* Assume no */
59 *InKernel = FALSE;
60
61 /* Set list pointers and make sure it's valid */
62 NextEntry = ListHead->Flink;
63 if (NextEntry)
64 {
65 /* Start loop */
66 while (NextEntry != ListHead)
67 {
68 /* Increase entry */
69 i++;
70
71 /* Check if this is a kernel entry and we only want drivers */
72 if ((i <= 2) && (DriversOnly != FALSE))
73 {
74 /* Skip it */
75 NextEntry = NextEntry->Flink;
76 continue;
77 }
78
79 /* Get the loader entry */
80 Entry = CONTAINING_RECORD(NextEntry,
81 LDR_DATA_TABLE_ENTRY,
82 InLoadOrderLinks);
83
84 /* Move to the next entry */
85 NextEntry = NextEntry->Flink;
86 ImageBase = Entry->DllBase;
87
88 /* Check if this is the right one */
89 if (((ULONG_PTR)Pc >= (ULONG_PTR)Entry->DllBase) &&
90 ((ULONG_PTR)Pc < ((ULONG_PTR)Entry->DllBase + Entry->SizeOfImage)))
91 {
92 /* Return this entry */
93 *LdrEntry = Entry;
94 PcBase = ImageBase;
95
96 /* Check if this was a kernel or HAL entry */
97 if (i <= 2) *InKernel = TRUE;
98 break;
99 }
100 }
101 }
102
103 /* Return the base address */
104 return PcBase;
105 }
106
107 PVOID
108 NTAPI
109 KiRosPcToUserFileHeader(IN PVOID Pc,
110 OUT PLDR_DATA_TABLE_ENTRY *LdrEntry)
111 {
112 PVOID ImageBase, PcBase = NULL;
113 PLDR_DATA_TABLE_ENTRY Entry;
114 PLIST_ENTRY ListHead, NextEntry;
115
116 /*
117 * We know this is valid because we should only be called after a
118 * succesfull address from RtlWalkFrameChain for UserMode, which
119 * validates everything for us.
120 */
121 ListHead = &KeGetCurrentThread()->
122 Teb->ProcessEnvironmentBlock->Ldr->InLoadOrderModuleList;
123
124 /* Set list pointers and make sure it's valid */
125 NextEntry = ListHead->Flink;
126 if (NextEntry)
127 {
128 /* Start loop */
129 while (NextEntry != ListHead)
130 {
131 /* Get the loader entry */
132 Entry = CONTAINING_RECORD(NextEntry,
133 LDR_DATA_TABLE_ENTRY,
134 InLoadOrderLinks);
135
136 /* Move to the next entry */
137 NextEntry = NextEntry->Flink;
138 ImageBase = Entry->DllBase;
139
140 /* Check if this is the right one */
141 if (((ULONG_PTR)Pc >= (ULONG_PTR)Entry->DllBase) &&
142 ((ULONG_PTR)Pc < ((ULONG_PTR)Entry->DllBase + Entry->SizeOfImage)))
143 {
144 /* Return this entry */
145 *LdrEntry = Entry;
146 PcBase = ImageBase;
147 break;
148 }
149 }
150 }
151
152 /* Return the base address */
153 return PcBase;
154 }
155
156 USHORT
157 NTAPI
158 KeRosCaptureUserStackBackTrace(IN ULONG FramesToSkip,
159 IN ULONG FramesToCapture,
160 OUT PVOID *BackTrace,
161 OUT PULONG BackTraceHash OPTIONAL)
162 {
163 PVOID Frames[2 * 64];
164 ULONG FrameCount;
165 ULONG Hash = 0, i;
166
167 /* Skip a frame for the caller */
168 FramesToSkip++;
169
170 /* Don't go past the limit */
171 if ((FramesToCapture + FramesToSkip) >= 128) return 0;
172
173 /* Do the back trace */
174 FrameCount = RtlWalkFrameChain(Frames, FramesToCapture + FramesToSkip, 1);
175
176 /* Make sure we're not skipping all of them */
177 if (FrameCount <= FramesToSkip) return 0;
178
179 /* Loop all the frames */
180 for (i = 0; i < FramesToCapture; i++)
181 {
182 /* Don't go past the limit */
183 if ((FramesToSkip + i) >= FrameCount) break;
184
185 /* Save this entry and hash it */
186 BackTrace[i] = Frames[FramesToSkip + i];
187 Hash += PtrToUlong(BackTrace[i]);
188 }
189
190 /* Write the hash */
191 if (BackTraceHash) *BackTraceHash = Hash;
192
193 /* Clear the other entries and return count */
194 RtlFillMemoryUlong(Frames, 128, 0);
195 return (USHORT)i;
196 }
197
198
199 VOID
200 FASTCALL
201 KeRosDumpStackFrameArray(IN PULONG_PTR Frames,
202 IN ULONG FrameCount)
203 {
204 ULONG i;
205 ULONG_PTR Addr;
206 BOOLEAN InSystem;
207 PVOID p;
208
209 /* GCC complaints that it may be used uninitialized */
210 PLDR_DATA_TABLE_ENTRY LdrEntry = NULL;
211
212 /* Loop them */
213 for (i = 0; i < FrameCount; i++)
214 {
215 /* Get the EIP */
216 Addr = Frames[i];
217 if (!Addr)
218 {
219 break;
220 }
221
222 /* Get the base for this file */
223 if (Addr > (ULONG_PTR)MmHighestUserAddress)
224 {
225 /* We are in kernel */
226 p = KiPcToFileHeader((PVOID)Addr, &LdrEntry, FALSE, &InSystem);
227 }
228 else
229 {
230 /* We are in user land */
231 p = KiRosPcToUserFileHeader((PVOID)Addr, &LdrEntry);
232 }
233 if (p)
234 {
235 #ifdef KDBG
236 if (!KdbSymPrintAddress((PVOID)Addr, NULL))
237 #endif
238 {
239 CHAR AnsiName[64];
240
241 /* Convert module name to ANSI and print it */
242 KeBugCheckUnicodeToAnsi(&LdrEntry->BaseDllName,
243 AnsiName,
244 sizeof(AnsiName));
245 Addr -= (ULONG_PTR)LdrEntry->DllBase;
246 DbgPrint("<%s: %p>", AnsiName, (PVOID)Addr);
247 }
248 }
249 else
250 {
251 /* Print only the address */
252 DbgPrint("<%p>", (PVOID)Addr);
253 }
254
255 /* Go to the next frame */
256 DbgPrint("\n");
257 }
258 }
259
260 VOID
261 NTAPI
262 KeRosDumpStackFrames(IN PULONG_PTR Frame OPTIONAL,
263 IN ULONG FrameCount OPTIONAL)
264 {
265 ULONG_PTR Frames[32];
266 ULONG RealFrameCount;
267
268 /* If the caller didn't ask, assume 32 frames */
269 if (!FrameCount || FrameCount > 32) FrameCount = 32;
270
271 if (Frame)
272 {
273 /* Dump them */
274 KeRosDumpStackFrameArray(Frame, FrameCount);
275 }
276 else
277 {
278 /* Get the current frames (skip the two. One for the dumper, one for the caller) */
279 RealFrameCount = RtlCaptureStackBackTrace(2, FrameCount, (PVOID*)Frames, NULL);
280 DPRINT1("RealFrameCount =%lu\n", RealFrameCount);
281
282 /* Dump them */
283 KeRosDumpStackFrameArray(Frames, RealFrameCount);
284
285 /* Count left for user mode? */
286 if (FrameCount - RealFrameCount > 0)
287 {
288 /* Get the current frames */
289 RealFrameCount = KeRosCaptureUserStackBackTrace(-1, FrameCount - RealFrameCount, (PVOID*)Frames, NULL);
290
291 /* Dump them */
292 KeRosDumpStackFrameArray(Frames, RealFrameCount);
293 }
294 }
295 }
296
297 VOID
298 NTAPI
299 KeRosDumpTriageForBugZillaReport(VOID)
300 {
301 #if 0
302 extern BOOLEAN KiFastSystemCallDisable, KiSMTProcessorsPresent;
303 extern ULONG KeI386MachineType, MxcsrFeatureMask;
304 extern BOOLEAN Ke386Pae, Ke386NoExecute;
305
306 DbgPrint("ReactOS has crashed! Please go to http://jira.reactos.org/ to file a bug!\n");
307 DbgPrint("\nHardware Information\n");
308 DbgPrint("Processor Architecture: %d\n"
309 "Feature Bits: %d\n"
310 "System Call Disabled: %d\n"
311 "NPX Present: %d\n"
312 "MXCsr Mask: %d\n"
313 "MXCsr Feature Mask: %d\n"
314 "XMMI Present: %d\n"
315 "FXSR Present: %d\n"
316 "Machine Type: %d\n"
317 "PAE: %d\n"
318 "NX: %d\n"
319 "Processors: %d\n"
320 "Active Processors: %d\n"
321 "Pentium LOCK Bug: %d\n"
322 "Hyperthreading: %d\n"
323 "CPU Manufacturer: %s\n"
324 "CPU Name: %wZ\n"
325 "CPUID: %d\n"
326 "CPU Type: %d\n"
327 "CPU Stepping: %d\n"
328 "CPU Speed: %d\n"
329 "CPU L2 Cache: %d\n"
330 "BIOS Date: %wZ\n"
331 "BIOS Version: %wZ\n"
332 "Video BIOS Date: %wZ\n"
333 "Video BIOS Version: %wZ\n"
334 "Memory: %d\n",
335 KeProcessorArchitecture,
336 KeFeatureBits,
337 KiFastSystemCallDisable,
338 KeI386NpxPresent,
339 KiMXCsrMask,
340 MxcsrFeatureMask,
341 KeI386XMMIPresent,
342 KeI386FxsrPresent,
343 KeI386MachineType,
344 Ke386Pae,
345 Ke386NoExecute,
346 KeNumberProcessors,
347 KeActiveProcessors,
348 KiI386PentiumLockErrataPresent,
349 KiSMTProcessorsPresent,
350 KeGetCurrentPrcb()->VendorString,
351 &KeRosProcessorName,
352 KeGetCurrentPrcb()->CpuID,
353 KeGetCurrentPrcb()->CpuType,
354 KeGetCurrentPrcb()->CpuStep,
355 KeGetCurrentPrcb()->MHz,
356 ((PKIPCR)KeGetPcr())->SecondLevelCacheSize,
357 &KeRosBiosDate,
358 &KeRosBiosVersion,
359 &KeRosVideoBiosDate,
360 &KeRosVideoBiosVersion,
361 MmNumberOfPhysicalPages * PAGE_SIZE);
362 #endif
363 }
364
365 VOID
366 INIT_FUNCTION
367 NTAPI
368 KiInitializeBugCheck(VOID)
369 {
370 PMESSAGE_RESOURCE_DATA BugCheckData;
371 LDR_RESOURCE_INFO ResourceInfo;
372 PIMAGE_RESOURCE_DATA_ENTRY ResourceDataEntry;
373 NTSTATUS Status;
374 PLDR_DATA_TABLE_ENTRY LdrEntry;
375
376 /* Get the kernel entry */
377 LdrEntry = CONTAINING_RECORD(KeLoaderBlock->LoadOrderListHead.Flink,
378 LDR_DATA_TABLE_ENTRY,
379 InLoadOrderLinks);
380
381 /* Cache the Bugcheck Message Strings. Prepare the Lookup Data */
382 ResourceInfo.Type = 11;
383 ResourceInfo.Name = 1;
384 ResourceInfo.Language = 9;
385
386 /* Do the lookup. */
387 Status = LdrFindResource_U(LdrEntry->DllBase,
388 &ResourceInfo,
389 RESOURCE_DATA_LEVEL,
390 &ResourceDataEntry);
391
392 /* Make sure it worked */
393 if (NT_SUCCESS(Status))
394 {
395 /* Now actually get a pointer to it */
396 Status = LdrAccessResource(LdrEntry->DllBase,
397 ResourceDataEntry,
398 (PVOID*)&BugCheckData,
399 NULL);
400 if (NT_SUCCESS(Status)) KiBugCodeMessages = BugCheckData;
401 }
402 }
403
404 BOOLEAN
405 NTAPI
406 KeGetBugMessageText(IN ULONG BugCheckCode,
407 OUT PANSI_STRING OutputString OPTIONAL)
408 {
409 ULONG i, j;
410 ULONG IdOffset;
411 ULONG_PTR MessageEntry;
412 PCHAR BugCode;
413 BOOLEAN Result = FALSE;
414 USHORT Length;
415
416 /* Make sure we're not bugchecking too early */
417 if (!KiBugCodeMessages) return Result;
418
419 /* Find the message. This code is based on RtlFindMesssage */
420 for (i = 0; i < KiBugCodeMessages->NumberOfBlocks; i++)
421 {
422 /* Check if the ID Matches */
423 if ((BugCheckCode >= KiBugCodeMessages->Blocks[i].LowId) &&
424 (BugCheckCode <= KiBugCodeMessages->Blocks[i].HighId))
425 {
426 /* Get Offset to Entry */
427 MessageEntry = KiBugCodeMessages->Blocks[i].OffsetToEntries +
428 (ULONG_PTR)KiBugCodeMessages;
429 IdOffset = BugCheckCode - KiBugCodeMessages->Blocks[i].LowId;
430
431 /* Get offset to ID */
432 for (j = 0; j < IdOffset; j++)
433 {
434 /* Advance in the Entries */
435 MessageEntry += ((PMESSAGE_RESOURCE_ENTRY)MessageEntry)->
436 Length;
437 }
438
439 /* Get the final Code */
440 BugCode = (PCHAR)((PMESSAGE_RESOURCE_ENTRY)MessageEntry)->Text;
441 Length = (USHORT)strlen(BugCode);
442
443 /* Handle trailing newlines */
444 while ((Length > 0) && ((BugCode[Length] == '\n') ||
445 (BugCode[Length] == '\r') ||
446 (BugCode[Length] == ANSI_NULL)))
447 {
448 /* Check if we have a string to return */
449 if (!OutputString) BugCode[Length] = ANSI_NULL;
450 Length--;
451 }
452
453 /* Check if caller wants an output string */
454 if (OutputString)
455 {
456 /* Return it in the OutputString */
457 OutputString->Buffer = BugCode;
458 OutputString->Length = Length + 1;
459 OutputString->MaximumLength = Length + 1;
460 }
461 else
462 {
463 /* Direct Output to Screen */
464 InbvDisplayString(BugCode);
465 InbvDisplayString("\r");
466 }
467
468 /* We're done */
469 Result = TRUE;
470 break;
471 }
472 }
473
474 /* Return the result */
475 return Result;
476 }
477
478 VOID
479 NTAPI
480 KiDoBugCheckCallbacks(VOID)
481 {
482 PKBUGCHECK_CALLBACK_RECORD CurrentRecord;
483 PLIST_ENTRY ListHead, NextEntry, LastEntry;
484 ULONG_PTR Checksum;
485
486 /* First make sure that the list is Initialized... it might not be */
487 ListHead = &KeBugcheckCallbackListHead;
488 if ((ListHead->Flink) && (ListHead->Blink))
489 {
490 /* Loop the list */
491 LastEntry = ListHead;
492 NextEntry = ListHead->Flink;
493 while (NextEntry != ListHead)
494 {
495 /* Get the reord */
496 CurrentRecord = CONTAINING_RECORD(NextEntry,
497 KBUGCHECK_CALLBACK_RECORD,
498 Entry);
499
500 /* Validate it */
501 if (CurrentRecord->Entry.Blink != LastEntry) return;
502 Checksum = (ULONG_PTR)CurrentRecord->CallbackRoutine;
503 Checksum += (ULONG_PTR)CurrentRecord->Buffer;
504 Checksum += (ULONG_PTR)CurrentRecord->Length;
505 Checksum += (ULONG_PTR)CurrentRecord->Component;
506
507 /* Make sure it's inserted and valitdated */
508 if ((CurrentRecord->State == BufferInserted) &&
509 (CurrentRecord->Checksum == Checksum))
510 {
511 /* Call the routine */
512 CurrentRecord->State = BufferStarted;
513 (CurrentRecord->CallbackRoutine)(CurrentRecord->Buffer,
514 CurrentRecord->Length);
515 CurrentRecord->State = BufferFinished;
516 }
517
518 /* Go to the next entry */
519 LastEntry = NextEntry;
520 NextEntry = NextEntry->Flink;
521 }
522 }
523 }
524
525 VOID
526 NTAPI
527 KiBugCheckDebugBreak(IN ULONG StatusCode)
528 {
529 /*
530 * Wrap this in SEH so we don't crash if
531 * there is no debugger or if it disconnected
532 */
533 DoBreak:
534 _SEH2_TRY
535 {
536 /* Breakpoint */
537 DbgBreakPointWithStatus(StatusCode);
538 }
539 _SEH2_EXCEPT(EXCEPTION_EXECUTE_HANDLER)
540 {
541 /* No debugger, halt the CPU */
542 HalHaltSystem();
543 }
544 _SEH2_END;
545
546 /* Break again if this wasn't first try */
547 if (StatusCode != DBG_STATUS_BUGCHECK_FIRST) goto DoBreak;
548 }
549
550 PCHAR
551 NTAPI
552 KeBugCheckUnicodeToAnsi(IN PUNICODE_STRING Unicode,
553 OUT PCHAR Ansi,
554 IN ULONG Length)
555 {
556 PCHAR p;
557 PWCHAR pw;
558 ULONG i;
559
560 /* Set length and normalize it */
561 i = Unicode->Length / sizeof(WCHAR);
562 i = min(i, Length - 1);
563
564 /* Set source and destination, and copy */
565 pw = Unicode->Buffer;
566 p = Ansi;
567 while (i--) *p++ = (CHAR)*pw++;
568
569 /* Null terminate and return */
570 *p = ANSI_NULL;
571 return Ansi;
572 }
573
574 VOID
575 NTAPI
576 KiDumpParameterImages(IN PCHAR Message,
577 IN PULONG_PTR Parameters,
578 IN ULONG ParameterCount,
579 IN PKE_BUGCHECK_UNICODE_TO_ANSI ConversionRoutine)
580 {
581 ULONG i;
582 BOOLEAN InSystem;
583 PLDR_DATA_TABLE_ENTRY LdrEntry;
584 PVOID ImageBase;
585 PUNICODE_STRING DriverName;
586 CHAR AnsiName[32];
587 PIMAGE_NT_HEADERS NtHeader;
588 ULONG TimeStamp;
589 BOOLEAN FirstRun = TRUE;
590
591 /* Loop parameters */
592 for (i = 0; i < ParameterCount; i++)
593 {
594 /* Get the base for this parameter */
595 ImageBase = KiPcToFileHeader((PVOID)Parameters[i],
596 &LdrEntry,
597 FALSE,
598 &InSystem);
599 if (!ImageBase)
600 {
601 /* FIXME: Add code to check for unloaded drivers */
602 DPRINT1("Potentially unloaded driver!\n");
603 continue;
604 }
605 else
606 {
607 /* Get the NT Headers and Timestamp */
608 NtHeader = RtlImageNtHeader(LdrEntry->DllBase);
609 TimeStamp = NtHeader->FileHeader.TimeDateStamp;
610
611 /* Convert the driver name */
612 DriverName = &LdrEntry->BaseDllName;
613 ConversionRoutine(&LdrEntry->BaseDllName,
614 AnsiName,
615 sizeof(AnsiName));
616 }
617
618 /* Format driver name */
619 sprintf(Message,
620 "%s** %12s - Address %p base at %p, DateStamp %08lx\r\n",
621 FirstRun ? "\r\n*":"*",
622 AnsiName,
623 (PVOID)Parameters[i],
624 ImageBase,
625 TimeStamp);
626
627 /* Check if we only had one parameter */
628 if (ParameterCount <= 1)
629 {
630 /* Then just save the name */
631 KiBugCheckDriver = DriverName;
632 }
633 else
634 {
635 /* Otherwise, display the message */
636 InbvDisplayString(Message);
637 }
638
639 /* Loop again */
640 FirstRun = FALSE;
641 }
642 }
643
644 VOID
645 NTAPI
646 KiDisplayBlueScreen(IN ULONG MessageId,
647 IN BOOLEAN IsHardError,
648 IN PCHAR HardErrCaption OPTIONAL,
649 IN PCHAR HardErrMessage OPTIONAL,
650 IN PCHAR Message)
651 {
652 CHAR AnsiName[75];
653
654 /* Check if bootvid is installed */
655 if (InbvIsBootDriverInstalled())
656 {
657 /* Acquire ownership and reset the display */
658 InbvAcquireDisplayOwnership();
659 InbvResetDisplay();
660
661 /* Display blue screen */
662 InbvSolidColorFill(0, 0, 639, 479, 4);
663 InbvSetTextColor(15);
664 InbvInstallDisplayStringFilter(NULL);
665 InbvEnableDisplayString(TRUE);
666 InbvSetScrollRegion(0, 0, 639, 479);
667 }
668
669 /* Check if this is a hard error */
670 if (IsHardError)
671 {
672 /* Display caption and message */
673 if (HardErrCaption) InbvDisplayString(HardErrCaption);
674 if (HardErrMessage) InbvDisplayString(HardErrMessage);
675 }
676
677 /* Begin the display */
678 InbvDisplayString("\r\n");
679
680 /* Print out initial message */
681 KeGetBugMessageText(BUGCHECK_MESSAGE_INTRO, NULL);
682 InbvDisplayString("\r\n\r\n");
683
684 /* Check if we have a driver */
685 if (KiBugCheckDriver)
686 {
687 /* Print out into to driver name */
688 KeGetBugMessageText(BUGCODE_ID_DRIVER, NULL);
689
690 /* Convert and print out driver name */
691 KeBugCheckUnicodeToAnsi(KiBugCheckDriver, AnsiName, sizeof(AnsiName));
692 InbvDisplayString(" ");
693 InbvDisplayString(AnsiName);
694 InbvDisplayString("\r\n\r\n");
695 }
696
697 /* Check if this is the generic message */
698 if (MessageId == BUGCODE_PSS_MESSAGE)
699 {
700 /* It is, so get the bug code string as well */
701 KeGetBugMessageText((ULONG)KiBugCheckData[0], NULL);
702 InbvDisplayString("\r\n\r\n");
703 }
704
705 /* Print second introduction message */
706 KeGetBugMessageText(PSS_MESSAGE_INTRO, NULL);
707 InbvDisplayString("\r\n\r\n");
708
709 /* Get the bug code string */
710 KeGetBugMessageText(MessageId, NULL);
711 InbvDisplayString("\r\n\r\n");
712
713 /* Print message for technical information */
714 KeGetBugMessageText(BUGCHECK_TECH_INFO, NULL);
715
716 /* Show the technical Data */
717 sprintf(AnsiName,
718 "\r\n\r\n*** STOP: 0x%08lX (0x%p,0x%p,0x%p,0x%p)\r\n\r\n",
719 (ULONG)KiBugCheckData[0],
720 (PVOID)KiBugCheckData[1],
721 (PVOID)KiBugCheckData[2],
722 (PVOID)KiBugCheckData[3],
723 (PVOID)KiBugCheckData[4]);
724 InbvDisplayString(AnsiName);
725
726 /* Check if we have a driver*/
727 if (KiBugCheckDriver)
728 {
729 /* Display technical driver data */
730 InbvDisplayString(Message);
731 }
732 else
733 {
734 /* Dump parameter information */
735 KiDumpParameterImages(Message,
736 (PVOID)&KiBugCheckData[1],
737 4,
738 KeBugCheckUnicodeToAnsi);
739 }
740 }
741
742 VOID
743 NTAPI
744 KeBugCheckWithTf(IN ULONG BugCheckCode,
745 IN ULONG_PTR BugCheckParameter1,
746 IN ULONG_PTR BugCheckParameter2,
747 IN ULONG_PTR BugCheckParameter3,
748 IN ULONG_PTR BugCheckParameter4,
749 IN PKTRAP_FRAME TrapFrame)
750 {
751 PKPRCB Prcb = KeGetCurrentPrcb();
752 CONTEXT Context;
753 ULONG MessageId;
754 CHAR AnsiName[128];
755 BOOLEAN IsSystem, IsHardError = FALSE, Reboot = FALSE;
756 PCHAR HardErrCaption = NULL, HardErrMessage = NULL;
757 PVOID Pc = NULL, Memory;
758 PVOID DriverBase;
759 PLDR_DATA_TABLE_ENTRY LdrEntry;
760 PULONG_PTR HardErrorParameters;
761 KIRQL OldIrql;
762 #ifdef CONFIG_SMP
763 LONG i = 0;
764 #endif
765
766 /* Set active bugcheck */
767 KeBugCheckActive = TRUE;
768 KiBugCheckDriver = NULL;
769
770 /* Check if this is power failure simulation */
771 if (BugCheckCode == POWER_FAILURE_SIMULATE)
772 {
773 /* Call the Callbacks and reboot */
774 KiDoBugCheckCallbacks();
775 HalReturnToFirmware(HalRebootRoutine);
776 }
777
778 /* Save the IRQL and set hardware trigger */
779 Prcb->DebuggerSavedIRQL = KeGetCurrentIrql();
780 InterlockedIncrement((PLONG)&KiHardwareTrigger);
781
782 /* Capture the CPU Context */
783 RtlCaptureContext(&Prcb->ProcessorState.ContextFrame);
784 KiSaveProcessorControlState(&Prcb->ProcessorState);
785 Context = Prcb->ProcessorState.ContextFrame;
786
787 /* FIXME: Call the Watchdog if it's registered */
788
789 /* Check which bugcode this is */
790 switch (BugCheckCode)
791 {
792 /* These bug checks already have detailed messages, keep them */
793 case UNEXPECTED_KERNEL_MODE_TRAP:
794 case DRIVER_CORRUPTED_EXPOOL:
795 case ACPI_BIOS_ERROR:
796 case ACPI_BIOS_FATAL_ERROR:
797 case THREAD_STUCK_IN_DEVICE_DRIVER:
798 case DATA_BUS_ERROR:
799 case FAT_FILE_SYSTEM:
800 case NO_MORE_SYSTEM_PTES:
801 case INACCESSIBLE_BOOT_DEVICE:
802
803 /* Keep the same code */
804 MessageId = BugCheckCode;
805 break;
806
807 /* Check if this is a kernel-mode exception */
808 case KERNEL_MODE_EXCEPTION_NOT_HANDLED:
809 case SYSTEM_THREAD_EXCEPTION_NOT_HANDLED:
810 case KMODE_EXCEPTION_NOT_HANDLED:
811
812 /* Use the generic text message */
813 MessageId = KMODE_EXCEPTION_NOT_HANDLED;
814 break;
815
816 /* File-system errors */
817 case NTFS_FILE_SYSTEM:
818
819 /* Use the generic message for FAT */
820 MessageId = FAT_FILE_SYSTEM;
821 break;
822
823 /* Check if this is a coruption of the Mm's Pool */
824 case DRIVER_CORRUPTED_MMPOOL:
825
826 /* Use generic corruption message */
827 MessageId = DRIVER_CORRUPTED_EXPOOL;
828 break;
829
830 /* Check if this is a signature check failure */
831 case STATUS_SYSTEM_IMAGE_BAD_SIGNATURE:
832
833 /* Use the generic corruption message */
834 MessageId = BUGCODE_PSS_MESSAGE_SIGNATURE;
835 break;
836
837 /* All other codes */
838 default:
839
840 /* Use the default bugcheck message */
841 MessageId = BUGCODE_PSS_MESSAGE;
842 break;
843 }
844
845 /* Save bugcheck data */
846 KiBugCheckData[0] = BugCheckCode;
847 KiBugCheckData[1] = BugCheckParameter1;
848 KiBugCheckData[2] = BugCheckParameter2;
849 KiBugCheckData[3] = BugCheckParameter3;
850 KiBugCheckData[4] = BugCheckParameter4;
851
852 /* Now check what bugcheck this is */
853 switch (BugCheckCode)
854 {
855 /* Invalid access to R/O memory or Unhandled KM Exception */
856 case KERNEL_MODE_EXCEPTION_NOT_HANDLED:
857 case ATTEMPTED_WRITE_TO_READONLY_MEMORY:
858 case ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY:
859
860 /* Check if we have a trap frame */
861 if (!TrapFrame)
862 {
863 /* Use parameter 3 as a trap frame, if it exists */
864 if (BugCheckParameter3) TrapFrame = (PVOID)BugCheckParameter3;
865 }
866
867 /* Check if we got one now and if we need to get the Program Counter */
868 if ((TrapFrame) &&
869 (BugCheckCode != KERNEL_MODE_EXCEPTION_NOT_HANDLED))
870 {
871 /* Get the Program Counter */
872 Pc = (PVOID)KeGetTrapFramePc(TrapFrame);
873 }
874 break;
875
876 /* Wrong IRQL */
877 case IRQL_NOT_LESS_OR_EQUAL:
878
879 /*
880 * The NT kernel has 3 special sections:
881 * MISYSPTE, POOLMI and POOLCODE. The bug check code can
882 * determine in which of these sections this bugcode happened
883 * and provide a more detailed analysis. For now, we don't.
884 */
885
886 /* Program Counter is in parameter 4 */
887 Pc = (PVOID)BugCheckParameter4;
888
889 /* Get the driver base */
890 DriverBase = KiPcToFileHeader(Pc,
891 &LdrEntry,
892 FALSE,
893 &IsSystem);
894 if (IsSystem)
895 {
896 /*
897 * The error happened inside the kernel or HAL.
898 * Get the memory address that was being referenced.
899 */
900 Memory = (PVOID)BugCheckParameter1;
901
902 /* Find to which driver it belongs */
903 DriverBase = KiPcToFileHeader(Memory,
904 &LdrEntry,
905 TRUE,
906 &IsSystem);
907 if (DriverBase)
908 {
909 /* Get the driver name and update the bug code */
910 KiBugCheckDriver = &LdrEntry->BaseDllName;
911 KiBugCheckData[0] = DRIVER_PORTION_MUST_BE_NONPAGED;
912 }
913 else
914 {
915 /* Find the driver that unloaded at this address */
916 KiBugCheckDriver = NULL; // FIXME: ROS can't locate
917
918 /* Check if the cause was an unloaded driver */
919 if (KiBugCheckDriver)
920 {
921 /* Update bug check code */
922 KiBugCheckData[0] =
923 SYSTEM_SCAN_AT_RAISED_IRQL_CAUGHT_IMPROPER_DRIVER_UNLOAD;
924 }
925 }
926 }
927 else
928 {
929 /* Update the bug check code */
930 KiBugCheckData[0] = DRIVER_IRQL_NOT_LESS_OR_EQUAL;
931 }
932
933 /* Clear Pc so we don't look it up later */
934 Pc = NULL;
935 break;
936
937 /* Hard error */
938 case FATAL_UNHANDLED_HARD_ERROR:
939
940 /* Copy bug check data from hard error */
941 HardErrorParameters = (PULONG_PTR)BugCheckParameter2;
942 KiBugCheckData[0] = BugCheckParameter1;
943 KiBugCheckData[1] = HardErrorParameters[0];
944 KiBugCheckData[2] = HardErrorParameters[1];
945 KiBugCheckData[3] = HardErrorParameters[2];
946 KiBugCheckData[4] = HardErrorParameters[3];
947
948 /* Remember that this is hard error and set the caption/message */
949 IsHardError = TRUE;
950 HardErrCaption = (PCHAR)BugCheckParameter3;
951 HardErrMessage = (PCHAR)BugCheckParameter4;
952 break;
953
954 /* Page fault */
955 case PAGE_FAULT_IN_NONPAGED_AREA:
956
957 /* Assume no driver */
958 DriverBase = NULL;
959
960 /* Check if we have a trap frame */
961 if (!TrapFrame)
962 {
963 /* We don't, use parameter 3 if possible */
964 if (BugCheckParameter3) TrapFrame = (PVOID)BugCheckParameter3;
965 }
966
967 /* Check if we have a frame now */
968 if (TrapFrame)
969 {
970 /* Get the Program Counter */
971 Pc = (PVOID)KeGetTrapFramePc(TrapFrame);
972 KiBugCheckData[3] = (ULONG_PTR)Pc;
973
974 /* Find out if was in the kernel or drivers */
975 DriverBase = KiPcToFileHeader(Pc,
976 &LdrEntry,
977 FALSE,
978 &IsSystem);
979 }
980 else
981 {
982 /* Can't blame a driver, assume system */
983 IsSystem = TRUE;
984 }
985
986 /* FIXME: Check for session pool in addition to special pool */
987
988 /* Special pool has its own bug check codes */
989 if (MmIsSpecialPoolAddress((PVOID)BugCheckParameter1))
990 {
991 if (MmIsSpecialPoolAddressFree((PVOID)BugCheckParameter1))
992 {
993 KiBugCheckData[0] = IsSystem
994 ? PAGE_FAULT_IN_FREED_SPECIAL_POOL
995 : DRIVER_PAGE_FAULT_IN_FREED_SPECIAL_POOL;
996 }
997 else
998 {
999 KiBugCheckData[0] = IsSystem
1000 ? PAGE_FAULT_BEYOND_END_OF_ALLOCATION
1001 : DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION;
1002 }
1003 }
1004 else if (!DriverBase)
1005 {
1006 /* Find the driver that unloaded at this address */
1007 KiBugCheckDriver = NULL; // FIXME: ROS can't locate
1008
1009 /* Check if the cause was an unloaded driver */
1010 if (KiBugCheckDriver)
1011 {
1012 KiBugCheckData[0] =
1013 DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS;
1014 }
1015 }
1016 break;
1017
1018 /* Check if the driver forgot to unlock pages */
1019 case DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS:
1020
1021 /* Program Counter is in parameter 1 */
1022 Pc = (PVOID)BugCheckParameter1;
1023 break;
1024
1025 /* Check if the driver consumed too many PTEs */
1026 case DRIVER_USED_EXCESSIVE_PTES:
1027
1028 /* Loader entry is in parameter 1 */
1029 LdrEntry = (PVOID)BugCheckParameter1;
1030 KiBugCheckDriver = &LdrEntry->BaseDllName;
1031 break;
1032
1033 /* Check if the driver has a stuck thread */
1034 case THREAD_STUCK_IN_DEVICE_DRIVER:
1035
1036 /* The name is in Parameter 3 */
1037 KiBugCheckDriver = (PVOID)BugCheckParameter3;
1038 break;
1039
1040 /* Anything else */
1041 default:
1042 break;
1043 }
1044
1045 /* Do we have a driver name? */
1046 if (KiBugCheckDriver)
1047 {
1048 /* Convert it to ANSI */
1049 KeBugCheckUnicodeToAnsi(KiBugCheckDriver, AnsiName, sizeof(AnsiName));
1050 }
1051 else
1052 {
1053 /* Do we have a Program Counter? */
1054 if (Pc)
1055 {
1056 /* Dump image name */
1057 KiDumpParameterImages(AnsiName,
1058 (PULONG_PTR)&Pc,
1059 1,
1060 KeBugCheckUnicodeToAnsi);
1061 }
1062 }
1063
1064 /* Check if we need to save the context for KD */
1065 if (!KdPitchDebugger) KdDebuggerDataBlock.SavedContext = (ULONG_PTR)&Context;
1066
1067 /* Check if a debugger is connected */
1068 if ((BugCheckCode != MANUALLY_INITIATED_CRASH) && (KdDebuggerEnabled))
1069 {
1070 /* Crash on the debugger console */
1071 DbgPrint("\n*** Fatal System Error: 0x%08lx\n"
1072 " (0x%p,0x%p,0x%p,0x%p)\n\n",
1073 KiBugCheckData[0],
1074 KiBugCheckData[1],
1075 KiBugCheckData[2],
1076 KiBugCheckData[3],
1077 KiBugCheckData[4]);
1078
1079 /* Check if the debugger isn't currently connected */
1080 if (!KdDebuggerNotPresent)
1081 {
1082 /* Check if we have a driver to blame */
1083 if (KiBugCheckDriver)
1084 {
1085 /* Dump it */
1086 DbgPrint("Driver at fault: %s.\n", AnsiName);
1087 }
1088
1089 /* Check if this was a hard error */
1090 if (IsHardError)
1091 {
1092 /* Print caption and message */
1093 if (HardErrCaption) DbgPrint(HardErrCaption);
1094 if (HardErrMessage) DbgPrint(HardErrMessage);
1095 }
1096
1097 /* Break in the debugger */
1098 KiBugCheckDebugBreak(DBG_STATUS_BUGCHECK_FIRST);
1099 }
1100 else
1101 {
1102 /*
1103 * ROS HACK.
1104 * Ok, so debugging is enabled, but KDBG isn't there.
1105 * We'll manually dump the stack for the user.
1106 */
1107 KeRosDumpStackFrames(NULL, 0);
1108
1109 /* ROS HACK 2: Generate something useful for Bugzilla */
1110 KeRosDumpTriageForBugZillaReport();
1111 }
1112 }
1113
1114 /* Raise IRQL to HIGH_LEVEL */
1115 _disable();
1116 KeRaiseIrql(HIGH_LEVEL, &OldIrql);
1117
1118 /* Avoid recursion */
1119 if (!InterlockedDecrement((PLONG)&KeBugCheckCount))
1120 {
1121 #ifdef CONFIG_SMP
1122 /* Set CPU that is bug checking now */
1123 KeBugCheckOwner = Prcb->Number;
1124
1125 /* Freeze the other CPUs */
1126 for (i = 0; i < KeNumberProcessors; i++)
1127 {
1128 if (i != (LONG)KeGetCurrentProcessorNumber())
1129 {
1130 /* Send the IPI and give them one second to catch up */
1131 KiIpiSend(1 << i, IPI_FREEZE);
1132 KeStallExecutionProcessor(1000000);
1133 }
1134 }
1135 #endif
1136
1137 /* Display the BSOD */
1138 KiDisplayBlueScreen(MessageId,
1139 IsHardError,
1140 HardErrCaption,
1141 HardErrMessage,
1142 AnsiName);
1143
1144 /* Check if the debugger is disabled but we can enable it */
1145 if (!(KdDebuggerEnabled) && !(KdPitchDebugger))
1146 {
1147 /* Enable it */
1148 KdEnableDebuggerWithLock(FALSE);
1149 }
1150 else
1151 {
1152 /* Otherwise, print the last line */
1153 InbvDisplayString("\r\n");
1154 }
1155
1156 /* Save the context */
1157 Prcb->ProcessorState.ContextFrame = Context;
1158
1159 /* FIXME: Support Triage Dump */
1160
1161 /* FIXME: Write the crash dump */
1162 }
1163 else
1164 {
1165 /* Increase recursion count */
1166 KeBugCheckOwnerRecursionCount++;
1167 if (KeBugCheckOwnerRecursionCount == 2)
1168 {
1169 /* Break in the debugger */
1170 KiBugCheckDebugBreak(DBG_STATUS_BUGCHECK_SECOND);
1171 }
1172 else if (KeBugCheckOwnerRecursionCount > 2)
1173 {
1174 /* Halt execution */
1175 while (TRUE);
1176 }
1177 }
1178
1179 /* Call the Callbacks */
1180 KiDoBugCheckCallbacks();
1181
1182 /* FIXME: Call Watchdog if enabled */
1183
1184 /* Check if we have to reboot */
1185 if (Reboot)
1186 {
1187 /* Unload symbols */
1188 DbgUnLoadImageSymbols(NULL, (PVOID)MAXULONG_PTR, 0);
1189 HalReturnToFirmware(HalRebootRoutine);
1190 }
1191
1192 /* Attempt to break in the debugger (otherwise halt CPU) */
1193 KiBugCheckDebugBreak(DBG_STATUS_BUGCHECK_SECOND);
1194
1195 /* Shouldn't get here */
1196 ASSERT(FALSE);
1197 while (TRUE);
1198 }
1199
1200 BOOLEAN
1201 NTAPI
1202 KiHandleNmi(VOID)
1203 {
1204 BOOLEAN Handled = FALSE;
1205 PKNMI_HANDLER_CALLBACK NmiData;
1206
1207 /* Parse the list of callbacks */
1208 NmiData = KiNmiCallbackListHead;
1209 while (NmiData)
1210 {
1211 /* Save if this callback has handled it -- all it takes is one */
1212 Handled |= NmiData->Callback(NmiData->Context, Handled);
1213 NmiData = NmiData->Next;
1214 }
1215
1216 /* Has anyone handled this? */
1217 return Handled;
1218 }
1219
1220 /* PUBLIC FUNCTIONS **********************************************************/
1221
1222 /*
1223 * @unimplemented
1224 */
1225 NTSTATUS
1226 NTAPI
1227 KeInitializeCrashDumpHeader(IN ULONG Type,
1228 IN ULONG Flags,
1229 OUT PVOID Buffer,
1230 IN ULONG BufferSize,
1231 OUT ULONG BufferNeeded OPTIONAL)
1232 {
1233 UNIMPLEMENTED;
1234 return STATUS_UNSUCCESSFUL;
1235 }
1236
1237 /*
1238 * @implemented
1239 */
1240 BOOLEAN
1241 NTAPI
1242 KeDeregisterBugCheckCallback(IN PKBUGCHECK_CALLBACK_RECORD CallbackRecord)
1243 {
1244 KIRQL OldIrql;
1245 BOOLEAN Status = FALSE;
1246
1247 /* Raise IRQL to High */
1248 KeRaiseIrql(HIGH_LEVEL, &OldIrql);
1249
1250 /* Check the Current State */
1251 if (CallbackRecord->State == BufferInserted)
1252 {
1253 /* Reset state and remove from list */
1254 CallbackRecord->State = BufferEmpty;
1255 RemoveEntryList(&CallbackRecord->Entry);
1256 Status = TRUE;
1257 }
1258
1259 /* Lower IRQL and return */
1260 KeLowerIrql(OldIrql);
1261 return Status;
1262 }
1263
1264 /*
1265 * @implemented
1266 */
1267 BOOLEAN
1268 NTAPI
1269 KeDeregisterBugCheckReasonCallback(
1270 IN PKBUGCHECK_REASON_CALLBACK_RECORD CallbackRecord)
1271 {
1272 KIRQL OldIrql;
1273 BOOLEAN Status = FALSE;
1274
1275 /* Raise IRQL to High */
1276 KeRaiseIrql(HIGH_LEVEL, &OldIrql);
1277
1278 /* Check the Current State */
1279 if (CallbackRecord->State == BufferInserted)
1280 {
1281 /* Reset state and remove from list */
1282 CallbackRecord->State = BufferEmpty;
1283 RemoveEntryList(&CallbackRecord->Entry);
1284 Status = TRUE;
1285 }
1286
1287 /* Lower IRQL and return */
1288 KeLowerIrql(OldIrql);
1289 return Status;
1290 }
1291
1292 /*
1293 * @implemented
1294 */
1295 BOOLEAN
1296 NTAPI
1297 KeRegisterBugCheckCallback(IN PKBUGCHECK_CALLBACK_RECORD CallbackRecord,
1298 IN PKBUGCHECK_CALLBACK_ROUTINE CallbackRoutine,
1299 IN PVOID Buffer,
1300 IN ULONG Length,
1301 IN PUCHAR Component)
1302 {
1303 KIRQL OldIrql;
1304 BOOLEAN Status = FALSE;
1305
1306 /* Raise IRQL to High */
1307 KeRaiseIrql(HIGH_LEVEL, &OldIrql);
1308
1309 /* Check the Current State first so we don't double-register */
1310 if (CallbackRecord->State == BufferEmpty)
1311 {
1312 /* Set the Callback Settings and insert into the list */
1313 CallbackRecord->Length = Length;
1314 CallbackRecord->Buffer = Buffer;
1315 CallbackRecord->Component = Component;
1316 CallbackRecord->CallbackRoutine = CallbackRoutine;
1317 CallbackRecord->State = BufferInserted;
1318 InsertTailList(&KeBugcheckCallbackListHead, &CallbackRecord->Entry);
1319 Status = TRUE;
1320 }
1321
1322 /* Lower IRQL and return */
1323 KeLowerIrql(OldIrql);
1324 return Status;
1325 }
1326
1327 /*
1328 * @implemented
1329 */
1330 BOOLEAN
1331 NTAPI
1332 KeRegisterBugCheckReasonCallback(
1333 IN PKBUGCHECK_REASON_CALLBACK_RECORD CallbackRecord,
1334 IN PKBUGCHECK_REASON_CALLBACK_ROUTINE CallbackRoutine,
1335 IN KBUGCHECK_CALLBACK_REASON Reason,
1336 IN PUCHAR Component)
1337 {
1338 KIRQL OldIrql;
1339 BOOLEAN Status = FALSE;
1340
1341 /* Raise IRQL to High */
1342 KeRaiseIrql(HIGH_LEVEL, &OldIrql);
1343
1344 /* Check the Current State first so we don't double-register */
1345 if (CallbackRecord->State == BufferEmpty)
1346 {
1347 /* Set the Callback Settings and insert into the list */
1348 CallbackRecord->Component = Component;
1349 CallbackRecord->CallbackRoutine = CallbackRoutine;
1350 CallbackRecord->State = BufferInserted;
1351 CallbackRecord->Reason = Reason;
1352 InsertTailList(&KeBugcheckReasonCallbackListHead,
1353 &CallbackRecord->Entry);
1354 Status = TRUE;
1355 }
1356
1357 /* Lower IRQL and return */
1358 KeLowerIrql(OldIrql);
1359 return Status;
1360 }
1361
1362 /*
1363 * @implemented
1364 */
1365 PVOID
1366 NTAPI
1367 KeRegisterNmiCallback(IN PNMI_CALLBACK CallbackRoutine,
1368 IN PVOID Context)
1369 {
1370 KIRQL OldIrql;
1371 PKNMI_HANDLER_CALLBACK NmiData, Next;
1372 ASSERT_IRQL_LESS_OR_EQUAL(DISPATCH_LEVEL);
1373
1374 /* Allocate NMI callback data */
1375 NmiData = ExAllocatePoolWithTag(NonPagedPool, sizeof(*NmiData), TAG_KNMI);
1376 if (!NmiData) return NULL;
1377
1378 /* Fill in the information */
1379 NmiData->Callback = CallbackRoutine;
1380 NmiData->Context = Context;
1381 NmiData->Handle = NmiData;
1382
1383 /* Insert it into NMI callback list */
1384 KiAcquireNmiListLock(&OldIrql);
1385 NmiData->Next = KiNmiCallbackListHead;
1386 Next = InterlockedCompareExchangePointer((PVOID*)&KiNmiCallbackListHead,
1387 NmiData,
1388 NmiData->Next);
1389 ASSERT(Next == NmiData->Next);
1390 KiReleaseNmiListLock(OldIrql);
1391
1392 /* Return the opaque "handle" */
1393 return NmiData->Handle;
1394 }
1395
1396 /*
1397 * @implemented
1398 */
1399 NTSTATUS
1400 NTAPI
1401 KeDeregisterNmiCallback(IN PVOID Handle)
1402 {
1403 KIRQL OldIrql;
1404 PKNMI_HANDLER_CALLBACK NmiData;
1405 PKNMI_HANDLER_CALLBACK* Previous;
1406 ASSERT_IRQL_LESS_OR_EQUAL(DISPATCH_LEVEL);
1407
1408 /* Find in the list the NMI callback corresponding to the handle */
1409 KiAcquireNmiListLock(&OldIrql);
1410 Previous = &KiNmiCallbackListHead;
1411 NmiData = *Previous;
1412 while (NmiData)
1413 {
1414 if (NmiData->Handle == Handle)
1415 {
1416 /* The handle is the pointer to the callback itself */
1417 ASSERT(Handle == NmiData);
1418
1419 /* Found it, remove from the list */
1420 *Previous = NmiData->Next;
1421 break;
1422 }
1423
1424 /* Not found; try again */
1425 Previous = &NmiData->Next;
1426 NmiData = *Previous;
1427 }
1428 KiReleaseNmiListLock(OldIrql);
1429
1430 /* If we have found the entry, free it */
1431 if (NmiData)
1432 {
1433 ExFreePoolWithTag(NmiData, TAG_KNMI);
1434 return STATUS_SUCCESS;
1435 }
1436
1437 return STATUS_INVALID_HANDLE;
1438 }
1439
1440 /*
1441 * @implemented
1442 */
1443 VOID
1444 NTAPI
1445 KeBugCheckEx(IN ULONG BugCheckCode,
1446 IN ULONG_PTR BugCheckParameter1,
1447 IN ULONG_PTR BugCheckParameter2,
1448 IN ULONG_PTR BugCheckParameter3,
1449 IN ULONG_PTR BugCheckParameter4)
1450 {
1451 /* Call the internal API */
1452 KeBugCheckWithTf(BugCheckCode,
1453 BugCheckParameter1,
1454 BugCheckParameter2,
1455 BugCheckParameter3,
1456 BugCheckParameter4,
1457 NULL);
1458 }
1459
1460 /*
1461 * @implemented
1462 */
1463 VOID
1464 NTAPI
1465 KeBugCheck(ULONG BugCheckCode)
1466 {
1467 /* Call the internal API */
1468 KeBugCheckWithTf(BugCheckCode, 0, 0, 0, 0, NULL);
1469 }
1470
1471 /*
1472 * @implemented
1473 */
1474 VOID
1475 NTAPI
1476 KeEnterKernelDebugger(VOID)
1477 {
1478 /* Disable interrupts */
1479 KiHardwareTrigger = 1;
1480 _disable();
1481
1482 /* Check the bugcheck count */
1483 if (!InterlockedDecrement((PLONG)&KeBugCheckCount))
1484 {
1485 /* There was only one, is the debugger disabled? */
1486 if (!(KdDebuggerEnabled) && !(KdPitchDebugger))
1487 {
1488 /* Enable the debugger */
1489 KdInitSystem(0, NULL);
1490 }
1491 }
1492
1493 /* Break in the debugger */
1494 KiBugCheckDebugBreak(DBG_STATUS_FATAL);
1495 }
1496
1497 /* EOF */