* PROJECT: ReactOS kernel
* FILE: ntoskrnl/ke/i386/exp.c
* PURPOSE: Handling exceptions
- * PROGRAMMER: David Welch (welch@cwcom.net)
+ * PROGRAMMERS: David Welch (welch@cwcom.net)
+ * Skywing (skywing@valhallalegends.com)
* REVISION HISTORY:
* ??/??/??: Created
+ * 09/12/03: KeRaiseUserException added (Skywing).
*/
/* INCLUDES *****************************************************************/
-#include <ddk/ntddk.h>
-#include <roscfg.h>
-#include <internal/ntoskrnl.h>
-#include <internal/ke.h>
-#include <internal/i386/segment.h>
-#include <internal/i386/mm.h>
-#include <internal/module.h>
-#include <internal/mm.h>
-#include <internal/ps.h>
-#include <internal/trap.h>
-#include <ntdll/ldr.h>
-#include <internal/safe.h>
-
+#include <ntoskrnl.h>
#define NDEBUG
#include <internal/debug.h>
/* GLOBALS *****************************************************************/
+#define FLAG_IF (1<<9)
+
#define _STR(x) #x
#define STR(x) _STR(x)
+#ifndef ARRAY_SIZE
+# define ARRAY_SIZE(x) (sizeof (x) / sizeof (x[0]))
+#endif
+
extern void interrupt_handler2e(void);
extern void interrupt_handler2d(void);
extern VOID KiTrap14(VOID);
extern VOID KiTrap15(VOID);
extern VOID KiTrap16(VOID);
+extern VOID KiTrap17(VOID);
+extern VOID KiTrap18(VOID);
+extern VOID KiTrap19(VOID);
extern VOID KiTrapUnknown(VOID);
extern ULONG init_stack;
extern ULONG init_stack_top;
-static char *ExceptionTypeStrings[] =
+extern BOOLEAN Ke386NoExecute;
+
+static char *ExceptionTypeStrings[] =
{
"Divide Error",
"Debug Trap",
"Stack Segment Fault",
"General Protection",
"Page Fault",
+ "Reserved(15)",
"Math Fault",
"Alignment Check",
- "Machine Check"
+ "Machine Check",
+ "SIMD Fault"
};
-/* FUNCTIONS ****************************************************************/
+static NTSTATUS ExceptionToNtStatus[] =
+ {
+ STATUS_INTEGER_DIVIDE_BY_ZERO,
+ STATUS_SINGLE_STEP,
+ STATUS_ACCESS_VIOLATION,
+ STATUS_BREAKPOINT,
+ STATUS_INTEGER_OVERFLOW,
+ STATUS_ARRAY_BOUNDS_EXCEEDED,
+ STATUS_ILLEGAL_INSTRUCTION,
+ STATUS_ACCESS_VIOLATION, /* STATUS_FLT_INVALID_OPERATION */
+ STATUS_ACCESS_VIOLATION,
+ STATUS_ACCESS_VIOLATION,
+ STATUS_ACCESS_VIOLATION,
+ STATUS_ACCESS_VIOLATION,
+ STATUS_STACK_OVERFLOW,
+ STATUS_ACCESS_VIOLATION,
+ STATUS_ACCESS_VIOLATION,
+ STATUS_ACCESS_VIOLATION, /* RESERVED */
+ STATUS_ACCESS_VIOLATION, /* STATUS_FLT_INVALID_OPERATION */
+ STATUS_DATATYPE_MISALIGNMENT,
+ STATUS_ACCESS_VIOLATION,
+ STATUS_ACCESS_VIOLATION /* STATUS_FLT_MULTIPLE_TRAPS? */
+ };
-extern unsigned int _text_start__, _text_end__;
+/* FUNCTIONS ****************************************************************/
-STATIC BOOLEAN
-print_address(PVOID address)
+#if defined(DBG) || defined(KDBG)
+BOOLEAN STDCALL
+KeRosPrintAddress(PVOID address)
+{
+ return KdbSymPrintAddress(address);
+}
+#else /* KDBG */
+BOOLEAN STDCALL
+KeRosPrintAddress(PVOID address)
{
-#ifdef KDBG
- ULONG Offset;
- PSYMBOL Symbol, NextSymbol;
- BOOLEAN Printed = FALSE;
- ULONG NextAddress;
-#endif /* KDBG */
PLIST_ENTRY current_entry;
MODULE_TEXT_SECTION* current;
extern LIST_ENTRY ModuleTextListHead;
-
+ ULONG_PTR RelativeAddress;
+
current_entry = ModuleTextListHead.Flink;
-
+
while (current_entry != &ModuleTextListHead &&
current_entry != NULL)
{
- current =
+ current =
CONTAINING_RECORD(current_entry, MODULE_TEXT_SECTION, ListEntry);
-
+
if (address >= (PVOID)current->Base &&
address < (PVOID)(current->Base + current->Length))
{
-
-#ifdef KDBG
-
- Offset = (ULONG)((ULONG)address - current->Base);
- Symbol = current->Symbols.Symbols;
- while (Symbol != NULL)
- {
- NextSymbol = Symbol->Next;
- if (NextSymbol != NULL)
- NextAddress = NextSymbol->RelativeAddress;
- else
- NextAddress = current->Length;
-
- if ((Offset >= Symbol->RelativeAddress) &&
- (Offset < NextAddress))
- {
- DbgPrint("<%ws: %x (%wZ)>", current->Name, Offset, &Symbol->Name);
- Printed = TRUE;
- break;
- }
- Symbol = NextSymbol;
- }
- if (!Printed)
- DbgPrint("<%ws: %x>", current->Name, Offset);
-
-#else /* KDBG */
-
- DbgPrint("<%ws: %x>", current->Name,
- address - current->Base);
-
-#endif /* KDBG */
-
- return(TRUE);
+ RelativeAddress = (ULONG_PTR) address - current->Base;
+ DbgPrint("<%ws: %x>", current->Name, RelativeAddress);
+ return(TRUE);
}
-
current_entry = current_entry->Flink;
}
return(FALSE);
}
+#endif /* KDBG */
ULONG
KiKernelTrapHandler(PKTRAP_FRAME Tf, ULONG ExceptionNr, PVOID Cr2)
{
EXCEPTION_RECORD Er;
- if (ExceptionNr == 0)
- {
- Er.ExceptionCode = STATUS_INTEGER_DIVIDE_BY_ZERO;
- }
- else if (ExceptionNr == 1)
- {
- Er.ExceptionCode = STATUS_SINGLE_STEP;
- }
- else if (ExceptionNr == 3)
- {
- Er.ExceptionCode = STATUS_BREAKPOINT;
- }
- else if (ExceptionNr == 4)
- {
- Er.ExceptionCode = STATUS_INTEGER_OVERFLOW;
- }
- else if (ExceptionNr == 5)
- {
- Er.ExceptionCode = STATUS_ARRAY_BOUNDS_EXCEEDED;
- }
- else if (ExceptionNr == 6)
- {
- Er.ExceptionCode = STATUS_ILLEGAL_INSTRUCTION;
- }
- else
- {
- Er.ExceptionCode = STATUS_ACCESS_VIOLATION;
- }
Er.ExceptionFlags = 0;
Er.ExceptionRecord = NULL;
Er.ExceptionAddress = (PVOID)Tf->Eip;
+
if (ExceptionNr == 14)
{
+ Er.ExceptionCode = STATUS_ACCESS_VIOLATION;
Er.NumberParameters = 2;
Er.ExceptionInformation[0] = Tf->ErrorCode & 0x1;
Er.ExceptionInformation[1] = (ULONG)Cr2;
}
else
{
+ if (ExceptionNr < ARRAY_SIZE(ExceptionToNtStatus))
+ {
+ Er.ExceptionCode = ExceptionToNtStatus[ExceptionNr];
+ }
+ else
+ {
+ Er.ExceptionCode = STATUS_ACCESS_VIOLATION;
+ }
Er.NumberParameters = 0;
}
+ Er.ExceptionFlags = ((NTSTATUS) STATUS_SINGLE_STEP == (NTSTATUS) Er.ExceptionCode
+ || (NTSTATUS) STATUS_BREAKPOINT == (NTSTATUS) Er.ExceptionCode) ?
+ EXCEPTION_NONCONTINUABLE : 0;
+
KiDispatchException(&Er, 0, Tf, KernelMode, TRUE);
return(0);
KiDoubleFaultHandler(VOID)
{
unsigned int cr2;
- ULONG i, j;
ULONG StackLimit;
ULONG StackBase;
ULONG Esp0;
ULONG ExceptionNr = 8;
KTSS* OldTss;
PULONG Frame;
+ ULONG OldCr3;
+#if 0
+ ULONG i, j;
static PVOID StackTrace[MM_STACK_SIZE / sizeof(PVOID)];
static ULONG StackRepeatCount[MM_STACK_SIZE / sizeof(PVOID)];
static ULONG StackRepeatLength[MM_STACK_SIZE / sizeof(PVOID)];
ULONG TraceLength;
BOOLEAN FoundRepeat;
-
- /* Use the address of the trap frame as approximation to the ring0 esp */
+#endif
+
OldTss = KeGetCurrentKPCR()->TSS;
Esp0 = OldTss->Esp;
-
+
/* Get CR2 */
- __asm__("movl %%cr2,%0\n\t" : "=d" (cr2));
-
+ cr2 = Ke386GetCr2();
+ if (PsGetCurrentThread() != NULL &&
+ PsGetCurrentThread()->ThreadsProcess != NULL)
+ {
+ OldCr3 = (ULONG)
+ PsGetCurrentThread()->ThreadsProcess->Pcb.DirectoryTableBase.QuadPart;
+ }
+ else
+ {
+ OldCr3 = 0xBEADF0AL;
+ }
+
/*
* Check for stack underflow
*/
Esp0, (ULONG)PsGetCurrentThread()->Tcb.StackLimit);
ExceptionNr = 12;
}
-
+
/*
* Print out the CPU registers
*/
- if (ExceptionNr < 19)
+ if (ExceptionNr < ARRAY_SIZE(ExceptionTypeStrings))
{
DbgPrint("%s Exception: %d(%x)\n", ExceptionTypeStrings[ExceptionNr],
ExceptionNr, 0);
DbgPrint("Exception: %d(%x)\n", ExceptionNr, 0);
}
DbgPrint("CS:EIP %x:%x ", OldTss->Cs, OldTss->Eip);
- print_address((PVOID)OldTss->Eip);
+ KeRosPrintAddress((PVOID)OldTss->Eip);
DbgPrint("\n");
- DbgPrint("cr2 %x cr3 %x ", cr2, OldTss->Cr3);
+ DbgPrint("cr2 %x cr3 %x ", cr2, OldCr3);
DbgPrint("Proc: %x ",PsGetCurrentProcess());
if (PsGetCurrentProcess() != NULL)
{
DbgPrint("\n");
DbgPrint("DS %x ES %x FS %x GS %x\n", OldTss->Ds, OldTss->Es,
OldTss->Fs, OldTss->Gs);
- DbgPrint("EAX: %.8x EBX: %.8x ECX: %.8x\n", OldTss->Eax, OldTss->Ebx,
+ DbgPrint("EAX: %.8x EBX: %.8x ECX: %.8x\n", OldTss->Eax, OldTss->Ebx,
OldTss->Ecx);
- DbgPrint("EDX: %.8x EBP: %.8x ESI: %.8x\n", OldTss->Edx, OldTss->Ebp,
- OldTss->Esi);
+ DbgPrint("EDX: %.8x EBP: %.8x ESI: %.8x\n ESP: %.8x", OldTss->Edx,
+ OldTss->Ebp, OldTss->Esi, Esp0);
DbgPrint("EDI: %.8x EFLAGS: %.8x ", OldTss->Edi, OldTss->Eflags);
if (OldTss->Cs == KERNEL_CS)
{
{
DbgPrint("kernel stack base %x\n",
PsGetCurrentThread()->Tcb.StackLimit);
-
+
}
}
else
}
if ((OldTss->Cs & 0xffff) == KERNEL_CS)
{
- DbgPrint("ESP %x\n", Esp0);
if (PsGetCurrentThread() != NULL)
{
StackLimit = (ULONG)PsGetCurrentThread()->Tcb.StackBase;
StackBase = (ULONG)&init_stack;
}
+ /*
+ Change to an #if 0 to reduce the amount of information printed on
+ a recursive stack trace.
+ */
+#if 1
+ DbgPrint("Frames: ");
+ Frame = (PULONG)OldTss->Ebp;
+ while (Frame != NULL && (ULONG)Frame >= StackBase)
+ {
+ KeRosPrintAddress((PVOID)Frame[1]);
+ Frame = (PULONG)Frame[0];
+ DbgPrint(" ");
+ }
+#else
DbgPrint("Frames: ");
i = 0;
Frame = (PULONG)OldTss->Ebp;
FoundRepeat = FALSE;
while ((j - i) <= (TraceLength - j) && FoundRepeat == FALSE)
{
- if (memcmp(&StackTrace[i], &StackTrace[j],
+ if (memcmp(&StackTrace[i], &StackTrace[j],
(j - i) * sizeof(PVOID)) == 0)
{
StackRepeatCount[i] = 2;
continue;
}
j = j + StackRepeatLength[i];
- while ((TraceLength - j) >= StackRepeatLength[i] &&
+ while ((TraceLength - j) >= StackRepeatLength[i] &&
FoundRepeat == TRUE)
{
- if (memcmp(&StackTrace[i], &StackTrace[j],
+ if (memcmp(&StackTrace[i], &StackTrace[j],
StackRepeatLength[i] * sizeof(PVOID)) == 0)
{
StackRepeatCount[i]++;
{
if (StackRepeatCount[i] == 0)
{
- print_address(StackTrace[i]);
+ KeRosPrintAddress(StackTrace[i]);
i++;
}
else
}
for (j = 0; j < StackRepeatLength[i]; j++)
{
- print_address(StackTrace[i + j]);
+ KeRosPrintAddress(StackTrace[i + j]);
}
DbgPrint("}*%d", StackRepeatCount[i]);
i = i + StackRepeatLength[i] * StackRepeatCount[i];
}
}
+#endif
}
-
+
DbgPrint("\n");
for(;;);
+ return 0;
}
-ULONG
-KiTrapHandler(PKTRAP_FRAME Tf, ULONG ExceptionNr)
-/*
- * FUNCTION: Called by the lowlevel execption handlers to print an amusing
- * message and halt the computer
- * ARGUMENTS:
- * Complete CPU context
- */
+VOID
+KiDumpTrapFrame(PKTRAP_FRAME Tf, ULONG Parameter1, ULONG Parameter2)
{
-//#define SEH
- unsigned int cr2;
-#ifndef SEH
- unsigned int cr3;
- unsigned int i;
- ULONG StackLimit;
- PULONG Frame;
-#endif
-// unsigned int j, sym;
- NTSTATUS Status;
- ULONG Esp0;
-
- /* Use the address of the trap frame as approximation to the ring0 esp */
- Esp0 = (ULONG)&Tf->Eip;
-
- /* Get CR2 */
- __asm__("movl %%cr2,%0\n\t" : "=d" (cr2));
-
- /*
- * If this was a V86 mode exception then handle it specially
- */
- if (Tf->Eflags & (1 << 17))
- {
- return(KeV86Exception(ExceptionNr, Tf, cr2));
- }
-
- /*
- * Check for stack underflow, this may be obsolete
- */
- if (PsGetCurrentThread() != NULL &&
- Esp0 < (ULONG)PsGetCurrentThread()->Tcb.StackLimit)
- {
- DbgPrint("Stack underflow (tf->esp %x Limit %x)\n",
- Esp0, (ULONG)PsGetCurrentThread()->Tcb.StackLimit);
- ExceptionNr = 12;
- }
-
- /*
- * Maybe handle the page fault and return
- */
- if (ExceptionNr == 14)
- {
- __asm__("sti\n\t");
- Status = MmPageFault(Tf->Cs&0xffff,
- &Tf->Eip,
- &Tf->Eax,
- cr2,
- Tf->ErrorCode);
- if (NT_SUCCESS(Status))
- {
- return(0);
- }
-
- }
-
- /*
- * Handle user exceptions differently
- */
- if ((Tf->Cs & 0xFFFF) == USER_CS)
- {
- return(KiUserTrapHandler(Tf, ExceptionNr, (PVOID)cr2));
- }
- else
- {
-#ifdef SEH
- return(KiKernelTrapHandler(Tf, ExceptionNr, (PVOID)cr2));
-#endif
- }
-
+ ULONG cr3_;
+ ULONG i;
+ ULONG StackLimit;
+ PULONG Frame;
+ ULONG Esp0;
+ ULONG ExceptionNr = (ULONG)Tf->DebugArgMark;
+ ULONG cr2 = (ULONG)Tf->DebugPointer;
-#ifndef SEH
+ Esp0 = (ULONG)Tf;
/*
* Print out the CPU registers
*/
- if (ExceptionNr < 19)
+ if (ExceptionNr < ARRAY_SIZE(ExceptionTypeStrings))
{
DbgPrint("%s Exception: %d(%x)\n", ExceptionTypeStrings[ExceptionNr],
ExceptionNr, Tf->ErrorCode&0xffff);
}
DbgPrint("Processor: %d CS:EIP %x:%x ", KeGetCurrentProcessorNumber(),
Tf->Cs&0xffff, Tf->Eip);
- print_address((PVOID)Tf->Eip);
+ KeRosPrintAddress((PVOID)Tf->Eip);
DbgPrint("\n");
- __asm__("movl %%cr3,%0\n\t" : "=d" (cr3));
- DbgPrint("cr2 %x cr3 %x ", cr2, cr3);
+ Ke386GetPageTableDirectory(cr3_);
+ DbgPrint("cr2 %x cr3 %x ", cr2, cr3_);
DbgPrint("Proc: %x ",PsGetCurrentProcess());
if (PsGetCurrentProcess() != NULL)
{
DbgPrint("DS %x ES %x FS %x GS %x\n", Tf->Ds&0xffff, Tf->Es&0xffff,
Tf->Fs&0xffff, Tf->Gs&0xfff);
DbgPrint("EAX: %.8x EBX: %.8x ECX: %.8x\n", Tf->Eax, Tf->Ebx, Tf->Ecx);
- DbgPrint("EDX: %.8x EBP: %.8x ESI: %.8x\n", Tf->Edx, Tf->Ebp, Tf->Esi);
+ DbgPrint("EDX: %.8x EBP: %.8x ESI: %.8x ESP: %.8x\n", Tf->Edx,
+ Tf->Ebp, Tf->Esi, Esp0);
DbgPrint("EDI: %.8x EFLAGS: %.8x ", Tf->Edi, Tf->Eflags);
if ((Tf->Cs&0xffff) == KERNEL_CS)
{
{
DbgPrint("kernel stack base %x\n",
PsGetCurrentThread()->Tcb.StackLimit);
-
+
}
}
- DbgPrint("ESP %x\n", Esp0);
-
if (PsGetCurrentThread() != NULL)
{
StackLimit = (ULONG)PsGetCurrentThread()->Tcb.StackBase;
{
StackLimit = (ULONG)&init_stack_top;
}
-
+
/*
* Dump the stack frames
*/
DbgPrint("Frames: ");
+ /* Change to an #if 0 if no frames are printed because of fpo. */
+#if 1
i = 1;
Frame = (PULONG)Tf->Ebp;
while (Frame != NULL)
{
- print_address((PVOID)Frame[1]);
- Frame = (PULONG)Frame[0];
+ NTSTATUS Status;
+ PVOID Eip;
+ Status = MmSafeCopyFromUser(&Eip, Frame + 1, sizeof(Eip));
+ if (!NT_SUCCESS(Status))
+ {
+ DbgPrint("<INVALID>");
+ break;
+ }
+ if (!KeRosPrintAddress(Eip))
+ {
+ DbgPrint("<%X>", Eip);
+ }
+ Status = MmSafeCopyFromUser(&Frame, Frame, sizeof(Frame));
+ if (!NT_SUCCESS(Status))
+ {
+ break;
+ }
i++;
+ DbgPrint(" ");
}
- if ((i % 8) != 0)
+#else
+ i = 1;
+ Frame = (PULONG)((ULONG_PTR)Esp0 + KTRAP_FRAME_EFLAGS);
+ while (Frame < (PULONG)PsGetCurrentThread()->Tcb.StackBase && i < 50)
{
- DbgPrint("\n");
+ ULONG Address = *Frame;
+ if (KeRosPrintAddress((PVOID)Address))
+ {
+ i++;
+ }
+ Frame++;
}
-
- for(;;);
-
- return 0;
#endif
}
-VOID
-KeDumpStackFrames(PULONG Frame)
+ULONG
+KiTrapHandler(PKTRAP_FRAME Tf, ULONG ExceptionNr)
+/*
+ * FUNCTION: Called by the lowlevel execption handlers to print an amusing
+ * message and halt the computer
+ * ARGUMENTS:
+ * Complete CPU context
+ */
{
- ULONG i;
+ unsigned int cr2;
+ NTSTATUS Status;
+ ULONG Esp0;
- DbgPrint("Frames: ");
- i = 1;
- while (Frame != NULL)
- {
- print_address((PVOID)Frame[1]);
- Frame = (PULONG)Frame[0];
- i++;
- }
- if ((i % 8) != 0)
+ /* Store the exception number in an unused field in the trap frame. */
+ Tf->DebugArgMark = (PVOID)ExceptionNr;
+
+ /* Use the address of the trap frame as approximation to the ring0 esp */
+ Esp0 = (ULONG)&Tf->Eip;
+
+ /* Get CR2 */
+ cr2 = Ke386GetCr2();
+ Tf->DebugPointer = (PVOID)cr2;
+
+ if (ExceptionNr == 14 && Tf->Eflags & FLAG_IF)
+ {
+ Ke386EnableInterrupts();
+ }
+
+ /*
+ * If this was a V86 mode exception then handle it specially
+ */
+ if (Tf->Eflags & (1 << 17))
+ {
+ return(KeV86Exception(ExceptionNr, Tf, cr2));
+ }
+
+ /*
+ * Check for stack underflow, this may be obsolete
+ */
+ if (PsGetCurrentThread() != NULL &&
+ Esp0 < (ULONG)PsGetCurrentThread()->Tcb.StackLimit)
+ {
+ DbgPrint("Stack underflow (tf->esp %x Limit %x)\n",
+ Esp0, (ULONG)PsGetCurrentThread()->Tcb.StackLimit);
+ ExceptionNr = 12;
+ }
+
+ /*
+ * Maybe handle the page fault and return
+ */
+ if (ExceptionNr == 14)
+ {
+ if (Ke386NoExecute && Tf->ErrorCode & 0x10 && cr2 >= KERNEL_BASE)
+ {
+ KEBUGCHECKWITHTF(ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY, 0, 0, 0, 0, Tf);
+ }
+ Status = MmPageFault(Tf->Cs&0xffff,
+ &Tf->Eip,
+ &Tf->Eax,
+ cr2,
+ Tf->ErrorCode);
+ if (NT_SUCCESS(Status))
+ {
+ return(0);
+ }
+ }
+
+ /*
+ * Check for a breakpoint that was only for the attention of the debugger.
+ */
+ if (ExceptionNr == 3 && Tf->Eip == ((ULONG)DbgBreakPointNoBugCheck) + 1)
+ {
+ /*
+ EIP is already adjusted by the processor to point to the instruction
+ after the breakpoint.
+ */
+ return(0);
+ }
+
+ /*
+ * Try to handle device-not-present, math-fault and xmm-fault exceptions.
+ */
+ if (ExceptionNr == 7 || ExceptionNr == 16 || ExceptionNr == 19)
+ {
+ Status = KiHandleFpuFault(Tf, ExceptionNr);
+ if (NT_SUCCESS(Status))
+ {
+ return(0);
+ }
+ }
+
+ /*
+ * Handle user exceptions differently
+ */
+ if ((Tf->Cs & 0xFFFF) == USER_CS)
+ {
+ return(KiUserTrapHandler(Tf, ExceptionNr, (PVOID)cr2));
+ }
+ else
{
- DbgPrint("\n");
+ return(KiKernelTrapHandler(Tf, ExceptionNr, (PVOID)cr2));
}
}
+VOID
+KeDumpStackFrames(PULONG Frame)
+{
+ DbgPrint("Frames: ");
+ while ( MmIsAddressValid(Frame) )
+ {
+ if (!KeRosPrintAddress((PVOID)Frame[1]))
+ {
+ DbgPrint("<%X>", (PVOID)Frame[1]);
+ }
+ Frame = (PULONG)Frame[0];
+ DbgPrint(" ");
+ }
+ DbgPrint("\n");
+}
+
+VOID STDCALL
+KeRosDumpStackFrames ( PULONG Frame, ULONG FrameCount )
+{
+ ULONG i=0;
+
+ DbgPrint("Frames: ");
+ if ( !Frame )
+ {
+#if defined __GNUC__
+ __asm__("mov %%ebp, %%ebx" : "=b" (Frame) : );
+#elif defined(_MSC_VER)
+ __asm mov [Frame], ebp
+#endif
+ Frame = (PULONG)Frame[0]; // step out of KeRosDumpStackFrames
+ }
+ while ( MmIsAddressValid(Frame) && i++ < FrameCount )
+ {
+ ULONG Addr = Frame[1];
+ if (!KeRosPrintAddress((PVOID)Addr))
+ {
+ DbgPrint("<%X>", Addr);
+ }
+ if ( Addr == 0 || Addr == 0xDEADBEEF )
+ {
+ break;
+ }
+ Frame = (PULONG)Frame[0];
+ DbgPrint(" ");
+ }
+ DbgPrint("\n");
+}
+
static void set_system_call_gate(unsigned int sel, unsigned int func)
{
DPRINT("sel %x %d\n",sel,sel);
DPRINT("set_interrupt_gate(sel %d, func %x)\n",sel,func);
KiIdt[sel].a = (((int)func)&0xffff) +
(KERNEL_CS << 16);
- KiIdt[sel].b = 0x8f00 + (((int)func)&0xffff0000);
+ KiIdt[sel].b = 0x8e00 + (((int)func)&0xffff0000);
+}
+
+static void set_trap_gate(unsigned int sel, unsigned int func, unsigned int dpl)
+{
+ DPRINT("set_trap_gate(sel %d, func %x, dpl %d)\n",sel, func, dpl);
+ ASSERT(dpl <= 3);
+ KiIdt[sel].a = (((int)func)&0xffff) +
+ (KERNEL_CS << 16);
+ KiIdt[sel].b = 0x8f00 + (dpl << 13) + (((int)func)&0xffff0000);
}
static void
KiIdt[sel].b = 0x8500;
}
-VOID
+VOID INIT_FUNCTION
KeInitExceptions(VOID)
/*
* FUNCTION: Initalize CPU exception handling
/*
* Set up the other gates
*/
- set_interrupt_gate(0, (ULONG)KiTrap0);
- set_interrupt_gate(1, (ULONG)KiTrap1);
- set_interrupt_gate(2, (ULONG)KiTrap2);
- set_interrupt_gate(3, (ULONG)KiTrap3);
- set_interrupt_gate(4, (ULONG)KiTrap4);
- set_interrupt_gate(5, (ULONG)KiTrap5);
- set_interrupt_gate(6, (ULONG)KiTrap6);
- set_interrupt_gate(7, (ULONG)KiTrap7);
+ set_trap_gate(0, (ULONG)KiTrap0, 0);
+ set_trap_gate(1, (ULONG)KiTrap1, 0);
+ set_trap_gate(2, (ULONG)KiTrap2, 0);
+ set_trap_gate(3, (ULONG)KiTrap3, 3);
+ set_trap_gate(4, (ULONG)KiTrap4, 0);
+ set_trap_gate(5, (ULONG)KiTrap5, 0);
+ set_trap_gate(6, (ULONG)KiTrap6, 0);
+ set_trap_gate(7, (ULONG)KiTrap7, 0);
set_task_gate(8, TRAP_TSS_SELECTOR);
- set_interrupt_gate(9, (ULONG)KiTrap9);
- set_interrupt_gate(10, (ULONG)KiTrap10);
- set_interrupt_gate(11, (ULONG)KiTrap11);
- set_interrupt_gate(12, (ULONG)KiTrap12);
- set_interrupt_gate(13, (ULONG)KiTrap13);
+ set_trap_gate(9, (ULONG)KiTrap9, 0);
+ set_trap_gate(10, (ULONG)KiTrap10, 0);
+ set_trap_gate(11, (ULONG)KiTrap11, 0);
+ set_trap_gate(12, (ULONG)KiTrap12, 0);
+ set_trap_gate(13, (ULONG)KiTrap13, 0);
set_interrupt_gate(14, (ULONG)KiTrap14);
- set_interrupt_gate(15, (ULONG)KiTrap15);
- set_interrupt_gate(16, (ULONG)KiTrap16);
-
- for (i=17;i<256;i++)
- {
- set_interrupt_gate(i,(int)KiTrapUnknown);
- }
-
+ set_trap_gate(15, (ULONG)KiTrap15, 0);
+ set_trap_gate(16, (ULONG)KiTrap16, 0);
+ set_trap_gate(17, (ULONG)KiTrap17, 0);
+ set_trap_gate(18, (ULONG)KiTrap18, 0);
+ set_trap_gate(19, (ULONG)KiTrap19, 0);
+
+ for (i = 20; i < 256; i++)
+ {
+ set_trap_gate(i,(int)KiTrapUnknown, 0);
+ }
+
set_system_call_gate(0x2d,(int)interrupt_handler2d);
set_system_call_gate(0x2e,(int)interrupt_handler2e);
}
+
+/*
+ * @implemented
+ */
+
+NTSTATUS STDCALL
+KeRaiseUserException(IN NTSTATUS ExceptionCode)
+{
+ /* FIXME: This needs SEH */
+ ULONG OldEip;
+ PKTHREAD Thread = KeGetCurrentThread();
+
+ ProbeForWrite(&Thread->Teb->ExceptionCode, sizeof(NTSTATUS), sizeof(NTSTATUS)); /* NT doesn't check this -- bad? */
+ OldEip = Thread->TrapFrame->Eip;
+ Thread->TrapFrame->Eip = (ULONG_PTR)LdrpGetSystemDllRaiseExceptionDispatcher();
+ Thread->Teb->ExceptionCode = ExceptionCode;
+ return((NTSTATUS)OldEip);
+}
+
+VOID
+FASTCALL
+KeRosTrapReturn ( PKTRAP_FRAME TrapFrame, PKTRAP_FRAME PrevTrapFrame );
+
+/*
+ * @implemented
+ */
+NTSTATUS STDCALL
+NtRaiseException (
+ IN PEXCEPTION_RECORD ExceptionRecord,
+ IN PCONTEXT Context,
+ IN BOOLEAN SearchFrames)
+{
+ PKTRAP_FRAME TrapFrame = KeGetCurrentThread()->TrapFrame;
+ PKTRAP_FRAME PrevTrapFrame = (PKTRAP_FRAME)TrapFrame->Edx;
+
+ KeGetCurrentKPCR()->Tib.ExceptionList = TrapFrame->ExceptionList;
+
+ KiDispatchException(ExceptionRecord,
+ Context,
+ PsGetCurrentThread()->Tcb.TrapFrame,
+ (KPROCESSOR_MODE)ExGetPreviousMode(),
+ SearchFrames);
+
+ KeRosTrapReturn ( TrapFrame, PrevTrapFrame );
+ return(STATUS_SUCCESS);
+}