ReactOS  0.4.15-dev-344-g6808e40
traphdlr.c
Go to the documentation of this file.
1 /*
2  * PROJECT: ReactOS Kernel
3  * LICENSE: BSD - See COPYING.ARM in the top level directory
4  * FILE: ntoskrnl/ke/i386/traphdlr.c
5  * PURPOSE: Kernel Trap Handlers
6  * PROGRAMMERS: ReactOS Portable Systems Group
7  */
8 
9 /* INCLUDES *******************************************************************/
10 
11 #include <ntoskrnl.h>
12 #define NDEBUG
13 #include <debug.h>
14 
17 
20 extern PVOID FrRestore;
22 
23 /* GLOBALS ********************************************************************/
24 
26 {
27  0xF2, /* REP */
28  0xF3, /* REP INS/OUTS */
29  0x67, /* ADDR */
30  0xF0, /* LOCK */
31  0x66, /* OP */
32  0x2E, /* SEG */
33  0x3E, /* DS */
34  0x26, /* ES */
35  0x64, /* FS */
36  0x65, /* GS */
37  0x36, /* SS */
38 };
39 
41 {
42  0xE4, /* IN */
43  0xE5, /* IN */
44  0xEC, /* IN */
45  0xED, /* IN */
46  0x6C, /* INS */
47  0x6D, /* INS */
48  0xE6, /* OUT */
49  0xE7, /* OUT */
50  0xEE, /* OUT */
51  0xEF, /* OUT */
52  0x6E, /* OUTS */
53  0x6F, /* OUTS */
54 };
55 
57 #if DBG && defined(_M_IX86) && !defined(_WINKD_)
58 PKDBG_PRESERVICEHOOK KeWin32PreServiceHook = NULL;
59 PKDBG_POSTSERVICEHOOK KeWin32PostServiceHook = NULL;
60 #endif
61 #if DBG
62 BOOLEAN StopChecking = FALSE;
63 #endif
64 
65 
66 /* TRAP EXIT CODE *************************************************************/
67 
69 BOOLEAN
71 {
72  /* Either the V8086 flag is on, or this is user-mode with a VDM */
73  return ((TrapFrame->EFlags & EFLAGS_V86_MASK) ||
74  ((KiUserTrap(TrapFrame)) && (PsGetCurrentProcess()->VdmObjects)));
75 }
76 
78 BOOLEAN
80 {
81  /* Check if the V8086 flag is on */
82  return ((TrapFrame->EFlags & EFLAGS_V86_MASK) != 0);
83 }
84 
86 BOOLEAN
88 {
89  /* An edited frame changes esp. It is marked by clearing the bits
90  defined by FRAME_EDITED in the SegCs field of the trap frame */
91  return ((TrapFrame->SegCs & FRAME_EDITED) == 0);
92 }
93 
95 VOID
96 KiCommonExit(IN PKTRAP_FRAME TrapFrame, BOOLEAN SkipPreviousMode)
97 {
98  /* Disable interrupts until we return */
99  _disable();
100 
101  /* Check for APC delivery */
102  KiCheckForApcDelivery(TrapFrame);
103 
104  /* Restore the SEH handler chain */
105  KeGetPcr()->NtTib.ExceptionList = TrapFrame->ExceptionList;
106 
107  /* Check if there are active debug registers */
108  if (__builtin_expect(TrapFrame->Dr7 & ~DR7_RESERVED_MASK, 0))
109  {
110  /* Check if the frame was from user mode or v86 mode */
111  if (KiUserTrap(TrapFrame) ||
112  (TrapFrame->EFlags & EFLAGS_V86_MASK))
113  {
114  /* Handle debug registers */
116  }
117  }
118 
119  /* Debugging checks */
120  KiExitTrapDebugChecks(TrapFrame, SkipPreviousMode);
121 }
122 
124 VOID
125 FASTCALL
127 {
128  /* Common trap exit code */
129  KiCommonExit(TrapFrame, TRUE);
130 
131  /* Check if this was a V8086 trap */
132  if (TrapFrame->EFlags & EFLAGS_V86_MASK) KiTrapReturnNoSegments(TrapFrame);
133 
134  /* Check for user mode exit */
135  if (KiUserTrap(TrapFrame)) KiTrapReturn(TrapFrame);
136 
137  /* Check for edited frame */
138  if (KiIsFrameEdited(TrapFrame)) KiEditedTrapReturn(TrapFrame);
139 
140  /* Check if we have single stepping enabled */
141  if (TrapFrame->EFlags & EFLAGS_TF) KiTrapReturnNoSegments(TrapFrame);
142 
143  /* Exit the trap to kernel mode */
144  KiTrapReturnNoSegmentsRet8(TrapFrame);
145 }
146 
148 VOID
149 FASTCALL
152 {
153  ASSERT((TrapFrame->EFlags & EFLAGS_V86_MASK) == 0);
154  ASSERT(!KiIsFrameEdited(TrapFrame));
155 
156  /* Copy the status into EAX */
157  TrapFrame->Eax = Status;
158 
159  /* Common trap exit code */
160  KiCommonExit(TrapFrame, FALSE);
161 
162  /* Restore previous mode */
163  KeGetCurrentThread()->PreviousMode = (CCHAR)TrapFrame->PreviousPreviousMode;
164 
165  /* Check for user mode exit */
166  if (KiUserTrap(TrapFrame))
167  {
168  /* Check if we were single stepping */
169  if (TrapFrame->EFlags & EFLAGS_TF)
170  {
171  /* Must use the IRET handler */
172  KiSystemCallTrapReturn(TrapFrame);
173  }
174  else
175  {
176  /* We can use the sysexit handler */
177  KiFastCallExitHandler(TrapFrame);
178  UNREACHABLE;
179  }
180  }
181 
182  /* Exit to kernel mode */
183  KiSystemCallReturn(TrapFrame);
184 }
185 
187 VOID
188 FASTCALL
190 {
191  /* Common trap exit code */
192  KiCommonExit(TrapFrame, FALSE);
193 
194  /* Restore previous mode */
195  KeGetCurrentThread()->PreviousMode = (CCHAR)TrapFrame->PreviousPreviousMode;
196 
197  /* Check if this was a V8086 trap */
198  if (TrapFrame->EFlags & EFLAGS_V86_MASK) KiTrapReturnNoSegments(TrapFrame);
199 
200  /* Check for user mode exit */
201  if (KiUserTrap(TrapFrame)) KiTrapReturn(TrapFrame);
202 
203  /* Check for edited frame */
204  if (KiIsFrameEdited(TrapFrame)) KiEditedTrapReturn(TrapFrame);
205 
206  /* Check if we have single stepping enabled */
207  if (TrapFrame->EFlags & EFLAGS_TF) KiTrapReturnNoSegments(TrapFrame);
208 
209  /* Exit the trap to kernel mode */
210  KiTrapReturnNoSegmentsRet8(TrapFrame);
211 }
212 
213 
214 /* TRAP HANDLERS **************************************************************/
215 
217 VOID
218 FASTCALL
220  IN ULONG Parameter1,
221  IN ULONG Parameter2,
222  IN ULONG Parameter3)
223 {
224  /* Check for VDM trap */
225  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
226 
227  /* Enable interrupts if the trap came from user-mode */
228  if (KiUserTrap(TrapFrame)) _enable();
229 
230  /* Dispatch the exception */
232  0,
233  TrapFrame->Eip - 1,
234  3,
235  Parameter1,
236  Parameter2,
237  Parameter3,
238  TrapFrame);
239 }
240 
242 VOID
243 FASTCALL
246  IN PFX_SAVE_AREA SaveArea)
247 {
248  ULONG Cr0, Mask, Error, ErrorOffset, DataOffset;
249 
250  /* Check for VDM trap */
251  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
252 
253  /* Check for kernel trap */
254  if (!KiUserTrap(TrapFrame))
255  {
256  /* Kernel might've tripped a delayed error */
257  SaveArea->Cr0NpxState |= CR0_TS;
258 
259  /* Only valid if it happened during a restore */
260  if ((PVOID)TrapFrame->Eip == FrRestore)
261  {
262  /* It did, so just skip the instruction */
263  TrapFrame->Eip += 3; /* Size of FRSTOR instruction */
264  KiEoiHelper(TrapFrame);
265  }
266  }
267 
268  /* User or kernel trap -- check if we need to unload the current state */
269  if (Thread->NpxState == NPX_STATE_LOADED)
270  {
271  /* Update CR0 */
272  Cr0 = __readcr0();
273  Cr0 &= ~(CR0_MP | CR0_EM | CR0_TS);
274  __writecr0(Cr0);
275 
276  /* Save FPU state */
277  Ke386SaveFpuState(SaveArea);
278 
279  /* Mark CR0 state dirty */
280  Cr0 |= NPX_STATE_NOT_LOADED;
281  Cr0 |= SaveArea->Cr0NpxState;
282  __writecr0(Cr0);
283 
284  /* Update NPX state */
285  Thread->NpxState = NPX_STATE_NOT_LOADED;
286  KeGetCurrentPrcb()->NpxThread = NULL;
287  }
288 
289  /* Clear the TS bit and re-enable interrupts */
290  SaveArea->Cr0NpxState &= ~CR0_TS;
291  _enable();
292 
293  /* Check if we should get the FN or FX error */
294  if (KeI386FxsrPresent)
295  {
296  /* Get it from FX */
297  Mask = SaveArea->U.FxArea.ControlWord;
298  Error = SaveArea->U.FxArea.StatusWord;
299 
300  /* Get the FPU exception address too */
301  ErrorOffset = SaveArea->U.FxArea.ErrorOffset;
302  DataOffset = SaveArea->U.FxArea.DataOffset;
303  }
304  else
305  {
306  /* Get it from FN */
307  Mask = SaveArea->U.FnArea.ControlWord;
308  Error = SaveArea->U.FnArea.StatusWord;
309 
310  /* Get the FPU exception address too */
311  ErrorOffset = SaveArea->U.FnArea.ErrorOffset;
312  DataOffset = SaveArea->U.FnArea.DataOffset;
313  }
314 
315  /* Get legal exceptions that software should handle */
316  Mask &= (FSW_INVALID_OPERATION |
317  FSW_DENORMAL |
319  FSW_OVERFLOW |
320  FSW_UNDERFLOW |
321  FSW_PRECISION);
322  Error &= ~Mask;
323 
324  /* Check for invalid operation */
326  {
327  /*
328  * Now check if this is actually a Stack Fault. This is needed because
329  * on x86 the Invalid Operation error is set for Stack Check faults as well.
330  */
331  if (Error & FSW_STACK_FAULT)
332  {
333  /* Issue stack check fault */
335  ErrorOffset,
336  0,
337  DataOffset,
338  TrapFrame);
339  }
340  else
341  {
342  /* This is an invalid operation fault after all, so raise that instead */
344  ErrorOffset,
345  0,
346  TrapFrame);
347  }
348  }
349 
350  /* Check for divide by zero */
351  if (Error & FSW_ZERO_DIVIDE)
352  {
353  /* Issue fault */
355  ErrorOffset,
356  0,
357  TrapFrame);
358  }
359 
360  /* Check for denormal */
361  if (Error & FSW_DENORMAL)
362  {
363  /* Issue fault */
365  ErrorOffset,
366  0,
367  TrapFrame);
368  }
369 
370  /* Check for overflow */
371  if (Error & FSW_OVERFLOW)
372  {
373  /* Issue fault */
375  ErrorOffset,
376  0,
377  TrapFrame);
378  }
379 
380  /* Check for underflow */
381  if (Error & FSW_UNDERFLOW)
382  {
383  /* Issue fault */
385  ErrorOffset,
386  0,
387  TrapFrame);
388  }
389 
390  /* Check for precision fault */
391  if (Error & FSW_PRECISION)
392  {
393  /* Issue fault */
395  ErrorOffset,
396  0,
397  TrapFrame);
398  }
399 
400  /* Unknown FPU fault */
401  KeBugCheckWithTf(TRAP_CAUSE_UNKNOWN, 1, Error, 0, 0, TrapFrame);
402 }
403 
405 VOID
406 FASTCALL
408 {
409  /* Save trap frame */
410  KiEnterTrap(TrapFrame);
411 
412  /* Check for VDM trap */
413  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
414 
415  /* Enable interrupts */
416  _enable();
417 
418  /* Dispatch the exception */
420  TrapFrame->Eip,
421  TrapFrame);
422 }
423 
425 VOID
426 FASTCALL
428 {
429  /* Save trap frame */
430  KiEnterTrap(TrapFrame);
431 
432  /* Check for VDM trap */
433  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
434 
435  /* Check if this was a single step after sysenter */
436  if (TrapFrame->Eip == (ULONG)KiFastCallEntry)
437  {
438  /* Disable single stepping */
439  TrapFrame->EFlags &= ~EFLAGS_TF;
440 
441  /* Re-enter at the alternative sysenter entry point */
442  TrapFrame->Eip = (ULONG)KiFastCallEntryWithSingleStep;
443 
444  /* End this trap */
445  KiEoiHelper(TrapFrame);
446  }
447 
448  /* Enable interrupts if the trap came from user-mode */
449  if (KiUserTrap(TrapFrame)) _enable();
450 
451  /* Mask out trap flag and dispatch the exception */
452  TrapFrame->EFlags &= ~EFLAGS_TF;
454  TrapFrame->Eip,
455  TrapFrame);
456 }
457 
458 VOID
459 __cdecl
461 {
462  PKTSS Tss, NmiTss;
465  PKGDTENTRY TssGdt;
466  KTRAP_FRAME TrapFrame;
467  KIRQL OldIrql;
468 
469  /*
470  * In some sort of strange recursion case, we might end up here with the IF
471  * flag incorrectly on the interrupt frame -- during a normal NMI this would
472  * normally already be set.
473  *
474  * For sanity's sake, make sure interrupts are disabled for sure.
475  * NMIs will already be since the CPU does it for us.
476  */
477  _disable();
478 
479  /* Get the current TSS, thread, and process */
480  Tss = KeGetPcr()->TSS;
482  Process = Thread->ApcState.Process;
483 
484  /* Save data usually not present in the TSS */
485  Tss->CR3 = Process->DirectoryTableBase[0];
486  Tss->IoMapBase = Process->IopmOffset;
487  Tss->LDT = Process->LdtDescriptor.LimitLow ? KGDT_LDT : 0;
488 
489  /* Now get the base address of the NMI TSS */
490  TssGdt = &((PKIPCR)KeGetPcr())->GDT[KGDT_NMI_TSS / sizeof(KGDTENTRY)];
491  NmiTss = (PKTSS)(ULONG_PTR)(TssGdt->BaseLow |
492  TssGdt->HighWord.Bytes.BaseMid << 16 |
493  TssGdt->HighWord.Bytes.BaseHi << 24);
494 
495  /*
496  * Switch to it and activate it, masking off the nested flag.
497  *
498  * Note that in reality, we are already on the NMI TSS -- we just
499  * need to update the PCR to reflect this.
500  */
501  KeGetPcr()->TSS = NmiTss;
503  TssGdt->HighWord.Bits.Dpl = 0;
504  TssGdt->HighWord.Bits.Pres = 1;
505  TssGdt->HighWord.Bits.Type = I386_TSS;
506 
507  /*
508  * Now build the trap frame based on the original TSS.
509  *
510  * The CPU does a hardware "Context switch" / task switch of sorts
511  * and so it takes care of saving our context in the normal TSS.
512  *
513  * We just have to go get the values...
514  */
515  RtlZeroMemory(&TrapFrame, sizeof(KTRAP_FRAME));
516  TrapFrame.HardwareSegSs = Tss->Ss0;
517  TrapFrame.HardwareEsp = Tss->Esp0;
518  TrapFrame.EFlags = Tss->EFlags;
519  TrapFrame.SegCs = Tss->Cs;
520  TrapFrame.Eip = Tss->Eip;
521  TrapFrame.Ebp = Tss->Ebp;
522  TrapFrame.Ebx = Tss->Ebx;
523  TrapFrame.Esi = Tss->Esi;
524  TrapFrame.Edi = Tss->Edi;
525  TrapFrame.SegFs = Tss->Fs;
526  TrapFrame.ExceptionList = KeGetPcr()->NtTib.ExceptionList;
527  TrapFrame.PreviousPreviousMode = (ULONG)-1;
528  TrapFrame.Eax = Tss->Eax;
529  TrapFrame.Ecx = Tss->Ecx;
530  TrapFrame.Edx = Tss->Edx;
531  TrapFrame.SegDs = Tss->Ds;
532  TrapFrame.SegEs = Tss->Es;
533  TrapFrame.SegGs = Tss->Gs;
534  TrapFrame.DbgEip = Tss->Eip;
535  TrapFrame.DbgEbp = Tss->Ebp;
536 
537  /* Store the trap frame in the KPRCB */
538  KiSaveProcessorState(&TrapFrame, NULL);
539 
540  /* Call any registered NMI handlers and see if they handled it or not */
541  if (!KiHandleNmi())
542  {
543  /*
544  * They did not, so call the platform HAL routine to bugcheck the system
545  *
546  * Make sure the HAL believes it's running at HIGH IRQL... we can't use
547  * the normal APIs here as playing with the IRQL could change the system
548  * state.
549  */
550  OldIrql = KeGetPcr()->Irql;
551  KeGetPcr()->Irql = HIGH_LEVEL;
553  KeGetPcr()->Irql = OldIrql;
554  }
555 
556  /*
557  * Although the CPU disabled NMIs, we just did a BIOS call, which could've
558  * totally changed things.
559  *
560  * We have to make sure we're still in our original NMI -- a nested NMI
561  * will point back to the NMI TSS, and in that case we're hosed.
562  */
563  if (KeGetPcr()->TSS->Backlink == KGDT_NMI_TSS)
564  {
565  /* Unhandled: crash the system */
567  }
568 
569  /* Restore original TSS */
570  KeGetPcr()->TSS = Tss;
571 
572  /* Set it back to busy */
573  TssGdt->HighWord.Bits.Dpl = 0;
574  TssGdt->HighWord.Bits.Pres = 1;
575  TssGdt->HighWord.Bits.Type = I386_ACTIVE_TSS;
576 
577  /* Restore nested flag */
579 
580  /* Handled, return from interrupt */
581 }
582 
584 VOID
585 FASTCALL
587 {
588  /* Save trap frame */
589  KiEnterTrap(TrapFrame);
590 
591  /* Continue with the common handler */
592  KiDebugHandler(TrapFrame, BREAKPOINT_BREAK, 0, 0);
593 }
594 
596 VOID
597 FASTCALL
599 {
600  /* Save trap frame */
601  KiEnterTrap(TrapFrame);
602 
603  /* Check for VDM trap */
604  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
605 
606  /* Enable interrupts */
607  _enable();
608 
609  /* Dispatch the exception */
611  TrapFrame->Eip - 1,
612  TrapFrame);
613 }
614 
616 VOID
617 FASTCALL
619 {
620  /* Save trap frame */
621  KiEnterTrap(TrapFrame);
622 
623  /* Check for VDM trap */
624  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
625 
626  /* Check for kernel-mode fault */
627  if (!KiUserTrap(TrapFrame)) KiSystemFatalException(EXCEPTION_BOUND_CHECK, TrapFrame);
628 
629  /* Enable interrupts */
630  _enable();
631 
632  /* Dispatch the exception */
634  TrapFrame->Eip,
635  TrapFrame);
636 }
637 
639 VOID
640 FASTCALL
642 {
643  PUCHAR Instruction;
644  ULONG i;
645  KIRQL OldIrql;
646 
647  /* Check for V86 GPF */
648  if (__builtin_expect(KiV86Trap(TrapFrame), 1))
649  {
650  /* Enter V86 trap */
651  KiEnterV86Trap(TrapFrame);
652 
653  /* Must be a VDM process */
654  if (__builtin_expect(!PsGetCurrentProcess()->VdmObjects, 0))
655  {
656  /* Enable interrupts */
657  _enable();
658 
659  /* Setup illegal instruction fault */
661  TrapFrame->Eip,
662  TrapFrame);
663  }
664 
665  /* Go to APC level */
667  _enable();
668 
669  /* Check for BOP */
670  if (!VdmDispatchBop(TrapFrame))
671  {
672  /* Should only happen in VDM mode */
674  }
675 
676  /* Bring IRQL back */
678  _disable();
679 
680  /* Do a quick V86 exit if possible */
681  KiExitV86Trap(TrapFrame);
682  }
683 
684  /* Save trap frame */
685  KiEnterTrap(TrapFrame);
686 
687  /* Enable interrupts */
688  Instruction = (PUCHAR)TrapFrame->Eip;
689  _enable();
690 
691  /* Check for user trap */
692  if (KiUserTrap(TrapFrame))
693  {
694  /* FIXME: Use SEH */
695 
696  /* Scan next 4 opcodes */
697  for (i = 0; i < 4; i++)
698  {
699  /* Check for LOCK instruction */
700  if (Instruction[i] == 0xF0)
701  {
702  /* Send invalid lock sequence exception */
704  TrapFrame->Eip,
705  TrapFrame);
706  }
707  }
708 
709  /* FIXME: SEH ends here */
710  }
711 
712  /* Kernel-mode or user-mode fault (but not LOCK) */
714  TrapFrame->Eip,
715  TrapFrame);
716 
717 }
718 
720 VOID
721 FASTCALL
723 {
724  PKTHREAD Thread, NpxThread;
725  PFX_SAVE_AREA SaveArea, NpxSaveArea;
726  ULONG Cr0;
727 
728  /* Save trap frame */
729  KiEnterTrap(TrapFrame);
730 
731  /* Try to handle NPX delay load */
732  for (;;)
733  {
734  /* Get the current thread */
736 
737  /* Get the NPX frame */
738  SaveArea = KiGetThreadNpxArea(Thread);
739 
740  /* Check if emulation is enabled */
741  if (SaveArea->Cr0NpxState & CR0_EM)
742  {
743  /* Not implemented */
745  }
746 
747  /* Save CR0 and check NPX state */
748  Cr0 = __readcr0();
749  if (Thread->NpxState != NPX_STATE_LOADED)
750  {
751  /* Update CR0 */
752  Cr0 &= ~(CR0_MP | CR0_EM | CR0_TS);
753  __writecr0(Cr0);
754 
755  /* Get the NPX thread */
756  NpxThread = KeGetCurrentPrcb()->NpxThread;
757  if (NpxThread)
758  {
759  /* Get the NPX frame */
760  NpxSaveArea = KiGetThreadNpxArea(NpxThread);
761 
762  /* Save FPU state */
763  Ke386SaveFpuState(NpxSaveArea);
764 
765  /* Update NPX state */
766  NpxThread->NpxState = NPX_STATE_NOT_LOADED;
767  }
768 
769  /* Load FPU state */
770  Ke386LoadFpuState(SaveArea);
771 
772  /* Update NPX state */
773  Thread->NpxState = NPX_STATE_LOADED;
774  KeGetCurrentPrcb()->NpxThread = Thread;
775 
776  /* Enable interrupts */
777  _enable();
778 
779  /* Check if CR0 needs to be reloaded due to context switch */
780  if (!SaveArea->Cr0NpxState) KiEoiHelper(TrapFrame);
781 
782  /* Otherwise, we need to reload CR0, disable interrupts */
783  _disable();
784 
785  /* Reload CR0 */
786  Cr0 = __readcr0();
787  Cr0 |= SaveArea->Cr0NpxState;
788  __writecr0(Cr0);
789 
790  /* Now restore interrupts and check for TS */
791  _enable();
792  if (Cr0 & CR0_TS) KiEoiHelper(TrapFrame);
793 
794  /* We're still here -- clear TS and try again */
796  _disable();
797  }
798  else
799  {
800  /* This is an actual fault, not a lack of FPU state */
801  break;
802  }
803  }
804 
805  /* TS should not be set */
806  if (Cr0 & CR0_TS)
807  {
808  /*
809  * If it's incorrectly set, then maybe the state is actually still valid
810  * but we could have lost track of that due to a BIOS call.
811  * Make sure MP is still set, which should verify the theory.
812  */
813  if (Cr0 & CR0_MP)
814  {
815  /* Indeed, the state is actually still valid, so clear TS */
817  KiEoiHelper(TrapFrame);
818  }
819 
820  /* Otherwise, something strange is going on */
821  KeBugCheckWithTf(TRAP_CAUSE_UNKNOWN, 2, Cr0, 0, 0, TrapFrame);
822  }
823 
824  /* It's not a delayed load, so process this trap as an NPX fault */
825  KiNpxHandler(TrapFrame, Thread, SaveArea);
826 }
827 
829 VOID
830 __cdecl
832 {
833  PKTSS Tss, DfTss;
836  PKGDTENTRY TssGdt;
837 
838  /* For sanity's sake, make sure interrupts are disabled */
839  _disable();
840 
841  /* Get the current TSS, thread, and process */
842  Tss = KeGetPcr()->TSS;
844  Process = Thread->ApcState.Process;
845 
846  /* Save data usually not present in the TSS */
847  Tss->CR3 = Process->DirectoryTableBase[0];
848  Tss->IoMapBase = Process->IopmOffset;
849  Tss->LDT = Process->LdtDescriptor.LimitLow ? KGDT_LDT : 0;
850 
851  /* Now get the base address of the double-fault TSS */
852  TssGdt = &((PKIPCR)KeGetPcr())->GDT[KGDT_DF_TSS / sizeof(KGDTENTRY)];
853  DfTss = (PKTSS)(ULONG_PTR)(TssGdt->BaseLow |
854  TssGdt->HighWord.Bytes.BaseMid << 16 |
855  TssGdt->HighWord.Bytes.BaseHi << 24);
856 
857  /*
858  * Switch to it and activate it, masking off the nested flag.
859  *
860  * Note that in reality, we are already on the double-fault TSS
861  * -- we just need to update the PCR to reflect this.
862  */
863  KeGetPcr()->TSS = DfTss;
865  TssGdt->HighWord.Bits.Dpl = 0;
866  TssGdt->HighWord.Bits.Pres = 1;
867  // TssGdt->HighWord.Bits.Type &= ~0x2; /* I386_ACTIVE_TSS --> I386_TSS */
868  TssGdt->HighWord.Bits.Type = I386_TSS; // Busy bit cleared in the TSS selector.
869 
870  /* Bugcheck the system */
871  KeBugCheckWithTf(UNEXPECTED_KERNEL_MODE_TRAP,
873  (ULONG_PTR)Tss,
874  0,
875  0,
876  NULL);
877 }
878 
880 VOID
881 FASTCALL
883 {
884  /* Save trap frame */
885  KiEnterTrap(TrapFrame);
886 
887  /* Enable interrupts and kill the system */
888  _enable();
890 }
891 
893 VOID
894 FASTCALL
896 {
897  /* Save trap frame */
898  KiEnterTrap(TrapFrame);
899 
900  /* Check for VDM trap */
901  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
902 
903  /* Kill the system */
905 }
906 
908 VOID
909 FASTCALL
911 {
912  /* Save trap frame */
913  KiEnterTrap(TrapFrame);
914 
915  /* FIXME: Kill the system */
918 }
919 
921 VOID
922 FASTCALL
924 {
925  /* Save trap frame */
926  KiEnterTrap(TrapFrame);
927 
928  /* FIXME: Kill the system */
931 }
932 
933 /* DECLSPEC_NORETURN VOID FASTCALL KiTrap0DHandler(IN PKTRAP_FRAME); */
935 
937 VOID
938 FASTCALL
940 {
941  ULONG i, j, Iopl;
942  BOOLEAN Privileged = FALSE;
943  PUCHAR Instructions;
944  UCHAR Instruction = 0;
945  KIRQL OldIrql;
946 
947  /* Check for V86 GPF */
948  if (__builtin_expect(KiV86Trap(TrapFrame), 1))
949  {
950  /* Enter V86 trap */
951  KiEnterV86Trap(TrapFrame);
952 
953  /* Must be a VDM process */
954  if (__builtin_expect(!PsGetCurrentProcess()->VdmObjects, 0))
955  {
956  /* Enable interrupts */
957  _enable();
958 
959  /* Setup illegal instruction fault */
961  TrapFrame->Eip,
962  TrapFrame);
963  }
964 
965  /* Go to APC level */
967  _enable();
968 
969  /* Handle the V86 opcode */
970  if (__builtin_expect(Ki386HandleOpcodeV86(TrapFrame) == 0xFF, 0))
971  {
972  /* Should only happen in VDM mode */
974  }
975 
976  /* Bring IRQL back */
978  _disable();
979 
980  /* Do a quick V86 exit if possible */
981  KiExitV86Trap(TrapFrame);
982  }
983 
984  /* Save trap frame */
985  KiEnterTrap(TrapFrame);
986 
987  /* Check for user-mode GPF */
988  if (KiUserTrap(TrapFrame))
989  {
990  /* Should not be VDM */
991  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
992 
993  /* Enable interrupts and check error code */
994  _enable();
995  if (!TrapFrame->ErrCode)
996  {
997  /* FIXME: Use SEH */
998  Instructions = (PUCHAR)TrapFrame->Eip;
999 
1000  /* Scan next 15 bytes */
1001  for (i = 0; i < 15; i++)
1002  {
1003  /* Skip prefix instructions */
1004  for (j = 0; j < sizeof(KiTrapPrefixTable); j++)
1005  {
1006  /* Is this a prefix instruction? */
1007  if (Instructions[i] == KiTrapPrefixTable[j])
1008  {
1009  /* Stop looking */
1010  break;
1011  }
1012  }
1013 
1014  /* Is this NOT any prefix instruction? */
1015  if (j == sizeof(KiTrapPrefixTable))
1016  {
1017  /* We can go ahead and handle the fault now */
1018  Instruction = Instructions[i];
1019  break;
1020  }
1021  }
1022 
1023  /* If all we found was prefixes, then this instruction is too long */
1024  if (i == 15)
1025  {
1026  /* Setup illegal instruction fault */
1028  TrapFrame->Eip,
1029  TrapFrame);
1030  }
1031 
1032  /* Check for privileged instructions */
1033  DPRINT("Instruction (%lu) at fault: %lx %lx %lx %lx\n",
1034  i,
1035  Instructions[i],
1036  Instructions[i + 1],
1037  Instructions[i + 2],
1038  Instructions[i + 3]);
1039  if (Instruction == 0xF4) // HLT
1040  {
1041  /* HLT is privileged */
1042  Privileged = TRUE;
1043  }
1044  else if (Instruction == 0x0F)
1045  {
1046  /* Test if it's any of the privileged two-byte opcodes */
1047  if (((Instructions[i + 1] == 0x00) && // LLDT or LTR
1048  (((Instructions[i + 2] & 0x38) == 0x10) || // LLDT
1049  (Instructions[i + 2] == 0x18))) || // LTR
1050  ((Instructions[i + 1] == 0x01) && // LGDT or LIDT or LMSW
1051  (((Instructions[i + 2] & 0x38) == 0x10) || // LGDT
1052  (Instructions[i + 2] == 0x18) || // LIDT
1053  (Instructions[i + 2] == 0x30))) || // LMSW
1054  (Instructions[i + 1] == 0x08) || // INVD
1055  (Instructions[i + 1] == 0x09) || // WBINVD
1056  (Instructions[i + 1] == 0x35) || // SYSEXIT
1057  (Instructions[i + 1] == 0x21) || // MOV DR, XXX
1058  (Instructions[i + 1] == 0x06) || // CLTS
1059  (Instructions[i + 1] == 0x20) || // MOV CR, XXX
1060  (Instructions[i + 1] == 0x22) || // MOV XXX, CR
1061  (Instructions[i + 1] == 0x23) || // MOV YYY, DR
1062  (Instructions[i + 1] == 0x30) || // WRMSR
1063  (Instructions[i + 1] == 0x33)) // RDPMC
1064  // INVLPG, INVLPGA, SYSRET
1065  {
1066  /* These are all privileged */
1067  Privileged = TRUE;
1068  }
1069  }
1070  else
1071  {
1072  /* Get the IOPL and compare with the RPL mask */
1073  Iopl = (TrapFrame->EFlags & EFLAGS_IOPL) >> 12;
1074  if ((TrapFrame->SegCs & RPL_MASK) > Iopl)
1075  {
1076  /* I/O privilege error -- check for known instructions */
1077  if ((Instruction == 0xFA) || (Instruction == 0xFB)) // CLI or STI
1078  {
1079  /* These are privileged */
1080  Privileged = TRUE;
1081  }
1082  else
1083  {
1084  /* Last hope: an IN/OUT instruction */
1085  for (j = 0; j < sizeof(KiTrapIoTable); j++)
1086  {
1087  /* Is this an I/O instruction? */
1088  if (Instruction == KiTrapIoTable[j])
1089  {
1090  /* Then it's privileged */
1091  Privileged = TRUE;
1092  break;
1093  }
1094  }
1095  }
1096  }
1097  }
1098 
1099  /* So now... was the instruction privileged or not? */
1100  if (Privileged)
1101  {
1102  /* Whew! We have a privileged instruction, so dispatch the fault */
1104  TrapFrame->Eip,
1105  TrapFrame);
1106  }
1107  }
1108 
1109  /* If we got here, send an access violation */
1111  TrapFrame->Eip,
1112  0,
1113  0xFFFFFFFF,
1114  TrapFrame);
1115  }
1116 
1117  /*
1118  * Check for a fault during checking of the user instruction.
1119  *
1120  * Note that the SEH handler will catch invalid EIP, but we could be dealing
1121  * with an invalid CS, which will generate another GPF instead.
1122  *
1123  */
1124  if ((PVOID)TrapFrame->Eip >= (PVOID)KiTrap0DHandler &&
1125  (PVOID)TrapFrame->Eip < (PVOID)KiTrap0EHandler)
1126  {
1127  /* Not implemented */
1129  }
1130 
1131  /*
1132  * NOTE: The ASM trap exit code would restore segment registers by doing
1133  * a POP <SEG>, which could cause an invalid segment if someone had messed
1134  * with the segment values.
1135  *
1136  * Another case is a bogus SS, which would hit a GPF when doing the iret.
1137  * This could only be done through a buggy or malicious driver, or perhaps
1138  * the kernel debugger.
1139  *
1140  * The kernel normally restores the "true" segment if this happens.
1141  *
1142  * However, since we're restoring in C, not ASM, we can't detect
1143  * POP <SEG> since the actual instructions will be different.
1144  *
1145  * A better technique would be to check the EIP and somehow edit the
1146  * trap frame before restarting the instruction -- but we would need to
1147  * know the extract instruction that was used first.
1148  *
1149  * We could force a special instrinsic to use stack instructions, or write
1150  * a simple instruction length checker.
1151  *
1152  * Nevertheless, this is a lot of work for the purpose of avoiding a crash
1153  * when the user is purposedly trying to create one from kernel-mode, so
1154  * we should probably table this for now since it's not a "real" issue.
1155  */
1156 
1157  /*
1158  * NOTE2: Another scenario is the IRET during a V8086 restore (BIOS Call)
1159  * which will cause a GPF since the trap frame is a total mess (on purpose)
1160  * as built in KiEnterV86Mode.
1161  *
1162  * The idea is to scan for IRET, scan for the known EIP adress, validate CS
1163  * and then manually issue a jump to the V8086 return EIP.
1164  */
1165  Instructions = (PUCHAR)TrapFrame->Eip;
1166  if (Instructions[0] == 0xCF)
1167  {
1168  /*
1169  * Some evil shit is going on here -- this is not the SS:ESP you're
1170  * looking for! Instead, this is actually CS:EIP you're looking at!
1171  * Why? Because part of the trap frame actually corresponds to the IRET
1172  * stack during the trap exit!
1173  */
1174  if ((TrapFrame->HardwareEsp == (ULONG)Ki386BiosCallReturnAddress) &&
1175  (TrapFrame->HardwareSegSs == (KGDT_R0_CODE | RPL_MASK)))
1176  {
1177  /* Exit the V86 trap! */
1178  Ki386BiosCallReturnAddress(TrapFrame);
1179  }
1180  else
1181  {
1182  /* Otherwise, this is another kind of IRET fault */
1184  }
1185  }
1186 
1187  /* So since we're not dealing with the above case, check for RDMSR/WRMSR */
1188  if ((Instructions[0] == 0xF) && // 2-byte opcode
1189  ((Instructions[1] == 0x32) || // RDMSR
1190  (Instructions[1] == 0x30))) // WRMSR
1191  {
1192  /* Unknown CPU MSR, so raise an access violation */
1194  TrapFrame->Eip,
1195  TrapFrame);
1196  }
1197 
1198  /* Check for lazy segment load */
1199  if (TrapFrame->SegDs != (KGDT_R3_DATA | RPL_MASK))
1200  {
1201  /* Fix it */
1202  TrapFrame->SegDs = (KGDT_R3_DATA | RPL_MASK);
1203  }
1204  else if (TrapFrame->SegEs != (KGDT_R3_DATA | RPL_MASK))
1205  {
1206  /* Fix it */
1207  TrapFrame->SegEs = (KGDT_R3_DATA | RPL_MASK);
1208  }
1209  else
1210  {
1211  /* Whatever it is, we can't handle it */
1213  }
1214 
1215  /* Return to where we came from */
1216  KiTrapReturn(TrapFrame);
1217 }
1218 
1220 VOID
1221 FASTCALL
1223 {
1224  PKTHREAD Thread;
1225  BOOLEAN StoreInstruction;
1226  ULONG_PTR Cr2;
1227  NTSTATUS Status;
1228 
1229  /* Save trap frame */
1230  KiEnterTrap(TrapFrame);
1231 
1232  /* Check if this is the base frame */
1234  if (KeGetTrapFrame(Thread) != TrapFrame)
1235  {
1236  /* It isn't, check if this is a second nested frame */
1237  if (((ULONG_PTR)KeGetTrapFrame(Thread) - (ULONG_PTR)TrapFrame) <=
1238  FIELD_OFFSET(KTRAP_FRAME, EFlags))
1239  {
1240  /* The stack is somewhere in between frames, we need to fix it */
1242  }
1243  }
1244 
1245  /* Save CR2 */
1246  Cr2 = __readcr2();
1247 
1248  /* Enable interrupts */
1249  _enable();
1250 
1251  /* Interpret the error code */
1252  StoreInstruction = (TrapFrame->ErrCode & 2) != 0;
1253 
1254  /* Check if we came in with interrupts disabled */
1255  if (!(TrapFrame->EFlags & EFLAGS_INTERRUPT_MASK))
1256  {
1257  /* This is completely illegal, bugcheck the system */
1258  KeBugCheckWithTf(IRQL_NOT_LESS_OR_EQUAL,
1259  Cr2,
1260  (ULONG_PTR)-1,
1261  TrapFrame->ErrCode,
1262  TrapFrame->Eip,
1263  TrapFrame);
1264  }
1265 
1266  /* Check for S-List fault
1267 
1268  Explanation: An S-List fault can occur due to a race condition between 2
1269  threads simultaneously trying to pop an element from the S-List. After
1270  thread 1 has read the pointer to the top element on the S-List it is
1271  preempted and thread 2 calls InterlockedPopEntrySlist on the same S-List,
1272  removing the top element and freeing it's memory. After that thread 1
1273  resumes and tries to read the address of the Next pointer from the top
1274  element, which it assumes will be the next top element.
1275  But since that memory has been freed, we get a page fault. To handle this
1276  race condition, we let thread 1 repeat the operation.
1277  We do NOT invoke the page fault handler in this case, since we do not
1278  want to trigger any side effects, like paging or a guard page fault.
1279 
1280  Sequence of operations:
1281 
1282  Thread 1 : mov eax, [ebp] <= eax now points to the first element
1283  Thread 1 : mov edx, [ebp + 4] <= edx is loaded with Depth and Sequence
1284  *** preempted ***
1285  Thread 2 : calls InterlockedPopEntrySlist, changing the top element
1286  Thread 2 : frees the memory of the element that was popped
1287  *** preempted ***
1288  Thread 1 : checks if eax is NULL
1289  Thread 1 : InterlockedPopEntrySListFault: mov ebx, [eax] <= faults
1290 
1291  To be sure that we are dealing with exactly the case described above, we
1292  check whether the ListHeader has changed. If Thread 2 only popped one
1293  entry, the Next field in the S-List-header has changed.
1294  If after thread 1 has faulted, thread 2 allocates a new element, by
1295  chance getting the same address as the previously freed element and
1296  pushes it on the list again, we will see the same top element, but the
1297  Sequence member of the S-List header has changed. Therefore we check
1298  both fields to make sure we catch any concurrent modification of the
1299  S-List-header.
1300  */
1301  if ((TrapFrame->Eip == (ULONG_PTR)ExpInterlockedPopEntrySListFault) ||
1302  (TrapFrame->Eip == (ULONG_PTR)KeUserPopEntrySListFault))
1303  {
1304  ULARGE_INTEGER SListHeader;
1305  PVOID ResumeAddress;
1306 
1307  /* Sanity check that the assembly is correct:
1308  This must be mov ebx, [eax]
1309  Followed by cmpxchg8b [ebp] */
1310  ASSERT((((UCHAR*)TrapFrame->Eip)[0] == 0x8B) &&
1311  (((UCHAR*)TrapFrame->Eip)[1] == 0x18) &&
1312  (((UCHAR*)TrapFrame->Eip)[2] == 0x0F) &&
1313  (((UCHAR*)TrapFrame->Eip)[3] == 0xC7) &&
1314  (((UCHAR*)TrapFrame->Eip)[4] == 0x4D) &&
1315  (((UCHAR*)TrapFrame->Eip)[5] == 0x00));
1316 
1317  /* Check if this is a user fault */
1318  if (TrapFrame->Eip == (ULONG_PTR)KeUserPopEntrySListFault)
1319  {
1320  /* EBP points to the S-List-header. Copy it inside SEH, to protect
1321  against a bogus pointer from user mode */
1322  _SEH2_TRY
1323  {
1324  ProbeForRead((PVOID)TrapFrame->Ebp,
1325  sizeof(ULARGE_INTEGER),
1327  SListHeader = *(PULARGE_INTEGER)TrapFrame->Ebp;
1328  }
1330  {
1331  /* The S-List pointer is not valid! */
1332  goto NotSListFault;
1333  }
1334  _SEH2_END;
1335  ResumeAddress = KeUserPopEntrySListResume;
1336  }
1337  else
1338  {
1339  SListHeader = *(PULARGE_INTEGER)TrapFrame->Ebp;
1340  ResumeAddress = ExpInterlockedPopEntrySListResume;
1341  }
1342 
1343  /* Check if either the Next pointer or the Sequence member in the
1344  S-List-header has changed. If any of these has changed, we restart
1345  the operation. Otherwise we only have a bogus pointer and let the
1346  page fault handler deal with it. */
1347  if ((SListHeader.LowPart != TrapFrame->Eax) ||
1348  (SListHeader.HighPart != TrapFrame->Edx))
1349  {
1350  DPRINT1("*** Got an S-List-Fault ***\n");
1351  KeGetCurrentThread()->SListFaultCount++;
1352 
1353  /* Restart the operation */
1354  TrapFrame->Eip = (ULONG_PTR)ResumeAddress;
1355 
1356  /* Continue execution */
1357  KiEoiHelper(TrapFrame);
1358  }
1359  }
1360 NotSListFault:
1361 
1362  /* Call the access fault handler */
1363  Status = MmAccessFault(TrapFrame->ErrCode,
1364  (PVOID)Cr2,
1365  KiUserTrap(TrapFrame),
1366  TrapFrame);
1367  if (NT_SUCCESS(Status))
1368  {
1369 #ifdef _WINKD_
1370  /* Check whether the kernel debugger has owed breakpoints to be inserted */
1372 #endif
1373  /* We succeeded, return */
1374  KiEoiHelper(TrapFrame);
1375  }
1376 
1377  /* Check for syscall fault */
1378 #if 0
1379  if ((TrapFrame->Eip == (ULONG_PTR)CopyParams) ||
1380  (TrapFrame->Eip == (ULONG_PTR)ReadBatch))
1381  {
1382  /* Not yet implemented */
1384  }
1385 #endif
1386 
1387  /* Check for VDM trap */
1388  if (KiVdmTrap(TrapFrame))
1389  {
1390  DPRINT1("VDM PAGE FAULT at %lx:%lx for address %lx\n",
1391  TrapFrame->SegCs, TrapFrame->Eip, Cr2);
1392  if (VdmDispatchPageFault(TrapFrame))
1393  {
1394  /* Return and end VDM execution */
1395  DPRINT1("VDM page fault with status 0x%lx resolved\n", Status);
1396  KiEoiHelper(TrapFrame);
1397  }
1398  DPRINT1("VDM page fault with status 0x%lx NOT resolved\n", Status);
1399  }
1400 
1401  /* Either kernel or user trap (non VDM) so dispatch exception */
1403  {
1404  /* This status code is repurposed so we can recognize it later */
1406  TrapFrame->Eip,
1407  StoreInstruction,
1408  Cr2,
1409  TrapFrame);
1410  }
1411  else if ((Status == STATUS_GUARD_PAGE_VIOLATION) ||
1413  {
1414  /* These faults only have two parameters */
1416  TrapFrame->Eip,
1417  StoreInstruction,
1418  Cr2,
1419  TrapFrame);
1420  }
1421 
1422  /* Only other choice is an in-page error, with 3 parameters */
1424  0,
1425  TrapFrame->Eip,
1426  3,
1427  StoreInstruction,
1428  Cr2,
1429  Status,
1430  TrapFrame);
1431 }
1432 
1434 VOID
1435 FASTCALL
1437 {
1438  /* Save trap frame */
1439  KiEnterTrap(TrapFrame);
1440 
1441  /* FIXME: Kill the system */
1442  UNIMPLEMENTED;
1444 }
1445 
1447 VOID
1448 FASTCALL
1450 {
1451  PKTHREAD Thread;
1452  PFX_SAVE_AREA SaveArea;
1453 
1454  /* Save trap frame */
1455  KiEnterTrap(TrapFrame);
1456 
1457  /* Check if this is the NPX thrad */
1459  SaveArea = KiGetThreadNpxArea(Thread);
1460  if (Thread != KeGetCurrentPrcb()->NpxThread)
1461  {
1462  /* It isn't, enable interrupts and set delayed error */
1463  _enable();
1464  SaveArea->Cr0NpxState |= CR0_TS;
1465 
1466  /* End trap */
1467  KiEoiHelper(TrapFrame);
1468  }
1469 
1470  /* Otherwise, proceed with NPX fault handling */
1471  KiNpxHandler(TrapFrame, Thread, SaveArea);
1472 }
1473 
1475 VOID
1476 FASTCALL
1478 {
1479  /* Save trap frame */
1480  KiEnterTrap(TrapFrame);
1481 
1482  /* Enable interrupts and kill the system */
1483  _enable();
1485 }
1486 
1488 VOID
1489 FASTCALL
1491 {
1492  PKTHREAD Thread;
1493  PFX_SAVE_AREA SaveArea;
1494  ULONG Cr0, MxCsrMask, Error;
1495 
1496  /* Save trap frame */
1497  KiEnterTrap(TrapFrame);
1498 
1499  /* Check if this is the NPX thrad */
1501  if (Thread != KeGetCurrentPrcb()->NpxThread)
1502  {
1503  /* It isn't, kill the system */
1504  KeBugCheckWithTf(TRAP_CAUSE_UNKNOWN, 13, (ULONG_PTR)Thread, 0, 0, TrapFrame);
1505  }
1506 
1507  /* Get the NPX frame */
1508  SaveArea = KiGetThreadNpxArea(Thread);
1509 
1510  /* Check for VDM trap */
1511  ASSERT(KiVdmTrap(TrapFrame) == FALSE);
1512 
1513  /* Check for user trap */
1514  if (!KiUserTrap(TrapFrame))
1515  {
1516  /* Kernel should not fault on XMMI */
1517  KeBugCheckWithTf(TRAP_CAUSE_UNKNOWN, 13, 0, 0, 2, TrapFrame);
1518  }
1519 
1520  /* Update CR0 */
1521  Cr0 = __readcr0();
1522  Cr0 &= ~(CR0_MP | CR0_EM | CR0_TS);
1523  __writecr0(Cr0);
1524 
1525  /* Save FPU state */
1526  Ke386SaveFpuState(SaveArea);
1527 
1528  /* Mark CR0 state dirty */
1529  Cr0 |= NPX_STATE_NOT_LOADED;
1530  Cr0 |= SaveArea->Cr0NpxState;
1531  __writecr0(Cr0);
1532 
1533  /* Update NPX state */
1534  Thread->NpxState = NPX_STATE_NOT_LOADED;
1535  KeGetCurrentPrcb()->NpxThread = NULL;
1536 
1537  /* Clear the TS bit and re-enable interrupts */
1538  SaveArea->Cr0NpxState &= ~CR0_TS;
1539  _enable();
1540 
1541  /* Now look at MxCsr to get the mask of errors we should care about */
1542  MxCsrMask = ~((USHORT)SaveArea->U.FxArea.MXCsr >> 7);
1543 
1544  /* Get legal exceptions that software should handle */
1545  Error = (USHORT)SaveArea->U.FxArea.MXCsr & (FSW_INVALID_OPERATION |
1546  FSW_DENORMAL |
1547  FSW_ZERO_DIVIDE |
1548  FSW_OVERFLOW |
1549  FSW_UNDERFLOW |
1550  FSW_PRECISION);
1551  Error &= MxCsrMask;
1552 
1553  /* Now handle any of those legal errors */
1554  if (Error & (FSW_INVALID_OPERATION |
1555  FSW_DENORMAL |
1556  FSW_ZERO_DIVIDE |
1557  FSW_OVERFLOW |
1558  FSW_UNDERFLOW |
1559  FSW_PRECISION))
1560  {
1561  /* By issuing an exception */
1563  TrapFrame->Eip,
1564  0,
1565  TrapFrame);
1566  }
1567 
1568  /* Unknown XMMI fault */
1569  KeBugCheckWithTf(TRAP_CAUSE_UNKNOWN, 13, 0, 0, 1, TrapFrame);
1570 }
1571 
1572 /* SOFTWARE SERVICES **********************************************************/
1573 
1574 VOID
1575 FASTCALL
1577 {
1578  /* Save trap frame */
1579  KiEnterTrap(TrapFrame);
1580 
1581  /* Decrement EIP to point to the INT29 instruction (2 bytes, not 1 like INT3) */
1582  TrapFrame->Eip -= 2;
1583 
1584  /* Check if this is a user trap */
1585  if (KiUserTrap(TrapFrame))
1586  {
1587  /* Dispatch exception to user mode */
1590  TrapFrame->Eip,
1591  1,
1592  TrapFrame->Ecx,
1593  0,
1594  0,
1595  TrapFrame);
1596  }
1597  else
1598  {
1599  EXCEPTION_RECORD ExceptionRecord;
1600 
1601  /* Bugcheck the system */
1602  ExceptionRecord.ExceptionCode = STATUS_STACK_BUFFER_OVERRUN;
1603  ExceptionRecord.ExceptionFlags = EXCEPTION_NONCONTINUABLE;
1604  ExceptionRecord.ExceptionRecord = NULL;
1605  ExceptionRecord.ExceptionAddress = (PVOID)TrapFrame->Eip;
1606  ExceptionRecord.NumberParameters = 1;
1607  ExceptionRecord.ExceptionInformation[0] = TrapFrame->Ecx;
1608 
1609  KeBugCheckWithTf(KERNEL_SECURITY_CHECK_FAILURE,
1610  TrapFrame->Ecx,
1611  (ULONG_PTR)TrapFrame,
1612  (ULONG_PTR)&ExceptionRecord,
1613  0,
1614  TrapFrame);
1615  }
1616 }
1617 
1618 VOID
1619 FASTCALL
1621 {
1622  /* Save trap frame */
1623  KiEnterTrap(TrapFrame);
1624 
1625  /*
1626  * Just fail the request
1627  */
1628  DbgPrint("INT 0x2A attempted, returning 0 tick count\n");
1629  TrapFrame->Eax = 0;
1630 
1631  /* Exit the trap */
1632  KiEoiHelper(TrapFrame);
1633 }
1634 
1635 VOID
1636 FASTCALL
1638 {
1639  PKTHREAD Thread;
1640  NTSTATUS Status;
1641 
1642  /* Save the SEH chain, NtCallbackReturn will restore this */
1643  TrapFrame->ExceptionList = KeGetPcr()->NtTib.ExceptionList;
1644 
1645  /* Set thread fields */
1647  Thread->TrapFrame = TrapFrame;
1648  Thread->PreviousMode = KiUserTrap(TrapFrame);
1649  ASSERT(Thread->PreviousMode != KernelMode);
1650 
1651  /* Pass the register parameters to NtCallbackReturn.
1652  Result pointer is in ecx, result length in edx, status in eax */
1653  Status = NtCallbackReturn((PVOID)TrapFrame->Ecx,
1654  TrapFrame->Edx,
1655  TrapFrame->Eax);
1656 
1657  /* If we got here, something went wrong. Return an error to the caller */
1658  KiServiceExit(TrapFrame, Status);
1659 }
1660 
1662 VOID
1663 FASTCALL
1665 {
1666  /* Save trap frame */
1667  KiEnterTrap(TrapFrame);
1668 
1669  /* Decrement EIP to point to the INT2C instruction (2 bytes, not 1 like INT3) */
1670  TrapFrame->Eip -= 2;
1671 
1672  /* Dispatch the exception */
1674  TrapFrame->Eip,
1675  TrapFrame);
1676 }
1677 
1679 VOID
1680 FASTCALL
1682 {
1683  /* Save trap frame */
1684  KiEnterTrap(TrapFrame);
1685 
1686  /* Increment EIP to skip the INT3 instruction */
1687  TrapFrame->Eip++;
1688 
1689  /* Continue with the common handler */
1690  KiDebugHandler(TrapFrame, TrapFrame->Eax, TrapFrame->Ecx, TrapFrame->Edx);
1691 }
1692 
1693 
1695 VOID
1696 KiDbgPreServiceHook(ULONG SystemCallNumber, PULONG_PTR Arguments)
1697 {
1698 #if DBG && !defined(_WINKD_)
1699  if (SystemCallNumber >= 0x1000 && KeWin32PreServiceHook)
1700  KeWin32PreServiceHook(SystemCallNumber, Arguments);
1701 #endif
1702 }
1703 
1705 ULONG_PTR
1707 {
1708 #if DBG && !defined(_WINKD_)
1709  if (SystemCallNumber >= 0x1000 && KeWin32PostServiceHook)
1710  return KeWin32PostServiceHook(SystemCallNumber, Result);
1711 #endif
1712  return Result;
1713 }
1714 
1716 VOID
1717 FASTCALL
1719  IN PVOID Arguments)
1720 {
1721  PKTHREAD Thread;
1722  PKSERVICE_TABLE_DESCRIPTOR DescriptorTable;
1723  ULONG Id, Offset, StackBytes;
1724  NTSTATUS Status;
1725  PVOID Handler;
1726  ULONG SystemCallNumber = TrapFrame->Eax;
1727 
1728  /* Get the current thread */
1730 
1731  /* Set debug header */
1732  KiFillTrapFrameDebug(TrapFrame);
1733 
1734  /* Chain trap frames */
1735  TrapFrame->Edx = (ULONG_PTR)Thread->TrapFrame;
1736 
1737  /* No error code */
1738  TrapFrame->ErrCode = 0;
1739 
1740  /* Save previous mode */
1741  TrapFrame->PreviousPreviousMode = Thread->PreviousMode;
1742 
1743  /* Save the SEH chain and terminate it for now */
1744  TrapFrame->ExceptionList = KeGetPcr()->NtTib.ExceptionList;
1745  KeGetPcr()->NtTib.ExceptionList = EXCEPTION_CHAIN_END;
1746 
1747  /* Default to debugging disabled */
1748  TrapFrame->Dr7 = 0;
1749 
1750  /* Check if the frame was from user mode */
1751  if (KiUserTrap(TrapFrame))
1752  {
1753  /* Check for active debugging */
1754  if (KeGetCurrentThread()->Header.DebugActive & 0xFF)
1755  {
1756  /* Handle debug registers */
1758  }
1759  }
1760 
1761  /* Set thread fields */
1762  Thread->TrapFrame = TrapFrame;
1763  Thread->PreviousMode = KiUserTrap(TrapFrame);
1764 
1765  /* Enable interrupts */
1766  _enable();
1767 
1768  /* Decode the system call number */
1769  Offset = (SystemCallNumber >> SERVICE_TABLE_SHIFT) & SERVICE_TABLE_MASK;
1770  Id = SystemCallNumber & SERVICE_NUMBER_MASK;
1771 
1772  /* Get descriptor table */
1773  DescriptorTable = (PVOID)((ULONG_PTR)Thread->ServiceTable + Offset);
1774 
1775  /* Validate the system call number */
1776  if (__builtin_expect(Id >= DescriptorTable->Limit, 0))
1777  {
1778  /* Check if this is a GUI call */
1779  if (!(Offset & SERVICE_TABLE_TEST))
1780  {
1781  /* Fail the call */
1783  goto ExitCall;
1784  }
1785 
1786  /* Convert us to a GUI thread -- must wrap in ASM to get new EBP */
1788 
1789  /* Reload trap frame and descriptor table pointer from new stack */
1790  TrapFrame = *(volatile PVOID*)&Thread->TrapFrame;
1791  DescriptorTable = (PVOID)(*(volatile ULONG_PTR*)&Thread->ServiceTable + Offset);
1792 
1793  if (!NT_SUCCESS(Status))
1794  {
1795  /* Set the last error and fail */
1796  goto ExitCall;
1797  }
1798 
1799  /* Validate the system call number again */
1800  if (Id >= DescriptorTable->Limit)
1801  {
1802  /* Fail the call */
1804  goto ExitCall;
1805  }
1806  }
1807 
1808  /* Check if this is a GUI call */
1809  if (__builtin_expect(Offset & SERVICE_TABLE_TEST, 0))
1810  {
1811  /* Get the batch count and flush if necessary */
1812  if (NtCurrentTeb()->GdiBatchCount) KeGdiFlushUserBatch();
1813  }
1814 
1815  /* Increase system call count */
1816  KeGetCurrentPrcb()->KeSystemCalls++;
1817 
1818  /* FIXME: Increase individual counts on debug systems */
1819  //KiIncreaseSystemCallCount(DescriptorTable, Id);
1820 
1821  /* Get stack bytes */
1822  StackBytes = DescriptorTable->Number[Id];
1823 
1824  /* Probe caller stack */
1825  if (__builtin_expect((Arguments < (PVOID)MmUserProbeAddress) && !(KiUserTrap(TrapFrame)), 0))
1826  {
1827  /* Access violation */
1829  }
1830 
1831  /* Call pre-service debug hook */
1832  KiDbgPreServiceHook(SystemCallNumber, Arguments);
1833 
1834  /* Get the handler and make the system call */
1835  Handler = (PVOID)DescriptorTable->Base[Id];
1836  Status = KiSystemCallTrampoline(Handler, Arguments, StackBytes);
1837 
1838  /* Call post-service debug hook */
1839  Status = KiDbgPostServiceHook(SystemCallNumber, Status);
1840 
1841  /* Make sure we're exiting correctly */
1842  KiExitSystemCallDebugChecks(Id, TrapFrame);
1843 
1844  /* Restore the old trap frame */
1845 ExitCall:
1846  Thread->TrapFrame = (PKTRAP_FRAME)TrapFrame->Edx;
1847 
1848  /* Exit from system call */
1849  KiServiceExit(TrapFrame, Status);
1850 }
1851 
1852 VOID
1853 FASTCALL
1855 {
1856  UNIMPLEMENTED;
1857 }
1858 
1859 /*
1860  * @implemented
1861  */
1862 VOID
1863 NTAPI
1865 {
1866  /* We should never see this call happening */
1867  KeBugCheck(MISMATCHED_HAL);
1868 }
1869 
1870 /* EOF */
VOID NTAPI ExpInterlockedPopEntrySListResume(VOID)
ULONG MmUserProbeAddress
Definition: init.c:50
#define FSW_PRECISION
Definition: ketypes.h:170
#define CR0_EM
Definition: asm.h:247
FORCEINLINE VOID KiEnterV86Trap(IN PKTRAP_FRAME TrapFrame)
Definition: trap_x.h:350
VOID(FASTCALL * PFAST_SYSTEM_CALL_EXIT)(IN PKTRAP_FRAME TrapFrame)
Definition: trap_x.h:245
#define IN
Definition: typedefs.h:39
#define SERVICE_TABLE_SHIFT
Definition: ketypes.h:71
#define KeRaiseIrql(irql, oldIrql)
Definition: env_spec_w32.h:597
#define TRUE
Definition: types.h:120
#define TYPE_ALIGNMENT(t)
Definition: ntbasedef.h:117
#define STATUS_ILLEGAL_INSTRUCTION
Definition: ntstatus.h:252
#define KeLowerIrql(oldIrql)
Definition: env_spec_w32.h:602
DECLSPEC_NORETURN VOID FASTCALL KiTrapReturnNoSegmentsRet8(IN PKTRAP_FRAME TrapFrame)
DECLSPEC_NORETURN VOID FASTCALL KiTrapReturnNoSegments(IN PKTRAP_FRAME TrapFrame)
__INTRIN_INLINE unsigned long __readcr2(void)
Definition: intrin_x86.h:1699
DECLSPEC_NORETURN VOID FASTCALL KiTrap0CHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:923
FORCEINLINE DECLSPEC_NORETURN VOID KiDispatchException2Args(IN NTSTATUS Code, IN ULONG_PTR Address, IN ULONG P1, IN ULONG P2, IN PKTRAP_FRAME TrapFrame)
Definition: ke.h:692
#define EXCEPTION_INVALID_TSS
Definition: asm.h:624
#define __cdecl
Definition: accygwin.h:79
#define I386_ACTIVE_TSS
Definition: ketypes.h:61
USHORT Fs
Definition: ketypes.h:816
#define DbgPrint
Definition: loader.c:25
NTSTATUS NTAPI MmAccessFault(IN ULONG FaultCode, IN PVOID Address, IN KPROCESSOR_MODE Mode, IN PVOID TrapInformation)
Definition: mmfault.c:204
FORCEINLINE BOOLEAN KiIsFrameEdited(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:87
DECLSPEC_NORETURN VOID FASTCALL KiTrapReturn(IN PKTRAP_FRAME TrapFrame)
KPRCB PrcbData[MAXIMUM_PROCESSORS]
Definition: kiinit.c:27
USHORT BaseLow
Definition: ketypes.h:336
ULONG CR3
Definition: ketypes.h:797
DECLSPEC_NORETURN VOID FASTCALL KiTrap10Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1449
VOID __cdecl KiFastCallEntryWithSingleStep(VOID)
#define SERVICE_TABLE_MASK
Definition: ketypes.h:78
unsigned char * PUCHAR
Definition: retypes.h:3
ULONG MXCsr
Definition: ketypes.h:435
void __cdecl _enable(void)
Definition: intrin_arm.h:373
DECLSPEC_NORETURN VOID FASTCALL KiTrap09Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:882
LONG NTSTATUS
Definition: precomp.h:26
DECLSPEC_NORETURN VOID FASTCALL KiTrap01Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:427
BOOLEAN FASTCALL Ki386HandleOpcodeV86(IN PKTRAP_FRAME TrapFrame)
Definition: v86vdm.c:456
PVOID KeUserPopEntrySListFault
Definition: psmgr.c:18
#define STATUS_SINGLE_STEP
Definition: ntstatus.h:173
FORCEINLINE struct _KPRCB * KeGetCurrentPrcb(VOID)
Definition: ketypes.h:1063
USHORT SegFs
Definition: ketypes.h:366
struct _KIPCR * PKIPCR
FORCEINLINE VOID KiCommonExit(IN PKTRAP_FRAME TrapFrame, BOOLEAN SkipPreviousMode)
Definition: traphdlr.c:96
FORCEINLINE VOID KiHandleDebugRegistersOnTrapEntry(IN PKTRAP_FRAME TrapFrame)
Definition: trap_x.h:256
#define STATUS_GUARD_PAGE_VIOLATION
Definition: ntstatus.h:170
USHORT Cs
Definition: ketypes.h:810
#define EXCEPTION_NONCONTINUABLE
Definition: rtltypes.h:150
#define EXCEPTION_ALIGNMENT_CHECK
Definition: asm.h:630
USHORT Es
Definition: ketypes.h:808
#define KGDT_R0_CODE
Definition: ketypes.h:75
DECLSPEC_NORETURN VOID NTAPI KiDispatchExceptionFromTrapFrame(IN NTSTATUS Code, IN ULONG Flags, IN ULONG_PTR Address, IN ULONG ParameterCount, IN ULONG_PTR Parameter1, IN ULONG_PTR Parameter2, IN ULONG_PTR Parameter3, IN PKTRAP_FRAME TrapFrame)
Definition: exp.c:1100
$ULONG LowPart
Definition: ntbasedef.h:576
DECLSPEC_NORETURN VOID __cdecl KiTrap08Handler(VOID)
Definition: traphdlr.c:831
ULONG HardwareSegSs
Definition: ketypes.h:271
#define STATUS_FLOAT_DIVIDE_BY_ZERO
Definition: ntstatus.h:364
ULONG Esi
Definition: ketypes.h:263
#define STATUS_FLOAT_INEXACT_RESULT
Definition: ntstatus.h:365
#define SERVICE_NUMBER_MASK
Definition: ketypes.h:83
#define FASTCALL
Definition: nt_native.h:50
DECLSPEC_NORETURN VOID FASTCALL KiTrap0DHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:939
#define DECLSPEC_NORETURN
Definition: ntbasedef.h:176
VOID NTAPI HalHandleNMI(IN PVOID NmiInfo)
Definition: misc.c:53
DECLSPEC_NORETURN VOID FASTCALL KiTrap00Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:407
#define KeGetPcr()
Definition: ke.h:25
ULONG KeI386FxsrPresent
Definition: cpu.c:31
USHORT LDT
Definition: ketypes.h:820
PVOID ExceptionAddress
Definition: compat.h:200
ULONG Edi
Definition: ketypes.h:262
#define EFLAGS_V86_MASK
Definition: ketypes.h:129
VOID __cdecl KiTrap02Handler(VOID)
Definition: traphdlr.c:460
DECLSPEC_NORETURN VOID FASTCALL KiTrap13Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1490
_SEH2_TRY
Definition: create.c:4250
DWORD Id
#define STATUS_FLOAT_STACK_CHECK
Definition: ntstatus.h:368
uint32_t ULONG_PTR
Definition: typedefs.h:64
#define STATUS_FLOAT_UNDERFLOW
Definition: ntstatus.h:369
#define EXCEPTION_NMI
Definition: asm.h:617
#define EXCEPTION_SEGMENT_NOT_PRESENT
Definition: asm.h:625
VOID FASTCALL KiGetTickCountHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1620
#define EXCEPTION_DOUBLE_FAULT
Definition: asm.h:622
DECLSPEC_NORETURN VOID FASTCALL KiSystemCallReturn(IN PKTRAP_FRAME TrapFrame)
DWORD ExceptionCode
Definition: compat.h:197
VOID NTAPI KdSetOwedBreakpoints(VOID)
Definition: kdbreak.c:105
UCHAR KIRQL
Definition: env_spec_w32.h:591
USHORT Ds
Definition: ketypes.h:814
#define KGDT_NMI_TSS
Definition: ketypes.h:85
#define EXCEPTION_BOUND_CHECK
Definition: asm.h:619
GLsizei GLenum const GLvoid GLsizei GLenum GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLint GLint GLint GLshort GLshort GLshort GLubyte GLubyte GLubyte GLuint GLuint GLuint GLushort GLushort GLushort GLbyte GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLfloat GLint GLint GLint GLint GLshort GLshort GLshort GLshort GLubyte GLubyte GLubyte GLubyte GLuint GLuint GLuint GLuint GLushort GLushort GLushort GLushort GLboolean const GLdouble const GLfloat const GLint const GLshort const GLbyte const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLdouble const GLfloat const GLfloat const GLint const GLint const GLshort const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort GLenum GLenum GLenum GLfloat GLenum GLint GLenum GLenum GLenum GLfloat GLenum GLenum GLint GLenum GLfloat GLenum GLint GLint GLushort GLenum GLenum GLfloat GLenum GLenum GLint GLfloat const GLubyte GLenum GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLint GLint GLsizei GLsizei GLint GLenum GLenum const GLvoid GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLenum const GLdouble GLenum GLenum const GLfloat GLenum GLenum const GLint GLsizei GLuint GLfloat GLuint GLbitfield GLfloat GLint GLuint GLboolean GLenum GLfloat GLenum GLbitfield GLenum GLfloat GLfloat GLint GLint const GLfloat GLenum GLfloat GLfloat GLint GLint GLfloat GLfloat GLint GLint const GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat const GLdouble const GLfloat const GLdouble const GLfloat GLint i
Definition: glfuncs.h:248
#define KGDT_LDT
Definition: ketypes.h:83
#define KGDT_DF_TSS
Definition: ketypes.h:84
ULONG Edx
Definition: ketypes.h:802
__INTRIN_INLINE uintptr_t __readeflags(void)
Definition: intrin_x86.h:1555
ULONG Eax
Definition: ketypes.h:258
NTSTATUS(* NTAPI)(IN PFILE_FULL_EA_INFORMATION EaBuffer, IN ULONG EaLength, OUT PULONG ErrorOffset)
Definition: IoEaTest.cpp:117
#define STATUS_FLOAT_OVERFLOW
Definition: ntstatus.h:367
_In_ ULONG _In_ ULONG Offset
Definition: ntddpcm.h:101
USHORT SegGs
Definition: ketypes.h:367
Definition: Header.h:8
#define EFLAGS_NESTED_TASK
Definition: ketypes.h:128
#define STATUS_INTEGER_OVERFLOW
Definition: ntstatus.h:371
DECLSPEC_NORETURN VOID FASTCALL KiDebugHandler(IN PKTRAP_FRAME TrapFrame, IN ULONG Parameter1, IN ULONG Parameter2, IN ULONG Parameter3)
Definition: traphdlr.c:219
#define STATUS_STACK_BUFFER_OVERRUN
Definition: ntstatus.h:932
USHORT SegEs
Definition: ketypes.h:365
#define STATUS_INTEGER_DIVIDE_BY_ZERO
Definition: ntstatus.h:370
union _FX_SAVE_AREA::@2383 U
FORCEINLINE DECLSPEC_NORETURN VOID KiExitV86Trap(IN PKTRAP_FRAME TrapFrame)
Definition: trap_x.h:304
DECLSPEC_NORETURN VOID NTAPI KeBugCheckWithTf(ULONG BugCheckCode, ULONG_PTR BugCheckParameter1, ULONG_PTR BugCheckParameter2, ULONG_PTR BugCheckParameter3, ULONG_PTR BugCheckParameter4, PKTRAP_FRAME Tf)
#define PsGetCurrentProcess
Definition: psfuncs.h:17
#define EXCEPTION_EXECUTE_HANDLER
Definition: excpt.h:85
#define EXCEPTION_STACK_FAULT
Definition: asm.h:626
struct _KTHREAD * CurrentThread
Definition: ketypes.h:566
#define RPL_MASK
Definition: ketypes.h:69
unsigned char BOOLEAN
NTSTATUS NTAPI KiConvertToGuiThread(VOID)
DECLSPEC_NORETURN VOID FASTCALL KiDebugServiceHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1681
smooth NULL
Definition: ftsmooth.c:416
__INTRIN_INLINE void __writecr0(unsigned int Data)
Definition: intrin_x86.h:1670
#define STATUS_BREAKPOINT
Definition: ntstatus.h:172
#define NPX_STATE_LOADED
Definition: asm.h:265
ULONG DbgEbp
Definition: ketypes.h:241
USHORT SegCs
Definition: ketypes.h:380
#define FORCEINLINE
Definition: ntbasedef.h:221
_At_(*)(_In_ PWSK_CLIENT Client, _In_opt_ PUNICODE_STRING NodeName, _In_opt_ PUNICODE_STRING ServiceName, _In_opt_ ULONG NameSpace, _In_opt_ GUID *Provider, _In_opt_ PADDRINFOEXW Hints, _Outptr_ PADDRINFOEXW *Result, _In_opt_ PEPROCESS OwningProcess, _In_opt_ PETHREAD OwningThread, _Inout_ PIRP Irp Result)(Mem)) NTSTATUS(WSKAPI *PFN_WSK_GET_ADDRESS_INFO
Definition: wsk.h:426
Definition: ketypes.h:789
#define SERVICE_TABLE_TEST
Definition: ketypes.h:90
void DPRINT(...)
Definition: polytest.cpp:61
ULONG Cr0NpxState
Definition: ketypes.h:451
VOID NTAPI KeBugCheck(ULONG BugCheckCode)
Definition: bug.c:1428
#define KGDT_R3_DATA
Definition: ketypes.h:78
struct _KGDTENTRY::@2376::@2377 Bytes
#define EXCEPTION_NPX_OVERRUN
Definition: asm.h:623
void * PVOID
Definition: retypes.h:9
#define FSW_OVERFLOW
Definition: ketypes.h:168
DECLSPEC_NORETURN VOID FASTCALL KiTrap0AHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:895
struct _ULARGE_INTEGER * PULARGE_INTEGER
Definition: drive.c:28
VOID __cdecl CopyParams(VOID)
VOID NTAPI ExpInterlockedPopEntrySListFault(VOID)
DECLSPEC_NORETURN VOID FASTCALL KiRaiseAssertionHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1664
Definition: utils.h:160
PFAST_SYSTEM_CALL_EXIT KiFastCallExitHandler
Definition: traphdlr.c:56
GLsizei GLenum const GLvoid GLsizei GLenum GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLint GLint GLint GLshort GLshort GLshort GLubyte GLubyte GLubyte GLuint GLuint GLuint GLushort GLushort GLushort GLbyte GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLfloat GLint GLint GLint GLint GLshort GLshort GLshort GLshort GLubyte GLubyte GLubyte GLubyte GLuint GLuint GLuint GLuint GLushort GLushort GLushort GLushort GLboolean const GLdouble const GLfloat const GLint const GLshort const GLbyte const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLdouble const GLfloat const GLfloat const GLint const GLint const GLshort const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort GLenum GLenum GLenum GLfloat GLenum GLint GLenum GLenum GLenum GLfloat GLenum GLenum GLint GLenum GLfloat GLenum GLint GLint GLushort GLenum GLenum GLfloat GLenum GLenum GLint GLfloat const GLubyte GLenum GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLint GLint GLsizei GLsizei GLint GLenum GLenum const GLvoid GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLenum const GLdouble GLenum GLenum const GLfloat GLenum GLenum const GLint GLsizei GLuint GLfloat GLuint GLbitfield GLfloat GLint GLuint GLboolean GLenum GLfloat GLenum GLbitfield GLenum GLfloat GLfloat GLint GLint const GLfloat GLenum GLfloat GLfloat GLint GLint GLfloat GLfloat GLint GLint const GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat const GLdouble const GLfloat const GLdouble const GLfloat GLint GLint GLint j
Definition: glfuncs.h:250
FORCEINLINE PFX_SAVE_AREA KiGetThreadNpxArea(IN PKTHREAD Thread)
Definition: ke.h:600
FORCEINLINE VOID KiCheckForApcDelivery(IN PKTRAP_FRAME TrapFrame)
Definition: ke.h:777
ULONG64 NpxState
Definition: ketypes.h:1958
#define STATUS_ASSERTION_FAILURE
Definition: ntstatus.h:946
ULONG Ebx
Definition: ketypes.h:803
$ULONG HighPart
Definition: ntbasedef.h:577
ULONG_PTR ExceptionInformation[EXCEPTION_MAXIMUM_PARAMETERS]
Definition: compat.h:202
struct _KGDTENTRY::@2376::@2378 Bits
if(!(yy_init))
Definition: macro.lex.yy.c:714
#define NT_SUCCESS(StatCode)
Definition: apphelp.c:32
USHORT Ss0
Definition: ketypes.h:794
ULONG Eip
Definition: ketypes.h:798
char CCHAR
Definition: typedefs.h:51
#define DR7_RESERVED_MASK
Definition: asm.h:514
union _KGDTENTRY::@2376 HighWord
ULONG Ecx
Definition: ketypes.h:801
ULONG HardwareEsp
Definition: ketypes.h:270
#define for
Definition: utility.h:88
_In_opt_ PFILE_OBJECT _In_opt_ PETHREAD Thread
Definition: fltkernel.h:2653
DECLSPEC_NORETURN VOID FASTCALL KiTrap03Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:586
BOOL Error
Definition: chkdsk.c:66
DECLSPEC_NORETURN VOID FASTCALL KiSystemFatalException(IN ULONG ExceptionCode, IN PKTRAP_FRAME TrapFrame)
Definition: except.c:402
FORCEINLINE BOOLEAN KiV86Trap(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:79
FORCEINLINE VOID KiDbgPreServiceHook(ULONG SystemCallNumber, PULONG_PTR Arguments)
Definition: traphdlr.c:1696
struct _EXCEPTION_REGISTRATION_RECORD FAR * ExceptionList
Definition: ketypes.h:260
#define KiFillTrapFrameDebug(x)
Definition: trap_x.h:189
USHORT IoMapBase
Definition: ketypes.h:823
ULONG EFlags
Definition: ketypes.h:799
DECLSPEC_NORETURN VOID FASTCALL KiTrap11Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1477
ASSERT((InvokeOnSuccess||InvokeOnError||InvokeOnCancel) ?(CompletionRoutine !=NULL) :TRUE)
#define EXCEPTION_GP_FAULT
Definition: asm.h:627
#define PKTSS
Definition: ketypes.h:921
unsigned char UCHAR
Definition: xmlstorage.h:181
#define FSW_STACK_FAULT
Definition: ketypes.h:171
#define EFLAGS_IOPL
Definition: cpu.c:17
VOID NTAPI ProbeForRead(IN CONST VOID *Address, IN SIZE_T Length, IN ULONG Alignment)
Definition: exintrin.c:102
_Requires_lock_held_ Interrupt _Releases_lock_ Interrupt _In_ _IRQL_restores_ KIRQL OldIrql
Definition: kefuncs.h:790
__INTRIN_INLINE void __writeeflags(uintptr_t Value)
Definition: intrin_x86.h:1550
VOID FASTCALL Ki386BiosCallReturnAddress(IN PKTRAP_FRAME TrapFrame)
DECLSPEC_NORETURN VOID FASTCALL KiTrap0BHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:910
#define FSW_INVALID_OPERATION
Definition: ketypes.h:165
FORCEINLINE BOOLEAN KiVdmTrap(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:70
DECLSPEC_NORETURN VOID FASTCALL KiTrap04Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:598
USHORT SegDs
Definition: ketypes.h:364
#define STATUS_PRIVILEGED_INSTRUCTION
Definition: ntstatus.h:372
DECLSPEC_NORETURN VOID FASTCALL KiTrap07Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:722
__INTRIN_INLINE unsigned long __readcr0(void)
Definition: intrin_x86.h:1692
DECLSPEC_NORETURN VOID FASTCALL KiTrap0FHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1436
#define EFLAGS_TF
Definition: ketypes.h:125
#define STATUS_FLOAT_MULTIPLE_TRAPS
Definition: ntstatus.h:794
ULONG Ecx
Definition: ketypes.h:257
ULONG Eip
Definition: ketypes.h:267
ULONG Eax
Definition: ketypes.h:800
FORCEINLINE BOOLEAN KiUserTrap(IN PKTRAP_FRAME TrapFrame)
Definition: ke.h:305
ACPI_PHYSICAL_ADDRESS ACPI_SIZE BOOLEAN Warn BOOLEAN Physical UINT32 ACPI_TABLE_HEADER *OutTableHeader ACPI_TABLE_HEADER **OutTable ACPI_HANDLE UINT32 ACPI_WALK_CALLBACK ACPI_WALK_CALLBACK void void **ReturnValue UINT32 ACPI_BUFFER *RetPathPtr ACPI_OBJECT_HANDLER Handler
Definition: acpixf.h:668
Status
Definition: gdiplustypes.h:24
VOID FASTCALL KiCheckForSListAddress(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1854
struct _EXCEPTION_RECORD * ExceptionRecord
Definition: compat.h:199
ULONG PreviousPreviousMode
Definition: ketypes.h:259
PVOID FrRestore
VOID __cdecl ReadBatch(VOID)
FORCEINLINE DECLSPEC_NORETURN VOID KiDispatchException0Args(IN NTSTATUS Code, IN ULONG_PTR Address, IN PKTRAP_FRAME TrapFrame)
Definition: ke.h:663
#define HIGH_LEVEL
Definition: env_spec_w32.h:703
ULONG DbgEip
Definition: ketypes.h:242
VOID FASTCALL KiRaiseSecurityCheckFailureHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1576
_SEH2_END
Definition: create.c:4424
UCHAR KiTrapIoTable[]
Definition: traphdlr.c:40
ULONG Ebx
Definition: ketypes.h:264
#define EXCEPTION_CHAIN_END
Definition: rtltypes.h:63
FORCEINLINE DECLSPEC_NORETURN VOID KiDispatchException1Args(IN NTSTATUS Code, IN ULONG_PTR Address, IN ULONG P1, IN PKTRAP_FRAME TrapFrame)
Definition: ke.h:677
FORCEINLINE struct _TEB * NtCurrentTeb(VOID)
Definition: psfuncs.h:420
ULONG Esp0
Definition: ketypes.h:793
#define STATUS_ACCESS_VIOLATION
Definition: ntstatus.h:228
unsigned short USHORT
Definition: pedump.c:61
BOOLEAN NTAPI VdmDispatchPageFault(_In_ PKTRAP_FRAME TrapFrame)
Definition: vdmexec.c:367
ULONG Edi
Definition: ketypes.h:807
ULONG Ebp
Definition: ketypes.h:805
#define FSW_UNDERFLOW
Definition: ketypes.h:169
PGDI_BATCHFLUSH_ROUTINE KeGdiFlushUserBatch
Definition: win32.c:20
#define CR0_TS
Definition: asm.h:248
DECLSPEC_NORETURN VOID FASTCALL KiTrap06Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:641
#define FIELD_OFFSET(t, f)
Definition: typedefs.h:254
BOOLEAN NTAPI KiHandleNmi(VOID)
Definition: bug.c:1165
#define KiExitTrapDebugChecks(x, y)
Definition: trap_x.h:188
VOID NTAPI KiSaveProcessorState(IN PKTRAP_FRAME TrapFrame, IN PKEXCEPTION_FRAME ExceptionFrame)
Definition: cpu.c:1143
#define STATUS_STACK_OVERFLOW
Definition: ntstatus.h:475
FORCEINLINE VOID KiExitSystemCallDebugChecks(IN ULONG SystemCall, IN PKTRAP_FRAME TrapFrame)
Definition: trap_x.h:194
BOOLEAN NTAPI VdmDispatchBop(IN PKTRAP_FRAME TrapFrame)
Definition: vdmexec.c:313
#define I386_TSS
Definition: ketypes.h:60
#define DPRINT1
Definition: precomp.h:8
#define NPX_STATE_NOT_LOADED
Definition: asm.h:264
#define UNIMPLEMENTED_FATAL(...)
Definition: debug.h:244
_Must_inspect_result_ _In_ PLARGE_INTEGER _In_ PLARGE_INTEGER _In_ ULONG _In_ PFILE_OBJECT _In_ PVOID Process
Definition: fsrtlfuncs.h:219
FORCEINLINE VOID KiHandleDebugRegistersOnTrapExit(PKTRAP_FRAME TrapFrame)
Definition: trap_x.h:283
#define FSW_ZERO_DIVIDE
Definition: ketypes.h:167
VOID NTAPI Kei386EoiHelper(VOID)
Definition: traphdlr.c:1864
ULONG Esi
Definition: ketypes.h:806
FORCEINLINE VOID KiEnterTrap(IN PKTRAP_FRAME TrapFrame)
Definition: trap_x.h:399
void __cdecl _disable(void)
Definition: intrin_arm.h:365
unsigned int ULONG
Definition: retypes.h:1
#define STATUS_INVALID_SYSTEM_SERVICE
Definition: ntstatus.h:251
#define UNIMPLEMENTED
Definition: debug.h:115
#define RtlZeroMemory(Destination, Length)
Definition: typedefs.h:261
#define ULONG_PTR
Definition: config.h:101
DWORD ExceptionFlags
Definition: compat.h:198
uint32_t * PULONG_PTR
Definition: typedefs.h:64
PVOID KeUserPopEntrySListResume
Definition: psmgr.c:19
DECLSPEC_NORETURN VOID FASTCALL KiServiceExit(IN PKTRAP_FRAME TrapFrame, IN NTSTATUS Status)
Definition: traphdlr.c:150
#define FRAME_EDITED
Definition: ke.h:64
DECLSPEC_NORETURN VOID FASTCALL KiServiceExit2(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:189
#define _SEH2_EXCEPT(...)
Definition: pseh2_64.h:6
struct _KTRAP_FRAME * PKTRAP_FRAME
#define STATUS_IN_PAGE_ERROR
Definition: ntstatus.h:229
DECLSPEC_NORETURN VOID FASTCALL KiNpxHandler(IN PKTRAP_FRAME TrapFrame, IN PKTHREAD Thread, IN PFX_SAVE_AREA SaveArea)
Definition: traphdlr.c:244
DECLSPEC_NORETURN VOID FASTCALL KiTrap0EHandler(IN PKTRAP_FRAME)
Definition: traphdlr.c:1222
#define STATUS_FLOAT_INVALID_OPERATION
Definition: ntstatus.h:366
DWORD NumberParameters
Definition: compat.h:201
#define KeGetCurrentThread
Definition: hal.h:44
UCHAR KiTrapPrefixTable[]
Definition: traphdlr.c:25
#define CR0_MP
Definition: asm.h:246
USHORT Gs
Definition: ketypes.h:818
VOID __cdecl KiFastCallEntry(VOID)
VOID FASTCALL Ke386LoadFpuState(IN PFX_SAVE_AREA SaveArea)
FXSAVE_FORMAT FxArea
Definition: ketypes.h:448
FORCEINLINE ULONG_PTR KiDbgPostServiceHook(ULONG SystemCallNumber, ULONG_PTR Result)
Definition: traphdlr.c:1706
VOID FASTCALL KiCallbackReturnHandler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:1637
#define STATUS_ARRAY_BOUNDS_EXCEEDED
Definition: ntstatus.h:362
#define KeGetTrapFrame(Thread)
Definition: ke.h:145
#define APC_LEVEL
Definition: env_spec_w32.h:695
DECLSPEC_NORETURN VOID FASTCALL KiTrap05Handler(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:618
ULONG EFlags
Definition: ketypes.h:384
#define KI_EXCEPTION_ACCESS_VIOLATION
Definition: ketypes.h:177
ULONG Edx
Definition: ketypes.h:256
ULONG Ebp
Definition: ketypes.h:265
#define FSW_DENORMAL
Definition: ketypes.h:166
#define BREAKPOINT_BREAK
Definition: kdtypes.h:50
#define STATUS_INVALID_LOCK_SEQUENCE
Definition: ntstatus.h:253
DECLSPEC_NORETURN VOID FASTCALL KiSystemServiceHandler(IN PKTRAP_FRAME TrapFrame, IN PVOID Arguments)
Definition: traphdlr.c:1718
DECLSPEC_NORETURN VOID FASTCALL KiEoiHelper(IN PKTRAP_FRAME TrapFrame)
Definition: traphdlr.c:126
DECLSPEC_NORETURN VOID FASTCALL KiSystemCallTrapReturn(IN PKTRAP_FRAME TrapFrame)
DECLSPEC_NORETURN VOID FASTCALL KiEditedTrapReturn(IN PKTRAP_FRAME TrapFrame)
#define EXCEPTION_RESERVED_TRAP
Definition: asm.h:628
NTSYSAPI NTSTATUS NTAPI NtCallbackReturn(IN PVOID Result OPTIONAL, IN ULONG ResultLength, IN NTSTATUS Status)
Definition: stubs.c:411
#define EFLAGS_INTERRUPT_MASK
Definition: ketypes.h:126