lesson9

advertisement
Processor Exceptions
A survey of the x86 exceptions
and mechanism for handling
faults, traps, and aborts
Types of exceptions
• The CPU recognizes various kinds of
processing errors (called ‘exceptions’):
• Those which are known before they have occurred
(and which therefore can be prevented)
• Those which are known only after they’ve occurred
(but for which corrective action can still be taken)
• Those which were not forseen, and which do not
permit any steps that would lead to recovery
• We will need some more background for
explaining these distinctions
More ‘application’ registers
• The 8087 NPX (numeric processor extension) introduced
eight 80-bit registers (for doing floating-point arithmetic):
80-bits
st0
st1
st2
st3
st4
st5
st6
st7
• and Core-2 Quad continues to implement these registers
Control Register 0
31
PCN
G DW
These are
cache-related
0
A
M
W
P
N
E
E
T
=
1
T EMP
SMP E
These are
NPX-related
Legend:
PE = Protection Enabled (1=yes, 0=no)
MP = Math NPX Present (1=yes, 0=no)
EM = Emulate Math NPX (1=yes, 0=no)
TS = Task was Switched (1=yes, 0=no)
ET = NPX Extension-Type (1=387, 0=287)
NE = NPX Errors trapped (1=yes, 0=no)
WP = Write-Protect user-pages (1=yes, 0=no)
AM = Alignment-checking Mask (1=on, 0=off)
NW = Non-Write-through (1=yes, 0=no)
CD = Cache is Disabled (1=yes, 0=no)
PG = Paging is Enabled (1=yes, 0=no)
More ‘system’ registers
• We already mentioned Control Register 0,
but there are also other system registers:
CR0
DR0
CR1
DR1
CR2
DR2
CR3
DR3
CR4
DR4
4 Control Registers
DR5
DR6
DR7
= unimplemented register
6 Debug Registers
‘Before-the-fact’ errors
• The CPU may fetch an instruction which it
cannot correctly execute (due to an invalid
operand or insufficient privilege-level, or to
the instruction’s opcode not being defined)
• A few examples are:
– Attempting to perform a division by zero
– Attempting to exceed memory-segment limits
– Attempting to modify a ‘read-only’ segment
‘After-the-fact’ errors
• Also the cpu may perform some operation
that results in an incorrect or illegal value
(due to limits on the CPU register-sizes or
to limits on the supported data-formats)
• A few examples:
– Add positive numbers, but get a negative total
– Store an array-entry beyond the array-bounds
– Take square-root of a real value less than 0.0
“privileged” instructions
• In Protected-Mode the instructions below
can only be executed at ring0 (i.e., if the
CPU’s Current Privilege Level is zero):
– ‘MOV’ to/from a control-register (e.g., CR0)
– ‘MOV’ to/from a debug-register (e.g., DR7)
– Modifying a system segment-register (i.e.,
‘LGDT’ / ’LIDT’ / ’LLDT’ / ’LTR’ / ’LMSW’ )
– Cache-invalidates: ‘INVD’/‘INVLPG’/ WBINVD’
– ‘CLTS’ or ‘HLT’
What happens if…?
• If protection rules are violated, or if errors
result from computations, the processor
will generate an ‘exception’ (i.e., it will
save some information on the stack and
transfer control to an ‘exception-handler’)
• Different kinds of exceptions will trigger
different exception-handling procedures
• Gates in the IDT define the ‘entry-points’
Faults, traps, and aborts
• Intel classifies exceptions into categories,
(according to whether or not it may be
possible to ‘recover’ from the ‘error’):
– ‘Faults’ are detected ‘before-the-fact’ (and
generally indicate ‘recoverable’ errors)
– ‘Traps’ are detected ‘after-the-fact’ (and
indicate some corrective action is needed)
– ‘Aborts’ are unrecoverable error-conditions
A ‘fault’ example
• Suppose an instruction tries to read from a
‘not-present’ data-segment: mov (%si),ax
• The CPU generate exception-number 0xB
• In case the corresponding IDT-descriptor
is a 32-bit interrupt-gate (or trap-gate), the
CPU will push at least four 32-bit values:
– Current contents of the EFLAGS register
– Current contents of registers CS and EIP
– An ‘error-code’ (with info about DS register)
‘Fault’ example (continued)
• If it is necessary to switch stacks (because of a
change in the exception-handler’s code-segment
privilege-level), then the ‘old’ stack’s address
(i.e., registers SS and ESP) will also get pushed
onto the ‘new’ stack
• The fault-handler can take whatever actions are
necessary to resolve the ‘not-present’ condition,
then mark the data-segment as being ‘present’
and ‘restart’ execution of the prior instruction
What about ‘not-present’ gates?
• If an exception is generated, but the IDT’s
gate-descriptor for that type of exception
isn’t ‘present’, then the CPU generates a
General Protection exception (INT-0x0D)
• So by supplying one exception-handler for
this ‘catch-all’ exception, you can ‘service’
nearly all of the various error-conditions (if
you include code that distinguishes them)
Error-Code Formats
• The format of the error-code that the CPU
pushes onto its stack depends upon which
type of exception has been encountered
• For General Protection exceptions, the
error-code format looks like this:
3 2 1 0
15
segment selector index
I E
T
N X
I
T T
TI=Table Indicator (0=GDT, 1=LDT)
INT=Interrupt (1=yes, 0=no)
EXT=External-to-CPU event was cause of the exception (1=yes, 0=no)
Stack Frame Layout (32bit)
SS
ESP
points to the old stack’s top
EFLAGS
CS
EIP
Error Code
points to the faulting instruction
SS:ESP = the new stack’s top
When the ‘fault’ exception uses a 32-bit Interrupt-Gate (or Trap-Gate)
Stack Frame Layout (16bit)
SS
SP
points to the old stack’s top
FLAGS
CS
IP
Error Code
points to the faulting instruction
SS:SP = the new stack’s top
When the ‘fault’ exception uses a 16-bit Interrupt-Gate (or Trap-Gate)
Catalog of x86 exceptions
•
•
•
•
•
•
•
•
0x00: divide-overflow fault
0x01: single-step trap or debug fault
0x02: non-maskable interrupt (NMI) trap
0x03: breakpoint trap
0x04: integer overflow trap
0x05: array bounds fault
0x06: invalid opcode fault
0x07: coprocessor unavailable fault
Catalog (continue)
•
•
•
•
•
•
•
•
0x08: double-fault abort
0x09: (reserved)
0x0A: invalid TSS fault/abort
0x0B: segment not present fault
0x0C: stack fault
0x0D: general protection exception fault
0x0E: page fault
0x0F: (reserved)
Catalog (continued again)
•
•
•
•
•
•
•
0x10: FPU floating-point error fault
0x11: operand alignment-check fault
0x12: machine-check exception abort
0x13: SIMD floating-point exception fault
0x14-0x1F: (reserved)
0x20-0xFF: (user-defined interrupts)
NOTE: Only the following exceptions have
error-codes: 0x8, 0xA, 0xB, 0xC, 0xD, 0xE
Demo program: ‘whycrash.s’
• To illustrate the processor’s response to
exceptions, we created this short demo
• It displays some diagnostic information
(including the ‘error-code’) when the CPU
triggers any exception-condition (all get
routed through the IDT-gate for General
Protection exceptions in this demo)
• Can help us identify causes for a ‘crash’
In-class exercise #1
• Try experimenting with your own examples
of impermissible instructions
• What if you try to store a value to the vram
memory-segment using an address-offset
larger than its 32KB segment-limit?
• What if you try to load a segment-register
with a selector-value that exceeds the size
of your descriptor-table?
• What if you try to ‘call’ to ring3 from ring0?
In-class exercise #2
• What if you tried to load a selector for the
wrong kind of descriptor:
• e.g., putting a code-selector into register SS?
• e.g., putting a data-selector into register CS?
• e.g., putting a gate-descriptor into register DS?
• What if you tried to execute an ‘undefined
opcode’?
• e.g., putting bytes 0xF, 0xB in instruction-stream
Download