Processor Exceptions A survey of the x86 exceptions and mechanism for handling faults, traps, and aborts.

Slides:



Advertisements
Similar presentations
Intermediate x86 Part 3 Xeno Kovah – 2010 xkovah at gmail.
Advertisements

Processor Privilege-Levels
Types of Code Segments Conforming Code Segment
Unit 4 Chapter-1 Multitasking. The Task State Segment.
Intel MP.
IA32 Paging Scheme Introduction to the Pentium’s support for “virtual” memory.
Facilities for x86 debugging
Interrupts in Protected-Mode Writing a protected-mode interrupt-service routine for the timer-tick interrupt.
Interrupts in Protected-Mode Writing a protected-mode interrupt-service routine for the timer-tick interrupt.
Processor Exceptions A survey of the x86 exceptions and mechanism for handling faults, traps, and aborts.
Page-Faults in Linux How can we study the handling of page-fault exceptions?
Exceptions and Interrupts How does Linux handle service- requests from the cpu and from the peripheral devices?
Interrupts in Protected-Mode Writing a protected-mode interrupt-service routine for the timer-tick interrupt.
The various x86 ‘modes’ On understanding key differences among the processor’s several execution-architectures.
Processor Privilege-Levels How the x86 processor accomplishes transitions among its four distinct privilege-levels.
Deferred segment-loading An exercise on implementing the concept of ‘load-on-demand’ for the program-segments in an ELF executable file.
Venturing into protected-mode A first look at the CPU registers and instructions which provide the essential supporting infrastructure.
X86 segmentation, page tables, and interrupts 3/17/08 Frans Kaashoek MIT
Facilities for x86 debugging Introduction to Pentium features that can assist programmers in their debugging of software.
Task-Switching How the x86 processor assists with context-switching among multiple program-threads.
Linux Operating System
Deferred segment-loading An exercise on implementing the concept of ‘load-on-demand’
Venturing into protected-mode
Introduction to Interrupts
8086 emulation Using Virtual-8086 mode to execute real-mode procedures in a protected-mode environment.
Venturing into protected-mode A first look at the CPU registers and instructions which provide the essential supporting infrastructure.
Interrupts in Protected-Mode Writing a protected-mode interrupt-service routine for the timer-tick interrupt.
Gursharan Singh Tatla Block Diagram of Intel 8086 Gursharan Singh Tatla 19-Apr-17.
UNIT 2 Memory Management Unit and Segment Description and Paging
Intel IA32 OS Support -Refresh
Intel
Interrupts. What Are Interrupts? Interrupts alter a program’s flow of control  Behavior is similar to a procedure call »Some significant differences.
80386DX.
Windows Kernel Internals Traps, Interrupts, Exceptions
The Pentium Processor.
The Pentium Processor Chapter 3 S. Dandamudi To be used with S. Dandamudi, “Introduction to Assembly Language Programming,” Second Edition, Springer,
Multitasking Mr. Mahendra B. Salunke Asst. Prof. Dept. of Computer Engg., STES SITS, Narhe, Pune-41 STES Sinhgad Institute of Tech. & Science Dept. of.
Chapter 11 CPU Structure and Function. CPU Structure CPU must: —Fetch instructions —Interpret instructions —Fetch data —Process data —Write data.
1 COMPUTER ARCHITECTURE (for Erasmus students) Assoc.Prof. Stasys Maciulevičius Computer Dept.
Microprocessor system architectures – IA32 introduction Jakub Yaghob.
Interrupts in the guest VM A look at the steps needed to “reflect” hardware interrupts back into the ROM-BIOS for servicing.
System Address Registers/Memory Management Registers Four memory management registers are used to specify the locations of data structures which control.
CSNB374: Microprocessor Systems Chapter 5: Procedures and Interrupts.
Interrupt driven I/O. MIPS RISC Exception Mechanism The processor operates in The processor operates in user mode user mode kernel mode kernel mode Access.
1 i386 Memory Management Professor Ching-Chi Hsu 1998 年 4 月.
Virtual 8086 Mode  The supports execution of one or more 8086, 8088, 80186, or programs in an protected-mode environment.  An 8086.
EFLAG Register of The The only new flag bit is the AC alignment check, used to indicate that the microprocessor has accessed a word at an odd.
80386DX. Programming Model The basic programming model consists of the following aspects: – Registers – Instruction Set – Addressing Modes – Data Types.
Segment Descriptor Segments are areas of memory defined by a programmer and can be a code, data or stack segment. In segments need not be all the.
6. HAL and IDT ENGI 3655 Lab Sessions. Richard Khoury2 Textbook Readings  Interrupts ◦ Section  Hardware Abstraction Layer ◦ Section
80386DX.
Interrupt driven I/O Computer Organization and Assembly Language: Module 12.
Information Security - 2. Other Registers EFLAGS – 32 Bit Register CFPFAFZFSFTFIFDFOFIO PL IO PL NTRFVM Bits 1,3,5,15,22-31 are RESERVED. 18: AC, 19:VIF,
Microprocessor system architectures – IA32 security
Information Security - 2. Task Switching Every process has an associated Task State Segment, whose starting point is stored in the Task register. A task.
Information Security - 2. CISC Vs RISC X86 is CISC while ARM is RISC CISC is Compiler’s heaven while RISC is Architecture’s heaven Orthogonal ISA in RISC.
Privilege Check for Control Transfer(Code Access) Control transfers (except interrupts) are accomplished by the instructions JMP, CALL, and RET The "near"
Microprocessor Architecture
Protection in Virtual Mode
An Interrupt is either a Hardware generated CALL (externally derived from a hardware signal) OR A Software-generated CALL (internally derived from.
Descriptor Table & Register
MICROPROCESSOR BASED SYSTEM DESIGN
Anton Burtsev February, 2017
x86 segmentation, page tables, and interrupts
System Segment Descriptor
Introduction to the Intel x86’s support for “virtual” memory
CNET 315 Microprocessor & Assembly Language
UNIT-VII Advanced Micro Processors Introduction to 80286
CS-401 Computer Architecture & Assembly Language Programming
CS444/544 Operating Systems II Virtual Memory
Presentation transcript:

Processor Exceptions A survey of the x86 exceptions and mechanism for handling faults, traps, and aborts

Types of exceptions The CPU recognizes various kinds of processing errors (called ‘exceptions’): Those which are known before they have occurred (and which therefore can be prevented) Those which are known only after they’ve occurred (but for which corrective action can still be taken) Those which were not forseen, and which do not permit any steps that would lead to recovery We will need some more background for explaining these distinctions

More ‘application’ registers The 8087 NPX (numeric processor extension) introduced eight 80-bit registers (for doing floating-point arithmetic): and the Pentium continues to implement these registers st0 st1 st2 st3 st4 st5 st6 st7 80-bits

Control Register 0 PGPG CDCD NWNW AMAM WPWP NENE ET=1ET=1 TSTS EMEM MPMP PEPE Legend: PE = Protection Enabled (1=yes, 0=no) MP = Math NPX Present (1=yes, 0=no) EM = Emulate Math NPX (1=yes, 0=no) TS = Task was Switched (1=yes, 0=no) ET = NPX Extension-Type (1=387, 0=287) NE = NPX Errors trapped (1=yes, 0=no) WP = Write-Protect user-pages (1=yes, 0=no) AM = Alignment-checking Mask (1=on, 0=off) NW = Non-Write-through (1=yes, 0=no) CD = Cache is Disabled (1=yes, 0=no) PG = Paging is Enabled (1=yes, 0=no) 031 These are NPX-related These are cache-related

More ‘system’ registers We already mentioned Control Register 0, but there are also other system registers: CR0 CR2 CR3 CR4 DR0 DR1 DR2 DR3 DR6 DR7 DR4 DR5 CR1 4 Control Registers 6 Debug Registers = unimplemented register

‘Before-the-fact’ errors The CPU may fetch an instruction which it cannot correctly execute (due to an invalid operand or insufficient privilege-level, or to the instruction’s opcode not being defined) A few examples are: –Attempting to perform a division by zero –Attempting to exceed memory-segment limits –Attempting to modify a ‘read-only’ segment

‘After-the-fact’ errors Also the cpu may perform some operation that results in an incorrect or illegal value (due to limits on the CPU register-sizes or to limits on the supported data-formats) A few examples: –Add positive numbers, but get a negative total –Store an array-entry beyond the array-bounds –Take square-root of a real value less than 0.0

“privileged” instructions In Protected-Mode the instructions below can only be executed at ring0 (i.e., if the CPU’s Current Privilege Level is zero): –‘MOV’ to/from a control-register (e.g., CR0) –‘MOV’ to/from a debug-register (e.g., DR7) –Modifying a system segment-register (i.e., ‘LGDT’ / ’LIDT’ / ’LLDT’ / ’LTR’ / ’LMSW’ ) –Cache-invalidates: ‘INVD’/‘INVLPG’/ WBINVD’ –‘CLTS’ or ‘HLT’

What happens if…? If protection rules are violated, or if errors result from computations, the processor will generate an ‘exception’ (i.e., it will save some information on the stack and transfer control to an ‘exception-handler’) Different kinds of exceptions will trigger different exception-handling procedures Gates in the IDT define the ‘entry-points’

Faults, traps, and aborts Intel classifies exceptions into categories, (according to whether or not it may be possible to ‘recover’ from the ‘error’): – ‘Faults’ are detected ‘before-the-fact’ (and generally indicate ‘recoverable’ errors) –‘Traps’ are detected ‘after-the-fact’ (and indicate some corrective action is needed) –‘Aborts’ are unrecoverable error-conditions

A ‘fault’ example Suppose an instruction tries to read from a ‘not-present’ data-segment:mov (%si),ax The CPU generate exception-number 0xB In case the corresponding IDT-descriptor is a 32-bit interrupt-gate (or trap-gate), the CPU will push at least four 32-bit values: –Current contents of the EFLAGS register –Current contents of registers CS and EIP –An ‘error-code’ (with info about DS register)

‘Fault’ example (continued) If it is necessary to switch stacks (because of a change in the exception-handler’s code-segment privilege-level), then the ‘old’ stack’s address (i.e., registers SS and ESP) will also get pushed onto the ‘new’ stack The fault-handler can take whatever actions are necessary to resolve the ‘not-present’ condition, then mark the data-segment as being ‘present’ and ‘restart’ execution of the prior instruction

What about ‘not-present’ gates? If an exception is generated, but the IDT’s gate-descriptor for that type of exception isn’t ‘present’, then the CPU generates a General Protection exception (INT-0x0D) So by supplying one exception-handler for this ‘catch-all’ exception, you can ‘service’ nearly all of the various error-conditions (if you include code that distinguishes them)

Error-Code Formats The format of the error-code that the CPU pushes onto its stack depends upon which type of exception has been encountered For General Protection exceptions, the error-code format looks like this: segment selector index EXTEXT INTINT TITI TI=Table Indicator (0=GDT, 1=LDT) INT=Interrupt (1=yes, 0=no) EXT=External-to-CPU event was cause of the exception (1=yes, 0=no)

Stack Frame Layout (32bit) ESP EFLAGS EIP SS CS Error Code points to the faulting instruction points to the old stack’s top SS:ESP = the new stack’s top When the ‘fault’ exception uses a 32-bit Interrupt-Gate (or Trap-Gate)

Stack Frame Layout (16bit) SP FLAGS IP SS CS Error Code points to the faulting instruction points to the old stack’s top SS:SP = the new stack’s top When the ‘fault’ exception uses a 16-bit Interrupt-Gate (or Trap-Gate)

Catalog of x86 exceptions 0x00: divide-overflow fault 0x01: single-step trap or debug fault 0x02: non-maskable interrupt (NMI) trap 0x03: breakpoint trap 0x04: integer overflow trap 0x05: array bounds fault 0x06: invalid opcode fault 0x07: coprocessor unavailable fault

Catalog (continue) 0x08: double-fault abort 0x09: (reserved) 0x0A: invalid TSS fault/abort 0x0B: segment not present fault 0x0C: stack fault 0x0D: general protection exception fault 0x0E: page fault 0x0F: (reserved)

Catalog (continued again) 0x10: FPU floating-point error fault 0x11: operand alignment-check fault 0x12: machine-check exception abort 0x13: SIMD floating-point exception fault 0x14-0x1F: (reserved) 0x20-0xFF: (user-defined interrupts) NOTE: Only the following exceptions have error-codes: 0x8, 0xA, 0xB, 0xC, 0xD, 0xE

Demo program: ‘whycrash.s’ To illustrate the processor’s response to exceptions, we created this short demo It displays some diagnostic information (including the ‘error-code’) when the CPU triggers any exception-condition (all get routed through the IDT-gate for General Protection exceptions in this demo) Can help us identify causes for a ‘crash’

In-class exercise #1 Try experimenting with your own examples of impermissible instructions What if you try to store a value to the vram memory-segment using an address-offset larger than its 32KB segment-limit? What if you try to load a segment-register with a selector-value that exceeds the size of your descriptor-table? What if you try to ‘call’ to ring3 from ring0?

In-class exercise #2 What if you tried to load a selector for the wrong kind of descriptor: e.g., putting a code-selector into register SS? e.g., putting a data-selector into register CS? e.g., putting a gate-descriptor into register DS? What if you tried to execute an ‘undefined opcode’? e.g.,putting bytes 0xF, 0xB in instruction-stream