db_interface.c revision 1.11 1 1.11 thorpej /* $NetBSD: db_interface.c,v 1.11 2001/11/23 21:18:30 thorpej Exp $ */
2 1.1 matt
3 1.1 matt /*
4 1.1 matt * Copyright (c) 1996 Scott K. Stevens
5 1.1 matt *
6 1.1 matt * Mach Operating System
7 1.1 matt * Copyright (c) 1991,1990 Carnegie Mellon University
8 1.1 matt * All Rights Reserved.
9 1.1 matt *
10 1.1 matt * Permission to use, copy, modify and distribute this software and its
11 1.1 matt * documentation is hereby granted, provided that both the copyright
12 1.1 matt * notice and this permission notice appear in all copies of the
13 1.1 matt * software, derivative works or modified versions, and any portions
14 1.1 matt * thereof, and that both notices appear in supporting documentation.
15 1.1 matt *
16 1.1 matt * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
17 1.1 matt * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
18 1.1 matt * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
19 1.1 matt *
20 1.1 matt * Carnegie Mellon requests users of this software to return to
21 1.1 matt *
22 1.1 matt * Software Distribution Coordinator or Software.Distribution (at) CS.CMU.EDU
23 1.1 matt * School of Computer Science
24 1.1 matt * Carnegie Mellon University
25 1.1 matt * Pittsburgh PA 15213-3890
26 1.1 matt *
27 1.1 matt * any improvements or extensions that they make and grant Carnegie the
28 1.1 matt * rights to redistribute these changes.
29 1.1 matt *
30 1.1 matt * From: db_interface.c,v 2.4 1991/02/05 17:11:13 mrt (CMU)
31 1.1 matt */
32 1.1 matt
33 1.1 matt /*
34 1.1 matt * Interface to new debugger.
35 1.1 matt */
36 1.1 matt #include "opt_ddb.h"
37 1.1 matt
38 1.1 matt #include <sys/param.h>
39 1.1 matt #include <sys/proc.h>
40 1.1 matt #include <sys/reboot.h>
41 1.1 matt #include <sys/systm.h> /* just for boothowto */
42 1.1 matt #include <sys/exec.h>
43 1.1 matt
44 1.1 matt #include <uvm/uvm_extern.h>
45 1.1 matt
46 1.1 matt #include <machine/db_machdep.h>
47 1.9 thorpej #include <arm/arm32/katelib.h>
48 1.11 thorpej #include <arm/undefined.h>
49 1.1 matt #include <ddb/db_command.h>
50 1.1 matt #include <ddb/db_output.h>
51 1.1 matt #include <ddb/db_variables.h>
52 1.1 matt #include <ddb/db_sym.h>
53 1.1 matt #include <ddb/db_extern.h>
54 1.1 matt #include <ddb/db_interface.h>
55 1.1 matt #include <dev/cons.h>
56 1.1 matt
57 1.1 matt static int nil;
58 1.1 matt
59 1.1 matt int db_access_und_sp __P((const struct db_variable *, db_expr_t *, int));
60 1.1 matt int db_access_abt_sp __P((const struct db_variable *, db_expr_t *, int));
61 1.1 matt int db_access_irq_sp __P((const struct db_variable *, db_expr_t *, int));
62 1.1 matt u_int db_fetch_reg __P((int, db_regs_t *));
63 1.1 matt
64 1.1 matt const struct db_variable db_regs[] = {
65 1.1 matt { "spsr", (long *)&DDB_REGS->tf_spsr, FCN_NULL, },
66 1.1 matt { "r0", (long *)&DDB_REGS->tf_r0, FCN_NULL, },
67 1.1 matt { "r1", (long *)&DDB_REGS->tf_r1, FCN_NULL, },
68 1.1 matt { "r2", (long *)&DDB_REGS->tf_r2, FCN_NULL, },
69 1.1 matt { "r3", (long *)&DDB_REGS->tf_r3, FCN_NULL, },
70 1.1 matt { "r4", (long *)&DDB_REGS->tf_r4, FCN_NULL, },
71 1.1 matt { "r5", (long *)&DDB_REGS->tf_r5, FCN_NULL, },
72 1.1 matt { "r6", (long *)&DDB_REGS->tf_r6, FCN_NULL, },
73 1.1 matt { "r7", (long *)&DDB_REGS->tf_r7, FCN_NULL, },
74 1.1 matt { "r8", (long *)&DDB_REGS->tf_r8, FCN_NULL, },
75 1.1 matt { "r9", (long *)&DDB_REGS->tf_r9, FCN_NULL, },
76 1.1 matt { "r10", (long *)&DDB_REGS->tf_r10, FCN_NULL, },
77 1.1 matt { "r11", (long *)&DDB_REGS->tf_r11, FCN_NULL, },
78 1.1 matt { "r12", (long *)&DDB_REGS->tf_r12, FCN_NULL, },
79 1.1 matt { "usr_sp", (long *)&DDB_REGS->tf_usr_sp, FCN_NULL, },
80 1.1 matt { "usr_lr", (long *)&DDB_REGS->tf_usr_lr, FCN_NULL, },
81 1.1 matt { "svc_sp", (long *)&DDB_REGS->tf_svc_sp, FCN_NULL, },
82 1.1 matt { "svc_lr", (long *)&DDB_REGS->tf_svc_lr, FCN_NULL, },
83 1.1 matt { "pc", (long *)&DDB_REGS->tf_pc, FCN_NULL, },
84 1.1 matt { "und_sp", (long *)&nil, db_access_und_sp, },
85 1.1 matt { "abt_sp", (long *)&nil, db_access_abt_sp, },
86 1.1 matt { "irq_sp", (long *)&nil, db_access_irq_sp, },
87 1.1 matt };
88 1.1 matt
89 1.1 matt const struct db_variable * const db_eregs = db_regs + sizeof(db_regs)/sizeof(db_regs[0]);
90 1.1 matt
91 1.1 matt extern label_t *db_recover;
92 1.1 matt
93 1.1 matt int db_active = 0;
94 1.1 matt
95 1.1 matt int db_access_und_sp(vp, valp, rw)
96 1.1 matt const struct db_variable *vp;
97 1.1 matt db_expr_t *valp;
98 1.1 matt int rw;
99 1.1 matt {
100 1.1 matt if (rw == DB_VAR_GET)
101 1.1 matt *valp = get_stackptr(PSR_UND32_MODE);
102 1.1 matt return(0);
103 1.1 matt }
104 1.1 matt
105 1.1 matt int db_access_abt_sp(vp, valp, rw)
106 1.1 matt const struct db_variable *vp;
107 1.1 matt db_expr_t *valp;
108 1.1 matt int rw;
109 1.1 matt {
110 1.1 matt if (rw == DB_VAR_GET)
111 1.1 matt *valp = get_stackptr(PSR_ABT32_MODE);
112 1.1 matt return(0);
113 1.1 matt }
114 1.1 matt
115 1.1 matt int db_access_irq_sp(vp, valp, rw)
116 1.1 matt const struct db_variable *vp;
117 1.1 matt db_expr_t *valp;
118 1.1 matt int rw;
119 1.1 matt {
120 1.1 matt if (rw == DB_VAR_GET)
121 1.1 matt *valp = get_stackptr(PSR_IRQ32_MODE);
122 1.1 matt return(0);
123 1.1 matt }
124 1.1 matt
125 1.1 matt /*
126 1.1 matt * kdb_trap - field a TRACE or BPT trap
127 1.1 matt */
128 1.1 matt int
129 1.1 matt kdb_trap(type, regs)
130 1.1 matt int type;
131 1.1 matt db_regs_t *regs;
132 1.1 matt {
133 1.1 matt int s;
134 1.1 matt
135 1.1 matt switch (type) {
136 1.1 matt case T_BREAKPOINT: /* breakpoint */
137 1.1 matt case -1: /* keyboard interrupt */
138 1.1 matt break;
139 1.1 matt default:
140 1.1 matt db_printf("kernel: trap");
141 1.1 matt if (db_recover != 0) {
142 1.1 matt db_error("Faulted in DDB; continuing...\n");
143 1.1 matt /*NOTREACHED*/
144 1.1 matt }
145 1.1 matt }
146 1.1 matt
147 1.1 matt /* Should switch to kdb`s own stack here. */
148 1.1 matt
149 1.1 matt ddb_regs = *regs;
150 1.1 matt
151 1.1 matt s = splhigh();
152 1.1 matt db_active++;
153 1.1 matt cnpollc(TRUE);
154 1.1 matt db_trap(type, 0/*code*/);
155 1.1 matt cnpollc(FALSE);
156 1.1 matt db_active--;
157 1.1 matt splx(s);
158 1.1 matt
159 1.1 matt *regs = ddb_regs;
160 1.1 matt
161 1.1 matt return (1);
162 1.1 matt }
163 1.1 matt
164 1.1 matt
165 1.1 matt /*
166 1.1 matt * Received keyboard interrupt sequence.
167 1.1 matt */
168 1.1 matt void
169 1.1 matt kdb_kbd_trap(regs)
170 1.1 matt db_regs_t *regs;
171 1.1 matt {
172 1.1 matt if (db_active == 0 && (boothowto & RB_KDB)) {
173 1.1 matt printf("\n\nkernel: keyboard interrupt\n");
174 1.1 matt kdb_trap(-1, regs);
175 1.1 matt }
176 1.1 matt }
177 1.1 matt
178 1.1 matt
179 1.1 matt static int
180 1.1 matt db_validate_address(addr)
181 1.1 matt vm_offset_t addr;
182 1.1 matt {
183 1.1 matt pt_entry_t *ptep;
184 1.1 matt pd_entry_t *pdep;
185 1.1 matt struct proc *p = curproc;
186 1.1 matt
187 1.1 matt /*
188 1.1 matt * If we have a valid pmap for curproc, use it's page directory
189 1.1 matt * otherwise use the kernel pmap's page directory.
190 1.1 matt */
191 1.1 matt if (!p || !p->p_vmspace || !p->p_vmspace->vm_map.pmap)
192 1.7 chris pdep = pmap_kernel()->pm_pdir;
193 1.1 matt else
194 1.1 matt pdep = p->p_vmspace->vm_map.pmap->pm_pdir;
195 1.1 matt
196 1.1 matt /* Make sure the address we are reading is valid */
197 1.1 matt switch ((pdep[(addr >> 20) + 0] & L1_MASK)) {
198 1.1 matt case L1_SECTION:
199 1.1 matt break;
200 1.1 matt case L1_PAGE:
201 1.1 matt /* Check the L2 page table for validity */
202 1.1 matt ptep = vtopte(addr);
203 1.1 matt if ((*ptep & L2_MASK) != L2_INVAL)
204 1.1 matt break;
205 1.1 matt /* FALLTHROUGH */
206 1.1 matt default:
207 1.1 matt return 1;
208 1.1 matt }
209 1.1 matt
210 1.1 matt return 0;
211 1.1 matt }
212 1.1 matt
213 1.1 matt /*
214 1.1 matt * Read bytes from kernel address space for debugger.
215 1.1 matt */
216 1.1 matt void
217 1.1 matt db_read_bytes(addr, size, data)
218 1.1 matt vm_offset_t addr;
219 1.1 matt int size;
220 1.1 matt char *data;
221 1.1 matt {
222 1.1 matt char *src;
223 1.1 matt
224 1.1 matt src = (char *)addr;
225 1.1 matt while (--size >= 0) {
226 1.1 matt if (db_validate_address((u_int)src)) {
227 1.1 matt db_printf("address %p is invalid\n", src);
228 1.1 matt return;
229 1.1 matt }
230 1.1 matt *data++ = *src++;
231 1.1 matt }
232 1.1 matt }
233 1.1 matt
234 1.1 matt static void
235 1.1 matt db_write_text(dst, ch)
236 1.1 matt unsigned char *dst;
237 1.1 matt int ch;
238 1.1 matt {
239 1.1 matt pt_entry_t *ptep, pteo;
240 1.1 matt vm_offset_t va;
241 1.1 matt
242 1.1 matt va = (unsigned long)dst & (~PGOFSET);
243 1.1 matt ptep = vtopte(va);
244 1.1 matt
245 1.1 matt if (db_validate_address((u_int)dst)) {
246 1.1 matt db_printf(" address %p not a valid page\n", dst);
247 1.1 matt return;
248 1.1 matt }
249 1.1 matt
250 1.1 matt pteo = *ptep;
251 1.1 matt *ptep = pteo | PT_AP(AP_KRW);
252 1.1 matt cpu_tlb_flushD_SE(va);
253 1.1 matt
254 1.1 matt *dst = (unsigned char)ch;
255 1.1 matt
256 1.1 matt /* make sure the caches and memory are in sync */
257 1.1 matt cpu_cache_syncI_rng((u_int)dst, 4);
258 1.1 matt
259 1.1 matt *ptep = pteo;
260 1.1 matt cpu_tlb_flushD_SE(va);
261 1.1 matt }
262 1.1 matt
263 1.1 matt /*
264 1.1 matt * Write bytes to kernel address space for debugger.
265 1.1 matt */
266 1.1 matt void
267 1.1 matt db_write_bytes(addr, size, data)
268 1.1 matt vm_offset_t addr;
269 1.1 matt int size;
270 1.1 matt char *data;
271 1.1 matt {
272 1.1 matt extern char etext[];
273 1.1 matt char *dst;
274 1.1 matt int loop;
275 1.1 matt
276 1.1 matt dst = (char *)addr;
277 1.1 matt loop = size;
278 1.1 matt while (--loop >= 0) {
279 1.1 matt if ((dst >= (char *)KERNEL_TEXT_BASE) && (dst < etext))
280 1.1 matt db_write_text(dst, *data);
281 1.1 matt else {
282 1.1 matt if (db_validate_address((u_int)dst)) {
283 1.1 matt db_printf("address %p is invalid\n", dst);
284 1.1 matt return;
285 1.1 matt }
286 1.1 matt *dst = *data;
287 1.1 matt }
288 1.1 matt dst++, data++;
289 1.1 matt }
290 1.1 matt /* make sure the caches and memory are in sync */
291 1.1 matt cpu_cache_syncI_rng(addr, size);
292 1.1 matt
293 1.1 matt /* In case the current page tables have been modified ... */
294 1.1 matt cpu_tlb_flushID();
295 1.1 matt }
296 1.1 matt
297 1.1 matt void
298 1.1 matt cpu_Debugger()
299 1.1 matt {
300 1.1 matt asm(".word 0xe7ffffff");
301 1.1 matt }
302 1.1 matt
303 1.1 matt void db_show_intrchain_cmd __P((db_expr_t addr, int have_addr, db_expr_t count, char *modif));
304 1.1 matt void db_show_panic_cmd __P((db_expr_t addr, int have_addr, db_expr_t count, char *modif));
305 1.1 matt void db_show_frame_cmd __P((db_expr_t addr, int have_addr, db_expr_t count, char *modif));
306 1.1 matt
307 1.1 matt const struct db_command db_machine_command_table[] = {
308 1.1 matt { "frame", db_show_frame_cmd, 0, NULL },
309 1.1 matt { "intrchain", db_show_intrchain_cmd, 0, NULL },
310 1.1 matt { "panic", db_show_panic_cmd, 0, NULL },
311 1.2 matt #ifdef ARM32_DB_COMMANDS
312 1.2 matt ARM32_DB_COMMANDS,
313 1.2 matt #endif
314 1.1 matt { NULL, NULL, 0, NULL }
315 1.1 matt };
316 1.1 matt
317 1.1 matt int
318 1.1 matt db_trapper(addr, inst, frame, fault_code)
319 1.1 matt u_int addr;
320 1.1 matt u_int inst;
321 1.1 matt trapframe_t *frame;
322 1.1 matt int fault_code;
323 1.1 matt {
324 1.1 matt if (fault_code == 0) {
325 1.1 matt if ((inst & ~INSN_COND_MASK) == (BKPT_INST & ~INSN_COND_MASK))
326 1.1 matt kdb_trap(T_BREAKPOINT, frame);
327 1.1 matt else
328 1.1 matt kdb_trap(-1, frame);
329 1.1 matt } else
330 1.1 matt return (1);
331 1.1 matt return (0);
332 1.1 matt }
333 1.1 matt
334 1.1 matt extern u_int esym;
335 1.1 matt extern u_int end;
336 1.1 matt
337 1.3 bjh21 static struct undefined_handler db_uh;
338 1.3 bjh21
339 1.1 matt void
340 1.1 matt db_machine_init()
341 1.1 matt {
342 1.5 bjh21 #ifndef __ELF__
343 1.1 matt struct exec *kernexec = (struct exec *)KERNEL_TEXT_BASE;
344 1.1 matt int len;
345 1.1 matt
346 1.1 matt /*
347 1.1 matt * The boot loader currently loads the kernel with the a.out
348 1.1 matt * header still attached.
349 1.1 matt */
350 1.1 matt
351 1.1 matt if (kernexec->a_syms == 0) {
352 1.8 thorpej printf("ddb: No symbol table\n");
353 1.1 matt } else {
354 1.2 matt /* cover the symbols themselves (what is the int for?? XXX) */
355 1.1 matt esym = (int)&end + kernexec->a_syms + sizeof(int);
356 1.2 matt
357 1.1 matt /*
358 1.1 matt * and the string table. (int containing size of string
359 1.1 matt * table is included in string table size).
360 1.1 matt */
361 1.1 matt len = *((u_int *)esym);
362 1.1 matt esym += (len + (sizeof(u_int) - 1)) & ~(sizeof(u_int) - 1);
363 1.1 matt }
364 1.5 bjh21 #endif
365 1.1 matt
366 1.3 bjh21 /*
367 1.3 bjh21 * We get called before malloc() is available, so supply a static
368 1.3 bjh21 * struct undefined_handler.
369 1.3 bjh21 */
370 1.3 bjh21 db_uh.uh_handler = db_trapper;
371 1.3 bjh21 install_coproc_handler_static(0, &db_uh);
372 1.1 matt }
373 1.1 matt
374 1.1 matt u_int
375 1.1 matt db_fetch_reg(reg, db_regs)
376 1.1 matt int reg;
377 1.1 matt db_regs_t *db_regs;
378 1.1 matt {
379 1.1 matt
380 1.1 matt switch (reg) {
381 1.1 matt case 0:
382 1.1 matt return (db_regs->tf_r0);
383 1.1 matt case 1:
384 1.1 matt return (db_regs->tf_r1);
385 1.1 matt case 2:
386 1.1 matt return (db_regs->tf_r2);
387 1.1 matt case 3:
388 1.1 matt return (db_regs->tf_r3);
389 1.1 matt case 4:
390 1.1 matt return (db_regs->tf_r4);
391 1.1 matt case 5:
392 1.1 matt return (db_regs->tf_r5);
393 1.1 matt case 6:
394 1.1 matt return (db_regs->tf_r6);
395 1.1 matt case 7:
396 1.1 matt return (db_regs->tf_r7);
397 1.1 matt case 8:
398 1.1 matt return (db_regs->tf_r8);
399 1.1 matt case 9:
400 1.1 matt return (db_regs->tf_r9);
401 1.1 matt case 10:
402 1.1 matt return (db_regs->tf_r10);
403 1.1 matt case 11:
404 1.1 matt return (db_regs->tf_r11);
405 1.1 matt case 12:
406 1.1 matt return (db_regs->tf_r12);
407 1.1 matt case 13:
408 1.1 matt return (db_regs->tf_svc_sp);
409 1.1 matt case 14:
410 1.1 matt return (db_regs->tf_svc_lr);
411 1.1 matt case 15:
412 1.1 matt return (db_regs->tf_pc);
413 1.1 matt default:
414 1.1 matt panic("db_fetch_reg: botch");
415 1.1 matt }
416 1.1 matt }
417 1.1 matt
418 1.1 matt u_int
419 1.1 matt branch_taken(insn, pc, db_regs)
420 1.1 matt u_int insn;
421 1.1 matt u_int pc;
422 1.1 matt db_regs_t *db_regs;
423 1.1 matt {
424 1.1 matt u_int addr, nregs;
425 1.1 matt
426 1.1 matt switch ((insn >> 24) & 0xf) {
427 1.1 matt case 0xa: /* b ... */
428 1.1 matt case 0xb: /* bl ... */
429 1.1 matt addr = ((insn << 2) & 0x03ffffff);
430 1.1 matt if (addr & 0x02000000)
431 1.1 matt addr |= 0xfc000000;
432 1.1 matt return (pc + 8 + addr);
433 1.1 matt case 0x7: /* ldr pc, [pc, reg, lsl #2] */
434 1.1 matt addr = db_fetch_reg(insn & 0xf, db_regs);
435 1.1 matt addr = pc + 8 + (addr << 2);
436 1.1 matt db_read_bytes(addr, 4, (char *)&addr);
437 1.1 matt return (addr);
438 1.1 matt case 0x1: /* mov pc, reg */
439 1.1 matt addr = db_fetch_reg(insn & 0xf, db_regs);
440 1.1 matt return (addr);
441 1.1 matt case 0x8: /* ldmxx reg, {..., pc} */
442 1.1 matt case 0x9:
443 1.1 matt addr = db_fetch_reg((insn >> 16) & 0xf, db_regs);
444 1.1 matt nregs = (insn & 0x5555) + ((insn >> 1) & 0x5555);
445 1.1 matt nregs = (nregs & 0x3333) + ((nregs >> 2) & 0x3333);
446 1.1 matt nregs = (nregs + (nregs >> 4)) & 0x0f0f;
447 1.1 matt nregs = (nregs + (nregs >> 8)) & 0x001f;
448 1.1 matt switch ((insn >> 23) & 0x3) {
449 1.1 matt case 0x0: /* ldmda */
450 1.1 matt addr = addr - 0;
451 1.1 matt break;
452 1.1 matt case 0x1: /* ldmia */
453 1.1 matt addr = addr + 0 + ((nregs - 1) << 2);
454 1.1 matt break;
455 1.1 matt case 0x2: /* ldmdb */
456 1.1 matt addr = addr - 4;
457 1.1 matt break;
458 1.1 matt case 0x3: /* ldmib */
459 1.1 matt addr = addr + 4 + ((nregs - 1) << 2);
460 1.1 matt break;
461 1.1 matt }
462 1.1 matt db_read_bytes(addr, 4, (char *)&addr);
463 1.1 matt return (addr);
464 1.1 matt default:
465 1.1 matt panic("branch_taken: botch");
466 1.1 matt }
467 1.1 matt }
468