db_interface.c revision 1.16 1 /* $NetBSD: db_interface.c,v 1.16 2002/01/17 23:56:01 thorpej Exp $ */
2
3 /*
4 * Copyright (c) 1996 Scott K. Stevens
5 *
6 * Mach Operating System
7 * Copyright (c) 1991,1990 Carnegie Mellon University
8 * All Rights Reserved.
9 *
10 * Permission to use, copy, modify and distribute this software and its
11 * documentation is hereby granted, provided that both the copyright
12 * notice and this permission notice appear in all copies of the
13 * software, derivative works or modified versions, and any portions
14 * thereof, and that both notices appear in supporting documentation.
15 *
16 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
17 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
18 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
19 *
20 * Carnegie Mellon requests users of this software to return to
21 *
22 * Software Distribution Coordinator or Software.Distribution (at) CS.CMU.EDU
23 * School of Computer Science
24 * Carnegie Mellon University
25 * Pittsburgh PA 15213-3890
26 *
27 * any improvements or extensions that they make and grant Carnegie the
28 * rights to redistribute these changes.
29 *
30 * From: db_interface.c,v 2.4 1991/02/05 17:11:13 mrt (CMU)
31 */
32
33 /*
34 * Interface to new debugger.
35 */
36 #include "opt_ddb.h"
37
38 #include <sys/param.h>
39 #include <sys/proc.h>
40 #include <sys/reboot.h>
41 #include <sys/systm.h> /* just for boothowto */
42 #include <sys/exec.h>
43
44 #include <uvm/uvm_extern.h>
45
46 #include <arm/arm32/db_machdep.h>
47 #include <arm/arm32/katelib.h>
48 #include <arm/undefined.h>
49 #include <ddb/db_access.h>
50 #include <ddb/db_command.h>
51 #include <ddb/db_output.h>
52 #include <ddb/db_variables.h>
53 #include <ddb/db_sym.h>
54 #include <ddb/db_extern.h>
55 #include <ddb/db_interface.h>
56 #include <dev/cons.h>
57
58 static int nil;
59
60 int db_access_und_sp __P((const struct db_variable *, db_expr_t *, int));
61 int db_access_abt_sp __P((const struct db_variable *, db_expr_t *, int));
62 int db_access_irq_sp __P((const struct db_variable *, db_expr_t *, int));
63 u_int db_fetch_reg __P((int, db_regs_t *));
64
65 int db_trapper __P((u_int, u_int, trapframe_t *, int));
66
67 const struct db_variable db_regs[] = {
68 { "spsr", (long *)&DDB_REGS->tf_spsr, FCN_NULL, },
69 { "r0", (long *)&DDB_REGS->tf_r0, FCN_NULL, },
70 { "r1", (long *)&DDB_REGS->tf_r1, FCN_NULL, },
71 { "r2", (long *)&DDB_REGS->tf_r2, FCN_NULL, },
72 { "r3", (long *)&DDB_REGS->tf_r3, FCN_NULL, },
73 { "r4", (long *)&DDB_REGS->tf_r4, FCN_NULL, },
74 { "r5", (long *)&DDB_REGS->tf_r5, FCN_NULL, },
75 { "r6", (long *)&DDB_REGS->tf_r6, FCN_NULL, },
76 { "r7", (long *)&DDB_REGS->tf_r7, FCN_NULL, },
77 { "r8", (long *)&DDB_REGS->tf_r8, FCN_NULL, },
78 { "r9", (long *)&DDB_REGS->tf_r9, FCN_NULL, },
79 { "r10", (long *)&DDB_REGS->tf_r10, FCN_NULL, },
80 { "r11", (long *)&DDB_REGS->tf_r11, FCN_NULL, },
81 { "r12", (long *)&DDB_REGS->tf_r12, FCN_NULL, },
82 { "usr_sp", (long *)&DDB_REGS->tf_usr_sp, FCN_NULL, },
83 { "usr_lr", (long *)&DDB_REGS->tf_usr_lr, FCN_NULL, },
84 { "svc_sp", (long *)&DDB_REGS->tf_svc_sp, FCN_NULL, },
85 { "svc_lr", (long *)&DDB_REGS->tf_svc_lr, FCN_NULL, },
86 { "pc", (long *)&DDB_REGS->tf_pc, FCN_NULL, },
87 { "und_sp", (long *)&nil, db_access_und_sp, },
88 { "abt_sp", (long *)&nil, db_access_abt_sp, },
89 { "irq_sp", (long *)&nil, db_access_irq_sp, },
90 };
91
92 const struct db_variable * const db_eregs = db_regs + sizeof(db_regs)/sizeof(db_regs[0]);
93
94 extern label_t *db_recover;
95
96 int db_active = 0;
97
98 int
99 db_access_und_sp(const struct db_variable *vp, db_expr_t *valp, int rw)
100 {
101
102 if (rw == DB_VAR_GET)
103 *valp = get_stackptr(PSR_UND32_MODE);
104 return(0);
105 }
106
107 int
108 db_access_abt_sp(const struct db_variable *vp, db_expr_t *valp, int rw)
109 {
110
111 if (rw == DB_VAR_GET)
112 *valp = get_stackptr(PSR_ABT32_MODE);
113 return(0);
114 }
115
116 int
117 db_access_irq_sp(const struct db_variable *vp, db_expr_t *valp, int rw)
118 {
119
120 if (rw == DB_VAR_GET)
121 *valp = get_stackptr(PSR_IRQ32_MODE);
122 return(0);
123 }
124
125 /*
126 * kdb_trap - field a TRACE or BPT trap
127 */
128 int
129 kdb_trap(int type, db_regs_t *regs)
130 {
131 int s;
132
133 switch (type) {
134 case T_BREAKPOINT: /* breakpoint */
135 case -1: /* keyboard interrupt */
136 break;
137 default:
138 db_printf("kernel: trap");
139 if (db_recover != 0) {
140 db_error("Faulted in DDB; continuing...\n");
141 /*NOTREACHED*/
142 }
143 }
144
145 /* Should switch to kdb`s own stack here. */
146
147 ddb_regs = *regs;
148
149 s = splhigh();
150 db_active++;
151 cnpollc(TRUE);
152 db_trap(type, 0/*code*/);
153 cnpollc(FALSE);
154 db_active--;
155 splx(s);
156
157 *regs = ddb_regs;
158
159 return (1);
160 }
161
162
163 static int
164 db_validate_address(vaddr_t addr)
165 {
166 struct proc *p = curproc;
167 struct pmap *pmap;
168
169 if (!p || !p->p_vmspace || !p->p_vmspace->vm_map.pmap)
170 pmap = pmap_kernel();
171 else
172 pmap = p->p_vmspace->vm_map.pmap;
173
174 return (pmap_extract(pmap, addr, NULL) == FALSE);
175 }
176
177 /*
178 * Read bytes from kernel address space for debugger.
179 */
180 void
181 db_read_bytes(addr, size, data)
182 vm_offset_t addr;
183 size_t size;
184 char *data;
185 {
186 char *src;
187
188 src = (char *)addr;
189
190 while (size-- > 0) {
191 if (db_validate_address((u_int)src)) {
192 db_printf("address %p is invalid\n", src);
193 return;
194 }
195 *data++ = *src++;
196 }
197 }
198
199 static void
200 db_write_text(vaddr_t addr, size_t size, char *data)
201 {
202 struct pmap *pmap = pmap_kernel();
203 pd_entry_t *pde, oldpde, tmppde;
204 pt_entry_t *pte, oldpte, tmppte;
205 vaddr_t pgva;
206 size_t limit, savesize;
207 char *dst;
208
209 if ((savesize = size) == 0)
210 return;
211
212 dst = (char *) addr;
213
214 do {
215 /* Get the PDE of the current VA. */
216 pde = pmap_pde(pmap, (vaddr_t) dst);
217 switch ((oldpde = *pde) & L1_MASK) {
218 case L1_SECTION:
219 pgva = (vaddr_t)dst & ~(L1_SEC_SIZE - 1);
220 limit = L1_SEC_SIZE -
221 ((vaddr_t)dst & (L1_SEC_SIZE - 1));
222
223 tmppde = oldpde | (AP_KRW << AP_SECTION_SHIFT);
224 *pde = tmppde;
225 break;
226
227 case L1_PAGE:
228 pgva = (vaddr_t)dst & ~PGOFSET;
229 limit = NBPG - ((vaddr_t)dst & PGOFSET);
230
231 pte = vtopte(pgva);
232 oldpte = *pte;
233 tmppte = oldpte | PT_AP(AP_KRW);
234 *pte = tmppte;
235 break;
236
237 default:
238 printf(" address 0x%08lx not a valid page\n",
239 (vaddr_t) dst);
240 return;
241 }
242 cpu_tlb_flushD_SE(pgva);
243 cpu_cpwait();
244
245 if (limit > size)
246 limit = size;
247 size -= limit;
248
249 /*
250 * Page is now writable. Do as much access as we
251 * can in this page.
252 */
253 for (; limit > 0; limit--)
254 *dst++ = *data++;
255
256 /*
257 * Restore old mapping permissions.
258 */
259 switch (oldpde & L1_MASK) {
260 case L1_SECTION:
261 *pde = oldpde;
262 break;
263
264 case L1_PAGE:
265 *pte = oldpte;
266 break;
267 }
268 cpu_tlb_flushD_SE(pgva);
269 cpu_cpwait();
270 } while (size != 0);
271
272 /* Sync the I-cache. */
273 cpu_cache_syncI_rng(addr, savesize);
274 }
275
276 /*
277 * Write bytes to kernel address space for debugger.
278 */
279 void
280 db_write_bytes(vaddr_t addr, size_t size, char *data)
281 {
282 extern char etext[];
283 char *dst;
284 size_t loop;
285
286 /* If any part is in kernel text, use db_write_text() */
287 if (addr >= KERNEL_TEXT_BASE && addr < (vaddr_t) etext) {
288 db_write_text(addr, size, data);
289 return;
290 }
291
292 dst = (char *)addr;
293 loop = size;
294 while (loop-- > 0) {
295 if (db_validate_address((u_int)dst)) {
296 db_printf("address %p is invalid\n", dst);
297 return;
298 }
299 *dst++ = *data++;
300 }
301 /* make sure the caches and memory are in sync */
302 cpu_cache_syncI_rng(addr, size);
303
304 /* In case the current page tables have been modified ... */
305 cpu_tlb_flushID();
306 cpu_cpwait();
307 }
308
309 void
310 cpu_Debugger(void)
311 {
312 asm(".word 0xe7ffffff");
313 }
314
315 const struct db_command db_machine_command_table[] = {
316 { "frame", db_show_frame_cmd, 0, NULL },
317 { "panic", db_show_panic_cmd, 0, NULL },
318 #ifdef ARM32_DB_COMMANDS
319 ARM32_DB_COMMANDS,
320 #endif
321 { NULL, NULL, 0, NULL }
322 };
323
324 int
325 db_trapper(u_int addr, u_int inst, trapframe_t *frame, int fault_code)
326 {
327
328 if (fault_code == 0) {
329 if ((inst & ~INSN_COND_MASK) == (BKPT_INST & ~INSN_COND_MASK))
330 kdb_trap(T_BREAKPOINT, frame);
331 else
332 kdb_trap(-1, frame);
333 } else
334 return (1);
335 return (0);
336 }
337
338 extern u_int esym;
339 extern u_int end;
340
341 static struct undefined_handler db_uh;
342
343 void
344 db_machine_init(void)
345 {
346 #ifndef __ELF__
347 struct exec *kernexec = (struct exec *)KERNEL_TEXT_BASE;
348 int len;
349
350 /*
351 * The boot loader currently loads the kernel with the a.out
352 * header still attached.
353 */
354
355 if (kernexec->a_syms == 0) {
356 printf("ddb: No symbol table\n");
357 } else {
358 /* cover the symbols themselves (what is the int for?? XXX) */
359 esym = (int)&end + kernexec->a_syms + sizeof(int);
360
361 /*
362 * and the string table. (int containing size of string
363 * table is included in string table size).
364 */
365 len = *((u_int *)esym);
366 esym += (len + (sizeof(u_int) - 1)) & ~(sizeof(u_int) - 1);
367 }
368 #endif
369
370 /*
371 * We get called before malloc() is available, so supply a static
372 * struct undefined_handler.
373 */
374 db_uh.uh_handler = db_trapper;
375 install_coproc_handler_static(0, &db_uh);
376 }
377
378 u_int
379 db_fetch_reg(int reg, db_regs_t *db_regs)
380 {
381
382 switch (reg) {
383 case 0:
384 return (db_regs->tf_r0);
385 case 1:
386 return (db_regs->tf_r1);
387 case 2:
388 return (db_regs->tf_r2);
389 case 3:
390 return (db_regs->tf_r3);
391 case 4:
392 return (db_regs->tf_r4);
393 case 5:
394 return (db_regs->tf_r5);
395 case 6:
396 return (db_regs->tf_r6);
397 case 7:
398 return (db_regs->tf_r7);
399 case 8:
400 return (db_regs->tf_r8);
401 case 9:
402 return (db_regs->tf_r9);
403 case 10:
404 return (db_regs->tf_r10);
405 case 11:
406 return (db_regs->tf_r11);
407 case 12:
408 return (db_regs->tf_r12);
409 case 13:
410 return (db_regs->tf_svc_sp);
411 case 14:
412 return (db_regs->tf_svc_lr);
413 case 15:
414 return (db_regs->tf_pc);
415 default:
416 panic("db_fetch_reg: botch");
417 }
418 }
419
420 u_int
421 branch_taken(u_int insn, u_int pc, db_regs_t *db_regs)
422 {
423 u_int addr, nregs;
424
425 switch ((insn >> 24) & 0xf) {
426 case 0xa: /* b ... */
427 case 0xb: /* bl ... */
428 addr = ((insn << 2) & 0x03ffffff);
429 if (addr & 0x02000000)
430 addr |= 0xfc000000;
431 return (pc + 8 + addr);
432 case 0x7: /* ldr pc, [pc, reg, lsl #2] */
433 addr = db_fetch_reg(insn & 0xf, db_regs);
434 addr = pc + 8 + (addr << 2);
435 db_read_bytes(addr, 4, (char *)&addr);
436 return (addr);
437 case 0x1: /* mov pc, reg */
438 addr = db_fetch_reg(insn & 0xf, db_regs);
439 return (addr);
440 case 0x8: /* ldmxx reg, {..., pc} */
441 case 0x9:
442 addr = db_fetch_reg((insn >> 16) & 0xf, db_regs);
443 nregs = (insn & 0x5555) + ((insn >> 1) & 0x5555);
444 nregs = (nregs & 0x3333) + ((nregs >> 2) & 0x3333);
445 nregs = (nregs + (nregs >> 4)) & 0x0f0f;
446 nregs = (nregs + (nregs >> 8)) & 0x001f;
447 switch ((insn >> 23) & 0x3) {
448 case 0x0: /* ldmda */
449 addr = addr - 0;
450 break;
451 case 0x1: /* ldmia */
452 addr = addr + 0 + ((nregs - 1) << 2);
453 break;
454 case 0x2: /* ldmdb */
455 addr = addr - 4;
456 break;
457 case 0x3: /* ldmib */
458 addr = addr + 4 + ((nregs - 1) << 2);
459 break;
460 }
461 db_read_bytes(addr, 4, (char *)&addr);
462 return (addr);
463 default:
464 panic("branch_taken: botch");
465 }
466 }
467