1 /* $NetBSD: db_interface.c,v 1.13 2002/01/05 22:41:47 chris Exp $ */ 2 3 /* 4 * Copyright (c) 1996 Scott K. Stevens 5 * 6 * Mach Operating System 7 * Copyright (c) 1991,1990 Carnegie Mellon University 8 * All Rights Reserved. 9 * 10 * Permission to use, copy, modify and distribute this software and its 11 * documentation is hereby granted, provided that both the copyright 12 * notice and this permission notice appear in all copies of the 13 * software, derivative works or modified versions, and any portions 14 * thereof, and that both notices appear in supporting documentation. 15 * 16 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" 17 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR 18 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. 19 * 20 * Carnegie Mellon requests users of this software to return to 21 * 22 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU 23 * School of Computer Science 24 * Carnegie Mellon University 25 * Pittsburgh PA 15213-3890 26 * 27 * any improvements or extensions that they make and grant Carnegie the 28 * rights to redistribute these changes. 29 * 30 * From: db_interface.c,v 2.4 1991/02/05 17:11:13 mrt (CMU) 31 */ 32 33 /* 34 * Interface to new debugger. 35 */ 36 #include "opt_ddb.h" 37 38 #include <sys/param.h> 39 #include <sys/proc.h> 40 #include <sys/reboot.h> 41 #include <sys/systm.h> /* just for boothowto */ 42 #include <sys/exec.h> 43 44 #include <uvm/uvm_extern.h> 45 46 #include <arm/arm32/db_machdep.h> 47 #include <arm/arm32/katelib.h> 48 #include <arm/undefined.h> 49 #include <ddb/db_access.h> 50 #include <ddb/db_command.h> 51 #include <ddb/db_output.h> 52 #include <ddb/db_variables.h> 53 #include <ddb/db_sym.h> 54 #include <ddb/db_extern.h> 55 #include <ddb/db_interface.h> 56 #include <dev/cons.h> 57 58 static int nil; 59 60 int db_access_und_sp __P((const struct db_variable *, db_expr_t *, int)); 61 int db_access_abt_sp __P((const struct db_variable *, db_expr_t *, int)); 62 int db_access_irq_sp __P((const struct db_variable *, db_expr_t *, int)); 63 u_int db_fetch_reg __P((int, db_regs_t *)); 64 65 static int db_validate_address __P((vm_offset_t)); 66 static void db_write_text __P((unsigned char *, int)); 67 int db_trapper __P((u_int, u_int, trapframe_t *, int)); 68 69 70 const struct db_variable db_regs[] = { 71 { "spsr", (long *)&DDB_REGS->tf_spsr, FCN_NULL, }, 72 { "r0", (long *)&DDB_REGS->tf_r0, FCN_NULL, }, 73 { "r1", (long *)&DDB_REGS->tf_r1, FCN_NULL, }, 74 { "r2", (long *)&DDB_REGS->tf_r2, FCN_NULL, }, 75 { "r3", (long *)&DDB_REGS->tf_r3, FCN_NULL, }, 76 { "r4", (long *)&DDB_REGS->tf_r4, FCN_NULL, }, 77 { "r5", (long *)&DDB_REGS->tf_r5, FCN_NULL, }, 78 { "r6", (long *)&DDB_REGS->tf_r6, FCN_NULL, }, 79 { "r7", (long *)&DDB_REGS->tf_r7, FCN_NULL, }, 80 { "r8", (long *)&DDB_REGS->tf_r8, FCN_NULL, }, 81 { "r9", (long *)&DDB_REGS->tf_r9, FCN_NULL, }, 82 { "r10", (long *)&DDB_REGS->tf_r10, FCN_NULL, }, 83 { "r11", (long *)&DDB_REGS->tf_r11, FCN_NULL, }, 84 { "r12", (long *)&DDB_REGS->tf_r12, FCN_NULL, }, 85 { "usr_sp", (long *)&DDB_REGS->tf_usr_sp, FCN_NULL, }, 86 { "usr_lr", (long *)&DDB_REGS->tf_usr_lr, FCN_NULL, }, 87 { "svc_sp", (long *)&DDB_REGS->tf_svc_sp, FCN_NULL, }, 88 { "svc_lr", (long *)&DDB_REGS->tf_svc_lr, FCN_NULL, }, 89 { "pc", (long *)&DDB_REGS->tf_pc, FCN_NULL, }, 90 { "und_sp", (long *)&nil, db_access_und_sp, }, 91 { "abt_sp", (long *)&nil, db_access_abt_sp, }, 92 { "irq_sp", (long *)&nil, db_access_irq_sp, }, 93 }; 94 95 const struct db_variable * const db_eregs = db_regs + sizeof(db_regs)/sizeof(db_regs[0]); 96 97 extern label_t *db_recover; 98 99 int db_active = 0; 100 101 int db_access_und_sp(vp, valp, rw) 102 const struct db_variable *vp; 103 db_expr_t *valp; 104 int rw; 105 { 106 if (rw == DB_VAR_GET) 107 *valp = get_stackptr(PSR_UND32_MODE); 108 return(0); 109 } 110 111 int db_access_abt_sp(vp, valp, rw) 112 const struct db_variable *vp; 113 db_expr_t *valp; 114 int rw; 115 { 116 if (rw == DB_VAR_GET) 117 *valp = get_stackptr(PSR_ABT32_MODE); 118 return(0); 119 } 120 121 int db_access_irq_sp(vp, valp, rw) 122 const struct db_variable *vp; 123 db_expr_t *valp; 124 int rw; 125 { 126 if (rw == DB_VAR_GET) 127 *valp = get_stackptr(PSR_IRQ32_MODE); 128 return(0); 129 } 130 131 /* 132 * kdb_trap - field a TRACE or BPT trap 133 */ 134 int 135 kdb_trap(type, regs) 136 int type; 137 db_regs_t *regs; 138 { 139 int s; 140 141 switch (type) { 142 case T_BREAKPOINT: /* breakpoint */ 143 case -1: /* keyboard interrupt */ 144 break; 145 default: 146 db_printf("kernel: trap"); 147 if (db_recover != 0) { 148 db_error("Faulted in DDB; continuing...\n"); 149 /*NOTREACHED*/ 150 } 151 } 152 153 /* Should switch to kdb`s own stack here. */ 154 155 ddb_regs = *regs; 156 157 s = splhigh(); 158 db_active++; 159 cnpollc(TRUE); 160 db_trap(type, 0/*code*/); 161 cnpollc(FALSE); 162 db_active--; 163 splx(s); 164 165 *regs = ddb_regs; 166 167 return (1); 168 } 169 170 171 static int 172 db_validate_address(addr) 173 vm_offset_t addr; 174 { 175 pt_entry_t *ptep; 176 pd_entry_t *pdep; 177 struct proc *p = curproc; 178 179 /* 180 * If we have a valid pmap for curproc, use it's page directory 181 * otherwise use the kernel pmap's page directory. 182 */ 183 if (!p || !p->p_vmspace || !p->p_vmspace->vm_map.pmap) 184 pdep = pmap_kernel()->pm_pdir; 185 else 186 pdep = p->p_vmspace->vm_map.pmap->pm_pdir; 187 188 /* Make sure the address we are reading is valid */ 189 switch ((pdep[(addr >> 20) + 0] & L1_MASK)) { 190 case L1_SECTION: 191 break; 192 case L1_PAGE: 193 /* Check the L2 page table for validity */ 194 ptep = vtopte(addr); 195 if ((*ptep & L2_MASK) != L2_INVAL) 196 break; 197 /* FALLTHROUGH */ 198 default: 199 return 1; 200 } 201 202 return 0; 203 } 204 205 /* 206 * Read bytes from kernel address space for debugger. 207 */ 208 void 209 db_read_bytes(addr, size, data) 210 vm_offset_t addr; 211 size_t size; 212 char *data; 213 { 214 char *src; 215 216 src = (char *)addr; 217 while (--size >= 0) { 218 if (db_validate_address((u_int)src)) { 219 db_printf("address %p is invalid\n", src); 220 return; 221 } 222 *data++ = *src++; 223 } 224 } 225 226 static void 227 db_write_text(dst, ch) 228 unsigned char *dst; 229 int ch; 230 { 231 pt_entry_t *ptep, pteo; 232 vm_offset_t va; 233 234 va = (unsigned long)dst & (~PGOFSET); 235 ptep = vtopte(va); 236 237 if (db_validate_address((u_int)dst)) { 238 db_printf(" address %p not a valid page\n", dst); 239 return; 240 } 241 242 pteo = *ptep; 243 *ptep = pteo | PT_AP(AP_KRW); 244 cpu_tlb_flushD_SE(va); 245 246 *dst = (unsigned char)ch; 247 248 /* make sure the caches and memory are in sync */ 249 cpu_cache_syncI_rng((u_int)dst, 4); 250 251 *ptep = pteo; 252 cpu_tlb_flushD_SE(va); 253 } 254 255 /* 256 * Write bytes to kernel address space for debugger. 257 */ 258 void 259 db_write_bytes(addr, size, data) 260 vm_offset_t addr; 261 size_t size; 262 char *data; 263 { 264 extern char etext[]; 265 char *dst; 266 int loop; 267 268 dst = (char *)addr; 269 loop = size; 270 while (--loop >= 0) { 271 if ((dst >= (char *)KERNEL_TEXT_BASE) && (dst < etext)) 272 db_write_text(dst, *data); 273 else { 274 if (db_validate_address((u_int)dst)) { 275 db_printf("address %p is invalid\n", dst); 276 return; 277 } 278 *dst = *data; 279 } 280 dst++, data++; 281 } 282 /* make sure the caches and memory are in sync */ 283 cpu_cache_syncI_rng(addr, size); 284 285 /* In case the current page tables have been modified ... */ 286 cpu_tlb_flushID(); 287 } 288 289 void 290 cpu_Debugger() 291 { 292 asm(".word 0xe7ffffff"); 293 } 294 295 const struct db_command db_machine_command_table[] = { 296 { "frame", db_show_frame_cmd, 0, NULL }, 297 { "panic", db_show_panic_cmd, 0, NULL }, 298 #ifdef ARM32_DB_COMMANDS 299 ARM32_DB_COMMANDS, 300 #endif 301 { NULL, NULL, 0, NULL } 302 }; 303 304 int 305 db_trapper(addr, inst, frame, fault_code) 306 u_int addr; 307 u_int inst; 308 trapframe_t *frame; 309 int fault_code; 310 { 311 if (fault_code == 0) { 312 if ((inst & ~INSN_COND_MASK) == (BKPT_INST & ~INSN_COND_MASK)) 313 kdb_trap(T_BREAKPOINT, frame); 314 else 315 kdb_trap(-1, frame); 316 } else 317 return (1); 318 return (0); 319 } 320 321 extern u_int esym; 322 extern u_int end; 323 324 static struct undefined_handler db_uh; 325 326 void 327 db_machine_init() 328 { 329 #ifndef __ELF__ 330 struct exec *kernexec = (struct exec *)KERNEL_TEXT_BASE; 331 int len; 332 333 /* 334 * The boot loader currently loads the kernel with the a.out 335 * header still attached. 336 */ 337 338 if (kernexec->a_syms == 0) { 339 printf("ddb: No symbol table\n"); 340 } else { 341 /* cover the symbols themselves (what is the int for?? XXX) */ 342 esym = (int)&end + kernexec->a_syms + sizeof(int); 343 344 /* 345 * and the string table. (int containing size of string 346 * table is included in string table size). 347 */ 348 len = *((u_int *)esym); 349 esym += (len + (sizeof(u_int) - 1)) & ~(sizeof(u_int) - 1); 350 } 351 #endif 352 353 /* 354 * We get called before malloc() is available, so supply a static 355 * struct undefined_handler. 356 */ 357 db_uh.uh_handler = db_trapper; 358 install_coproc_handler_static(0, &db_uh); 359 } 360 361 u_int 362 db_fetch_reg(reg, db_regs) 363 int reg; 364 db_regs_t *db_regs; 365 { 366 367 switch (reg) { 368 case 0: 369 return (db_regs->tf_r0); 370 case 1: 371 return (db_regs->tf_r1); 372 case 2: 373 return (db_regs->tf_r2); 374 case 3: 375 return (db_regs->tf_r3); 376 case 4: 377 return (db_regs->tf_r4); 378 case 5: 379 return (db_regs->tf_r5); 380 case 6: 381 return (db_regs->tf_r6); 382 case 7: 383 return (db_regs->tf_r7); 384 case 8: 385 return (db_regs->tf_r8); 386 case 9: 387 return (db_regs->tf_r9); 388 case 10: 389 return (db_regs->tf_r10); 390 case 11: 391 return (db_regs->tf_r11); 392 case 12: 393 return (db_regs->tf_r12); 394 case 13: 395 return (db_regs->tf_svc_sp); 396 case 14: 397 return (db_regs->tf_svc_lr); 398 case 15: 399 return (db_regs->tf_pc); 400 default: 401 panic("db_fetch_reg: botch"); 402 } 403 } 404 405 u_int 406 branch_taken(insn, pc, db_regs) 407 u_int insn; 408 u_int pc; 409 db_regs_t *db_regs; 410 { 411 u_int addr, nregs; 412 413 switch ((insn >> 24) & 0xf) { 414 case 0xa: /* b ... */ 415 case 0xb: /* bl ... */ 416 addr = ((insn << 2) & 0x03ffffff); 417 if (addr & 0x02000000) 418 addr |= 0xfc000000; 419 return (pc + 8 + addr); 420 case 0x7: /* ldr pc, [pc, reg, lsl #2] */ 421 addr = db_fetch_reg(insn & 0xf, db_regs); 422 addr = pc + 8 + (addr << 2); 423 db_read_bytes(addr, 4, (char *)&addr); 424 return (addr); 425 case 0x1: /* mov pc, reg */ 426 addr = db_fetch_reg(insn & 0xf, db_regs); 427 return (addr); 428 case 0x8: /* ldmxx reg, {..., pc} */ 429 case 0x9: 430 addr = db_fetch_reg((insn >> 16) & 0xf, db_regs); 431 nregs = (insn & 0x5555) + ((insn >> 1) & 0x5555); 432 nregs = (nregs & 0x3333) + ((nregs >> 2) & 0x3333); 433 nregs = (nregs + (nregs >> 4)) & 0x0f0f; 434 nregs = (nregs + (nregs >> 8)) & 0x001f; 435 switch ((insn >> 23) & 0x3) { 436 case 0x0: /* ldmda */ 437 addr = addr - 0; 438 break; 439 case 0x1: /* ldmia */ 440 addr = addr + 0 + ((nregs - 1) << 2); 441 break; 442 case 0x2: /* ldmdb */ 443 addr = addr - 4; 444 break; 445 case 0x3: /* ldmib */ 446 addr = addr + 4 + ((nregs - 1) << 2); 447 break; 448 } 449 db_read_bytes(addr, 4, (char *)&addr); 450 return (addr); 451 default: 452 panic("branch_taken: botch"); 453 } 454 } 455