1 /* $NetBSD: kgdb_stub.c,v 1.3 1997/03/15 18:12:11 is Exp $ */ 2 3 /* 4 * Copyright (c) 1990, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * This software was developed by the Computer Systems Engineering group 8 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and 9 * contributed to Berkeley. 10 * 11 * All advertising materials mentioning features or use of this software 12 * must display the following acknowledgement: 13 * This product includes software developed by the University of 14 * California, Lawrence Berkeley Laboratories. 15 * 16 * Redistribution and use in source and binary forms, with or without 17 * modification, are permitted provided that the following conditions 18 * are met: 19 * 1. Redistributions of source code must retain the above copyright 20 * notice, this list of conditions and the following disclaimer. 21 * 2. Redistributions in binary form must reproduce the above copyright 22 * notice, this list of conditions and the following disclaimer in the 23 * documentation and/or other materials provided with the distribution. 24 * 3. All advertising materials mentioning features or use of this software 25 * must display the following acknowledgement: 26 * This product includes software developed by the University of 27 * California, Berkeley and its contributors. 28 * 4. Neither the name of the University nor the names of its contributors 29 * may be used to endorse or promote products derived from this software 30 * without specific prior written permission. 31 * 32 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 33 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 34 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 35 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 36 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 37 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 38 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 39 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 40 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 41 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 42 * SUCH DAMAGE. 43 * 44 * @(#)kgdb_stub.c 8.4 (Berkeley) 1/12/94 45 */ 46 47 /* 48 * "Stub" to allow remote cpu to debug over a serial line using gdb. 49 */ 50 51 #include <sys/param.h> 52 #include <sys/systm.h> 53 #include <sys/kgdb.h> 54 55 /* #define DEBUG_KGDB XXX */ 56 57 /* XXX: Maybe these should be in the MD files? */ 58 #ifndef KGDBDEV 59 #define KGDBDEV -1 60 #endif 61 #ifndef KGDBRATE 62 #define KGDBRATE 19200 63 #endif 64 65 int kgdb_dev = KGDBDEV; /* remote debugging device (-1 if none) */ 66 int kgdb_rate = KGDBRATE; /* remote debugging baud rate */ 67 int kgdb_active = 0; /* remote debugging active if != 0 */ 68 int kgdb_debug_init = 0; /* != 0 waits for remote at system init */ 69 int kgdb_debug_panic = 0; /* != 0 waits for remote on panic */ 70 label_t *kgdb_recover = 0; 71 72 static void kgdb_copy __P((void *, void *, int)); 73 /* static void kgdb_zero __P((void *, int)); */ 74 static void kgdb_send __P((u_char *)); 75 static int kgdb_recv __P((u_char *, int)); 76 static int digit2i __P((u_char)); 77 static u_char i2digit __P((int)); 78 static void mem2hex __P((void *, void *, int)); 79 static u_char *hex2mem __P((void *, u_char *, int)); 80 static vm_offset_t hex2i __P((u_char **)); 81 82 static int (*kgdb_getc) __P((void *)); 83 static void (*kgdb_putc) __P((void *, int)); 84 static void *kgdb_ioarg; 85 86 static u_char buffer[KGDB_BUFLEN]; 87 static kgdb_reg_t gdb_regs[KGDB_NUMREGS]; 88 89 #define GETC() ((*kgdb_getc)(kgdb_ioarg)) 90 #define PUTC(c) ((*kgdb_putc)(kgdb_ioarg, c)) 91 92 /* 93 * This little routine exists simply so that bcopy() can be debugged. 94 */ 95 static void 96 kgdb_copy(vsrc, vdst, len) 97 void *vsrc, *vdst; 98 int len; 99 { 100 char *src = vsrc; 101 char *dst = vdst; 102 103 while (--len >= 0) 104 *dst++ = *src++; 105 } 106 107 #if 0 108 /* ditto for bzero */ 109 static void 110 kgdb_zero(vptr, len) 111 void *vptr; 112 int len; 113 { 114 char *ptr = vptr; 115 116 while (--len >= 0) 117 *ptr++ = (char) 0; 118 } 119 #endif 120 121 /* 122 * Convert a hex digit into an integer. 123 * This returns -1 if the argument passed is no 124 * valid hex digit. 125 */ 126 static int 127 digit2i(c) 128 u_char c; 129 { 130 if (c >= '0' && c <= '9') 131 return(c - '0'); 132 else if (c >= 'a' && c <= 'f') 133 return(c - 'a' + 10); 134 else if (c >= 'A' && c <= 'F') 135 136 return(c - 'A' + 10); 137 else 138 return(-1); 139 } 140 141 /* 142 * Convert the low 4 bits of an integer into 143 * an hex digit. 144 */ 145 static u_char 146 i2digit(n) 147 int n; 148 { 149 return("0123456789abcdef"[n & 0x0f]); 150 } 151 152 /* 153 * Convert a byte array into an hex string. 154 */ 155 static void 156 mem2hex(vdst, vsrc, len) 157 void *vdst, *vsrc; 158 int len; 159 { 160 u_char *dst = vdst; 161 u_char *src = vsrc; 162 163 while (len--) { 164 *dst++ = i2digit(*src >> 4); 165 *dst++ = i2digit(*src++); 166 } 167 *dst = '\0'; 168 } 169 170 /* 171 * Convert an hex string into a byte array. 172 * This returns a pointer to the character following 173 * the last valid hex digit. If the string ends in 174 * the middle of a byte, NULL is returned. 175 */ 176 static u_char * 177 hex2mem(vdst, src, maxlen) 178 void *vdst; 179 u_char *src; 180 int maxlen; 181 { 182 u_char *dst = vdst; 183 int msb, lsb; 184 185 while (*src && maxlen--) { 186 msb = digit2i(*src++); 187 if (msb < 0) 188 return(src - 1); 189 lsb = digit2i(*src++); 190 if (lsb < 0) 191 return(NULL); 192 *dst++ = (msb << 4) | lsb; 193 } 194 return(src); 195 } 196 197 /* 198 * Convert an hex string into an integer. 199 * This returns a pointer to the character following 200 * the last valid hex digit. 201 */ 202 static vm_offset_t 203 hex2i(srcp) 204 u_char **srcp; 205 { 206 char *src = *srcp; 207 vm_offset_t r = 0; 208 int nibble; 209 210 while ((nibble = digit2i(*src)) >= 0) { 211 r *= 16; 212 r += nibble; 213 src++; 214 } 215 *srcp = src; 216 return(r); 217 } 218 219 /* 220 * Send a packet. 221 */ 222 static void 223 kgdb_send(bp) 224 u_char *bp; 225 { 226 u_char *p; 227 u_char csum, c; 228 229 #ifdef DEBUG_KGDB 230 printf("kgdb_send: %s\n", bp); 231 #endif 232 do { 233 p = bp; 234 PUTC(KGDB_START); 235 for (csum = 0; (c = *p); p++) { 236 PUTC(c); 237 csum += c; 238 } 239 PUTC(KGDB_END); 240 PUTC(i2digit(csum >> 4)); 241 PUTC(i2digit(csum)); 242 } while ((c = GETC() & 0x7f) == KGDB_BADP); 243 } 244 245 /* 246 * Receive a packet. 247 */ 248 static int 249 kgdb_recv(bp, maxlen) 250 u_char *bp; 251 int maxlen; 252 { 253 u_char *p; 254 int c, csum; 255 int len; 256 257 do { 258 p = bp; 259 csum = len = 0; 260 while ((c = GETC()) != KGDB_START) 261 ; 262 263 while ((c = GETC()) != KGDB_END && len < maxlen) { 264 c &= 0x7f; 265 csum += c; 266 *p++ = c; 267 len++; 268 } 269 csum &= 0xff; 270 *p = '\0'; 271 272 if (len >= maxlen) { 273 PUTC(KGDB_BADP); 274 continue; 275 } 276 277 csum -= digit2i(GETC()) * 16; 278 csum -= digit2i(GETC()); 279 280 if (csum == 0) { 281 PUTC(KGDB_GOODP); 282 /* Sequence present? */ 283 if (bp[2] == ':') { 284 PUTC(bp[0]); 285 PUTC(bp[1]); 286 len -= 3; 287 kgdb_copy(bp + 3, bp, len); 288 } 289 break; 290 } 291 PUTC(KGDB_BADP); 292 } while (1); 293 #ifdef DEBUG_KGDB 294 printf("kgdb_recv: %s\n", bp); 295 #endif 296 return(len); 297 } 298 299 /* 300 * This is called by the approprite tty driver. 301 * In our case, by dev/scn.c:scn_kgdb_init() 302 */ 303 void 304 kgdb_attach(getfn, putfn, ioarg) 305 int (*getfn) __P((void *)); 306 void (*putfn) __P((void *, int)); 307 void *ioarg; 308 { 309 kgdb_getc = getfn; 310 kgdb_putc = putfn; 311 kgdb_ioarg = ioarg; 312 } 313 314 /* 315 * This function does all command procesing for interfacing to 316 * a remote gdb. Note that the error codes are ignored by gdb 317 * at present, but might eventually become meaningful. (XXX) 318 * It might makes sense to use POSIX errno values, because 319 * that is what the gdb/remote.c functions want to return. 320 */ 321 int 322 kgdb_trap(type, regs) 323 int type; 324 db_regs_t *regs; 325 { 326 label_t jmpbuf; 327 vm_offset_t addr; 328 size_t len; 329 u_char *p; 330 331 if (kgdb_dev < 0 || kgdb_getc == NULL) { 332 /* not debugging */ 333 return (0); 334 } 335 336 /* Detect and recover from unexpected traps. */ 337 if (kgdb_recover != 0) { 338 printf("kgdb: caught trap 0x%x at %p\n", 339 type, (void*)PC_REGS(regs)); 340 kgdb_send("E0E"); /* 14==EFAULT */ 341 longjmp(kgdb_recover); 342 } 343 344 /* 345 * The first entry to this function is normally through 346 * a breakpoint trap in kgdb_connect(), in which case we 347 * must advance past the breakpoint because gdb will not. 348 * 349 * Machines vary as to where they leave the PC after a 350 * breakpoint trap. Those that leave the PC set to the 351 * address of the trap instruction (i.e. pc532) will not 352 * define FIXUP_PC_AFTER_BREAK(), and therefore will just 353 * advance the PC. On machines that leave the PC set to 354 * the instruction after the trap, FIXUP_PC_AFTER_BREAK 355 * will be defined to back-up the PC, so that after the 356 * "first-time" part of the if statement below has run, 357 * the PC will be the same as it was on entry. 358 * 359 * On the first entry here, we expect that gdb is not yet 360 * listening to us, so just enter the interaction loop. 361 * After the debugger is "active" (connected) it will be 362 * waiting for a "signaled" message from us. 363 */ 364 if (kgdb_active == 0) { 365 if (!IS_BREAKPOINT_TRAP(type, 0)) { 366 /* No debugger active -- let trap handle this. */ 367 return (0); 368 } 369 /* Make the PC point at the breakpoint... */ 370 #ifdef FIXUP_PC_AFTER_BREAK 371 FIXUP_PC_AFTER_BREAK(regs); 372 #endif 373 /* ... and then advance past it. */ 374 PC_REGS(regs) += BKPT_SIZE; 375 kgdb_active = 1; 376 } else { 377 /* Tell remote host that an exception has occured. */ 378 sprintf(buffer, "S%02x", kgdb_signal(type)); 379 kgdb_send(buffer); 380 } 381 382 /* Stick frame regs into our reg cache. */ 383 kgdb_getregs(regs, gdb_regs); 384 385 /* 386 * Interact with gdb until it lets us go. 387 * If we cause a trap, resume here. 388 */ 389 (void) setjmp((kgdb_recover = &jmpbuf)); 390 for (;;) { 391 kgdb_recv(buffer, sizeof(buffer)); 392 switch (buffer[0]) { 393 394 default: 395 /* Unknown command. */ 396 kgdb_send(""); 397 continue; 398 399 case KGDB_SIGNAL: 400 /* 401 * if this command came from a running gdb, 402 * answer it -- the other guy has no way of 403 * knowing if we're in or out of this loop 404 * when he issues a "remote-signal". 405 */ 406 sprintf(buffer, "S%02x", kgdb_signal(type)); 407 kgdb_send(buffer); 408 continue; 409 410 case KGDB_REG_R: 411 mem2hex(buffer, gdb_regs, sizeof(gdb_regs)); 412 kgdb_send(buffer); 413 continue; 414 415 case KGDB_REG_W: 416 p = hex2mem(gdb_regs, buffer + 1, sizeof(gdb_regs)); 417 if (p == NULL || *p != '\0') 418 kgdb_send("E01"); 419 else { 420 kgdb_setregs(regs, gdb_regs); 421 kgdb_send("OK"); 422 } 423 continue; 424 425 case KGDB_MEM_R: 426 p = buffer + 1; 427 addr = hex2i(&p); 428 if (*p++ != ',') { 429 kgdb_send("E02"); 430 continue; 431 } 432 len = hex2i(&p); 433 if (*p != '\0') { 434 kgdb_send("E03"); 435 continue; 436 } 437 if (len > sizeof(buffer) / 2) { 438 kgdb_send("E04"); 439 continue; 440 } 441 if (kgdb_acc(addr, len) == 0) { 442 kgdb_send("E05"); 443 continue; 444 } 445 db_read_bytes(addr, (size_t)len, 446 (char *)buffer + sizeof(buffer) / 2); 447 mem2hex(buffer, buffer + sizeof(buffer) / 2, len); 448 kgdb_send(buffer); 449 continue; 450 451 case KGDB_MEM_W: 452 p = buffer + 1; 453 addr = hex2i(&p); 454 if (*p++ != ',') { 455 kgdb_send("E06"); 456 continue; 457 } 458 len = hex2i(&p); 459 if (*p++ != ':') { 460 kgdb_send("E07"); 461 continue; 462 } 463 if (len > (sizeof(buffer) - (p - buffer))) { 464 kgdb_send("E08"); 465 continue; 466 } 467 p = hex2mem(buffer, p, sizeof(buffer)); 468 if (p == NULL) { 469 kgdb_send("E09"); 470 continue; 471 } 472 if (kgdb_acc(addr, len) == 0) { 473 kgdb_send("E0A"); 474 continue; 475 } 476 db_write_bytes(addr, (size_t)len, (char *)buffer); 477 kgdb_send("OK"); 478 continue; 479 480 case KGDB_KILL: 481 kgdb_active = 0; 482 printf("kgdb detached\n"); 483 db_clear_single_step(regs); 484 goto out; 485 486 case KGDB_CONT: 487 if (buffer[1]) { 488 p = buffer + 1; 489 addr = hex2i(&p); 490 if (*p) { 491 kgdb_send("E0B"); 492 continue; 493 } 494 PC_REGS(regs) = addr; 495 } 496 db_clear_single_step(regs); 497 goto out; 498 499 case KGDB_STEP: 500 if (buffer[1]) { 501 p = buffer + 1; 502 addr = hex2i(&p); 503 if (*p) { 504 kgdb_send("E0B"); 505 continue; 506 } 507 PC_REGS(regs) = addr; 508 } 509 db_set_single_step(regs); 510 goto out; 511 } 512 } 513 out: 514 kgdb_recover = 0; 515 return (1); 516 } 517