]>
Commit | Line | Data |
---|---|---|
1c79356b | 1 | /* |
593a1d5f | 2 | * Copyright (c) 2000-2008 Apple Inc. All rights reserved. |
1c79356b | 3 | * |
2d21ac55 | 4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ |
1c79356b | 5 | * |
2d21ac55 A |
6 | * This file contains Original Code and/or Modifications of Original Code |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
8f6c56a5 | 14 | * |
2d21ac55 A |
15 | * Please obtain a copy of the License at |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
17 | * | |
18 | * The Original Code and all software distributed under the License are | |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
8f6c56a5 A |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
2d21ac55 A |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
8f6c56a5 | 25 | * |
2d21ac55 | 26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ |
1c79356b A |
27 | */ |
28 | /* | |
29 | * @OSF_COPYRIGHT@ | |
30 | */ | |
31 | /* | |
32 | * @APPLE_FREE_COPYRIGHT@ | |
33 | */ | |
34 | /* | |
35 | * (c) Copyright 1988 HEWLETT-PACKARD COMPANY | |
36 | * | |
37 | * To anyone who acknowledges that this file is provided "AS IS" | |
38 | * without any express or implied warranty: | |
39 | * permission to use, copy, modify, and distribute this file | |
40 | * for any purpose is hereby granted without fee, provided that | |
41 | * the above copyright notice and this notice appears in all | |
42 | * copies, and that the name of Hewlett-Packard Company not be | |
43 | * used in advertising or publicity pertaining to distribution | |
44 | * of the software without specific, written prior permission. | |
45 | * Hewlett-Packard Company makes no representations about the | |
46 | * suitability of this software for any purpose. | |
47 | */ | |
48 | /* | |
49 | * Copyright (c) 1990,1991,1992,1994 The University of Utah and | |
50 | * the Computer Systems Laboratory (CSL). All rights reserved. | |
51 | * | |
52 | * THE UNIVERSITY OF UTAH AND CSL PROVIDE THIS SOFTWARE IN ITS "AS IS" | |
53 | * CONDITION, AND DISCLAIM ANY LIABILITY OF ANY KIND FOR ANY DAMAGES | |
54 | * WHATSOEVER RESULTING FROM ITS USE. | |
55 | * | |
56 | * CSL requests users of this software to return to csl-dist@cs.utah.edu any | |
57 | * improvements that they make and grant CSL redistribution rights. | |
58 | * | |
59 | * Utah $Hdr: model_dep.c 1.34 94/12/14$ | |
60 | */ | |
2d21ac55 A |
61 | /* |
62 | * NOTICE: This file was modified by McAfee Research in 2004 to introduce | |
63 | * support for mandatory and extensible security protections. This notice | |
64 | * is included in support of clause 2.2 (b) of the Apple Public License, | |
65 | * Version 2.0. | |
66 | */ | |
1c79356b A |
67 | |
68 | #include <debug.h> | |
69 | #include <mach_kdb.h> | |
70 | #include <mach_kdp.h> | |
71 | #include <db_machine_commands.h> | |
1c79356b A |
72 | |
73 | #include <kern/thread.h> | |
74 | #include <machine/pmap.h> | |
1c79356b A |
75 | #include <device/device_types.h> |
76 | ||
77 | #include <mach/vm_param.h> | |
78 | #include <mach/clock_types.h> | |
79 | #include <mach/machine.h> | |
80 | #include <mach/kmod.h> | |
81 | #include <ppc/boot.h> | |
82 | ||
83 | #include <kern/misc_protos.h> | |
84 | #include <kern/startup.h> | |
85 | #include <ppc/misc_protos.h> | |
86 | #include <ppc/proc_reg.h> | |
87 | #include <ppc/thread.h> | |
88 | #include <ppc/asm.h> | |
89 | #include <ppc/mem.h> | |
90 | #include <ppc/Firmware.h> | |
91 | #include <ppc/low_trace.h> | |
92 | #include <ppc/mappings.h> | |
93 | #include <ppc/FirmwareCalls.h> | |
91447636 | 94 | #include <ppc/cpu_internal.h> |
1c79356b | 95 | #include <ppc/exception.h> |
55e303ae | 96 | #include <ppc/hw_perfmon.h> |
91447636 | 97 | #include <ppc/lowglobals.h> |
2d21ac55 A |
98 | #include <ppc/machine_cpu.h> |
99 | #include <ppc/db_machdep.h> | |
1c79356b A |
100 | |
101 | #include <kern/clock.h> | |
102 | #include <kern/debug.h> | |
103 | #include <machine/trap.h> | |
104 | #include <kern/spl.h> | |
105 | #include <pexpert/pexpert.h> | |
2d21ac55 A |
106 | #include <kern/sched.h> |
107 | #include <kern/task.h> | |
108 | #include <kern/machine.h> | |
109 | #include <vm/vm_map.h> | |
1c79356b A |
110 | |
111 | #include <IOKit/IOPlatformExpert.h> | |
112 | ||
113 | #include <mach/vm_prot.h> | |
114 | #include <vm/pmap.h> | |
115 | #include <mach/time_value.h> | |
2d21ac55 A |
116 | #include <mach/mach_types.h> |
117 | #include <mach/mach_vm.h> | |
1c79356b A |
118 | #include <machine/machparam.h> /* for btop */ |
119 | ||
120 | #if MACH_KDB | |
121 | #include <ddb/db_aout.h> | |
122 | #include <ddb/db_output.h> | |
123 | #include <ddb/db_command.h> | |
124 | #include <machine/db_machdep.h> | |
125 | ||
126 | extern struct db_command ppc_db_commands[]; | |
127 | #endif /* MACH_KDB */ | |
128 | ||
129 | char kernel_args_buf[256] = "/mach_kernel"; | |
130 | char boot_args_buf[256] = "/mach_servers/bootstrap"; | |
131 | char env_buf[256]; | |
132 | ||
133 | #define TRAP_DEBUGGER __asm__ volatile("tw 4,r3,r3"); | |
134 | #define TRAP_DEBUGGER_INST 0x7c831808 | |
135 | #define TRAP_DIRECT __asm__ volatile("tw 4,r4,r4"); | |
136 | #define TRAP_DIRECT_INST 0x7c842008 | |
137 | #define TRAP_INST_SIZE 4 | |
138 | #define BREAK_TO_KDP0 0x7fe00008 | |
139 | #define BREAK_TO_KDP1 0x7c800008 | |
140 | #define BREAK_TO_KDB0 0x7c810808 | |
141 | ||
142 | /* | |
143 | * Code used to synchronize debuggers among all cpus, one active at a time, switch | |
144 | * from on to another using kdb_on! #cpu or cpu #cpu | |
145 | */ | |
146 | ||
9bccf70c A |
147 | hw_lock_data_t debugger_lock; /* debugger lock */ |
148 | hw_lock_data_t pbtlock; /* backtrace print lock */ | |
1c79356b | 149 | |
2d21ac55 | 150 | unsigned int debugger_cpu = (unsigned)-1; /* current cpu running debugger */ |
1c79356b | 151 | int debugger_debug = 0; /* Debug debugger */ |
1c79356b A |
152 | int db_run_mode; /* Debugger run mode */ |
153 | unsigned int debugger_sync = 0; /* Cross processor debugger entry sync */ | |
154 | extern unsigned int NMIss; /* NMI debounce switch */ | |
155 | ||
0b4e3aa0 A |
156 | extern volatile int panicwait; |
157 | volatile unsigned int pbtcnt = 0; | |
158 | volatile unsigned int pbtcpu = -1; | |
159 | ||
1c79356b A |
160 | unsigned int lastTrace; /* Value of low-level exception trace controls */ |
161 | ||
a3d08fcd | 162 | |
1c79356b A |
163 | volatile unsigned int cpus_holding_bkpts; /* counter for number of cpus holding |
164 | breakpoints (ie: cpus that did not | |
165 | insert back breakpoints) */ | |
166 | void unlock_debugger(void); | |
167 | void lock_debugger(void); | |
2d21ac55 A |
168 | void dump_backtrace(struct savearea *sv, |
169 | unsigned int stackptr, | |
170 | unsigned int fence); | |
171 | void dump_savearea(struct savearea *sv, | |
172 | unsigned int fence); | |
55e303ae | 173 | |
1c79356b A |
174 | #if !MACH_KDB |
175 | boolean_t db_breakpoints_inserted = TRUE; | |
2d21ac55 | 176 | jmp_buf_t *db_recover; |
1c79356b A |
177 | #endif |
178 | ||
179 | #if MACH_KDB | |
180 | #include <ddb/db_run.h> | |
181 | int kdb_flag=0; | |
182 | extern boolean_t db_breakpoints_inserted; | |
183 | extern jmp_buf_t *db_recover; | |
184 | #define KDB_READY 0x1 | |
185 | #endif | |
186 | ||
187 | #if MACH_KDP | |
188 | extern int kdp_flag; | |
189 | #define KDP_READY 0x1 | |
190 | #endif | |
191 | ||
2d21ac55 | 192 | unsigned int db_im_stepping = 0xFFFFFFFF; /* Remember if we were stepping */ |
0b4e3aa0 | 193 | |
0b4e3aa0 | 194 | |
2d21ac55 | 195 | const char *failNames[] = { |
0b4e3aa0 A |
196 | "Debugging trap", /* failDebug */ |
197 | "Corrupt stack", /* failStack */ | |
198 | "Corrupt mapping tables", /* failMapping */ | |
199 | "Corrupt context", /* failContext */ | |
9bccf70c A |
200 | "No saveareas", /* failNoSavearea */ |
201 | "Savearea corruption", /* failSaveareaCorr */ | |
202 | "Invalid live context", /* failBadLiveContext */ | |
91447636 | 203 | "Corrupt skip lists", /* failSkipLists */ |
55e303ae | 204 | "Unaligned stack", /* failUnalignedStk */ |
91447636 | 205 | "Invalid pmap", /* failPmap */ |
b36670ce | 206 | "Lock timeout", /* failTimeout */ |
9bccf70c | 207 | "Unknown failure code" /* Unknown failure code - must always be last */ |
0b4e3aa0 A |
208 | }; |
209 | ||
2d21ac55 | 210 | const char *invxcption = "Unknown code"; |
0b4e3aa0 | 211 | |
2d21ac55 | 212 | static unsigned commit_paniclog_to_nvram; |
1c79356b A |
213 | |
214 | #if !MACH_KDB | |
2d21ac55 A |
215 | void kdb_trap(__unused int type, __unused struct savearea *regs) {} |
216 | #endif /* !MACH_KDB */ | |
1c79356b A |
217 | |
218 | #if !MACH_KDP | |
2d21ac55 A |
219 | void kdp_trap(__unused int type, __unused struct savearea *regs) {} |
220 | #endif /* !MACH_KDP */ | |
221 | ||
222 | extern int default_preemption_rate; | |
223 | extern int max_unsafe_quanta; | |
224 | extern int max_poll_quanta; | |
1c79356b A |
225 | |
226 | void | |
2d21ac55 | 227 | machine_startup(void) |
1c79356b A |
228 | { |
229 | int boot_arg; | |
91447636 | 230 | unsigned int wncpu; |
1c79356b | 231 | |
593a1d5f | 232 | if (PE_parse_boot_argn("cpus", &wncpu, sizeof (wncpu))) { |
91447636 A |
233 | if ((wncpu > 0) && (wncpu < MAX_CPUS)) |
234 | max_ncpus = wncpu; | |
235 | } | |
1c79356b A |
236 | |
237 | if( PE_get_hotkey( kPEControlKey )) | |
238 | halt_in_debugger = halt_in_debugger ? 0 : 1; | |
239 | ||
593a1d5f | 240 | if (PE_parse_boot_argn("debug", &boot_arg, sizeof (boot_arg))) { |
1c79356b | 241 | if (boot_arg & DB_HALT) halt_in_debugger=1; |
2d21ac55 | 242 | if (boot_arg & DB_PRT) disable_debug_output=FALSE; |
1c79356b | 243 | if (boot_arg & DB_SLOG) systemLogDiags=TRUE; |
9bccf70c A |
244 | if (boot_arg & DB_NMI) panicDebugging=TRUE; |
245 | if (boot_arg & DB_LOG_PI_SCRN) logPanicDataToScreen=TRUE; | |
1c79356b | 246 | } |
91447636 | 247 | |
593a1d5f | 248 | if (!PE_parse_boot_argn("nvram_paniclog", &commit_paniclog_to_nvram, sizeof (commit_paniclog_to_nvram))) |
2d21ac55 A |
249 | commit_paniclog_to_nvram = 1; |
250 | ||
593a1d5f | 251 | PE_parse_boot_argn("vmmforce", &lowGlo.lgVMMforcedFeats, sizeof (lowGlo.lgVMMforcedFeats)); |
1c79356b | 252 | |
0b4e3aa0 A |
253 | hw_lock_init(&debugger_lock); /* initialize debugger lock */ |
254 | hw_lock_init(&pbtlock); /* initialize print backtrace lock */ | |
1c79356b A |
255 | |
256 | #if MACH_KDB | |
257 | /* | |
258 | * Initialize KDB | |
259 | */ | |
260 | #if DB_MACHINE_COMMANDS | |
261 | db_machine_commands_install(ppc_db_commands); | |
262 | #endif /* DB_MACHINE_COMMANDS */ | |
263 | ddb_init(); | |
264 | ||
265 | if (boot_arg & DB_KDB) | |
266 | current_debugger = KDB_CUR_DB; | |
267 | ||
268 | /* | |
269 | * Cause a breakpoint trap to the debugger before proceeding | |
270 | * any further if the proper option bit was specified in | |
271 | * the boot flags. | |
272 | */ | |
273 | if (halt_in_debugger && (current_debugger == KDB_CUR_DB)) { | |
274 | Debugger("inline call to debugger(machine_startup)"); | |
275 | halt_in_debugger = 0; | |
276 | active_debugger =1; | |
277 | } | |
278 | #endif /* MACH_KDB */ | |
593a1d5f | 279 | if (PE_parse_boot_argn("preempt", &boot_arg, sizeof (boot_arg))) { |
1c79356b A |
280 | default_preemption_rate = boot_arg; |
281 | } | |
593a1d5f | 282 | if (PE_parse_boot_argn("unsafe", &boot_arg, sizeof (boot_arg))) { |
0b4e3aa0 A |
283 | max_unsafe_quanta = boot_arg; |
284 | } | |
593a1d5f | 285 | if (PE_parse_boot_argn("poll", &boot_arg, sizeof (boot_arg))) { |
0b4e3aa0 A |
286 | max_poll_quanta = boot_arg; |
287 | } | |
593a1d5f | 288 | if (PE_parse_boot_argn("yield", &boot_arg, sizeof (boot_arg))) { |
0b4e3aa0 A |
289 | sched_poll_yield_shift = boot_arg; |
290 | } | |
1c79356b A |
291 | |
292 | machine_conf(); | |
293 | ||
1c79356b | 294 | /* |
91447636 | 295 | * Kick off the kernel bootstrap. |
1c79356b | 296 | */ |
91447636 A |
297 | kernel_bootstrap(); |
298 | /*NOTREACHED*/ | |
1c79356b A |
299 | } |
300 | ||
301 | char * | |
2d21ac55 | 302 | machine_boot_info(__unused char *buf, __unused vm_size_t size) |
1c79356b A |
303 | { |
304 | return(PE_boot_args()); | |
305 | } | |
306 | ||
307 | void | |
308 | machine_conf(void) | |
309 | { | |
55e303ae | 310 | machine_info.memory_size = mem_size; /* Note that this will be 2 GB for >= 2 GB machines */ |
1c79356b A |
311 | } |
312 | ||
313 | void | |
314 | machine_init(void) | |
315 | { | |
2d21ac55 | 316 | debug_log_init(); |
1c79356b | 317 | clock_config(); |
3a60a9f5 A |
318 | /* Note that we must initialize the stepper tables AFTER the clock is configured!!!!! */ |
319 | if(pmsExperimental & 1) pmsCPUConf(); /* (EXPERIMENTAL) Initialize the stepper tables */ | |
55e303ae | 320 | perfmon_init(); |
3a60a9f5 A |
321 | return; |
322 | ||
1c79356b A |
323 | } |
324 | ||
593a1d5f A |
325 | void |
326 | slave_machine_init(__unused void *param) | |
1c79356b | 327 | { |
1c79356b | 328 | cpu_machine_init(); /* Initialize the processor */ |
91447636 | 329 | clock_init(); /* Init the clock */ |
1c79356b A |
330 | } |
331 | ||
332 | void | |
333 | halt_all_cpus(boolean_t reboot) | |
334 | { | |
335 | if(reboot) | |
336 | { | |
337 | printf("MACH Reboot\n"); | |
338 | PEHaltRestart(kPERestartCPU); | |
339 | } | |
340 | else | |
341 | { | |
342 | printf("CPU halted\n"); | |
343 | PEHaltRestart(kPEHaltCPU); | |
344 | } | |
345 | while(1); | |
346 | } | |
347 | ||
348 | void | |
349 | halt_cpu(void) | |
350 | { | |
351 | halt_all_cpus(FALSE); | |
352 | } | |
353 | ||
354 | #if MACH_ASSERT | |
355 | /* | |
356 | * Machine-dependent routine to fill in an array with up to callstack_max | |
357 | * levels of return pc information. | |
358 | */ | |
2d21ac55 A |
359 | void |
360 | machine_callstack(__unused natural_t *buf, __unused vm_size_t callstack_max) | |
1c79356b A |
361 | { |
362 | } | |
363 | #endif /* MACH_ASSERT */ | |
364 | ||
1c79356b | 365 | void |
9bccf70c | 366 | print_backtrace(struct savearea *ssp) |
1c79356b | 367 | { |
2d21ac55 A |
368 | unsigned int stackptr, fence; |
369 | struct savearea *sv, *svssp, *psv; | |
370 | unsigned int cpu; | |
0b4e3aa0 A |
371 | |
372 | /* | |
373 | * We need this lock to make sure we don't hang up when we double panic on an MP. | |
374 | */ | |
375 | ||
376 | cpu = cpu_number(); /* Just who are we anyways? */ | |
377 | if(pbtcpu != cpu) { /* Allow recursion */ | |
2d21ac55 | 378 | (void)hw_atomic_add(&pbtcnt, 1); /* Remember we are trying */ |
0b4e3aa0 A |
379 | while(!hw_lock_try(&pbtlock)); /* Spin here until we can get in. If we never do, well, we're crashing anyhow... */ |
380 | pbtcpu = cpu; /* Mark it as us */ | |
381 | } | |
1c79356b | 382 | |
2d21ac55 A |
383 | svssp = (struct savearea *)ssp; /* Make this easier */ |
384 | sv = NULL; | |
385 | if(current_thread()) | |
386 | sv = (struct savearea *)current_thread()->machine.pcb; /* Find most current savearea if system has started */ | |
0b4e3aa0 A |
387 | |
388 | fence = 0xFFFFFFFF; /* Show we go all the way */ | |
55e303ae | 389 | if(sv) fence = (unsigned int)sv->save_r1; /* Stop at previous exception point */ |
0b4e3aa0 A |
390 | |
391 | if(!svssp) { /* Should we start from stack? */ | |
9bccf70c | 392 | kdb_printf("Latest stack backtrace for cpu %d:\n", cpu_number()); |
0b4e3aa0 | 393 | __asm__ volatile("mr %0,r1" : "=r" (stackptr)); /* Get current stack */ |
2d21ac55 | 394 | dump_backtrace((struct savearea *)0,stackptr, fence); /* Dump the backtrace */ |
0b4e3aa0 | 395 | if(!sv) { /* Leave if no saveareas */ |
0b4e3aa0 | 396 | hw_lock_unlock(&pbtlock); /* Allow another back trace to happen */ |
2d21ac55 | 397 | goto pbt_exit; |
0b4e3aa0 A |
398 | } |
399 | } | |
400 | else { /* Were we passed an exception? */ | |
401 | fence = 0xFFFFFFFF; /* Show we go all the way */ | |
9bccf70c | 402 | if(svssp->save_hdr.save_prev) { |
55e303ae | 403 | if((svssp->save_hdr.save_prev <= vm_last_addr) && ((unsigned int)pmap_find_phys(kernel_pmap, (addr64_t)svssp->save_hdr.save_prev))) { /* Valid address? */ |
2d21ac55 | 404 | psv = (struct savearea *)((unsigned int)svssp->save_hdr.save_prev); /* Get the 64-bit back chain converted to a regualr pointer */ |
55e303ae | 405 | fence = (unsigned int)psv->save_r1; /* Stop at previous exception point */ |
9bccf70c A |
406 | } |
407 | } | |
0b4e3aa0 | 408 | |
9bccf70c | 409 | kdb_printf("Latest crash info for cpu %d:\n", cpu_number()); |
2d21ac55 | 410 | kdb_printf(" Exception state (sv=%p)\n", svssp); |
0b4e3aa0 A |
411 | dump_savearea(svssp, fence); /* Dump this savearea */ |
412 | } | |
413 | ||
414 | if(!sv) { /* Leave if no saveareas */ | |
0b4e3aa0 | 415 | hw_lock_unlock(&pbtlock); /* Allow another back trace to happen */ |
2d21ac55 | 416 | goto pbt_exit; |
0b4e3aa0 A |
417 | } |
418 | ||
9bccf70c | 419 | kdb_printf("Proceeding back via exception chain:\n"); |
0b4e3aa0 A |
420 | |
421 | while(sv) { /* Do them all... */ | |
55e303ae A |
422 | if(!(((addr64_t)((uintptr_t)sv) <= vm_last_addr) && |
423 | (unsigned int)pmap_find_phys(kernel_pmap, (addr64_t)((uintptr_t)sv)))) { /* Valid address? */ | |
2d21ac55 | 424 | kdb_printf(" Exception state (sv=%p) Not mapped or invalid. stopping...\n", sv); |
9bccf70c A |
425 | break; |
426 | } | |
427 | ||
2d21ac55 | 428 | kdb_printf(" Exception state (sv=%p)\n", sv); |
0b4e3aa0 | 429 | if(sv == svssp) { /* Did we dump it already? */ |
9bccf70c | 430 | kdb_printf(" previously dumped as \"Latest\" state. skipping...\n"); |
0b4e3aa0 A |
431 | } |
432 | else { | |
433 | fence = 0xFFFFFFFF; /* Show we go all the way */ | |
9bccf70c | 434 | if(sv->save_hdr.save_prev) { |
55e303ae | 435 | if((sv->save_hdr.save_prev <= vm_last_addr) && ((unsigned int)pmap_find_phys(kernel_pmap, (addr64_t)sv->save_hdr.save_prev))) { /* Valid address? */ |
2d21ac55 | 436 | psv = (struct savearea *)((unsigned int)sv->save_hdr.save_prev); /* Get the 64-bit back chain converted to a regualr pointer */ |
55e303ae | 437 | fence = (unsigned int)psv->save_r1; /* Stop at previous exception point */ |
9bccf70c A |
438 | } |
439 | } | |
0b4e3aa0 A |
440 | dump_savearea(sv, fence); /* Dump this savearea */ |
441 | } | |
442 | ||
2d21ac55 | 443 | sv = CAST_DOWN(struct savearea *, sv->save_hdr.save_prev); /* Back chain */ |
0b4e3aa0 A |
444 | } |
445 | ||
0b4e3aa0 A |
446 | |
447 | pbtcpu = -1; /* Mark as unowned */ | |
448 | hw_lock_unlock(&pbtlock); /* Allow another back trace to happen */ | |
2d21ac55 | 449 | (void)hw_atomic_sub(&pbtcnt, 1); /* Show we are done */ |
0b4e3aa0 A |
450 | |
451 | while(pbtcnt); /* Wait for completion */ | |
2d21ac55 A |
452 | pbt_exit: |
453 | panic_display_system_configuration(); | |
c910b4d9 A |
454 | panic_display_zprint(); |
455 | dump_kext_info(&kdb_log); | |
0b4e3aa0 A |
456 | return; |
457 | } | |
458 | ||
2d21ac55 A |
459 | void |
460 | dump_savearea(struct savearea *sv, unsigned int fence) | |
461 | { | |
462 | const char *xcode; | |
0b4e3aa0 | 463 | |
2d21ac55 A |
464 | if(sv->save_exception > T_MAX) |
465 | xcode = invxcption; /* Too big for table */ | |
466 | else | |
467 | xcode = trap_type[sv->save_exception / 4]; /* Point to the type */ | |
0b4e3aa0 | 468 | |
9bccf70c | 469 | kdb_printf(" PC=0x%08X; MSR=0x%08X; DAR=0x%08X; DSISR=0x%08X; LR=0x%08X; R1=0x%08X; XCP=0x%08X (%s)\n", |
55e303ae A |
470 | (unsigned int)sv->save_srr0, (unsigned int)sv->save_srr1, (unsigned int)sv->save_dar, sv->save_dsisr, |
471 | (unsigned int)sv->save_lr, (unsigned int)sv->save_r1, sv->save_exception, xcode); | |
0b4e3aa0 A |
472 | |
473 | if(!(sv->save_srr1 & MASK(MSR_PR))) { /* Are we in the kernel? */ | |
91447636 | 474 | dump_backtrace(sv, (unsigned int)sv->save_r1, fence); /* Dump the stack back trace from here if not user state */ |
1c79356b | 475 | } |
0b4e3aa0 A |
476 | |
477 | return; | |
478 | } | |
479 | ||
91447636 | 480 | #define DUMPFRAMES 34 |
0b4e3aa0 | 481 | #define LRindex 2 |
1c79356b | 482 | |
2d21ac55 | 483 | void dump_backtrace(struct savearea *sv, unsigned int stackptr, unsigned int fence) { |
1c79356b | 484 | |
0b4e3aa0 A |
485 | unsigned int bframes[DUMPFRAMES]; |
486 | unsigned int sframe[8], raddr, dumbo; | |
91447636 | 487 | int i, index=0; |
2d21ac55 | 488 | // char syminfo[80]; |
0b4e3aa0 | 489 | |
9bccf70c | 490 | kdb_printf(" Backtrace:\n"); |
2d21ac55 | 491 | if (sv != (struct savearea *)0) { |
91447636 A |
492 | bframes[0] = (unsigned int)sv->save_srr0; |
493 | bframes[1] = (unsigned int)sv->save_lr; | |
494 | index = 2; | |
495 | } | |
496 | for(i = index; i < DUMPFRAMES; i++) { /* Dump up to max frames */ | |
0b4e3aa0 A |
497 | |
498 | if(!stackptr || (stackptr == fence)) break; /* Hit stop point or end... */ | |
499 | ||
55e303ae | 500 | if(stackptr & 0x0000000F) { /* Is stack pointer valid? */ |
9bccf70c | 501 | kdb_printf("\n backtrace terminated - unaligned frame address: 0x%08X\n", stackptr); /* No, tell 'em */ |
0b4e3aa0 A |
502 | break; |
503 | } | |
504 | ||
55e303ae A |
505 | raddr = (unsigned int)pmap_find_phys(kernel_pmap, (addr64_t)stackptr); /* Get physical frame address */ |
506 | if(!raddr || (stackptr > vm_last_addr)) { /* Is it mapped? */ | |
9bccf70c | 507 | kdb_printf("\n backtrace terminated - frame not mapped or invalid: 0x%08X\n", stackptr); /* No, tell 'em */ |
1c79356b | 508 | break; |
1c79356b | 509 | } |
0b4e3aa0 | 510 | |
55e303ae | 511 | if(!mapping_phys_lookup(raddr, &dumbo)) { /* Is it within physical RAM? */ |
9bccf70c | 512 | kdb_printf("\n backtrace terminated - frame outside of RAM: v=0x%08X, p=%08X\n", stackptr, raddr); /* No, tell 'em */ |
1c79356b | 513 | break; |
0b4e3aa0 A |
514 | } |
515 | ||
55e303ae | 516 | ReadReal((addr64_t)((raddr << 12) | (stackptr & 4095)), &sframe[0]); /* Fetch the stack frame */ |
0b4e3aa0 | 517 | |
9bccf70c | 518 | bframes[i] = sframe[LRindex]; /* Save the link register */ |
0b4e3aa0 | 519 | |
2d21ac55 A |
520 | // syms_formataddr((vm_offset_t)bframes[i], syminfo, sizeof (syminfo)); |
521 | // kdb_printf(" %s\n", syminfo); | |
9bccf70c A |
522 | if(!i) kdb_printf(" "); /* Indent first time */ |
523 | else if(!(i & 7)) kdb_printf("\n "); /* Skip to new line every 8 */ | |
524 | kdb_printf("0x%08X ", bframes[i]); /* Dump the link register */ | |
0b4e3aa0 | 525 | |
9bccf70c | 526 | stackptr = sframe[0]; /* Chain back */ |
1c79356b | 527 | } |
9bccf70c A |
528 | kdb_printf("\n"); |
529 | if(i >= DUMPFRAMES) kdb_printf(" backtrace continues...\n"); /* Say we terminated early */ | |
0b4e3aa0 A |
530 | if(i) kmod_dump((vm_offset_t *)&bframes[0], i); /* Show what kmods are in trace */ |
531 | ||
1c79356b | 532 | } |
0b4e3aa0 | 533 | |
2d21ac55 A |
534 | void commit_paniclog(void) { |
535 | unsigned long pi_size = 0; | |
0b4e3aa0 | 536 | |
2d21ac55 A |
537 | if (debug_buf_size > 0) { |
538 | if (commit_paniclog_to_nvram) { | |
539 | unsigned int bufpos; | |
540 | ||
541 | /* XXX Consider using the WKdm compressor in the | |
542 | * future, rather than just packing - would need to | |
543 | * be co-ordinated with crashreporter, which decodes | |
544 | * this post-restart. The compressor should be | |
545 | * capable of in-place compression. | |
546 | */ | |
547 | bufpos = packA(debug_buf, (unsigned) (debug_buf_ptr - debug_buf), debug_buf_size); | |
548 | /* If compression was successful, | |
549 | * use the compressed length | |
550 | */ | |
551 | pi_size = bufpos ? bufpos : (unsigned) (debug_buf_ptr - debug_buf); | |
552 | ||
553 | /* Truncate if the buffer is larger than a | |
554 | * certain magic size - this really ought to | |
555 | * be some appropriate fraction of the NVRAM | |
556 | * image buffer, and is best done in the | |
557 | * savePanicInfo() or PESavePanicInfo() calls | |
558 | * This call must save data synchronously, | |
559 | * since we can subsequently halt the system. | |
560 | */ | |
561 | kprintf("Attempting to commit panic log to NVRAM\n"); | |
562 | /* N.B.: This routine (currently an IOKit wrapper that | |
563 | * calls through to the appropriate platform NVRAM | |
564 | * driver, must be panic context safe, i.e. | |
565 | * acquire no locks or require kernel services. | |
566 | * This does not appear to be the case currently | |
567 | * on some platforms, unfortunately (the driver | |
568 | * on command gate serialization). | |
569 | */ | |
570 | pi_size = PESavePanicInfo((unsigned char *)debug_buf, | |
571 | ((pi_size > 2040) ? 2040 : pi_size)); | |
572 | /* Uncompress in-place, to allow debuggers to examine | |
573 | * the panic log. | |
574 | */ | |
575 | if (bufpos) | |
576 | unpackA(debug_buf, bufpos); | |
577 | } | |
578 | } | |
579 | } | |
1c79356b A |
580 | |
581 | void | |
582 | Debugger(const char *message) { | |
583 | ||
1c79356b A |
584 | spl_t spl; |
585 | ||
586 | spl = splhigh(); /* No interruptions from here on */ | |
0b4e3aa0 | 587 | |
1c79356b A |
588 | /* |
589 | * backtrace for Debugger() call from panic() if no current debugger | |
590 | * backtrace and return for double panic() call | |
591 | */ | |
592 | if ((panicstr != (char *)0) && | |
593 | (((nestedpanic != 0) && (current_debugger == 1)) || (active_debugger == 0))) { | |
594 | print_backtrace(NULL); | |
595 | if (nestedpanic != 0) { | |
596 | splx(spl); | |
0b4e3aa0 | 597 | return; /* Yeah, don't enter again... */ |
1c79356b A |
598 | } |
599 | } | |
0b4e3aa0 | 600 | |
91447636 | 601 | if (debug_mode && getPerProc()->debugger_active) { /* Are we already on debugger on this processor? */ |
1c79356b A |
602 | splx(spl); |
603 | return; /* Yeah, don't do it again... */ | |
604 | } | |
605 | ||
9bccf70c A |
606 | |
607 | /* | |
608 | * The above stuff catches the double panic case so we shouldn't have to worry about that here. | |
609 | */ | |
610 | if ( panicstr != (char *)0 ) | |
611 | { | |
9bccf70c | 612 | disable_preemption(); |
2d21ac55 A |
613 | /* Commit the panic log buffer to NVRAM, unless otherwise |
614 | * specified via a boot-arg. | |
615 | */ | |
616 | commit_paniclog(); | |
617 | if(!panicDebugging) { | |
618 | unsigned int my_cpu, tcpu; | |
9bccf70c A |
619 | |
620 | my_cpu = cpu_number(); | |
621 | debugger_cpu = my_cpu; | |
622 | ||
2d21ac55 | 623 | (void)hw_atomic_add(&debug_mode, 1); |
91447636 | 624 | PerProcTable[my_cpu].ppe_vaddr->debugger_active++; |
9bccf70c A |
625 | lock_debugger(); |
626 | ||
91447636 | 627 | for(tcpu = 0; tcpu < real_ncpus; tcpu++) { |
9bccf70c | 628 | if(tcpu == my_cpu) continue; |
2d21ac55 | 629 | (void)hw_atomic_add(&debugger_sync, 1); |
9bccf70c A |
630 | (void)cpu_signal(tcpu, SIGPdebug, 0 ,0); |
631 | } | |
632 | (void)hw_cpu_sync(&debugger_sync, LockTimeOut); | |
633 | debugger_sync = 0; | |
634 | } | |
635 | ||
636 | draw_panic_dialog(); | |
637 | ||
2d21ac55 A |
638 | if(!panicDebugging) { |
639 | #if CONFIG_EMBEDDED | |
640 | PEHaltRestart(kPEPanicRestartCPU); | |
641 | #else | |
9bccf70c | 642 | PEHaltRestart( kPEHangCPU ); |
2d21ac55 A |
643 | #endif |
644 | } | |
9bccf70c A |
645 | |
646 | enable_preemption(); | |
647 | } | |
648 | ||
1c79356b A |
649 | if ((current_debugger != NO_CUR_DB)) { /* If there is a debugger configured, enter it */ |
650 | printf("Debugger(%s)\n", message); | |
651 | TRAP_DEBUGGER; | |
652 | splx(spl); | |
653 | return; /* Done debugging for a while */ | |
654 | } | |
655 | ||
656 | printf("\nNo debugger configured - dumping debug information\n"); | |
1c79356b A |
657 | printf("MSR=%08X\n",mfmsr()); |
658 | print_backtrace(NULL); | |
659 | splx(spl); | |
660 | return; | |
661 | } | |
662 | ||
0b4e3aa0 A |
663 | /* |
664 | * Here's where we attempt to get some diagnostic information dumped out | |
665 | * when the system is really confused. We will try to get into the | |
666 | * debugger as well. | |
667 | * | |
668 | * We are here with interrupts disabled and on the debug stack. The savearea | |
669 | * that was passed in is NOT chained to the activation. | |
670 | * | |
671 | * save_r3 contains the failure reason code. | |
672 | */ | |
673 | ||
2d21ac55 A |
674 | void |
675 | SysChoked(unsigned int type, struct savearea *sv) | |
676 | { | |
0b4e3aa0 | 677 | unsigned int failcode; |
2d21ac55 | 678 | const char * const pmsg = "System Failure: cpu=%d; code=%08X (%s)\n"; |
0b4e3aa0 | 679 | mp_disable_preemption(); |
2d21ac55 | 680 | disable_debug_output = FALSE; |
0b4e3aa0 A |
681 | debug_mode = TRUE; |
682 | ||
55e303ae | 683 | failcode = (unsigned int)sv->save_r3; /* Get the failure code */ |
0b4e3aa0 A |
684 | if(failcode > failUnknown) failcode = failUnknown; /* Set unknown code code */ |
685 | ||
2d21ac55 A |
686 | kprintf(pmsg, cpu_number(), (unsigned int)sv->save_r3, failNames[failcode]); |
687 | kdb_printf(pmsg, cpu_number(), (unsigned int)sv->save_r3, failNames[failcode]); | |
0b4e3aa0 | 688 | |
9bccf70c | 689 | print_backtrace(sv); /* Attempt to print backtrace */ |
0b4e3aa0 | 690 | |
2d21ac55 A |
691 | /* Commit the panic log buffer to NVRAM, unless otherwise |
692 | * specified via a boot-arg. For certain types of panics | |
693 | * which result in a "choke" exception, this may well | |
694 | * be inadvisable, and setting the nvram_paniclog=0 | |
695 | * boot-arg may be useful. | |
696 | */ | |
697 | ||
698 | if (panicDebugging) | |
699 | commit_paniclog(); | |
700 | ||
701 | Call_DebuggerC(type, sv); /* Attempt to get into debugger */ | |
0b4e3aa0 | 702 | |
2d21ac55 A |
703 | if ((current_debugger != NO_CUR_DB)) |
704 | Call_DebuggerC(type, sv); /* Attempt to get into debugger */ | |
705 | panic_plain(pmsg, cpu_number(), (unsigned int)sv->save_r3, failNames[failcode]); | |
0b4e3aa0 A |
706 | } |
707 | ||
708 | ||
709 | ||
1c79356b A |
710 | /* |
711 | * When we get here, interruptions are disabled and we are on the debugger stack | |
712 | * Never, ever, ever, ever enable interruptions from here on | |
713 | */ | |
714 | ||
2d21ac55 A |
715 | int |
716 | Call_DebuggerC(unsigned int type, struct savearea *saved_state) | |
1c79356b A |
717 | { |
718 | int directcall, wait; | |
2d21ac55 | 719 | addr64_t instr_ptr = 0ULL; |
55e303ae | 720 | ppnum_t instr_pp; |
2d21ac55 A |
721 | unsigned int instr, tcpu, my_cpu; |
722 | int wasdebugger; | |
1c79356b A |
723 | |
724 | my_cpu = cpu_number(); /* Get our CPU */ | |
725 | ||
726 | #if MACH_KDB | |
727 | if((debugger_cpu == my_cpu) && /* Do we already own debugger? */ | |
91447636 | 728 | PerProcTable[my_cpu].ppe_vaddr->debugger_active && /* and are we really active? */ |
1c79356b A |
729 | db_recover && /* and have we set up recovery? */ |
730 | (current_debugger == KDB_CUR_DB)) { /* and are we in KDB (only it handles recovery) */ | |
731 | kdb_trap(type, saved_state); /* Then reenter it... */ | |
732 | } | |
733 | #endif | |
734 | ||
2d21ac55 | 735 | (void)hw_atomic_add(&debug_mode, 1); /* Indicate we are in debugger */ |
91447636 A |
736 | PerProcTable[my_cpu].ppe_vaddr->debugger_active++; /* Show active on our CPU */ |
737 | ||
1c79356b A |
738 | lock_debugger(); /* Insure that only one CPU is in debugger */ |
739 | ||
740 | if(db_im_stepping == my_cpu) { /* Are we just back from a step? */ | |
741 | enable_preemption_no_check(); /* Enable preemption now */ | |
742 | db_im_stepping = 0xFFFFFFFF; /* Nobody stepping right now */ | |
743 | } | |
744 | ||
745 | if (debugger_debug) { | |
746 | #if 0 | |
2d21ac55 | 747 | kprintf("Call_DebuggerC(%d): %08X %08X, debact = %d\n", my_cpu, type, (uint32_t)saved_state, debug_mode); /* (TEST/DEBUG) */ |
1c79356b | 748 | #endif |
2d21ac55 | 749 | printf("Call_Debugger: enter - cpu %d, is_slave %d, debugger_cpu %d, pc %08llX\n", |
91447636 | 750 | my_cpu, PerProcTable[my_cpu].ppe_vaddr->debugger_is_slave, debugger_cpu, saved_state->save_srr0); |
1c79356b A |
751 | } |
752 | ||
55e303ae A |
753 | instr_pp = (vm_offset_t)pmap_find_phys(kernel_pmap, (addr64_t)(saved_state->save_srr0)); |
754 | ||
755 | if (instr_pp) { | |
756 | instr_ptr = (addr64_t)(((addr64_t)instr_pp << 12) | (saved_state->save_srr0 & 0xFFF)); /* Make physical address */ | |
757 | instr = ml_phys_read_64(instr_ptr); /* Get the trap that caused entry */ | |
1c79356b A |
758 | } |
759 | else instr = 0; | |
760 | ||
761 | #if 0 | |
55e303ae | 762 | if (debugger_debug) kprintf("Call_DebuggerC(%d): instr_pp = %08X, instr_ptr = %016llX, instr = %08X\n", my_cpu, instr_pp, instr_ptr, instr); /* (TEST/DEBUG) */ |
1c79356b A |
763 | #endif |
764 | ||
765 | if (db_breakpoints_inserted) cpus_holding_bkpts++; /* Bump up the holding count */ | |
2d21ac55 A |
766 | if ((debugger_cpu == (unsigned)-1) && |
767 | !PerProcTable[my_cpu].ppe_vaddr->debugger_is_slave) { | |
1c79356b A |
768 | #if 0 |
769 | if (debugger_debug) kprintf("Call_DebuggerC(%d): lasttrace = %08X\n", my_cpu, lastTrace); /* (TEST/DEBUG) */ | |
770 | #endif | |
771 | debugger_cpu = my_cpu; /* Show that we are debugger */ | |
a3d08fcd A |
772 | |
773 | ||
1c79356b A |
774 | lastTrace = LLTraceSet(0); /* Disable low-level tracing */ |
775 | ||
91447636 | 776 | for(tcpu = 0; tcpu < real_ncpus; tcpu++) { /* Stop all the other guys */ |
1c79356b | 777 | if(tcpu == my_cpu) continue; /* Don't diddle ourselves */ |
2d21ac55 | 778 | (void)hw_atomic_add(&debugger_sync, 1); /* Count signal sent */ |
1c79356b A |
779 | (void)cpu_signal(tcpu, SIGPdebug, 0 ,0); /* Tell 'em to enter debugger */ |
780 | } | |
781 | (void)hw_cpu_sync(&debugger_sync, LockTimeOut); /* Wait for the other processors to enter debug */ | |
782 | debugger_sync = 0; /* We're done with it */ | |
783 | } | |
784 | else if (debugger_cpu != my_cpu) goto debugger_exit; /* We are not debugger, don't continue... */ | |
785 | ||
786 | ||
787 | if (instr == TRAP_DIRECT_INST) { | |
2d21ac55 | 788 | disable_debug_output = FALSE; |
1c79356b A |
789 | print_backtrace(saved_state); |
790 | } | |
791 | ||
792 | switch_debugger = 0; /* Make sure switch request is off */ | |
793 | directcall = 1; /* Assume direct call */ | |
794 | ||
9bccf70c | 795 | if (saved_state->save_srr1 & MASK(SRR1_PRG_TRAP)) { /* Trap instruction? */ |
1c79356b A |
796 | |
797 | directcall = 0; /* We had a trap not a direct call */ | |
798 | ||
799 | switch (instr) { /* Select trap type */ | |
800 | ||
801 | #if MACH_KDP | |
802 | case BREAK_TO_KDP0: /* Breakpoint into KDP? */ | |
803 | case BREAK_TO_KDP1: /* Breakpoint into KDP? */ | |
804 | current_debugger = KDP_CUR_DB; /* Yes, set KDP */ | |
805 | kdp_trap(type, saved_state); /* Enter it */ | |
806 | break; | |
807 | #endif | |
808 | ||
809 | #if MACH_KDB | |
810 | case BREAK_TO_KDB0: /* Breakpoint to KDB (the "good" debugger)? */ | |
811 | current_debugger = KDB_CUR_DB; /* Yes, set it */ | |
812 | kdb_trap(type, saved_state); /* Enter it */ | |
813 | break; | |
814 | #endif | |
815 | ||
816 | case TRAP_DEBUGGER_INST: /* Should we enter the current debugger? */ | |
817 | case TRAP_DIRECT_INST: /* Should we enter the current debugger? */ | |
818 | if (current_debugger == KDP_CUR_DB) /* Is current KDP? */ | |
819 | kdp_trap(type, saved_state); /* Yes, enter it */ | |
820 | else if (current_debugger == KDB_CUR_DB) /* Is this KDB? */ | |
821 | kdb_trap(type, saved_state); /* Yes, go ahead and enter */ | |
822 | else goto debugger_error; /* No debugger active */ | |
823 | break; | |
824 | ||
825 | default: /* Unknown/bogus trap type */ | |
826 | goto debugger_error; | |
827 | } | |
828 | } | |
829 | ||
830 | while(1) { /* We are here to handle debugger switches */ | |
831 | ||
832 | if(!directcall) { /* Was this a direct call? */ | |
833 | if(!switch_debugger) break; /* No, then leave if no switch requested... */ | |
834 | ||
835 | /* | |
836 | * Note: we can only switch to a debugger we have. Ignore bogus switch requests. | |
837 | */ | |
838 | #if 0 | |
839 | if (debugger_debug) kprintf("Call_DebuggerC(%d): switching debuggers\n", my_cpu); /* (TEST/DEBUG) */ | |
840 | #endif | |
841 | #if MACH_KDB | |
842 | if(current_debugger == KDP_CUR_DB) current_debugger = KDB_CUR_DB; /* Switch to KDB */ | |
843 | #if MACH_KDP | |
844 | else | |
845 | #endif | |
846 | #endif | |
847 | #if MACH_KDP | |
848 | if(current_debugger == KDB_CUR_DB) current_debugger = KDP_CUR_DB; /* Switch to KDP */ | |
849 | #endif | |
850 | } | |
851 | ||
852 | switch_debugger = 0; /* Clear request */ | |
853 | directcall = 0; /* Clear first-time direct call indication */ | |
854 | ||
855 | switch (current_debugger) { /* Enter correct debugger */ | |
856 | ||
857 | case KDP_CUR_DB: /* Enter KDP */ | |
858 | kdp_trap(type, saved_state); | |
859 | break; | |
860 | ||
861 | case KDB_CUR_DB: /* Enter KDB */ | |
862 | kdb_trap(type, saved_state); | |
863 | break; | |
864 | ||
865 | default: /* No debugger installed */ | |
866 | goto debugger_error; | |
867 | break; | |
868 | } | |
869 | } | |
870 | ||
871 | debugger_exit: | |
872 | #if 0 | |
873 | if (debugger_debug) kprintf("Call_DebuggerC(%d): exit - inst = %08X, cpu=%d(%d), run=%d\n", my_cpu, | |
91447636 | 874 | instr, my_cpu, debugger_cpu, db_run_mode); /* (TEST/DEBUG) */ |
1c79356b A |
875 | #endif |
876 | if ((instr == TRAP_DEBUGGER_INST) || /* Did we trap to enter debugger? */ | |
9bccf70c | 877 | (instr == TRAP_DIRECT_INST)) saved_state->save_srr0 += TRAP_INST_SIZE; /* Yes, point past trap */ |
1c79356b | 878 | |
a3d08fcd A |
879 | wasdebugger = 0; /* Assume not debugger */ |
880 | if(debugger_cpu == my_cpu) { /* Are the debugger processor? */ | |
881 | wasdebugger = 1; /* Remember that we were the debugger */ | |
882 | LLTraceSet(lastTrace); /* Enable tracing on the way out if we are debugger */ | |
883 | } | |
1c79356b A |
884 | |
885 | wait = FALSE; /* Assume we are not going to wait */ | |
886 | if (db_run_mode == STEP_CONTINUE) { /* Are we going to run? */ | |
887 | wait = TRUE; /* Yeah, remember to wait for breakpoints to clear */ | |
888 | debugger_cpu = -1; /* Release other processor's debuggers */ | |
91447636 A |
889 | for(tcpu = 0; tcpu < real_ncpus; tcpu++) |
890 | PerProcTable[tcpu].ppe_vaddr->debugger_pending = 0; /* Release request (this is a HACK) */ | |
1c79356b A |
891 | NMIss = 0; /* Let NMI bounce */ |
892 | } | |
893 | ||
894 | if(db_run_mode == STEP_ONCE) { /* Are we about to step? */ | |
895 | disable_preemption(); /* Disable preemption for the step */ | |
896 | db_im_stepping = my_cpu; /* Remember that I am about to step */ | |
897 | } | |
898 | ||
899 | if (db_breakpoints_inserted) cpus_holding_bkpts--; /* If any breakpoints, back off count */ | |
91447636 | 900 | if (PerProcTable[my_cpu].ppe_vaddr->debugger_is_slave) PerProcTable[my_cpu].ppe_vaddr->debugger_is_slave--; /* If we were a slove, uncount us */ |
1c79356b A |
901 | if (debugger_debug) |
902 | printf("Call_Debugger: exit - cpu %d, debugger_cpu %d, run_mode %d holds %d\n", | |
903 | my_cpu, debugger_cpu, db_run_mode, | |
904 | cpus_holding_bkpts); | |
905 | ||
906 | unlock_debugger(); /* Release the lock */ | |
91447636 | 907 | PerProcTable[my_cpu].ppe_vaddr->debugger_active--; /* Say we aren't active anymore */ |
1c79356b A |
908 | |
909 | if (wait) while(cpus_holding_bkpts); /* Wait for breakpoints to clear */ | |
910 | ||
a3d08fcd | 911 | |
2d21ac55 | 912 | (void)hw_atomic_sub(&debug_mode, 1); /* Set out of debug now */ |
1c79356b A |
913 | |
914 | return(1); /* Exit debugger normally */ | |
915 | ||
916 | debugger_error: | |
917 | if(db_run_mode != STEP_ONCE) enable_preemption_no_check(); /* Enable preemption, but don't preempt here */ | |
2d21ac55 | 918 | (void)hw_atomic_sub(&debug_mode, 1); /* Set out of debug now */ |
1c79356b A |
919 | return(0); /* Return in shame... */ |
920 | ||
921 | } | |
922 | ||
2d21ac55 A |
923 | void |
924 | lock_debugger(void) | |
925 | { | |
926 | unsigned int my_cpu; | |
1c79356b A |
927 | |
928 | my_cpu = cpu_number(); /* Get our CPU number */ | |
929 | ||
2d21ac55 A |
930 | while(1) { /* Check until we get it */ |
931 | if (debugger_cpu != (unsigned)-1 && debugger_cpu != my_cpu) | |
932 | continue; /* Someone, not us, is debugger... */ | |
933 | if (hw_lock_try(&debugger_lock)) { /* Get the debug lock */ | |
934 | if (debugger_cpu == (unsigned)-1 || debugger_cpu == my_cpu) | |
935 | break; /* Is it us? */ | |
936 | hw_lock_unlock(&debugger_lock); /* Not us, release lock */ | |
1c79356b A |
937 | } |
938 | } | |
939 | } | |
940 | ||
941 | void unlock_debugger(void) { | |
942 | ||
943 | hw_lock_unlock(&debugger_lock); | |
944 | ||
945 | } | |
946 | ||
2d21ac55 A |
947 | int patchInst(task_t task, addr64_t vaddr, uint32_t inst); |
948 | int patchInst(task_t task, addr64_t vaddr, uint32_t inst) | |
949 | { | |
950 | vm_map_t map; | |
951 | addr64_t paddr; | |
952 | uint32_t instr, nestingDepth; | |
953 | kern_return_t ret; | |
954 | vm_region_submap_short_info_data_64_t info; | |
955 | mach_msg_type_number_t count; | |
956 | mach_vm_address_t address; | |
957 | mach_vm_size_t sizeOfRegion; | |
958 | vm_prot_t reprotect; | |
959 | ||
960 | if(task == TASK_NULL) return -1; /* Leave if task is bogus... */ | |
961 | ||
962 | task_lock(task); /* Make sure the task doesn't go anywhaere */ | |
963 | if (!task->active) { /* Is is alive? */ | |
964 | task_unlock(task); /* Nope, unlock */ | |
965 | return -1; /* Not a active task, fail... */ | |
966 | } | |
967 | map = task->map; /* Get his map */ | |
968 | vm_map_reference_swap(map); /* Don't let it go away */ | |
969 | task_unlock(task); /* Unleash the task */ | |
55e303ae | 970 | |
2d21ac55 A |
971 | /* Find the memory permissions. */ |
972 | nestingDepth=999999; /* Limit recursion */ | |
973 | ||
974 | count = VM_REGION_SUBMAP_SHORT_INFO_COUNT_64; | |
975 | address = (mach_vm_address_t)vaddr; | |
976 | sizeOfRegion = (mach_vm_size_t)4; | |
977 | ||
978 | ret = mach_vm_region_recurse(map, &address, &sizeOfRegion, &nestingDepth, (vm_region_recurse_info_t)&info, &count); | |
979 | if (ret != KERN_SUCCESS) { /* Leave if it didn't work */ | |
980 | vm_map_deallocate(map); /* Drop reference on map */ | |
981 | return (-1); | |
982 | } | |
1c79356b | 983 | |
2d21ac55 A |
984 | /* |
985 | * We need to check if there could be a problem if the dtrace probes are being removed and the code is being | |
986 | * executed at the same time. This sequence may leave us with no-execute turned on temporarily when we execute | |
987 | * through it. | |
988 | */ | |
989 | ||
990 | if (!(info.protection & VM_PROT_WRITE)) { | |
991 | /* Save the original protection values for restoration later */ | |
992 | reprotect = info.protection; | |
993 | ||
994 | if (info.max_protection & VM_PROT_WRITE) { | |
995 | /* The memory is not currently writable, but can be made writable. */ | |
996 | ret = mach_vm_protect(map, (mach_vm_offset_t)vaddr, (mach_vm_size_t)4, 0, reprotect | VM_PROT_WRITE); | |
997 | } | |
998 | else { | |
999 | /* | |
1000 | * The memory is not currently writable, and cannot be made writable. We need to COW this memory. | |
1001 | * | |
1002 | * Strange, we can't just say "reprotect | VM_PROT_COPY", that fails. | |
1003 | */ | |
1004 | ret = mach_vm_protect(map, (mach_vm_offset_t)vaddr, (mach_vm_size_t)4, 0, VM_PROT_COPY | VM_PROT_READ | VM_PROT_WRITE); | |
1005 | } | |
1006 | ||
1007 | if (ret != KERN_SUCCESS) { | |
1008 | vm_map_deallocate(map); /* Drop reference on map */ | |
1009 | return (-1); | |
1010 | } | |
1011 | ||
1012 | } | |
1013 | else { | |
1014 | /* The memory was already writable. */ | |
1015 | reprotect = VM_PROT_NONE; | |
1016 | } | |
1017 | ||
1018 | instr = inst; /* Place instruction in local memory */ | |
1019 | ret = vm_map_write_user(map, &inst, (vm_map_address_t)vaddr, (vm_size_t)4); /* Write the instruction */ | |
1020 | if (ret != KERN_SUCCESS) { /* Leave if it didn't work */ | |
1021 | ||
1022 | if (reprotect != VM_PROT_NONE) { | |
1023 | ret = mach_vm_protect (map, (mach_vm_offset_t)vaddr, (mach_vm_size_t)4, 0, reprotect); | |
1024 | } | |
1025 | ||
1026 | vm_map_deallocate(map); /* Drop reference on map */ | |
1027 | return (-1); | |
1028 | } | |
1029 | ||
1030 | paddr = (addr64_t)pmap_find_phys(map->pmap, vaddr) << 12; /* Find the physical address of the patched address */ | |
1031 | if(!paddr) { /* Is address mapped now? */ | |
1032 | vm_map_deallocate(map); /* Drop reference on map */ | |
1033 | return 0; /* Leave... */ | |
1034 | } | |
1035 | paddr = paddr | (vaddr & 4095); /* Construct physical address */ | |
1036 | invalidate_icache64(paddr, 4, 1); /* Flush out the instruction cache here */ | |
1037 | ||
1038 | if (reprotect != VM_PROT_NONE) { | |
1039 | ret = mach_vm_protect(map, (mach_vm_offset_t)vaddr, (mach_vm_size_t)4, 0, reprotect); | |
1040 | } | |
1041 | ||
1042 | vm_map_deallocate(map); | |
1043 | ||
1044 | return (0); | |
55e303ae | 1045 | } |