]>
git.saurik.com Git - apple/xnu.git/blob - osfmk/kdp/ml/i386/kdp_machdep.c
2 * Copyright (c) 2000 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
20 * @APPLE_LICENSE_HEADER_END@
23 #include <mach/mach_types.h>
24 #include <mach/machine.h>
25 #include <mach/exception_types.h>
26 #include <i386/trap.h>
28 #include <kdp/kdp_internal.h>
30 #define KDP_TEST_HARNESS 0
32 #define dprintf(x) printf x
37 void print_saved_state(void *);
39 void kdp_i386_trap(unsigned int, struct i386_saved_state
*, kern_return_t
, vm_offset_t
);
46 unsigned short *remote_port
,
47 unsigned int exception
,
52 kdp_exception_t
*rq
= (kdp_exception_t
*)pkt
;
54 rq
->hdr
.request
= KDP_EXCEPTION
;
56 rq
->hdr
.seq
= kdp
.exception_seq
;
58 rq
->hdr
.len
= sizeof (*rq
);
61 rq
->exc_info
[0].cpu
= 0;
62 rq
->exc_info
[0].exception
= exception
;
63 rq
->exc_info
[0].code
= code
;
64 rq
->exc_info
[0].subcode
= subcode
;
66 rq
->hdr
.len
+= rq
->n_exc_info
* sizeof (kdp_exc_info_t
);
68 bcopy((char *)rq
, (char *)pkt
, rq
->hdr
.len
);
70 kdp
.exception_ack_needed
= TRUE
;
72 *remote_port
= kdp
.exception_port
;
82 kdp_exception_ack_t
*rq
= (kdp_exception_ack_t
*)pkt
;
84 if (len
< sizeof (*rq
))
87 if (!rq
->hdr
.is_reply
|| rq
->hdr
.request
!= KDP_EXCEPTION
)
90 dprintf(("kdp_exception_ack seq %x %x\n", rq
->hdr
.seq
, kdp
.exception_seq
));
92 if (rq
->hdr
.seq
== kdp
.exception_seq
) {
93 kdp
.exception_ack_needed
= FALSE
;
101 i386_thread_state_t
*state
104 struct i386_saved_state
*saved_state
;
106 saved_state
= (struct i386_saved_state
*)kdp
.saved_state
;
108 *state
= (i386_thread_state_t
) { 0 };
109 state
->eax
= saved_state
->eax
;
110 state
->ebx
= saved_state
->ebx
;
111 state
->ecx
= saved_state
->ecx
;
112 state
->edx
= saved_state
->edx
;
113 state
->edi
= saved_state
->edi
;
114 state
->esi
= saved_state
->esi
;
115 state
->ebp
= saved_state
->ebp
;
117 if ((saved_state
->cs
& 0x3) == 0){ /* Kernel State */
118 state
->esp
= (unsigned int) &saved_state
->uesp
;
119 state
->ss
= KERNEL_DS
;
121 state
->esp
= saved_state
->uesp
;
122 state
->ss
= saved_state
->ss
;
125 state
->eflags
= saved_state
->efl
;
126 state
->eip
= saved_state
->eip
;
127 state
->cs
= saved_state
->cs
;
128 state
->ds
= saved_state
->ds
;
129 state
->es
= saved_state
->es
;
130 state
->fs
= saved_state
->fs
;
131 state
->gs
= saved_state
->gs
;
137 i386_thread_state_t
*state
140 struct i386_saved_state
*saved_state
;
142 saved_state
= (struct i386_saved_state
*)kdp
.saved_state
;
144 saved_state
->eax
= state
->eax
;
145 saved_state
->ebx
= state
->ebx
;
146 saved_state
->ecx
= state
->ecx
;
147 saved_state
->edx
= state
->edx
;
148 saved_state
->edi
= state
->edi
;
149 saved_state
->esi
= state
->esi
;
150 saved_state
->ebp
= state
->ebp
;
151 saved_state
->efl
= state
->eflags
;
153 saved_state
->frame
.eflags
&= ~( EFL_VM
| EFL_NT
| EFL_IOPL
| EFL_CLR
);
154 saved_state
->frame
.eflags
|= ( EFL_IF
| EFL_SET
);
156 saved_state
->eip
= state
->eip
;
157 saved_state
->fs
= state
->fs
;
158 saved_state
->gs
= state
->gs
;
163 kdp_machine_read_regs(
172 case i386_THREAD_STATE
:
173 dprintf(("kdp_readregs THREAD_STATE\n"));
174 kdp_getstate((i386_thread_state_t
*)data
);
175 *size
= sizeof (i386_thread_state_t
);
176 return KDPERR_NO_ERROR
;
178 case i386_THREAD_FPSTATE
:
179 dprintf(("kdp_readregs THREAD_FPSTATE\n"));
180 *(i386_thread_fpstate_t
*)data
= (i386_thread_fpstate_t
) { 0 };
181 *size
= sizeof (i386_thread_fpstate_t
);
182 return KDPERR_NO_ERROR
;
185 dprintf(("kdp_readregs bad flavor %d\n"));
186 return KDPERR_BADFLAVOR
;
191 kdp_machine_write_regs(
200 case i386_THREAD_STATE
:
201 dprintf(("kdp_writeregs THREAD_STATE\n"));
202 kdp_setstate((i386_thread_state_t
*)data
);
203 return KDPERR_NO_ERROR
;
205 case i386_THREAD_FPSTATE
:
206 dprintf(("kdp_writeregs THREAD_FPSTATE\n"));
207 return KDPERR_NO_ERROR
;
210 dprintf(("kdp_writeregs bad flavor %d\n"));
211 return KDPERR_BADFLAVOR
;
218 kdp_machine_hostinfo(
219 kdp_hostinfo_t
*hostinfo
225 hostinfo
->cpus_mask
= 0;
227 for (i
= 0; i
< machine_info
.max_cpus
; i
++) {
228 m
= &machine_slot
[i
];
232 hostinfo
->cpus_mask
|= (1 << i
);
236 hostinfo
->cpu_type
= CPU_TYPE_I386
;
237 hostinfo
->cpu_subtype
= CPU_SUBTYPE_486
;
245 printf("kdp panic: %s\n", msg
);
246 __asm__
volatile("hlt");
275 kdp_us_spin(int usec
)
277 extern void delay(int);
282 void print_saved_state(void *state
)
284 struct i386_saved_state
*saved_state
;
288 printf("pc = 0x%x\n", saved_state
->eip
);
289 printf("cr3= 0x%x\n", saved_state
->cr2
);
290 printf("rp = TODO FIXME\n");
291 printf("sp = 0x%x\n", saved_state
->esp
);
298 return; /* No op here. */
304 __asm__
volatile ("int $3"); /* Let the processor do the work */
308 typedef struct _cframe_t
{
309 struct _cframe_t
*prev
;
315 #define MAX_FRAME_DELTA 65536
318 kdp_i386_backtrace(void *_frame
, int nframes
)
320 cframe_t
*frame
= (cframe_t
*)_frame
;
323 for (i
=0; i
<nframes
; i
++) {
324 if ((vm_offset_t
)frame
< VM_MIN_KERNEL_ADDRESS
||
325 (vm_offset_t
)frame
> VM_MAX_KERNEL_ADDRESS
) {
328 printf("frame %x called by %x ",
329 frame
, frame
->caller
);
330 printf("args %x %x %x %x\n",
331 frame
->args
[0], frame
->args
[1],
332 frame
->args
[2], frame
->args
[3]);
333 if ((frame
->prev
< frame
) || /* wrong direction */
334 ((frame
->prev
- frame
) > MAX_FRAME_DELTA
)) {
341 printf("invalid frame pointer %x\n",frame
);
347 struct i386_saved_state
*saved_state
,
348 kern_return_t result
,
352 unsigned int exception
, subcode
= 0, code
;
356 if (trapno
!= T_INT3
&& trapno
!= T_DEBUG
)
357 printf("unexpected kernel trap %x eip %x\n", trapno
, saved_state
->eip
);
362 exception
= EXC_ARITHMETIC
;
363 code
= EXC_I386_DIVERR
;
367 exception
= EXC_SOFTWARE
;
368 code
= EXC_I386_INTOFLT
;
371 case T_OUT_OF_BOUNDS
:
372 exception
= EXC_ARITHMETIC
;
373 code
= EXC_I386_BOUNDFLT
;
376 case T_INVALID_OPCODE
:
377 exception
= EXC_BAD_INSTRUCTION
;
378 code
= EXC_I386_INVOPFLT
;
381 case T_SEGMENT_NOT_PRESENT
:
382 exception
= EXC_BAD_INSTRUCTION
;
383 code
= EXC_I386_SEGNPFLT
;
384 subcode
= saved_state
->err
;
388 exception
= EXC_BAD_INSTRUCTION
;
389 code
= EXC_I386_STKFLT
;
390 subcode
= saved_state
->err
;
393 case T_GENERAL_PROTECTION
:
394 exception
= EXC_BAD_INSTRUCTION
;
395 code
= EXC_I386_GPFLT
;
396 subcode
= saved_state
->err
;
400 exception
= EXC_BAD_ACCESS
;
406 exception
= EXC_SOFTWARE
;
407 code
= EXC_I386_ALIGNFLT
;
412 exception
= EXC_BREAKPOINT
;
413 code
= EXC_I386_BPTFLT
;
417 exception
= EXC_BAD_INSTRUCTION
;
422 // kdp_i386_backtrace((void *) saved_state->ebp, 10);
424 kdp_raise_exception(exception
, code
, subcode
, saved_state
);
436 unsigned int kdp_ml_get_breakinsn()