]>
git.saurik.com Git - apple/xnu.git/blob - osfmk/kdp/ml/i386/kdp_machdep.c
2 * Copyright (c) 2000 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
20 * @APPLE_LICENSE_HEADER_END@
23 * Copyright (c) 1997 Apple Computer, Inc. All rights reserved.
24 * Copyright (c) 1994 NeXT Computer, Inc. All rights reserved.
26 * machdep/ppc/kdp_machdep.c
28 * Machine-dependent code for Remote Debugging Protocol
30 * March, 1997 Created. Umesh Vaishampayan [umeshv@NeXT.com]
34 #include <mach/mach_types.h>
35 #include <mach/machine.h>
36 #include <mach/exception_types.h>
37 #include <i386/trap.h>
38 #include <kdp/kdp_internal.h>
40 #define KDP_TEST_HARNESS 0
42 #define dprintf(x) printf x
47 void print_saved_state(void *);
49 void kdp_i386_trap(unsigned int, struct i386_saved_state
*, kern_return_t
, vm_offset_t
);
56 unsigned short *remote_port
,
57 unsigned int exception
,
62 kdp_exception_t
*rq
= (kdp_exception_t
*)pkt
;
64 rq
->hdr
.request
= KDP_EXCEPTION
;
66 rq
->hdr
.seq
= kdp
.exception_seq
;
68 rq
->hdr
.len
= sizeof (*rq
);
71 rq
->exc_info
[0].cpu
= 0;
72 rq
->exc_info
[0].exception
= exception
;
73 rq
->exc_info
[0].code
= code
;
74 rq
->exc_info
[0].subcode
= subcode
;
76 rq
->hdr
.len
+= rq
->n_exc_info
* sizeof (kdp_exc_info_t
);
78 bcopy((char *)rq
, (char *)pkt
, rq
->hdr
.len
);
80 kdp
.exception_ack_needed
= TRUE
;
82 *remote_port
= kdp
.exception_port
;
92 kdp_exception_ack_t
*rq
= (kdp_exception_ack_t
*)pkt
;
94 if (len
< sizeof (*rq
))
97 if (!rq
->hdr
.is_reply
|| rq
->hdr
.request
!= KDP_EXCEPTION
)
100 dprintf(("kdp_exception_ack seq %x %x\n", rq
->hdr
.seq
, kdp
.exception_seq
));
102 if (rq
->hdr
.seq
== kdp
.exception_seq
) {
103 kdp
.exception_ack_needed
= FALSE
;
111 i386_thread_state_t
*state
114 struct i386_saved_state
*saved_state
;
116 saved_state
= (struct i386_saved_state
*)kdp
.saved_state
;
118 *state
= (i386_thread_state_t
) { 0 };
119 state
->eax
= saved_state
->eax
;
120 state
->ebx
= saved_state
->ebx
;
121 state
->ecx
= saved_state
->ecx
;
122 state
->edx
= saved_state
->edx
;
123 state
->edi
= saved_state
->edi
;
124 state
->esi
= saved_state
->esi
;
125 state
->ebp
= saved_state
->ebp
;
127 if ((saved_state
->cs
& 0x3) == 0){ /* Kernel State */
128 state
->esp
= (unsigned int) &saved_state
->uesp
;
129 state
->ss
= KERNEL_DS
;
131 state
->esp
= saved_state
->uesp
;
132 state
->ss
= saved_state
->ss
;
135 state
->eflags
= saved_state
->efl
;
136 state
->eip
= saved_state
->eip
;
137 state
->cs
= saved_state
->cs
;
138 state
->ds
= saved_state
->ds
;
139 state
->es
= saved_state
->es
;
140 state
->fs
= saved_state
->fs
;
141 state
->gs
= saved_state
->gs
;
147 i386_thread_state_t
*state
150 struct i386_saved_state
*saved_state
;
152 saved_state
= (struct i386_saved_state
*)kdp
.saved_state
;
154 saved_state
->eax
= state
->eax
;
155 saved_state
->ebx
= state
->ebx
;
156 saved_state
->ecx
= state
->ecx
;
157 saved_state
->edx
= state
->edx
;
158 saved_state
->edi
= state
->edi
;
159 saved_state
->esi
= state
->esi
;
160 saved_state
->ebp
= state
->ebp
;
161 saved_state
->efl
= state
->eflags
;
163 saved_state
->frame
.eflags
&= ~( EFL_VM
| EFL_NT
| EFL_IOPL
| EFL_CLR
);
164 saved_state
->frame
.eflags
|= ( EFL_IF
| EFL_SET
);
166 saved_state
->eip
= state
->eip
;
167 saved_state
->fs
= state
->fs
;
168 saved_state
->gs
= state
->gs
;
173 kdp_machine_read_regs(
182 case i386_THREAD_STATE
:
183 dprintf(("kdp_readregs THREAD_STATE\n"));
184 kdp_getstate((i386_thread_state_t
*)data
);
185 *size
= sizeof (i386_thread_state_t
);
186 return KDPERR_NO_ERROR
;
188 case i386_THREAD_FPSTATE
:
189 dprintf(("kdp_readregs THREAD_FPSTATE\n"));
190 *(i386_thread_fpstate_t
*)data
= (i386_thread_fpstate_t
) { 0 };
191 *size
= sizeof (i386_thread_fpstate_t
);
192 return KDPERR_NO_ERROR
;
195 dprintf(("kdp_readregs bad flavor %d\n"));
196 return KDPERR_BADFLAVOR
;
201 kdp_machine_write_regs(
210 case i386_THREAD_STATE
:
211 dprintf(("kdp_writeregs THREAD_STATE\n"));
212 kdp_setstate((i386_thread_state_t
*)data
);
213 return KDPERR_NO_ERROR
;
215 case i386_THREAD_FPSTATE
:
216 dprintf(("kdp_writeregs THREAD_FPSTATE\n"));
217 return KDPERR_NO_ERROR
;
220 dprintf(("kdp_writeregs bad flavor %d\n"));
221 return KDPERR_BADFLAVOR
;
228 kdp_machine_hostinfo(
229 kdp_hostinfo_t
*hostinfo
235 hostinfo
->cpus_mask
= 0;
237 for (i
= 0; i
< machine_info
.max_cpus
; i
++) {
238 m
= &machine_slot
[i
];
242 hostinfo
->cpus_mask
|= (1 << i
);
246 hostinfo
->cpu_type
= CPU_TYPE_I386
;
247 hostinfo
->cpu_subtype
= CPU_SUBTYPE_486
;
255 printf("kdp panic: %s\n", msg
);
256 __asm__
volatile("hlt");
285 kdp_us_spin(int usec
)
287 extern void delay(int);
292 void print_saved_state(void *state
)
294 struct i386_saved_state
*saved_state
;
298 printf("pc = 0x%x\n", saved_state
->eip
);
299 printf("cr3= 0x%x\n", saved_state
->cr2
);
300 printf("rp = TODO FIXME\n");
301 printf("sp = 0x%x\n", saved_state
->esp
);
308 return; /* No op here. */
314 __asm__
volatile ("int $3"); /* Let the processor do the work */
318 typedef struct _cframe_t
{
319 struct _cframe_t
*prev
;
325 #define MAX_FRAME_DELTA 65536
328 kdp_i386_backtrace(void *_frame
, int nframes
)
330 cframe_t
*frame
= (cframe_t
*)_frame
;
333 for (i
=0; i
<nframes
; i
++) {
334 if ((vm_offset_t
)frame
< VM_MIN_KERNEL_ADDRESS
||
335 (vm_offset_t
)frame
> VM_MAX_KERNEL_ADDRESS
) {
338 printf("frame %x called by %x ",
339 frame
, frame
->caller
);
340 printf("args %x %x %x %x\n",
341 frame
->args
[0], frame
->args
[1],
342 frame
->args
[2], frame
->args
[3]);
343 if ((frame
->prev
< frame
) || /* wrong direction */
344 ((frame
->prev
- frame
) > MAX_FRAME_DELTA
)) {
351 printf("invalid frame pointer %x\n",frame
->prev
);
357 struct i386_saved_state
*saved_state
,
358 kern_return_t result
,
362 unsigned int exception
, subcode
= 0, code
;
364 if (trapno
!= T_INT3
&& trapno
!= T_DEBUG
)
365 printf("unexpected kernel trap %x eip %x\n", trapno
, saved_state
->eip
);
370 exception
= EXC_ARITHMETIC
;
371 code
= EXC_I386_DIVERR
;
375 exception
= EXC_SOFTWARE
;
376 code
= EXC_I386_INTOFLT
;
379 case T_OUT_OF_BOUNDS
:
380 exception
= EXC_ARITHMETIC
;
381 code
= EXC_I386_BOUNDFLT
;
384 case T_INVALID_OPCODE
:
385 exception
= EXC_BAD_INSTRUCTION
;
386 code
= EXC_I386_INVOPFLT
;
389 case T_SEGMENT_NOT_PRESENT
:
390 exception
= EXC_BAD_INSTRUCTION
;
391 code
= EXC_I386_SEGNPFLT
;
392 subcode
= saved_state
->err
;
396 exception
= EXC_BAD_INSTRUCTION
;
397 code
= EXC_I386_STKFLT
;
398 subcode
= saved_state
->err
;
401 case T_GENERAL_PROTECTION
:
402 exception
= EXC_BAD_INSTRUCTION
;
403 code
= EXC_I386_GPFLT
;
404 subcode
= saved_state
->err
;
408 exception
= EXC_BAD_ACCESS
;
414 exception
= EXC_SOFTWARE
;
415 code
= EXC_I386_ALIGNFLT
;
420 exception
= EXC_BREAKPOINT
;
421 code
= EXC_I386_BPTFLT
;
425 exception
= EXC_BAD_INSTRUCTION
;
430 // kdp_i386_backtrace((void *) saved_state->ebp, 10);
432 kdp_raise_exception(exception
, code
, subcode
, saved_state
);