]>
git.saurik.com Git - apple/xnu.git/blob - osfmk/kdp/ml/i386/kdp_machdep.c
2 * Copyright (c) 2000 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
20 * @APPLE_LICENSE_HEADER_END@
23 #include <mach/mach_types.h>
24 #include <mach/machine.h>
25 #include <mach/exception_types.h>
26 #include <i386/trap.h>
27 #include <kdp/kdp_internal.h>
29 #define KDP_TEST_HARNESS 0
31 #define dprintf(x) printf x
36 void print_saved_state(void *);
38 void kdp_i386_trap(unsigned int, struct i386_saved_state
*, kern_return_t
, vm_offset_t
);
45 unsigned short *remote_port
,
46 unsigned int exception
,
51 kdp_exception_t
*rq
= (kdp_exception_t
*)pkt
;
53 rq
->hdr
.request
= KDP_EXCEPTION
;
55 rq
->hdr
.seq
= kdp
.exception_seq
;
57 rq
->hdr
.len
= sizeof (*rq
);
60 rq
->exc_info
[0].cpu
= 0;
61 rq
->exc_info
[0].exception
= exception
;
62 rq
->exc_info
[0].code
= code
;
63 rq
->exc_info
[0].subcode
= subcode
;
65 rq
->hdr
.len
+= rq
->n_exc_info
* sizeof (kdp_exc_info_t
);
67 bcopy((char *)rq
, (char *)pkt
, rq
->hdr
.len
);
69 kdp
.exception_ack_needed
= TRUE
;
71 *remote_port
= kdp
.exception_port
;
81 kdp_exception_ack_t
*rq
= (kdp_exception_ack_t
*)pkt
;
83 if (len
< sizeof (*rq
))
86 if (!rq
->hdr
.is_reply
|| rq
->hdr
.request
!= KDP_EXCEPTION
)
89 dprintf(("kdp_exception_ack seq %x %x\n", rq
->hdr
.seq
, kdp
.exception_seq
));
91 if (rq
->hdr
.seq
== kdp
.exception_seq
) {
92 kdp
.exception_ack_needed
= FALSE
;
100 i386_thread_state_t
*state
103 struct i386_saved_state
*saved_state
;
105 saved_state
= (struct i386_saved_state
*)kdp
.saved_state
;
107 *state
= (i386_thread_state_t
) { 0 };
108 state
->eax
= saved_state
->eax
;
109 state
->ebx
= saved_state
->ebx
;
110 state
->ecx
= saved_state
->ecx
;
111 state
->edx
= saved_state
->edx
;
112 state
->edi
= saved_state
->edi
;
113 state
->esi
= saved_state
->esi
;
114 state
->ebp
= saved_state
->ebp
;
116 if ((saved_state
->cs
& 0x3) == 0){ /* Kernel State */
117 state
->esp
= (unsigned int) &saved_state
->uesp
;
118 state
->ss
= KERNEL_DS
;
120 state
->esp
= saved_state
->uesp
;
121 state
->ss
= saved_state
->ss
;
124 state
->eflags
= saved_state
->efl
;
125 state
->eip
= saved_state
->eip
;
126 state
->cs
= saved_state
->cs
;
127 state
->ds
= saved_state
->ds
;
128 state
->es
= saved_state
->es
;
129 state
->fs
= saved_state
->fs
;
130 state
->gs
= saved_state
->gs
;
136 i386_thread_state_t
*state
139 struct i386_saved_state
*saved_state
;
141 saved_state
= (struct i386_saved_state
*)kdp
.saved_state
;
143 saved_state
->eax
= state
->eax
;
144 saved_state
->ebx
= state
->ebx
;
145 saved_state
->ecx
= state
->ecx
;
146 saved_state
->edx
= state
->edx
;
147 saved_state
->edi
= state
->edi
;
148 saved_state
->esi
= state
->esi
;
149 saved_state
->ebp
= state
->ebp
;
150 saved_state
->efl
= state
->eflags
;
152 saved_state
->frame
.eflags
&= ~( EFL_VM
| EFL_NT
| EFL_IOPL
| EFL_CLR
);
153 saved_state
->frame
.eflags
|= ( EFL_IF
| EFL_SET
);
155 saved_state
->eip
= state
->eip
;
156 saved_state
->fs
= state
->fs
;
157 saved_state
->gs
= state
->gs
;
162 kdp_machine_read_regs(
171 case i386_THREAD_STATE
:
172 dprintf(("kdp_readregs THREAD_STATE\n"));
173 kdp_getstate((i386_thread_state_t
*)data
);
174 *size
= sizeof (i386_thread_state_t
);
175 return KDPERR_NO_ERROR
;
177 case i386_THREAD_FPSTATE
:
178 dprintf(("kdp_readregs THREAD_FPSTATE\n"));
179 *(i386_thread_fpstate_t
*)data
= (i386_thread_fpstate_t
) { 0 };
180 *size
= sizeof (i386_thread_fpstate_t
);
181 return KDPERR_NO_ERROR
;
184 dprintf(("kdp_readregs bad flavor %d\n"));
185 return KDPERR_BADFLAVOR
;
190 kdp_machine_write_regs(
199 case i386_THREAD_STATE
:
200 dprintf(("kdp_writeregs THREAD_STATE\n"));
201 kdp_setstate((i386_thread_state_t
*)data
);
202 return KDPERR_NO_ERROR
;
204 case i386_THREAD_FPSTATE
:
205 dprintf(("kdp_writeregs THREAD_FPSTATE\n"));
206 return KDPERR_NO_ERROR
;
209 dprintf(("kdp_writeregs bad flavor %d\n"));
210 return KDPERR_BADFLAVOR
;
217 kdp_machine_hostinfo(
218 kdp_hostinfo_t
*hostinfo
224 hostinfo
->cpus_mask
= 0;
226 for (i
= 0; i
< machine_info
.max_cpus
; i
++) {
227 m
= &machine_slot
[i
];
231 hostinfo
->cpus_mask
|= (1 << i
);
235 hostinfo
->cpu_type
= CPU_TYPE_I386
;
236 hostinfo
->cpu_subtype
= CPU_SUBTYPE_486
;
244 printf("kdp panic: %s\n", msg
);
245 __asm__
volatile("hlt");
274 kdp_us_spin(int usec
)
276 extern void delay(int);
281 void print_saved_state(void *state
)
283 struct i386_saved_state
*saved_state
;
287 printf("pc = 0x%x\n", saved_state
->eip
);
288 printf("cr3= 0x%x\n", saved_state
->cr2
);
289 printf("rp = TODO FIXME\n");
290 printf("sp = 0x%x\n", saved_state
->esp
);
297 return; /* No op here. */
303 __asm__
volatile ("int $3"); /* Let the processor do the work */
307 typedef struct _cframe_t
{
308 struct _cframe_t
*prev
;
314 #define MAX_FRAME_DELTA 65536
317 kdp_i386_backtrace(void *_frame
, int nframes
)
319 cframe_t
*frame
= (cframe_t
*)_frame
;
322 for (i
=0; i
<nframes
; i
++) {
323 if ((vm_offset_t
)frame
< VM_MIN_KERNEL_ADDRESS
||
324 (vm_offset_t
)frame
> VM_MAX_KERNEL_ADDRESS
) {
327 printf("frame %x called by %x ",
328 frame
, frame
->caller
);
329 printf("args %x %x %x %x\n",
330 frame
->args
[0], frame
->args
[1],
331 frame
->args
[2], frame
->args
[3]);
332 if ((frame
->prev
< frame
) || /* wrong direction */
333 ((frame
->prev
- frame
) > MAX_FRAME_DELTA
)) {
340 printf("invalid frame pointer %x\n",frame
->prev
);
346 struct i386_saved_state
*saved_state
,
347 kern_return_t result
,
351 unsigned int exception
, subcode
= 0, code
;
353 if (trapno
!= T_INT3
&& trapno
!= T_DEBUG
)
354 printf("unexpected kernel trap %x eip %x\n", trapno
, saved_state
->eip
);
359 exception
= EXC_ARITHMETIC
;
360 code
= EXC_I386_DIVERR
;
364 exception
= EXC_SOFTWARE
;
365 code
= EXC_I386_INTOFLT
;
368 case T_OUT_OF_BOUNDS
:
369 exception
= EXC_ARITHMETIC
;
370 code
= EXC_I386_BOUNDFLT
;
373 case T_INVALID_OPCODE
:
374 exception
= EXC_BAD_INSTRUCTION
;
375 code
= EXC_I386_INVOPFLT
;
378 case T_SEGMENT_NOT_PRESENT
:
379 exception
= EXC_BAD_INSTRUCTION
;
380 code
= EXC_I386_SEGNPFLT
;
381 subcode
= saved_state
->err
;
385 exception
= EXC_BAD_INSTRUCTION
;
386 code
= EXC_I386_STKFLT
;
387 subcode
= saved_state
->err
;
390 case T_GENERAL_PROTECTION
:
391 exception
= EXC_BAD_INSTRUCTION
;
392 code
= EXC_I386_GPFLT
;
393 subcode
= saved_state
->err
;
397 exception
= EXC_BAD_ACCESS
;
403 exception
= EXC_SOFTWARE
;
404 code
= EXC_I386_ALIGNFLT
;
409 exception
= EXC_BREAKPOINT
;
410 code
= EXC_I386_BPTFLT
;
414 exception
= EXC_BAD_INSTRUCTION
;
419 kdp_i386_backtrace((void *) saved_state
->ebp
, 10);
421 kdp_raise_exception(exception
, code
, subcode
, saved_state
);
431 unsigned int kdp_ml_get_breakinsn()