Annotation of sys/kern/kgdb_stub.c, Revision 1.1
1.1 ! nbrk 1: /* $OpenBSD: kgdb_stub.c,v 1.8 2005/11/17 19:23:01 fgsch Exp $ */
! 2: /* $NetBSD: kgdb_stub.c,v 1.6 1998/08/30 20:30:57 scottr Exp $ */
! 3:
! 4: /*
! 5: * Copyright (c) 1990, 1993
! 6: * The Regents of the University of California. All rights reserved.
! 7: *
! 8: * This software was developed by the Computer Systems Engineering group
! 9: * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
! 10: * contributed to Berkeley.
! 11: *
! 12: * All advertising materials mentioning features or use of this software
! 13: * must display the following acknowledgement:
! 14: * This product includes software developed by the University of
! 15: * California, Lawrence Berkeley Laboratories.
! 16: *
! 17: * Redistribution and use in source and binary forms, with or without
! 18: * modification, are permitted provided that the following conditions
! 19: * are met:
! 20: * 1. Redistributions of source code must retain the above copyright
! 21: * notice, this list of conditions and the following disclaimer.
! 22: * 2. Redistributions in binary form must reproduce the above copyright
! 23: * notice, this list of conditions and the following disclaimer in the
! 24: * documentation and/or other materials provided with the distribution.
! 25: * 3. Neither the name of the University nor the names of its contributors
! 26: * may be used to endorse or promote products derived from this software
! 27: * without specific prior written permission.
! 28: *
! 29: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
! 30: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
! 31: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
! 32: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
! 33: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
! 34: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
! 35: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
! 36: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
! 37: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
! 38: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
! 39: * SUCH DAMAGE.
! 40: *
! 41: * @(#)kgdb_stub.c 8.4 (Berkeley) 1/12/94
! 42: */
! 43:
! 44: /*
! 45: * "Stub" to allow remote cpu to debug over a serial line using gdb.
! 46: */
! 47:
! 48: #include <sys/param.h>
! 49: #include <sys/systm.h>
! 50: #include <sys/kgdb.h>
! 51:
! 52: /* #define DEBUG_KGDB XXX */
! 53:
! 54: /* XXX: Maybe these should be in the MD files? */
! 55: #ifndef KGDBDEV
! 56: #define KGDBDEV -1
! 57: #endif
! 58: #ifndef KGDBRATE
! 59: #define KGDBRATE 19200
! 60: #endif
! 61:
! 62: int kgdb_dev = KGDBDEV; /* remote debugging device (-1 if none) */
! 63: int kgdb_rate = KGDBRATE; /* remote debugging baud rate */
! 64: int kgdb_active = 0; /* remote debugging active if != 0 */
! 65: int kgdb_debug_init = 0; /* != 0 waits for remote at system init */
! 66: int kgdb_debug_panic = 0; /* != 0 waits for remote on panic */
! 67: label_t *kgdb_recover = 0;
! 68:
! 69: static void kgdb_copy(void *, void *, int);
! 70: /* static void kgdb_zero(void *, int); */
! 71: static void kgdb_send(u_char *);
! 72: static int kgdb_recv(u_char *, int);
! 73: static int digit2i(u_char);
! 74: static u_char i2digit(int);
! 75: static void mem2hex(void *, void *, int);
! 76: static u_char *hex2mem(void *, u_char *, int);
! 77: static vaddr_t hex2i(u_char **);
! 78:
! 79: static int (*kgdb_getc)(void *);
! 80: static void (*kgdb_putc)(void *, int);
! 81: static void *kgdb_ioarg;
! 82:
! 83: static u_char buffer[KGDB_BUFLEN];
! 84: static kgdb_reg_t gdb_regs[KGDB_NUMREGS];
! 85:
! 86: #define GETC() ((*kgdb_getc)(kgdb_ioarg))
! 87: #define PUTC(c) ((*kgdb_putc)(kgdb_ioarg, c))
! 88:
! 89: /*
! 90: * This little routine exists simply so that bcopy() can be debugged.
! 91: */
! 92: static void
! 93: kgdb_copy(void *vsrc, void *vdst, int len)
! 94: {
! 95: char *src = vsrc;
! 96: char *dst = vdst;
! 97:
! 98: while (--len >= 0)
! 99: *dst++ = *src++;
! 100: }
! 101:
! 102: #if 0
! 103: /* ditto for bzero */
! 104: static void
! 105: kgdb_zero(void *vptr, int len)
! 106: {
! 107: char *ptr = vptr;
! 108:
! 109: while (--len >= 0)
! 110: *ptr++ = (char) 0;
! 111: }
! 112: #endif
! 113:
! 114: /*
! 115: * Convert a hex digit into an integer.
! 116: * This returns -1 if the argument passed is no
! 117: * valid hex digit.
! 118: */
! 119: static int
! 120: digit2i(u_char c)
! 121: {
! 122: if (c >= '0' && c <= '9')
! 123: return (c - '0');
! 124: else if (c >= 'a' && c <= 'f')
! 125: return (c - 'a' + 10);
! 126: else if (c >= 'A' && c <= 'F')
! 127:
! 128: return (c - 'A' + 10);
! 129: else
! 130: return (-1);
! 131: }
! 132:
! 133: /*
! 134: * Convert the low 4 bits of an integer into
! 135: * an hex digit.
! 136: */
! 137: static u_char
! 138: i2digit(int n)
! 139: {
! 140: return ("0123456789abcdef"[n & 0x0f]);
! 141: }
! 142:
! 143: /*
! 144: * Convert a byte array into an hex string.
! 145: */
! 146: static void
! 147: mem2hex(void *vdst, void *vsrc, int len)
! 148: {
! 149: u_char *dst = vdst;
! 150: u_char *src = vsrc;
! 151:
! 152: while (len--) {
! 153: *dst++ = i2digit(*src >> 4);
! 154: *dst++ = i2digit(*src++);
! 155: }
! 156: *dst = '\0';
! 157: }
! 158:
! 159: /*
! 160: * Convert an hex string into a byte array.
! 161: * This returns a pointer to the character following
! 162: * the last valid hex digit. If the string ends in
! 163: * the middle of a byte, NULL is returned.
! 164: */
! 165: static u_char *
! 166: hex2mem(void *vdst, u_char *src, int maxlen)
! 167: {
! 168: u_char *dst = vdst;
! 169: int msb, lsb;
! 170:
! 171: while (*src && maxlen--) {
! 172: msb = digit2i(*src++);
! 173: if (msb < 0)
! 174: return (src - 1);
! 175: lsb = digit2i(*src++);
! 176: if (lsb < 0)
! 177: return (NULL);
! 178: *dst++ = (msb << 4) | lsb;
! 179: }
! 180: return (src);
! 181: }
! 182:
! 183: /*
! 184: * Convert an hex string into an integer.
! 185: * This returns a pointer to the character following
! 186: * the last valid hex digit.
! 187: */
! 188: static vaddr_t
! 189: hex2i(u_char **srcp)
! 190: {
! 191: char *src = *srcp;
! 192: vaddr_t r = 0;
! 193: int nibble;
! 194:
! 195: while ((nibble = digit2i(*src)) >= 0) {
! 196: r *= 16;
! 197: r += nibble;
! 198: src++;
! 199: }
! 200: *srcp = src;
! 201: return (r);
! 202: }
! 203:
! 204: /*
! 205: * Send a packet.
! 206: */
! 207: static void
! 208: kgdb_send(u_char *bp)
! 209: {
! 210: u_char *p;
! 211: u_char csum, c;
! 212:
! 213: #ifdef DEBUG_KGDB
! 214: printf("kgdb_send: %s\n", bp);
! 215: #endif
! 216: do {
! 217: p = bp;
! 218: PUTC(KGDB_START);
! 219: for (csum = 0; (c = *p); p++) {
! 220: PUTC(c);
! 221: csum += c;
! 222: }
! 223: PUTC(KGDB_END);
! 224: PUTC(i2digit(csum >> 4));
! 225: PUTC(i2digit(csum));
! 226: } while ((c = GETC() & 0x7f) == KGDB_BADP);
! 227: }
! 228:
! 229: /*
! 230: * Receive a packet.
! 231: */
! 232: static int
! 233: kgdb_recv(u_char *bp, int maxlen)
! 234: {
! 235: u_char *p;
! 236: int c, csum;
! 237: int len;
! 238:
! 239: do {
! 240: p = bp;
! 241: csum = len = 0;
! 242: while ((c = GETC()) != KGDB_START)
! 243: ;
! 244:
! 245: while ((c = GETC()) != KGDB_END && len < maxlen) {
! 246: c &= 0x7f;
! 247: csum += c;
! 248: *p++ = c;
! 249: len++;
! 250: }
! 251: csum &= 0xff;
! 252: *p = '\0';
! 253:
! 254: if (len >= maxlen) {
! 255: PUTC(KGDB_BADP);
! 256: continue;
! 257: }
! 258:
! 259: csum -= digit2i(GETC()) * 16;
! 260: csum -= digit2i(GETC());
! 261:
! 262: if (csum == 0) {
! 263: PUTC(KGDB_GOODP);
! 264: /* Sequence present? */
! 265: if (bp[2] == ':') {
! 266: PUTC(bp[0]);
! 267: PUTC(bp[1]);
! 268: len -= 3;
! 269: kgdb_copy(bp + 3, bp, len);
! 270: }
! 271: break;
! 272: }
! 273: PUTC(KGDB_BADP);
! 274: } while (1);
! 275: #ifdef DEBUG_KGDB
! 276: printf("kgdb_recv: %s\n", bp);
! 277: #endif
! 278: return (len);
! 279: }
! 280:
! 281: /*
! 282: * This is called by the appropriate tty driver.
! 283: */
! 284: void
! 285: kgdb_attach(int (*getfn)(void *), void (*putfn)(void *, int), void *ioarg)
! 286: {
! 287: kgdb_getc = getfn;
! 288: kgdb_putc = putfn;
! 289: kgdb_ioarg = ioarg;
! 290: }
! 291:
! 292: /*
! 293: * This function does all command processing for interfacing to
! 294: * a remote gdb. Note that the error codes are ignored by gdb
! 295: * at present, but might eventually become meaningful. (XXX)
! 296: * It might makes sense to use POSIX errno values, because
! 297: * that is what the gdb/remote.c functions want to return.
! 298: */
! 299: int
! 300: kgdb_trap(int type, db_regs_t *regs)
! 301: {
! 302: label_t jmpbuf;
! 303: vaddr_t addr;
! 304: size_t len;
! 305: u_char *p;
! 306:
! 307: if (kgdb_dev < 0 || kgdb_getc == NULL) {
! 308: /* not debugging */
! 309: return (0);
! 310: }
! 311:
! 312: /* Detect and recover from unexpected traps. */
! 313: if (kgdb_recover != 0) {
! 314: printf("kgdb: caught trap 0x%x at %p\n",
! 315: type, (void *)PC_REGS(regs));
! 316: kgdb_send("E0E"); /* 14==EFAULT */
! 317: longjmp(kgdb_recover);
! 318: }
! 319:
! 320: /*
! 321: * The first entry to this function is normally through
! 322: * a breakpoint trap in kgdb_connect(), in which case we
! 323: * must advance past the breakpoint because gdb will not.
! 324: *
! 325: * Machines vary as to where they leave the PC after a
! 326: * breakpoint trap. Those that leave the PC set to the
! 327: * address of the trap instruction (i.e. pc532) will not
! 328: * define FIXUP_PC_AFTER_BREAK(), and therefore will just
! 329: * advance the PC. On machines that leave the PC set to
! 330: * the instruction after the trap, FIXUP_PC_AFTER_BREAK
! 331: * will be defined to back-up the PC, so that after the
! 332: * "first-time" part of the if statement below has run,
! 333: * the PC will be the same as it was on entry.
! 334: *
! 335: * On the first entry here, we expect that gdb is not yet
! 336: * listening to us, so just enter the interaction loop.
! 337: * After the debugger is "active" (connected) it will be
! 338: * waiting for a "signaled" message from us.
! 339: */
! 340: if (kgdb_active == 0) {
! 341: if (!IS_BREAKPOINT_TRAP(type, 0)) {
! 342: /* No debugger active -- let trap handle this. */
! 343: return (0);
! 344: }
! 345: /* Make the PC point at the breakpoint... */
! 346: #ifdef FIXUP_PC_AFTER_BREAK
! 347: FIXUP_PC_AFTER_BREAK(regs);
! 348: #endif
! 349: /* ... and then advance past it. */
! 350: #ifdef PC_ADVANCE
! 351: PC_ADVANCE(regs);
! 352: #else
! 353: PC_REGS(regs) += BKPT_SIZE;
! 354: #endif
! 355: kgdb_active = 1;
! 356: } else {
! 357: /* Tell remote host that an exception has occurred. */
! 358: snprintf(buffer, sizeof buffer, "S%02x", kgdb_signal(type));
! 359: kgdb_send(buffer);
! 360: }
! 361:
! 362: /* Stick frame regs into our reg cache. */
! 363: kgdb_getregs(regs, gdb_regs);
! 364:
! 365: /*
! 366: * Interact with gdb until it lets us go.
! 367: * If we cause a trap, resume here.
! 368: */
! 369: (void)setjmp((kgdb_recover = &jmpbuf));
! 370: for (;;) {
! 371: kgdb_recv(buffer, sizeof(buffer));
! 372: switch (buffer[0]) {
! 373:
! 374: default:
! 375: /* Unknown command. */
! 376: kgdb_send("");
! 377: continue;
! 378:
! 379: case KGDB_SIGNAL:
! 380: /*
! 381: * if this command came from a running gdb,
! 382: * answer it -- the other guy has no way of
! 383: * knowing if we're in or out of this loop
! 384: * when he issues a "remote-signal".
! 385: */
! 386: snprintf(buffer, sizeof buffer, "S%02x",
! 387: kgdb_signal(type));
! 388: kgdb_send(buffer);
! 389: continue;
! 390:
! 391: case KGDB_REG_R:
! 392: mem2hex(buffer, gdb_regs, sizeof(gdb_regs));
! 393: kgdb_send(buffer);
! 394: continue;
! 395:
! 396: case KGDB_REG_W:
! 397: p = hex2mem(gdb_regs, buffer + 1, sizeof(gdb_regs));
! 398: if (p == NULL || *p != '\0')
! 399: kgdb_send("E01");
! 400: else {
! 401: kgdb_setregs(regs, gdb_regs);
! 402: kgdb_send("OK");
! 403: }
! 404: continue;
! 405:
! 406: case KGDB_MEM_R:
! 407: p = buffer + 1;
! 408: addr = hex2i(&p);
! 409: if (*p++ != ',') {
! 410: kgdb_send("E02");
! 411: continue;
! 412: }
! 413: len = hex2i(&p);
! 414: if (*p != '\0') {
! 415: kgdb_send("E03");
! 416: continue;
! 417: }
! 418: if (len > sizeof(buffer) / 2) {
! 419: kgdb_send("E04");
! 420: continue;
! 421: }
! 422: if (kgdb_acc(addr, len) == 0) {
! 423: kgdb_send("E05");
! 424: continue;
! 425: }
! 426: db_read_bytes(addr, (size_t)len,
! 427: (char *)buffer + sizeof(buffer) / 2);
! 428: mem2hex(buffer, buffer + sizeof(buffer) / 2, len);
! 429: kgdb_send(buffer);
! 430: continue;
! 431:
! 432: case KGDB_MEM_W:
! 433: p = buffer + 1;
! 434: addr = hex2i(&p);
! 435: if (*p++ != ',') {
! 436: kgdb_send("E06");
! 437: continue;
! 438: }
! 439: len = hex2i(&p);
! 440: if (*p++ != ':') {
! 441: kgdb_send("E07");
! 442: continue;
! 443: }
! 444: if (len > (sizeof(buffer) - (p - buffer))) {
! 445: kgdb_send("E08");
! 446: continue;
! 447: }
! 448: p = hex2mem(buffer, p, sizeof(buffer));
! 449: if (p == NULL) {
! 450: kgdb_send("E09");
! 451: continue;
! 452: }
! 453: if (kgdb_acc(addr, len) == 0) {
! 454: kgdb_send("E0A");
! 455: continue;
! 456: }
! 457: db_write_bytes(addr, (size_t)len, (char *)buffer);
! 458: kgdb_send("OK");
! 459: continue;
! 460:
! 461: case KGDB_DETACH:
! 462: kgdb_active = 0;
! 463: printf("kgdb detached\n");
! 464: db_clear_single_step(regs);
! 465: kgdb_send("OK");
! 466: goto out;
! 467:
! 468: case KGDB_KILL:
! 469: kgdb_active = 0;
! 470: printf("kgdb detached\n");
! 471: db_clear_single_step(regs);
! 472: goto out;
! 473:
! 474: case KGDB_CONT:
! 475: if (buffer[1]) {
! 476: p = buffer + 1;
! 477: addr = hex2i(&p);
! 478: if (*p) {
! 479: kgdb_send("E0B");
! 480: continue;
! 481: }
! 482: PC_REGS(regs) = addr;
! 483: }
! 484: db_clear_single_step(regs);
! 485: goto out;
! 486:
! 487: case KGDB_STEP:
! 488: if (buffer[1]) {
! 489: p = buffer + 1;
! 490: addr = hex2i(&p);
! 491: if (*p) {
! 492: kgdb_send("E0B");
! 493: continue;
! 494: }
! 495: PC_REGS(regs) = addr;
! 496: }
! 497: db_set_single_step(regs);
! 498: goto out;
! 499: }
! 500: }
! 501: out:
! 502: kgdb_recover = 0;
! 503: return (1);
! 504: }
! 505:
! 506: /*
! 507: * Trap into kgdb to wait for debugger to connect,
! 508: * noting on the console why nothing else is going on.
! 509: */
! 510: void
! 511: kgdb_connect(int verbose)
! 512: {
! 513: if (kgdb_dev < 0)
! 514: return;
! 515:
! 516: KGDB_PREPARE;
! 517:
! 518: if (verbose)
! 519: printf("kgdb waiting...");
! 520:
! 521: KGDB_ENTER;
! 522:
! 523: if (verbose)
! 524: printf("connected.\n");
! 525:
! 526: kgdb_debug_panic = 1;
! 527: }
! 528:
! 529: /*
! 530: * Decide what to do on panic.
! 531: * (This is called by panic, like Debugger())
! 532: */
! 533: void
! 534: kgdb_panic()
! 535: {
! 536: if (kgdb_dev >= 0 && kgdb_debug_panic) {
! 537: printf("entering kgdb\n");
! 538: kgdb_connect(kgdb_active == 0);
! 539: }
! 540: }
CVSweb