Subversion Repositories HelenOS

Rev

Rev 4343 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
614 palkovsky 1
/*
2071 jermar 2
 * Copyright (c) 2005 Ondrej Palkovsky
614 palkovsky 3
 * All rights reserved.
4
 *
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
7
 * are met:
8
 *
9
 * - Redistributions of source code must retain the above copyright
10
 *   notice, this list of conditions and the following disclaimer.
11
 * - Redistributions in binary form must reproduce the above copyright
12
 *   notice, this list of conditions and the following disclaimer in the
13
 *   documentation and/or other materials provided with the distribution.
14
 * - The name of the author may not be used to endorse or promote products
15
 *   derived from this software without specific prior written permission.
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
 */
28
 
1888 jermar 29
/** @addtogroup mips32debug
1702 cejka 30
 * @{
31
 */
32
/** @file
33
 */
34
 
614 palkovsky 35
#include <arch/debugger.h>
3153 svoboda 36
#include <arch/barrier.h>
614 palkovsky 37
#include <memstr.h>
38
#include <console/kconsole.h>
39
#include <console/cmd.h>
40
#include <print.h>
41
#include <panic.h>
42
#include <arch.h>
43
#include <arch/cp0.h>
44
#include <func.h>
4346 svoboda 45
#include <symtab.h>
614 palkovsky 46
 
47
bpinfo_t breakpoints[BKPOINTS_MAX];
623 jermar 48
SPINLOCK_INITIALIZE(bkpoint_lock);
614 palkovsky 49
 
4337 svoboda 50
#ifdef CONFIG_KCONSOLE
51
 
614 palkovsky 52
static int cmd_print_breakpoints(cmd_arg_t *argv);
673 jermar 53
static cmd_info_t bkpts_info = {
54
    .name = "bkpts",
614 palkovsky 55
    .description = "Print breakpoint table.",
56
    .func = cmd_print_breakpoints,
57
    .argc = 0,
58
};
59
 
60
static int cmd_del_breakpoint(cmd_arg_t *argv);
61
static cmd_arg_t del_argv = {
62
    .type = ARG_TYPE_INT
63
};
64
static cmd_info_t delbkpt_info = {
65
    .name = "delbkpt",
66
    .description = "delbkpt <number> - Delete breakpoint.",
67
    .func = cmd_del_breakpoint,
68
    .argc = 1,
69
    .argv = &del_argv
70
};
71
 
72
static int cmd_add_breakpoint(cmd_arg_t *argv);
73
static cmd_arg_t add_argv = {
74
    .type = ARG_TYPE_INT
75
};
76
static cmd_info_t addbkpt_info = {
77
    .name = "addbkpt",
3153 svoboda 78
    .description = "addbkpt <&symbol> - new bkpoint. Break on J/Branch "
79
        "insts unsupported.",
614 palkovsky 80
    .func = cmd_add_breakpoint,
81
    .argc = 1,
82
    .argv = &add_argv
83
};
84
 
635 palkovsky 85
static cmd_arg_t adde_argv[] = {
86
    { .type = ARG_TYPE_INT },
87
    { .type = ARG_TYPE_INT }
88
};
89
static cmd_info_t addbkpte_info = {
90
    .name = "addbkpte",
3153 svoboda 91
    .description = "addebkpte <&symbol> <&func> - new bkpoint. Call "
92
        "func(or Nothing if 0).",
635 palkovsky 93
    .func = cmd_add_breakpoint,
94
    .argc = 2,
95
    .argv = adde_argv
96
};
97
 
98
static struct {
1780 jermar 99
    uint32_t andmask;
100
    uint32_t value;
3153 svoboda 101
} jmpinstr[] = {
635 palkovsky 102
    {0xf3ff0000, 0x41000000}, /* BCzF */
103
    {0xf3ff0000, 0x41020000}, /* BCzFL */
104
    {0xf3ff0000, 0x41010000}, /* BCzT */
105
    {0xf3ff0000, 0x41030000}, /* BCzTL */
106
    {0xfc000000, 0x10000000}, /* BEQ */
107
    {0xfc000000, 0x50000000}, /* BEQL */
108
    {0xfc1f0000, 0x04010000}, /* BEQL */
109
    {0xfc1f0000, 0x04110000}, /* BGEZAL */
110
    {0xfc1f0000, 0x04130000}, /* BGEZALL */
111
    {0xfc1f0000, 0x04030000}, /* BGEZL */
112
    {0xfc1f0000, 0x1c000000}, /* BGTZ */
113
    {0xfc1f0000, 0x5c000000}, /* BGTZL */
114
    {0xfc1f0000, 0x18000000}, /* BLEZ */
115
    {0xfc1f0000, 0x58000000}, /* BLEZL */
116
    {0xfc1f0000, 0x04000000}, /* BLTZ */
117
    {0xfc1f0000, 0x04100000}, /* BLTZAL */
118
    {0xfc1f0000, 0x04120000}, /* BLTZALL */
119
    {0xfc1f0000, 0x04020000}, /* BLTZL */
120
    {0xfc000000, 0x14000000}, /* BNE */
121
    {0xfc000000, 0x54000000}, /* BNEL */
122
    {0xfc000000, 0x08000000}, /* J */
123
    {0xfc000000, 0x0c000000}, /* JAL */
124
    {0xfc1f07ff, 0x00000009}, /* JALR */
3153 svoboda 125
    {0, 0} /* EndOfTable */
635 palkovsky 126
};
127
 
4337 svoboda 128
 
635 palkovsky 129
/** Test, if the given instruction is a jump or branch instruction
130
 *
131
 * @param instr Instruction code
132
 * @return true - it is jump instruction, false otherwise
4337 svoboda 133
 *
635 palkovsky 134
 */
1780 jermar 135
static bool is_jump(unative_t instr)
635 palkovsky 136
{
137
    int i;
138
 
3153 svoboda 139
    for (i = 0; jmpinstr[i].andmask; i++) {
635 palkovsky 140
        if ((instr & jmpinstr[i].andmask) == jmpinstr[i].value)
141
            return true;
142
    }
143
 
144
    return false;
145
}
146
 
614 palkovsky 147
/** Add new breakpoint to table */
148
int cmd_add_breakpoint(cmd_arg_t *argv)
149
{
150
    bpinfo_t *cur = NULL;
151
    ipl_t ipl;
152
    int i;
153
 
154
    if (argv->intval & 0x3) {
155
        printf("Not aligned instruction, forgot to use &symbol?\n");
156
        return 1;
157
    }
158
    ipl = interrupts_disable();
159
    spinlock_lock(&bkpoint_lock);
160
 
161
    /* Check, that the breakpoints do not conflict */
3149 svoboda 162
    for (i = 0; i < BKPOINTS_MAX; i++) {
1780 jermar 163
        if (breakpoints[i].address == (uintptr_t)argv->intval) {
614 palkovsky 164
            printf("Duplicate breakpoint %d.\n", i);
4343 svoboda 165
            spinlock_unlock(&bkpoint_lock);
614 palkovsky 166
            return 0;
3153 svoboda 167
        } else if (breakpoints[i].address == (uintptr_t)argv->intval +
168
            sizeof(unative_t) || breakpoints[i].address ==
169
            (uintptr_t)argv->intval - sizeof(unative_t)) {
170
            printf("Adjacent breakpoints not supported, conflict "
171
                "with %d.\n", i);
4343 svoboda 172
            spinlock_unlock(&bkpoint_lock);
614 palkovsky 173
            return 0;
174
        }
4343 svoboda 175
 
614 palkovsky 176
    }
177
 
3153 svoboda 178
    for (i = 0; i < BKPOINTS_MAX; i++)
614 palkovsky 179
        if (!breakpoints[i].address) {
180
            cur = &breakpoints[i];
181
            break;
182
        }
183
    if (!cur) {
184
        printf("Too many breakpoints.\n");
185
        spinlock_unlock(&bkpoint_lock);
186
        interrupts_restore(ipl);
187
        return 0;
188
    }
1780 jermar 189
    cur->address = (uintptr_t) argv->intval;
614 palkovsky 190
    printf("Adding breakpoint on address: %p\n", argv->intval);
1780 jermar 191
    cur->instruction = ((unative_t *)cur->address)[0];
192
    cur->nextinstruction = ((unative_t *)cur->address)[1];
635 palkovsky 193
    if (argv == &add_argv) {
194
        cur->flags = 0;
195
    } else { /* We are add extended */
196
        cur->flags = BKPOINT_FUNCCALL;
3153 svoboda 197
        cur->bkfunc = (void (*)(void *, istate_t *)) argv[1].intval;
635 palkovsky 198
    }
199
    if (is_jump(cur->instruction))
200
        cur->flags |= BKPOINT_ONESHOT;
201
    cur->counter = 0;
614 palkovsky 202
 
203
    /* Set breakpoint */
1780 jermar 204
    *((unative_t *)cur->address) = 0x0d;
3153 svoboda 205
    smc_coherence(cur->address);
614 palkovsky 206
 
207
    spinlock_unlock(&bkpoint_lock);
208
    interrupts_restore(ipl);
209
 
210
    return 1;
211
}
212
 
213
/** Remove breakpoint from table */
214
int cmd_del_breakpoint(cmd_arg_t *argv)
215
{
216
    bpinfo_t *cur;
217
    ipl_t ipl;
218
 
2745 decky 219
    if (argv->intval > BKPOINTS_MAX) {
614 palkovsky 220
        printf("Invalid breakpoint number.\n");
221
        return 0;
222
    }
223
    ipl = interrupts_disable();
224
    spinlock_lock(&bkpoint_lock);
225
 
226
    cur = &breakpoints[argv->intval];
227
    if (!cur->address) {
228
        printf("Breakpoint does not exist.\n");
229
        spinlock_unlock(&bkpoint_lock);
230
        interrupts_restore(ipl);
231
        return 0;
232
    }
635 palkovsky 233
    if ((cur->flags & BKPOINT_INPROG) && (cur->flags & BKPOINT_ONESHOT)) {
234
        printf("Cannot remove one-shot breakpoint in-progress\n");
235
        spinlock_unlock(&bkpoint_lock);
236
        interrupts_restore(ipl);
237
        return 0;
238
    }
1780 jermar 239
    ((uint32_t *)cur->address)[0] = cur->instruction;
3153 svoboda 240
    smc_coherence(((uint32_t *)cur->address)[0]);
1780 jermar 241
    ((uint32_t *)cur->address)[1] = cur->nextinstruction;
3153 svoboda 242
    smc_coherence(((uint32_t *)cur->address)[1]);
614 palkovsky 243
 
244
    cur->address = NULL;
245
 
246
    spinlock_unlock(&bkpoint_lock);
247
    interrupts_restore(ipl);
248
    return 1;
249
}
250
 
251
/** Print table of active breakpoints */
252
int cmd_print_breakpoints(cmd_arg_t *argv)
253
{
2719 decky 254
    unsigned int i;
614 palkovsky 255
    char *symbol;
2719 decky 256
 
257
    printf("#  Count Address    INPROG ONESHOT FUNCCALL In symbol\n");
258
    printf("-- ----- ---------- ------ ------- -------- ---------\n");
259
 
260
    for (i = 0; i < BKPOINTS_MAX; i++)
614 palkovsky 261
        if (breakpoints[i].address) {
4346 svoboda 262
            symbol = symtab_fmt_name_lookup(
263
                breakpoints[i].address);
264
 
2719 decky 265
            printf("%-2u %-5d %#10zx %-6s %-7s %-8s %s\n", i,
3153 svoboda 266
                breakpoints[i].counter, breakpoints[i].address,
267
                ((breakpoints[i].flags & BKPOINT_INPROG) ? "true" :
268
                "false"), ((breakpoints[i].flags & BKPOINT_ONESHOT)
269
                ? "true" : "false"), ((breakpoints[i].flags &
270
                BKPOINT_FUNCCALL) ? "true" : "false"), symbol);
614 palkovsky 271
        }
272
    return 1;
273
}
274
 
4337 svoboda 275
#endif
276
 
614 palkovsky 277
/** Initialize debugger */
278
void debugger_init()
279
{
280
    int i;
281
 
3153 svoboda 282
    for (i = 0; i < BKPOINTS_MAX; i++)
614 palkovsky 283
        breakpoints[i].address = NULL;
4337 svoboda 284
 
285
#ifdef CONFIG_KCONSOLE
673 jermar 286
    cmd_initialize(&bkpts_info);
287
    if (!cmd_register(&bkpts_info))
4337 svoboda 288
        printf("Cannot register command %s\n", bkpts_info.name);
614 palkovsky 289
 
290
    cmd_initialize(&delbkpt_info);
291
    if (!cmd_register(&delbkpt_info))
4337 svoboda 292
        printf("Cannot register command %s\n", delbkpt_info.name);
614 palkovsky 293
 
294
    cmd_initialize(&addbkpt_info);
295
    if (!cmd_register(&addbkpt_info))
4337 svoboda 296
        printf("Cannot register command %s\n", addbkpt_info.name);
635 palkovsky 297
 
298
    cmd_initialize(&addbkpte_info);
299
    if (!cmd_register(&addbkpte_info))
4337 svoboda 300
        printf("Cannot register command %s\n", addbkpte_info.name);
301
#endif
614 palkovsky 302
}
303
 
304
/** Handle breakpoint
305
 *
306
 * Find breakpoint in breakpoint table.
307
 * If found, call kconsole, set break on next instruction and reexecute.
308
 * If we are on "next instruction", set it back on the first and reexecute.
309
 * If breakpoint not found in breakpoint table, call kconsole and start
310
 * next instruction.
311
 */
958 jermar 312
void debugger_bpoint(istate_t *istate)
614 palkovsky 313
{
314
    bpinfo_t *cur = NULL;
1780 jermar 315
    uintptr_t fireaddr = istate->epc;
614 palkovsky 316
    int i;
317
 
318
    /* test branch delay slot */
319
    if (cp0_cause_read() & 0x80000000)
4339 svoboda 320
        panic("Breakpoint in branch delay slot not supported.");
614 palkovsky 321
 
322
    spinlock_lock(&bkpoint_lock);
3153 svoboda 323
    for (i = 0; i < BKPOINTS_MAX; i++) {
635 palkovsky 324
        /* Normal breakpoint */
3153 svoboda 325
        if (fireaddr == breakpoints[i].address &&
326
            !(breakpoints[i].flags & BKPOINT_REINST)) {
614 palkovsky 327
            cur = &breakpoints[i];
635 palkovsky 328
            break;
329
        }
330
        /* Reinst only breakpoint */
3153 svoboda 331
        if ((breakpoints[i].flags & BKPOINT_REINST) &&
332
            (fireaddr == breakpoints[i].address + sizeof(unative_t))) {
635 palkovsky 333
            cur = &breakpoints[i];
334
            break;
335
        }
614 palkovsky 336
    }
337
    if (cur) {
635 palkovsky 338
        if (cur->flags & BKPOINT_REINST) {
614 palkovsky 339
            /* Set breakpoint on first instruction */
1780 jermar 340
            ((uint32_t *)cur->address)[0] = 0x0d;
3153 svoboda 341
            smc_coherence(((uint32_t *)cur->address)[0]);
614 palkovsky 342
            /* Return back the second */
1780 jermar 343
            ((uint32_t *)cur->address)[1] = cur->nextinstruction;
3153 svoboda 344
            smc_coherence(((uint32_t *)cur->address)[1]);
635 palkovsky 345
            cur->flags &= ~BKPOINT_REINST;
614 palkovsky 346
            spinlock_unlock(&bkpoint_lock);
347
            return;
635 palkovsky 348
        }
349
        if (cur->flags & BKPOINT_INPROG)
350
            printf("Warning: breakpoint recursion\n");
351
 
4346 svoboda 352
        if (!(cur->flags & BKPOINT_FUNCCALL)) {
3153 svoboda 353
            printf("***Breakpoint %d: %p in %s.\n", i, fireaddr,
4346 svoboda 354
                symtab_fmt_name_lookup(istate->epc));
355
        }
635 palkovsky 356
 
357
        /* Return first instruction back */
1780 jermar 358
        ((uint32_t *)cur->address)[0] = cur->instruction;
3153 svoboda 359
        smc_coherence(cur->address);
635 palkovsky 360
 
361
        if (! (cur->flags & BKPOINT_ONESHOT)) {
362
            /* Set Breakpoint on next instruction */
1780 jermar 363
            ((uint32_t *)cur->address)[1] = 0x0d;
635 palkovsky 364
            cur->flags |= BKPOINT_REINST;
365
        }
366
        cur->flags |= BKPOINT_INPROG;
614 palkovsky 367
    } else {
4346 svoboda 368
        printf("***Breakpoint %d: %p in %s.\n", i, fireaddr,
369
            symtab_fmt_name_lookup(fireaddr));
370
 
614 palkovsky 371
        /* Move on to next instruction */
958 jermar 372
        istate->epc += 4;
614 palkovsky 373
    }
850 palkovsky 374
    if (cur)
375
        cur->counter++;
635 palkovsky 376
    if (cur && (cur->flags & BKPOINT_FUNCCALL)) {
377
        /* Allow zero bkfunc, just for counting */
378
        if (cur->bkfunc)
958 jermar 379
            cur->bkfunc(cur, istate);
635 palkovsky 380
    } else {
4337 svoboda 381
#ifdef CONFIG_KCONSOLE
635 palkovsky 382
        /* This disables all other processors - we are not SMP,
383
         * actually this gets us to cpu_halt, if scheduler() is run
384
         * - we generally do not want scheduler to be run from debug,
385
         *   so this is a good idea
386
         */
4337 svoboda 387
        atomic_set(&haltstate, 1);
635 palkovsky 388
        spinlock_unlock(&bkpoint_lock);
4337 svoboda 389
 
4346 svoboda 390
        kconsole("debug", "Debug console ready.\n", false);
4337 svoboda 391
 
635 palkovsky 392
        spinlock_lock(&bkpoint_lock);
4337 svoboda 393
        atomic_set(&haltstate, 0);
394
#endif
635 palkovsky 395
    }
396
    if (cur && cur->address == fireaddr && (cur->flags & BKPOINT_INPROG)) {
397
        /* Remove one-shot breakpoint */
398
        if ((cur->flags & BKPOINT_ONESHOT))
399
            cur->address = NULL;
400
        /* Remove in-progress flag */
401
        cur->flags &= ~BKPOINT_INPROG;
402
    }
614 palkovsky 403
    spinlock_unlock(&bkpoint_lock);
404
}
1702 cejka 405
 
1888 jermar 406
/** @}
1702 cejka 407
 */