Subversion Repositories HelenOS

Rev

Rev 2886 | Rev 2888 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 2886 Rev 2887
Line 13... Line 13...
13
#include <arch.h>
13
#include <arch.h>
14
#include <errno.h>
14
#include <errno.h>
15
#include <ipc/ipc.h>
15
#include <ipc/ipc.h>
16
#include <syscall/copy.h>
16
#include <syscall/copy.h>
17
#include <udebug/udebug.h>
17
#include <udebug/udebug.h>
-
 
18
#include <udebug/udebug_ops.h>
18
#include <udebug/udebug_ipc.h>
19
#include <udebug/udebug_ipc.h>
19
 
20
 
20
/**
-
 
21
 * Prepare a thread for a debugging operation.
-
 
22
 *
-
 
23
 * Simply put, return thread t with t->debug_lock held,
-
 
24
 * but only if it verifies all conditions.
-
 
25
 *
-
 
26
 * Specifically, verifies that thread t exists, is a userspace thread,
-
 
27
 * and belongs to the current task (TASK). It also locks t->debug_lock,
-
 
28
 * making sure that t->debug_active is true - that the thread is
-
 
29
 * in a valid debugging session.
-
 
30
 *
-
 
31
 * Returns EOK if all went well, or an error code otherwise.
-
 
32
 * Interrupts must be already disabled when calling this function.
-
 
33
 *
-
 
34
 * Note: This function sports complicated locking.
-
 
35
 */
-
 
36
static int _thread_op_begin(thread_t *t)
-
 
37
{
-
 
38
    int rc;
-
 
39
    task_id_t taskid;
-
 
40
 
-
 
41
    taskid = TASK->taskid;
-
 
42
 
-
 
43
    /* Must lock threads_lock to ensure continued existence of the thread */
-
 
44
    spinlock_lock(&threads_lock);
-
 
45
 
-
 
46
    if (!thread_exists(t)) {
-
 
47
        spinlock_unlock(&threads_lock);
-
 
48
        return ENOENT;
-
 
49
    }
-
 
50
 
-
 
51
    spinlock_lock(&t->debug_lock);
-
 
52
    spinlock_lock(&t->lock);
-
 
53
   
-
 
54
    /* Now verify that it's the current task */
-
 
55
    if (t->task != TASK) {
-
 
56
        /* No such thread belonging to callee */
-
 
57
        rc = ENOENT;
-
 
58
        goto error_exit;
-
 
59
    }
-
 
60
 
-
 
61
    /* Verify that 't' is a userspace thread */
-
 
62
    if ((t->flags & THREAD_FLAG_USPACE) == 0) {
-
 
63
        /* It's not, deny its existence */
-
 
64
        rc = ENOENT;
-
 
65
        goto error_exit;
-
 
66
    }
-
 
67
 
-
 
68
    if ((t->debug_active != true) || (t->debug_stop != true)) {
-
 
69
        /* Not in debugging session or already has GO */
-
 
70
        rc = ENOENT;
-
 
71
        goto error_exit;
-
 
72
    }
-
 
73
 
-
 
74
    spinlock_unlock(&threads_lock);
-
 
75
    spinlock_unlock(&t->lock);
-
 
76
 
-
 
77
    /* Only t->debug_lock left */
-
 
78
 
-
 
79
    return EOK; /* All went well */
-
 
80
 
-
 
81
 
-
 
82
    /* Executed when a check on the thread fails */
-
 
83
error_exit:
-
 
84
    spinlock_unlock(&t->lock);
-
 
85
    spinlock_unlock(&t->debug_lock);
-
 
86
    spinlock_unlock(&threads_lock);
-
 
87
 
-
 
88
    /* No locks left here */
-
 
89
    return rc;  /* Some errors occured */
-
 
90
}
-
 
91
 
-
 
92
 
-
 
93
static void _thread_op_end(thread_t *t)
-
 
94
{
-
 
95
    spinlock_unlock(&t->debug_lock);
-
 
96
}
-
 
97
 
-
 
98
static int udebug_rp_regs_write(call_t *call, phone_t *phone)
21
static int udebug_rp_regs_write(call_t *call, phone_t *phone)
99
{
22
{
100
    void *uspace_data;
23
    void *uspace_data;
101
    unative_t to_copy;
24
    unative_t to_copy;
102
    int rc;
25
    int rc;
Line 167... Line 90...
167
    return 0;
90
    return 0;
168
}
91
}
169
 
92
 
170
static void udebug_receive_begin(call_t *call)
93
static void udebug_receive_begin(call_t *call)
171
{
94
{
172
    ipl_t ipl;
-
 
173
    int reply;
95
    int rc;
174
 
-
 
175
    thread_t *t;
-
 
176
    link_t *cur;
-
 
177
 
-
 
178
    klog_printf("debug_begin()");
-
 
179
 
-
 
180
    ipl = interrupts_disable();
-
 
181
    klog_printf("debugging task %llu", TASK->taskid);
-
 
182
 
-
 
183
    spinlock_lock(&TASK->lock);
-
 
184
 
-
 
185
    if (TASK->dt_state != UDEBUG_TS_INACTIVE) {
-
 
186
        spinlock_unlock(&TASK->lock);
-
 
187
        interrupts_restore(ipl);
-
 
188
        klog_printf("debug_begin(): busy error");
-
 
189
 
96
 
-
 
97
    rc = udebug_begin(call);
-
 
98
    if (rc < 0) {
190
        IPC_SET_RETVAL(call->data, EBUSY);
99
        IPC_SET_RETVAL(call->data, rc);
191
        ipc_answer(&TASK->kernel_box, call);
100
        ipc_answer(&TASK->kernel_box, call);
-
 
101
        return;
192
    }
102
    }
193
 
103
 
194
    TASK->dt_state = UDEBUG_TS_BEGINNING;
-
 
195
    TASK->debug_begin_call = call;
-
 
196
    TASK->debugger = call->sender;
-
 
197
 
-
 
198
    if (TASK->not_stoppable_count == 0) {
-
 
199
        TASK->dt_state = UDEBUG_TS_ACTIVE;
-
 
200
        TASK->debug_begin_call = NULL;
-
 
201
        reply = 1; /* immediate reply */
-
 
202
    } else {
104
    if (rc != 0) {
203
        reply = 0; /* no reply */
-
 
204
    }
-
 
205
   
-
 
206
    /* Set debug_active on all of the task's userspace threads */
-
 
207
 
-
 
208
    for (cur = TASK->th_head.next; cur != &TASK->th_head; cur = cur->next) {
-
 
209
        t = list_get_instance(cur, thread_t, th_link);
-
 
210
 
-
 
211
        spinlock_lock(&t->debug_lock);
105
        IPC_SET_RETVAL(call->data, 0);
212
        if ((t->flags & THREAD_FLAG_USPACE) != 0)
-
 
213
            t->debug_active = true;
-
 
214
        spinlock_unlock(&t->debug_lock);
106
        ipc_answer(&TASK->kernel_box, call);
215
    }
107
    }
216
 
-
 
217
    spinlock_unlock(&TASK->lock);
-
 
218
    interrupts_restore(ipl);
-
 
219
 
-
 
220
    klog_printf("debug_begin() done (%s)",
-
 
221
        reply ? "reply" : "stoppability wait");
-
 
222
 
-
 
223
    if (reply) ipc_answer(&TASK->kernel_box, call);
-
 
224
}
108
}
225
 
109
 
226
static void udebug_receive_end(call_t *call)
110
static void udebug_receive_end(call_t *call)
227
{
111
{
228
    ipl_t ipl;
-
 
229
    int rc;
112
    int rc;
230
 
113
 
231
    klog_printf("udebug_receive_end()");
-
 
232
 
-
 
233
    ipl = interrupts_disable();
-
 
234
    spinlock_lock(&TASK->lock);
-
 
235
 
-
 
236
    rc = udebug_task_cleanup(TASK);
114
    rc = udebug_end();
237
 
-
 
238
    klog_printf("task %llu", TASK->taskid);
-
 
239
 
115
 
240
    spinlock_unlock(&TASK->lock);
-
 
241
    interrupts_restore(ipl);
-
 
242
 
-
 
243
    if (rc < 0) {
-
 
244
        IPC_SET_RETVAL(call->data, EINVAL);
-
 
245
        ipc_answer(&TASK->kernel_box, call);
-
 
246
        return;
-
 
247
    }
-
 
248
 
-
 
249
    IPC_SET_RETVAL(call->data, 0);
116
    IPC_SET_RETVAL(call->data, rc);
250
    ipc_answer(&TASK->kernel_box, call);
117
    ipc_answer(&TASK->kernel_box, call);
251
}
118
}
252
 
119
 
253
static void udebug_receive_go(call_t *call)
120
static void udebug_receive_go(call_t *call)
254
{
121
{
255
    thread_t *t;
122
    thread_t *t;
256
    ipl_t ipl;
-
 
257
    int rc;
123
    int rc;
258
 
124
 
259
    klog_printf("debug_go()");
125
    klog_printf("debug_go()");
260
 
126
 
261
    t = (thread_t *)IPC_GET_ARG2(call->data);
127
    t = (thread_t *)IPC_GET_ARG2(call->data);
262
 
128
 
263
    ipl = interrupts_disable();
-
 
264
 
-
 
265
    /* On success, this will lock t->debug_lock */
-
 
266
    rc = _thread_op_begin(t);
129
    rc = udebug_go(t, call);
267
    if (rc != EOK) {
130
    if (rc < 0) {
268
        interrupts_restore(ipl);
-
 
269
 
-
 
270
        IPC_SET_RETVAL(call->data, rc);
131
        IPC_SET_RETVAL(call->data, rc);
271
        ipc_answer(&TASK->kernel_box, call);
132
        ipc_answer(&TASK->kernel_box, call);
272
        return;
133
        return;
273
    }
134
    }
274
 
-
 
275
    t->debug_go_call = call;
-
 
276
    t->debug_stop = false;
-
 
277
    t->cur_event = 0;   /* none */
-
 
278
 
-
 
279
    /*
-
 
280
     * Neither t's lock nor threads_lock may be held during wakeup
-
 
281
     */
-
 
282
    waitq_wakeup(&t->go_wq, WAKEUP_FIRST);
-
 
283
 
-
 
284
    _thread_op_end(t);
-
 
285
    interrupts_restore(ipl);
-
 
286
 
-
 
287
    /* No reply */
-
 
288
}
135
}
289
 
136
 
290
 
137
 
291
static void udebug_receive_thread_read(call_t *call)
138
static void udebug_receive_thread_read(call_t *call)
292
{
139
{
293
    thread_t *t;
-
 
294
    link_t *cur;
-
 
295
    unative_t uspace_addr;
140
    unative_t uspace_addr;
296
    unative_t to_copy;
141
    unative_t to_copy;
297
    unsigned total_bytes;
142
    unsigned total_bytes;
298
    unsigned buf_size;
143
    unsigned buf_size;
299
    unative_t tid;
144
    void *buffer;
300
    unsigned num_threads, copied_ids;
-
 
301
    ipl_t ipl;
145
    size_t n;
302
    unative_t *buffer;
-
 
303
    int flags;
146
    int rc;
304
 
-
 
305
    klog_printf("debug_thread_read()");
-
 
306
 
-
 
307
    ipl = interrupts_disable();
-
 
308
    spinlock_lock(&TASK->lock);
-
 
309
 
-
 
310
    /* Verify task state */
-
 
311
    if (TASK->dt_state != UDEBUG_TS_ACTIVE) {
-
 
312
        spinlock_unlock(&TASK->lock);
-
 
313
        interrupts_restore(ipl);
-
 
314
 
147
 
-
 
148
    rc = udebug_thread_read(&buffer, &n);
-
 
149
    if (rc < 0) {
315
        IPC_SET_RETVAL(call->data, EINVAL);
150
        IPC_SET_RETVAL(call->data, rc);
316
        ipc_answer(&TASK->kernel_box, call);
151
        ipc_answer(&TASK->kernel_box, call);
317
        return;
152
        return;
318
    }
153
    }
319
 
154
 
320
    /* Count the threads first */
-
 
321
 
-
 
322
    num_threads = 0;
-
 
323
    for (cur = TASK->th_head.next; cur != &TASK->th_head; cur = cur->next) {
-
 
324
        /* Count all threads, to be on the safe side */
-
 
325
        ++num_threads;
-
 
326
    }
-
 
327
 
-
 
328
    /* Allocate a buffer and copy down the threads' ids */
-
 
329
    buffer = malloc(num_threads * sizeof(unative_t), 0); // ???
-
 
330
 
-
 
331
    copied_ids = 0;
-
 
332
    for (cur = TASK->th_head.next; cur != &TASK->th_head; cur = cur->next) {
-
 
333
        t = list_get_instance(cur, thread_t, th_link);
-
 
334
 
-
 
335
        spinlock_lock(&t->lock);
-
 
336
        flags = t->flags;
-
 
337
        spinlock_unlock(&t->lock);
-
 
338
 
-
 
339
        /* Not interested in kernel threads */
-
 
340
        if ((flags & THREAD_FLAG_USPACE) != 0) {
-
 
341
            /* Using thread struct pointer for identification */
-
 
342
            tid = (unative_t) t;
-
 
343
            buffer[copied_ids++] = tid;
-
 
344
        }
-
 
345
    }
-
 
346
 
-
 
347
    spinlock_unlock(&TASK->lock);
-
 
348
    interrupts_restore(ipl);
-
 
349
 
-
 
350
    /*
155
    /*
351
     * Prepare data and send it back through call->buffer
156
     * Make use of call->buffer to transfer data to caller's userspace
352
     */
157
     */
353
 
158
 
354
    uspace_addr = IPC_GET_ARG2(call->data);
159
    uspace_addr = IPC_GET_ARG2(call->data);
355
    buf_size = IPC_GET_ARG3(call->data);
160
    buf_size = IPC_GET_ARG3(call->data);
356
 
161
 
357
    total_bytes = copied_ids * sizeof(unative_t);
162
    total_bytes = n;
358
 
163
 
359
    if (buf_size > total_bytes)
164
    if (buf_size > total_bytes)
360
        to_copy = total_bytes;
165
        to_copy = total_bytes;
361
    else
166
    else
362
        to_copy = buf_size;
167
        to_copy = buf_size;
Line 367... Line 172...
367
       (no way to distinguish method in answer) */
172
       (no way to distinguish method in answer) */
368
    IPC_SET_ARG1(call->data, uspace_addr);
173
    IPC_SET_ARG1(call->data, uspace_addr);
369
    IPC_SET_ARG2(call->data, to_copy);
174
    IPC_SET_ARG2(call->data, to_copy);
370
 
175
 
371
    IPC_SET_ARG3(call->data, total_bytes);
176
    IPC_SET_ARG3(call->data, total_bytes);
372
    call->buffer = (void *)buffer;
177
    call->buffer = buffer;
373
 
178
 
374
    ipc_answer(&TASK->kernel_box, call);
179
    ipc_answer(&TASK->kernel_box, call);
375
}
180
}
376
 
181
 
377
static void udebug_receive_args_read(call_t *call)
182
static void udebug_receive_args_read(call_t *call)
378
{
183
{
379
    thread_t *t;
184
    thread_t *t;
380
    unative_t uspace_addr;
185
    unative_t uspace_addr;
381
    int rc;
186
    int rc;
382
    ipl_t ipl;
-
 
383
    unative_t *buffer;
187
    void *buffer;
384
 
-
 
385
    klog_printf("debug_args_read()");
-
 
386
 
188
 
387
    t = (thread_t *)IPC_GET_ARG2(call->data);
189
    t = (thread_t *)IPC_GET_ARG2(call->data);
388
 
190
 
389
    ipl = interrupts_disable();
-
 
390
 
-
 
391
    /* On success, this will lock t->debug_lock */
-
 
392
    rc = _thread_op_begin(t);
191
    rc = udebug_args_read(t, &buffer);
393
    if (rc != EOK) {
192
    if (rc != EOK) {
394
        interrupts_restore(ipl);
-
 
395
        IPC_SET_RETVAL(call->data, rc);
193
        IPC_SET_RETVAL(call->data, rc);
396
        ipc_answer(&TASK->kernel_box, call);
194
        ipc_answer(&TASK->kernel_box, call);
397
        return;
195
        return;
398
    }
196
    }
399
 
197
 
400
    /* Additionally we need to verify that we are inside a syscall */
-
 
401
    if (t->cur_event != UDEBUG_EVENT_SYSCALL) {
-
 
402
        _thread_op_end(t);
-
 
403
        interrupts_restore(ipl);
-
 
404
 
-
 
405
        IPC_SET_RETVAL(call->data, EINVAL);
-
 
406
        ipc_answer(&TASK->kernel_box, call);
-
 
407
        return;
-
 
408
    }
-
 
409
 
-
 
410
    /* Copy to a local buffer before releasing the lock */
-
 
411
    buffer = malloc(6 * sizeof(unative_t), 0); // ???
-
 
412
    memcpy(buffer, t->syscall_args, 6 * sizeof(unative_t));
-
 
413
 
-
 
414
    _thread_op_end(t);
-
 
415
    interrupts_restore(ipl);
-
 
416
 
-
 
417
    /*
198
    /*
418
     * Make use of call->buffer to transfer data to caller's userspace
199
     * Make use of call->buffer to transfer data to caller's userspace
419
     */
200
     */
420
 
201
 
421
    uspace_addr = IPC_GET_ARG3(call->data);
202
    uspace_addr = IPC_GET_ARG3(call->data);
Line 424... Line 205...
424
    /* ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that
205
    /* ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that
425
       same code in process_answer() can be used
206
       same code in process_answer() can be used
426
       (no way to distinguish method in answer) */
207
       (no way to distinguish method in answer) */
427
    IPC_SET_ARG1(call->data, uspace_addr);
208
    IPC_SET_ARG1(call->data, uspace_addr);
428
    IPC_SET_ARG2(call->data, 6 * sizeof(unative_t));
209
    IPC_SET_ARG2(call->data, 6 * sizeof(unative_t));
429
    call->buffer = (void *)buffer;
210
    call->buffer = buffer;
430
 
211
 
431
    ipc_answer(&TASK->kernel_box, call);
212
    ipc_answer(&TASK->kernel_box, call);
432
}
213
}
433
 
214
 
434
static void udebug_receive_regs_read(call_t *call)
215
static void udebug_receive_regs_read(call_t *call)
Line 436... Line 217...
436
    thread_t *t;
217
    thread_t *t;
437
    unative_t uspace_addr;
218
    unative_t uspace_addr;
438
    unative_t to_copy;
219
    unative_t to_copy;
439
    unative_t buf_size;
220
    unative_t buf_size;
440
    unative_t total_bytes;
221
    unative_t total_bytes;
441
    istate_t *state;
-
 
442
    void *buffer;
222
    void *buffer;
443
    int rc;
223
    int rc;
444
    ipl_t ipl;
224
    size_t n;
445
 
225
 
446
    klog_printf("debug_regs_read()");
226
    klog_printf("debug_regs_read()");
447
 
227
 
448
    t = (thread_t *) IPC_GET_ARG2(call->data);
228
    t = (thread_t *) IPC_GET_ARG2(call->data);
449
 
229
 
450
    ipl = interrupts_disable();
-
 
451
 
-
 
452
    /* On success, this will lock t->debug_lock */
-
 
453
    rc = _thread_op_begin(t);
230
    rc = udebug_regs_read(t, &buffer, &n);
454
    if (rc != EOK) {
231
    if (rc < 0) {
455
        interrupts_restore(ipl);
-
 
456
 
-
 
457
        IPC_SET_RETVAL(call->data, rc);
232
        IPC_SET_RETVAL(call->data, rc);
458
        ipc_answer(&TASK->kernel_box, call);
233
        ipc_answer(&TASK->kernel_box, call);
459
        return;
234
        return;
460
    }
235
    }
461
 
236
 
462
    state = t->uspace_state;
-
 
463
    if (state == NULL) {
-
 
464
        _thread_op_end(t);
-
 
465
        interrupts_restore(ipl);
-
 
466
        klog_printf("debug_regs_read() - istate not available");
-
 
467
 
-
 
468
        IPC_SET_RETVAL(call->data, EBUSY);
-
 
469
        ipc_answer(&TASK->kernel_box, call);
-
 
470
        return;
-
 
471
    }
-
 
472
 
-
 
473
    /* Copy to an allocated buffer */
-
 
474
    buffer = malloc(sizeof(istate_t), 0); // ???
-
 
475
    memcpy(buffer, state, sizeof(istate_t));
-
 
476
 
-
 
477
    _thread_op_end(t);
-
 
478
    interrupts_restore(ipl);
-
 
479
 
-
 
480
    /*
237
    /*
481
     * Make use of call->buffer to transfer data to caller's userspace
238
     * Make use of call->buffer to transfer data to caller's userspace
482
     */
239
     */
483
 
240
 
484
    uspace_addr = IPC_GET_ARG3(call->data);
241
    uspace_addr = IPC_GET_ARG3(call->data);
485
    buf_size = IPC_GET_ARG4(call->data);
242
    buf_size = IPC_GET_ARG4(call->data);
486
 
243
 
487
    total_bytes = sizeof(istate_t);
244
    total_bytes = n;
488
 
245
 
489
    if (buf_size > total_bytes)
246
    if (buf_size > total_bytes)
490
        to_copy = total_bytes;
247
        to_copy = total_bytes;
491
    else
248
    else
492
        to_copy = buf_size;
249
        to_copy = buf_size;
Line 497... Line 254...
497
       (no way to distinguish method in answer) */
254
       (no way to distinguish method in answer) */
498
    IPC_SET_ARG1(call->data, uspace_addr);
255
    IPC_SET_ARG1(call->data, uspace_addr);
499
    IPC_SET_ARG2(call->data, to_copy);
256
    IPC_SET_ARG2(call->data, to_copy);
500
 
257
 
501
    IPC_SET_ARG3(call->data, total_bytes);
258
    IPC_SET_ARG3(call->data, total_bytes);
502
    call->buffer = (void *)buffer;
259
    call->buffer = buffer;
503
 
260
 
504
    ipc_answer(&TASK->kernel_box, call);
261
    ipc_answer(&TASK->kernel_box, call);
505
}
262
}
506
 
263
 
507
static void udebug_receive_regs_write(call_t *call)
264
static void udebug_receive_regs_write(call_t *call)
508
{
265
{
509
    thread_t *t;
266
    thread_t *t;
510
    void *uspace_data;
267
    void *uspace_data;
511
    unative_t to_copy;
268
    unative_t to_copy;
512
    int rc;
269
    int rc;
513
    istate_t *state;
-
 
514
    ipl_t ipl;
-
 
515
 
-
 
516
    klog_printf("debug_regs_write()");
-
 
517
 
270
 
518
    uspace_data = (void *)IPC_GET_ARG3(call->data);
271
    uspace_data = (void *)IPC_GET_ARG3(call->data);
519
    to_copy = IPC_GET_ARG4(call->data);
272
    to_copy = IPC_GET_ARG4(call->data);
520
 
273
 
521
    /* Try to change the thread's uspace_state */
-
 
522
 
-
 
523
    ipl = interrupts_disable();
-
 
524
    t = (thread_t *) IPC_GET_ARG2(call->data);
274
    t = (thread_t *) IPC_GET_ARG2(call->data);
525
 
275
 
526
    /* On success, this will lock t->debug_lock */
276
    rc = udebug_regs_write(t, call->buffer);
527
    rc = _thread_op_begin(t);
-
 
528
    if (rc != EOK) {
277
    if (rc < 0) {
529
        interrupts_restore(ipl);
-
 
530
 
-
 
531
        IPC_SET_RETVAL(call->data, rc);
278
        IPC_SET_RETVAL(call->data, rc);
532
        ipc_answer(&TASK->kernel_box, call);
279
        ipc_answer(&TASK->kernel_box, call);
533
        return;
280
        return;
534
    }
281
    }
535
 
282
 
536
    state = t->uspace_state;
-
 
537
    if (state == NULL) {
-
 
538
        _thread_op_end(t);
-
 
539
        interrupts_restore(ipl);
-
 
540
        klog_printf("debug_regs_write() - istate not available");
-
 
541
 
-
 
542
        IPC_SET_RETVAL(call->data, EBUSY);
-
 
543
        ipc_answer(&TASK->kernel_box, call);
-
 
544
        return;
-
 
545
    }
-
 
546
 
-
 
547
    memcpy(t->uspace_state, call->buffer, sizeof(t->uspace_state));
-
 
548
 
-
 
549
    _thread_op_end(t);
-
 
550
    interrupts_restore(ipl);
-
 
551
 
-
 
552
    /* Set answer values */
283
    /* Set answer values */
553
 
284
 
554
    IPC_SET_ARG1(call->data, to_copy);
285
    IPC_SET_ARG1(call->data, to_copy);
555
    IPC_SET_ARG2(call->data, sizeof(istate_t));
286
    IPC_SET_ARG2(call->data, sizeof(istate_t));
556
 
287
 
557
    IPC_SET_RETVAL(call->data, 0);
288
    IPC_SET_RETVAL(call->data, 0);
-
 
289
    free(call->buffer);
558
    ipc_answer(&TASK->kernel_box, call);
290
    call->buffer = NULL;
559
 
291
 
560
    klog_printf("debug_regs_write() done");
292
    ipc_answer(&TASK->kernel_box, call);
561
}
293
}
562
 
294
 
563
 
295
 
564
static void udebug_receive_mem_read(call_t *call)
296
static void udebug_receive_mem_read(call_t *call)
565
{
297
{
566
    unative_t uspace_dst;
298
    unative_t uspace_dst;
567
    void *uspace_ptr;
299
    unative_t uspace_src;
568
    unsigned size;
300
    unsigned size;
569
    void *buffer;
301
    void *buffer;
570
    int rc;
302
    int rc;
571
 
303
 
572
    klog_printf("debug_mem_read()");
-
 
573
    uspace_dst = IPC_GET_ARG2(call->data);
304
    uspace_dst = IPC_GET_ARG2(call->data);
574
    uspace_ptr = (void *)IPC_GET_ARG3(call->data);
305
    uspace_src = IPC_GET_ARG3(call->data);
575
    size = IPC_GET_ARG4(call->data);
306
    size = IPC_GET_ARG4(call->data);
576
 
307
 
577
    buffer = malloc(size, 0); // ???
-
 
578
    klog_printf("debug_mem_read: src=%u, size=%u", uspace_ptr, size);
308
    rc = udebug_mem_read(uspace_src, size, &buffer);
579
 
-
 
580
    /* NOTE: this is not strictly from a syscall... but that shouldn't
-
 
581
     * be a problem */
-
 
582
    rc = copy_from_uspace(buffer, uspace_ptr, size);
-
 
583
    if (rc) {
309
    if (rc < 0) {
584
        IPC_SET_RETVAL(call->data, rc);
310
        IPC_SET_RETVAL(call->data, rc);
585
        ipc_answer(&TASK->kernel_box, call);
311
        ipc_answer(&TASK->kernel_box, call);
586
        return;
312
        return;
587
    }
313
    }
588
 
314
 
589
    klog_printf("first word: %u", *((unative_t *)buffer));
-
 
590
 
-
 
591
    IPC_SET_RETVAL(call->data, 0);
315
    IPC_SET_RETVAL(call->data, 0);
592
    /* Hack: ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that
316
    /* ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that
593
       same code in process_answer() can be used
317
       same code in process_answer() can be used
594
       (no way to distinguish method in answer) */
318
       (no way to distinguish method in answer) */
595
    IPC_SET_ARG1(call->data, uspace_dst);
319
    IPC_SET_ARG1(call->data, uspace_dst);
596
    IPC_SET_ARG2(call->data, size);
320
    IPC_SET_ARG2(call->data, size);
597
    call->buffer = buffer;
321
    call->buffer = buffer;
Line 599... Line 323...
599
    ipc_answer(&TASK->kernel_box, call);
323
    ipc_answer(&TASK->kernel_box, call);
600
}
324
}
601
 
325
 
602
static void udebug_receive_mem_write(call_t *call)
326
static void udebug_receive_mem_write(call_t *call)
603
{
327
{
604
    void *uspace_dst;
328
    unative_t uspace_dst;
605
    unsigned size;
329
    unsigned size;
606
    void *buffer;
-
 
607
    int rc;
330
    int rc;
608
    udebug_task_state_t dts;
-
 
609
 
331
 
610
    klog_printf("udebug_receive_mem_write()");
332
    klog_printf("udebug_receive_mem_write()");
611
 
333
 
612
    /* Verify task state */
-
 
613
    spinlock_lock(&TASK->lock);
-
 
614
    dts = TASK->dt_state;
-
 
615
    spinlock_unlock(&TASK->lock);
-
 
616
 
-
 
617
    if (dts != UDEBUG_TS_ACTIVE) {
-
 
618
        IPC_SET_RETVAL(call->data, EBUSY);
-
 
619
        ipc_answer(&TASK->kernel_box, call);
-
 
620
        return;
-
 
621
    }
-
 
622
   
-
 
623
    uspace_dst = (void *)IPC_GET_ARG3(call->data);
334
    uspace_dst = IPC_GET_ARG3(call->data);
624
    size = IPC_GET_ARG4(call->data);
335
    size = IPC_GET_ARG4(call->data);
625
 
336
 
626
    buffer = call->buffer;
-
 
627
    klog_printf("dst=%u, size=%u", uspace_dst, size);
-
 
628
 
-
 
629
    /* NOTE: this is not strictly from a syscall... but that shouldn't
-
 
630
     * be a problem */
-
 
631
    rc = copy_to_uspace(uspace_dst, buffer, size);
337
    rc = udebug_mem_write(uspace_dst, call->buffer, size);
632
    if (rc) {
338
    if (rc < 0) {
633
        IPC_SET_RETVAL(call->data, rc);
339
        IPC_SET_RETVAL(call->data, rc);
634
        ipc_answer(&TASK->kernel_box, call);
340
        ipc_answer(&TASK->kernel_box, call);
635
        return;
341
        return;
636
    }
342
    }
637
 
343
 
638
    IPC_SET_RETVAL(call->data, 0);
344
    IPC_SET_RETVAL(call->data, 0);
639
 
-
 
640
    free(call->buffer);
345
    free(call->buffer);
641
    call->buffer = NULL;
346
    call->buffer = NULL;
642
 
347
 
643
    ipc_answer(&TASK->kernel_box, call);
348
    ipc_answer(&TASK->kernel_box, call);
644
}
349
}