Rev 2886 | Rev 2888 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 2886 | Rev 2887 | ||
---|---|---|---|
Line 13... | Line 13... | ||
13 | #include <arch.h> |
13 | #include <arch.h> |
14 | #include <errno.h> |
14 | #include <errno.h> |
15 | #include <ipc/ipc.h> |
15 | #include <ipc/ipc.h> |
16 | #include <syscall/copy.h> |
16 | #include <syscall/copy.h> |
17 | #include <udebug/udebug.h> |
17 | #include <udebug/udebug.h> |
- | 18 | #include <udebug/udebug_ops.h> |
|
18 | #include <udebug/udebug_ipc.h> |
19 | #include <udebug/udebug_ipc.h> |
19 | 20 | ||
20 | /** |
- | |
21 | * Prepare a thread for a debugging operation. |
- | |
22 | * |
- | |
23 | * Simply put, return thread t with t->debug_lock held, |
- | |
24 | * but only if it verifies all conditions. |
- | |
25 | * |
- | |
26 | * Specifically, verifies that thread t exists, is a userspace thread, |
- | |
27 | * and belongs to the current task (TASK). It also locks t->debug_lock, |
- | |
28 | * making sure that t->debug_active is true - that the thread is |
- | |
29 | * in a valid debugging session. |
- | |
30 | * |
- | |
31 | * Returns EOK if all went well, or an error code otherwise. |
- | |
32 | * Interrupts must be already disabled when calling this function. |
- | |
33 | * |
- | |
34 | * Note: This function sports complicated locking. |
- | |
35 | */ |
- | |
36 | static int _thread_op_begin(thread_t *t) |
- | |
37 | { |
- | |
38 | int rc; |
- | |
39 | task_id_t taskid; |
- | |
40 | - | ||
41 | taskid = TASK->taskid; |
- | |
42 | - | ||
43 | /* Must lock threads_lock to ensure continued existence of the thread */ |
- | |
44 | spinlock_lock(&threads_lock); |
- | |
45 | - | ||
46 | if (!thread_exists(t)) { |
- | |
47 | spinlock_unlock(&threads_lock); |
- | |
48 | return ENOENT; |
- | |
49 | } |
- | |
50 | - | ||
51 | spinlock_lock(&t->debug_lock); |
- | |
52 | spinlock_lock(&t->lock); |
- | |
53 | - | ||
54 | /* Now verify that it's the current task */ |
- | |
55 | if (t->task != TASK) { |
- | |
56 | /* No such thread belonging to callee */ |
- | |
57 | rc = ENOENT; |
- | |
58 | goto error_exit; |
- | |
59 | } |
- | |
60 | - | ||
61 | /* Verify that 't' is a userspace thread */ |
- | |
62 | if ((t->flags & THREAD_FLAG_USPACE) == 0) { |
- | |
63 | /* It's not, deny its existence */ |
- | |
64 | rc = ENOENT; |
- | |
65 | goto error_exit; |
- | |
66 | } |
- | |
67 | - | ||
68 | if ((t->debug_active != true) || (t->debug_stop != true)) { |
- | |
69 | /* Not in debugging session or already has GO */ |
- | |
70 | rc = ENOENT; |
- | |
71 | goto error_exit; |
- | |
72 | } |
- | |
73 | - | ||
74 | spinlock_unlock(&threads_lock); |
- | |
75 | spinlock_unlock(&t->lock); |
- | |
76 | - | ||
77 | /* Only t->debug_lock left */ |
- | |
78 | - | ||
79 | return EOK; /* All went well */ |
- | |
80 | - | ||
81 | - | ||
82 | /* Executed when a check on the thread fails */ |
- | |
83 | error_exit: |
- | |
84 | spinlock_unlock(&t->lock); |
- | |
85 | spinlock_unlock(&t->debug_lock); |
- | |
86 | spinlock_unlock(&threads_lock); |
- | |
87 | - | ||
88 | /* No locks left here */ |
- | |
89 | return rc; /* Some errors occured */ |
- | |
90 | } |
- | |
91 | - | ||
92 | - | ||
93 | static void _thread_op_end(thread_t *t) |
- | |
94 | { |
- | |
95 | spinlock_unlock(&t->debug_lock); |
- | |
96 | } |
- | |
97 | - | ||
98 | static int udebug_rp_regs_write(call_t *call, phone_t *phone) |
21 | static int udebug_rp_regs_write(call_t *call, phone_t *phone) |
99 | { |
22 | { |
100 | void *uspace_data; |
23 | void *uspace_data; |
101 | unative_t to_copy; |
24 | unative_t to_copy; |
102 | int rc; |
25 | int rc; |
Line 167... | Line 90... | ||
167 | return 0; |
90 | return 0; |
168 | } |
91 | } |
169 | 92 | ||
170 | static void udebug_receive_begin(call_t *call) |
93 | static void udebug_receive_begin(call_t *call) |
171 | { |
94 | { |
172 | ipl_t ipl; |
- | |
173 | int reply; |
95 | int rc; |
174 | - | ||
175 | thread_t *t; |
- | |
176 | link_t *cur; |
- | |
177 | - | ||
178 | klog_printf("debug_begin()"); |
- | |
179 | - | ||
180 | ipl = interrupts_disable(); |
- | |
181 | klog_printf("debugging task %llu", TASK->taskid); |
- | |
182 | - | ||
183 | spinlock_lock(&TASK->lock); |
- | |
184 | - | ||
185 | if (TASK->dt_state != UDEBUG_TS_INACTIVE) { |
- | |
186 | spinlock_unlock(&TASK->lock); |
- | |
187 | interrupts_restore(ipl); |
- | |
188 | klog_printf("debug_begin(): busy error"); |
- | |
189 | 96 | ||
- | 97 | rc = udebug_begin(call); |
|
- | 98 | if (rc < 0) { |
|
190 | IPC_SET_RETVAL(call->data, EBUSY); |
99 | IPC_SET_RETVAL(call->data, rc); |
191 | ipc_answer(&TASK->kernel_box, call); |
100 | ipc_answer(&TASK->kernel_box, call); |
- | 101 | return; |
|
192 | } |
102 | } |
193 | 103 | ||
194 | TASK->dt_state = UDEBUG_TS_BEGINNING; |
- | |
195 | TASK->debug_begin_call = call; |
- | |
196 | TASK->debugger = call->sender; |
- | |
197 | - | ||
198 | if (TASK->not_stoppable_count == 0) { |
- | |
199 | TASK->dt_state = UDEBUG_TS_ACTIVE; |
- | |
200 | TASK->debug_begin_call = NULL; |
- | |
201 | reply = 1; /* immediate reply */ |
- | |
202 | } else { |
104 | if (rc != 0) { |
203 | reply = 0; /* no reply */ |
- | |
204 | } |
- | |
205 | - | ||
206 | /* Set debug_active on all of the task's userspace threads */ |
- | |
207 | - | ||
208 | for (cur = TASK->th_head.next; cur != &TASK->th_head; cur = cur->next) { |
- | |
209 | t = list_get_instance(cur, thread_t, th_link); |
- | |
210 | - | ||
211 | spinlock_lock(&t->debug_lock); |
105 | IPC_SET_RETVAL(call->data, 0); |
212 | if ((t->flags & THREAD_FLAG_USPACE) != 0) |
- | |
213 | t->debug_active = true; |
- | |
214 | spinlock_unlock(&t->debug_lock); |
106 | ipc_answer(&TASK->kernel_box, call); |
215 | } |
107 | } |
216 | - | ||
217 | spinlock_unlock(&TASK->lock); |
- | |
218 | interrupts_restore(ipl); |
- | |
219 | - | ||
220 | klog_printf("debug_begin() done (%s)", |
- | |
221 | reply ? "reply" : "stoppability wait"); |
- | |
222 | - | ||
223 | if (reply) ipc_answer(&TASK->kernel_box, call); |
- | |
224 | } |
108 | } |
225 | 109 | ||
226 | static void udebug_receive_end(call_t *call) |
110 | static void udebug_receive_end(call_t *call) |
227 | { |
111 | { |
228 | ipl_t ipl; |
- | |
229 | int rc; |
112 | int rc; |
230 | 113 | ||
231 | klog_printf("udebug_receive_end()"); |
- | |
232 | - | ||
233 | ipl = interrupts_disable(); |
- | |
234 | spinlock_lock(&TASK->lock); |
- | |
235 | - | ||
236 | rc = udebug_task_cleanup(TASK); |
114 | rc = udebug_end(); |
237 | - | ||
238 | klog_printf("task %llu", TASK->taskid); |
- | |
239 | 115 | ||
240 | spinlock_unlock(&TASK->lock); |
- | |
241 | interrupts_restore(ipl); |
- | |
242 | - | ||
243 | if (rc < 0) { |
- | |
244 | IPC_SET_RETVAL(call->data, EINVAL); |
- | |
245 | ipc_answer(&TASK->kernel_box, call); |
- | |
246 | return; |
- | |
247 | } |
- | |
248 | - | ||
249 | IPC_SET_RETVAL(call->data, 0); |
116 | IPC_SET_RETVAL(call->data, rc); |
250 | ipc_answer(&TASK->kernel_box, call); |
117 | ipc_answer(&TASK->kernel_box, call); |
251 | } |
118 | } |
252 | 119 | ||
253 | static void udebug_receive_go(call_t *call) |
120 | static void udebug_receive_go(call_t *call) |
254 | { |
121 | { |
255 | thread_t *t; |
122 | thread_t *t; |
256 | ipl_t ipl; |
- | |
257 | int rc; |
123 | int rc; |
258 | 124 | ||
259 | klog_printf("debug_go()"); |
125 | klog_printf("debug_go()"); |
260 | 126 | ||
261 | t = (thread_t *)IPC_GET_ARG2(call->data); |
127 | t = (thread_t *)IPC_GET_ARG2(call->data); |
262 | 128 | ||
263 | ipl = interrupts_disable(); |
- | |
264 | - | ||
265 | /* On success, this will lock t->debug_lock */ |
- | |
266 | rc = _thread_op_begin(t); |
129 | rc = udebug_go(t, call); |
267 | if (rc != EOK) { |
130 | if (rc < 0) { |
268 | interrupts_restore(ipl); |
- | |
269 | - | ||
270 | IPC_SET_RETVAL(call->data, rc); |
131 | IPC_SET_RETVAL(call->data, rc); |
271 | ipc_answer(&TASK->kernel_box, call); |
132 | ipc_answer(&TASK->kernel_box, call); |
272 | return; |
133 | return; |
273 | } |
134 | } |
274 | - | ||
275 | t->debug_go_call = call; |
- | |
276 | t->debug_stop = false; |
- | |
277 | t->cur_event = 0; /* none */ |
- | |
278 | - | ||
279 | /* |
- | |
280 | * Neither t's lock nor threads_lock may be held during wakeup |
- | |
281 | */ |
- | |
282 | waitq_wakeup(&t->go_wq, WAKEUP_FIRST); |
- | |
283 | - | ||
284 | _thread_op_end(t); |
- | |
285 | interrupts_restore(ipl); |
- | |
286 | - | ||
287 | /* No reply */ |
- | |
288 | } |
135 | } |
289 | 136 | ||
290 | 137 | ||
291 | static void udebug_receive_thread_read(call_t *call) |
138 | static void udebug_receive_thread_read(call_t *call) |
292 | { |
139 | { |
293 | thread_t *t; |
- | |
294 | link_t *cur; |
- | |
295 | unative_t uspace_addr; |
140 | unative_t uspace_addr; |
296 | unative_t to_copy; |
141 | unative_t to_copy; |
297 | unsigned total_bytes; |
142 | unsigned total_bytes; |
298 | unsigned buf_size; |
143 | unsigned buf_size; |
299 | unative_t tid; |
144 | void *buffer; |
300 | unsigned num_threads, copied_ids; |
- | |
301 | ipl_t ipl; |
145 | size_t n; |
302 | unative_t *buffer; |
- | |
303 | int flags; |
146 | int rc; |
304 | - | ||
305 | klog_printf("debug_thread_read()"); |
- | |
306 | - | ||
307 | ipl = interrupts_disable(); |
- | |
308 | spinlock_lock(&TASK->lock); |
- | |
309 | - | ||
310 | /* Verify task state */ |
- | |
311 | if (TASK->dt_state != UDEBUG_TS_ACTIVE) { |
- | |
312 | spinlock_unlock(&TASK->lock); |
- | |
313 | interrupts_restore(ipl); |
- | |
314 | 147 | ||
- | 148 | rc = udebug_thread_read(&buffer, &n); |
|
- | 149 | if (rc < 0) { |
|
315 | IPC_SET_RETVAL(call->data, EINVAL); |
150 | IPC_SET_RETVAL(call->data, rc); |
316 | ipc_answer(&TASK->kernel_box, call); |
151 | ipc_answer(&TASK->kernel_box, call); |
317 | return; |
152 | return; |
318 | } |
153 | } |
319 | 154 | ||
320 | /* Count the threads first */ |
- | |
321 | - | ||
322 | num_threads = 0; |
- | |
323 | for (cur = TASK->th_head.next; cur != &TASK->th_head; cur = cur->next) { |
- | |
324 | /* Count all threads, to be on the safe side */ |
- | |
325 | ++num_threads; |
- | |
326 | } |
- | |
327 | - | ||
328 | /* Allocate a buffer and copy down the threads' ids */ |
- | |
329 | buffer = malloc(num_threads * sizeof(unative_t), 0); // ??? |
- | |
330 | - | ||
331 | copied_ids = 0; |
- | |
332 | for (cur = TASK->th_head.next; cur != &TASK->th_head; cur = cur->next) { |
- | |
333 | t = list_get_instance(cur, thread_t, th_link); |
- | |
334 | - | ||
335 | spinlock_lock(&t->lock); |
- | |
336 | flags = t->flags; |
- | |
337 | spinlock_unlock(&t->lock); |
- | |
338 | - | ||
339 | /* Not interested in kernel threads */ |
- | |
340 | if ((flags & THREAD_FLAG_USPACE) != 0) { |
- | |
341 | /* Using thread struct pointer for identification */ |
- | |
342 | tid = (unative_t) t; |
- | |
343 | buffer[copied_ids++] = tid; |
- | |
344 | } |
- | |
345 | } |
- | |
346 | - | ||
347 | spinlock_unlock(&TASK->lock); |
- | |
348 | interrupts_restore(ipl); |
- | |
349 | - | ||
350 | /* |
155 | /* |
351 | * Prepare data and send it back through call->buffer |
156 | * Make use of call->buffer to transfer data to caller's userspace |
352 | */ |
157 | */ |
353 | 158 | ||
354 | uspace_addr = IPC_GET_ARG2(call->data); |
159 | uspace_addr = IPC_GET_ARG2(call->data); |
355 | buf_size = IPC_GET_ARG3(call->data); |
160 | buf_size = IPC_GET_ARG3(call->data); |
356 | 161 | ||
357 | total_bytes = copied_ids * sizeof(unative_t); |
162 | total_bytes = n; |
358 | 163 | ||
359 | if (buf_size > total_bytes) |
164 | if (buf_size > total_bytes) |
360 | to_copy = total_bytes; |
165 | to_copy = total_bytes; |
361 | else |
166 | else |
362 | to_copy = buf_size; |
167 | to_copy = buf_size; |
Line 367... | Line 172... | ||
367 | (no way to distinguish method in answer) */ |
172 | (no way to distinguish method in answer) */ |
368 | IPC_SET_ARG1(call->data, uspace_addr); |
173 | IPC_SET_ARG1(call->data, uspace_addr); |
369 | IPC_SET_ARG2(call->data, to_copy); |
174 | IPC_SET_ARG2(call->data, to_copy); |
370 | 175 | ||
371 | IPC_SET_ARG3(call->data, total_bytes); |
176 | IPC_SET_ARG3(call->data, total_bytes); |
372 | call->buffer = (void *)buffer; |
177 | call->buffer = buffer; |
373 | 178 | ||
374 | ipc_answer(&TASK->kernel_box, call); |
179 | ipc_answer(&TASK->kernel_box, call); |
375 | } |
180 | } |
376 | 181 | ||
377 | static void udebug_receive_args_read(call_t *call) |
182 | static void udebug_receive_args_read(call_t *call) |
378 | { |
183 | { |
379 | thread_t *t; |
184 | thread_t *t; |
380 | unative_t uspace_addr; |
185 | unative_t uspace_addr; |
381 | int rc; |
186 | int rc; |
382 | ipl_t ipl; |
- | |
383 | unative_t *buffer; |
187 | void *buffer; |
384 | - | ||
385 | klog_printf("debug_args_read()"); |
- | |
386 | 188 | ||
387 | t = (thread_t *)IPC_GET_ARG2(call->data); |
189 | t = (thread_t *)IPC_GET_ARG2(call->data); |
388 | 190 | ||
389 | ipl = interrupts_disable(); |
- | |
390 | - | ||
391 | /* On success, this will lock t->debug_lock */ |
- | |
392 | rc = _thread_op_begin(t); |
191 | rc = udebug_args_read(t, &buffer); |
393 | if (rc != EOK) { |
192 | if (rc != EOK) { |
394 | interrupts_restore(ipl); |
- | |
395 | IPC_SET_RETVAL(call->data, rc); |
193 | IPC_SET_RETVAL(call->data, rc); |
396 | ipc_answer(&TASK->kernel_box, call); |
194 | ipc_answer(&TASK->kernel_box, call); |
397 | return; |
195 | return; |
398 | } |
196 | } |
399 | 197 | ||
400 | /* Additionally we need to verify that we are inside a syscall */ |
- | |
401 | if (t->cur_event != UDEBUG_EVENT_SYSCALL) { |
- | |
402 | _thread_op_end(t); |
- | |
403 | interrupts_restore(ipl); |
- | |
404 | - | ||
405 | IPC_SET_RETVAL(call->data, EINVAL); |
- | |
406 | ipc_answer(&TASK->kernel_box, call); |
- | |
407 | return; |
- | |
408 | } |
- | |
409 | - | ||
410 | /* Copy to a local buffer before releasing the lock */ |
- | |
411 | buffer = malloc(6 * sizeof(unative_t), 0); // ??? |
- | |
412 | memcpy(buffer, t->syscall_args, 6 * sizeof(unative_t)); |
- | |
413 | - | ||
414 | _thread_op_end(t); |
- | |
415 | interrupts_restore(ipl); |
- | |
416 | - | ||
417 | /* |
198 | /* |
418 | * Make use of call->buffer to transfer data to caller's userspace |
199 | * Make use of call->buffer to transfer data to caller's userspace |
419 | */ |
200 | */ |
420 | 201 | ||
421 | uspace_addr = IPC_GET_ARG3(call->data); |
202 | uspace_addr = IPC_GET_ARG3(call->data); |
Line 424... | Line 205... | ||
424 | /* ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that |
205 | /* ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that |
425 | same code in process_answer() can be used |
206 | same code in process_answer() can be used |
426 | (no way to distinguish method in answer) */ |
207 | (no way to distinguish method in answer) */ |
427 | IPC_SET_ARG1(call->data, uspace_addr); |
208 | IPC_SET_ARG1(call->data, uspace_addr); |
428 | IPC_SET_ARG2(call->data, 6 * sizeof(unative_t)); |
209 | IPC_SET_ARG2(call->data, 6 * sizeof(unative_t)); |
429 | call->buffer = (void *)buffer; |
210 | call->buffer = buffer; |
430 | 211 | ||
431 | ipc_answer(&TASK->kernel_box, call); |
212 | ipc_answer(&TASK->kernel_box, call); |
432 | } |
213 | } |
433 | 214 | ||
434 | static void udebug_receive_regs_read(call_t *call) |
215 | static void udebug_receive_regs_read(call_t *call) |
Line 436... | Line 217... | ||
436 | thread_t *t; |
217 | thread_t *t; |
437 | unative_t uspace_addr; |
218 | unative_t uspace_addr; |
438 | unative_t to_copy; |
219 | unative_t to_copy; |
439 | unative_t buf_size; |
220 | unative_t buf_size; |
440 | unative_t total_bytes; |
221 | unative_t total_bytes; |
441 | istate_t *state; |
- | |
442 | void *buffer; |
222 | void *buffer; |
443 | int rc; |
223 | int rc; |
444 | ipl_t ipl; |
224 | size_t n; |
445 | 225 | ||
446 | klog_printf("debug_regs_read()"); |
226 | klog_printf("debug_regs_read()"); |
447 | 227 | ||
448 | t = (thread_t *) IPC_GET_ARG2(call->data); |
228 | t = (thread_t *) IPC_GET_ARG2(call->data); |
449 | 229 | ||
450 | ipl = interrupts_disable(); |
- | |
451 | - | ||
452 | /* On success, this will lock t->debug_lock */ |
- | |
453 | rc = _thread_op_begin(t); |
230 | rc = udebug_regs_read(t, &buffer, &n); |
454 | if (rc != EOK) { |
231 | if (rc < 0) { |
455 | interrupts_restore(ipl); |
- | |
456 | - | ||
457 | IPC_SET_RETVAL(call->data, rc); |
232 | IPC_SET_RETVAL(call->data, rc); |
458 | ipc_answer(&TASK->kernel_box, call); |
233 | ipc_answer(&TASK->kernel_box, call); |
459 | return; |
234 | return; |
460 | } |
235 | } |
461 | 236 | ||
462 | state = t->uspace_state; |
- | |
463 | if (state == NULL) { |
- | |
464 | _thread_op_end(t); |
- | |
465 | interrupts_restore(ipl); |
- | |
466 | klog_printf("debug_regs_read() - istate not available"); |
- | |
467 | - | ||
468 | IPC_SET_RETVAL(call->data, EBUSY); |
- | |
469 | ipc_answer(&TASK->kernel_box, call); |
- | |
470 | return; |
- | |
471 | } |
- | |
472 | - | ||
473 | /* Copy to an allocated buffer */ |
- | |
474 | buffer = malloc(sizeof(istate_t), 0); // ??? |
- | |
475 | memcpy(buffer, state, sizeof(istate_t)); |
- | |
476 | - | ||
477 | _thread_op_end(t); |
- | |
478 | interrupts_restore(ipl); |
- | |
479 | - | ||
480 | /* |
237 | /* |
481 | * Make use of call->buffer to transfer data to caller's userspace |
238 | * Make use of call->buffer to transfer data to caller's userspace |
482 | */ |
239 | */ |
483 | 240 | ||
484 | uspace_addr = IPC_GET_ARG3(call->data); |
241 | uspace_addr = IPC_GET_ARG3(call->data); |
485 | buf_size = IPC_GET_ARG4(call->data); |
242 | buf_size = IPC_GET_ARG4(call->data); |
486 | 243 | ||
487 | total_bytes = sizeof(istate_t); |
244 | total_bytes = n; |
488 | 245 | ||
489 | if (buf_size > total_bytes) |
246 | if (buf_size > total_bytes) |
490 | to_copy = total_bytes; |
247 | to_copy = total_bytes; |
491 | else |
248 | else |
492 | to_copy = buf_size; |
249 | to_copy = buf_size; |
Line 497... | Line 254... | ||
497 | (no way to distinguish method in answer) */ |
254 | (no way to distinguish method in answer) */ |
498 | IPC_SET_ARG1(call->data, uspace_addr); |
255 | IPC_SET_ARG1(call->data, uspace_addr); |
499 | IPC_SET_ARG2(call->data, to_copy); |
256 | IPC_SET_ARG2(call->data, to_copy); |
500 | 257 | ||
501 | IPC_SET_ARG3(call->data, total_bytes); |
258 | IPC_SET_ARG3(call->data, total_bytes); |
502 | call->buffer = (void *)buffer; |
259 | call->buffer = buffer; |
503 | 260 | ||
504 | ipc_answer(&TASK->kernel_box, call); |
261 | ipc_answer(&TASK->kernel_box, call); |
505 | } |
262 | } |
506 | 263 | ||
507 | static void udebug_receive_regs_write(call_t *call) |
264 | static void udebug_receive_regs_write(call_t *call) |
508 | { |
265 | { |
509 | thread_t *t; |
266 | thread_t *t; |
510 | void *uspace_data; |
267 | void *uspace_data; |
511 | unative_t to_copy; |
268 | unative_t to_copy; |
512 | int rc; |
269 | int rc; |
513 | istate_t *state; |
- | |
514 | ipl_t ipl; |
- | |
515 | - | ||
516 | klog_printf("debug_regs_write()"); |
- | |
517 | 270 | ||
518 | uspace_data = (void *)IPC_GET_ARG3(call->data); |
271 | uspace_data = (void *)IPC_GET_ARG3(call->data); |
519 | to_copy = IPC_GET_ARG4(call->data); |
272 | to_copy = IPC_GET_ARG4(call->data); |
520 | 273 | ||
521 | /* Try to change the thread's uspace_state */ |
- | |
522 | - | ||
523 | ipl = interrupts_disable(); |
- | |
524 | t = (thread_t *) IPC_GET_ARG2(call->data); |
274 | t = (thread_t *) IPC_GET_ARG2(call->data); |
525 | 275 | ||
526 | /* On success, this will lock t->debug_lock */ |
276 | rc = udebug_regs_write(t, call->buffer); |
527 | rc = _thread_op_begin(t); |
- | |
528 | if (rc != EOK) { |
277 | if (rc < 0) { |
529 | interrupts_restore(ipl); |
- | |
530 | - | ||
531 | IPC_SET_RETVAL(call->data, rc); |
278 | IPC_SET_RETVAL(call->data, rc); |
532 | ipc_answer(&TASK->kernel_box, call); |
279 | ipc_answer(&TASK->kernel_box, call); |
533 | return; |
280 | return; |
534 | } |
281 | } |
535 | 282 | ||
536 | state = t->uspace_state; |
- | |
537 | if (state == NULL) { |
- | |
538 | _thread_op_end(t); |
- | |
539 | interrupts_restore(ipl); |
- | |
540 | klog_printf("debug_regs_write() - istate not available"); |
- | |
541 | - | ||
542 | IPC_SET_RETVAL(call->data, EBUSY); |
- | |
543 | ipc_answer(&TASK->kernel_box, call); |
- | |
544 | return; |
- | |
545 | } |
- | |
546 | - | ||
547 | memcpy(t->uspace_state, call->buffer, sizeof(t->uspace_state)); |
- | |
548 | - | ||
549 | _thread_op_end(t); |
- | |
550 | interrupts_restore(ipl); |
- | |
551 | - | ||
552 | /* Set answer values */ |
283 | /* Set answer values */ |
553 | 284 | ||
554 | IPC_SET_ARG1(call->data, to_copy); |
285 | IPC_SET_ARG1(call->data, to_copy); |
555 | IPC_SET_ARG2(call->data, sizeof(istate_t)); |
286 | IPC_SET_ARG2(call->data, sizeof(istate_t)); |
556 | 287 | ||
557 | IPC_SET_RETVAL(call->data, 0); |
288 | IPC_SET_RETVAL(call->data, 0); |
- | 289 | free(call->buffer); |
|
558 | ipc_answer(&TASK->kernel_box, call); |
290 | call->buffer = NULL; |
559 | 291 | ||
560 | klog_printf("debug_regs_write() done"); |
292 | ipc_answer(&TASK->kernel_box, call); |
561 | } |
293 | } |
562 | 294 | ||
563 | 295 | ||
564 | static void udebug_receive_mem_read(call_t *call) |
296 | static void udebug_receive_mem_read(call_t *call) |
565 | { |
297 | { |
566 | unative_t uspace_dst; |
298 | unative_t uspace_dst; |
567 | void *uspace_ptr; |
299 | unative_t uspace_src; |
568 | unsigned size; |
300 | unsigned size; |
569 | void *buffer; |
301 | void *buffer; |
570 | int rc; |
302 | int rc; |
571 | 303 | ||
572 | klog_printf("debug_mem_read()"); |
- | |
573 | uspace_dst = IPC_GET_ARG2(call->data); |
304 | uspace_dst = IPC_GET_ARG2(call->data); |
574 | uspace_ptr = (void *)IPC_GET_ARG3(call->data); |
305 | uspace_src = IPC_GET_ARG3(call->data); |
575 | size = IPC_GET_ARG4(call->data); |
306 | size = IPC_GET_ARG4(call->data); |
576 | 307 | ||
577 | buffer = malloc(size, 0); // ??? |
- | |
578 | klog_printf("debug_mem_read: src=%u, size=%u", uspace_ptr, size); |
308 | rc = udebug_mem_read(uspace_src, size, &buffer); |
579 | - | ||
580 | /* NOTE: this is not strictly from a syscall... but that shouldn't |
- | |
581 | * be a problem */ |
- | |
582 | rc = copy_from_uspace(buffer, uspace_ptr, size); |
- | |
583 | if (rc) { |
309 | if (rc < 0) { |
584 | IPC_SET_RETVAL(call->data, rc); |
310 | IPC_SET_RETVAL(call->data, rc); |
585 | ipc_answer(&TASK->kernel_box, call); |
311 | ipc_answer(&TASK->kernel_box, call); |
586 | return; |
312 | return; |
587 | } |
313 | } |
588 | 314 | ||
589 | klog_printf("first word: %u", *((unative_t *)buffer)); |
- | |
590 | - | ||
591 | IPC_SET_RETVAL(call->data, 0); |
315 | IPC_SET_RETVAL(call->data, 0); |
592 | /* Hack: ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that |
316 | /* ARG1=dest, ARG2=size as in IPC_M_DATA_READ so that |
593 | same code in process_answer() can be used |
317 | same code in process_answer() can be used |
594 | (no way to distinguish method in answer) */ |
318 | (no way to distinguish method in answer) */ |
595 | IPC_SET_ARG1(call->data, uspace_dst); |
319 | IPC_SET_ARG1(call->data, uspace_dst); |
596 | IPC_SET_ARG2(call->data, size); |
320 | IPC_SET_ARG2(call->data, size); |
597 | call->buffer = buffer; |
321 | call->buffer = buffer; |
Line 599... | Line 323... | ||
599 | ipc_answer(&TASK->kernel_box, call); |
323 | ipc_answer(&TASK->kernel_box, call); |
600 | } |
324 | } |
601 | 325 | ||
602 | static void udebug_receive_mem_write(call_t *call) |
326 | static void udebug_receive_mem_write(call_t *call) |
603 | { |
327 | { |
604 | void *uspace_dst; |
328 | unative_t uspace_dst; |
605 | unsigned size; |
329 | unsigned size; |
606 | void *buffer; |
- | |
607 | int rc; |
330 | int rc; |
608 | udebug_task_state_t dts; |
- | |
609 | 331 | ||
610 | klog_printf("udebug_receive_mem_write()"); |
332 | klog_printf("udebug_receive_mem_write()"); |
611 | 333 | ||
612 | /* Verify task state */ |
- | |
613 | spinlock_lock(&TASK->lock); |
- | |
614 | dts = TASK->dt_state; |
- | |
615 | spinlock_unlock(&TASK->lock); |
- | |
616 | - | ||
617 | if (dts != UDEBUG_TS_ACTIVE) { |
- | |
618 | IPC_SET_RETVAL(call->data, EBUSY); |
- | |
619 | ipc_answer(&TASK->kernel_box, call); |
- | |
620 | return; |
- | |
621 | } |
- | |
622 | - | ||
623 | uspace_dst = (void *)IPC_GET_ARG3(call->data); |
334 | uspace_dst = IPC_GET_ARG3(call->data); |
624 | size = IPC_GET_ARG4(call->data); |
335 | size = IPC_GET_ARG4(call->data); |
625 | 336 | ||
626 | buffer = call->buffer; |
- | |
627 | klog_printf("dst=%u, size=%u", uspace_dst, size); |
- | |
628 | - | ||
629 | /* NOTE: this is not strictly from a syscall... but that shouldn't |
- | |
630 | * be a problem */ |
- | |
631 | rc = copy_to_uspace(uspace_dst, buffer, size); |
337 | rc = udebug_mem_write(uspace_dst, call->buffer, size); |
632 | if (rc) { |
338 | if (rc < 0) { |
633 | IPC_SET_RETVAL(call->data, rc); |
339 | IPC_SET_RETVAL(call->data, rc); |
634 | ipc_answer(&TASK->kernel_box, call); |
340 | ipc_answer(&TASK->kernel_box, call); |
635 | return; |
341 | return; |
636 | } |
342 | } |
637 | 343 | ||
638 | IPC_SET_RETVAL(call->data, 0); |
344 | IPC_SET_RETVAL(call->data, 0); |
639 | - | ||
640 | free(call->buffer); |
345 | free(call->buffer); |
641 | call->buffer = NULL; |
346 | call->buffer = NULL; |
642 | 347 | ||
643 | ipc_answer(&TASK->kernel_box, call); |
348 | ipc_answer(&TASK->kernel_box, call); |
644 | } |
349 | } |