| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* $Id: sparc-stub.c,v 1.28 2001/10/30 04:54:21 davem Exp $ | 
|  | 2 | * sparc-stub.c:  KGDB support for the Linux kernel. | 
|  | 3 | * | 
|  | 4 | * Modifications to run under Linux | 
|  | 5 | * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu) | 
|  | 6 | * | 
|  | 7 | * This file originally came from the gdb sources, and the | 
|  | 8 | * copyright notices have been retained below. | 
|  | 9 | */ | 
|  | 10 |  | 
|  | 11 | /**************************************************************************** | 
|  | 12 |  | 
|  | 13 | THIS SOFTWARE IS NOT COPYRIGHTED | 
|  | 14 |  | 
|  | 15 | HP offers the following for use in the public domain.  HP makes no | 
|  | 16 | warranty with regard to the software or its performance and the | 
|  | 17 | user accepts the software "AS IS" with all faults. | 
|  | 18 |  | 
|  | 19 | HP DISCLAIMS ANY WARRANTIES, EXPRESS OR IMPLIED, WITH REGARD | 
|  | 20 | TO THIS SOFTWARE INCLUDING BUT NOT LIMITED TO THE WARRANTIES | 
|  | 21 | OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. | 
|  | 22 |  | 
|  | 23 | ****************************************************************************/ | 
|  | 24 |  | 
|  | 25 | /**************************************************************************** | 
|  | 26 | *  Header: remcom.c,v 1.34 91/03/09 12:29:49 glenne Exp $ | 
|  | 27 | * | 
|  | 28 | *  Module name: remcom.c $ | 
|  | 29 | *  Revision: 1.34 $ | 
|  | 30 | *  Date: 91/03/09 12:29:49 $ | 
|  | 31 | *  Contributor:     Lake Stevens Instrument Division$ | 
|  | 32 | * | 
|  | 33 | *  Description:     low level support for gdb debugger. $ | 
|  | 34 | * | 
|  | 35 | *  Considerations:  only works on target hardware $ | 
|  | 36 | * | 
|  | 37 | *  Written by:      Glenn Engel $ | 
|  | 38 | *  ModuleState:     Experimental $ | 
|  | 39 | * | 
|  | 40 | *  NOTES:           See Below $ | 
|  | 41 | * | 
|  | 42 | *  Modified for SPARC by Stu Grossman, Cygnus Support. | 
|  | 43 | * | 
|  | 44 | *  This code has been extensively tested on the Fujitsu SPARClite demo board. | 
|  | 45 | * | 
|  | 46 | *  To enable debugger support, two things need to happen.  One, a | 
|  | 47 | *  call to set_debug_traps() is necessary in order to allow any breakpoints | 
|  | 48 | *  or error conditions to be properly intercepted and reported to gdb. | 
|  | 49 | *  Two, a breakpoint needs to be generated to begin communication.  This | 
|  | 50 | *  is most easily accomplished by a call to breakpoint().  Breakpoint() | 
|  | 51 | *  simulates a breakpoint by executing a trap #1. | 
|  | 52 | * | 
|  | 53 | ************* | 
|  | 54 | * | 
|  | 55 | *    The following gdb commands are supported: | 
|  | 56 | * | 
|  | 57 | * command          function                               Return value | 
|  | 58 | * | 
|  | 59 | *    g             return the value of the CPU registers  hex data or ENN | 
|  | 60 | *    G             set the value of the CPU registers     OK or ENN | 
|  | 61 | * | 
|  | 62 | *    mAA..AA,LLLL  Read LLLL bytes at address AA..AA      hex data or ENN | 
|  | 63 | *    MAA..AA,LLLL: Write LLLL bytes at address AA.AA      OK or ENN | 
|  | 64 | * | 
|  | 65 | *    c             Resume at current address              SNN   ( signal NN) | 
|  | 66 | *    cAA..AA       Continue at address AA..AA             SNN | 
|  | 67 | * | 
|  | 68 | *    s             Step one instruction                   SNN | 
|  | 69 | *    sAA..AA       Step one instruction from AA..AA       SNN | 
|  | 70 | * | 
|  | 71 | *    k             kill | 
|  | 72 | * | 
|  | 73 | *    ?             What was the last sigval ?             SNN   (signal NN) | 
|  | 74 | * | 
|  | 75 | *    bBB..BB	    Set baud rate to BB..BB		   OK or BNN, then sets | 
|  | 76 | *							   baud rate | 
|  | 77 | * | 
|  | 78 | * All commands and responses are sent with a packet which includes a | 
|  | 79 | * checksum.  A packet consists of | 
|  | 80 | * | 
|  | 81 | * $<packet info>#<checksum>. | 
|  | 82 | * | 
|  | 83 | * where | 
|  | 84 | * <packet info> :: <characters representing the command or response> | 
|  | 85 | * <checksum>    :: < two hex digits computed as modulo 256 sum of <packetinfo>> | 
|  | 86 | * | 
|  | 87 | * When a packet is received, it is first acknowledged with either '+' or '-'. | 
|  | 88 | * '+' indicates a successful transfer.  '-' indicates a failed transfer. | 
|  | 89 | * | 
|  | 90 | * Example: | 
|  | 91 | * | 
|  | 92 | * Host:                  Reply: | 
|  | 93 | * $m0,10#2a               +$00010203040506070809101112131415#42 | 
|  | 94 | * | 
|  | 95 | ****************************************************************************/ | 
|  | 96 |  | 
|  | 97 | #include <linux/kernel.h> | 
|  | 98 | #include <linux/string.h> | 
|  | 99 | #include <linux/mm.h> | 
|  | 100 | #include <linux/smp.h> | 
|  | 101 | #include <linux/smp_lock.h> | 
|  | 102 |  | 
|  | 103 | #include <asm/system.h> | 
|  | 104 | #include <asm/signal.h> | 
|  | 105 | #include <asm/oplib.h> | 
|  | 106 | #include <asm/head.h> | 
|  | 107 | #include <asm/traps.h> | 
|  | 108 | #include <asm/vac-ops.h> | 
|  | 109 | #include <asm/kgdb.h> | 
|  | 110 | #include <asm/pgalloc.h> | 
|  | 111 | #include <asm/pgtable.h> | 
|  | 112 | #include <asm/cacheflush.h> | 
|  | 113 |  | 
|  | 114 | /* | 
|  | 115 | * | 
|  | 116 | * external low-level support routines | 
|  | 117 | */ | 
|  | 118 |  | 
|  | 119 | extern void putDebugChar(char);   /* write a single character      */ | 
|  | 120 | extern char getDebugChar(void);   /* read and return a single char */ | 
|  | 121 |  | 
|  | 122 | /* | 
|  | 123 | * BUFMAX defines the maximum number of characters in inbound/outbound buffers | 
|  | 124 | * at least NUMREGBYTES*2 are needed for register packets | 
|  | 125 | */ | 
|  | 126 | #define BUFMAX 2048 | 
|  | 127 |  | 
|  | 128 | static int initialized;	/* !0 means we've been initialized */ | 
|  | 129 |  | 
|  | 130 | static const char hexchars[]="0123456789abcdef"; | 
|  | 131 |  | 
|  | 132 | #define NUMREGS 72 | 
|  | 133 |  | 
|  | 134 | /* Number of bytes of registers.  */ | 
|  | 135 | #define NUMREGBYTES (NUMREGS * 4) | 
|  | 136 | enum regnames {G0, G1, G2, G3, G4, G5, G6, G7, | 
|  | 137 | O0, O1, O2, O3, O4, O5, SP, O7, | 
|  | 138 | L0, L1, L2, L3, L4, L5, L6, L7, | 
|  | 139 | I0, I1, I2, I3, I4, I5, FP, I7, | 
|  | 140 |  | 
|  | 141 | F0, F1, F2, F3, F4, F5, F6, F7, | 
|  | 142 | F8, F9, F10, F11, F12, F13, F14, F15, | 
|  | 143 | F16, F17, F18, F19, F20, F21, F22, F23, | 
|  | 144 | F24, F25, F26, F27, F28, F29, F30, F31, | 
|  | 145 | Y, PSR, WIM, TBR, PC, NPC, FPSR, CPSR }; | 
|  | 146 |  | 
|  | 147 |  | 
|  | 148 | extern void trap_low(void);  /* In arch/sparc/kernel/entry.S */ | 
|  | 149 |  | 
|  | 150 | unsigned long get_sun4cpte(unsigned long addr) | 
|  | 151 | { | 
|  | 152 | unsigned long entry; | 
|  | 153 |  | 
|  | 154 | __asm__ __volatile__("\n\tlda [%1] %2, %0\n\t" : | 
|  | 155 | "=r" (entry) : | 
|  | 156 | "r" (addr), "i" (ASI_PTE)); | 
|  | 157 | return entry; | 
|  | 158 | } | 
|  | 159 |  | 
|  | 160 | unsigned long get_sun4csegmap(unsigned long addr) | 
|  | 161 | { | 
|  | 162 | unsigned long entry; | 
|  | 163 |  | 
|  | 164 | __asm__ __volatile__("\n\tlduba [%1] %2, %0\n\t" : | 
|  | 165 | "=r" (entry) : | 
|  | 166 | "r" (addr), "i" (ASI_SEGMAP)); | 
|  | 167 | return entry; | 
|  | 168 | } | 
|  | 169 |  | 
|  | 170 | #if 0 | 
|  | 171 | /* Have to sort this out. This cannot be done after initialization. */ | 
|  | 172 | static void flush_cache_all_nop(void) {} | 
|  | 173 | #endif | 
|  | 174 |  | 
|  | 175 | /* Place where we save old trap entries for restoration */ | 
|  | 176 | struct tt_entry kgdb_savettable[256]; | 
|  | 177 | typedef void (*trapfunc_t)(void); | 
|  | 178 |  | 
|  | 179 | /* Helper routine for manipulation of kgdb_savettable */ | 
|  | 180 | static inline void copy_ttentry(struct tt_entry *src, struct tt_entry *dest) | 
|  | 181 | { | 
|  | 182 | dest->inst_one = src->inst_one; | 
|  | 183 | dest->inst_two = src->inst_two; | 
|  | 184 | dest->inst_three = src->inst_three; | 
|  | 185 | dest->inst_four = src->inst_four; | 
|  | 186 | } | 
|  | 187 |  | 
|  | 188 | /* Initialize the kgdb_savettable so that debugging can commence */ | 
|  | 189 | static void eh_init(void) | 
|  | 190 | { | 
|  | 191 | int i; | 
|  | 192 |  | 
|  | 193 | for(i=0; i < 256; i++) | 
|  | 194 | copy_ttentry(&sparc_ttable[i], &kgdb_savettable[i]); | 
|  | 195 | } | 
|  | 196 |  | 
|  | 197 | /* Install an exception handler for kgdb */ | 
|  | 198 | static void exceptionHandler(int tnum, trapfunc_t trap_entry) | 
|  | 199 | { | 
|  | 200 | unsigned long te_addr = (unsigned long) trap_entry; | 
|  | 201 |  | 
|  | 202 | /* Make new vector */ | 
|  | 203 | sparc_ttable[tnum].inst_one = | 
|  | 204 | SPARC_BRANCH((unsigned long) te_addr, | 
|  | 205 | (unsigned long) &sparc_ttable[tnum].inst_one); | 
|  | 206 | sparc_ttable[tnum].inst_two = SPARC_RD_PSR_L0; | 
|  | 207 | sparc_ttable[tnum].inst_three = SPARC_NOP; | 
|  | 208 | sparc_ttable[tnum].inst_four = SPARC_NOP; | 
|  | 209 | } | 
|  | 210 |  | 
|  | 211 | /* Convert ch from a hex digit to an int */ | 
|  | 212 | static int | 
|  | 213 | hex(unsigned char ch) | 
|  | 214 | { | 
|  | 215 | if (ch >= 'a' && ch <= 'f') | 
|  | 216 | return ch-'a'+10; | 
|  | 217 | if (ch >= '0' && ch <= '9') | 
|  | 218 | return ch-'0'; | 
|  | 219 | if (ch >= 'A' && ch <= 'F') | 
|  | 220 | return ch-'A'+10; | 
|  | 221 | return -1; | 
|  | 222 | } | 
|  | 223 |  | 
|  | 224 | /* scan for the sequence $<data>#<checksum>     */ | 
|  | 225 | static void | 
|  | 226 | getpacket(char *buffer) | 
|  | 227 | { | 
|  | 228 | unsigned char checksum; | 
|  | 229 | unsigned char xmitcsum; | 
|  | 230 | int i; | 
|  | 231 | int count; | 
|  | 232 | unsigned char ch; | 
|  | 233 |  | 
|  | 234 | do { | 
|  | 235 | /* wait around for the start character, ignore all other characters */ | 
|  | 236 | while ((ch = (getDebugChar() & 0x7f)) != '$') ; | 
|  | 237 |  | 
|  | 238 | checksum = 0; | 
|  | 239 | xmitcsum = -1; | 
|  | 240 |  | 
|  | 241 | count = 0; | 
|  | 242 |  | 
|  | 243 | /* now, read until a # or end of buffer is found */ | 
|  | 244 | while (count < BUFMAX) { | 
|  | 245 | ch = getDebugChar() & 0x7f; | 
|  | 246 | if (ch == '#') | 
|  | 247 | break; | 
|  | 248 | checksum = checksum + ch; | 
|  | 249 | buffer[count] = ch; | 
|  | 250 | count = count + 1; | 
|  | 251 | } | 
|  | 252 |  | 
|  | 253 | if (count >= BUFMAX) | 
|  | 254 | continue; | 
|  | 255 |  | 
|  | 256 | buffer[count] = 0; | 
|  | 257 |  | 
|  | 258 | if (ch == '#') { | 
|  | 259 | xmitcsum = hex(getDebugChar() & 0x7f) << 4; | 
|  | 260 | xmitcsum |= hex(getDebugChar() & 0x7f); | 
|  | 261 | if (checksum != xmitcsum) | 
|  | 262 | putDebugChar('-');	/* failed checksum */ | 
|  | 263 | else { | 
|  | 264 | putDebugChar('+'); /* successful transfer */ | 
|  | 265 | /* if a sequence char is present, reply the ID */ | 
|  | 266 | if (buffer[2] == ':') { | 
|  | 267 | putDebugChar(buffer[0]); | 
|  | 268 | putDebugChar(buffer[1]); | 
|  | 269 | /* remove sequence chars from buffer */ | 
|  | 270 | count = strlen(buffer); | 
|  | 271 | for (i=3; i <= count; i++) | 
|  | 272 | buffer[i-3] = buffer[i]; | 
|  | 273 | } | 
|  | 274 | } | 
|  | 275 | } | 
|  | 276 | } while (checksum != xmitcsum); | 
|  | 277 | } | 
|  | 278 |  | 
|  | 279 | /* send the packet in buffer.  */ | 
|  | 280 |  | 
|  | 281 | static void | 
|  | 282 | putpacket(unsigned char *buffer) | 
|  | 283 | { | 
|  | 284 | unsigned char checksum; | 
|  | 285 | int count; | 
|  | 286 | unsigned char ch, recv; | 
|  | 287 |  | 
|  | 288 | /*  $<packet info>#<checksum>. */ | 
|  | 289 | do { | 
|  | 290 | putDebugChar('$'); | 
|  | 291 | checksum = 0; | 
|  | 292 | count = 0; | 
|  | 293 |  | 
|  | 294 | while ((ch = buffer[count])) { | 
|  | 295 | putDebugChar(ch); | 
|  | 296 | checksum += ch; | 
|  | 297 | count += 1; | 
|  | 298 | } | 
|  | 299 |  | 
|  | 300 | putDebugChar('#'); | 
|  | 301 | putDebugChar(hexchars[checksum >> 4]); | 
|  | 302 | putDebugChar(hexchars[checksum & 0xf]); | 
|  | 303 | recv = getDebugChar(); | 
|  | 304 | } while ((recv & 0x7f) != '+'); | 
|  | 305 | } | 
|  | 306 |  | 
|  | 307 | static char remcomInBuffer[BUFMAX]; | 
|  | 308 | static char remcomOutBuffer[BUFMAX]; | 
|  | 309 |  | 
|  | 310 | /* Convert the memory pointed to by mem into hex, placing result in buf. | 
|  | 311 | * Return a pointer to the last char put in buf (null), in case of mem fault, | 
|  | 312 | * return 0. | 
|  | 313 | */ | 
|  | 314 |  | 
|  | 315 | static unsigned char * | 
|  | 316 | mem2hex(char *mem, char *buf, int count) | 
|  | 317 | { | 
|  | 318 | unsigned char ch; | 
|  | 319 |  | 
|  | 320 | while (count-- > 0) { | 
|  | 321 | /* This assembler code is basically:  ch = *mem++; | 
|  | 322 | * except that we use the SPARC/Linux exception table | 
|  | 323 | * mechanism (see how "fixup" works in kernel_mna_trap_fault) | 
|  | 324 | * to arrange for a "return 0" upon a memory fault | 
|  | 325 | */ | 
|  | 326 | __asm__( | 
|  | 327 | "\n1:\n\t" | 
|  | 328 | "ldub [%0], %1\n\t" | 
|  | 329 | "inc %0\n\t" | 
|  | 330 | ".section .fixup,#alloc,#execinstr\n\t" | 
|  | 331 | ".align 4\n" | 
|  | 332 | "2:\n\t" | 
|  | 333 | "retl\n\t" | 
|  | 334 | " mov 0, %%o0\n\t" | 
|  | 335 | ".section __ex_table, #alloc\n\t" | 
|  | 336 | ".align 4\n\t" | 
|  | 337 | ".word 1b, 2b\n\t" | 
|  | 338 | ".text\n" | 
|  | 339 | : "=r" (mem), "=r" (ch) : "0" (mem)); | 
|  | 340 | *buf++ = hexchars[ch >> 4]; | 
|  | 341 | *buf++ = hexchars[ch & 0xf]; | 
|  | 342 | } | 
|  | 343 |  | 
|  | 344 | *buf = 0; | 
|  | 345 | return buf; | 
|  | 346 | } | 
|  | 347 |  | 
|  | 348 | /* convert the hex array pointed to by buf into binary to be placed in mem | 
|  | 349 | * return a pointer to the character AFTER the last byte written. | 
|  | 350 | */ | 
|  | 351 | static char * | 
|  | 352 | hex2mem(char *buf, char *mem, int count) | 
|  | 353 | { | 
|  | 354 | int i; | 
|  | 355 | unsigned char ch; | 
|  | 356 |  | 
|  | 357 | for (i=0; i<count; i++) { | 
|  | 358 |  | 
|  | 359 | ch = hex(*buf++) << 4; | 
|  | 360 | ch |= hex(*buf++); | 
|  | 361 | /* Assembler code is   *mem++ = ch;   with return 0 on fault */ | 
|  | 362 | __asm__( | 
|  | 363 | "\n1:\n\t" | 
|  | 364 | "stb %1, [%0]\n\t" | 
|  | 365 | "inc %0\n\t" | 
|  | 366 | ".section .fixup,#alloc,#execinstr\n\t" | 
|  | 367 | ".align 4\n" | 
|  | 368 | "2:\n\t" | 
|  | 369 | "retl\n\t" | 
|  | 370 | " mov 0, %%o0\n\t" | 
|  | 371 | ".section __ex_table, #alloc\n\t" | 
|  | 372 | ".align 4\n\t" | 
|  | 373 | ".word 1b, 2b\n\t" | 
|  | 374 | ".text\n" | 
|  | 375 | : "=r" (mem) : "r" (ch) , "0" (mem)); | 
|  | 376 | } | 
|  | 377 | return mem; | 
|  | 378 | } | 
|  | 379 |  | 
|  | 380 | /* This table contains the mapping between SPARC hardware trap types, and | 
|  | 381 | signals, which are primarily what GDB understands.  It also indicates | 
|  | 382 | which hardware traps we need to commandeer when initializing the stub. */ | 
|  | 383 |  | 
|  | 384 | static struct hard_trap_info | 
|  | 385 | { | 
|  | 386 | unsigned char tt;		/* Trap type code for SPARC */ | 
|  | 387 | unsigned char signo;		/* Signal that we map this trap into */ | 
|  | 388 | } hard_trap_info[] = { | 
|  | 389 | {SP_TRAP_SBPT, SIGTRAP},      /* ta 1 - Linux/KGDB software breakpoint */ | 
|  | 390 | {0, 0}			/* Must be last */ | 
|  | 391 | }; | 
|  | 392 |  | 
|  | 393 | /* Set up exception handlers for tracing and breakpoints */ | 
|  | 394 |  | 
|  | 395 | void | 
|  | 396 | set_debug_traps(void) | 
|  | 397 | { | 
|  | 398 | struct hard_trap_info *ht; | 
|  | 399 | unsigned long flags; | 
|  | 400 |  | 
|  | 401 | local_irq_save(flags); | 
|  | 402 | #if 0 | 
|  | 403 | /* Have to sort this out. This cannot be done after initialization. */ | 
|  | 404 | BTFIXUPSET_CALL(flush_cache_all, flush_cache_all_nop, BTFIXUPCALL_NOP); | 
|  | 405 | #endif | 
|  | 406 |  | 
|  | 407 | /* Initialize our copy of the Linux Sparc trap table */ | 
|  | 408 | eh_init(); | 
|  | 409 |  | 
|  | 410 | for (ht = hard_trap_info; ht->tt && ht->signo; ht++) { | 
|  | 411 | /* Only if it doesn't destroy our fault handlers */ | 
|  | 412 | if((ht->tt != SP_TRAP_TFLT) && | 
|  | 413 | (ht->tt != SP_TRAP_DFLT)) | 
|  | 414 | exceptionHandler(ht->tt, trap_low); | 
|  | 415 | } | 
|  | 416 |  | 
|  | 417 | /* In case GDB is started before us, ack any packets (presumably | 
|  | 418 | * "$?#xx") sitting there. | 
|  | 419 | * | 
|  | 420 | * I've found this code causes more problems than it solves, | 
|  | 421 | * so that's why it's commented out.  GDB seems to work fine | 
|  | 422 | * now starting either before or after the kernel   -bwb | 
|  | 423 | */ | 
|  | 424 | #if 0 | 
|  | 425 | while((c = getDebugChar()) != '$'); | 
|  | 426 | while((c = getDebugChar()) != '#'); | 
|  | 427 | c = getDebugChar(); /* eat first csum byte */ | 
|  | 428 | c = getDebugChar(); /* eat second csum byte */ | 
|  | 429 | putDebugChar('+'); /* ack it */ | 
|  | 430 | #endif | 
|  | 431 |  | 
|  | 432 | initialized = 1; /* connect! */ | 
|  | 433 | local_irq_restore(flags); | 
|  | 434 | } | 
|  | 435 |  | 
|  | 436 | /* Convert the SPARC hardware trap type code to a unix signal number. */ | 
|  | 437 |  | 
|  | 438 | static int | 
|  | 439 | computeSignal(int tt) | 
|  | 440 | { | 
|  | 441 | struct hard_trap_info *ht; | 
|  | 442 |  | 
|  | 443 | for (ht = hard_trap_info; ht->tt && ht->signo; ht++) | 
|  | 444 | if (ht->tt == tt) | 
|  | 445 | return ht->signo; | 
|  | 446 |  | 
|  | 447 | return SIGHUP;         /* default for things we don't know about */ | 
|  | 448 | } | 
|  | 449 |  | 
|  | 450 | /* | 
|  | 451 | * While we find nice hex chars, build an int. | 
|  | 452 | * Return number of chars processed. | 
|  | 453 | */ | 
|  | 454 |  | 
|  | 455 | static int | 
|  | 456 | hexToInt(char **ptr, int *intValue) | 
|  | 457 | { | 
|  | 458 | int numChars = 0; | 
|  | 459 | int hexValue; | 
|  | 460 |  | 
|  | 461 | *intValue = 0; | 
|  | 462 |  | 
|  | 463 | while (**ptr) { | 
|  | 464 | hexValue = hex(**ptr); | 
|  | 465 | if (hexValue < 0) | 
|  | 466 | break; | 
|  | 467 |  | 
|  | 468 | *intValue = (*intValue << 4) | hexValue; | 
|  | 469 | numChars ++; | 
|  | 470 |  | 
|  | 471 | (*ptr)++; | 
|  | 472 | } | 
|  | 473 |  | 
|  | 474 | return (numChars); | 
|  | 475 | } | 
|  | 476 |  | 
|  | 477 | /* | 
|  | 478 | * This function does all command processing for interfacing to gdb.  It | 
|  | 479 | * returns 1 if you should skip the instruction at the trap address, 0 | 
|  | 480 | * otherwise. | 
|  | 481 | */ | 
|  | 482 |  | 
|  | 483 | extern void breakinst(void); | 
|  | 484 |  | 
|  | 485 | void | 
|  | 486 | handle_exception (unsigned long *registers) | 
|  | 487 | { | 
|  | 488 | int tt;       /* Trap type */ | 
|  | 489 | int sigval; | 
|  | 490 | int addr; | 
|  | 491 | int length; | 
|  | 492 | char *ptr; | 
|  | 493 | unsigned long *sp; | 
|  | 494 |  | 
|  | 495 | /* First, we must force all of the windows to be spilled out */ | 
|  | 496 |  | 
|  | 497 | asm("save %sp, -64, %sp\n\t" | 
|  | 498 | "save %sp, -64, %sp\n\t" | 
|  | 499 | "save %sp, -64, %sp\n\t" | 
|  | 500 | "save %sp, -64, %sp\n\t" | 
|  | 501 | "save %sp, -64, %sp\n\t" | 
|  | 502 | "save %sp, -64, %sp\n\t" | 
|  | 503 | "save %sp, -64, %sp\n\t" | 
|  | 504 | "save %sp, -64, %sp\n\t" | 
|  | 505 | "restore\n\t" | 
|  | 506 | "restore\n\t" | 
|  | 507 | "restore\n\t" | 
|  | 508 | "restore\n\t" | 
|  | 509 | "restore\n\t" | 
|  | 510 | "restore\n\t" | 
|  | 511 | "restore\n\t" | 
|  | 512 | "restore\n\t"); | 
|  | 513 |  | 
|  | 514 | lock_kernel(); | 
|  | 515 | if (registers[PC] == (unsigned long)breakinst) { | 
|  | 516 | /* Skip over breakpoint trap insn */ | 
|  | 517 | registers[PC] = registers[NPC]; | 
|  | 518 | registers[NPC] += 4; | 
|  | 519 | } | 
|  | 520 |  | 
|  | 521 | sp = (unsigned long *)registers[SP]; | 
|  | 522 |  | 
|  | 523 | tt = (registers[TBR] >> 4) & 0xff; | 
|  | 524 |  | 
|  | 525 | /* reply to host that an exception has occurred */ | 
|  | 526 | sigval = computeSignal(tt); | 
|  | 527 | ptr = remcomOutBuffer; | 
|  | 528 |  | 
|  | 529 | *ptr++ = 'T'; | 
|  | 530 | *ptr++ = hexchars[sigval >> 4]; | 
|  | 531 | *ptr++ = hexchars[sigval & 0xf]; | 
|  | 532 |  | 
|  | 533 | *ptr++ = hexchars[PC >> 4]; | 
|  | 534 | *ptr++ = hexchars[PC & 0xf]; | 
|  | 535 | *ptr++ = ':'; | 
|  | 536 | ptr = mem2hex((char *)®isters[PC], ptr, 4); | 
|  | 537 | *ptr++ = ';'; | 
|  | 538 |  | 
|  | 539 | *ptr++ = hexchars[FP >> 4]; | 
|  | 540 | *ptr++ = hexchars[FP & 0xf]; | 
|  | 541 | *ptr++ = ':'; | 
|  | 542 | ptr = mem2hex((char *) (sp + 8 + 6), ptr, 4); /* FP */ | 
|  | 543 | *ptr++ = ';'; | 
|  | 544 |  | 
|  | 545 | *ptr++ = hexchars[SP >> 4]; | 
|  | 546 | *ptr++ = hexchars[SP & 0xf]; | 
|  | 547 | *ptr++ = ':'; | 
|  | 548 | ptr = mem2hex((char *)&sp, ptr, 4); | 
|  | 549 | *ptr++ = ';'; | 
|  | 550 |  | 
|  | 551 | *ptr++ = hexchars[NPC >> 4]; | 
|  | 552 | *ptr++ = hexchars[NPC & 0xf]; | 
|  | 553 | *ptr++ = ':'; | 
|  | 554 | ptr = mem2hex((char *)®isters[NPC], ptr, 4); | 
|  | 555 | *ptr++ = ';'; | 
|  | 556 |  | 
|  | 557 | *ptr++ = hexchars[O7 >> 4]; | 
|  | 558 | *ptr++ = hexchars[O7 & 0xf]; | 
|  | 559 | *ptr++ = ':'; | 
|  | 560 | ptr = mem2hex((char *)®isters[O7], ptr, 4); | 
|  | 561 | *ptr++ = ';'; | 
|  | 562 |  | 
|  | 563 | *ptr++ = 0; | 
|  | 564 |  | 
|  | 565 | putpacket(remcomOutBuffer); | 
|  | 566 |  | 
|  | 567 | /* XXX We may want to add some features dealing with poking the | 
|  | 568 | * XXX page tables, the real ones on the srmmu, and what is currently | 
|  | 569 | * XXX loaded in the sun4/sun4c tlb at this point in time.  But this | 
|  | 570 | * XXX also required hacking to the gdb sources directly... | 
|  | 571 | */ | 
|  | 572 |  | 
|  | 573 | while (1) { | 
|  | 574 | remcomOutBuffer[0] = 0; | 
|  | 575 |  | 
|  | 576 | getpacket(remcomInBuffer); | 
|  | 577 | switch (remcomInBuffer[0]) { | 
|  | 578 | case '?': | 
|  | 579 | remcomOutBuffer[0] = 'S'; | 
|  | 580 | remcomOutBuffer[1] = hexchars[sigval >> 4]; | 
|  | 581 | remcomOutBuffer[2] = hexchars[sigval & 0xf]; | 
|  | 582 | remcomOutBuffer[3] = 0; | 
|  | 583 | break; | 
|  | 584 |  | 
|  | 585 | case 'd': | 
|  | 586 | /* toggle debug flag */ | 
|  | 587 | break; | 
|  | 588 |  | 
|  | 589 | case 'g':		/* return the value of the CPU registers */ | 
|  | 590 | { | 
|  | 591 | ptr = remcomOutBuffer; | 
|  | 592 | /* G & O regs */ | 
|  | 593 | ptr = mem2hex((char *)registers, ptr, 16 * 4); | 
|  | 594 | /* L & I regs */ | 
|  | 595 | ptr = mem2hex((char *) (sp + 0), ptr, 16 * 4); | 
|  | 596 | /* Floating point */ | 
|  | 597 | memset(ptr, '0', 32 * 8); | 
|  | 598 | /* Y, PSR, WIM, TBR, PC, NPC, FPSR, CPSR */ | 
|  | 599 | mem2hex((char *)®isters[Y], (ptr + 32 * 4 * 2), (8 * 4)); | 
|  | 600 | } | 
|  | 601 | break; | 
|  | 602 |  | 
|  | 603 | case 'G':	   /* set the value of the CPU registers - return OK */ | 
|  | 604 | { | 
|  | 605 | unsigned long *newsp, psr; | 
|  | 606 |  | 
|  | 607 | psr = registers[PSR]; | 
|  | 608 |  | 
|  | 609 | ptr = &remcomInBuffer[1]; | 
|  | 610 | /* G & O regs */ | 
|  | 611 | hex2mem(ptr, (char *)registers, 16 * 4); | 
|  | 612 | /* L & I regs */ | 
|  | 613 | hex2mem(ptr + 16 * 4 * 2, (char *) (sp + 0), 16 * 4); | 
|  | 614 | /* Y, PSR, WIM, TBR, PC, NPC, FPSR, CPSR */ | 
|  | 615 | hex2mem(ptr + 64 * 4 * 2, (char *)®isters[Y], 8 * 4); | 
|  | 616 |  | 
|  | 617 | /* See if the stack pointer has moved.  If so, | 
|  | 618 | * then copy the saved locals and ins to the | 
|  | 619 | * new location.  This keeps the window | 
|  | 620 | * overflow and underflow routines happy. | 
|  | 621 | */ | 
|  | 622 |  | 
|  | 623 | newsp = (unsigned long *)registers[SP]; | 
|  | 624 | if (sp != newsp) | 
|  | 625 | sp = memcpy(newsp, sp, 16 * 4); | 
|  | 626 |  | 
|  | 627 | /* Don't allow CWP to be modified. */ | 
|  | 628 |  | 
|  | 629 | if (psr != registers[PSR]) | 
|  | 630 | registers[PSR] = (psr & 0x1f) | (registers[PSR] & ~0x1f); | 
|  | 631 |  | 
|  | 632 | strcpy(remcomOutBuffer,"OK"); | 
|  | 633 | } | 
|  | 634 | break; | 
|  | 635 |  | 
|  | 636 | case 'm':	  /* mAA..AA,LLLL  Read LLLL bytes at address AA..AA */ | 
|  | 637 | /* Try to read %x,%x.  */ | 
|  | 638 |  | 
|  | 639 | ptr = &remcomInBuffer[1]; | 
|  | 640 |  | 
|  | 641 | if (hexToInt(&ptr, &addr) | 
|  | 642 | && *ptr++ == ',' | 
|  | 643 | && hexToInt(&ptr, &length))	{ | 
|  | 644 | if (mem2hex((char *)addr, remcomOutBuffer, length)) | 
|  | 645 | break; | 
|  | 646 |  | 
|  | 647 | strcpy (remcomOutBuffer, "E03"); | 
|  | 648 | } else { | 
|  | 649 | strcpy(remcomOutBuffer,"E01"); | 
|  | 650 | } | 
|  | 651 | break; | 
|  | 652 |  | 
|  | 653 | case 'M': /* MAA..AA,LLLL: Write LLLL bytes at address AA.AA return OK */ | 
|  | 654 | /* Try to read '%x,%x:'.  */ | 
|  | 655 |  | 
|  | 656 | ptr = &remcomInBuffer[1]; | 
|  | 657 |  | 
|  | 658 | if (hexToInt(&ptr, &addr) | 
|  | 659 | && *ptr++ == ',' | 
|  | 660 | && hexToInt(&ptr, &length) | 
|  | 661 | && *ptr++ == ':') { | 
|  | 662 | if (hex2mem(ptr, (char *)addr, length)) { | 
|  | 663 | strcpy(remcomOutBuffer, "OK"); | 
|  | 664 | } else { | 
|  | 665 | strcpy(remcomOutBuffer, "E03"); | 
|  | 666 | } | 
|  | 667 | } else { | 
|  | 668 | strcpy(remcomOutBuffer, "E02"); | 
|  | 669 | } | 
|  | 670 | break; | 
|  | 671 |  | 
|  | 672 | case 'c':    /* cAA..AA    Continue at address AA..AA(optional) */ | 
|  | 673 | /* try to read optional parameter, pc unchanged if no parm */ | 
|  | 674 |  | 
|  | 675 | ptr = &remcomInBuffer[1]; | 
|  | 676 | if (hexToInt(&ptr, &addr)) { | 
|  | 677 | registers[PC] = addr; | 
|  | 678 | registers[NPC] = addr + 4; | 
|  | 679 | } | 
|  | 680 |  | 
|  | 681 | /* Need to flush the instruction cache here, as we may have deposited a | 
|  | 682 | * breakpoint, and the icache probably has no way of knowing that a data ref to | 
|  | 683 | * some location may have changed something that is in the instruction cache. | 
|  | 684 | */ | 
|  | 685 | flush_cache_all(); | 
|  | 686 | unlock_kernel(); | 
|  | 687 | return; | 
|  | 688 |  | 
|  | 689 | /* kill the program */ | 
|  | 690 | case 'k' :		/* do nothing */ | 
|  | 691 | break; | 
|  | 692 | case 'r':		/* Reset */ | 
|  | 693 | asm ("call 0\n\t" | 
|  | 694 | "nop\n\t"); | 
|  | 695 | break; | 
|  | 696 | }			/* switch */ | 
|  | 697 |  | 
|  | 698 | /* reply to the request */ | 
|  | 699 | putpacket(remcomOutBuffer); | 
|  | 700 | } /* while(1) */ | 
|  | 701 | } | 
|  | 702 |  | 
|  | 703 | /* This function will generate a breakpoint exception.  It is used at the | 
|  | 704 | beginning of a program to sync up with a debugger and can be used | 
|  | 705 | otherwise as a quick means to stop program execution and "break" into | 
|  | 706 | the debugger. */ | 
|  | 707 |  | 
|  | 708 | void | 
|  | 709 | breakpoint(void) | 
|  | 710 | { | 
|  | 711 | if (!initialized) | 
|  | 712 | return; | 
|  | 713 |  | 
|  | 714 | /* Again, watch those c-prefixes for ELF kernels */ | 
|  | 715 | #if defined(__svr4__) || defined(__ELF__) | 
|  | 716 | asm(".globl breakinst\n" | 
|  | 717 | "breakinst:\n\t" | 
|  | 718 | "ta 1\n"); | 
|  | 719 | #else | 
|  | 720 | asm(".globl _breakinst\n" | 
|  | 721 | "_breakinst:\n\t" | 
|  | 722 | "ta 1\n"); | 
|  | 723 | #endif | 
|  | 724 | } |