source: mainline/kernel/arch/mips32/src/debugger.c@ 666f492

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 666f492 was 556f9892, checked in by Jakub Jermar <jakub@…>, 15 years ago

Add two missing interrupts_restore() in mips32 debugger code.

  • Property mode set to 100644
File size: 11.2 KB
Line 
1/*
2 * Copyright (c) 2005 Ondrej Palkovsky
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup mips32debug
30 * @{
31 */
32/** @file
33 */
34
35#include <arch/debugger.h>
36#include <arch/barrier.h>
37#include <memstr.h>
38#include <console/kconsole.h>
39#include <console/cmd.h>
40#include <print.h>
41#include <panic.h>
42#include <arch.h>
43#include <arch/cp0.h>
44#include <func.h>
45#include <symtab.h>
46
47bpinfo_t breakpoints[BKPOINTS_MAX];
48SPINLOCK_INITIALIZE(bkpoint_lock);
49
50#ifdef CONFIG_KCONSOLE
51
52static int cmd_print_breakpoints(cmd_arg_t *argv);
53static cmd_info_t bkpts_info = {
54 .name = "bkpts",
55 .description = "Print breakpoint table.",
56 .func = cmd_print_breakpoints,
57 .argc = 0,
58};
59
60static int cmd_del_breakpoint(cmd_arg_t *argv);
61static cmd_arg_t del_argv = {
62 .type = ARG_TYPE_INT
63};
64static cmd_info_t delbkpt_info = {
65 .name = "delbkpt",
66 .description = "delbkpt <number> - Delete breakpoint.",
67 .func = cmd_del_breakpoint,
68 .argc = 1,
69 .argv = &del_argv
70};
71
72static int cmd_add_breakpoint(cmd_arg_t *argv);
73static cmd_arg_t add_argv = {
74 .type = ARG_TYPE_INT
75};
76static cmd_info_t addbkpt_info = {
77 .name = "addbkpt",
78 .description = "addbkpt <&symbol> - new bkpoint. Break on J/Branch "
79 "insts unsupported.",
80 .func = cmd_add_breakpoint,
81 .argc = 1,
82 .argv = &add_argv
83};
84
85static cmd_arg_t adde_argv[] = {
86 { .type = ARG_TYPE_INT },
87 { .type = ARG_TYPE_INT }
88};
89static cmd_info_t addbkpte_info = {
90 .name = "addbkpte",
91 .description = "addebkpte <&symbol> <&func> - new bkpoint. Call "
92 "func(or Nothing if 0).",
93 .func = cmd_add_breakpoint,
94 .argc = 2,
95 .argv = adde_argv
96};
97
98static struct {
99 uint32_t andmask;
100 uint32_t value;
101} jmpinstr[] = {
102 {0xf3ff0000, 0x41000000}, /* BCzF */
103 {0xf3ff0000, 0x41020000}, /* BCzFL */
104 {0xf3ff0000, 0x41010000}, /* BCzT */
105 {0xf3ff0000, 0x41030000}, /* BCzTL */
106 {0xfc000000, 0x10000000}, /* BEQ */
107 {0xfc000000, 0x50000000}, /* BEQL */
108 {0xfc1f0000, 0x04010000}, /* BEQL */
109 {0xfc1f0000, 0x04110000}, /* BGEZAL */
110 {0xfc1f0000, 0x04130000}, /* BGEZALL */
111 {0xfc1f0000, 0x04030000}, /* BGEZL */
112 {0xfc1f0000, 0x1c000000}, /* BGTZ */
113 {0xfc1f0000, 0x5c000000}, /* BGTZL */
114 {0xfc1f0000, 0x18000000}, /* BLEZ */
115 {0xfc1f0000, 0x58000000}, /* BLEZL */
116 {0xfc1f0000, 0x04000000}, /* BLTZ */
117 {0xfc1f0000, 0x04100000}, /* BLTZAL */
118 {0xfc1f0000, 0x04120000}, /* BLTZALL */
119 {0xfc1f0000, 0x04020000}, /* BLTZL */
120 {0xfc000000, 0x14000000}, /* BNE */
121 {0xfc000000, 0x54000000}, /* BNEL */
122 {0xfc000000, 0x08000000}, /* J */
123 {0xfc000000, 0x0c000000}, /* JAL */
124 {0xfc1f07ff, 0x00000009}, /* JALR */
125 {0, 0} /* EndOfTable */
126};
127
128
129/** Test, if the given instruction is a jump or branch instruction
130 *
131 * @param instr Instruction code
132 * @return true - it is jump instruction, false otherwise
133 *
134 */
135static bool is_jump(unative_t instr)
136{
137 int i;
138
139 for (i = 0; jmpinstr[i].andmask; i++) {
140 if ((instr & jmpinstr[i].andmask) == jmpinstr[i].value)
141 return true;
142 }
143
144 return false;
145}
146
147/** Add new breakpoint to table */
148int cmd_add_breakpoint(cmd_arg_t *argv)
149{
150 bpinfo_t *cur = NULL;
151 ipl_t ipl;
152 int i;
153
154 if (argv->intval & 0x3) {
155 printf("Not aligned instruction, forgot to use &symbol?\n");
156 return 1;
157 }
158 ipl = interrupts_disable();
159 spinlock_lock(&bkpoint_lock);
160
161 /* Check, that the breakpoints do not conflict */
162 for (i = 0; i < BKPOINTS_MAX; i++) {
163 if (breakpoints[i].address == (uintptr_t)argv->intval) {
164 printf("Duplicate breakpoint %d.\n", i);
165 spinlock_unlock(&bkpoint_lock);
166 interrupts_restore(ipl);
167 return 0;
168 } else if (breakpoints[i].address == (uintptr_t)argv->intval +
169 sizeof(unative_t) || breakpoints[i].address ==
170 (uintptr_t)argv->intval - sizeof(unative_t)) {
171 printf("Adjacent breakpoints not supported, conflict "
172 "with %d.\n", i);
173 spinlock_unlock(&bkpoint_lock);
174 interrupts_restore(ipl);
175 return 0;
176 }
177
178 }
179
180 for (i = 0; i < BKPOINTS_MAX; i++)
181 if (!breakpoints[i].address) {
182 cur = &breakpoints[i];
183 break;
184 }
185 if (!cur) {
186 printf("Too many breakpoints.\n");
187 spinlock_unlock(&bkpoint_lock);
188 interrupts_restore(ipl);
189 return 0;
190 }
191 cur->address = (uintptr_t) argv->intval;
192 printf("Adding breakpoint on address: %p\n", argv->intval);
193 cur->instruction = ((unative_t *)cur->address)[0];
194 cur->nextinstruction = ((unative_t *)cur->address)[1];
195 if (argv == &add_argv) {
196 cur->flags = 0;
197 } else { /* We are add extended */
198 cur->flags = BKPOINT_FUNCCALL;
199 cur->bkfunc = (void (*)(void *, istate_t *)) argv[1].intval;
200 }
201 if (is_jump(cur->instruction))
202 cur->flags |= BKPOINT_ONESHOT;
203 cur->counter = 0;
204
205 /* Set breakpoint */
206 *((unative_t *)cur->address) = 0x0d;
207 smc_coherence(cur->address);
208
209 spinlock_unlock(&bkpoint_lock);
210 interrupts_restore(ipl);
211
212 return 1;
213}
214
215/** Remove breakpoint from table */
216int cmd_del_breakpoint(cmd_arg_t *argv)
217{
218 bpinfo_t *cur;
219 ipl_t ipl;
220
221 if (argv->intval > BKPOINTS_MAX) {
222 printf("Invalid breakpoint number.\n");
223 return 0;
224 }
225 ipl = interrupts_disable();
226 spinlock_lock(&bkpoint_lock);
227
228 cur = &breakpoints[argv->intval];
229 if (!cur->address) {
230 printf("Breakpoint does not exist.\n");
231 spinlock_unlock(&bkpoint_lock);
232 interrupts_restore(ipl);
233 return 0;
234 }
235 if ((cur->flags & BKPOINT_INPROG) && (cur->flags & BKPOINT_ONESHOT)) {
236 printf("Cannot remove one-shot breakpoint in-progress\n");
237 spinlock_unlock(&bkpoint_lock);
238 interrupts_restore(ipl);
239 return 0;
240 }
241 ((uint32_t *)cur->address)[0] = cur->instruction;
242 smc_coherence(((uint32_t *)cur->address)[0]);
243 ((uint32_t *)cur->address)[1] = cur->nextinstruction;
244 smc_coherence(((uint32_t *)cur->address)[1]);
245
246 cur->address = NULL;
247
248 spinlock_unlock(&bkpoint_lock);
249 interrupts_restore(ipl);
250 return 1;
251}
252
253/** Print table of active breakpoints */
254int cmd_print_breakpoints(cmd_arg_t *argv)
255{
256 unsigned int i;
257
258 printf("# Count Address INPROG ONESHOT FUNCCALL In symbol\n");
259 printf("-- ----- ---------- ------ ------- -------- ---------\n");
260
261 for (i = 0; i < BKPOINTS_MAX; i++) {
262 if (breakpoints[i].address) {
263 const char *symbol = symtab_fmt_name_lookup(
264 breakpoints[i].address);
265
266 printf("%-2u %-5d %#10zx %-6s %-7s %-8s %s\n", i,
267 breakpoints[i].counter, breakpoints[i].address,
268 ((breakpoints[i].flags & BKPOINT_INPROG) ? "true" :
269 "false"), ((breakpoints[i].flags & BKPOINT_ONESHOT)
270 ? "true" : "false"), ((breakpoints[i].flags &
271 BKPOINT_FUNCCALL) ? "true" : "false"), symbol);
272 }
273 }
274
275 return 1;
276}
277
278#endif
279
280/** Initialize debugger */
281void debugger_init()
282{
283 int i;
284
285 for (i = 0; i < BKPOINTS_MAX; i++)
286 breakpoints[i].address = NULL;
287
288#ifdef CONFIG_KCONSOLE
289 cmd_initialize(&bkpts_info);
290 if (!cmd_register(&bkpts_info))
291 printf("Cannot register command %s\n", bkpts_info.name);
292
293 cmd_initialize(&delbkpt_info);
294 if (!cmd_register(&delbkpt_info))
295 printf("Cannot register command %s\n", delbkpt_info.name);
296
297 cmd_initialize(&addbkpt_info);
298 if (!cmd_register(&addbkpt_info))
299 printf("Cannot register command %s\n", addbkpt_info.name);
300
301 cmd_initialize(&addbkpte_info);
302 if (!cmd_register(&addbkpte_info))
303 printf("Cannot register command %s\n", addbkpte_info.name);
304#endif
305}
306
307/** Handle breakpoint
308 *
309 * Find breakpoint in breakpoint table.
310 * If found, call kconsole, set break on next instruction and reexecute.
311 * If we are on "next instruction", set it back on the first and reexecute.
312 * If breakpoint not found in breakpoint table, call kconsole and start
313 * next instruction.
314 */
315void debugger_bpoint(istate_t *istate)
316{
317 bpinfo_t *cur = NULL;
318 uintptr_t fireaddr = istate->epc;
319 int i;
320
321 /* test branch delay slot */
322 if (cp0_cause_read() & 0x80000000)
323 panic("Breakpoint in branch delay slot not supported.");
324
325 spinlock_lock(&bkpoint_lock);
326 for (i = 0; i < BKPOINTS_MAX; i++) {
327 /* Normal breakpoint */
328 if (fireaddr == breakpoints[i].address &&
329 !(breakpoints[i].flags & BKPOINT_REINST)) {
330 cur = &breakpoints[i];
331 break;
332 }
333 /* Reinst only breakpoint */
334 if ((breakpoints[i].flags & BKPOINT_REINST) &&
335 (fireaddr == breakpoints[i].address + sizeof(unative_t))) {
336 cur = &breakpoints[i];
337 break;
338 }
339 }
340 if (cur) {
341 if (cur->flags & BKPOINT_REINST) {
342 /* Set breakpoint on first instruction */
343 ((uint32_t *)cur->address)[0] = 0x0d;
344 smc_coherence(((uint32_t *)cur->address)[0]);
345 /* Return back the second */
346 ((uint32_t *)cur->address)[1] = cur->nextinstruction;
347 smc_coherence(((uint32_t *)cur->address)[1]);
348 cur->flags &= ~BKPOINT_REINST;
349 spinlock_unlock(&bkpoint_lock);
350 return;
351 }
352 if (cur->flags & BKPOINT_INPROG)
353 printf("Warning: breakpoint recursion\n");
354
355 if (!(cur->flags & BKPOINT_FUNCCALL)) {
356 printf("***Breakpoint %d: %p in %s.\n", i, fireaddr,
357 symtab_fmt_name_lookup(istate->epc));
358 }
359
360 /* Return first instruction back */
361 ((uint32_t *)cur->address)[0] = cur->instruction;
362 smc_coherence(cur->address);
363
364 if (! (cur->flags & BKPOINT_ONESHOT)) {
365 /* Set Breakpoint on next instruction */
366 ((uint32_t *)cur->address)[1] = 0x0d;
367 cur->flags |= BKPOINT_REINST;
368 }
369 cur->flags |= BKPOINT_INPROG;
370 } else {
371 printf("***Breakpoint %d: %p in %s.\n", i, fireaddr,
372 symtab_fmt_name_lookup(fireaddr));
373
374 /* Move on to next instruction */
375 istate->epc += 4;
376 }
377 if (cur)
378 cur->counter++;
379 if (cur && (cur->flags & BKPOINT_FUNCCALL)) {
380 /* Allow zero bkfunc, just for counting */
381 if (cur->bkfunc)
382 cur->bkfunc(cur, istate);
383 } else {
384#ifdef CONFIG_KCONSOLE
385 /* This disables all other processors - we are not SMP,
386 * actually this gets us to cpu_halt, if scheduler() is run
387 * - we generally do not want scheduler to be run from debug,
388 * so this is a good idea
389 */
390 atomic_set(&haltstate, 1);
391 spinlock_unlock(&bkpoint_lock);
392
393 kconsole("debug", "Debug console ready.\n", false);
394
395 spinlock_lock(&bkpoint_lock);
396 atomic_set(&haltstate, 0);
397#endif
398 }
399 if (cur && cur->address == fireaddr && (cur->flags & BKPOINT_INPROG)) {
400 /* Remove one-shot breakpoint */
401 if ((cur->flags & BKPOINT_ONESHOT))
402 cur->address = NULL;
403 /* Remove in-progress flag */
404 cur->flags &= ~BKPOINT_INPROG;
405 }
406 spinlock_unlock(&bkpoint_lock);
407}
408
409/** @}
410 */
Note: See TracBrowser for help on using the repository browser.