#include <mach/mach_types.h>
#include <mach/machine.h>
#include <mach/exception_types.h>
#include <kern/cpu_data.h>
#include <i386/trap.h>
#include <i386/mp.h>
#include <kdp/kdp_internal.h>
#define KDP_TEST_HARNESS 0
#if KDP_TEST_HARNESS
#define dprintf(x) printf x
#else
#define dprintf(x)
#endif
extern void kdreboot(void);
void print_saved_state(void *);
void kdp_call(void);
int kdp_getc(void);
boolean_t kdp_call_kdb(void);
void kdp_getstate(i386_thread_state_t *);
void kdp_setstate(i386_thread_state_t *);
void kdp_print_phys(int);
void kdp_i386_backtrace(void *, int);
void kdp_i386_trap(
unsigned int,
struct i386_saved_state *,
kern_return_t,
vm_offset_t);
void
kdp_exception(
unsigned char *pkt,
int *len,
unsigned short *remote_port,
unsigned int exception,
unsigned int code,
unsigned int subcode
)
{
kdp_exception_t *rq = (kdp_exception_t *)pkt;
rq->hdr.request = KDP_EXCEPTION;
rq->hdr.is_reply = 0;
rq->hdr.seq = kdp.exception_seq;
rq->hdr.key = 0;
rq->hdr.len = sizeof (*rq);
rq->n_exc_info = 1;
rq->exc_info[0].cpu = 0;
rq->exc_info[0].exception = exception;
rq->exc_info[0].code = code;
rq->exc_info[0].subcode = subcode;
rq->hdr.len += rq->n_exc_info * sizeof (kdp_exc_info_t);
bcopy((char *)rq, (char *)pkt, rq->hdr.len);
kdp.exception_ack_needed = TRUE;
*remote_port = kdp.exception_port;
*len = rq->hdr.len;
}
boolean_t
kdp_exception_ack(
unsigned char *pkt,
int len
)
{
kdp_exception_ack_t *rq = (kdp_exception_ack_t *)pkt;
if (((unsigned int) len) < sizeof (*rq))
return(FALSE);
if (!rq->hdr.is_reply || rq->hdr.request != KDP_EXCEPTION)
return(FALSE);
dprintf(("kdp_exception_ack seq %x %x\n", rq->hdr.seq, kdp.exception_seq));
if (rq->hdr.seq == kdp.exception_seq) {
kdp.exception_ack_needed = FALSE;
kdp.exception_seq++;
}
return(TRUE);
}
void
kdp_getstate(
i386_thread_state_t *state
)
{
static i386_thread_state_t null_state;
struct i386_saved_state *saved_state;
saved_state = (struct i386_saved_state *)kdp.saved_state;
*state = null_state;
state->eax = saved_state->eax;
state->ebx = saved_state->ebx;
state->ecx = saved_state->ecx;
state->edx = saved_state->edx;
state->edi = saved_state->edi;
state->esi = saved_state->esi;
state->ebp = saved_state->ebp;
if ((saved_state->cs & 0x3) == 0){
state->esp = (unsigned int) &saved_state->uesp;
state->ss = KERNEL_DS;
} else {
state->esp = saved_state->uesp;
state->ss = saved_state->ss;
}
state->eflags = saved_state->efl;
state->eip = saved_state->eip;
state->cs = saved_state->cs;
state->ds = saved_state->ds;
state->es = saved_state->es;
state->fs = saved_state->fs;
state->gs = saved_state->gs;
}
void
kdp_setstate(
i386_thread_state_t *state
)
{
struct i386_saved_state *saved_state;
saved_state = (struct i386_saved_state *)kdp.saved_state;
saved_state->eax = state->eax;
saved_state->ebx = state->ebx;
saved_state->ecx = state->ecx;
saved_state->edx = state->edx;
saved_state->edi = state->edi;
saved_state->esi = state->esi;
saved_state->ebp = state->ebp;
saved_state->efl = state->eflags;
#if 0
saved_state->frame.eflags &= ~( EFL_VM | EFL_NT | EFL_IOPL | EFL_CLR );
saved_state->frame.eflags |= ( EFL_IF | EFL_SET );
#endif
saved_state->eip = state->eip;
saved_state->fs = state->fs;
saved_state->gs = state->gs;
}
kdp_error_t
kdp_machine_read_regs(
__unused unsigned int cpu,
__unused unsigned int flavor,
char *data,
__unused int *size
)
{
static i386_thread_fpstate_t null_fpstate;
switch (flavor) {
case i386_THREAD_STATE:
dprintf(("kdp_readregs THREAD_STATE\n"));
kdp_getstate((i386_thread_state_t *)data);
*size = sizeof (i386_thread_state_t);
return KDPERR_NO_ERROR;
case i386_THREAD_FPSTATE:
dprintf(("kdp_readregs THREAD_FPSTATE\n"));
*(i386_thread_fpstate_t *)data = null_fpstate;
*size = sizeof (i386_thread_fpstate_t);
return KDPERR_NO_ERROR;
default:
dprintf(("kdp_readregs bad flavor %d\n", flavor));
*size = 0;
return KDPERR_BADFLAVOR;
}
}
kdp_error_t
kdp_machine_write_regs(
__unused unsigned int cpu,
unsigned int flavor,
char *data,
__unused int *size
)
{
switch (flavor) {
case i386_THREAD_STATE:
dprintf(("kdp_writeregs THREAD_STATE\n"));
kdp_setstate((i386_thread_state_t *)data);
return KDPERR_NO_ERROR;
case i386_THREAD_FPSTATE:
dprintf(("kdp_writeregs THREAD_FPSTATE\n"));
return KDPERR_NO_ERROR;
default:
dprintf(("kdp_writeregs bad flavor %d\n"));
return KDPERR_BADFLAVOR;
}
}
void
kdp_machine_hostinfo(
kdp_hostinfo_t *hostinfo
)
{
int i;
hostinfo->cpus_mask = 0;
for (i = 0; i < machine_info.max_cpus; i++) {
if (cpu_data_ptr[i] == NULL)
continue;
hostinfo->cpus_mask |= (1 << i);
}
hostinfo->cpu_type = CPU_TYPE_I386;
hostinfo->cpu_subtype = CPU_SUBTYPE_486;
}
void
kdp_panic(
const char *msg
)
{
kprintf("kdp panic: %s\n", msg);
__asm__ volatile("hlt");
}
void
kdp_reboot(void)
{
kdreboot();
}
int
kdp_intr_disbl(void)
{
return splhigh();
}
void
kdp_intr_enbl(int s)
{
splx(s);
}
int
kdp_getc()
{
return cnmaygetc();
}
void
kdp_us_spin(int usec)
{
delay(usec/100);
}
void print_saved_state(void *state)
{
struct i386_saved_state *saved_state;
saved_state = state;
kprintf("pc = 0x%x\n", saved_state->eip);
kprintf("cr3= 0x%x\n", saved_state->cr2);
kprintf("rp = TODO FIXME\n");
kprintf("sp = 0x%x\n", saved_state->esp);
}
void
kdp_sync_cache()
{
return;
}
void
kdp_call()
{
__asm__ volatile ("int $3");
}
typedef struct _cframe_t {
struct _cframe_t *prev;
unsigned caller;
unsigned args[0];
} cframe_t;
#include <i386/pmap.h>
extern pt_entry_t *DMAP2;
extern caddr_t DADDR2;
void
kdp_print_phys(int src)
{
unsigned int *iptr;
int i;
*(int *) DMAP2 = 0x63 | (src & 0xfffff000);
invlpg((u_int) DADDR2);
iptr = (unsigned int *) DADDR2;
for (i = 0; i < 100; i++) {
kprintf("0x%x ", *iptr++);
if ((i % 8) == 0)
kprintf("\n");
}
kprintf("\n");
*(int *) DMAP2 = 0;
}
#define MAX_FRAME_DELTA 65536
void
kdp_i386_backtrace(void *_frame, int nframes)
{
cframe_t *frame = (cframe_t *)_frame;
int i;
for (i=0; i<nframes; i++) {
if ((vm_offset_t)frame < VM_MIN_KERNEL_ADDRESS ||
(vm_offset_t)frame > VM_MAX_KERNEL_ADDRESS) {
goto invalid;
}
kprintf("frame 0x%x called by 0x%x ",
frame, frame->caller);
kprintf("args 0x%x 0x%x 0x%x 0x%x\n",
frame->args[0], frame->args[1],
frame->args[2], frame->args[3]);
if ((frame->prev < frame) ||
((frame->prev - frame) > MAX_FRAME_DELTA)) {
goto invalid;
}
frame = frame->prev;
}
return;
invalid:
kprintf("invalid frame pointer 0x%x\n",frame);
}
void
kdp_i386_trap(
unsigned int trapno,
struct i386_saved_state *saved_state,
kern_return_t result,
vm_offset_t va
)
{
unsigned int exception, subcode = 0, code;
mp_kdp_enter();
if (trapno != T_INT3 && trapno != T_DEBUG)
kprintf("unexpected kernel trap 0x%x eip 0x%x cr2 0x%x \n",
trapno, saved_state->eip, saved_state->esp);
switch (trapno) {
case T_DIVIDE_ERROR:
exception = EXC_ARITHMETIC;
code = EXC_I386_DIVERR;
break;
case T_OVERFLOW:
exception = EXC_SOFTWARE;
code = EXC_I386_INTOFLT;
break;
case T_OUT_OF_BOUNDS:
exception = EXC_ARITHMETIC;
code = EXC_I386_BOUNDFLT;
break;
case T_INVALID_OPCODE:
exception = EXC_BAD_INSTRUCTION;
code = EXC_I386_INVOPFLT;
break;
case T_SEGMENT_NOT_PRESENT:
exception = EXC_BAD_INSTRUCTION;
code = EXC_I386_SEGNPFLT;
subcode = saved_state->err;
break;
case T_STACK_FAULT:
exception = EXC_BAD_INSTRUCTION;
code = EXC_I386_STKFLT;
subcode = saved_state->err;
break;
case T_GENERAL_PROTECTION:
exception = EXC_BAD_INSTRUCTION;
code = EXC_I386_GPFLT;
subcode = saved_state->err;
break;
case T_PAGE_FAULT:
exception = EXC_BAD_ACCESS;
code = result;
subcode = va;
break;
case T_WATCHPOINT:
exception = EXC_SOFTWARE;
code = EXC_I386_ALIGNFLT;
break;
case T_DEBUG:
case T_INT3:
exception = EXC_BREAKPOINT;
code = EXC_I386_BPTFLT;
break;
default:
exception = EXC_BAD_INSTRUCTION;
code = trapno;
break;
}
kdp_i386_backtrace((void *) saved_state->ebp, 10);
kdp_raise_exception(exception, code, subcode, saved_state);
mp_kdp_exit();
}
boolean_t
kdp_call_kdb(
void)
{
return(FALSE);
}
unsigned int
kdp_ml_get_breakinsn(void)
{
return 0xcc;
}