2 * Mach Operating System
3 * Copyright (c) 1991,1990 Carnegie Mellon University
6 * Permission to use, copy, modify and distribute this software and its
7 * documentation is hereby granted, provided that both the copyright
8 * notice and this permission notice appear in all copies of the
9 * software, derivative works or modified versions, and any portions
10 * thereof, and that both notices appear in supporting documentation.
12 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS
13 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
14 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
16 * Carnegie Mellon requests users of this software to return to
18 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
19 * School of Computer Science
20 * Carnegie Mellon University
21 * Pittsburgh PA 15213-3890
23 * any improvements or extensions that they make and grant Carnegie the
24 * rights to redistribute these changes.
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD$");
30 #include <sys/param.h>
31 #include <sys/systm.h>
34 #include <sys/sysent.h>
36 #include <machine/cpu.h>
37 #include <machine/md_var.h>
38 #include <machine/pcb.h>
39 #include <machine/reg.h>
40 #include <machine/stack.h>
43 #include <vm/vm_param.h>
47 #include <ddb/db_access.h>
48 #include <ddb/db_sym.h>
49 #include <ddb/db_variables.h>
51 static db_varfcn_t db_esp
;
52 static db_varfcn_t db_frame
;
53 static db_varfcn_t db_frame_seg
;
54 static db_varfcn_t db_gs
;
55 static db_varfcn_t db_ss
;
58 * Machine register set.
60 #define DB_OFFSET(x) (db_expr_t *)offsetof(struct trapframe, x)
61 struct db_variable db_regs
[] = {
62 { "cs", DB_OFFSET(tf_cs
), db_frame_seg
},
63 { "ds", DB_OFFSET(tf_ds
), db_frame_seg
},
64 { "es", DB_OFFSET(tf_es
), db_frame_seg
},
65 { "fs", DB_OFFSET(tf_fs
), db_frame_seg
},
66 { "gs", NULL
, db_gs
},
67 { "ss", NULL
, db_ss
},
68 { "eax", DB_OFFSET(tf_eax
), db_frame
},
69 { "ecx", DB_OFFSET(tf_ecx
), db_frame
},
70 { "edx", DB_OFFSET(tf_edx
), db_frame
},
71 { "ebx", DB_OFFSET(tf_ebx
), db_frame
},
72 { "esp", NULL
, db_esp
},
73 { "ebp", DB_OFFSET(tf_ebp
), db_frame
},
74 { "esi", DB_OFFSET(tf_esi
), db_frame
},
75 { "edi", DB_OFFSET(tf_edi
), db_frame
},
76 { "eip", DB_OFFSET(tf_eip
), db_frame
},
77 { "efl", DB_OFFSET(tf_eflags
), db_frame
},
79 struct db_variable
*db_eregs
= db_regs
+ nitems(db_regs
);
82 get_esp(struct trapframe
*tf
)
84 return ((ISPL(tf
->tf_cs
)) ? tf
->tf_esp
:
85 (db_expr_t
)tf
+ (uintptr_t)DB_OFFSET(tf_esp
));
89 db_frame(struct db_variable
*vp
, db_expr_t
*valuep
, int op
)
93 if (kdb_frame
== NULL
)
96 reg
= (int *)((uintptr_t)kdb_frame
+ (db_expr_t
)vp
->valuep
);
105 db_frame_seg(struct db_variable
*vp
, db_expr_t
*valuep
, int op
)
109 if (kdb_frame
== NULL
)
112 reg
= (uint16_t *)((uintptr_t)kdb_frame
+ (db_expr_t
)vp
->valuep
);
113 if (op
== DB_VAR_GET
)
121 db_esp(struct db_variable
*vp
, db_expr_t
*valuep
, int op
)
124 if (kdb_frame
== NULL
)
127 if (op
== DB_VAR_GET
)
128 *valuep
= get_esp(kdb_frame
);
129 else if (ISPL(kdb_frame
->tf_cs
))
130 kdb_frame
->tf_esp
= *valuep
;
135 db_gs(struct db_variable
*vp
, db_expr_t
*valuep
, int op
)
138 if (op
== DB_VAR_GET
)
146 db_ss(struct db_variable
*vp
, db_expr_t
*valuep
, int op
)
149 if (kdb_frame
== NULL
)
152 if (op
== DB_VAR_GET
)
153 *valuep
= (ISPL(kdb_frame
->tf_cs
)) ? kdb_frame
->tf_ss
: rss();
154 else if (ISPL(kdb_frame
->tf_cs
))
155 kdb_frame
->tf_ss
= *valuep
;
163 #define DOUBLE_FAULT 4
164 #define TRAP_INTERRUPT 5
165 #define TRAP_TIMERINT 6
167 static void db_nextframe(struct i386_frame
**, db_addr_t
*, struct thread
*);
168 static int db_numargs(struct i386_frame
*);
169 static void db_print_stack_entry(const char *, int, char **, int *, db_addr_t
,
171 static void decode_syscall(int, struct thread
*);
173 static const char * watchtype_str(int type
);
174 int i386_set_watch(int watchnum
, unsigned int watchaddr
, int size
, int access
,
176 int i386_clr_watch(int watchnum
, struct dbreg
*d
);
179 * Figure out how many arguments were passed into the frame at "fp".
183 struct i386_frame
*fp
;
189 argp
= (char *)db_get_value((int)&fp
->f_retaddr
, 4, FALSE
);
191 * XXX etext is wrong for LKMs. We should attempt to interpret
192 * the instruction at the return address in all cases. This
193 * may require better fault handling.
195 if (argp
< btext
|| argp
>= etext
) {
199 inst
= db_get_value((int)argp
, 4, FALSE
);
200 if ((inst
& 0xff) == 0x59) /* popl %ecx */
202 else if ((inst
& 0xffff) == 0xc483) /* addl $Ibs, %esp */
203 args
= ((inst
>> 16) & 0xff) / 4;
204 else if ((inst
& 0xf8ff) == 0xc089) { /* movl %eax, %Reg */
214 db_print_stack_entry(name
, narg
, argnp
, argp
, callpc
, frame
)
222 int n
= narg
>= 0 ? narg
: 5;
224 db_printf("%s(", name
);
227 db_printf("%s=", *argnp
++);
228 db_printf("%r", db_get_value((int)argp
, 4, FALSE
));
236 db_printsym(callpc
, DB_STGY_PROC
);
238 db_printf("/frame 0x%r", (register_t
)frame
);
243 decode_syscall(int number
, struct thread
*td
)
251 db_printf(" (%d", number
);
252 p
= (td
!= NULL
) ? td
->td_proc
: NULL
;
253 if (p
!= NULL
&& 0 <= number
&& number
< p
->p_sysent
->sv_size
) {
254 f
= p
->p_sysent
->sv_table
[number
].sy_call
;
255 sym
= db_search_symbol((db_addr_t
)f
, DB_STGY_ANY
, &diff
);
256 if (sym
!= DB_SYM_NULL
&& diff
== 0) {
257 db_symbol_values(sym
, &symname
, NULL
);
258 db_printf(", %s, %s", p
->p_sysent
->sv_name
, symname
);
265 * Figure out the next frame up in the call stack.
268 db_nextframe(struct i386_frame
**fp
, db_addr_t
*ip
, struct thread
*td
)
270 struct trapframe
*tf
;
277 eip
= db_get_value((int) &(*fp
)->f_retaddr
, 4, FALSE
);
278 ebp
= db_get_value((int) &(*fp
)->f_frame
, 4, FALSE
);
281 * Figure out frame type. We look at the address just before
282 * the saved instruction pointer as the saved EIP is after the
283 * call function, and if the function being called is marked as
284 * dead (such as panic() at the end of dblfault_handler()), then
285 * the instruction at the saved EIP will be part of a different
286 * function (syscall() in this example) rather than the one that
287 * actually made the call.
290 sym
= db_search_symbol(eip
- 1, DB_STGY_ANY
, &offset
);
291 db_symbol_values(sym
, &name
, NULL
);
293 if (strcmp(name
, "calltrap") == 0 ||
294 strcmp(name
, "fork_trampoline") == 0)
296 else if (strncmp(name
, "Xatpic_intr", 11) == 0 ||
297 strncmp(name
, "Xapic_isr", 9) == 0)
298 frame_type
= INTERRUPT
;
299 else if (strcmp(name
, "Xlcall_syscall") == 0 ||
300 strcmp(name
, "Xint0x80_syscall") == 0)
301 frame_type
= SYSCALL
;
302 else if (strcmp(name
, "dblfault_handler") == 0)
303 frame_type
= DOUBLE_FAULT
;
304 /* XXX: These are interrupts with trap frames. */
305 else if (strcmp(name
, "Xtimerint") == 0)
306 frame_type
= TRAP_TIMERINT
;
307 else if (strcmp(name
, "Xcpustop") == 0 ||
308 strcmp(name
, "Xrendezvous") == 0 ||
309 strcmp(name
, "Xipi_intr_bitmap_handler") == 0)
310 frame_type
= TRAP_INTERRUPT
;
314 * Normal frames need no special processing.
316 if (frame_type
== NORMAL
) {
317 *ip
= (db_addr_t
) eip
;
318 *fp
= (struct i386_frame
*) ebp
;
322 db_print_stack_entry(name
, 0, 0, 0, eip
, &(*fp
)->f_frame
);
325 * For a double fault, we have to snag the values from the
326 * previous TSS since a double fault uses a task gate to
327 * switch to a known good state.
329 if (frame_type
== DOUBLE_FAULT
) {
330 esp
= PCPU_GET(common_tss
.tss_esp
);
331 eip
= PCPU_GET(common_tss
.tss_eip
);
332 ebp
= PCPU_GET(common_tss
.tss_ebp
);
334 "--- trap 0x17, eip = %#r, esp = %#r, ebp = %#r ---\n",
336 *ip
= (db_addr_t
) eip
;
337 *fp
= (struct i386_frame
*) ebp
;
342 * Point to base of trapframe which is just above the
345 if (frame_type
== INTERRUPT
)
346 tf
= (struct trapframe
*)((int)*fp
+ 16);
347 else if (frame_type
== TRAP_INTERRUPT
)
348 tf
= (struct trapframe
*)((int)*fp
+ 8);
350 tf
= (struct trapframe
*)((int)*fp
+ 12);
352 if (INKERNEL((int) tf
)) {
356 switch (frame_type
) {
358 db_printf("--- trap %#r", tf
->tf_trapno
);
361 db_printf("--- syscall");
362 decode_syscall(tf
->tf_eax
, td
);
367 db_printf("--- interrupt");
370 panic("The moon has moved again.");
372 db_printf(", eip = %#r, esp = %#r, ebp = %#r ---\n", eip
,
376 *ip
= (db_addr_t
) eip
;
377 *fp
= (struct i386_frame
*) ebp
;
381 db_backtrace(struct thread
*td
, struct trapframe
*tf
, struct i386_frame
*frame
,
382 db_addr_t pc
, register_t sp
, int count
)
384 struct i386_frame
*actframe
;
386 char *argnames
[MAXNARG
], **argnp
= NULL
;
395 * If an indirect call via an invalid pointer caused a trap,
396 * %pc contains the invalid address while the return address
397 * of the unlucky caller has been saved by CPU on the stack
398 * just before the trap frame. In this case, try to recover
399 * the caller's address so that the first frame is assigned
400 * to the right spot in the right function, for that is where
401 * the failure actually happened.
403 * This trick depends on the fault address stashed in tf_err
404 * by trap_fatal() before entering KDB.
406 if (kdb_frame
&& pc
== kdb_frame
->tf_err
) {
408 * Find where the trap frame actually ends.
409 * It won't contain tf_esp or tf_ss unless crossing rings.
411 if (ISPL(kdb_frame
->tf_cs
))
412 instr
= (int)(kdb_frame
+ 1);
414 instr
= (int)&kdb_frame
->tf_esp
;
415 pc
= db_get_value(instr
, 4, FALSE
);
422 while (count
-- && !db_pager_quit
) {
423 sym
= db_search_symbol(pc
, DB_STGY_ANY
, &offset
);
424 db_symbol_values(sym
, &name
, NULL
);
427 * Attempt to determine a (possibly fake) frame that gives
428 * the caller's pc. It may differ from `frame' if the
429 * current function never sets up a standard frame or hasn't
430 * set one up yet or has just discarded one. The last two
431 * cases can be guessed fairly reliably for code generated
432 * by gcc. The first case is too much trouble to handle in
433 * general because the amount of junk on the stack depends
434 * on the pc (the special handling of "calltrap", etc. in
435 * db_nextframe() works because the `next' pc is special).
440 if (sym
== C_DB_SYM_NULL
&& sp
!= 0) {
442 * If a symbol couldn't be found, we've probably
443 * jumped to a bogus location, so try and use
444 * the return address to find our caller.
446 db_print_stack_entry(name
, 0, 0, 0, pc
,
448 pc
= db_get_value(sp
, 4, FALSE
);
449 if (db_search_symbol(pc
, DB_STGY_PROC
,
450 &offset
) == C_DB_SYM_NULL
)
453 } else if (tf
!= NULL
) {
454 instr
= db_get_value(pc
, 4, FALSE
);
455 if ((instr
& 0xffffff) == 0x00e58955) {
456 /* pushl %ebp; movl %esp, %ebp */
457 actframe
= (void *)(get_esp(tf
) - 4);
458 } else if ((instr
& 0xffff) == 0x0000e589) {
459 /* movl %esp, %ebp */
460 actframe
= (void *)get_esp(tf
);
461 if (tf
->tf_ebp
== 0) {
462 /* Fake frame better. */
465 } else if ((instr
& 0xff) == 0x000000c3) {
467 actframe
= (void *)(get_esp(tf
) - 4);
468 } else if (offset
== 0) {
469 /* Probably an assembler symbol. */
470 actframe
= (void *)(get_esp(tf
) - 4);
472 } else if (strcmp(name
, "fork_trampoline") == 0) {
474 * Don't try to walk back on a stack for a
475 * process that hasn't actually been run yet.
477 db_print_stack_entry(name
, 0, 0, 0, pc
,
483 argp
= &actframe
->f_arg0
;
485 if (sym
!= NULL
&& db_sym_numargs(sym
, &narg
, argnames
)) {
488 narg
= db_numargs(frame
);
491 db_print_stack_entry(name
, narg
, argnp
, argp
, pc
, actframe
);
493 if (actframe
!= frame
) {
494 /* `frame' belongs to caller. */
496 db_get_value((int)&actframe
->f_retaddr
, 4, FALSE
);
500 db_nextframe(&frame
, &pc
, td
);
502 if (INKERNEL((int)pc
) && !INKERNEL((int) frame
)) {
503 sym
= db_search_symbol(pc
, DB_STGY_ANY
, &offset
);
504 db_symbol_values(sym
, &name
, NULL
);
505 db_print_stack_entry(name
, 0, 0, 0, pc
, frame
);
508 if (!INKERNEL((int) frame
)) {
519 struct i386_frame
*frame
;
523 __asm
__volatile("movl %%ebp,%0" : "=r" (ebp
));
524 frame
= (struct i386_frame
*)ebp
;
525 callpc
= (db_addr_t
)db_get_value((int)&frame
->f_retaddr
, 4, FALSE
);
526 frame
= frame
->f_frame
;
527 db_backtrace(curthread
, NULL
, frame
, callpc
, 0, -1);
531 db_trace_thread(struct thread
*thr
, int count
)
534 struct trapframe
*tf
;
536 ctx
= kdb_thr_ctx(thr
);
537 tf
= thr
== kdb_thread
? kdb_frame
: NULL
;
538 return (db_backtrace(thr
, tf
, (struct i386_frame
*)ctx
->pcb_ebp
,
539 ctx
->pcb_eip
, ctx
->pcb_esp
, count
));
543 i386_set_watch(watchnum
, watchaddr
, size
, access
, d
)
545 unsigned int watchaddr
;
552 if (watchnum
== -1) {
553 for (i
= 0; i
< 4; i
++)
554 if (!DBREG_DR7_ENABLED(d
->dr
[7], i
))
564 size
= 1; /* size must be 1 for an execution breakpoint */
566 case DBREG_DR7_WRONLY
:
574 * we can watch a 1, 2, or 4 byte sized location
578 len
= DBREG_DR7_LEN_1
;
581 len
= DBREG_DR7_LEN_2
;
584 len
= DBREG_DR7_LEN_4
;
590 /* clear the bits we are about to affect */
591 d
->dr
[7] &= ~DBREG_DR7_MASK(watchnum
);
593 /* set drN register to the address, N=watchnum */
594 DBREG_DRX(d
, watchnum
) = watchaddr
;
596 /* enable the watchpoint */
597 d
->dr
[7] |= DBREG_DR7_SET(watchnum
, len
, access
,
598 DBREG_DR7_GLOBAL_ENABLE
);
605 i386_clr_watch(watchnum
, d
)
610 if (watchnum
< 0 || watchnum
>= 4)
613 d
->dr
[7] &= ~DBREG_DR7_MASK(watchnum
);
614 DBREG_DRX(d
, watchnum
) = 0;
621 db_md_set_watchpoint(addr
, size
)
628 fill_dbregs(NULL
, &d
);
631 for(i
= 0; i
< 4; i
++) {
632 if (!DBREG_DR7_ENABLED(d
.dr
[7], i
))
636 if (avail
* 4 < size
)
639 for (i
= 0; i
< 4 && (size
> 0); i
++) {
640 if (!DBREG_DR7_ENABLED(d
.dr
[7], i
)) {
645 i386_set_watch(i
, addr
, wsize
,
646 DBREG_DR7_WRONLY
, &d
);
652 set_dbregs(NULL
, &d
);
659 db_md_clr_watchpoint(addr
, size
)
666 fill_dbregs(NULL
, &d
);
668 for(i
= 0; i
< 4; i
++) {
669 if (DBREG_DR7_ENABLED(d
.dr
[7], i
)) {
670 if ((DBREG_DRX((&d
), i
) >= addr
) &&
671 (DBREG_DRX((&d
), i
) < addr
+size
))
672 i386_clr_watch(i
, &d
);
677 set_dbregs(NULL
, &d
);
688 case DBREG_DR7_EXEC
: return "execute"; break;
689 case DBREG_DR7_RDWR
: return "read/write"; break;
690 case DBREG_DR7_WRONLY
: return "write"; break;
691 default : return "invalid"; break;
697 db_md_list_watchpoints()
702 fill_dbregs(NULL
, &d
);
704 db_printf("\nhardware watchpoints:\n");
705 db_printf(" watch status type len address\n");
706 db_printf(" ----- -------- ---------- --- ----------\n");
707 for (i
= 0; i
< 4; i
++) {
708 if (DBREG_DR7_ENABLED(d
.dr
[7], i
)) {
709 type
= DBREG_DR7_ACCESS(d
.dr
[7], i
);
710 len
= DBREG_DR7_LEN(d
.dr
[7], i
);
711 db_printf(" %-5d %-8s %10s %3d ",
712 i
, "enabled", watchtype_str(type
), len
+ 1);
713 db_printsym((db_addr_t
)DBREG_DRX((&d
), i
), DB_STGY_ANY
);
716 db_printf(" %-5d disabled\n", i
);
720 db_printf("\ndebug register values:\n");
721 for (i
= 0; i
< 8; i
++) {
722 db_printf(" dr%d 0x%08x\n", i
, DBREG_DRX((&d
), i
));