1 /* kgdb support for MN10300
3 * Copyright (C) 2010 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public Licence
8 * as published by the Free Software Foundation; either version
9 * 2 of the Licence, or (at your option) any later version.
12 #include <linux/slab.h>
13 #include <linux/ptrace.h>
14 #include <linux/kgdb.h>
15 #include <linux/uaccess.h>
16 #include <unit/leds.h>
17 #include <unit/serial.h>
18 #include <asm/debugger.h>
19 #include <asm/serial-regs.h>
23 * Software single-stepping breakpoint save (used by __switch_to())
25 static struct thread_info
*kgdb_sstep_thread
;
26 u8
*kgdb_sstep_bp_addr
[2];
30 * Copy kernel exception frame registers to the GDB register file
32 void pt_regs_to_gdb_regs(unsigned long *gdb_regs
, struct pt_regs
*regs
)
34 unsigned long ssp
= (unsigned long) (regs
+ 1);
36 gdb_regs
[GDB_FR_D0
] = regs
->d0
;
37 gdb_regs
[GDB_FR_D1
] = regs
->d1
;
38 gdb_regs
[GDB_FR_D2
] = regs
->d2
;
39 gdb_regs
[GDB_FR_D3
] = regs
->d3
;
40 gdb_regs
[GDB_FR_A0
] = regs
->a0
;
41 gdb_regs
[GDB_FR_A1
] = regs
->a1
;
42 gdb_regs
[GDB_FR_A2
] = regs
->a2
;
43 gdb_regs
[GDB_FR_A3
] = regs
->a3
;
44 gdb_regs
[GDB_FR_SP
] = (regs
->epsw
& EPSW_nSL
) ? regs
->sp
: ssp
;
45 gdb_regs
[GDB_FR_PC
] = regs
->pc
;
46 gdb_regs
[GDB_FR_MDR
] = regs
->mdr
;
47 gdb_regs
[GDB_FR_EPSW
] = regs
->epsw
;
48 gdb_regs
[GDB_FR_LIR
] = regs
->lir
;
49 gdb_regs
[GDB_FR_LAR
] = regs
->lar
;
50 gdb_regs
[GDB_FR_MDRQ
] = regs
->mdrq
;
51 gdb_regs
[GDB_FR_E0
] = regs
->e0
;
52 gdb_regs
[GDB_FR_E1
] = regs
->e1
;
53 gdb_regs
[GDB_FR_E2
] = regs
->e2
;
54 gdb_regs
[GDB_FR_E3
] = regs
->e3
;
55 gdb_regs
[GDB_FR_E4
] = regs
->e4
;
56 gdb_regs
[GDB_FR_E5
] = regs
->e5
;
57 gdb_regs
[GDB_FR_E6
] = regs
->e6
;
58 gdb_regs
[GDB_FR_E7
] = regs
->e7
;
59 gdb_regs
[GDB_FR_SSP
] = ssp
;
60 gdb_regs
[GDB_FR_MSP
] = 0;
61 gdb_regs
[GDB_FR_USP
] = regs
->sp
;
62 gdb_regs
[GDB_FR_MCRH
] = regs
->mcrh
;
63 gdb_regs
[GDB_FR_MCRL
] = regs
->mcrl
;
64 gdb_regs
[GDB_FR_MCVF
] = regs
->mcvf
;
65 gdb_regs
[GDB_FR_DUMMY0
] = 0;
66 gdb_regs
[GDB_FR_DUMMY1
] = 0;
67 gdb_regs
[GDB_FR_FS0
] = 0;
71 * Extracts kernel SP/PC values understandable by gdb from the values
72 * saved by switch_to().
74 void sleeping_thread_to_gdb_regs(unsigned long *gdb_regs
, struct task_struct
*p
)
76 gdb_regs
[GDB_FR_SSP
] = p
->thread
.sp
;
77 gdb_regs
[GDB_FR_PC
] = p
->thread
.pc
;
78 gdb_regs
[GDB_FR_A3
] = p
->thread
.a3
;
79 gdb_regs
[GDB_FR_USP
] = p
->thread
.usp
;
80 gdb_regs
[GDB_FR_FPCR
] = p
->thread
.fpu_state
.fpcr
;
84 * Fill kernel exception frame registers from the GDB register file
86 void gdb_regs_to_pt_regs(unsigned long *gdb_regs
, struct pt_regs
*regs
)
88 regs
->d0
= gdb_regs
[GDB_FR_D0
];
89 regs
->d1
= gdb_regs
[GDB_FR_D1
];
90 regs
->d2
= gdb_regs
[GDB_FR_D2
];
91 regs
->d3
= gdb_regs
[GDB_FR_D3
];
92 regs
->a0
= gdb_regs
[GDB_FR_A0
];
93 regs
->a1
= gdb_regs
[GDB_FR_A1
];
94 regs
->a2
= gdb_regs
[GDB_FR_A2
];
95 regs
->a3
= gdb_regs
[GDB_FR_A3
];
96 regs
->sp
= gdb_regs
[GDB_FR_SP
];
97 regs
->pc
= gdb_regs
[GDB_FR_PC
];
98 regs
->mdr
= gdb_regs
[GDB_FR_MDR
];
99 regs
->epsw
= gdb_regs
[GDB_FR_EPSW
];
100 regs
->lir
= gdb_regs
[GDB_FR_LIR
];
101 regs
->lar
= gdb_regs
[GDB_FR_LAR
];
102 regs
->mdrq
= gdb_regs
[GDB_FR_MDRQ
];
103 regs
->e0
= gdb_regs
[GDB_FR_E0
];
104 regs
->e1
= gdb_regs
[GDB_FR_E1
];
105 regs
->e2
= gdb_regs
[GDB_FR_E2
];
106 regs
->e3
= gdb_regs
[GDB_FR_E3
];
107 regs
->e4
= gdb_regs
[GDB_FR_E4
];
108 regs
->e5
= gdb_regs
[GDB_FR_E5
];
109 regs
->e6
= gdb_regs
[GDB_FR_E6
];
110 regs
->e7
= gdb_regs
[GDB_FR_E7
];
111 regs
->sp
= gdb_regs
[GDB_FR_SSP
];
112 /* gdb_regs[GDB_FR_MSP]; */
113 // regs->usp = gdb_regs[GDB_FR_USP];
114 regs
->mcrh
= gdb_regs
[GDB_FR_MCRH
];
115 regs
->mcrl
= gdb_regs
[GDB_FR_MCRL
];
116 regs
->mcvf
= gdb_regs
[GDB_FR_MCVF
];
117 /* gdb_regs[GDB_FR_DUMMY0]; */
118 /* gdb_regs[GDB_FR_DUMMY1]; */
120 // regs->fpcr = gdb_regs[GDB_FR_FPCR];
121 // regs->fs0 = gdb_regs[GDB_FR_FS0];
124 struct kgdb_arch arch_kgdb_ops
= {
125 .gdb_bpt_instr
= { 0xff },
126 .flags
= KGDB_HW_BREAKPOINT
,
129 static const unsigned char mn10300_kgdb_insn_sizes
[256] =
131 /* 1 2 3 4 5 6 7 8 9 a b c d e f */
132 1, 3, 3, 3, 1, 3, 3, 3, 1, 3, 3, 3, 1, 3, 3, 3, /* 0 */
133 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, /* 1 */
134 2, 2, 2, 2, 3, 3, 3, 3, 2, 2, 2, 2, 3, 3, 3, 3, /* 2 */
135 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 1, 1, 1, 1, /* 3 */
136 1, 1, 2, 2, 1, 1, 2, 2, 1, 1, 2, 2, 1, 1, 2, 2, /* 4 */
137 1, 1, 1, 1, 1, 1, 1, 1, 2, 2, 2, 2, 2, 2, 2, 2, /* 5 */
138 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, /* 6 */
139 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, /* 7 */
140 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, /* 8 */
141 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, /* 9 */
142 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, /* a */
143 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, 1, 1, 1, 1, 2, /* b */
144 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 2, 2, /* c */
145 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* d */
146 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, /* e */
147 0, 2, 2, 2, 2, 2, 2, 4, 0, 3, 0, 4, 0, 6, 7, 1 /* f */
151 * Attempt to emulate single stepping by means of breakpoint instructions.
152 * Although there is a single-step trace flag in EPSW, its use is not
153 * sufficiently documented and is only intended for use with the JTAG debugger.
155 static int kgdb_arch_do_singlestep(struct pt_regs
*regs
)
159 u8
*pc
= (u8
*)regs
->pc
, *sp
= (u8
*)(regs
+ 1), cur
;
160 u8
*x
= NULL
, *y
= NULL
;
163 ret
= probe_kernel_read(&cur
, pc
, 1);
167 size
= mn10300_kgdb_insn_sizes
[cur
];
176 ret
= probe_kernel_read(&arg
, pc
+ 1, 1);
180 if (arg
>= 0 && arg
<= 2)
188 if (regs
->pc
== regs
->lar
)
193 /* SETLB - loads the next four bytes into the LIR register
194 * (which mustn't include a breakpoint instruction) */
199 /* JMP (d16,PC) or CALL (d16,PC) */
202 ret
= probe_kernel_read(&arg
, pc
+ 1, 2);
208 /* JMP (d32,PC) or CALL (d32,PC) */
211 ret
= probe_kernel_read(&arg
, pc
+ 1, 4);
224 ret
= probe_kernel_read(&arg
, pc
+ 2, 1);
227 ret
= probe_kernel_read(&x
, sp
+ (s8
)arg
, 4);
233 ret
= probe_kernel_read(&cur
, pc
+ 1, 1);
237 if (cur
>= 0xf0 && cur
<= 0xf7) {
238 /* JMP (An) / CALLS (An) */
240 case 0: x
= (u8
*)regs
->a0
; break;
241 case 1: x
= (u8
*)regs
->a1
; break;
242 case 2: x
= (u8
*)regs
->a2
; break;
243 case 3: x
= (u8
*)regs
->a3
; break;
246 } else if (cur
== 0xfc) {
248 ret
= probe_kernel_read(&x
, sp
, 4);
252 } else if (cur
== 0xfd) {
254 ret
= probe_kernel_read(&x
, sp
+ 4, 4);
264 /* potential 3-byte conditional branches */
266 ret
= probe_kernel_read(&cur
, pc
+ 1, 1);
271 if (cur
>= 0xe8 && cur
<= 0xeb) {
272 ret
= probe_kernel_read(&arg
, pc
+ 2, 1);
275 if (arg
>= 0 && arg
<= 3)
283 ret
= probe_kernel_read(&cur
, pc
+ 1, 1);
289 ret
= probe_kernel_read(&arg
, pc
+ 2, 2);
300 ret
= probe_kernel_read(&cur
, pc
+ 1, 1);
306 ret
= probe_kernel_read(&arg
, pc
+ 2, 4);
320 kgdb_sstep_bp_addr
[0] = x
;
321 kgdb_sstep_bp_addr
[1] = NULL
;
322 ret
= probe_kernel_read(&kgdb_sstep_bp
[0], x
, 1);
325 ret
= probe_kernel_write(x
, &arch_kgdb_ops
.gdb_bpt_instr
, 1);
328 kgdb_sstep_thread
= current_thread_info();
329 debugger_local_cache_flushinv_one(x
);
333 kgdb_sstep_bp_addr
[0] = x
;
334 kgdb_sstep_bp_addr
[1] = y
;
335 ret
= probe_kernel_read(&kgdb_sstep_bp
[0], x
, 1);
338 ret
= probe_kernel_read(&kgdb_sstep_bp
[1], y
, 1);
341 ret
= probe_kernel_write(x
, &arch_kgdb_ops
.gdb_bpt_instr
, 1);
344 ret
= probe_kernel_write(y
, &arch_kgdb_ops
.gdb_bpt_instr
, 1);
346 probe_kernel_write(kgdb_sstep_bp_addr
[0],
347 &kgdb_sstep_bp
[0], 1);
349 kgdb_sstep_thread
= current_thread_info();
351 debugger_local_cache_flushinv_one(x
);
352 debugger_local_cache_flushinv_one(y
);
357 * Remove emplaced single-step breakpoints, returning true if we hit one of
360 static bool kgdb_arch_undo_singlestep(struct pt_regs
*regs
)
363 u8
*x
= kgdb_sstep_bp_addr
[0], *y
= kgdb_sstep_bp_addr
[1];
366 if (kgdb_sstep_thread
== current_thread_info()) {
368 if (x
== (u8
*)regs
->pc
)
370 if (probe_kernel_read(&opcode
, x
,
374 probe_kernel_write(x
, &kgdb_sstep_bp
[0], 1);
375 debugger_local_cache_flushinv_one(x
);
378 if (y
== (u8
*)regs
->pc
)
380 if (probe_kernel_read(&opcode
, y
,
384 probe_kernel_write(y
, &kgdb_sstep_bp
[1], 1);
385 debugger_local_cache_flushinv_one(y
);
389 kgdb_sstep_bp_addr
[0] = NULL
;
390 kgdb_sstep_bp_addr
[1] = NULL
;
391 kgdb_sstep_thread
= NULL
;
396 * Catch a single-step-pending thread being deleted and make sure the global
397 * single-step state is cleared. At this point the breakpoints should have
398 * been removed by __switch_to().
400 void arch_release_thread_stack(unsigned long *stack
)
402 struct thread_info
*ti
= (void *)stack
;
403 if (kgdb_sstep_thread
== ti
) {
404 kgdb_sstep_thread
= NULL
;
406 /* However, we may now be running in degraded mode, with most
407 * of the CPUs disabled until such a time as KGDB is reentered,
408 * so force immediate reentry */
414 * Handle unknown packets and [CcsDk] packets
415 * - at this point breakpoints have been installed
417 int kgdb_arch_handle_exception(int vector
, int signo
, int err_code
,
418 char *remcom_in_buffer
, char *remcom_out_buffer
,
419 struct pt_regs
*regs
)
424 switch (remcom_in_buffer
[0]) {
427 /* try to read optional parameter, pc unchanged if no parm */
428 ptr
= &remcom_in_buffer
[1];
429 if (kgdb_hex2long(&ptr
, &addr
))
433 atomic_set(&kgdb_cpu_doing_single_step
, -1);
435 if (remcom_in_buffer
[0] == 's') {
436 kgdb_arch_do_singlestep(regs
);
437 kgdb_single_step
= 1;
438 atomic_set(&kgdb_cpu_doing_single_step
,
439 raw_smp_processor_id());
443 return -1; /* this means that we do not want to exit from the handler */
447 * Handle event interception
448 * - returns 0 if the exception should be skipped, -ERROR otherwise.
450 int debugger_intercept(enum exception_code excep
, int signo
, int si_code
,
451 struct pt_regs
*regs
)
455 if (kgdb_arch_undo_singlestep(regs
)) {
458 si_code
= TRAP_TRACE
;
461 ret
= kgdb_handle_exception(excep
, signo
, si_code
, regs
);
463 debugger_local_cache_flushinv();
469 * Determine if we've hit a debugger special breakpoint
471 int at_debugger_breakpoint(struct pt_regs
*regs
)
473 return regs
->pc
== (unsigned long)&__arch_kgdb_breakpoint
;
479 int kgdb_arch_init(void)
485 * Do something, perhaps, but don't know what.
487 void kgdb_arch_exit(void)
492 void debugger_nmi_interrupt(struct pt_regs
*regs
, enum exception_code code
)
494 kgdb_nmicallback(arch_smp_processor_id(), regs
);
495 debugger_local_cache_flushinv();
498 void kgdb_roundup_cpus(unsigned long flags
)
500 smp_jump_to_debugger();