2 * Mach Operating System
3 * Copyright (c) 1991,1990 Carnegie Mellon University
6 * Permission to use, copy, modify and distribute this software and its
7 * documentation is hereby granted, provided that both the copyright
8 * notice and this permission notice appear in all copies of the
9 * software, derivative works or modified versions, and any portions
10 * thereof, and that both notices appear in supporting documentation.
12 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS
13 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
14 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
16 * Carnegie Mellon requests users of this software to return to
18 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
19 * School of Computer Science
20 * Carnegie Mellon University
21 * Pittsburgh PA 15213-3890
23 * any improvements or extensions that they make and grant Carnegie the
24 * rights to redistribute these changes.
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD$");
30 #include "opt_compat.h"
32 #include <sys/param.h>
33 #include <sys/systm.h>
37 #include <sys/stack.h>
38 #include <sys/sysent.h>
40 #include <machine/cpu.h>
41 #include <machine/md_var.h>
42 #include <machine/pcb.h>
43 #include <machine/reg.h>
44 #include <machine/stack.h>
47 #include <vm/vm_param.h>
51 #include <ddb/db_access.h>
52 #include <ddb/db_sym.h>
53 #include <ddb/db_variables.h>
55 static db_varfcn_t db_frame;
56 static db_varfcn_t db_frame_seg;
58 CTASSERT(sizeof(struct dbreg) == sizeof(((struct pcpu *)NULL)->pc_dbreg));
61 * Machine register set.
63 #define DB_OFFSET(x) (db_expr_t *)offsetof(struct trapframe, x)
64 struct db_variable db_regs[] = {
65 { "cs", DB_OFFSET(tf_cs), db_frame_seg },
66 { "ds", DB_OFFSET(tf_ds), db_frame_seg },
67 { "es", DB_OFFSET(tf_es), db_frame_seg },
68 { "fs", DB_OFFSET(tf_fs), db_frame_seg },
69 { "gs", DB_OFFSET(tf_gs), db_frame_seg },
70 { "ss", DB_OFFSET(tf_ss), db_frame_seg },
71 { "rax", DB_OFFSET(tf_rax), db_frame },
72 { "rcx", DB_OFFSET(tf_rcx), db_frame },
73 { "rdx", DB_OFFSET(tf_rdx), db_frame },
74 { "rbx", DB_OFFSET(tf_rbx), db_frame },
75 { "rsp", DB_OFFSET(tf_rsp), db_frame },
76 { "rbp", DB_OFFSET(tf_rbp), db_frame },
77 { "rsi", DB_OFFSET(tf_rsi), db_frame },
78 { "rdi", DB_OFFSET(tf_rdi), db_frame },
79 { "r8", DB_OFFSET(tf_r8), db_frame },
80 { "r9", DB_OFFSET(tf_r9), db_frame },
81 { "r10", DB_OFFSET(tf_r10), db_frame },
82 { "r11", DB_OFFSET(tf_r11), db_frame },
83 { "r12", DB_OFFSET(tf_r12), db_frame },
84 { "r13", DB_OFFSET(tf_r13), db_frame },
85 { "r14", DB_OFFSET(tf_r14), db_frame },
86 { "r15", DB_OFFSET(tf_r15), db_frame },
87 { "rip", DB_OFFSET(tf_rip), db_frame },
88 { "rflags", DB_OFFSET(tf_rflags), db_frame },
90 struct db_variable *db_eregs = db_regs + nitems(db_regs);
93 db_frame_seg(struct db_variable *vp, db_expr_t *valuep, int op)
97 if (kdb_frame == NULL)
100 reg = (uint16_t *)((uintptr_t)kdb_frame + (db_expr_t)vp->valuep);
101 if (op == DB_VAR_GET)
109 db_frame(struct db_variable *vp, db_expr_t *valuep, int op)
113 if (kdb_frame == NULL)
116 reg = (long *)((uintptr_t)kdb_frame + (db_expr_t)vp->valuep);
117 if (op == DB_VAR_GET)
128 #define TRAP_INTERRUPT 5
130 static void db_nextframe(struct amd64_frame **, db_addr_t *, struct thread *);
131 static void db_print_stack_entry(const char *, db_addr_t, void *);
132 static void decode_syscall(int, struct thread *);
134 static const char * watchtype_str(int type);
135 int amd64_set_watch(int watchnum, unsigned long watchaddr, int size,
136 int access, struct dbreg *d);
137 int amd64_clr_watch(int watchnum, struct dbreg *d);
140 db_print_stack_entry(const char *name, db_addr_t callpc, void *frame)
143 db_printf("%s() at ", name != NULL ? name : "??");
144 db_printsym(callpc, DB_STGY_PROC);
146 db_printf("/frame 0x%lx", (register_t)frame);
151 decode_syscall(int number, struct thread *td)
159 db_printf(" (%d", number);
160 p = (td != NULL) ? td->td_proc : NULL;
161 if (p != NULL && 0 <= number && number < p->p_sysent->sv_size) {
162 f = p->p_sysent->sv_table[number].sy_call;
163 sym = db_search_symbol((db_addr_t)f, DB_STGY_ANY, &diff);
164 if (sym != DB_SYM_NULL && diff == 0) {
165 db_symbol_values(sym, &symname, NULL);
166 db_printf(", %s, %s", p->p_sysent->sv_name, symname);
173 * Figure out the next frame up in the call stack.
176 db_nextframe(struct amd64_frame **fp, db_addr_t *ip, struct thread *td)
178 struct trapframe *tf;
185 rip = db_get_value((long) &(*fp)->f_retaddr, 8, FALSE);
186 rbp = db_get_value((long) &(*fp)->f_frame, 8, FALSE);
189 * Figure out frame type. We look at the address just before
190 * the saved instruction pointer as the saved EIP is after the
191 * call function, and if the function being called is marked as
192 * dead (such as panic() at the end of dblfault_handler()), then
193 * the instruction at the saved EIP will be part of a different
194 * function (syscall() in this example) rather than the one that
195 * actually made the call.
198 sym = db_search_symbol(rip - 1, DB_STGY_ANY, &offset);
199 db_symbol_values(sym, &name, NULL);
201 if (strcmp(name, "calltrap") == 0 ||
202 strcmp(name, "fork_trampoline") == 0 ||
203 strcmp(name, "nmi_calltrap") == 0 ||
204 strcmp(name, "Xdblfault") == 0)
206 else if (strncmp(name, "Xatpic_intr", 11) == 0 ||
207 strncmp(name, "Xapic_isr", 9) == 0 ||
208 strcmp(name, "Xtimerint") == 0 ||
209 strcmp(name, "Xipi_intr_bitmap_handler") == 0 ||
210 strcmp(name, "Xcpustop") == 0 ||
211 strcmp(name, "Xcpususpend") == 0 ||
212 strcmp(name, "Xrendezvous") == 0)
213 frame_type = INTERRUPT;
214 else if (strcmp(name, "Xfast_syscall") == 0)
215 frame_type = SYSCALL;
216 #ifdef COMPAT_FREEBSD32
217 else if (strcmp(name, "Xint0x80_syscall") == 0)
218 frame_type = SYSCALL;
220 /* XXX: These are interrupts with trap frames. */
221 else if (strcmp(name, "Xtimerint") == 0 ||
222 strcmp(name, "Xcpustop") == 0 ||
223 strcmp(name, "Xcpususpend") == 0 ||
224 strcmp(name, "Xrendezvous") == 0 ||
225 strcmp(name, "Xipi_intr_bitmap_handler") == 0)
226 frame_type = TRAP_INTERRUPT;
230 * Normal frames need no special processing.
232 if (frame_type == NORMAL) {
233 *ip = (db_addr_t) rip;
234 *fp = (struct amd64_frame *) rbp;
238 db_print_stack_entry(name, rip, &(*fp)->f_frame);
241 * Point to base of trapframe which is just above the
244 tf = (struct trapframe *)((long)*fp + 16);
246 if (INKERNEL((long) tf)) {
250 switch (frame_type) {
252 db_printf("--- trap %#r", tf->tf_trapno);
255 db_printf("--- syscall");
256 decode_syscall(tf->tf_rax, td);
260 db_printf("--- interrupt");
263 panic("The moon has moved again.");
265 db_printf(", rip = %#lr, rsp = %#lr, rbp = %#lr ---\n", rip,
269 *ip = (db_addr_t) rip;
270 *fp = (struct amd64_frame *) rbp;
274 db_backtrace(struct thread *td, struct trapframe *tf, struct amd64_frame *frame,
275 db_addr_t pc, register_t sp, int count)
277 struct amd64_frame *actframe;
287 while (count-- && !db_pager_quit) {
288 sym = db_search_symbol(pc, DB_STGY_ANY, &offset);
289 db_symbol_values(sym, &name, NULL);
292 * Attempt to determine a (possibly fake) frame that gives
293 * the caller's pc. It may differ from `frame' if the
294 * current function never sets up a standard frame or hasn't
295 * set one up yet or has just discarded one. The last two
296 * cases can be guessed fairly reliably for code generated
297 * by gcc. The first case is too much trouble to handle in
298 * general because the amount of junk on the stack depends
299 * on the pc (the special handling of "calltrap", etc. in
300 * db_nextframe() works because the `next' pc is special).
305 if (sym == C_DB_SYM_NULL && sp != 0) {
307 * If a symbol couldn't be found, we've probably
308 * jumped to a bogus location, so try and use
309 * the return address to find our caller.
311 db_print_stack_entry(name, pc, NULL);
312 pc = db_get_value(sp, 8, FALSE);
313 if (db_search_symbol(pc, DB_STGY_PROC,
314 &offset) == C_DB_SYM_NULL)
317 } else if (tf != NULL) {
320 instr = db_get_value(pc, 4, FALSE);
321 if ((instr & 0xffffffff) == 0xe5894855) {
322 /* pushq %rbp; movq %rsp, %rbp */
323 actframe = (void *)(tf->tf_rsp - 8);
324 } else if ((instr & 0xffffff) == 0xe58948) {
325 /* movq %rsp, %rbp */
326 actframe = (void *)tf->tf_rsp;
327 if (tf->tf_rbp == 0) {
328 /* Fake frame better. */
331 } else if ((instr & 0xff) == 0xc3) {
333 actframe = (void *)(tf->tf_rsp - 8);
334 } else if (offset == 0) {
335 /* Probably an assembler symbol. */
336 actframe = (void *)(tf->tf_rsp - 8);
338 } else if (strcmp(name, "fork_trampoline") == 0) {
340 * Don't try to walk back on a stack for a
341 * process that hasn't actually been run yet.
343 db_print_stack_entry(name, pc, actframe);
348 db_print_stack_entry(name, pc, actframe);
350 if (actframe != frame) {
351 /* `frame' belongs to caller. */
353 db_get_value((long)&actframe->f_retaddr, 8, FALSE);
357 db_nextframe(&frame, &pc, td);
359 if (INKERNEL((long)pc) && !INKERNEL((long)frame)) {
360 sym = db_search_symbol(pc, DB_STGY_ANY, &offset);
361 db_symbol_values(sym, &name, NULL);
362 db_print_stack_entry(name, pc, frame);
365 if (!INKERNEL((long) frame)) {
376 struct amd64_frame *frame;
380 __asm __volatile("movq %%rbp,%0" : "=r" (rbp));
381 frame = (struct amd64_frame *)rbp;
382 callpc = (db_addr_t)db_get_value((long)&frame->f_retaddr, 8, FALSE);
383 frame = frame->f_frame;
384 db_backtrace(curthread, NULL, frame, callpc, 0, -1);
388 db_trace_thread(struct thread *thr, int count)
391 struct trapframe *tf;
393 ctx = kdb_thr_ctx(thr);
394 tf = thr == kdb_thread ? kdb_frame : NULL;
395 return (db_backtrace(thr, tf, (struct amd64_frame *)ctx->pcb_rbp,
396 ctx->pcb_rip, ctx->pcb_rsp, count));
400 amd64_set_watch(watchnum, watchaddr, size, access, d)
402 unsigned long watchaddr;
409 if (watchnum == -1) {
410 for (i = 0; i < 4; i++)
411 if (!DBREG_DR7_ENABLED(d->dr[7], i))
421 size = 1; /* size must be 1 for an execution breakpoint */
423 case DBREG_DR7_WRONLY:
431 * we can watch a 1, 2, 4, or 8 byte sized location
435 len = DBREG_DR7_LEN_1;
438 len = DBREG_DR7_LEN_2;
441 len = DBREG_DR7_LEN_4;
444 len = DBREG_DR7_LEN_8;
450 /* clear the bits we are about to affect */
451 d->dr[7] &= ~DBREG_DR7_MASK(watchnum);
453 /* set drN register to the address, N=watchnum */
454 DBREG_DRX(d, watchnum) = watchaddr;
456 /* enable the watchpoint */
457 d->dr[7] |= DBREG_DR7_SET(watchnum, len, access,
458 DBREG_DR7_GLOBAL_ENABLE);
465 amd64_clr_watch(watchnum, d)
470 if (watchnum < 0 || watchnum >= 4)
473 d->dr[7] &= ~DBREG_DR7_MASK(watchnum);
474 DBREG_DRX(d, watchnum) = 0;
481 db_md_set_watchpoint(addr, size)
487 int avail, c, cpu, i, wsize;
489 d = (struct dbreg *)PCPU_PTR(dbreg);
490 cpu = PCPU_GET(cpuid);
491 fill_dbregs(NULL, d);
494 for (i = 0; i < 4; i++) {
495 if (!DBREG_DR7_ENABLED(d->dr[7], i))
499 if (avail * 8 < size)
502 for (i = 0; i < 4 && size > 0; i++) {
503 if (!DBREG_DR7_ENABLED(d->dr[7], i)) {
504 if (size >= 8 || (avail == 1 && size > 4))
510 amd64_set_watch(i, addr, wsize, DBREG_DR7_WRONLY, d);
522 memcpy(pc->pc_dbreg, d, sizeof(*d));
523 pc->pc_dbreg_cmd = PC_DBREG_CMD_LOAD;
530 db_md_clr_watchpoint(addr, size)
538 d = (struct dbreg *)PCPU_PTR(dbreg);
539 cpu = PCPU_GET(cpuid);
540 fill_dbregs(NULL, d);
542 for (i = 0; i < 4; i++) {
543 if (DBREG_DR7_ENABLED(d->dr[7], i)) {
544 if (DBREG_DRX((d), i) >= addr &&
545 DBREG_DRX((d), i) < addr + size)
546 amd64_clr_watch(i, d);
556 memcpy(pc->pc_dbreg, d, sizeof(*d));
557 pc->pc_dbreg_cmd = PC_DBREG_CMD_LOAD;
569 case DBREG_DR7_EXEC : return "execute"; break;
570 case DBREG_DR7_RDWR : return "read/write"; break;
571 case DBREG_DR7_WRONLY : return "write"; break;
572 default : return "invalid"; break;
578 db_md_list_watchpoints(void)
583 fill_dbregs(NULL, &d);
585 db_printf("\nhardware watchpoints:\n");
586 db_printf(" watch status type len address\n");
587 db_printf(" ----- -------- ---------- --- ------------------\n");
588 for (i = 0; i < 4; i++) {
589 if (DBREG_DR7_ENABLED(d.dr[7], i)) {
590 type = DBREG_DR7_ACCESS(d.dr[7], i);
591 len = DBREG_DR7_LEN(d.dr[7], i);
592 if (len == DBREG_DR7_LEN_8)
596 db_printf(" %-5d %-8s %10s %3d ",
597 i, "enabled", watchtype_str(type), len);
598 db_printsym((db_addr_t)DBREG_DRX(&d, i), DB_STGY_ANY);
601 db_printf(" %-5d disabled\n", i);
605 db_printf("\ndebug register values:\n");
606 for (i = 0; i < 8; i++)
607 if (i != 4 && i != 5)
608 db_printf(" dr%d 0x%016lx\n", i, DBREG_DRX(&d, i));
613 amd64_db_resume_dbreg(void)
617 switch (PCPU_GET(dbreg_cmd)) {
618 case PC_DBREG_CMD_LOAD:
619 d = (struct dbreg *)PCPU_PTR(dbreg);
621 PCPU_SET(dbreg_cmd, PC_DBREG_CMD_NONE);