2 * Mach Operating System
3 * Copyright (c) 1991,1990 Carnegie Mellon University
6 * Permission to use, copy, modify and distribute this software and its
7 * documentation is hereby granted, provided that both the copyright
8 * notice and this permission notice appear in all copies of the
9 * software, derivative works or modified versions, and any portions
10 * thereof, and that both notices appear in supporting documentation.
12 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS
13 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
14 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
16 * Carnegie Mellon requests users of this software to return to
18 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
19 * School of Computer Science
20 * Carnegie Mellon University
21 * Pittsburgh PA 15213-3890
23 * any improvements or extensions that they make and grant Carnegie the
24 * rights to redistribute these changes.
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD$");
30 #include "opt_compat.h"
32 #include <sys/param.h>
33 #include <sys/systm.h>
37 #include <sys/stack.h>
38 #include <sys/sysent.h>
40 #include <machine/cpu.h>
41 #include <machine/md_var.h>
42 #include <machine/pcb.h>
43 #include <machine/reg.h>
44 #include <machine/stack.h>
47 #include <vm/vm_param.h>
51 #include <ddb/db_access.h>
52 #include <ddb/db_sym.h>
53 #include <ddb/db_variables.h>
55 static db_varfcn_t db_frame;
56 static db_varfcn_t db_frame_seg;
58 CTASSERT(sizeof(struct dbreg) == sizeof(((struct pcpu *)NULL)->pc_dbreg));
61 * Machine register set.
63 #define DB_OFFSET(x) (db_expr_t *)offsetof(struct trapframe, x)
64 struct db_variable db_regs[] = {
65 { "cs", DB_OFFSET(tf_cs), db_frame_seg },
66 { "ds", DB_OFFSET(tf_ds), db_frame_seg },
67 { "es", DB_OFFSET(tf_es), db_frame_seg },
68 { "fs", DB_OFFSET(tf_fs), db_frame_seg },
69 { "gs", DB_OFFSET(tf_gs), db_frame_seg },
70 { "ss", DB_OFFSET(tf_ss), db_frame_seg },
71 { "rax", DB_OFFSET(tf_rax), db_frame },
72 { "rcx", DB_OFFSET(tf_rcx), db_frame },
73 { "rdx", DB_OFFSET(tf_rdx), db_frame },
74 { "rbx", DB_OFFSET(tf_rbx), db_frame },
75 { "rsp", DB_OFFSET(tf_rsp), db_frame },
76 { "rbp", DB_OFFSET(tf_rbp), db_frame },
77 { "rsi", DB_OFFSET(tf_rsi), db_frame },
78 { "rdi", DB_OFFSET(tf_rdi), db_frame },
79 { "r8", DB_OFFSET(tf_r8), db_frame },
80 { "r9", DB_OFFSET(tf_r9), db_frame },
81 { "r10", DB_OFFSET(tf_r10), db_frame },
82 { "r11", DB_OFFSET(tf_r11), db_frame },
83 { "r12", DB_OFFSET(tf_r12), db_frame },
84 { "r13", DB_OFFSET(tf_r13), db_frame },
85 { "r14", DB_OFFSET(tf_r14), db_frame },
86 { "r15", DB_OFFSET(tf_r15), db_frame },
87 { "rip", DB_OFFSET(tf_rip), db_frame },
88 { "rflags", DB_OFFSET(tf_rflags), db_frame },
90 struct db_variable *db_eregs = db_regs + nitems(db_regs);
93 db_frame_seg(struct db_variable *vp, db_expr_t *valuep, int op)
97 if (kdb_frame == NULL)
100 reg = (uint16_t *)((uintptr_t)kdb_frame + (db_expr_t)vp->valuep);
101 if (op == DB_VAR_GET)
109 db_frame(struct db_variable *vp, db_expr_t *valuep, int op)
113 if (kdb_frame == NULL)
116 reg = (long *)((uintptr_t)kdb_frame + (db_expr_t)vp->valuep);
117 if (op == DB_VAR_GET)
128 #define TRAP_INTERRUPT 5
130 static void db_nextframe(struct amd64_frame **, db_addr_t *, struct thread *);
131 static void db_print_stack_entry(const char *, db_addr_t, void *);
132 static void decode_syscall(int, struct thread *);
134 static const char * watchtype_str(int type);
135 int amd64_set_watch(int watchnum, unsigned long watchaddr, int size,
136 int access, struct dbreg *d);
137 int amd64_clr_watch(int watchnum, struct dbreg *d);
140 db_print_stack_entry(const char *name, db_addr_t callpc, void *frame)
143 db_printf("%s() at ", name != NULL ? name : "??");
144 db_printsym(callpc, DB_STGY_PROC);
146 db_printf("/frame 0x%lx", (register_t)frame);
151 decode_syscall(int number, struct thread *td)
159 db_printf(" (%d", number);
160 p = (td != NULL) ? td->td_proc : NULL;
161 if (p != NULL && 0 <= number && number < p->p_sysent->sv_size) {
162 f = p->p_sysent->sv_table[number].sy_call;
163 sym = db_search_symbol((db_addr_t)f, DB_STGY_ANY, &diff);
164 if (sym != DB_SYM_NULL && diff == 0) {
165 db_symbol_values(sym, &symname, NULL);
166 db_printf(", %s, %s", p->p_sysent->sv_name, symname);
173 * Figure out the next frame up in the call stack.
176 db_nextframe(struct amd64_frame **fp, db_addr_t *ip, struct thread *td)
178 struct trapframe *tf;
185 rip = db_get_value((long) &(*fp)->f_retaddr, 8, FALSE);
186 rbp = db_get_value((long) &(*fp)->f_frame, 8, FALSE);
189 * Figure out frame type. We look at the address just before
190 * the saved instruction pointer as the saved EIP is after the
191 * call function, and if the function being called is marked as
192 * dead (such as panic() at the end of dblfault_handler()), then
193 * the instruction at the saved EIP will be part of a different
194 * function (syscall() in this example) rather than the one that
195 * actually made the call.
198 sym = db_search_symbol(rip - 1, DB_STGY_ANY, &offset);
199 db_symbol_values(sym, &name, NULL);
201 if (strcmp(name, "calltrap") == 0 ||
202 strcmp(name, "fork_trampoline") == 0 ||
203 strcmp(name, "nmi_calltrap") == 0 ||
204 strcmp(name, "Xdblfault") == 0)
206 else if (strncmp(name, "Xatpic_intr", 11) == 0 ||
207 strncmp(name, "Xapic_isr", 9) == 0 ||
208 strcmp(name, "Xtimerint") == 0 ||
209 strcmp(name, "Xipi_intr_bitmap_handler") == 0 ||
210 strcmp(name, "Xcpustop") == 0 ||
211 strcmp(name, "Xcpususpend") == 0 ||
212 strcmp(name, "Xrendezvous") == 0)
213 frame_type = INTERRUPT;
214 else if (strcmp(name, "Xfast_syscall") == 0)
215 frame_type = SYSCALL;
216 #ifdef COMPAT_FREEBSD32
217 else if (strcmp(name, "Xint0x80_syscall") == 0)
218 frame_type = SYSCALL;
220 /* XXX: These are interrupts with trap frames. */
221 else if (strcmp(name, "Xtimerint") == 0 ||
222 strcmp(name, "Xcpustop") == 0 ||
223 strcmp(name, "Xcpususpend") == 0 ||
224 strcmp(name, "Xrendezvous") == 0 ||
225 strcmp(name, "Xipi_intr_bitmap_handler") == 0)
226 frame_type = TRAP_INTERRUPT;
230 * Normal frames need no special processing.
232 if (frame_type == NORMAL) {
233 *ip = (db_addr_t) rip;
234 *fp = (struct amd64_frame *) rbp;
238 db_print_stack_entry(name, rip, &(*fp)->f_frame);
241 * Point to base of trapframe which is just above the
244 tf = (struct trapframe *)((long)*fp + 16);
246 if (INKERNEL((long) tf)) {
250 switch (frame_type) {
252 db_printf("--- trap %#r", tf->tf_trapno);
255 db_printf("--- syscall");
256 decode_syscall(tf->tf_rax, td);
260 db_printf("--- interrupt");
263 panic("The moon has moved again.");
265 db_printf(", rip = %#lr, rsp = %#lr, rbp = %#lr ---\n", rip,
269 *ip = (db_addr_t) rip;
270 *fp = (struct amd64_frame *) rbp;
274 db_backtrace(struct thread *td, struct trapframe *tf, struct amd64_frame *frame,
275 db_addr_t pc, register_t sp, int count)
277 struct amd64_frame *actframe;
287 while (count-- && !db_pager_quit) {
288 sym = db_search_symbol(pc, DB_STGY_ANY, &offset);
289 db_symbol_values(sym, &name, NULL);
292 * Attempt to determine a (possibly fake) frame that gives
293 * the caller's pc. It may differ from `frame' if the
294 * current function never sets up a standard frame or hasn't
295 * set one up yet or has just discarded one. The last two
296 * cases can be guessed fairly reliably for code generated
297 * by gcc. The first case is too much trouble to handle in
298 * general because the amount of junk on the stack depends
299 * on the pc (the special handling of "calltrap", etc. in
300 * db_nextframe() works because the `next' pc is special).
305 if (sym == C_DB_SYM_NULL && sp != 0) {
307 * If a symbol couldn't be found, we've probably
308 * jumped to a bogus location, so try and use
309 * the return address to find our caller.
311 db_print_stack_entry(name, pc, NULL);
312 pc = db_get_value(sp, 8, FALSE);
313 if (db_search_symbol(pc, DB_STGY_PROC,
314 &offset) == C_DB_SYM_NULL)
317 } else if (tf != NULL) {
320 instr = db_get_value(pc, 4, FALSE);
321 if ((instr & 0xffffffff) == 0xe5894855) {
322 /* pushq %rbp; movq %rsp, %rbp */
323 actframe = (void *)(tf->tf_rsp - 8);
324 } else if ((instr & 0xffffff) == 0xe58948) {
325 /* movq %rsp, %rbp */
326 actframe = (void *)tf->tf_rsp;
327 if (tf->tf_rbp == 0) {
328 /* Fake frame better. */
331 } else if ((instr & 0xff) == 0xc3) {
333 actframe = (void *)(tf->tf_rsp - 8);
334 } else if (offset == 0) {
335 /* Probably an assembler symbol. */
336 actframe = (void *)(tf->tf_rsp - 8);
338 } else if (name != NULL &&
339 strcmp(name, "fork_trampoline") == 0) {
341 * Don't try to walk back on a stack for a
342 * process that hasn't actually been run yet.
344 db_print_stack_entry(name, pc, actframe);
349 db_print_stack_entry(name, pc, actframe);
351 if (actframe != frame) {
352 /* `frame' belongs to caller. */
354 db_get_value((long)&actframe->f_retaddr, 8, FALSE);
358 db_nextframe(&frame, &pc, td);
360 if (INKERNEL((long)pc) && !INKERNEL((long)frame)) {
361 sym = db_search_symbol(pc, DB_STGY_ANY, &offset);
362 db_symbol_values(sym, &name, NULL);
363 db_print_stack_entry(name, pc, frame);
366 if (!INKERNEL((long) frame)) {
377 struct amd64_frame *frame;
381 __asm __volatile("movq %%rbp,%0" : "=r" (rbp));
382 frame = (struct amd64_frame *)rbp;
383 callpc = (db_addr_t)db_get_value((long)&frame->f_retaddr, 8, FALSE);
384 frame = frame->f_frame;
385 db_backtrace(curthread, NULL, frame, callpc, 0, -1);
389 db_trace_thread(struct thread *thr, int count)
392 struct trapframe *tf;
394 ctx = kdb_thr_ctx(thr);
395 tf = thr == kdb_thread ? kdb_frame : NULL;
396 return (db_backtrace(thr, tf, (struct amd64_frame *)ctx->pcb_rbp,
397 ctx->pcb_rip, ctx->pcb_rsp, count));
401 amd64_set_watch(watchnum, watchaddr, size, access, d)
403 unsigned long watchaddr;
410 if (watchnum == -1) {
411 for (i = 0; i < 4; i++)
412 if (!DBREG_DR7_ENABLED(d->dr[7], i))
422 size = 1; /* size must be 1 for an execution breakpoint */
424 case DBREG_DR7_WRONLY:
432 * we can watch a 1, 2, 4, or 8 byte sized location
436 len = DBREG_DR7_LEN_1;
439 len = DBREG_DR7_LEN_2;
442 len = DBREG_DR7_LEN_4;
445 len = DBREG_DR7_LEN_8;
451 /* clear the bits we are about to affect */
452 d->dr[7] &= ~DBREG_DR7_MASK(watchnum);
454 /* set drN register to the address, N=watchnum */
455 DBREG_DRX(d, watchnum) = watchaddr;
457 /* enable the watchpoint */
458 d->dr[7] |= DBREG_DR7_SET(watchnum, len, access,
459 DBREG_DR7_GLOBAL_ENABLE);
466 amd64_clr_watch(watchnum, d)
471 if (watchnum < 0 || watchnum >= 4)
474 d->dr[7] &= ~DBREG_DR7_MASK(watchnum);
475 DBREG_DRX(d, watchnum) = 0;
482 db_md_set_watchpoint(addr, size)
488 int avail, c, cpu, i, wsize;
490 d = (struct dbreg *)PCPU_PTR(dbreg);
491 cpu = PCPU_GET(cpuid);
492 fill_dbregs(NULL, d);
495 for (i = 0; i < 4; i++) {
496 if (!DBREG_DR7_ENABLED(d->dr[7], i))
500 if (avail * 8 < size)
503 for (i = 0; i < 4 && size > 0; i++) {
504 if (!DBREG_DR7_ENABLED(d->dr[7], i)) {
505 if (size >= 8 || (avail == 1 && size > 4))
511 amd64_set_watch(i, addr, wsize, DBREG_DR7_WRONLY, d);
523 memcpy(pc->pc_dbreg, d, sizeof(*d));
524 pc->pc_dbreg_cmd = PC_DBREG_CMD_LOAD;
531 db_md_clr_watchpoint(addr, size)
539 d = (struct dbreg *)PCPU_PTR(dbreg);
540 cpu = PCPU_GET(cpuid);
541 fill_dbregs(NULL, d);
543 for (i = 0; i < 4; i++) {
544 if (DBREG_DR7_ENABLED(d->dr[7], i)) {
545 if (DBREG_DRX((d), i) >= addr &&
546 DBREG_DRX((d), i) < addr + size)
547 amd64_clr_watch(i, d);
557 memcpy(pc->pc_dbreg, d, sizeof(*d));
558 pc->pc_dbreg_cmd = PC_DBREG_CMD_LOAD;
570 case DBREG_DR7_EXEC : return "execute"; break;
571 case DBREG_DR7_RDWR : return "read/write"; break;
572 case DBREG_DR7_WRONLY : return "write"; break;
573 default : return "invalid"; break;
579 db_md_list_watchpoints()
584 fill_dbregs(NULL, &d);
586 db_printf("\nhardware watchpoints:\n");
587 db_printf(" watch status type len address\n");
588 db_printf(" ----- -------- ---------- --- ------------------\n");
589 for (i = 0; i < 4; i++) {
590 if (DBREG_DR7_ENABLED(d.dr[7], i)) {
591 type = DBREG_DR7_ACCESS(d.dr[7], i);
592 len = DBREG_DR7_LEN(d.dr[7], i);
593 if (len == DBREG_DR7_LEN_8)
597 db_printf(" %-5d %-8s %10s %3d ",
598 i, "enabled", watchtype_str(type), len);
599 db_printsym((db_addr_t)DBREG_DRX((&d), i), DB_STGY_ANY);
602 db_printf(" %-5d disabled\n", i);
606 db_printf("\ndebug register values:\n");
607 for (i = 0; i < 8; i++) {
608 db_printf(" dr%d 0x%016lx\n", i, DBREG_DRX((&d), i));
614 amd64_db_resume_dbreg(void)
618 switch (PCPU_GET(dbreg_cmd)) {
619 case PC_DBREG_CMD_LOAD:
620 d = (struct dbreg *)PCPU_PTR(dbreg);
622 PCPU_SET(dbreg_cmd, PC_DBREG_CMD_NONE);