blob: 9232caee70604c686e07b7aef4c21598c7196fa4 [file] [log] [blame]
Jason Wessel5cbad0e2008-02-20 13:33:40 -06001/*
2 * arch/arm/kernel/kgdb.c
3 *
4 * ARM KGDB support
5 *
6 * Copyright (c) 2002-2004 MontaVista Software, Inc
7 * Copyright (c) 2008 Wind River Systems, Inc.
8 *
9 * Authors: George Davis <davis_g@mvista.com>
10 * Deepak Saxena <dsaxena@plexity.net>
11 */
Will Deacon5d8614c2010-03-12 11:03:58 +010012#include <linux/irq.h>
Jason Wessel62a03092010-08-05 09:22:22 -050013#include <linux/kdebug.h>
Jason Wessel5cbad0e2008-02-20 13:33:40 -060014#include <linux/kgdb.h>
Doug Anderson23a4e402014-04-22 15:14:51 -070015#include <linux/uaccess.h>
16
Wang Nanfca08f32015-01-09 10:19:49 +080017#include <asm/patch.h>
Jason Wessel5cbad0e2008-02-20 13:33:40 -060018#include <asm/traps.h>
19
Jason Wessel22eeef42010-08-05 09:22:21 -050020struct dbg_reg_def_t dbg_reg_def[DBG_MAX_REG_NUM] =
Jason Wessel5cbad0e2008-02-20 13:33:40 -060021{
Jason Wessel22eeef42010-08-05 09:22:21 -050022 { "r0", 4, offsetof(struct pt_regs, ARM_r0)},
23 { "r1", 4, offsetof(struct pt_regs, ARM_r1)},
24 { "r2", 4, offsetof(struct pt_regs, ARM_r2)},
25 { "r3", 4, offsetof(struct pt_regs, ARM_r3)},
26 { "r4", 4, offsetof(struct pt_regs, ARM_r4)},
27 { "r5", 4, offsetof(struct pt_regs, ARM_r5)},
28 { "r6", 4, offsetof(struct pt_regs, ARM_r6)},
29 { "r7", 4, offsetof(struct pt_regs, ARM_r7)},
30 { "r8", 4, offsetof(struct pt_regs, ARM_r8)},
31 { "r9", 4, offsetof(struct pt_regs, ARM_r9)},
32 { "r10", 4, offsetof(struct pt_regs, ARM_r10)},
33 { "fp", 4, offsetof(struct pt_regs, ARM_fp)},
34 { "ip", 4, offsetof(struct pt_regs, ARM_ip)},
35 { "sp", 4, offsetof(struct pt_regs, ARM_sp)},
36 { "lr", 4, offsetof(struct pt_regs, ARM_lr)},
37 { "pc", 4, offsetof(struct pt_regs, ARM_pc)},
38 { "f0", 12, -1 },
39 { "f1", 12, -1 },
40 { "f2", 12, -1 },
41 { "f3", 12, -1 },
42 { "f4", 12, -1 },
43 { "f5", 12, -1 },
44 { "f6", 12, -1 },
45 { "f7", 12, -1 },
46 { "fps", 4, -1 },
47 { "cpsr", 4, offsetof(struct pt_regs, ARM_cpsr)},
48};
Jason Wessel5cbad0e2008-02-20 13:33:40 -060049
Jason Wessel22eeef42010-08-05 09:22:21 -050050char *dbg_get_reg(int regno, void *mem, struct pt_regs *regs)
51{
52 if (regno >= DBG_MAX_REG_NUM || regno < 0)
53 return NULL;
Jason Wessel5cbad0e2008-02-20 13:33:40 -060054
Jason Wessel22eeef42010-08-05 09:22:21 -050055 if (dbg_reg_def[regno].offset != -1)
56 memcpy(mem, (void *)regs + dbg_reg_def[regno].offset,
57 dbg_reg_def[regno].size);
58 else
59 memset(mem, 0, dbg_reg_def[regno].size);
60 return dbg_reg_def[regno].name;
Jason Wessel5cbad0e2008-02-20 13:33:40 -060061}
62
Jason Wessel22eeef42010-08-05 09:22:21 -050063int dbg_set_reg(int regno, void *mem, struct pt_regs *regs)
Jason Wessel5cbad0e2008-02-20 13:33:40 -060064{
Jason Wessel22eeef42010-08-05 09:22:21 -050065 if (regno >= DBG_MAX_REG_NUM || regno < 0)
66 return -EINVAL;
67
68 if (dbg_reg_def[regno].offset != -1)
69 memcpy((void *)regs + dbg_reg_def[regno].offset, mem,
70 dbg_reg_def[regno].size);
71 return 0;
Jason Wessel5cbad0e2008-02-20 13:33:40 -060072}
73
74void
75sleeping_thread_to_gdb_regs(unsigned long *gdb_regs, struct task_struct *task)
76{
Doug Anderson001bf452015-09-02 03:39:19 +010077 struct thread_info *ti;
Jason Wessel5cbad0e2008-02-20 13:33:40 -060078 int regno;
79
80 /* Just making sure... */
81 if (task == NULL)
82 return;
83
84 /* Initialize to zero */
Rabin Vincent834b2962010-10-26 12:49:00 -050085 for (regno = 0; regno < GDB_MAX_REGS; regno++)
Jason Wessel5cbad0e2008-02-20 13:33:40 -060086 gdb_regs[regno] = 0;
87
88 /* Otherwise, we have only some registers from switch_to() */
Doug Anderson001bf452015-09-02 03:39:19 +010089 ti = task_thread_info(task);
90 gdb_regs[_R4] = ti->cpu_context.r4;
91 gdb_regs[_R5] = ti->cpu_context.r5;
92 gdb_regs[_R6] = ti->cpu_context.r6;
93 gdb_regs[_R7] = ti->cpu_context.r7;
94 gdb_regs[_R8] = ti->cpu_context.r8;
95 gdb_regs[_R9] = ti->cpu_context.r9;
96 gdb_regs[_R10] = ti->cpu_context.sl;
97 gdb_regs[_FP] = ti->cpu_context.fp;
98 gdb_regs[_SPT] = ti->cpu_context.sp;
99 gdb_regs[_PC] = ti->cpu_context.pc;
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600100}
101
Jason Wesseldcc78712010-05-20 21:04:21 -0500102void kgdb_arch_set_pc(struct pt_regs *regs, unsigned long pc)
103{
104 regs->ARM_pc = pc;
105}
106
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600107static int compiled_break;
108
109int kgdb_arch_handle_exception(int exception_vector, int signo,
110 int err_code, char *remcom_in_buffer,
111 char *remcom_out_buffer,
112 struct pt_regs *linux_regs)
113{
114 unsigned long addr;
115 char *ptr;
116
117 switch (remcom_in_buffer[0]) {
118 case 'D':
119 case 'k':
120 case 'c':
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600121 /*
122 * Try to read optional parameter, pc unchanged if no parm.
123 * If this was a compiled breakpoint, we need to move
124 * to the next instruction or we will just breakpoint
125 * over and over again.
126 */
127 ptr = &remcom_in_buffer[1];
128 if (kgdb_hex2long(&ptr, &addr))
129 linux_regs->ARM_pc = addr;
130 else if (compiled_break == 1)
131 linux_regs->ARM_pc += 4;
132
133 compiled_break = 0;
134
135 return 0;
136 }
137
138 return -1;
139}
140
141static int kgdb_brk_fn(struct pt_regs *regs, unsigned int instr)
142{
143 kgdb_handle_exception(1, SIGTRAP, 0, regs);
144
145 return 0;
146}
147
148static int kgdb_compiled_brk_fn(struct pt_regs *regs, unsigned int instr)
149{
150 compiled_break = 1;
151 kgdb_handle_exception(1, SIGTRAP, 0, regs);
152
153 return 0;
154}
155
156static struct undef_hook kgdb_brkpt_hook = {
157 .instr_mask = 0xffffffff,
158 .instr_val = KGDB_BREAKINST,
Omar Sandoval6bf755d2014-08-01 18:14:06 +0100159 .cpsr_mask = MODE_MASK,
160 .cpsr_val = SVC_MODE,
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600161 .fn = kgdb_brk_fn
162};
163
164static struct undef_hook kgdb_compiled_brkpt_hook = {
165 .instr_mask = 0xffffffff,
166 .instr_val = KGDB_COMPILED_BREAK,
Omar Sandoval6bf755d2014-08-01 18:14:06 +0100167 .cpsr_mask = MODE_MASK,
168 .cpsr_val = SVC_MODE,
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600169 .fn = kgdb_compiled_brk_fn
170};
171
Will Deacon5d8614c2010-03-12 11:03:58 +0100172static void kgdb_call_nmi_hook(void *ignored)
173{
174 kgdb_nmicallback(raw_smp_processor_id(), get_irq_regs());
175}
176
177void kgdb_roundup_cpus(unsigned long flags)
178{
179 local_irq_enable();
180 smp_call_function(kgdb_call_nmi_hook, NULL, 0);
181 local_irq_disable();
182}
183
Jason Wessel62a03092010-08-05 09:22:22 -0500184static int __kgdb_notify(struct die_args *args, unsigned long cmd)
185{
186 struct pt_regs *regs = args->regs;
187
188 if (kgdb_handle_exception(1, args->signr, cmd, regs))
189 return NOTIFY_DONE;
190 return NOTIFY_STOP;
191}
192static int
193kgdb_notify(struct notifier_block *self, unsigned long cmd, void *ptr)
194{
195 unsigned long flags;
196 int ret;
197
198 local_irq_save(flags);
199 ret = __kgdb_notify(ptr, cmd);
200 local_irq_restore(flags);
201
202 return ret;
203}
204
205static struct notifier_block kgdb_notifier = {
206 .notifier_call = kgdb_notify,
207 .priority = -INT_MAX,
208};
209
210
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600211/**
212 * kgdb_arch_init - Perform any architecture specific initalization.
213 *
214 * This function will handle the initalization of any architecture
215 * specific callbacks.
216 */
217int kgdb_arch_init(void)
218{
Jason Wessel62a03092010-08-05 09:22:22 -0500219 int ret = register_die_notifier(&kgdb_notifier);
220
221 if (ret != 0)
222 return ret;
223
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600224 register_undef_hook(&kgdb_brkpt_hook);
225 register_undef_hook(&kgdb_compiled_brkpt_hook);
226
227 return 0;
228}
229
230/**
231 * kgdb_arch_exit - Perform any architecture specific uninitalization.
232 *
233 * This function will handle the uninitalization of any architecture
234 * specific callbacks, for dynamic registration and unregistration.
235 */
236void kgdb_arch_exit(void)
237{
238 unregister_undef_hook(&kgdb_brkpt_hook);
239 unregister_undef_hook(&kgdb_compiled_brkpt_hook);
Jason Wessel62a03092010-08-05 09:22:22 -0500240 unregister_die_notifier(&kgdb_notifier);
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600241}
242
Doug Anderson23a4e402014-04-22 15:14:51 -0700243int kgdb_arch_set_breakpoint(struct kgdb_bkpt *bpt)
244{
245 int err;
246
247 /* patch_text() only supports int-sized breakpoints */
248 BUILD_BUG_ON(sizeof(int) != BREAK_INSTR_SIZE);
249
250 err = probe_kernel_read(bpt->saved_instr, (char *)bpt->bpt_addr,
251 BREAK_INSTR_SIZE);
252 if (err)
253 return err;
254
Doug Anderson7ae85dc2015-08-26 18:26:49 +0100255 /* Machine is already stopped, so we can use __patch_text() directly */
256 __patch_text((void *)bpt->bpt_addr,
257 *(unsigned int *)arch_kgdb_ops.gdb_bpt_instr);
Doug Anderson23a4e402014-04-22 15:14:51 -0700258
259 return err;
260}
261
262int kgdb_arch_remove_breakpoint(struct kgdb_bkpt *bpt)
263{
Doug Anderson7ae85dc2015-08-26 18:26:49 +0100264 /* Machine is already stopped, so we can use __patch_text() directly */
265 __patch_text((void *)bpt->bpt_addr, *(unsigned int *)bpt->saved_instr);
Doug Anderson23a4e402014-04-22 15:14:51 -0700266
267 return 0;
268}
269
Jason Wessel5cbad0e2008-02-20 13:33:40 -0600270/*
271 * Register our undef instruction hooks with ARM undef core.
272 * We regsiter a hook specifically looking for the KGB break inst
273 * and we handle the normal undef case within the do_undefinstr
274 * handler.
275 */
276struct kgdb_arch arch_kgdb_ops = {
277#ifndef __ARMEB__
278 .gdb_bpt_instr = {0xfe, 0xde, 0xff, 0xe7}
279#else /* ! __ARMEB__ */
280 .gdb_bpt_instr = {0xe7, 0xff, 0xde, 0xfe}
281#endif
282};