From: "Battig, Caleb" <Caleb.Battig@netapp.com>
To: Simon Marchi <simark@simark.ca>,
"gdb-patches@sourceware.org" <gdb-patches@sourceware.org>
Cc: "Lovett, Stuart" <Stuart.Lovett@netapp.com>,
"Peikes, Wendy" <Wendy.Peikes@netapp.com>
Subject: Re: [PING][PING] Added x86_64 stub for debugging embedded systems running on Intel x86_64 processor architecture.
Date: Tue, 20 Oct 2020 16:34:30 +0000 [thread overview]
Message-ID: <BL0PR06MB44183BAEDCCA038EB0F21E1BE11F0@BL0PR06MB4418.namprd06.prod.outlook.com> (raw)
In-Reply-To: <074c171f-c4c0-d50f-0b51-c2d3e7e79ad3@simark.ca>
[-- Attachment #1.1: Type: text/plain, Size: 2873 bytes --]
Simon,
Thanks for getting back to me. I am unfortunately unable to use 'gdb send-email' to send git patches. This is because my organization requires two factor authentication for Outlook (our email client) and I don't think Git Credential Manager can be setup with 2fa. For instance -
Send this email? ([y]es|[n]o|[q]uit|[a]ll): y
5.7.3 Authentication unsuccessful [SA0PR11CA0047.namprd11.prod.outlook.com]
The GDB Contribution Checklist - https://sourceware.org/gdb/wiki/ContributionChecklist#Submitting_patches - says, "If using git send-email is not possible for you, you can still try to send it using your email client, pasting the output of git format-patch in the email body." So I have opted for this instead.
I have cleaned up all the whitespace coding standard violations. See the attachment.
Thanks,
Caleb Battig
Platform Software Engineer
NetApp
724.741.5226 Direct Phone
Caleb.Battig@netapp.com<mailto:Eugene.Novak@netapp.com>
netapp.com<http://www.netapp.com/us/>
[cid:1f8fcc99-6da2-4a8a-8f86-465d04044777]
________________________________
From: Simon Marchi <simark@simark.ca>
Sent: Tuesday, October 20, 2020 7:09 AM
To: Battig, Caleb <Caleb.Battig@netapp.com>; gdb-patches@sourceware.org <gdb-patches@sourceware.org>
Cc: Lovett, Stuart <Stuart.Lovett@netapp.com>; Peikes, Wendy <Wendy.Peikes@netapp.com>
Subject: Re: [PING][PING] Added x86_64 stub for debugging embedded systems running on Intel x86_64 processor architecture.
NetApp Security WARNING: This is an external email. Do not click links or open attachments unless you recognize the sender and know the content is safe.
On 2020-10-19 6:23 p.m., Battig, Caleb wrote:
> Simon,
>
> Thanks so much for looking into this. This is a significant addition to GDB that has the potential to help a lot of developers.
>
> I've made some formatting changes. See the attached patch. I'm not sure what you meant by your comment on whitespace and indentation, but I made all the other changes.
>
> Thanks,
For example, if a line is indented by 18 columns, that means you'll have
two tabs (worth 16 columns) followed by two spaces (for a total of 18
columns).
You can find the faulty lines using:
$ grep -E '^\t* ' x86_64-stub.c
Can you please send your patch using git-send-email? It's not
convenient to send in-line comments for a patch sent as attachment.
"if" blocks should be formatted like this:
if (something)
{
..
}
"if" blocks that contain a single line don't need braces. The exception
is if you ou have nested "if" blocks, the outer ones need to have
braces:
if (something)
printf ("Something");
but:
if (something)
{
if (something_else)
printf ("Something 1");
}
else
printf ("Something 2");
Thanks,
Simon
[-- Attachment #1.2: Outlook-4vqmjijw.png --]
[-- Type: image/png, Size: 56478 bytes --]
[-- Attachment #2: 0001-Added-x86_64-stub-for-debugging-embedded-systems-run.patch --]
[-- Type: application/octet-stream, Size: 38137 bytes --]
From ea6b0e3ed665ffb3aa18fdc535aeb1247eaabacc Mon Sep 17 00:00:00 2001
From: Caleb Battig <caleb.battig@netapp.com>
Date: Tue, 20 Oct 2020 10:29:14 -0600
Subject: [PATCH] Added-x86_64 stub for debugging embedded systems running
Intel x86_64 architecture.
---
gdb/stubs/x86_64-stub.c | 1272 +++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 1272 insertions(+)
create mode 100644 gdb/stubs/x86_64-stub.c
diff --git a/gdb/stubs/x86_64-stub.c b/gdb/stubs/x86_64-stub.c
new file mode 100644
index 0000000000..eaf523a237
--- /dev/null
+++ b/gdb/stubs/x86_64-stub.c
@@ -0,0 +1,1272 @@
+/****************************************************************************
+
+ THIS SOFTWARE IS NOT COPYRIGHTED
+
+ HP offers the following for use in the public domain. HP makes no
+ warranty with regard to the software or it's performance and the
+ user accepts the software "AS IS" with all faults.
+
+ HP DISCLAIMS ANY WARRANTIES, EXPRESS OR IMPLIED, WITH REGARD
+ TO THIS SOFTWARE INCLUDING BUT NOT LIMITED TO THE WARRANTIES
+ OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
+
+****************************************************************************/
+
+/****************************************************************************
+ * Header: remcom.c,v 1.34 91/03/09 12:29:49 glenne Exp $
+ *
+ * Module name: remcom.c $
+ * Revision: 1.34 $
+ * Date: 91/03/09 12:29:49 $
+ * Contributor: Lake Stevens Instrument Division$
+ *
+ * Description: low level support for gdb debugger. $
+ *
+ * Considerations: only works on target hardware $
+ *
+ * Written by: Glenn Engel $
+ * ModuleState: Experimental $
+ *
+ * NOTES: See Below $
+ *
+ * Modified for 386 by Jim Kingdon, Cygnus Support.
+ *
+ * To enable debugger support, two things need to happen. One, a
+ * call to set_debug_traps() is necessary in order to allow any breakpoints
+ * or error conditions to be properly intercepted and reported to gdb.
+ * Two, a breakpoint needs to be generated to begin communication. This
+ * is most easily accomplished by a call to breakpoint(). Breakpoint()
+ * simulates a breakpoint by executing a trap #1.
+ *
+ * The function exceptionHandler () is
+ * used to attach a specific handler to a specific 386 vector number.
+ * It should use the same privilege level it runs at. It should
+ * install it as an interrupt gate so that interrupts are masked
+ * while the handler runs.
+ *
+ * Because gdb will sometimes write to the stack area to execute function
+ * calls, this program cannot rely on using the supervisor stack so it
+ * uses it's own stack area reserved in the int array remcomStack.
+ *
+ *************
+ *
+ * The following gdb commands are supported:
+ *
+ * command function Return value
+ *
+ * g return the value of the CPU _registers hex data or ENN
+ * G set the value of the CPU _registers OK or ENN
+ *
+ * mAA..AA,LLLL Read LLLL bytes at address AA..AA hex data or ENN
+ * MAA..AA,LLLL: Write LLLL bytes at address AA.AA OK or ENN
+ *
+ * c Resume at current address SNN ( signal NN)
+ * cAA..AA Continue at address AA..AA SNN
+ *
+ * s Step one instruction SNN
+ * sAA..AA Step one instruction from AA..AA SNN
+ *
+ * k kill
+ *
+ * ? What was the last sigval ? SNN (signal NN)
+ *
+ * All commands and responses are sent with a packet which includes a
+ * checksum. A packet consists of
+ *
+ * $<packet info>#<checksum>.
+ *
+ * where
+ * <packet info> :: <characters representing the command or response>
+ * <checksum> :: < two hex digits computed as modulo 256 sum of <packetinfo>>
+ *
+ * When a packet is received, it is first acknowledged with either '+' or '-'.
+ * '+' indicates a successful transfer. '-' indicates a failed transfer.
+ *
+ * Example:
+ *
+ * Host: Reply:
+ * $m0,10#2a +$00010203040506070809101112131415#42
+ *
+ ****************************************************************************/
+
+/****************************************************************************
+ *
+ * Update 2020/03/05
+ *
+ * This stub is based on the old x86 stub (i386-stub.c) provided by gdb.
+ * It has been updated to support intel x86_64 processor architecture.
+ *
+ ****************************************************************************/
+
+/*
+ * We don't want GCC to compile this file with any optimizations since
+ * it contains so much embedded x64 assembly code.
+ */
+#pragma GCC optimize("-O0")
+
+#include <stdio.h>
+#include <string.h>
+
+/* single threaded target */
+#define THREAD_TID "1"
+
+/************************************************************************
+ *
+ * External low-level support routines.
+ * These functions should have an OS specific implementation provided.
+ * See - https://sourceware.org/gdb/onlinedocs/gdb/Bootstrapping.html#Bootstrapping.
+ *
+ * For convenience, default implementations of these functions are provided at the
+ * end of this file, but they may not apply to your OS. To enable the default
+ * implementations uncomment the below defines:
+ *
+ * #define GDB_USE_SERIAL_PORT_IO // for the functions putDebugChar() and getDebugChar()
+ * #define GDB_USE_STD_X64_EXCEPTION_HANDLER // for the function exceptionHandler()
+ */
+extern void putDebugChar (char c); /* write a single character */
+extern int getDebugChar (void); /* read and return a single char */
+extern void exceptionHandler (int intr_vector, void *intr_handler); /* install intr_handler as handler for exception intr_vector */
+/************************************************************************/
+
+/************************************************************************
+ * Internal support routines
+ */
+static char *gdb_strcpy (char *dest, const char *src); /* essentially strcpy */
+static void gdb_bcopy (void *from, void *to, int length);
+static int gdb_str_starts_with (char *str, char *prefix);
+static size_t gdb_run_length_encode (char *buffer, size_t length);
+/************************************************************************/
+
+/* BUFMAX defines the maximum number of characters in inbound/outbound buffers*/
+/* at least NUMREGBYTES*2 are needed for register packets */
+#define BUFMAX 1024
+
+static char initialized = 0; /* boolean flag. != 0 means we've been initialized */
+static const char hexchars[] = "0123456789abcdef";
+
+/*
+ * GDB expects the 16-bit segment registers (%cs, %ss, %ds, %es, %fs, %gs)
+ * as well as the 64-bit rflags register to be stored in 32-bit fields.
+ * So we need to separate the registers into two arrays.
+ */
+
+/* Number of non-segment registers. */
+#define NUMREGS 17
+/* Number of segment registers. */
+#define NUMSEGREGS 7
+
+/* Number of bytes of 64-bit registers. */
+#define NUMREGBYTES (NUMREGS * 8)
+/* Need to store the segment registers in 32-bit fields. */
+#define NUMSEGREGBYTES (NUMSEGREGS * 4)
+
+/* Names of 64-bit registers */
+enum regnames { RAX, RBX, RCX, RDX, RSI, RDI, RBP, RSP,
+ R8, R9, R10, R11, R12, R13, R14, R15,
+ RIP };
+/*
+ * Names of 16-bit segment registers.
+ * rflags is included here because GDB expects it to be stored
+ * in a 32-bit field
+ */
+enum segregnames { PS /* also known as rflags */, CS, SS, DS, ES, FS, GS };
+
+/*
+ * These should not be static because they can be used outside this module
+ */
+uint64_t _registers[NUMREGS];
+uint32_t _segregisters[NUMSEGREGS];
+
+#define STACKSIZE 10000
+uint64_t remcomStack[STACKSIZE/sizeof(uint64_t)];
+static uint64_t* _stackPtr = &remcomStack[STACKSIZE/sizeof(uint64_t) - 1];
+
+
+/*************************** ASSEMBLY CODE MACROS *************************/
+
+extern void
+_return_to_prog ();
+
+/* Restore the program's _registers (including the stack pointer, which
+ means we get the right stack and don't have to worry about popping our
+ return address and any stack frames and so on) and return. */
+asm(".text");
+asm(".globl _return_to_prog");
+asm("_return_to_prog:");
+ asm("movw _segregisters+8, %ss");
+ asm("movq _registers+56, %rsp");
+ asm("movq _registers+8, %rbx");
+ asm("movq _registers+16, %rcx");
+ asm("movq _registers+24, %rdx");
+ asm("movq _registers+32, %rsi");
+ asm("movq _registers+40, %rdi");
+ asm("movq _registers+48, %rbp");
+ asm("movq _registers+64, %r8");
+ asm("movq _registers+72, %r9");
+ asm("movq _registers+80, %r10");
+ asm("movq _registers+88, %r11");
+ asm("movq _registers+96, %r12");
+ asm("movq _registers+104, %r13");
+ asm("movq _registers+112, %r14");
+ asm("movq _registers+120, %r15");
+ asm("movw _segregisters+12, %ds");
+ asm("movw _segregisters+16, %es");
+ asm("movw _segregisters+20, %fs");
+ asm("movw _segregisters+24, %gs");
+ asm("xorq %rax, %rax");
+ asm("movl _segregisters, %eax");
+ asm("pushq %rax"); /* saved rflags */
+ asm("movl _segregisters+4, %eax");
+ asm("pushq %rax"); /* saved cs */
+ asm("movq _registers+128, %rax");
+ asm("pushq %rax"); /* saved rip */
+ asm("movq _registers, %rax");
+ /* use iretq to restore rip and rflags together so
+ that trace flag works right. */
+ asm("iretq");
+
+#define BREAKPOINT() asm(" int $3")
+
+/* Put the error code here just in case the user cares. */
+uint64_t _gdb_errcode;
+/* Likewise, the vector number here (since GDB only gets the signal
+ number through the usual means, and that's not very specific). */
+uint64_t gdb_vector = -1;
+
+/* GDB stores segment _registers in 32-bit words (that's just the way
+ m-i386v.h is written). So zero the appropriate areas in _segregisters. */
+#define SAVE_REGISTERS1() \
+ asm ("movq %rax, _registers"); \
+ asm ("movq %rbx, _registers+8"); \
+ asm ("movq %rcx, _registers+16"); \
+ asm ("movq %rdx, _registers+24"); \
+ asm ("movq %rsi, _registers+32"); \
+ asm ("movq %rdi, _registers+40"); \
+ asm ("movq %rbp, _registers+48"); \
+ asm ("movq %r8, _registers+64"); \
+ asm ("movq %r9, _registers+72"); \
+ asm ("movq %r10, _registers+80"); \
+ asm ("movq %r11, _registers+88"); \
+ asm ("movq %r12, _registers+96"); \
+ asm ("movq %r13, _registers+104"); \
+ asm ("movq %r14, _registers+112"); \
+ asm ("movq %r15, _registers+120"); \
+ asm ("movw $0, %ax"); \
+ asm ("movw %ds, _segregisters+12"); \
+ asm ("movw %ax, _segregisters+14"); \
+ asm ("movw %es, _segregisters+16"); \
+ asm ("movw %ax, _segregisters+18"); \
+ asm ("movw %fs, _segregisters+20"); \
+ asm ("movw %ax, _segregisters+22"); \
+ asm ("movw %gs, _segregisters+24"); \
+ asm ("movw %ax, _segregisters+26")
+#define SAVE_ERRCODE() \
+ asm ("popq %rbx"); \
+ asm ("movq %rbx, _gdb_errcode")
+#define SAVE_REGISTERS2() \
+ asm ("popq %rbx"); /* old rip */ \
+ asm ("movq %rbx, _registers+128"); \
+ asm ("popq %rbx"); /* old cs */ \
+ asm ("movl %ebx, _segregisters+4"); \
+ asm ("popq %rbx"); /* old rflags */ \
+ asm ("movl %ebx, _segregisters"); \
+ /* Now that we've done the pops, we can save the stack pointer." */ \
+ asm ("movw %ss, _segregisters+8"); \
+ asm ("movw %ax, _segregisters+10"); \
+ asm ("movq %rsp, _registers+56")
+
+/* See if _mem_fault_routine is set, if so just iretq to that address. */
+#define CHECK_FAULT() \
+ asm ("cmpq $0, _mem_fault_routine"); \
+ asm ("jne mem_fault")
+
+asm (".text");
+asm ("mem_fault:");
+ /* OK to clobber temp _registers; we're just going to end up in set_mem_err. */
+ /* Pop error code from the stack and save it. */
+ asm ("popq %rax");
+ asm ("movq %rax, _gdb_errcode");
+
+ asm ("popq %rax"); /* rip */
+ /* We don't want to return there, we want to return to the function
+ pointed to by _mem_fault_routine instead. */
+ asm ("movq _mem_fault_routine, %rax");
+ asm ("popq %rcx"); /* cs (low 16 bits; junk in hi 16 bits). */
+ asm ("popq %rdx"); /* rflags */
+
+ /* Remove this stack frame; when we do the iretq, we will be going to
+ the start of a function, so we want the stack to look just like it
+ would after a "call" instruction. */
+ asm ("leave");
+
+ /* Push the stuff that iretq wants. */
+ asm ("pushq %rdx"); /* rflags */
+ asm ("pushq %rcx"); /* cs */
+ asm ("pushq %rax"); /* rip */
+
+ /* Zero _mem_fault_routine. */
+ asm ("movq $0, %rax");
+ asm ("movq %rax, _mem_fault_routine");
+
+ asm ("iretq");
+
+#define CALL_HOOK() asm("call _remcomHandler")
+
+/* These functions are called when an exception occurs. It saves
+ * all the cpu regs in the _registers array, munges the stack a bit,
+ * and invokes an exception handler (remcom_handler).
+ *
+ * stack on entry: stack on exit:
+ * old rflags vector number
+ * old cs (zero-filled to 64 bits)
+ * old rip
+ *
+ */
+extern void
+_catchException3 (void);
+asm(".text");
+asm(".globl _catchException3");
+asm("_catchException3:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $3");
+ CALL_HOOK();
+
+/* Same thing for exception 1. */
+extern void
+_catchException1 (void);
+asm(".text");
+asm(".globl _catchException1");
+asm("_catchException1:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $1");
+ CALL_HOOK();
+
+/* Same thing for exception 0. */
+extern void
+_catchException0 (void);
+asm(".text");
+asm(".globl _catchException0");
+asm("_catchException0:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $0");
+ CALL_HOOK();
+
+/* Same thing for exception 4. */
+extern void
+_catchException4 (void);
+asm(".text");
+asm(".globl _catchException4");
+asm("_catchException4:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $4");
+ CALL_HOOK();
+
+/* Same thing for exception 5. */
+extern void
+_catchException5 (void);
+asm(".text");
+asm(".globl _catchException5");
+asm("_catchException5:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $5");
+ CALL_HOOK();
+
+/* Same thing for exception 6. */
+extern void
+_catchException6 (void);
+asm(".text");
+asm(".globl _catchException6");
+asm("_catchException6:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $6");
+ CALL_HOOK();
+
+/* Same thing for exception 7. */
+extern void
+_catchException7 (void);
+asm(".text");
+asm(".globl _catchException7");
+asm("_catchException7:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $7");
+ CALL_HOOK();
+
+/* Same thing for exception 8. */
+extern void
+_catchException8 (void);
+asm(".text");
+asm(".globl _catchException8");
+asm("_catchException8:");
+ SAVE_REGISTERS1();
+ SAVE_ERRCODE();
+ SAVE_REGISTERS2();
+ asm ("pushq $8");
+ CALL_HOOK();
+
+/* Same thing for exception 9. */
+extern void
+_catchException9 (void);
+asm(".text");
+asm(".globl _catchException9");
+asm("_catchException9:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $9");
+ CALL_HOOK();
+
+/* Same thing for exception 10. */
+extern void
+_catchException10 (void);
+asm(".text");
+asm(".globl _catchException10");
+asm("_catchException10:");
+ SAVE_REGISTERS1();
+ SAVE_ERRCODE();
+ SAVE_REGISTERS2();
+ asm ("pushq $10");
+ CALL_HOOK();
+
+/* Same thing for exception 12. */
+extern void
+_catchException12 (void);
+asm(".text");
+asm(".globl _catchException12");
+asm("_catchException12:");
+ SAVE_REGISTERS1();
+ SAVE_ERRCODE();
+ SAVE_REGISTERS2();
+ asm ("pushq $12");
+ CALL_HOOK();
+
+/* Same thing for exception 16. */
+extern void
+_catchException16 (void);
+asm(".text");
+asm(".globl _catchException16");
+asm("_catchException16:");
+ SAVE_REGISTERS1();
+ SAVE_REGISTERS2();
+ asm ("pushq $16");
+ CALL_HOOK();
+
+/* For 13, 11, and 14 we have to deal with the CHECK_FAULT stuff. */
+
+/* Same thing for exception 13. */
+extern void
+_catchException13 (void);
+asm (".text");
+asm (".globl _catchException13");
+asm ("_catchException13:");
+ CHECK_FAULT();
+ SAVE_REGISTERS1();
+ SAVE_ERRCODE();
+ SAVE_REGISTERS2();
+ asm ("pushq $13");
+ CALL_HOOK();
+
+/* Same thing for exception 11. */
+extern void
+_catchException11 (void);
+asm (".text");
+asm (".globl _catchException11");
+asm ("_catchException11:");
+ CHECK_FAULT();
+ SAVE_REGISTERS1();
+ SAVE_ERRCODE();
+ SAVE_REGISTERS2();
+ asm ("pushq $11");
+ CALL_HOOK();
+
+/* Same thing for exception 14. */
+extern void
+_catchException14 (void);
+asm (".text");
+asm (".globl _catchException14");
+asm ("_catchException14:");
+ CHECK_FAULT();
+ SAVE_REGISTERS1();
+ SAVE_ERRCODE();
+ SAVE_REGISTERS2();
+ asm ("pushq $14");
+ CALL_HOOK();
+
+/*
+ * remcomHandler is a front end for _handle_exception. It moves the
+ * stack pointer into an area reserved for debugger use.
+ */
+asm("_remcomHandler:");
+ asm("popq %rax"); /* pop off return address */
+ asm("popq %rdi"); /* get the exception number in %rdi to pass it as the first argument to _handle_exception */
+ asm("movq _stackPtr, %rsp"); /* move to remcom stack area */
+ asm("call _handle_exception"); /* this never returns */
+
+void
+_returnFromException ()
+{
+ _return_to_prog ();
+}
+
+void
+debug_error (format, parm)
+ char *format;
+ char *parm;
+{
+ printf (format, parm);
+}
+
+int
+hex (ch)
+ char ch;
+{
+ if ((ch >= 'a') && (ch <= 'f'))
+ return (ch - 'a' + 10);
+ if ((ch >= '0') && (ch <= '9'))
+ return (ch - '0');
+ if ((ch >= 'A') && (ch <= 'F'))
+ return (ch - 'A' + 10);
+ return (-1);
+}
+
+static char remcomInBuffer[BUFMAX];
+static char remcomOutBuffer[BUFMAX];
+
+/* scan for the sequence $<data>#<checksum> */
+
+char *
+getpacket (void)
+{
+ char *buffer = &remcomInBuffer[0];
+ unsigned char checksum;
+ unsigned char xmitcsum;
+ int count;
+ char ch;
+
+ while (1)
+ {
+ /* wait around for the start character, ignore all other characters */
+ while ((ch = getDebugChar ()) != '$')
+ ;
+
+ retry:
+ checksum = 0;
+ xmitcsum = -1;
+ count = 0;
+
+ /* now, read until a # or end of buffer is found */
+ while (count < BUFMAX)
+ {
+ ch = getDebugChar ();
+ if (ch == '$')
+ goto retry;
+ if (ch == '#')
+ break;
+ checksum = checksum + ch;
+ buffer[count] = ch;
+ count = count + 1;
+ }
+ buffer[count] = 0;
+
+ if (ch == '#')
+ {
+ ch = getDebugChar ();
+ xmitcsum = hex (ch) << 4;
+ ch = getDebugChar ();
+ xmitcsum += hex (ch);
+
+ if (checksum != xmitcsum)
+ {
+ debug_error ("failed checksum");
+ putDebugChar ('-'); /* failed checksum */
+ }
+ else
+ {
+ putDebugChar ('+'); /* successful transfer */
+
+ /* if a sequence char is present, reply the sequence ID */
+ if (buffer[2] == ':')
+ {
+ putDebugChar (buffer[0]);
+ putDebugChar (buffer[1]);
+
+ return &buffer[3];
+ }
+
+ return &buffer[0];
+ }
+ }
+ }
+}
+
+/* send the packet in buffer. */
+
+void
+putpacket (char *buffer)
+{
+ unsigned char checksum;
+ int count;
+ char ch;
+
+ /* $<packet info>#<checksum>. */
+ do
+ {
+ putDebugChar ('$');
+ checksum = 0;
+ count = strlen (buffer);
+
+ count = gdb_run_length_encode (buffer, count);
+ buffer[count] = '\0';
+ count = 0;
+
+ while ((ch = buffer[count]))
+ {
+ putDebugChar (ch);
+ checksum += ch;
+ count += 1;
+ }
+
+ putDebugChar ('#');
+ putDebugChar (hexchars[checksum >> 4]);
+ putDebugChar (hexchars[checksum & 0x0f]);
+
+ }
+ while (getDebugChar () != '+');
+}
+
+/* Address of a routine to RTE to if we get a memory fault. */
+static void (*volatile _mem_fault_routine) () = NULL;
+
+/* Indicate to caller of mem2hex or hex2mem that there has been an
+ error. */
+static volatile int mem_err = 0;
+
+void
+set_mem_err (void)
+{
+ mem_err = 1;
+}
+
+/* These are separate functions so that they are so short and sweet
+ that the compiler won't save any _registers (if there is a fault
+ to mem_fault, they won't get restored, so there better not be any
+ saved). */
+int
+get_char (char *addr)
+{
+ return *addr;
+}
+
+void
+set_char (char *addr, int val)
+{
+ *addr = val;
+}
+
+/* convert the memory pointed to by mem into hex, placing result in buf */
+/* return a pointer to the last char put in buf (null) */
+/* If MAY_FAULT is non-zero, then we should set mem_err in response to
+ a fault; if zero treat a fault like any other fault in the stub. */
+char *
+mem2hex (char *mem, char * buf, uint32_t count, uint32_t may_fault)
+{
+ int i;
+ unsigned char ch;
+
+ if (may_fault) {
+ _mem_fault_routine = set_mem_err;
+ }
+
+ for (i = 0; i < count; i++)
+ {
+ ch = get_char (mem++);
+ if (may_fault && mem_err) {
+ return (buf);
+ }
+ *buf++ = hexchars[ch >> 4];
+ *buf++ = hexchars[ch & 0x0f];
+ }
+ *buf = 0;
+
+ if (may_fault) {
+ _mem_fault_routine = NULL;
+ }
+
+ return (buf);
+}
+
+/* convert the hex array pointed to by buf into binary to be placed in mem */
+/* return a pointer to the character AFTER the last byte written */
+char *
+hex2mem (char *buf, char *mem, uint32_t count, uint32_t may_fault)
+{
+ int i;
+ unsigned char ch;
+
+ if (may_fault)
+ _mem_fault_routine = set_mem_err;
+ for (i = 0; i < count; i++)
+ {
+ ch = hex (*buf++) << 4;
+ ch = ch + hex (*buf++);
+ set_char (mem++, ch);
+ if (may_fault && mem_err)
+ return (mem);
+ }
+ if (may_fault)
+ _mem_fault_routine = NULL;
+ return (mem);
+}
+
+/* this function takes the x64 exception vector and attempts to
+ translate this number into a unix compatible signal value */
+uint32_t
+computeSignal (uint64_t exceptionVector)
+{
+ uint32_t sigval;
+ switch (exceptionVector)
+ {
+ case 0:
+ sigval = 8;
+ break; /* divide by zero */
+ case 1:
+ sigval = 5;
+ break; /* debug exception */
+ case 3:
+ sigval = 5;
+ break; /* breakpoint */
+ case 4:
+ sigval = 16;
+ break; /* into instruction (overflow) */
+ case 5:
+ sigval = 16;
+ break; /* bound instruction */
+ case 6:
+ sigval = 4;
+ break; /* Invalid opcode */
+ case 7:
+ sigval = 8;
+ break; /* coprocessor not available */
+ case 8:
+ sigval = 7;
+ break; /* double fault */
+ case 9:
+ sigval = 11;
+ break; /* coprocessor segment overrun */
+ case 10:
+ sigval = 11;
+ break; /* Invalid TSS */
+ case 11:
+ sigval = 11;
+ break; /* Segment not present */
+ case 12:
+ sigval = 11;
+ break; /* stack exception */
+ case 13:
+ sigval = 11;
+ break; /* general protection */
+ case 14:
+ sigval = 11;
+ break; /* page fault */
+ case 16:
+ sigval = 7;
+ break; /* coprocessor error */
+ default:
+ sigval = 7; /* "software generated" */
+ }
+ return (sigval);
+}
+
+/**********************************************/
+/* WHILE WE FIND NICE HEX CHARS, BUILD AN INT */
+/* RETURN NUMBER OF CHARS PROCESSED */
+/**********************************************/
+uint32_t
+hexToInt (char **ptr, int64_t *intValue)
+{
+ uint32_t numChars = 0;
+ int hexValue;
+
+ *intValue = 0;
+
+ while (**ptr)
+ {
+ hexValue = hex (**ptr);
+ if (hexValue >= 0)
+ {
+ *intValue = (*intValue << 4) | hexValue;
+ numChars++;
+ }
+ else
+ break;
+
+ (*ptr)++;
+ }
+
+ return (numChars);
+}
+
+/*
+ * This function does all command procesing for interfacing to gdb.
+ */
+void
+_handle_exception (uint64_t exceptionVector)
+{
+ uint32_t sigval, stepping;
+ int64_t addr, length;
+ char *ptr;
+
+ gdb_vector = exceptionVector;
+
+ /* reply to host that an exception has occurred */
+ sigval = computeSignal (exceptionVector);
+
+ ptr = remcomOutBuffer;
+
+ *ptr++ = 'T'; /* notify gdb with signo, RIP, and thread id */
+ *ptr++ = hexchars[sigval >> 4];
+ *ptr++ = hexchars[sigval & 0x0f];
+
+ *ptr++ = hexchars[RIP >> 4];
+ *ptr++ = hexchars[RIP & 0x0f];
+ *ptr++ = ':';
+ ptr = mem2hex ((char *)&_registers[RIP], ptr, 8, 0); /* RIP */
+ *ptr++ = ';';
+
+ gdb_strcpy (ptr, "thread:"THREAD_TID";");
+
+ putpacket (remcomOutBuffer);
+
+ stepping = 0;
+
+ while (1 == 1)
+ {
+ remcomOutBuffer[0] = 0;
+ ptr = getpacket ();
+
+ switch (*ptr++)
+ {
+ case '?':
+ remcomOutBuffer[0] = 'S';
+ remcomOutBuffer[1] = hexchars[sigval >> 4];
+ remcomOutBuffer[2] = hexchars[sigval & 0x0f];
+ remcomOutBuffer[3] = 0;
+ break;
+ case 'D': /* detach */
+ gdb_strcpy (remcomOutBuffer, "OK");
+ break;
+ case 'g': /* return the value of the CPU _registers */
+ ptr = mem2hex ((char *) _registers, remcomOutBuffer, NUMREGBYTES, 0);
+ mem2hex ((char *) _segregisters, ptr, NUMSEGREGBYTES, 0);
+ break;
+ case 'G': /* set the value of the CPU _registers - return OK */
+ hex2mem (ptr, (char *) _registers, NUMREGBYTES, 0);
+ ptr += (NUMREGBYTES * 2);
+ hex2mem (ptr, (char *) _segregisters, NUMSEGREGBYTES, 0);
+ gdb_strcpy (remcomOutBuffer, "OK");
+ break;
+ case 'p': /* return the value of a single CPU register */
+ {
+ int64_t regno;
+
+ if (hexToInt (&ptr, ®no)) {
+ if (regno >= 0) {
+ if (regno < NUMREGS) {
+ mem2hex ((char *) &_registers[regno], remcomOutBuffer, 8, 0);
+ break;
+ } else if (regno < (NUMREGS + NUMSEGREGS)) {
+ mem2hex ((char *) &_segregisters[regno - NUMREGS], remcomOutBuffer, 4, 0);
+ break;
+ }
+ }
+ }
+
+ gdb_strcpy (remcomOutBuffer, "E01");
+ break;
+ }
+ case 'P': /* set the value of a single CPU register - return OK */
+ {
+ int64_t regno;
+
+ if (hexToInt (&ptr, ®no) && *ptr++ == '=') {
+ if (regno >= 0) {
+ if (regno < NUMREGS) {
+ hex2mem (ptr, (char *) &_registers[regno], 8, 0);
+ gdb_strcpy (remcomOutBuffer, "OK");
+ break;
+ } else if (regno < (NUMREGS + NUMSEGREGS)) {
+ hex2mem (ptr, (char *) &_segregisters[regno], 4, 0);
+ gdb_strcpy (remcomOutBuffer, "OK");
+ break;
+ } else {
+ /*
+ * Hack to deal with gdb client asking to set weird registers
+ * such as "orig_rax" - lie and say we set the non-existent register.
+ */
+ gdb_strcpy (remcomOutBuffer, "OK");
+ break;
+ }
+ }
+ }
+ gdb_strcpy (remcomOutBuffer, "E01");
+ break;
+ }
+ /* mAA..AA,LLLL Read LLLL bytes at address AA..AA */
+ case 'm':
+ /* TRY TO READ %x,%x. IF SUCCEED, SET PTR = 0 */
+ if (hexToInt (&ptr, &addr))
+ if (*(ptr++) == ',')
+ if (hexToInt (&ptr, &length))
+ {
+ ptr = 0;
+ mem_err = 0;
+ mem2hex ((char *) addr, remcomOutBuffer, length, 1);
+ if (mem_err)
+ {
+ gdb_strcpy (remcomOutBuffer, "E03");
+ debug_error ("memory fault");
+ }
+ }
+
+ if (ptr)
+ {
+ gdb_strcpy (remcomOutBuffer, "E01");
+ }
+ break;
+
+ /* MAA..AA,LLLL: Write LLLL bytes at address AA.AA return OK */
+ case 'M':
+ /* TRY TO READ '%x,%x:'. IF SUCCEED, SET PTR = 0 */
+ if (hexToInt (&ptr, &addr))
+ if (*(ptr++) == ',')
+ if (hexToInt (&ptr, &length))
+ if (*(ptr++) == ':')
+ {
+ mem_err = 0;
+ hex2mem (ptr, (char *) addr, length, 1);
+
+ if (mem_err)
+ {
+ gdb_strcpy (remcomOutBuffer, "E03");
+ debug_error ("memory fault");
+ }
+ else
+ {
+ gdb_strcpy (remcomOutBuffer, "OK");
+ }
+
+ ptr = 0;
+ }
+ if (ptr)
+ {
+ gdb_strcpy (remcomOutBuffer, "E02");
+ }
+ break;
+
+ /* cAA..AA Continue at address AA..AA(optional) */
+ /* sAA..AA Step one instruction from AA..AA(optional) */
+ case 's':
+ stepping = 1;
+ /* FALLTHROUGH */
+ case 'c':
+ /* try to read optional parameter,RIP unchanged if no parm */
+ if (hexToInt (&ptr, &addr)) {
+ _registers[RIP] = addr;
+ }
+
+ /* clear the trace bit */
+ _segregisters[PS] &= 0xfffffeff;
+
+ /* set the trace bit if we're stepping */
+ if (stepping) {
+ _segregisters[PS] |= 0x00000100;
+ }
+
+ _returnFromException (); /* this is a jump */
+ break;
+
+ /* kill the program */
+ case 'k':
+ /*
+ * We don't actually want to reboot the loader - do nothing.
+ */
+ break;
+
+ /* Set thread for subsequent operations; ignore this since we are a single threaded target */
+ case 'H':
+ gdb_strcpy (remcomOutBuffer, "OK");
+ break;
+
+ /*
+ * General Query Packets
+ *
+ * See - https://sourceware.org/gdb/current/onlinedocs/gdb/General-Query-Packets.html
+ */
+ case 'q':
+ /* qSupported packet */
+ if (gdb_str_starts_with(ptr, "Supported")) {
+ gdb_strcpy (remcomOutBuffer, "multiprocess-;vContSupported-;QThreadEvents-");
+ }
+ /* qC packet */
+ else if (strcmp(ptr, "C") == 0) {
+ // single threaded target - reply with thread id
+ gdb_strcpy (remcomOutBuffer, "QC"THREAD_TID);
+ }
+ /* qTStatus packet */
+ else if (strcmp (ptr, "TStatus") == 0) {
+ // no trace is running
+ gdb_strcpy (remcomOutBuffer, "T0");
+ }
+ break;
+ } /* switch */
+
+ /* reply to the request */
+ putpacket (remcomOutBuffer);
+ }
+}
+
+/* this function is used to set up exception handlers for tracing and
+ breakpoints */
+void
+set_debug_traps (void)
+{
+ _stackPtr = &remcomStack[STACKSIZE / sizeof (uint64_t) - 1];
+
+ printf("Setting Debug Traps for GDB.\n\n");
+
+ exceptionHandler (0, _catchException0);
+ exceptionHandler (1, _catchException1);
+ exceptionHandler (3, _catchException3);
+ exceptionHandler (4, _catchException4);
+ exceptionHandler (5, _catchException5);
+ exceptionHandler (6, _catchException6);
+ exceptionHandler (7, _catchException7);
+ exceptionHandler (8, _catchException8);
+ exceptionHandler (9, _catchException9);
+ exceptionHandler (10, _catchException10);
+ exceptionHandler (11, _catchException11);
+ exceptionHandler (12, _catchException12);
+ /*
+ * Don't install GP exception handler
+ */
+ // exceptionHandler (13, _catchException13);
+ exceptionHandler (14, _catchException14);
+ exceptionHandler (16, _catchException16);
+}
+
+
+void
+gdb_init (void)
+{
+ if (!initialized) {
+ set_debug_traps ();
+ }
+ initialized = 1;
+}
+
+/* This function will generate a breakpoint exception. It is used at the
+ beginning of a program to sync up with a debugger and can be used
+ otherwise as a quick means to stop program execution and "break" into
+ the debugger. */
+
+void
+breakpoint (void)
+{
+ if (!initialized) {
+ gdb_init ();
+ }
+
+ BREAKPOINT ();
+}
+
+static void
+gdb_bcopy (void *from, void *to, int length)
+{
+ char *fp = from;
+ char *tp = to;
+
+ while (length--) *tp++ = *fp++;
+}
+
+#define GDB_RLE_LEN_ENCODE_OFFSET 29
+#define GDB_RLE_MIN_ENCODE_LEN 4
+#define GDB_RLE_MAX_ENCODE_LEN (126 - GDB_RLE_LEN_ENCODE_OFFSET)
+
+static size_t
+gdb_run_length_encode (char *buffer, size_t length)
+{
+ if (length < GDB_RLE_MIN_ENCODE_LEN)
+ return length;
+
+ size_t newLen = length;
+ char *rleStart = &buffer[0];
+ int i;
+
+ for (i = 1; i < newLen; ++i) {
+ // rleBlockLen is the count of identical characters in the block.
+ // The encoding is <char>*<repeat> where repeat is the number of times to repeat
+ // <char>, therefore <repeat> is (rleBlockLen - 1)
+ char rleBlockLen = (&buffer[i] - rleStart) + 1;
+
+ if ((i == (newLen - 1)) || (buffer[i] != *rleStart) || ((rleBlockLen - 1) == GDB_RLE_MAX_ENCODE_LEN)) {
+ // reached an end condition
+ if (buffer[i] != *rleStart) {
+ // in this case buffer[i] is pointing at the first non encodable byte after the block
+ // so adjust rleBlockLen
+ rleBlockLen -= 1;
+ }
+
+ if (rleBlockLen < GDB_RLE_MIN_ENCODE_LEN) {
+ rleStart = &buffer[i];
+ continue;
+ }
+
+ char encodedLength = GDB_RLE_LEN_ENCODE_OFFSET + (rleBlockLen - 1);
+ if ((encodedLength == '+') || (encodedLength == '-') ||
+ (encodedLength == '$') || (encodedLength == '#')) {
+ // don't rle if encoded length is a reserved character
+ // TBD: could still encode by encoding a shorter block, but for now just leave it unencoded
+ rleStart = &buffer[i];
+ continue;
+ }
+
+ // only encode if the encoded length is not a reserved character
+ rleStart[1] = '*';
+ rleStart[2] = encodedLength;
+ if (&rleStart[3] < &buffer[newLen]) {
+ // if there is more data in the buffer, shift it left up to the end of the newly
+ // encoded data
+ size_t numBytesToRemove = rleBlockLen - 3;
+ char *firstByteToRemove = &rleStart[3];
+ char *firstByteToMove = firstByteToRemove + numBytesToRemove;
+ int numBytesToMove = newLen - (firstByteToRemove - buffer) - numBytesToRemove;
+ if (numBytesToMove > 0) {
+ gdb_bcopy(firstByteToMove, firstByteToRemove, numBytesToMove);
+ }
+ newLen -= numBytesToRemove;
+ // adjust i so that processing will continue on the moved data
+ i = (&rleStart[3] - buffer);
+ }
+ rleStart = &buffer[i];
+ }
+ }
+
+ return newLen;
+}
+
+static char *
+gdb_strcpy (char *dest,const char *src)
+{
+ char *ptr = dest;
+
+ while (*src) *ptr++ = *src++;
+ *ptr = '\0';
+
+ return dest;
+}
+
+/* return 1 if str starts with prefix and 0 otherwise */
+static int
+gdb_str_starts_with (char *str, char *prefix)
+{
+ return (strncmp (str, prefix, strlen (prefix)) == 0);
+}
+
+
+// Default Implementations of OS Specific Functions
+
+#ifdef GDB_USE_SERIAL_PORT_IO
+
+// Implementations of I/O functions - putDebugChar() and getDebugChar()
+
+#define DEBUG_COM_PORT ((volatile unsigned short)0x3f8)
+#define COM_REG_THB (DEBUG_COM_PORT + 0)
+#define COM_REG_RB (DEBUG_COM_PORT + 0)
+
+#define COM_REG_LSR (DEBUG_COM_PORT + 5)
+#define LSR_THB_EMPTY (1<<5)
+#define LSR_RB_READY (1<<0)
+
+extern void phys_write8 (uint64_t port, uint8_t data);
+extern uint8_t phys_read8 (uint64_t port);
+
+void
+putDebugChar (char c)
+{
+ while(! (phys_read8(COM_REG_LSR) & LSR_THB_EMPTY) ) {
+ // wait for current byte to be written
+ }
+ phys_write8 (COM_REG_THB, c);
+}
+
+int
+getDebugChar (void)
+{
+ char c;
+ while (! (phys_read8 (COM_REG_LSR) & LSR_RB_READY) ) {
+ // wait for a character
+ }
+ c = phys_read8 (COM_REG_RB);
+ return c;
+}
+
+#endif /* GDB_USE_SERIAL_PORT_IO */
+
+#ifdef GDB_USE_STD_X64_EXCEPTION_HANDLER
+
+// Implementation of Interrupt Descriptor Table (IDT) function - exceptionHandler()
+
+typedef struct idtr_table_entry {
+ uint16_t handler_addr_offset1;
+ uint16_t segment_selector;
+ uint16_t flags;
+ uint16_t handler_addr_offset2;
+ uint32_t handler_addr_offset3;
+ uint32_t reserved;
+} __attribute__((packed)) idtr_table_entry_t;
+
+typedef struct idtr_table_addr {
+ uint16_t limit; // the offset (in bytes) of the last valid byte in the idtr
+ idtr_table_entry_t *addr; // the base address of the idtr in memory
+} __attribute__((packed)) idtr_table_addr_t;
+
+/* store the address of the interrupt descrtiptor table in memory */
+void store_idtr (idtr_table_addr_t *idtr_table_addr);
+
+asm(".text");
+asm("store_idtr:");
+ // %rdi is the parameter to this function
+ // a pointer to a 10-byte memory location
+ asm("sidt (%rdi)");
+ asm("retq");
+
+/* return the value of the 16-bit %cs (code segment) register */
+uint16_t get_cs_reg (void);
+
+asm(".text");
+asm("get_cs_reg:");
+ asm("xor %rax, %rax");
+ asm("mov %cs, %rax");
+ asm("retq");
+
+void
+exceptionHandler (int intr_vector, void *intr_handler)
+{
+ idtr_table_addr_t idtr_table_addr;
+ store_idtr (&idtr_table_addr);
+
+ idtr_table_entry_t *idtr_entry = &idtr_table_addr.addr[intr_vector];
+ idtr_entry->segment_selector = get_cs_reg ();
+
+ uint64_t intr_handler_addr = (uint64_t)intr_handler;
+ idtr_entry->handler_addr_offset1 = (uint16_t)intr_handler_addr;
+ idtr_entry->handler_addr_offset2 = (uint16_t)(intr_handler_addr >> 16);
+ idtr_entry->handler_addr_offset3 = (uint32_t)(intr_handler_addr >> 32);
+}
+
+#endif /* GDB_USE_STD_X64_EXCEPTION_HANDLER */
--
2.14.1.windows.1
next prev parent reply other threads:[~2020-10-20 16:34 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <BL0PR06MB4418CCCF8597C622AC200C61E1300@BL0PR06MB4418.namprd06.prod.outlook.com>
2020-10-12 17:51 ` [PING] " Battig, Caleb
2020-10-19 14:18 ` [PING][PING] " Battig, Caleb
2020-10-19 14:29 ` Simon Marchi
2020-10-19 14:38 ` Battig, Caleb
2020-10-19 14:43 ` Battig, Caleb
2020-10-19 15:45 ` Simon Marchi
2020-10-19 22:23 ` Battig, Caleb
2020-10-20 13:09 ` Simon Marchi
2020-10-20 16:34 ` Battig, Caleb [this message]
2020-10-22 16:34 ` Battig, Caleb
2020-10-23 0:47 ` Simon Marchi
2020-10-28 22:11 ` Battig, Caleb
2020-11-11 16:39 ` Battig, Caleb
2020-11-11 20:54 ` Simon Marchi
2020-11-11 21:58 ` Battig, Caleb
2020-12-14 15:10 ` Simon Marchi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=BL0PR06MB44183BAEDCCA038EB0F21E1BE11F0@BL0PR06MB4418.namprd06.prod.outlook.com \
--to=caleb.battig@netapp.com \
--cc=Stuart.Lovett@netapp.com \
--cc=Wendy.Peikes@netapp.com \
--cc=gdb-patches@sourceware.org \
--cc=simark@simark.ca \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox