xref: /openbmc/linux/arch/sparc/include/asm/kdebug_32.h (revision b2441318)
1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */
2a439fe51SSam Ravnborg /*
3a439fe51SSam Ravnborg  * kdebug.h:  Defines and definitions for debugging the Linux kernel
4a439fe51SSam Ravnborg  *            under various kernel debuggers.
5a439fe51SSam Ravnborg  *
6a439fe51SSam Ravnborg  * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)
7a439fe51SSam Ravnborg  */
8a439fe51SSam Ravnborg #ifndef _SPARC_KDEBUG_H
9a439fe51SSam Ravnborg #define _SPARC_KDEBUG_H
10a439fe51SSam Ravnborg 
11a439fe51SSam Ravnborg #include <asm/openprom.h>
12a439fe51SSam Ravnborg #include <asm/vaddrs.h>
13a439fe51SSam Ravnborg 
14a439fe51SSam Ravnborg /* Breakpoints are enter through trap table entry 126.  So in sparc assembly
15a439fe51SSam Ravnborg  * if you want to drop into the debugger you do:
16a439fe51SSam Ravnborg  *
17a439fe51SSam Ravnborg  * t DEBUG_BP_TRAP
18a439fe51SSam Ravnborg  */
19a439fe51SSam Ravnborg 
20a439fe51SSam Ravnborg #define DEBUG_BP_TRAP     126
21a439fe51SSam Ravnborg 
22a439fe51SSam Ravnborg #ifndef __ASSEMBLY__
23a439fe51SSam Ravnborg /* The debug vector is passed in %o1 at boot time.  It is a pointer to
24a439fe51SSam Ravnborg  * a structure in the debuggers address space.  Here is its format.
25a439fe51SSam Ravnborg  */
26a439fe51SSam Ravnborg 
27a439fe51SSam Ravnborg typedef unsigned int (*debugger_funct)(void);
28a439fe51SSam Ravnborg 
29a439fe51SSam Ravnborg struct kernel_debug {
30a439fe51SSam Ravnborg 	/* First the entry point into the debugger.  You jump here
31a439fe51SSam Ravnborg 	 * to give control over to the debugger.
32a439fe51SSam Ravnborg 	 */
33a439fe51SSam Ravnborg 	unsigned long kdebug_entry;
34a439fe51SSam Ravnborg 	unsigned long kdebug_trapme;   /* Figure out later... */
35a439fe51SSam Ravnborg 	/* The following is the number of pages that the debugger has
36a439fe51SSam Ravnborg 	 * taken from to total pool.
37a439fe51SSam Ravnborg 	 */
38a439fe51SSam Ravnborg 	unsigned long *kdebug_stolen_pages;
39a439fe51SSam Ravnborg 	/* Ok, after you remap yourself and/or change the trap table
40a439fe51SSam Ravnborg 	 * from what you were left with at boot time you have to call
41a439fe51SSam Ravnborg 	 * this synchronization function so the debugger can check out
42a439fe51SSam Ravnborg 	 * what you have done.
43a439fe51SSam Ravnborg 	 */
44a439fe51SSam Ravnborg 	debugger_funct teach_debugger;
45a439fe51SSam Ravnborg }; /* I think that is it... */
46a439fe51SSam Ravnborg 
47a439fe51SSam Ravnborg extern struct kernel_debug *linux_dbvec;
48a439fe51SSam Ravnborg 
49a439fe51SSam Ravnborg /* Use this macro in C-code to enter the debugger. */
sp_enter_debugger(void)50a439fe51SSam Ravnborg static inline void sp_enter_debugger(void)
51a439fe51SSam Ravnborg {
52a439fe51SSam Ravnborg 	__asm__ __volatile__("jmpl %0, %%o7\n\t"
53a439fe51SSam Ravnborg 			     "nop\n\t" : :
54a439fe51SSam Ravnborg 			     "r" (linux_dbvec) : "o7", "memory");
55a439fe51SSam Ravnborg }
56a439fe51SSam Ravnborg 
57a439fe51SSam Ravnborg #define SP_ENTER_DEBUGGER do { \
58a439fe51SSam Ravnborg 	     if((linux_dbvec!=0) && ((*(short *)linux_dbvec)!=-1)) \
59a439fe51SSam Ravnborg 	       sp_enter_debugger(); \
60a439fe51SSam Ravnborg 		       } while(0)
61a439fe51SSam Ravnborg 
62a439fe51SSam Ravnborg enum die_val {
63a439fe51SSam Ravnborg 	DIE_UNUSED,
64c10555faSAl Viro 	DIE_OOPS,
65a439fe51SSam Ravnborg };
66a439fe51SSam Ravnborg 
67a439fe51SSam Ravnborg #endif /* !(__ASSEMBLY__) */
68a439fe51SSam Ravnborg 
69a439fe51SSam Ravnborg /* Some nice offset defines for assembler code. */
70a439fe51SSam Ravnborg #define KDEBUG_ENTRY_OFF    0x0
71a439fe51SSam Ravnborg #define KDEBUG_DUNNO_OFF    0x4
72a439fe51SSam Ravnborg #define KDEBUG_DUNNO2_OFF   0x8
73a439fe51SSam Ravnborg #define KDEBUG_TEACH_OFF    0xc
74a439fe51SSam Ravnborg 
75a439fe51SSam Ravnborg #endif /* !(_SPARC_KDEBUG_H) */
76