1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 2a439fe51SSam Ravnborg /* 3a439fe51SSam Ravnborg * kdebug.h: Defines and definitions for debugging the Linux kernel 4a439fe51SSam Ravnborg * under various kernel debuggers. 5a439fe51SSam Ravnborg * 6a439fe51SSam Ravnborg * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu) 7a439fe51SSam Ravnborg */ 8a439fe51SSam Ravnborg #ifndef _SPARC_KDEBUG_H 9a439fe51SSam Ravnborg #define _SPARC_KDEBUG_H 10a439fe51SSam Ravnborg 11a439fe51SSam Ravnborg #include <asm/openprom.h> 12a439fe51SSam Ravnborg #include <asm/vaddrs.h> 13a439fe51SSam Ravnborg 14a439fe51SSam Ravnborg /* Breakpoints are enter through trap table entry 126. So in sparc assembly 15a439fe51SSam Ravnborg * if you want to drop into the debugger you do: 16a439fe51SSam Ravnborg * 17a439fe51SSam Ravnborg * t DEBUG_BP_TRAP 18a439fe51SSam Ravnborg */ 19a439fe51SSam Ravnborg 20a439fe51SSam Ravnborg #define DEBUG_BP_TRAP 126 21a439fe51SSam Ravnborg 22a439fe51SSam Ravnborg #ifndef __ASSEMBLY__ 23a439fe51SSam Ravnborg /* The debug vector is passed in %o1 at boot time. It is a pointer to 24a439fe51SSam Ravnborg * a structure in the debuggers address space. Here is its format. 25a439fe51SSam Ravnborg */ 26a439fe51SSam Ravnborg 27a439fe51SSam Ravnborg typedef unsigned int (*debugger_funct)(void); 28a439fe51SSam Ravnborg 29a439fe51SSam Ravnborg struct kernel_debug { 30a439fe51SSam Ravnborg /* First the entry point into the debugger. You jump here 31a439fe51SSam Ravnborg * to give control over to the debugger. 32a439fe51SSam Ravnborg */ 33a439fe51SSam Ravnborg unsigned long kdebug_entry; 34a439fe51SSam Ravnborg unsigned long kdebug_trapme; /* Figure out later... */ 35a439fe51SSam Ravnborg /* The following is the number of pages that the debugger has 36a439fe51SSam Ravnborg * taken from to total pool. 37a439fe51SSam Ravnborg */ 38a439fe51SSam Ravnborg unsigned long *kdebug_stolen_pages; 39a439fe51SSam Ravnborg /* Ok, after you remap yourself and/or change the trap table 40a439fe51SSam Ravnborg * from what you were left with at boot time you have to call 41a439fe51SSam Ravnborg * this synchronization function so the debugger can check out 42a439fe51SSam Ravnborg * what you have done. 43a439fe51SSam Ravnborg */ 44a439fe51SSam Ravnborg debugger_funct teach_debugger; 45a439fe51SSam Ravnborg }; /* I think that is it... */ 46a439fe51SSam Ravnborg 47a439fe51SSam Ravnborg extern struct kernel_debug *linux_dbvec; 48a439fe51SSam Ravnborg 49a439fe51SSam Ravnborg /* Use this macro in C-code to enter the debugger. */ sp_enter_debugger(void)50a439fe51SSam Ravnborgstatic inline void sp_enter_debugger(void) 51a439fe51SSam Ravnborg { 52a439fe51SSam Ravnborg __asm__ __volatile__("jmpl %0, %%o7\n\t" 53a439fe51SSam Ravnborg "nop\n\t" : : 54a439fe51SSam Ravnborg "r" (linux_dbvec) : "o7", "memory"); 55a439fe51SSam Ravnborg } 56a439fe51SSam Ravnborg 57a439fe51SSam Ravnborg #define SP_ENTER_DEBUGGER do { \ 58a439fe51SSam Ravnborg if((linux_dbvec!=0) && ((*(short *)linux_dbvec)!=-1)) \ 59a439fe51SSam Ravnborg sp_enter_debugger(); \ 60a439fe51SSam Ravnborg } while(0) 61a439fe51SSam Ravnborg 62a439fe51SSam Ravnborg enum die_val { 63a439fe51SSam Ravnborg DIE_UNUSED, 64c10555faSAl Viro DIE_OOPS, 65a439fe51SSam Ravnborg }; 66a439fe51SSam Ravnborg 67a439fe51SSam Ravnborg #endif /* !(__ASSEMBLY__) */ 68a439fe51SSam Ravnborg 69a439fe51SSam Ravnborg /* Some nice offset defines for assembler code. */ 70a439fe51SSam Ravnborg #define KDEBUG_ENTRY_OFF 0x0 71a439fe51SSam Ravnborg #define KDEBUG_DUNNO_OFF 0x4 72a439fe51SSam Ravnborg #define KDEBUG_DUNNO2_OFF 0x8 73a439fe51SSam Ravnborg #define KDEBUG_TEACH_OFF 0xc 74a439fe51SSam Ravnborg 75a439fe51SSam Ravnborg #endif /* !(_SPARC_KDEBUG_H) */ 76