xref: /openbmc/linux/arch/sparc/include/asm/kdebug_32.h (revision a439fe51)
1a439fe51SSam Ravnborg /*
2a439fe51SSam Ravnborg  * kdebug.h:  Defines and definitions for debugging the Linux kernel
3a439fe51SSam Ravnborg  *            under various kernel debuggers.
4a439fe51SSam Ravnborg  *
5a439fe51SSam Ravnborg  * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)
6a439fe51SSam Ravnborg  */
7a439fe51SSam Ravnborg #ifndef _SPARC_KDEBUG_H
8a439fe51SSam Ravnborg #define _SPARC_KDEBUG_H
9a439fe51SSam Ravnborg 
10a439fe51SSam Ravnborg #include <asm/openprom.h>
11a439fe51SSam Ravnborg #include <asm/vaddrs.h>
12a439fe51SSam Ravnborg 
13a439fe51SSam Ravnborg /* Breakpoints are enter through trap table entry 126.  So in sparc assembly
14a439fe51SSam Ravnborg  * if you want to drop into the debugger you do:
15a439fe51SSam Ravnborg  *
16a439fe51SSam Ravnborg  * t DEBUG_BP_TRAP
17a439fe51SSam Ravnborg  */
18a439fe51SSam Ravnborg 
19a439fe51SSam Ravnborg #define DEBUG_BP_TRAP     126
20a439fe51SSam Ravnborg 
21a439fe51SSam Ravnborg #ifndef __ASSEMBLY__
22a439fe51SSam Ravnborg /* The debug vector is passed in %o1 at boot time.  It is a pointer to
23a439fe51SSam Ravnborg  * a structure in the debuggers address space.  Here is its format.
24a439fe51SSam Ravnborg  */
25a439fe51SSam Ravnborg 
26a439fe51SSam Ravnborg typedef unsigned int (*debugger_funct)(void);
27a439fe51SSam Ravnborg 
28a439fe51SSam Ravnborg struct kernel_debug {
29a439fe51SSam Ravnborg 	/* First the entry point into the debugger.  You jump here
30a439fe51SSam Ravnborg 	 * to give control over to the debugger.
31a439fe51SSam Ravnborg 	 */
32a439fe51SSam Ravnborg 	unsigned long kdebug_entry;
33a439fe51SSam Ravnborg 	unsigned long kdebug_trapme;   /* Figure out later... */
34a439fe51SSam Ravnborg 	/* The following is the number of pages that the debugger has
35a439fe51SSam Ravnborg 	 * taken from to total pool.
36a439fe51SSam Ravnborg 	 */
37a439fe51SSam Ravnborg 	unsigned long *kdebug_stolen_pages;
38a439fe51SSam Ravnborg 	/* Ok, after you remap yourself and/or change the trap table
39a439fe51SSam Ravnborg 	 * from what you were left with at boot time you have to call
40a439fe51SSam Ravnborg 	 * this synchronization function so the debugger can check out
41a439fe51SSam Ravnborg 	 * what you have done.
42a439fe51SSam Ravnborg 	 */
43a439fe51SSam Ravnborg 	debugger_funct teach_debugger;
44a439fe51SSam Ravnborg }; /* I think that is it... */
45a439fe51SSam Ravnborg 
46a439fe51SSam Ravnborg extern struct kernel_debug *linux_dbvec;
47a439fe51SSam Ravnborg 
48a439fe51SSam Ravnborg /* Use this macro in C-code to enter the debugger. */
49a439fe51SSam Ravnborg static inline void sp_enter_debugger(void)
50a439fe51SSam Ravnborg {
51a439fe51SSam Ravnborg 	__asm__ __volatile__("jmpl %0, %%o7\n\t"
52a439fe51SSam Ravnborg 			     "nop\n\t" : :
53a439fe51SSam Ravnborg 			     "r" (linux_dbvec) : "o7", "memory");
54a439fe51SSam Ravnborg }
55a439fe51SSam Ravnborg 
56a439fe51SSam Ravnborg #define SP_ENTER_DEBUGGER do { \
57a439fe51SSam Ravnborg 	     if((linux_dbvec!=0) && ((*(short *)linux_dbvec)!=-1)) \
58a439fe51SSam Ravnborg 	       sp_enter_debugger(); \
59a439fe51SSam Ravnborg 		       } while(0)
60a439fe51SSam Ravnborg 
61a439fe51SSam Ravnborg enum die_val {
62a439fe51SSam Ravnborg 	DIE_UNUSED,
63a439fe51SSam Ravnborg };
64a439fe51SSam Ravnborg 
65a439fe51SSam Ravnborg #endif /* !(__ASSEMBLY__) */
66a439fe51SSam Ravnborg 
67a439fe51SSam Ravnborg /* Some nice offset defines for assembler code. */
68a439fe51SSam Ravnborg #define KDEBUG_ENTRY_OFF    0x0
69a439fe51SSam Ravnborg #define KDEBUG_DUNNO_OFF    0x4
70a439fe51SSam Ravnborg #define KDEBUG_DUNNO2_OFF   0x8
71a439fe51SSam Ravnborg #define KDEBUG_TEACH_OFF    0xc
72a439fe51SSam Ravnborg 
73a439fe51SSam Ravnborg #endif /* !(_SPARC_KDEBUG_H) */
74