2019-05-27 06:55:01 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Routines providing a simple monitor for use on the PowerMac.
|
|
|
|
*
|
2005-11-08 11:55:08 +00:00
|
|
|
* Copyright (C) 1996-2005 Paul Mackerras.
|
2006-10-03 04:12:08 +00:00
|
|
|
* Copyright (C) 2001 PPC64 Team, IBM Corp
|
|
|
|
* Copyrignt (C) 2006 Michael Ellerman, IBM Corp
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
2015-11-06 02:21:17 +00:00
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <linux/errno.h>
|
2017-02-08 17:51:30 +00:00
|
|
|
#include <linux/sched/signal.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <linux/smp.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/reboot.h>
|
|
|
|
#include <linux/delay.h>
|
|
|
|
#include <linux/kallsyms.h>
|
2012-08-23 22:09:12 +00:00
|
|
|
#include <linux/kmsg_dump.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <linux/cpumask.h>
|
2011-07-22 22:24:23 +00:00
|
|
|
#include <linux/export.h>
|
2005-11-08 11:55:08 +00:00
|
|
|
#include <linux/sysrq.h>
|
2005-11-14 00:06:50 +00:00
|
|
|
#include <linux/interrupt.h>
|
IRQ: Maintain regs pointer globally rather than passing to IRQ handlers
Maintain a per-CPU global "struct pt_regs *" variable which can be used instead
of passing regs around manually through all ~1800 interrupt handlers in the
Linux kernel.
The regs pointer is used in few places, but it potentially costs both stack
space and code to pass it around. On the FRV arch, removing the regs parameter
from all the genirq function results in a 20% speed up of the IRQ exit path
(ie: from leaving timer_interrupt() to leaving do_IRQ()).
Where appropriate, an arch may override the generic storage facility and do
something different with the variable. On FRV, for instance, the address is
maintained in GR28 at all times inside the kernel as part of general exception
handling.
Having looked over the code, it appears that the parameter may be handed down
through up to twenty or so layers of functions. Consider a USB character
device attached to a USB hub, attached to a USB controller that posts its
interrupts through a cascaded auxiliary interrupt controller. A character
device driver may want to pass regs to the sysrq handler through the input
layer which adds another few layers of parameter passing.
I've build this code with allyesconfig for x86_64 and i386. I've runtested the
main part of the code on FRV and i386, though I can't test most of the drivers.
I've also done partial conversion for powerpc and MIPS - these at least compile
with minimal configurations.
This will affect all archs. Mostly the changes should be relatively easy.
Take do_IRQ(), store the regs pointer at the beginning, saving the old one:
struct pt_regs *old_regs = set_irq_regs(regs);
And put the old one back at the end:
set_irq_regs(old_regs);
Don't pass regs through to generic_handle_irq() or __do_IRQ().
In timer_interrupt(), this sort of change will be necessary:
- update_process_times(user_mode(regs));
- profile_tick(CPU_PROFILING, regs);
+ update_process_times(user_mode(get_irq_regs()));
+ profile_tick(CPU_PROFILING);
I'd like to move update_process_times()'s use of get_irq_regs() into itself,
except that i386, alone of the archs, uses something other than user_mode().
Some notes on the interrupt handling in the drivers:
(*) input_dev() is now gone entirely. The regs pointer is no longer stored in
the input_dev struct.
(*) finish_unlinks() in drivers/usb/host/ohci-q.c needs checking. It does
something different depending on whether it's been supplied with a regs
pointer or not.
(*) Various IRQ handler function pointers have been moved to type
irq_handler_t.
Signed-Off-By: David Howells <dhowells@redhat.com>
(cherry picked from 1b16e7ac850969f38b375e511e3fa2f474a33867 commit)
2006-10-05 13:55:46 +00:00
|
|
|
#include <linux/irq.h>
|
2006-12-08 11:30:41 +00:00
|
|
|
#include <linux/bug.h>
|
2014-08-05 04:55:00 +00:00
|
|
|
#include <linux/nmi.h>
|
2014-07-15 11:43:47 +00:00
|
|
|
#include <linux/ctype.h>
|
2017-10-30 11:01:12 +00:00
|
|
|
#include <linux/highmem.h>
|
2019-09-07 06:11:24 +00:00
|
|
|
#include <linux/security.h>
|
2021-08-12 13:28:31 +00:00
|
|
|
#include <linux/debugfs.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
#include <asm/ptrace.h>
|
2017-04-05 07:54:50 +00:00
|
|
|
#include <asm/smp.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <asm/string.h>
|
|
|
|
#include <asm/prom.h>
|
|
|
|
#include <asm/machdep.h>
|
2005-10-28 12:53:37 +00:00
|
|
|
#include <asm/xmon.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <asm/processor.h>
|
|
|
|
#include <asm/mmu.h>
|
|
|
|
#include <asm/mmu_context.h>
|
2018-03-08 02:54:42 +00:00
|
|
|
#include <asm/plpar_wrappers.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <asm/cputable.h>
|
|
|
|
#include <asm/rtas.h>
|
|
|
|
#include <asm/sstep.h>
|
2006-10-10 01:47:07 +00:00
|
|
|
#include <asm/irq_regs.h>
|
2006-10-24 16:31:27 +00:00
|
|
|
#include <asm/spu.h>
|
|
|
|
#include <asm/spu_priv1.h>
|
2008-01-18 04:50:30 +00:00
|
|
|
#include <asm/setjmp.h>
|
2008-12-17 10:08:55 +00:00
|
|
|
#include <asm/reg.h>
|
2012-03-28 17:30:02 +00:00
|
|
|
#include <asm/debug.h>
|
2012-12-20 14:06:44 +00:00
|
|
|
#include <asm/hw_breakpoint.h>
|
2017-04-05 07:54:50 +00:00
|
|
|
#include <asm/xive.h>
|
2016-02-09 07:17:49 +00:00
|
|
|
#include <asm/opal.h>
|
|
|
|
#include <asm/firmware.h>
|
2017-06-27 07:48:58 +00:00
|
|
|
#include <asm/code-patching.h>
|
2016-11-22 09:20:09 +00:00
|
|
|
#include <asm/sections.h>
|
2020-05-06 03:40:26 +00:00
|
|
|
#include <asm/inst.h>
|
2021-04-14 11:00:33 +00:00
|
|
|
#include <asm/interrupt.h>
|
2016-02-09 07:17:49 +00:00
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
#ifdef CONFIG_PPC64
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <asm/hvcall.h>
|
2005-10-28 12:53:37 +00:00
|
|
|
#include <asm/paca.h>
|
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
#include "nonstdio.h"
|
2006-11-22 23:46:45 +00:00
|
|
|
#include "dis-asm.h"
|
2020-05-06 03:40:23 +00:00
|
|
|
#include "xmon_bpts.h"
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_SMP
|
2008-05-08 04:27:17 +00:00
|
|
|
static cpumask_t cpus_in_xmon = CPU_MASK_NONE;
|
2005-04-16 22:20:36 +00:00
|
|
|
static unsigned long xmon_taken = 1;
|
|
|
|
static int xmon_owner;
|
|
|
|
static int xmon_gate;
|
2021-06-01 07:48:01 +00:00
|
|
|
static int xmon_batch;
|
|
|
|
static unsigned long xmon_batch_start_cpu;
|
|
|
|
static cpumask_t xmon_batch_cpus = CPU_MASK_NONE;
|
2012-09-13 23:01:31 +00:00
|
|
|
#else
|
|
|
|
#define xmon_owner 0
|
2005-04-16 22:20:36 +00:00
|
|
|
#endif /* CONFIG_SMP */
|
|
|
|
|
2018-11-08 17:12:42 +00:00
|
|
|
#ifdef CONFIG_PPC_PSERIES
|
|
|
|
static int set_indicator_token = RTAS_UNKNOWN_SERVICE;
|
|
|
|
#endif
|
2010-01-12 00:50:14 +00:00
|
|
|
static unsigned long in_xmon __read_mostly = 0;
|
2017-03-22 19:27:49 +00:00
|
|
|
static int xmon_on = IS_ENABLED(CONFIG_XMON_DEFAULT);
|
2019-04-16 03:26:38 +00:00
|
|
|
static bool xmon_is_ro = IS_ENABLED(CONFIG_XMON_DEFAULT_RO_MODE);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
static unsigned long adrs;
|
|
|
|
static int size = 1;
|
2020-02-19 11:00:07 +00:00
|
|
|
#define MAX_DUMP (64 * 1024)
|
2005-04-16 22:20:36 +00:00
|
|
|
static unsigned long ndump = 64;
|
2020-02-19 11:00:07 +00:00
|
|
|
#define MAX_IDUMP (MAX_DUMP >> 2)
|
2005-04-16 22:20:36 +00:00
|
|
|
static unsigned long nidump = 16;
|
|
|
|
static unsigned long ncsum = 4096;
|
|
|
|
static int termch;
|
|
|
|
static char tmpstr[128];
|
2017-08-02 20:14:06 +00:00
|
|
|
static int tracing_enabled;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
static long bus_error_jmp[JMP_BUF_LEN];
|
|
|
|
static int catch_memory_errors;
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
static int catch_spr_faults;
|
2005-04-16 22:20:36 +00:00
|
|
|
static long *xmon_fault_jmp[NR_CPUS];
|
|
|
|
|
|
|
|
/* Breakpoint stuff */
|
|
|
|
struct bpt {
|
|
|
|
unsigned long address;
|
2021-05-20 13:50:45 +00:00
|
|
|
u32 *instr;
|
2005-04-16 22:20:36 +00:00
|
|
|
atomic_t ref_count;
|
|
|
|
int enabled;
|
|
|
|
unsigned long pad;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Bits in bpt.enabled */
|
2014-12-01 05:54:13 +00:00
|
|
|
#define BP_CIABR 1
|
|
|
|
#define BP_TRAP 2
|
|
|
|
#define BP_DABR 4
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
static struct bpt bpts[NBPTS];
|
2020-05-14 11:17:41 +00:00
|
|
|
static struct bpt dabr[HBP_NUM_MAX];
|
2005-04-16 22:20:36 +00:00
|
|
|
static struct bpt *iabr;
|
|
|
|
static unsigned bpinstr = 0x7fe00008; /* trap */
|
|
|
|
|
|
|
|
#define BP_NUM(bp) ((bp) - bpts + 1)
|
|
|
|
|
|
|
|
/* Prototypes */
|
|
|
|
static int cmds(struct pt_regs *);
|
|
|
|
static int mread(unsigned long, void *, int);
|
|
|
|
static int mwrite(unsigned long, void *, int);
|
2020-05-06 03:40:38 +00:00
|
|
|
static int mread_instr(unsigned long, struct ppc_inst *);
|
2005-04-16 22:20:36 +00:00
|
|
|
static int handle_fault(struct pt_regs *);
|
|
|
|
static void byterev(unsigned char *, int);
|
|
|
|
static void memex(void);
|
|
|
|
static int bsesc(void);
|
|
|
|
static void dump(void);
|
2017-10-30 11:01:12 +00:00
|
|
|
static void show_pte(unsigned long);
|
2005-04-16 22:20:36 +00:00
|
|
|
static void prdump(unsigned long, long);
|
|
|
|
static int ppc_inst_dump(unsigned long, long, int);
|
2009-05-14 23:13:07 +00:00
|
|
|
static void dump_log_buf(void);
|
2016-02-09 07:17:49 +00:00
|
|
|
|
2021-06-01 07:48:01 +00:00
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
static int xmon_switch_cpu(unsigned long);
|
|
|
|
static int xmon_batch_next_cpu(void);
|
|
|
|
static int batch_cmds(struct pt_regs *);
|
|
|
|
#endif
|
|
|
|
|
2016-02-09 07:17:49 +00:00
|
|
|
#ifdef CONFIG_PPC_POWERNV
|
|
|
|
static void dump_opal_msglog(void);
|
|
|
|
#else
|
|
|
|
static inline void dump_opal_msglog(void)
|
|
|
|
{
|
|
|
|
printf("Machine is not running OPAL firmware.\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static void backtrace(struct pt_regs *);
|
|
|
|
static void excprint(struct pt_regs *);
|
|
|
|
static void prregs(struct pt_regs *);
|
|
|
|
static void memops(int);
|
|
|
|
static void memlocate(void);
|
|
|
|
static void memzcan(void);
|
|
|
|
static void memdiffs(unsigned char *, unsigned char *, unsigned, unsigned);
|
|
|
|
int skipbl(void);
|
|
|
|
int scanhex(unsigned long *valp);
|
|
|
|
static void scannl(void);
|
|
|
|
static int hexdigit(int);
|
|
|
|
void getstring(char *, int);
|
|
|
|
static void flush_input(void);
|
|
|
|
static int inchar(void);
|
|
|
|
static void take_input(char *);
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
static int read_spr(int, unsigned long *);
|
2005-04-16 22:20:36 +00:00
|
|
|
static void write_spr(int, unsigned long);
|
|
|
|
static void super_regs(void);
|
|
|
|
static void remove_bpts(void);
|
|
|
|
static void insert_bpts(void);
|
|
|
|
static void remove_cpu_bpts(void);
|
|
|
|
static void insert_cpu_bpts(void);
|
|
|
|
static struct bpt *at_breakpoint(unsigned long pc);
|
|
|
|
static struct bpt *in_breakpoint_table(unsigned long pc, unsigned long *offp);
|
|
|
|
static int do_step(struct pt_regs *);
|
|
|
|
static void bpt_cmds(void);
|
|
|
|
static void cacheflush(void);
|
|
|
|
static int cpu_cmd(void);
|
|
|
|
static void csum(void);
|
|
|
|
static void bootcmds(void);
|
2005-10-28 12:53:37 +00:00
|
|
|
static void proccall(void);
|
2015-11-23 15:01:15 +00:00
|
|
|
static void show_tasks(void);
|
2005-04-16 22:20:36 +00:00
|
|
|
void dump_segments(void);
|
|
|
|
static void symbol_lookup(void);
|
2006-09-08 14:29:21 +00:00
|
|
|
static void xmon_show_stack(unsigned long sp, unsigned long lr,
|
|
|
|
unsigned long pc);
|
2005-04-16 22:20:36 +00:00
|
|
|
static void xmon_print_symbol(unsigned long address, const char *mid,
|
|
|
|
const char *after);
|
|
|
|
static const char *getvecname(unsigned long vec);
|
|
|
|
|
2006-10-24 16:31:27 +00:00
|
|
|
static int do_spu_cmd(void);
|
|
|
|
|
2007-11-16 07:23:33 +00:00
|
|
|
#ifdef CONFIG_44x
|
|
|
|
static void dump_tlb_44x(void);
|
|
|
|
#endif
|
2010-07-09 05:34:50 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3E
|
|
|
|
static void dump_tlb_book3e(void);
|
|
|
|
#endif
|
2007-11-16 07:23:33 +00:00
|
|
|
|
2019-09-07 06:11:24 +00:00
|
|
|
static void clear_all_bpt(void);
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
#define REG "%.16lx"
|
|
|
|
#else
|
|
|
|
#define REG "%.8lx"
|
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2013-12-02 09:10:12 +00:00
|
|
|
#ifdef __LITTLE_ENDIAN__
|
|
|
|
#define GETWORD(v) (((v)[3] << 24) + ((v)[2] << 16) + ((v)[1] << 8) + (v)[0])
|
|
|
|
#else
|
2005-04-16 22:20:36 +00:00
|
|
|
#define GETWORD(v) (((v)[0] << 24) + ((v)[1] << 16) + ((v)[2] << 8) + (v)[3])
|
2013-12-02 09:10:12 +00:00
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2019-04-16 03:26:38 +00:00
|
|
|
static const char *xmon_ro_msg = "Operation disabled: xmon in read-only mode\n";
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static char *help_string = "\
|
|
|
|
Commands:\n\
|
|
|
|
b show breakpoints\n\
|
|
|
|
bd set data breakpoint\n\
|
|
|
|
bi set instruction breakpoint\n\
|
|
|
|
bc clear breakpoint\n"
|
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
"\
|
|
|
|
c print cpus stopped in xmon\n\
|
2021-06-01 07:48:01 +00:00
|
|
|
c# try to switch to cpu number h (in hex)\n\
|
|
|
|
c# $ run command '$' (one of 'r','S' or 't') on all cpus in xmon\n"
|
2005-04-16 22:20:36 +00:00
|
|
|
#endif
|
|
|
|
"\
|
|
|
|
C checksum\n\
|
|
|
|
d dump bytes\n\
|
2017-02-07 13:40:44 +00:00
|
|
|
d1 dump 1 byte values\n\
|
|
|
|
d2 dump 2 byte values\n\
|
|
|
|
d4 dump 4 byte values\n\
|
|
|
|
d8 dump 8 byte values\n\
|
2005-04-16 22:20:36 +00:00
|
|
|
di dump instructions\n\
|
|
|
|
df dump float values\n\
|
|
|
|
dd dump double values\n\
|
2012-09-13 23:01:31 +00:00
|
|
|
dl dump the kernel log buffer\n"
|
2016-02-09 07:17:49 +00:00
|
|
|
#ifdef CONFIG_PPC_POWERNV
|
|
|
|
"\
|
|
|
|
do dump the OPAL message log\n"
|
|
|
|
#endif
|
2012-09-13 23:01:31 +00:00
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
"\
|
|
|
|
dp[#] dump paca for current cpu, or cpu #\n\
|
|
|
|
dpa dump paca for all possible cpus\n"
|
|
|
|
#endif
|
|
|
|
"\
|
2006-03-08 19:40:28 +00:00
|
|
|
dr dump stream of raw bytes\n\
|
2017-10-30 11:01:12 +00:00
|
|
|
dv dump virtual address translation \n\
|
2015-11-06 02:21:17 +00:00
|
|
|
dt dump the tracing buffers (uses printk)\n\
|
2017-08-02 20:14:05 +00:00
|
|
|
dtc dump the tracing buffers for current CPU (uses printk)\n\
|
2017-04-05 07:54:50 +00:00
|
|
|
"
|
|
|
|
#ifdef CONFIG_PPC_POWERNV
|
|
|
|
" dx# dump xive on CPU #\n\
|
|
|
|
dxi# dump xive irq state #\n\
|
|
|
|
dxa dump xive on all CPUs\n"
|
|
|
|
#endif
|
|
|
|
" e print exception information\n\
|
2005-04-16 22:20:36 +00:00
|
|
|
f flush cache\n\
|
|
|
|
la lookup symbol+offset of specified address\n\
|
|
|
|
ls lookup address of specified symbol\n\
|
2016-11-22 09:20:09 +00:00
|
|
|
lp s [#] lookup address of percpu symbol s for current cpu, or cpu #\n\
|
2005-04-16 22:20:36 +00:00
|
|
|
m examine/change memory\n\
|
|
|
|
mm move a block of memory\n\
|
|
|
|
ms set a block of memory\n\
|
|
|
|
md compare two blocks of memory\n\
|
|
|
|
ml locate a block of memory\n\
|
|
|
|
mz zero a block of memory\n\
|
|
|
|
mi show information about memory allocation\n\
|
2005-10-28 12:53:37 +00:00
|
|
|
p call a procedure\n\
|
2015-11-23 15:01:15 +00:00
|
|
|
P list processes/tasks\n\
|
2005-04-16 22:20:36 +00:00
|
|
|
r print registers\n\
|
2006-10-24 16:31:27 +00:00
|
|
|
s single step\n"
|
2006-11-27 18:18:55 +00:00
|
|
|
#ifdef CONFIG_SPU_BASE
|
2006-10-24 16:31:27 +00:00
|
|
|
" ss stop execution on all spus\n\
|
2006-10-24 16:31:28 +00:00
|
|
|
sr restore execution on stopped spus\n\
|
2006-11-22 23:46:41 +00:00
|
|
|
sf # dump spu fields for spu # (in hex)\n\
|
2007-02-26 09:14:06 +00:00
|
|
|
sd # dump spu local store for spu # (in hex)\n\
|
2006-11-22 23:46:44 +00:00
|
|
|
sdi # disassemble spu local store for spu # (in hex)\n"
|
2006-10-24 16:31:27 +00:00
|
|
|
#endif
|
|
|
|
" S print special registers\n\
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
Sa print all SPRs\n\
|
|
|
|
Sr # read SPR #\n\
|
|
|
|
Sw #v write v to SPR #\n\
|
2005-04-16 22:20:36 +00:00
|
|
|
t print backtrace\n\
|
|
|
|
x exit monitor and recover\n\
|
2016-01-27 00:29:44 +00:00
|
|
|
X exit monitor and don't recover\n"
|
2011-09-29 11:25:10 +00:00
|
|
|
#if defined(CONFIG_PPC64) && !defined(CONFIG_PPC_BOOK3E)
|
2005-10-28 12:53:37 +00:00
|
|
|
" u dump segment table or SLB\n"
|
2018-11-17 10:25:02 +00:00
|
|
|
#elif defined(CONFIG_PPC_BOOK3S_32)
|
2005-10-28 12:53:37 +00:00
|
|
|
" u dump segment registers\n"
|
2011-09-29 11:25:10 +00:00
|
|
|
#elif defined(CONFIG_44x) || defined(CONFIG_PPC_BOOK3E)
|
2007-11-16 07:23:33 +00:00
|
|
|
" u dump TLB\n"
|
|
|
|
#endif
|
2017-09-18 14:16:58 +00:00
|
|
|
" U show uptime information\n"
|
2005-10-28 12:53:37 +00:00
|
|
|
" ? help\n"
|
2015-10-08 00:50:24 +00:00
|
|
|
" # n limit output to n lines per page (for dp, dpa, dl)\n"
|
2019-09-07 06:11:24 +00:00
|
|
|
" zr reboot\n"
|
|
|
|
" zh halt\n"
|
2005-04-16 22:20:36 +00:00
|
|
|
;
|
|
|
|
|
2019-09-07 06:11:24 +00:00
|
|
|
#ifdef CONFIG_SECURITY
|
|
|
|
static bool xmon_is_locked_down(void)
|
|
|
|
{
|
|
|
|
static bool lockdown;
|
|
|
|
|
|
|
|
if (!lockdown) {
|
|
|
|
lockdown = !!security_locked_down(LOCKDOWN_XMON_RW);
|
|
|
|
if (lockdown) {
|
|
|
|
printf("xmon: Disabled due to kernel lockdown\n");
|
|
|
|
xmon_is_ro = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!xmon_is_ro) {
|
|
|
|
xmon_is_ro = !!security_locked_down(LOCKDOWN_XMON_WR);
|
|
|
|
if (xmon_is_ro)
|
|
|
|
printf("xmon: Read-only due to kernel lockdown\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
return lockdown;
|
|
|
|
}
|
|
|
|
#else /* CONFIG_SECURITY */
|
|
|
|
static inline bool xmon_is_locked_down(void)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static struct pt_regs *xmon_regs;
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
static inline void sync(void)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
asm volatile("sync; isync");
|
|
|
|
}
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
static inline void cflush(void *p)
|
|
|
|
{
|
|
|
|
asm volatile ("dcbf 0,%0; icbi 0,%0" : : "r" (p));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void cinval(void *p)
|
|
|
|
{
|
|
|
|
asm volatile ("dcbi 0,%0; icbi 0,%0" : : "r" (p));
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2014-11-28 04:36:42 +00:00
|
|
|
/**
|
|
|
|
* write_ciabr() - write the CIABR SPR
|
|
|
|
* @ciabr: The value to write.
|
|
|
|
*
|
|
|
|
* This function writes a value to the CIARB register either directly
|
|
|
|
* through mtspr instruction if the kernel is in HV privilege mode or
|
|
|
|
* call a hypervisor function to achieve the same in case the kernel
|
|
|
|
* is in supervisor privilege mode.
|
|
|
|
*/
|
|
|
|
static void write_ciabr(unsigned long ciabr)
|
|
|
|
{
|
|
|
|
if (!cpu_has_feature(CPU_FTR_ARCH_207S))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (cpu_has_feature(CPU_FTR_HVMODE)) {
|
|
|
|
mtspr(SPRN_CIABR, ciabr);
|
|
|
|
return;
|
|
|
|
}
|
2018-03-08 02:54:41 +00:00
|
|
|
plpar_set_ciabr(ciabr);
|
2014-11-28 04:36:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* set_ciabr() - set the CIABR
|
|
|
|
* @addr: The value to set.
|
|
|
|
*
|
|
|
|
* This function sets the correct privilege value into the the HW
|
|
|
|
* breakpoint address before writing it up in the CIABR register.
|
|
|
|
*/
|
|
|
|
static void set_ciabr(unsigned long addr)
|
|
|
|
{
|
|
|
|
addr &= ~CIABR_PRIV;
|
|
|
|
|
|
|
|
if (cpu_has_feature(CPU_FTR_HVMODE))
|
|
|
|
addr |= CIABR_PRIV_HYPER;
|
|
|
|
else
|
|
|
|
addr |= CIABR_PRIV_SUPER;
|
|
|
|
write_ciabr(addr);
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Disable surveillance (the service processor watchdog function)
|
|
|
|
* while we are in xmon.
|
|
|
|
* XXX we should re-enable it when we leave. :)
|
|
|
|
*/
|
|
|
|
#define SURVEILLANCE_TOKEN 9000
|
|
|
|
|
|
|
|
static inline void disable_surveillance(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_PPC_PSERIES
|
|
|
|
/* Since this can't be a module, args should end up below 4GB. */
|
|
|
|
static struct rtas_args args;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point we have got all the cpus we can into
|
|
|
|
* xmon, so there is hopefully no other cpu calling RTAS
|
|
|
|
* at the moment, even though we don't take rtas.lock.
|
|
|
|
* If we did try to take rtas.lock there would be a
|
|
|
|
* real possibility of deadlock.
|
|
|
|
*/
|
2018-11-08 17:12:42 +00:00
|
|
|
if (set_indicator_token == RTAS_UNKNOWN_SERVICE)
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
2015-11-24 11:26:09 +00:00
|
|
|
|
2018-11-08 17:12:42 +00:00
|
|
|
rtas_call_unlocked(&args, set_indicator_token, 3, 1, NULL,
|
|
|
|
SURVEILLANCE_TOKEN, 0, 0);
|
2015-11-24 11:26:09 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
#endif /* CONFIG_PPC_PSERIES */
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
static int xmon_speaker;
|
|
|
|
|
|
|
|
static void get_output_lock(void)
|
|
|
|
{
|
|
|
|
int me = smp_processor_id() + 0x100;
|
|
|
|
int last_speaker = 0, prev;
|
|
|
|
long timeout;
|
|
|
|
|
|
|
|
if (xmon_speaker == me)
|
|
|
|
return;
|
2013-12-23 12:46:04 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
for (;;) {
|
2013-12-23 12:46:04 +00:00
|
|
|
last_speaker = cmpxchg(&xmon_speaker, 0, me);
|
|
|
|
if (last_speaker == 0)
|
|
|
|
return;
|
|
|
|
|
2013-12-23 12:46:05 +00:00
|
|
|
/*
|
|
|
|
* Wait a full second for the lock, we might be on a slow
|
|
|
|
* console, but check every 100us.
|
|
|
|
*/
|
|
|
|
timeout = 10000;
|
2005-04-16 22:20:36 +00:00
|
|
|
while (xmon_speaker == last_speaker) {
|
2013-12-23 12:46:05 +00:00
|
|
|
if (--timeout > 0) {
|
|
|
|
udelay(100);
|
2005-04-16 22:20:36 +00:00
|
|
|
continue;
|
2013-12-23 12:46:05 +00:00
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/* hostile takeover */
|
|
|
|
prev = cmpxchg(&xmon_speaker, last_speaker, me);
|
|
|
|
if (prev == last_speaker)
|
|
|
|
return;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void release_output_lock(void)
|
|
|
|
{
|
|
|
|
xmon_speaker = 0;
|
|
|
|
}
|
2008-05-08 04:27:17 +00:00
|
|
|
|
|
|
|
int cpus_are_in_xmon(void)
|
|
|
|
{
|
2011-04-28 05:07:23 +00:00
|
|
|
return !cpumask_empty(&cpus_in_xmon);
|
2008-05-08 04:27:17 +00:00
|
|
|
}
|
2016-12-19 18:30:11 +00:00
|
|
|
|
|
|
|
static bool wait_for_other_cpus(int ncpus)
|
|
|
|
{
|
|
|
|
unsigned long timeout;
|
|
|
|
|
|
|
|
/* We wait for 2s, which is a metric "little while" */
|
|
|
|
for (timeout = 20000; timeout != 0; --timeout) {
|
|
|
|
if (cpumask_weight(&cpus_in_xmon) >= ncpus)
|
|
|
|
return true;
|
|
|
|
udelay(100);
|
|
|
|
barrier();
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2019-09-07 06:11:24 +00:00
|
|
|
#else /* CONFIG_SMP */
|
|
|
|
static inline void get_output_lock(void) {}
|
|
|
|
static inline void release_output_lock(void) {}
|
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-09-23 03:51:04 +00:00
|
|
|
static inline int unrecoverable_excp(struct pt_regs *regs)
|
|
|
|
{
|
2011-09-29 12:05:28 +00:00
|
|
|
#if defined(CONFIG_4xx) || defined(CONFIG_PPC_BOOK3E)
|
2011-09-23 05:40:46 +00:00
|
|
|
/* We have no MSR_RI bit on 4xx or Book3e, so we simply return false */
|
2009-09-23 03:51:04 +00:00
|
|
|
return 0;
|
|
|
|
#else
|
|
|
|
return ((regs->msr & MSR_RI) == 0);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2020-06-30 00:02:18 +00:00
|
|
|
static void xmon_touch_watchdogs(void)
|
|
|
|
{
|
|
|
|
touch_softlockup_watchdog_sync();
|
|
|
|
rcu_cpu_stall_reset();
|
|
|
|
touch_nmi_watchdog();
|
|
|
|
}
|
|
|
|
|
2021-04-29 08:06:38 +00:00
|
|
|
static int xmon_core(struct pt_regs *regs, volatile int fromipi)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2021-04-29 08:06:38 +00:00
|
|
|
volatile int cmd = 0;
|
|
|
|
struct bpt *volatile bp;
|
2005-04-16 22:20:36 +00:00
|
|
|
long recurse_jmp[JMP_BUF_LEN];
|
2019-09-07 06:11:24 +00:00
|
|
|
bool locked_down;
|
2005-04-16 22:20:36 +00:00
|
|
|
unsigned long offset;
|
2007-03-20 14:48:34 +00:00
|
|
|
unsigned long flags;
|
2005-04-16 22:20:36 +00:00
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
int cpu;
|
|
|
|
int secondary;
|
|
|
|
#endif
|
|
|
|
|
2007-03-20 14:48:34 +00:00
|
|
|
local_irq_save(flags);
|
2014-08-05 04:55:00 +00:00
|
|
|
hard_irq_disable();
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2019-09-07 06:11:24 +00:00
|
|
|
locked_down = xmon_is_locked_down();
|
|
|
|
|
2019-06-27 09:59:40 +00:00
|
|
|
if (!fromipi) {
|
|
|
|
tracing_enabled = tracing_is_on();
|
|
|
|
tracing_off();
|
|
|
|
}
|
2017-08-02 20:14:06 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
bp = in_breakpoint_table(regs->nip, &offset);
|
|
|
|
if (bp != NULL) {
|
2021-06-17 15:51:03 +00:00
|
|
|
regs_set_return_ip(regs, bp->address + offset);
|
2005-04-16 22:20:36 +00:00
|
|
|
atomic_dec(&bp->ref_count);
|
|
|
|
}
|
|
|
|
|
|
|
|
remove_cpu_bpts();
|
|
|
|
|
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
cpu = smp_processor_id();
|
2011-04-28 05:07:23 +00:00
|
|
|
if (cpumask_test_cpu(cpu, &cpus_in_xmon)) {
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
/*
|
|
|
|
* We catch SPR read/write faults here because the 0x700, 0xf60
|
|
|
|
* etc. handlers don't call debugger_fault_handler().
|
|
|
|
*/
|
|
|
|
if (catch_spr_faults)
|
|
|
|
longjmp(bus_error_jmp, 1);
|
2005-04-16 22:20:36 +00:00
|
|
|
get_output_lock();
|
|
|
|
excprint(regs);
|
|
|
|
printf("cpu 0x%x: Exception %lx %s in xmon, "
|
|
|
|
"returning to main loop\n",
|
|
|
|
cpu, regs->trap, getvecname(TRAP(regs)));
|
2005-08-03 05:08:18 +00:00
|
|
|
release_output_lock();
|
2005-04-16 22:20:36 +00:00
|
|
|
longjmp(xmon_fault_jmp[cpu], 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (setjmp(recurse_jmp) != 0) {
|
|
|
|
if (!in_xmon || !xmon_gate) {
|
2005-08-03 05:08:18 +00:00
|
|
|
get_output_lock();
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("xmon: WARNING: bad recursive fault "
|
|
|
|
"on cpu 0x%x\n", cpu);
|
2005-08-03 05:08:18 +00:00
|
|
|
release_output_lock();
|
2005-04-16 22:20:36 +00:00
|
|
|
goto waiting;
|
|
|
|
}
|
|
|
|
secondary = !(xmon_taken && cpu == xmon_owner);
|
|
|
|
goto cmdloop;
|
|
|
|
}
|
|
|
|
|
|
|
|
xmon_fault_jmp[cpu] = recurse_jmp;
|
|
|
|
|
|
|
|
bp = NULL;
|
2011-04-07 21:56:03 +00:00
|
|
|
if ((regs->msr & (MSR_IR|MSR_PR|MSR_64BIT)) == (MSR_IR|MSR_64BIT))
|
2005-04-16 22:20:36 +00:00
|
|
|
bp = at_breakpoint(regs->nip);
|
2009-09-23 03:51:04 +00:00
|
|
|
if (bp || unrecoverable_excp(regs))
|
2005-04-16 22:20:36 +00:00
|
|
|
fromipi = 0;
|
|
|
|
|
|
|
|
if (!fromipi) {
|
|
|
|
get_output_lock();
|
2019-09-07 06:11:24 +00:00
|
|
|
if (!locked_down)
|
|
|
|
excprint(regs);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (bp) {
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("cpu 0x%x stopped at breakpoint 0x%tx (",
|
2005-04-16 22:20:36 +00:00
|
|
|
cpu, BP_NUM(bp));
|
|
|
|
xmon_print_symbol(regs->nip, " ", ")\n");
|
|
|
|
}
|
2009-09-23 03:51:04 +00:00
|
|
|
if (unrecoverable_excp(regs))
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("WARNING: exception is not recoverable, "
|
|
|
|
"can't continue\n");
|
|
|
|
release_output_lock();
|
|
|
|
}
|
|
|
|
|
2013-12-23 12:46:06 +00:00
|
|
|
cpumask_set_cpu(cpu, &cpus_in_xmon);
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
waiting:
|
|
|
|
secondary = 1;
|
2017-09-29 03:29:40 +00:00
|
|
|
spin_begin();
|
2005-04-16 22:20:36 +00:00
|
|
|
while (secondary && !xmon_gate) {
|
|
|
|
if (in_xmon == 0) {
|
2017-09-29 03:29:40 +00:00
|
|
|
if (fromipi) {
|
|
|
|
spin_end();
|
2005-04-16 22:20:36 +00:00
|
|
|
goto leave;
|
2017-09-29 03:29:40 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
secondary = test_and_set_bit(0, &in_xmon);
|
|
|
|
}
|
2017-09-29 03:29:40 +00:00
|
|
|
spin_cpu_relax();
|
|
|
|
touch_nmi_watchdog();
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2017-09-29 03:29:40 +00:00
|
|
|
spin_end();
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (!secondary && !xmon_gate) {
|
|
|
|
/* we are the first cpu to come in */
|
|
|
|
/* interrupt other cpu(s) */
|
|
|
|
int ncpus = num_online_cpus();
|
|
|
|
|
|
|
|
xmon_owner = cpu;
|
|
|
|
mb();
|
|
|
|
if (ncpus > 1) {
|
2016-12-19 18:30:11 +00:00
|
|
|
/*
|
|
|
|
* A system reset (trap == 0x100) can be triggered on
|
|
|
|
* all CPUs, so when we come in via 0x100 try waiting
|
|
|
|
* for the other CPUs to come in before we send the
|
|
|
|
* debugger break (IPI). This is similar to
|
|
|
|
* crash_kexec_secondary().
|
|
|
|
*/
|
2021-04-14 11:00:33 +00:00
|
|
|
if (TRAP(regs) != INTERRUPT_SYSTEM_RESET || !wait_for_other_cpus(ncpus))
|
2016-12-19 18:30:11 +00:00
|
|
|
smp_send_debugger_break();
|
|
|
|
|
|
|
|
wait_for_other_cpus(ncpus);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
remove_bpts();
|
|
|
|
disable_surveillance();
|
2019-09-07 06:11:24 +00:00
|
|
|
|
|
|
|
if (!locked_down) {
|
|
|
|
/* for breakpoint or single step, print curr insn */
|
2021-04-14 11:00:33 +00:00
|
|
|
if (bp || TRAP(regs) == INTERRUPT_TRACE)
|
2019-09-07 06:11:24 +00:00
|
|
|
ppc_inst_dump(regs->nip, 1, 0);
|
|
|
|
printf("enter ? for help\n");
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
mb();
|
|
|
|
xmon_gate = 1;
|
|
|
|
barrier();
|
2017-09-29 03:29:40 +00:00
|
|
|
touch_nmi_watchdog();
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cmdloop:
|
|
|
|
while (in_xmon) {
|
|
|
|
if (secondary) {
|
2017-09-29 03:29:40 +00:00
|
|
|
spin_begin();
|
2005-04-16 22:20:36 +00:00
|
|
|
if (cpu == xmon_owner) {
|
|
|
|
if (!test_and_set_bit(0, &xmon_taken)) {
|
|
|
|
secondary = 0;
|
2017-09-29 03:29:40 +00:00
|
|
|
spin_end();
|
2005-04-16 22:20:36 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/* missed it */
|
|
|
|
while (cpu == xmon_owner)
|
2017-09-29 03:29:40 +00:00
|
|
|
spin_cpu_relax();
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2017-09-29 03:29:40 +00:00
|
|
|
spin_cpu_relax();
|
|
|
|
touch_nmi_watchdog();
|
2005-04-16 22:20:36 +00:00
|
|
|
} else {
|
2021-06-01 07:48:01 +00:00
|
|
|
cmd = 1;
|
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
if (xmon_batch)
|
|
|
|
cmd = batch_cmds(regs);
|
|
|
|
#endif
|
|
|
|
if (!locked_down && cmd)
|
2019-09-07 06:11:24 +00:00
|
|
|
cmd = cmds(regs);
|
|
|
|
if (locked_down || cmd != 0) {
|
2005-04-16 22:20:36 +00:00
|
|
|
/* exiting xmon */
|
|
|
|
insert_bpts();
|
|
|
|
xmon_gate = 0;
|
|
|
|
wmb();
|
|
|
|
in_xmon = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* have switched to some other cpu */
|
|
|
|
secondary = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
leave:
|
2011-04-28 05:07:23 +00:00
|
|
|
cpumask_clear_cpu(cpu, &cpus_in_xmon);
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_fault_jmp[cpu] = NULL;
|
|
|
|
#else
|
|
|
|
/* UP is simple... */
|
|
|
|
if (in_xmon) {
|
|
|
|
printf("Exception %lx %s in xmon, returning to main loop\n",
|
|
|
|
regs->trap, getvecname(TRAP(regs)));
|
|
|
|
longjmp(xmon_fault_jmp[0], 1);
|
|
|
|
}
|
|
|
|
if (setjmp(recurse_jmp) == 0) {
|
|
|
|
xmon_fault_jmp[0] = recurse_jmp;
|
|
|
|
in_xmon = 1;
|
|
|
|
|
|
|
|
excprint(regs);
|
|
|
|
bp = at_breakpoint(regs->nip);
|
|
|
|
if (bp) {
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("Stopped at breakpoint %tx (", BP_NUM(bp));
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_print_symbol(regs->nip, " ", ")\n");
|
|
|
|
}
|
2009-09-23 03:51:04 +00:00
|
|
|
if (unrecoverable_excp(regs))
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("WARNING: exception is not recoverable, "
|
|
|
|
"can't continue\n");
|
|
|
|
remove_bpts();
|
|
|
|
disable_surveillance();
|
2019-09-07 06:11:24 +00:00
|
|
|
if (!locked_down) {
|
|
|
|
/* for breakpoint or single step, print current insn */
|
2021-04-14 11:00:33 +00:00
|
|
|
if (bp || TRAP(regs) == INTERRUPT_TRACE)
|
2019-09-07 06:11:24 +00:00
|
|
|
ppc_inst_dump(regs->nip, 1, 0);
|
|
|
|
printf("enter ? for help\n");
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2019-09-07 06:11:24 +00:00
|
|
|
if (!locked_down)
|
|
|
|
cmd = cmds(regs);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
insert_bpts();
|
|
|
|
in_xmon = 0;
|
|
|
|
#endif
|
|
|
|
|
2009-10-05 04:46:05 +00:00
|
|
|
#ifdef CONFIG_BOOKE
|
|
|
|
if (regs->msr & MSR_DE) {
|
|
|
|
bp = at_breakpoint(regs->nip);
|
|
|
|
if (bp != NULL) {
|
2021-06-17 15:51:03 +00:00
|
|
|
regs_set_return_ip(regs, (unsigned long) &bp->instr[0]);
|
2009-10-05 04:46:05 +00:00
|
|
|
atomic_inc(&bp->ref_count);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else
|
2011-04-07 21:56:03 +00:00
|
|
|
if ((regs->msr & (MSR_IR|MSR_PR|MSR_64BIT)) == (MSR_IR|MSR_64BIT)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
bp = at_breakpoint(regs->nip);
|
|
|
|
if (bp != NULL) {
|
2020-05-06 03:40:32 +00:00
|
|
|
int stepped = emulate_step(regs, ppc_inst_read(bp->instr));
|
2005-04-16 22:20:36 +00:00
|
|
|
if (stepped == 0) {
|
2021-06-17 15:51:03 +00:00
|
|
|
regs_set_return_ip(regs, (unsigned long) &bp->instr[0]);
|
2005-04-16 22:20:36 +00:00
|
|
|
atomic_inc(&bp->ref_count);
|
|
|
|
} else if (stepped < 0) {
|
|
|
|
printf("Couldn't single-step %s instruction\n",
|
2020-05-06 03:40:32 +00:00
|
|
|
IS_RFID(ppc_inst_read(bp->instr))? "rfid": "mtmsrd");
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2009-10-05 04:46:05 +00:00
|
|
|
#endif
|
2019-09-07 06:11:24 +00:00
|
|
|
if (locked_down)
|
|
|
|
clear_all_bpt();
|
|
|
|
else
|
|
|
|
insert_cpu_bpts();
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2020-06-30 00:02:18 +00:00
|
|
|
xmon_touch_watchdogs();
|
2007-03-20 14:48:34 +00:00
|
|
|
local_irq_restore(flags);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2006-10-03 11:32:49 +00:00
|
|
|
return cmd != 'X' && cmd != EOF;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int xmon(struct pt_regs *excp)
|
|
|
|
{
|
|
|
|
struct pt_regs regs;
|
|
|
|
|
|
|
|
if (excp == NULL) {
|
2008-12-17 10:08:55 +00:00
|
|
|
ppc_save_regs(®s);
|
2005-04-16 22:20:36 +00:00
|
|
|
excp = ®s;
|
|
|
|
}
|
2006-10-24 16:31:27 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
return xmon_core(excp, 0);
|
|
|
|
}
|
2005-10-28 12:53:37 +00:00
|
|
|
EXPORT_SYMBOL(xmon);
|
|
|
|
|
2006-10-10 01:47:07 +00:00
|
|
|
irqreturn_t xmon_irq(int irq, void *d)
|
2005-10-28 12:53:37 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
local_irq_save(flags);
|
|
|
|
printf("Keyboard interrupt\n");
|
2006-10-10 01:47:07 +00:00
|
|
|
xmon(get_irq_regs());
|
2005-10-28 12:53:37 +00:00
|
|
|
local_irq_restore(flags);
|
|
|
|
return IRQ_HANDLED;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2006-01-11 00:00:05 +00:00
|
|
|
static int xmon_bpt(struct pt_regs *regs)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct bpt *bp;
|
|
|
|
unsigned long offset;
|
|
|
|
|
2011-04-07 21:56:03 +00:00
|
|
|
if ((regs->msr & (MSR_IR|MSR_PR|MSR_64BIT)) != (MSR_IR|MSR_64BIT))
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Are we at the trap at bp->instr[1] for some bp? */
|
|
|
|
bp = in_breakpoint_table(regs->nip, &offset);
|
2020-05-15 02:12:55 +00:00
|
|
|
if (bp != NULL && (offset == 4 || offset == 8)) {
|
2021-06-17 15:51:03 +00:00
|
|
|
regs_set_return_ip(regs, bp->address + offset);
|
2005-04-16 22:20:36 +00:00
|
|
|
atomic_dec(&bp->ref_count);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Are we at a breakpoint? */
|
|
|
|
bp = at_breakpoint(regs->nip);
|
|
|
|
if (!bp)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
xmon_core(regs, 0);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2006-01-11 00:00:05 +00:00
|
|
|
static int xmon_sstep(struct pt_regs *regs)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
if (user_mode(regs))
|
|
|
|
return 0;
|
|
|
|
xmon_core(regs, 0);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2012-12-20 14:06:44 +00:00
|
|
|
static int xmon_break_match(struct pt_regs *regs)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2020-05-14 11:17:41 +00:00
|
|
|
int i;
|
|
|
|
|
2011-04-07 21:56:03 +00:00
|
|
|
if ((regs->msr & (MSR_IR|MSR_PR|MSR_64BIT)) != (MSR_IR|MSR_64BIT))
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
2020-05-14 11:17:41 +00:00
|
|
|
for (i = 0; i < nr_wp_slots(); i++) {
|
|
|
|
if (dabr[i].enabled)
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
found:
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_core(regs, 0);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2006-01-11 00:00:05 +00:00
|
|
|
static int xmon_iabr_match(struct pt_regs *regs)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2011-04-07 21:56:03 +00:00
|
|
|
if ((regs->msr & (MSR_IR|MSR_PR|MSR_64BIT)) != (MSR_IR|MSR_64BIT))
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
2008-05-08 04:27:16 +00:00
|
|
|
if (iabr == NULL)
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
xmon_core(regs, 0);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2006-01-11 00:00:05 +00:00
|
|
|
static int xmon_ipi(struct pt_regs *regs)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
#ifdef CONFIG_SMP
|
2011-04-28 05:07:23 +00:00
|
|
|
if (in_xmon && !cpumask_test_cpu(smp_processor_id(), &cpus_in_xmon))
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_core(regs, 1);
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-01-11 00:00:05 +00:00
|
|
|
static int xmon_fault_handler(struct pt_regs *regs)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct bpt *bp;
|
|
|
|
unsigned long offset;
|
|
|
|
|
|
|
|
if (in_xmon && catch_memory_errors)
|
|
|
|
handle_fault(regs); /* doesn't return */
|
|
|
|
|
2011-04-07 21:56:03 +00:00
|
|
|
if ((regs->msr & (MSR_IR|MSR_PR|MSR_64BIT)) == (MSR_IR|MSR_64BIT)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
bp = in_breakpoint_table(regs->nip, &offset);
|
|
|
|
if (bp != NULL) {
|
2021-06-17 15:51:03 +00:00
|
|
|
regs_set_return_ip(regs, bp->address + offset);
|
2005-04-16 22:20:36 +00:00
|
|
|
atomic_dec(&bp->ref_count);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-05-23 18:00:54 +00:00
|
|
|
/* Force enable xmon if not already enabled */
|
|
|
|
static inline void force_enable_xmon(void)
|
|
|
|
{
|
|
|
|
/* Enable xmon hooks if needed */
|
|
|
|
if (!xmon_on) {
|
|
|
|
printf("xmon: Enabling debugger hooks\n");
|
|
|
|
xmon_on = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static struct bpt *at_breakpoint(unsigned long pc)
|
|
|
|
{
|
|
|
|
int i;
|
2021-04-29 08:06:38 +00:00
|
|
|
struct bpt *volatile bp;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
bp = bpts;
|
|
|
|
for (i = 0; i < NBPTS; ++i, ++bp)
|
|
|
|
if (bp->enabled && pc == bp->address)
|
|
|
|
return bp;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct bpt *in_breakpoint_table(unsigned long nip, unsigned long *offp)
|
|
|
|
{
|
|
|
|
unsigned long off;
|
|
|
|
|
2020-05-06 03:40:22 +00:00
|
|
|
off = nip - (unsigned long)bpt_table;
|
|
|
|
if (off >= sizeof(bpt_table))
|
2005-04-16 22:20:36 +00:00
|
|
|
return NULL;
|
2020-05-06 03:40:24 +00:00
|
|
|
*offp = off & (BPT_SIZE - 1);
|
|
|
|
if (off & 3)
|
2005-04-16 22:20:36 +00:00
|
|
|
return NULL;
|
2020-05-06 03:40:22 +00:00
|
|
|
return bpts + (off / BPT_SIZE);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct bpt *new_breakpoint(unsigned long a)
|
|
|
|
{
|
|
|
|
struct bpt *bp;
|
|
|
|
|
|
|
|
a &= ~3UL;
|
|
|
|
bp = at_breakpoint(a);
|
|
|
|
if (bp)
|
|
|
|
return bp;
|
|
|
|
|
|
|
|
for (bp = bpts; bp < &bpts[NBPTS]; ++bp) {
|
|
|
|
if (!bp->enabled && atomic_read(&bp->ref_count) == 0) {
|
|
|
|
bp->address = a;
|
2020-05-06 03:40:31 +00:00
|
|
|
bp->instr = (void *)(bpt_table + ((bp - bpts) * BPT_WORDS));
|
2005-04-16 22:20:36 +00:00
|
|
|
return bp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("Sorry, no free breakpoints. Please clear one first.\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void insert_bpts(void)
|
|
|
|
{
|
|
|
|
int i;
|
2020-05-06 03:40:46 +00:00
|
|
|
struct ppc_inst instr, instr2;
|
|
|
|
struct bpt *bp, *bp2;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
bp = bpts;
|
|
|
|
for (i = 0; i < NBPTS; ++i, ++bp) {
|
2014-12-01 05:54:13 +00:00
|
|
|
if ((bp->enabled & (BP_TRAP|BP_CIABR)) == 0)
|
2005-04-16 22:20:36 +00:00
|
|
|
continue;
|
2020-05-06 03:40:38 +00:00
|
|
|
if (!mread_instr(bp->address, &instr)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("Couldn't read instruction at %lx, "
|
|
|
|
"disabling breakpoint there\n", bp->address);
|
|
|
|
bp->enabled = 0;
|
|
|
|
continue;
|
|
|
|
}
|
2020-05-06 03:40:21 +00:00
|
|
|
if (IS_MTMSRD(instr) || IS_RFID(instr)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("Breakpoint at %lx is on an mtmsrd or rfid "
|
|
|
|
"instruction, disabling it\n", bp->address);
|
|
|
|
bp->enabled = 0;
|
|
|
|
continue;
|
|
|
|
}
|
2020-05-06 03:40:46 +00:00
|
|
|
/*
|
|
|
|
* Check the address is not a suffix by looking for a prefix in
|
|
|
|
* front of it.
|
|
|
|
*/
|
|
|
|
if (mread_instr(bp->address - 4, &instr2) == 8) {
|
|
|
|
printf("Breakpoint at %lx is on the second word of a prefixed instruction, disabling it\n",
|
|
|
|
bp->address);
|
|
|
|
bp->enabled = 0;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* We might still be a suffix - if the prefix has already been
|
|
|
|
* replaced by a breakpoint we won't catch it with the above
|
|
|
|
* test.
|
|
|
|
*/
|
|
|
|
bp2 = at_breakpoint(bp->address - 4);
|
|
|
|
if (bp2 && ppc_inst_prefixed(ppc_inst_read(bp2->instr))) {
|
|
|
|
printf("Breakpoint at %lx is on the second word of a prefixed instruction, disabling it\n",
|
|
|
|
bp->address);
|
|
|
|
bp->enabled = 0;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-05-06 03:40:21 +00:00
|
|
|
patch_instruction(bp->instr, instr);
|
2021-05-20 13:50:45 +00:00
|
|
|
patch_instruction(ppc_inst_next(bp->instr, bp->instr),
|
2020-05-06 03:40:39 +00:00
|
|
|
ppc_inst(bpinstr));
|
2014-12-01 05:54:13 +00:00
|
|
|
if (bp->enabled & BP_CIABR)
|
2005-04-16 22:20:36 +00:00
|
|
|
continue;
|
2021-05-20 13:50:45 +00:00
|
|
|
if (patch_instruction((u32 *)bp->address,
|
2020-05-06 03:40:31 +00:00
|
|
|
ppc_inst(bpinstr)) != 0) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("Couldn't write instruction at %lx, "
|
|
|
|
"disabling breakpoint there\n", bp->address);
|
|
|
|
bp->enabled &= ~BP_TRAP;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void insert_cpu_bpts(void)
|
|
|
|
{
|
2020-05-14 11:17:41 +00:00
|
|
|
int i;
|
2012-12-20 14:06:44 +00:00
|
|
|
struct arch_hw_breakpoint brk;
|
|
|
|
|
2020-05-14 11:17:41 +00:00
|
|
|
for (i = 0; i < nr_wp_slots(); i++) {
|
|
|
|
if (dabr[i].enabled) {
|
|
|
|
brk.address = dabr[i].address;
|
|
|
|
brk.type = (dabr[i].enabled & HW_BRK_TYPE_DABR) | HW_BRK_TYPE_PRIV_ALL;
|
|
|
|
brk.len = 8;
|
2020-09-02 04:29:43 +00:00
|
|
|
brk.hw_len = 8;
|
2020-05-14 11:17:41 +00:00
|
|
|
__set_breakpoint(i, &brk);
|
|
|
|
}
|
2012-12-20 14:06:44 +00:00
|
|
|
}
|
2014-11-28 04:36:42 +00:00
|
|
|
|
|
|
|
if (iabr)
|
|
|
|
set_ciabr(iabr->address);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void remove_bpts(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct bpt *bp;
|
2020-05-06 03:40:31 +00:00
|
|
|
struct ppc_inst instr;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
bp = bpts;
|
|
|
|
for (i = 0; i < NBPTS; ++i, ++bp) {
|
2014-12-01 05:54:13 +00:00
|
|
|
if ((bp->enabled & (BP_TRAP|BP_CIABR)) != BP_TRAP)
|
2005-04-16 22:20:36 +00:00
|
|
|
continue;
|
2020-05-06 03:40:38 +00:00
|
|
|
if (mread_instr(bp->address, &instr)
|
2020-05-06 03:40:30 +00:00
|
|
|
&& ppc_inst_equal(instr, ppc_inst(bpinstr))
|
2017-06-27 07:48:58 +00:00
|
|
|
&& patch_instruction(
|
2021-05-20 13:50:45 +00:00
|
|
|
(u32 *)bp->address, ppc_inst_read(bp->instr)) != 0)
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("Couldn't remove breakpoint at %lx\n",
|
|
|
|
bp->address);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void remove_cpu_bpts(void)
|
|
|
|
{
|
2012-12-20 14:06:44 +00:00
|
|
|
hw_breakpoint_disable();
|
2014-11-28 04:36:42 +00:00
|
|
|
write_ciabr(0);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2017-09-18 14:16:58 +00:00
|
|
|
/* Based on uptime_proc_show(). */
|
|
|
|
static void
|
|
|
|
show_uptime(void)
|
|
|
|
{
|
2018-06-18 09:56:24 +00:00
|
|
|
struct timespec64 uptime;
|
2017-09-18 14:16:58 +00:00
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
2018-06-18 09:56:24 +00:00
|
|
|
ktime_get_coarse_boottime_ts64(&uptime);
|
2017-09-18 14:16:58 +00:00
|
|
|
printf("Uptime: %lu.%.2lu seconds\n", (unsigned long)uptime.tv_sec,
|
|
|
|
((unsigned long)uptime.tv_nsec / (NSEC_PER_SEC/100)));
|
|
|
|
|
|
|
|
sync();
|
|
|
|
__delay(200); \
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
|
2015-10-08 00:50:23 +00:00
|
|
|
static void set_lpp_cmd(void)
|
|
|
|
{
|
|
|
|
unsigned long lpp;
|
|
|
|
|
|
|
|
if (!scanhex(&lpp)) {
|
|
|
|
printf("Invalid number.\n");
|
|
|
|
lpp = 0;
|
|
|
|
}
|
|
|
|
xmon_set_pagination_lpp(lpp);
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
/* Command interpreting routine */
|
|
|
|
static char *last_cmd;
|
|
|
|
|
|
|
|
static int
|
|
|
|
cmds(struct pt_regs *excp)
|
|
|
|
{
|
|
|
|
int cmd = 0;
|
|
|
|
|
|
|
|
last_cmd = NULL;
|
|
|
|
xmon_regs = excp;
|
2006-09-08 14:29:21 +00:00
|
|
|
|
2017-03-22 19:27:50 +00:00
|
|
|
xmon_show_stack(excp->gpr[1], excp->link, excp->nip);
|
2006-09-08 14:29:21 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
for(;;) {
|
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
printf("%x:", smp_processor_id());
|
|
|
|
#endif /* CONFIG_SMP */
|
|
|
|
printf("mon> ");
|
|
|
|
flush_input();
|
|
|
|
termch = 0;
|
|
|
|
cmd = skipbl();
|
|
|
|
if( cmd == '\n' ) {
|
|
|
|
if (last_cmd == NULL)
|
|
|
|
continue;
|
|
|
|
take_input(last_cmd);
|
|
|
|
last_cmd = NULL;
|
|
|
|
cmd = inchar();
|
|
|
|
}
|
|
|
|
switch (cmd) {
|
|
|
|
case 'm':
|
|
|
|
cmd = inchar();
|
|
|
|
switch (cmd) {
|
|
|
|
case 'm':
|
|
|
|
case 's':
|
|
|
|
case 'd':
|
|
|
|
memops(cmd);
|
|
|
|
break;
|
|
|
|
case 'l':
|
|
|
|
memlocate();
|
|
|
|
break;
|
|
|
|
case 'z':
|
2019-04-16 03:26:38 +00:00
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
break;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
memzcan();
|
|
|
|
break;
|
|
|
|
case 'i':
|
2017-02-22 23:46:16 +00:00
|
|
|
show_mem(0, NULL);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
termch = cmd;
|
|
|
|
memex();
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
dump();
|
|
|
|
break;
|
|
|
|
case 'l':
|
|
|
|
symbol_lookup();
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
prregs(excp); /* print regs */
|
|
|
|
break;
|
|
|
|
case 'e':
|
|
|
|
excprint(excp);
|
|
|
|
break;
|
|
|
|
case 'S':
|
|
|
|
super_regs();
|
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
backtrace(excp);
|
|
|
|
break;
|
|
|
|
case 'f':
|
|
|
|
cacheflush();
|
|
|
|
break;
|
|
|
|
case 's':
|
2006-10-24 16:31:27 +00:00
|
|
|
if (do_spu_cmd() == 0)
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
if (do_step(excp))
|
|
|
|
return cmd;
|
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
case 'X':
|
2017-08-02 20:14:06 +00:00
|
|
|
if (tracing_enabled)
|
|
|
|
tracing_on();
|
2005-11-30 05:54:12 +00:00
|
|
|
return cmd;
|
2005-04-16 22:20:36 +00:00
|
|
|
case EOF:
|
2005-11-30 05:54:12 +00:00
|
|
|
printf(" <no input ...>\n");
|
|
|
|
mdelay(2000);
|
2005-04-16 22:20:36 +00:00
|
|
|
return cmd;
|
|
|
|
case '?':
|
2007-07-18 09:26:40 +00:00
|
|
|
xmon_puts(help_string);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
2015-10-08 00:50:23 +00:00
|
|
|
case '#':
|
|
|
|
set_lpp_cmd();
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
case 'b':
|
|
|
|
bpt_cmds();
|
|
|
|
break;
|
|
|
|
case 'C':
|
|
|
|
csum();
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
if (cpu_cmd())
|
|
|
|
return 0;
|
|
|
|
break;
|
|
|
|
case 'z':
|
|
|
|
bootcmds();
|
|
|
|
break;
|
2005-10-28 12:53:37 +00:00
|
|
|
case 'p':
|
2019-04-16 03:26:38 +00:00
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
break;
|
|
|
|
}
|
2005-10-28 12:53:37 +00:00
|
|
|
proccall();
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
2015-11-23 15:01:15 +00:00
|
|
|
case 'P':
|
|
|
|
show_tasks();
|
|
|
|
break;
|
2018-11-17 10:25:04 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S
|
2005-04-16 22:20:36 +00:00
|
|
|
case 'u':
|
|
|
|
dump_segments();
|
|
|
|
break;
|
2014-11-12 05:54:54 +00:00
|
|
|
#elif defined(CONFIG_44x)
|
2007-11-16 07:23:33 +00:00
|
|
|
case 'u':
|
|
|
|
dump_tlb_44x();
|
|
|
|
break;
|
2011-09-29 11:25:10 +00:00
|
|
|
#elif defined(CONFIG_PPC_BOOK3E)
|
2010-07-09 05:34:50 +00:00
|
|
|
case 'u':
|
|
|
|
dump_tlb_book3e();
|
|
|
|
break;
|
2005-10-28 12:53:37 +00:00
|
|
|
#endif
|
2017-09-18 14:16:58 +00:00
|
|
|
case 'U':
|
|
|
|
show_uptime();
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
default:
|
|
|
|
printf("Unrecognized command: ");
|
2012-08-23 22:09:13 +00:00
|
|
|
do {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (' ' < cmd && cmd <= '~')
|
|
|
|
putchar(cmd);
|
|
|
|
else
|
|
|
|
printf("\\x%x", cmd);
|
|
|
|
cmd = inchar();
|
2012-08-23 22:09:13 +00:00
|
|
|
} while (cmd != '\n');
|
2005-04-16 22:20:36 +00:00
|
|
|
printf(" (type ? for help)\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-10-05 04:46:05 +00:00
|
|
|
#ifdef CONFIG_BOOKE
|
|
|
|
static int do_step(struct pt_regs *regs)
|
|
|
|
{
|
2021-06-17 15:51:03 +00:00
|
|
|
regs_set_return_msr(regs, regs->msr | MSR_DE);
|
2009-10-05 04:46:05 +00:00
|
|
|
mtspr(SPRN_DBCR0, mfspr(SPRN_DBCR0) | DBCR0_IC | DBCR0_IDM);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#else
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Step a single instruction.
|
|
|
|
* Some instructions we emulate, others we execute with MSR_SE set.
|
|
|
|
*/
|
|
|
|
static int do_step(struct pt_regs *regs)
|
|
|
|
{
|
2020-05-06 03:40:31 +00:00
|
|
|
struct ppc_inst instr;
|
2005-04-16 22:20:36 +00:00
|
|
|
int stepped;
|
|
|
|
|
2018-05-23 18:00:54 +00:00
|
|
|
force_enable_xmon();
|
2005-04-16 22:20:36 +00:00
|
|
|
/* check we are in 64-bit kernel mode, translation enabled */
|
2011-04-07 21:56:03 +00:00
|
|
|
if ((regs->msr & (MSR_64BIT|MSR_PR|MSR_IR)) == (MSR_64BIT|MSR_IR)) {
|
2020-05-06 03:40:38 +00:00
|
|
|
if (mread_instr(regs->nip, &instr)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
stepped = emulate_step(regs, instr);
|
|
|
|
if (stepped < 0) {
|
|
|
|
printf("Couldn't single-step %s instruction\n",
|
|
|
|
(IS_RFID(instr)? "rfid": "mtmsrd"));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (stepped > 0) {
|
2020-05-07 12:13:30 +00:00
|
|
|
set_trap(regs, 0xd00);
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("stepped to ");
|
|
|
|
xmon_print_symbol(regs->nip, " ", "\n");
|
|
|
|
ppc_inst_dump(regs->nip, 1, 0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-06-17 15:51:03 +00:00
|
|
|
regs_set_return_msr(regs, regs->msr | MSR_SE);
|
2005-04-16 22:20:36 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2009-10-05 04:46:05 +00:00
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
static void bootcmds(void)
|
|
|
|
{
|
2019-11-01 08:55:21 +00:00
|
|
|
char tmp[64];
|
2005-04-16 22:20:36 +00:00
|
|
|
int cmd;
|
|
|
|
|
|
|
|
cmd = inchar();
|
2019-11-01 08:55:21 +00:00
|
|
|
if (cmd == 'r') {
|
|
|
|
getstring(tmp, 64);
|
|
|
|
ppc_md.restart(tmp);
|
|
|
|
} else if (cmd == 'h') {
|
2005-04-16 22:20:36 +00:00
|
|
|
ppc_md.halt();
|
2019-11-01 08:55:21 +00:00
|
|
|
} else if (cmd == 'p') {
|
2014-10-13 14:01:09 +00:00
|
|
|
if (pm_power_off)
|
|
|
|
pm_power_off();
|
2019-11-01 08:55:21 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2021-06-01 07:48:01 +00:00
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
static int xmon_switch_cpu(unsigned long cpu)
|
|
|
|
{
|
|
|
|
int timeout;
|
|
|
|
|
|
|
|
xmon_taken = 0;
|
|
|
|
mb();
|
|
|
|
xmon_owner = cpu;
|
|
|
|
timeout = 10000000;
|
|
|
|
while (!xmon_taken) {
|
|
|
|
if (--timeout == 0) {
|
|
|
|
if (test_and_set_bit(0, &xmon_taken))
|
|
|
|
break;
|
|
|
|
/* take control back */
|
|
|
|
mb();
|
|
|
|
xmon_owner = smp_processor_id();
|
|
|
|
printf("cpu 0x%lx didn't take control\n", cpu);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
barrier();
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int xmon_batch_next_cpu(void)
|
|
|
|
{
|
|
|
|
unsigned long cpu;
|
|
|
|
|
|
|
|
while (!cpumask_empty(&xmon_batch_cpus)) {
|
|
|
|
cpu = cpumask_next_wrap(smp_processor_id(), &xmon_batch_cpus,
|
|
|
|
xmon_batch_start_cpu, true);
|
|
|
|
if (cpu == nr_cpumask_bits)
|
|
|
|
break;
|
|
|
|
if (xmon_batch_start_cpu == -1)
|
|
|
|
xmon_batch_start_cpu = cpu;
|
|
|
|
if (xmon_switch_cpu(cpu))
|
|
|
|
return 0;
|
|
|
|
cpumask_clear_cpu(cpu, &xmon_batch_cpus);
|
|
|
|
}
|
|
|
|
|
|
|
|
xmon_batch = 0;
|
|
|
|
printf("%x:mon> \n", smp_processor_id());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int batch_cmds(struct pt_regs *excp)
|
|
|
|
{
|
|
|
|
int cmd;
|
|
|
|
|
|
|
|
/* simulate command entry */
|
|
|
|
cmd = xmon_batch;
|
|
|
|
termch = '\n';
|
|
|
|
|
|
|
|
last_cmd = NULL;
|
|
|
|
xmon_regs = excp;
|
|
|
|
|
|
|
|
printf("%x:", smp_processor_id());
|
|
|
|
printf("mon> ");
|
|
|
|
printf("%c\n", (char)cmd);
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case 'r':
|
|
|
|
prregs(excp); /* print regs */
|
|
|
|
break;
|
|
|
|
case 'S':
|
|
|
|
super_regs();
|
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
backtrace(excp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
cpumask_clear_cpu(smp_processor_id(), &xmon_batch_cpus);
|
|
|
|
|
|
|
|
return xmon_batch_next_cpu();
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static int cpu_cmd(void)
|
|
|
|
{
|
2013-09-03 10:16:23 +00:00
|
|
|
unsigned long cpu, first_cpu, last_cpu;
|
2021-06-01 07:48:01 +00:00
|
|
|
|
|
|
|
cpu = skipbl();
|
|
|
|
if (cpu == '#') {
|
|
|
|
xmon_batch = skipbl();
|
|
|
|
if (xmon_batch) {
|
|
|
|
switch (xmon_batch) {
|
|
|
|
case 'r':
|
|
|
|
case 'S':
|
|
|
|
case 't':
|
|
|
|
cpumask_copy(&xmon_batch_cpus, &cpus_in_xmon);
|
|
|
|
if (cpumask_weight(&xmon_batch_cpus) <= 1) {
|
|
|
|
printf("There are no other cpus in xmon\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
xmon_batch_start_cpu = -1;
|
|
|
|
if (!xmon_batch_next_cpu())
|
|
|
|
return 1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("c# only supports 'r', 'S' and 't' commands\n");
|
|
|
|
}
|
|
|
|
xmon_batch = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
termch = cpu;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (!scanhex(&cpu)) {
|
|
|
|
/* print cpus waiting or in xmon */
|
|
|
|
printf("cpus stopped:");
|
2013-09-03 10:16:23 +00:00
|
|
|
last_cpu = first_cpu = NR_CPUS;
|
2012-06-28 19:28:57 +00:00
|
|
|
for_each_possible_cpu(cpu) {
|
2011-04-28 05:07:23 +00:00
|
|
|
if (cpumask_test_cpu(cpu, &cpus_in_xmon)) {
|
2013-09-03 10:16:23 +00:00
|
|
|
if (cpu == last_cpu + 1) {
|
|
|
|
last_cpu = cpu;
|
|
|
|
} else {
|
|
|
|
if (last_cpu != first_cpu)
|
2014-05-26 11:02:14 +00:00
|
|
|
printf("-0x%lx", last_cpu);
|
2013-09-03 10:16:23 +00:00
|
|
|
last_cpu = first_cpu = cpu;
|
2014-05-26 11:02:14 +00:00
|
|
|
printf(" 0x%lx", cpu);
|
2013-09-03 10:16:23 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
}
|
2013-09-03 10:16:23 +00:00
|
|
|
if (last_cpu != first_cpu)
|
2014-05-26 11:02:14 +00:00
|
|
|
printf("-0x%lx", last_cpu);
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* try to switch to cpu specified */
|
2011-04-28 05:07:23 +00:00
|
|
|
if (!cpumask_test_cpu(cpu, &cpus_in_xmon)) {
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("cpu 0x%lx isn't in xmon\n", cpu);
|
2018-05-02 13:07:26 +00:00
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
printf("backtrace of paca[0x%lx].saved_r1 (possibly stale):\n", cpu);
|
|
|
|
xmon_show_stack(paca_ptrs[cpu]->saved_r1, 0, 0);
|
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2021-06-01 07:48:01 +00:00
|
|
|
|
|
|
|
return xmon_switch_cpu(cpu);
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
#else
|
2021-06-01 07:48:01 +00:00
|
|
|
static int cpu_cmd(void)
|
|
|
|
{
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2021-06-01 07:48:01 +00:00
|
|
|
#endif /* CONFIG_SMP */
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
static unsigned short fcstab[256] = {
|
|
|
|
0x0000, 0x1189, 0x2312, 0x329b, 0x4624, 0x57ad, 0x6536, 0x74bf,
|
|
|
|
0x8c48, 0x9dc1, 0xaf5a, 0xbed3, 0xca6c, 0xdbe5, 0xe97e, 0xf8f7,
|
|
|
|
0x1081, 0x0108, 0x3393, 0x221a, 0x56a5, 0x472c, 0x75b7, 0x643e,
|
|
|
|
0x9cc9, 0x8d40, 0xbfdb, 0xae52, 0xdaed, 0xcb64, 0xf9ff, 0xe876,
|
|
|
|
0x2102, 0x308b, 0x0210, 0x1399, 0x6726, 0x76af, 0x4434, 0x55bd,
|
|
|
|
0xad4a, 0xbcc3, 0x8e58, 0x9fd1, 0xeb6e, 0xfae7, 0xc87c, 0xd9f5,
|
|
|
|
0x3183, 0x200a, 0x1291, 0x0318, 0x77a7, 0x662e, 0x54b5, 0x453c,
|
|
|
|
0xbdcb, 0xac42, 0x9ed9, 0x8f50, 0xfbef, 0xea66, 0xd8fd, 0xc974,
|
|
|
|
0x4204, 0x538d, 0x6116, 0x709f, 0x0420, 0x15a9, 0x2732, 0x36bb,
|
|
|
|
0xce4c, 0xdfc5, 0xed5e, 0xfcd7, 0x8868, 0x99e1, 0xab7a, 0xbaf3,
|
|
|
|
0x5285, 0x430c, 0x7197, 0x601e, 0x14a1, 0x0528, 0x37b3, 0x263a,
|
|
|
|
0xdecd, 0xcf44, 0xfddf, 0xec56, 0x98e9, 0x8960, 0xbbfb, 0xaa72,
|
|
|
|
0x6306, 0x728f, 0x4014, 0x519d, 0x2522, 0x34ab, 0x0630, 0x17b9,
|
|
|
|
0xef4e, 0xfec7, 0xcc5c, 0xddd5, 0xa96a, 0xb8e3, 0x8a78, 0x9bf1,
|
|
|
|
0x7387, 0x620e, 0x5095, 0x411c, 0x35a3, 0x242a, 0x16b1, 0x0738,
|
|
|
|
0xffcf, 0xee46, 0xdcdd, 0xcd54, 0xb9eb, 0xa862, 0x9af9, 0x8b70,
|
|
|
|
0x8408, 0x9581, 0xa71a, 0xb693, 0xc22c, 0xd3a5, 0xe13e, 0xf0b7,
|
|
|
|
0x0840, 0x19c9, 0x2b52, 0x3adb, 0x4e64, 0x5fed, 0x6d76, 0x7cff,
|
|
|
|
0x9489, 0x8500, 0xb79b, 0xa612, 0xd2ad, 0xc324, 0xf1bf, 0xe036,
|
|
|
|
0x18c1, 0x0948, 0x3bd3, 0x2a5a, 0x5ee5, 0x4f6c, 0x7df7, 0x6c7e,
|
|
|
|
0xa50a, 0xb483, 0x8618, 0x9791, 0xe32e, 0xf2a7, 0xc03c, 0xd1b5,
|
|
|
|
0x2942, 0x38cb, 0x0a50, 0x1bd9, 0x6f66, 0x7eef, 0x4c74, 0x5dfd,
|
|
|
|
0xb58b, 0xa402, 0x9699, 0x8710, 0xf3af, 0xe226, 0xd0bd, 0xc134,
|
|
|
|
0x39c3, 0x284a, 0x1ad1, 0x0b58, 0x7fe7, 0x6e6e, 0x5cf5, 0x4d7c,
|
|
|
|
0xc60c, 0xd785, 0xe51e, 0xf497, 0x8028, 0x91a1, 0xa33a, 0xb2b3,
|
|
|
|
0x4a44, 0x5bcd, 0x6956, 0x78df, 0x0c60, 0x1de9, 0x2f72, 0x3efb,
|
|
|
|
0xd68d, 0xc704, 0xf59f, 0xe416, 0x90a9, 0x8120, 0xb3bb, 0xa232,
|
|
|
|
0x5ac5, 0x4b4c, 0x79d7, 0x685e, 0x1ce1, 0x0d68, 0x3ff3, 0x2e7a,
|
|
|
|
0xe70e, 0xf687, 0xc41c, 0xd595, 0xa12a, 0xb0a3, 0x8238, 0x93b1,
|
|
|
|
0x6b46, 0x7acf, 0x4854, 0x59dd, 0x2d62, 0x3ceb, 0x0e70, 0x1ff9,
|
|
|
|
0xf78f, 0xe606, 0xd49d, 0xc514, 0xb1ab, 0xa022, 0x92b9, 0x8330,
|
|
|
|
0x7bc7, 0x6a4e, 0x58d5, 0x495c, 0x3de3, 0x2c6a, 0x1ef1, 0x0f78
|
|
|
|
};
|
|
|
|
|
|
|
|
#define FCS(fcs, c) (((fcs) >> 8) ^ fcstab[((fcs) ^ (c)) & 0xff])
|
|
|
|
|
|
|
|
static void
|
|
|
|
csum(void)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
unsigned short fcs;
|
|
|
|
unsigned char v;
|
|
|
|
|
|
|
|
if (!scanhex(&adrs))
|
|
|
|
return;
|
|
|
|
if (!scanhex(&ncsum))
|
|
|
|
return;
|
|
|
|
fcs = 0xffff;
|
|
|
|
for (i = 0; i < ncsum; ++i) {
|
|
|
|
if (mread(adrs+i, &v, 1) == 0) {
|
2014-05-26 11:02:14 +00:00
|
|
|
printf("csum stopped at "REG"\n", adrs+i);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
fcs = FCS(fcs, v);
|
|
|
|
}
|
|
|
|
printf("%x\n", fcs);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if this is a suitable place to put a breakpoint.
|
|
|
|
*/
|
|
|
|
static long check_bp_loc(unsigned long addr)
|
|
|
|
{
|
2020-05-06 03:40:31 +00:00
|
|
|
struct ppc_inst instr;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
addr &= ~3;
|
2005-12-04 07:39:15 +00:00
|
|
|
if (!is_kernel_addr(addr)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("Breakpoints may only be placed at kernel addresses\n");
|
|
|
|
return 0;
|
|
|
|
}
|
2020-05-06 03:40:38 +00:00
|
|
|
if (!mread_instr(addr, &instr)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("Can't read instruction at address %lx\n", addr);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (IS_MTMSRD(instr) || IS_RFID(instr)) {
|
|
|
|
printf("Breakpoints may not be placed on mtmsrd or rfid "
|
|
|
|
"instructions\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-05-14 11:17:41 +00:00
|
|
|
static int find_free_data_bpt(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < nr_wp_slots(); i++) {
|
|
|
|
if (!dabr[i].enabled)
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
printf("Couldn't find free breakpoint register\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void print_data_bpts(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < nr_wp_slots(); i++) {
|
|
|
|
if (!dabr[i].enabled)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
printf(" data "REG" [", dabr[i].address);
|
|
|
|
if (dabr[i].enabled & 1)
|
|
|
|
printf("r");
|
|
|
|
if (dabr[i].enabled & 2)
|
|
|
|
printf("w");
|
|
|
|
printf("]\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-23 22:09:13 +00:00
|
|
|
static char *breakpoint_help_string =
|
2005-04-16 22:20:36 +00:00
|
|
|
"Breakpoint command usage:\n"
|
|
|
|
"b show breakpoints\n"
|
|
|
|
"b <addr> [cnt] set breakpoint at given instr addr\n"
|
|
|
|
"bc clear all breakpoints\n"
|
|
|
|
"bc <n/addr> clear breakpoint number n or at addr\n"
|
2014-11-28 04:36:42 +00:00
|
|
|
"bi <addr> [cnt] set hardware instr breakpoint (POWER8 only)\n"
|
2005-04-16 22:20:36 +00:00
|
|
|
"bd <addr> [cnt] set hardware data breakpoint\n"
|
|
|
|
"";
|
|
|
|
|
|
|
|
static void
|
|
|
|
bpt_cmds(void)
|
|
|
|
{
|
|
|
|
int cmd;
|
|
|
|
unsigned long a;
|
2017-05-12 00:47:07 +00:00
|
|
|
int i;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct bpt *bp;
|
|
|
|
|
|
|
|
cmd = inchar();
|
2019-09-07 06:11:23 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
switch (cmd) {
|
2017-05-12 00:47:07 +00:00
|
|
|
static const char badaddr[] = "Only kernel addresses are permitted for breakpoints\n";
|
|
|
|
int mode;
|
2005-04-16 22:20:36 +00:00
|
|
|
case 'd': /* bd - hardware data breakpoint */
|
2019-09-07 06:11:23 +00:00
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
break;
|
|
|
|
}
|
2018-03-27 04:37:19 +00:00
|
|
|
if (!ppc_breakpoint_available()) {
|
|
|
|
printf("Hardware data breakpoint not supported on this cpu\n");
|
|
|
|
break;
|
|
|
|
}
|
2020-05-14 11:17:41 +00:00
|
|
|
i = find_free_data_bpt();
|
|
|
|
if (i < 0)
|
2018-03-27 04:37:19 +00:00
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
mode = 7;
|
|
|
|
cmd = inchar();
|
|
|
|
if (cmd == 'r')
|
|
|
|
mode = 5;
|
|
|
|
else if (cmd == 'w')
|
|
|
|
mode = 6;
|
|
|
|
else
|
|
|
|
termch = cmd;
|
2020-05-14 11:17:41 +00:00
|
|
|
dabr[i].address = 0;
|
|
|
|
dabr[i].enabled = 0;
|
|
|
|
if (scanhex(&dabr[i].address)) {
|
|
|
|
if (!is_kernel_addr(dabr[i].address)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf(badaddr);
|
|
|
|
break;
|
|
|
|
}
|
2020-05-14 11:17:41 +00:00
|
|
|
dabr[i].address &= ~HW_BRK_TYPE_DABR;
|
|
|
|
dabr[i].enabled = mode | BP_DABR;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2018-03-04 17:30:25 +00:00
|
|
|
|
|
|
|
force_enable_xmon();
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'i': /* bi - hardware instr breakpoint */
|
2019-09-07 06:11:23 +00:00
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
break;
|
|
|
|
}
|
2014-11-28 04:36:42 +00:00
|
|
|
if (!cpu_has_feature(CPU_FTR_ARCH_207S)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("Hardware instruction breakpoint "
|
|
|
|
"not supported on this cpu\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (iabr) {
|
2014-12-01 05:54:13 +00:00
|
|
|
iabr->enabled &= ~BP_CIABR;
|
2005-04-16 22:20:36 +00:00
|
|
|
iabr = NULL;
|
|
|
|
}
|
|
|
|
if (!scanhex(&a))
|
|
|
|
break;
|
|
|
|
if (!check_bp_loc(a))
|
|
|
|
break;
|
|
|
|
bp = new_breakpoint(a);
|
|
|
|
if (bp != NULL) {
|
2014-12-01 05:54:13 +00:00
|
|
|
bp->enabled |= BP_CIABR;
|
2005-04-16 22:20:36 +00:00
|
|
|
iabr = bp;
|
2018-03-04 17:30:25 +00:00
|
|
|
force_enable_xmon();
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'c':
|
|
|
|
if (!scanhex(&a)) {
|
|
|
|
/* clear all breakpoints */
|
|
|
|
for (i = 0; i < NBPTS; ++i)
|
|
|
|
bpts[i].enabled = 0;
|
|
|
|
iabr = NULL;
|
2020-05-14 11:17:41 +00:00
|
|
|
for (i = 0; i < nr_wp_slots(); i++)
|
|
|
|
dabr[i].enabled = 0;
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("All breakpoints cleared\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (a <= NBPTS && a >= 1) {
|
|
|
|
/* assume a breakpoint number */
|
|
|
|
bp = &bpts[a-1]; /* bp nums are 1 based */
|
|
|
|
} else {
|
|
|
|
/* assume a breakpoint address */
|
|
|
|
bp = at_breakpoint(a);
|
2008-05-08 04:27:16 +00:00
|
|
|
if (bp == NULL) {
|
2014-05-26 11:02:14 +00:00
|
|
|
printf("No breakpoint at %lx\n", a);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("Cleared breakpoint %tx (", BP_NUM(bp));
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_print_symbol(bp->address, " ", ")\n");
|
|
|
|
bp->enabled = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
termch = cmd;
|
2012-08-23 22:09:13 +00:00
|
|
|
cmd = skipbl();
|
2005-04-16 22:20:36 +00:00
|
|
|
if (cmd == '?') {
|
|
|
|
printf(breakpoint_help_string);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
termch = cmd;
|
2019-09-07 06:11:23 +00:00
|
|
|
|
|
|
|
if (xmon_is_ro || !scanhex(&a)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
/* print all breakpoints */
|
|
|
|
printf(" type address\n");
|
2020-05-14 11:17:41 +00:00
|
|
|
print_data_bpts();
|
2005-04-16 22:20:36 +00:00
|
|
|
for (bp = bpts; bp < &bpts[NBPTS]; ++bp) {
|
|
|
|
if (!bp->enabled)
|
|
|
|
continue;
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("%tx %s ", BP_NUM(bp),
|
2014-12-01 05:54:13 +00:00
|
|
|
(bp->enabled & BP_CIABR) ? "inst": "trap");
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_print_symbol(bp->address, " ", "\n");
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!check_bp_loc(a))
|
|
|
|
break;
|
|
|
|
bp = new_breakpoint(a);
|
2018-03-04 17:30:25 +00:00
|
|
|
if (bp != NULL) {
|
2005-04-16 22:20:36 +00:00
|
|
|
bp->enabled |= BP_TRAP;
|
2018-03-04 17:30:25 +00:00
|
|
|
force_enable_xmon();
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Very cheap human name for vector lookup. */
|
|
|
|
static
|
|
|
|
const char *getvecname(unsigned long vec)
|
|
|
|
{
|
|
|
|
char *ret;
|
|
|
|
|
|
|
|
switch (vec) {
|
|
|
|
case 0x100: ret = "(System Reset)"; break;
|
|
|
|
case 0x200: ret = "(Machine Check)"; break;
|
|
|
|
case 0x300: ret = "(Data Access)"; break;
|
2017-03-16 03:04:40 +00:00
|
|
|
case 0x380:
|
|
|
|
if (radix_enabled())
|
|
|
|
ret = "(Data Access Out of Range)";
|
|
|
|
else
|
|
|
|
ret = "(Data SLB Access)";
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
case 0x400: ret = "(Instruction Access)"; break;
|
2017-03-16 03:04:40 +00:00
|
|
|
case 0x480:
|
|
|
|
if (radix_enabled())
|
|
|
|
ret = "(Instruction Access Out of Range)";
|
|
|
|
else
|
|
|
|
ret = "(Instruction SLB Access)";
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
case 0x500: ret = "(Hardware Interrupt)"; break;
|
|
|
|
case 0x600: ret = "(Alignment)"; break;
|
|
|
|
case 0x700: ret = "(Program Check)"; break;
|
|
|
|
case 0x800: ret = "(FPU Unavailable)"; break;
|
|
|
|
case 0x900: ret = "(Decrementer)"; break;
|
2013-08-15 05:22:16 +00:00
|
|
|
case 0x980: ret = "(Hypervisor Decrementer)"; break;
|
|
|
|
case 0xa00: ret = "(Doorbell)"; break;
|
2005-04-16 22:20:36 +00:00
|
|
|
case 0xc00: ret = "(System Call)"; break;
|
|
|
|
case 0xd00: ret = "(Single Step)"; break;
|
2013-08-15 05:22:16 +00:00
|
|
|
case 0xe40: ret = "(Emulation Assist)"; break;
|
|
|
|
case 0xe60: ret = "(HMI)"; break;
|
|
|
|
case 0xe80: ret = "(Hypervisor Doorbell)"; break;
|
2005-04-16 22:20:36 +00:00
|
|
|
case 0xf00: ret = "(Performance Monitor)"; break;
|
|
|
|
case 0xf20: ret = "(Altivec Unavailable)"; break;
|
|
|
|
case 0x1300: ret = "(Instruction Breakpoint)"; break;
|
2013-08-15 05:22:16 +00:00
|
|
|
case 0x1500: ret = "(Denormalisation)"; break;
|
|
|
|
case 0x1700: ret = "(Altivec Assist)"; break;
|
2020-06-11 08:12:03 +00:00
|
|
|
case 0x3000: ret = "(System Call Vectored)"; break;
|
2005-04-16 22:20:36 +00:00
|
|
|
default: ret = "";
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void get_function_bounds(unsigned long pc, unsigned long *startp,
|
|
|
|
unsigned long *endp)
|
|
|
|
{
|
|
|
|
unsigned long size, offset;
|
|
|
|
const char *name;
|
|
|
|
|
|
|
|
*startp = *endp = 0;
|
|
|
|
if (pc == 0)
|
|
|
|
return;
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
2007-05-08 07:28:41 +00:00
|
|
|
name = kallsyms_lookup(pc, &size, &offset, NULL, tmpstr);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (name != NULL) {
|
|
|
|
*startp = pc - offset;
|
|
|
|
*endp = pc - offset + size;
|
|
|
|
}
|
|
|
|
sync();
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
|
2008-04-17 04:34:59 +00:00
|
|
|
#define LRSAVE_OFFSET (STACK_FRAME_LR_SAVE * sizeof(unsigned long))
|
|
|
|
#define MARKER_OFFSET (STACK_FRAME_MARKER * sizeof(unsigned long))
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static void xmon_show_stack(unsigned long sp, unsigned long lr,
|
|
|
|
unsigned long pc)
|
|
|
|
{
|
2012-10-09 04:20:36 +00:00
|
|
|
int max_to_print = 64;
|
2005-04-16 22:20:36 +00:00
|
|
|
unsigned long ip;
|
|
|
|
unsigned long newsp;
|
|
|
|
unsigned long marker;
|
|
|
|
struct pt_regs regs;
|
|
|
|
|
2012-10-09 04:20:36 +00:00
|
|
|
while (max_to_print--) {
|
2017-01-05 11:08:15 +00:00
|
|
|
if (!is_kernel_addr(sp)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (sp != 0)
|
|
|
|
printf("SP (%lx) is in userspace\n", sp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
if (!mread(sp + LRSAVE_OFFSET, &ip, sizeof(unsigned long))
|
2005-04-16 22:20:36 +00:00
|
|
|
|| !mread(sp, &newsp, sizeof(unsigned long))) {
|
|
|
|
printf("Couldn't read stack frame at %lx\n", sp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For the first stack frame, try to work out if
|
|
|
|
* LR and/or the saved LR value in the bottommost
|
|
|
|
* stack frame are valid.
|
|
|
|
*/
|
|
|
|
if ((pc | lr) != 0) {
|
|
|
|
unsigned long fnstart, fnend;
|
|
|
|
unsigned long nextip;
|
|
|
|
int printip = 1;
|
|
|
|
|
|
|
|
get_function_bounds(pc, &fnstart, &fnend);
|
|
|
|
nextip = 0;
|
|
|
|
if (newsp > sp)
|
2005-10-28 12:53:37 +00:00
|
|
|
mread(newsp + LRSAVE_OFFSET, &nextip,
|
2005-04-16 22:20:36 +00:00
|
|
|
sizeof(unsigned long));
|
|
|
|
if (lr == ip) {
|
2017-01-05 11:08:15 +00:00
|
|
|
if (!is_kernel_addr(lr)
|
2005-04-16 22:20:36 +00:00
|
|
|
|| (fnstart <= lr && lr < fnend))
|
|
|
|
printip = 0;
|
|
|
|
} else if (lr == nextip) {
|
|
|
|
printip = 0;
|
2017-01-05 11:08:15 +00:00
|
|
|
} else if (is_kernel_addr(lr)
|
2005-04-16 22:20:36 +00:00
|
|
|
&& !(fnstart <= lr && lr < fnend)) {
|
|
|
|
printf("[link register ] ");
|
|
|
|
xmon_print_symbol(lr, " ", "\n");
|
|
|
|
}
|
|
|
|
if (printip) {
|
2005-10-28 12:53:37 +00:00
|
|
|
printf("["REG"] ", sp);
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_print_symbol(ip, " ", " (unreliable)\n");
|
|
|
|
}
|
|
|
|
pc = lr = 0;
|
|
|
|
|
|
|
|
} else {
|
2005-10-28 12:53:37 +00:00
|
|
|
printf("["REG"] ", sp);
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_print_symbol(ip, " ", "\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Look for "regshere" marker to see if this is
|
|
|
|
an exception frame. */
|
2005-10-28 12:53:37 +00:00
|
|
|
if (mread(sp + MARKER_OFFSET, &marker, sizeof(unsigned long))
|
2008-04-17 04:34:59 +00:00
|
|
|
&& marker == STACK_FRAME_REGS_MARKER) {
|
2012-10-09 04:20:35 +00:00
|
|
|
if (mread(sp + STACK_FRAME_OVERHEAD, ®s, sizeof(regs))
|
2005-04-16 22:20:36 +00:00
|
|
|
!= sizeof(regs)) {
|
|
|
|
printf("Couldn't read registers at %lx\n",
|
2012-10-09 04:20:35 +00:00
|
|
|
sp + STACK_FRAME_OVERHEAD);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
2012-08-23 22:09:13 +00:00
|
|
|
printf("--- Exception: %lx %s at ", regs.trap,
|
2005-04-16 22:20:36 +00:00
|
|
|
getvecname(TRAP(®s)));
|
|
|
|
pc = regs.nip;
|
|
|
|
lr = regs.link;
|
|
|
|
xmon_print_symbol(pc, " ", "\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (newsp == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
sp = newsp;
|
2012-10-09 04:20:36 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void backtrace(struct pt_regs *excp)
|
|
|
|
{
|
|
|
|
unsigned long sp;
|
|
|
|
|
|
|
|
if (scanhex(&sp))
|
|
|
|
xmon_show_stack(sp, 0, 0);
|
|
|
|
else
|
|
|
|
xmon_show_stack(excp->gpr[1], excp->link, excp->nip);
|
|
|
|
scannl();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void print_bug_trap(struct pt_regs *regs)
|
|
|
|
{
|
2008-10-31 10:34:09 +00:00
|
|
|
#ifdef CONFIG_BUG
|
2006-12-08 11:30:41 +00:00
|
|
|
const struct bug_entry *bug;
|
2005-04-16 22:20:36 +00:00
|
|
|
unsigned long addr;
|
|
|
|
|
|
|
|
if (regs->msr & MSR_PR)
|
|
|
|
return; /* not in kernel */
|
|
|
|
addr = regs->nip; /* address of trap instruction */
|
2017-01-05 11:08:15 +00:00
|
|
|
if (!is_kernel_addr(addr))
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
bug = find_bug(regs->nip);
|
|
|
|
if (bug == NULL)
|
|
|
|
return;
|
2006-12-08 11:30:41 +00:00
|
|
|
if (is_warning_bug(bug))
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
|
2007-03-04 06:05:34 +00:00
|
|
|
#ifdef CONFIG_DEBUG_BUGVERBOSE
|
2006-12-08 11:30:41 +00:00
|
|
|
printf("kernel BUG at %s:%u!\n",
|
2020-12-01 00:52:03 +00:00
|
|
|
(char *)bug + bug->file_disp, bug->line);
|
2007-03-04 06:05:34 +00:00
|
|
|
#else
|
2020-12-01 00:52:03 +00:00
|
|
|
printf("kernel BUG at %px!\n", (void *)bug + bug->bug_addr_disp);
|
2007-03-04 06:05:34 +00:00
|
|
|
#endif
|
2008-10-31 10:34:09 +00:00
|
|
|
#endif /* CONFIG_BUG */
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void excprint(struct pt_regs *fp)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
unsigned long trap;
|
|
|
|
|
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
printf("cpu 0x%x: ", smp_processor_id());
|
|
|
|
#endif /* CONFIG_SMP */
|
|
|
|
|
|
|
|
trap = TRAP(fp);
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("Vector: %lx %s at [%px]\n", fp->trap, getvecname(trap), fp);
|
2005-04-16 22:20:36 +00:00
|
|
|
printf(" pc: ");
|
|
|
|
xmon_print_symbol(fp->nip, ": ", "\n");
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf(" lr: ");
|
2005-04-16 22:20:36 +00:00
|
|
|
xmon_print_symbol(fp->link, ": ", "\n");
|
|
|
|
|
|
|
|
printf(" sp: %lx\n", fp->gpr[1]);
|
|
|
|
printf(" msr: %lx\n", fp->msr);
|
|
|
|
|
2021-04-14 11:00:33 +00:00
|
|
|
if (trap == INTERRUPT_DATA_STORAGE ||
|
|
|
|
trap == INTERRUPT_DATA_SEGMENT ||
|
|
|
|
trap == INTERRUPT_ALIGNMENT ||
|
|
|
|
trap == INTERRUPT_MACHINE_CHECK) {
|
2005-04-16 22:20:36 +00:00
|
|
|
printf(" dar: %lx\n", fp->dar);
|
2021-04-14 11:00:33 +00:00
|
|
|
if (trap != INTERRUPT_DATA_SEGMENT)
|
2005-04-16 22:20:36 +00:00
|
|
|
printf(" dsisr: %lx\n", fp->dsisr);
|
|
|
|
}
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf(" current = 0x%px\n", current);
|
2005-10-28 12:53:37 +00:00
|
|
|
#ifdef CONFIG_PPC64
|
2018-05-10 01:04:24 +00:00
|
|
|
printf(" paca = 0x%px\t irqmask: 0x%02x\t irq_happened: 0x%02x\n",
|
2017-12-20 03:55:50 +00:00
|
|
|
local_paca, local_paca->irq_soft_mask, local_paca->irq_happened);
|
2005-10-28 12:53:37 +00:00
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
if (current) {
|
2018-03-25 09:06:47 +00:00
|
|
|
printf(" pid = %d, comm = %s\n",
|
2005-04-16 22:20:36 +00:00
|
|
|
current->pid, current->comm);
|
|
|
|
}
|
|
|
|
|
2021-04-14 11:00:33 +00:00
|
|
|
if (trap == INTERRUPT_PROGRAM)
|
2005-04-16 22:20:36 +00:00
|
|
|
print_bug_trap(fp);
|
2015-11-25 02:46:25 +00:00
|
|
|
|
|
|
|
printf(linux_banner);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void prregs(struct pt_regs *fp)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2005-10-28 12:53:37 +00:00
|
|
|
int n, trap;
|
2005-04-16 22:20:36 +00:00
|
|
|
unsigned long base;
|
|
|
|
struct pt_regs regs;
|
|
|
|
|
|
|
|
if (scanhex(&base)) {
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
regs = *(struct pt_regs *)base;
|
|
|
|
sync();
|
|
|
|
__delay(200);
|
|
|
|
} else {
|
|
|
|
catch_memory_errors = 0;
|
2005-10-28 12:53:37 +00:00
|
|
|
printf("*** Error reading registers from "REG"\n",
|
2005-04-16 22:20:36 +00:00
|
|
|
base);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
fp = ®s;
|
|
|
|
}
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
#ifdef CONFIG_PPC64
|
2021-03-16 10:42:04 +00:00
|
|
|
#define R_PER_LINE 2
|
2005-10-28 12:53:37 +00:00
|
|
|
#else
|
2021-03-16 10:42:04 +00:00
|
|
|
#define R_PER_LINE 4
|
|
|
|
#endif
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
for (n = 0; n < 32; ++n) {
|
2021-03-16 10:42:04 +00:00
|
|
|
printf("R%.2d = "REG"%s", n, fp->gpr[n],
|
|
|
|
(n % R_PER_LINE) == R_PER_LINE - 1 ? "\n" : " ");
|
2005-10-28 12:53:37 +00:00
|
|
|
}
|
2021-03-16 10:42:04 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("pc = ");
|
|
|
|
xmon_print_symbol(fp->nip, " ", "\n");
|
2020-05-07 12:13:31 +00:00
|
|
|
if (!trap_is_syscall(fp) && cpu_has_feature(CPU_FTR_CFAR)) {
|
2011-05-01 19:48:20 +00:00
|
|
|
printf("cfar= ");
|
|
|
|
xmon_print_symbol(fp->orig_gpr3, " ", "\n");
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("lr = ");
|
|
|
|
xmon_print_symbol(fp->link, " ", "\n");
|
2005-10-28 12:53:37 +00:00
|
|
|
printf("msr = "REG" cr = %.8lx\n", fp->msr, fp->ccr);
|
|
|
|
printf("ctr = "REG" xer = "REG" trap = %4lx\n",
|
2005-04-16 22:20:36 +00:00
|
|
|
fp->ctr, fp->xer, fp->trap);
|
2005-10-28 12:53:37 +00:00
|
|
|
trap = TRAP(fp);
|
2021-04-14 11:00:33 +00:00
|
|
|
if (trap == INTERRUPT_DATA_STORAGE ||
|
|
|
|
trap == INTERRUPT_DATA_SEGMENT ||
|
|
|
|
trap == INTERRUPT_ALIGNMENT)
|
2005-10-28 12:53:37 +00:00
|
|
|
printf("dar = "REG" dsisr = %.8lx\n", fp->dar, fp->dsisr);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void cacheflush(void)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
int cmd;
|
|
|
|
unsigned long nflush;
|
|
|
|
|
|
|
|
cmd = inchar();
|
|
|
|
if (cmd != 'i')
|
|
|
|
termch = cmd;
|
|
|
|
scanhex((void *)&adrs);
|
|
|
|
if (termch != '\n')
|
|
|
|
termch = 0;
|
|
|
|
nflush = 1;
|
|
|
|
scanhex(&nflush);
|
|
|
|
nflush = (nflush + L1_CACHE_BYTES - 1) / L1_CACHE_BYTES;
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
2020-03-30 07:59:54 +00:00
|
|
|
if (cmd != 'i' || IS_ENABLED(CONFIG_PPC_BOOK3S_64)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
for (; nflush > 0; --nflush, adrs += L1_CACHE_BYTES)
|
|
|
|
cflush((void *) adrs);
|
|
|
|
} else {
|
|
|
|
for (; nflush > 0; --nflush, adrs += L1_CACHE_BYTES)
|
|
|
|
cinval((void *) adrs);
|
|
|
|
}
|
|
|
|
sync();
|
|
|
|
/* wait a little while to see if we get a machine check */
|
|
|
|
__delay(200);
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
extern unsigned long xmon_mfspr(int spr, unsigned long default_value);
|
|
|
|
extern void xmon_mtspr(int spr, unsigned long value);
|
|
|
|
|
|
|
|
static int
|
|
|
|
read_spr(int n, unsigned long *vp)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
unsigned long ret = -1UL;
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
int ok = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
catch_spr_faults = 1;
|
2005-04-16 22:20:36 +00:00
|
|
|
sync();
|
|
|
|
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
ret = xmon_mfspr(n, *vp);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
sync();
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
*vp = ret;
|
|
|
|
ok = 1;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
catch_spr_faults = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
return ok;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
write_spr(int n, unsigned long val)
|
|
|
|
{
|
2019-04-16 03:26:38 +00:00
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
catch_spr_faults = 1;
|
2005-04-16 22:20:36 +00:00
|
|
|
sync();
|
|
|
|
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
xmon_mtspr(n, val);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
sync();
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
} else {
|
|
|
|
printf("SPR 0x%03x (%4d) Faulted during write\n", n, n);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
catch_spr_faults = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2016-07-07 12:54:29 +00:00
|
|
|
static void dump_206_sprs(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
if (!cpu_has_feature(CPU_FTR_ARCH_206))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Actually some of these pre-date 2.06, but whatevs */
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("srr0 = %.16lx srr1 = %.16lx dsisr = %.8lx\n",
|
2016-07-07 12:54:29 +00:00
|
|
|
mfspr(SPRN_SRR0), mfspr(SPRN_SRR1), mfspr(SPRN_DSISR));
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("dscr = %.16lx ppr = %.16lx pir = %.8lx\n",
|
2016-07-07 12:54:29 +00:00
|
|
|
mfspr(SPRN_DSCR), mfspr(SPRN_PPR), mfspr(SPRN_PIR));
|
2017-08-30 11:43:34 +00:00
|
|
|
printf("amr = %.16lx uamor = %.16lx\n",
|
|
|
|
mfspr(SPRN_AMR), mfspr(SPRN_UAMOR));
|
2016-07-07 12:54:29 +00:00
|
|
|
|
|
|
|
if (!(mfmsr() & MSR_HV))
|
|
|
|
return;
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("sdr1 = %.16lx hdar = %.16lx hdsisr = %.8lx\n",
|
2016-07-07 12:54:29 +00:00
|
|
|
mfspr(SPRN_SDR1), mfspr(SPRN_HDAR), mfspr(SPRN_HDSISR));
|
2017-08-30 11:43:34 +00:00
|
|
|
printf("hsrr0 = %.16lx hsrr1 = %.16lx hdec = %.16lx\n",
|
2016-07-07 12:54:29 +00:00
|
|
|
mfspr(SPRN_HSRR0), mfspr(SPRN_HSRR1), mfspr(SPRN_HDEC));
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("lpcr = %.16lx pcr = %.16lx lpidr = %.8lx\n",
|
2016-07-07 12:54:29 +00:00
|
|
|
mfspr(SPRN_LPCR), mfspr(SPRN_PCR), mfspr(SPRN_LPID));
|
2017-08-30 11:43:34 +00:00
|
|
|
printf("hsprg0 = %.16lx hsprg1 = %.16lx amor = %.16lx\n",
|
|
|
|
mfspr(SPRN_HSPRG0), mfspr(SPRN_HSPRG1), mfspr(SPRN_AMOR));
|
2017-08-29 07:22:36 +00:00
|
|
|
printf("dabr = %.16lx dabrx = %.16lx\n",
|
2016-07-07 12:54:29 +00:00
|
|
|
mfspr(SPRN_DABR), mfspr(SPRN_DABRX));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2016-07-07 12:54:30 +00:00
|
|
|
static void dump_207_sprs(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
unsigned long msr;
|
|
|
|
|
|
|
|
if (!cpu_has_feature(CPU_FTR_ARCH_207S))
|
|
|
|
return;
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("dpdes = %.16lx tir = %.16lx cir = %.8lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_DPDES), mfspr(SPRN_TIR), mfspr(SPRN_CIR));
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("fscr = %.16lx tar = %.16lx pspb = %.8lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_FSCR), mfspr(SPRN_TAR), mfspr(SPRN_PSPB));
|
|
|
|
|
|
|
|
msr = mfmsr();
|
|
|
|
if (msr & MSR_TM) {
|
|
|
|
/* Only if TM has been enabled in the kernel */
|
2017-08-29 07:22:36 +00:00
|
|
|
printf("tfhar = %.16lx tfiar = %.16lx texasr = %.16lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_TFHAR), mfspr(SPRN_TFIAR),
|
|
|
|
mfspr(SPRN_TEXASR));
|
|
|
|
}
|
|
|
|
|
2017-08-29 07:22:36 +00:00
|
|
|
printf("mmcr0 = %.16lx mmcr1 = %.16lx mmcr2 = %.16lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_MMCR0), mfspr(SPRN_MMCR1), mfspr(SPRN_MMCR2));
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("pmc1 = %.8lx pmc2 = %.8lx pmc3 = %.8lx pmc4 = %.8lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_PMC1), mfspr(SPRN_PMC2),
|
|
|
|
mfspr(SPRN_PMC3), mfspr(SPRN_PMC4));
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("mmcra = %.16lx siar = %.16lx pmc5 = %.8lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_MMCRA), mfspr(SPRN_SIAR), mfspr(SPRN_PMC5));
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("sdar = %.16lx sier = %.16lx pmc6 = %.8lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_SDAR), mfspr(SPRN_SIER), mfspr(SPRN_PMC6));
|
2017-08-29 07:22:36 +00:00
|
|
|
printf("ebbhr = %.16lx ebbrr = %.16lx bescr = %.16lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_EBBHR), mfspr(SPRN_EBBRR), mfspr(SPRN_BESCR));
|
2017-08-30 11:43:34 +00:00
|
|
|
printf("iamr = %.16lx\n", mfspr(SPRN_IAMR));
|
2016-07-07 12:54:30 +00:00
|
|
|
|
|
|
|
if (!(msr & MSR_HV))
|
|
|
|
return;
|
|
|
|
|
2017-08-29 07:22:36 +00:00
|
|
|
printf("hfscr = %.16lx dhdes = %.16lx rpr = %.16lx\n",
|
2016-07-07 12:54:30 +00:00
|
|
|
mfspr(SPRN_HFSCR), mfspr(SPRN_DHDES), mfspr(SPRN_RPR));
|
2020-05-14 11:17:41 +00:00
|
|
|
printf("dawr0 = %.16lx dawrx0 = %.16lx\n",
|
|
|
|
mfspr(SPRN_DAWR0), mfspr(SPRN_DAWRX0));
|
|
|
|
if (nr_wp_slots() > 1) {
|
|
|
|
printf("dawr1 = %.16lx dawrx1 = %.16lx\n",
|
|
|
|
mfspr(SPRN_DAWR1), mfspr(SPRN_DAWRX1));
|
|
|
|
}
|
|
|
|
printf("ciabr = %.16lx\n", mfspr(SPRN_CIABR));
|
2016-07-07 12:54:30 +00:00
|
|
|
#endif
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2017-08-30 11:45:09 +00:00
|
|
|
static void dump_300_sprs(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
bool hv = mfmsr() & MSR_HV;
|
|
|
|
|
|
|
|
if (!cpu_has_feature(CPU_FTR_ARCH_300))
|
|
|
|
return;
|
|
|
|
|
|
|
|
printf("pidr = %.16lx tidr = %.16lx\n",
|
|
|
|
mfspr(SPRN_PID), mfspr(SPRN_TIDR));
|
2020-01-06 19:50:02 +00:00
|
|
|
printf("psscr = %.16lx\n",
|
|
|
|
hv ? mfspr(SPRN_PSSCR) : mfspr(SPRN_PSSCR_PR));
|
2017-08-30 11:45:09 +00:00
|
|
|
|
|
|
|
if (!hv)
|
|
|
|
return;
|
|
|
|
|
2020-01-06 19:50:02 +00:00
|
|
|
printf("ptcr = %.16lx asdr = %.16lx\n",
|
|
|
|
mfspr(SPRN_PTCR), mfspr(SPRN_ASDR));
|
2017-08-30 11:45:09 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2020-07-17 14:38:18 +00:00
|
|
|
static void dump_310_sprs(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
if (!cpu_has_feature(CPU_FTR_ARCH_31))
|
|
|
|
return;
|
|
|
|
|
|
|
|
printf("mmcr3 = %.16lx, sier2 = %.16lx, sier3 = %.16lx\n",
|
|
|
|
mfspr(SPRN_MMCR3), mfspr(SPRN_SIER2), mfspr(SPRN_SIER3));
|
|
|
|
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
static void dump_one_spr(int spr, bool show_unimplemented)
|
|
|
|
{
|
|
|
|
unsigned long val;
|
|
|
|
|
|
|
|
val = 0xdeadbeef;
|
|
|
|
if (!read_spr(spr, &val)) {
|
|
|
|
printf("SPR 0x%03x (%4d) Faulted during read\n", spr, spr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (val == 0xdeadbeef) {
|
|
|
|
/* Looks like read was a nop, confirm */
|
|
|
|
val = 0x0badcafe;
|
|
|
|
if (!read_spr(spr, &val)) {
|
|
|
|
printf("SPR 0x%03x (%4d) Faulted during read\n", spr, spr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (val == 0x0badcafe) {
|
|
|
|
if (show_unimplemented)
|
|
|
|
printf("SPR 0x%03x (%4d) Unimplemented\n", spr, spr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("SPR 0x%03x (%4d) = 0x%lx\n", spr, spr, val);
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void super_regs(void)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2016-07-07 12:54:27 +00:00
|
|
|
static unsigned long regno;
|
2005-04-16 22:20:36 +00:00
|
|
|
int cmd;
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
int spr;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
cmd = skipbl();
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case '\n': {
|
2012-08-23 22:09:13 +00:00
|
|
|
unsigned long sp, toc;
|
2005-04-16 22:20:36 +00:00
|
|
|
asm("mr %0,1" : "=r" (sp) :);
|
|
|
|
asm("mr %0,2" : "=r" (toc) :);
|
|
|
|
|
2016-07-07 12:54:28 +00:00
|
|
|
printf("msr = "REG" sprg0 = "REG"\n",
|
2005-10-28 12:53:37 +00:00
|
|
|
mfmsr(), mfspr(SPRN_SPRG0));
|
2016-07-07 12:54:28 +00:00
|
|
|
printf("pvr = "REG" sprg1 = "REG"\n",
|
2012-08-23 22:09:13 +00:00
|
|
|
mfspr(SPRN_PVR), mfspr(SPRN_SPRG1));
|
2016-07-07 12:54:28 +00:00
|
|
|
printf("dec = "REG" sprg2 = "REG"\n",
|
2005-10-28 12:53:37 +00:00
|
|
|
mfspr(SPRN_DEC), mfspr(SPRN_SPRG2));
|
2016-07-07 12:54:28 +00:00
|
|
|
printf("sp = "REG" sprg3 = "REG"\n", sp, mfspr(SPRN_SPRG3));
|
|
|
|
printf("toc = "REG" dar = "REG"\n", toc, mfspr(SPRN_DAR));
|
|
|
|
|
2016-07-07 12:54:29 +00:00
|
|
|
dump_206_sprs();
|
2016-07-07 12:54:30 +00:00
|
|
|
dump_207_sprs();
|
2017-08-30 11:45:09 +00:00
|
|
|
dump_300_sprs();
|
2020-07-17 14:38:18 +00:00
|
|
|
dump_310_sprs();
|
2016-07-07 12:54:29 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
case 'w': {
|
|
|
|
unsigned long val;
|
|
|
|
scanhex(®no);
|
|
|
|
val = 0;
|
|
|
|
read_spr(regno, &val);
|
2005-04-16 22:20:36 +00:00
|
|
|
scanhex(&val);
|
|
|
|
write_spr(regno, val);
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
dump_one_spr(regno, true);
|
|
|
|
break;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
case 'r':
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
scanhex(®no);
|
|
|
|
dump_one_spr(regno, true);
|
|
|
|
break;
|
|
|
|
case 'a':
|
|
|
|
/* dump ALL SPRs */
|
|
|
|
for (spr = 1; spr < 1024; ++spr)
|
|
|
|
dump_one_spr(spr, false);
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
}
|
powerpc/xmon: Fix SPR read/write commands and add command to dump SPRs
xmon has commands for reading and writing SPRs, but they don't work
currently for several reasons. They attempt to synthesize a small
function containing an mfspr or mtspr instruction and call it. However,
the instructions are on the stack, which is usually not executable.
Also, for 64-bit we set up a procedure descriptor, which is fine for the
big-endian ABIv1, but not correct for ABIv2. Finally, the code uses the
infrastructure for catching memory errors, but that only catches data
storage interrupts and machine check interrupts, but a failed
mfspr/mtspr can generate a program interrupt or a hypervisor emulation
assist interrupt, or be a no-op.
Instead of trying to synthesize a function on the fly, this adds two new
functions, xmon_mfspr() and xmon_mtspr(), which take an SPR number as an
argument and read or write the SPR. Because there is no Power ISA
instruction which takes an SPR number in a register, we have to generate
one of each possible mfspr and mtspr instruction, for all 1024 possible
SPRs. Thus we get just over 8k bytes of code for each of xmon_mfspr()
and xmon_mtspr(). However, this 16kB of code pales in comparison to the
> 130kB of PPC opcode tables used by the xmon disassembler.
To catch interrupts caused by the mfspr/mtspr instructions, we add a new
'catch_spr_faults' flag. If an interrupt occurs while it is set, we come
back into xmon() via program_check_interrupt(), _exception() and die(),
see that catch_spr_faults is set and do a longjmp to bus_error_jmp, back
into read_spr() or write_spr().
This adds a couple of other nice features: first, a "Sa" command that
attempts to read and print out the value of all 1024 SPRs. If any mfspr
instruction acts as a no-op, then the SPR is not implemented and not
printed.
Secondly, the Sr and Sw commands detect when an SPR is not
implemented (i.e. mfspr is a no-op) and print a message to that effect
rather than printing a bogus value.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-04-13 11:31:24 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
scannl();
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Stuff for reading and writing memory safely
|
|
|
|
*/
|
2008-05-08 04:27:16 +00:00
|
|
|
static int
|
2005-04-16 22:20:36 +00:00
|
|
|
mread(unsigned long adrs, void *buf, int size)
|
|
|
|
{
|
|
|
|
volatile int n;
|
|
|
|
char *p, *q;
|
|
|
|
|
|
|
|
n = 0;
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
p = (char *)adrs;
|
|
|
|
q = (char *)buf;
|
|
|
|
switch (size) {
|
|
|
|
case 2:
|
2005-10-28 12:53:37 +00:00
|
|
|
*(u16 *)q = *(u16 *)p;
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
case 4:
|
2005-10-28 12:53:37 +00:00
|
|
|
*(u32 *)q = *(u32 *)p;
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
case 8:
|
2005-10-28 12:53:37 +00:00
|
|
|
*(u64 *)q = *(u64 *)p;
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
for( ; n < size; ++n) {
|
|
|
|
*q++ = *p++;
|
|
|
|
sync();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sync();
|
|
|
|
/* wait a little while to see if we get a machine check */
|
|
|
|
__delay(200);
|
|
|
|
n = size;
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static int
|
2005-04-16 22:20:36 +00:00
|
|
|
mwrite(unsigned long adrs, void *buf, int size)
|
|
|
|
{
|
|
|
|
volatile int n;
|
|
|
|
char *p, *q;
|
|
|
|
|
|
|
|
n = 0;
|
2019-04-16 03:26:38 +00:00
|
|
|
|
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
p = (char *) adrs;
|
|
|
|
q = (char *) buf;
|
|
|
|
switch (size) {
|
|
|
|
case 2:
|
2005-10-28 12:53:37 +00:00
|
|
|
*(u16 *)p = *(u16 *)q;
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
case 4:
|
2005-10-28 12:53:37 +00:00
|
|
|
*(u32 *)p = *(u32 *)q;
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
case 8:
|
2005-10-28 12:53:37 +00:00
|
|
|
*(u64 *)p = *(u64 *)q;
|
2005-04-16 22:20:36 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
for ( ; n < size; ++n) {
|
|
|
|
*p++ = *q++;
|
|
|
|
sync();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sync();
|
|
|
|
/* wait a little while to see if we get a machine check */
|
|
|
|
__delay(200);
|
|
|
|
n = size;
|
|
|
|
} else {
|
2014-05-26 11:02:14 +00:00
|
|
|
printf("*** Error writing address "REG"\n", adrs + n);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2020-05-06 03:40:38 +00:00
|
|
|
static int
|
|
|
|
mread_instr(unsigned long adrs, struct ppc_inst *instr)
|
|
|
|
{
|
|
|
|
volatile int n;
|
|
|
|
|
|
|
|
n = 0;
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
2021-05-20 13:50:45 +00:00
|
|
|
*instr = ppc_inst_read((u32 *)adrs);
|
2020-05-06 03:40:38 +00:00
|
|
|
sync();
|
|
|
|
/* wait a little while to see if we get a machine check */
|
|
|
|
__delay(200);
|
|
|
|
n = ppc_inst_len(*instr);
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static int fault_type;
|
2005-10-28 12:53:37 +00:00
|
|
|
static int fault_except;
|
2005-04-16 22:20:36 +00:00
|
|
|
static char *fault_chars[] = { "--", "**", "##" };
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
static int handle_fault(struct pt_regs *regs)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2005-10-28 12:53:37 +00:00
|
|
|
fault_except = TRAP(regs);
|
2005-04-16 22:20:36 +00:00
|
|
|
switch (TRAP(regs)) {
|
|
|
|
case 0x200:
|
|
|
|
fault_type = 0;
|
|
|
|
break;
|
|
|
|
case 0x300:
|
|
|
|
case 0x380:
|
|
|
|
fault_type = 1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fault_type = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
longjmp(bus_error_jmp, 1);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define SWAP(a, b, t) ((t) = (a), (a) = (b), (b) = (t))
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
byterev(unsigned char *val, int size)
|
|
|
|
{
|
|
|
|
int t;
|
|
|
|
|
|
|
|
switch (size) {
|
|
|
|
case 2:
|
|
|
|
SWAP(val[0], val[1], t);
|
|
|
|
break;
|
|
|
|
case 4:
|
|
|
|
SWAP(val[0], val[3], t);
|
|
|
|
SWAP(val[1], val[2], t);
|
|
|
|
break;
|
|
|
|
case 8: /* is there really any use for this? */
|
|
|
|
SWAP(val[0], val[7], t);
|
|
|
|
SWAP(val[1], val[6], t);
|
|
|
|
SWAP(val[2], val[5], t);
|
|
|
|
SWAP(val[3], val[4], t);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int brev;
|
|
|
|
static int mnoread;
|
|
|
|
|
2012-08-23 22:09:13 +00:00
|
|
|
static char *memex_help_string =
|
2005-04-16 22:20:36 +00:00
|
|
|
"Memory examine command usage:\n"
|
|
|
|
"m [addr] [flags] examine/change memory\n"
|
|
|
|
" addr is optional. will start where left off.\n"
|
|
|
|
" flags may include chars from this set:\n"
|
|
|
|
" b modify by bytes (default)\n"
|
|
|
|
" w modify by words (2 byte)\n"
|
|
|
|
" l modify by longs (4 byte)\n"
|
|
|
|
" d modify by doubleword (8 byte)\n"
|
|
|
|
" r toggle reverse byte order mode\n"
|
|
|
|
" n do not read memory (for i/o spaces)\n"
|
|
|
|
" . ok to read (default)\n"
|
|
|
|
"NOTE: flags are saved as defaults\n"
|
|
|
|
"";
|
|
|
|
|
2012-08-23 22:09:13 +00:00
|
|
|
static char *memex_subcmd_help_string =
|
2005-04-16 22:20:36 +00:00
|
|
|
"Memory examine subcommands:\n"
|
|
|
|
" hexval write this val to current location\n"
|
|
|
|
" 'string' write chars from string to this location\n"
|
|
|
|
" ' increment address\n"
|
|
|
|
" ^ decrement address\n"
|
|
|
|
" / increment addr by 0x10. //=0x100, ///=0x1000, etc\n"
|
|
|
|
" \\ decrement addr by 0x10. \\\\=0x100, \\\\\\=0x1000, etc\n"
|
|
|
|
" ` clear no-read flag\n"
|
|
|
|
" ; stay at this addr\n"
|
|
|
|
" v change to byte mode\n"
|
|
|
|
" w change to word (2 byte) mode\n"
|
|
|
|
" l change to long (4 byte) mode\n"
|
|
|
|
" u change to doubleword (8 byte) mode\n"
|
|
|
|
" m addr change current addr\n"
|
|
|
|
" n toggle no-read flag\n"
|
|
|
|
" r toggle byte reverse flag\n"
|
|
|
|
" < count back up count bytes\n"
|
|
|
|
" > count skip forward count bytes\n"
|
|
|
|
" x exit this mode\n"
|
|
|
|
"";
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
memex(void)
|
|
|
|
{
|
|
|
|
int cmd, inc, i, nslash;
|
|
|
|
unsigned long n;
|
|
|
|
unsigned char val[16];
|
|
|
|
|
|
|
|
scanhex((void *)&adrs);
|
|
|
|
cmd = skipbl();
|
|
|
|
if (cmd == '?') {
|
|
|
|
printf(memex_help_string);
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
termch = cmd;
|
|
|
|
}
|
|
|
|
last_cmd = "m\n";
|
|
|
|
while ((cmd = skipbl()) != '\n') {
|
|
|
|
switch( cmd ){
|
|
|
|
case 'b': size = 1; break;
|
|
|
|
case 'w': size = 2; break;
|
|
|
|
case 'l': size = 4; break;
|
|
|
|
case 'd': size = 8; break;
|
|
|
|
case 'r': brev = !brev; break;
|
|
|
|
case 'n': mnoread = 1; break;
|
|
|
|
case '.': mnoread = 0; break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if( size <= 0 )
|
|
|
|
size = 1;
|
|
|
|
else if( size > 8 )
|
|
|
|
size = 8;
|
|
|
|
for(;;){
|
|
|
|
if (!mnoread)
|
|
|
|
n = mread(adrs, val, size);
|
2005-11-10 03:30:20 +00:00
|
|
|
printf(REG"%c", adrs, brev? 'r': ' ');
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!mnoread) {
|
|
|
|
if (brev)
|
|
|
|
byterev(val, size);
|
|
|
|
putchar(' ');
|
|
|
|
for (i = 0; i < n; ++i)
|
|
|
|
printf("%.2x", val[i]);
|
|
|
|
for (; i < size; ++i)
|
|
|
|
printf("%s", fault_chars[fault_type]);
|
|
|
|
}
|
|
|
|
putchar(' ');
|
|
|
|
inc = size;
|
|
|
|
nslash = 0;
|
|
|
|
for(;;){
|
|
|
|
if( scanhex(&n) ){
|
|
|
|
for (i = 0; i < size; ++i)
|
|
|
|
val[i] = n >> (i * 8);
|
|
|
|
if (!brev)
|
|
|
|
byterev(val, size);
|
|
|
|
mwrite(adrs, val, size);
|
|
|
|
inc = size;
|
|
|
|
}
|
|
|
|
cmd = skipbl();
|
|
|
|
if (cmd == '\n')
|
|
|
|
break;
|
|
|
|
inc = 0;
|
|
|
|
switch (cmd) {
|
|
|
|
case '\'':
|
|
|
|
for(;;){
|
|
|
|
n = inchar();
|
|
|
|
if( n == '\\' )
|
|
|
|
n = bsesc();
|
|
|
|
else if( n == '\'' )
|
|
|
|
break;
|
|
|
|
for (i = 0; i < size; ++i)
|
|
|
|
val[i] = n >> (i * 8);
|
|
|
|
if (!brev)
|
|
|
|
byterev(val, size);
|
|
|
|
mwrite(adrs, val, size);
|
|
|
|
adrs += size;
|
|
|
|
}
|
|
|
|
adrs -= size;
|
|
|
|
inc = size;
|
|
|
|
break;
|
|
|
|
case ',':
|
|
|
|
adrs += size;
|
|
|
|
break;
|
|
|
|
case '.':
|
|
|
|
mnoread = 0;
|
|
|
|
break;
|
|
|
|
case ';':
|
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
case EOF:
|
|
|
|
scannl();
|
|
|
|
return;
|
|
|
|
case 'b':
|
|
|
|
case 'v':
|
|
|
|
size = 1;
|
|
|
|
break;
|
|
|
|
case 'w':
|
|
|
|
size = 2;
|
|
|
|
break;
|
|
|
|
case 'l':
|
|
|
|
size = 4;
|
|
|
|
break;
|
|
|
|
case 'u':
|
|
|
|
size = 8;
|
|
|
|
break;
|
|
|
|
case '^':
|
|
|
|
adrs -= size;
|
|
|
|
break;
|
|
|
|
case '/':
|
|
|
|
if (nslash > 0)
|
|
|
|
adrs -= 1 << nslash;
|
|
|
|
else
|
|
|
|
nslash = 0;
|
|
|
|
nslash += 4;
|
|
|
|
adrs += 1 << nslash;
|
|
|
|
break;
|
|
|
|
case '\\':
|
|
|
|
if (nslash < 0)
|
|
|
|
adrs += 1 << -nslash;
|
|
|
|
else
|
|
|
|
nslash = 0;
|
|
|
|
nslash -= 4;
|
|
|
|
adrs -= 1 << -nslash;
|
|
|
|
break;
|
|
|
|
case 'm':
|
|
|
|
scanhex((void *)&adrs);
|
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
mnoread = 1;
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
brev = !brev;
|
|
|
|
break;
|
|
|
|
case '<':
|
|
|
|
n = size;
|
|
|
|
scanhex(&n);
|
|
|
|
adrs -= n;
|
|
|
|
break;
|
|
|
|
case '>':
|
|
|
|
n = size;
|
|
|
|
scanhex(&n);
|
|
|
|
adrs += n;
|
|
|
|
break;
|
|
|
|
case '?':
|
|
|
|
printf(memex_subcmd_help_string);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
adrs += inc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static int
|
2005-04-16 22:20:36 +00:00
|
|
|
bsesc(void)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
c = inchar();
|
|
|
|
switch( c ){
|
|
|
|
case 'n': c = '\n'; break;
|
|
|
|
case 'r': c = '\r'; break;
|
|
|
|
case 'b': c = '\b'; break;
|
|
|
|
case 't': c = '\t'; break;
|
|
|
|
}
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
2006-03-08 19:40:28 +00:00
|
|
|
static void xmon_rawdump (unsigned long adrs, long ndump)
|
|
|
|
{
|
|
|
|
long n, m, r, nr;
|
|
|
|
unsigned char temp[16];
|
|
|
|
|
|
|
|
for (n = ndump; n > 0;) {
|
|
|
|
r = n < 16? n: 16;
|
|
|
|
nr = mread(adrs, temp, r);
|
|
|
|
adrs += nr;
|
|
|
|
for (m = 0; m < r; ++m) {
|
|
|
|
if (m < nr)
|
|
|
|
printf("%.2x", temp[m]);
|
|
|
|
else
|
|
|
|
printf("%s", fault_chars[fault_type]);
|
|
|
|
}
|
|
|
|
n -= r;
|
|
|
|
if (nr < r)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
|
2017-08-02 20:14:05 +00:00
|
|
|
static void dump_tracing(void)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
c = inchar();
|
|
|
|
if (c == 'c')
|
|
|
|
ftrace_dump(DUMP_ORIG);
|
|
|
|
else
|
|
|
|
ftrace_dump(DUMP_ALL);
|
|
|
|
}
|
|
|
|
|
2012-09-13 23:01:31 +00:00
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
static void dump_one_paca(int cpu)
|
|
|
|
{
|
|
|
|
struct paca_struct *p;
|
2017-10-19 04:08:43 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S_64
|
2015-10-14 05:58:36 +00:00
|
|
|
int i = 0;
|
|
|
|
#endif
|
2012-09-13 23:01:31 +00:00
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) != 0) {
|
|
|
|
printf("*** Error dumping paca for cpu 0x%x!\n", cpu);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
2018-02-13 15:08:12 +00:00
|
|
|
p = paca_ptrs[cpu];
|
2012-09-13 23:01:31 +00:00
|
|
|
|
2017-12-06 12:23:28 +00:00
|
|
|
printf("paca for cpu 0x%x @ %px:\n", cpu, p);
|
2012-09-13 23:01:31 +00:00
|
|
|
|
2018-05-21 11:28:34 +00:00
|
|
|
printf(" %-*s = %s\n", 25, "possible", cpu_possible(cpu) ? "yes" : "no");
|
|
|
|
printf(" %-*s = %s\n", 25, "present", cpu_present(cpu) ? "yes" : "no");
|
|
|
|
printf(" %-*s = %s\n", 25, "online", cpu_online(cpu) ? "yes" : "no");
|
2012-09-13 23:01:31 +00:00
|
|
|
|
2018-05-21 11:06:19 +00:00
|
|
|
#define DUMP(paca, name, format) \
|
2018-05-21 11:28:34 +00:00
|
|
|
printf(" %-*s = "format"\t(0x%lx)\n", 25, #name, 18, paca->name, \
|
2012-09-13 23:01:31 +00:00
|
|
|
offsetof(struct paca_struct, name));
|
|
|
|
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, lock_token, "%#-*x");
|
|
|
|
DUMP(p, paca_index, "%#-*x");
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, kernel_toc, "%#-*llx");
|
|
|
|
DUMP(p, kernelbase, "%#-*llx");
|
|
|
|
DUMP(p, kernel_msr, "%#-*llx");
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, emergency_sp, "%-*px");
|
2013-10-30 14:34:00 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S_64
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, nmi_emergency_sp, "%-*px");
|
|
|
|
DUMP(p, mc_emergency_sp, "%-*px");
|
|
|
|
DUMP(p, in_nmi, "%#-*x");
|
|
|
|
DUMP(p, in_mce, "%#-*x");
|
|
|
|
DUMP(p, hmi_event_available, "%#-*x");
|
2013-10-30 14:34:00 +00:00
|
|
|
#endif
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, data_offset, "%#-*llx");
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, hw_cpu_id, "%#-*x");
|
|
|
|
DUMP(p, cpu_start, "%#-*x");
|
|
|
|
DUMP(p, kexec_state, "%#-*x");
|
2017-10-19 04:08:43 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S_64
|
2018-09-14 15:30:54 +00:00
|
|
|
if (!early_radix_enabled()) {
|
|
|
|
for (i = 0; i < SLB_NUM_BOLTED; i++) {
|
|
|
|
u64 esid, vsid;
|
2015-10-14 05:58:36 +00:00
|
|
|
|
2018-09-14 15:30:54 +00:00
|
|
|
if (!p->slb_shadow_ptr)
|
|
|
|
continue;
|
2015-10-14 05:58:36 +00:00
|
|
|
|
2018-09-14 15:30:54 +00:00
|
|
|
esid = be64_to_cpu(p->slb_shadow_ptr->save_area[i].esid);
|
|
|
|
vsid = be64_to_cpu(p->slb_shadow_ptr->save_area[i].vsid);
|
2015-10-14 05:58:36 +00:00
|
|
|
|
2018-09-14 15:30:54 +00:00
|
|
|
if (esid || vsid) {
|
|
|
|
printf(" %-*s[%d] = 0x%016llx 0x%016llx\n",
|
|
|
|
22, "slb_shadow", i, esid, vsid);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
DUMP(p, vmalloc_sllp, "%#-*x");
|
2018-09-14 15:30:53 +00:00
|
|
|
DUMP(p, stab_rr, "%#-*x");
|
|
|
|
DUMP(p, slb_used_bitmap, "%#-*x");
|
|
|
|
DUMP(p, slb_kern_bitmap, "%#-*x");
|
2018-09-14 15:30:54 +00:00
|
|
|
|
|
|
|
if (!early_cpu_has_feature(CPU_FTR_ARCH_300)) {
|
|
|
|
DUMP(p, slb_cache_ptr, "%#-*x");
|
|
|
|
for (i = 0; i < SLB_CACHE_ENTRIES; i++)
|
|
|
|
printf(" %-*s[%d] = 0x%016x\n",
|
|
|
|
22, "slb_cache", i, p->slb_cache[i]);
|
2015-10-14 05:58:36 +00:00
|
|
|
}
|
2018-09-14 15:30:50 +00:00
|
|
|
}
|
2018-01-10 12:49:12 +00:00
|
|
|
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, rfi_flush_fallback_area, "%-*px");
|
2015-10-14 05:58:36 +00:00
|
|
|
#endif
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, dscr_default, "%#-*llx");
|
2015-10-14 05:58:36 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3E
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, pgd, "%-*px");
|
|
|
|
DUMP(p, kernel_pgd, "%-*px");
|
|
|
|
DUMP(p, tcd_ptr, "%-*px");
|
|
|
|
DUMP(p, mc_kstack, "%-*px");
|
|
|
|
DUMP(p, crit_kstack, "%-*px");
|
|
|
|
DUMP(p, dbg_kstack, "%-*px");
|
2015-10-14 05:58:36 +00:00
|
|
|
#endif
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, __current, "%-*px");
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, kstack, "%#-*llx");
|
2018-05-21 11:28:34 +00:00
|
|
|
printf(" %-*s = 0x%016llx\n", 25, "kstack_base", p->kstack & ~(THREAD_SIZE - 1));
|
2018-10-12 02:58:52 +00:00
|
|
|
#ifdef CONFIG_STACKPROTECTOR
|
|
|
|
DUMP(p, canary, "%#-*lx");
|
|
|
|
#endif
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, saved_r1, "%#-*llx");
|
powerpc/64s/exception: remove bad stack branch
The bad stack test in interrupt handlers has a few problems. For
performance it is taken in the common case, which is a fetch bubble
and a waste of i-cache.
For code development and maintainence, it requires yet another stack
frame setup routine, and that constrains all exception handlers to
follow the same register save pattern which inhibits future
optimisation.
Remove the test/branch and replace it with a trap. Teach the program
check handler to use the emergency stack for this case.
This does not result in quite so nice a message, however the SRR0 and
SRR1 of the crashed interrupt can be seen in r11 and r12, as is the
original r1 (adjusted by INT_FRAME_SIZE). These are the most important
parts to debugging the issue.
The original r9-12 and cr0 is lost, which is the main downside.
kernel BUG at linux/arch/powerpc/kernel/exceptions-64s.S:847!
Oops: Exception in kernel mode, sig: 5 [#1]
BE SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in:
CPU: 0 PID: 1 Comm: swapper/0 Not tainted
NIP: c000000000009108 LR: c000000000cadbcc CTR: c0000000000090f0
REGS: c0000000fffcbd70 TRAP: 0700 Not tainted
MSR: 9000000000021032 <SF,HV,ME,IR,DR,RI> CR: 28222448 XER: 20040000
CFAR: c000000000009100 IRQMASK: 0
GPR00: 000000000000003d fffffffffffffd00 c0000000018cfb00 c0000000f02b3166
GPR04: fffffffffffffffd 0000000000000007 fffffffffffffffb 0000000000000030
GPR08: 0000000000000037 0000000028222448 0000000000000000 c000000000ca8de0
GPR12: 9000000002009032 c000000001ae0000 c000000000010a00 0000000000000000
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR20: c0000000f00322c0 c000000000f85200 0000000000000004 ffffffffffffffff
GPR24: fffffffffffffffe 0000000000000000 0000000000000000 000000000000000a
GPR28: 0000000000000000 0000000000000000 c0000000f02b391c c0000000f02b3167
NIP [c000000000009108] decrementer_common+0x18/0x160
LR [c000000000cadbcc] .vsnprintf+0x3ec/0x4f0
Call Trace:
Instruction dump:
996d098a 994d098b 38610070 480246ed 48005518 60000000 38200000 718a4000
7c2a0b78 3821fd00 41c20008 e82d0970 <0981fd00> f92101a0 f9610170 f9810178
Signed-off-by: Nicholas Piggin <npiggin@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2019-06-28 06:33:18 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3E
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, trap_save, "%#-*x");
|
powerpc/64s/exception: remove bad stack branch
The bad stack test in interrupt handlers has a few problems. For
performance it is taken in the common case, which is a fetch bubble
and a waste of i-cache.
For code development and maintainence, it requires yet another stack
frame setup routine, and that constrains all exception handlers to
follow the same register save pattern which inhibits future
optimisation.
Remove the test/branch and replace it with a trap. Teach the program
check handler to use the emergency stack for this case.
This does not result in quite so nice a message, however the SRR0 and
SRR1 of the crashed interrupt can be seen in r11 and r12, as is the
original r1 (adjusted by INT_FRAME_SIZE). These are the most important
parts to debugging the issue.
The original r9-12 and cr0 is lost, which is the main downside.
kernel BUG at linux/arch/powerpc/kernel/exceptions-64s.S:847!
Oops: Exception in kernel mode, sig: 5 [#1]
BE SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in:
CPU: 0 PID: 1 Comm: swapper/0 Not tainted
NIP: c000000000009108 LR: c000000000cadbcc CTR: c0000000000090f0
REGS: c0000000fffcbd70 TRAP: 0700 Not tainted
MSR: 9000000000021032 <SF,HV,ME,IR,DR,RI> CR: 28222448 XER: 20040000
CFAR: c000000000009100 IRQMASK: 0
GPR00: 000000000000003d fffffffffffffd00 c0000000018cfb00 c0000000f02b3166
GPR04: fffffffffffffffd 0000000000000007 fffffffffffffffb 0000000000000030
GPR08: 0000000000000037 0000000028222448 0000000000000000 c000000000ca8de0
GPR12: 9000000002009032 c000000001ae0000 c000000000010a00 0000000000000000
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR20: c0000000f00322c0 c000000000f85200 0000000000000004 ffffffffffffffff
GPR24: fffffffffffffffe 0000000000000000 0000000000000000 000000000000000a
GPR28: 0000000000000000 0000000000000000 c0000000f02b391c c0000000f02b3167
NIP [c000000000009108] decrementer_common+0x18/0x160
LR [c000000000cadbcc] .vsnprintf+0x3ec/0x4f0
Call Trace:
Instruction dump:
996d098a 994d098b 38610070 480246ed 48005518 60000000 38200000 718a4000
7c2a0b78 3821fd00 41c20008 e82d0970 <0981fd00> f92101a0 f9610170 f9810178
Signed-off-by: Nicholas Piggin <npiggin@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2019-06-28 06:33:18 +00:00
|
|
|
#endif
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, irq_soft_mask, "%#-*x");
|
|
|
|
DUMP(p, irq_happened, "%#-*x");
|
2019-02-22 14:45:42 +00:00
|
|
|
#ifdef CONFIG_MMIOWB
|
|
|
|
DUMP(p, mmiowb_state.nesting_count, "%#-*x");
|
|
|
|
DUMP(p, mmiowb_state.mmiowb_pending, "%#-*x");
|
|
|
|
#endif
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, irq_work_pending, "%#-*x");
|
|
|
|
DUMP(p, sprg_vdso, "%#-*llx");
|
2015-10-14 05:58:36 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
|
2018-05-21 11:06:19 +00:00
|
|
|
DUMP(p, tm_scratch, "%#-*llx");
|
2015-10-14 05:58:36 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_PPC_POWERNV
|
powerpc/64s: Reimplement book3s idle code in C
Reimplement Book3S idle code in C, moving POWER7/8/9 implementation
speific HV idle code to the powernv platform code.
Book3S assembly stubs are kept in common code and used only to save
the stack frame and non-volatile GPRs before executing architected
idle instructions, and restoring the stack and reloading GPRs then
returning to C after waking from idle.
The complex logic dealing with threads and subcores, locking, SPRs,
HMIs, timebase resync, etc., is all done in C which makes it more
maintainable.
This is not a strict translation to C code, there are some
significant differences:
- Idle wakeup no longer uses the ->cpu_restore call to reinit SPRs,
but saves and restores them itself.
- The optimisation where EC=ESL=0 idle modes did not have to save GPRs
or change MSR is restored, because it's now simple to do. ESL=1
sleeps that do not lose GPRs can use this optimization too.
- KVM secondary entry and cede is now more of a call/return style
rather than branchy. nap_state_lost is not required because KVM
always returns via NVGPR restoring path.
- KVM secondary wakeup from offline sequence is moved entirely into
the offline wakeup, which avoids a hwsync in the normal idle wakeup
path.
Performance measured with context switch ping-pong on different
threads or cores, is possibly improved a small amount, 1-3% depending
on stop state and core vs thread test for shallow states. Deep states
it's in the noise compared with other latencies.
KVM improvements:
- Idle sleepers now always return to caller rather than branch out
to KVM first.
- This allows optimisations like very fast return to caller when no
state has been lost.
- KVM no longer requires nap_state_lost because it controls NVGPR
save/restore itself on the way in and out.
- The heavy idle wakeup KVM request check can be moved out of the
normal host idle code and into the not-performance-critical offline
code.
- KVM nap code now returns from where it is called, which makes the
flow a bit easier to follow.
Reviewed-by: Gautham R. Shenoy <ego@linux.vnet.ibm.com>
Signed-off-by: Nicholas Piggin <npiggin@gmail.com>
[mpe: Squash the KVM changes in]
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2019-04-12 14:30:52 +00:00
|
|
|
DUMP(p, idle_state, "%#-*lx");
|
|
|
|
if (!early_cpu_has_feature(CPU_FTR_ARCH_300)) {
|
|
|
|
DUMP(p, thread_idle_state, "%#-*x");
|
|
|
|
DUMP(p, subcore_sibling_mask, "%#-*x");
|
|
|
|
} else {
|
|
|
|
#ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
|
|
|
|
DUMP(p, requested_psscr, "%#-*llx");
|
|
|
|
DUMP(p, dont_stop.counter, "%#-*x");
|
|
|
|
#endif
|
|
|
|
}
|
2015-10-14 05:58:36 +00:00
|
|
|
#endif
|
2012-09-13 23:01:31 +00:00
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, accounting.utime, "%#-*lx");
|
|
|
|
DUMP(p, accounting.stime, "%#-*lx");
|
powerpc/time: Only set CONFIG_ARCH_HAS_SCALED_CPUTIME on PPC64
scaled cputime is only meaningfull when the processor has
SPURR and/or PURR, which means only on PPC64.
Removing it on PPC32 significantly reduces the size of
vtime_account_system() and vtime_account_idle() on an 8xx:
Before:
00000000 l F .text 000000a8 vtime_delta
00000280 g F .text 0000010c vtime_account_system
0000038c g F .text 00000048 vtime_account_idle
After:
(vtime_delta gets inlined inside the two functions)
000001d8 g F .text 000000a0 vtime_account_system
00000278 g F .text 00000038 vtime_account_idle
In terms of performance, we also get approximatly 7% improvement on
task switch. The following small benchmark app is run with perf stat:
void *thread(void *arg)
{
int i;
for (i = 0; i < atoi((char*)arg); i++)
pthread_yield();
}
int main(int argc, char **argv)
{
pthread_t th1, th2;
pthread_create(&th1, NULL, thread, argv[1]);
pthread_create(&th2, NULL, thread, argv[1]);
pthread_join(th1, NULL);
pthread_join(th2, NULL);
return 0;
}
Before the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
8228.476465 task-clock (msec) # 0.954 CPUs utilized ( +- 0.23% )
200004 context-switches # 0.024 M/sec ( +- 0.00% )
After the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
7649.070444 task-clock (msec) # 0.955 CPUs utilized ( +- 0.27% )
200004 context-switches # 0.026 M/sec ( +- 0.00% )
Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2018-08-02 07:53:59 +00:00
|
|
|
#ifdef CONFIG_ARCH_HAS_SCALED_CPUTIME
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, accounting.utime_scaled, "%#-*lx");
|
powerpc/time: Only set CONFIG_ARCH_HAS_SCALED_CPUTIME on PPC64
scaled cputime is only meaningfull when the processor has
SPURR and/or PURR, which means only on PPC64.
Removing it on PPC32 significantly reduces the size of
vtime_account_system() and vtime_account_idle() on an 8xx:
Before:
00000000 l F .text 000000a8 vtime_delta
00000280 g F .text 0000010c vtime_account_system
0000038c g F .text 00000048 vtime_account_idle
After:
(vtime_delta gets inlined inside the two functions)
000001d8 g F .text 000000a0 vtime_account_system
00000278 g F .text 00000038 vtime_account_idle
In terms of performance, we also get approximatly 7% improvement on
task switch. The following small benchmark app is run with perf stat:
void *thread(void *arg)
{
int i;
for (i = 0; i < atoi((char*)arg); i++)
pthread_yield();
}
int main(int argc, char **argv)
{
pthread_t th1, th2;
pthread_create(&th1, NULL, thread, argv[1]);
pthread_create(&th2, NULL, thread, argv[1]);
pthread_join(th1, NULL);
pthread_join(th2, NULL);
return 0;
}
Before the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
8228.476465 task-clock (msec) # 0.954 CPUs utilized ( +- 0.23% )
200004 context-switches # 0.024 M/sec ( +- 0.00% )
After the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
7649.070444 task-clock (msec) # 0.955 CPUs utilized ( +- 0.27% )
200004 context-switches # 0.026 M/sec ( +- 0.00% )
Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2018-08-02 07:53:59 +00:00
|
|
|
#endif
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, accounting.starttime, "%#-*lx");
|
|
|
|
DUMP(p, accounting.starttime_user, "%#-*lx");
|
powerpc/time: Only set CONFIG_ARCH_HAS_SCALED_CPUTIME on PPC64
scaled cputime is only meaningfull when the processor has
SPURR and/or PURR, which means only on PPC64.
Removing it on PPC32 significantly reduces the size of
vtime_account_system() and vtime_account_idle() on an 8xx:
Before:
00000000 l F .text 000000a8 vtime_delta
00000280 g F .text 0000010c vtime_account_system
0000038c g F .text 00000048 vtime_account_idle
After:
(vtime_delta gets inlined inside the two functions)
000001d8 g F .text 000000a0 vtime_account_system
00000278 g F .text 00000038 vtime_account_idle
In terms of performance, we also get approximatly 7% improvement on
task switch. The following small benchmark app is run with perf stat:
void *thread(void *arg)
{
int i;
for (i = 0; i < atoi((char*)arg); i++)
pthread_yield();
}
int main(int argc, char **argv)
{
pthread_t th1, th2;
pthread_create(&th1, NULL, thread, argv[1]);
pthread_create(&th2, NULL, thread, argv[1]);
pthread_join(th1, NULL);
pthread_join(th2, NULL);
return 0;
}
Before the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
8228.476465 task-clock (msec) # 0.954 CPUs utilized ( +- 0.23% )
200004 context-switches # 0.024 M/sec ( +- 0.00% )
After the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
7649.070444 task-clock (msec) # 0.955 CPUs utilized ( +- 0.27% )
200004 context-switches # 0.026 M/sec ( +- 0.00% )
Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2018-08-02 07:53:59 +00:00
|
|
|
#ifdef CONFIG_ARCH_HAS_SCALED_CPUTIME
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, accounting.startspurr, "%#-*lx");
|
|
|
|
DUMP(p, accounting.utime_sspurr, "%#-*lx");
|
powerpc/time: Only set CONFIG_ARCH_HAS_SCALED_CPUTIME on PPC64
scaled cputime is only meaningfull when the processor has
SPURR and/or PURR, which means only on PPC64.
Removing it on PPC32 significantly reduces the size of
vtime_account_system() and vtime_account_idle() on an 8xx:
Before:
00000000 l F .text 000000a8 vtime_delta
00000280 g F .text 0000010c vtime_account_system
0000038c g F .text 00000048 vtime_account_idle
After:
(vtime_delta gets inlined inside the two functions)
000001d8 g F .text 000000a0 vtime_account_system
00000278 g F .text 00000038 vtime_account_idle
In terms of performance, we also get approximatly 7% improvement on
task switch. The following small benchmark app is run with perf stat:
void *thread(void *arg)
{
int i;
for (i = 0; i < atoi((char*)arg); i++)
pthread_yield();
}
int main(int argc, char **argv)
{
pthread_t th1, th2;
pthread_create(&th1, NULL, thread, argv[1]);
pthread_create(&th2, NULL, thread, argv[1]);
pthread_join(th1, NULL);
pthread_join(th2, NULL);
return 0;
}
Before the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
8228.476465 task-clock (msec) # 0.954 CPUs utilized ( +- 0.23% )
200004 context-switches # 0.024 M/sec ( +- 0.00% )
After the patch:
Performance counter stats for 'chrt -f 98 ./sched 100000' (50 runs):
7649.070444 task-clock (msec) # 0.955 CPUs utilized ( +- 0.27% )
200004 context-switches # 0.026 M/sec ( +- 0.00% )
Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2018-08-02 07:53:59 +00:00
|
|
|
#endif
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP(p, accounting.steal_time, "%#-*lx");
|
2012-09-13 23:01:31 +00:00
|
|
|
#undef DUMP
|
|
|
|
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
sync();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dump_all_pacas(void)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
if (num_possible_cpus() == 0) {
|
|
|
|
printf("No possible cpus, use 'dp #' to dump individual cpus\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for_each_possible_cpu(cpu)
|
|
|
|
dump_one_paca(cpu);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dump_pacas(void)
|
|
|
|
{
|
|
|
|
unsigned long num;
|
|
|
|
int c;
|
|
|
|
|
|
|
|
c = inchar();
|
|
|
|
if (c == 'a') {
|
|
|
|
dump_all_pacas();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
termch = c; /* Put c back, it wasn't 'a' */
|
|
|
|
|
|
|
|
if (scanhex(&num))
|
|
|
|
dump_one_paca(num);
|
|
|
|
else
|
|
|
|
dump_one_paca(xmon_owner);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-04-05 07:54:50 +00:00
|
|
|
#ifdef CONFIG_PPC_POWERNV
|
|
|
|
static void dump_one_xive(int cpu)
|
|
|
|
{
|
|
|
|
unsigned int hwid = get_hard_smp_processor_id(cpu);
|
2019-08-14 15:47:52 +00:00
|
|
|
bool hv = cpu_has_feature(CPU_FTR_HVMODE);
|
2017-04-05 07:54:50 +00:00
|
|
|
|
2019-08-14 15:47:52 +00:00
|
|
|
if (hv) {
|
|
|
|
opal_xive_dump(XIVE_DUMP_TM_HYP, hwid);
|
|
|
|
opal_xive_dump(XIVE_DUMP_TM_POOL, hwid);
|
|
|
|
opal_xive_dump(XIVE_DUMP_TM_OS, hwid);
|
|
|
|
opal_xive_dump(XIVE_DUMP_TM_USER, hwid);
|
|
|
|
opal_xive_dump(XIVE_DUMP_VP, hwid);
|
|
|
|
opal_xive_dump(XIVE_DUMP_EMU_STATE, hwid);
|
|
|
|
}
|
2017-04-05 07:54:50 +00:00
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) != 0) {
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
printf("*** Error dumping xive on cpu %d\n", cpu);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
xmon_xive_do_dump(cpu);
|
|
|
|
sync();
|
|
|
|
__delay(200);
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dump_all_xives(void)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
if (num_possible_cpus() == 0) {
|
|
|
|
printf("No possible cpus, use 'dx #' to dump individual cpus\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for_each_possible_cpu(cpu)
|
|
|
|
dump_one_xive(cpu);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dump_xives(void)
|
|
|
|
{
|
|
|
|
unsigned long num;
|
|
|
|
int c;
|
|
|
|
|
2017-10-17 18:20:18 +00:00
|
|
|
if (!xive_enabled()) {
|
|
|
|
printf("Xive disabled on this system\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-04-05 07:54:50 +00:00
|
|
|
c = inchar();
|
|
|
|
if (c == 'a') {
|
|
|
|
dump_all_xives();
|
|
|
|
return;
|
|
|
|
} else if (c == 'i') {
|
|
|
|
if (scanhex(&num))
|
2021-03-31 14:45:11 +00:00
|
|
|
xmon_xive_get_irq_config(num, NULL);
|
2019-08-14 15:47:54 +00:00
|
|
|
else
|
2021-03-31 14:45:11 +00:00
|
|
|
xmon_xive_get_irq_all();
|
2017-04-05 07:54:50 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
termch = c; /* Put c back, it wasn't 'a' */
|
|
|
|
|
|
|
|
if (scanhex(&num))
|
|
|
|
dump_one_xive(num);
|
|
|
|
else
|
|
|
|
dump_one_xive(xmon_owner);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_PPC_POWERNV */
|
|
|
|
|
2017-02-07 13:40:44 +00:00
|
|
|
static void dump_by_size(unsigned long addr, long count, int size)
|
|
|
|
{
|
|
|
|
unsigned char temp[16];
|
|
|
|
int i, j;
|
|
|
|
u64 val;
|
|
|
|
|
|
|
|
count = ALIGN(count, 16);
|
|
|
|
|
|
|
|
for (i = 0; i < count; i += 16, addr += 16) {
|
|
|
|
printf(REG, addr);
|
|
|
|
|
|
|
|
if (mread(addr, temp, 16) != 16) {
|
|
|
|
printf("\nFaulted reading %d bytes from 0x"REG"\n", 16, addr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (j = 0; j < 16; j += size) {
|
|
|
|
putchar(' ');
|
|
|
|
switch (size) {
|
|
|
|
case 1: val = temp[j]; break;
|
|
|
|
case 2: val = *(u16 *)&temp[j]; break;
|
|
|
|
case 4: val = *(u32 *)&temp[j]; break;
|
|
|
|
case 8: val = *(u64 *)&temp[j]; break;
|
|
|
|
default: val = 0;
|
|
|
|
}
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("%0*llx", size * 2, val);
|
2017-02-07 13:40:44 +00:00
|
|
|
}
|
powerpc/xmon: Add ASCII dump to d1,d2,d4,d8 commands.
The reason debuggers add an ASCII dump to other types of memory dumps
is to give the user visual reference points in the case that ASCII
strings are adjacent to other structures or element. For example,
when examining the task_struct structure one can look for the comm[]
string and use it to locate other important elements.
ASCII strings do not have endianess, they exist in memory in the same
order regardless of CPU endianess. ASCII strings are, by definition,
human readable and so should be presented in a human readable format.
For these reasons, the supplemental ASCII dump does not re-order
the strings from memory to match the endianess of the corresponding
16, 32, or 64 bit words. That would make the ASCII dump much less
useful.
Signed-off-by: Douglas Miller <dougmill@linux.vnet.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/1488205694-13337-1-git-send-email-dougmill@linux.vnet.ibm.com
2017-02-27 14:28:14 +00:00
|
|
|
printf(" |");
|
|
|
|
for (j = 0; j < 16; ++j) {
|
|
|
|
val = temp[j];
|
|
|
|
putchar(' ' <= val && val <= '~' ? val : '.');
|
|
|
|
}
|
|
|
|
printf("|\n");
|
2017-02-07 13:40:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
dump(void)
|
|
|
|
{
|
2017-02-07 13:40:44 +00:00
|
|
|
static char last[] = { "d?\n" };
|
2005-04-16 22:20:36 +00:00
|
|
|
int c;
|
|
|
|
|
|
|
|
c = inchar();
|
2012-09-13 23:01:31 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
if (c == 'p') {
|
2015-10-08 00:50:23 +00:00
|
|
|
xmon_start_pagination();
|
2012-09-13 23:01:31 +00:00
|
|
|
dump_pacas();
|
2015-10-08 00:50:23 +00:00
|
|
|
xmon_end_pagination();
|
2012-09-13 23:01:31 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2017-04-05 07:54:50 +00:00
|
|
|
#ifdef CONFIG_PPC_POWERNV
|
|
|
|
if (c == 'x') {
|
|
|
|
xmon_start_pagination();
|
|
|
|
dump_xives();
|
|
|
|
xmon_end_pagination();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2012-09-13 23:01:31 +00:00
|
|
|
|
2017-08-02 20:14:05 +00:00
|
|
|
if (c == 't') {
|
|
|
|
dump_tracing();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-02-07 13:40:44 +00:00
|
|
|
if (c == '\n')
|
2005-04-16 22:20:36 +00:00
|
|
|
termch = c;
|
2017-02-07 13:40:44 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
scanhex((void *)&adrs);
|
|
|
|
if (termch != '\n')
|
|
|
|
termch = 0;
|
|
|
|
if (c == 'i') {
|
|
|
|
scanhex(&nidump);
|
|
|
|
if (nidump == 0)
|
|
|
|
nidump = 16;
|
2020-02-19 11:00:07 +00:00
|
|
|
else if (nidump > MAX_IDUMP)
|
|
|
|
nidump = MAX_IDUMP;
|
2005-04-16 22:20:36 +00:00
|
|
|
adrs += ppc_inst_dump(adrs, nidump, 1);
|
|
|
|
last_cmd = "di\n";
|
2009-05-14 23:13:07 +00:00
|
|
|
} else if (c == 'l') {
|
|
|
|
dump_log_buf();
|
2016-02-09 07:17:49 +00:00
|
|
|
} else if (c == 'o') {
|
|
|
|
dump_opal_msglog();
|
2017-10-30 11:01:12 +00:00
|
|
|
} else if (c == 'v') {
|
|
|
|
/* dump virtual to physical translation */
|
|
|
|
show_pte(adrs);
|
2006-03-08 19:40:28 +00:00
|
|
|
} else if (c == 'r') {
|
|
|
|
scanhex(&ndump);
|
|
|
|
if (ndump == 0)
|
|
|
|
ndump = 64;
|
|
|
|
xmon_rawdump(adrs, ndump);
|
|
|
|
adrs += ndump;
|
|
|
|
last_cmd = "dr\n";
|
2005-04-16 22:20:36 +00:00
|
|
|
} else {
|
|
|
|
scanhex(&ndump);
|
|
|
|
if (ndump == 0)
|
|
|
|
ndump = 64;
|
|
|
|
else if (ndump > MAX_DUMP)
|
|
|
|
ndump = MAX_DUMP;
|
2017-02-07 13:40:44 +00:00
|
|
|
|
|
|
|
switch (c) {
|
|
|
|
case '8':
|
|
|
|
case '4':
|
|
|
|
case '2':
|
|
|
|
case '1':
|
|
|
|
ndump = ALIGN(ndump, 16);
|
|
|
|
dump_by_size(adrs, ndump, c - '0');
|
|
|
|
last[1] = c;
|
|
|
|
last_cmd = last;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
prdump(adrs, ndump);
|
|
|
|
last_cmd = "d\n";
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
adrs += ndump;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
prdump(unsigned long adrs, long ndump)
|
|
|
|
{
|
|
|
|
long n, m, c, r, nr;
|
|
|
|
unsigned char temp[16];
|
|
|
|
|
|
|
|
for (n = ndump; n > 0;) {
|
2005-10-28 12:53:37 +00:00
|
|
|
printf(REG, adrs);
|
2005-04-16 22:20:36 +00:00
|
|
|
putchar(' ');
|
|
|
|
r = n < 16? n: 16;
|
|
|
|
nr = mread(adrs, temp, r);
|
|
|
|
adrs += nr;
|
|
|
|
for (m = 0; m < r; ++m) {
|
2012-08-23 22:09:13 +00:00
|
|
|
if ((m & (sizeof(long) - 1)) == 0 && m > 0)
|
2005-11-10 03:30:20 +00:00
|
|
|
putchar(' ');
|
2005-04-16 22:20:36 +00:00
|
|
|
if (m < nr)
|
|
|
|
printf("%.2x", temp[m]);
|
|
|
|
else
|
|
|
|
printf("%s", fault_chars[fault_type]);
|
|
|
|
}
|
2005-11-10 03:30:20 +00:00
|
|
|
for (; m < 16; ++m) {
|
2012-08-23 22:09:13 +00:00
|
|
|
if ((m & (sizeof(long) - 1)) == 0)
|
2005-11-10 03:30:20 +00:00
|
|
|
putchar(' ');
|
2005-04-16 22:20:36 +00:00
|
|
|
printf(" ");
|
2005-11-10 03:30:20 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
printf(" |");
|
|
|
|
for (m = 0; m < r; ++m) {
|
|
|
|
if (m < nr) {
|
|
|
|
c = temp[m];
|
|
|
|
putchar(' ' <= c && c <= '~'? c: '.');
|
|
|
|
} else
|
|
|
|
putchar(' ');
|
|
|
|
}
|
|
|
|
n -= r;
|
|
|
|
for (; m < 16; ++m)
|
|
|
|
putchar(' ');
|
|
|
|
printf("|\n");
|
|
|
|
if (nr < r)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-11-22 23:46:42 +00:00
|
|
|
typedef int (*instruction_dump_func)(unsigned long inst, unsigned long addr);
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static int
|
2006-11-22 23:46:42 +00:00
|
|
|
generic_inst_dump(unsigned long adr, long count, int praddr,
|
|
|
|
instruction_dump_func dump_func)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
int nr, dotted;
|
|
|
|
unsigned long first_adr;
|
2020-05-06 03:40:31 +00:00
|
|
|
struct ppc_inst inst, last_inst = ppc_inst(0);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
dotted = 0;
|
powerpc/xmon: Improve dumping prefixed instructions
Currently prefixed instructions are dumped as two separate word
instructions. Use mread_instr() so that prefixed instructions are read
as such and update the incrementor in the loop to take this into
account.
'dump_func' is print_insn_powerpc() which comes from ppc-dis.c which is
taken from binutils. When this is updated prefixed instructions will be
disassembled.
Currently dumping prefixed instructions looks like this:
0:mon> di c000000000094168
c000000000094168 0x06000000 .long 0x6000000
c00000000009416c 0x392a0003 addi r9,r10,3
c000000000094170 0x913f0028 stw r9,40(r31)
c000000000094174 0xe93f002a lwa r9,40(r31)
c000000000094178 0x7d234b78 mr r3,r9
c00000000009417c 0x383f0040 addi r1,r31,64
c000000000094180 0xebe1fff8 ld r31,-8(r1)
c000000000094184 0x4e800020 blr
c000000000094188 0x60000000 nop
...
c000000000094190 0x3c4c0121 addis r2,r12,289
c000000000094194 0x38429670 addi r2,r2,-27024
c000000000094198 0x7c0802a6 mflr r0
c00000000009419c 0x60000000 nop
c0000000000941a0 0xe9240100 ld r9,256(r4)
c0000000000941a4 0x39400001 li r10,1
After this it looks like:
0:mon> di c000000000094168
c000000000094168 0x06000000 0x392a0003 .long 0x392a000306000000
c000000000094170 0x913f0028 stw r9,40(r31)
c000000000094174 0xe93f002a lwa r9,40(r31)
c000000000094178 0x7d234b78 mr r3,r9
c00000000009417c 0x383f0040 addi r1,r31,64
c000000000094180 0xebe1fff8 ld r31,-8(r1)
c000000000094184 0x4e800020 blr
c000000000094188 0x60000000 nop
...
c000000000094190 0x3c4c0121 addis r2,r12,289
c000000000094194 0x38429570 addi r2,r2,-27280
c000000000094198 0x7c0802a6 mflr r0
c00000000009419c 0x60000000 nop
c0000000000941a0 0xe9240100 ld r9,256(r4)
c0000000000941a4 0x39400001 li r10,1
c0000000000941a8 0x3d02000b addis r8,r2,11
Signed-off-by: Jordan Niethe <jniethe5@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20200602052728.18227-2-jniethe5@gmail.com
2020-06-02 05:27:26 +00:00
|
|
|
for (first_adr = adr; count > 0; --count, adr += ppc_inst_len(inst)) {
|
|
|
|
nr = mread_instr(adr, &inst);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (nr == 0) {
|
|
|
|
if (praddr) {
|
|
|
|
const char *x = fault_chars[fault_type];
|
2005-10-28 12:53:37 +00:00
|
|
|
printf(REG" %s%s%s%s\n", adr, x, x, x, x);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2020-05-06 03:40:30 +00:00
|
|
|
if (adr > first_adr && ppc_inst_equal(inst, last_inst)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!dotted) {
|
|
|
|
printf(" ...\n");
|
|
|
|
dotted = 1;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
dotted = 0;
|
|
|
|
last_inst = inst;
|
|
|
|
if (praddr)
|
2020-06-02 05:27:25 +00:00
|
|
|
printf(REG" %s", adr, ppc_inst_as_str(inst));
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("\t");
|
powerpc/xmon: Improve dumping prefixed instructions
Currently prefixed instructions are dumped as two separate word
instructions. Use mread_instr() so that prefixed instructions are read
as such and update the incrementor in the loop to take this into
account.
'dump_func' is print_insn_powerpc() which comes from ppc-dis.c which is
taken from binutils. When this is updated prefixed instructions will be
disassembled.
Currently dumping prefixed instructions looks like this:
0:mon> di c000000000094168
c000000000094168 0x06000000 .long 0x6000000
c00000000009416c 0x392a0003 addi r9,r10,3
c000000000094170 0x913f0028 stw r9,40(r31)
c000000000094174 0xe93f002a lwa r9,40(r31)
c000000000094178 0x7d234b78 mr r3,r9
c00000000009417c 0x383f0040 addi r1,r31,64
c000000000094180 0xebe1fff8 ld r31,-8(r1)
c000000000094184 0x4e800020 blr
c000000000094188 0x60000000 nop
...
c000000000094190 0x3c4c0121 addis r2,r12,289
c000000000094194 0x38429670 addi r2,r2,-27024
c000000000094198 0x7c0802a6 mflr r0
c00000000009419c 0x60000000 nop
c0000000000941a0 0xe9240100 ld r9,256(r4)
c0000000000941a4 0x39400001 li r10,1
After this it looks like:
0:mon> di c000000000094168
c000000000094168 0x06000000 0x392a0003 .long 0x392a000306000000
c000000000094170 0x913f0028 stw r9,40(r31)
c000000000094174 0xe93f002a lwa r9,40(r31)
c000000000094178 0x7d234b78 mr r3,r9
c00000000009417c 0x383f0040 addi r1,r31,64
c000000000094180 0xebe1fff8 ld r31,-8(r1)
c000000000094184 0x4e800020 blr
c000000000094188 0x60000000 nop
...
c000000000094190 0x3c4c0121 addis r2,r12,289
c000000000094194 0x38429570 addi r2,r2,-27280
c000000000094198 0x7c0802a6 mflr r0
c00000000009419c 0x60000000 nop
c0000000000941a0 0xe9240100 ld r9,256(r4)
c0000000000941a4 0x39400001 li r10,1
c0000000000941a8 0x3d02000b addis r8,r2,11
Signed-off-by: Jordan Niethe <jniethe5@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20200602052728.18227-2-jniethe5@gmail.com
2020-06-02 05:27:26 +00:00
|
|
|
if (!ppc_inst_prefixed(inst))
|
|
|
|
dump_func(ppc_inst_val(inst), adr);
|
|
|
|
else
|
2021-04-20 14:02:06 +00:00
|
|
|
dump_func(ppc_inst_as_ulong(inst), adr);
|
2005-04-16 22:20:36 +00:00
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
return adr - first_adr;
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static int
|
2006-11-22 23:46:42 +00:00
|
|
|
ppc_inst_dump(unsigned long adr, long count, int praddr)
|
|
|
|
{
|
|
|
|
return generic_inst_dump(adr, count, praddr, print_insn_powerpc);
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
void
|
|
|
|
print_address(unsigned long addr)
|
|
|
|
{
|
|
|
|
xmon_print_symbol(addr, "\t# ", "");
|
|
|
|
}
|
|
|
|
|
2018-10-22 14:54:16 +00:00
|
|
|
static void
|
2009-05-14 23:13:07 +00:00
|
|
|
dump_log_buf(void)
|
|
|
|
{
|
2021-03-03 10:15:25 +00:00
|
|
|
struct kmsg_dump_iter iter;
|
2021-05-14 16:24:20 +00:00
|
|
|
static unsigned char buf[1024];
|
2012-08-23 22:09:12 +00:00
|
|
|
size_t len;
|
2009-05-14 23:13:07 +00:00
|
|
|
|
2012-08-23 22:09:13 +00:00
|
|
|
if (setjmp(bus_error_jmp) != 0) {
|
2012-08-23 22:09:12 +00:00
|
|
|
printf("Error dumping printk buffer!\n");
|
2012-08-23 22:09:13 +00:00
|
|
|
return;
|
|
|
|
}
|
2009-05-14 23:13:07 +00:00
|
|
|
|
2012-08-23 22:09:13 +00:00
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
2009-05-14 23:13:07 +00:00
|
|
|
|
2021-03-03 10:15:27 +00:00
|
|
|
kmsg_dump_rewind(&iter);
|
2015-10-08 00:50:24 +00:00
|
|
|
xmon_start_pagination();
|
2021-03-03 10:15:27 +00:00
|
|
|
while (kmsg_dump_get_line(&iter, false, buf, sizeof(buf), &len)) {
|
2012-08-23 22:09:12 +00:00
|
|
|
buf[len] = '\0';
|
|
|
|
printf("%s", buf);
|
|
|
|
}
|
2015-10-08 00:50:24 +00:00
|
|
|
xmon_end_pagination();
|
2009-05-14 23:13:07 +00:00
|
|
|
|
2012-08-23 22:09:13 +00:00
|
|
|
sync();
|
|
|
|
/* wait a little while to see if we get a machine check */
|
|
|
|
__delay(200);
|
|
|
|
catch_memory_errors = 0;
|
2009-05-14 23:13:07 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2016-02-09 07:17:49 +00:00
|
|
|
#ifdef CONFIG_PPC_POWERNV
|
|
|
|
static void dump_opal_msglog(void)
|
|
|
|
{
|
|
|
|
unsigned char buf[128];
|
|
|
|
ssize_t res;
|
2021-04-29 08:06:38 +00:00
|
|
|
volatile loff_t pos = 0;
|
2016-02-09 07:17:49 +00:00
|
|
|
|
|
|
|
if (!firmware_has_feature(FW_FEATURE_OPAL)) {
|
|
|
|
printf("Machine is not running OPAL firmware.\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) != 0) {
|
|
|
|
printf("Error dumping OPAL msglog!\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
|
|
|
xmon_start_pagination();
|
|
|
|
while ((res = opal_msglog_copy(buf, pos, sizeof(buf) - 1))) {
|
|
|
|
if (res < 0) {
|
|
|
|
printf("Error dumping OPAL msglog! Error: %zd\n", res);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
buf[res] = '\0';
|
|
|
|
printf("%s", buf);
|
|
|
|
pos += res;
|
|
|
|
}
|
|
|
|
xmon_end_pagination();
|
|
|
|
|
|
|
|
sync();
|
|
|
|
/* wait a little while to see if we get a machine check */
|
|
|
|
__delay(200);
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Memory operations - move, set, print differences
|
|
|
|
*/
|
|
|
|
static unsigned long mdest; /* destination address */
|
|
|
|
static unsigned long msrc; /* source address */
|
|
|
|
static unsigned long mval; /* byte value to set memory to */
|
|
|
|
static unsigned long mcount; /* # bytes to affect */
|
|
|
|
static unsigned long mdiffs; /* max # differences to print */
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
memops(int cmd)
|
|
|
|
{
|
|
|
|
scanhex((void *)&mdest);
|
|
|
|
if( termch != '\n' )
|
|
|
|
termch = 0;
|
|
|
|
scanhex((void *)(cmd == 's'? &mval: &msrc));
|
|
|
|
if( termch != '\n' )
|
|
|
|
termch = 0;
|
|
|
|
scanhex((void *)&mcount);
|
|
|
|
switch( cmd ){
|
|
|
|
case 'm':
|
2019-04-16 03:26:38 +00:00
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
break;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
memmove((void *)mdest, (void *)msrc, mcount);
|
|
|
|
break;
|
|
|
|
case 's':
|
2019-04-16 03:26:38 +00:00
|
|
|
if (xmon_is_ro) {
|
|
|
|
printf(xmon_ro_msg);
|
|
|
|
break;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
memset((void *)mdest, mval, mcount);
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
if( termch != '\n' )
|
|
|
|
termch = 0;
|
|
|
|
scanhex((void *)&mdiffs);
|
|
|
|
memdiffs((unsigned char *)mdest, (unsigned char *)msrc, mcount, mdiffs);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
memdiffs(unsigned char *p1, unsigned char *p2, unsigned nb, unsigned maxpr)
|
|
|
|
{
|
|
|
|
unsigned n, prt;
|
|
|
|
|
|
|
|
prt = 0;
|
|
|
|
for( n = nb; n > 0; --n )
|
|
|
|
if( *p1++ != *p2++ )
|
|
|
|
if( ++prt <= maxpr )
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("%px %.2x # %px %.2x\n", p1 - 1,
|
2005-04-16 22:20:36 +00:00
|
|
|
p1[-1], p2 - 1, p2[-1]);
|
|
|
|
if( prt > maxpr )
|
|
|
|
printf("Total of %d differences\n", prt);
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned mend;
|
|
|
|
static unsigned mask;
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
memlocate(void)
|
|
|
|
{
|
|
|
|
unsigned a, n;
|
|
|
|
unsigned char val[4];
|
|
|
|
|
|
|
|
last_cmd = "ml";
|
|
|
|
scanhex((void *)&mdest);
|
|
|
|
if (termch != '\n') {
|
|
|
|
termch = 0;
|
|
|
|
scanhex((void *)&mend);
|
|
|
|
if (termch != '\n') {
|
|
|
|
termch = 0;
|
|
|
|
scanhex((void *)&mval);
|
|
|
|
mask = ~0;
|
|
|
|
if (termch != '\n') termch = 0;
|
|
|
|
scanhex((void *)&mask);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
n = 0;
|
|
|
|
for (a = mdest; a < mend; a += 4) {
|
|
|
|
if (mread(a, val, 4) == 4
|
|
|
|
&& ((GETWORD(val) ^ mval) & mask) == 0) {
|
|
|
|
printf("%.16x: %.16x\n", a, GETWORD(val));
|
|
|
|
if (++n >= 10)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned long mskip = 0x1000;
|
|
|
|
static unsigned long mlim = 0xffffffff;
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
memzcan(void)
|
|
|
|
{
|
|
|
|
unsigned char v;
|
|
|
|
unsigned a;
|
|
|
|
int ok, ook;
|
|
|
|
|
|
|
|
scanhex(&mdest);
|
|
|
|
if (termch != '\n') termch = 0;
|
|
|
|
scanhex(&mskip);
|
|
|
|
if (termch != '\n') termch = 0;
|
|
|
|
scanhex(&mlim);
|
|
|
|
ook = 0;
|
|
|
|
for (a = mdest; a < mlim; a += mskip) {
|
|
|
|
ok = mread(a, &v, 1);
|
|
|
|
if (ok && !ook) {
|
|
|
|
printf("%.8x .. ", a);
|
|
|
|
} else if (!ok && ook)
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("%.8lx\n", a - mskip);
|
2005-04-16 22:20:36 +00:00
|
|
|
ook = ok;
|
|
|
|
if (a + mskip < a)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (ook)
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("%.8lx\n", a - mskip);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2021-04-29 08:06:38 +00:00
|
|
|
static void show_task(struct task_struct *volatile tsk)
|
2015-11-23 15:01:15 +00:00
|
|
|
{
|
2021-06-11 08:28:17 +00:00
|
|
|
unsigned int p_state = READ_ONCE(tsk->__state);
|
2015-11-23 15:01:15 +00:00
|
|
|
char state;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Cloned from kdb_task_state_char(), which is not entirely
|
|
|
|
* appropriate for calling from xmon. This could be moved
|
|
|
|
* to a common, generic, routine used by both.
|
|
|
|
*/
|
2021-06-11 08:28:17 +00:00
|
|
|
state = (p_state == 0) ? 'R' :
|
|
|
|
(p_state < 0) ? 'U' :
|
|
|
|
(p_state & TASK_UNINTERRUPTIBLE) ? 'D' :
|
|
|
|
(p_state & TASK_STOPPED) ? 'T' :
|
|
|
|
(p_state & TASK_TRACED) ? 'C' :
|
2015-11-23 15:01:15 +00:00
|
|
|
(tsk->exit_state & EXIT_ZOMBIE) ? 'Z' :
|
|
|
|
(tsk->exit_state & EXIT_DEAD) ? 'E' :
|
2021-06-11 08:28:17 +00:00
|
|
|
(p_state & TASK_INTERRUPTIBLE) ? 'S' : '?';
|
2015-11-23 15:01:15 +00:00
|
|
|
|
2020-05-20 11:17:40 +00:00
|
|
|
printf("%16px %16lx %16px %6d %6d %c %2d %s\n", tsk,
|
|
|
|
tsk->thread.ksp, tsk->thread.regs,
|
2018-10-22 14:54:16 +00:00
|
|
|
tsk->pid, rcu_dereference(tsk->parent)->pid,
|
2019-01-31 10:08:50 +00:00
|
|
|
state, task_cpu(tsk),
|
2015-11-23 15:01:15 +00:00
|
|
|
tsk->comm);
|
|
|
|
}
|
|
|
|
|
2017-10-30 11:01:12 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S_64
|
2018-10-22 14:54:16 +00:00
|
|
|
static void format_pte(void *ptep, unsigned long pte)
|
2017-10-30 11:01:12 +00:00
|
|
|
{
|
2018-10-09 13:51:56 +00:00
|
|
|
pte_t entry = __pte(pte);
|
|
|
|
|
2017-10-30 11:01:12 +00:00
|
|
|
printf("ptep @ 0x%016lx = 0x%016lx\n", (unsigned long)ptep, pte);
|
|
|
|
printf("Maps physical address = 0x%016lx\n", pte & PTE_RPN_MASK);
|
|
|
|
|
|
|
|
printf("Flags = %s%s%s%s%s\n",
|
2018-10-09 13:51:56 +00:00
|
|
|
pte_young(entry) ? "Accessed " : "",
|
|
|
|
pte_dirty(entry) ? "Dirty " : "",
|
|
|
|
pte_read(entry) ? "Read " : "",
|
|
|
|
pte_write(entry) ? "Write " : "",
|
|
|
|
pte_exec(entry) ? "Exec " : "");
|
2017-10-30 11:01:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void show_pte(unsigned long addr)
|
|
|
|
{
|
|
|
|
unsigned long tskv = 0;
|
2021-04-29 08:06:38 +00:00
|
|
|
struct task_struct *volatile tsk = NULL;
|
2017-10-30 11:01:12 +00:00
|
|
|
struct mm_struct *mm;
|
2020-06-04 23:46:44 +00:00
|
|
|
pgd_t *pgdp;
|
|
|
|
p4d_t *p4dp;
|
2017-10-30 11:01:12 +00:00
|
|
|
pud_t *pudp;
|
|
|
|
pmd_t *pmdp;
|
|
|
|
pte_t *ptep;
|
|
|
|
|
|
|
|
if (!scanhex(&tskv))
|
|
|
|
mm = &init_mm;
|
|
|
|
else
|
|
|
|
tsk = (struct task_struct *)tskv;
|
|
|
|
|
|
|
|
if (tsk == NULL)
|
|
|
|
mm = &init_mm;
|
|
|
|
else
|
|
|
|
mm = tsk->active_mm;
|
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) != 0) {
|
|
|
|
catch_memory_errors = 0;
|
2017-12-06 12:23:28 +00:00
|
|
|
printf("*** Error dumping pte for task %px\n", tsk);
|
2017-10-30 11:01:12 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
2020-06-04 23:46:44 +00:00
|
|
|
if (mm == &init_mm)
|
2017-10-30 11:01:12 +00:00
|
|
|
pgdp = pgd_offset_k(addr);
|
2020-06-04 23:46:44 +00:00
|
|
|
else
|
2017-10-30 11:01:12 +00:00
|
|
|
pgdp = pgd_offset(mm, addr);
|
|
|
|
|
2020-06-04 23:46:44 +00:00
|
|
|
p4dp = p4d_offset(pgdp, addr);
|
|
|
|
|
|
|
|
if (p4d_none(*p4dp)) {
|
|
|
|
printf("No valid P4D\n");
|
2017-10-30 11:01:12 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-04 23:46:44 +00:00
|
|
|
if (p4d_is_leaf(*p4dp)) {
|
|
|
|
format_pte(p4dp, p4d_val(*p4dp));
|
2017-10-30 11:01:12 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-04 23:46:44 +00:00
|
|
|
printf("p4dp @ 0x%px = 0x%016lx\n", p4dp, p4d_val(*p4dp));
|
|
|
|
|
|
|
|
pudp = pud_offset(p4dp, addr);
|
2017-10-30 11:01:12 +00:00
|
|
|
|
|
|
|
if (pud_none(*pudp)) {
|
|
|
|
printf("No valid PUD\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-05-14 06:03:00 +00:00
|
|
|
if (pud_is_leaf(*pudp)) {
|
2017-10-30 11:01:12 +00:00
|
|
|
format_pte(pudp, pud_val(*pudp));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("pudp @ 0x%px = 0x%016lx\n", pudp, pud_val(*pudp));
|
2017-10-30 11:01:12 +00:00
|
|
|
|
|
|
|
pmdp = pmd_offset(pudp, addr);
|
|
|
|
|
|
|
|
if (pmd_none(*pmdp)) {
|
|
|
|
printf("No valid PMD\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-05-14 06:03:00 +00:00
|
|
|
if (pmd_is_leaf(*pmdp)) {
|
2017-10-30 11:01:12 +00:00
|
|
|
format_pte(pmdp, pmd_val(*pmdp));
|
|
|
|
return;
|
|
|
|
}
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("pmdp @ 0x%px = 0x%016lx\n", pmdp, pmd_val(*pmdp));
|
2017-10-30 11:01:12 +00:00
|
|
|
|
|
|
|
ptep = pte_offset_map(pmdp, addr);
|
|
|
|
if (pte_none(*ptep)) {
|
|
|
|
printf("no valid PTE\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
format_pte(ptep, pte_val(*ptep));
|
|
|
|
|
|
|
|
sync();
|
|
|
|
__delay(200);
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void show_pte(unsigned long addr)
|
|
|
|
{
|
|
|
|
printf("show_pte not yet implemented\n");
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_PPC_BOOK3S_64 */
|
|
|
|
|
2015-11-23 15:01:15 +00:00
|
|
|
static void show_tasks(void)
|
|
|
|
{
|
|
|
|
unsigned long tskv;
|
2021-04-29 08:06:38 +00:00
|
|
|
struct task_struct *volatile tsk = NULL;
|
2015-11-23 15:01:15 +00:00
|
|
|
|
2020-05-20 11:17:40 +00:00
|
|
|
printf(" task_struct ->thread.ksp ->thread.regs PID PPID S P CMD\n");
|
2015-11-23 15:01:15 +00:00
|
|
|
|
|
|
|
if (scanhex(&tskv))
|
|
|
|
tsk = (struct task_struct *)tskv;
|
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) != 0) {
|
|
|
|
catch_memory_errors = 0;
|
2017-12-06 12:23:28 +00:00
|
|
|
printf("*** Error dumping task %px\n", tsk);
|
2015-11-23 15:01:15 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
|
|
|
if (tsk)
|
|
|
|
show_task(tsk);
|
|
|
|
else
|
|
|
|
for_each_process(tsk)
|
|
|
|
show_task(tsk);
|
|
|
|
|
|
|
|
sync();
|
|
|
|
__delay(200);
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void proccall(void)
|
2005-10-28 12:53:37 +00:00
|
|
|
{
|
|
|
|
unsigned long args[8];
|
|
|
|
unsigned long ret;
|
|
|
|
int i;
|
|
|
|
typedef unsigned long (*callfunc_t)(unsigned long, unsigned long,
|
|
|
|
unsigned long, unsigned long, unsigned long,
|
|
|
|
unsigned long, unsigned long, unsigned long);
|
|
|
|
callfunc_t func;
|
|
|
|
|
|
|
|
if (!scanhex(&adrs))
|
|
|
|
return;
|
|
|
|
if (termch != '\n')
|
|
|
|
termch = 0;
|
|
|
|
for (i = 0; i < 8; ++i)
|
|
|
|
args[i] = 0;
|
|
|
|
for (i = 0; i < 8; ++i) {
|
|
|
|
if (!scanhex(&args[i]) || termch == '\n')
|
|
|
|
break;
|
|
|
|
termch = 0;
|
|
|
|
}
|
|
|
|
func = (callfunc_t) adrs;
|
|
|
|
ret = 0;
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
ret = func(args[0], args[1], args[2], args[3],
|
|
|
|
args[4], args[5], args[6], args[7]);
|
|
|
|
sync();
|
2014-05-26 11:02:14 +00:00
|
|
|
printf("return value is 0x%lx\n", ret);
|
2005-10-28 12:53:37 +00:00
|
|
|
} else {
|
|
|
|
printf("*** %x exception occurred\n", fault_except);
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/* Input scanning routines */
|
|
|
|
int
|
|
|
|
skipbl(void)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
if( termch != 0 ){
|
|
|
|
c = termch;
|
|
|
|
termch = 0;
|
|
|
|
} else
|
|
|
|
c = inchar();
|
|
|
|
while( c == ' ' || c == '\t' )
|
|
|
|
c = inchar();
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define N_PTREGS 44
|
2018-05-31 11:11:25 +00:00
|
|
|
static const char *regnames[N_PTREGS] = {
|
2005-04-16 22:20:36 +00:00
|
|
|
"r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7",
|
|
|
|
"r8", "r9", "r10", "r11", "r12", "r13", "r14", "r15",
|
|
|
|
"r16", "r17", "r18", "r19", "r20", "r21", "r22", "r23",
|
|
|
|
"r24", "r25", "r26", "r27", "r28", "r29", "r30", "r31",
|
2005-10-28 12:53:37 +00:00
|
|
|
"pc", "msr", "or3", "ctr", "lr", "xer", "ccr",
|
|
|
|
#ifdef CONFIG_PPC64
|
|
|
|
"softe",
|
|
|
|
#else
|
|
|
|
"mq",
|
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
"trap", "dar", "dsisr", "res"
|
|
|
|
};
|
|
|
|
|
|
|
|
int
|
|
|
|
scanhex(unsigned long *vp)
|
|
|
|
{
|
|
|
|
int c, d;
|
|
|
|
unsigned long v;
|
|
|
|
|
|
|
|
c = skipbl();
|
|
|
|
if (c == '%') {
|
|
|
|
/* parse register name */
|
|
|
|
char regname[8];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < sizeof(regname) - 1; ++i) {
|
|
|
|
c = inchar();
|
|
|
|
if (!isalnum(c)) {
|
|
|
|
termch = c;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
regname[i] = c;
|
|
|
|
}
|
|
|
|
regname[i] = 0;
|
2018-05-31 11:11:25 +00:00
|
|
|
i = match_string(regnames, N_PTREGS, regname);
|
|
|
|
if (i < 0) {
|
|
|
|
printf("invalid register name '%%%s'\n", regname);
|
|
|
|
return 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2018-05-31 11:11:25 +00:00
|
|
|
if (xmon_regs == NULL) {
|
|
|
|
printf("regs not available\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
*vp = ((unsigned long *)xmon_regs)[i];
|
|
|
|
return 1;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* skip leading "0x" if any */
|
|
|
|
|
|
|
|
if (c == '0') {
|
|
|
|
c = inchar();
|
|
|
|
if (c == 'x') {
|
|
|
|
c = inchar();
|
|
|
|
} else {
|
|
|
|
d = hexdigit(c);
|
|
|
|
if (d == EOF) {
|
|
|
|
termch = c;
|
|
|
|
*vp = 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if (c == '$') {
|
|
|
|
int i;
|
|
|
|
for (i=0; i<63; i++) {
|
|
|
|
c = inchar();
|
2014-07-15 11:43:47 +00:00
|
|
|
if (isspace(c) || c == '\0') {
|
2005-04-16 22:20:36 +00:00
|
|
|
termch = c;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
tmpstr[i] = c;
|
|
|
|
}
|
|
|
|
tmpstr[i++] = 0;
|
2005-06-22 00:15:30 +00:00
|
|
|
*vp = 0;
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
*vp = kallsyms_lookup_name(tmpstr);
|
|
|
|
sync();
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!(*vp)) {
|
|
|
|
printf("unknown symbol '%s'\n", tmpstr);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
d = hexdigit(c);
|
|
|
|
if (d == EOF) {
|
|
|
|
termch = c;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
v = 0;
|
|
|
|
do {
|
|
|
|
v = (v << 4) + d;
|
|
|
|
c = inchar();
|
|
|
|
d = hexdigit(c);
|
|
|
|
} while (d != EOF);
|
|
|
|
termch = c;
|
|
|
|
*vp = v;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
scannl(void)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
c = termch;
|
|
|
|
termch = 0;
|
|
|
|
while( c != '\n' )
|
|
|
|
c = inchar();
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static int hexdigit(int c)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
if( '0' <= c && c <= '9' )
|
|
|
|
return c - '0';
|
|
|
|
if( 'A' <= c && c <= 'F' )
|
|
|
|
return c - ('A' - 10);
|
|
|
|
if( 'a' <= c && c <= 'f' )
|
|
|
|
return c - ('a' - 10);
|
|
|
|
return EOF;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
getstring(char *s, int size)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
c = skipbl();
|
2020-02-17 04:13:43 +00:00
|
|
|
if (c == '\n') {
|
|
|
|
*s = 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
do {
|
|
|
|
if( size > 1 ){
|
|
|
|
*s++ = c;
|
|
|
|
--size;
|
|
|
|
}
|
|
|
|
c = inchar();
|
|
|
|
} while( c != ' ' && c != '\t' && c != '\n' );
|
|
|
|
termch = c;
|
|
|
|
*s = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char line[256];
|
|
|
|
static char *lineptr;
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
flush_input(void)
|
|
|
|
{
|
|
|
|
lineptr = NULL;
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static int
|
2005-04-16 22:20:36 +00:00
|
|
|
inchar(void)
|
|
|
|
{
|
|
|
|
if (lineptr == NULL || *lineptr == 0) {
|
2005-11-08 11:55:08 +00:00
|
|
|
if (xmon_gets(line, sizeof(line)) == NULL) {
|
2005-04-16 22:20:36 +00:00
|
|
|
lineptr = NULL;
|
|
|
|
return EOF;
|
|
|
|
}
|
|
|
|
lineptr = line;
|
|
|
|
}
|
|
|
|
return *lineptr++;
|
|
|
|
}
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void
|
2005-04-16 22:20:36 +00:00
|
|
|
take_input(char *str)
|
|
|
|
{
|
|
|
|
lineptr = str;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
symbol_lookup(void)
|
|
|
|
{
|
|
|
|
int type = inchar();
|
2016-11-22 09:20:09 +00:00
|
|
|
unsigned long addr, cpu;
|
|
|
|
void __percpu *ptr = NULL;
|
2005-04-16 22:20:36 +00:00
|
|
|
static char tmp[64];
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case 'a':
|
|
|
|
if (scanhex(&addr))
|
|
|
|
xmon_print_symbol(addr, ": ", "\n");
|
|
|
|
termch = 0;
|
|
|
|
break;
|
|
|
|
case 's':
|
|
|
|
getstring(tmp, 64);
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
addr = kallsyms_lookup_name(tmp);
|
|
|
|
if (addr)
|
|
|
|
printf("%s: %lx\n", tmp, addr);
|
|
|
|
else
|
|
|
|
printf("Symbol '%s' not found.\n", tmp);
|
|
|
|
sync();
|
|
|
|
}
|
2016-11-22 09:20:09 +00:00
|
|
|
catch_memory_errors = 0;
|
|
|
|
termch = 0;
|
|
|
|
break;
|
|
|
|
case 'p':
|
|
|
|
getstring(tmp, 64);
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
ptr = (void __percpu *)kallsyms_lookup_name(tmp);
|
|
|
|
sync();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ptr &&
|
|
|
|
ptr >= (void __percpu *)__per_cpu_start &&
|
|
|
|
ptr < (void __percpu *)__per_cpu_end)
|
|
|
|
{
|
|
|
|
if (scanhex(&cpu) && cpu < num_possible_cpus()) {
|
|
|
|
addr = (unsigned long)per_cpu_ptr(ptr, cpu);
|
|
|
|
} else {
|
|
|
|
cpu = raw_smp_processor_id();
|
|
|
|
addr = (unsigned long)this_cpu_ptr(ptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("%s for cpu 0x%lx: %lx\n", tmp, cpu, addr);
|
|
|
|
} else {
|
|
|
|
printf("Percpu symbol '%s' not found.\n", tmp);
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
catch_memory_errors = 0;
|
|
|
|
termch = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Print an address in numeric and symbolic form (if possible) */
|
|
|
|
static void xmon_print_symbol(unsigned long address, const char *mid,
|
|
|
|
const char *after)
|
|
|
|
{
|
|
|
|
char *modname;
|
2021-04-29 08:06:38 +00:00
|
|
|
const char *volatile name = NULL;
|
2005-04-16 22:20:36 +00:00
|
|
|
unsigned long offset, size;
|
|
|
|
|
2005-10-28 12:53:37 +00:00
|
|
|
printf(REG, address);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
name = kallsyms_lookup(address, &size, &offset, &modname,
|
|
|
|
tmpstr);
|
|
|
|
sync();
|
|
|
|
/* wait a little while to see if we get a machine check */
|
|
|
|
__delay(200);
|
|
|
|
}
|
|
|
|
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
|
|
|
|
if (name) {
|
|
|
|
printf("%s%s+%#lx/%#lx", mid, name, offset, size);
|
|
|
|
if (modname)
|
|
|
|
printf(" [%s]", modname);
|
|
|
|
}
|
|
|
|
printf("%s", after);
|
|
|
|
}
|
|
|
|
|
2017-10-19 04:08:43 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S_64
|
2014-07-10 02:29:20 +00:00
|
|
|
void dump_segments(void)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
int i;
|
2015-07-29 07:10:04 +00:00
|
|
|
unsigned long esid,vsid;
|
2007-12-06 21:22:23 +00:00
|
|
|
unsigned long llp;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2014-05-26 11:02:14 +00:00
|
|
|
printf("SLB contents of cpu 0x%x\n", smp_processor_id());
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-12-06 06:24:48 +00:00
|
|
|
for (i = 0; i < mmu_slb_size; i++) {
|
2007-12-06 21:22:23 +00:00
|
|
|
asm volatile("slbmfee %0,%1" : "=r" (esid) : "r" (i));
|
|
|
|
asm volatile("slbmfev %0,%1" : "=r" (vsid) : "r" (i));
|
2017-04-24 00:35:14 +00:00
|
|
|
|
|
|
|
if (!esid && !vsid)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
printf("%02d %016lx %016lx", i, esid, vsid);
|
|
|
|
|
|
|
|
if (!(esid & SLB_ESID_V)) {
|
|
|
|
printf("\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
llp = vsid & SLB_VSID_LLP;
|
|
|
|
if (vsid & SLB_VSID_B_1T) {
|
|
|
|
printf(" 1T ESID=%9lx VSID=%13lx LLP:%3lx \n",
|
|
|
|
GET_ESID_1T(esid),
|
|
|
|
(vsid & ~SLB_VSID_B) >> SLB_VSID_SHIFT_1T,
|
|
|
|
llp);
|
|
|
|
} else {
|
|
|
|
printf(" 256M ESID=%9lx VSID=%13lx LLP:%3lx \n",
|
|
|
|
GET_ESID(esid),
|
|
|
|
(vsid & ~SLB_VSID_B) >> SLB_VSID_SHIFT,
|
|
|
|
llp);
|
2007-12-06 21:22:23 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
}
|
2005-10-28 12:53:37 +00:00
|
|
|
#endif
|
|
|
|
|
2018-11-17 10:25:02 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S_32
|
2005-10-28 12:53:37 +00:00
|
|
|
void dump_segments(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
printf("sr0-15 =");
|
|
|
|
for (i = 0; i < 16; ++i)
|
2021-02-06 11:47:27 +00:00
|
|
|
printf(" %x", mfsr(i << 28));
|
2005-10-28 12:53:37 +00:00
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2007-11-16 07:23:33 +00:00
|
|
|
#ifdef CONFIG_44x
|
|
|
|
static void dump_tlb_44x(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < PPC44x_TLB_SIZE; i++) {
|
|
|
|
unsigned long w0,w1,w2;
|
|
|
|
asm volatile("tlbre %0,%1,0" : "=r" (w0) : "r" (i));
|
|
|
|
asm volatile("tlbre %0,%1,1" : "=r" (w1) : "r" (i));
|
|
|
|
asm volatile("tlbre %0,%1,2" : "=r" (w2) : "r" (i));
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("[%02x] %08lx %08lx %08lx ", i, w0, w1, w2);
|
2007-11-16 07:23:33 +00:00
|
|
|
if (w0 & PPC44x_TLB_VALID) {
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("V %08lx -> %01lx%08lx %c%c%c%c%c",
|
2007-11-16 07:23:33 +00:00
|
|
|
w0 & PPC44x_TLB_EPN_MASK,
|
|
|
|
w1 & PPC44x_TLB_ERPN_MASK,
|
|
|
|
w1 & PPC44x_TLB_RPN_MASK,
|
|
|
|
(w2 & PPC44x_TLB_W) ? 'W' : 'w',
|
|
|
|
(w2 & PPC44x_TLB_I) ? 'I' : 'i',
|
|
|
|
(w2 & PPC44x_TLB_M) ? 'M' : 'm',
|
|
|
|
(w2 & PPC44x_TLB_G) ? 'G' : 'g',
|
|
|
|
(w2 & PPC44x_TLB_E) ? 'E' : 'e');
|
|
|
|
}
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_44x */
|
2008-05-08 04:27:16 +00:00
|
|
|
|
2010-07-09 05:34:50 +00:00
|
|
|
#ifdef CONFIG_PPC_BOOK3E
|
|
|
|
static void dump_tlb_book3e(void)
|
|
|
|
{
|
|
|
|
u32 mmucfg, pidmask, lpidmask;
|
|
|
|
u64 ramask;
|
|
|
|
int i, tlb, ntlbs, pidsz, lpidsz, rasz, lrat = 0;
|
|
|
|
int mmu_version;
|
|
|
|
static const char *pgsz_names[] = {
|
|
|
|
" 1K",
|
|
|
|
" 2K",
|
|
|
|
" 4K",
|
|
|
|
" 8K",
|
|
|
|
" 16K",
|
|
|
|
" 32K",
|
|
|
|
" 64K",
|
|
|
|
"128K",
|
|
|
|
"256K",
|
|
|
|
"512K",
|
|
|
|
" 1M",
|
|
|
|
" 2M",
|
|
|
|
" 4M",
|
|
|
|
" 8M",
|
|
|
|
" 16M",
|
|
|
|
" 32M",
|
|
|
|
" 64M",
|
|
|
|
"128M",
|
|
|
|
"256M",
|
|
|
|
"512M",
|
|
|
|
" 1G",
|
|
|
|
" 2G",
|
|
|
|
" 4G",
|
|
|
|
" 8G",
|
|
|
|
" 16G",
|
|
|
|
" 32G",
|
|
|
|
" 64G",
|
|
|
|
"128G",
|
|
|
|
"256G",
|
|
|
|
"512G",
|
|
|
|
" 1T",
|
|
|
|
" 2T",
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Gather some infos about the MMU */
|
|
|
|
mmucfg = mfspr(SPRN_MMUCFG);
|
|
|
|
mmu_version = (mmucfg & 3) + 1;
|
|
|
|
ntlbs = ((mmucfg >> 2) & 3) + 1;
|
|
|
|
pidsz = ((mmucfg >> 6) & 0x1f) + 1;
|
|
|
|
lpidsz = (mmucfg >> 24) & 0xf;
|
|
|
|
rasz = (mmucfg >> 16) & 0x7f;
|
|
|
|
if ((mmu_version > 1) && (mmucfg & 0x10000))
|
|
|
|
lrat = 1;
|
|
|
|
printf("Book3E MMU MAV=%d.0,%d TLBs,%d-bit PID,%d-bit LPID,%d-bit RA\n",
|
|
|
|
mmu_version, ntlbs, pidsz, lpidsz, rasz);
|
|
|
|
pidmask = (1ul << pidsz) - 1;
|
|
|
|
lpidmask = (1ul << lpidsz) - 1;
|
|
|
|
ramask = (1ull << rasz) - 1;
|
|
|
|
|
|
|
|
for (tlb = 0; tlb < ntlbs; tlb++) {
|
|
|
|
u32 tlbcfg;
|
|
|
|
int nent, assoc, new_cc = 1;
|
|
|
|
printf("TLB %d:\n------\n", tlb);
|
|
|
|
switch(tlb) {
|
|
|
|
case 0:
|
|
|
|
tlbcfg = mfspr(SPRN_TLB0CFG);
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
tlbcfg = mfspr(SPRN_TLB1CFG);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
tlbcfg = mfspr(SPRN_TLB2CFG);
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
tlbcfg = mfspr(SPRN_TLB3CFG);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("Unsupported TLB number !\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
nent = tlbcfg & 0xfff;
|
|
|
|
assoc = (tlbcfg >> 24) & 0xff;
|
|
|
|
for (i = 0; i < nent; i++) {
|
|
|
|
u32 mas0 = MAS0_TLBSEL(tlb);
|
|
|
|
u32 mas1 = MAS1_TSIZE(BOOK3E_PAGESZ_4K);
|
|
|
|
u64 mas2 = 0;
|
|
|
|
u64 mas7_mas3;
|
|
|
|
int esel = i, cc = i;
|
|
|
|
|
|
|
|
if (assoc != 0) {
|
|
|
|
cc = i / assoc;
|
|
|
|
esel = i % assoc;
|
|
|
|
mas2 = cc * 0x1000;
|
|
|
|
}
|
|
|
|
|
|
|
|
mas0 |= MAS0_ESEL(esel);
|
|
|
|
mtspr(SPRN_MAS0, mas0);
|
|
|
|
mtspr(SPRN_MAS1, mas1);
|
|
|
|
mtspr(SPRN_MAS2, mas2);
|
|
|
|
asm volatile("tlbre 0,0,0" : : : "memory");
|
|
|
|
mas1 = mfspr(SPRN_MAS1);
|
|
|
|
mas2 = mfspr(SPRN_MAS2);
|
|
|
|
mas7_mas3 = mfspr(SPRN_MAS7_MAS3);
|
|
|
|
if (assoc && (i % assoc) == 0)
|
|
|
|
new_cc = 1;
|
|
|
|
if (!(mas1 & MAS1_VALID))
|
|
|
|
continue;
|
|
|
|
if (assoc == 0)
|
|
|
|
printf("%04x- ", i);
|
|
|
|
else if (new_cc)
|
|
|
|
printf("%04x-%c", cc, 'A' + esel);
|
|
|
|
else
|
|
|
|
printf(" |%c", 'A' + esel);
|
|
|
|
new_cc = 0;
|
|
|
|
printf(" %016llx %04x %s %c%c AS%c",
|
|
|
|
mas2 & ~0x3ffull,
|
|
|
|
(mas1 >> 16) & 0x3fff,
|
|
|
|
pgsz_names[(mas1 >> 7) & 0x1f],
|
|
|
|
mas1 & MAS1_IND ? 'I' : ' ',
|
|
|
|
mas1 & MAS1_IPROT ? 'P' : ' ',
|
|
|
|
mas1 & MAS1_TS ? '1' : '0');
|
|
|
|
printf(" %c%c%c%c%c%c%c",
|
|
|
|
mas2 & MAS2_X0 ? 'a' : ' ',
|
|
|
|
mas2 & MAS2_X1 ? 'v' : ' ',
|
|
|
|
mas2 & MAS2_W ? 'w' : ' ',
|
|
|
|
mas2 & MAS2_I ? 'i' : ' ',
|
|
|
|
mas2 & MAS2_M ? 'm' : ' ',
|
|
|
|
mas2 & MAS2_G ? 'g' : ' ',
|
|
|
|
mas2 & MAS2_E ? 'e' : ' ');
|
|
|
|
printf(" %016llx", mas7_mas3 & ramask & ~0x7ffull);
|
|
|
|
if (mas1 & MAS1_IND)
|
|
|
|
printf(" %s\n",
|
|
|
|
pgsz_names[(mas7_mas3 >> 1) & 0x1f]);
|
|
|
|
else
|
|
|
|
printf(" U%c%c%c S%c%c%c\n",
|
|
|
|
mas7_mas3 & MAS3_UX ? 'x' : ' ',
|
|
|
|
mas7_mas3 & MAS3_UW ? 'w' : ' ',
|
|
|
|
mas7_mas3 & MAS3_UR ? 'r' : ' ',
|
|
|
|
mas7_mas3 & MAS3_SX ? 'x' : ' ',
|
|
|
|
mas7_mas3 & MAS3_SW ? 'w' : ' ',
|
|
|
|
mas7_mas3 & MAS3_SR ? 'r' : ' ');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_PPC_BOOK3E */
|
|
|
|
|
2008-05-08 04:27:16 +00:00
|
|
|
static void xmon_init(int enable)
|
2005-08-04 17:26:42 +00:00
|
|
|
{
|
|
|
|
if (enable) {
|
|
|
|
__debugger = xmon;
|
|
|
|
__debugger_ipi = xmon_ipi;
|
|
|
|
__debugger_bpt = xmon_bpt;
|
|
|
|
__debugger_sstep = xmon_sstep;
|
|
|
|
__debugger_iabr_match = xmon_iabr_match;
|
2012-12-20 14:06:44 +00:00
|
|
|
__debugger_break_match = xmon_break_match;
|
2005-08-04 17:26:42 +00:00
|
|
|
__debugger_fault_handler = xmon_fault_handler;
|
2018-11-08 17:12:42 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_PPC_PSERIES
|
|
|
|
/*
|
|
|
|
* Get the token here to avoid trying to get a lock
|
|
|
|
* during the crash, causing a deadlock.
|
|
|
|
*/
|
|
|
|
set_indicator_token = rtas_token("set-indicator");
|
|
|
|
#endif
|
2005-08-04 17:26:42 +00:00
|
|
|
} else {
|
|
|
|
__debugger = NULL;
|
|
|
|
__debugger_ipi = NULL;
|
|
|
|
__debugger_bpt = NULL;
|
|
|
|
__debugger_sstep = NULL;
|
|
|
|
__debugger_iabr_match = NULL;
|
2012-12-20 14:06:44 +00:00
|
|
|
__debugger_break_match = NULL;
|
2005-08-04 17:26:42 +00:00
|
|
|
__debugger_fault_handler = NULL;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2005-11-08 11:55:08 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_MAGIC_SYSRQ
|
2010-08-18 04:15:46 +00:00
|
|
|
static void sysrq_handle_xmon(int key)
|
2005-11-08 11:55:08 +00:00
|
|
|
{
|
2019-09-07 06:11:24 +00:00
|
|
|
if (xmon_is_locked_down()) {
|
|
|
|
clear_all_bpt();
|
|
|
|
xmon_init(0);
|
|
|
|
return;
|
|
|
|
}
|
2005-11-08 11:55:08 +00:00
|
|
|
/* ensure xmon is enabled */
|
|
|
|
xmon_init(1);
|
IRQ: Maintain regs pointer globally rather than passing to IRQ handlers
Maintain a per-CPU global "struct pt_regs *" variable which can be used instead
of passing regs around manually through all ~1800 interrupt handlers in the
Linux kernel.
The regs pointer is used in few places, but it potentially costs both stack
space and code to pass it around. On the FRV arch, removing the regs parameter
from all the genirq function results in a 20% speed up of the IRQ exit path
(ie: from leaving timer_interrupt() to leaving do_IRQ()).
Where appropriate, an arch may override the generic storage facility and do
something different with the variable. On FRV, for instance, the address is
maintained in GR28 at all times inside the kernel as part of general exception
handling.
Having looked over the code, it appears that the parameter may be handed down
through up to twenty or so layers of functions. Consider a USB character
device attached to a USB hub, attached to a USB controller that posts its
interrupts through a cascaded auxiliary interrupt controller. A character
device driver may want to pass regs to the sysrq handler through the input
layer which adds another few layers of parameter passing.
I've build this code with allyesconfig for x86_64 and i386. I've runtested the
main part of the code on FRV and i386, though I can't test most of the drivers.
I've also done partial conversion for powerpc and MIPS - these at least compile
with minimal configurations.
This will affect all archs. Mostly the changes should be relatively easy.
Take do_IRQ(), store the regs pointer at the beginning, saving the old one:
struct pt_regs *old_regs = set_irq_regs(regs);
And put the old one back at the end:
set_irq_regs(old_regs);
Don't pass regs through to generic_handle_irq() or __do_IRQ().
In timer_interrupt(), this sort of change will be necessary:
- update_process_times(user_mode(regs));
- profile_tick(CPU_PROFILING, regs);
+ update_process_times(user_mode(get_irq_regs()));
+ profile_tick(CPU_PROFILING);
I'd like to move update_process_times()'s use of get_irq_regs() into itself,
except that i386, alone of the archs, uses something other than user_mode().
Some notes on the interrupt handling in the drivers:
(*) input_dev() is now gone entirely. The regs pointer is no longer stored in
the input_dev struct.
(*) finish_unlinks() in drivers/usb/host/ohci-q.c needs checking. It does
something different depending on whether it's been supplied with a regs
pointer or not.
(*) Various IRQ handler function pointers have been moved to type
irq_handler_t.
Signed-Off-By: David Howells <dhowells@redhat.com>
(cherry picked from 1b16e7ac850969f38b375e511e3fa2f474a33867 commit)
2006-10-05 13:55:46 +00:00
|
|
|
debugger(get_irq_regs());
|
2017-03-22 19:27:49 +00:00
|
|
|
if (!xmon_on)
|
|
|
|
xmon_init(0);
|
2005-11-08 11:55:08 +00:00
|
|
|
}
|
|
|
|
|
2020-05-13 21:43:46 +00:00
|
|
|
static const struct sysrq_key_op sysrq_xmon_op = {
|
2005-11-08 11:55:08 +00:00
|
|
|
.handler = sysrq_handle_xmon,
|
2013-04-30 22:28:54 +00:00
|
|
|
.help_msg = "xmon(x)",
|
2005-11-08 11:55:08 +00:00
|
|
|
.action_msg = "Entering xmon",
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init setup_xmon_sysrq(void)
|
|
|
|
{
|
|
|
|
register_sysrq_key('x', &sysrq_xmon_op);
|
|
|
|
return 0;
|
|
|
|
}
|
2017-03-22 19:27:50 +00:00
|
|
|
device_initcall(setup_xmon_sysrq);
|
2005-11-08 11:55:08 +00:00
|
|
|
#endif /* CONFIG_MAGIC_SYSRQ */
|
2006-10-03 04:12:08 +00:00
|
|
|
|
2018-03-04 17:31:32 +00:00
|
|
|
static void clear_all_bpt(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* clear/unpatch all breakpoints */
|
|
|
|
remove_bpts();
|
|
|
|
remove_cpu_bpts();
|
|
|
|
|
|
|
|
/* Disable all breakpoints */
|
|
|
|
for (i = 0; i < NBPTS; ++i)
|
|
|
|
bpts[i].enabled = 0;
|
|
|
|
|
|
|
|
/* Clear any data or iabr breakpoints */
|
2020-05-14 11:17:41 +00:00
|
|
|
iabr = NULL;
|
|
|
|
for (i = 0; i < nr_wp_slots(); i++)
|
|
|
|
dabr[i].enabled = 0;
|
2018-03-04 17:31:32 +00:00
|
|
|
}
|
|
|
|
|
2019-09-07 06:11:24 +00:00
|
|
|
#ifdef CONFIG_DEBUG_FS
|
2017-03-22 19:27:51 +00:00
|
|
|
static int xmon_dbgfs_set(void *data, u64 val)
|
|
|
|
{
|
|
|
|
xmon_on = !!val;
|
|
|
|
xmon_init(xmon_on);
|
|
|
|
|
2018-03-04 17:31:32 +00:00
|
|
|
/* make sure all breakpoints removed when disabling */
|
2019-09-07 06:11:24 +00:00
|
|
|
if (!xmon_on) {
|
2018-03-04 17:31:32 +00:00
|
|
|
clear_all_bpt();
|
2019-09-07 06:11:24 +00:00
|
|
|
get_output_lock();
|
|
|
|
printf("xmon: All breakpoints cleared\n");
|
|
|
|
release_output_lock();
|
|
|
|
}
|
|
|
|
|
2017-03-22 19:27:51 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int xmon_dbgfs_get(void *data, u64 *val)
|
|
|
|
{
|
|
|
|
*val = xmon_on;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
DEFINE_SIMPLE_ATTRIBUTE(xmon_dbgfs_ops, xmon_dbgfs_get,
|
|
|
|
xmon_dbgfs_set, "%llu\n");
|
|
|
|
|
|
|
|
static int __init setup_xmon_dbgfs(void)
|
|
|
|
{
|
2021-08-12 13:28:31 +00:00
|
|
|
debugfs_create_file("xmon", 0600, arch_debugfs_dir, NULL,
|
|
|
|
&xmon_dbgfs_ops);
|
2017-03-22 19:27:51 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
device_initcall(setup_xmon_dbgfs);
|
|
|
|
#endif /* CONFIG_DEBUG_FS */
|
|
|
|
|
2017-03-22 19:27:50 +00:00
|
|
|
static int xmon_early __initdata;
|
2006-10-03 04:12:08 +00:00
|
|
|
|
|
|
|
static int __init early_parse_xmon(char *p)
|
|
|
|
{
|
2019-09-07 06:11:24 +00:00
|
|
|
if (xmon_is_locked_down()) {
|
|
|
|
xmon_init(0);
|
|
|
|
xmon_early = 0;
|
|
|
|
xmon_on = 0;
|
|
|
|
} else if (!p || strncmp(p, "early", 5) == 0) {
|
2006-10-03 04:12:08 +00:00
|
|
|
/* just "xmon" is equivalent to "xmon=early" */
|
|
|
|
xmon_init(1);
|
|
|
|
xmon_early = 1;
|
2017-03-22 19:27:49 +00:00
|
|
|
xmon_on = 1;
|
|
|
|
} else if (strncmp(p, "on", 2) == 0) {
|
2006-10-03 04:12:08 +00:00
|
|
|
xmon_init(1);
|
2017-03-22 19:27:49 +00:00
|
|
|
xmon_on = 1;
|
2019-04-16 03:26:38 +00:00
|
|
|
} else if (strncmp(p, "rw", 2) == 0) {
|
|
|
|
xmon_init(1);
|
|
|
|
xmon_on = 1;
|
|
|
|
xmon_is_ro = false;
|
|
|
|
} else if (strncmp(p, "ro", 2) == 0) {
|
|
|
|
xmon_init(1);
|
|
|
|
xmon_on = 1;
|
|
|
|
xmon_is_ro = true;
|
2017-03-22 19:27:49 +00:00
|
|
|
} else if (strncmp(p, "off", 3) == 0)
|
|
|
|
xmon_on = 0;
|
2006-10-03 04:12:08 +00:00
|
|
|
else
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
early_param("xmon", early_parse_xmon);
|
|
|
|
|
|
|
|
void __init xmon_setup(void)
|
|
|
|
{
|
2017-03-22 19:27:49 +00:00
|
|
|
if (xmon_on)
|
2006-10-03 04:12:08 +00:00
|
|
|
xmon_init(1);
|
|
|
|
if (xmon_early)
|
|
|
|
debugger(NULL);
|
|
|
|
}
|
2006-10-24 16:31:27 +00:00
|
|
|
|
2006-11-27 18:18:55 +00:00
|
|
|
#ifdef CONFIG_SPU_BASE
|
2006-10-24 16:31:27 +00:00
|
|
|
|
|
|
|
struct spu_info {
|
|
|
|
struct spu *spu;
|
|
|
|
u64 saved_mfc_sr1_RW;
|
|
|
|
u32 saved_spu_runcntl_RW;
|
2006-11-22 23:46:41 +00:00
|
|
|
unsigned long dump_addr;
|
2006-10-24 16:31:27 +00:00
|
|
|
u8 stopped_ok;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define XMON_NUM_SPUS 16 /* Enough for current hardware */
|
|
|
|
|
|
|
|
static struct spu_info spu_info[XMON_NUM_SPUS];
|
|
|
|
|
|
|
|
void xmon_register_spus(struct list_head *list)
|
|
|
|
{
|
|
|
|
struct spu *spu;
|
|
|
|
|
|
|
|
list_for_each_entry(spu, list, full_list) {
|
|
|
|
if (spu->number >= XMON_NUM_SPUS) {
|
|
|
|
WARN_ON(1);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
spu_info[spu->number].spu = spu;
|
|
|
|
spu_info[spu->number].stopped_ok = 0;
|
2006-11-22 23:46:41 +00:00
|
|
|
spu_info[spu->number].dump_addr = (unsigned long)
|
|
|
|
spu_info[spu->number].spu->local_store;
|
2006-10-24 16:31:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void stop_spus(void)
|
|
|
|
{
|
|
|
|
struct spu *spu;
|
2021-04-29 08:06:38 +00:00
|
|
|
volatile int i;
|
2006-10-24 16:31:27 +00:00
|
|
|
u64 tmp;
|
|
|
|
|
|
|
|
for (i = 0; i < XMON_NUM_SPUS; i++) {
|
|
|
|
if (!spu_info[i].spu)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
|
|
|
spu = spu_info[i].spu;
|
|
|
|
|
|
|
|
spu_info[i].saved_spu_runcntl_RW =
|
|
|
|
in_be32(&spu->problem->spu_runcntl_RW);
|
|
|
|
|
|
|
|
tmp = spu_mfc_sr1_get(spu);
|
|
|
|
spu_info[i].saved_mfc_sr1_RW = tmp;
|
|
|
|
|
|
|
|
tmp &= ~MFC_STATE1_MASTER_RUN_CONTROL_MASK;
|
|
|
|
spu_mfc_sr1_set(spu, tmp);
|
|
|
|
|
|
|
|
sync();
|
|
|
|
__delay(200);
|
|
|
|
|
|
|
|
spu_info[i].stopped_ok = 1;
|
2006-11-22 23:46:40 +00:00
|
|
|
|
|
|
|
printf("Stopped spu %.2d (was %s)\n", i,
|
|
|
|
spu_info[i].saved_spu_runcntl_RW ?
|
|
|
|
"running" : "stopped");
|
2006-10-24 16:31:27 +00:00
|
|
|
} else {
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
printf("*** Error stopping spu %.2d\n", i);
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void restart_spus(void)
|
|
|
|
{
|
|
|
|
struct spu *spu;
|
2021-04-29 08:06:38 +00:00
|
|
|
volatile int i;
|
2006-10-24 16:31:27 +00:00
|
|
|
|
|
|
|
for (i = 0; i < XMON_NUM_SPUS; i++) {
|
|
|
|
if (!spu_info[i].spu)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!spu_info[i].stopped_ok) {
|
|
|
|
printf("*** Error, spu %d was not successfully stopped"
|
|
|
|
", not restarting\n", i);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
|
|
|
|
spu = spu_info[i].spu;
|
|
|
|
spu_mfc_sr1_set(spu, spu_info[i].saved_mfc_sr1_RW);
|
|
|
|
out_be32(&spu->problem->spu_runcntl_RW,
|
|
|
|
spu_info[i].saved_spu_runcntl_RW);
|
|
|
|
|
|
|
|
sync();
|
|
|
|
__delay(200);
|
|
|
|
|
|
|
|
printf("Restarted spu %.2d\n", i);
|
|
|
|
} else {
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
printf("*** Error restarting spu %.2d\n", i);
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-10-24 16:31:28 +00:00
|
|
|
#define DUMP_WIDTH 23
|
2006-11-22 23:46:39 +00:00
|
|
|
#define DUMP_VALUE(format, field, value) \
|
2006-10-24 16:31:28 +00:00
|
|
|
do { \
|
|
|
|
if (setjmp(bus_error_jmp) == 0) { \
|
|
|
|
catch_memory_errors = 1; \
|
|
|
|
sync(); \
|
|
|
|
printf(" %-*s = "format"\n", DUMP_WIDTH, \
|
2006-11-22 23:46:39 +00:00
|
|
|
#field, value); \
|
2006-10-24 16:31:28 +00:00
|
|
|
sync(); \
|
|
|
|
__delay(200); \
|
|
|
|
} else { \
|
|
|
|
catch_memory_errors = 0; \
|
|
|
|
printf(" %-*s = *** Error reading field.\n", \
|
|
|
|
DUMP_WIDTH, #field); \
|
|
|
|
} \
|
|
|
|
catch_memory_errors = 0; \
|
|
|
|
} while (0)
|
|
|
|
|
2006-11-22 23:46:39 +00:00
|
|
|
#define DUMP_FIELD(obj, format, field) \
|
|
|
|
DUMP_VALUE(format, field, obj->field)
|
|
|
|
|
2006-10-24 16:31:28 +00:00
|
|
|
static void dump_spu_fields(struct spu *spu)
|
|
|
|
{
|
|
|
|
printf("Dumping spu fields at address %p:\n", spu);
|
|
|
|
|
|
|
|
DUMP_FIELD(spu, "0x%x", number);
|
|
|
|
DUMP_FIELD(spu, "%s", name);
|
|
|
|
DUMP_FIELD(spu, "0x%lx", local_store_phys);
|
|
|
|
DUMP_FIELD(spu, "0x%p", local_store);
|
|
|
|
DUMP_FIELD(spu, "0x%lx", ls_size);
|
|
|
|
DUMP_FIELD(spu, "0x%x", node);
|
|
|
|
DUMP_FIELD(spu, "0x%lx", flags);
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP_FIELD(spu, "%llu", class_0_pending);
|
|
|
|
DUMP_FIELD(spu, "0x%llx", class_0_dar);
|
|
|
|
DUMP_FIELD(spu, "0x%llx", class_1_dar);
|
|
|
|
DUMP_FIELD(spu, "0x%llx", class_1_dsisr);
|
|
|
|
DUMP_FIELD(spu, "0x%x", irqs[0]);
|
|
|
|
DUMP_FIELD(spu, "0x%x", irqs[1]);
|
|
|
|
DUMP_FIELD(spu, "0x%x", irqs[2]);
|
2006-10-24 16:31:28 +00:00
|
|
|
DUMP_FIELD(spu, "0x%x", slb_replace);
|
|
|
|
DUMP_FIELD(spu, "%d", pid);
|
|
|
|
DUMP_FIELD(spu, "0x%p", mm);
|
|
|
|
DUMP_FIELD(spu, "0x%p", ctx);
|
|
|
|
DUMP_FIELD(spu, "0x%p", rq);
|
2018-03-25 09:06:47 +00:00
|
|
|
DUMP_FIELD(spu, "0x%llx", timestamp);
|
2006-10-24 16:31:28 +00:00
|
|
|
DUMP_FIELD(spu, "0x%lx", problem_phys);
|
|
|
|
DUMP_FIELD(spu, "0x%p", problem);
|
2006-11-22 23:46:39 +00:00
|
|
|
DUMP_VALUE("0x%x", problem->spu_runcntl_RW,
|
|
|
|
in_be32(&spu->problem->spu_runcntl_RW));
|
|
|
|
DUMP_VALUE("0x%x", problem->spu_status_R,
|
|
|
|
in_be32(&spu->problem->spu_status_R));
|
|
|
|
DUMP_VALUE("0x%x", problem->spu_npc_RW,
|
|
|
|
in_be32(&spu->problem->spu_npc_RW));
|
2006-10-24 16:31:28 +00:00
|
|
|
DUMP_FIELD(spu, "0x%p", priv2);
|
2006-11-22 23:46:50 +00:00
|
|
|
DUMP_FIELD(spu, "0x%p", pdata);
|
2006-10-24 16:31:28 +00:00
|
|
|
}
|
|
|
|
|
2021-04-09 07:01:51 +00:00
|
|
|
static int spu_inst_dump(unsigned long adr, long count, int praddr)
|
2006-11-22 23:46:44 +00:00
|
|
|
{
|
|
|
|
return generic_inst_dump(adr, count, praddr, print_insn_spu);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dump_spu_ls(unsigned long num, int subcmd)
|
2006-11-22 23:46:41 +00:00
|
|
|
{
|
|
|
|
unsigned long offset, addr, ls_addr;
|
|
|
|
|
|
|
|
if (setjmp(bus_error_jmp) == 0) {
|
|
|
|
catch_memory_errors = 1;
|
|
|
|
sync();
|
|
|
|
ls_addr = (unsigned long)spu_info[num].spu->local_store;
|
|
|
|
sync();
|
|
|
|
__delay(200);
|
|
|
|
} else {
|
|
|
|
catch_memory_errors = 0;
|
2018-03-25 09:06:47 +00:00
|
|
|
printf("*** Error: accessing spu info for spu %ld\n", num);
|
2006-11-22 23:46:41 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
catch_memory_errors = 0;
|
|
|
|
|
|
|
|
if (scanhex(&offset))
|
|
|
|
addr = ls_addr + offset;
|
|
|
|
else
|
|
|
|
addr = spu_info[num].dump_addr;
|
|
|
|
|
|
|
|
if (addr >= ls_addr + LS_SIZE) {
|
|
|
|
printf("*** Error: address outside of local store\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2006-11-22 23:46:44 +00:00
|
|
|
switch (subcmd) {
|
|
|
|
case 'i':
|
|
|
|
addr += spu_inst_dump(addr, 16, 1);
|
|
|
|
last_cmd = "sdi\n";
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
prdump(addr, 64);
|
|
|
|
addr += 64;
|
|
|
|
last_cmd = "sd\n";
|
|
|
|
break;
|
|
|
|
}
|
2006-11-22 23:46:41 +00:00
|
|
|
|
|
|
|
spu_info[num].dump_addr = addr;
|
|
|
|
}
|
|
|
|
|
2006-10-24 16:31:27 +00:00
|
|
|
static int do_spu_cmd(void)
|
|
|
|
{
|
2006-11-22 23:46:41 +00:00
|
|
|
static unsigned long num = 0;
|
2006-11-22 23:46:44 +00:00
|
|
|
int cmd, subcmd = 0;
|
2006-10-24 16:31:27 +00:00
|
|
|
|
|
|
|
cmd = inchar();
|
|
|
|
switch (cmd) {
|
|
|
|
case 's':
|
|
|
|
stop_spus();
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
restart_spus();
|
|
|
|
break;
|
2006-11-22 23:46:41 +00:00
|
|
|
case 'd':
|
2006-11-22 23:46:44 +00:00
|
|
|
subcmd = inchar();
|
|
|
|
if (isxdigit(subcmd) || subcmd == '\n')
|
|
|
|
termch = subcmd;
|
2020-07-27 22:42:01 +00:00
|
|
|
fallthrough;
|
2006-11-22 23:46:44 +00:00
|
|
|
case 'f':
|
2006-11-22 23:46:41 +00:00
|
|
|
scanhex(&num);
|
|
|
|
if (num >= XMON_NUM_SPUS || !spu_info[num].spu) {
|
2006-10-24 16:31:28 +00:00
|
|
|
printf("*** Error: invalid spu number\n");
|
2006-11-22 23:46:41 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case 'f':
|
|
|
|
dump_spu_fields(spu_info[num].spu);
|
|
|
|
break;
|
|
|
|
default:
|
2006-11-22 23:46:44 +00:00
|
|
|
dump_spu_ls(num, subcmd);
|
2006-11-22 23:46:41 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2006-10-24 16:31:28 +00:00
|
|
|
break;
|
2006-10-24 16:31:27 +00:00
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2006-11-27 18:18:55 +00:00
|
|
|
#else /* ! CONFIG_SPU_BASE */
|
2006-10-24 16:31:27 +00:00
|
|
|
static int do_spu_cmd(void)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
#endif
|