/* * Copyright (c) 2000-2012 Apple Inc. All rights reserved. * * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. The rights granted to you under the License * may not be used to create, or enable the creation or redistribution of, * unlawful or unlicensed copies of an Apple operating system, or to * circumvent, violate, or enable the circumvention or violation of, any * terms of an Apple operating system software license agreement. * * Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ */ #include #include #include #include #include #include #include #include #include #include #include #include /* bcopy */ #include #include #include #include #include #include #include #include #define DO_ALIGN 1 /* align all packet data accesses */ #define KDP_TEST_HARNESS 0 #if KDP_TEST_HARNESS #define dprintf(x) kprintf x #else #define dprintf(x) #endif SECURITY_READ_ONLY_EARLY(static kdp_dispatch_t) dispatch_table[KDP_INVALID_REQUEST - KDP_CONNECT] = { /* 0 */ kdp_connect, /* 1 */ kdp_disconnect, /* 2 */ kdp_hostinfo, /* 3 */ kdp_version, /* 4 */ kdp_maxbytes, /* 5 */ kdp_readmem, /* 6 */ kdp_writemem, /* 7 */ kdp_readregs, /* 8 */ kdp_writeregs, /* 9 */ kdp_unknown, /* A */ kdp_unknown, /* B */ kdp_suspend, /* C */ kdp_resumecpus, /* D */ kdp_unknown, /* E */ kdp_unknown, /* F */ kdp_breakpoint_set, /*10 */ kdp_breakpoint_remove, /*11 */ kdp_regions, /*12 */ kdp_reattach, /*13 */ kdp_reboot, /*14 */ kdp_readmem64, /*15 */ kdp_writemem64, /*16 */ kdp_breakpoint64_set, /*17 */ kdp_breakpoint64_remove, /*18 */ kdp_kernelversion, /*19 */ kdp_readphysmem64, /*1A */ kdp_writephysmem64, /*1B */ kdp_readioport, /*1C */ kdp_writeioport, /*1D */ kdp_readmsr64, /*1E */ kdp_writemsr64, /*1F */ kdp_dumpinfo, }; kdp_glob_t kdp; #define MAX_BREAKPOINTS 100 /* * Version 11 of the KDP Protocol adds support for 64-bit wide memory * addresses (read/write and breakpoints) as well as a dedicated * kernelversion request. Version 12 adds read/writing of physical * memory with 64-bit wide memory addresses. */ #define KDP_VERSION 12 typedef struct{ mach_vm_address_t address; uint32_t bytesused; uint8_t oldbytes[MAX_BREAKINSN_BYTES]; } kdp_breakpoint_record_t; static kdp_breakpoint_record_t breakpoint_list[MAX_BREAKPOINTS]; static unsigned int breakpoints_initialized = 0; int reattach_wait = 0; int noresume_on_disconnect = 0; kdp_error_t kdp_set_breakpoint_internal( mach_vm_address_t address ); kdp_error_t kdp_remove_breakpoint_internal( mach_vm_address_t address ); boolean_t kdp_packet( unsigned char *pkt, int *len, unsigned short *reply_port ) { static unsigned aligned_pkt[1538 / sizeof(unsigned) + 1];// max ether pkt kdp_pkt_t *rd = (kdp_pkt_t *)&aligned_pkt; size_t plen = *len; kdp_req_t req; boolean_t ret; #if DO_ALIGN if (plen > sizeof(aligned_pkt)) { printf("kdp_packet bad len %lu\n", plen); return FALSE; } bcopy((char *)pkt, (char *)rd, plen); #else rd = (kdp_pkt_t *)pkt; #endif if (plen < sizeof(rd->hdr) || rd->hdr.len != plen) { printf("kdp_packet bad len pkt %lu hdr %d\n", plen, rd->hdr.len); return FALSE; } if (rd->hdr.is_reply) { printf("kdp_packet reply recvd req %x seq %x\n", rd->hdr.request, rd->hdr.seq); return FALSE; } req = rd->hdr.request; if (req >= KDP_INVALID_REQUEST) { printf("kdp_packet bad request %x len %d seq %x key %x\n", rd->hdr.request, rd->hdr.len, rd->hdr.seq, rd->hdr.key); return FALSE; } ret = ((*dispatch_table[req - KDP_CONNECT])(rd, len, reply_port)); #if DO_ALIGN bcopy((char *)rd, (char *) pkt, *len); #endif return ret; } static boolean_t kdp_unknown( kdp_pkt_t *pkt, __unused int *len, __unused unsigned short *reply_port ) { kdp_pkt_t *rd = (kdp_pkt_t *)pkt; printf("kdp_unknown request %x len %d seq %x key %x\n", rd->hdr.request, rd->hdr.len, rd->hdr.seq, rd->hdr.key); return FALSE; } static boolean_t kdp_connect( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_connect_req_t *rq = &pkt->connect_req; size_t plen = *len; kdp_connect_reply_t *rp = &pkt->connect_reply; uint16_t rport, eport; uint32_t key; uint8_t seq; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_connect seq %x greeting %s\n", rq->hdr.seq, rq->greeting)); rport = rq->req_reply_port; eport = rq->exc_note_port; key = rq->hdr.key; seq = rq->hdr.seq; if (kdp.is_conn) { if ((seq == kdp.conn_seq) && /* duplicate request */ (rport == kdp.reply_port) && (eport == kdp.exception_port) && (key == kdp.session_key)) { rp->error = KDPERR_NO_ERROR; } else { rp->error = KDPERR_ALREADY_CONNECTED; } } else { kdp.reply_port = rport; kdp.exception_port = eport; kdp.is_conn = TRUE; kdp.conn_seq = seq; kdp.session_key = key; rp->error = KDPERR_NO_ERROR; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = rport; *len = rp->hdr.len; if (current_debugger == KDP_CUR_DB) { active_debugger = 1; } return TRUE; } static boolean_t kdp_disconnect( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_disconnect_req_t *rq = &pkt->disconnect_req; size_t plen = *len; kdp_disconnect_reply_t *rp = &pkt->disconnect_reply; if (plen < sizeof(*rq)) { return FALSE; } if (!kdp.is_conn) { return FALSE; } dprintf(("kdp_disconnect\n")); *reply_port = kdp.reply_port; kdp.reply_port = kdp.exception_port = 0; kdp.is_halted = kdp.is_conn = FALSE; kdp.exception_seq = kdp.conn_seq = 0; kdp.session_key = 0; if (debugger_panic_str != NULL) { reattach_wait = 1; } if (noresume_on_disconnect == 1) { reattach_wait = 1; noresume_on_disconnect = 0; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *len = rp->hdr.len; if (current_debugger == KDP_CUR_DB) { active_debugger = 0; } return TRUE; } static boolean_t kdp_reattach( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_reattach_req_t *rq = &pkt->reattach_req; kdp.is_conn = TRUE; kdp_disconnect(pkt, len, reply_port); *reply_port = rq->req_reply_port; reattach_wait = 1; return TRUE; } static boolean_t kdp_hostinfo( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_hostinfo_req_t *rq = &pkt->hostinfo_req; size_t plen = *len; kdp_hostinfo_reply_t *rp = &pkt->hostinfo_reply; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_hostinfo\n")); rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); kdp_machine_hostinfo(&rp->hostinfo); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_kernelversion( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_kernelversion_req_t *rq = &pkt->kernelversion_req; size_t plen = *len; kdp_kernelversion_reply_t *rp = &pkt->kernelversion_reply; size_t slen; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); dprintf(("kdp_kernelversion\n")); slen = strlcpy(rp->version, kdp_kernelversion_string, MAX_KDP_DATA_SIZE); rp->hdr.len += slen + 1; /* strlcpy returns the amount copied with NUL */ *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_suspend( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_suspend_req_t *rq = &pkt->suspend_req; size_t plen = *len; kdp_suspend_reply_t *rp = &pkt->suspend_reply; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); dprintf(("kdp_suspend\n")); kdp.is_halted = TRUE; *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_resumecpus( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_resumecpus_req_t *rq = &pkt->resumecpus_req; size_t plen = *len; kdp_resumecpus_reply_t *rp = &pkt->resumecpus_reply; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); dprintf(("kdp_resumecpus %x\n", rq->cpu_mask)); kdp.is_halted = FALSE; *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_writemem( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_writemem_req_t *rq = &pkt->writemem_req; size_t plen = *len; kdp_writemem_reply_t *rp = &pkt->writemem_reply; mach_vm_size_t cnt; if (plen < sizeof(*rq)) { return FALSE; } if (rq->nbytes > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { dprintf(("kdp_writemem addr %x size %d\n", rq->address, rq->nbytes)); cnt = kdp_machine_vm_write((caddr_t)rq->data, (mach_vm_address_t)rq->address, rq->nbytes); rp->error = KDPERR_ACCESS(rq->nbytes, cnt); dprintf((" cnt %lld error %d\n", cnt, rp->error)); } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_writemem64( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_writemem64_req_t *rq = &pkt->writemem64_req; size_t plen = *len; kdp_writemem64_reply_t *rp = &pkt->writemem64_reply; mach_vm_size_t cnt; if (plen < sizeof(*rq)) { return FALSE; } if (rq->nbytes > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { dprintf(("kdp_writemem64 addr %llx size %d\n", rq->address, rq->nbytes)); cnt = kdp_machine_vm_write((caddr_t)rq->data, (mach_vm_address_t)rq->address, (mach_vm_size_t)rq->nbytes); rp->error = KDPERR_ACCESS(rq->nbytes, cnt); dprintf((" cnt %lld error %d\n", cnt, rp->error)); } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_writephysmem64( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_writephysmem64_req_t *rq = &pkt->writephysmem64_req; size_t plen = *len; kdp_writephysmem64_reply_t *rp = &pkt->writephysmem64_reply; mach_vm_size_t cnt; unsigned int size; if (plen < sizeof(*rq)) { return FALSE; } size = rq->nbytes; if (size > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { dprintf(("kdp_writephysmem64 addr %llx size %d\n", rq->address, size)); cnt = kdp_machine_phys_write(rq, rq->data, rq->lcpu); rp->error = KDPERR_ACCESS(size, cnt); dprintf((" cnt %lld error %d\n", cnt, rp->error)); } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_readmem( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_readmem_req_t *rq = &pkt->readmem_req; size_t plen = *len; kdp_readmem_reply_t *rp = &pkt->readmem_reply; mach_vm_size_t cnt; unsigned int size; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); size = rq->nbytes; if (size > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { dprintf(("kdp_readmem addr %x size %d\n", rq->address, size)); cnt = kdp_machine_vm_read((mach_vm_address_t)rq->address, (caddr_t)rp->data, rq->nbytes); rp->error = KDPERR_ACCESS(size, cnt); dprintf((" cnt %lld error %d\n", cnt, rp->error)); rp->hdr.len += cnt; } *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_readmem64( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_readmem64_req_t *rq = &pkt->readmem64_req; size_t plen = *len; kdp_readmem64_reply_t *rp = &pkt->readmem64_reply; mach_vm_size_t cnt; unsigned int size; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); size = rq->nbytes; if (size > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { dprintf(("kdp_readmem64 addr %llx size %d\n", rq->address, size)); cnt = kdp_machine_vm_read((mach_vm_address_t)rq->address, (caddr_t)rp->data, rq->nbytes); rp->error = KDPERR_ACCESS(size, cnt); dprintf((" cnt %lld error %d\n", cnt, rp->error)); rp->hdr.len += cnt; } *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_readphysmem64( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_readphysmem64_req_t *rq = &pkt->readphysmem64_req; size_t plen = *len; kdp_readphysmem64_reply_t *rp = &pkt->readphysmem64_reply; mach_vm_size_t cnt; unsigned int size; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); size = rq->nbytes; if (size > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { dprintf(("kdp_readphysmem64 addr %llx size %d\n", rq->address, size)); cnt = kdp_machine_phys_read(rq, rp->data, rq->lcpu); rp->error = KDPERR_ACCESS(size, cnt); dprintf((" cnt %lld error %d\n", cnt, rp->error)); rp->hdr.len += cnt; } *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_maxbytes( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_maxbytes_req_t *rq = &pkt->maxbytes_req; size_t plen = *len; kdp_maxbytes_reply_t *rp = &pkt->maxbytes_reply; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); dprintf(("kdp_maxbytes\n")); rp->max_bytes = MAX_KDP_DATA_SIZE; *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_version( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_version_req_t *rq = &pkt->version_req; size_t plen = *len; kdp_version_reply_t *rp = &pkt->version_reply; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); dprintf(("kdp_version\n")); rp->version = KDP_VERSION; if (!(kdp_flag & KDP_BP_DIS)) { rp->feature = KDP_FEATURE_BP; } else { rp->feature = 0; } *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_regions( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_regions_req_t *rq = &pkt->regions_req; size_t plen = *len; kdp_regions_reply_t *rp = &pkt->regions_reply; kdp_region_t *r; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); dprintf(("kdp_regions\n")); r = rp->regions; rp->nregions = 0; r->address = 0; r->nbytes = 0xffffffff; r->protection = VM_PROT_ALL; r++; rp->nregions++; rp->hdr.len += rp->nregions * sizeof(kdp_region_t); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_writeregs( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_writeregs_req_t *rq = &pkt->writeregs_req; size_t plen = *len; int size; kdp_writeregs_reply_t *rp = &pkt->writeregs_reply; if (plen < sizeof(*rq)) { return FALSE; } size = rq->hdr.len - (unsigned)sizeof(kdp_hdr_t) - (unsigned)sizeof(unsigned int); rp->error = kdp_machine_write_regs(rq->cpu, rq->flavor, rq->data, &size); rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_readregs( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_readregs_req_t *rq = &pkt->readregs_req; size_t plen = *len; kdp_readregs_reply_t *rp = &pkt->readregs_reply; int size; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); rp->error = kdp_machine_read_regs(rq->cpu, rq->flavor, rp->data, &size); rp->hdr.len += size; *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } boolean_t kdp_breakpoint_set( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_breakpoint_req_t *rq = &pkt->breakpoint_req; kdp_breakpoint_reply_t *rp = &pkt->breakpoint_reply; size_t plen = *len; kdp_error_t kerr; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_breakpoint_set %x\n", rq->address)); kerr = kdp_set_breakpoint_internal((mach_vm_address_t)rq->address); rp->error = kerr; rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } boolean_t kdp_breakpoint64_set( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_breakpoint64_req_t *rq = &pkt->breakpoint64_req; kdp_breakpoint64_reply_t *rp = &pkt->breakpoint64_reply; size_t plen = *len; kdp_error_t kerr; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_breakpoint64_set %llx\n", rq->address)); kerr = kdp_set_breakpoint_internal((mach_vm_address_t)rq->address); rp->error = kerr; rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } boolean_t kdp_breakpoint_remove( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_breakpoint_req_t *rq = &pkt->breakpoint_req; kdp_breakpoint_reply_t *rp = &pkt->breakpoint_reply; size_t plen = *len; kdp_error_t kerr; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_breakpoint_remove %x\n", rq->address)); kerr = kdp_remove_breakpoint_internal((mach_vm_address_t)rq->address); rp->error = kerr; rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } boolean_t kdp_breakpoint64_remove( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_breakpoint64_req_t *rq = &pkt->breakpoint64_req; kdp_breakpoint64_reply_t *rp = &pkt->breakpoint64_reply; size_t plen = *len; kdp_error_t kerr; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_breakpoint64_remove %llx\n", rq->address)); kerr = kdp_remove_breakpoint_internal((mach_vm_address_t)rq->address); rp->error = kerr; rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } kdp_error_t kdp_set_breakpoint_internal( mach_vm_address_t address ) { uint8_t breakinstr[MAX_BREAKINSN_BYTES], oldinstr[MAX_BREAKINSN_BYTES]; uint32_t breakinstrsize = sizeof(breakinstr); mach_vm_size_t cnt; int i; kdp_machine_get_breakinsn(breakinstr, &breakinstrsize); if (breakpoints_initialized == 0) { for (i = 0; (i < MAX_BREAKPOINTS); breakpoint_list[i].address = 0, i++) { ; } breakpoints_initialized++; } cnt = kdp_machine_vm_read(address, (caddr_t)&oldinstr, (mach_vm_size_t)breakinstrsize); if (0 == memcmp(oldinstr, breakinstr, breakinstrsize)) { printf("A trap was already set at that address, not setting new breakpoint\n"); return KDPERR_BREAKPOINT_ALREADY_SET; } for (i = 0; (i < MAX_BREAKPOINTS) && (breakpoint_list[i].address != 0); i++) { ; } if (i == MAX_BREAKPOINTS) { return KDPERR_MAX_BREAKPOINTS; } breakpoint_list[i].address = address; memcpy(breakpoint_list[i].oldbytes, oldinstr, breakinstrsize); breakpoint_list[i].bytesused = breakinstrsize; cnt = kdp_machine_vm_write((caddr_t)&breakinstr, address, breakinstrsize); return KDPERR_NO_ERROR; } kdp_error_t kdp_remove_breakpoint_internal( mach_vm_address_t address ) { mach_vm_size_t cnt; int i; for (i = 0; (i < MAX_BREAKPOINTS) && (breakpoint_list[i].address != address); i++) { ; } if (i == MAX_BREAKPOINTS) { return KDPERR_BREAKPOINT_NOT_FOUND; } breakpoint_list[i].address = 0; cnt = kdp_machine_vm_write((caddr_t)&breakpoint_list[i].oldbytes, address, breakpoint_list[i].bytesused); return KDPERR_NO_ERROR; } boolean_t kdp_remove_all_breakpoints(void) { int i; boolean_t breakpoint_found = FALSE; if (breakpoints_initialized) { for (i = 0; i < MAX_BREAKPOINTS; i++) { if (breakpoint_list[i].address) { kdp_machine_vm_write((caddr_t)&(breakpoint_list[i].oldbytes), (mach_vm_address_t)breakpoint_list[i].address, (mach_vm_size_t)breakpoint_list[i].bytesused); breakpoint_found = TRUE; breakpoint_list[i].address = 0; } } if (breakpoint_found) { printf("kdp_remove_all_breakpoints: found extant breakpoints, removing them.\n"); } } return breakpoint_found; } boolean_t kdp_reboot( __unused kdp_pkt_t *pkt, __unused int *len, __unused unsigned short *reply_port ) { dprintf(("kdp_reboot\n")); kdp_machine_reboot(); return TRUE; // no, not really, we won't return } static boolean_t kdp_readioport( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_readioport_req_t *rq = &pkt->readioport_req; kdp_readioport_reply_t *rp = &pkt->readioport_reply; size_t plen = *len; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); if (rq->nbytes > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { #if KDP_TEST_HARNESS uint16_t addr = rq->address; #endif uint16_t size = rq->nbytes; dprintf(("kdp_readioport addr %x size %d\n", addr, size)); rp->error = kdp_machine_ioport_read(rq, rp->data, rq->lcpu); if (rp->error == KDPERR_NO_ERROR) { rp->hdr.len += size; } } *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_writeioport( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_writeioport_req_t *rq = &pkt->writeioport_req; kdp_writeioport_reply_t *rp = &pkt->writeioport_reply; size_t plen = *len; if (plen < sizeof(*rq)) { return FALSE; } if (rq->nbytes > MAX_KDP_DATA_SIZE) { rp->error = KDPERR_BAD_NBYTES; } else { dprintf(("kdp_writeioport addr %x size %d\n", rq->address, rq->nbytes)); rp->error = kdp_machine_ioport_write(rq, rq->data, rq->lcpu); } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_readmsr64( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_readmsr64_req_t *rq = &pkt->readmsr64_req; kdp_readmsr64_reply_t *rp = &pkt->readmsr64_reply; size_t plen = *len; if (plen < sizeof(*rq)) { return FALSE; } rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); dprintf(("kdp_readmsr64 lcpu %x addr %x\n", rq->lcpu, rq->address)); rp->error = kdp_machine_msr64_read(rq, rp->data, rq->lcpu); if (rp->error == KDPERR_NO_ERROR) { rp->hdr.len += sizeof(uint64_t); } *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_writemsr64( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_writemsr64_req_t *rq = &pkt->writemsr64_req; kdp_writemsr64_reply_t *rp = &pkt->writemsr64_reply; size_t plen = *len; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_writemsr64 lcpu %x addr %x\n", rq->lcpu, rq->address)); rp->error = kdp_machine_msr64_write(rq, rq->data, rq->lcpu); rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; } static boolean_t kdp_dumpinfo( kdp_pkt_t *pkt, int *len, unsigned short *reply_port ) { kdp_dumpinfo_req_t *rq = &pkt->dumpinfo_req; kdp_dumpinfo_reply_t *rp = &pkt->dumpinfo_reply; size_t plen = *len; if (plen < sizeof(*rq)) { return FALSE; } dprintf(("kdp_dumpinfo file=%s destip=%s routerip=%s\n", rq->name, rq->destip, rq->routerip)); rp->hdr.is_reply = 1; rp->hdr.len = sizeof(*rp); if ((rq->type & KDP_DUMPINFO_MASK) != KDP_DUMPINFO_GETINFO) { kdp_set_dump_info(rq->type, rq->name, rq->destip, rq->routerip, rq->port); } /* gather some stats for reply */ kdp_get_dump_info(rp); *reply_port = kdp.reply_port; *len = rp->hdr.len; return TRUE; }