mirror of
https://github.com/mupen64plus/mupen64plus-oldsvn.git
synced 2025-04-02 10:52:35 -04:00
152 lines
5.2 KiB
C
152 lines
5.2 KiB
C
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
|
* Mupen64plus - decoder.h *
|
|
* Mupen64Plus homepage: http://code.google.com/p/mupen64plus/ *
|
|
* Copyright (C) 2008 DarkJeztr HyperHacker *
|
|
* *
|
|
* This program is free software; you can redistribute it and/or modify *
|
|
* it under the terms of the GNU General Public License as published by *
|
|
* the Free Software Foundation; either version 2 of the License, or *
|
|
* (at your option) any later version. *
|
|
* *
|
|
* This program is distributed in the hope that it will be useful, *
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
|
|
* GNU General Public License for more details. *
|
|
* *
|
|
* You should have received a copy of the GNU General Public License *
|
|
* along with this program; if not, write to the *
|
|
* Free Software Foundation, Inc., *
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. *
|
|
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
|
|
|
|
#include <SDL.h>
|
|
#include <SDL_thread.h>
|
|
|
|
#include "breakpoints.h"
|
|
|
|
int g_NumBreakpoints=0;
|
|
breakpoint g_Breakpoints[BREAKPOINTS_MAX_NUMBER];
|
|
|
|
|
|
int add_breakpoint( uint32 address )
|
|
{
|
|
if( g_NumBreakpoints == BREAKPOINTS_MAX_NUMBER ) {
|
|
printf("BREAKPOINTS_MAX_NUMBER have been reached.\n");//REMOVE ME
|
|
return -1;
|
|
}
|
|
g_Breakpoints[g_NumBreakpoints].address=address;
|
|
g_Breakpoints[g_NumBreakpoints].endaddr=address;
|
|
BPT_SET_FLAG(g_Breakpoints[g_NumBreakpoints], BPT_FLAG_EXEC);
|
|
|
|
enable_breakpoint(g_NumBreakpoints);
|
|
|
|
return g_NumBreakpoints++;
|
|
|
|
}
|
|
|
|
int add_breakpoint_struct(breakpoint* newbp)
|
|
{
|
|
if( g_NumBreakpoints == BREAKPOINTS_MAX_NUMBER ) {
|
|
printf("BREAKPOINTS_MAX_NUMBER have been reached.\n");//REMOVE ME
|
|
return -1;
|
|
}
|
|
memcpy(&g_Breakpoints[g_NumBreakpoints], newbp, sizeof(breakpoint));
|
|
printf("newbp %08X - %08X\n", g_Breakpoints[g_NumBreakpoints].address, g_Breakpoints[g_NumBreakpoints].endaddr);
|
|
return g_NumBreakpoints++;
|
|
}
|
|
|
|
void enable_breakpoint( int breakpoint )
|
|
{
|
|
BPT_SET_FLAG(g_Breakpoints[breakpoint], BPT_FLAG_ENABLED);
|
|
//TODO: Must setup breakpoint checks in r4300
|
|
}
|
|
|
|
void disable_breakpoint( int breakpoint )
|
|
{
|
|
BPT_CLEAR_FLAG(g_Breakpoints[breakpoint], BPT_FLAG_ENABLED);
|
|
//TODO: Must setup breakpoint checks in r4300
|
|
}
|
|
|
|
void remove_breakpoint_by_num( int bpt )
|
|
{
|
|
g_Breakpoints[bpt]=g_Breakpoints[--g_NumBreakpoints];
|
|
}
|
|
|
|
void remove_breakpoint_by_address( uint32 address )
|
|
{
|
|
int bpt = lookup_breakpoint( address, 0 );
|
|
if(bpt==-1)
|
|
{
|
|
printf("Tried to remove Nonexistant breakpoint %x!", address);
|
|
}
|
|
else
|
|
remove_breakpoint_by_num( bpt );
|
|
}
|
|
|
|
int lookup_breakpoint( uint32 address, uint32 flags)
|
|
{
|
|
int i=0;
|
|
while( i != g_NumBreakpoints )
|
|
{
|
|
if((address >= g_Breakpoints[i].address) && (address <= g_Breakpoints[i].endaddr) && (!flags || ((g_Breakpoints[i].flags & flags) == flags)))
|
|
{
|
|
//printf("Bpt %d (0x%08X - 0x%08X) matches 0x%08X\n", i, g_Breakpoints[i].address,
|
|
// g_Breakpoints[i].endaddr, address);
|
|
return i;
|
|
}
|
|
else
|
|
i++;
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
int check_breakpoints( uint32 address )
|
|
{
|
|
int bpt=lookup_breakpoint( address, BPT_FLAG_ENABLED | BPT_FLAG_EXEC );
|
|
if( (bpt != -1) && BPT_CHECK_FLAG(g_Breakpoints[bpt], BPT_FLAG_ENABLED))
|
|
return bpt;
|
|
return -1;
|
|
}
|
|
|
|
|
|
int check_breakpoints_on_mem_access( uint32 address, uint32 size, uint32 flags )
|
|
{
|
|
//This function handles memory read/write breakpoints. size specifies the address
|
|
//range to check, flags specifies the flags that all need to be set.
|
|
//It automatically stops and updates the debugger on hit, so the memory access
|
|
//functions only need to call it and can discard the result.
|
|
|
|
int i, bpt;
|
|
for(i=address; i<=(address + size); i++)
|
|
{
|
|
bpt=lookup_breakpoint( address, flags );
|
|
if(bpt != -1)
|
|
{
|
|
if(BPT_CHECK_FLAG(g_Breakpoints[bpt], BPT_FLAG_LOG))
|
|
log_breakpoint(PC->addr, flags, address);
|
|
|
|
run = 0;
|
|
switch_button_to_run();
|
|
update_debugger_frontend();
|
|
|
|
previousPC = PC->addr;
|
|
// Emulation thread is blocked until a button is clicked.
|
|
SDL_CondWait(debugger_done_cond, mutex);
|
|
|
|
return bpt;
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
int log_breakpoint(uint32 PC, uint32 Flag, uint32 Access)
|
|
{
|
|
char msg[32];
|
|
|
|
if(Flag & BPT_FLAG_READ) sprintf(msg, "0x%08X read 0x%08X", PC, Access);
|
|
else if(Flag & BPT_FLAG_WRITE) sprintf(msg, "0x%08X wrote 0x%08X", PC, Access);
|
|
else sprintf(msg, "0x%08X executed", PC);
|
|
printf("BPT: %s\n", msg);
|
|
//todo: log to file
|
|
}
|
|
|