19454b2d8SWarner Losh /*- 2cbc17435SMarcel Moolenaar * Copyright (c) 2004 The FreeBSD Project 3cbc17435SMarcel Moolenaar * All rights reserved. 4cbc17435SMarcel Moolenaar * 5cbc17435SMarcel Moolenaar * Redistribution and use in source and binary forms, with or without 6cbc17435SMarcel Moolenaar * modification, are permitted provided that the following conditions 7cbc17435SMarcel Moolenaar * are met: 8cbc17435SMarcel Moolenaar * 9cbc17435SMarcel Moolenaar * 1. Redistributions of source code must retain the above copyright 10cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer. 11cbc17435SMarcel Moolenaar * 2. Redistributions in binary form must reproduce the above copyright 12cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer in the 13cbc17435SMarcel Moolenaar * documentation and/or other materials provided with the distribution. 14cbc17435SMarcel Moolenaar * 15cbc17435SMarcel Moolenaar * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 16cbc17435SMarcel Moolenaar * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 17cbc17435SMarcel Moolenaar * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 18cbc17435SMarcel Moolenaar * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 19cbc17435SMarcel Moolenaar * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 20cbc17435SMarcel Moolenaar * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 21cbc17435SMarcel Moolenaar * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 22cbc17435SMarcel Moolenaar * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 23cbc17435SMarcel Moolenaar * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 24cbc17435SMarcel Moolenaar * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 25cbc17435SMarcel Moolenaar */ 26cbc17435SMarcel Moolenaar 27cbc17435SMarcel Moolenaar #include <sys/cdefs.h> 28cbc17435SMarcel Moolenaar __FBSDID("$FreeBSD$"); 29cbc17435SMarcel Moolenaar 30f0c6706dSPeter Wemm #include "opt_kdb.h" 31f0c6706dSPeter Wemm 32cbc17435SMarcel Moolenaar #include <sys/param.h> 33cbc17435SMarcel Moolenaar #include <sys/systm.h> 34cbc17435SMarcel Moolenaar #include <sys/kdb.h> 35cbc17435SMarcel Moolenaar #include <sys/kernel.h> 36cbc17435SMarcel Moolenaar #include <sys/malloc.h> 37cbc17435SMarcel Moolenaar #include <sys/pcpu.h> 38cbc17435SMarcel Moolenaar #include <sys/proc.h> 39cbc17435SMarcel Moolenaar #include <sys/smp.h> 40cbc17435SMarcel Moolenaar #include <sys/sysctl.h> 41cbc17435SMarcel Moolenaar 42cbc17435SMarcel Moolenaar #include <machine/kdb.h> 43cbc17435SMarcel Moolenaar #include <machine/pcb.h> 44cbc17435SMarcel Moolenaar 4558553b99SJohn Baldwin #ifdef SMP 46fdc9713bSDoug White #include <machine/smp.h> 47fdc9713bSDoug White #endif 48fdc9713bSDoug White 49cbc17435SMarcel Moolenaar int kdb_active = 0; 507cddab63SWarner Losh static void *kdb_jmpbufp = NULL; 51cbc17435SMarcel Moolenaar struct kdb_dbbe *kdb_dbbe = NULL; 527cddab63SWarner Losh static struct pcb kdb_pcb; 53cbc17435SMarcel Moolenaar struct pcb *kdb_thrctx = NULL; 54cbc17435SMarcel Moolenaar struct thread *kdb_thread = NULL; 55cbc17435SMarcel Moolenaar struct trapframe *kdb_frame = NULL; 56cbc17435SMarcel Moolenaar 57cbc17435SMarcel Moolenaar KDB_BACKEND(null, NULL, NULL, NULL); 58cbc17435SMarcel Moolenaar SET_DECLARE(kdb_dbbe_set, struct kdb_dbbe); 59cbc17435SMarcel Moolenaar 60cbc17435SMarcel Moolenaar static int kdb_sysctl_available(SYSCTL_HANDLER_ARGS); 61cbc17435SMarcel Moolenaar static int kdb_sysctl_current(SYSCTL_HANDLER_ARGS); 62cbc17435SMarcel Moolenaar static int kdb_sysctl_enter(SYSCTL_HANDLER_ARGS); 6340c9966aSPeter Wemm static int kdb_sysctl_panic(SYSCTL_HANDLER_ARGS); 6440c9966aSPeter Wemm static int kdb_sysctl_trap(SYSCTL_HANDLER_ARGS); 6542ccd54fSYaroslav Tykhiy static int kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS); 66cbc17435SMarcel Moolenaar 67cbc17435SMarcel Moolenaar SYSCTL_NODE(_debug, OID_AUTO, kdb, CTLFLAG_RW, NULL, "KDB nodes"); 68cbc17435SMarcel Moolenaar 697cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, available, CTLTYPE_STRING | CTLFLAG_RD, NULL, 707cddab63SWarner Losh 0, kdb_sysctl_available, "A", "list of available KDB backends"); 71cbc17435SMarcel Moolenaar 727cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, current, CTLTYPE_STRING | CTLFLAG_RW, NULL, 737cddab63SWarner Losh 0, kdb_sysctl_current, "A", "currently selected KDB backend"); 74cbc17435SMarcel Moolenaar 757cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, enter, CTLTYPE_INT | CTLFLAG_RW, NULL, 0, 76cbc17435SMarcel Moolenaar kdb_sysctl_enter, "I", "set to enter the debugger"); 77cbc17435SMarcel Moolenaar 787cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, panic, CTLTYPE_INT | CTLFLAG_RW, NULL, 0, 7940c9966aSPeter Wemm kdb_sysctl_panic, "I", "set to panic the kernel"); 8040c9966aSPeter Wemm 817cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, trap, CTLTYPE_INT | CTLFLAG_RW, NULL, 0, 8242ccd54fSYaroslav Tykhiy kdb_sysctl_trap, "I", "set to cause a page fault via data access"); 8342ccd54fSYaroslav Tykhiy 847cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, trap_code, CTLTYPE_INT | CTLFLAG_RW, NULL, 0, 8542ccd54fSYaroslav Tykhiy kdb_sysctl_trap_code, "I", "set to cause a page fault via code access"); 8640c9966aSPeter Wemm 87d8939d82SRobert Watson /* 88d8939d82SRobert Watson * Flag indicating whether or not to IPI the other CPUs to stop them on 89d8939d82SRobert Watson * entering the debugger. Sometimes, this will result in a deadlock as 90d8939d82SRobert Watson * stop_cpus() waits for the other cpus to stop, so we allow it to be 91d8939d82SRobert Watson * disabled. 92d8939d82SRobert Watson */ 93d8939d82SRobert Watson #ifdef SMP 94d8939d82SRobert Watson static int kdb_stop_cpus = 1; 95d8939d82SRobert Watson SYSCTL_INT(_debug_kdb, OID_AUTO, stop_cpus, CTLTYPE_INT | CTLFLAG_RW, 96374875faSEd Maste &kdb_stop_cpus, 0, "stop other CPUs when entering the debugger"); 97d963815bSRobert Watson TUNABLE_INT("debug.kdb.stop_cpus", &kdb_stop_cpus); 98d8939d82SRobert Watson #endif 99d8939d82SRobert Watson 1003de213ccSRobert Watson /* 1013de213ccSRobert Watson * Flag to indicate to debuggers why the debugger was entered. 1023de213ccSRobert Watson */ 1033de213ccSRobert Watson const char * volatile kdb_why = KDB_WHY_UNSET; 1043de213ccSRobert Watson 105cbc17435SMarcel Moolenaar static int 106cbc17435SMarcel Moolenaar kdb_sysctl_available(SYSCTL_HANDLER_ARGS) 107cbc17435SMarcel Moolenaar { 108cbc17435SMarcel Moolenaar struct kdb_dbbe *be, **iter; 109cbc17435SMarcel Moolenaar char *avail, *p; 110cbc17435SMarcel Moolenaar ssize_t len, sz; 111cbc17435SMarcel Moolenaar int error; 112cbc17435SMarcel Moolenaar 113cbc17435SMarcel Moolenaar sz = 0; 114cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 115cbc17435SMarcel Moolenaar be = *iter; 116cbc17435SMarcel Moolenaar if (be->dbbe_active == 0) 117cbc17435SMarcel Moolenaar sz += strlen(be->dbbe_name) + 1; 118cbc17435SMarcel Moolenaar } 119cbc17435SMarcel Moolenaar sz++; 120cbc17435SMarcel Moolenaar avail = malloc(sz, M_TEMP, M_WAITOK); 121cbc17435SMarcel Moolenaar p = avail; 122f742a1edSStephan Uphoff *p = '\0'; 123f742a1edSStephan Uphoff 124cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 125cbc17435SMarcel Moolenaar be = *iter; 126cbc17435SMarcel Moolenaar if (be->dbbe_active == 0) { 127cbc17435SMarcel Moolenaar len = snprintf(p, sz, "%s ", be->dbbe_name); 128cbc17435SMarcel Moolenaar p += len; 129cbc17435SMarcel Moolenaar sz -= len; 130cbc17435SMarcel Moolenaar } 131cbc17435SMarcel Moolenaar } 132cbc17435SMarcel Moolenaar KASSERT(sz >= 0, ("%s", __func__)); 133cbc17435SMarcel Moolenaar error = sysctl_handle_string(oidp, avail, 0, req); 134cbc17435SMarcel Moolenaar free(avail, M_TEMP); 135cbc17435SMarcel Moolenaar return (error); 136cbc17435SMarcel Moolenaar } 137cbc17435SMarcel Moolenaar 138cbc17435SMarcel Moolenaar static int 139cbc17435SMarcel Moolenaar kdb_sysctl_current(SYSCTL_HANDLER_ARGS) 140cbc17435SMarcel Moolenaar { 141cbc17435SMarcel Moolenaar char buf[16]; 142cbc17435SMarcel Moolenaar int error; 143cbc17435SMarcel Moolenaar 144a8bfba1aSMarcel Moolenaar if (kdb_dbbe != NULL) { 145cbc17435SMarcel Moolenaar strncpy(buf, kdb_dbbe->dbbe_name, sizeof(buf)); 146cbc17435SMarcel Moolenaar buf[sizeof(buf) - 1] = '\0'; 147a8bfba1aSMarcel Moolenaar } else 148a8bfba1aSMarcel Moolenaar *buf = '\0'; 149cbc17435SMarcel Moolenaar error = sysctl_handle_string(oidp, buf, sizeof(buf), req); 150cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 151cbc17435SMarcel Moolenaar return (error); 152cbc17435SMarcel Moolenaar if (kdb_active) 153cbc17435SMarcel Moolenaar return (EBUSY); 1543bcd2440SMarcel Moolenaar return (kdb_dbbe_select(buf)); 155cbc17435SMarcel Moolenaar } 156cbc17435SMarcel Moolenaar 157cbc17435SMarcel Moolenaar static int 158cbc17435SMarcel Moolenaar kdb_sysctl_enter(SYSCTL_HANDLER_ARGS) 159cbc17435SMarcel Moolenaar { 160cbc17435SMarcel Moolenaar int error, i; 161cbc17435SMarcel Moolenaar 162cbc17435SMarcel Moolenaar error = sysctl_wire_old_buffer(req, sizeof(int)); 163cbc17435SMarcel Moolenaar if (error == 0) { 164cbc17435SMarcel Moolenaar i = 0; 165cbc17435SMarcel Moolenaar error = sysctl_handle_int(oidp, &i, 0, req); 166cbc17435SMarcel Moolenaar } 167cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 168cbc17435SMarcel Moolenaar return (error); 169cbc17435SMarcel Moolenaar if (kdb_active) 170cbc17435SMarcel Moolenaar return (EBUSY); 1713de213ccSRobert Watson kdb_enter(KDB_WHY_SYSCTL, "sysctl debug.kdb.enter"); 172cbc17435SMarcel Moolenaar return (0); 173cbc17435SMarcel Moolenaar } 174cbc17435SMarcel Moolenaar 17540c9966aSPeter Wemm static int 17640c9966aSPeter Wemm kdb_sysctl_panic(SYSCTL_HANDLER_ARGS) 17740c9966aSPeter Wemm { 17840c9966aSPeter Wemm int error, i; 17940c9966aSPeter Wemm 18040c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 18140c9966aSPeter Wemm if (error == 0) { 18240c9966aSPeter Wemm i = 0; 18340c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 18440c9966aSPeter Wemm } 18540c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 18640c9966aSPeter Wemm return (error); 18740c9966aSPeter Wemm panic("kdb_sysctl_panic"); 18840c9966aSPeter Wemm return (0); 18940c9966aSPeter Wemm } 19040c9966aSPeter Wemm 19140c9966aSPeter Wemm static int 19240c9966aSPeter Wemm kdb_sysctl_trap(SYSCTL_HANDLER_ARGS) 19340c9966aSPeter Wemm { 19440c9966aSPeter Wemm int error, i; 19540c9966aSPeter Wemm int *addr = (int *)0x10; 19640c9966aSPeter Wemm 19740c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 19840c9966aSPeter Wemm if (error == 0) { 19940c9966aSPeter Wemm i = 0; 20040c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 20140c9966aSPeter Wemm } 20240c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 20340c9966aSPeter Wemm return (error); 20440c9966aSPeter Wemm return (*addr); 20540c9966aSPeter Wemm } 20640c9966aSPeter Wemm 20742ccd54fSYaroslav Tykhiy static int 20842ccd54fSYaroslav Tykhiy kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS) 20942ccd54fSYaroslav Tykhiy { 21042ccd54fSYaroslav Tykhiy int error, i; 21142ccd54fSYaroslav Tykhiy void (*fp)(u_int, u_int, u_int) = (void *)0xdeadc0de; 21242ccd54fSYaroslav Tykhiy 21342ccd54fSYaroslav Tykhiy error = sysctl_wire_old_buffer(req, sizeof(int)); 21442ccd54fSYaroslav Tykhiy if (error == 0) { 21542ccd54fSYaroslav Tykhiy i = 0; 21642ccd54fSYaroslav Tykhiy error = sysctl_handle_int(oidp, &i, 0, req); 21742ccd54fSYaroslav Tykhiy } 21842ccd54fSYaroslav Tykhiy if (error != 0 || req->newptr == NULL) 21942ccd54fSYaroslav Tykhiy return (error); 22042ccd54fSYaroslav Tykhiy (*fp)(0x11111111, 0x22222222, 0x33333333); 22142ccd54fSYaroslav Tykhiy return (0); 22242ccd54fSYaroslav Tykhiy } 22342ccd54fSYaroslav Tykhiy 22443d7128cSPeter Wemm void 22543d7128cSPeter Wemm kdb_panic(const char *msg) 22643d7128cSPeter Wemm { 22743d7128cSPeter Wemm 22843d7128cSPeter Wemm #ifdef SMP 22943d7128cSPeter Wemm stop_cpus(PCPU_GET(other_cpus)); 23043d7128cSPeter Wemm #endif 23143d7128cSPeter Wemm printf("KDB: panic\n"); 23243d7128cSPeter Wemm panic(msg); 23343d7128cSPeter Wemm } 23443d7128cSPeter Wemm 23543d7128cSPeter Wemm void 23643d7128cSPeter Wemm kdb_reboot(void) 23743d7128cSPeter Wemm { 23843d7128cSPeter Wemm 23943d7128cSPeter Wemm printf("KDB: reboot requested\n"); 24043d7128cSPeter Wemm shutdown_nice(0); 24143d7128cSPeter Wemm } 24243d7128cSPeter Wemm 243cbc17435SMarcel Moolenaar /* 244cbc17435SMarcel Moolenaar * Solaris implements a new BREAK which is initiated by a character sequence 245cbc17435SMarcel Moolenaar * CR ~ ^b which is similar to a familiar pattern used on Sun servers by the 246cbc17435SMarcel Moolenaar * Remote Console. 247cbc17435SMarcel Moolenaar * 248cbc17435SMarcel Moolenaar * Note that this function may be called from almost anywhere, with interrupts 249cbc17435SMarcel Moolenaar * disabled and with unknown locks held, so it must not access data other than 250cbc17435SMarcel Moolenaar * its arguments. Its up to the caller to ensure that the state variable is 251cbc17435SMarcel Moolenaar * consistent. 252cbc17435SMarcel Moolenaar */ 253cbc17435SMarcel Moolenaar 254cbc17435SMarcel Moolenaar #define KEY_CR 13 /* CR '\r' */ 255cbc17435SMarcel Moolenaar #define KEY_TILDE 126 /* ~ */ 256cbc17435SMarcel Moolenaar #define KEY_CRTLB 2 /* ^B */ 25743d7128cSPeter Wemm #define KEY_CRTLP 16 /* ^P */ 25843d7128cSPeter Wemm #define KEY_CRTLR 18 /* ^R */ 259cbc17435SMarcel Moolenaar 260cbc17435SMarcel Moolenaar int 261cbc17435SMarcel Moolenaar kdb_alt_break(int key, int *state) 262cbc17435SMarcel Moolenaar { 263cbc17435SMarcel Moolenaar int brk; 264cbc17435SMarcel Moolenaar 265cbc17435SMarcel Moolenaar brk = 0; 26643d7128cSPeter Wemm switch (*state) { 26743d7128cSPeter Wemm case 0: 26843d7128cSPeter Wemm if (key == KEY_CR) 26943d7128cSPeter Wemm *state = 1; 270cbc17435SMarcel Moolenaar break; 27143d7128cSPeter Wemm case 1: 27243d7128cSPeter Wemm if (key == KEY_TILDE) 27343d7128cSPeter Wemm *state = 2; 274cbc17435SMarcel Moolenaar break; 27543d7128cSPeter Wemm case 2: 27643d7128cSPeter Wemm if (key == KEY_CRTLB) 27743d7128cSPeter Wemm brk = KDB_REQ_DEBUGGER; 27843d7128cSPeter Wemm else if (key == KEY_CRTLP) 27943d7128cSPeter Wemm brk = KDB_REQ_PANIC; 28043d7128cSPeter Wemm else if (key == KEY_CRTLR) 28143d7128cSPeter Wemm brk = KDB_REQ_REBOOT; 282cbc17435SMarcel Moolenaar *state = 0; 283cbc17435SMarcel Moolenaar } 284cbc17435SMarcel Moolenaar return (brk); 285cbc17435SMarcel Moolenaar } 286cbc17435SMarcel Moolenaar 287cbc17435SMarcel Moolenaar /* 288cbc17435SMarcel Moolenaar * Print a backtrace of the calling thread. The backtrace is generated by 289cbc17435SMarcel Moolenaar * the selected debugger, provided it supports backtraces. If no debugger 290cbc17435SMarcel Moolenaar * is selected or the current debugger does not support backtraces, this 291cbc17435SMarcel Moolenaar * function silently returns. 292cbc17435SMarcel Moolenaar */ 293cbc17435SMarcel Moolenaar 294cbc17435SMarcel Moolenaar void 2957cddab63SWarner Losh kdb_backtrace(void) 296cbc17435SMarcel Moolenaar { 297cbc17435SMarcel Moolenaar 298cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_dbbe->dbbe_trace != NULL) { 299cbc17435SMarcel Moolenaar printf("KDB: stack backtrace:\n"); 300cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_trace(); 301cbc17435SMarcel Moolenaar } 302cbc17435SMarcel Moolenaar } 303cbc17435SMarcel Moolenaar 304cbc17435SMarcel Moolenaar /* 3053bcd2440SMarcel Moolenaar * Set/change the current backend. 3063bcd2440SMarcel Moolenaar */ 3073bcd2440SMarcel Moolenaar 3083bcd2440SMarcel Moolenaar int 3093bcd2440SMarcel Moolenaar kdb_dbbe_select(const char *name) 3103bcd2440SMarcel Moolenaar { 3113bcd2440SMarcel Moolenaar struct kdb_dbbe *be, **iter; 3123bcd2440SMarcel Moolenaar 3133bcd2440SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 3143bcd2440SMarcel Moolenaar be = *iter; 3153bcd2440SMarcel Moolenaar if (be->dbbe_active == 0 && strcmp(be->dbbe_name, name) == 0) { 3163bcd2440SMarcel Moolenaar kdb_dbbe = be; 3173bcd2440SMarcel Moolenaar return (0); 3183bcd2440SMarcel Moolenaar } 3193bcd2440SMarcel Moolenaar } 3203bcd2440SMarcel Moolenaar return (EINVAL); 3213bcd2440SMarcel Moolenaar } 3223bcd2440SMarcel Moolenaar 3233bcd2440SMarcel Moolenaar /* 324cbc17435SMarcel Moolenaar * Enter the currently selected debugger. If a message has been provided, 325cbc17435SMarcel Moolenaar * it is printed first. If the debugger does not support the enter method, 326cbc17435SMarcel Moolenaar * it is entered by using breakpoint(), which enters the debugger through 3273de213ccSRobert Watson * kdb_trap(). The 'why' argument will contain a more mechanically usable 3283de213ccSRobert Watson * string than 'msg', and is relied upon by DDB scripting to identify the 3293de213ccSRobert Watson * reason for entering the debugger so that the right script can be run. 330cbc17435SMarcel Moolenaar */ 331cbc17435SMarcel Moolenaar void 3323de213ccSRobert Watson kdb_enter(const char *why, const char *msg) 333cbc17435SMarcel Moolenaar { 334cbc17435SMarcel Moolenaar 335cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_active == 0) { 336cbc17435SMarcel Moolenaar if (msg != NULL) 337cbc17435SMarcel Moolenaar printf("KDB: enter: %s\n", msg); 3383de213ccSRobert Watson kdb_why = why; 339cbc17435SMarcel Moolenaar breakpoint(); 3403de213ccSRobert Watson kdb_why = KDB_WHY_UNSET; 341cbc17435SMarcel Moolenaar } 342cbc17435SMarcel Moolenaar } 343cbc17435SMarcel Moolenaar 344cbc17435SMarcel Moolenaar /* 345cbc17435SMarcel Moolenaar * Initialize the kernel debugger interface. 346cbc17435SMarcel Moolenaar */ 347cbc17435SMarcel Moolenaar 348cbc17435SMarcel Moolenaar void 3497cddab63SWarner Losh kdb_init(void) 350cbc17435SMarcel Moolenaar { 351cbc17435SMarcel Moolenaar struct kdb_dbbe *be, **iter; 352cbc17435SMarcel Moolenaar int cur_pri, pri; 353cbc17435SMarcel Moolenaar 354cbc17435SMarcel Moolenaar kdb_active = 0; 355cbc17435SMarcel Moolenaar kdb_dbbe = NULL; 356cbc17435SMarcel Moolenaar cur_pri = -1; 357cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 358cbc17435SMarcel Moolenaar be = *iter; 359cbc17435SMarcel Moolenaar pri = (be->dbbe_init != NULL) ? be->dbbe_init() : -1; 360cbc17435SMarcel Moolenaar be->dbbe_active = (pri >= 0) ? 0 : -1; 361cbc17435SMarcel Moolenaar if (pri > cur_pri) { 362cbc17435SMarcel Moolenaar cur_pri = pri; 363cbc17435SMarcel Moolenaar kdb_dbbe = be; 364cbc17435SMarcel Moolenaar } 365cbc17435SMarcel Moolenaar } 366cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL) { 367cbc17435SMarcel Moolenaar printf("KDB: debugger backends:"); 368cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 369cbc17435SMarcel Moolenaar be = *iter; 370cbc17435SMarcel Moolenaar if (be->dbbe_active == 0) 371cbc17435SMarcel Moolenaar printf(" %s", be->dbbe_name); 372cbc17435SMarcel Moolenaar } 373cbc17435SMarcel Moolenaar printf("\n"); 374cbc17435SMarcel Moolenaar printf("KDB: current backend: %s\n", 375cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_name); 376cbc17435SMarcel Moolenaar } 377cbc17435SMarcel Moolenaar } 378cbc17435SMarcel Moolenaar 379cbc17435SMarcel Moolenaar /* 380cbc17435SMarcel Moolenaar * Handle contexts. 381cbc17435SMarcel Moolenaar */ 382cbc17435SMarcel Moolenaar 383cbc17435SMarcel Moolenaar void * 384cbc17435SMarcel Moolenaar kdb_jmpbuf(jmp_buf new) 385cbc17435SMarcel Moolenaar { 386cbc17435SMarcel Moolenaar void *old; 387cbc17435SMarcel Moolenaar 388cbc17435SMarcel Moolenaar old = kdb_jmpbufp; 389cbc17435SMarcel Moolenaar kdb_jmpbufp = new; 390cbc17435SMarcel Moolenaar return (old); 391cbc17435SMarcel Moolenaar } 392cbc17435SMarcel Moolenaar 393cbc17435SMarcel Moolenaar void 394cbc17435SMarcel Moolenaar kdb_reenter(void) 395cbc17435SMarcel Moolenaar { 396cbc17435SMarcel Moolenaar 397cbc17435SMarcel Moolenaar if (!kdb_active || kdb_jmpbufp == NULL) 398cbc17435SMarcel Moolenaar return; 399cbc17435SMarcel Moolenaar 400cbc17435SMarcel Moolenaar longjmp(kdb_jmpbufp, 1); 401cbc17435SMarcel Moolenaar /* NOTREACHED */ 402cbc17435SMarcel Moolenaar } 403cbc17435SMarcel Moolenaar 404cbc17435SMarcel Moolenaar /* 405cbc17435SMarcel Moolenaar * Thread related support functions. 406cbc17435SMarcel Moolenaar */ 407cbc17435SMarcel Moolenaar 408cbc17435SMarcel Moolenaar struct pcb * 409cbc17435SMarcel Moolenaar kdb_thr_ctx(struct thread *thr) 410fdc9713bSDoug White { 411bfcdefd8SMarcel Moolenaar #if defined(SMP) && defined(KDB_STOPPEDPCB) 412fdc9713bSDoug White struct pcpu *pc; 41358553b99SJohn Baldwin #endif 414fdc9713bSDoug White 415fdc9713bSDoug White if (thr == curthread) 4166b1e0d75SJohn Baldwin return (&kdb_pcb); 417fdc9713bSDoug White 418bfcdefd8SMarcel Moolenaar #if defined(SMP) && defined(KDB_STOPPEDPCB) 419fdc9713bSDoug White SLIST_FOREACH(pc, &cpuhead, pc_allcpu) { 420bfcdefd8SMarcel Moolenaar if (pc->pc_curthread == thr && (stopped_cpus & pc->pc_cpumask)) 421bfcdefd8SMarcel Moolenaar return (KDB_STOPPEDPCB(pc)); 422fdc9713bSDoug White } 42358553b99SJohn Baldwin #endif 4246b1e0d75SJohn Baldwin return (thr->td_pcb); 425fdc9713bSDoug White } 426cbc17435SMarcel Moolenaar 427cbc17435SMarcel Moolenaar struct thread * 428cbc17435SMarcel Moolenaar kdb_thr_first(void) 429cbc17435SMarcel Moolenaar { 430cbc17435SMarcel Moolenaar struct proc *p; 431cbc17435SMarcel Moolenaar struct thread *thr; 432cbc17435SMarcel Moolenaar 433cbc17435SMarcel Moolenaar p = LIST_FIRST(&allproc); 434cbc17435SMarcel Moolenaar while (p != NULL) { 435b61ce5b0SJeff Roberson if (p->p_flag & P_INMEM) { 436cbc17435SMarcel Moolenaar thr = FIRST_THREAD_IN_PROC(p); 437cbc17435SMarcel Moolenaar if (thr != NULL) 438cbc17435SMarcel Moolenaar return (thr); 439cbc17435SMarcel Moolenaar } 440cbc17435SMarcel Moolenaar p = LIST_NEXT(p, p_list); 441cbc17435SMarcel Moolenaar } 442cbc17435SMarcel Moolenaar return (NULL); 443cbc17435SMarcel Moolenaar } 444cbc17435SMarcel Moolenaar 445cbc17435SMarcel Moolenaar struct thread * 4463d4f3136SMarcel Moolenaar kdb_thr_from_pid(pid_t pid) 4473d4f3136SMarcel Moolenaar { 4483d4f3136SMarcel Moolenaar struct proc *p; 4493d4f3136SMarcel Moolenaar 4503d4f3136SMarcel Moolenaar p = LIST_FIRST(&allproc); 4513d4f3136SMarcel Moolenaar while (p != NULL) { 452b61ce5b0SJeff Roberson if (p->p_flag & P_INMEM && p->p_pid == pid) 4533d4f3136SMarcel Moolenaar return (FIRST_THREAD_IN_PROC(p)); 4543d4f3136SMarcel Moolenaar p = LIST_NEXT(p, p_list); 4553d4f3136SMarcel Moolenaar } 4563d4f3136SMarcel Moolenaar return (NULL); 4573d4f3136SMarcel Moolenaar } 4583d4f3136SMarcel Moolenaar 4593d4f3136SMarcel Moolenaar struct thread * 4603d4f3136SMarcel Moolenaar kdb_thr_lookup(lwpid_t tid) 461cbc17435SMarcel Moolenaar { 462cbc17435SMarcel Moolenaar struct thread *thr; 463cbc17435SMarcel Moolenaar 464cbc17435SMarcel Moolenaar thr = kdb_thr_first(); 465cbc17435SMarcel Moolenaar while (thr != NULL && thr->td_tid != tid) 466cbc17435SMarcel Moolenaar thr = kdb_thr_next(thr); 467cbc17435SMarcel Moolenaar return (thr); 468cbc17435SMarcel Moolenaar } 469cbc17435SMarcel Moolenaar 470cbc17435SMarcel Moolenaar struct thread * 471cbc17435SMarcel Moolenaar kdb_thr_next(struct thread *thr) 472cbc17435SMarcel Moolenaar { 473cbc17435SMarcel Moolenaar struct proc *p; 474cbc17435SMarcel Moolenaar 475cbc17435SMarcel Moolenaar p = thr->td_proc; 476cbc17435SMarcel Moolenaar thr = TAILQ_NEXT(thr, td_plist); 477cbc17435SMarcel Moolenaar do { 478cbc17435SMarcel Moolenaar if (thr != NULL) 479cbc17435SMarcel Moolenaar return (thr); 480cbc17435SMarcel Moolenaar p = LIST_NEXT(p, p_list); 481b61ce5b0SJeff Roberson if (p != NULL && (p->p_flag & P_INMEM)) 482cbc17435SMarcel Moolenaar thr = FIRST_THREAD_IN_PROC(p); 483cbc17435SMarcel Moolenaar } while (p != NULL); 484cbc17435SMarcel Moolenaar return (NULL); 485cbc17435SMarcel Moolenaar } 486cbc17435SMarcel Moolenaar 487cbc17435SMarcel Moolenaar int 488cbc17435SMarcel Moolenaar kdb_thr_select(struct thread *thr) 489cbc17435SMarcel Moolenaar { 490cbc17435SMarcel Moolenaar if (thr == NULL) 491cbc17435SMarcel Moolenaar return (EINVAL); 492cbc17435SMarcel Moolenaar kdb_thread = thr; 493cbc17435SMarcel Moolenaar kdb_thrctx = kdb_thr_ctx(thr); 494cbc17435SMarcel Moolenaar return (0); 495cbc17435SMarcel Moolenaar } 496cbc17435SMarcel Moolenaar 497cbc17435SMarcel Moolenaar /* 498cbc17435SMarcel Moolenaar * Enter the debugger due to a trap. 499cbc17435SMarcel Moolenaar */ 500cbc17435SMarcel Moolenaar 501cbc17435SMarcel Moolenaar int 502cbc17435SMarcel Moolenaar kdb_trap(int type, int code, struct trapframe *tf) 503cbc17435SMarcel Moolenaar { 5045991a4f8SMarcel Moolenaar register_t intr; 505d8939d82SRobert Watson #ifdef SMP 506d8939d82SRobert Watson int did_stop_cpus; 507d8939d82SRobert Watson #endif 5085991a4f8SMarcel Moolenaar int handled; 509cbc17435SMarcel Moolenaar 510cbc17435SMarcel Moolenaar if (kdb_dbbe == NULL || kdb_dbbe->dbbe_trap == NULL) 511cbc17435SMarcel Moolenaar return (0); 512cbc17435SMarcel Moolenaar 513cbc17435SMarcel Moolenaar /* We reenter the debugger through kdb_reenter(). */ 514cbc17435SMarcel Moolenaar if (kdb_active) 515cbc17435SMarcel Moolenaar return (0); 516cbc17435SMarcel Moolenaar 5172fae8f5aSMarcel Moolenaar intr = intr_disable(); 518cbc17435SMarcel Moolenaar 519cbc17435SMarcel Moolenaar #ifdef SMP 520d8939d82SRobert Watson if ((did_stop_cpus = kdb_stop_cpus) != 0) 521cbc17435SMarcel Moolenaar stop_cpus(PCPU_GET(other_cpus)); 522cbc17435SMarcel Moolenaar #endif 523cbc17435SMarcel Moolenaar 52439eb1d12SMarcel Moolenaar kdb_active++; 52539eb1d12SMarcel Moolenaar 526e6aa7232SMarcel Moolenaar kdb_frame = tf; 527e6aa7232SMarcel Moolenaar 528cbc17435SMarcel Moolenaar /* Let MD code do its thing first... */ 529cbc17435SMarcel Moolenaar kdb_cpu_trap(type, code); 530cbc17435SMarcel Moolenaar 531ddf41225SMarcel Moolenaar makectx(tf, &kdb_pcb); 532ddf41225SMarcel Moolenaar kdb_thr_select(curthread); 533ddf41225SMarcel Moolenaar 534cbc17435SMarcel Moolenaar handled = kdb_dbbe->dbbe_trap(type, code); 535cbc17435SMarcel Moolenaar 53639eb1d12SMarcel Moolenaar kdb_active--; 53739eb1d12SMarcel Moolenaar 538cbc17435SMarcel Moolenaar #ifdef SMP 539d8939d82SRobert Watson if (did_stop_cpus) 540cbc17435SMarcel Moolenaar restart_cpus(stopped_cpus); 541cbc17435SMarcel Moolenaar #endif 542cbc17435SMarcel Moolenaar 5432fae8f5aSMarcel Moolenaar intr_restore(intr); 544cbc17435SMarcel Moolenaar 545cbc17435SMarcel Moolenaar return (handled); 546cbc17435SMarcel Moolenaar } 547