19454b2d8SWarner Losh /*- 2*8a36da99SPedro F. Giffuni * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3*8a36da99SPedro F. Giffuni * 4cbc17435SMarcel Moolenaar * Copyright (c) 2004 The FreeBSD Project 5cbc17435SMarcel Moolenaar * All rights reserved. 6cbc17435SMarcel Moolenaar * 7cbc17435SMarcel Moolenaar * Redistribution and use in source and binary forms, with or without 8cbc17435SMarcel Moolenaar * modification, are permitted provided that the following conditions 9cbc17435SMarcel Moolenaar * are met: 10cbc17435SMarcel Moolenaar * 11cbc17435SMarcel Moolenaar * 1. Redistributions of source code must retain the above copyright 12cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer. 13cbc17435SMarcel Moolenaar * 2. Redistributions in binary form must reproduce the above copyright 14cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer in the 15cbc17435SMarcel Moolenaar * documentation and/or other materials provided with the distribution. 16cbc17435SMarcel Moolenaar * 17cbc17435SMarcel Moolenaar * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 18cbc17435SMarcel Moolenaar * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 19cbc17435SMarcel Moolenaar * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 20cbc17435SMarcel Moolenaar * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 21cbc17435SMarcel Moolenaar * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 22cbc17435SMarcel Moolenaar * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23cbc17435SMarcel Moolenaar * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24cbc17435SMarcel Moolenaar * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25cbc17435SMarcel Moolenaar * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 26cbc17435SMarcel Moolenaar * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27cbc17435SMarcel Moolenaar */ 28cbc17435SMarcel Moolenaar 29cbc17435SMarcel Moolenaar #include <sys/cdefs.h> 30cbc17435SMarcel Moolenaar __FBSDID("$FreeBSD$"); 31cbc17435SMarcel Moolenaar 32f0c6706dSPeter Wemm #include "opt_kdb.h" 33088acbb3SAndriy Gapon #include "opt_stack.h" 34f0c6706dSPeter Wemm 35cbc17435SMarcel Moolenaar #include <sys/param.h> 36cbc17435SMarcel Moolenaar #include <sys/systm.h> 37bf8696b4SAndriy Gapon #include <sys/cons.h> 38cbc17435SMarcel Moolenaar #include <sys/kdb.h> 39cbc17435SMarcel Moolenaar #include <sys/kernel.h> 40cbc17435SMarcel Moolenaar #include <sys/malloc.h> 41cbc17435SMarcel Moolenaar #include <sys/pcpu.h> 42cbc17435SMarcel Moolenaar #include <sys/proc.h> 433a5d3671SMatthew D Fleming #include <sys/sbuf.h> 44cbc17435SMarcel Moolenaar #include <sys/smp.h> 45088acbb3SAndriy Gapon #include <sys/stack.h> 46cbc17435SMarcel Moolenaar #include <sys/sysctl.h> 47cbc17435SMarcel Moolenaar 48cbc17435SMarcel Moolenaar #include <machine/kdb.h> 49cbc17435SMarcel Moolenaar #include <machine/pcb.h> 50cbc17435SMarcel Moolenaar 5158553b99SJohn Baldwin #ifdef SMP 52fdc9713bSDoug White #include <machine/smp.h> 53fdc9713bSDoug White #endif 54fdc9713bSDoug White 55614e1868SMateusz Guzik u_char __read_frequently kdb_active = 0; 567cddab63SWarner Losh static void *kdb_jmpbufp = NULL; 57cbc17435SMarcel Moolenaar struct kdb_dbbe *kdb_dbbe = NULL; 587cddab63SWarner Losh static struct pcb kdb_pcb; 59cbc17435SMarcel Moolenaar struct pcb *kdb_thrctx = NULL; 60cbc17435SMarcel Moolenaar struct thread *kdb_thread = NULL; 61cbc17435SMarcel Moolenaar struct trapframe *kdb_frame = NULL; 62cbc17435SMarcel Moolenaar 634cf75455SRobert Watson #ifdef BREAK_TO_DEBUGGER 644cf75455SRobert Watson #define KDB_BREAK_TO_DEBUGGER 1 654cf75455SRobert Watson #else 664cf75455SRobert Watson #define KDB_BREAK_TO_DEBUGGER 0 674cf75455SRobert Watson #endif 684cf75455SRobert Watson 694cf75455SRobert Watson #ifdef ALT_BREAK_TO_DEBUGGER 704cf75455SRobert Watson #define KDB_ALT_BREAK_TO_DEBUGGER 1 714cf75455SRobert Watson #else 724cf75455SRobert Watson #define KDB_ALT_BREAK_TO_DEBUGGER 0 734cf75455SRobert Watson #endif 744cf75455SRobert Watson 754cf75455SRobert Watson static int kdb_break_to_debugger = KDB_BREAK_TO_DEBUGGER; 764cf75455SRobert Watson static int kdb_alt_break_to_debugger = KDB_ALT_BREAK_TO_DEBUGGER; 774cf75455SRobert Watson 780cc457b0SJohn Baldwin KDB_BACKEND(null, NULL, NULL, NULL, NULL); 79cbc17435SMarcel Moolenaar SET_DECLARE(kdb_dbbe_set, struct kdb_dbbe); 80cbc17435SMarcel Moolenaar 81cbc17435SMarcel Moolenaar static int kdb_sysctl_available(SYSCTL_HANDLER_ARGS); 82cbc17435SMarcel Moolenaar static int kdb_sysctl_current(SYSCTL_HANDLER_ARGS); 83cbc17435SMarcel Moolenaar static int kdb_sysctl_enter(SYSCTL_HANDLER_ARGS); 8440c9966aSPeter Wemm static int kdb_sysctl_panic(SYSCTL_HANDLER_ARGS); 8540c9966aSPeter Wemm static int kdb_sysctl_trap(SYSCTL_HANDLER_ARGS); 8642ccd54fSYaroslav Tykhiy static int kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS); 87cbc17435SMarcel Moolenaar 886472ac3dSEd Schouten static SYSCTL_NODE(_debug, OID_AUTO, kdb, CTLFLAG_RW, NULL, "KDB nodes"); 89cbc17435SMarcel Moolenaar 907cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, available, CTLTYPE_STRING | CTLFLAG_RD, NULL, 917cddab63SWarner Losh 0, kdb_sysctl_available, "A", "list of available KDB backends"); 92cbc17435SMarcel Moolenaar 937cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, current, CTLTYPE_STRING | CTLFLAG_RW, NULL, 947cddab63SWarner Losh 0, kdb_sysctl_current, "A", "currently selected KDB backend"); 95cbc17435SMarcel Moolenaar 96ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, enter, 97ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 98cbc17435SMarcel Moolenaar kdb_sysctl_enter, "I", "set to enter the debugger"); 99cbc17435SMarcel Moolenaar 100ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, panic, 101ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 10240c9966aSPeter Wemm kdb_sysctl_panic, "I", "set to panic the kernel"); 10340c9966aSPeter Wemm 104ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, trap, 105ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 10642ccd54fSYaroslav Tykhiy kdb_sysctl_trap, "I", "set to cause a page fault via data access"); 10742ccd54fSYaroslav Tykhiy 108ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, trap_code, 109ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 11042ccd54fSYaroslav Tykhiy kdb_sysctl_trap_code, "I", "set to cause a page fault via code access"); 11140c9966aSPeter Wemm 112ef522f95SDavid E. O'Brien SYSCTL_INT(_debug_kdb, OID_AUTO, break_to_debugger, 113f0188618SHans Petter Selasky CTLFLAG_RWTUN | CTLFLAG_SECURE, 114ef522f95SDavid E. O'Brien &kdb_break_to_debugger, 0, "Enable break to debugger"); 1154cf75455SRobert Watson 116ef522f95SDavid E. O'Brien SYSCTL_INT(_debug_kdb, OID_AUTO, alt_break_to_debugger, 117f0188618SHans Petter Selasky CTLFLAG_RWTUN | CTLFLAG_SECURE, 118ef522f95SDavid E. O'Brien &kdb_alt_break_to_debugger, 0, "Enable alternative break to debugger"); 1194cf75455SRobert Watson 120d8939d82SRobert Watson /* 1213de213ccSRobert Watson * Flag to indicate to debuggers why the debugger was entered. 1223de213ccSRobert Watson */ 1233de213ccSRobert Watson const char * volatile kdb_why = KDB_WHY_UNSET; 1243de213ccSRobert Watson 125cbc17435SMarcel Moolenaar static int 126cbc17435SMarcel Moolenaar kdb_sysctl_available(SYSCTL_HANDLER_ARGS) 127cbc17435SMarcel Moolenaar { 1283a5d3671SMatthew D Fleming struct kdb_dbbe **iter; 1293a5d3671SMatthew D Fleming struct sbuf sbuf; 130cbc17435SMarcel Moolenaar int error; 131cbc17435SMarcel Moolenaar 1323a5d3671SMatthew D Fleming sbuf_new_for_sysctl(&sbuf, NULL, 64, req); 133cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 1343a5d3671SMatthew D Fleming if ((*iter)->dbbe_active == 0) 1353a5d3671SMatthew D Fleming sbuf_printf(&sbuf, "%s ", (*iter)->dbbe_name); 136cbc17435SMarcel Moolenaar } 1373a5d3671SMatthew D Fleming error = sbuf_finish(&sbuf); 1383a5d3671SMatthew D Fleming sbuf_delete(&sbuf); 139cbc17435SMarcel Moolenaar return (error); 140cbc17435SMarcel Moolenaar } 141cbc17435SMarcel Moolenaar 142cbc17435SMarcel Moolenaar static int 143cbc17435SMarcel Moolenaar kdb_sysctl_current(SYSCTL_HANDLER_ARGS) 144cbc17435SMarcel Moolenaar { 145cbc17435SMarcel Moolenaar char buf[16]; 146cbc17435SMarcel Moolenaar int error; 147cbc17435SMarcel Moolenaar 1483a5d3671SMatthew D Fleming if (kdb_dbbe != NULL) 1493a5d3671SMatthew D Fleming strlcpy(buf, kdb_dbbe->dbbe_name, sizeof(buf)); 1503a5d3671SMatthew D Fleming else 151a8bfba1aSMarcel Moolenaar *buf = '\0'; 152cbc17435SMarcel Moolenaar error = sysctl_handle_string(oidp, buf, sizeof(buf), req); 153cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 154cbc17435SMarcel Moolenaar return (error); 155cbc17435SMarcel Moolenaar if (kdb_active) 156cbc17435SMarcel Moolenaar return (EBUSY); 1573bcd2440SMarcel Moolenaar return (kdb_dbbe_select(buf)); 158cbc17435SMarcel Moolenaar } 159cbc17435SMarcel Moolenaar 160cbc17435SMarcel Moolenaar static int 161cbc17435SMarcel Moolenaar kdb_sysctl_enter(SYSCTL_HANDLER_ARGS) 162cbc17435SMarcel Moolenaar { 163cbc17435SMarcel Moolenaar int error, i; 164cbc17435SMarcel Moolenaar 165cbc17435SMarcel Moolenaar error = sysctl_wire_old_buffer(req, sizeof(int)); 166cbc17435SMarcel Moolenaar if (error == 0) { 167cbc17435SMarcel Moolenaar i = 0; 168cbc17435SMarcel Moolenaar error = sysctl_handle_int(oidp, &i, 0, req); 169cbc17435SMarcel Moolenaar } 170cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 171cbc17435SMarcel Moolenaar return (error); 172cbc17435SMarcel Moolenaar if (kdb_active) 173cbc17435SMarcel Moolenaar return (EBUSY); 1743de213ccSRobert Watson kdb_enter(KDB_WHY_SYSCTL, "sysctl debug.kdb.enter"); 175cbc17435SMarcel Moolenaar return (0); 176cbc17435SMarcel Moolenaar } 177cbc17435SMarcel Moolenaar 17840c9966aSPeter Wemm static int 17940c9966aSPeter Wemm kdb_sysctl_panic(SYSCTL_HANDLER_ARGS) 18040c9966aSPeter Wemm { 18140c9966aSPeter Wemm int error, i; 18240c9966aSPeter Wemm 18340c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 18440c9966aSPeter Wemm if (error == 0) { 18540c9966aSPeter Wemm i = 0; 18640c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 18740c9966aSPeter Wemm } 18840c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 18940c9966aSPeter Wemm return (error); 19040c9966aSPeter Wemm panic("kdb_sysctl_panic"); 19140c9966aSPeter Wemm return (0); 19240c9966aSPeter Wemm } 19340c9966aSPeter Wemm 19440c9966aSPeter Wemm static int 19540c9966aSPeter Wemm kdb_sysctl_trap(SYSCTL_HANDLER_ARGS) 19640c9966aSPeter Wemm { 19740c9966aSPeter Wemm int error, i; 19840c9966aSPeter Wemm int *addr = (int *)0x10; 19940c9966aSPeter Wemm 20040c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 20140c9966aSPeter Wemm if (error == 0) { 20240c9966aSPeter Wemm i = 0; 20340c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 20440c9966aSPeter Wemm } 20540c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 20640c9966aSPeter Wemm return (error); 20740c9966aSPeter Wemm return (*addr); 20840c9966aSPeter Wemm } 20940c9966aSPeter Wemm 21042ccd54fSYaroslav Tykhiy static int 21142ccd54fSYaroslav Tykhiy kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS) 21242ccd54fSYaroslav Tykhiy { 21342ccd54fSYaroslav Tykhiy int error, i; 21442ccd54fSYaroslav Tykhiy void (*fp)(u_int, u_int, u_int) = (void *)0xdeadc0de; 21542ccd54fSYaroslav Tykhiy 21642ccd54fSYaroslav Tykhiy error = sysctl_wire_old_buffer(req, sizeof(int)); 21742ccd54fSYaroslav Tykhiy if (error == 0) { 21842ccd54fSYaroslav Tykhiy i = 0; 21942ccd54fSYaroslav Tykhiy error = sysctl_handle_int(oidp, &i, 0, req); 22042ccd54fSYaroslav Tykhiy } 22142ccd54fSYaroslav Tykhiy if (error != 0 || req->newptr == NULL) 22242ccd54fSYaroslav Tykhiy return (error); 22342ccd54fSYaroslav Tykhiy (*fp)(0x11111111, 0x22222222, 0x33333333); 22442ccd54fSYaroslav Tykhiy return (0); 22542ccd54fSYaroslav Tykhiy } 22642ccd54fSYaroslav Tykhiy 22743d7128cSPeter Wemm void 22843d7128cSPeter Wemm kdb_panic(const char *msg) 22943d7128cSPeter Wemm { 230a38f1f26SAttilio Rao 23143d7128cSPeter Wemm printf("KDB: panic\n"); 2321bdfff22SAndriy Gapon panic("%s", msg); 23343d7128cSPeter Wemm } 23443d7128cSPeter Wemm 23543d7128cSPeter Wemm void 23643d7128cSPeter Wemm kdb_reboot(void) 23743d7128cSPeter Wemm { 23843d7128cSPeter Wemm 23943d7128cSPeter Wemm printf("KDB: reboot requested\n"); 24043d7128cSPeter Wemm shutdown_nice(0); 24143d7128cSPeter Wemm } 24243d7128cSPeter Wemm 243cbc17435SMarcel Moolenaar /* 244cbc17435SMarcel Moolenaar * Solaris implements a new BREAK which is initiated by a character sequence 245cbc17435SMarcel Moolenaar * CR ~ ^b which is similar to a familiar pattern used on Sun servers by the 246cbc17435SMarcel Moolenaar * Remote Console. 247cbc17435SMarcel Moolenaar * 248cbc17435SMarcel Moolenaar * Note that this function may be called from almost anywhere, with interrupts 249cbc17435SMarcel Moolenaar * disabled and with unknown locks held, so it must not access data other than 250cbc17435SMarcel Moolenaar * its arguments. Its up to the caller to ensure that the state variable is 251cbc17435SMarcel Moolenaar * consistent. 252cbc17435SMarcel Moolenaar */ 253cbc17435SMarcel Moolenaar 254cbc17435SMarcel Moolenaar #define KEY_CR 13 /* CR '\r' */ 255cbc17435SMarcel Moolenaar #define KEY_TILDE 126 /* ~ */ 256cbc17435SMarcel Moolenaar #define KEY_CRTLB 2 /* ^B */ 25743d7128cSPeter Wemm #define KEY_CRTLP 16 /* ^P */ 25843d7128cSPeter Wemm #define KEY_CRTLR 18 /* ^R */ 259cbc17435SMarcel Moolenaar 26049f5aeafSAttilio Rao /* States of th KDB "alternate break sequence" detecting state machine. */ 26149f5aeafSAttilio Rao enum { 26249f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_NONE, 26349f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_CR, 26449f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_CR_TILDE, 26549f5aeafSAttilio Rao }; 26649f5aeafSAttilio Rao 267cbc17435SMarcel Moolenaar int 2684cf75455SRobert Watson kdb_break(void) 2694cf75455SRobert Watson { 2704cf75455SRobert Watson 2714cf75455SRobert Watson if (!kdb_break_to_debugger) 2724cf75455SRobert Watson return (0); 2734cf75455SRobert Watson kdb_enter(KDB_WHY_BREAK, "Break to debugger"); 2744cf75455SRobert Watson return (KDB_REQ_DEBUGGER); 2754cf75455SRobert Watson } 2764cf75455SRobert Watson 2774cf75455SRobert Watson static int 2784cf75455SRobert Watson kdb_alt_break_state(int key, int *state) 279cbc17435SMarcel Moolenaar { 280cbc17435SMarcel Moolenaar int brk; 281cbc17435SMarcel Moolenaar 28249f5aeafSAttilio Rao /* All states transition to KDB_ALT_BREAK_SEEN_CR on a CR. */ 28349f5aeafSAttilio Rao if (key == KEY_CR) { 28449f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_CR; 28549f5aeafSAttilio Rao return (0); 28649f5aeafSAttilio Rao } 28749f5aeafSAttilio Rao 288cbc17435SMarcel Moolenaar brk = 0; 28943d7128cSPeter Wemm switch (*state) { 29049f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_CR: 29149f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 29243d7128cSPeter Wemm if (key == KEY_TILDE) 29349f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_CR_TILDE; 294cbc17435SMarcel Moolenaar break; 29549f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_CR_TILDE: 29649f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 29743d7128cSPeter Wemm if (key == KEY_CRTLB) 29843d7128cSPeter Wemm brk = KDB_REQ_DEBUGGER; 29943d7128cSPeter Wemm else if (key == KEY_CRTLP) 30043d7128cSPeter Wemm brk = KDB_REQ_PANIC; 30143d7128cSPeter Wemm else if (key == KEY_CRTLR) 30243d7128cSPeter Wemm brk = KDB_REQ_REBOOT; 30349f5aeafSAttilio Rao break; 30449f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_NONE: 30549f5aeafSAttilio Rao default: 30649f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 30749f5aeafSAttilio Rao break; 308cbc17435SMarcel Moolenaar } 309cbc17435SMarcel Moolenaar return (brk); 310cbc17435SMarcel Moolenaar } 311cbc17435SMarcel Moolenaar 3124cf75455SRobert Watson static int 3134cf75455SRobert Watson kdb_alt_break_internal(int key, int *state, int force_gdb) 3144cf75455SRobert Watson { 3154cf75455SRobert Watson int brk; 3164cf75455SRobert Watson 3174cf75455SRobert Watson if (!kdb_alt_break_to_debugger) 3184cf75455SRobert Watson return (0); 3194cf75455SRobert Watson brk = kdb_alt_break_state(key, state); 3204cf75455SRobert Watson switch (brk) { 3214cf75455SRobert Watson case KDB_REQ_DEBUGGER: 3224cf75455SRobert Watson if (force_gdb) 3234cf75455SRobert Watson kdb_dbbe_select("gdb"); 3244cf75455SRobert Watson kdb_enter(KDB_WHY_BREAK, "Break to debugger"); 3254cf75455SRobert Watson break; 3264cf75455SRobert Watson 3274cf75455SRobert Watson case KDB_REQ_PANIC: 3284cf75455SRobert Watson if (force_gdb) 3294cf75455SRobert Watson kdb_dbbe_select("gdb"); 3304cf75455SRobert Watson kdb_panic("Panic sequence on console"); 3314cf75455SRobert Watson break; 3324cf75455SRobert Watson 3334cf75455SRobert Watson case KDB_REQ_REBOOT: 3344cf75455SRobert Watson kdb_reboot(); 3354cf75455SRobert Watson break; 3364cf75455SRobert Watson } 3374cf75455SRobert Watson return (0); 3384cf75455SRobert Watson } 3394cf75455SRobert Watson 3404cf75455SRobert Watson int 3414cf75455SRobert Watson kdb_alt_break(int key, int *state) 3424cf75455SRobert Watson { 3434cf75455SRobert Watson 3444cf75455SRobert Watson return (kdb_alt_break_internal(key, state, 0)); 3454cf75455SRobert Watson } 3464cf75455SRobert Watson 3474cf75455SRobert Watson /* 3484cf75455SRobert Watson * This variation on kdb_alt_break() is used only by dcons, which has its own 3494cf75455SRobert Watson * configuration flag to force GDB use regardless of the global KDB 3504cf75455SRobert Watson * configuration. 3514cf75455SRobert Watson */ 3524cf75455SRobert Watson int 3534cf75455SRobert Watson kdb_alt_break_gdb(int key, int *state) 3544cf75455SRobert Watson { 3554cf75455SRobert Watson 3564cf75455SRobert Watson return (kdb_alt_break_internal(key, state, 1)); 3574cf75455SRobert Watson } 3584cf75455SRobert Watson 359cbc17435SMarcel Moolenaar /* 360cbc17435SMarcel Moolenaar * Print a backtrace of the calling thread. The backtrace is generated by 361cbc17435SMarcel Moolenaar * the selected debugger, provided it supports backtraces. If no debugger 362cbc17435SMarcel Moolenaar * is selected or the current debugger does not support backtraces, this 363cbc17435SMarcel Moolenaar * function silently returns. 364cbc17435SMarcel Moolenaar */ 365cbc17435SMarcel Moolenaar 366cbc17435SMarcel Moolenaar void 3677cddab63SWarner Losh kdb_backtrace(void) 368cbc17435SMarcel Moolenaar { 369cbc17435SMarcel Moolenaar 370cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_dbbe->dbbe_trace != NULL) { 371cbc17435SMarcel Moolenaar printf("KDB: stack backtrace:\n"); 372cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_trace(); 373cbc17435SMarcel Moolenaar } 374088acbb3SAndriy Gapon #ifdef STACK 375088acbb3SAndriy Gapon else { 376088acbb3SAndriy Gapon struct stack st; 377088acbb3SAndriy Gapon 378088acbb3SAndriy Gapon printf("KDB: stack backtrace:\n"); 3790cc457b0SJohn Baldwin stack_zero(&st); 380088acbb3SAndriy Gapon stack_save(&st); 38161548876SAndriy Gapon stack_print_ddb(&st); 382088acbb3SAndriy Gapon } 383088acbb3SAndriy Gapon #endif 384cbc17435SMarcel Moolenaar } 385cbc17435SMarcel Moolenaar 386cbc17435SMarcel Moolenaar /* 3870cc457b0SJohn Baldwin * Similar to kdb_backtrace() except that it prints a backtrace of an 3880cc457b0SJohn Baldwin * arbitrary thread rather than the calling thread. 3890cc457b0SJohn Baldwin */ 3900cc457b0SJohn Baldwin void 3910cc457b0SJohn Baldwin kdb_backtrace_thread(struct thread *td) 3920cc457b0SJohn Baldwin { 3930cc457b0SJohn Baldwin 3940cc457b0SJohn Baldwin if (kdb_dbbe != NULL && kdb_dbbe->dbbe_trace_thread != NULL) { 3950cc457b0SJohn Baldwin printf("KDB: stack backtrace of thread %d:\n", td->td_tid); 3960cc457b0SJohn Baldwin kdb_dbbe->dbbe_trace_thread(td); 3970cc457b0SJohn Baldwin } 3980cc457b0SJohn Baldwin #ifdef STACK 3990cc457b0SJohn Baldwin else { 4000cc457b0SJohn Baldwin struct stack st; 4010cc457b0SJohn Baldwin 4020cc457b0SJohn Baldwin printf("KDB: stack backtrace of thread %d:\n", td->td_tid); 4030cc457b0SJohn Baldwin stack_zero(&st); 4040cc457b0SJohn Baldwin stack_save_td(&st, td); 4050cc457b0SJohn Baldwin stack_print_ddb(&st); 4060cc457b0SJohn Baldwin } 4070cc457b0SJohn Baldwin #endif 4080cc457b0SJohn Baldwin } 4090cc457b0SJohn Baldwin 4100cc457b0SJohn Baldwin /* 4113bcd2440SMarcel Moolenaar * Set/change the current backend. 4123bcd2440SMarcel Moolenaar */ 4133bcd2440SMarcel Moolenaar 4143bcd2440SMarcel Moolenaar int 4153bcd2440SMarcel Moolenaar kdb_dbbe_select(const char *name) 4163bcd2440SMarcel Moolenaar { 4173bcd2440SMarcel Moolenaar struct kdb_dbbe *be, **iter; 4183bcd2440SMarcel Moolenaar 4193bcd2440SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 4203bcd2440SMarcel Moolenaar be = *iter; 4213bcd2440SMarcel Moolenaar if (be->dbbe_active == 0 && strcmp(be->dbbe_name, name) == 0) { 4223bcd2440SMarcel Moolenaar kdb_dbbe = be; 4233bcd2440SMarcel Moolenaar return (0); 4243bcd2440SMarcel Moolenaar } 4253bcd2440SMarcel Moolenaar } 4263bcd2440SMarcel Moolenaar return (EINVAL); 4273bcd2440SMarcel Moolenaar } 4283bcd2440SMarcel Moolenaar 4293bcd2440SMarcel Moolenaar /* 430cbc17435SMarcel Moolenaar * Enter the currently selected debugger. If a message has been provided, 431cbc17435SMarcel Moolenaar * it is printed first. If the debugger does not support the enter method, 432cbc17435SMarcel Moolenaar * it is entered by using breakpoint(), which enters the debugger through 4333de213ccSRobert Watson * kdb_trap(). The 'why' argument will contain a more mechanically usable 4343de213ccSRobert Watson * string than 'msg', and is relied upon by DDB scripting to identify the 4353de213ccSRobert Watson * reason for entering the debugger so that the right script can be run. 436cbc17435SMarcel Moolenaar */ 437cbc17435SMarcel Moolenaar void 4383de213ccSRobert Watson kdb_enter(const char *why, const char *msg) 439cbc17435SMarcel Moolenaar { 440cbc17435SMarcel Moolenaar 441cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_active == 0) { 442cbc17435SMarcel Moolenaar if (msg != NULL) 443cbc17435SMarcel Moolenaar printf("KDB: enter: %s\n", msg); 4443de213ccSRobert Watson kdb_why = why; 445cbc17435SMarcel Moolenaar breakpoint(); 4463de213ccSRobert Watson kdb_why = KDB_WHY_UNSET; 447cbc17435SMarcel Moolenaar } 448cbc17435SMarcel Moolenaar } 449cbc17435SMarcel Moolenaar 450cbc17435SMarcel Moolenaar /* 451cbc17435SMarcel Moolenaar * Initialize the kernel debugger interface. 452cbc17435SMarcel Moolenaar */ 453cbc17435SMarcel Moolenaar 454cbc17435SMarcel Moolenaar void 4557cddab63SWarner Losh kdb_init(void) 456cbc17435SMarcel Moolenaar { 457cbc17435SMarcel Moolenaar struct kdb_dbbe *be, **iter; 458cbc17435SMarcel Moolenaar int cur_pri, pri; 459cbc17435SMarcel Moolenaar 460cbc17435SMarcel Moolenaar kdb_active = 0; 461cbc17435SMarcel Moolenaar kdb_dbbe = NULL; 462cbc17435SMarcel Moolenaar cur_pri = -1; 463cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 464cbc17435SMarcel Moolenaar be = *iter; 465cbc17435SMarcel Moolenaar pri = (be->dbbe_init != NULL) ? be->dbbe_init() : -1; 466cbc17435SMarcel Moolenaar be->dbbe_active = (pri >= 0) ? 0 : -1; 467cbc17435SMarcel Moolenaar if (pri > cur_pri) { 468cbc17435SMarcel Moolenaar cur_pri = pri; 469cbc17435SMarcel Moolenaar kdb_dbbe = be; 470cbc17435SMarcel Moolenaar } 471cbc17435SMarcel Moolenaar } 472cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL) { 473cbc17435SMarcel Moolenaar printf("KDB: debugger backends:"); 474cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 475cbc17435SMarcel Moolenaar be = *iter; 476cbc17435SMarcel Moolenaar if (be->dbbe_active == 0) 477cbc17435SMarcel Moolenaar printf(" %s", be->dbbe_name); 478cbc17435SMarcel Moolenaar } 479cbc17435SMarcel Moolenaar printf("\n"); 480cbc17435SMarcel Moolenaar printf("KDB: current backend: %s\n", 481cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_name); 482cbc17435SMarcel Moolenaar } 483cbc17435SMarcel Moolenaar } 484cbc17435SMarcel Moolenaar 485cbc17435SMarcel Moolenaar /* 486cbc17435SMarcel Moolenaar * Handle contexts. 487cbc17435SMarcel Moolenaar */ 488cbc17435SMarcel Moolenaar 489cbc17435SMarcel Moolenaar void * 490cbc17435SMarcel Moolenaar kdb_jmpbuf(jmp_buf new) 491cbc17435SMarcel Moolenaar { 492cbc17435SMarcel Moolenaar void *old; 493cbc17435SMarcel Moolenaar 494cbc17435SMarcel Moolenaar old = kdb_jmpbufp; 495cbc17435SMarcel Moolenaar kdb_jmpbufp = new; 496cbc17435SMarcel Moolenaar return (old); 497cbc17435SMarcel Moolenaar } 498cbc17435SMarcel Moolenaar 499cbc17435SMarcel Moolenaar void 500cbc17435SMarcel Moolenaar kdb_reenter(void) 501cbc17435SMarcel Moolenaar { 502cbc17435SMarcel Moolenaar 503cbc17435SMarcel Moolenaar if (!kdb_active || kdb_jmpbufp == NULL) 504cbc17435SMarcel Moolenaar return; 505cbc17435SMarcel Moolenaar 506c2a44591SKonstantin Belousov printf("KDB: reentering\n"); 507c2a44591SKonstantin Belousov kdb_backtrace(); 508cbc17435SMarcel Moolenaar longjmp(kdb_jmpbufp, 1); 509cbc17435SMarcel Moolenaar /* NOTREACHED */ 510cbc17435SMarcel Moolenaar } 511cbc17435SMarcel Moolenaar 512cbc17435SMarcel Moolenaar /* 513cbc17435SMarcel Moolenaar * Thread related support functions. 514cbc17435SMarcel Moolenaar */ 515cbc17435SMarcel Moolenaar 516cbc17435SMarcel Moolenaar struct pcb * 517cbc17435SMarcel Moolenaar kdb_thr_ctx(struct thread *thr) 518fdc9713bSDoug White { 519bfcdefd8SMarcel Moolenaar #if defined(SMP) && defined(KDB_STOPPEDPCB) 520fdc9713bSDoug White struct pcpu *pc; 52158553b99SJohn Baldwin #endif 522fdc9713bSDoug White 523fdc9713bSDoug White if (thr == curthread) 5246b1e0d75SJohn Baldwin return (&kdb_pcb); 525fdc9713bSDoug White 526bfcdefd8SMarcel Moolenaar #if defined(SMP) && defined(KDB_STOPPEDPCB) 527d098f930SNathan Whitehorn STAILQ_FOREACH(pc, &cpuhead, pc_allcpu) { 52871a19bdcSAttilio Rao if (pc->pc_curthread == thr && 529a38f1f26SAttilio Rao CPU_ISSET(pc->pc_cpuid, &stopped_cpus)) 530bfcdefd8SMarcel Moolenaar return (KDB_STOPPEDPCB(pc)); 531fdc9713bSDoug White } 53258553b99SJohn Baldwin #endif 5336b1e0d75SJohn Baldwin return (thr->td_pcb); 534fdc9713bSDoug White } 535cbc17435SMarcel Moolenaar 536cbc17435SMarcel Moolenaar struct thread * 537cbc17435SMarcel Moolenaar kdb_thr_first(void) 538cbc17435SMarcel Moolenaar { 539cbc17435SMarcel Moolenaar struct proc *p; 540cbc17435SMarcel Moolenaar struct thread *thr; 541cbc17435SMarcel Moolenaar 542cbc17435SMarcel Moolenaar p = LIST_FIRST(&allproc); 543cbc17435SMarcel Moolenaar while (p != NULL) { 544b61ce5b0SJeff Roberson if (p->p_flag & P_INMEM) { 545cbc17435SMarcel Moolenaar thr = FIRST_THREAD_IN_PROC(p); 546cbc17435SMarcel Moolenaar if (thr != NULL) 547cbc17435SMarcel Moolenaar return (thr); 548cbc17435SMarcel Moolenaar } 549cbc17435SMarcel Moolenaar p = LIST_NEXT(p, p_list); 550cbc17435SMarcel Moolenaar } 551cbc17435SMarcel Moolenaar return (NULL); 552cbc17435SMarcel Moolenaar } 553cbc17435SMarcel Moolenaar 554cbc17435SMarcel Moolenaar struct thread * 5553d4f3136SMarcel Moolenaar kdb_thr_from_pid(pid_t pid) 5563d4f3136SMarcel Moolenaar { 5573d4f3136SMarcel Moolenaar struct proc *p; 5583d4f3136SMarcel Moolenaar 5593d4f3136SMarcel Moolenaar p = LIST_FIRST(&allproc); 5603d4f3136SMarcel Moolenaar while (p != NULL) { 561b61ce5b0SJeff Roberson if (p->p_flag & P_INMEM && p->p_pid == pid) 5623d4f3136SMarcel Moolenaar return (FIRST_THREAD_IN_PROC(p)); 5633d4f3136SMarcel Moolenaar p = LIST_NEXT(p, p_list); 5643d4f3136SMarcel Moolenaar } 5653d4f3136SMarcel Moolenaar return (NULL); 5663d4f3136SMarcel Moolenaar } 5673d4f3136SMarcel Moolenaar 5683d4f3136SMarcel Moolenaar struct thread * 5693d4f3136SMarcel Moolenaar kdb_thr_lookup(lwpid_t tid) 570cbc17435SMarcel Moolenaar { 571cbc17435SMarcel Moolenaar struct thread *thr; 572cbc17435SMarcel Moolenaar 573cbc17435SMarcel Moolenaar thr = kdb_thr_first(); 574cbc17435SMarcel Moolenaar while (thr != NULL && thr->td_tid != tid) 575cbc17435SMarcel Moolenaar thr = kdb_thr_next(thr); 576cbc17435SMarcel Moolenaar return (thr); 577cbc17435SMarcel Moolenaar } 578cbc17435SMarcel Moolenaar 579cbc17435SMarcel Moolenaar struct thread * 580cbc17435SMarcel Moolenaar kdb_thr_next(struct thread *thr) 581cbc17435SMarcel Moolenaar { 582cbc17435SMarcel Moolenaar struct proc *p; 583cbc17435SMarcel Moolenaar 584cbc17435SMarcel Moolenaar p = thr->td_proc; 585cbc17435SMarcel Moolenaar thr = TAILQ_NEXT(thr, td_plist); 586cbc17435SMarcel Moolenaar do { 587cbc17435SMarcel Moolenaar if (thr != NULL) 588cbc17435SMarcel Moolenaar return (thr); 589cbc17435SMarcel Moolenaar p = LIST_NEXT(p, p_list); 590b61ce5b0SJeff Roberson if (p != NULL && (p->p_flag & P_INMEM)) 591cbc17435SMarcel Moolenaar thr = FIRST_THREAD_IN_PROC(p); 592cbc17435SMarcel Moolenaar } while (p != NULL); 593cbc17435SMarcel Moolenaar return (NULL); 594cbc17435SMarcel Moolenaar } 595cbc17435SMarcel Moolenaar 596cbc17435SMarcel Moolenaar int 597cbc17435SMarcel Moolenaar kdb_thr_select(struct thread *thr) 598cbc17435SMarcel Moolenaar { 599cbc17435SMarcel Moolenaar if (thr == NULL) 600cbc17435SMarcel Moolenaar return (EINVAL); 601cbc17435SMarcel Moolenaar kdb_thread = thr; 602cbc17435SMarcel Moolenaar kdb_thrctx = kdb_thr_ctx(thr); 603cbc17435SMarcel Moolenaar return (0); 604cbc17435SMarcel Moolenaar } 605cbc17435SMarcel Moolenaar 606cbc17435SMarcel Moolenaar /* 607cbc17435SMarcel Moolenaar * Enter the debugger due to a trap. 608cbc17435SMarcel Moolenaar */ 609cbc17435SMarcel Moolenaar 610cbc17435SMarcel Moolenaar int 611cbc17435SMarcel Moolenaar kdb_trap(int type, int code, struct trapframe *tf) 612cbc17435SMarcel Moolenaar { 613d8939d82SRobert Watson #ifdef SMP 614a38f1f26SAttilio Rao cpuset_t other_cpus; 615d8939d82SRobert Watson #endif 616c0757dafSAttilio Rao struct kdb_dbbe *be; 617c0757dafSAttilio Rao register_t intr; 6185991a4f8SMarcel Moolenaar int handled; 61935370593SAndriy Gapon #ifdef SMP 62035370593SAndriy Gapon int did_stop_cpus; 62135370593SAndriy Gapon #endif 622cbc17435SMarcel Moolenaar 6233a5d3671SMatthew D Fleming be = kdb_dbbe; 6243a5d3671SMatthew D Fleming if (be == NULL || be->dbbe_trap == NULL) 625cbc17435SMarcel Moolenaar return (0); 626cbc17435SMarcel Moolenaar 627cbc17435SMarcel Moolenaar /* We reenter the debugger through kdb_reenter(). */ 628cbc17435SMarcel Moolenaar if (kdb_active) 629cbc17435SMarcel Moolenaar return (0); 630cbc17435SMarcel Moolenaar 6312fae8f5aSMarcel Moolenaar intr = intr_disable(); 632cbc17435SMarcel Moolenaar 633cbc17435SMarcel Moolenaar #ifdef SMP 63435370593SAndriy Gapon if (!SCHEDULER_STOPPED()) { 635a38f1f26SAttilio Rao other_cpus = all_cpus; 636a38f1f26SAttilio Rao CPU_CLR(PCPU_GET(cpuid), &other_cpus); 637a38f1f26SAttilio Rao stop_cpus_hard(other_cpus); 63835370593SAndriy Gapon did_stop_cpus = 1; 63935370593SAndriy Gapon } else 64035370593SAndriy Gapon did_stop_cpus = 0; 641cbc17435SMarcel Moolenaar #endif 642cbc17435SMarcel Moolenaar 64339eb1d12SMarcel Moolenaar kdb_active++; 64439eb1d12SMarcel Moolenaar 645e6aa7232SMarcel Moolenaar kdb_frame = tf; 646e6aa7232SMarcel Moolenaar 647cbc17435SMarcel Moolenaar /* Let MD code do its thing first... */ 648cbc17435SMarcel Moolenaar kdb_cpu_trap(type, code); 649cbc17435SMarcel Moolenaar 650ddf41225SMarcel Moolenaar makectx(tf, &kdb_pcb); 651ddf41225SMarcel Moolenaar kdb_thr_select(curthread); 652ddf41225SMarcel Moolenaar 653bf8696b4SAndriy Gapon cngrab(); 654bf8696b4SAndriy Gapon 6553a5d3671SMatthew D Fleming for (;;) { 6563a5d3671SMatthew D Fleming handled = be->dbbe_trap(type, code); 6573a5d3671SMatthew D Fleming if (be == kdb_dbbe) 6583a5d3671SMatthew D Fleming break; 6593a5d3671SMatthew D Fleming be = kdb_dbbe; 6603a5d3671SMatthew D Fleming if (be == NULL || be->dbbe_trap == NULL) 6613a5d3671SMatthew D Fleming break; 6623a5d3671SMatthew D Fleming printf("Switching to %s back-end\n", be->dbbe_name); 6633a5d3671SMatthew D Fleming } 664cbc17435SMarcel Moolenaar 665bf8696b4SAndriy Gapon cnungrab(); 666bf8696b4SAndriy Gapon 66739eb1d12SMarcel Moolenaar kdb_active--; 66839eb1d12SMarcel Moolenaar 669cbc17435SMarcel Moolenaar #ifdef SMP 67035370593SAndriy Gapon if (did_stop_cpus) 671cbc17435SMarcel Moolenaar restart_cpus(stopped_cpus); 672cbc17435SMarcel Moolenaar #endif 673cbc17435SMarcel Moolenaar 6742fae8f5aSMarcel Moolenaar intr_restore(intr); 675cbc17435SMarcel Moolenaar 676cbc17435SMarcel Moolenaar return (handled); 677cbc17435SMarcel Moolenaar } 678