19454b2d8SWarner Losh /*- 24d846d26SWarner Losh * SPDX-License-Identifier: BSD-2-Clause 38a36da99SPedro F. Giffuni * 4cbc17435SMarcel Moolenaar * Copyright (c) 2004 The FreeBSD Project 5cbc17435SMarcel Moolenaar * All rights reserved. 6cbc17435SMarcel Moolenaar * 7cbc17435SMarcel Moolenaar * Redistribution and use in source and binary forms, with or without 8cbc17435SMarcel Moolenaar * modification, are permitted provided that the following conditions 9cbc17435SMarcel Moolenaar * are met: 10cbc17435SMarcel Moolenaar * 11cbc17435SMarcel Moolenaar * 1. Redistributions of source code must retain the above copyright 12cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer. 13cbc17435SMarcel Moolenaar * 2. Redistributions in binary form must reproduce the above copyright 14cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer in the 15cbc17435SMarcel Moolenaar * documentation and/or other materials provided with the distribution. 16cbc17435SMarcel Moolenaar * 17cbc17435SMarcel Moolenaar * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 18cbc17435SMarcel Moolenaar * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 19cbc17435SMarcel Moolenaar * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 20cbc17435SMarcel Moolenaar * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 21cbc17435SMarcel Moolenaar * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 22cbc17435SMarcel Moolenaar * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23cbc17435SMarcel Moolenaar * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24cbc17435SMarcel Moolenaar * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25cbc17435SMarcel Moolenaar * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 26cbc17435SMarcel Moolenaar * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27cbc17435SMarcel Moolenaar */ 28cbc17435SMarcel Moolenaar 29cbc17435SMarcel Moolenaar #include <sys/cdefs.h> 30cbc17435SMarcel Moolenaar __FBSDID("$FreeBSD$"); 31cbc17435SMarcel Moolenaar 32f0c6706dSPeter Wemm #include "opt_kdb.h" 33088acbb3SAndriy Gapon #include "opt_stack.h" 34f0c6706dSPeter Wemm 35cbc17435SMarcel Moolenaar #include <sys/param.h> 36cbc17435SMarcel Moolenaar #include <sys/systm.h> 37bf8696b4SAndriy Gapon #include <sys/cons.h> 38cbc17435SMarcel Moolenaar #include <sys/kdb.h> 39cbc17435SMarcel Moolenaar #include <sys/kernel.h> 40cbc17435SMarcel Moolenaar #include <sys/malloc.h> 413f289c3fSJeff Roberson #include <sys/lock.h> 42cbc17435SMarcel Moolenaar #include <sys/pcpu.h> 434819e5aeSStephen J. Kiernan #include <sys/priv.h> 44cbc17435SMarcel Moolenaar #include <sys/proc.h> 453a5d3671SMatthew D Fleming #include <sys/sbuf.h> 46cbc17435SMarcel Moolenaar #include <sys/smp.h> 47088acbb3SAndriy Gapon #include <sys/stack.h> 48cbc17435SMarcel Moolenaar #include <sys/sysctl.h> 499d6ae1e3SColin Percival #include <sys/tslog.h> 50cbc17435SMarcel Moolenaar 51cbc17435SMarcel Moolenaar #include <machine/kdb.h> 52cbc17435SMarcel Moolenaar #include <machine/pcb.h> 53cbc17435SMarcel Moolenaar 5458553b99SJohn Baldwin #ifdef SMP 55fdc9713bSDoug White #include <machine/smp.h> 56fdc9713bSDoug White #endif 57fdc9713bSDoug White 582449b9e5SMitchell Horne #include <security/mac/mac_framework.h> 592449b9e5SMitchell Horne 60614e1868SMateusz Guzik u_char __read_frequently kdb_active = 0; 617cddab63SWarner Losh static void *kdb_jmpbufp = NULL; 62cbc17435SMarcel Moolenaar struct kdb_dbbe *kdb_dbbe = NULL; 637cddab63SWarner Losh static struct pcb kdb_pcb; 64cbc17435SMarcel Moolenaar struct pcb *kdb_thrctx = NULL; 65cbc17435SMarcel Moolenaar struct thread *kdb_thread = NULL; 66cbc17435SMarcel Moolenaar struct trapframe *kdb_frame = NULL; 67cbc17435SMarcel Moolenaar 684cf75455SRobert Watson #ifdef BREAK_TO_DEBUGGER 694cf75455SRobert Watson #define KDB_BREAK_TO_DEBUGGER 1 704cf75455SRobert Watson #else 714cf75455SRobert Watson #define KDB_BREAK_TO_DEBUGGER 0 724cf75455SRobert Watson #endif 734cf75455SRobert Watson 744cf75455SRobert Watson #ifdef ALT_BREAK_TO_DEBUGGER 754cf75455SRobert Watson #define KDB_ALT_BREAK_TO_DEBUGGER 1 764cf75455SRobert Watson #else 774cf75455SRobert Watson #define KDB_ALT_BREAK_TO_DEBUGGER 0 784cf75455SRobert Watson #endif 794cf75455SRobert Watson 804cf75455SRobert Watson static int kdb_break_to_debugger = KDB_BREAK_TO_DEBUGGER; 814cf75455SRobert Watson static int kdb_alt_break_to_debugger = KDB_ALT_BREAK_TO_DEBUGGER; 82cab10561SMark Johnston static int kdb_enter_securelevel = 0; 834cf75455SRobert Watson 840cc457b0SJohn Baldwin KDB_BACKEND(null, NULL, NULL, NULL, NULL); 85cbc17435SMarcel Moolenaar 86cbc17435SMarcel Moolenaar static int kdb_sysctl_available(SYSCTL_HANDLER_ARGS); 87cbc17435SMarcel Moolenaar static int kdb_sysctl_current(SYSCTL_HANDLER_ARGS); 88cbc17435SMarcel Moolenaar static int kdb_sysctl_enter(SYSCTL_HANDLER_ARGS); 8940c9966aSPeter Wemm static int kdb_sysctl_panic(SYSCTL_HANDLER_ARGS); 9093644056SWarner Losh static int kdb_sysctl_panic_str(SYSCTL_HANDLER_ARGS); 9140c9966aSPeter Wemm static int kdb_sysctl_trap(SYSCTL_HANDLER_ARGS); 9242ccd54fSYaroslav Tykhiy static int kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS); 93fd94177cSKonstantin Belousov static int kdb_sysctl_stack_overflow(SYSCTL_HANDLER_ARGS); 94cbc17435SMarcel Moolenaar 957029da5cSPawel Biernacki static SYSCTL_NODE(_debug, OID_AUTO, kdb, CTLFLAG_RW | CTLFLAG_MPSAFE, NULL, 967029da5cSPawel Biernacki "KDB nodes"); 97cbc17435SMarcel Moolenaar 987029da5cSPawel Biernacki SYSCTL_PROC(_debug_kdb, OID_AUTO, available, 997029da5cSPawel Biernacki CTLTYPE_STRING | CTLFLAG_RD | CTLFLAG_MPSAFE, NULL, 0, 1007029da5cSPawel Biernacki kdb_sysctl_available, "A", 1017029da5cSPawel Biernacki "list of available KDB backends"); 102cbc17435SMarcel Moolenaar 1037029da5cSPawel Biernacki SYSCTL_PROC(_debug_kdb, OID_AUTO, current, 1047029da5cSPawel Biernacki CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_MPSAFE, NULL, 0, 1057029da5cSPawel Biernacki kdb_sysctl_current, "A", 1067029da5cSPawel Biernacki "currently selected KDB backend"); 107cbc17435SMarcel Moolenaar 108ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, enter, 109cab10561SMark Johnston CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_MPSAFE, NULL, 0, 1107029da5cSPawel Biernacki kdb_sysctl_enter, "I", 1117029da5cSPawel Biernacki "set to enter the debugger"); 112cbc17435SMarcel Moolenaar 113ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, panic, 1147029da5cSPawel Biernacki CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE | CTLFLAG_MPSAFE, NULL, 0, 1157029da5cSPawel Biernacki kdb_sysctl_panic, "I", 1167029da5cSPawel Biernacki "set to panic the kernel"); 11740c9966aSPeter Wemm 11893644056SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, panic_str, 11993644056SWarner Losh CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_SECURE | CTLFLAG_MPSAFE, NULL, 0, 12093644056SWarner Losh kdb_sysctl_panic_str, "A", 12140e6e2c2SWarner Losh "trigger a kernel panic, using the provided string as the panic message"); 12293644056SWarner Losh 123ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, trap, 1247029da5cSPawel Biernacki CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE | CTLFLAG_MPSAFE, NULL, 0, 1257029da5cSPawel Biernacki kdb_sysctl_trap, "I", 1267029da5cSPawel Biernacki "set to cause a page fault via data access"); 12742ccd54fSYaroslav Tykhiy 128ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, trap_code, 1297029da5cSPawel Biernacki CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE | CTLFLAG_MPSAFE, NULL, 0, 1307029da5cSPawel Biernacki kdb_sysctl_trap_code, "I", 1317029da5cSPawel Biernacki "set to cause a page fault via code access"); 13240c9966aSPeter Wemm 133fd94177cSKonstantin Belousov SYSCTL_PROC(_debug_kdb, OID_AUTO, stack_overflow, 1347029da5cSPawel Biernacki CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE | CTLFLAG_MPSAFE, NULL, 0, 1357029da5cSPawel Biernacki kdb_sysctl_stack_overflow, "I", 1367029da5cSPawel Biernacki "set to cause a stack overflow"); 137fd94177cSKonstantin Belousov 138ef522f95SDavid E. O'Brien SYSCTL_INT(_debug_kdb, OID_AUTO, break_to_debugger, 139cab10561SMark Johnston CTLFLAG_RWTUN, 140ef522f95SDavid E. O'Brien &kdb_break_to_debugger, 0, "Enable break to debugger"); 1414cf75455SRobert Watson 142ef522f95SDavid E. O'Brien SYSCTL_INT(_debug_kdb, OID_AUTO, alt_break_to_debugger, 143cab10561SMark Johnston CTLFLAG_RWTUN, 144ef522f95SDavid E. O'Brien &kdb_alt_break_to_debugger, 0, "Enable alternative break to debugger"); 1454cf75455SRobert Watson 146cab10561SMark Johnston SYSCTL_INT(_debug_kdb, OID_AUTO, enter_securelevel, 147cab10561SMark Johnston CTLFLAG_RWTUN | CTLFLAG_SECURE, 148cab10561SMark Johnston &kdb_enter_securelevel, 0, 149cab10561SMark Johnston "Maximum securelevel to enter a KDB backend"); 150cab10561SMark Johnston 151d8939d82SRobert Watson /* 1523de213ccSRobert Watson * Flag to indicate to debuggers why the debugger was entered. 1533de213ccSRobert Watson */ 1543de213ccSRobert Watson const char * volatile kdb_why = KDB_WHY_UNSET; 1553de213ccSRobert Watson 156cbc17435SMarcel Moolenaar static int 157cbc17435SMarcel Moolenaar kdb_sysctl_available(SYSCTL_HANDLER_ARGS) 158cbc17435SMarcel Moolenaar { 1593a5d3671SMatthew D Fleming struct kdb_dbbe **iter; 1603a5d3671SMatthew D Fleming struct sbuf sbuf; 161cbc17435SMarcel Moolenaar int error; 162cbc17435SMarcel Moolenaar 1633a5d3671SMatthew D Fleming sbuf_new_for_sysctl(&sbuf, NULL, 64, req); 164cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 1653a5d3671SMatthew D Fleming if ((*iter)->dbbe_active == 0) 1663a5d3671SMatthew D Fleming sbuf_printf(&sbuf, "%s ", (*iter)->dbbe_name); 167cbc17435SMarcel Moolenaar } 1683a5d3671SMatthew D Fleming error = sbuf_finish(&sbuf); 1693a5d3671SMatthew D Fleming sbuf_delete(&sbuf); 170cbc17435SMarcel Moolenaar return (error); 171cbc17435SMarcel Moolenaar } 172cbc17435SMarcel Moolenaar 173cbc17435SMarcel Moolenaar static int 174cbc17435SMarcel Moolenaar kdb_sysctl_current(SYSCTL_HANDLER_ARGS) 175cbc17435SMarcel Moolenaar { 176cbc17435SMarcel Moolenaar char buf[16]; 177cbc17435SMarcel Moolenaar int error; 178cbc17435SMarcel Moolenaar 1793a5d3671SMatthew D Fleming if (kdb_dbbe != NULL) 1803a5d3671SMatthew D Fleming strlcpy(buf, kdb_dbbe->dbbe_name, sizeof(buf)); 1813a5d3671SMatthew D Fleming else 182a8bfba1aSMarcel Moolenaar *buf = '\0'; 183cbc17435SMarcel Moolenaar error = sysctl_handle_string(oidp, buf, sizeof(buf), req); 184cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 185cbc17435SMarcel Moolenaar return (error); 186cbc17435SMarcel Moolenaar if (kdb_active) 187cbc17435SMarcel Moolenaar return (EBUSY); 1883bcd2440SMarcel Moolenaar return (kdb_dbbe_select(buf)); 189cbc17435SMarcel Moolenaar } 190cbc17435SMarcel Moolenaar 191cbc17435SMarcel Moolenaar static int 192cbc17435SMarcel Moolenaar kdb_sysctl_enter(SYSCTL_HANDLER_ARGS) 193cbc17435SMarcel Moolenaar { 194cbc17435SMarcel Moolenaar int error, i; 195cbc17435SMarcel Moolenaar 196cbc17435SMarcel Moolenaar error = sysctl_wire_old_buffer(req, sizeof(int)); 197cbc17435SMarcel Moolenaar if (error == 0) { 198cbc17435SMarcel Moolenaar i = 0; 199cbc17435SMarcel Moolenaar error = sysctl_handle_int(oidp, &i, 0, req); 200cbc17435SMarcel Moolenaar } 201cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 202cbc17435SMarcel Moolenaar return (error); 203cbc17435SMarcel Moolenaar if (kdb_active) 204cbc17435SMarcel Moolenaar return (EBUSY); 2053de213ccSRobert Watson kdb_enter(KDB_WHY_SYSCTL, "sysctl debug.kdb.enter"); 206cbc17435SMarcel Moolenaar return (0); 207cbc17435SMarcel Moolenaar } 208cbc17435SMarcel Moolenaar 20940c9966aSPeter Wemm static int 21040c9966aSPeter Wemm kdb_sysctl_panic(SYSCTL_HANDLER_ARGS) 21140c9966aSPeter Wemm { 21240c9966aSPeter Wemm int error, i; 21340c9966aSPeter Wemm 21440c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 21540c9966aSPeter Wemm if (error == 0) { 21640c9966aSPeter Wemm i = 0; 21740c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 21840c9966aSPeter Wemm } 21940c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 22040c9966aSPeter Wemm return (error); 22140c9966aSPeter Wemm panic("kdb_sysctl_panic"); 22240c9966aSPeter Wemm return (0); 22340c9966aSPeter Wemm } 22440c9966aSPeter Wemm 22540c9966aSPeter Wemm static int 22693644056SWarner Losh kdb_sysctl_panic_str(SYSCTL_HANDLER_ARGS) 22793644056SWarner Losh { 22893644056SWarner Losh int error; 22993644056SWarner Losh static char buf[256]; /* static buffer to limit mallocs when panicing */ 23093644056SWarner Losh 23193644056SWarner Losh *buf = '\0'; 23293644056SWarner Losh error = sysctl_handle_string(oidp, buf, sizeof(buf), req); 23393644056SWarner Losh if (error != 0 || req->newptr == NULL) 23493644056SWarner Losh return (error); 23593644056SWarner Losh panic("kdb_sysctl_panic: %s", buf); 23693644056SWarner Losh return (0); 23793644056SWarner Losh } 23893644056SWarner Losh 23993644056SWarner Losh static int 24040c9966aSPeter Wemm kdb_sysctl_trap(SYSCTL_HANDLER_ARGS) 24140c9966aSPeter Wemm { 24240c9966aSPeter Wemm int error, i; 24340c9966aSPeter Wemm int *addr = (int *)0x10; 24440c9966aSPeter Wemm 24540c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 24640c9966aSPeter Wemm if (error == 0) { 24740c9966aSPeter Wemm i = 0; 24840c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 24940c9966aSPeter Wemm } 25040c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 25140c9966aSPeter Wemm return (error); 25240c9966aSPeter Wemm return (*addr); 25340c9966aSPeter Wemm } 25440c9966aSPeter Wemm 25542ccd54fSYaroslav Tykhiy static int 25642ccd54fSYaroslav Tykhiy kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS) 25742ccd54fSYaroslav Tykhiy { 25842ccd54fSYaroslav Tykhiy int error, i; 25942ccd54fSYaroslav Tykhiy void (*fp)(u_int, u_int, u_int) = (void *)0xdeadc0de; 26042ccd54fSYaroslav Tykhiy 26142ccd54fSYaroslav Tykhiy error = sysctl_wire_old_buffer(req, sizeof(int)); 26242ccd54fSYaroslav Tykhiy if (error == 0) { 26342ccd54fSYaroslav Tykhiy i = 0; 26442ccd54fSYaroslav Tykhiy error = sysctl_handle_int(oidp, &i, 0, req); 26542ccd54fSYaroslav Tykhiy } 26642ccd54fSYaroslav Tykhiy if (error != 0 || req->newptr == NULL) 26742ccd54fSYaroslav Tykhiy return (error); 26842ccd54fSYaroslav Tykhiy (*fp)(0x11111111, 0x22222222, 0x33333333); 26942ccd54fSYaroslav Tykhiy return (0); 27042ccd54fSYaroslav Tykhiy } 27142ccd54fSYaroslav Tykhiy 272fd94177cSKonstantin Belousov static void kdb_stack_overflow(volatile int *x) __noinline; 273fd94177cSKonstantin Belousov static void 274fd94177cSKonstantin Belousov kdb_stack_overflow(volatile int *x) 275fd94177cSKonstantin Belousov { 276fd94177cSKonstantin Belousov 277fd94177cSKonstantin Belousov if (*x > 10000000) 278fd94177cSKonstantin Belousov return; 279fd94177cSKonstantin Belousov kdb_stack_overflow(x); 280fd94177cSKonstantin Belousov *x += PCPU_GET(cpuid) / 1000000; 281fd94177cSKonstantin Belousov } 282fd94177cSKonstantin Belousov 283fd94177cSKonstantin Belousov static int 284fd94177cSKonstantin Belousov kdb_sysctl_stack_overflow(SYSCTL_HANDLER_ARGS) 285fd94177cSKonstantin Belousov { 286fd94177cSKonstantin Belousov int error, i; 287fd94177cSKonstantin Belousov volatile int x; 288fd94177cSKonstantin Belousov 289fd94177cSKonstantin Belousov error = sysctl_wire_old_buffer(req, sizeof(int)); 290fd94177cSKonstantin Belousov if (error == 0) { 291fd94177cSKonstantin Belousov i = 0; 292fd94177cSKonstantin Belousov error = sysctl_handle_int(oidp, &i, 0, req); 293fd94177cSKonstantin Belousov } 294fd94177cSKonstantin Belousov if (error != 0 || req->newptr == NULL) 295fd94177cSKonstantin Belousov return (error); 296fd94177cSKonstantin Belousov x = 0; 297fd94177cSKonstantin Belousov kdb_stack_overflow(&x); 298fd94177cSKonstantin Belousov return (0); 299fd94177cSKonstantin Belousov } 300fd94177cSKonstantin Belousov 30143d7128cSPeter Wemm void 30243d7128cSPeter Wemm kdb_panic(const char *msg) 30343d7128cSPeter Wemm { 304a38f1f26SAttilio Rao 3051ea833a5STom Jones kdb_why = KDB_WHY_PANIC; 30643d7128cSPeter Wemm printf("KDB: panic\n"); 3071bdfff22SAndriy Gapon panic("%s", msg); 30843d7128cSPeter Wemm } 30943d7128cSPeter Wemm 31043d7128cSPeter Wemm void 31143d7128cSPeter Wemm kdb_reboot(void) 31243d7128cSPeter Wemm { 31343d7128cSPeter Wemm 3141ea833a5STom Jones kdb_why = KDB_WHY_REBOOT; 31543d7128cSPeter Wemm printf("KDB: reboot requested\n"); 31643d7128cSPeter Wemm shutdown_nice(0); 31743d7128cSPeter Wemm } 31843d7128cSPeter Wemm 319cbc17435SMarcel Moolenaar /* 320cbc17435SMarcel Moolenaar * Solaris implements a new BREAK which is initiated by a character sequence 321cbc17435SMarcel Moolenaar * CR ~ ^b which is similar to a familiar pattern used on Sun servers by the 322cbc17435SMarcel Moolenaar * Remote Console. 323cbc17435SMarcel Moolenaar * 324cbc17435SMarcel Moolenaar * Note that this function may be called from almost anywhere, with interrupts 325cbc17435SMarcel Moolenaar * disabled and with unknown locks held, so it must not access data other than 326cbc17435SMarcel Moolenaar * its arguments. Its up to the caller to ensure that the state variable is 327cbc17435SMarcel Moolenaar * consistent. 328cbc17435SMarcel Moolenaar */ 329cbc17435SMarcel Moolenaar #define KEY_CR 13 /* CR '\r' */ 330cbc17435SMarcel Moolenaar #define KEY_TILDE 126 /* ~ */ 331cbc17435SMarcel Moolenaar #define KEY_CRTLB 2 /* ^B */ 33243d7128cSPeter Wemm #define KEY_CRTLP 16 /* ^P */ 33343d7128cSPeter Wemm #define KEY_CRTLR 18 /* ^R */ 334cbc17435SMarcel Moolenaar 33549f5aeafSAttilio Rao /* States of th KDB "alternate break sequence" detecting state machine. */ 33649f5aeafSAttilio Rao enum { 33749f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_NONE, 33849f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_CR, 33949f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_CR_TILDE, 34049f5aeafSAttilio Rao }; 34149f5aeafSAttilio Rao 342cbc17435SMarcel Moolenaar int 3434cf75455SRobert Watson kdb_break(void) 3444cf75455SRobert Watson { 3454cf75455SRobert Watson 3464cf75455SRobert Watson if (!kdb_break_to_debugger) 3474cf75455SRobert Watson return (0); 3484cf75455SRobert Watson kdb_enter(KDB_WHY_BREAK, "Break to debugger"); 3494cf75455SRobert Watson return (KDB_REQ_DEBUGGER); 3504cf75455SRobert Watson } 3514cf75455SRobert Watson 3524cf75455SRobert Watson static int 3534cf75455SRobert Watson kdb_alt_break_state(int key, int *state) 354cbc17435SMarcel Moolenaar { 355cbc17435SMarcel Moolenaar int brk; 356cbc17435SMarcel Moolenaar 35749f5aeafSAttilio Rao /* All states transition to KDB_ALT_BREAK_SEEN_CR on a CR. */ 35849f5aeafSAttilio Rao if (key == KEY_CR) { 35949f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_CR; 36049f5aeafSAttilio Rao return (0); 36149f5aeafSAttilio Rao } 36249f5aeafSAttilio Rao 363cbc17435SMarcel Moolenaar brk = 0; 36443d7128cSPeter Wemm switch (*state) { 36549f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_CR: 36649f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 36743d7128cSPeter Wemm if (key == KEY_TILDE) 36849f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_CR_TILDE; 369cbc17435SMarcel Moolenaar break; 37049f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_CR_TILDE: 37149f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 37243d7128cSPeter Wemm if (key == KEY_CRTLB) 37343d7128cSPeter Wemm brk = KDB_REQ_DEBUGGER; 37443d7128cSPeter Wemm else if (key == KEY_CRTLP) 37543d7128cSPeter Wemm brk = KDB_REQ_PANIC; 37643d7128cSPeter Wemm else if (key == KEY_CRTLR) 37743d7128cSPeter Wemm brk = KDB_REQ_REBOOT; 37849f5aeafSAttilio Rao break; 37949f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_NONE: 38049f5aeafSAttilio Rao default: 38149f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 38249f5aeafSAttilio Rao break; 383cbc17435SMarcel Moolenaar } 384cbc17435SMarcel Moolenaar return (brk); 385cbc17435SMarcel Moolenaar } 386cbc17435SMarcel Moolenaar 3874cf75455SRobert Watson static int 3884cf75455SRobert Watson kdb_alt_break_internal(int key, int *state, int force_gdb) 3894cf75455SRobert Watson { 3904cf75455SRobert Watson int brk; 3914cf75455SRobert Watson 3924cf75455SRobert Watson if (!kdb_alt_break_to_debugger) 3934cf75455SRobert Watson return (0); 3944cf75455SRobert Watson brk = kdb_alt_break_state(key, state); 3954cf75455SRobert Watson switch (brk) { 3964cf75455SRobert Watson case KDB_REQ_DEBUGGER: 3974cf75455SRobert Watson if (force_gdb) 3984cf75455SRobert Watson kdb_dbbe_select("gdb"); 3994cf75455SRobert Watson kdb_enter(KDB_WHY_BREAK, "Break to debugger"); 4004cf75455SRobert Watson break; 4014cf75455SRobert Watson 4024cf75455SRobert Watson case KDB_REQ_PANIC: 4034cf75455SRobert Watson if (force_gdb) 4044cf75455SRobert Watson kdb_dbbe_select("gdb"); 4054cf75455SRobert Watson kdb_panic("Panic sequence on console"); 4064cf75455SRobert Watson break; 4074cf75455SRobert Watson 4084cf75455SRobert Watson case KDB_REQ_REBOOT: 4094cf75455SRobert Watson kdb_reboot(); 4104cf75455SRobert Watson break; 4114cf75455SRobert Watson } 4124cf75455SRobert Watson return (0); 4134cf75455SRobert Watson } 4144cf75455SRobert Watson 4154cf75455SRobert Watson int 4164cf75455SRobert Watson kdb_alt_break(int key, int *state) 4174cf75455SRobert Watson { 4184cf75455SRobert Watson 4194cf75455SRobert Watson return (kdb_alt_break_internal(key, state, 0)); 4204cf75455SRobert Watson } 4214cf75455SRobert Watson 4224cf75455SRobert Watson /* 4234cf75455SRobert Watson * This variation on kdb_alt_break() is used only by dcons, which has its own 4244cf75455SRobert Watson * configuration flag to force GDB use regardless of the global KDB 4254cf75455SRobert Watson * configuration. 4264cf75455SRobert Watson */ 4274cf75455SRobert Watson int 4284cf75455SRobert Watson kdb_alt_break_gdb(int key, int *state) 4294cf75455SRobert Watson { 4304cf75455SRobert Watson 4314cf75455SRobert Watson return (kdb_alt_break_internal(key, state, 1)); 4324cf75455SRobert Watson } 4334cf75455SRobert Watson 434cbc17435SMarcel Moolenaar /* 435cbc17435SMarcel Moolenaar * Print a backtrace of the calling thread. The backtrace is generated by 436cbc17435SMarcel Moolenaar * the selected debugger, provided it supports backtraces. If no debugger 437cbc17435SMarcel Moolenaar * is selected or the current debugger does not support backtraces, this 438cbc17435SMarcel Moolenaar * function silently returns. 439cbc17435SMarcel Moolenaar */ 440cbc17435SMarcel Moolenaar void 4417cddab63SWarner Losh kdb_backtrace(void) 442cbc17435SMarcel Moolenaar { 443cbc17435SMarcel Moolenaar 444cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_dbbe->dbbe_trace != NULL) { 445cbc17435SMarcel Moolenaar printf("KDB: stack backtrace:\n"); 446cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_trace(); 447cbc17435SMarcel Moolenaar } 448088acbb3SAndriy Gapon #ifdef STACK 449088acbb3SAndriy Gapon else { 450088acbb3SAndriy Gapon struct stack st; 451088acbb3SAndriy Gapon 452088acbb3SAndriy Gapon printf("KDB: stack backtrace:\n"); 453088acbb3SAndriy Gapon stack_save(&st); 45461548876SAndriy Gapon stack_print_ddb(&st); 455088acbb3SAndriy Gapon } 456088acbb3SAndriy Gapon #endif 457cbc17435SMarcel Moolenaar } 458cbc17435SMarcel Moolenaar 459cbc17435SMarcel Moolenaar /* 4600cc457b0SJohn Baldwin * Similar to kdb_backtrace() except that it prints a backtrace of an 4610cc457b0SJohn Baldwin * arbitrary thread rather than the calling thread. 4620cc457b0SJohn Baldwin */ 4630cc457b0SJohn Baldwin void 4640cc457b0SJohn Baldwin kdb_backtrace_thread(struct thread *td) 4650cc457b0SJohn Baldwin { 4660cc457b0SJohn Baldwin 4670cc457b0SJohn Baldwin if (kdb_dbbe != NULL && kdb_dbbe->dbbe_trace_thread != NULL) { 4680cc457b0SJohn Baldwin printf("KDB: stack backtrace of thread %d:\n", td->td_tid); 4690cc457b0SJohn Baldwin kdb_dbbe->dbbe_trace_thread(td); 4700cc457b0SJohn Baldwin } 4710cc457b0SJohn Baldwin #ifdef STACK 4720cc457b0SJohn Baldwin else { 4730cc457b0SJohn Baldwin struct stack st; 4740cc457b0SJohn Baldwin 4750cc457b0SJohn Baldwin printf("KDB: stack backtrace of thread %d:\n", td->td_tid); 4761c29da02SMark Johnston if (stack_save_td(&st, td) == 0) 4770cc457b0SJohn Baldwin stack_print_ddb(&st); 4780cc457b0SJohn Baldwin } 4790cc457b0SJohn Baldwin #endif 4800cc457b0SJohn Baldwin } 4810cc457b0SJohn Baldwin 4820cc457b0SJohn Baldwin /* 4833bcd2440SMarcel Moolenaar * Set/change the current backend. 4843bcd2440SMarcel Moolenaar */ 4853bcd2440SMarcel Moolenaar int 4863bcd2440SMarcel Moolenaar kdb_dbbe_select(const char *name) 4873bcd2440SMarcel Moolenaar { 4883bcd2440SMarcel Moolenaar struct kdb_dbbe *be, **iter; 4894819e5aeSStephen J. Kiernan int error; 4904819e5aeSStephen J. Kiernan 4914819e5aeSStephen J. Kiernan error = priv_check(curthread, PRIV_KDB_SET_BACKEND); 4924819e5aeSStephen J. Kiernan if (error) 4934819e5aeSStephen J. Kiernan return (error); 4943bcd2440SMarcel Moolenaar 4953bcd2440SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 4963bcd2440SMarcel Moolenaar be = *iter; 4973bcd2440SMarcel Moolenaar if (be->dbbe_active == 0 && strcmp(be->dbbe_name, name) == 0) { 4983bcd2440SMarcel Moolenaar kdb_dbbe = be; 4993bcd2440SMarcel Moolenaar return (0); 5003bcd2440SMarcel Moolenaar } 5013bcd2440SMarcel Moolenaar } 5023bcd2440SMarcel Moolenaar return (EINVAL); 5033bcd2440SMarcel Moolenaar } 5043bcd2440SMarcel Moolenaar 505cab10561SMark Johnston static bool 506*bd16c274SMark Johnston kdb_backend_permitted(struct kdb_dbbe *be, struct thread *td) 507cab10561SMark Johnston { 508*bd16c274SMark Johnston struct ucred *cred; 509cab10561SMark Johnston int error; 510cab10561SMark Johnston 511*bd16c274SMark Johnston cred = td->td_ucred; 512*bd16c274SMark Johnston if (cred == NULL) { 513*bd16c274SMark Johnston KASSERT(td == &thread0 && cold, 514*bd16c274SMark Johnston ("%s: missing cred for %p", __func__, td)); 515*bd16c274SMark Johnston error = 0; 516*bd16c274SMark Johnston } else { 517cab10561SMark Johnston error = securelevel_gt(cred, kdb_enter_securelevel); 518*bd16c274SMark Johnston } 519cab10561SMark Johnston #ifdef MAC 520cab10561SMark Johnston /* 521cab10561SMark Johnston * Give MAC a chance to weigh in on the policy: if the securelevel is 522cab10561SMark Johnston * not raised, then MAC may veto the backend, otherwise MAC may 523cab10561SMark Johnston * explicitly grant access. 524cab10561SMark Johnston */ 525cab10561SMark Johnston if (error == 0) { 526cab10561SMark Johnston error = mac_kdb_check_backend(be); 527cab10561SMark Johnston if (error != 0) { 528cab10561SMark Johnston printf("MAC prevented execution of KDB backend: %s\n", 529cab10561SMark Johnston be->dbbe_name); 530cab10561SMark Johnston return (false); 531cab10561SMark Johnston } 532cab10561SMark Johnston } else if (mac_kdb_grant_backend(be) == 0) { 533cab10561SMark Johnston error = 0; 534cab10561SMark Johnston } 535cab10561SMark Johnston #endif 536cab10561SMark Johnston if (error != 0) 537cab10561SMark Johnston printf("refusing to enter KDB with elevated securelevel\n"); 538cab10561SMark Johnston return (error == 0); 539cab10561SMark Johnston } 540cab10561SMark Johnston 5413bcd2440SMarcel Moolenaar /* 542cbc17435SMarcel Moolenaar * Enter the currently selected debugger. If a message has been provided, 543cbc17435SMarcel Moolenaar * it is printed first. If the debugger does not support the enter method, 544cbc17435SMarcel Moolenaar * it is entered by using breakpoint(), which enters the debugger through 5453de213ccSRobert Watson * kdb_trap(). The 'why' argument will contain a more mechanically usable 5463de213ccSRobert Watson * string than 'msg', and is relied upon by DDB scripting to identify the 5473de213ccSRobert Watson * reason for entering the debugger so that the right script can be run. 548cbc17435SMarcel Moolenaar */ 549cbc17435SMarcel Moolenaar void 5503de213ccSRobert Watson kdb_enter(const char *why, const char *msg) 551cbc17435SMarcel Moolenaar { 552cbc17435SMarcel Moolenaar 553cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_active == 0) { 5541ea833a5STom Jones kdb_why = why; 555cbc17435SMarcel Moolenaar if (msg != NULL) 556cbc17435SMarcel Moolenaar printf("KDB: enter: %s\n", msg); 557cbc17435SMarcel Moolenaar breakpoint(); 5583de213ccSRobert Watson kdb_why = KDB_WHY_UNSET; 559cbc17435SMarcel Moolenaar } 560cbc17435SMarcel Moolenaar } 561cbc17435SMarcel Moolenaar 562cbc17435SMarcel Moolenaar /* 563cbc17435SMarcel Moolenaar * Initialize the kernel debugger interface. 564cbc17435SMarcel Moolenaar */ 565cbc17435SMarcel Moolenaar void 5667cddab63SWarner Losh kdb_init(void) 567cbc17435SMarcel Moolenaar { 568cbc17435SMarcel Moolenaar struct kdb_dbbe *be, **iter; 569cbc17435SMarcel Moolenaar int cur_pri, pri; 570cbc17435SMarcel Moolenaar 5719d6ae1e3SColin Percival TSENTER(); 572cbc17435SMarcel Moolenaar kdb_active = 0; 573cbc17435SMarcel Moolenaar kdb_dbbe = NULL; 574cbc17435SMarcel Moolenaar cur_pri = -1; 575cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 576cbc17435SMarcel Moolenaar be = *iter; 577cbc17435SMarcel Moolenaar pri = (be->dbbe_init != NULL) ? be->dbbe_init() : -1; 578cbc17435SMarcel Moolenaar be->dbbe_active = (pri >= 0) ? 0 : -1; 579cbc17435SMarcel Moolenaar if (pri > cur_pri) { 580cbc17435SMarcel Moolenaar cur_pri = pri; 581cbc17435SMarcel Moolenaar kdb_dbbe = be; 582cbc17435SMarcel Moolenaar } 583cbc17435SMarcel Moolenaar } 584cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL) { 585cbc17435SMarcel Moolenaar printf("KDB: debugger backends:"); 586cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 587cbc17435SMarcel Moolenaar be = *iter; 588cbc17435SMarcel Moolenaar if (be->dbbe_active == 0) 589cbc17435SMarcel Moolenaar printf(" %s", be->dbbe_name); 590cbc17435SMarcel Moolenaar } 591cbc17435SMarcel Moolenaar printf("\n"); 592cbc17435SMarcel Moolenaar printf("KDB: current backend: %s\n", 593cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_name); 594cbc17435SMarcel Moolenaar } 5959d6ae1e3SColin Percival TSEXIT(); 596cbc17435SMarcel Moolenaar } 597cbc17435SMarcel Moolenaar 598cbc17435SMarcel Moolenaar /* 599cbc17435SMarcel Moolenaar * Handle contexts. 600cbc17435SMarcel Moolenaar */ 601cbc17435SMarcel Moolenaar void * 602cbc17435SMarcel Moolenaar kdb_jmpbuf(jmp_buf new) 603cbc17435SMarcel Moolenaar { 604cbc17435SMarcel Moolenaar void *old; 605cbc17435SMarcel Moolenaar 606cbc17435SMarcel Moolenaar old = kdb_jmpbufp; 607cbc17435SMarcel Moolenaar kdb_jmpbufp = new; 608cbc17435SMarcel Moolenaar return (old); 609cbc17435SMarcel Moolenaar } 610cbc17435SMarcel Moolenaar 611cbc17435SMarcel Moolenaar void 612cbc17435SMarcel Moolenaar kdb_reenter(void) 613cbc17435SMarcel Moolenaar { 614cbc17435SMarcel Moolenaar 615cbc17435SMarcel Moolenaar if (!kdb_active || kdb_jmpbufp == NULL) 616cbc17435SMarcel Moolenaar return; 617cbc17435SMarcel Moolenaar 618c2a44591SKonstantin Belousov printf("KDB: reentering\n"); 619c2a44591SKonstantin Belousov kdb_backtrace(); 620cbc17435SMarcel Moolenaar longjmp(kdb_jmpbufp, 1); 621cbc17435SMarcel Moolenaar /* NOTREACHED */ 622cbc17435SMarcel Moolenaar } 623cbc17435SMarcel Moolenaar 624212ff84fSEdward Tomasz Napierala void 625212ff84fSEdward Tomasz Napierala kdb_reenter_silent(void) 626212ff84fSEdward Tomasz Napierala { 627212ff84fSEdward Tomasz Napierala 628212ff84fSEdward Tomasz Napierala if (!kdb_active || kdb_jmpbufp == NULL) 629212ff84fSEdward Tomasz Napierala return; 630212ff84fSEdward Tomasz Napierala 631212ff84fSEdward Tomasz Napierala longjmp(kdb_jmpbufp, 1); 632212ff84fSEdward Tomasz Napierala /* NOTREACHED */ 633212ff84fSEdward Tomasz Napierala } 634212ff84fSEdward Tomasz Napierala 635cbc17435SMarcel Moolenaar /* 6362c9ec075SAlexey Dokuchaev * Thread-related support functions. 637cbc17435SMarcel Moolenaar */ 638cbc17435SMarcel Moolenaar struct pcb * 639cbc17435SMarcel Moolenaar kdb_thr_ctx(struct thread *thr) 640fdc9713bSDoug White { 6419fb6718dSMark Johnston #ifdef SMP 642fdc9713bSDoug White struct pcpu *pc; 64358553b99SJohn Baldwin #endif 644fdc9713bSDoug White 645fdc9713bSDoug White if (thr == curthread) 6466b1e0d75SJohn Baldwin return (&kdb_pcb); 647fdc9713bSDoug White 6489fb6718dSMark Johnston #ifdef SMP 649d098f930SNathan Whitehorn STAILQ_FOREACH(pc, &cpuhead, pc_allcpu) { 65071a19bdcSAttilio Rao if (pc->pc_curthread == thr && 651a38f1f26SAttilio Rao CPU_ISSET(pc->pc_cpuid, &stopped_cpus)) 6529fb6718dSMark Johnston return (&stoppcbs[pc->pc_cpuid]); 653fdc9713bSDoug White } 65458553b99SJohn Baldwin #endif 6556b1e0d75SJohn Baldwin return (thr->td_pcb); 656fdc9713bSDoug White } 657cbc17435SMarcel Moolenaar 658cbc17435SMarcel Moolenaar struct thread * 659cbc17435SMarcel Moolenaar kdb_thr_first(void) 660cbc17435SMarcel Moolenaar { 661cbc17435SMarcel Moolenaar struct proc *p; 662cbc17435SMarcel Moolenaar struct thread *thr; 6639acce1c9SJohn Baldwin u_int i; 664cbc17435SMarcel Moolenaar 6654ccaa87fSMitchell Horne /* This function may be called early. */ 6664ccaa87fSMitchell Horne if (pidhashtbl == NULL) 6674ccaa87fSMitchell Horne return (&thread0); 6684ccaa87fSMitchell Horne 6699acce1c9SJohn Baldwin for (i = 0; i <= pidhash; i++) { 6709acce1c9SJohn Baldwin LIST_FOREACH(p, &pidhashtbl[i], p_hash) { 671cbc17435SMarcel Moolenaar thr = FIRST_THREAD_IN_PROC(p); 672cbc17435SMarcel Moolenaar if (thr != NULL) 673cbc17435SMarcel Moolenaar return (thr); 674cbc17435SMarcel Moolenaar } 675cbc17435SMarcel Moolenaar } 676cbc17435SMarcel Moolenaar return (NULL); 677cbc17435SMarcel Moolenaar } 678cbc17435SMarcel Moolenaar 679cbc17435SMarcel Moolenaar struct thread * 6803d4f3136SMarcel Moolenaar kdb_thr_from_pid(pid_t pid) 6813d4f3136SMarcel Moolenaar { 6823d4f3136SMarcel Moolenaar struct proc *p; 6833d4f3136SMarcel Moolenaar 6849acce1c9SJohn Baldwin LIST_FOREACH(p, PIDHASH(pid), p_hash) { 685825d2341SJohn Baldwin if (p->p_pid == pid) 6863d4f3136SMarcel Moolenaar return (FIRST_THREAD_IN_PROC(p)); 6873d4f3136SMarcel Moolenaar } 6883d4f3136SMarcel Moolenaar return (NULL); 6893d4f3136SMarcel Moolenaar } 6903d4f3136SMarcel Moolenaar 6913d4f3136SMarcel Moolenaar struct thread * 6923d4f3136SMarcel Moolenaar kdb_thr_lookup(lwpid_t tid) 693cbc17435SMarcel Moolenaar { 694cbc17435SMarcel Moolenaar struct thread *thr; 695cbc17435SMarcel Moolenaar 696cbc17435SMarcel Moolenaar thr = kdb_thr_first(); 697cbc17435SMarcel Moolenaar while (thr != NULL && thr->td_tid != tid) 698cbc17435SMarcel Moolenaar thr = kdb_thr_next(thr); 699cbc17435SMarcel Moolenaar return (thr); 700cbc17435SMarcel Moolenaar } 701cbc17435SMarcel Moolenaar 702cbc17435SMarcel Moolenaar struct thread * 703cbc17435SMarcel Moolenaar kdb_thr_next(struct thread *thr) 704cbc17435SMarcel Moolenaar { 705cbc17435SMarcel Moolenaar struct proc *p; 7069acce1c9SJohn Baldwin u_int hash; 707cbc17435SMarcel Moolenaar 708cbc17435SMarcel Moolenaar p = thr->td_proc; 709cbc17435SMarcel Moolenaar thr = TAILQ_NEXT(thr, td_plist); 710cbc17435SMarcel Moolenaar if (thr != NULL) 711cbc17435SMarcel Moolenaar return (thr); 7124ccaa87fSMitchell Horne if (pidhashtbl == NULL) 7134ccaa87fSMitchell Horne return (NULL); 7149acce1c9SJohn Baldwin hash = p->p_pid & pidhash; 7159acce1c9SJohn Baldwin for (;;) { 7169acce1c9SJohn Baldwin p = LIST_NEXT(p, p_hash); 7179acce1c9SJohn Baldwin while (p == NULL) { 7189acce1c9SJohn Baldwin if (++hash > pidhash) 719cbc17435SMarcel Moolenaar return (NULL); 7209acce1c9SJohn Baldwin p = LIST_FIRST(&pidhashtbl[hash]); 7219acce1c9SJohn Baldwin } 722825d2341SJohn Baldwin thr = FIRST_THREAD_IN_PROC(p); 723825d2341SJohn Baldwin if (thr != NULL) 724825d2341SJohn Baldwin return (thr); 7259acce1c9SJohn Baldwin } 726cbc17435SMarcel Moolenaar } 727cbc17435SMarcel Moolenaar 728cbc17435SMarcel Moolenaar int 729cbc17435SMarcel Moolenaar kdb_thr_select(struct thread *thr) 730cbc17435SMarcel Moolenaar { 731cbc17435SMarcel Moolenaar if (thr == NULL) 732cbc17435SMarcel Moolenaar return (EINVAL); 733cbc17435SMarcel Moolenaar kdb_thread = thr; 734cbc17435SMarcel Moolenaar kdb_thrctx = kdb_thr_ctx(thr); 735cbc17435SMarcel Moolenaar return (0); 736cbc17435SMarcel Moolenaar } 737cbc17435SMarcel Moolenaar 738cbc17435SMarcel Moolenaar /* 739cbc17435SMarcel Moolenaar * Enter the debugger due to a trap. 740cbc17435SMarcel Moolenaar */ 741cbc17435SMarcel Moolenaar int 742cbc17435SMarcel Moolenaar kdb_trap(int type, int code, struct trapframe *tf) 743cbc17435SMarcel Moolenaar { 744d8939d82SRobert Watson #ifdef SMP 745a38f1f26SAttilio Rao cpuset_t other_cpus; 746d8939d82SRobert Watson #endif 747c0757dafSAttilio Rao struct kdb_dbbe *be; 748c0757dafSAttilio Rao register_t intr; 7495991a4f8SMarcel Moolenaar int handled; 75035370593SAndriy Gapon int did_stop_cpus; 751cbc17435SMarcel Moolenaar 7523a5d3671SMatthew D Fleming be = kdb_dbbe; 7533a5d3671SMatthew D Fleming if (be == NULL || be->dbbe_trap == NULL) 754cbc17435SMarcel Moolenaar return (0); 755cbc17435SMarcel Moolenaar 756cbc17435SMarcel Moolenaar /* We reenter the debugger through kdb_reenter(). */ 757cbc17435SMarcel Moolenaar if (kdb_active) 758cbc17435SMarcel Moolenaar return (0); 759cbc17435SMarcel Moolenaar 7602fae8f5aSMarcel Moolenaar intr = intr_disable(); 761cbc17435SMarcel Moolenaar 76235370593SAndriy Gapon if (!SCHEDULER_STOPPED()) { 763fcbb889fSEric van Gyzen #ifdef SMP 764a19bd8e3SStefan Eßer other_cpus = all_cpus; 765a19bd8e3SStefan Eßer CPU_ANDNOT(&other_cpus, &other_cpus, &stopped_cpus); 766a38f1f26SAttilio Rao CPU_CLR(PCPU_GET(cpuid), &other_cpus); 767a38f1f26SAttilio Rao stop_cpus_hard(other_cpus); 768fcbb889fSEric van Gyzen #endif 769fcbb889fSEric van Gyzen curthread->td_stopsched = 1; 77035370593SAndriy Gapon did_stop_cpus = 1; 77135370593SAndriy Gapon } else 77235370593SAndriy Gapon did_stop_cpus = 0; 773cbc17435SMarcel Moolenaar 77439eb1d12SMarcel Moolenaar kdb_active++; 77539eb1d12SMarcel Moolenaar 776e6aa7232SMarcel Moolenaar kdb_frame = tf; 777e6aa7232SMarcel Moolenaar 778cbc17435SMarcel Moolenaar /* Let MD code do its thing first... */ 779cbc17435SMarcel Moolenaar kdb_cpu_trap(type, code); 780cbc17435SMarcel Moolenaar 781ddf41225SMarcel Moolenaar makectx(tf, &kdb_pcb); 782ddf41225SMarcel Moolenaar kdb_thr_select(curthread); 783ddf41225SMarcel Moolenaar 784bf8696b4SAndriy Gapon cngrab(); 785bf8696b4SAndriy Gapon 7863a5d3671SMatthew D Fleming for (;;) { 787*bd16c274SMark Johnston if (!kdb_backend_permitted(be, curthread)) { 7882449b9e5SMitchell Horne /* Unhandled breakpoint traps are fatal. */ 7892449b9e5SMitchell Horne handled = 1; 7902449b9e5SMitchell Horne break; 7912449b9e5SMitchell Horne } 7923a5d3671SMatthew D Fleming handled = be->dbbe_trap(type, code); 7933a5d3671SMatthew D Fleming if (be == kdb_dbbe) 7943a5d3671SMatthew D Fleming break; 7953a5d3671SMatthew D Fleming be = kdb_dbbe; 7963a5d3671SMatthew D Fleming if (be == NULL || be->dbbe_trap == NULL) 7973a5d3671SMatthew D Fleming break; 7983a5d3671SMatthew D Fleming printf("Switching to %s back-end\n", be->dbbe_name); 7993a5d3671SMatthew D Fleming } 800cbc17435SMarcel Moolenaar 801bf8696b4SAndriy Gapon cnungrab(); 802bf8696b4SAndriy Gapon 80339eb1d12SMarcel Moolenaar kdb_active--; 80439eb1d12SMarcel Moolenaar 80516b51429SEric van Gyzen if (did_stop_cpus) { 806fcbb889fSEric van Gyzen curthread->td_stopsched = 0; 807fcbb889fSEric van Gyzen #ifdef SMP 808e2650af1SStefan Eßer CPU_AND(&other_cpus, &other_cpus, &stopped_cpus); 8095b3e8b07SWojciech Macek restart_cpus(other_cpus); 810cbc17435SMarcel Moolenaar #endif 811fcbb889fSEric van Gyzen } 812cbc17435SMarcel Moolenaar 8132fae8f5aSMarcel Moolenaar intr_restore(intr); 814cbc17435SMarcel Moolenaar 815cbc17435SMarcel Moolenaar return (handled); 816cbc17435SMarcel Moolenaar } 817