19454b2d8SWarner Losh /*- 28a36da99SPedro F. Giffuni * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 38a36da99SPedro F. Giffuni * 4cbc17435SMarcel Moolenaar * Copyright (c) 2004 The FreeBSD Project 5cbc17435SMarcel Moolenaar * All rights reserved. 6cbc17435SMarcel Moolenaar * 7cbc17435SMarcel Moolenaar * Redistribution and use in source and binary forms, with or without 8cbc17435SMarcel Moolenaar * modification, are permitted provided that the following conditions 9cbc17435SMarcel Moolenaar * are met: 10cbc17435SMarcel Moolenaar * 11cbc17435SMarcel Moolenaar * 1. Redistributions of source code must retain the above copyright 12cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer. 13cbc17435SMarcel Moolenaar * 2. Redistributions in binary form must reproduce the above copyright 14cbc17435SMarcel Moolenaar * notice, this list of conditions and the following disclaimer in the 15cbc17435SMarcel Moolenaar * documentation and/or other materials provided with the distribution. 16cbc17435SMarcel Moolenaar * 17cbc17435SMarcel Moolenaar * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 18cbc17435SMarcel Moolenaar * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 19cbc17435SMarcel Moolenaar * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 20cbc17435SMarcel Moolenaar * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 21cbc17435SMarcel Moolenaar * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 22cbc17435SMarcel Moolenaar * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23cbc17435SMarcel Moolenaar * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24cbc17435SMarcel Moolenaar * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25cbc17435SMarcel Moolenaar * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 26cbc17435SMarcel Moolenaar * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27cbc17435SMarcel Moolenaar */ 28cbc17435SMarcel Moolenaar 29cbc17435SMarcel Moolenaar #include <sys/cdefs.h> 30cbc17435SMarcel Moolenaar __FBSDID("$FreeBSD$"); 31cbc17435SMarcel Moolenaar 32f0c6706dSPeter Wemm #include "opt_kdb.h" 33088acbb3SAndriy Gapon #include "opt_stack.h" 34f0c6706dSPeter Wemm 35cbc17435SMarcel Moolenaar #include <sys/param.h> 36cbc17435SMarcel Moolenaar #include <sys/systm.h> 37bf8696b4SAndriy Gapon #include <sys/cons.h> 38cbc17435SMarcel Moolenaar #include <sys/kdb.h> 39cbc17435SMarcel Moolenaar #include <sys/kernel.h> 40cbc17435SMarcel Moolenaar #include <sys/malloc.h> 413f289c3fSJeff Roberson #include <sys/lock.h> 42cbc17435SMarcel Moolenaar #include <sys/pcpu.h> 43cbc17435SMarcel Moolenaar #include <sys/proc.h> 443a5d3671SMatthew D Fleming #include <sys/sbuf.h> 45cbc17435SMarcel Moolenaar #include <sys/smp.h> 46088acbb3SAndriy Gapon #include <sys/stack.h> 47cbc17435SMarcel Moolenaar #include <sys/sysctl.h> 48cbc17435SMarcel Moolenaar 49cbc17435SMarcel Moolenaar #include <machine/kdb.h> 50cbc17435SMarcel Moolenaar #include <machine/pcb.h> 51cbc17435SMarcel Moolenaar 5258553b99SJohn Baldwin #ifdef SMP 53fdc9713bSDoug White #include <machine/smp.h> 54fdc9713bSDoug White #endif 55fdc9713bSDoug White 56614e1868SMateusz Guzik u_char __read_frequently kdb_active = 0; 577cddab63SWarner Losh static void *kdb_jmpbufp = NULL; 58cbc17435SMarcel Moolenaar struct kdb_dbbe *kdb_dbbe = NULL; 597cddab63SWarner Losh static struct pcb kdb_pcb; 60cbc17435SMarcel Moolenaar struct pcb *kdb_thrctx = NULL; 61cbc17435SMarcel Moolenaar struct thread *kdb_thread = NULL; 62cbc17435SMarcel Moolenaar struct trapframe *kdb_frame = NULL; 63cbc17435SMarcel Moolenaar 644cf75455SRobert Watson #ifdef BREAK_TO_DEBUGGER 654cf75455SRobert Watson #define KDB_BREAK_TO_DEBUGGER 1 664cf75455SRobert Watson #else 674cf75455SRobert Watson #define KDB_BREAK_TO_DEBUGGER 0 684cf75455SRobert Watson #endif 694cf75455SRobert Watson 704cf75455SRobert Watson #ifdef ALT_BREAK_TO_DEBUGGER 714cf75455SRobert Watson #define KDB_ALT_BREAK_TO_DEBUGGER 1 724cf75455SRobert Watson #else 734cf75455SRobert Watson #define KDB_ALT_BREAK_TO_DEBUGGER 0 744cf75455SRobert Watson #endif 754cf75455SRobert Watson 764cf75455SRobert Watson static int kdb_break_to_debugger = KDB_BREAK_TO_DEBUGGER; 774cf75455SRobert Watson static int kdb_alt_break_to_debugger = KDB_ALT_BREAK_TO_DEBUGGER; 784cf75455SRobert Watson 790cc457b0SJohn Baldwin KDB_BACKEND(null, NULL, NULL, NULL, NULL); 80cbc17435SMarcel Moolenaar SET_DECLARE(kdb_dbbe_set, struct kdb_dbbe); 81cbc17435SMarcel Moolenaar 82cbc17435SMarcel Moolenaar static int kdb_sysctl_available(SYSCTL_HANDLER_ARGS); 83cbc17435SMarcel Moolenaar static int kdb_sysctl_current(SYSCTL_HANDLER_ARGS); 84cbc17435SMarcel Moolenaar static int kdb_sysctl_enter(SYSCTL_HANDLER_ARGS); 8540c9966aSPeter Wemm static int kdb_sysctl_panic(SYSCTL_HANDLER_ARGS); 8640c9966aSPeter Wemm static int kdb_sysctl_trap(SYSCTL_HANDLER_ARGS); 8742ccd54fSYaroslav Tykhiy static int kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS); 88fd94177cSKonstantin Belousov static int kdb_sysctl_stack_overflow(SYSCTL_HANDLER_ARGS); 89cbc17435SMarcel Moolenaar 906472ac3dSEd Schouten static SYSCTL_NODE(_debug, OID_AUTO, kdb, CTLFLAG_RW, NULL, "KDB nodes"); 91cbc17435SMarcel Moolenaar 927cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, available, CTLTYPE_STRING | CTLFLAG_RD, NULL, 937cddab63SWarner Losh 0, kdb_sysctl_available, "A", "list of available KDB backends"); 94cbc17435SMarcel Moolenaar 957cddab63SWarner Losh SYSCTL_PROC(_debug_kdb, OID_AUTO, current, CTLTYPE_STRING | CTLFLAG_RW, NULL, 967cddab63SWarner Losh 0, kdb_sysctl_current, "A", "currently selected KDB backend"); 97cbc17435SMarcel Moolenaar 98ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, enter, 99ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 100cbc17435SMarcel Moolenaar kdb_sysctl_enter, "I", "set to enter the debugger"); 101cbc17435SMarcel Moolenaar 102ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, panic, 103ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 10440c9966aSPeter Wemm kdb_sysctl_panic, "I", "set to panic the kernel"); 10540c9966aSPeter Wemm 106ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, trap, 107ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 10842ccd54fSYaroslav Tykhiy kdb_sysctl_trap, "I", "set to cause a page fault via data access"); 10942ccd54fSYaroslav Tykhiy 110ef522f95SDavid E. O'Brien SYSCTL_PROC(_debug_kdb, OID_AUTO, trap_code, 111ef522f95SDavid E. O'Brien CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 11242ccd54fSYaroslav Tykhiy kdb_sysctl_trap_code, "I", "set to cause a page fault via code access"); 11340c9966aSPeter Wemm 114fd94177cSKonstantin Belousov SYSCTL_PROC(_debug_kdb, OID_AUTO, stack_overflow, 115fd94177cSKonstantin Belousov CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_SECURE, NULL, 0, 116fd94177cSKonstantin Belousov kdb_sysctl_stack_overflow, "I", "set to cause a stack overflow"); 117fd94177cSKonstantin Belousov 118ef522f95SDavid E. O'Brien SYSCTL_INT(_debug_kdb, OID_AUTO, break_to_debugger, 119f0188618SHans Petter Selasky CTLFLAG_RWTUN | CTLFLAG_SECURE, 120ef522f95SDavid E. O'Brien &kdb_break_to_debugger, 0, "Enable break to debugger"); 1214cf75455SRobert Watson 122ef522f95SDavid E. O'Brien SYSCTL_INT(_debug_kdb, OID_AUTO, alt_break_to_debugger, 123f0188618SHans Petter Selasky CTLFLAG_RWTUN | CTLFLAG_SECURE, 124ef522f95SDavid E. O'Brien &kdb_alt_break_to_debugger, 0, "Enable alternative break to debugger"); 1254cf75455SRobert Watson 126d8939d82SRobert Watson /* 1273de213ccSRobert Watson * Flag to indicate to debuggers why the debugger was entered. 1283de213ccSRobert Watson */ 1293de213ccSRobert Watson const char * volatile kdb_why = KDB_WHY_UNSET; 1303de213ccSRobert Watson 131cbc17435SMarcel Moolenaar static int 132cbc17435SMarcel Moolenaar kdb_sysctl_available(SYSCTL_HANDLER_ARGS) 133cbc17435SMarcel Moolenaar { 1343a5d3671SMatthew D Fleming struct kdb_dbbe **iter; 1353a5d3671SMatthew D Fleming struct sbuf sbuf; 136cbc17435SMarcel Moolenaar int error; 137cbc17435SMarcel Moolenaar 1383a5d3671SMatthew D Fleming sbuf_new_for_sysctl(&sbuf, NULL, 64, req); 139cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 1403a5d3671SMatthew D Fleming if ((*iter)->dbbe_active == 0) 1413a5d3671SMatthew D Fleming sbuf_printf(&sbuf, "%s ", (*iter)->dbbe_name); 142cbc17435SMarcel Moolenaar } 1433a5d3671SMatthew D Fleming error = sbuf_finish(&sbuf); 1443a5d3671SMatthew D Fleming sbuf_delete(&sbuf); 145cbc17435SMarcel Moolenaar return (error); 146cbc17435SMarcel Moolenaar } 147cbc17435SMarcel Moolenaar 148cbc17435SMarcel Moolenaar static int 149cbc17435SMarcel Moolenaar kdb_sysctl_current(SYSCTL_HANDLER_ARGS) 150cbc17435SMarcel Moolenaar { 151cbc17435SMarcel Moolenaar char buf[16]; 152cbc17435SMarcel Moolenaar int error; 153cbc17435SMarcel Moolenaar 1543a5d3671SMatthew D Fleming if (kdb_dbbe != NULL) 1553a5d3671SMatthew D Fleming strlcpy(buf, kdb_dbbe->dbbe_name, sizeof(buf)); 1563a5d3671SMatthew D Fleming else 157a8bfba1aSMarcel Moolenaar *buf = '\0'; 158cbc17435SMarcel Moolenaar error = sysctl_handle_string(oidp, buf, sizeof(buf), req); 159cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 160cbc17435SMarcel Moolenaar return (error); 161cbc17435SMarcel Moolenaar if (kdb_active) 162cbc17435SMarcel Moolenaar return (EBUSY); 1633bcd2440SMarcel Moolenaar return (kdb_dbbe_select(buf)); 164cbc17435SMarcel Moolenaar } 165cbc17435SMarcel Moolenaar 166cbc17435SMarcel Moolenaar static int 167cbc17435SMarcel Moolenaar kdb_sysctl_enter(SYSCTL_HANDLER_ARGS) 168cbc17435SMarcel Moolenaar { 169cbc17435SMarcel Moolenaar int error, i; 170cbc17435SMarcel Moolenaar 171cbc17435SMarcel Moolenaar error = sysctl_wire_old_buffer(req, sizeof(int)); 172cbc17435SMarcel Moolenaar if (error == 0) { 173cbc17435SMarcel Moolenaar i = 0; 174cbc17435SMarcel Moolenaar error = sysctl_handle_int(oidp, &i, 0, req); 175cbc17435SMarcel Moolenaar } 176cbc17435SMarcel Moolenaar if (error != 0 || req->newptr == NULL) 177cbc17435SMarcel Moolenaar return (error); 178cbc17435SMarcel Moolenaar if (kdb_active) 179cbc17435SMarcel Moolenaar return (EBUSY); 1803de213ccSRobert Watson kdb_enter(KDB_WHY_SYSCTL, "sysctl debug.kdb.enter"); 181cbc17435SMarcel Moolenaar return (0); 182cbc17435SMarcel Moolenaar } 183cbc17435SMarcel Moolenaar 18440c9966aSPeter Wemm static int 18540c9966aSPeter Wemm kdb_sysctl_panic(SYSCTL_HANDLER_ARGS) 18640c9966aSPeter Wemm { 18740c9966aSPeter Wemm int error, i; 18840c9966aSPeter Wemm 18940c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 19040c9966aSPeter Wemm if (error == 0) { 19140c9966aSPeter Wemm i = 0; 19240c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 19340c9966aSPeter Wemm } 19440c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 19540c9966aSPeter Wemm return (error); 19640c9966aSPeter Wemm panic("kdb_sysctl_panic"); 19740c9966aSPeter Wemm return (0); 19840c9966aSPeter Wemm } 19940c9966aSPeter Wemm 20040c9966aSPeter Wemm static int 20140c9966aSPeter Wemm kdb_sysctl_trap(SYSCTL_HANDLER_ARGS) 20240c9966aSPeter Wemm { 20340c9966aSPeter Wemm int error, i; 20440c9966aSPeter Wemm int *addr = (int *)0x10; 20540c9966aSPeter Wemm 20640c9966aSPeter Wemm error = sysctl_wire_old_buffer(req, sizeof(int)); 20740c9966aSPeter Wemm if (error == 0) { 20840c9966aSPeter Wemm i = 0; 20940c9966aSPeter Wemm error = sysctl_handle_int(oidp, &i, 0, req); 21040c9966aSPeter Wemm } 21140c9966aSPeter Wemm if (error != 0 || req->newptr == NULL) 21240c9966aSPeter Wemm return (error); 21340c9966aSPeter Wemm return (*addr); 21440c9966aSPeter Wemm } 21540c9966aSPeter Wemm 21642ccd54fSYaroslav Tykhiy static int 21742ccd54fSYaroslav Tykhiy kdb_sysctl_trap_code(SYSCTL_HANDLER_ARGS) 21842ccd54fSYaroslav Tykhiy { 21942ccd54fSYaroslav Tykhiy int error, i; 22042ccd54fSYaroslav Tykhiy void (*fp)(u_int, u_int, u_int) = (void *)0xdeadc0de; 22142ccd54fSYaroslav Tykhiy 22242ccd54fSYaroslav Tykhiy error = sysctl_wire_old_buffer(req, sizeof(int)); 22342ccd54fSYaroslav Tykhiy if (error == 0) { 22442ccd54fSYaroslav Tykhiy i = 0; 22542ccd54fSYaroslav Tykhiy error = sysctl_handle_int(oidp, &i, 0, req); 22642ccd54fSYaroslav Tykhiy } 22742ccd54fSYaroslav Tykhiy if (error != 0 || req->newptr == NULL) 22842ccd54fSYaroslav Tykhiy return (error); 22942ccd54fSYaroslav Tykhiy (*fp)(0x11111111, 0x22222222, 0x33333333); 23042ccd54fSYaroslav Tykhiy return (0); 23142ccd54fSYaroslav Tykhiy } 23242ccd54fSYaroslav Tykhiy 233fd94177cSKonstantin Belousov static void kdb_stack_overflow(volatile int *x) __noinline; 234fd94177cSKonstantin Belousov static void 235fd94177cSKonstantin Belousov kdb_stack_overflow(volatile int *x) 236fd94177cSKonstantin Belousov { 237fd94177cSKonstantin Belousov 238fd94177cSKonstantin Belousov if (*x > 10000000) 239fd94177cSKonstantin Belousov return; 240fd94177cSKonstantin Belousov kdb_stack_overflow(x); 241fd94177cSKonstantin Belousov *x += PCPU_GET(cpuid) / 1000000; 242fd94177cSKonstantin Belousov } 243fd94177cSKonstantin Belousov 244fd94177cSKonstantin Belousov static int 245fd94177cSKonstantin Belousov kdb_sysctl_stack_overflow(SYSCTL_HANDLER_ARGS) 246fd94177cSKonstantin Belousov { 247fd94177cSKonstantin Belousov int error, i; 248fd94177cSKonstantin Belousov volatile int x; 249fd94177cSKonstantin Belousov 250fd94177cSKonstantin Belousov error = sysctl_wire_old_buffer(req, sizeof(int)); 251fd94177cSKonstantin Belousov if (error == 0) { 252fd94177cSKonstantin Belousov i = 0; 253fd94177cSKonstantin Belousov error = sysctl_handle_int(oidp, &i, 0, req); 254fd94177cSKonstantin Belousov } 255fd94177cSKonstantin Belousov if (error != 0 || req->newptr == NULL) 256fd94177cSKonstantin Belousov return (error); 257fd94177cSKonstantin Belousov x = 0; 258fd94177cSKonstantin Belousov kdb_stack_overflow(&x); 259fd94177cSKonstantin Belousov return (0); 260fd94177cSKonstantin Belousov } 261fd94177cSKonstantin Belousov 262fd94177cSKonstantin Belousov 26343d7128cSPeter Wemm void 26443d7128cSPeter Wemm kdb_panic(const char *msg) 26543d7128cSPeter Wemm { 266a38f1f26SAttilio Rao 26743d7128cSPeter Wemm printf("KDB: panic\n"); 2681bdfff22SAndriy Gapon panic("%s", msg); 26943d7128cSPeter Wemm } 27043d7128cSPeter Wemm 27143d7128cSPeter Wemm void 27243d7128cSPeter Wemm kdb_reboot(void) 27343d7128cSPeter Wemm { 27443d7128cSPeter Wemm 27543d7128cSPeter Wemm printf("KDB: reboot requested\n"); 27643d7128cSPeter Wemm shutdown_nice(0); 27743d7128cSPeter Wemm } 27843d7128cSPeter Wemm 279cbc17435SMarcel Moolenaar /* 280cbc17435SMarcel Moolenaar * Solaris implements a new BREAK which is initiated by a character sequence 281cbc17435SMarcel Moolenaar * CR ~ ^b which is similar to a familiar pattern used on Sun servers by the 282cbc17435SMarcel Moolenaar * Remote Console. 283cbc17435SMarcel Moolenaar * 284cbc17435SMarcel Moolenaar * Note that this function may be called from almost anywhere, with interrupts 285cbc17435SMarcel Moolenaar * disabled and with unknown locks held, so it must not access data other than 286cbc17435SMarcel Moolenaar * its arguments. Its up to the caller to ensure that the state variable is 287cbc17435SMarcel Moolenaar * consistent. 288cbc17435SMarcel Moolenaar */ 289cbc17435SMarcel Moolenaar #define KEY_CR 13 /* CR '\r' */ 290cbc17435SMarcel Moolenaar #define KEY_TILDE 126 /* ~ */ 291cbc17435SMarcel Moolenaar #define KEY_CRTLB 2 /* ^B */ 29243d7128cSPeter Wemm #define KEY_CRTLP 16 /* ^P */ 29343d7128cSPeter Wemm #define KEY_CRTLR 18 /* ^R */ 294cbc17435SMarcel Moolenaar 29549f5aeafSAttilio Rao /* States of th KDB "alternate break sequence" detecting state machine. */ 29649f5aeafSAttilio Rao enum { 29749f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_NONE, 29849f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_CR, 29949f5aeafSAttilio Rao KDB_ALT_BREAK_SEEN_CR_TILDE, 30049f5aeafSAttilio Rao }; 30149f5aeafSAttilio Rao 302cbc17435SMarcel Moolenaar int 3034cf75455SRobert Watson kdb_break(void) 3044cf75455SRobert Watson { 3054cf75455SRobert Watson 3064cf75455SRobert Watson if (!kdb_break_to_debugger) 3074cf75455SRobert Watson return (0); 3084cf75455SRobert Watson kdb_enter(KDB_WHY_BREAK, "Break to debugger"); 3094cf75455SRobert Watson return (KDB_REQ_DEBUGGER); 3104cf75455SRobert Watson } 3114cf75455SRobert Watson 3124cf75455SRobert Watson static int 3134cf75455SRobert Watson kdb_alt_break_state(int key, int *state) 314cbc17435SMarcel Moolenaar { 315cbc17435SMarcel Moolenaar int brk; 316cbc17435SMarcel Moolenaar 31749f5aeafSAttilio Rao /* All states transition to KDB_ALT_BREAK_SEEN_CR on a CR. */ 31849f5aeafSAttilio Rao if (key == KEY_CR) { 31949f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_CR; 32049f5aeafSAttilio Rao return (0); 32149f5aeafSAttilio Rao } 32249f5aeafSAttilio Rao 323cbc17435SMarcel Moolenaar brk = 0; 32443d7128cSPeter Wemm switch (*state) { 32549f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_CR: 32649f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 32743d7128cSPeter Wemm if (key == KEY_TILDE) 32849f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_CR_TILDE; 329cbc17435SMarcel Moolenaar break; 33049f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_CR_TILDE: 33149f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 33243d7128cSPeter Wemm if (key == KEY_CRTLB) 33343d7128cSPeter Wemm brk = KDB_REQ_DEBUGGER; 33443d7128cSPeter Wemm else if (key == KEY_CRTLP) 33543d7128cSPeter Wemm brk = KDB_REQ_PANIC; 33643d7128cSPeter Wemm else if (key == KEY_CRTLR) 33743d7128cSPeter Wemm brk = KDB_REQ_REBOOT; 33849f5aeafSAttilio Rao break; 33949f5aeafSAttilio Rao case KDB_ALT_BREAK_SEEN_NONE: 34049f5aeafSAttilio Rao default: 34149f5aeafSAttilio Rao *state = KDB_ALT_BREAK_SEEN_NONE; 34249f5aeafSAttilio Rao break; 343cbc17435SMarcel Moolenaar } 344cbc17435SMarcel Moolenaar return (brk); 345cbc17435SMarcel Moolenaar } 346cbc17435SMarcel Moolenaar 3474cf75455SRobert Watson static int 3484cf75455SRobert Watson kdb_alt_break_internal(int key, int *state, int force_gdb) 3494cf75455SRobert Watson { 3504cf75455SRobert Watson int brk; 3514cf75455SRobert Watson 3524cf75455SRobert Watson if (!kdb_alt_break_to_debugger) 3534cf75455SRobert Watson return (0); 3544cf75455SRobert Watson brk = kdb_alt_break_state(key, state); 3554cf75455SRobert Watson switch (brk) { 3564cf75455SRobert Watson case KDB_REQ_DEBUGGER: 3574cf75455SRobert Watson if (force_gdb) 3584cf75455SRobert Watson kdb_dbbe_select("gdb"); 3594cf75455SRobert Watson kdb_enter(KDB_WHY_BREAK, "Break to debugger"); 3604cf75455SRobert Watson break; 3614cf75455SRobert Watson 3624cf75455SRobert Watson case KDB_REQ_PANIC: 3634cf75455SRobert Watson if (force_gdb) 3644cf75455SRobert Watson kdb_dbbe_select("gdb"); 3654cf75455SRobert Watson kdb_panic("Panic sequence on console"); 3664cf75455SRobert Watson break; 3674cf75455SRobert Watson 3684cf75455SRobert Watson case KDB_REQ_REBOOT: 3694cf75455SRobert Watson kdb_reboot(); 3704cf75455SRobert Watson break; 3714cf75455SRobert Watson } 3724cf75455SRobert Watson return (0); 3734cf75455SRobert Watson } 3744cf75455SRobert Watson 3754cf75455SRobert Watson int 3764cf75455SRobert Watson kdb_alt_break(int key, int *state) 3774cf75455SRobert Watson { 3784cf75455SRobert Watson 3794cf75455SRobert Watson return (kdb_alt_break_internal(key, state, 0)); 3804cf75455SRobert Watson } 3814cf75455SRobert Watson 3824cf75455SRobert Watson /* 3834cf75455SRobert Watson * This variation on kdb_alt_break() is used only by dcons, which has its own 3844cf75455SRobert Watson * configuration flag to force GDB use regardless of the global KDB 3854cf75455SRobert Watson * configuration. 3864cf75455SRobert Watson */ 3874cf75455SRobert Watson int 3884cf75455SRobert Watson kdb_alt_break_gdb(int key, int *state) 3894cf75455SRobert Watson { 3904cf75455SRobert Watson 3914cf75455SRobert Watson return (kdb_alt_break_internal(key, state, 1)); 3924cf75455SRobert Watson } 3934cf75455SRobert Watson 394cbc17435SMarcel Moolenaar /* 395cbc17435SMarcel Moolenaar * Print a backtrace of the calling thread. The backtrace is generated by 396cbc17435SMarcel Moolenaar * the selected debugger, provided it supports backtraces. If no debugger 397cbc17435SMarcel Moolenaar * is selected or the current debugger does not support backtraces, this 398cbc17435SMarcel Moolenaar * function silently returns. 399cbc17435SMarcel Moolenaar */ 400cbc17435SMarcel Moolenaar void 4017cddab63SWarner Losh kdb_backtrace(void) 402cbc17435SMarcel Moolenaar { 403cbc17435SMarcel Moolenaar 404cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_dbbe->dbbe_trace != NULL) { 405cbc17435SMarcel Moolenaar printf("KDB: stack backtrace:\n"); 406cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_trace(); 407cbc17435SMarcel Moolenaar } 408088acbb3SAndriy Gapon #ifdef STACK 409088acbb3SAndriy Gapon else { 410088acbb3SAndriy Gapon struct stack st; 411088acbb3SAndriy Gapon 412088acbb3SAndriy Gapon printf("KDB: stack backtrace:\n"); 4130cc457b0SJohn Baldwin stack_zero(&st); 414088acbb3SAndriy Gapon stack_save(&st); 41561548876SAndriy Gapon stack_print_ddb(&st); 416088acbb3SAndriy Gapon } 417088acbb3SAndriy Gapon #endif 418cbc17435SMarcel Moolenaar } 419cbc17435SMarcel Moolenaar 420cbc17435SMarcel Moolenaar /* 4210cc457b0SJohn Baldwin * Similar to kdb_backtrace() except that it prints a backtrace of an 4220cc457b0SJohn Baldwin * arbitrary thread rather than the calling thread. 4230cc457b0SJohn Baldwin */ 4240cc457b0SJohn Baldwin void 4250cc457b0SJohn Baldwin kdb_backtrace_thread(struct thread *td) 4260cc457b0SJohn Baldwin { 4270cc457b0SJohn Baldwin 4280cc457b0SJohn Baldwin if (kdb_dbbe != NULL && kdb_dbbe->dbbe_trace_thread != NULL) { 4290cc457b0SJohn Baldwin printf("KDB: stack backtrace of thread %d:\n", td->td_tid); 4300cc457b0SJohn Baldwin kdb_dbbe->dbbe_trace_thread(td); 4310cc457b0SJohn Baldwin } 4320cc457b0SJohn Baldwin #ifdef STACK 4330cc457b0SJohn Baldwin else { 4340cc457b0SJohn Baldwin struct stack st; 4350cc457b0SJohn Baldwin 4360cc457b0SJohn Baldwin printf("KDB: stack backtrace of thread %d:\n", td->td_tid); 4370cc457b0SJohn Baldwin stack_zero(&st); 4380cc457b0SJohn Baldwin stack_save_td(&st, td); 4390cc457b0SJohn Baldwin stack_print_ddb(&st); 4400cc457b0SJohn Baldwin } 4410cc457b0SJohn Baldwin #endif 4420cc457b0SJohn Baldwin } 4430cc457b0SJohn Baldwin 4440cc457b0SJohn Baldwin /* 4453bcd2440SMarcel Moolenaar * Set/change the current backend. 4463bcd2440SMarcel Moolenaar */ 4473bcd2440SMarcel Moolenaar int 4483bcd2440SMarcel Moolenaar kdb_dbbe_select(const char *name) 4493bcd2440SMarcel Moolenaar { 4503bcd2440SMarcel Moolenaar struct kdb_dbbe *be, **iter; 4513bcd2440SMarcel Moolenaar 4523bcd2440SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 4533bcd2440SMarcel Moolenaar be = *iter; 4543bcd2440SMarcel Moolenaar if (be->dbbe_active == 0 && strcmp(be->dbbe_name, name) == 0) { 4553bcd2440SMarcel Moolenaar kdb_dbbe = be; 4563bcd2440SMarcel Moolenaar return (0); 4573bcd2440SMarcel Moolenaar } 4583bcd2440SMarcel Moolenaar } 4593bcd2440SMarcel Moolenaar return (EINVAL); 4603bcd2440SMarcel Moolenaar } 4613bcd2440SMarcel Moolenaar 4623bcd2440SMarcel Moolenaar /* 463cbc17435SMarcel Moolenaar * Enter the currently selected debugger. If a message has been provided, 464cbc17435SMarcel Moolenaar * it is printed first. If the debugger does not support the enter method, 465cbc17435SMarcel Moolenaar * it is entered by using breakpoint(), which enters the debugger through 4663de213ccSRobert Watson * kdb_trap(). The 'why' argument will contain a more mechanically usable 4673de213ccSRobert Watson * string than 'msg', and is relied upon by DDB scripting to identify the 4683de213ccSRobert Watson * reason for entering the debugger so that the right script can be run. 469cbc17435SMarcel Moolenaar */ 470cbc17435SMarcel Moolenaar void 4713de213ccSRobert Watson kdb_enter(const char *why, const char *msg) 472cbc17435SMarcel Moolenaar { 473cbc17435SMarcel Moolenaar 474cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL && kdb_active == 0) { 475cbc17435SMarcel Moolenaar if (msg != NULL) 476cbc17435SMarcel Moolenaar printf("KDB: enter: %s\n", msg); 4773de213ccSRobert Watson kdb_why = why; 478cbc17435SMarcel Moolenaar breakpoint(); 4793de213ccSRobert Watson kdb_why = KDB_WHY_UNSET; 480cbc17435SMarcel Moolenaar } 481cbc17435SMarcel Moolenaar } 482cbc17435SMarcel Moolenaar 483cbc17435SMarcel Moolenaar /* 484cbc17435SMarcel Moolenaar * Initialize the kernel debugger interface. 485cbc17435SMarcel Moolenaar */ 486cbc17435SMarcel Moolenaar void 4877cddab63SWarner Losh kdb_init(void) 488cbc17435SMarcel Moolenaar { 489cbc17435SMarcel Moolenaar struct kdb_dbbe *be, **iter; 490cbc17435SMarcel Moolenaar int cur_pri, pri; 491cbc17435SMarcel Moolenaar 492cbc17435SMarcel Moolenaar kdb_active = 0; 493cbc17435SMarcel Moolenaar kdb_dbbe = NULL; 494cbc17435SMarcel Moolenaar cur_pri = -1; 495cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 496cbc17435SMarcel Moolenaar be = *iter; 497cbc17435SMarcel Moolenaar pri = (be->dbbe_init != NULL) ? be->dbbe_init() : -1; 498cbc17435SMarcel Moolenaar be->dbbe_active = (pri >= 0) ? 0 : -1; 499cbc17435SMarcel Moolenaar if (pri > cur_pri) { 500cbc17435SMarcel Moolenaar cur_pri = pri; 501cbc17435SMarcel Moolenaar kdb_dbbe = be; 502cbc17435SMarcel Moolenaar } 503cbc17435SMarcel Moolenaar } 504cbc17435SMarcel Moolenaar if (kdb_dbbe != NULL) { 505cbc17435SMarcel Moolenaar printf("KDB: debugger backends:"); 506cbc17435SMarcel Moolenaar SET_FOREACH(iter, kdb_dbbe_set) { 507cbc17435SMarcel Moolenaar be = *iter; 508cbc17435SMarcel Moolenaar if (be->dbbe_active == 0) 509cbc17435SMarcel Moolenaar printf(" %s", be->dbbe_name); 510cbc17435SMarcel Moolenaar } 511cbc17435SMarcel Moolenaar printf("\n"); 512cbc17435SMarcel Moolenaar printf("KDB: current backend: %s\n", 513cbc17435SMarcel Moolenaar kdb_dbbe->dbbe_name); 514cbc17435SMarcel Moolenaar } 515cbc17435SMarcel Moolenaar } 516cbc17435SMarcel Moolenaar 517cbc17435SMarcel Moolenaar /* 518cbc17435SMarcel Moolenaar * Handle contexts. 519cbc17435SMarcel Moolenaar */ 520cbc17435SMarcel Moolenaar void * 521cbc17435SMarcel Moolenaar kdb_jmpbuf(jmp_buf new) 522cbc17435SMarcel Moolenaar { 523cbc17435SMarcel Moolenaar void *old; 524cbc17435SMarcel Moolenaar 525cbc17435SMarcel Moolenaar old = kdb_jmpbufp; 526cbc17435SMarcel Moolenaar kdb_jmpbufp = new; 527cbc17435SMarcel Moolenaar return (old); 528cbc17435SMarcel Moolenaar } 529cbc17435SMarcel Moolenaar 530cbc17435SMarcel Moolenaar void 531cbc17435SMarcel Moolenaar kdb_reenter(void) 532cbc17435SMarcel Moolenaar { 533cbc17435SMarcel Moolenaar 534cbc17435SMarcel Moolenaar if (!kdb_active || kdb_jmpbufp == NULL) 535cbc17435SMarcel Moolenaar return; 536cbc17435SMarcel Moolenaar 537c2a44591SKonstantin Belousov printf("KDB: reentering\n"); 538c2a44591SKonstantin Belousov kdb_backtrace(); 539cbc17435SMarcel Moolenaar longjmp(kdb_jmpbufp, 1); 540cbc17435SMarcel Moolenaar /* NOTREACHED */ 541cbc17435SMarcel Moolenaar } 542cbc17435SMarcel Moolenaar 543212ff84fSEdward Tomasz Napierala void 544212ff84fSEdward Tomasz Napierala kdb_reenter_silent(void) 545212ff84fSEdward Tomasz Napierala { 546212ff84fSEdward Tomasz Napierala 547212ff84fSEdward Tomasz Napierala if (!kdb_active || kdb_jmpbufp == NULL) 548212ff84fSEdward Tomasz Napierala return; 549212ff84fSEdward Tomasz Napierala 550212ff84fSEdward Tomasz Napierala longjmp(kdb_jmpbufp, 1); 551212ff84fSEdward Tomasz Napierala /* NOTREACHED */ 552212ff84fSEdward Tomasz Napierala } 553212ff84fSEdward Tomasz Napierala 554cbc17435SMarcel Moolenaar /* 5552c9ec075SAlexey Dokuchaev * Thread-related support functions. 556cbc17435SMarcel Moolenaar */ 557cbc17435SMarcel Moolenaar struct pcb * 558cbc17435SMarcel Moolenaar kdb_thr_ctx(struct thread *thr) 559fdc9713bSDoug White { 560bfcdefd8SMarcel Moolenaar #if defined(SMP) && defined(KDB_STOPPEDPCB) 561fdc9713bSDoug White struct pcpu *pc; 56258553b99SJohn Baldwin #endif 563fdc9713bSDoug White 564fdc9713bSDoug White if (thr == curthread) 5656b1e0d75SJohn Baldwin return (&kdb_pcb); 566fdc9713bSDoug White 567bfcdefd8SMarcel Moolenaar #if defined(SMP) && defined(KDB_STOPPEDPCB) 568d098f930SNathan Whitehorn STAILQ_FOREACH(pc, &cpuhead, pc_allcpu) { 56971a19bdcSAttilio Rao if (pc->pc_curthread == thr && 570a38f1f26SAttilio Rao CPU_ISSET(pc->pc_cpuid, &stopped_cpus)) 571bfcdefd8SMarcel Moolenaar return (KDB_STOPPEDPCB(pc)); 572fdc9713bSDoug White } 57358553b99SJohn Baldwin #endif 5746b1e0d75SJohn Baldwin return (thr->td_pcb); 575fdc9713bSDoug White } 576cbc17435SMarcel Moolenaar 577cbc17435SMarcel Moolenaar struct thread * 578cbc17435SMarcel Moolenaar kdb_thr_first(void) 579cbc17435SMarcel Moolenaar { 580cbc17435SMarcel Moolenaar struct proc *p; 581cbc17435SMarcel Moolenaar struct thread *thr; 582cbc17435SMarcel Moolenaar 5837938a442SBjoern A. Zeeb FOREACH_PROC_IN_SYSTEM(p) { 584b61ce5b0SJeff Roberson if (p->p_flag & P_INMEM) { 585cbc17435SMarcel Moolenaar thr = FIRST_THREAD_IN_PROC(p); 586cbc17435SMarcel Moolenaar if (thr != NULL) 587cbc17435SMarcel Moolenaar return (thr); 588cbc17435SMarcel Moolenaar } 589cbc17435SMarcel Moolenaar } 590cbc17435SMarcel Moolenaar return (NULL); 591cbc17435SMarcel Moolenaar } 592cbc17435SMarcel Moolenaar 593cbc17435SMarcel Moolenaar struct thread * 5943d4f3136SMarcel Moolenaar kdb_thr_from_pid(pid_t pid) 5953d4f3136SMarcel Moolenaar { 5963d4f3136SMarcel Moolenaar struct proc *p; 5973d4f3136SMarcel Moolenaar 5987938a442SBjoern A. Zeeb FOREACH_PROC_IN_SYSTEM(p) { 599b61ce5b0SJeff Roberson if (p->p_flag & P_INMEM && p->p_pid == pid) 6003d4f3136SMarcel Moolenaar return (FIRST_THREAD_IN_PROC(p)); 6013d4f3136SMarcel Moolenaar } 6023d4f3136SMarcel Moolenaar return (NULL); 6033d4f3136SMarcel Moolenaar } 6043d4f3136SMarcel Moolenaar 6053d4f3136SMarcel Moolenaar struct thread * 6063d4f3136SMarcel Moolenaar kdb_thr_lookup(lwpid_t tid) 607cbc17435SMarcel Moolenaar { 608cbc17435SMarcel Moolenaar struct thread *thr; 609cbc17435SMarcel Moolenaar 610cbc17435SMarcel Moolenaar thr = kdb_thr_first(); 611cbc17435SMarcel Moolenaar while (thr != NULL && thr->td_tid != tid) 612cbc17435SMarcel Moolenaar thr = kdb_thr_next(thr); 613cbc17435SMarcel Moolenaar return (thr); 614cbc17435SMarcel Moolenaar } 615cbc17435SMarcel Moolenaar 616cbc17435SMarcel Moolenaar struct thread * 617cbc17435SMarcel Moolenaar kdb_thr_next(struct thread *thr) 618cbc17435SMarcel Moolenaar { 619cbc17435SMarcel Moolenaar struct proc *p; 620cbc17435SMarcel Moolenaar 621cbc17435SMarcel Moolenaar p = thr->td_proc; 622cbc17435SMarcel Moolenaar thr = TAILQ_NEXT(thr, td_plist); 623cbc17435SMarcel Moolenaar do { 624cbc17435SMarcel Moolenaar if (thr != NULL) 625cbc17435SMarcel Moolenaar return (thr); 626cbc17435SMarcel Moolenaar p = LIST_NEXT(p, p_list); 627b61ce5b0SJeff Roberson if (p != NULL && (p->p_flag & P_INMEM)) 628cbc17435SMarcel Moolenaar thr = FIRST_THREAD_IN_PROC(p); 629cbc17435SMarcel Moolenaar } while (p != NULL); 630cbc17435SMarcel Moolenaar return (NULL); 631cbc17435SMarcel Moolenaar } 632cbc17435SMarcel Moolenaar 633cbc17435SMarcel Moolenaar int 634cbc17435SMarcel Moolenaar kdb_thr_select(struct thread *thr) 635cbc17435SMarcel Moolenaar { 636cbc17435SMarcel Moolenaar if (thr == NULL) 637cbc17435SMarcel Moolenaar return (EINVAL); 638cbc17435SMarcel Moolenaar kdb_thread = thr; 639cbc17435SMarcel Moolenaar kdb_thrctx = kdb_thr_ctx(thr); 640cbc17435SMarcel Moolenaar return (0); 641cbc17435SMarcel Moolenaar } 642cbc17435SMarcel Moolenaar 643cbc17435SMarcel Moolenaar /* 644cbc17435SMarcel Moolenaar * Enter the debugger due to a trap. 645cbc17435SMarcel Moolenaar */ 646cbc17435SMarcel Moolenaar int 647cbc17435SMarcel Moolenaar kdb_trap(int type, int code, struct trapframe *tf) 648cbc17435SMarcel Moolenaar { 649d8939d82SRobert Watson #ifdef SMP 650a38f1f26SAttilio Rao cpuset_t other_cpus; 651d8939d82SRobert Watson #endif 652c0757dafSAttilio Rao struct kdb_dbbe *be; 653c0757dafSAttilio Rao register_t intr; 6545991a4f8SMarcel Moolenaar int handled; 65535370593SAndriy Gapon int did_stop_cpus; 656cbc17435SMarcel Moolenaar 6573a5d3671SMatthew D Fleming be = kdb_dbbe; 6583a5d3671SMatthew D Fleming if (be == NULL || be->dbbe_trap == NULL) 659cbc17435SMarcel Moolenaar return (0); 660cbc17435SMarcel Moolenaar 661cbc17435SMarcel Moolenaar /* We reenter the debugger through kdb_reenter(). */ 662cbc17435SMarcel Moolenaar if (kdb_active) 663cbc17435SMarcel Moolenaar return (0); 664cbc17435SMarcel Moolenaar 6652fae8f5aSMarcel Moolenaar intr = intr_disable(); 666cbc17435SMarcel Moolenaar 66735370593SAndriy Gapon if (!SCHEDULER_STOPPED()) { 668*fcbb889fSEric van Gyzen #ifdef SMP 669a38f1f26SAttilio Rao other_cpus = all_cpus; 6705b3e8b07SWojciech Macek CPU_NAND(&other_cpus, &stopped_cpus); 671a38f1f26SAttilio Rao CPU_CLR(PCPU_GET(cpuid), &other_cpus); 672a38f1f26SAttilio Rao stop_cpus_hard(other_cpus); 673*fcbb889fSEric van Gyzen #endif 674*fcbb889fSEric van Gyzen curthread->td_stopsched = 1; 67535370593SAndriy Gapon did_stop_cpus = 1; 67635370593SAndriy Gapon } else 67735370593SAndriy Gapon did_stop_cpus = 0; 678cbc17435SMarcel Moolenaar 67939eb1d12SMarcel Moolenaar kdb_active++; 68039eb1d12SMarcel Moolenaar 681e6aa7232SMarcel Moolenaar kdb_frame = tf; 682e6aa7232SMarcel Moolenaar 683cbc17435SMarcel Moolenaar /* Let MD code do its thing first... */ 684cbc17435SMarcel Moolenaar kdb_cpu_trap(type, code); 685cbc17435SMarcel Moolenaar 686ddf41225SMarcel Moolenaar makectx(tf, &kdb_pcb); 687ddf41225SMarcel Moolenaar kdb_thr_select(curthread); 688ddf41225SMarcel Moolenaar 689bf8696b4SAndriy Gapon cngrab(); 690bf8696b4SAndriy Gapon 6913a5d3671SMatthew D Fleming for (;;) { 6923a5d3671SMatthew D Fleming handled = be->dbbe_trap(type, code); 6933a5d3671SMatthew D Fleming if (be == kdb_dbbe) 6943a5d3671SMatthew D Fleming break; 6953a5d3671SMatthew D Fleming be = kdb_dbbe; 6963a5d3671SMatthew D Fleming if (be == NULL || be->dbbe_trap == NULL) 6973a5d3671SMatthew D Fleming break; 6983a5d3671SMatthew D Fleming printf("Switching to %s back-end\n", be->dbbe_name); 6993a5d3671SMatthew D Fleming } 700cbc17435SMarcel Moolenaar 701bf8696b4SAndriy Gapon cnungrab(); 702bf8696b4SAndriy Gapon 70339eb1d12SMarcel Moolenaar kdb_active--; 70439eb1d12SMarcel Moolenaar 70516b51429SEric van Gyzen if (did_stop_cpus) { 706*fcbb889fSEric van Gyzen curthread->td_stopsched = 0; 707*fcbb889fSEric van Gyzen #ifdef SMP 7085b3e8b07SWojciech Macek CPU_AND(&other_cpus, &stopped_cpus); 7095b3e8b07SWojciech Macek restart_cpus(other_cpus); 710cbc17435SMarcel Moolenaar #endif 711*fcbb889fSEric van Gyzen } 712cbc17435SMarcel Moolenaar 7132fae8f5aSMarcel Moolenaar intr_restore(intr); 714cbc17435SMarcel Moolenaar 715cbc17435SMarcel Moolenaar return (handled); 716cbc17435SMarcel Moolenaar } 717