1 /* 2 * Kernel Debugger Architecture Independent Main Code 3 * 4 * This file is subject to the terms and conditions of the GNU General Public 5 * License. See the file "COPYING" in the main directory of this archive 6 * for more details. 7 * 8 * Copyright (C) 1999-2004 Silicon Graphics, Inc. All Rights Reserved. 9 * Copyright (C) 2000 Stephane Eranian <eranian@hpl.hp.com> 10 * Xscale (R) modifications copyright (C) 2003 Intel Corporation. 11 * Copyright (c) 2009 Wind River Systems, Inc. All Rights Reserved. 12 */ 13 14 #include <linux/ctype.h> 15 #include <linux/types.h> 16 #include <linux/string.h> 17 #include <linux/kernel.h> 18 #include <linux/kmsg_dump.h> 19 #include <linux/reboot.h> 20 #include <linux/sched.h> 21 #include <linux/sched/loadavg.h> 22 #include <linux/sched/stat.h> 23 #include <linux/sched/debug.h> 24 #include <linux/sysrq.h> 25 #include <linux/smp.h> 26 #include <linux/utsname.h> 27 #include <linux/vmalloc.h> 28 #include <linux/atomic.h> 29 #include <linux/module.h> 30 #include <linux/moduleparam.h> 31 #include <linux/mm.h> 32 #include <linux/init.h> 33 #include <linux/kallsyms.h> 34 #include <linux/kgdb.h> 35 #include <linux/kdb.h> 36 #include <linux/notifier.h> 37 #include <linux/interrupt.h> 38 #include <linux/delay.h> 39 #include <linux/nmi.h> 40 #include <linux/time.h> 41 #include <linux/ptrace.h> 42 #include <linux/sysctl.h> 43 #include <linux/cpu.h> 44 #include <linux/kdebug.h> 45 #include <linux/proc_fs.h> 46 #include <linux/uaccess.h> 47 #include <linux/slab.h> 48 #include "kdb_private.h" 49 50 #undef MODULE_PARAM_PREFIX 51 #define MODULE_PARAM_PREFIX "kdb." 52 53 static int kdb_cmd_enabled = CONFIG_KDB_DEFAULT_ENABLE; 54 module_param_named(cmd_enable, kdb_cmd_enabled, int, 0600); 55 56 char kdb_grep_string[KDB_GREP_STRLEN]; 57 int kdb_grepping_flag; 58 EXPORT_SYMBOL(kdb_grepping_flag); 59 int kdb_grep_leading; 60 int kdb_grep_trailing; 61 62 /* 63 * Kernel debugger state flags 64 */ 65 unsigned int kdb_flags; 66 67 /* 68 * kdb_lock protects updates to kdb_initial_cpu. Used to 69 * single thread processors through the kernel debugger. 70 */ 71 int kdb_initial_cpu = -1; /* cpu number that owns kdb */ 72 int kdb_nextline = 1; 73 int kdb_state; /* General KDB state */ 74 75 struct task_struct *kdb_current_task; 76 struct pt_regs *kdb_current_regs; 77 78 const char *kdb_diemsg; 79 static int kdb_go_count; 80 #ifdef CONFIG_KDB_CONTINUE_CATASTROPHIC 81 static unsigned int kdb_continue_catastrophic = 82 CONFIG_KDB_CONTINUE_CATASTROPHIC; 83 #else 84 static unsigned int kdb_continue_catastrophic; 85 #endif 86 87 /* kdb_cmds_head describes the available commands. */ 88 static LIST_HEAD(kdb_cmds_head); 89 90 typedef struct _kdbmsg { 91 int km_diag; /* kdb diagnostic */ 92 char *km_msg; /* Corresponding message text */ 93 } kdbmsg_t; 94 95 #define KDBMSG(msgnum, text) \ 96 { KDB_##msgnum, text } 97 98 static kdbmsg_t kdbmsgs[] = { 99 KDBMSG(NOTFOUND, "Command Not Found"), 100 KDBMSG(ARGCOUNT, "Improper argument count, see usage."), 101 KDBMSG(BADWIDTH, "Illegal value for BYTESPERWORD use 1, 2, 4 or 8, " 102 "8 is only allowed on 64 bit systems"), 103 KDBMSG(BADRADIX, "Illegal value for RADIX use 8, 10 or 16"), 104 KDBMSG(NOTENV, "Cannot find environment variable"), 105 KDBMSG(NOENVVALUE, "Environment variable should have value"), 106 KDBMSG(NOTIMP, "Command not implemented"), 107 KDBMSG(ENVFULL, "Environment full"), 108 KDBMSG(ENVBUFFULL, "Environment buffer full"), 109 KDBMSG(TOOMANYBPT, "Too many breakpoints defined"), 110 #ifdef CONFIG_CPU_XSCALE 111 KDBMSG(TOOMANYDBREGS, "More breakpoints than ibcr registers defined"), 112 #else 113 KDBMSG(TOOMANYDBREGS, "More breakpoints than db registers defined"), 114 #endif 115 KDBMSG(DUPBPT, "Duplicate breakpoint address"), 116 KDBMSG(BPTNOTFOUND, "Breakpoint not found"), 117 KDBMSG(BADMODE, "Invalid IDMODE"), 118 KDBMSG(BADINT, "Illegal numeric value"), 119 KDBMSG(INVADDRFMT, "Invalid symbolic address format"), 120 KDBMSG(BADREG, "Invalid register name"), 121 KDBMSG(BADCPUNUM, "Invalid cpu number"), 122 KDBMSG(BADLENGTH, "Invalid length field"), 123 KDBMSG(NOBP, "No Breakpoint exists"), 124 KDBMSG(BADADDR, "Invalid address"), 125 KDBMSG(NOPERM, "Permission denied"), 126 }; 127 #undef KDBMSG 128 129 static const int __nkdb_err = ARRAY_SIZE(kdbmsgs); 130 131 132 /* 133 * Initial environment. This is all kept static and local to 134 * this file. We don't want to rely on the memory allocation 135 * mechanisms in the kernel, so we use a very limited allocate-only 136 * heap for new and altered environment variables. The entire 137 * environment is limited to a fixed number of entries (add more 138 * to __env[] if required) and a fixed amount of heap (add more to 139 * KDB_ENVBUFSIZE if required). 140 */ 141 142 static char *__env[31] = { 143 #if defined(CONFIG_SMP) 144 "PROMPT=[%d]kdb> ", 145 #else 146 "PROMPT=kdb> ", 147 #endif 148 "MOREPROMPT=more> ", 149 "RADIX=16", 150 "MDCOUNT=8", /* lines of md output */ 151 KDB_PLATFORM_ENV, 152 "DTABCOUNT=30", 153 "NOSECT=1", 154 }; 155 156 static const int __nenv = ARRAY_SIZE(__env); 157 158 struct task_struct *kdb_curr_task(int cpu) 159 { 160 struct task_struct *p = curr_task(cpu); 161 #ifdef _TIF_MCA_INIT 162 if ((task_thread_info(p)->flags & _TIF_MCA_INIT) && KDB_TSK(cpu)) 163 p = krp->p; 164 #endif 165 return p; 166 } 167 168 /* 169 * Check whether the flags of the current command and the permissions 170 * of the kdb console has allow a command to be run. 171 */ 172 static inline bool kdb_check_flags(kdb_cmdflags_t flags, int permissions, 173 bool no_args) 174 { 175 /* permissions comes from userspace so needs massaging slightly */ 176 permissions &= KDB_ENABLE_MASK; 177 permissions |= KDB_ENABLE_ALWAYS_SAFE; 178 179 /* some commands change group when launched with no arguments */ 180 if (no_args) 181 permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT; 182 183 flags |= KDB_ENABLE_ALL; 184 185 return permissions & flags; 186 } 187 188 /* 189 * kdbgetenv - This function will return the character string value of 190 * an environment variable. 191 * Parameters: 192 * match A character string representing an environment variable. 193 * Returns: 194 * NULL No environment variable matches 'match' 195 * char* Pointer to string value of environment variable. 196 */ 197 char *kdbgetenv(const char *match) 198 { 199 char **ep = __env; 200 int matchlen = strlen(match); 201 int i; 202 203 for (i = 0; i < __nenv; i++) { 204 char *e = *ep++; 205 206 if (!e) 207 continue; 208 209 if ((strncmp(match, e, matchlen) == 0) 210 && ((e[matchlen] == '\0') 211 || (e[matchlen] == '='))) { 212 char *cp = strchr(e, '='); 213 return cp ? ++cp : ""; 214 } 215 } 216 return NULL; 217 } 218 219 /* 220 * kdballocenv - This function is used to allocate bytes for 221 * environment entries. 222 * Parameters: 223 * match A character string representing a numeric value 224 * Outputs: 225 * *value the unsigned long representation of the env variable 'match' 226 * Returns: 227 * Zero on success, a kdb diagnostic on failure. 228 * Remarks: 229 * We use a static environment buffer (envbuffer) to hold the values 230 * of dynamically generated environment variables (see kdb_set). Buffer 231 * space once allocated is never free'd, so over time, the amount of space 232 * (currently 512 bytes) will be exhausted if env variables are changed 233 * frequently. 234 */ 235 static char *kdballocenv(size_t bytes) 236 { 237 #define KDB_ENVBUFSIZE 512 238 static char envbuffer[KDB_ENVBUFSIZE]; 239 static int envbufsize; 240 char *ep = NULL; 241 242 if ((KDB_ENVBUFSIZE - envbufsize) >= bytes) { 243 ep = &envbuffer[envbufsize]; 244 envbufsize += bytes; 245 } 246 return ep; 247 } 248 249 /* 250 * kdbgetulenv - This function will return the value of an unsigned 251 * long-valued environment variable. 252 * Parameters: 253 * match A character string representing a numeric value 254 * Outputs: 255 * *value the unsigned long representation of the env variable 'match' 256 * Returns: 257 * Zero on success, a kdb diagnostic on failure. 258 */ 259 static int kdbgetulenv(const char *match, unsigned long *value) 260 { 261 char *ep; 262 263 ep = kdbgetenv(match); 264 if (!ep) 265 return KDB_NOTENV; 266 if (strlen(ep) == 0) 267 return KDB_NOENVVALUE; 268 269 *value = simple_strtoul(ep, NULL, 0); 270 271 return 0; 272 } 273 274 /* 275 * kdbgetintenv - This function will return the value of an 276 * integer-valued environment variable. 277 * Parameters: 278 * match A character string representing an integer-valued env variable 279 * Outputs: 280 * *value the integer representation of the environment variable 'match' 281 * Returns: 282 * Zero on success, a kdb diagnostic on failure. 283 */ 284 int kdbgetintenv(const char *match, int *value) 285 { 286 unsigned long val; 287 int diag; 288 289 diag = kdbgetulenv(match, &val); 290 if (!diag) 291 *value = (int) val; 292 return diag; 293 } 294 295 /* 296 * kdb_setenv() - Alter an existing environment variable or create a new one. 297 * @var: Name of the variable 298 * @val: Value of the variable 299 * 300 * Return: Zero on success, a kdb diagnostic on failure. 301 */ 302 static int kdb_setenv(const char *var, const char *val) 303 { 304 int i; 305 char *ep; 306 size_t varlen, vallen; 307 308 varlen = strlen(var); 309 vallen = strlen(val); 310 ep = kdballocenv(varlen + vallen + 2); 311 if (ep == (char *)0) 312 return KDB_ENVBUFFULL; 313 314 sprintf(ep, "%s=%s", var, val); 315 316 for (i = 0; i < __nenv; i++) { 317 if (__env[i] 318 && ((strncmp(__env[i], var, varlen) == 0) 319 && ((__env[i][varlen] == '\0') 320 || (__env[i][varlen] == '=')))) { 321 __env[i] = ep; 322 return 0; 323 } 324 } 325 326 /* 327 * Wasn't existing variable. Fit into slot. 328 */ 329 for (i = 0; i < __nenv-1; i++) { 330 if (__env[i] == (char *)0) { 331 __env[i] = ep; 332 return 0; 333 } 334 } 335 336 return KDB_ENVFULL; 337 } 338 339 /* 340 * kdb_printenv() - Display the current environment variables. 341 */ 342 static void kdb_printenv(void) 343 { 344 int i; 345 346 for (i = 0; i < __nenv; i++) { 347 if (__env[i]) 348 kdb_printf("%s\n", __env[i]); 349 } 350 } 351 352 /* 353 * kdbgetularg - This function will convert a numeric string into an 354 * unsigned long value. 355 * Parameters: 356 * arg A character string representing a numeric value 357 * Outputs: 358 * *value the unsigned long representation of arg. 359 * Returns: 360 * Zero on success, a kdb diagnostic on failure. 361 */ 362 int kdbgetularg(const char *arg, unsigned long *value) 363 { 364 char *endp; 365 unsigned long val; 366 367 val = simple_strtoul(arg, &endp, 0); 368 369 if (endp == arg) { 370 /* 371 * Also try base 16, for us folks too lazy to type the 372 * leading 0x... 373 */ 374 val = simple_strtoul(arg, &endp, 16); 375 if (endp == arg) 376 return KDB_BADINT; 377 } 378 379 *value = val; 380 381 return 0; 382 } 383 384 int kdbgetu64arg(const char *arg, u64 *value) 385 { 386 char *endp; 387 u64 val; 388 389 val = simple_strtoull(arg, &endp, 0); 390 391 if (endp == arg) { 392 393 val = simple_strtoull(arg, &endp, 16); 394 if (endp == arg) 395 return KDB_BADINT; 396 } 397 398 *value = val; 399 400 return 0; 401 } 402 403 /* 404 * kdb_set - This function implements the 'set' command. Alter an 405 * existing environment variable or create a new one. 406 */ 407 int kdb_set(int argc, const char **argv) 408 { 409 /* 410 * we can be invoked two ways: 411 * set var=value argv[1]="var", argv[2]="value" 412 * set var = value argv[1]="var", argv[2]="=", argv[3]="value" 413 * - if the latter, shift 'em down. 414 */ 415 if (argc == 3) { 416 argv[2] = argv[3]; 417 argc--; 418 } 419 420 if (argc != 2) 421 return KDB_ARGCOUNT; 422 423 /* 424 * Censor sensitive variables 425 */ 426 if (strcmp(argv[1], "PROMPT") == 0 && 427 !kdb_check_flags(KDB_ENABLE_MEM_READ, kdb_cmd_enabled, false)) 428 return KDB_NOPERM; 429 430 /* 431 * Check for internal variables 432 */ 433 if (strcmp(argv[1], "KDBDEBUG") == 0) { 434 unsigned int debugflags; 435 char *cp; 436 437 debugflags = simple_strtoul(argv[2], &cp, 0); 438 if (cp == argv[2] || debugflags & ~KDB_DEBUG_FLAG_MASK) { 439 kdb_printf("kdb: illegal debug flags '%s'\n", 440 argv[2]); 441 return 0; 442 } 443 kdb_flags = (kdb_flags & ~KDB_DEBUG(MASK)) 444 | (debugflags << KDB_DEBUG_FLAG_SHIFT); 445 446 return 0; 447 } 448 449 /* 450 * Tokenizer squashed the '=' sign. argv[1] is variable 451 * name, argv[2] = value. 452 */ 453 return kdb_setenv(argv[1], argv[2]); 454 } 455 456 static int kdb_check_regs(void) 457 { 458 if (!kdb_current_regs) { 459 kdb_printf("No current kdb registers." 460 " You may need to select another task\n"); 461 return KDB_BADREG; 462 } 463 return 0; 464 } 465 466 /* 467 * kdbgetaddrarg - This function is responsible for parsing an 468 * address-expression and returning the value of the expression, 469 * symbol name, and offset to the caller. 470 * 471 * The argument may consist of a numeric value (decimal or 472 * hexadecimal), a symbol name, a register name (preceded by the 473 * percent sign), an environment variable with a numeric value 474 * (preceded by a dollar sign) or a simple arithmetic expression 475 * consisting of a symbol name, +/-, and a numeric constant value 476 * (offset). 477 * Parameters: 478 * argc - count of arguments in argv 479 * argv - argument vector 480 * *nextarg - index to next unparsed argument in argv[] 481 * regs - Register state at time of KDB entry 482 * Outputs: 483 * *value - receives the value of the address-expression 484 * *offset - receives the offset specified, if any 485 * *name - receives the symbol name, if any 486 * *nextarg - index to next unparsed argument in argv[] 487 * Returns: 488 * zero is returned on success, a kdb diagnostic code is 489 * returned on error. 490 */ 491 int kdbgetaddrarg(int argc, const char **argv, int *nextarg, 492 unsigned long *value, long *offset, 493 char **name) 494 { 495 unsigned long addr; 496 unsigned long off = 0; 497 int positive; 498 int diag; 499 int found = 0; 500 char *symname; 501 char symbol = '\0'; 502 char *cp; 503 kdb_symtab_t symtab; 504 505 /* 506 * If the enable flags prohibit both arbitrary memory access 507 * and flow control then there are no reasonable grounds to 508 * provide symbol lookup. 509 */ 510 if (!kdb_check_flags(KDB_ENABLE_MEM_READ | KDB_ENABLE_FLOW_CTRL, 511 kdb_cmd_enabled, false)) 512 return KDB_NOPERM; 513 514 /* 515 * Process arguments which follow the following syntax: 516 * 517 * symbol | numeric-address [+/- numeric-offset] 518 * %register 519 * $environment-variable 520 */ 521 522 if (*nextarg > argc) 523 return KDB_ARGCOUNT; 524 525 symname = (char *)argv[*nextarg]; 526 527 /* 528 * If there is no whitespace between the symbol 529 * or address and the '+' or '-' symbols, we 530 * remember the character and replace it with a 531 * null so the symbol/value can be properly parsed 532 */ 533 cp = strpbrk(symname, "+-"); 534 if (cp != NULL) { 535 symbol = *cp; 536 *cp++ = '\0'; 537 } 538 539 if (symname[0] == '$') { 540 diag = kdbgetulenv(&symname[1], &addr); 541 if (diag) 542 return diag; 543 } else if (symname[0] == '%') { 544 diag = kdb_check_regs(); 545 if (diag) 546 return diag; 547 /* Implement register values with % at a later time as it is 548 * arch optional. 549 */ 550 return KDB_NOTIMP; 551 } else { 552 found = kdbgetsymval(symname, &symtab); 553 if (found) { 554 addr = symtab.sym_start; 555 } else { 556 diag = kdbgetularg(argv[*nextarg], &addr); 557 if (diag) 558 return diag; 559 } 560 } 561 562 if (!found) 563 found = kdbnearsym(addr, &symtab); 564 565 (*nextarg)++; 566 567 if (name) 568 *name = symname; 569 if (value) 570 *value = addr; 571 if (offset && name && *name) 572 *offset = addr - symtab.sym_start; 573 574 if ((*nextarg > argc) 575 && (symbol == '\0')) 576 return 0; 577 578 /* 579 * check for +/- and offset 580 */ 581 582 if (symbol == '\0') { 583 if ((argv[*nextarg][0] != '+') 584 && (argv[*nextarg][0] != '-')) { 585 /* 586 * Not our argument. Return. 587 */ 588 return 0; 589 } else { 590 positive = (argv[*nextarg][0] == '+'); 591 (*nextarg)++; 592 } 593 } else 594 positive = (symbol == '+'); 595 596 /* 597 * Now there must be an offset! 598 */ 599 if ((*nextarg > argc) 600 && (symbol == '\0')) { 601 return KDB_INVADDRFMT; 602 } 603 604 if (!symbol) { 605 cp = (char *)argv[*nextarg]; 606 (*nextarg)++; 607 } 608 609 diag = kdbgetularg(cp, &off); 610 if (diag) 611 return diag; 612 613 if (!positive) 614 off = -off; 615 616 if (offset) 617 *offset += off; 618 619 if (value) 620 *value += off; 621 622 return 0; 623 } 624 625 static void kdb_cmderror(int diag) 626 { 627 int i; 628 629 if (diag >= 0) { 630 kdb_printf("no error detected (diagnostic is %d)\n", diag); 631 return; 632 } 633 634 for (i = 0; i < __nkdb_err; i++) { 635 if (kdbmsgs[i].km_diag == diag) { 636 kdb_printf("diag: %d: %s\n", diag, kdbmsgs[i].km_msg); 637 return; 638 } 639 } 640 641 kdb_printf("Unknown diag %d\n", -diag); 642 } 643 644 /* 645 * kdb_defcmd, kdb_defcmd2 - This function implements the 'defcmd' 646 * command which defines one command as a set of other commands, 647 * terminated by endefcmd. kdb_defcmd processes the initial 648 * 'defcmd' command, kdb_defcmd2 is invoked from kdb_parse for 649 * the following commands until 'endefcmd'. 650 * Inputs: 651 * argc argument count 652 * argv argument vector 653 * Returns: 654 * zero for success, a kdb diagnostic if error 655 */ 656 struct kdb_macro { 657 kdbtab_t cmd; /* Macro command */ 658 struct list_head statements; /* Associated statement list */ 659 }; 660 661 struct kdb_macro_statement { 662 char *statement; /* Statement text */ 663 struct list_head list_node; /* Statement list node */ 664 }; 665 666 static struct kdb_macro *kdb_macro; 667 static bool defcmd_in_progress; 668 669 /* Forward references */ 670 static int kdb_exec_defcmd(int argc, const char **argv); 671 672 static int kdb_defcmd2(const char *cmdstr, const char *argv0) 673 { 674 struct kdb_macro_statement *kms; 675 676 if (!kdb_macro) 677 return KDB_NOTIMP; 678 679 if (strcmp(argv0, "endefcmd") == 0) { 680 defcmd_in_progress = false; 681 if (!list_empty(&kdb_macro->statements)) 682 kdb_register(&kdb_macro->cmd); 683 return 0; 684 } 685 686 kms = kmalloc(sizeof(*kms), GFP_KDB); 687 if (!kms) { 688 kdb_printf("Could not allocate new kdb macro command: %s\n", 689 cmdstr); 690 return KDB_NOTIMP; 691 } 692 693 kms->statement = kdb_strdup(cmdstr, GFP_KDB); 694 list_add_tail(&kms->list_node, &kdb_macro->statements); 695 696 return 0; 697 } 698 699 static int kdb_defcmd(int argc, const char **argv) 700 { 701 kdbtab_t *mp; 702 703 if (defcmd_in_progress) { 704 kdb_printf("kdb: nested defcmd detected, assuming missing " 705 "endefcmd\n"); 706 kdb_defcmd2("endefcmd", "endefcmd"); 707 } 708 if (argc == 0) { 709 kdbtab_t *kp; 710 struct kdb_macro *kmp; 711 struct kdb_macro_statement *kms; 712 713 list_for_each_entry(kp, &kdb_cmds_head, list_node) { 714 if (kp->func == kdb_exec_defcmd) { 715 kdb_printf("defcmd %s \"%s\" \"%s\"\n", 716 kp->name, kp->usage, kp->help); 717 kmp = container_of(kp, struct kdb_macro, cmd); 718 list_for_each_entry(kms, &kmp->statements, 719 list_node) 720 kdb_printf("%s", kms->statement); 721 kdb_printf("endefcmd\n"); 722 } 723 } 724 return 0; 725 } 726 if (argc != 3) 727 return KDB_ARGCOUNT; 728 if (in_dbg_master()) { 729 kdb_printf("Command only available during kdb_init()\n"); 730 return KDB_NOTIMP; 731 } 732 kdb_macro = kzalloc(sizeof(*kdb_macro), GFP_KDB); 733 if (!kdb_macro) 734 goto fail_defcmd; 735 736 mp = &kdb_macro->cmd; 737 mp->func = kdb_exec_defcmd; 738 mp->minlen = 0; 739 mp->flags = KDB_ENABLE_ALWAYS_SAFE; 740 mp->name = kdb_strdup(argv[1], GFP_KDB); 741 if (!mp->name) 742 goto fail_name; 743 mp->usage = kdb_strdup(argv[2], GFP_KDB); 744 if (!mp->usage) 745 goto fail_usage; 746 mp->help = kdb_strdup(argv[3], GFP_KDB); 747 if (!mp->help) 748 goto fail_help; 749 if (mp->usage[0] == '"') { 750 strcpy(mp->usage, argv[2]+1); 751 mp->usage[strlen(mp->usage)-1] = '\0'; 752 } 753 if (mp->help[0] == '"') { 754 strcpy(mp->help, argv[3]+1); 755 mp->help[strlen(mp->help)-1] = '\0'; 756 } 757 758 INIT_LIST_HEAD(&kdb_macro->statements); 759 defcmd_in_progress = true; 760 return 0; 761 fail_help: 762 kfree(mp->usage); 763 fail_usage: 764 kfree(mp->name); 765 fail_name: 766 kfree(kdb_macro); 767 fail_defcmd: 768 kdb_printf("Could not allocate new kdb_macro entry for %s\n", argv[1]); 769 return KDB_NOTIMP; 770 } 771 772 /* 773 * kdb_exec_defcmd - Execute the set of commands associated with this 774 * defcmd name. 775 * Inputs: 776 * argc argument count 777 * argv argument vector 778 * Returns: 779 * zero for success, a kdb diagnostic if error 780 */ 781 static int kdb_exec_defcmd(int argc, const char **argv) 782 { 783 int ret; 784 kdbtab_t *kp; 785 struct kdb_macro *kmp; 786 struct kdb_macro_statement *kms; 787 788 if (argc != 0) 789 return KDB_ARGCOUNT; 790 791 list_for_each_entry(kp, &kdb_cmds_head, list_node) { 792 if (strcmp(kp->name, argv[0]) == 0) 793 break; 794 } 795 if (list_entry_is_head(kp, &kdb_cmds_head, list_node)) { 796 kdb_printf("kdb_exec_defcmd: could not find commands for %s\n", 797 argv[0]); 798 return KDB_NOTIMP; 799 } 800 kmp = container_of(kp, struct kdb_macro, cmd); 801 list_for_each_entry(kms, &kmp->statements, list_node) { 802 /* 803 * Recursive use of kdb_parse, do not use argv after this point. 804 */ 805 argv = NULL; 806 kdb_printf("[%s]kdb> %s\n", kmp->cmd.name, kms->statement); 807 ret = kdb_parse(kms->statement); 808 if (ret) 809 return ret; 810 } 811 return 0; 812 } 813 814 /* Command history */ 815 #define KDB_CMD_HISTORY_COUNT 32 816 #define CMD_BUFLEN 200 /* kdb_printf: max printline 817 * size == 256 */ 818 static unsigned int cmd_head, cmd_tail; 819 static unsigned int cmdptr; 820 static char cmd_hist[KDB_CMD_HISTORY_COUNT][CMD_BUFLEN]; 821 static char cmd_cur[CMD_BUFLEN]; 822 823 /* 824 * The "str" argument may point to something like | grep xyz 825 */ 826 static void parse_grep(const char *str) 827 { 828 int len; 829 char *cp = (char *)str, *cp2; 830 831 /* sanity check: we should have been called with the \ first */ 832 if (*cp != '|') 833 return; 834 cp++; 835 while (isspace(*cp)) 836 cp++; 837 if (!str_has_prefix(cp, "grep ")) { 838 kdb_printf("invalid 'pipe', see grephelp\n"); 839 return; 840 } 841 cp += 5; 842 while (isspace(*cp)) 843 cp++; 844 cp2 = strchr(cp, '\n'); 845 if (cp2) 846 *cp2 = '\0'; /* remove the trailing newline */ 847 len = strlen(cp); 848 if (len == 0) { 849 kdb_printf("invalid 'pipe', see grephelp\n"); 850 return; 851 } 852 /* now cp points to a nonzero length search string */ 853 if (*cp == '"') { 854 /* allow it be "x y z" by removing the "'s - there must 855 be two of them */ 856 cp++; 857 cp2 = strchr(cp, '"'); 858 if (!cp2) { 859 kdb_printf("invalid quoted string, see grephelp\n"); 860 return; 861 } 862 *cp2 = '\0'; /* end the string where the 2nd " was */ 863 } 864 kdb_grep_leading = 0; 865 if (*cp == '^') { 866 kdb_grep_leading = 1; 867 cp++; 868 } 869 len = strlen(cp); 870 kdb_grep_trailing = 0; 871 if (*(cp+len-1) == '$') { 872 kdb_grep_trailing = 1; 873 *(cp+len-1) = '\0'; 874 } 875 len = strlen(cp); 876 if (!len) 877 return; 878 if (len >= KDB_GREP_STRLEN) { 879 kdb_printf("search string too long\n"); 880 return; 881 } 882 strcpy(kdb_grep_string, cp); 883 kdb_grepping_flag++; 884 return; 885 } 886 887 /* 888 * kdb_parse - Parse the command line, search the command table for a 889 * matching command and invoke the command function. This 890 * function may be called recursively, if it is, the second call 891 * will overwrite argv and cbuf. It is the caller's 892 * responsibility to save their argv if they recursively call 893 * kdb_parse(). 894 * Parameters: 895 * cmdstr The input command line to be parsed. 896 * regs The registers at the time kdb was entered. 897 * Returns: 898 * Zero for success, a kdb diagnostic if failure. 899 * Remarks: 900 * Limited to 20 tokens. 901 * 902 * Real rudimentary tokenization. Basically only whitespace 903 * is considered a token delimiter (but special consideration 904 * is taken of the '=' sign as used by the 'set' command). 905 * 906 * The algorithm used to tokenize the input string relies on 907 * there being at least one whitespace (or otherwise useless) 908 * character between tokens as the character immediately following 909 * the token is altered in-place to a null-byte to terminate the 910 * token string. 911 */ 912 913 #define MAXARGC 20 914 915 int kdb_parse(const char *cmdstr) 916 { 917 static char *argv[MAXARGC]; 918 static int argc; 919 static char cbuf[CMD_BUFLEN+2]; 920 char *cp; 921 char *cpp, quoted; 922 kdbtab_t *tp; 923 int escaped, ignore_errors = 0, check_grep = 0; 924 925 /* 926 * First tokenize the command string. 927 */ 928 cp = (char *)cmdstr; 929 930 if (KDB_FLAG(CMD_INTERRUPT)) { 931 /* Previous command was interrupted, newline must not 932 * repeat the command */ 933 KDB_FLAG_CLEAR(CMD_INTERRUPT); 934 KDB_STATE_SET(PAGER); 935 argc = 0; /* no repeat */ 936 } 937 938 if (*cp != '\n' && *cp != '\0') { 939 argc = 0; 940 cpp = cbuf; 941 while (*cp) { 942 /* skip whitespace */ 943 while (isspace(*cp)) 944 cp++; 945 if ((*cp == '\0') || (*cp == '\n') || 946 (*cp == '#' && !defcmd_in_progress)) 947 break; 948 /* special case: check for | grep pattern */ 949 if (*cp == '|') { 950 check_grep++; 951 break; 952 } 953 if (cpp >= cbuf + CMD_BUFLEN) { 954 kdb_printf("kdb_parse: command buffer " 955 "overflow, command ignored\n%s\n", 956 cmdstr); 957 return KDB_NOTFOUND; 958 } 959 if (argc >= MAXARGC - 1) { 960 kdb_printf("kdb_parse: too many arguments, " 961 "command ignored\n%s\n", cmdstr); 962 return KDB_NOTFOUND; 963 } 964 argv[argc++] = cpp; 965 escaped = 0; 966 quoted = '\0'; 967 /* Copy to next unquoted and unescaped 968 * whitespace or '=' */ 969 while (*cp && *cp != '\n' && 970 (escaped || quoted || !isspace(*cp))) { 971 if (cpp >= cbuf + CMD_BUFLEN) 972 break; 973 if (escaped) { 974 escaped = 0; 975 *cpp++ = *cp++; 976 continue; 977 } 978 if (*cp == '\\') { 979 escaped = 1; 980 ++cp; 981 continue; 982 } 983 if (*cp == quoted) 984 quoted = '\0'; 985 else if (*cp == '\'' || *cp == '"') 986 quoted = *cp; 987 *cpp = *cp++; 988 if (*cpp == '=' && !quoted) 989 break; 990 ++cpp; 991 } 992 *cpp++ = '\0'; /* Squash a ws or '=' character */ 993 } 994 } 995 if (!argc) 996 return 0; 997 if (check_grep) 998 parse_grep(cp); 999 if (defcmd_in_progress) { 1000 int result = kdb_defcmd2(cmdstr, argv[0]); 1001 if (!defcmd_in_progress) { 1002 argc = 0; /* avoid repeat on endefcmd */ 1003 *(argv[0]) = '\0'; 1004 } 1005 return result; 1006 } 1007 if (argv[0][0] == '-' && argv[0][1] && 1008 (argv[0][1] < '0' || argv[0][1] > '9')) { 1009 ignore_errors = 1; 1010 ++argv[0]; 1011 } 1012 1013 list_for_each_entry(tp, &kdb_cmds_head, list_node) { 1014 /* 1015 * If this command is allowed to be abbreviated, 1016 * check to see if this is it. 1017 */ 1018 if (tp->minlen && (strlen(argv[0]) <= tp->minlen) && 1019 (strncmp(argv[0], tp->name, tp->minlen) == 0)) 1020 break; 1021 1022 if (strcmp(argv[0], tp->name) == 0) 1023 break; 1024 } 1025 1026 /* 1027 * If we don't find a command by this name, see if the first 1028 * few characters of this match any of the known commands. 1029 * e.g., md1c20 should match md. 1030 */ 1031 if (list_entry_is_head(tp, &kdb_cmds_head, list_node)) { 1032 list_for_each_entry(tp, &kdb_cmds_head, list_node) { 1033 if (strncmp(argv[0], tp->name, strlen(tp->name)) == 0) 1034 break; 1035 } 1036 } 1037 1038 if (!list_entry_is_head(tp, &kdb_cmds_head, list_node)) { 1039 int result; 1040 1041 if (!kdb_check_flags(tp->flags, kdb_cmd_enabled, argc <= 1)) 1042 return KDB_NOPERM; 1043 1044 KDB_STATE_SET(CMD); 1045 result = (*tp->func)(argc-1, (const char **)argv); 1046 if (result && ignore_errors && result > KDB_CMD_GO) 1047 result = 0; 1048 KDB_STATE_CLEAR(CMD); 1049 1050 if (tp->flags & KDB_REPEAT_WITH_ARGS) 1051 return result; 1052 1053 argc = tp->flags & KDB_REPEAT_NO_ARGS ? 1 : 0; 1054 if (argv[argc]) 1055 *(argv[argc]) = '\0'; 1056 return result; 1057 } 1058 1059 /* 1060 * If the input with which we were presented does not 1061 * map to an existing command, attempt to parse it as an 1062 * address argument and display the result. Useful for 1063 * obtaining the address of a variable, or the nearest symbol 1064 * to an address contained in a register. 1065 */ 1066 { 1067 unsigned long value; 1068 char *name = NULL; 1069 long offset; 1070 int nextarg = 0; 1071 1072 if (kdbgetaddrarg(0, (const char **)argv, &nextarg, 1073 &value, &offset, &name)) { 1074 return KDB_NOTFOUND; 1075 } 1076 1077 kdb_printf("%s = ", argv[0]); 1078 kdb_symbol_print(value, NULL, KDB_SP_DEFAULT); 1079 kdb_printf("\n"); 1080 return 0; 1081 } 1082 } 1083 1084 1085 static int handle_ctrl_cmd(char *cmd) 1086 { 1087 #define CTRL_P 16 1088 #define CTRL_N 14 1089 1090 /* initial situation */ 1091 if (cmd_head == cmd_tail) 1092 return 0; 1093 switch (*cmd) { 1094 case CTRL_P: 1095 if (cmdptr != cmd_tail) 1096 cmdptr = (cmdptr + KDB_CMD_HISTORY_COUNT - 1) % 1097 KDB_CMD_HISTORY_COUNT; 1098 strscpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN); 1099 return 1; 1100 case CTRL_N: 1101 if (cmdptr != cmd_head) 1102 cmdptr = (cmdptr+1) % KDB_CMD_HISTORY_COUNT; 1103 strscpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN); 1104 return 1; 1105 } 1106 return 0; 1107 } 1108 1109 /* 1110 * kdb_reboot - This function implements the 'reboot' command. Reboot 1111 * the system immediately, or loop for ever on failure. 1112 */ 1113 static int kdb_reboot(int argc, const char **argv) 1114 { 1115 emergency_restart(); 1116 kdb_printf("Hmm, kdb_reboot did not reboot, spinning here\n"); 1117 while (1) 1118 cpu_relax(); 1119 /* NOTREACHED */ 1120 return 0; 1121 } 1122 1123 static void kdb_dumpregs(struct pt_regs *regs) 1124 { 1125 int old_lvl = console_loglevel; 1126 console_loglevel = CONSOLE_LOGLEVEL_MOTORMOUTH; 1127 kdb_trap_printk++; 1128 show_regs(regs); 1129 kdb_trap_printk--; 1130 kdb_printf("\n"); 1131 console_loglevel = old_lvl; 1132 } 1133 1134 static void kdb_set_current_task(struct task_struct *p) 1135 { 1136 kdb_current_task = p; 1137 1138 if (kdb_task_has_cpu(p)) { 1139 kdb_current_regs = KDB_TSKREGS(kdb_process_cpu(p)); 1140 return; 1141 } 1142 kdb_current_regs = NULL; 1143 } 1144 1145 static void drop_newline(char *buf) 1146 { 1147 size_t len = strlen(buf); 1148 1149 if (len == 0) 1150 return; 1151 if (*(buf + len - 1) == '\n') 1152 *(buf + len - 1) = '\0'; 1153 } 1154 1155 /* 1156 * kdb_local - The main code for kdb. This routine is invoked on a 1157 * specific processor, it is not global. The main kdb() routine 1158 * ensures that only one processor at a time is in this routine. 1159 * This code is called with the real reason code on the first 1160 * entry to a kdb session, thereafter it is called with reason 1161 * SWITCH, even if the user goes back to the original cpu. 1162 * Inputs: 1163 * reason The reason KDB was invoked 1164 * error The hardware-defined error code 1165 * regs The exception frame at time of fault/breakpoint. 1166 * db_result Result code from the break or debug point. 1167 * Returns: 1168 * 0 KDB was invoked for an event which it wasn't responsible 1169 * 1 KDB handled the event for which it was invoked. 1170 * KDB_CMD_GO User typed 'go'. 1171 * KDB_CMD_CPU User switched to another cpu. 1172 * KDB_CMD_SS Single step. 1173 */ 1174 static int kdb_local(kdb_reason_t reason, int error, struct pt_regs *regs, 1175 kdb_dbtrap_t db_result) 1176 { 1177 char *cmdbuf; 1178 int diag; 1179 struct task_struct *kdb_current = 1180 kdb_curr_task(raw_smp_processor_id()); 1181 1182 KDB_DEBUG_STATE("kdb_local 1", reason); 1183 kdb_go_count = 0; 1184 if (reason == KDB_REASON_DEBUG) { 1185 /* special case below */ 1186 } else { 1187 kdb_printf("\nEntering kdb (current=0x%px, pid %d) ", 1188 kdb_current, kdb_current ? kdb_current->pid : 0); 1189 #if defined(CONFIG_SMP) 1190 kdb_printf("on processor %d ", raw_smp_processor_id()); 1191 #endif 1192 } 1193 1194 switch (reason) { 1195 case KDB_REASON_DEBUG: 1196 { 1197 /* 1198 * If re-entering kdb after a single step 1199 * command, don't print the message. 1200 */ 1201 switch (db_result) { 1202 case KDB_DB_BPT: 1203 kdb_printf("\nEntering kdb (0x%px, pid %d) ", 1204 kdb_current, kdb_current->pid); 1205 #if defined(CONFIG_SMP) 1206 kdb_printf("on processor %d ", raw_smp_processor_id()); 1207 #endif 1208 kdb_printf("due to Debug @ " kdb_machreg_fmt "\n", 1209 instruction_pointer(regs)); 1210 break; 1211 case KDB_DB_SS: 1212 break; 1213 case KDB_DB_SSBPT: 1214 KDB_DEBUG_STATE("kdb_local 4", reason); 1215 return 1; /* kdba_db_trap did the work */ 1216 default: 1217 kdb_printf("kdb: Bad result from kdba_db_trap: %d\n", 1218 db_result); 1219 break; 1220 } 1221 1222 } 1223 break; 1224 case KDB_REASON_ENTER: 1225 if (KDB_STATE(KEYBOARD)) 1226 kdb_printf("due to Keyboard Entry\n"); 1227 else 1228 kdb_printf("due to KDB_ENTER()\n"); 1229 break; 1230 case KDB_REASON_KEYBOARD: 1231 KDB_STATE_SET(KEYBOARD); 1232 kdb_printf("due to Keyboard Entry\n"); 1233 break; 1234 case KDB_REASON_ENTER_SLAVE: 1235 /* drop through, slaves only get released via cpu switch */ 1236 case KDB_REASON_SWITCH: 1237 kdb_printf("due to cpu switch\n"); 1238 break; 1239 case KDB_REASON_OOPS: 1240 kdb_printf("Oops: %s\n", kdb_diemsg); 1241 kdb_printf("due to oops @ " kdb_machreg_fmt "\n", 1242 instruction_pointer(regs)); 1243 kdb_dumpregs(regs); 1244 break; 1245 case KDB_REASON_SYSTEM_NMI: 1246 kdb_printf("due to System NonMaskable Interrupt\n"); 1247 break; 1248 case KDB_REASON_NMI: 1249 kdb_printf("due to NonMaskable Interrupt @ " 1250 kdb_machreg_fmt "\n", 1251 instruction_pointer(regs)); 1252 break; 1253 case KDB_REASON_SSTEP: 1254 case KDB_REASON_BREAK: 1255 kdb_printf("due to %s @ " kdb_machreg_fmt "\n", 1256 reason == KDB_REASON_BREAK ? 1257 "Breakpoint" : "SS trap", instruction_pointer(regs)); 1258 /* 1259 * Determine if this breakpoint is one that we 1260 * are interested in. 1261 */ 1262 if (db_result != KDB_DB_BPT) { 1263 kdb_printf("kdb: error return from kdba_bp_trap: %d\n", 1264 db_result); 1265 KDB_DEBUG_STATE("kdb_local 6", reason); 1266 return 0; /* Not for us, dismiss it */ 1267 } 1268 break; 1269 case KDB_REASON_RECURSE: 1270 kdb_printf("due to Recursion @ " kdb_machreg_fmt "\n", 1271 instruction_pointer(regs)); 1272 break; 1273 default: 1274 kdb_printf("kdb: unexpected reason code: %d\n", reason); 1275 KDB_DEBUG_STATE("kdb_local 8", reason); 1276 return 0; /* Not for us, dismiss it */ 1277 } 1278 1279 while (1) { 1280 /* 1281 * Initialize pager context. 1282 */ 1283 kdb_nextline = 1; 1284 KDB_STATE_CLEAR(SUPPRESS); 1285 kdb_grepping_flag = 0; 1286 /* ensure the old search does not leak into '/' commands */ 1287 kdb_grep_string[0] = '\0'; 1288 1289 cmdbuf = cmd_cur; 1290 *cmdbuf = '\0'; 1291 *(cmd_hist[cmd_head]) = '\0'; 1292 1293 do_full_getstr: 1294 /* PROMPT can only be set if we have MEM_READ permission. */ 1295 snprintf(kdb_prompt_str, CMD_BUFLEN, kdbgetenv("PROMPT"), 1296 raw_smp_processor_id()); 1297 if (defcmd_in_progress) 1298 strncat(kdb_prompt_str, "[defcmd]", CMD_BUFLEN); 1299 1300 /* 1301 * Fetch command from keyboard 1302 */ 1303 cmdbuf = kdb_getstr(cmdbuf, CMD_BUFLEN, kdb_prompt_str); 1304 if (*cmdbuf != '\n') { 1305 if (*cmdbuf < 32) { 1306 if (cmdptr == cmd_head) { 1307 strscpy(cmd_hist[cmd_head], cmd_cur, 1308 CMD_BUFLEN); 1309 *(cmd_hist[cmd_head] + 1310 strlen(cmd_hist[cmd_head])-1) = '\0'; 1311 } 1312 if (!handle_ctrl_cmd(cmdbuf)) 1313 *(cmd_cur+strlen(cmd_cur)-1) = '\0'; 1314 cmdbuf = cmd_cur; 1315 goto do_full_getstr; 1316 } else { 1317 strscpy(cmd_hist[cmd_head], cmd_cur, 1318 CMD_BUFLEN); 1319 } 1320 1321 cmd_head = (cmd_head+1) % KDB_CMD_HISTORY_COUNT; 1322 if (cmd_head == cmd_tail) 1323 cmd_tail = (cmd_tail+1) % KDB_CMD_HISTORY_COUNT; 1324 } 1325 1326 cmdptr = cmd_head; 1327 diag = kdb_parse(cmdbuf); 1328 if (diag == KDB_NOTFOUND) { 1329 drop_newline(cmdbuf); 1330 kdb_printf("Unknown kdb command: '%s'\n", cmdbuf); 1331 diag = 0; 1332 } 1333 if (diag == KDB_CMD_GO 1334 || diag == KDB_CMD_CPU 1335 || diag == KDB_CMD_SS 1336 || diag == KDB_CMD_KGDB) 1337 break; 1338 1339 if (diag) 1340 kdb_cmderror(diag); 1341 } 1342 KDB_DEBUG_STATE("kdb_local 9", diag); 1343 return diag; 1344 } 1345 1346 1347 /* 1348 * kdb_print_state - Print the state data for the current processor 1349 * for debugging. 1350 * Inputs: 1351 * text Identifies the debug point 1352 * value Any integer value to be printed, e.g. reason code. 1353 */ 1354 void kdb_print_state(const char *text, int value) 1355 { 1356 kdb_printf("state: %s cpu %d value %d initial %d state %x\n", 1357 text, raw_smp_processor_id(), value, kdb_initial_cpu, 1358 kdb_state); 1359 } 1360 1361 /* 1362 * kdb_main_loop - After initial setup and assignment of the 1363 * controlling cpu, all cpus are in this loop. One cpu is in 1364 * control and will issue the kdb prompt, the others will spin 1365 * until 'go' or cpu switch. 1366 * 1367 * To get a consistent view of the kernel stacks for all 1368 * processes, this routine is invoked from the main kdb code via 1369 * an architecture specific routine. kdba_main_loop is 1370 * responsible for making the kernel stacks consistent for all 1371 * processes, there should be no difference between a blocked 1372 * process and a running process as far as kdb is concerned. 1373 * Inputs: 1374 * reason The reason KDB was invoked 1375 * error The hardware-defined error code 1376 * reason2 kdb's current reason code. 1377 * Initially error but can change 1378 * according to kdb state. 1379 * db_result Result code from break or debug point. 1380 * regs The exception frame at time of fault/breakpoint. 1381 * should always be valid. 1382 * Returns: 1383 * 0 KDB was invoked for an event which it wasn't responsible 1384 * 1 KDB handled the event for which it was invoked. 1385 */ 1386 int kdb_main_loop(kdb_reason_t reason, kdb_reason_t reason2, int error, 1387 kdb_dbtrap_t db_result, struct pt_regs *regs) 1388 { 1389 int result = 1; 1390 /* Stay in kdb() until 'go', 'ss[b]' or an error */ 1391 while (1) { 1392 /* 1393 * All processors except the one that is in control 1394 * will spin here. 1395 */ 1396 KDB_DEBUG_STATE("kdb_main_loop 1", reason); 1397 while (KDB_STATE(HOLD_CPU)) { 1398 /* state KDB is turned off by kdb_cpu to see if the 1399 * other cpus are still live, each cpu in this loop 1400 * turns it back on. 1401 */ 1402 if (!KDB_STATE(KDB)) 1403 KDB_STATE_SET(KDB); 1404 } 1405 1406 KDB_STATE_CLEAR(SUPPRESS); 1407 KDB_DEBUG_STATE("kdb_main_loop 2", reason); 1408 if (KDB_STATE(LEAVING)) 1409 break; /* Another cpu said 'go' */ 1410 /* Still using kdb, this processor is in control */ 1411 result = kdb_local(reason2, error, regs, db_result); 1412 KDB_DEBUG_STATE("kdb_main_loop 3", result); 1413 1414 if (result == KDB_CMD_CPU) 1415 break; 1416 1417 if (result == KDB_CMD_SS) { 1418 KDB_STATE_SET(DOING_SS); 1419 break; 1420 } 1421 1422 if (result == KDB_CMD_KGDB) { 1423 if (!KDB_STATE(DOING_KGDB)) 1424 kdb_printf("Entering please attach debugger " 1425 "or use $D#44+ or $3#33\n"); 1426 break; 1427 } 1428 if (result && result != 1 && result != KDB_CMD_GO) 1429 kdb_printf("\nUnexpected kdb_local return code %d\n", 1430 result); 1431 KDB_DEBUG_STATE("kdb_main_loop 4", reason); 1432 break; 1433 } 1434 if (KDB_STATE(DOING_SS)) 1435 KDB_STATE_CLEAR(SSBPT); 1436 1437 /* Clean up any keyboard devices before leaving */ 1438 kdb_kbd_cleanup_state(); 1439 1440 return result; 1441 } 1442 1443 /* 1444 * kdb_mdr - This function implements the guts of the 'mdr', memory 1445 * read command. 1446 * mdr <addr arg>,<byte count> 1447 * Inputs: 1448 * addr Start address 1449 * count Number of bytes 1450 * Returns: 1451 * Always 0. Any errors are detected and printed by kdb_getarea. 1452 */ 1453 static int kdb_mdr(unsigned long addr, unsigned int count) 1454 { 1455 unsigned char c; 1456 while (count--) { 1457 if (kdb_getarea(c, addr)) 1458 return 0; 1459 kdb_printf("%02x", c); 1460 addr++; 1461 } 1462 kdb_printf("\n"); 1463 return 0; 1464 } 1465 1466 /* 1467 * kdb_md - This function implements the 'md', 'md1', 'md2', 'md4', 1468 * 'md8' 'mdr' and 'mds' commands. 1469 * 1470 * md|mds [<addr arg> [<line count> [<radix>]]] 1471 * mdWcN [<addr arg> [<line count> [<radix>]]] 1472 * where W = is the width (1, 2, 4 or 8) and N is the count. 1473 * for eg., md1c20 reads 20 bytes, 1 at a time. 1474 * mdr <addr arg>,<byte count> 1475 */ 1476 static void kdb_md_line(const char *fmtstr, unsigned long addr, 1477 int symbolic, int nosect, int bytesperword, 1478 int num, int repeat, int phys) 1479 { 1480 /* print just one line of data */ 1481 kdb_symtab_t symtab; 1482 char cbuf[32]; 1483 char *c = cbuf; 1484 int i; 1485 int j; 1486 unsigned long word; 1487 1488 memset(cbuf, '\0', sizeof(cbuf)); 1489 if (phys) 1490 kdb_printf("phys " kdb_machreg_fmt0 " ", addr); 1491 else 1492 kdb_printf(kdb_machreg_fmt0 " ", addr); 1493 1494 for (i = 0; i < num && repeat--; i++) { 1495 if (phys) { 1496 if (kdb_getphysword(&word, addr, bytesperword)) 1497 break; 1498 } else if (kdb_getword(&word, addr, bytesperword)) 1499 break; 1500 kdb_printf(fmtstr, word); 1501 if (symbolic) 1502 kdbnearsym(word, &symtab); 1503 else 1504 memset(&symtab, 0, sizeof(symtab)); 1505 if (symtab.sym_name) { 1506 kdb_symbol_print(word, &symtab, 0); 1507 if (!nosect) { 1508 kdb_printf("\n"); 1509 kdb_printf(" %s %s " 1510 kdb_machreg_fmt " " 1511 kdb_machreg_fmt " " 1512 kdb_machreg_fmt, symtab.mod_name, 1513 symtab.sec_name, symtab.sec_start, 1514 symtab.sym_start, symtab.sym_end); 1515 } 1516 addr += bytesperword; 1517 } else { 1518 union { 1519 u64 word; 1520 unsigned char c[8]; 1521 } wc; 1522 unsigned char *cp; 1523 #ifdef __BIG_ENDIAN 1524 cp = wc.c + 8 - bytesperword; 1525 #else 1526 cp = wc.c; 1527 #endif 1528 wc.word = word; 1529 #define printable_char(c) \ 1530 ({unsigned char __c = c; isascii(__c) && isprint(__c) ? __c : '.'; }) 1531 for (j = 0; j < bytesperword; j++) 1532 *c++ = printable_char(*cp++); 1533 addr += bytesperword; 1534 #undef printable_char 1535 } 1536 } 1537 kdb_printf("%*s %s\n", (int)((num-i)*(2*bytesperword + 1)+1), 1538 " ", cbuf); 1539 } 1540 1541 static int kdb_md(int argc, const char **argv) 1542 { 1543 static unsigned long last_addr; 1544 static int last_radix, last_bytesperword, last_repeat; 1545 int radix = 16, mdcount = 8, bytesperword = KDB_WORD_SIZE, repeat; 1546 int nosect = 0; 1547 char fmtchar, fmtstr[64]; 1548 unsigned long addr; 1549 unsigned long word; 1550 long offset = 0; 1551 int symbolic = 0; 1552 int valid = 0; 1553 int phys = 0; 1554 int raw = 0; 1555 1556 kdbgetintenv("MDCOUNT", &mdcount); 1557 kdbgetintenv("RADIX", &radix); 1558 kdbgetintenv("BYTESPERWORD", &bytesperword); 1559 1560 /* Assume 'md <addr>' and start with environment values */ 1561 repeat = mdcount * 16 / bytesperword; 1562 1563 if (strcmp(argv[0], "mdr") == 0) { 1564 if (argc == 2 || (argc == 0 && last_addr != 0)) 1565 valid = raw = 1; 1566 else 1567 return KDB_ARGCOUNT; 1568 } else if (isdigit(argv[0][2])) { 1569 bytesperword = (int)(argv[0][2] - '0'); 1570 if (bytesperword == 0) { 1571 bytesperword = last_bytesperword; 1572 if (bytesperword == 0) 1573 bytesperword = 4; 1574 } 1575 last_bytesperword = bytesperword; 1576 repeat = mdcount * 16 / bytesperword; 1577 if (!argv[0][3]) 1578 valid = 1; 1579 else if (argv[0][3] == 'c' && argv[0][4]) { 1580 char *p; 1581 repeat = simple_strtoul(argv[0] + 4, &p, 10); 1582 mdcount = ((repeat * bytesperword) + 15) / 16; 1583 valid = !*p; 1584 } 1585 last_repeat = repeat; 1586 } else if (strcmp(argv[0], "md") == 0) 1587 valid = 1; 1588 else if (strcmp(argv[0], "mds") == 0) 1589 valid = 1; 1590 else if (strcmp(argv[0], "mdp") == 0) { 1591 phys = valid = 1; 1592 } 1593 if (!valid) 1594 return KDB_NOTFOUND; 1595 1596 if (argc == 0) { 1597 if (last_addr == 0) 1598 return KDB_ARGCOUNT; 1599 addr = last_addr; 1600 radix = last_radix; 1601 bytesperword = last_bytesperword; 1602 repeat = last_repeat; 1603 if (raw) 1604 mdcount = repeat; 1605 else 1606 mdcount = ((repeat * bytesperword) + 15) / 16; 1607 } 1608 1609 if (argc) { 1610 unsigned long val; 1611 int diag, nextarg = 1; 1612 diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, 1613 &offset, NULL); 1614 if (diag) 1615 return diag; 1616 if (argc > nextarg+2) 1617 return KDB_ARGCOUNT; 1618 1619 if (argc >= nextarg) { 1620 diag = kdbgetularg(argv[nextarg], &val); 1621 if (!diag) { 1622 mdcount = (int) val; 1623 if (raw) 1624 repeat = mdcount; 1625 else 1626 repeat = mdcount * 16 / bytesperword; 1627 } 1628 } 1629 if (argc >= nextarg+1) { 1630 diag = kdbgetularg(argv[nextarg+1], &val); 1631 if (!diag) 1632 radix = (int) val; 1633 } 1634 } 1635 1636 if (strcmp(argv[0], "mdr") == 0) { 1637 int ret; 1638 last_addr = addr; 1639 ret = kdb_mdr(addr, mdcount); 1640 last_addr += mdcount; 1641 last_repeat = mdcount; 1642 last_bytesperword = bytesperword; // to make REPEAT happy 1643 return ret; 1644 } 1645 1646 switch (radix) { 1647 case 10: 1648 fmtchar = 'd'; 1649 break; 1650 case 16: 1651 fmtchar = 'x'; 1652 break; 1653 case 8: 1654 fmtchar = 'o'; 1655 break; 1656 default: 1657 return KDB_BADRADIX; 1658 } 1659 1660 last_radix = radix; 1661 1662 if (bytesperword > KDB_WORD_SIZE) 1663 return KDB_BADWIDTH; 1664 1665 switch (bytesperword) { 1666 case 8: 1667 sprintf(fmtstr, "%%16.16l%c ", fmtchar); 1668 break; 1669 case 4: 1670 sprintf(fmtstr, "%%8.8l%c ", fmtchar); 1671 break; 1672 case 2: 1673 sprintf(fmtstr, "%%4.4l%c ", fmtchar); 1674 break; 1675 case 1: 1676 sprintf(fmtstr, "%%2.2l%c ", fmtchar); 1677 break; 1678 default: 1679 return KDB_BADWIDTH; 1680 } 1681 1682 last_repeat = repeat; 1683 last_bytesperword = bytesperword; 1684 1685 if (strcmp(argv[0], "mds") == 0) { 1686 symbolic = 1; 1687 /* Do not save these changes as last_*, they are temporary mds 1688 * overrides. 1689 */ 1690 bytesperword = KDB_WORD_SIZE; 1691 repeat = mdcount; 1692 kdbgetintenv("NOSECT", &nosect); 1693 } 1694 1695 /* Round address down modulo BYTESPERWORD */ 1696 1697 addr &= ~(bytesperword-1); 1698 1699 while (repeat > 0) { 1700 unsigned long a; 1701 int n, z, num = (symbolic ? 1 : (16 / bytesperword)); 1702 1703 if (KDB_FLAG(CMD_INTERRUPT)) 1704 return 0; 1705 for (a = addr, z = 0; z < repeat; a += bytesperword, ++z) { 1706 if (phys) { 1707 if (kdb_getphysword(&word, a, bytesperword) 1708 || word) 1709 break; 1710 } else if (kdb_getword(&word, a, bytesperword) || word) 1711 break; 1712 } 1713 n = min(num, repeat); 1714 kdb_md_line(fmtstr, addr, symbolic, nosect, bytesperword, 1715 num, repeat, phys); 1716 addr += bytesperword * n; 1717 repeat -= n; 1718 z = (z + num - 1) / num; 1719 if (z > 2) { 1720 int s = num * (z-2); 1721 kdb_printf(kdb_machreg_fmt0 "-" kdb_machreg_fmt0 1722 " zero suppressed\n", 1723 addr, addr + bytesperword * s - 1); 1724 addr += bytesperword * s; 1725 repeat -= s; 1726 } 1727 } 1728 last_addr = addr; 1729 1730 return 0; 1731 } 1732 1733 /* 1734 * kdb_mm - This function implements the 'mm' command. 1735 * mm address-expression new-value 1736 * Remarks: 1737 * mm works on machine words, mmW works on bytes. 1738 */ 1739 static int kdb_mm(int argc, const char **argv) 1740 { 1741 int diag; 1742 unsigned long addr; 1743 long offset = 0; 1744 unsigned long contents; 1745 int nextarg; 1746 int width; 1747 1748 if (argv[0][2] && !isdigit(argv[0][2])) 1749 return KDB_NOTFOUND; 1750 1751 if (argc < 2) 1752 return KDB_ARGCOUNT; 1753 1754 nextarg = 1; 1755 diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL); 1756 if (diag) 1757 return diag; 1758 1759 if (nextarg > argc) 1760 return KDB_ARGCOUNT; 1761 diag = kdbgetaddrarg(argc, argv, &nextarg, &contents, NULL, NULL); 1762 if (diag) 1763 return diag; 1764 1765 if (nextarg != argc + 1) 1766 return KDB_ARGCOUNT; 1767 1768 width = argv[0][2] ? (argv[0][2] - '0') : (KDB_WORD_SIZE); 1769 diag = kdb_putword(addr, contents, width); 1770 if (diag) 1771 return diag; 1772 1773 kdb_printf(kdb_machreg_fmt " = " kdb_machreg_fmt "\n", addr, contents); 1774 1775 return 0; 1776 } 1777 1778 /* 1779 * kdb_go - This function implements the 'go' command. 1780 * go [address-expression] 1781 */ 1782 static int kdb_go(int argc, const char **argv) 1783 { 1784 unsigned long addr; 1785 int diag; 1786 int nextarg; 1787 long offset; 1788 1789 if (raw_smp_processor_id() != kdb_initial_cpu) { 1790 kdb_printf("go must execute on the entry cpu, " 1791 "please use \"cpu %d\" and then execute go\n", 1792 kdb_initial_cpu); 1793 return KDB_BADCPUNUM; 1794 } 1795 if (argc == 1) { 1796 nextarg = 1; 1797 diag = kdbgetaddrarg(argc, argv, &nextarg, 1798 &addr, &offset, NULL); 1799 if (diag) 1800 return diag; 1801 } else if (argc) { 1802 return KDB_ARGCOUNT; 1803 } 1804 1805 diag = KDB_CMD_GO; 1806 if (KDB_FLAG(CATASTROPHIC)) { 1807 kdb_printf("Catastrophic error detected\n"); 1808 kdb_printf("kdb_continue_catastrophic=%d, ", 1809 kdb_continue_catastrophic); 1810 if (kdb_continue_catastrophic == 0 && kdb_go_count++ == 0) { 1811 kdb_printf("type go a second time if you really want " 1812 "to continue\n"); 1813 return 0; 1814 } 1815 if (kdb_continue_catastrophic == 2) { 1816 kdb_printf("forcing reboot\n"); 1817 kdb_reboot(0, NULL); 1818 } 1819 kdb_printf("attempting to continue\n"); 1820 } 1821 return diag; 1822 } 1823 1824 /* 1825 * kdb_rd - This function implements the 'rd' command. 1826 */ 1827 static int kdb_rd(int argc, const char **argv) 1828 { 1829 int len = kdb_check_regs(); 1830 #if DBG_MAX_REG_NUM > 0 1831 int i; 1832 char *rname; 1833 int rsize; 1834 u64 reg64; 1835 u32 reg32; 1836 u16 reg16; 1837 u8 reg8; 1838 1839 if (len) 1840 return len; 1841 1842 for (i = 0; i < DBG_MAX_REG_NUM; i++) { 1843 rsize = dbg_reg_def[i].size * 2; 1844 if (rsize > 16) 1845 rsize = 2; 1846 if (len + strlen(dbg_reg_def[i].name) + 4 + rsize > 80) { 1847 len = 0; 1848 kdb_printf("\n"); 1849 } 1850 if (len) 1851 len += kdb_printf(" "); 1852 switch(dbg_reg_def[i].size * 8) { 1853 case 8: 1854 rname = dbg_get_reg(i, ®8, kdb_current_regs); 1855 if (!rname) 1856 break; 1857 len += kdb_printf("%s: %02x", rname, reg8); 1858 break; 1859 case 16: 1860 rname = dbg_get_reg(i, ®16, kdb_current_regs); 1861 if (!rname) 1862 break; 1863 len += kdb_printf("%s: %04x", rname, reg16); 1864 break; 1865 case 32: 1866 rname = dbg_get_reg(i, ®32, kdb_current_regs); 1867 if (!rname) 1868 break; 1869 len += kdb_printf("%s: %08x", rname, reg32); 1870 break; 1871 case 64: 1872 rname = dbg_get_reg(i, ®64, kdb_current_regs); 1873 if (!rname) 1874 break; 1875 len += kdb_printf("%s: %016llx", rname, reg64); 1876 break; 1877 default: 1878 len += kdb_printf("%s: ??", dbg_reg_def[i].name); 1879 } 1880 } 1881 kdb_printf("\n"); 1882 #else 1883 if (len) 1884 return len; 1885 1886 kdb_dumpregs(kdb_current_regs); 1887 #endif 1888 return 0; 1889 } 1890 1891 /* 1892 * kdb_rm - This function implements the 'rm' (register modify) command. 1893 * rm register-name new-contents 1894 * Remarks: 1895 * Allows register modification with the same restrictions as gdb 1896 */ 1897 static int kdb_rm(int argc, const char **argv) 1898 { 1899 #if DBG_MAX_REG_NUM > 0 1900 int diag; 1901 const char *rname; 1902 int i; 1903 u64 reg64; 1904 u32 reg32; 1905 u16 reg16; 1906 u8 reg8; 1907 1908 if (argc != 2) 1909 return KDB_ARGCOUNT; 1910 /* 1911 * Allow presence or absence of leading '%' symbol. 1912 */ 1913 rname = argv[1]; 1914 if (*rname == '%') 1915 rname++; 1916 1917 diag = kdbgetu64arg(argv[2], ®64); 1918 if (diag) 1919 return diag; 1920 1921 diag = kdb_check_regs(); 1922 if (diag) 1923 return diag; 1924 1925 diag = KDB_BADREG; 1926 for (i = 0; i < DBG_MAX_REG_NUM; i++) { 1927 if (strcmp(rname, dbg_reg_def[i].name) == 0) { 1928 diag = 0; 1929 break; 1930 } 1931 } 1932 if (!diag) { 1933 switch(dbg_reg_def[i].size * 8) { 1934 case 8: 1935 reg8 = reg64; 1936 dbg_set_reg(i, ®8, kdb_current_regs); 1937 break; 1938 case 16: 1939 reg16 = reg64; 1940 dbg_set_reg(i, ®16, kdb_current_regs); 1941 break; 1942 case 32: 1943 reg32 = reg64; 1944 dbg_set_reg(i, ®32, kdb_current_regs); 1945 break; 1946 case 64: 1947 dbg_set_reg(i, ®64, kdb_current_regs); 1948 break; 1949 } 1950 } 1951 return diag; 1952 #else 1953 kdb_printf("ERROR: Register set currently not implemented\n"); 1954 return 0; 1955 #endif 1956 } 1957 1958 #if defined(CONFIG_MAGIC_SYSRQ) 1959 /* 1960 * kdb_sr - This function implements the 'sr' (SYSRQ key) command 1961 * which interfaces to the soi-disant MAGIC SYSRQ functionality. 1962 * sr <magic-sysrq-code> 1963 */ 1964 static int kdb_sr(int argc, const char **argv) 1965 { 1966 bool check_mask = 1967 !kdb_check_flags(KDB_ENABLE_ALL, kdb_cmd_enabled, false); 1968 1969 if (argc != 1) 1970 return KDB_ARGCOUNT; 1971 1972 kdb_trap_printk++; 1973 __handle_sysrq(*argv[1], check_mask); 1974 kdb_trap_printk--; 1975 1976 return 0; 1977 } 1978 #endif /* CONFIG_MAGIC_SYSRQ */ 1979 1980 /* 1981 * kdb_ef - This function implements the 'regs' (display exception 1982 * frame) command. This command takes an address and expects to 1983 * find an exception frame at that address, formats and prints 1984 * it. 1985 * regs address-expression 1986 * Remarks: 1987 * Not done yet. 1988 */ 1989 static int kdb_ef(int argc, const char **argv) 1990 { 1991 int diag; 1992 unsigned long addr; 1993 long offset; 1994 int nextarg; 1995 1996 if (argc != 1) 1997 return KDB_ARGCOUNT; 1998 1999 nextarg = 1; 2000 diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL); 2001 if (diag) 2002 return diag; 2003 show_regs((struct pt_regs *)addr); 2004 return 0; 2005 } 2006 2007 #if defined(CONFIG_MODULES) 2008 /* 2009 * kdb_lsmod - This function implements the 'lsmod' command. Lists 2010 * currently loaded kernel modules. 2011 * Mostly taken from userland lsmod. 2012 */ 2013 static int kdb_lsmod(int argc, const char **argv) 2014 { 2015 struct module *mod; 2016 2017 if (argc != 0) 2018 return KDB_ARGCOUNT; 2019 2020 kdb_printf("Module Size modstruct Used by\n"); 2021 list_for_each_entry(mod, kdb_modules, list) { 2022 if (mod->state == MODULE_STATE_UNFORMED) 2023 continue; 2024 2025 kdb_printf("%-20s%8u 0x%px ", mod->name, 2026 mod->core_layout.size, (void *)mod); 2027 #ifdef CONFIG_MODULE_UNLOAD 2028 kdb_printf("%4d ", module_refcount(mod)); 2029 #endif 2030 if (mod->state == MODULE_STATE_GOING) 2031 kdb_printf(" (Unloading)"); 2032 else if (mod->state == MODULE_STATE_COMING) 2033 kdb_printf(" (Loading)"); 2034 else 2035 kdb_printf(" (Live)"); 2036 kdb_printf(" 0x%px", mod->core_layout.base); 2037 2038 #ifdef CONFIG_MODULE_UNLOAD 2039 { 2040 struct module_use *use; 2041 kdb_printf(" [ "); 2042 list_for_each_entry(use, &mod->source_list, 2043 source_list) 2044 kdb_printf("%s ", use->target->name); 2045 kdb_printf("]\n"); 2046 } 2047 #endif 2048 } 2049 2050 return 0; 2051 } 2052 2053 #endif /* CONFIG_MODULES */ 2054 2055 /* 2056 * kdb_env - This function implements the 'env' command. Display the 2057 * current environment variables. 2058 */ 2059 2060 static int kdb_env(int argc, const char **argv) 2061 { 2062 kdb_printenv(); 2063 2064 if (KDB_DEBUG(MASK)) 2065 kdb_printf("KDBDEBUG=0x%x\n", 2066 (kdb_flags & KDB_DEBUG(MASK)) >> KDB_DEBUG_FLAG_SHIFT); 2067 2068 return 0; 2069 } 2070 2071 #ifdef CONFIG_PRINTK 2072 /* 2073 * kdb_dmesg - This function implements the 'dmesg' command to display 2074 * the contents of the syslog buffer. 2075 * dmesg [lines] [adjust] 2076 */ 2077 static int kdb_dmesg(int argc, const char **argv) 2078 { 2079 int diag; 2080 int logging; 2081 int lines = 0; 2082 int adjust = 0; 2083 int n = 0; 2084 int skip = 0; 2085 struct kmsg_dump_iter iter; 2086 size_t len; 2087 char buf[201]; 2088 2089 if (argc > 2) 2090 return KDB_ARGCOUNT; 2091 if (argc) { 2092 char *cp; 2093 lines = simple_strtol(argv[1], &cp, 0); 2094 if (*cp) 2095 lines = 0; 2096 if (argc > 1) { 2097 adjust = simple_strtoul(argv[2], &cp, 0); 2098 if (*cp || adjust < 0) 2099 adjust = 0; 2100 } 2101 } 2102 2103 /* disable LOGGING if set */ 2104 diag = kdbgetintenv("LOGGING", &logging); 2105 if (!diag && logging) { 2106 const char *setargs[] = { "set", "LOGGING", "0" }; 2107 kdb_set(2, setargs); 2108 } 2109 2110 kmsg_dump_rewind(&iter); 2111 while (kmsg_dump_get_line(&iter, 1, NULL, 0, NULL)) 2112 n++; 2113 2114 if (lines < 0) { 2115 if (adjust >= n) 2116 kdb_printf("buffer only contains %d lines, nothing " 2117 "printed\n", n); 2118 else if (adjust - lines >= n) 2119 kdb_printf("buffer only contains %d lines, last %d " 2120 "lines printed\n", n, n - adjust); 2121 skip = adjust; 2122 lines = abs(lines); 2123 } else if (lines > 0) { 2124 skip = n - lines - adjust; 2125 lines = abs(lines); 2126 if (adjust >= n) { 2127 kdb_printf("buffer only contains %d lines, " 2128 "nothing printed\n", n); 2129 skip = n; 2130 } else if (skip < 0) { 2131 lines += skip; 2132 skip = 0; 2133 kdb_printf("buffer only contains %d lines, first " 2134 "%d lines printed\n", n, lines); 2135 } 2136 } else { 2137 lines = n; 2138 } 2139 2140 if (skip >= n || skip < 0) 2141 return 0; 2142 2143 kmsg_dump_rewind(&iter); 2144 while (kmsg_dump_get_line(&iter, 1, buf, sizeof(buf), &len)) { 2145 if (skip) { 2146 skip--; 2147 continue; 2148 } 2149 if (!lines--) 2150 break; 2151 if (KDB_FLAG(CMD_INTERRUPT)) 2152 return 0; 2153 2154 kdb_printf("%.*s\n", (int)len - 1, buf); 2155 } 2156 2157 return 0; 2158 } 2159 #endif /* CONFIG_PRINTK */ 2160 2161 /* Make sure we balance enable/disable calls, must disable first. */ 2162 static atomic_t kdb_nmi_disabled; 2163 2164 static int kdb_disable_nmi(int argc, const char *argv[]) 2165 { 2166 if (atomic_read(&kdb_nmi_disabled)) 2167 return 0; 2168 atomic_set(&kdb_nmi_disabled, 1); 2169 arch_kgdb_ops.enable_nmi(0); 2170 return 0; 2171 } 2172 2173 static int kdb_param_enable_nmi(const char *val, const struct kernel_param *kp) 2174 { 2175 if (!atomic_add_unless(&kdb_nmi_disabled, -1, 0)) 2176 return -EINVAL; 2177 arch_kgdb_ops.enable_nmi(1); 2178 return 0; 2179 } 2180 2181 static const struct kernel_param_ops kdb_param_ops_enable_nmi = { 2182 .set = kdb_param_enable_nmi, 2183 }; 2184 module_param_cb(enable_nmi, &kdb_param_ops_enable_nmi, NULL, 0600); 2185 2186 /* 2187 * kdb_cpu - This function implements the 'cpu' command. 2188 * cpu [<cpunum>] 2189 * Returns: 2190 * KDB_CMD_CPU for success, a kdb diagnostic if error 2191 */ 2192 static void kdb_cpu_status(void) 2193 { 2194 int i, start_cpu, first_print = 1; 2195 char state, prev_state = '?'; 2196 2197 kdb_printf("Currently on cpu %d\n", raw_smp_processor_id()); 2198 kdb_printf("Available cpus: "); 2199 for (start_cpu = -1, i = 0; i < NR_CPUS; i++) { 2200 if (!cpu_online(i)) { 2201 state = 'F'; /* cpu is offline */ 2202 } else if (!kgdb_info[i].enter_kgdb) { 2203 state = 'D'; /* cpu is online but unresponsive */ 2204 } else { 2205 state = ' '; /* cpu is responding to kdb */ 2206 if (kdb_task_state_char(KDB_TSK(i)) == '-') 2207 state = '-'; /* idle task */ 2208 } 2209 if (state != prev_state) { 2210 if (prev_state != '?') { 2211 if (!first_print) 2212 kdb_printf(", "); 2213 first_print = 0; 2214 kdb_printf("%d", start_cpu); 2215 if (start_cpu < i-1) 2216 kdb_printf("-%d", i-1); 2217 if (prev_state != ' ') 2218 kdb_printf("(%c)", prev_state); 2219 } 2220 prev_state = state; 2221 start_cpu = i; 2222 } 2223 } 2224 /* print the trailing cpus, ignoring them if they are all offline */ 2225 if (prev_state != 'F') { 2226 if (!first_print) 2227 kdb_printf(", "); 2228 kdb_printf("%d", start_cpu); 2229 if (start_cpu < i-1) 2230 kdb_printf("-%d", i-1); 2231 if (prev_state != ' ') 2232 kdb_printf("(%c)", prev_state); 2233 } 2234 kdb_printf("\n"); 2235 } 2236 2237 static int kdb_cpu(int argc, const char **argv) 2238 { 2239 unsigned long cpunum; 2240 int diag; 2241 2242 if (argc == 0) { 2243 kdb_cpu_status(); 2244 return 0; 2245 } 2246 2247 if (argc != 1) 2248 return KDB_ARGCOUNT; 2249 2250 diag = kdbgetularg(argv[1], &cpunum); 2251 if (diag) 2252 return diag; 2253 2254 /* 2255 * Validate cpunum 2256 */ 2257 if ((cpunum >= CONFIG_NR_CPUS) || !kgdb_info[cpunum].enter_kgdb) 2258 return KDB_BADCPUNUM; 2259 2260 dbg_switch_cpu = cpunum; 2261 2262 /* 2263 * Switch to other cpu 2264 */ 2265 return KDB_CMD_CPU; 2266 } 2267 2268 /* The user may not realize that ps/bta with no parameters does not print idle 2269 * or sleeping system daemon processes, so tell them how many were suppressed. 2270 */ 2271 void kdb_ps_suppressed(void) 2272 { 2273 int idle = 0, daemon = 0; 2274 unsigned long cpu; 2275 const struct task_struct *p, *g; 2276 for_each_online_cpu(cpu) { 2277 p = kdb_curr_task(cpu); 2278 if (kdb_task_state(p, "-")) 2279 ++idle; 2280 } 2281 for_each_process_thread(g, p) { 2282 if (kdb_task_state(p, "ims")) 2283 ++daemon; 2284 } 2285 if (idle || daemon) { 2286 if (idle) 2287 kdb_printf("%d idle process%s (state -)%s\n", 2288 idle, idle == 1 ? "" : "es", 2289 daemon ? " and " : ""); 2290 if (daemon) 2291 kdb_printf("%d sleeping system daemon (state [ims]) " 2292 "process%s", daemon, 2293 daemon == 1 ? "" : "es"); 2294 kdb_printf(" suppressed,\nuse 'ps A' to see all.\n"); 2295 } 2296 } 2297 2298 void kdb_ps1(const struct task_struct *p) 2299 { 2300 int cpu; 2301 unsigned long tmp; 2302 2303 if (!p || 2304 copy_from_kernel_nofault(&tmp, (char *)p, sizeof(unsigned long))) 2305 return; 2306 2307 cpu = kdb_process_cpu(p); 2308 kdb_printf("0x%px %8d %8d %d %4d %c 0x%px %c%s\n", 2309 (void *)p, p->pid, p->parent->pid, 2310 kdb_task_has_cpu(p), kdb_process_cpu(p), 2311 kdb_task_state_char(p), 2312 (void *)(&p->thread), 2313 p == kdb_curr_task(raw_smp_processor_id()) ? '*' : ' ', 2314 p->comm); 2315 if (kdb_task_has_cpu(p)) { 2316 if (!KDB_TSK(cpu)) { 2317 kdb_printf(" Error: no saved data for this cpu\n"); 2318 } else { 2319 if (KDB_TSK(cpu) != p) 2320 kdb_printf(" Error: does not match running " 2321 "process table (0x%px)\n", KDB_TSK(cpu)); 2322 } 2323 } 2324 } 2325 2326 /* 2327 * kdb_ps - This function implements the 'ps' command which shows a 2328 * list of the active processes. 2329 * 2330 * ps [<state_chars>] Show processes, optionally selecting only those whose 2331 * state character is found in <state_chars>. 2332 */ 2333 static int kdb_ps(int argc, const char **argv) 2334 { 2335 struct task_struct *g, *p; 2336 const char *mask; 2337 unsigned long cpu; 2338 2339 if (argc == 0) 2340 kdb_ps_suppressed(); 2341 kdb_printf("%-*s Pid Parent [*] cpu State %-*s Command\n", 2342 (int)(2*sizeof(void *))+2, "Task Addr", 2343 (int)(2*sizeof(void *))+2, "Thread"); 2344 mask = argc ? argv[1] : kdbgetenv("PS"); 2345 /* Run the active tasks first */ 2346 for_each_online_cpu(cpu) { 2347 if (KDB_FLAG(CMD_INTERRUPT)) 2348 return 0; 2349 p = kdb_curr_task(cpu); 2350 if (kdb_task_state(p, mask)) 2351 kdb_ps1(p); 2352 } 2353 kdb_printf("\n"); 2354 /* Now the real tasks */ 2355 for_each_process_thread(g, p) { 2356 if (KDB_FLAG(CMD_INTERRUPT)) 2357 return 0; 2358 if (kdb_task_state(p, mask)) 2359 kdb_ps1(p); 2360 } 2361 2362 return 0; 2363 } 2364 2365 /* 2366 * kdb_pid - This function implements the 'pid' command which switches 2367 * the currently active process. 2368 * pid [<pid> | R] 2369 */ 2370 static int kdb_pid(int argc, const char **argv) 2371 { 2372 struct task_struct *p; 2373 unsigned long val; 2374 int diag; 2375 2376 if (argc > 1) 2377 return KDB_ARGCOUNT; 2378 2379 if (argc) { 2380 if (strcmp(argv[1], "R") == 0) { 2381 p = KDB_TSK(kdb_initial_cpu); 2382 } else { 2383 diag = kdbgetularg(argv[1], &val); 2384 if (diag) 2385 return KDB_BADINT; 2386 2387 p = find_task_by_pid_ns((pid_t)val, &init_pid_ns); 2388 if (!p) { 2389 kdb_printf("No task with pid=%d\n", (pid_t)val); 2390 return 0; 2391 } 2392 } 2393 kdb_set_current_task(p); 2394 } 2395 kdb_printf("KDB current process is %s(pid=%d)\n", 2396 kdb_current_task->comm, 2397 kdb_current_task->pid); 2398 2399 return 0; 2400 } 2401 2402 static int kdb_kgdb(int argc, const char **argv) 2403 { 2404 return KDB_CMD_KGDB; 2405 } 2406 2407 /* 2408 * kdb_help - This function implements the 'help' and '?' commands. 2409 */ 2410 static int kdb_help(int argc, const char **argv) 2411 { 2412 kdbtab_t *kt; 2413 2414 kdb_printf("%-15.15s %-20.20s %s\n", "Command", "Usage", "Description"); 2415 kdb_printf("-----------------------------" 2416 "-----------------------------\n"); 2417 list_for_each_entry(kt, &kdb_cmds_head, list_node) { 2418 char *space = ""; 2419 if (KDB_FLAG(CMD_INTERRUPT)) 2420 return 0; 2421 if (!kdb_check_flags(kt->flags, kdb_cmd_enabled, true)) 2422 continue; 2423 if (strlen(kt->usage) > 20) 2424 space = "\n "; 2425 kdb_printf("%-15.15s %-20s%s%s\n", kt->name, 2426 kt->usage, space, kt->help); 2427 } 2428 return 0; 2429 } 2430 2431 /* 2432 * kdb_kill - This function implements the 'kill' commands. 2433 */ 2434 static int kdb_kill(int argc, const char **argv) 2435 { 2436 long sig, pid; 2437 char *endp; 2438 struct task_struct *p; 2439 2440 if (argc != 2) 2441 return KDB_ARGCOUNT; 2442 2443 sig = simple_strtol(argv[1], &endp, 0); 2444 if (*endp) 2445 return KDB_BADINT; 2446 if ((sig >= 0) || !valid_signal(-sig)) { 2447 kdb_printf("Invalid signal parameter.<-signal>\n"); 2448 return 0; 2449 } 2450 sig = -sig; 2451 2452 pid = simple_strtol(argv[2], &endp, 0); 2453 if (*endp) 2454 return KDB_BADINT; 2455 if (pid <= 0) { 2456 kdb_printf("Process ID must be large than 0.\n"); 2457 return 0; 2458 } 2459 2460 /* Find the process. */ 2461 p = find_task_by_pid_ns(pid, &init_pid_ns); 2462 if (!p) { 2463 kdb_printf("The specified process isn't found.\n"); 2464 return 0; 2465 } 2466 p = p->group_leader; 2467 kdb_send_sig(p, sig); 2468 return 0; 2469 } 2470 2471 /* 2472 * Most of this code has been lifted from kernel/timer.c::sys_sysinfo(). 2473 * I cannot call that code directly from kdb, it has an unconditional 2474 * cli()/sti() and calls routines that take locks which can stop the debugger. 2475 */ 2476 static void kdb_sysinfo(struct sysinfo *val) 2477 { 2478 u64 uptime = ktime_get_mono_fast_ns(); 2479 2480 memset(val, 0, sizeof(*val)); 2481 val->uptime = div_u64(uptime, NSEC_PER_SEC); 2482 val->loads[0] = avenrun[0]; 2483 val->loads[1] = avenrun[1]; 2484 val->loads[2] = avenrun[2]; 2485 val->procs = nr_threads-1; 2486 si_meminfo(val); 2487 2488 return; 2489 } 2490 2491 /* 2492 * kdb_summary - This function implements the 'summary' command. 2493 */ 2494 static int kdb_summary(int argc, const char **argv) 2495 { 2496 time64_t now; 2497 struct sysinfo val; 2498 2499 if (argc) 2500 return KDB_ARGCOUNT; 2501 2502 kdb_printf("sysname %s\n", init_uts_ns.name.sysname); 2503 kdb_printf("release %s\n", init_uts_ns.name.release); 2504 kdb_printf("version %s\n", init_uts_ns.name.version); 2505 kdb_printf("machine %s\n", init_uts_ns.name.machine); 2506 kdb_printf("nodename %s\n", init_uts_ns.name.nodename); 2507 kdb_printf("domainname %s\n", init_uts_ns.name.domainname); 2508 2509 now = __ktime_get_real_seconds(); 2510 kdb_printf("date %ptTs tz_minuteswest %d\n", &now, sys_tz.tz_minuteswest); 2511 kdb_sysinfo(&val); 2512 kdb_printf("uptime "); 2513 if (val.uptime > (24*60*60)) { 2514 int days = val.uptime / (24*60*60); 2515 val.uptime %= (24*60*60); 2516 kdb_printf("%d day%s ", days, days == 1 ? "" : "s"); 2517 } 2518 kdb_printf("%02ld:%02ld\n", val.uptime/(60*60), (val.uptime/60)%60); 2519 2520 kdb_printf("load avg %ld.%02ld %ld.%02ld %ld.%02ld\n", 2521 LOAD_INT(val.loads[0]), LOAD_FRAC(val.loads[0]), 2522 LOAD_INT(val.loads[1]), LOAD_FRAC(val.loads[1]), 2523 LOAD_INT(val.loads[2]), LOAD_FRAC(val.loads[2])); 2524 2525 /* Display in kilobytes */ 2526 #define K(x) ((x) << (PAGE_SHIFT - 10)) 2527 kdb_printf("\nMemTotal: %8lu kB\nMemFree: %8lu kB\n" 2528 "Buffers: %8lu kB\n", 2529 K(val.totalram), K(val.freeram), K(val.bufferram)); 2530 return 0; 2531 } 2532 2533 /* 2534 * kdb_per_cpu - This function implements the 'per_cpu' command. 2535 */ 2536 static int kdb_per_cpu(int argc, const char **argv) 2537 { 2538 char fmtstr[64]; 2539 int cpu, diag, nextarg = 1; 2540 unsigned long addr, symaddr, val, bytesperword = 0, whichcpu = ~0UL; 2541 2542 if (argc < 1 || argc > 3) 2543 return KDB_ARGCOUNT; 2544 2545 diag = kdbgetaddrarg(argc, argv, &nextarg, &symaddr, NULL, NULL); 2546 if (diag) 2547 return diag; 2548 2549 if (argc >= 2) { 2550 diag = kdbgetularg(argv[2], &bytesperword); 2551 if (diag) 2552 return diag; 2553 } 2554 if (!bytesperword) 2555 bytesperword = KDB_WORD_SIZE; 2556 else if (bytesperword > KDB_WORD_SIZE) 2557 return KDB_BADWIDTH; 2558 sprintf(fmtstr, "%%0%dlx ", (int)(2*bytesperword)); 2559 if (argc >= 3) { 2560 diag = kdbgetularg(argv[3], &whichcpu); 2561 if (diag) 2562 return diag; 2563 if (whichcpu >= nr_cpu_ids || !cpu_online(whichcpu)) { 2564 kdb_printf("cpu %ld is not online\n", whichcpu); 2565 return KDB_BADCPUNUM; 2566 } 2567 } 2568 2569 /* Most architectures use __per_cpu_offset[cpu], some use 2570 * __per_cpu_offset(cpu), smp has no __per_cpu_offset. 2571 */ 2572 #ifdef __per_cpu_offset 2573 #define KDB_PCU(cpu) __per_cpu_offset(cpu) 2574 #else 2575 #ifdef CONFIG_SMP 2576 #define KDB_PCU(cpu) __per_cpu_offset[cpu] 2577 #else 2578 #define KDB_PCU(cpu) 0 2579 #endif 2580 #endif 2581 for_each_online_cpu(cpu) { 2582 if (KDB_FLAG(CMD_INTERRUPT)) 2583 return 0; 2584 2585 if (whichcpu != ~0UL && whichcpu != cpu) 2586 continue; 2587 addr = symaddr + KDB_PCU(cpu); 2588 diag = kdb_getword(&val, addr, bytesperword); 2589 if (diag) { 2590 kdb_printf("%5d " kdb_bfd_vma_fmt0 " - unable to " 2591 "read, diag=%d\n", cpu, addr, diag); 2592 continue; 2593 } 2594 kdb_printf("%5d ", cpu); 2595 kdb_md_line(fmtstr, addr, 2596 bytesperword == KDB_WORD_SIZE, 2597 1, bytesperword, 1, 1, 0); 2598 } 2599 #undef KDB_PCU 2600 return 0; 2601 } 2602 2603 /* 2604 * display help for the use of cmd | grep pattern 2605 */ 2606 static int kdb_grep_help(int argc, const char **argv) 2607 { 2608 kdb_printf("Usage of cmd args | grep pattern:\n"); 2609 kdb_printf(" Any command's output may be filtered through an "); 2610 kdb_printf("emulated 'pipe'.\n"); 2611 kdb_printf(" 'grep' is just a key word.\n"); 2612 kdb_printf(" The pattern may include a very limited set of " 2613 "metacharacters:\n"); 2614 kdb_printf(" pattern or ^pattern or pattern$ or ^pattern$\n"); 2615 kdb_printf(" And if there are spaces in the pattern, you may " 2616 "quote it:\n"); 2617 kdb_printf(" \"pat tern\" or \"^pat tern\" or \"pat tern$\"" 2618 " or \"^pat tern$\"\n"); 2619 return 0; 2620 } 2621 2622 /** 2623 * kdb_register() - This function is used to register a kernel debugger 2624 * command. 2625 * @cmd: pointer to kdb command 2626 * 2627 * Note that it's the job of the caller to keep the memory for the cmd 2628 * allocated until unregister is called. 2629 */ 2630 int kdb_register(kdbtab_t *cmd) 2631 { 2632 kdbtab_t *kp; 2633 2634 list_for_each_entry(kp, &kdb_cmds_head, list_node) { 2635 if (strcmp(kp->name, cmd->name) == 0) { 2636 kdb_printf("Duplicate kdb cmd: %s, func %p help %s\n", 2637 cmd->name, cmd->func, cmd->help); 2638 return 1; 2639 } 2640 } 2641 2642 list_add_tail(&cmd->list_node, &kdb_cmds_head); 2643 return 0; 2644 } 2645 EXPORT_SYMBOL_GPL(kdb_register); 2646 2647 /** 2648 * kdb_register_table() - This function is used to register a kdb command 2649 * table. 2650 * @kp: pointer to kdb command table 2651 * @len: length of kdb command table 2652 */ 2653 void kdb_register_table(kdbtab_t *kp, size_t len) 2654 { 2655 while (len--) { 2656 list_add_tail(&kp->list_node, &kdb_cmds_head); 2657 kp++; 2658 } 2659 } 2660 2661 /** 2662 * kdb_unregister() - This function is used to unregister a kernel debugger 2663 * command. It is generally called when a module which 2664 * implements kdb command is unloaded. 2665 * @cmd: pointer to kdb command 2666 */ 2667 void kdb_unregister(kdbtab_t *cmd) 2668 { 2669 list_del(&cmd->list_node); 2670 } 2671 EXPORT_SYMBOL_GPL(kdb_unregister); 2672 2673 static kdbtab_t maintab[] = { 2674 { .name = "md", 2675 .func = kdb_md, 2676 .usage = "<vaddr>", 2677 .help = "Display Memory Contents, also mdWcN, e.g. md8c1", 2678 .minlen = 1, 2679 .flags = KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS, 2680 }, 2681 { .name = "mdr", 2682 .func = kdb_md, 2683 .usage = "<vaddr> <bytes>", 2684 .help = "Display Raw Memory", 2685 .flags = KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS, 2686 }, 2687 { .name = "mdp", 2688 .func = kdb_md, 2689 .usage = "<paddr> <bytes>", 2690 .help = "Display Physical Memory", 2691 .flags = KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS, 2692 }, 2693 { .name = "mds", 2694 .func = kdb_md, 2695 .usage = "<vaddr>", 2696 .help = "Display Memory Symbolically", 2697 .flags = KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS, 2698 }, 2699 { .name = "mm", 2700 .func = kdb_mm, 2701 .usage = "<vaddr> <contents>", 2702 .help = "Modify Memory Contents", 2703 .flags = KDB_ENABLE_MEM_WRITE | KDB_REPEAT_NO_ARGS, 2704 }, 2705 { .name = "go", 2706 .func = kdb_go, 2707 .usage = "[<vaddr>]", 2708 .help = "Continue Execution", 2709 .minlen = 1, 2710 .flags = KDB_ENABLE_REG_WRITE | 2711 KDB_ENABLE_ALWAYS_SAFE_NO_ARGS, 2712 }, 2713 { .name = "rd", 2714 .func = kdb_rd, 2715 .usage = "", 2716 .help = "Display Registers", 2717 .flags = KDB_ENABLE_REG_READ, 2718 }, 2719 { .name = "rm", 2720 .func = kdb_rm, 2721 .usage = "<reg> <contents>", 2722 .help = "Modify Registers", 2723 .flags = KDB_ENABLE_REG_WRITE, 2724 }, 2725 { .name = "ef", 2726 .func = kdb_ef, 2727 .usage = "<vaddr>", 2728 .help = "Display exception frame", 2729 .flags = KDB_ENABLE_MEM_READ, 2730 }, 2731 { .name = "bt", 2732 .func = kdb_bt, 2733 .usage = "[<vaddr>]", 2734 .help = "Stack traceback", 2735 .minlen = 1, 2736 .flags = KDB_ENABLE_MEM_READ | KDB_ENABLE_INSPECT_NO_ARGS, 2737 }, 2738 { .name = "btp", 2739 .func = kdb_bt, 2740 .usage = "<pid>", 2741 .help = "Display stack for process <pid>", 2742 .flags = KDB_ENABLE_INSPECT, 2743 }, 2744 { .name = "bta", 2745 .func = kdb_bt, 2746 .usage = "[<state_chars>|A]", 2747 .help = "Backtrace all processes whose state matches", 2748 .flags = KDB_ENABLE_INSPECT, 2749 }, 2750 { .name = "btc", 2751 .func = kdb_bt, 2752 .usage = "", 2753 .help = "Backtrace current process on each cpu", 2754 .flags = KDB_ENABLE_INSPECT, 2755 }, 2756 { .name = "btt", 2757 .func = kdb_bt, 2758 .usage = "<vaddr>", 2759 .help = "Backtrace process given its struct task address", 2760 .flags = KDB_ENABLE_MEM_READ | KDB_ENABLE_INSPECT_NO_ARGS, 2761 }, 2762 { .name = "env", 2763 .func = kdb_env, 2764 .usage = "", 2765 .help = "Show environment variables", 2766 .flags = KDB_ENABLE_ALWAYS_SAFE, 2767 }, 2768 { .name = "set", 2769 .func = kdb_set, 2770 .usage = "", 2771 .help = "Set environment variables", 2772 .flags = KDB_ENABLE_ALWAYS_SAFE, 2773 }, 2774 { .name = "help", 2775 .func = kdb_help, 2776 .usage = "", 2777 .help = "Display Help Message", 2778 .minlen = 1, 2779 .flags = KDB_ENABLE_ALWAYS_SAFE, 2780 }, 2781 { .name = "?", 2782 .func = kdb_help, 2783 .usage = "", 2784 .help = "Display Help Message", 2785 .flags = KDB_ENABLE_ALWAYS_SAFE, 2786 }, 2787 { .name = "cpu", 2788 .func = kdb_cpu, 2789 .usage = "<cpunum>", 2790 .help = "Switch to new cpu", 2791 .flags = KDB_ENABLE_ALWAYS_SAFE_NO_ARGS, 2792 }, 2793 { .name = "kgdb", 2794 .func = kdb_kgdb, 2795 .usage = "", 2796 .help = "Enter kgdb mode", 2797 .flags = 0, 2798 }, 2799 { .name = "ps", 2800 .func = kdb_ps, 2801 .usage = "[<state_chars>|A]", 2802 .help = "Display active task list", 2803 .flags = KDB_ENABLE_INSPECT, 2804 }, 2805 { .name = "pid", 2806 .func = kdb_pid, 2807 .usage = "<pidnum>", 2808 .help = "Switch to another task", 2809 .flags = KDB_ENABLE_INSPECT, 2810 }, 2811 { .name = "reboot", 2812 .func = kdb_reboot, 2813 .usage = "", 2814 .help = "Reboot the machine immediately", 2815 .flags = KDB_ENABLE_REBOOT, 2816 }, 2817 #if defined(CONFIG_MODULES) 2818 { .name = "lsmod", 2819 .func = kdb_lsmod, 2820 .usage = "", 2821 .help = "List loaded kernel modules", 2822 .flags = KDB_ENABLE_INSPECT, 2823 }, 2824 #endif 2825 #if defined(CONFIG_MAGIC_SYSRQ) 2826 { .name = "sr", 2827 .func = kdb_sr, 2828 .usage = "<key>", 2829 .help = "Magic SysRq key", 2830 .flags = KDB_ENABLE_ALWAYS_SAFE, 2831 }, 2832 #endif 2833 #if defined(CONFIG_PRINTK) 2834 { .name = "dmesg", 2835 .func = kdb_dmesg, 2836 .usage = "[lines]", 2837 .help = "Display syslog buffer", 2838 .flags = KDB_ENABLE_ALWAYS_SAFE, 2839 }, 2840 #endif 2841 { .name = "defcmd", 2842 .func = kdb_defcmd, 2843 .usage = "name \"usage\" \"help\"", 2844 .help = "Define a set of commands, down to endefcmd", 2845 /* 2846 * Macros are always safe because when executed each 2847 * internal command re-enters kdb_parse() and is safety 2848 * checked individually. 2849 */ 2850 .flags = KDB_ENABLE_ALWAYS_SAFE, 2851 }, 2852 { .name = "kill", 2853 .func = kdb_kill, 2854 .usage = "<-signal> <pid>", 2855 .help = "Send a signal to a process", 2856 .flags = KDB_ENABLE_SIGNAL, 2857 }, 2858 { .name = "summary", 2859 .func = kdb_summary, 2860 .usage = "", 2861 .help = "Summarize the system", 2862 .minlen = 4, 2863 .flags = KDB_ENABLE_ALWAYS_SAFE, 2864 }, 2865 { .name = "per_cpu", 2866 .func = kdb_per_cpu, 2867 .usage = "<sym> [<bytes>] [<cpu>]", 2868 .help = "Display per_cpu variables", 2869 .minlen = 3, 2870 .flags = KDB_ENABLE_MEM_READ, 2871 }, 2872 { .name = "grephelp", 2873 .func = kdb_grep_help, 2874 .usage = "", 2875 .help = "Display help on | grep", 2876 .flags = KDB_ENABLE_ALWAYS_SAFE, 2877 }, 2878 }; 2879 2880 static kdbtab_t nmicmd = { 2881 .name = "disable_nmi", 2882 .func = kdb_disable_nmi, 2883 .usage = "", 2884 .help = "Disable NMI entry to KDB", 2885 .flags = KDB_ENABLE_ALWAYS_SAFE, 2886 }; 2887 2888 /* Initialize the kdb command table. */ 2889 static void __init kdb_inittab(void) 2890 { 2891 kdb_register_table(maintab, ARRAY_SIZE(maintab)); 2892 if (arch_kgdb_ops.enable_nmi) 2893 kdb_register_table(&nmicmd, 1); 2894 } 2895 2896 /* Execute any commands defined in kdb_cmds. */ 2897 static void __init kdb_cmd_init(void) 2898 { 2899 int i, diag; 2900 for (i = 0; kdb_cmds[i]; ++i) { 2901 diag = kdb_parse(kdb_cmds[i]); 2902 if (diag) 2903 kdb_printf("kdb command %s failed, kdb diag %d\n", 2904 kdb_cmds[i], diag); 2905 } 2906 if (defcmd_in_progress) { 2907 kdb_printf("Incomplete 'defcmd' set, forcing endefcmd\n"); 2908 kdb_parse("endefcmd"); 2909 } 2910 } 2911 2912 /* Initialize kdb_printf, breakpoint tables and kdb state */ 2913 void __init kdb_init(int lvl) 2914 { 2915 static int kdb_init_lvl = KDB_NOT_INITIALIZED; 2916 int i; 2917 2918 if (kdb_init_lvl == KDB_INIT_FULL || lvl <= kdb_init_lvl) 2919 return; 2920 for (i = kdb_init_lvl; i < lvl; i++) { 2921 switch (i) { 2922 case KDB_NOT_INITIALIZED: 2923 kdb_inittab(); /* Initialize Command Table */ 2924 kdb_initbptab(); /* Initialize Breakpoints */ 2925 break; 2926 case KDB_INIT_EARLY: 2927 kdb_cmd_init(); /* Build kdb_cmds tables */ 2928 break; 2929 } 2930 } 2931 kdb_init_lvl = lvl; 2932 } 2933