xref: /OK3568_Linux_fs/kernel/kernel/debug/kdb/kdb_main.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun  * Kernel Debugger Architecture Independent Main Code
3*4882a593Smuzhiyun  *
4*4882a593Smuzhiyun  * This file is subject to the terms and conditions of the GNU General Public
5*4882a593Smuzhiyun  * License.  See the file "COPYING" in the main directory of this archive
6*4882a593Smuzhiyun  * for more details.
7*4882a593Smuzhiyun  *
8*4882a593Smuzhiyun  * Copyright (C) 1999-2004 Silicon Graphics, Inc.  All Rights Reserved.
9*4882a593Smuzhiyun  * Copyright (C) 2000 Stephane Eranian <eranian@hpl.hp.com>
10*4882a593Smuzhiyun  * Xscale (R) modifications copyright (C) 2003 Intel Corporation.
11*4882a593Smuzhiyun  * Copyright (c) 2009 Wind River Systems, Inc.  All Rights Reserved.
12*4882a593Smuzhiyun  */
13*4882a593Smuzhiyun 
14*4882a593Smuzhiyun #include <linux/ctype.h>
15*4882a593Smuzhiyun #include <linux/types.h>
16*4882a593Smuzhiyun #include <linux/string.h>
17*4882a593Smuzhiyun #include <linux/kernel.h>
18*4882a593Smuzhiyun #include <linux/kmsg_dump.h>
19*4882a593Smuzhiyun #include <linux/reboot.h>
20*4882a593Smuzhiyun #include <linux/sched.h>
21*4882a593Smuzhiyun #include <linux/sched/loadavg.h>
22*4882a593Smuzhiyun #include <linux/sched/stat.h>
23*4882a593Smuzhiyun #include <linux/sched/debug.h>
24*4882a593Smuzhiyun #include <linux/sysrq.h>
25*4882a593Smuzhiyun #include <linux/smp.h>
26*4882a593Smuzhiyun #include <linux/utsname.h>
27*4882a593Smuzhiyun #include <linux/vmalloc.h>
28*4882a593Smuzhiyun #include <linux/atomic.h>
29*4882a593Smuzhiyun #include <linux/module.h>
30*4882a593Smuzhiyun #include <linux/moduleparam.h>
31*4882a593Smuzhiyun #include <linux/mm.h>
32*4882a593Smuzhiyun #include <linux/init.h>
33*4882a593Smuzhiyun #include <linux/kallsyms.h>
34*4882a593Smuzhiyun #include <linux/kgdb.h>
35*4882a593Smuzhiyun #include <linux/kdb.h>
36*4882a593Smuzhiyun #include <linux/notifier.h>
37*4882a593Smuzhiyun #include <linux/interrupt.h>
38*4882a593Smuzhiyun #include <linux/delay.h>
39*4882a593Smuzhiyun #include <linux/nmi.h>
40*4882a593Smuzhiyun #include <linux/time.h>
41*4882a593Smuzhiyun #include <linux/ptrace.h>
42*4882a593Smuzhiyun #include <linux/sysctl.h>
43*4882a593Smuzhiyun #include <linux/cpu.h>
44*4882a593Smuzhiyun #include <linux/kdebug.h>
45*4882a593Smuzhiyun #include <linux/proc_fs.h>
46*4882a593Smuzhiyun #include <linux/uaccess.h>
47*4882a593Smuzhiyun #include <linux/slab.h>
48*4882a593Smuzhiyun #include <linux/security.h>
49*4882a593Smuzhiyun #include "kdb_private.h"
50*4882a593Smuzhiyun 
51*4882a593Smuzhiyun #undef	MODULE_PARAM_PREFIX
52*4882a593Smuzhiyun #define	MODULE_PARAM_PREFIX "kdb."
53*4882a593Smuzhiyun 
54*4882a593Smuzhiyun static int kdb_cmd_enabled = CONFIG_KDB_DEFAULT_ENABLE;
55*4882a593Smuzhiyun module_param_named(cmd_enable, kdb_cmd_enabled, int, 0600);
56*4882a593Smuzhiyun 
57*4882a593Smuzhiyun char kdb_grep_string[KDB_GREP_STRLEN];
58*4882a593Smuzhiyun int kdb_grepping_flag;
59*4882a593Smuzhiyun EXPORT_SYMBOL(kdb_grepping_flag);
60*4882a593Smuzhiyun int kdb_grep_leading;
61*4882a593Smuzhiyun int kdb_grep_trailing;
62*4882a593Smuzhiyun 
63*4882a593Smuzhiyun /*
64*4882a593Smuzhiyun  * Kernel debugger state flags
65*4882a593Smuzhiyun  */
66*4882a593Smuzhiyun unsigned int kdb_flags;
67*4882a593Smuzhiyun 
68*4882a593Smuzhiyun /*
69*4882a593Smuzhiyun  * kdb_lock protects updates to kdb_initial_cpu.  Used to
70*4882a593Smuzhiyun  * single thread processors through the kernel debugger.
71*4882a593Smuzhiyun  */
72*4882a593Smuzhiyun int kdb_initial_cpu = -1;	/* cpu number that owns kdb */
73*4882a593Smuzhiyun int kdb_nextline = 1;
74*4882a593Smuzhiyun int kdb_state;			/* General KDB state */
75*4882a593Smuzhiyun 
76*4882a593Smuzhiyun struct task_struct *kdb_current_task;
77*4882a593Smuzhiyun struct pt_regs *kdb_current_regs;
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun const char *kdb_diemsg;
80*4882a593Smuzhiyun static int kdb_go_count;
81*4882a593Smuzhiyun #ifdef CONFIG_KDB_CONTINUE_CATASTROPHIC
82*4882a593Smuzhiyun static unsigned int kdb_continue_catastrophic =
83*4882a593Smuzhiyun 	CONFIG_KDB_CONTINUE_CATASTROPHIC;
84*4882a593Smuzhiyun #else
85*4882a593Smuzhiyun static unsigned int kdb_continue_catastrophic;
86*4882a593Smuzhiyun #endif
87*4882a593Smuzhiyun 
88*4882a593Smuzhiyun /* kdb_commands describes the available commands. */
89*4882a593Smuzhiyun static kdbtab_t *kdb_commands;
90*4882a593Smuzhiyun #define KDB_BASE_CMD_MAX 50
91*4882a593Smuzhiyun static int kdb_max_commands = KDB_BASE_CMD_MAX;
92*4882a593Smuzhiyun static kdbtab_t kdb_base_commands[KDB_BASE_CMD_MAX];
93*4882a593Smuzhiyun #define for_each_kdbcmd(cmd, num)					\
94*4882a593Smuzhiyun 	for ((cmd) = kdb_base_commands, (num) = 0;			\
95*4882a593Smuzhiyun 	     num < kdb_max_commands;					\
96*4882a593Smuzhiyun 	     num++, num == KDB_BASE_CMD_MAX ? cmd = kdb_commands : cmd++)
97*4882a593Smuzhiyun 
98*4882a593Smuzhiyun typedef struct _kdbmsg {
99*4882a593Smuzhiyun 	int	km_diag;	/* kdb diagnostic */
100*4882a593Smuzhiyun 	char	*km_msg;	/* Corresponding message text */
101*4882a593Smuzhiyun } kdbmsg_t;
102*4882a593Smuzhiyun 
103*4882a593Smuzhiyun #define KDBMSG(msgnum, text) \
104*4882a593Smuzhiyun 	{ KDB_##msgnum, text }
105*4882a593Smuzhiyun 
106*4882a593Smuzhiyun static kdbmsg_t kdbmsgs[] = {
107*4882a593Smuzhiyun 	KDBMSG(NOTFOUND, "Command Not Found"),
108*4882a593Smuzhiyun 	KDBMSG(ARGCOUNT, "Improper argument count, see usage."),
109*4882a593Smuzhiyun 	KDBMSG(BADWIDTH, "Illegal value for BYTESPERWORD use 1, 2, 4 or 8, "
110*4882a593Smuzhiyun 	       "8 is only allowed on 64 bit systems"),
111*4882a593Smuzhiyun 	KDBMSG(BADRADIX, "Illegal value for RADIX use 8, 10 or 16"),
112*4882a593Smuzhiyun 	KDBMSG(NOTENV, "Cannot find environment variable"),
113*4882a593Smuzhiyun 	KDBMSG(NOENVVALUE, "Environment variable should have value"),
114*4882a593Smuzhiyun 	KDBMSG(NOTIMP, "Command not implemented"),
115*4882a593Smuzhiyun 	KDBMSG(ENVFULL, "Environment full"),
116*4882a593Smuzhiyun 	KDBMSG(ENVBUFFULL, "Environment buffer full"),
117*4882a593Smuzhiyun 	KDBMSG(TOOMANYBPT, "Too many breakpoints defined"),
118*4882a593Smuzhiyun #ifdef CONFIG_CPU_XSCALE
119*4882a593Smuzhiyun 	KDBMSG(TOOMANYDBREGS, "More breakpoints than ibcr registers defined"),
120*4882a593Smuzhiyun #else
121*4882a593Smuzhiyun 	KDBMSG(TOOMANYDBREGS, "More breakpoints than db registers defined"),
122*4882a593Smuzhiyun #endif
123*4882a593Smuzhiyun 	KDBMSG(DUPBPT, "Duplicate breakpoint address"),
124*4882a593Smuzhiyun 	KDBMSG(BPTNOTFOUND, "Breakpoint not found"),
125*4882a593Smuzhiyun 	KDBMSG(BADMODE, "Invalid IDMODE"),
126*4882a593Smuzhiyun 	KDBMSG(BADINT, "Illegal numeric value"),
127*4882a593Smuzhiyun 	KDBMSG(INVADDRFMT, "Invalid symbolic address format"),
128*4882a593Smuzhiyun 	KDBMSG(BADREG, "Invalid register name"),
129*4882a593Smuzhiyun 	KDBMSG(BADCPUNUM, "Invalid cpu number"),
130*4882a593Smuzhiyun 	KDBMSG(BADLENGTH, "Invalid length field"),
131*4882a593Smuzhiyun 	KDBMSG(NOBP, "No Breakpoint exists"),
132*4882a593Smuzhiyun 	KDBMSG(BADADDR, "Invalid address"),
133*4882a593Smuzhiyun 	KDBMSG(NOPERM, "Permission denied"),
134*4882a593Smuzhiyun };
135*4882a593Smuzhiyun #undef KDBMSG
136*4882a593Smuzhiyun 
137*4882a593Smuzhiyun static const int __nkdb_err = ARRAY_SIZE(kdbmsgs);
138*4882a593Smuzhiyun 
139*4882a593Smuzhiyun 
140*4882a593Smuzhiyun /*
141*4882a593Smuzhiyun  * Initial environment.   This is all kept static and local to
142*4882a593Smuzhiyun  * this file.   We don't want to rely on the memory allocation
143*4882a593Smuzhiyun  * mechanisms in the kernel, so we use a very limited allocate-only
144*4882a593Smuzhiyun  * heap for new and altered environment variables.  The entire
145*4882a593Smuzhiyun  * environment is limited to a fixed number of entries (add more
146*4882a593Smuzhiyun  * to __env[] if required) and a fixed amount of heap (add more to
147*4882a593Smuzhiyun  * KDB_ENVBUFSIZE if required).
148*4882a593Smuzhiyun  */
149*4882a593Smuzhiyun 
150*4882a593Smuzhiyun static char *__env[] = {
151*4882a593Smuzhiyun #if defined(CONFIG_SMP)
152*4882a593Smuzhiyun  "PROMPT=[%d]kdb> ",
153*4882a593Smuzhiyun #else
154*4882a593Smuzhiyun  "PROMPT=kdb> ",
155*4882a593Smuzhiyun #endif
156*4882a593Smuzhiyun  "MOREPROMPT=more> ",
157*4882a593Smuzhiyun  "RADIX=16",
158*4882a593Smuzhiyun  "MDCOUNT=8",			/* lines of md output */
159*4882a593Smuzhiyun  KDB_PLATFORM_ENV,
160*4882a593Smuzhiyun  "DTABCOUNT=30",
161*4882a593Smuzhiyun  "NOSECT=1",
162*4882a593Smuzhiyun  (char *)0,
163*4882a593Smuzhiyun  (char *)0,
164*4882a593Smuzhiyun  (char *)0,
165*4882a593Smuzhiyun  (char *)0,
166*4882a593Smuzhiyun  (char *)0,
167*4882a593Smuzhiyun  (char *)0,
168*4882a593Smuzhiyun  (char *)0,
169*4882a593Smuzhiyun  (char *)0,
170*4882a593Smuzhiyun  (char *)0,
171*4882a593Smuzhiyun  (char *)0,
172*4882a593Smuzhiyun  (char *)0,
173*4882a593Smuzhiyun  (char *)0,
174*4882a593Smuzhiyun  (char *)0,
175*4882a593Smuzhiyun  (char *)0,
176*4882a593Smuzhiyun  (char *)0,
177*4882a593Smuzhiyun  (char *)0,
178*4882a593Smuzhiyun  (char *)0,
179*4882a593Smuzhiyun  (char *)0,
180*4882a593Smuzhiyun  (char *)0,
181*4882a593Smuzhiyun  (char *)0,
182*4882a593Smuzhiyun  (char *)0,
183*4882a593Smuzhiyun  (char *)0,
184*4882a593Smuzhiyun  (char *)0,
185*4882a593Smuzhiyun  (char *)0,
186*4882a593Smuzhiyun };
187*4882a593Smuzhiyun 
188*4882a593Smuzhiyun static const int __nenv = ARRAY_SIZE(__env);
189*4882a593Smuzhiyun 
kdb_curr_task(int cpu)190*4882a593Smuzhiyun struct task_struct *kdb_curr_task(int cpu)
191*4882a593Smuzhiyun {
192*4882a593Smuzhiyun 	struct task_struct *p = curr_task(cpu);
193*4882a593Smuzhiyun #ifdef	_TIF_MCA_INIT
194*4882a593Smuzhiyun 	if ((task_thread_info(p)->flags & _TIF_MCA_INIT) && KDB_TSK(cpu))
195*4882a593Smuzhiyun 		p = krp->p;
196*4882a593Smuzhiyun #endif
197*4882a593Smuzhiyun 	return p;
198*4882a593Smuzhiyun }
199*4882a593Smuzhiyun 
200*4882a593Smuzhiyun /*
201*4882a593Smuzhiyun  * Update the permissions flags (kdb_cmd_enabled) to match the
202*4882a593Smuzhiyun  * current lockdown state.
203*4882a593Smuzhiyun  *
204*4882a593Smuzhiyun  * Within this function the calls to security_locked_down() are "lazy". We
205*4882a593Smuzhiyun  * avoid calling them if the current value of kdb_cmd_enabled already excludes
206*4882a593Smuzhiyun  * flags that might be subject to lockdown. Additionally we deliberately check
207*4882a593Smuzhiyun  * the lockdown flags independently (even though read lockdown implies write
208*4882a593Smuzhiyun  * lockdown) since that results in both simpler code and clearer messages to
209*4882a593Smuzhiyun  * the user on first-time debugger entry.
210*4882a593Smuzhiyun  *
211*4882a593Smuzhiyun  * The permission masks during a read+write lockdown permits the following
212*4882a593Smuzhiyun  * flags: INSPECT, SIGNAL, REBOOT (and ALWAYS_SAFE).
213*4882a593Smuzhiyun  *
214*4882a593Smuzhiyun  * The INSPECT commands are not blocked during lockdown because they are
215*4882a593Smuzhiyun  * not arbitrary memory reads. INSPECT covers the backtrace family (sometimes
216*4882a593Smuzhiyun  * forcing them to have no arguments) and lsmod. These commands do expose
217*4882a593Smuzhiyun  * some kernel state but do not allow the developer seated at the console to
218*4882a593Smuzhiyun  * choose what state is reported. SIGNAL and REBOOT should not be controversial,
219*4882a593Smuzhiyun  * given these are allowed for root during lockdown already.
220*4882a593Smuzhiyun  */
kdb_check_for_lockdown(void)221*4882a593Smuzhiyun static void kdb_check_for_lockdown(void)
222*4882a593Smuzhiyun {
223*4882a593Smuzhiyun 	const int write_flags = KDB_ENABLE_MEM_WRITE |
224*4882a593Smuzhiyun 				KDB_ENABLE_REG_WRITE |
225*4882a593Smuzhiyun 				KDB_ENABLE_FLOW_CTRL;
226*4882a593Smuzhiyun 	const int read_flags = KDB_ENABLE_MEM_READ |
227*4882a593Smuzhiyun 			       KDB_ENABLE_REG_READ;
228*4882a593Smuzhiyun 
229*4882a593Smuzhiyun 	bool need_to_lockdown_write = false;
230*4882a593Smuzhiyun 	bool need_to_lockdown_read = false;
231*4882a593Smuzhiyun 
232*4882a593Smuzhiyun 	if (kdb_cmd_enabled & (KDB_ENABLE_ALL | write_flags))
233*4882a593Smuzhiyun 		need_to_lockdown_write =
234*4882a593Smuzhiyun 			security_locked_down(LOCKDOWN_DBG_WRITE_KERNEL);
235*4882a593Smuzhiyun 
236*4882a593Smuzhiyun 	if (kdb_cmd_enabled & (KDB_ENABLE_ALL | read_flags))
237*4882a593Smuzhiyun 		need_to_lockdown_read =
238*4882a593Smuzhiyun 			security_locked_down(LOCKDOWN_DBG_READ_KERNEL);
239*4882a593Smuzhiyun 
240*4882a593Smuzhiyun 	/* De-compose KDB_ENABLE_ALL if required */
241*4882a593Smuzhiyun 	if (need_to_lockdown_write || need_to_lockdown_read)
242*4882a593Smuzhiyun 		if (kdb_cmd_enabled & KDB_ENABLE_ALL)
243*4882a593Smuzhiyun 			kdb_cmd_enabled = KDB_ENABLE_MASK & ~KDB_ENABLE_ALL;
244*4882a593Smuzhiyun 
245*4882a593Smuzhiyun 	if (need_to_lockdown_write)
246*4882a593Smuzhiyun 		kdb_cmd_enabled &= ~write_flags;
247*4882a593Smuzhiyun 
248*4882a593Smuzhiyun 	if (need_to_lockdown_read)
249*4882a593Smuzhiyun 		kdb_cmd_enabled &= ~read_flags;
250*4882a593Smuzhiyun }
251*4882a593Smuzhiyun 
252*4882a593Smuzhiyun /*
253*4882a593Smuzhiyun  * Check whether the flags of the current command, the permissions of the kdb
254*4882a593Smuzhiyun  * console and the lockdown state allow a command to be run.
255*4882a593Smuzhiyun  */
kdb_check_flags(kdb_cmdflags_t flags,int permissions,bool no_args)256*4882a593Smuzhiyun static bool kdb_check_flags(kdb_cmdflags_t flags, int permissions,
257*4882a593Smuzhiyun 				   bool no_args)
258*4882a593Smuzhiyun {
259*4882a593Smuzhiyun 	/* permissions comes from userspace so needs massaging slightly */
260*4882a593Smuzhiyun 	permissions &= KDB_ENABLE_MASK;
261*4882a593Smuzhiyun 	permissions |= KDB_ENABLE_ALWAYS_SAFE;
262*4882a593Smuzhiyun 
263*4882a593Smuzhiyun 	/* some commands change group when launched with no arguments */
264*4882a593Smuzhiyun 	if (no_args)
265*4882a593Smuzhiyun 		permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT;
266*4882a593Smuzhiyun 
267*4882a593Smuzhiyun 	flags |= KDB_ENABLE_ALL;
268*4882a593Smuzhiyun 
269*4882a593Smuzhiyun 	return permissions & flags;
270*4882a593Smuzhiyun }
271*4882a593Smuzhiyun 
272*4882a593Smuzhiyun /*
273*4882a593Smuzhiyun  * kdbgetenv - This function will return the character string value of
274*4882a593Smuzhiyun  *	an environment variable.
275*4882a593Smuzhiyun  * Parameters:
276*4882a593Smuzhiyun  *	match	A character string representing an environment variable.
277*4882a593Smuzhiyun  * Returns:
278*4882a593Smuzhiyun  *	NULL	No environment variable matches 'match'
279*4882a593Smuzhiyun  *	char*	Pointer to string value of environment variable.
280*4882a593Smuzhiyun  */
kdbgetenv(const char * match)281*4882a593Smuzhiyun char *kdbgetenv(const char *match)
282*4882a593Smuzhiyun {
283*4882a593Smuzhiyun 	char **ep = __env;
284*4882a593Smuzhiyun 	int matchlen = strlen(match);
285*4882a593Smuzhiyun 	int i;
286*4882a593Smuzhiyun 
287*4882a593Smuzhiyun 	for (i = 0; i < __nenv; i++) {
288*4882a593Smuzhiyun 		char *e = *ep++;
289*4882a593Smuzhiyun 
290*4882a593Smuzhiyun 		if (!e)
291*4882a593Smuzhiyun 			continue;
292*4882a593Smuzhiyun 
293*4882a593Smuzhiyun 		if ((strncmp(match, e, matchlen) == 0)
294*4882a593Smuzhiyun 		 && ((e[matchlen] == '\0')
295*4882a593Smuzhiyun 		   || (e[matchlen] == '='))) {
296*4882a593Smuzhiyun 			char *cp = strchr(e, '=');
297*4882a593Smuzhiyun 			return cp ? ++cp : "";
298*4882a593Smuzhiyun 		}
299*4882a593Smuzhiyun 	}
300*4882a593Smuzhiyun 	return NULL;
301*4882a593Smuzhiyun }
302*4882a593Smuzhiyun 
303*4882a593Smuzhiyun /*
304*4882a593Smuzhiyun  * kdballocenv - This function is used to allocate bytes for
305*4882a593Smuzhiyun  *	environment entries.
306*4882a593Smuzhiyun  * Parameters:
307*4882a593Smuzhiyun  *	match	A character string representing a numeric value
308*4882a593Smuzhiyun  * Outputs:
309*4882a593Smuzhiyun  *	*value  the unsigned long representation of the env variable 'match'
310*4882a593Smuzhiyun  * Returns:
311*4882a593Smuzhiyun  *	Zero on success, a kdb diagnostic on failure.
312*4882a593Smuzhiyun  * Remarks:
313*4882a593Smuzhiyun  *	We use a static environment buffer (envbuffer) to hold the values
314*4882a593Smuzhiyun  *	of dynamically generated environment variables (see kdb_set).  Buffer
315*4882a593Smuzhiyun  *	space once allocated is never free'd, so over time, the amount of space
316*4882a593Smuzhiyun  *	(currently 512 bytes) will be exhausted if env variables are changed
317*4882a593Smuzhiyun  *	frequently.
318*4882a593Smuzhiyun  */
kdballocenv(size_t bytes)319*4882a593Smuzhiyun static char *kdballocenv(size_t bytes)
320*4882a593Smuzhiyun {
321*4882a593Smuzhiyun #define	KDB_ENVBUFSIZE	512
322*4882a593Smuzhiyun 	static char envbuffer[KDB_ENVBUFSIZE];
323*4882a593Smuzhiyun 	static int envbufsize;
324*4882a593Smuzhiyun 	char *ep = NULL;
325*4882a593Smuzhiyun 
326*4882a593Smuzhiyun 	if ((KDB_ENVBUFSIZE - envbufsize) >= bytes) {
327*4882a593Smuzhiyun 		ep = &envbuffer[envbufsize];
328*4882a593Smuzhiyun 		envbufsize += bytes;
329*4882a593Smuzhiyun 	}
330*4882a593Smuzhiyun 	return ep;
331*4882a593Smuzhiyun }
332*4882a593Smuzhiyun 
333*4882a593Smuzhiyun /*
334*4882a593Smuzhiyun  * kdbgetulenv - This function will return the value of an unsigned
335*4882a593Smuzhiyun  *	long-valued environment variable.
336*4882a593Smuzhiyun  * Parameters:
337*4882a593Smuzhiyun  *	match	A character string representing a numeric value
338*4882a593Smuzhiyun  * Outputs:
339*4882a593Smuzhiyun  *	*value  the unsigned long represntation of the env variable 'match'
340*4882a593Smuzhiyun  * Returns:
341*4882a593Smuzhiyun  *	Zero on success, a kdb diagnostic on failure.
342*4882a593Smuzhiyun  */
kdbgetulenv(const char * match,unsigned long * value)343*4882a593Smuzhiyun static int kdbgetulenv(const char *match, unsigned long *value)
344*4882a593Smuzhiyun {
345*4882a593Smuzhiyun 	char *ep;
346*4882a593Smuzhiyun 
347*4882a593Smuzhiyun 	ep = kdbgetenv(match);
348*4882a593Smuzhiyun 	if (!ep)
349*4882a593Smuzhiyun 		return KDB_NOTENV;
350*4882a593Smuzhiyun 	if (strlen(ep) == 0)
351*4882a593Smuzhiyun 		return KDB_NOENVVALUE;
352*4882a593Smuzhiyun 
353*4882a593Smuzhiyun 	*value = simple_strtoul(ep, NULL, 0);
354*4882a593Smuzhiyun 
355*4882a593Smuzhiyun 	return 0;
356*4882a593Smuzhiyun }
357*4882a593Smuzhiyun 
358*4882a593Smuzhiyun /*
359*4882a593Smuzhiyun  * kdbgetintenv - This function will return the value of an
360*4882a593Smuzhiyun  *	integer-valued environment variable.
361*4882a593Smuzhiyun  * Parameters:
362*4882a593Smuzhiyun  *	match	A character string representing an integer-valued env variable
363*4882a593Smuzhiyun  * Outputs:
364*4882a593Smuzhiyun  *	*value  the integer representation of the environment variable 'match'
365*4882a593Smuzhiyun  * Returns:
366*4882a593Smuzhiyun  *	Zero on success, a kdb diagnostic on failure.
367*4882a593Smuzhiyun  */
kdbgetintenv(const char * match,int * value)368*4882a593Smuzhiyun int kdbgetintenv(const char *match, int *value)
369*4882a593Smuzhiyun {
370*4882a593Smuzhiyun 	unsigned long val;
371*4882a593Smuzhiyun 	int diag;
372*4882a593Smuzhiyun 
373*4882a593Smuzhiyun 	diag = kdbgetulenv(match, &val);
374*4882a593Smuzhiyun 	if (!diag)
375*4882a593Smuzhiyun 		*value = (int) val;
376*4882a593Smuzhiyun 	return diag;
377*4882a593Smuzhiyun }
378*4882a593Smuzhiyun 
379*4882a593Smuzhiyun /*
380*4882a593Smuzhiyun  * kdbgetularg - This function will convert a numeric string into an
381*4882a593Smuzhiyun  *	unsigned long value.
382*4882a593Smuzhiyun  * Parameters:
383*4882a593Smuzhiyun  *	arg	A character string representing a numeric value
384*4882a593Smuzhiyun  * Outputs:
385*4882a593Smuzhiyun  *	*value  the unsigned long represntation of arg.
386*4882a593Smuzhiyun  * Returns:
387*4882a593Smuzhiyun  *	Zero on success, a kdb diagnostic on failure.
388*4882a593Smuzhiyun  */
kdbgetularg(const char * arg,unsigned long * value)389*4882a593Smuzhiyun int kdbgetularg(const char *arg, unsigned long *value)
390*4882a593Smuzhiyun {
391*4882a593Smuzhiyun 	char *endp;
392*4882a593Smuzhiyun 	unsigned long val;
393*4882a593Smuzhiyun 
394*4882a593Smuzhiyun 	val = simple_strtoul(arg, &endp, 0);
395*4882a593Smuzhiyun 
396*4882a593Smuzhiyun 	if (endp == arg) {
397*4882a593Smuzhiyun 		/*
398*4882a593Smuzhiyun 		 * Also try base 16, for us folks too lazy to type the
399*4882a593Smuzhiyun 		 * leading 0x...
400*4882a593Smuzhiyun 		 */
401*4882a593Smuzhiyun 		val = simple_strtoul(arg, &endp, 16);
402*4882a593Smuzhiyun 		if (endp == arg)
403*4882a593Smuzhiyun 			return KDB_BADINT;
404*4882a593Smuzhiyun 	}
405*4882a593Smuzhiyun 
406*4882a593Smuzhiyun 	*value = val;
407*4882a593Smuzhiyun 
408*4882a593Smuzhiyun 	return 0;
409*4882a593Smuzhiyun }
410*4882a593Smuzhiyun 
kdbgetu64arg(const char * arg,u64 * value)411*4882a593Smuzhiyun int kdbgetu64arg(const char *arg, u64 *value)
412*4882a593Smuzhiyun {
413*4882a593Smuzhiyun 	char *endp;
414*4882a593Smuzhiyun 	u64 val;
415*4882a593Smuzhiyun 
416*4882a593Smuzhiyun 	val = simple_strtoull(arg, &endp, 0);
417*4882a593Smuzhiyun 
418*4882a593Smuzhiyun 	if (endp == arg) {
419*4882a593Smuzhiyun 
420*4882a593Smuzhiyun 		val = simple_strtoull(arg, &endp, 16);
421*4882a593Smuzhiyun 		if (endp == arg)
422*4882a593Smuzhiyun 			return KDB_BADINT;
423*4882a593Smuzhiyun 	}
424*4882a593Smuzhiyun 
425*4882a593Smuzhiyun 	*value = val;
426*4882a593Smuzhiyun 
427*4882a593Smuzhiyun 	return 0;
428*4882a593Smuzhiyun }
429*4882a593Smuzhiyun 
430*4882a593Smuzhiyun /*
431*4882a593Smuzhiyun  * kdb_set - This function implements the 'set' command.  Alter an
432*4882a593Smuzhiyun  *	existing environment variable or create a new one.
433*4882a593Smuzhiyun  */
kdb_set(int argc,const char ** argv)434*4882a593Smuzhiyun int kdb_set(int argc, const char **argv)
435*4882a593Smuzhiyun {
436*4882a593Smuzhiyun 	int i;
437*4882a593Smuzhiyun 	char *ep;
438*4882a593Smuzhiyun 	size_t varlen, vallen;
439*4882a593Smuzhiyun 
440*4882a593Smuzhiyun 	/*
441*4882a593Smuzhiyun 	 * we can be invoked two ways:
442*4882a593Smuzhiyun 	 *   set var=value    argv[1]="var", argv[2]="value"
443*4882a593Smuzhiyun 	 *   set var = value  argv[1]="var", argv[2]="=", argv[3]="value"
444*4882a593Smuzhiyun 	 * - if the latter, shift 'em down.
445*4882a593Smuzhiyun 	 */
446*4882a593Smuzhiyun 	if (argc == 3) {
447*4882a593Smuzhiyun 		argv[2] = argv[3];
448*4882a593Smuzhiyun 		argc--;
449*4882a593Smuzhiyun 	}
450*4882a593Smuzhiyun 
451*4882a593Smuzhiyun 	if (argc != 2)
452*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
453*4882a593Smuzhiyun 
454*4882a593Smuzhiyun 	/*
455*4882a593Smuzhiyun 	 * Censor sensitive variables
456*4882a593Smuzhiyun 	 */
457*4882a593Smuzhiyun 	if (strcmp(argv[1], "PROMPT") == 0 &&
458*4882a593Smuzhiyun 	    !kdb_check_flags(KDB_ENABLE_MEM_READ, kdb_cmd_enabled, false))
459*4882a593Smuzhiyun 		return KDB_NOPERM;
460*4882a593Smuzhiyun 
461*4882a593Smuzhiyun 	/*
462*4882a593Smuzhiyun 	 * Check for internal variables
463*4882a593Smuzhiyun 	 */
464*4882a593Smuzhiyun 	if (strcmp(argv[1], "KDBDEBUG") == 0) {
465*4882a593Smuzhiyun 		unsigned int debugflags;
466*4882a593Smuzhiyun 		char *cp;
467*4882a593Smuzhiyun 
468*4882a593Smuzhiyun 		debugflags = simple_strtoul(argv[2], &cp, 0);
469*4882a593Smuzhiyun 		if (cp == argv[2] || debugflags & ~KDB_DEBUG_FLAG_MASK) {
470*4882a593Smuzhiyun 			kdb_printf("kdb: illegal debug flags '%s'\n",
471*4882a593Smuzhiyun 				    argv[2]);
472*4882a593Smuzhiyun 			return 0;
473*4882a593Smuzhiyun 		}
474*4882a593Smuzhiyun 		kdb_flags = (kdb_flags & ~KDB_DEBUG(MASK))
475*4882a593Smuzhiyun 			| (debugflags << KDB_DEBUG_FLAG_SHIFT);
476*4882a593Smuzhiyun 
477*4882a593Smuzhiyun 		return 0;
478*4882a593Smuzhiyun 	}
479*4882a593Smuzhiyun 
480*4882a593Smuzhiyun 	/*
481*4882a593Smuzhiyun 	 * Tokenizer squashed the '=' sign.  argv[1] is variable
482*4882a593Smuzhiyun 	 * name, argv[2] = value.
483*4882a593Smuzhiyun 	 */
484*4882a593Smuzhiyun 	varlen = strlen(argv[1]);
485*4882a593Smuzhiyun 	vallen = strlen(argv[2]);
486*4882a593Smuzhiyun 	ep = kdballocenv(varlen + vallen + 2);
487*4882a593Smuzhiyun 	if (ep == (char *)0)
488*4882a593Smuzhiyun 		return KDB_ENVBUFFULL;
489*4882a593Smuzhiyun 
490*4882a593Smuzhiyun 	sprintf(ep, "%s=%s", argv[1], argv[2]);
491*4882a593Smuzhiyun 
492*4882a593Smuzhiyun 	ep[varlen+vallen+1] = '\0';
493*4882a593Smuzhiyun 
494*4882a593Smuzhiyun 	for (i = 0; i < __nenv; i++) {
495*4882a593Smuzhiyun 		if (__env[i]
496*4882a593Smuzhiyun 		 && ((strncmp(__env[i], argv[1], varlen) == 0)
497*4882a593Smuzhiyun 		   && ((__env[i][varlen] == '\0')
498*4882a593Smuzhiyun 		    || (__env[i][varlen] == '=')))) {
499*4882a593Smuzhiyun 			__env[i] = ep;
500*4882a593Smuzhiyun 			return 0;
501*4882a593Smuzhiyun 		}
502*4882a593Smuzhiyun 	}
503*4882a593Smuzhiyun 
504*4882a593Smuzhiyun 	/*
505*4882a593Smuzhiyun 	 * Wasn't existing variable.  Fit into slot.
506*4882a593Smuzhiyun 	 */
507*4882a593Smuzhiyun 	for (i = 0; i < __nenv-1; i++) {
508*4882a593Smuzhiyun 		if (__env[i] == (char *)0) {
509*4882a593Smuzhiyun 			__env[i] = ep;
510*4882a593Smuzhiyun 			return 0;
511*4882a593Smuzhiyun 		}
512*4882a593Smuzhiyun 	}
513*4882a593Smuzhiyun 
514*4882a593Smuzhiyun 	return KDB_ENVFULL;
515*4882a593Smuzhiyun }
516*4882a593Smuzhiyun 
kdb_check_regs(void)517*4882a593Smuzhiyun static int kdb_check_regs(void)
518*4882a593Smuzhiyun {
519*4882a593Smuzhiyun 	if (!kdb_current_regs) {
520*4882a593Smuzhiyun 		kdb_printf("No current kdb registers."
521*4882a593Smuzhiyun 			   "  You may need to select another task\n");
522*4882a593Smuzhiyun 		return KDB_BADREG;
523*4882a593Smuzhiyun 	}
524*4882a593Smuzhiyun 	return 0;
525*4882a593Smuzhiyun }
526*4882a593Smuzhiyun 
527*4882a593Smuzhiyun /*
528*4882a593Smuzhiyun  * kdbgetaddrarg - This function is responsible for parsing an
529*4882a593Smuzhiyun  *	address-expression and returning the value of the expression,
530*4882a593Smuzhiyun  *	symbol name, and offset to the caller.
531*4882a593Smuzhiyun  *
532*4882a593Smuzhiyun  *	The argument may consist of a numeric value (decimal or
533*4882a593Smuzhiyun  *	hexidecimal), a symbol name, a register name (preceded by the
534*4882a593Smuzhiyun  *	percent sign), an environment variable with a numeric value
535*4882a593Smuzhiyun  *	(preceded by a dollar sign) or a simple arithmetic expression
536*4882a593Smuzhiyun  *	consisting of a symbol name, +/-, and a numeric constant value
537*4882a593Smuzhiyun  *	(offset).
538*4882a593Smuzhiyun  * Parameters:
539*4882a593Smuzhiyun  *	argc	- count of arguments in argv
540*4882a593Smuzhiyun  *	argv	- argument vector
541*4882a593Smuzhiyun  *	*nextarg - index to next unparsed argument in argv[]
542*4882a593Smuzhiyun  *	regs	- Register state at time of KDB entry
543*4882a593Smuzhiyun  * Outputs:
544*4882a593Smuzhiyun  *	*value	- receives the value of the address-expression
545*4882a593Smuzhiyun  *	*offset - receives the offset specified, if any
546*4882a593Smuzhiyun  *	*name   - receives the symbol name, if any
547*4882a593Smuzhiyun  *	*nextarg - index to next unparsed argument in argv[]
548*4882a593Smuzhiyun  * Returns:
549*4882a593Smuzhiyun  *	zero is returned on success, a kdb diagnostic code is
550*4882a593Smuzhiyun  *      returned on error.
551*4882a593Smuzhiyun  */
kdbgetaddrarg(int argc,const char ** argv,int * nextarg,unsigned long * value,long * offset,char ** name)552*4882a593Smuzhiyun int kdbgetaddrarg(int argc, const char **argv, int *nextarg,
553*4882a593Smuzhiyun 		  unsigned long *value,  long *offset,
554*4882a593Smuzhiyun 		  char **name)
555*4882a593Smuzhiyun {
556*4882a593Smuzhiyun 	unsigned long addr;
557*4882a593Smuzhiyun 	unsigned long off = 0;
558*4882a593Smuzhiyun 	int positive;
559*4882a593Smuzhiyun 	int diag;
560*4882a593Smuzhiyun 	int found = 0;
561*4882a593Smuzhiyun 	char *symname;
562*4882a593Smuzhiyun 	char symbol = '\0';
563*4882a593Smuzhiyun 	char *cp;
564*4882a593Smuzhiyun 	kdb_symtab_t symtab;
565*4882a593Smuzhiyun 
566*4882a593Smuzhiyun 	/*
567*4882a593Smuzhiyun 	 * If the enable flags prohibit both arbitrary memory access
568*4882a593Smuzhiyun 	 * and flow control then there are no reasonable grounds to
569*4882a593Smuzhiyun 	 * provide symbol lookup.
570*4882a593Smuzhiyun 	 */
571*4882a593Smuzhiyun 	if (!kdb_check_flags(KDB_ENABLE_MEM_READ | KDB_ENABLE_FLOW_CTRL,
572*4882a593Smuzhiyun 			     kdb_cmd_enabled, false))
573*4882a593Smuzhiyun 		return KDB_NOPERM;
574*4882a593Smuzhiyun 
575*4882a593Smuzhiyun 	/*
576*4882a593Smuzhiyun 	 * Process arguments which follow the following syntax:
577*4882a593Smuzhiyun 	 *
578*4882a593Smuzhiyun 	 *  symbol | numeric-address [+/- numeric-offset]
579*4882a593Smuzhiyun 	 *  %register
580*4882a593Smuzhiyun 	 *  $environment-variable
581*4882a593Smuzhiyun 	 */
582*4882a593Smuzhiyun 
583*4882a593Smuzhiyun 	if (*nextarg > argc)
584*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
585*4882a593Smuzhiyun 
586*4882a593Smuzhiyun 	symname = (char *)argv[*nextarg];
587*4882a593Smuzhiyun 
588*4882a593Smuzhiyun 	/*
589*4882a593Smuzhiyun 	 * If there is no whitespace between the symbol
590*4882a593Smuzhiyun 	 * or address and the '+' or '-' symbols, we
591*4882a593Smuzhiyun 	 * remember the character and replace it with a
592*4882a593Smuzhiyun 	 * null so the symbol/value can be properly parsed
593*4882a593Smuzhiyun 	 */
594*4882a593Smuzhiyun 	cp = strpbrk(symname, "+-");
595*4882a593Smuzhiyun 	if (cp != NULL) {
596*4882a593Smuzhiyun 		symbol = *cp;
597*4882a593Smuzhiyun 		*cp++ = '\0';
598*4882a593Smuzhiyun 	}
599*4882a593Smuzhiyun 
600*4882a593Smuzhiyun 	if (symname[0] == '$') {
601*4882a593Smuzhiyun 		diag = kdbgetulenv(&symname[1], &addr);
602*4882a593Smuzhiyun 		if (diag)
603*4882a593Smuzhiyun 			return diag;
604*4882a593Smuzhiyun 	} else if (symname[0] == '%') {
605*4882a593Smuzhiyun 		diag = kdb_check_regs();
606*4882a593Smuzhiyun 		if (diag)
607*4882a593Smuzhiyun 			return diag;
608*4882a593Smuzhiyun 		/* Implement register values with % at a later time as it is
609*4882a593Smuzhiyun 		 * arch optional.
610*4882a593Smuzhiyun 		 */
611*4882a593Smuzhiyun 		return KDB_NOTIMP;
612*4882a593Smuzhiyun 	} else {
613*4882a593Smuzhiyun 		found = kdbgetsymval(symname, &symtab);
614*4882a593Smuzhiyun 		if (found) {
615*4882a593Smuzhiyun 			addr = symtab.sym_start;
616*4882a593Smuzhiyun 		} else {
617*4882a593Smuzhiyun 			diag = kdbgetularg(argv[*nextarg], &addr);
618*4882a593Smuzhiyun 			if (diag)
619*4882a593Smuzhiyun 				return diag;
620*4882a593Smuzhiyun 		}
621*4882a593Smuzhiyun 	}
622*4882a593Smuzhiyun 
623*4882a593Smuzhiyun 	if (!found)
624*4882a593Smuzhiyun 		found = kdbnearsym(addr, &symtab);
625*4882a593Smuzhiyun 
626*4882a593Smuzhiyun 	(*nextarg)++;
627*4882a593Smuzhiyun 
628*4882a593Smuzhiyun 	if (name)
629*4882a593Smuzhiyun 		*name = symname;
630*4882a593Smuzhiyun 	if (value)
631*4882a593Smuzhiyun 		*value = addr;
632*4882a593Smuzhiyun 	if (offset && name && *name)
633*4882a593Smuzhiyun 		*offset = addr - symtab.sym_start;
634*4882a593Smuzhiyun 
635*4882a593Smuzhiyun 	if ((*nextarg > argc)
636*4882a593Smuzhiyun 	 && (symbol == '\0'))
637*4882a593Smuzhiyun 		return 0;
638*4882a593Smuzhiyun 
639*4882a593Smuzhiyun 	/*
640*4882a593Smuzhiyun 	 * check for +/- and offset
641*4882a593Smuzhiyun 	 */
642*4882a593Smuzhiyun 
643*4882a593Smuzhiyun 	if (symbol == '\0') {
644*4882a593Smuzhiyun 		if ((argv[*nextarg][0] != '+')
645*4882a593Smuzhiyun 		 && (argv[*nextarg][0] != '-')) {
646*4882a593Smuzhiyun 			/*
647*4882a593Smuzhiyun 			 * Not our argument.  Return.
648*4882a593Smuzhiyun 			 */
649*4882a593Smuzhiyun 			return 0;
650*4882a593Smuzhiyun 		} else {
651*4882a593Smuzhiyun 			positive = (argv[*nextarg][0] == '+');
652*4882a593Smuzhiyun 			(*nextarg)++;
653*4882a593Smuzhiyun 		}
654*4882a593Smuzhiyun 	} else
655*4882a593Smuzhiyun 		positive = (symbol == '+');
656*4882a593Smuzhiyun 
657*4882a593Smuzhiyun 	/*
658*4882a593Smuzhiyun 	 * Now there must be an offset!
659*4882a593Smuzhiyun 	 */
660*4882a593Smuzhiyun 	if ((*nextarg > argc)
661*4882a593Smuzhiyun 	 && (symbol == '\0')) {
662*4882a593Smuzhiyun 		return KDB_INVADDRFMT;
663*4882a593Smuzhiyun 	}
664*4882a593Smuzhiyun 
665*4882a593Smuzhiyun 	if (!symbol) {
666*4882a593Smuzhiyun 		cp = (char *)argv[*nextarg];
667*4882a593Smuzhiyun 		(*nextarg)++;
668*4882a593Smuzhiyun 	}
669*4882a593Smuzhiyun 
670*4882a593Smuzhiyun 	diag = kdbgetularg(cp, &off);
671*4882a593Smuzhiyun 	if (diag)
672*4882a593Smuzhiyun 		return diag;
673*4882a593Smuzhiyun 
674*4882a593Smuzhiyun 	if (!positive)
675*4882a593Smuzhiyun 		off = -off;
676*4882a593Smuzhiyun 
677*4882a593Smuzhiyun 	if (offset)
678*4882a593Smuzhiyun 		*offset += off;
679*4882a593Smuzhiyun 
680*4882a593Smuzhiyun 	if (value)
681*4882a593Smuzhiyun 		*value += off;
682*4882a593Smuzhiyun 
683*4882a593Smuzhiyun 	return 0;
684*4882a593Smuzhiyun }
685*4882a593Smuzhiyun 
kdb_cmderror(int diag)686*4882a593Smuzhiyun static void kdb_cmderror(int diag)
687*4882a593Smuzhiyun {
688*4882a593Smuzhiyun 	int i;
689*4882a593Smuzhiyun 
690*4882a593Smuzhiyun 	if (diag >= 0) {
691*4882a593Smuzhiyun 		kdb_printf("no error detected (diagnostic is %d)\n", diag);
692*4882a593Smuzhiyun 		return;
693*4882a593Smuzhiyun 	}
694*4882a593Smuzhiyun 
695*4882a593Smuzhiyun 	for (i = 0; i < __nkdb_err; i++) {
696*4882a593Smuzhiyun 		if (kdbmsgs[i].km_diag == diag) {
697*4882a593Smuzhiyun 			kdb_printf("diag: %d: %s\n", diag, kdbmsgs[i].km_msg);
698*4882a593Smuzhiyun 			return;
699*4882a593Smuzhiyun 		}
700*4882a593Smuzhiyun 	}
701*4882a593Smuzhiyun 
702*4882a593Smuzhiyun 	kdb_printf("Unknown diag %d\n", -diag);
703*4882a593Smuzhiyun }
704*4882a593Smuzhiyun 
705*4882a593Smuzhiyun /*
706*4882a593Smuzhiyun  * kdb_defcmd, kdb_defcmd2 - This function implements the 'defcmd'
707*4882a593Smuzhiyun  *	command which defines one command as a set of other commands,
708*4882a593Smuzhiyun  *	terminated by endefcmd.  kdb_defcmd processes the initial
709*4882a593Smuzhiyun  *	'defcmd' command, kdb_defcmd2 is invoked from kdb_parse for
710*4882a593Smuzhiyun  *	the following commands until 'endefcmd'.
711*4882a593Smuzhiyun  * Inputs:
712*4882a593Smuzhiyun  *	argc	argument count
713*4882a593Smuzhiyun  *	argv	argument vector
714*4882a593Smuzhiyun  * Returns:
715*4882a593Smuzhiyun  *	zero for success, a kdb diagnostic if error
716*4882a593Smuzhiyun  */
717*4882a593Smuzhiyun struct defcmd_set {
718*4882a593Smuzhiyun 	int count;
719*4882a593Smuzhiyun 	bool usable;
720*4882a593Smuzhiyun 	char *name;
721*4882a593Smuzhiyun 	char *usage;
722*4882a593Smuzhiyun 	char *help;
723*4882a593Smuzhiyun 	char **command;
724*4882a593Smuzhiyun };
725*4882a593Smuzhiyun static struct defcmd_set *defcmd_set;
726*4882a593Smuzhiyun static int defcmd_set_count;
727*4882a593Smuzhiyun static bool defcmd_in_progress;
728*4882a593Smuzhiyun 
729*4882a593Smuzhiyun /* Forward references */
730*4882a593Smuzhiyun static int kdb_exec_defcmd(int argc, const char **argv);
731*4882a593Smuzhiyun 
kdb_defcmd2(const char * cmdstr,const char * argv0)732*4882a593Smuzhiyun static int kdb_defcmd2(const char *cmdstr, const char *argv0)
733*4882a593Smuzhiyun {
734*4882a593Smuzhiyun 	struct defcmd_set *s = defcmd_set + defcmd_set_count - 1;
735*4882a593Smuzhiyun 	char **save_command = s->command;
736*4882a593Smuzhiyun 	if (strcmp(argv0, "endefcmd") == 0) {
737*4882a593Smuzhiyun 		defcmd_in_progress = false;
738*4882a593Smuzhiyun 		if (!s->count)
739*4882a593Smuzhiyun 			s->usable = false;
740*4882a593Smuzhiyun 		if (s->usable)
741*4882a593Smuzhiyun 			/* macros are always safe because when executed each
742*4882a593Smuzhiyun 			 * internal command re-enters kdb_parse() and is
743*4882a593Smuzhiyun 			 * safety checked individually.
744*4882a593Smuzhiyun 			 */
745*4882a593Smuzhiyun 			kdb_register_flags(s->name, kdb_exec_defcmd, s->usage,
746*4882a593Smuzhiyun 					   s->help, 0,
747*4882a593Smuzhiyun 					   KDB_ENABLE_ALWAYS_SAFE);
748*4882a593Smuzhiyun 		return 0;
749*4882a593Smuzhiyun 	}
750*4882a593Smuzhiyun 	if (!s->usable)
751*4882a593Smuzhiyun 		return KDB_NOTIMP;
752*4882a593Smuzhiyun 	s->command = kcalloc(s->count + 1, sizeof(*(s->command)), GFP_KDB);
753*4882a593Smuzhiyun 	if (!s->command) {
754*4882a593Smuzhiyun 		kdb_printf("Could not allocate new kdb_defcmd table for %s\n",
755*4882a593Smuzhiyun 			   cmdstr);
756*4882a593Smuzhiyun 		s->usable = false;
757*4882a593Smuzhiyun 		return KDB_NOTIMP;
758*4882a593Smuzhiyun 	}
759*4882a593Smuzhiyun 	memcpy(s->command, save_command, s->count * sizeof(*(s->command)));
760*4882a593Smuzhiyun 	s->command[s->count++] = kdb_strdup(cmdstr, GFP_KDB);
761*4882a593Smuzhiyun 	kfree(save_command);
762*4882a593Smuzhiyun 	return 0;
763*4882a593Smuzhiyun }
764*4882a593Smuzhiyun 
kdb_defcmd(int argc,const char ** argv)765*4882a593Smuzhiyun static int kdb_defcmd(int argc, const char **argv)
766*4882a593Smuzhiyun {
767*4882a593Smuzhiyun 	struct defcmd_set *save_defcmd_set = defcmd_set, *s;
768*4882a593Smuzhiyun 	if (defcmd_in_progress) {
769*4882a593Smuzhiyun 		kdb_printf("kdb: nested defcmd detected, assuming missing "
770*4882a593Smuzhiyun 			   "endefcmd\n");
771*4882a593Smuzhiyun 		kdb_defcmd2("endefcmd", "endefcmd");
772*4882a593Smuzhiyun 	}
773*4882a593Smuzhiyun 	if (argc == 0) {
774*4882a593Smuzhiyun 		int i;
775*4882a593Smuzhiyun 		for (s = defcmd_set; s < defcmd_set + defcmd_set_count; ++s) {
776*4882a593Smuzhiyun 			kdb_printf("defcmd %s \"%s\" \"%s\"\n", s->name,
777*4882a593Smuzhiyun 				   s->usage, s->help);
778*4882a593Smuzhiyun 			for (i = 0; i < s->count; ++i)
779*4882a593Smuzhiyun 				kdb_printf("%s", s->command[i]);
780*4882a593Smuzhiyun 			kdb_printf("endefcmd\n");
781*4882a593Smuzhiyun 		}
782*4882a593Smuzhiyun 		return 0;
783*4882a593Smuzhiyun 	}
784*4882a593Smuzhiyun 	if (argc != 3)
785*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
786*4882a593Smuzhiyun 	if (in_dbg_master()) {
787*4882a593Smuzhiyun 		kdb_printf("Command only available during kdb_init()\n");
788*4882a593Smuzhiyun 		return KDB_NOTIMP;
789*4882a593Smuzhiyun 	}
790*4882a593Smuzhiyun 	defcmd_set = kmalloc_array(defcmd_set_count + 1, sizeof(*defcmd_set),
791*4882a593Smuzhiyun 				   GFP_KDB);
792*4882a593Smuzhiyun 	if (!defcmd_set)
793*4882a593Smuzhiyun 		goto fail_defcmd;
794*4882a593Smuzhiyun 	memcpy(defcmd_set, save_defcmd_set,
795*4882a593Smuzhiyun 	       defcmd_set_count * sizeof(*defcmd_set));
796*4882a593Smuzhiyun 	s = defcmd_set + defcmd_set_count;
797*4882a593Smuzhiyun 	memset(s, 0, sizeof(*s));
798*4882a593Smuzhiyun 	s->usable = true;
799*4882a593Smuzhiyun 	s->name = kdb_strdup(argv[1], GFP_KDB);
800*4882a593Smuzhiyun 	if (!s->name)
801*4882a593Smuzhiyun 		goto fail_name;
802*4882a593Smuzhiyun 	s->usage = kdb_strdup(argv[2], GFP_KDB);
803*4882a593Smuzhiyun 	if (!s->usage)
804*4882a593Smuzhiyun 		goto fail_usage;
805*4882a593Smuzhiyun 	s->help = kdb_strdup(argv[3], GFP_KDB);
806*4882a593Smuzhiyun 	if (!s->help)
807*4882a593Smuzhiyun 		goto fail_help;
808*4882a593Smuzhiyun 	if (s->usage[0] == '"') {
809*4882a593Smuzhiyun 		strcpy(s->usage, argv[2]+1);
810*4882a593Smuzhiyun 		s->usage[strlen(s->usage)-1] = '\0';
811*4882a593Smuzhiyun 	}
812*4882a593Smuzhiyun 	if (s->help[0] == '"') {
813*4882a593Smuzhiyun 		strcpy(s->help, argv[3]+1);
814*4882a593Smuzhiyun 		s->help[strlen(s->help)-1] = '\0';
815*4882a593Smuzhiyun 	}
816*4882a593Smuzhiyun 	++defcmd_set_count;
817*4882a593Smuzhiyun 	defcmd_in_progress = true;
818*4882a593Smuzhiyun 	kfree(save_defcmd_set);
819*4882a593Smuzhiyun 	return 0;
820*4882a593Smuzhiyun fail_help:
821*4882a593Smuzhiyun 	kfree(s->usage);
822*4882a593Smuzhiyun fail_usage:
823*4882a593Smuzhiyun 	kfree(s->name);
824*4882a593Smuzhiyun fail_name:
825*4882a593Smuzhiyun 	kfree(defcmd_set);
826*4882a593Smuzhiyun fail_defcmd:
827*4882a593Smuzhiyun 	kdb_printf("Could not allocate new defcmd_set entry for %s\n", argv[1]);
828*4882a593Smuzhiyun 	defcmd_set = save_defcmd_set;
829*4882a593Smuzhiyun 	return KDB_NOTIMP;
830*4882a593Smuzhiyun }
831*4882a593Smuzhiyun 
832*4882a593Smuzhiyun /*
833*4882a593Smuzhiyun  * kdb_exec_defcmd - Execute the set of commands associated with this
834*4882a593Smuzhiyun  *	defcmd name.
835*4882a593Smuzhiyun  * Inputs:
836*4882a593Smuzhiyun  *	argc	argument count
837*4882a593Smuzhiyun  *	argv	argument vector
838*4882a593Smuzhiyun  * Returns:
839*4882a593Smuzhiyun  *	zero for success, a kdb diagnostic if error
840*4882a593Smuzhiyun  */
kdb_exec_defcmd(int argc,const char ** argv)841*4882a593Smuzhiyun static int kdb_exec_defcmd(int argc, const char **argv)
842*4882a593Smuzhiyun {
843*4882a593Smuzhiyun 	int i, ret;
844*4882a593Smuzhiyun 	struct defcmd_set *s;
845*4882a593Smuzhiyun 	if (argc != 0)
846*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
847*4882a593Smuzhiyun 	for (s = defcmd_set, i = 0; i < defcmd_set_count; ++i, ++s) {
848*4882a593Smuzhiyun 		if (strcmp(s->name, argv[0]) == 0)
849*4882a593Smuzhiyun 			break;
850*4882a593Smuzhiyun 	}
851*4882a593Smuzhiyun 	if (i == defcmd_set_count) {
852*4882a593Smuzhiyun 		kdb_printf("kdb_exec_defcmd: could not find commands for %s\n",
853*4882a593Smuzhiyun 			   argv[0]);
854*4882a593Smuzhiyun 		return KDB_NOTIMP;
855*4882a593Smuzhiyun 	}
856*4882a593Smuzhiyun 	for (i = 0; i < s->count; ++i) {
857*4882a593Smuzhiyun 		/* Recursive use of kdb_parse, do not use argv after
858*4882a593Smuzhiyun 		 * this point */
859*4882a593Smuzhiyun 		argv = NULL;
860*4882a593Smuzhiyun 		kdb_printf("[%s]kdb> %s\n", s->name, s->command[i]);
861*4882a593Smuzhiyun 		ret = kdb_parse(s->command[i]);
862*4882a593Smuzhiyun 		if (ret)
863*4882a593Smuzhiyun 			return ret;
864*4882a593Smuzhiyun 	}
865*4882a593Smuzhiyun 	return 0;
866*4882a593Smuzhiyun }
867*4882a593Smuzhiyun 
868*4882a593Smuzhiyun /* Command history */
869*4882a593Smuzhiyun #define KDB_CMD_HISTORY_COUNT	32
870*4882a593Smuzhiyun #define CMD_BUFLEN		200	/* kdb_printf: max printline
871*4882a593Smuzhiyun 					 * size == 256 */
872*4882a593Smuzhiyun static unsigned int cmd_head, cmd_tail;
873*4882a593Smuzhiyun static unsigned int cmdptr;
874*4882a593Smuzhiyun static char cmd_hist[KDB_CMD_HISTORY_COUNT][CMD_BUFLEN];
875*4882a593Smuzhiyun static char cmd_cur[CMD_BUFLEN];
876*4882a593Smuzhiyun 
877*4882a593Smuzhiyun /*
878*4882a593Smuzhiyun  * The "str" argument may point to something like  | grep xyz
879*4882a593Smuzhiyun  */
parse_grep(const char * str)880*4882a593Smuzhiyun static void parse_grep(const char *str)
881*4882a593Smuzhiyun {
882*4882a593Smuzhiyun 	int	len;
883*4882a593Smuzhiyun 	char	*cp = (char *)str, *cp2;
884*4882a593Smuzhiyun 
885*4882a593Smuzhiyun 	/* sanity check: we should have been called with the \ first */
886*4882a593Smuzhiyun 	if (*cp != '|')
887*4882a593Smuzhiyun 		return;
888*4882a593Smuzhiyun 	cp++;
889*4882a593Smuzhiyun 	while (isspace(*cp))
890*4882a593Smuzhiyun 		cp++;
891*4882a593Smuzhiyun 	if (!str_has_prefix(cp, "grep ")) {
892*4882a593Smuzhiyun 		kdb_printf("invalid 'pipe', see grephelp\n");
893*4882a593Smuzhiyun 		return;
894*4882a593Smuzhiyun 	}
895*4882a593Smuzhiyun 	cp += 5;
896*4882a593Smuzhiyun 	while (isspace(*cp))
897*4882a593Smuzhiyun 		cp++;
898*4882a593Smuzhiyun 	cp2 = strchr(cp, '\n');
899*4882a593Smuzhiyun 	if (cp2)
900*4882a593Smuzhiyun 		*cp2 = '\0'; /* remove the trailing newline */
901*4882a593Smuzhiyun 	len = strlen(cp);
902*4882a593Smuzhiyun 	if (len == 0) {
903*4882a593Smuzhiyun 		kdb_printf("invalid 'pipe', see grephelp\n");
904*4882a593Smuzhiyun 		return;
905*4882a593Smuzhiyun 	}
906*4882a593Smuzhiyun 	/* now cp points to a nonzero length search string */
907*4882a593Smuzhiyun 	if (*cp == '"') {
908*4882a593Smuzhiyun 		/* allow it be "x y z" by removing the "'s - there must
909*4882a593Smuzhiyun 		   be two of them */
910*4882a593Smuzhiyun 		cp++;
911*4882a593Smuzhiyun 		cp2 = strchr(cp, '"');
912*4882a593Smuzhiyun 		if (!cp2) {
913*4882a593Smuzhiyun 			kdb_printf("invalid quoted string, see grephelp\n");
914*4882a593Smuzhiyun 			return;
915*4882a593Smuzhiyun 		}
916*4882a593Smuzhiyun 		*cp2 = '\0'; /* end the string where the 2nd " was */
917*4882a593Smuzhiyun 	}
918*4882a593Smuzhiyun 	kdb_grep_leading = 0;
919*4882a593Smuzhiyun 	if (*cp == '^') {
920*4882a593Smuzhiyun 		kdb_grep_leading = 1;
921*4882a593Smuzhiyun 		cp++;
922*4882a593Smuzhiyun 	}
923*4882a593Smuzhiyun 	len = strlen(cp);
924*4882a593Smuzhiyun 	kdb_grep_trailing = 0;
925*4882a593Smuzhiyun 	if (*(cp+len-1) == '$') {
926*4882a593Smuzhiyun 		kdb_grep_trailing = 1;
927*4882a593Smuzhiyun 		*(cp+len-1) = '\0';
928*4882a593Smuzhiyun 	}
929*4882a593Smuzhiyun 	len = strlen(cp);
930*4882a593Smuzhiyun 	if (!len)
931*4882a593Smuzhiyun 		return;
932*4882a593Smuzhiyun 	if (len >= KDB_GREP_STRLEN) {
933*4882a593Smuzhiyun 		kdb_printf("search string too long\n");
934*4882a593Smuzhiyun 		return;
935*4882a593Smuzhiyun 	}
936*4882a593Smuzhiyun 	strcpy(kdb_grep_string, cp);
937*4882a593Smuzhiyun 	kdb_grepping_flag++;
938*4882a593Smuzhiyun 	return;
939*4882a593Smuzhiyun }
940*4882a593Smuzhiyun 
941*4882a593Smuzhiyun /*
942*4882a593Smuzhiyun  * kdb_parse - Parse the command line, search the command table for a
943*4882a593Smuzhiyun  *	matching command and invoke the command function.  This
944*4882a593Smuzhiyun  *	function may be called recursively, if it is, the second call
945*4882a593Smuzhiyun  *	will overwrite argv and cbuf.  It is the caller's
946*4882a593Smuzhiyun  *	responsibility to save their argv if they recursively call
947*4882a593Smuzhiyun  *	kdb_parse().
948*4882a593Smuzhiyun  * Parameters:
949*4882a593Smuzhiyun  *      cmdstr	The input command line to be parsed.
950*4882a593Smuzhiyun  *	regs	The registers at the time kdb was entered.
951*4882a593Smuzhiyun  * Returns:
952*4882a593Smuzhiyun  *	Zero for success, a kdb diagnostic if failure.
953*4882a593Smuzhiyun  * Remarks:
954*4882a593Smuzhiyun  *	Limited to 20 tokens.
955*4882a593Smuzhiyun  *
956*4882a593Smuzhiyun  *	Real rudimentary tokenization. Basically only whitespace
957*4882a593Smuzhiyun  *	is considered a token delimeter (but special consideration
958*4882a593Smuzhiyun  *	is taken of the '=' sign as used by the 'set' command).
959*4882a593Smuzhiyun  *
960*4882a593Smuzhiyun  *	The algorithm used to tokenize the input string relies on
961*4882a593Smuzhiyun  *	there being at least one whitespace (or otherwise useless)
962*4882a593Smuzhiyun  *	character between tokens as the character immediately following
963*4882a593Smuzhiyun  *	the token is altered in-place to a null-byte to terminate the
964*4882a593Smuzhiyun  *	token string.
965*4882a593Smuzhiyun  */
966*4882a593Smuzhiyun 
967*4882a593Smuzhiyun #define MAXARGC	20
968*4882a593Smuzhiyun 
kdb_parse(const char * cmdstr)969*4882a593Smuzhiyun int kdb_parse(const char *cmdstr)
970*4882a593Smuzhiyun {
971*4882a593Smuzhiyun 	static char *argv[MAXARGC];
972*4882a593Smuzhiyun 	static int argc;
973*4882a593Smuzhiyun 	static char cbuf[CMD_BUFLEN+2];
974*4882a593Smuzhiyun 	char *cp;
975*4882a593Smuzhiyun 	char *cpp, quoted;
976*4882a593Smuzhiyun 	kdbtab_t *tp;
977*4882a593Smuzhiyun 	int i, escaped, ignore_errors = 0, check_grep = 0;
978*4882a593Smuzhiyun 
979*4882a593Smuzhiyun 	/*
980*4882a593Smuzhiyun 	 * First tokenize the command string.
981*4882a593Smuzhiyun 	 */
982*4882a593Smuzhiyun 	cp = (char *)cmdstr;
983*4882a593Smuzhiyun 
984*4882a593Smuzhiyun 	if (KDB_FLAG(CMD_INTERRUPT)) {
985*4882a593Smuzhiyun 		/* Previous command was interrupted, newline must not
986*4882a593Smuzhiyun 		 * repeat the command */
987*4882a593Smuzhiyun 		KDB_FLAG_CLEAR(CMD_INTERRUPT);
988*4882a593Smuzhiyun 		KDB_STATE_SET(PAGER);
989*4882a593Smuzhiyun 		argc = 0;	/* no repeat */
990*4882a593Smuzhiyun 	}
991*4882a593Smuzhiyun 
992*4882a593Smuzhiyun 	if (*cp != '\n' && *cp != '\0') {
993*4882a593Smuzhiyun 		argc = 0;
994*4882a593Smuzhiyun 		cpp = cbuf;
995*4882a593Smuzhiyun 		while (*cp) {
996*4882a593Smuzhiyun 			/* skip whitespace */
997*4882a593Smuzhiyun 			while (isspace(*cp))
998*4882a593Smuzhiyun 				cp++;
999*4882a593Smuzhiyun 			if ((*cp == '\0') || (*cp == '\n') ||
1000*4882a593Smuzhiyun 			    (*cp == '#' && !defcmd_in_progress))
1001*4882a593Smuzhiyun 				break;
1002*4882a593Smuzhiyun 			/* special case: check for | grep pattern */
1003*4882a593Smuzhiyun 			if (*cp == '|') {
1004*4882a593Smuzhiyun 				check_grep++;
1005*4882a593Smuzhiyun 				break;
1006*4882a593Smuzhiyun 			}
1007*4882a593Smuzhiyun 			if (cpp >= cbuf + CMD_BUFLEN) {
1008*4882a593Smuzhiyun 				kdb_printf("kdb_parse: command buffer "
1009*4882a593Smuzhiyun 					   "overflow, command ignored\n%s\n",
1010*4882a593Smuzhiyun 					   cmdstr);
1011*4882a593Smuzhiyun 				return KDB_NOTFOUND;
1012*4882a593Smuzhiyun 			}
1013*4882a593Smuzhiyun 			if (argc >= MAXARGC - 1) {
1014*4882a593Smuzhiyun 				kdb_printf("kdb_parse: too many arguments, "
1015*4882a593Smuzhiyun 					   "command ignored\n%s\n", cmdstr);
1016*4882a593Smuzhiyun 				return KDB_NOTFOUND;
1017*4882a593Smuzhiyun 			}
1018*4882a593Smuzhiyun 			argv[argc++] = cpp;
1019*4882a593Smuzhiyun 			escaped = 0;
1020*4882a593Smuzhiyun 			quoted = '\0';
1021*4882a593Smuzhiyun 			/* Copy to next unquoted and unescaped
1022*4882a593Smuzhiyun 			 * whitespace or '=' */
1023*4882a593Smuzhiyun 			while (*cp && *cp != '\n' &&
1024*4882a593Smuzhiyun 			       (escaped || quoted || !isspace(*cp))) {
1025*4882a593Smuzhiyun 				if (cpp >= cbuf + CMD_BUFLEN)
1026*4882a593Smuzhiyun 					break;
1027*4882a593Smuzhiyun 				if (escaped) {
1028*4882a593Smuzhiyun 					escaped = 0;
1029*4882a593Smuzhiyun 					*cpp++ = *cp++;
1030*4882a593Smuzhiyun 					continue;
1031*4882a593Smuzhiyun 				}
1032*4882a593Smuzhiyun 				if (*cp == '\\') {
1033*4882a593Smuzhiyun 					escaped = 1;
1034*4882a593Smuzhiyun 					++cp;
1035*4882a593Smuzhiyun 					continue;
1036*4882a593Smuzhiyun 				}
1037*4882a593Smuzhiyun 				if (*cp == quoted)
1038*4882a593Smuzhiyun 					quoted = '\0';
1039*4882a593Smuzhiyun 				else if (*cp == '\'' || *cp == '"')
1040*4882a593Smuzhiyun 					quoted = *cp;
1041*4882a593Smuzhiyun 				*cpp = *cp++;
1042*4882a593Smuzhiyun 				if (*cpp == '=' && !quoted)
1043*4882a593Smuzhiyun 					break;
1044*4882a593Smuzhiyun 				++cpp;
1045*4882a593Smuzhiyun 			}
1046*4882a593Smuzhiyun 			*cpp++ = '\0';	/* Squash a ws or '=' character */
1047*4882a593Smuzhiyun 		}
1048*4882a593Smuzhiyun 	}
1049*4882a593Smuzhiyun 	if (!argc)
1050*4882a593Smuzhiyun 		return 0;
1051*4882a593Smuzhiyun 	if (check_grep)
1052*4882a593Smuzhiyun 		parse_grep(cp);
1053*4882a593Smuzhiyun 	if (defcmd_in_progress) {
1054*4882a593Smuzhiyun 		int result = kdb_defcmd2(cmdstr, argv[0]);
1055*4882a593Smuzhiyun 		if (!defcmd_in_progress) {
1056*4882a593Smuzhiyun 			argc = 0;	/* avoid repeat on endefcmd */
1057*4882a593Smuzhiyun 			*(argv[0]) = '\0';
1058*4882a593Smuzhiyun 		}
1059*4882a593Smuzhiyun 		return result;
1060*4882a593Smuzhiyun 	}
1061*4882a593Smuzhiyun 	if (argv[0][0] == '-' && argv[0][1] &&
1062*4882a593Smuzhiyun 	    (argv[0][1] < '0' || argv[0][1] > '9')) {
1063*4882a593Smuzhiyun 		ignore_errors = 1;
1064*4882a593Smuzhiyun 		++argv[0];
1065*4882a593Smuzhiyun 	}
1066*4882a593Smuzhiyun 
1067*4882a593Smuzhiyun 	for_each_kdbcmd(tp, i) {
1068*4882a593Smuzhiyun 		if (tp->cmd_name) {
1069*4882a593Smuzhiyun 			/*
1070*4882a593Smuzhiyun 			 * If this command is allowed to be abbreviated,
1071*4882a593Smuzhiyun 			 * check to see if this is it.
1072*4882a593Smuzhiyun 			 */
1073*4882a593Smuzhiyun 
1074*4882a593Smuzhiyun 			if (tp->cmd_minlen
1075*4882a593Smuzhiyun 			 && (strlen(argv[0]) <= tp->cmd_minlen)) {
1076*4882a593Smuzhiyun 				if (strncmp(argv[0],
1077*4882a593Smuzhiyun 					    tp->cmd_name,
1078*4882a593Smuzhiyun 					    tp->cmd_minlen) == 0) {
1079*4882a593Smuzhiyun 					break;
1080*4882a593Smuzhiyun 				}
1081*4882a593Smuzhiyun 			}
1082*4882a593Smuzhiyun 
1083*4882a593Smuzhiyun 			if (strcmp(argv[0], tp->cmd_name) == 0)
1084*4882a593Smuzhiyun 				break;
1085*4882a593Smuzhiyun 		}
1086*4882a593Smuzhiyun 	}
1087*4882a593Smuzhiyun 
1088*4882a593Smuzhiyun 	/*
1089*4882a593Smuzhiyun 	 * If we don't find a command by this name, see if the first
1090*4882a593Smuzhiyun 	 * few characters of this match any of the known commands.
1091*4882a593Smuzhiyun 	 * e.g., md1c20 should match md.
1092*4882a593Smuzhiyun 	 */
1093*4882a593Smuzhiyun 	if (i == kdb_max_commands) {
1094*4882a593Smuzhiyun 		for_each_kdbcmd(tp, i) {
1095*4882a593Smuzhiyun 			if (tp->cmd_name) {
1096*4882a593Smuzhiyun 				if (strncmp(argv[0],
1097*4882a593Smuzhiyun 					    tp->cmd_name,
1098*4882a593Smuzhiyun 					    strlen(tp->cmd_name)) == 0) {
1099*4882a593Smuzhiyun 					break;
1100*4882a593Smuzhiyun 				}
1101*4882a593Smuzhiyun 			}
1102*4882a593Smuzhiyun 		}
1103*4882a593Smuzhiyun 	}
1104*4882a593Smuzhiyun 
1105*4882a593Smuzhiyun 	if (i < kdb_max_commands) {
1106*4882a593Smuzhiyun 		int result;
1107*4882a593Smuzhiyun 
1108*4882a593Smuzhiyun 		if (!kdb_check_flags(tp->cmd_flags, kdb_cmd_enabled, argc <= 1))
1109*4882a593Smuzhiyun 			return KDB_NOPERM;
1110*4882a593Smuzhiyun 
1111*4882a593Smuzhiyun 		KDB_STATE_SET(CMD);
1112*4882a593Smuzhiyun 		result = (*tp->cmd_func)(argc-1, (const char **)argv);
1113*4882a593Smuzhiyun 		if (result && ignore_errors && result > KDB_CMD_GO)
1114*4882a593Smuzhiyun 			result = 0;
1115*4882a593Smuzhiyun 		KDB_STATE_CLEAR(CMD);
1116*4882a593Smuzhiyun 
1117*4882a593Smuzhiyun 		if (tp->cmd_flags & KDB_REPEAT_WITH_ARGS)
1118*4882a593Smuzhiyun 			return result;
1119*4882a593Smuzhiyun 
1120*4882a593Smuzhiyun 		argc = tp->cmd_flags & KDB_REPEAT_NO_ARGS ? 1 : 0;
1121*4882a593Smuzhiyun 		if (argv[argc])
1122*4882a593Smuzhiyun 			*(argv[argc]) = '\0';
1123*4882a593Smuzhiyun 		return result;
1124*4882a593Smuzhiyun 	}
1125*4882a593Smuzhiyun 
1126*4882a593Smuzhiyun 	/*
1127*4882a593Smuzhiyun 	 * If the input with which we were presented does not
1128*4882a593Smuzhiyun 	 * map to an existing command, attempt to parse it as an
1129*4882a593Smuzhiyun 	 * address argument and display the result.   Useful for
1130*4882a593Smuzhiyun 	 * obtaining the address of a variable, or the nearest symbol
1131*4882a593Smuzhiyun 	 * to an address contained in a register.
1132*4882a593Smuzhiyun 	 */
1133*4882a593Smuzhiyun 	{
1134*4882a593Smuzhiyun 		unsigned long value;
1135*4882a593Smuzhiyun 		char *name = NULL;
1136*4882a593Smuzhiyun 		long offset;
1137*4882a593Smuzhiyun 		int nextarg = 0;
1138*4882a593Smuzhiyun 
1139*4882a593Smuzhiyun 		if (kdbgetaddrarg(0, (const char **)argv, &nextarg,
1140*4882a593Smuzhiyun 				  &value, &offset, &name)) {
1141*4882a593Smuzhiyun 			return KDB_NOTFOUND;
1142*4882a593Smuzhiyun 		}
1143*4882a593Smuzhiyun 
1144*4882a593Smuzhiyun 		kdb_printf("%s = ", argv[0]);
1145*4882a593Smuzhiyun 		kdb_symbol_print(value, NULL, KDB_SP_DEFAULT);
1146*4882a593Smuzhiyun 		kdb_printf("\n");
1147*4882a593Smuzhiyun 		return 0;
1148*4882a593Smuzhiyun 	}
1149*4882a593Smuzhiyun }
1150*4882a593Smuzhiyun 
1151*4882a593Smuzhiyun 
handle_ctrl_cmd(char * cmd)1152*4882a593Smuzhiyun static int handle_ctrl_cmd(char *cmd)
1153*4882a593Smuzhiyun {
1154*4882a593Smuzhiyun #define CTRL_P	16
1155*4882a593Smuzhiyun #define CTRL_N	14
1156*4882a593Smuzhiyun 
1157*4882a593Smuzhiyun 	/* initial situation */
1158*4882a593Smuzhiyun 	if (cmd_head == cmd_tail)
1159*4882a593Smuzhiyun 		return 0;
1160*4882a593Smuzhiyun 	switch (*cmd) {
1161*4882a593Smuzhiyun 	case CTRL_P:
1162*4882a593Smuzhiyun 		if (cmdptr != cmd_tail)
1163*4882a593Smuzhiyun 			cmdptr = (cmdptr + KDB_CMD_HISTORY_COUNT - 1) %
1164*4882a593Smuzhiyun 				 KDB_CMD_HISTORY_COUNT;
1165*4882a593Smuzhiyun 		strscpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN);
1166*4882a593Smuzhiyun 		return 1;
1167*4882a593Smuzhiyun 	case CTRL_N:
1168*4882a593Smuzhiyun 		if (cmdptr != cmd_head)
1169*4882a593Smuzhiyun 			cmdptr = (cmdptr+1) % KDB_CMD_HISTORY_COUNT;
1170*4882a593Smuzhiyun 		strscpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN);
1171*4882a593Smuzhiyun 		return 1;
1172*4882a593Smuzhiyun 	}
1173*4882a593Smuzhiyun 	return 0;
1174*4882a593Smuzhiyun }
1175*4882a593Smuzhiyun 
1176*4882a593Smuzhiyun /*
1177*4882a593Smuzhiyun  * kdb_reboot - This function implements the 'reboot' command.  Reboot
1178*4882a593Smuzhiyun  *	the system immediately, or loop for ever on failure.
1179*4882a593Smuzhiyun  */
kdb_reboot(int argc,const char ** argv)1180*4882a593Smuzhiyun static int kdb_reboot(int argc, const char **argv)
1181*4882a593Smuzhiyun {
1182*4882a593Smuzhiyun 	emergency_restart();
1183*4882a593Smuzhiyun 	kdb_printf("Hmm, kdb_reboot did not reboot, spinning here\n");
1184*4882a593Smuzhiyun 	while (1)
1185*4882a593Smuzhiyun 		cpu_relax();
1186*4882a593Smuzhiyun 	/* NOTREACHED */
1187*4882a593Smuzhiyun 	return 0;
1188*4882a593Smuzhiyun }
1189*4882a593Smuzhiyun 
kdb_dumpregs(struct pt_regs * regs)1190*4882a593Smuzhiyun static void kdb_dumpregs(struct pt_regs *regs)
1191*4882a593Smuzhiyun {
1192*4882a593Smuzhiyun 	int old_lvl = console_loglevel;
1193*4882a593Smuzhiyun 	console_loglevel = CONSOLE_LOGLEVEL_MOTORMOUTH;
1194*4882a593Smuzhiyun 	kdb_trap_printk++;
1195*4882a593Smuzhiyun 	show_regs(regs);
1196*4882a593Smuzhiyun 	kdb_trap_printk--;
1197*4882a593Smuzhiyun 	kdb_printf("\n");
1198*4882a593Smuzhiyun 	console_loglevel = old_lvl;
1199*4882a593Smuzhiyun }
1200*4882a593Smuzhiyun 
kdb_set_current_task(struct task_struct * p)1201*4882a593Smuzhiyun static void kdb_set_current_task(struct task_struct *p)
1202*4882a593Smuzhiyun {
1203*4882a593Smuzhiyun 	kdb_current_task = p;
1204*4882a593Smuzhiyun 
1205*4882a593Smuzhiyun 	if (kdb_task_has_cpu(p)) {
1206*4882a593Smuzhiyun 		kdb_current_regs = KDB_TSKREGS(kdb_process_cpu(p));
1207*4882a593Smuzhiyun 		return;
1208*4882a593Smuzhiyun 	}
1209*4882a593Smuzhiyun 	kdb_current_regs = NULL;
1210*4882a593Smuzhiyun }
1211*4882a593Smuzhiyun 
drop_newline(char * buf)1212*4882a593Smuzhiyun static void drop_newline(char *buf)
1213*4882a593Smuzhiyun {
1214*4882a593Smuzhiyun 	size_t len = strlen(buf);
1215*4882a593Smuzhiyun 
1216*4882a593Smuzhiyun 	if (len == 0)
1217*4882a593Smuzhiyun 		return;
1218*4882a593Smuzhiyun 	if (*(buf + len - 1) == '\n')
1219*4882a593Smuzhiyun 		*(buf + len - 1) = '\0';
1220*4882a593Smuzhiyun }
1221*4882a593Smuzhiyun 
1222*4882a593Smuzhiyun /*
1223*4882a593Smuzhiyun  * kdb_local - The main code for kdb.  This routine is invoked on a
1224*4882a593Smuzhiyun  *	specific processor, it is not global.  The main kdb() routine
1225*4882a593Smuzhiyun  *	ensures that only one processor at a time is in this routine.
1226*4882a593Smuzhiyun  *	This code is called with the real reason code on the first
1227*4882a593Smuzhiyun  *	entry to a kdb session, thereafter it is called with reason
1228*4882a593Smuzhiyun  *	SWITCH, even if the user goes back to the original cpu.
1229*4882a593Smuzhiyun  * Inputs:
1230*4882a593Smuzhiyun  *	reason		The reason KDB was invoked
1231*4882a593Smuzhiyun  *	error		The hardware-defined error code
1232*4882a593Smuzhiyun  *	regs		The exception frame at time of fault/breakpoint.
1233*4882a593Smuzhiyun  *	db_result	Result code from the break or debug point.
1234*4882a593Smuzhiyun  * Returns:
1235*4882a593Smuzhiyun  *	0	KDB was invoked for an event which it wasn't responsible
1236*4882a593Smuzhiyun  *	1	KDB handled the event for which it was invoked.
1237*4882a593Smuzhiyun  *	KDB_CMD_GO	User typed 'go'.
1238*4882a593Smuzhiyun  *	KDB_CMD_CPU	User switched to another cpu.
1239*4882a593Smuzhiyun  *	KDB_CMD_SS	Single step.
1240*4882a593Smuzhiyun  */
kdb_local(kdb_reason_t reason,int error,struct pt_regs * regs,kdb_dbtrap_t db_result)1241*4882a593Smuzhiyun static int kdb_local(kdb_reason_t reason, int error, struct pt_regs *regs,
1242*4882a593Smuzhiyun 		     kdb_dbtrap_t db_result)
1243*4882a593Smuzhiyun {
1244*4882a593Smuzhiyun 	char *cmdbuf;
1245*4882a593Smuzhiyun 	int diag;
1246*4882a593Smuzhiyun 	struct task_struct *kdb_current =
1247*4882a593Smuzhiyun 		kdb_curr_task(raw_smp_processor_id());
1248*4882a593Smuzhiyun 
1249*4882a593Smuzhiyun 	KDB_DEBUG_STATE("kdb_local 1", reason);
1250*4882a593Smuzhiyun 
1251*4882a593Smuzhiyun 	kdb_check_for_lockdown();
1252*4882a593Smuzhiyun 
1253*4882a593Smuzhiyun 	kdb_go_count = 0;
1254*4882a593Smuzhiyun 	if (reason == KDB_REASON_DEBUG) {
1255*4882a593Smuzhiyun 		/* special case below */
1256*4882a593Smuzhiyun 	} else {
1257*4882a593Smuzhiyun 		kdb_printf("\nEntering kdb (current=0x%px, pid %d) ",
1258*4882a593Smuzhiyun 			   kdb_current, kdb_current ? kdb_current->pid : 0);
1259*4882a593Smuzhiyun #if defined(CONFIG_SMP)
1260*4882a593Smuzhiyun 		kdb_printf("on processor %d ", raw_smp_processor_id());
1261*4882a593Smuzhiyun #endif
1262*4882a593Smuzhiyun 	}
1263*4882a593Smuzhiyun 
1264*4882a593Smuzhiyun 	switch (reason) {
1265*4882a593Smuzhiyun 	case KDB_REASON_DEBUG:
1266*4882a593Smuzhiyun 	{
1267*4882a593Smuzhiyun 		/*
1268*4882a593Smuzhiyun 		 * If re-entering kdb after a single step
1269*4882a593Smuzhiyun 		 * command, don't print the message.
1270*4882a593Smuzhiyun 		 */
1271*4882a593Smuzhiyun 		switch (db_result) {
1272*4882a593Smuzhiyun 		case KDB_DB_BPT:
1273*4882a593Smuzhiyun 			kdb_printf("\nEntering kdb (0x%px, pid %d) ",
1274*4882a593Smuzhiyun 				   kdb_current, kdb_current->pid);
1275*4882a593Smuzhiyun #if defined(CONFIG_SMP)
1276*4882a593Smuzhiyun 			kdb_printf("on processor %d ", raw_smp_processor_id());
1277*4882a593Smuzhiyun #endif
1278*4882a593Smuzhiyun 			kdb_printf("due to Debug @ " kdb_machreg_fmt "\n",
1279*4882a593Smuzhiyun 				   instruction_pointer(regs));
1280*4882a593Smuzhiyun 			break;
1281*4882a593Smuzhiyun 		case KDB_DB_SS:
1282*4882a593Smuzhiyun 			break;
1283*4882a593Smuzhiyun 		case KDB_DB_SSBPT:
1284*4882a593Smuzhiyun 			KDB_DEBUG_STATE("kdb_local 4", reason);
1285*4882a593Smuzhiyun 			return 1;	/* kdba_db_trap did the work */
1286*4882a593Smuzhiyun 		default:
1287*4882a593Smuzhiyun 			kdb_printf("kdb: Bad result from kdba_db_trap: %d\n",
1288*4882a593Smuzhiyun 				   db_result);
1289*4882a593Smuzhiyun 			break;
1290*4882a593Smuzhiyun 		}
1291*4882a593Smuzhiyun 
1292*4882a593Smuzhiyun 	}
1293*4882a593Smuzhiyun 		break;
1294*4882a593Smuzhiyun 	case KDB_REASON_ENTER:
1295*4882a593Smuzhiyun 		if (KDB_STATE(KEYBOARD))
1296*4882a593Smuzhiyun 			kdb_printf("due to Keyboard Entry\n");
1297*4882a593Smuzhiyun 		else
1298*4882a593Smuzhiyun 			kdb_printf("due to KDB_ENTER()\n");
1299*4882a593Smuzhiyun 		break;
1300*4882a593Smuzhiyun 	case KDB_REASON_KEYBOARD:
1301*4882a593Smuzhiyun 		KDB_STATE_SET(KEYBOARD);
1302*4882a593Smuzhiyun 		kdb_printf("due to Keyboard Entry\n");
1303*4882a593Smuzhiyun 		break;
1304*4882a593Smuzhiyun 	case KDB_REASON_ENTER_SLAVE:
1305*4882a593Smuzhiyun 		/* drop through, slaves only get released via cpu switch */
1306*4882a593Smuzhiyun 	case KDB_REASON_SWITCH:
1307*4882a593Smuzhiyun 		kdb_printf("due to cpu switch\n");
1308*4882a593Smuzhiyun 		break;
1309*4882a593Smuzhiyun 	case KDB_REASON_OOPS:
1310*4882a593Smuzhiyun 		kdb_printf("Oops: %s\n", kdb_diemsg);
1311*4882a593Smuzhiyun 		kdb_printf("due to oops @ " kdb_machreg_fmt "\n",
1312*4882a593Smuzhiyun 			   instruction_pointer(regs));
1313*4882a593Smuzhiyun 		kdb_dumpregs(regs);
1314*4882a593Smuzhiyun 		break;
1315*4882a593Smuzhiyun 	case KDB_REASON_SYSTEM_NMI:
1316*4882a593Smuzhiyun 		kdb_printf("due to System NonMaskable Interrupt\n");
1317*4882a593Smuzhiyun 		break;
1318*4882a593Smuzhiyun 	case KDB_REASON_NMI:
1319*4882a593Smuzhiyun 		kdb_printf("due to NonMaskable Interrupt @ "
1320*4882a593Smuzhiyun 			   kdb_machreg_fmt "\n",
1321*4882a593Smuzhiyun 			   instruction_pointer(regs));
1322*4882a593Smuzhiyun 		break;
1323*4882a593Smuzhiyun 	case KDB_REASON_SSTEP:
1324*4882a593Smuzhiyun 	case KDB_REASON_BREAK:
1325*4882a593Smuzhiyun 		kdb_printf("due to %s @ " kdb_machreg_fmt "\n",
1326*4882a593Smuzhiyun 			   reason == KDB_REASON_BREAK ?
1327*4882a593Smuzhiyun 			   "Breakpoint" : "SS trap", instruction_pointer(regs));
1328*4882a593Smuzhiyun 		/*
1329*4882a593Smuzhiyun 		 * Determine if this breakpoint is one that we
1330*4882a593Smuzhiyun 		 * are interested in.
1331*4882a593Smuzhiyun 		 */
1332*4882a593Smuzhiyun 		if (db_result != KDB_DB_BPT) {
1333*4882a593Smuzhiyun 			kdb_printf("kdb: error return from kdba_bp_trap: %d\n",
1334*4882a593Smuzhiyun 				   db_result);
1335*4882a593Smuzhiyun 			KDB_DEBUG_STATE("kdb_local 6", reason);
1336*4882a593Smuzhiyun 			return 0;	/* Not for us, dismiss it */
1337*4882a593Smuzhiyun 		}
1338*4882a593Smuzhiyun 		break;
1339*4882a593Smuzhiyun 	case KDB_REASON_RECURSE:
1340*4882a593Smuzhiyun 		kdb_printf("due to Recursion @ " kdb_machreg_fmt "\n",
1341*4882a593Smuzhiyun 			   instruction_pointer(regs));
1342*4882a593Smuzhiyun 		break;
1343*4882a593Smuzhiyun 	default:
1344*4882a593Smuzhiyun 		kdb_printf("kdb: unexpected reason code: %d\n", reason);
1345*4882a593Smuzhiyun 		KDB_DEBUG_STATE("kdb_local 8", reason);
1346*4882a593Smuzhiyun 		return 0;	/* Not for us, dismiss it */
1347*4882a593Smuzhiyun 	}
1348*4882a593Smuzhiyun 
1349*4882a593Smuzhiyun 	while (1) {
1350*4882a593Smuzhiyun 		/*
1351*4882a593Smuzhiyun 		 * Initialize pager context.
1352*4882a593Smuzhiyun 		 */
1353*4882a593Smuzhiyun 		kdb_nextline = 1;
1354*4882a593Smuzhiyun 		KDB_STATE_CLEAR(SUPPRESS);
1355*4882a593Smuzhiyun 		kdb_grepping_flag = 0;
1356*4882a593Smuzhiyun 		/* ensure the old search does not leak into '/' commands */
1357*4882a593Smuzhiyun 		kdb_grep_string[0] = '\0';
1358*4882a593Smuzhiyun 
1359*4882a593Smuzhiyun 		cmdbuf = cmd_cur;
1360*4882a593Smuzhiyun 		*cmdbuf = '\0';
1361*4882a593Smuzhiyun 		*(cmd_hist[cmd_head]) = '\0';
1362*4882a593Smuzhiyun 
1363*4882a593Smuzhiyun do_full_getstr:
1364*4882a593Smuzhiyun 		/* PROMPT can only be set if we have MEM_READ permission. */
1365*4882a593Smuzhiyun 		snprintf(kdb_prompt_str, CMD_BUFLEN, kdbgetenv("PROMPT"),
1366*4882a593Smuzhiyun 			 raw_smp_processor_id());
1367*4882a593Smuzhiyun 		if (defcmd_in_progress)
1368*4882a593Smuzhiyun 			strncat(kdb_prompt_str, "[defcmd]", CMD_BUFLEN);
1369*4882a593Smuzhiyun 
1370*4882a593Smuzhiyun 		/*
1371*4882a593Smuzhiyun 		 * Fetch command from keyboard
1372*4882a593Smuzhiyun 		 */
1373*4882a593Smuzhiyun 		cmdbuf = kdb_getstr(cmdbuf, CMD_BUFLEN, kdb_prompt_str);
1374*4882a593Smuzhiyun 		if (*cmdbuf != '\n') {
1375*4882a593Smuzhiyun 			if (*cmdbuf < 32) {
1376*4882a593Smuzhiyun 				if (cmdptr == cmd_head) {
1377*4882a593Smuzhiyun 					strscpy(cmd_hist[cmd_head], cmd_cur,
1378*4882a593Smuzhiyun 						CMD_BUFLEN);
1379*4882a593Smuzhiyun 					*(cmd_hist[cmd_head] +
1380*4882a593Smuzhiyun 					  strlen(cmd_hist[cmd_head])-1) = '\0';
1381*4882a593Smuzhiyun 				}
1382*4882a593Smuzhiyun 				if (!handle_ctrl_cmd(cmdbuf))
1383*4882a593Smuzhiyun 					*(cmd_cur+strlen(cmd_cur)-1) = '\0';
1384*4882a593Smuzhiyun 				cmdbuf = cmd_cur;
1385*4882a593Smuzhiyun 				goto do_full_getstr;
1386*4882a593Smuzhiyun 			} else {
1387*4882a593Smuzhiyun 				strscpy(cmd_hist[cmd_head], cmd_cur,
1388*4882a593Smuzhiyun 					CMD_BUFLEN);
1389*4882a593Smuzhiyun 			}
1390*4882a593Smuzhiyun 
1391*4882a593Smuzhiyun 			cmd_head = (cmd_head+1) % KDB_CMD_HISTORY_COUNT;
1392*4882a593Smuzhiyun 			if (cmd_head == cmd_tail)
1393*4882a593Smuzhiyun 				cmd_tail = (cmd_tail+1) % KDB_CMD_HISTORY_COUNT;
1394*4882a593Smuzhiyun 		}
1395*4882a593Smuzhiyun 
1396*4882a593Smuzhiyun 		cmdptr = cmd_head;
1397*4882a593Smuzhiyun 		diag = kdb_parse(cmdbuf);
1398*4882a593Smuzhiyun 		if (diag == KDB_NOTFOUND) {
1399*4882a593Smuzhiyun 			drop_newline(cmdbuf);
1400*4882a593Smuzhiyun 			kdb_printf("Unknown kdb command: '%s'\n", cmdbuf);
1401*4882a593Smuzhiyun 			diag = 0;
1402*4882a593Smuzhiyun 		}
1403*4882a593Smuzhiyun 		if (diag == KDB_CMD_GO
1404*4882a593Smuzhiyun 		 || diag == KDB_CMD_CPU
1405*4882a593Smuzhiyun 		 || diag == KDB_CMD_SS
1406*4882a593Smuzhiyun 		 || diag == KDB_CMD_KGDB)
1407*4882a593Smuzhiyun 			break;
1408*4882a593Smuzhiyun 
1409*4882a593Smuzhiyun 		if (diag)
1410*4882a593Smuzhiyun 			kdb_cmderror(diag);
1411*4882a593Smuzhiyun 	}
1412*4882a593Smuzhiyun 	KDB_DEBUG_STATE("kdb_local 9", diag);
1413*4882a593Smuzhiyun 	return diag;
1414*4882a593Smuzhiyun }
1415*4882a593Smuzhiyun 
1416*4882a593Smuzhiyun 
1417*4882a593Smuzhiyun /*
1418*4882a593Smuzhiyun  * kdb_print_state - Print the state data for the current processor
1419*4882a593Smuzhiyun  *	for debugging.
1420*4882a593Smuzhiyun  * Inputs:
1421*4882a593Smuzhiyun  *	text		Identifies the debug point
1422*4882a593Smuzhiyun  *	value		Any integer value to be printed, e.g. reason code.
1423*4882a593Smuzhiyun  */
kdb_print_state(const char * text,int value)1424*4882a593Smuzhiyun void kdb_print_state(const char *text, int value)
1425*4882a593Smuzhiyun {
1426*4882a593Smuzhiyun 	kdb_printf("state: %s cpu %d value %d initial %d state %x\n",
1427*4882a593Smuzhiyun 		   text, raw_smp_processor_id(), value, kdb_initial_cpu,
1428*4882a593Smuzhiyun 		   kdb_state);
1429*4882a593Smuzhiyun }
1430*4882a593Smuzhiyun 
1431*4882a593Smuzhiyun /*
1432*4882a593Smuzhiyun  * kdb_main_loop - After initial setup and assignment of the
1433*4882a593Smuzhiyun  *	controlling cpu, all cpus are in this loop.  One cpu is in
1434*4882a593Smuzhiyun  *	control and will issue the kdb prompt, the others will spin
1435*4882a593Smuzhiyun  *	until 'go' or cpu switch.
1436*4882a593Smuzhiyun  *
1437*4882a593Smuzhiyun  *	To get a consistent view of the kernel stacks for all
1438*4882a593Smuzhiyun  *	processes, this routine is invoked from the main kdb code via
1439*4882a593Smuzhiyun  *	an architecture specific routine.  kdba_main_loop is
1440*4882a593Smuzhiyun  *	responsible for making the kernel stacks consistent for all
1441*4882a593Smuzhiyun  *	processes, there should be no difference between a blocked
1442*4882a593Smuzhiyun  *	process and a running process as far as kdb is concerned.
1443*4882a593Smuzhiyun  * Inputs:
1444*4882a593Smuzhiyun  *	reason		The reason KDB was invoked
1445*4882a593Smuzhiyun  *	error		The hardware-defined error code
1446*4882a593Smuzhiyun  *	reason2		kdb's current reason code.
1447*4882a593Smuzhiyun  *			Initially error but can change
1448*4882a593Smuzhiyun  *			according to kdb state.
1449*4882a593Smuzhiyun  *	db_result	Result code from break or debug point.
1450*4882a593Smuzhiyun  *	regs		The exception frame at time of fault/breakpoint.
1451*4882a593Smuzhiyun  *			should always be valid.
1452*4882a593Smuzhiyun  * Returns:
1453*4882a593Smuzhiyun  *	0	KDB was invoked for an event which it wasn't responsible
1454*4882a593Smuzhiyun  *	1	KDB handled the event for which it was invoked.
1455*4882a593Smuzhiyun  */
kdb_main_loop(kdb_reason_t reason,kdb_reason_t reason2,int error,kdb_dbtrap_t db_result,struct pt_regs * regs)1456*4882a593Smuzhiyun int kdb_main_loop(kdb_reason_t reason, kdb_reason_t reason2, int error,
1457*4882a593Smuzhiyun 	      kdb_dbtrap_t db_result, struct pt_regs *regs)
1458*4882a593Smuzhiyun {
1459*4882a593Smuzhiyun 	int result = 1;
1460*4882a593Smuzhiyun 	/* Stay in kdb() until 'go', 'ss[b]' or an error */
1461*4882a593Smuzhiyun 	while (1) {
1462*4882a593Smuzhiyun 		/*
1463*4882a593Smuzhiyun 		 * All processors except the one that is in control
1464*4882a593Smuzhiyun 		 * will spin here.
1465*4882a593Smuzhiyun 		 */
1466*4882a593Smuzhiyun 		KDB_DEBUG_STATE("kdb_main_loop 1", reason);
1467*4882a593Smuzhiyun 		while (KDB_STATE(HOLD_CPU)) {
1468*4882a593Smuzhiyun 			/* state KDB is turned off by kdb_cpu to see if the
1469*4882a593Smuzhiyun 			 * other cpus are still live, each cpu in this loop
1470*4882a593Smuzhiyun 			 * turns it back on.
1471*4882a593Smuzhiyun 			 */
1472*4882a593Smuzhiyun 			if (!KDB_STATE(KDB))
1473*4882a593Smuzhiyun 				KDB_STATE_SET(KDB);
1474*4882a593Smuzhiyun 		}
1475*4882a593Smuzhiyun 
1476*4882a593Smuzhiyun 		KDB_STATE_CLEAR(SUPPRESS);
1477*4882a593Smuzhiyun 		KDB_DEBUG_STATE("kdb_main_loop 2", reason);
1478*4882a593Smuzhiyun 		if (KDB_STATE(LEAVING))
1479*4882a593Smuzhiyun 			break;	/* Another cpu said 'go' */
1480*4882a593Smuzhiyun 		/* Still using kdb, this processor is in control */
1481*4882a593Smuzhiyun 		result = kdb_local(reason2, error, regs, db_result);
1482*4882a593Smuzhiyun 		KDB_DEBUG_STATE("kdb_main_loop 3", result);
1483*4882a593Smuzhiyun 
1484*4882a593Smuzhiyun 		if (result == KDB_CMD_CPU)
1485*4882a593Smuzhiyun 			break;
1486*4882a593Smuzhiyun 
1487*4882a593Smuzhiyun 		if (result == KDB_CMD_SS) {
1488*4882a593Smuzhiyun 			KDB_STATE_SET(DOING_SS);
1489*4882a593Smuzhiyun 			break;
1490*4882a593Smuzhiyun 		}
1491*4882a593Smuzhiyun 
1492*4882a593Smuzhiyun 		if (result == KDB_CMD_KGDB) {
1493*4882a593Smuzhiyun 			if (!KDB_STATE(DOING_KGDB))
1494*4882a593Smuzhiyun 				kdb_printf("Entering please attach debugger "
1495*4882a593Smuzhiyun 					   "or use $D#44+ or $3#33\n");
1496*4882a593Smuzhiyun 			break;
1497*4882a593Smuzhiyun 		}
1498*4882a593Smuzhiyun 		if (result && result != 1 && result != KDB_CMD_GO)
1499*4882a593Smuzhiyun 			kdb_printf("\nUnexpected kdb_local return code %d\n",
1500*4882a593Smuzhiyun 				   result);
1501*4882a593Smuzhiyun 		KDB_DEBUG_STATE("kdb_main_loop 4", reason);
1502*4882a593Smuzhiyun 		break;
1503*4882a593Smuzhiyun 	}
1504*4882a593Smuzhiyun 	if (KDB_STATE(DOING_SS))
1505*4882a593Smuzhiyun 		KDB_STATE_CLEAR(SSBPT);
1506*4882a593Smuzhiyun 
1507*4882a593Smuzhiyun 	/* Clean up any keyboard devices before leaving */
1508*4882a593Smuzhiyun 	kdb_kbd_cleanup_state();
1509*4882a593Smuzhiyun 
1510*4882a593Smuzhiyun 	return result;
1511*4882a593Smuzhiyun }
1512*4882a593Smuzhiyun 
1513*4882a593Smuzhiyun /*
1514*4882a593Smuzhiyun  * kdb_mdr - This function implements the guts of the 'mdr', memory
1515*4882a593Smuzhiyun  * read command.
1516*4882a593Smuzhiyun  *	mdr  <addr arg>,<byte count>
1517*4882a593Smuzhiyun  * Inputs:
1518*4882a593Smuzhiyun  *	addr	Start address
1519*4882a593Smuzhiyun  *	count	Number of bytes
1520*4882a593Smuzhiyun  * Returns:
1521*4882a593Smuzhiyun  *	Always 0.  Any errors are detected and printed by kdb_getarea.
1522*4882a593Smuzhiyun  */
kdb_mdr(unsigned long addr,unsigned int count)1523*4882a593Smuzhiyun static int kdb_mdr(unsigned long addr, unsigned int count)
1524*4882a593Smuzhiyun {
1525*4882a593Smuzhiyun 	unsigned char c;
1526*4882a593Smuzhiyun 	while (count--) {
1527*4882a593Smuzhiyun 		if (kdb_getarea(c, addr))
1528*4882a593Smuzhiyun 			return 0;
1529*4882a593Smuzhiyun 		kdb_printf("%02x", c);
1530*4882a593Smuzhiyun 		addr++;
1531*4882a593Smuzhiyun 	}
1532*4882a593Smuzhiyun 	kdb_printf("\n");
1533*4882a593Smuzhiyun 	return 0;
1534*4882a593Smuzhiyun }
1535*4882a593Smuzhiyun 
1536*4882a593Smuzhiyun /*
1537*4882a593Smuzhiyun  * kdb_md - This function implements the 'md', 'md1', 'md2', 'md4',
1538*4882a593Smuzhiyun  *	'md8' 'mdr' and 'mds' commands.
1539*4882a593Smuzhiyun  *
1540*4882a593Smuzhiyun  *	md|mds  [<addr arg> [<line count> [<radix>]]]
1541*4882a593Smuzhiyun  *	mdWcN	[<addr arg> [<line count> [<radix>]]]
1542*4882a593Smuzhiyun  *		where W = is the width (1, 2, 4 or 8) and N is the count.
1543*4882a593Smuzhiyun  *		for eg., md1c20 reads 20 bytes, 1 at a time.
1544*4882a593Smuzhiyun  *	mdr  <addr arg>,<byte count>
1545*4882a593Smuzhiyun  */
kdb_md_line(const char * fmtstr,unsigned long addr,int symbolic,int nosect,int bytesperword,int num,int repeat,int phys)1546*4882a593Smuzhiyun static void kdb_md_line(const char *fmtstr, unsigned long addr,
1547*4882a593Smuzhiyun 			int symbolic, int nosect, int bytesperword,
1548*4882a593Smuzhiyun 			int num, int repeat, int phys)
1549*4882a593Smuzhiyun {
1550*4882a593Smuzhiyun 	/* print just one line of data */
1551*4882a593Smuzhiyun 	kdb_symtab_t symtab;
1552*4882a593Smuzhiyun 	char cbuf[32];
1553*4882a593Smuzhiyun 	char *c = cbuf;
1554*4882a593Smuzhiyun 	int i;
1555*4882a593Smuzhiyun 	int j;
1556*4882a593Smuzhiyun 	unsigned long word;
1557*4882a593Smuzhiyun 
1558*4882a593Smuzhiyun 	memset(cbuf, '\0', sizeof(cbuf));
1559*4882a593Smuzhiyun 	if (phys)
1560*4882a593Smuzhiyun 		kdb_printf("phys " kdb_machreg_fmt0 " ", addr);
1561*4882a593Smuzhiyun 	else
1562*4882a593Smuzhiyun 		kdb_printf(kdb_machreg_fmt0 " ", addr);
1563*4882a593Smuzhiyun 
1564*4882a593Smuzhiyun 	for (i = 0; i < num && repeat--; i++) {
1565*4882a593Smuzhiyun 		if (phys) {
1566*4882a593Smuzhiyun 			if (kdb_getphysword(&word, addr, bytesperword))
1567*4882a593Smuzhiyun 				break;
1568*4882a593Smuzhiyun 		} else if (kdb_getword(&word, addr, bytesperword))
1569*4882a593Smuzhiyun 			break;
1570*4882a593Smuzhiyun 		kdb_printf(fmtstr, word);
1571*4882a593Smuzhiyun 		if (symbolic)
1572*4882a593Smuzhiyun 			kdbnearsym(word, &symtab);
1573*4882a593Smuzhiyun 		else
1574*4882a593Smuzhiyun 			memset(&symtab, 0, sizeof(symtab));
1575*4882a593Smuzhiyun 		if (symtab.sym_name) {
1576*4882a593Smuzhiyun 			kdb_symbol_print(word, &symtab, 0);
1577*4882a593Smuzhiyun 			if (!nosect) {
1578*4882a593Smuzhiyun 				kdb_printf("\n");
1579*4882a593Smuzhiyun 				kdb_printf("                       %s %s "
1580*4882a593Smuzhiyun 					   kdb_machreg_fmt " "
1581*4882a593Smuzhiyun 					   kdb_machreg_fmt " "
1582*4882a593Smuzhiyun 					   kdb_machreg_fmt, symtab.mod_name,
1583*4882a593Smuzhiyun 					   symtab.sec_name, symtab.sec_start,
1584*4882a593Smuzhiyun 					   symtab.sym_start, symtab.sym_end);
1585*4882a593Smuzhiyun 			}
1586*4882a593Smuzhiyun 			addr += bytesperword;
1587*4882a593Smuzhiyun 		} else {
1588*4882a593Smuzhiyun 			union {
1589*4882a593Smuzhiyun 				u64 word;
1590*4882a593Smuzhiyun 				unsigned char c[8];
1591*4882a593Smuzhiyun 			} wc;
1592*4882a593Smuzhiyun 			unsigned char *cp;
1593*4882a593Smuzhiyun #ifdef	__BIG_ENDIAN
1594*4882a593Smuzhiyun 			cp = wc.c + 8 - bytesperword;
1595*4882a593Smuzhiyun #else
1596*4882a593Smuzhiyun 			cp = wc.c;
1597*4882a593Smuzhiyun #endif
1598*4882a593Smuzhiyun 			wc.word = word;
1599*4882a593Smuzhiyun #define printable_char(c) \
1600*4882a593Smuzhiyun 	({unsigned char __c = c; isascii(__c) && isprint(__c) ? __c : '.'; })
1601*4882a593Smuzhiyun 			for (j = 0; j < bytesperword; j++)
1602*4882a593Smuzhiyun 				*c++ = printable_char(*cp++);
1603*4882a593Smuzhiyun 			addr += bytesperword;
1604*4882a593Smuzhiyun #undef printable_char
1605*4882a593Smuzhiyun 		}
1606*4882a593Smuzhiyun 	}
1607*4882a593Smuzhiyun 	kdb_printf("%*s %s\n", (int)((num-i)*(2*bytesperword + 1)+1),
1608*4882a593Smuzhiyun 		   " ", cbuf);
1609*4882a593Smuzhiyun }
1610*4882a593Smuzhiyun 
kdb_md(int argc,const char ** argv)1611*4882a593Smuzhiyun static int kdb_md(int argc, const char **argv)
1612*4882a593Smuzhiyun {
1613*4882a593Smuzhiyun 	static unsigned long last_addr;
1614*4882a593Smuzhiyun 	static int last_radix, last_bytesperword, last_repeat;
1615*4882a593Smuzhiyun 	int radix = 16, mdcount = 8, bytesperword = KDB_WORD_SIZE, repeat;
1616*4882a593Smuzhiyun 	int nosect = 0;
1617*4882a593Smuzhiyun 	char fmtchar, fmtstr[64];
1618*4882a593Smuzhiyun 	unsigned long addr;
1619*4882a593Smuzhiyun 	unsigned long word;
1620*4882a593Smuzhiyun 	long offset = 0;
1621*4882a593Smuzhiyun 	int symbolic = 0;
1622*4882a593Smuzhiyun 	int valid = 0;
1623*4882a593Smuzhiyun 	int phys = 0;
1624*4882a593Smuzhiyun 	int raw = 0;
1625*4882a593Smuzhiyun 
1626*4882a593Smuzhiyun 	kdbgetintenv("MDCOUNT", &mdcount);
1627*4882a593Smuzhiyun 	kdbgetintenv("RADIX", &radix);
1628*4882a593Smuzhiyun 	kdbgetintenv("BYTESPERWORD", &bytesperword);
1629*4882a593Smuzhiyun 
1630*4882a593Smuzhiyun 	/* Assume 'md <addr>' and start with environment values */
1631*4882a593Smuzhiyun 	repeat = mdcount * 16 / bytesperword;
1632*4882a593Smuzhiyun 
1633*4882a593Smuzhiyun 	if (strcmp(argv[0], "mdr") == 0) {
1634*4882a593Smuzhiyun 		if (argc == 2 || (argc == 0 && last_addr != 0))
1635*4882a593Smuzhiyun 			valid = raw = 1;
1636*4882a593Smuzhiyun 		else
1637*4882a593Smuzhiyun 			return KDB_ARGCOUNT;
1638*4882a593Smuzhiyun 	} else if (isdigit(argv[0][2])) {
1639*4882a593Smuzhiyun 		bytesperword = (int)(argv[0][2] - '0');
1640*4882a593Smuzhiyun 		if (bytesperword == 0) {
1641*4882a593Smuzhiyun 			bytesperword = last_bytesperword;
1642*4882a593Smuzhiyun 			if (bytesperword == 0)
1643*4882a593Smuzhiyun 				bytesperword = 4;
1644*4882a593Smuzhiyun 		}
1645*4882a593Smuzhiyun 		last_bytesperword = bytesperword;
1646*4882a593Smuzhiyun 		repeat = mdcount * 16 / bytesperword;
1647*4882a593Smuzhiyun 		if (!argv[0][3])
1648*4882a593Smuzhiyun 			valid = 1;
1649*4882a593Smuzhiyun 		else if (argv[0][3] == 'c' && argv[0][4]) {
1650*4882a593Smuzhiyun 			char *p;
1651*4882a593Smuzhiyun 			repeat = simple_strtoul(argv[0] + 4, &p, 10);
1652*4882a593Smuzhiyun 			mdcount = ((repeat * bytesperword) + 15) / 16;
1653*4882a593Smuzhiyun 			valid = !*p;
1654*4882a593Smuzhiyun 		}
1655*4882a593Smuzhiyun 		last_repeat = repeat;
1656*4882a593Smuzhiyun 	} else if (strcmp(argv[0], "md") == 0)
1657*4882a593Smuzhiyun 		valid = 1;
1658*4882a593Smuzhiyun 	else if (strcmp(argv[0], "mds") == 0)
1659*4882a593Smuzhiyun 		valid = 1;
1660*4882a593Smuzhiyun 	else if (strcmp(argv[0], "mdp") == 0) {
1661*4882a593Smuzhiyun 		phys = valid = 1;
1662*4882a593Smuzhiyun 	}
1663*4882a593Smuzhiyun 	if (!valid)
1664*4882a593Smuzhiyun 		return KDB_NOTFOUND;
1665*4882a593Smuzhiyun 
1666*4882a593Smuzhiyun 	if (argc == 0) {
1667*4882a593Smuzhiyun 		if (last_addr == 0)
1668*4882a593Smuzhiyun 			return KDB_ARGCOUNT;
1669*4882a593Smuzhiyun 		addr = last_addr;
1670*4882a593Smuzhiyun 		radix = last_radix;
1671*4882a593Smuzhiyun 		bytesperword = last_bytesperword;
1672*4882a593Smuzhiyun 		repeat = last_repeat;
1673*4882a593Smuzhiyun 		if (raw)
1674*4882a593Smuzhiyun 			mdcount = repeat;
1675*4882a593Smuzhiyun 		else
1676*4882a593Smuzhiyun 			mdcount = ((repeat * bytesperword) + 15) / 16;
1677*4882a593Smuzhiyun 	}
1678*4882a593Smuzhiyun 
1679*4882a593Smuzhiyun 	if (argc) {
1680*4882a593Smuzhiyun 		unsigned long val;
1681*4882a593Smuzhiyun 		int diag, nextarg = 1;
1682*4882a593Smuzhiyun 		diag = kdbgetaddrarg(argc, argv, &nextarg, &addr,
1683*4882a593Smuzhiyun 				     &offset, NULL);
1684*4882a593Smuzhiyun 		if (diag)
1685*4882a593Smuzhiyun 			return diag;
1686*4882a593Smuzhiyun 		if (argc > nextarg+2)
1687*4882a593Smuzhiyun 			return KDB_ARGCOUNT;
1688*4882a593Smuzhiyun 
1689*4882a593Smuzhiyun 		if (argc >= nextarg) {
1690*4882a593Smuzhiyun 			diag = kdbgetularg(argv[nextarg], &val);
1691*4882a593Smuzhiyun 			if (!diag) {
1692*4882a593Smuzhiyun 				mdcount = (int) val;
1693*4882a593Smuzhiyun 				if (raw)
1694*4882a593Smuzhiyun 					repeat = mdcount;
1695*4882a593Smuzhiyun 				else
1696*4882a593Smuzhiyun 					repeat = mdcount * 16 / bytesperword;
1697*4882a593Smuzhiyun 			}
1698*4882a593Smuzhiyun 		}
1699*4882a593Smuzhiyun 		if (argc >= nextarg+1) {
1700*4882a593Smuzhiyun 			diag = kdbgetularg(argv[nextarg+1], &val);
1701*4882a593Smuzhiyun 			if (!diag)
1702*4882a593Smuzhiyun 				radix = (int) val;
1703*4882a593Smuzhiyun 		}
1704*4882a593Smuzhiyun 	}
1705*4882a593Smuzhiyun 
1706*4882a593Smuzhiyun 	if (strcmp(argv[0], "mdr") == 0) {
1707*4882a593Smuzhiyun 		int ret;
1708*4882a593Smuzhiyun 		last_addr = addr;
1709*4882a593Smuzhiyun 		ret = kdb_mdr(addr, mdcount);
1710*4882a593Smuzhiyun 		last_addr += mdcount;
1711*4882a593Smuzhiyun 		last_repeat = mdcount;
1712*4882a593Smuzhiyun 		last_bytesperword = bytesperword; // to make REPEAT happy
1713*4882a593Smuzhiyun 		return ret;
1714*4882a593Smuzhiyun 	}
1715*4882a593Smuzhiyun 
1716*4882a593Smuzhiyun 	switch (radix) {
1717*4882a593Smuzhiyun 	case 10:
1718*4882a593Smuzhiyun 		fmtchar = 'd';
1719*4882a593Smuzhiyun 		break;
1720*4882a593Smuzhiyun 	case 16:
1721*4882a593Smuzhiyun 		fmtchar = 'x';
1722*4882a593Smuzhiyun 		break;
1723*4882a593Smuzhiyun 	case 8:
1724*4882a593Smuzhiyun 		fmtchar = 'o';
1725*4882a593Smuzhiyun 		break;
1726*4882a593Smuzhiyun 	default:
1727*4882a593Smuzhiyun 		return KDB_BADRADIX;
1728*4882a593Smuzhiyun 	}
1729*4882a593Smuzhiyun 
1730*4882a593Smuzhiyun 	last_radix = radix;
1731*4882a593Smuzhiyun 
1732*4882a593Smuzhiyun 	if (bytesperword > KDB_WORD_SIZE)
1733*4882a593Smuzhiyun 		return KDB_BADWIDTH;
1734*4882a593Smuzhiyun 
1735*4882a593Smuzhiyun 	switch (bytesperword) {
1736*4882a593Smuzhiyun 	case 8:
1737*4882a593Smuzhiyun 		sprintf(fmtstr, "%%16.16l%c ", fmtchar);
1738*4882a593Smuzhiyun 		break;
1739*4882a593Smuzhiyun 	case 4:
1740*4882a593Smuzhiyun 		sprintf(fmtstr, "%%8.8l%c ", fmtchar);
1741*4882a593Smuzhiyun 		break;
1742*4882a593Smuzhiyun 	case 2:
1743*4882a593Smuzhiyun 		sprintf(fmtstr, "%%4.4l%c ", fmtchar);
1744*4882a593Smuzhiyun 		break;
1745*4882a593Smuzhiyun 	case 1:
1746*4882a593Smuzhiyun 		sprintf(fmtstr, "%%2.2l%c ", fmtchar);
1747*4882a593Smuzhiyun 		break;
1748*4882a593Smuzhiyun 	default:
1749*4882a593Smuzhiyun 		return KDB_BADWIDTH;
1750*4882a593Smuzhiyun 	}
1751*4882a593Smuzhiyun 
1752*4882a593Smuzhiyun 	last_repeat = repeat;
1753*4882a593Smuzhiyun 	last_bytesperword = bytesperword;
1754*4882a593Smuzhiyun 
1755*4882a593Smuzhiyun 	if (strcmp(argv[0], "mds") == 0) {
1756*4882a593Smuzhiyun 		symbolic = 1;
1757*4882a593Smuzhiyun 		/* Do not save these changes as last_*, they are temporary mds
1758*4882a593Smuzhiyun 		 * overrides.
1759*4882a593Smuzhiyun 		 */
1760*4882a593Smuzhiyun 		bytesperword = KDB_WORD_SIZE;
1761*4882a593Smuzhiyun 		repeat = mdcount;
1762*4882a593Smuzhiyun 		kdbgetintenv("NOSECT", &nosect);
1763*4882a593Smuzhiyun 	}
1764*4882a593Smuzhiyun 
1765*4882a593Smuzhiyun 	/* Round address down modulo BYTESPERWORD */
1766*4882a593Smuzhiyun 
1767*4882a593Smuzhiyun 	addr &= ~(bytesperword-1);
1768*4882a593Smuzhiyun 
1769*4882a593Smuzhiyun 	while (repeat > 0) {
1770*4882a593Smuzhiyun 		unsigned long a;
1771*4882a593Smuzhiyun 		int n, z, num = (symbolic ? 1 : (16 / bytesperword));
1772*4882a593Smuzhiyun 
1773*4882a593Smuzhiyun 		if (KDB_FLAG(CMD_INTERRUPT))
1774*4882a593Smuzhiyun 			return 0;
1775*4882a593Smuzhiyun 		for (a = addr, z = 0; z < repeat; a += bytesperword, ++z) {
1776*4882a593Smuzhiyun 			if (phys) {
1777*4882a593Smuzhiyun 				if (kdb_getphysword(&word, a, bytesperword)
1778*4882a593Smuzhiyun 						|| word)
1779*4882a593Smuzhiyun 					break;
1780*4882a593Smuzhiyun 			} else if (kdb_getword(&word, a, bytesperword) || word)
1781*4882a593Smuzhiyun 				break;
1782*4882a593Smuzhiyun 		}
1783*4882a593Smuzhiyun 		n = min(num, repeat);
1784*4882a593Smuzhiyun 		kdb_md_line(fmtstr, addr, symbolic, nosect, bytesperword,
1785*4882a593Smuzhiyun 			    num, repeat, phys);
1786*4882a593Smuzhiyun 		addr += bytesperword * n;
1787*4882a593Smuzhiyun 		repeat -= n;
1788*4882a593Smuzhiyun 		z = (z + num - 1) / num;
1789*4882a593Smuzhiyun 		if (z > 2) {
1790*4882a593Smuzhiyun 			int s = num * (z-2);
1791*4882a593Smuzhiyun 			kdb_printf(kdb_machreg_fmt0 "-" kdb_machreg_fmt0
1792*4882a593Smuzhiyun 				   " zero suppressed\n",
1793*4882a593Smuzhiyun 				addr, addr + bytesperword * s - 1);
1794*4882a593Smuzhiyun 			addr += bytesperword * s;
1795*4882a593Smuzhiyun 			repeat -= s;
1796*4882a593Smuzhiyun 		}
1797*4882a593Smuzhiyun 	}
1798*4882a593Smuzhiyun 	last_addr = addr;
1799*4882a593Smuzhiyun 
1800*4882a593Smuzhiyun 	return 0;
1801*4882a593Smuzhiyun }
1802*4882a593Smuzhiyun 
1803*4882a593Smuzhiyun /*
1804*4882a593Smuzhiyun  * kdb_mm - This function implements the 'mm' command.
1805*4882a593Smuzhiyun  *	mm address-expression new-value
1806*4882a593Smuzhiyun  * Remarks:
1807*4882a593Smuzhiyun  *	mm works on machine words, mmW works on bytes.
1808*4882a593Smuzhiyun  */
kdb_mm(int argc,const char ** argv)1809*4882a593Smuzhiyun static int kdb_mm(int argc, const char **argv)
1810*4882a593Smuzhiyun {
1811*4882a593Smuzhiyun 	int diag;
1812*4882a593Smuzhiyun 	unsigned long addr;
1813*4882a593Smuzhiyun 	long offset = 0;
1814*4882a593Smuzhiyun 	unsigned long contents;
1815*4882a593Smuzhiyun 	int nextarg;
1816*4882a593Smuzhiyun 	int width;
1817*4882a593Smuzhiyun 
1818*4882a593Smuzhiyun 	if (argv[0][2] && !isdigit(argv[0][2]))
1819*4882a593Smuzhiyun 		return KDB_NOTFOUND;
1820*4882a593Smuzhiyun 
1821*4882a593Smuzhiyun 	if (argc < 2)
1822*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
1823*4882a593Smuzhiyun 
1824*4882a593Smuzhiyun 	nextarg = 1;
1825*4882a593Smuzhiyun 	diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL);
1826*4882a593Smuzhiyun 	if (diag)
1827*4882a593Smuzhiyun 		return diag;
1828*4882a593Smuzhiyun 
1829*4882a593Smuzhiyun 	if (nextarg > argc)
1830*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
1831*4882a593Smuzhiyun 	diag = kdbgetaddrarg(argc, argv, &nextarg, &contents, NULL, NULL);
1832*4882a593Smuzhiyun 	if (diag)
1833*4882a593Smuzhiyun 		return diag;
1834*4882a593Smuzhiyun 
1835*4882a593Smuzhiyun 	if (nextarg != argc + 1)
1836*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
1837*4882a593Smuzhiyun 
1838*4882a593Smuzhiyun 	width = argv[0][2] ? (argv[0][2] - '0') : (KDB_WORD_SIZE);
1839*4882a593Smuzhiyun 	diag = kdb_putword(addr, contents, width);
1840*4882a593Smuzhiyun 	if (diag)
1841*4882a593Smuzhiyun 		return diag;
1842*4882a593Smuzhiyun 
1843*4882a593Smuzhiyun 	kdb_printf(kdb_machreg_fmt " = " kdb_machreg_fmt "\n", addr, contents);
1844*4882a593Smuzhiyun 
1845*4882a593Smuzhiyun 	return 0;
1846*4882a593Smuzhiyun }
1847*4882a593Smuzhiyun 
1848*4882a593Smuzhiyun /*
1849*4882a593Smuzhiyun  * kdb_go - This function implements the 'go' command.
1850*4882a593Smuzhiyun  *	go [address-expression]
1851*4882a593Smuzhiyun  */
kdb_go(int argc,const char ** argv)1852*4882a593Smuzhiyun static int kdb_go(int argc, const char **argv)
1853*4882a593Smuzhiyun {
1854*4882a593Smuzhiyun 	unsigned long addr;
1855*4882a593Smuzhiyun 	int diag;
1856*4882a593Smuzhiyun 	int nextarg;
1857*4882a593Smuzhiyun 	long offset;
1858*4882a593Smuzhiyun 
1859*4882a593Smuzhiyun 	if (raw_smp_processor_id() != kdb_initial_cpu) {
1860*4882a593Smuzhiyun 		kdb_printf("go must execute on the entry cpu, "
1861*4882a593Smuzhiyun 			   "please use \"cpu %d\" and then execute go\n",
1862*4882a593Smuzhiyun 			   kdb_initial_cpu);
1863*4882a593Smuzhiyun 		return KDB_BADCPUNUM;
1864*4882a593Smuzhiyun 	}
1865*4882a593Smuzhiyun 	if (argc == 1) {
1866*4882a593Smuzhiyun 		nextarg = 1;
1867*4882a593Smuzhiyun 		diag = kdbgetaddrarg(argc, argv, &nextarg,
1868*4882a593Smuzhiyun 				     &addr, &offset, NULL);
1869*4882a593Smuzhiyun 		if (diag)
1870*4882a593Smuzhiyun 			return diag;
1871*4882a593Smuzhiyun 	} else if (argc) {
1872*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
1873*4882a593Smuzhiyun 	}
1874*4882a593Smuzhiyun 
1875*4882a593Smuzhiyun 	diag = KDB_CMD_GO;
1876*4882a593Smuzhiyun 	if (KDB_FLAG(CATASTROPHIC)) {
1877*4882a593Smuzhiyun 		kdb_printf("Catastrophic error detected\n");
1878*4882a593Smuzhiyun 		kdb_printf("kdb_continue_catastrophic=%d, ",
1879*4882a593Smuzhiyun 			kdb_continue_catastrophic);
1880*4882a593Smuzhiyun 		if (kdb_continue_catastrophic == 0 && kdb_go_count++ == 0) {
1881*4882a593Smuzhiyun 			kdb_printf("type go a second time if you really want "
1882*4882a593Smuzhiyun 				   "to continue\n");
1883*4882a593Smuzhiyun 			return 0;
1884*4882a593Smuzhiyun 		}
1885*4882a593Smuzhiyun 		if (kdb_continue_catastrophic == 2) {
1886*4882a593Smuzhiyun 			kdb_printf("forcing reboot\n");
1887*4882a593Smuzhiyun 			kdb_reboot(0, NULL);
1888*4882a593Smuzhiyun 		}
1889*4882a593Smuzhiyun 		kdb_printf("attempting to continue\n");
1890*4882a593Smuzhiyun 	}
1891*4882a593Smuzhiyun 	return diag;
1892*4882a593Smuzhiyun }
1893*4882a593Smuzhiyun 
1894*4882a593Smuzhiyun /*
1895*4882a593Smuzhiyun  * kdb_rd - This function implements the 'rd' command.
1896*4882a593Smuzhiyun  */
kdb_rd(int argc,const char ** argv)1897*4882a593Smuzhiyun static int kdb_rd(int argc, const char **argv)
1898*4882a593Smuzhiyun {
1899*4882a593Smuzhiyun 	int len = kdb_check_regs();
1900*4882a593Smuzhiyun #if DBG_MAX_REG_NUM > 0
1901*4882a593Smuzhiyun 	int i;
1902*4882a593Smuzhiyun 	char *rname;
1903*4882a593Smuzhiyun 	int rsize;
1904*4882a593Smuzhiyun 	u64 reg64;
1905*4882a593Smuzhiyun 	u32 reg32;
1906*4882a593Smuzhiyun 	u16 reg16;
1907*4882a593Smuzhiyun 	u8 reg8;
1908*4882a593Smuzhiyun 
1909*4882a593Smuzhiyun 	if (len)
1910*4882a593Smuzhiyun 		return len;
1911*4882a593Smuzhiyun 
1912*4882a593Smuzhiyun 	for (i = 0; i < DBG_MAX_REG_NUM; i++) {
1913*4882a593Smuzhiyun 		rsize = dbg_reg_def[i].size * 2;
1914*4882a593Smuzhiyun 		if (rsize > 16)
1915*4882a593Smuzhiyun 			rsize = 2;
1916*4882a593Smuzhiyun 		if (len + strlen(dbg_reg_def[i].name) + 4 + rsize > 80) {
1917*4882a593Smuzhiyun 			len = 0;
1918*4882a593Smuzhiyun 			kdb_printf("\n");
1919*4882a593Smuzhiyun 		}
1920*4882a593Smuzhiyun 		if (len)
1921*4882a593Smuzhiyun 			len += kdb_printf("  ");
1922*4882a593Smuzhiyun 		switch(dbg_reg_def[i].size * 8) {
1923*4882a593Smuzhiyun 		case 8:
1924*4882a593Smuzhiyun 			rname = dbg_get_reg(i, &reg8, kdb_current_regs);
1925*4882a593Smuzhiyun 			if (!rname)
1926*4882a593Smuzhiyun 				break;
1927*4882a593Smuzhiyun 			len += kdb_printf("%s: %02x", rname, reg8);
1928*4882a593Smuzhiyun 			break;
1929*4882a593Smuzhiyun 		case 16:
1930*4882a593Smuzhiyun 			rname = dbg_get_reg(i, &reg16, kdb_current_regs);
1931*4882a593Smuzhiyun 			if (!rname)
1932*4882a593Smuzhiyun 				break;
1933*4882a593Smuzhiyun 			len += kdb_printf("%s: %04x", rname, reg16);
1934*4882a593Smuzhiyun 			break;
1935*4882a593Smuzhiyun 		case 32:
1936*4882a593Smuzhiyun 			rname = dbg_get_reg(i, &reg32, kdb_current_regs);
1937*4882a593Smuzhiyun 			if (!rname)
1938*4882a593Smuzhiyun 				break;
1939*4882a593Smuzhiyun 			len += kdb_printf("%s: %08x", rname, reg32);
1940*4882a593Smuzhiyun 			break;
1941*4882a593Smuzhiyun 		case 64:
1942*4882a593Smuzhiyun 			rname = dbg_get_reg(i, &reg64, kdb_current_regs);
1943*4882a593Smuzhiyun 			if (!rname)
1944*4882a593Smuzhiyun 				break;
1945*4882a593Smuzhiyun 			len += kdb_printf("%s: %016llx", rname, reg64);
1946*4882a593Smuzhiyun 			break;
1947*4882a593Smuzhiyun 		default:
1948*4882a593Smuzhiyun 			len += kdb_printf("%s: ??", dbg_reg_def[i].name);
1949*4882a593Smuzhiyun 		}
1950*4882a593Smuzhiyun 	}
1951*4882a593Smuzhiyun 	kdb_printf("\n");
1952*4882a593Smuzhiyun #else
1953*4882a593Smuzhiyun 	if (len)
1954*4882a593Smuzhiyun 		return len;
1955*4882a593Smuzhiyun 
1956*4882a593Smuzhiyun 	kdb_dumpregs(kdb_current_regs);
1957*4882a593Smuzhiyun #endif
1958*4882a593Smuzhiyun 	return 0;
1959*4882a593Smuzhiyun }
1960*4882a593Smuzhiyun 
1961*4882a593Smuzhiyun /*
1962*4882a593Smuzhiyun  * kdb_rm - This function implements the 'rm' (register modify)  command.
1963*4882a593Smuzhiyun  *	rm register-name new-contents
1964*4882a593Smuzhiyun  * Remarks:
1965*4882a593Smuzhiyun  *	Allows register modification with the same restrictions as gdb
1966*4882a593Smuzhiyun  */
kdb_rm(int argc,const char ** argv)1967*4882a593Smuzhiyun static int kdb_rm(int argc, const char **argv)
1968*4882a593Smuzhiyun {
1969*4882a593Smuzhiyun #if DBG_MAX_REG_NUM > 0
1970*4882a593Smuzhiyun 	int diag;
1971*4882a593Smuzhiyun 	const char *rname;
1972*4882a593Smuzhiyun 	int i;
1973*4882a593Smuzhiyun 	u64 reg64;
1974*4882a593Smuzhiyun 	u32 reg32;
1975*4882a593Smuzhiyun 	u16 reg16;
1976*4882a593Smuzhiyun 	u8 reg8;
1977*4882a593Smuzhiyun 
1978*4882a593Smuzhiyun 	if (argc != 2)
1979*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
1980*4882a593Smuzhiyun 	/*
1981*4882a593Smuzhiyun 	 * Allow presence or absence of leading '%' symbol.
1982*4882a593Smuzhiyun 	 */
1983*4882a593Smuzhiyun 	rname = argv[1];
1984*4882a593Smuzhiyun 	if (*rname == '%')
1985*4882a593Smuzhiyun 		rname++;
1986*4882a593Smuzhiyun 
1987*4882a593Smuzhiyun 	diag = kdbgetu64arg(argv[2], &reg64);
1988*4882a593Smuzhiyun 	if (diag)
1989*4882a593Smuzhiyun 		return diag;
1990*4882a593Smuzhiyun 
1991*4882a593Smuzhiyun 	diag = kdb_check_regs();
1992*4882a593Smuzhiyun 	if (diag)
1993*4882a593Smuzhiyun 		return diag;
1994*4882a593Smuzhiyun 
1995*4882a593Smuzhiyun 	diag = KDB_BADREG;
1996*4882a593Smuzhiyun 	for (i = 0; i < DBG_MAX_REG_NUM; i++) {
1997*4882a593Smuzhiyun 		if (strcmp(rname, dbg_reg_def[i].name) == 0) {
1998*4882a593Smuzhiyun 			diag = 0;
1999*4882a593Smuzhiyun 			break;
2000*4882a593Smuzhiyun 		}
2001*4882a593Smuzhiyun 	}
2002*4882a593Smuzhiyun 	if (!diag) {
2003*4882a593Smuzhiyun 		switch(dbg_reg_def[i].size * 8) {
2004*4882a593Smuzhiyun 		case 8:
2005*4882a593Smuzhiyun 			reg8 = reg64;
2006*4882a593Smuzhiyun 			dbg_set_reg(i, &reg8, kdb_current_regs);
2007*4882a593Smuzhiyun 			break;
2008*4882a593Smuzhiyun 		case 16:
2009*4882a593Smuzhiyun 			reg16 = reg64;
2010*4882a593Smuzhiyun 			dbg_set_reg(i, &reg16, kdb_current_regs);
2011*4882a593Smuzhiyun 			break;
2012*4882a593Smuzhiyun 		case 32:
2013*4882a593Smuzhiyun 			reg32 = reg64;
2014*4882a593Smuzhiyun 			dbg_set_reg(i, &reg32, kdb_current_regs);
2015*4882a593Smuzhiyun 			break;
2016*4882a593Smuzhiyun 		case 64:
2017*4882a593Smuzhiyun 			dbg_set_reg(i, &reg64, kdb_current_regs);
2018*4882a593Smuzhiyun 			break;
2019*4882a593Smuzhiyun 		}
2020*4882a593Smuzhiyun 	}
2021*4882a593Smuzhiyun 	return diag;
2022*4882a593Smuzhiyun #else
2023*4882a593Smuzhiyun 	kdb_printf("ERROR: Register set currently not implemented\n");
2024*4882a593Smuzhiyun     return 0;
2025*4882a593Smuzhiyun #endif
2026*4882a593Smuzhiyun }
2027*4882a593Smuzhiyun 
2028*4882a593Smuzhiyun #if defined(CONFIG_MAGIC_SYSRQ)
2029*4882a593Smuzhiyun /*
2030*4882a593Smuzhiyun  * kdb_sr - This function implements the 'sr' (SYSRQ key) command
2031*4882a593Smuzhiyun  *	which interfaces to the soi-disant MAGIC SYSRQ functionality.
2032*4882a593Smuzhiyun  *		sr <magic-sysrq-code>
2033*4882a593Smuzhiyun  */
kdb_sr(int argc,const char ** argv)2034*4882a593Smuzhiyun static int kdb_sr(int argc, const char **argv)
2035*4882a593Smuzhiyun {
2036*4882a593Smuzhiyun 	bool check_mask =
2037*4882a593Smuzhiyun 	    !kdb_check_flags(KDB_ENABLE_ALL, kdb_cmd_enabled, false);
2038*4882a593Smuzhiyun 
2039*4882a593Smuzhiyun 	if (argc != 1)
2040*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2041*4882a593Smuzhiyun 
2042*4882a593Smuzhiyun 	kdb_trap_printk++;
2043*4882a593Smuzhiyun 	__handle_sysrq(*argv[1], check_mask);
2044*4882a593Smuzhiyun 	kdb_trap_printk--;
2045*4882a593Smuzhiyun 
2046*4882a593Smuzhiyun 	return 0;
2047*4882a593Smuzhiyun }
2048*4882a593Smuzhiyun #endif	/* CONFIG_MAGIC_SYSRQ */
2049*4882a593Smuzhiyun 
2050*4882a593Smuzhiyun /*
2051*4882a593Smuzhiyun  * kdb_ef - This function implements the 'regs' (display exception
2052*4882a593Smuzhiyun  *	frame) command.  This command takes an address and expects to
2053*4882a593Smuzhiyun  *	find an exception frame at that address, formats and prints
2054*4882a593Smuzhiyun  *	it.
2055*4882a593Smuzhiyun  *		regs address-expression
2056*4882a593Smuzhiyun  * Remarks:
2057*4882a593Smuzhiyun  *	Not done yet.
2058*4882a593Smuzhiyun  */
kdb_ef(int argc,const char ** argv)2059*4882a593Smuzhiyun static int kdb_ef(int argc, const char **argv)
2060*4882a593Smuzhiyun {
2061*4882a593Smuzhiyun 	int diag;
2062*4882a593Smuzhiyun 	unsigned long addr;
2063*4882a593Smuzhiyun 	long offset;
2064*4882a593Smuzhiyun 	int nextarg;
2065*4882a593Smuzhiyun 
2066*4882a593Smuzhiyun 	if (argc != 1)
2067*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2068*4882a593Smuzhiyun 
2069*4882a593Smuzhiyun 	nextarg = 1;
2070*4882a593Smuzhiyun 	diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL);
2071*4882a593Smuzhiyun 	if (diag)
2072*4882a593Smuzhiyun 		return diag;
2073*4882a593Smuzhiyun 	show_regs((struct pt_regs *)addr);
2074*4882a593Smuzhiyun 	return 0;
2075*4882a593Smuzhiyun }
2076*4882a593Smuzhiyun 
2077*4882a593Smuzhiyun #if defined(CONFIG_MODULES)
2078*4882a593Smuzhiyun /*
2079*4882a593Smuzhiyun  * kdb_lsmod - This function implements the 'lsmod' command.  Lists
2080*4882a593Smuzhiyun  *	currently loaded kernel modules.
2081*4882a593Smuzhiyun  *	Mostly taken from userland lsmod.
2082*4882a593Smuzhiyun  */
kdb_lsmod(int argc,const char ** argv)2083*4882a593Smuzhiyun static int kdb_lsmod(int argc, const char **argv)
2084*4882a593Smuzhiyun {
2085*4882a593Smuzhiyun 	struct module *mod;
2086*4882a593Smuzhiyun 
2087*4882a593Smuzhiyun 	if (argc != 0)
2088*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2089*4882a593Smuzhiyun 
2090*4882a593Smuzhiyun 	kdb_printf("Module                  Size  modstruct     Used by\n");
2091*4882a593Smuzhiyun 	list_for_each_entry(mod, kdb_modules, list) {
2092*4882a593Smuzhiyun 		if (mod->state == MODULE_STATE_UNFORMED)
2093*4882a593Smuzhiyun 			continue;
2094*4882a593Smuzhiyun 
2095*4882a593Smuzhiyun 		kdb_printf("%-20s%8u  0x%px ", mod->name,
2096*4882a593Smuzhiyun 			   mod->core_layout.size, (void *)mod);
2097*4882a593Smuzhiyun #ifdef CONFIG_MODULE_UNLOAD
2098*4882a593Smuzhiyun 		kdb_printf("%4d ", module_refcount(mod));
2099*4882a593Smuzhiyun #endif
2100*4882a593Smuzhiyun 		if (mod->state == MODULE_STATE_GOING)
2101*4882a593Smuzhiyun 			kdb_printf(" (Unloading)");
2102*4882a593Smuzhiyun 		else if (mod->state == MODULE_STATE_COMING)
2103*4882a593Smuzhiyun 			kdb_printf(" (Loading)");
2104*4882a593Smuzhiyun 		else
2105*4882a593Smuzhiyun 			kdb_printf(" (Live)");
2106*4882a593Smuzhiyun 		kdb_printf(" 0x%px", mod->core_layout.base);
2107*4882a593Smuzhiyun 
2108*4882a593Smuzhiyun #ifdef CONFIG_MODULE_UNLOAD
2109*4882a593Smuzhiyun 		{
2110*4882a593Smuzhiyun 			struct module_use *use;
2111*4882a593Smuzhiyun 			kdb_printf(" [ ");
2112*4882a593Smuzhiyun 			list_for_each_entry(use, &mod->source_list,
2113*4882a593Smuzhiyun 					    source_list)
2114*4882a593Smuzhiyun 				kdb_printf("%s ", use->target->name);
2115*4882a593Smuzhiyun 			kdb_printf("]\n");
2116*4882a593Smuzhiyun 		}
2117*4882a593Smuzhiyun #endif
2118*4882a593Smuzhiyun 	}
2119*4882a593Smuzhiyun 
2120*4882a593Smuzhiyun 	return 0;
2121*4882a593Smuzhiyun }
2122*4882a593Smuzhiyun 
2123*4882a593Smuzhiyun #endif	/* CONFIG_MODULES */
2124*4882a593Smuzhiyun 
2125*4882a593Smuzhiyun /*
2126*4882a593Smuzhiyun  * kdb_env - This function implements the 'env' command.  Display the
2127*4882a593Smuzhiyun  *	current environment variables.
2128*4882a593Smuzhiyun  */
2129*4882a593Smuzhiyun 
kdb_env(int argc,const char ** argv)2130*4882a593Smuzhiyun static int kdb_env(int argc, const char **argv)
2131*4882a593Smuzhiyun {
2132*4882a593Smuzhiyun 	int i;
2133*4882a593Smuzhiyun 
2134*4882a593Smuzhiyun 	for (i = 0; i < __nenv; i++) {
2135*4882a593Smuzhiyun 		if (__env[i])
2136*4882a593Smuzhiyun 			kdb_printf("%s\n", __env[i]);
2137*4882a593Smuzhiyun 	}
2138*4882a593Smuzhiyun 
2139*4882a593Smuzhiyun 	if (KDB_DEBUG(MASK))
2140*4882a593Smuzhiyun 		kdb_printf("KDBDEBUG=0x%x\n",
2141*4882a593Smuzhiyun 			(kdb_flags & KDB_DEBUG(MASK)) >> KDB_DEBUG_FLAG_SHIFT);
2142*4882a593Smuzhiyun 
2143*4882a593Smuzhiyun 	return 0;
2144*4882a593Smuzhiyun }
2145*4882a593Smuzhiyun 
2146*4882a593Smuzhiyun #ifdef CONFIG_PRINTK
2147*4882a593Smuzhiyun /*
2148*4882a593Smuzhiyun  * kdb_dmesg - This function implements the 'dmesg' command to display
2149*4882a593Smuzhiyun  *	the contents of the syslog buffer.
2150*4882a593Smuzhiyun  *		dmesg [lines] [adjust]
2151*4882a593Smuzhiyun  */
kdb_dmesg(int argc,const char ** argv)2152*4882a593Smuzhiyun static int kdb_dmesg(int argc, const char **argv)
2153*4882a593Smuzhiyun {
2154*4882a593Smuzhiyun 	int diag;
2155*4882a593Smuzhiyun 	int logging;
2156*4882a593Smuzhiyun 	int lines = 0;
2157*4882a593Smuzhiyun 	int adjust = 0;
2158*4882a593Smuzhiyun 	int n = 0;
2159*4882a593Smuzhiyun 	int skip = 0;
2160*4882a593Smuzhiyun 	struct kmsg_dumper dumper = { .active = 1 };
2161*4882a593Smuzhiyun 	size_t len;
2162*4882a593Smuzhiyun 	char buf[201];
2163*4882a593Smuzhiyun 
2164*4882a593Smuzhiyun 	if (argc > 2)
2165*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2166*4882a593Smuzhiyun 	if (argc) {
2167*4882a593Smuzhiyun 		char *cp;
2168*4882a593Smuzhiyun 		lines = simple_strtol(argv[1], &cp, 0);
2169*4882a593Smuzhiyun 		if (*cp)
2170*4882a593Smuzhiyun 			lines = 0;
2171*4882a593Smuzhiyun 		if (argc > 1) {
2172*4882a593Smuzhiyun 			adjust = simple_strtoul(argv[2], &cp, 0);
2173*4882a593Smuzhiyun 			if (*cp || adjust < 0)
2174*4882a593Smuzhiyun 				adjust = 0;
2175*4882a593Smuzhiyun 		}
2176*4882a593Smuzhiyun 	}
2177*4882a593Smuzhiyun 
2178*4882a593Smuzhiyun 	/* disable LOGGING if set */
2179*4882a593Smuzhiyun 	diag = kdbgetintenv("LOGGING", &logging);
2180*4882a593Smuzhiyun 	if (!diag && logging) {
2181*4882a593Smuzhiyun 		const char *setargs[] = { "set", "LOGGING", "0" };
2182*4882a593Smuzhiyun 		kdb_set(2, setargs);
2183*4882a593Smuzhiyun 	}
2184*4882a593Smuzhiyun 
2185*4882a593Smuzhiyun 	kmsg_dump_rewind_nolock(&dumper);
2186*4882a593Smuzhiyun 	while (kmsg_dump_get_line_nolock(&dumper, 1, NULL, 0, NULL))
2187*4882a593Smuzhiyun 		n++;
2188*4882a593Smuzhiyun 
2189*4882a593Smuzhiyun 	if (lines < 0) {
2190*4882a593Smuzhiyun 		if (adjust >= n)
2191*4882a593Smuzhiyun 			kdb_printf("buffer only contains %d lines, nothing "
2192*4882a593Smuzhiyun 				   "printed\n", n);
2193*4882a593Smuzhiyun 		else if (adjust - lines >= n)
2194*4882a593Smuzhiyun 			kdb_printf("buffer only contains %d lines, last %d "
2195*4882a593Smuzhiyun 				   "lines printed\n", n, n - adjust);
2196*4882a593Smuzhiyun 		skip = adjust;
2197*4882a593Smuzhiyun 		lines = abs(lines);
2198*4882a593Smuzhiyun 	} else if (lines > 0) {
2199*4882a593Smuzhiyun 		skip = n - lines - adjust;
2200*4882a593Smuzhiyun 		lines = abs(lines);
2201*4882a593Smuzhiyun 		if (adjust >= n) {
2202*4882a593Smuzhiyun 			kdb_printf("buffer only contains %d lines, "
2203*4882a593Smuzhiyun 				   "nothing printed\n", n);
2204*4882a593Smuzhiyun 			skip = n;
2205*4882a593Smuzhiyun 		} else if (skip < 0) {
2206*4882a593Smuzhiyun 			lines += skip;
2207*4882a593Smuzhiyun 			skip = 0;
2208*4882a593Smuzhiyun 			kdb_printf("buffer only contains %d lines, first "
2209*4882a593Smuzhiyun 				   "%d lines printed\n", n, lines);
2210*4882a593Smuzhiyun 		}
2211*4882a593Smuzhiyun 	} else {
2212*4882a593Smuzhiyun 		lines = n;
2213*4882a593Smuzhiyun 	}
2214*4882a593Smuzhiyun 
2215*4882a593Smuzhiyun 	if (skip >= n || skip < 0)
2216*4882a593Smuzhiyun 		return 0;
2217*4882a593Smuzhiyun 
2218*4882a593Smuzhiyun 	kmsg_dump_rewind_nolock(&dumper);
2219*4882a593Smuzhiyun 	while (kmsg_dump_get_line_nolock(&dumper, 1, buf, sizeof(buf), &len)) {
2220*4882a593Smuzhiyun 		if (skip) {
2221*4882a593Smuzhiyun 			skip--;
2222*4882a593Smuzhiyun 			continue;
2223*4882a593Smuzhiyun 		}
2224*4882a593Smuzhiyun 		if (!lines--)
2225*4882a593Smuzhiyun 			break;
2226*4882a593Smuzhiyun 		if (KDB_FLAG(CMD_INTERRUPT))
2227*4882a593Smuzhiyun 			return 0;
2228*4882a593Smuzhiyun 
2229*4882a593Smuzhiyun 		kdb_printf("%.*s\n", (int)len - 1, buf);
2230*4882a593Smuzhiyun 	}
2231*4882a593Smuzhiyun 
2232*4882a593Smuzhiyun 	return 0;
2233*4882a593Smuzhiyun }
2234*4882a593Smuzhiyun #endif /* CONFIG_PRINTK */
2235*4882a593Smuzhiyun 
2236*4882a593Smuzhiyun /* Make sure we balance enable/disable calls, must disable first. */
2237*4882a593Smuzhiyun static atomic_t kdb_nmi_disabled;
2238*4882a593Smuzhiyun 
kdb_disable_nmi(int argc,const char * argv[])2239*4882a593Smuzhiyun static int kdb_disable_nmi(int argc, const char *argv[])
2240*4882a593Smuzhiyun {
2241*4882a593Smuzhiyun 	if (atomic_read(&kdb_nmi_disabled))
2242*4882a593Smuzhiyun 		return 0;
2243*4882a593Smuzhiyun 	atomic_set(&kdb_nmi_disabled, 1);
2244*4882a593Smuzhiyun 	arch_kgdb_ops.enable_nmi(0);
2245*4882a593Smuzhiyun 	return 0;
2246*4882a593Smuzhiyun }
2247*4882a593Smuzhiyun 
kdb_param_enable_nmi(const char * val,const struct kernel_param * kp)2248*4882a593Smuzhiyun static int kdb_param_enable_nmi(const char *val, const struct kernel_param *kp)
2249*4882a593Smuzhiyun {
2250*4882a593Smuzhiyun 	if (!atomic_add_unless(&kdb_nmi_disabled, -1, 0))
2251*4882a593Smuzhiyun 		return -EINVAL;
2252*4882a593Smuzhiyun 	arch_kgdb_ops.enable_nmi(1);
2253*4882a593Smuzhiyun 	return 0;
2254*4882a593Smuzhiyun }
2255*4882a593Smuzhiyun 
2256*4882a593Smuzhiyun static const struct kernel_param_ops kdb_param_ops_enable_nmi = {
2257*4882a593Smuzhiyun 	.set = kdb_param_enable_nmi,
2258*4882a593Smuzhiyun };
2259*4882a593Smuzhiyun module_param_cb(enable_nmi, &kdb_param_ops_enable_nmi, NULL, 0600);
2260*4882a593Smuzhiyun 
2261*4882a593Smuzhiyun /*
2262*4882a593Smuzhiyun  * kdb_cpu - This function implements the 'cpu' command.
2263*4882a593Smuzhiyun  *	cpu	[<cpunum>]
2264*4882a593Smuzhiyun  * Returns:
2265*4882a593Smuzhiyun  *	KDB_CMD_CPU for success, a kdb diagnostic if error
2266*4882a593Smuzhiyun  */
kdb_cpu_status(void)2267*4882a593Smuzhiyun static void kdb_cpu_status(void)
2268*4882a593Smuzhiyun {
2269*4882a593Smuzhiyun 	int i, start_cpu, first_print = 1;
2270*4882a593Smuzhiyun 	char state, prev_state = '?';
2271*4882a593Smuzhiyun 
2272*4882a593Smuzhiyun 	kdb_printf("Currently on cpu %d\n", raw_smp_processor_id());
2273*4882a593Smuzhiyun 	kdb_printf("Available cpus: ");
2274*4882a593Smuzhiyun 	for (start_cpu = -1, i = 0; i < NR_CPUS; i++) {
2275*4882a593Smuzhiyun 		if (!cpu_online(i)) {
2276*4882a593Smuzhiyun 			state = 'F';	/* cpu is offline */
2277*4882a593Smuzhiyun 		} else if (!kgdb_info[i].enter_kgdb) {
2278*4882a593Smuzhiyun 			state = 'D';	/* cpu is online but unresponsive */
2279*4882a593Smuzhiyun 		} else {
2280*4882a593Smuzhiyun 			state = ' ';	/* cpu is responding to kdb */
2281*4882a593Smuzhiyun 			if (kdb_task_state_char(KDB_TSK(i)) == 'I')
2282*4882a593Smuzhiyun 				state = 'I';	/* idle task */
2283*4882a593Smuzhiyun 		}
2284*4882a593Smuzhiyun 		if (state != prev_state) {
2285*4882a593Smuzhiyun 			if (prev_state != '?') {
2286*4882a593Smuzhiyun 				if (!first_print)
2287*4882a593Smuzhiyun 					kdb_printf(", ");
2288*4882a593Smuzhiyun 				first_print = 0;
2289*4882a593Smuzhiyun 				kdb_printf("%d", start_cpu);
2290*4882a593Smuzhiyun 				if (start_cpu < i-1)
2291*4882a593Smuzhiyun 					kdb_printf("-%d", i-1);
2292*4882a593Smuzhiyun 				if (prev_state != ' ')
2293*4882a593Smuzhiyun 					kdb_printf("(%c)", prev_state);
2294*4882a593Smuzhiyun 			}
2295*4882a593Smuzhiyun 			prev_state = state;
2296*4882a593Smuzhiyun 			start_cpu = i;
2297*4882a593Smuzhiyun 		}
2298*4882a593Smuzhiyun 	}
2299*4882a593Smuzhiyun 	/* print the trailing cpus, ignoring them if they are all offline */
2300*4882a593Smuzhiyun 	if (prev_state != 'F') {
2301*4882a593Smuzhiyun 		if (!first_print)
2302*4882a593Smuzhiyun 			kdb_printf(", ");
2303*4882a593Smuzhiyun 		kdb_printf("%d", start_cpu);
2304*4882a593Smuzhiyun 		if (start_cpu < i-1)
2305*4882a593Smuzhiyun 			kdb_printf("-%d", i-1);
2306*4882a593Smuzhiyun 		if (prev_state != ' ')
2307*4882a593Smuzhiyun 			kdb_printf("(%c)", prev_state);
2308*4882a593Smuzhiyun 	}
2309*4882a593Smuzhiyun 	kdb_printf("\n");
2310*4882a593Smuzhiyun }
2311*4882a593Smuzhiyun 
kdb_cpu(int argc,const char ** argv)2312*4882a593Smuzhiyun static int kdb_cpu(int argc, const char **argv)
2313*4882a593Smuzhiyun {
2314*4882a593Smuzhiyun 	unsigned long cpunum;
2315*4882a593Smuzhiyun 	int diag;
2316*4882a593Smuzhiyun 
2317*4882a593Smuzhiyun 	if (argc == 0) {
2318*4882a593Smuzhiyun 		kdb_cpu_status();
2319*4882a593Smuzhiyun 		return 0;
2320*4882a593Smuzhiyun 	}
2321*4882a593Smuzhiyun 
2322*4882a593Smuzhiyun 	if (argc != 1)
2323*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2324*4882a593Smuzhiyun 
2325*4882a593Smuzhiyun 	diag = kdbgetularg(argv[1], &cpunum);
2326*4882a593Smuzhiyun 	if (diag)
2327*4882a593Smuzhiyun 		return diag;
2328*4882a593Smuzhiyun 
2329*4882a593Smuzhiyun 	/*
2330*4882a593Smuzhiyun 	 * Validate cpunum
2331*4882a593Smuzhiyun 	 */
2332*4882a593Smuzhiyun 	if ((cpunum >= CONFIG_NR_CPUS) || !kgdb_info[cpunum].enter_kgdb)
2333*4882a593Smuzhiyun 		return KDB_BADCPUNUM;
2334*4882a593Smuzhiyun 
2335*4882a593Smuzhiyun 	dbg_switch_cpu = cpunum;
2336*4882a593Smuzhiyun 
2337*4882a593Smuzhiyun 	/*
2338*4882a593Smuzhiyun 	 * Switch to other cpu
2339*4882a593Smuzhiyun 	 */
2340*4882a593Smuzhiyun 	return KDB_CMD_CPU;
2341*4882a593Smuzhiyun }
2342*4882a593Smuzhiyun 
2343*4882a593Smuzhiyun /* The user may not realize that ps/bta with no parameters does not print idle
2344*4882a593Smuzhiyun  * or sleeping system daemon processes, so tell them how many were suppressed.
2345*4882a593Smuzhiyun  */
kdb_ps_suppressed(void)2346*4882a593Smuzhiyun void kdb_ps_suppressed(void)
2347*4882a593Smuzhiyun {
2348*4882a593Smuzhiyun 	int idle = 0, daemon = 0;
2349*4882a593Smuzhiyun 	unsigned long mask_I = kdb_task_state_string("I"),
2350*4882a593Smuzhiyun 		      mask_M = kdb_task_state_string("M");
2351*4882a593Smuzhiyun 	unsigned long cpu;
2352*4882a593Smuzhiyun 	const struct task_struct *p, *g;
2353*4882a593Smuzhiyun 	for_each_online_cpu(cpu) {
2354*4882a593Smuzhiyun 		p = kdb_curr_task(cpu);
2355*4882a593Smuzhiyun 		if (kdb_task_state(p, mask_I))
2356*4882a593Smuzhiyun 			++idle;
2357*4882a593Smuzhiyun 	}
2358*4882a593Smuzhiyun 	for_each_process_thread(g, p) {
2359*4882a593Smuzhiyun 		if (kdb_task_state(p, mask_M))
2360*4882a593Smuzhiyun 			++daemon;
2361*4882a593Smuzhiyun 	}
2362*4882a593Smuzhiyun 	if (idle || daemon) {
2363*4882a593Smuzhiyun 		if (idle)
2364*4882a593Smuzhiyun 			kdb_printf("%d idle process%s (state I)%s\n",
2365*4882a593Smuzhiyun 				   idle, idle == 1 ? "" : "es",
2366*4882a593Smuzhiyun 				   daemon ? " and " : "");
2367*4882a593Smuzhiyun 		if (daemon)
2368*4882a593Smuzhiyun 			kdb_printf("%d sleeping system daemon (state M) "
2369*4882a593Smuzhiyun 				   "process%s", daemon,
2370*4882a593Smuzhiyun 				   daemon == 1 ? "" : "es");
2371*4882a593Smuzhiyun 		kdb_printf(" suppressed,\nuse 'ps A' to see all.\n");
2372*4882a593Smuzhiyun 	}
2373*4882a593Smuzhiyun }
2374*4882a593Smuzhiyun 
2375*4882a593Smuzhiyun /*
2376*4882a593Smuzhiyun  * kdb_ps - This function implements the 'ps' command which shows a
2377*4882a593Smuzhiyun  *	list of the active processes.
2378*4882a593Smuzhiyun  *		ps [DRSTCZEUIMA]   All processes, optionally filtered by state
2379*4882a593Smuzhiyun  */
kdb_ps1(const struct task_struct * p)2380*4882a593Smuzhiyun void kdb_ps1(const struct task_struct *p)
2381*4882a593Smuzhiyun {
2382*4882a593Smuzhiyun 	int cpu;
2383*4882a593Smuzhiyun 	unsigned long tmp;
2384*4882a593Smuzhiyun 
2385*4882a593Smuzhiyun 	if (!p ||
2386*4882a593Smuzhiyun 	    copy_from_kernel_nofault(&tmp, (char *)p, sizeof(unsigned long)))
2387*4882a593Smuzhiyun 		return;
2388*4882a593Smuzhiyun 
2389*4882a593Smuzhiyun 	cpu = kdb_process_cpu(p);
2390*4882a593Smuzhiyun 	kdb_printf("0x%px %8d %8d  %d %4d   %c  0x%px %c%s\n",
2391*4882a593Smuzhiyun 		   (void *)p, p->pid, p->parent->pid,
2392*4882a593Smuzhiyun 		   kdb_task_has_cpu(p), kdb_process_cpu(p),
2393*4882a593Smuzhiyun 		   kdb_task_state_char(p),
2394*4882a593Smuzhiyun 		   (void *)(&p->thread),
2395*4882a593Smuzhiyun 		   p == kdb_curr_task(raw_smp_processor_id()) ? '*' : ' ',
2396*4882a593Smuzhiyun 		   p->comm);
2397*4882a593Smuzhiyun 	if (kdb_task_has_cpu(p)) {
2398*4882a593Smuzhiyun 		if (!KDB_TSK(cpu)) {
2399*4882a593Smuzhiyun 			kdb_printf("  Error: no saved data for this cpu\n");
2400*4882a593Smuzhiyun 		} else {
2401*4882a593Smuzhiyun 			if (KDB_TSK(cpu) != p)
2402*4882a593Smuzhiyun 				kdb_printf("  Error: does not match running "
2403*4882a593Smuzhiyun 				   "process table (0x%px)\n", KDB_TSK(cpu));
2404*4882a593Smuzhiyun 		}
2405*4882a593Smuzhiyun 	}
2406*4882a593Smuzhiyun }
2407*4882a593Smuzhiyun 
kdb_ps(int argc,const char ** argv)2408*4882a593Smuzhiyun static int kdb_ps(int argc, const char **argv)
2409*4882a593Smuzhiyun {
2410*4882a593Smuzhiyun 	struct task_struct *g, *p;
2411*4882a593Smuzhiyun 	unsigned long mask, cpu;
2412*4882a593Smuzhiyun 
2413*4882a593Smuzhiyun 	if (argc == 0)
2414*4882a593Smuzhiyun 		kdb_ps_suppressed();
2415*4882a593Smuzhiyun 	kdb_printf("%-*s      Pid   Parent [*] cpu State %-*s Command\n",
2416*4882a593Smuzhiyun 		(int)(2*sizeof(void *))+2, "Task Addr",
2417*4882a593Smuzhiyun 		(int)(2*sizeof(void *))+2, "Thread");
2418*4882a593Smuzhiyun 	mask = kdb_task_state_string(argc ? argv[1] : NULL);
2419*4882a593Smuzhiyun 	/* Run the active tasks first */
2420*4882a593Smuzhiyun 	for_each_online_cpu(cpu) {
2421*4882a593Smuzhiyun 		if (KDB_FLAG(CMD_INTERRUPT))
2422*4882a593Smuzhiyun 			return 0;
2423*4882a593Smuzhiyun 		p = kdb_curr_task(cpu);
2424*4882a593Smuzhiyun 		if (kdb_task_state(p, mask))
2425*4882a593Smuzhiyun 			kdb_ps1(p);
2426*4882a593Smuzhiyun 	}
2427*4882a593Smuzhiyun 	kdb_printf("\n");
2428*4882a593Smuzhiyun 	/* Now the real tasks */
2429*4882a593Smuzhiyun 	for_each_process_thread(g, p) {
2430*4882a593Smuzhiyun 		if (KDB_FLAG(CMD_INTERRUPT))
2431*4882a593Smuzhiyun 			return 0;
2432*4882a593Smuzhiyun 		if (kdb_task_state(p, mask))
2433*4882a593Smuzhiyun 			kdb_ps1(p);
2434*4882a593Smuzhiyun 	}
2435*4882a593Smuzhiyun 
2436*4882a593Smuzhiyun 	return 0;
2437*4882a593Smuzhiyun }
2438*4882a593Smuzhiyun 
2439*4882a593Smuzhiyun /*
2440*4882a593Smuzhiyun  * kdb_pid - This function implements the 'pid' command which switches
2441*4882a593Smuzhiyun  *	the currently active process.
2442*4882a593Smuzhiyun  *		pid [<pid> | R]
2443*4882a593Smuzhiyun  */
kdb_pid(int argc,const char ** argv)2444*4882a593Smuzhiyun static int kdb_pid(int argc, const char **argv)
2445*4882a593Smuzhiyun {
2446*4882a593Smuzhiyun 	struct task_struct *p;
2447*4882a593Smuzhiyun 	unsigned long val;
2448*4882a593Smuzhiyun 	int diag;
2449*4882a593Smuzhiyun 
2450*4882a593Smuzhiyun 	if (argc > 1)
2451*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2452*4882a593Smuzhiyun 
2453*4882a593Smuzhiyun 	if (argc) {
2454*4882a593Smuzhiyun 		if (strcmp(argv[1], "R") == 0) {
2455*4882a593Smuzhiyun 			p = KDB_TSK(kdb_initial_cpu);
2456*4882a593Smuzhiyun 		} else {
2457*4882a593Smuzhiyun 			diag = kdbgetularg(argv[1], &val);
2458*4882a593Smuzhiyun 			if (diag)
2459*4882a593Smuzhiyun 				return KDB_BADINT;
2460*4882a593Smuzhiyun 
2461*4882a593Smuzhiyun 			p = find_task_by_pid_ns((pid_t)val,	&init_pid_ns);
2462*4882a593Smuzhiyun 			if (!p) {
2463*4882a593Smuzhiyun 				kdb_printf("No task with pid=%d\n", (pid_t)val);
2464*4882a593Smuzhiyun 				return 0;
2465*4882a593Smuzhiyun 			}
2466*4882a593Smuzhiyun 		}
2467*4882a593Smuzhiyun 		kdb_set_current_task(p);
2468*4882a593Smuzhiyun 	}
2469*4882a593Smuzhiyun 	kdb_printf("KDB current process is %s(pid=%d)\n",
2470*4882a593Smuzhiyun 		   kdb_current_task->comm,
2471*4882a593Smuzhiyun 		   kdb_current_task->pid);
2472*4882a593Smuzhiyun 
2473*4882a593Smuzhiyun 	return 0;
2474*4882a593Smuzhiyun }
2475*4882a593Smuzhiyun 
kdb_kgdb(int argc,const char ** argv)2476*4882a593Smuzhiyun static int kdb_kgdb(int argc, const char **argv)
2477*4882a593Smuzhiyun {
2478*4882a593Smuzhiyun 	return KDB_CMD_KGDB;
2479*4882a593Smuzhiyun }
2480*4882a593Smuzhiyun 
2481*4882a593Smuzhiyun /*
2482*4882a593Smuzhiyun  * kdb_help - This function implements the 'help' and '?' commands.
2483*4882a593Smuzhiyun  */
kdb_help(int argc,const char ** argv)2484*4882a593Smuzhiyun static int kdb_help(int argc, const char **argv)
2485*4882a593Smuzhiyun {
2486*4882a593Smuzhiyun 	kdbtab_t *kt;
2487*4882a593Smuzhiyun 	int i;
2488*4882a593Smuzhiyun 
2489*4882a593Smuzhiyun 	kdb_printf("%-15.15s %-20.20s %s\n", "Command", "Usage", "Description");
2490*4882a593Smuzhiyun 	kdb_printf("-----------------------------"
2491*4882a593Smuzhiyun 		   "-----------------------------\n");
2492*4882a593Smuzhiyun 	for_each_kdbcmd(kt, i) {
2493*4882a593Smuzhiyun 		char *space = "";
2494*4882a593Smuzhiyun 		if (KDB_FLAG(CMD_INTERRUPT))
2495*4882a593Smuzhiyun 			return 0;
2496*4882a593Smuzhiyun 		if (!kt->cmd_name)
2497*4882a593Smuzhiyun 			continue;
2498*4882a593Smuzhiyun 		if (!kdb_check_flags(kt->cmd_flags, kdb_cmd_enabled, true))
2499*4882a593Smuzhiyun 			continue;
2500*4882a593Smuzhiyun 		if (strlen(kt->cmd_usage) > 20)
2501*4882a593Smuzhiyun 			space = "\n                                    ";
2502*4882a593Smuzhiyun 		kdb_printf("%-15.15s %-20s%s%s\n", kt->cmd_name,
2503*4882a593Smuzhiyun 			   kt->cmd_usage, space, kt->cmd_help);
2504*4882a593Smuzhiyun 	}
2505*4882a593Smuzhiyun 	return 0;
2506*4882a593Smuzhiyun }
2507*4882a593Smuzhiyun 
2508*4882a593Smuzhiyun /*
2509*4882a593Smuzhiyun  * kdb_kill - This function implements the 'kill' commands.
2510*4882a593Smuzhiyun  */
kdb_kill(int argc,const char ** argv)2511*4882a593Smuzhiyun static int kdb_kill(int argc, const char **argv)
2512*4882a593Smuzhiyun {
2513*4882a593Smuzhiyun 	long sig, pid;
2514*4882a593Smuzhiyun 	char *endp;
2515*4882a593Smuzhiyun 	struct task_struct *p;
2516*4882a593Smuzhiyun 
2517*4882a593Smuzhiyun 	if (argc != 2)
2518*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2519*4882a593Smuzhiyun 
2520*4882a593Smuzhiyun 	sig = simple_strtol(argv[1], &endp, 0);
2521*4882a593Smuzhiyun 	if (*endp)
2522*4882a593Smuzhiyun 		return KDB_BADINT;
2523*4882a593Smuzhiyun 	if ((sig >= 0) || !valid_signal(-sig)) {
2524*4882a593Smuzhiyun 		kdb_printf("Invalid signal parameter.<-signal>\n");
2525*4882a593Smuzhiyun 		return 0;
2526*4882a593Smuzhiyun 	}
2527*4882a593Smuzhiyun 	sig = -sig;
2528*4882a593Smuzhiyun 
2529*4882a593Smuzhiyun 	pid = simple_strtol(argv[2], &endp, 0);
2530*4882a593Smuzhiyun 	if (*endp)
2531*4882a593Smuzhiyun 		return KDB_BADINT;
2532*4882a593Smuzhiyun 	if (pid <= 0) {
2533*4882a593Smuzhiyun 		kdb_printf("Process ID must be large than 0.\n");
2534*4882a593Smuzhiyun 		return 0;
2535*4882a593Smuzhiyun 	}
2536*4882a593Smuzhiyun 
2537*4882a593Smuzhiyun 	/* Find the process. */
2538*4882a593Smuzhiyun 	p = find_task_by_pid_ns(pid, &init_pid_ns);
2539*4882a593Smuzhiyun 	if (!p) {
2540*4882a593Smuzhiyun 		kdb_printf("The specified process isn't found.\n");
2541*4882a593Smuzhiyun 		return 0;
2542*4882a593Smuzhiyun 	}
2543*4882a593Smuzhiyun 	p = p->group_leader;
2544*4882a593Smuzhiyun 	kdb_send_sig(p, sig);
2545*4882a593Smuzhiyun 	return 0;
2546*4882a593Smuzhiyun }
2547*4882a593Smuzhiyun 
2548*4882a593Smuzhiyun /*
2549*4882a593Smuzhiyun  * Most of this code has been lifted from kernel/timer.c::sys_sysinfo().
2550*4882a593Smuzhiyun  * I cannot call that code directly from kdb, it has an unconditional
2551*4882a593Smuzhiyun  * cli()/sti() and calls routines that take locks which can stop the debugger.
2552*4882a593Smuzhiyun  */
kdb_sysinfo(struct sysinfo * val)2553*4882a593Smuzhiyun static void kdb_sysinfo(struct sysinfo *val)
2554*4882a593Smuzhiyun {
2555*4882a593Smuzhiyun 	u64 uptime = ktime_get_mono_fast_ns();
2556*4882a593Smuzhiyun 
2557*4882a593Smuzhiyun 	memset(val, 0, sizeof(*val));
2558*4882a593Smuzhiyun 	val->uptime = div_u64(uptime, NSEC_PER_SEC);
2559*4882a593Smuzhiyun 	val->loads[0] = avenrun[0];
2560*4882a593Smuzhiyun 	val->loads[1] = avenrun[1];
2561*4882a593Smuzhiyun 	val->loads[2] = avenrun[2];
2562*4882a593Smuzhiyun 	val->procs = nr_threads-1;
2563*4882a593Smuzhiyun 	si_meminfo(val);
2564*4882a593Smuzhiyun 
2565*4882a593Smuzhiyun 	return;
2566*4882a593Smuzhiyun }
2567*4882a593Smuzhiyun 
2568*4882a593Smuzhiyun /*
2569*4882a593Smuzhiyun  * kdb_summary - This function implements the 'summary' command.
2570*4882a593Smuzhiyun  */
kdb_summary(int argc,const char ** argv)2571*4882a593Smuzhiyun static int kdb_summary(int argc, const char **argv)
2572*4882a593Smuzhiyun {
2573*4882a593Smuzhiyun 	time64_t now;
2574*4882a593Smuzhiyun 	struct tm tm;
2575*4882a593Smuzhiyun 	struct sysinfo val;
2576*4882a593Smuzhiyun 
2577*4882a593Smuzhiyun 	if (argc)
2578*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2579*4882a593Smuzhiyun 
2580*4882a593Smuzhiyun 	kdb_printf("sysname    %s\n", init_uts_ns.name.sysname);
2581*4882a593Smuzhiyun 	kdb_printf("release    %s\n", init_uts_ns.name.release);
2582*4882a593Smuzhiyun 	kdb_printf("version    %s\n", init_uts_ns.name.version);
2583*4882a593Smuzhiyun 	kdb_printf("machine    %s\n", init_uts_ns.name.machine);
2584*4882a593Smuzhiyun 	kdb_printf("nodename   %s\n", init_uts_ns.name.nodename);
2585*4882a593Smuzhiyun 	kdb_printf("domainname %s\n", init_uts_ns.name.domainname);
2586*4882a593Smuzhiyun 
2587*4882a593Smuzhiyun 	now = __ktime_get_real_seconds();
2588*4882a593Smuzhiyun 	time64_to_tm(now, 0, &tm);
2589*4882a593Smuzhiyun 	kdb_printf("date       %04ld-%02d-%02d %02d:%02d:%02d "
2590*4882a593Smuzhiyun 		   "tz_minuteswest %d\n",
2591*4882a593Smuzhiyun 		1900+tm.tm_year, tm.tm_mon+1, tm.tm_mday,
2592*4882a593Smuzhiyun 		tm.tm_hour, tm.tm_min, tm.tm_sec,
2593*4882a593Smuzhiyun 		sys_tz.tz_minuteswest);
2594*4882a593Smuzhiyun 
2595*4882a593Smuzhiyun 	kdb_sysinfo(&val);
2596*4882a593Smuzhiyun 	kdb_printf("uptime     ");
2597*4882a593Smuzhiyun 	if (val.uptime > (24*60*60)) {
2598*4882a593Smuzhiyun 		int days = val.uptime / (24*60*60);
2599*4882a593Smuzhiyun 		val.uptime %= (24*60*60);
2600*4882a593Smuzhiyun 		kdb_printf("%d day%s ", days, days == 1 ? "" : "s");
2601*4882a593Smuzhiyun 	}
2602*4882a593Smuzhiyun 	kdb_printf("%02ld:%02ld\n", val.uptime/(60*60), (val.uptime/60)%60);
2603*4882a593Smuzhiyun 
2604*4882a593Smuzhiyun 	kdb_printf("load avg   %ld.%02ld %ld.%02ld %ld.%02ld\n",
2605*4882a593Smuzhiyun 		LOAD_INT(val.loads[0]), LOAD_FRAC(val.loads[0]),
2606*4882a593Smuzhiyun 		LOAD_INT(val.loads[1]), LOAD_FRAC(val.loads[1]),
2607*4882a593Smuzhiyun 		LOAD_INT(val.loads[2]), LOAD_FRAC(val.loads[2]));
2608*4882a593Smuzhiyun 
2609*4882a593Smuzhiyun 	/* Display in kilobytes */
2610*4882a593Smuzhiyun #define K(x) ((x) << (PAGE_SHIFT - 10))
2611*4882a593Smuzhiyun 	kdb_printf("\nMemTotal:       %8lu kB\nMemFree:        %8lu kB\n"
2612*4882a593Smuzhiyun 		   "Buffers:        %8lu kB\n",
2613*4882a593Smuzhiyun 		   K(val.totalram), K(val.freeram), K(val.bufferram));
2614*4882a593Smuzhiyun 	return 0;
2615*4882a593Smuzhiyun }
2616*4882a593Smuzhiyun 
2617*4882a593Smuzhiyun /*
2618*4882a593Smuzhiyun  * kdb_per_cpu - This function implements the 'per_cpu' command.
2619*4882a593Smuzhiyun  */
kdb_per_cpu(int argc,const char ** argv)2620*4882a593Smuzhiyun static int kdb_per_cpu(int argc, const char **argv)
2621*4882a593Smuzhiyun {
2622*4882a593Smuzhiyun 	char fmtstr[64];
2623*4882a593Smuzhiyun 	int cpu, diag, nextarg = 1;
2624*4882a593Smuzhiyun 	unsigned long addr, symaddr, val, bytesperword = 0, whichcpu = ~0UL;
2625*4882a593Smuzhiyun 
2626*4882a593Smuzhiyun 	if (argc < 1 || argc > 3)
2627*4882a593Smuzhiyun 		return KDB_ARGCOUNT;
2628*4882a593Smuzhiyun 
2629*4882a593Smuzhiyun 	diag = kdbgetaddrarg(argc, argv, &nextarg, &symaddr, NULL, NULL);
2630*4882a593Smuzhiyun 	if (diag)
2631*4882a593Smuzhiyun 		return diag;
2632*4882a593Smuzhiyun 
2633*4882a593Smuzhiyun 	if (argc >= 2) {
2634*4882a593Smuzhiyun 		diag = kdbgetularg(argv[2], &bytesperword);
2635*4882a593Smuzhiyun 		if (diag)
2636*4882a593Smuzhiyun 			return diag;
2637*4882a593Smuzhiyun 	}
2638*4882a593Smuzhiyun 	if (!bytesperword)
2639*4882a593Smuzhiyun 		bytesperword = KDB_WORD_SIZE;
2640*4882a593Smuzhiyun 	else if (bytesperword > KDB_WORD_SIZE)
2641*4882a593Smuzhiyun 		return KDB_BADWIDTH;
2642*4882a593Smuzhiyun 	sprintf(fmtstr, "%%0%dlx ", (int)(2*bytesperword));
2643*4882a593Smuzhiyun 	if (argc >= 3) {
2644*4882a593Smuzhiyun 		diag = kdbgetularg(argv[3], &whichcpu);
2645*4882a593Smuzhiyun 		if (diag)
2646*4882a593Smuzhiyun 			return diag;
2647*4882a593Smuzhiyun 		if (whichcpu >= nr_cpu_ids || !cpu_online(whichcpu)) {
2648*4882a593Smuzhiyun 			kdb_printf("cpu %ld is not online\n", whichcpu);
2649*4882a593Smuzhiyun 			return KDB_BADCPUNUM;
2650*4882a593Smuzhiyun 		}
2651*4882a593Smuzhiyun 	}
2652*4882a593Smuzhiyun 
2653*4882a593Smuzhiyun 	/* Most architectures use __per_cpu_offset[cpu], some use
2654*4882a593Smuzhiyun 	 * __per_cpu_offset(cpu), smp has no __per_cpu_offset.
2655*4882a593Smuzhiyun 	 */
2656*4882a593Smuzhiyun #ifdef	__per_cpu_offset
2657*4882a593Smuzhiyun #define KDB_PCU(cpu) __per_cpu_offset(cpu)
2658*4882a593Smuzhiyun #else
2659*4882a593Smuzhiyun #ifdef	CONFIG_SMP
2660*4882a593Smuzhiyun #define KDB_PCU(cpu) __per_cpu_offset[cpu]
2661*4882a593Smuzhiyun #else
2662*4882a593Smuzhiyun #define KDB_PCU(cpu) 0
2663*4882a593Smuzhiyun #endif
2664*4882a593Smuzhiyun #endif
2665*4882a593Smuzhiyun 	for_each_online_cpu(cpu) {
2666*4882a593Smuzhiyun 		if (KDB_FLAG(CMD_INTERRUPT))
2667*4882a593Smuzhiyun 			return 0;
2668*4882a593Smuzhiyun 
2669*4882a593Smuzhiyun 		if (whichcpu != ~0UL && whichcpu != cpu)
2670*4882a593Smuzhiyun 			continue;
2671*4882a593Smuzhiyun 		addr = symaddr + KDB_PCU(cpu);
2672*4882a593Smuzhiyun 		diag = kdb_getword(&val, addr, bytesperword);
2673*4882a593Smuzhiyun 		if (diag) {
2674*4882a593Smuzhiyun 			kdb_printf("%5d " kdb_bfd_vma_fmt0 " - unable to "
2675*4882a593Smuzhiyun 				   "read, diag=%d\n", cpu, addr, diag);
2676*4882a593Smuzhiyun 			continue;
2677*4882a593Smuzhiyun 		}
2678*4882a593Smuzhiyun 		kdb_printf("%5d ", cpu);
2679*4882a593Smuzhiyun 		kdb_md_line(fmtstr, addr,
2680*4882a593Smuzhiyun 			bytesperword == KDB_WORD_SIZE,
2681*4882a593Smuzhiyun 			1, bytesperword, 1, 1, 0);
2682*4882a593Smuzhiyun 	}
2683*4882a593Smuzhiyun #undef KDB_PCU
2684*4882a593Smuzhiyun 	return 0;
2685*4882a593Smuzhiyun }
2686*4882a593Smuzhiyun 
2687*4882a593Smuzhiyun /*
2688*4882a593Smuzhiyun  * display help for the use of cmd | grep pattern
2689*4882a593Smuzhiyun  */
kdb_grep_help(int argc,const char ** argv)2690*4882a593Smuzhiyun static int kdb_grep_help(int argc, const char **argv)
2691*4882a593Smuzhiyun {
2692*4882a593Smuzhiyun 	kdb_printf("Usage of  cmd args | grep pattern:\n");
2693*4882a593Smuzhiyun 	kdb_printf("  Any command's output may be filtered through an ");
2694*4882a593Smuzhiyun 	kdb_printf("emulated 'pipe'.\n");
2695*4882a593Smuzhiyun 	kdb_printf("  'grep' is just a key word.\n");
2696*4882a593Smuzhiyun 	kdb_printf("  The pattern may include a very limited set of "
2697*4882a593Smuzhiyun 		   "metacharacters:\n");
2698*4882a593Smuzhiyun 	kdb_printf("   pattern or ^pattern or pattern$ or ^pattern$\n");
2699*4882a593Smuzhiyun 	kdb_printf("  And if there are spaces in the pattern, you may "
2700*4882a593Smuzhiyun 		   "quote it:\n");
2701*4882a593Smuzhiyun 	kdb_printf("   \"pat tern\" or \"^pat tern\" or \"pat tern$\""
2702*4882a593Smuzhiyun 		   " or \"^pat tern$\"\n");
2703*4882a593Smuzhiyun 	return 0;
2704*4882a593Smuzhiyun }
2705*4882a593Smuzhiyun 
2706*4882a593Smuzhiyun /*
2707*4882a593Smuzhiyun  * kdb_register_flags - This function is used to register a kernel
2708*4882a593Smuzhiyun  * 	debugger command.
2709*4882a593Smuzhiyun  * Inputs:
2710*4882a593Smuzhiyun  *	cmd	Command name
2711*4882a593Smuzhiyun  *	func	Function to execute the command
2712*4882a593Smuzhiyun  *	usage	A simple usage string showing arguments
2713*4882a593Smuzhiyun  *	help	A simple help string describing command
2714*4882a593Smuzhiyun  *	repeat	Does the command auto repeat on enter?
2715*4882a593Smuzhiyun  * Returns:
2716*4882a593Smuzhiyun  *	zero for success, one if a duplicate command.
2717*4882a593Smuzhiyun  */
2718*4882a593Smuzhiyun #define kdb_command_extend 50	/* arbitrary */
kdb_register_flags(char * cmd,kdb_func_t func,char * usage,char * help,short minlen,kdb_cmdflags_t flags)2719*4882a593Smuzhiyun int kdb_register_flags(char *cmd,
2720*4882a593Smuzhiyun 		       kdb_func_t func,
2721*4882a593Smuzhiyun 		       char *usage,
2722*4882a593Smuzhiyun 		       char *help,
2723*4882a593Smuzhiyun 		       short minlen,
2724*4882a593Smuzhiyun 		       kdb_cmdflags_t flags)
2725*4882a593Smuzhiyun {
2726*4882a593Smuzhiyun 	int i;
2727*4882a593Smuzhiyun 	kdbtab_t *kp;
2728*4882a593Smuzhiyun 
2729*4882a593Smuzhiyun 	/*
2730*4882a593Smuzhiyun 	 *  Brute force method to determine duplicates
2731*4882a593Smuzhiyun 	 */
2732*4882a593Smuzhiyun 	for_each_kdbcmd(kp, i) {
2733*4882a593Smuzhiyun 		if (kp->cmd_name && (strcmp(kp->cmd_name, cmd) == 0)) {
2734*4882a593Smuzhiyun 			kdb_printf("Duplicate kdb command registered: "
2735*4882a593Smuzhiyun 				"%s, func %px help %s\n", cmd, func, help);
2736*4882a593Smuzhiyun 			return 1;
2737*4882a593Smuzhiyun 		}
2738*4882a593Smuzhiyun 	}
2739*4882a593Smuzhiyun 
2740*4882a593Smuzhiyun 	/*
2741*4882a593Smuzhiyun 	 * Insert command into first available location in table
2742*4882a593Smuzhiyun 	 */
2743*4882a593Smuzhiyun 	for_each_kdbcmd(kp, i) {
2744*4882a593Smuzhiyun 		if (kp->cmd_name == NULL)
2745*4882a593Smuzhiyun 			break;
2746*4882a593Smuzhiyun 	}
2747*4882a593Smuzhiyun 
2748*4882a593Smuzhiyun 	if (i >= kdb_max_commands) {
2749*4882a593Smuzhiyun 		kdbtab_t *new = kmalloc_array(kdb_max_commands -
2750*4882a593Smuzhiyun 						KDB_BASE_CMD_MAX +
2751*4882a593Smuzhiyun 						kdb_command_extend,
2752*4882a593Smuzhiyun 					      sizeof(*new),
2753*4882a593Smuzhiyun 					      GFP_KDB);
2754*4882a593Smuzhiyun 		if (!new) {
2755*4882a593Smuzhiyun 			kdb_printf("Could not allocate new kdb_command "
2756*4882a593Smuzhiyun 				   "table\n");
2757*4882a593Smuzhiyun 			return 1;
2758*4882a593Smuzhiyun 		}
2759*4882a593Smuzhiyun 		if (kdb_commands) {
2760*4882a593Smuzhiyun 			memcpy(new, kdb_commands,
2761*4882a593Smuzhiyun 			  (kdb_max_commands - KDB_BASE_CMD_MAX) * sizeof(*new));
2762*4882a593Smuzhiyun 			kfree(kdb_commands);
2763*4882a593Smuzhiyun 		}
2764*4882a593Smuzhiyun 		memset(new + kdb_max_commands - KDB_BASE_CMD_MAX, 0,
2765*4882a593Smuzhiyun 		       kdb_command_extend * sizeof(*new));
2766*4882a593Smuzhiyun 		kdb_commands = new;
2767*4882a593Smuzhiyun 		kp = kdb_commands + kdb_max_commands - KDB_BASE_CMD_MAX;
2768*4882a593Smuzhiyun 		kdb_max_commands += kdb_command_extend;
2769*4882a593Smuzhiyun 	}
2770*4882a593Smuzhiyun 
2771*4882a593Smuzhiyun 	kp->cmd_name   = cmd;
2772*4882a593Smuzhiyun 	kp->cmd_func   = func;
2773*4882a593Smuzhiyun 	kp->cmd_usage  = usage;
2774*4882a593Smuzhiyun 	kp->cmd_help   = help;
2775*4882a593Smuzhiyun 	kp->cmd_minlen = minlen;
2776*4882a593Smuzhiyun 	kp->cmd_flags  = flags;
2777*4882a593Smuzhiyun 
2778*4882a593Smuzhiyun 	return 0;
2779*4882a593Smuzhiyun }
2780*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(kdb_register_flags);
2781*4882a593Smuzhiyun 
2782*4882a593Smuzhiyun 
2783*4882a593Smuzhiyun /*
2784*4882a593Smuzhiyun  * kdb_register - Compatibility register function for commands that do
2785*4882a593Smuzhiyun  *	not need to specify a repeat state.  Equivalent to
2786*4882a593Smuzhiyun  *	kdb_register_flags with flags set to 0.
2787*4882a593Smuzhiyun  * Inputs:
2788*4882a593Smuzhiyun  *	cmd	Command name
2789*4882a593Smuzhiyun  *	func	Function to execute the command
2790*4882a593Smuzhiyun  *	usage	A simple usage string showing arguments
2791*4882a593Smuzhiyun  *	help	A simple help string describing command
2792*4882a593Smuzhiyun  * Returns:
2793*4882a593Smuzhiyun  *	zero for success, one if a duplicate command.
2794*4882a593Smuzhiyun  */
kdb_register(char * cmd,kdb_func_t func,char * usage,char * help,short minlen)2795*4882a593Smuzhiyun int kdb_register(char *cmd,
2796*4882a593Smuzhiyun 	     kdb_func_t func,
2797*4882a593Smuzhiyun 	     char *usage,
2798*4882a593Smuzhiyun 	     char *help,
2799*4882a593Smuzhiyun 	     short minlen)
2800*4882a593Smuzhiyun {
2801*4882a593Smuzhiyun 	return kdb_register_flags(cmd, func, usage, help, minlen, 0);
2802*4882a593Smuzhiyun }
2803*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(kdb_register);
2804*4882a593Smuzhiyun 
2805*4882a593Smuzhiyun /*
2806*4882a593Smuzhiyun  * kdb_unregister - This function is used to unregister a kernel
2807*4882a593Smuzhiyun  *	debugger command.  It is generally called when a module which
2808*4882a593Smuzhiyun  *	implements kdb commands is unloaded.
2809*4882a593Smuzhiyun  * Inputs:
2810*4882a593Smuzhiyun  *	cmd	Command name
2811*4882a593Smuzhiyun  * Returns:
2812*4882a593Smuzhiyun  *	zero for success, one command not registered.
2813*4882a593Smuzhiyun  */
kdb_unregister(char * cmd)2814*4882a593Smuzhiyun int kdb_unregister(char *cmd)
2815*4882a593Smuzhiyun {
2816*4882a593Smuzhiyun 	int i;
2817*4882a593Smuzhiyun 	kdbtab_t *kp;
2818*4882a593Smuzhiyun 
2819*4882a593Smuzhiyun 	/*
2820*4882a593Smuzhiyun 	 *  find the command.
2821*4882a593Smuzhiyun 	 */
2822*4882a593Smuzhiyun 	for_each_kdbcmd(kp, i) {
2823*4882a593Smuzhiyun 		if (kp->cmd_name && (strcmp(kp->cmd_name, cmd) == 0)) {
2824*4882a593Smuzhiyun 			kp->cmd_name = NULL;
2825*4882a593Smuzhiyun 			return 0;
2826*4882a593Smuzhiyun 		}
2827*4882a593Smuzhiyun 	}
2828*4882a593Smuzhiyun 
2829*4882a593Smuzhiyun 	/* Couldn't find it.  */
2830*4882a593Smuzhiyun 	return 1;
2831*4882a593Smuzhiyun }
2832*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(kdb_unregister);
2833*4882a593Smuzhiyun 
2834*4882a593Smuzhiyun /* Initialize the kdb command table. */
kdb_inittab(void)2835*4882a593Smuzhiyun static void __init kdb_inittab(void)
2836*4882a593Smuzhiyun {
2837*4882a593Smuzhiyun 	int i;
2838*4882a593Smuzhiyun 	kdbtab_t *kp;
2839*4882a593Smuzhiyun 
2840*4882a593Smuzhiyun 	for_each_kdbcmd(kp, i)
2841*4882a593Smuzhiyun 		kp->cmd_name = NULL;
2842*4882a593Smuzhiyun 
2843*4882a593Smuzhiyun 	kdb_register_flags("md", kdb_md, "<vaddr>",
2844*4882a593Smuzhiyun 	  "Display Memory Contents, also mdWcN, e.g. md8c1", 1,
2845*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2846*4882a593Smuzhiyun 	kdb_register_flags("mdr", kdb_md, "<vaddr> <bytes>",
2847*4882a593Smuzhiyun 	  "Display Raw Memory", 0,
2848*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2849*4882a593Smuzhiyun 	kdb_register_flags("mdp", kdb_md, "<paddr> <bytes>",
2850*4882a593Smuzhiyun 	  "Display Physical Memory", 0,
2851*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2852*4882a593Smuzhiyun 	kdb_register_flags("mds", kdb_md, "<vaddr>",
2853*4882a593Smuzhiyun 	  "Display Memory Symbolically", 0,
2854*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2855*4882a593Smuzhiyun 	kdb_register_flags("mm", kdb_mm, "<vaddr> <contents>",
2856*4882a593Smuzhiyun 	  "Modify Memory Contents", 0,
2857*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_WRITE | KDB_REPEAT_NO_ARGS);
2858*4882a593Smuzhiyun 	kdb_register_flags("go", kdb_go, "[<vaddr>]",
2859*4882a593Smuzhiyun 	  "Continue Execution", 1,
2860*4882a593Smuzhiyun 	  KDB_ENABLE_REG_WRITE | KDB_ENABLE_ALWAYS_SAFE_NO_ARGS);
2861*4882a593Smuzhiyun 	kdb_register_flags("rd", kdb_rd, "",
2862*4882a593Smuzhiyun 	  "Display Registers", 0,
2863*4882a593Smuzhiyun 	  KDB_ENABLE_REG_READ);
2864*4882a593Smuzhiyun 	kdb_register_flags("rm", kdb_rm, "<reg> <contents>",
2865*4882a593Smuzhiyun 	  "Modify Registers", 0,
2866*4882a593Smuzhiyun 	  KDB_ENABLE_REG_WRITE);
2867*4882a593Smuzhiyun 	kdb_register_flags("ef", kdb_ef, "<vaddr>",
2868*4882a593Smuzhiyun 	  "Display exception frame", 0,
2869*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ);
2870*4882a593Smuzhiyun 	kdb_register_flags("bt", kdb_bt, "[<vaddr>]",
2871*4882a593Smuzhiyun 	  "Stack traceback", 1,
2872*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ | KDB_ENABLE_INSPECT_NO_ARGS);
2873*4882a593Smuzhiyun 	kdb_register_flags("btp", kdb_bt, "<pid>",
2874*4882a593Smuzhiyun 	  "Display stack for process <pid>", 0,
2875*4882a593Smuzhiyun 	  KDB_ENABLE_INSPECT);
2876*4882a593Smuzhiyun 	kdb_register_flags("bta", kdb_bt, "[D|R|S|T|C|Z|E|U|I|M|A]",
2877*4882a593Smuzhiyun 	  "Backtrace all processes matching state flag", 0,
2878*4882a593Smuzhiyun 	  KDB_ENABLE_INSPECT);
2879*4882a593Smuzhiyun 	kdb_register_flags("btc", kdb_bt, "",
2880*4882a593Smuzhiyun 	  "Backtrace current process on each cpu", 0,
2881*4882a593Smuzhiyun 	  KDB_ENABLE_INSPECT);
2882*4882a593Smuzhiyun 	kdb_register_flags("btt", kdb_bt, "<vaddr>",
2883*4882a593Smuzhiyun 	  "Backtrace process given its struct task address", 0,
2884*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ | KDB_ENABLE_INSPECT_NO_ARGS);
2885*4882a593Smuzhiyun 	kdb_register_flags("env", kdb_env, "",
2886*4882a593Smuzhiyun 	  "Show environment variables", 0,
2887*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2888*4882a593Smuzhiyun 	kdb_register_flags("set", kdb_set, "",
2889*4882a593Smuzhiyun 	  "Set environment variables", 0,
2890*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2891*4882a593Smuzhiyun 	kdb_register_flags("help", kdb_help, "",
2892*4882a593Smuzhiyun 	  "Display Help Message", 1,
2893*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2894*4882a593Smuzhiyun 	kdb_register_flags("?", kdb_help, "",
2895*4882a593Smuzhiyun 	  "Display Help Message", 0,
2896*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2897*4882a593Smuzhiyun 	kdb_register_flags("cpu", kdb_cpu, "<cpunum>",
2898*4882a593Smuzhiyun 	  "Switch to new cpu", 0,
2899*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE_NO_ARGS);
2900*4882a593Smuzhiyun 	kdb_register_flags("kgdb", kdb_kgdb, "",
2901*4882a593Smuzhiyun 	  "Enter kgdb mode", 0, 0);
2902*4882a593Smuzhiyun 	kdb_register_flags("ps", kdb_ps, "[<flags>|A]",
2903*4882a593Smuzhiyun 	  "Display active task list", 0,
2904*4882a593Smuzhiyun 	  KDB_ENABLE_INSPECT);
2905*4882a593Smuzhiyun 	kdb_register_flags("pid", kdb_pid, "<pidnum>",
2906*4882a593Smuzhiyun 	  "Switch to another task", 0,
2907*4882a593Smuzhiyun 	  KDB_ENABLE_INSPECT);
2908*4882a593Smuzhiyun 	kdb_register_flags("reboot", kdb_reboot, "",
2909*4882a593Smuzhiyun 	  "Reboot the machine immediately", 0,
2910*4882a593Smuzhiyun 	  KDB_ENABLE_REBOOT);
2911*4882a593Smuzhiyun #if defined(CONFIG_MODULES)
2912*4882a593Smuzhiyun 	kdb_register_flags("lsmod", kdb_lsmod, "",
2913*4882a593Smuzhiyun 	  "List loaded kernel modules", 0,
2914*4882a593Smuzhiyun 	  KDB_ENABLE_INSPECT);
2915*4882a593Smuzhiyun #endif
2916*4882a593Smuzhiyun #if defined(CONFIG_MAGIC_SYSRQ)
2917*4882a593Smuzhiyun 	kdb_register_flags("sr", kdb_sr, "<key>",
2918*4882a593Smuzhiyun 	  "Magic SysRq key", 0,
2919*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2920*4882a593Smuzhiyun #endif
2921*4882a593Smuzhiyun #if defined(CONFIG_PRINTK)
2922*4882a593Smuzhiyun 	kdb_register_flags("dmesg", kdb_dmesg, "[lines]",
2923*4882a593Smuzhiyun 	  "Display syslog buffer", 0,
2924*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2925*4882a593Smuzhiyun #endif
2926*4882a593Smuzhiyun 	if (arch_kgdb_ops.enable_nmi) {
2927*4882a593Smuzhiyun 		kdb_register_flags("disable_nmi", kdb_disable_nmi, "",
2928*4882a593Smuzhiyun 		  "Disable NMI entry to KDB", 0,
2929*4882a593Smuzhiyun 		  KDB_ENABLE_ALWAYS_SAFE);
2930*4882a593Smuzhiyun 	}
2931*4882a593Smuzhiyun 	kdb_register_flags("defcmd", kdb_defcmd, "name \"usage\" \"help\"",
2932*4882a593Smuzhiyun 	  "Define a set of commands, down to endefcmd", 0,
2933*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2934*4882a593Smuzhiyun 	kdb_register_flags("kill", kdb_kill, "<-signal> <pid>",
2935*4882a593Smuzhiyun 	  "Send a signal to a process", 0,
2936*4882a593Smuzhiyun 	  KDB_ENABLE_SIGNAL);
2937*4882a593Smuzhiyun 	kdb_register_flags("summary", kdb_summary, "",
2938*4882a593Smuzhiyun 	  "Summarize the system", 4,
2939*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2940*4882a593Smuzhiyun 	kdb_register_flags("per_cpu", kdb_per_cpu, "<sym> [<bytes>] [<cpu>]",
2941*4882a593Smuzhiyun 	  "Display per_cpu variables", 3,
2942*4882a593Smuzhiyun 	  KDB_ENABLE_MEM_READ);
2943*4882a593Smuzhiyun 	kdb_register_flags("grephelp", kdb_grep_help, "",
2944*4882a593Smuzhiyun 	  "Display help on | grep", 0,
2945*4882a593Smuzhiyun 	  KDB_ENABLE_ALWAYS_SAFE);
2946*4882a593Smuzhiyun }
2947*4882a593Smuzhiyun 
2948*4882a593Smuzhiyun /* Execute any commands defined in kdb_cmds.  */
kdb_cmd_init(void)2949*4882a593Smuzhiyun static void __init kdb_cmd_init(void)
2950*4882a593Smuzhiyun {
2951*4882a593Smuzhiyun 	int i, diag;
2952*4882a593Smuzhiyun 	for (i = 0; kdb_cmds[i]; ++i) {
2953*4882a593Smuzhiyun 		diag = kdb_parse(kdb_cmds[i]);
2954*4882a593Smuzhiyun 		if (diag)
2955*4882a593Smuzhiyun 			kdb_printf("kdb command %s failed, kdb diag %d\n",
2956*4882a593Smuzhiyun 				kdb_cmds[i], diag);
2957*4882a593Smuzhiyun 	}
2958*4882a593Smuzhiyun 	if (defcmd_in_progress) {
2959*4882a593Smuzhiyun 		kdb_printf("Incomplete 'defcmd' set, forcing endefcmd\n");
2960*4882a593Smuzhiyun 		kdb_parse("endefcmd");
2961*4882a593Smuzhiyun 	}
2962*4882a593Smuzhiyun }
2963*4882a593Smuzhiyun 
2964*4882a593Smuzhiyun /* Initialize kdb_printf, breakpoint tables and kdb state */
kdb_init(int lvl)2965*4882a593Smuzhiyun void __init kdb_init(int lvl)
2966*4882a593Smuzhiyun {
2967*4882a593Smuzhiyun 	static int kdb_init_lvl = KDB_NOT_INITIALIZED;
2968*4882a593Smuzhiyun 	int i;
2969*4882a593Smuzhiyun 
2970*4882a593Smuzhiyun 	if (kdb_init_lvl == KDB_INIT_FULL || lvl <= kdb_init_lvl)
2971*4882a593Smuzhiyun 		return;
2972*4882a593Smuzhiyun 	for (i = kdb_init_lvl; i < lvl; i++) {
2973*4882a593Smuzhiyun 		switch (i) {
2974*4882a593Smuzhiyun 		case KDB_NOT_INITIALIZED:
2975*4882a593Smuzhiyun 			kdb_inittab();		/* Initialize Command Table */
2976*4882a593Smuzhiyun 			kdb_initbptab();	/* Initialize Breakpoints */
2977*4882a593Smuzhiyun 			break;
2978*4882a593Smuzhiyun 		case KDB_INIT_EARLY:
2979*4882a593Smuzhiyun 			kdb_cmd_init();		/* Build kdb_cmds tables */
2980*4882a593Smuzhiyun 			break;
2981*4882a593Smuzhiyun 		}
2982*4882a593Smuzhiyun 	}
2983*4882a593Smuzhiyun 	kdb_init_lvl = lvl;
2984*4882a593Smuzhiyun }
2985