1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun * Kernel Debugger Architecture Independent Main Code
3*4882a593Smuzhiyun *
4*4882a593Smuzhiyun * This file is subject to the terms and conditions of the GNU General Public
5*4882a593Smuzhiyun * License. See the file "COPYING" in the main directory of this archive
6*4882a593Smuzhiyun * for more details.
7*4882a593Smuzhiyun *
8*4882a593Smuzhiyun * Copyright (C) 1999-2004 Silicon Graphics, Inc. All Rights Reserved.
9*4882a593Smuzhiyun * Copyright (C) 2000 Stephane Eranian <eranian@hpl.hp.com>
10*4882a593Smuzhiyun * Xscale (R) modifications copyright (C) 2003 Intel Corporation.
11*4882a593Smuzhiyun * Copyright (c) 2009 Wind River Systems, Inc. All Rights Reserved.
12*4882a593Smuzhiyun */
13*4882a593Smuzhiyun
14*4882a593Smuzhiyun #include <linux/ctype.h>
15*4882a593Smuzhiyun #include <linux/types.h>
16*4882a593Smuzhiyun #include <linux/string.h>
17*4882a593Smuzhiyun #include <linux/kernel.h>
18*4882a593Smuzhiyun #include <linux/kmsg_dump.h>
19*4882a593Smuzhiyun #include <linux/reboot.h>
20*4882a593Smuzhiyun #include <linux/sched.h>
21*4882a593Smuzhiyun #include <linux/sched/loadavg.h>
22*4882a593Smuzhiyun #include <linux/sched/stat.h>
23*4882a593Smuzhiyun #include <linux/sched/debug.h>
24*4882a593Smuzhiyun #include <linux/sysrq.h>
25*4882a593Smuzhiyun #include <linux/smp.h>
26*4882a593Smuzhiyun #include <linux/utsname.h>
27*4882a593Smuzhiyun #include <linux/vmalloc.h>
28*4882a593Smuzhiyun #include <linux/atomic.h>
29*4882a593Smuzhiyun #include <linux/module.h>
30*4882a593Smuzhiyun #include <linux/moduleparam.h>
31*4882a593Smuzhiyun #include <linux/mm.h>
32*4882a593Smuzhiyun #include <linux/init.h>
33*4882a593Smuzhiyun #include <linux/kallsyms.h>
34*4882a593Smuzhiyun #include <linux/kgdb.h>
35*4882a593Smuzhiyun #include <linux/kdb.h>
36*4882a593Smuzhiyun #include <linux/notifier.h>
37*4882a593Smuzhiyun #include <linux/interrupt.h>
38*4882a593Smuzhiyun #include <linux/delay.h>
39*4882a593Smuzhiyun #include <linux/nmi.h>
40*4882a593Smuzhiyun #include <linux/time.h>
41*4882a593Smuzhiyun #include <linux/ptrace.h>
42*4882a593Smuzhiyun #include <linux/sysctl.h>
43*4882a593Smuzhiyun #include <linux/cpu.h>
44*4882a593Smuzhiyun #include <linux/kdebug.h>
45*4882a593Smuzhiyun #include <linux/proc_fs.h>
46*4882a593Smuzhiyun #include <linux/uaccess.h>
47*4882a593Smuzhiyun #include <linux/slab.h>
48*4882a593Smuzhiyun #include <linux/security.h>
49*4882a593Smuzhiyun #include "kdb_private.h"
50*4882a593Smuzhiyun
51*4882a593Smuzhiyun #undef MODULE_PARAM_PREFIX
52*4882a593Smuzhiyun #define MODULE_PARAM_PREFIX "kdb."
53*4882a593Smuzhiyun
54*4882a593Smuzhiyun static int kdb_cmd_enabled = CONFIG_KDB_DEFAULT_ENABLE;
55*4882a593Smuzhiyun module_param_named(cmd_enable, kdb_cmd_enabled, int, 0600);
56*4882a593Smuzhiyun
57*4882a593Smuzhiyun char kdb_grep_string[KDB_GREP_STRLEN];
58*4882a593Smuzhiyun int kdb_grepping_flag;
59*4882a593Smuzhiyun EXPORT_SYMBOL(kdb_grepping_flag);
60*4882a593Smuzhiyun int kdb_grep_leading;
61*4882a593Smuzhiyun int kdb_grep_trailing;
62*4882a593Smuzhiyun
63*4882a593Smuzhiyun /*
64*4882a593Smuzhiyun * Kernel debugger state flags
65*4882a593Smuzhiyun */
66*4882a593Smuzhiyun unsigned int kdb_flags;
67*4882a593Smuzhiyun
68*4882a593Smuzhiyun /*
69*4882a593Smuzhiyun * kdb_lock protects updates to kdb_initial_cpu. Used to
70*4882a593Smuzhiyun * single thread processors through the kernel debugger.
71*4882a593Smuzhiyun */
72*4882a593Smuzhiyun int kdb_initial_cpu = -1; /* cpu number that owns kdb */
73*4882a593Smuzhiyun int kdb_nextline = 1;
74*4882a593Smuzhiyun int kdb_state; /* General KDB state */
75*4882a593Smuzhiyun
76*4882a593Smuzhiyun struct task_struct *kdb_current_task;
77*4882a593Smuzhiyun struct pt_regs *kdb_current_regs;
78*4882a593Smuzhiyun
79*4882a593Smuzhiyun const char *kdb_diemsg;
80*4882a593Smuzhiyun static int kdb_go_count;
81*4882a593Smuzhiyun #ifdef CONFIG_KDB_CONTINUE_CATASTROPHIC
82*4882a593Smuzhiyun static unsigned int kdb_continue_catastrophic =
83*4882a593Smuzhiyun CONFIG_KDB_CONTINUE_CATASTROPHIC;
84*4882a593Smuzhiyun #else
85*4882a593Smuzhiyun static unsigned int kdb_continue_catastrophic;
86*4882a593Smuzhiyun #endif
87*4882a593Smuzhiyun
88*4882a593Smuzhiyun /* kdb_commands describes the available commands. */
89*4882a593Smuzhiyun static kdbtab_t *kdb_commands;
90*4882a593Smuzhiyun #define KDB_BASE_CMD_MAX 50
91*4882a593Smuzhiyun static int kdb_max_commands = KDB_BASE_CMD_MAX;
92*4882a593Smuzhiyun static kdbtab_t kdb_base_commands[KDB_BASE_CMD_MAX];
93*4882a593Smuzhiyun #define for_each_kdbcmd(cmd, num) \
94*4882a593Smuzhiyun for ((cmd) = kdb_base_commands, (num) = 0; \
95*4882a593Smuzhiyun num < kdb_max_commands; \
96*4882a593Smuzhiyun num++, num == KDB_BASE_CMD_MAX ? cmd = kdb_commands : cmd++)
97*4882a593Smuzhiyun
98*4882a593Smuzhiyun typedef struct _kdbmsg {
99*4882a593Smuzhiyun int km_diag; /* kdb diagnostic */
100*4882a593Smuzhiyun char *km_msg; /* Corresponding message text */
101*4882a593Smuzhiyun } kdbmsg_t;
102*4882a593Smuzhiyun
103*4882a593Smuzhiyun #define KDBMSG(msgnum, text) \
104*4882a593Smuzhiyun { KDB_##msgnum, text }
105*4882a593Smuzhiyun
106*4882a593Smuzhiyun static kdbmsg_t kdbmsgs[] = {
107*4882a593Smuzhiyun KDBMSG(NOTFOUND, "Command Not Found"),
108*4882a593Smuzhiyun KDBMSG(ARGCOUNT, "Improper argument count, see usage."),
109*4882a593Smuzhiyun KDBMSG(BADWIDTH, "Illegal value for BYTESPERWORD use 1, 2, 4 or 8, "
110*4882a593Smuzhiyun "8 is only allowed on 64 bit systems"),
111*4882a593Smuzhiyun KDBMSG(BADRADIX, "Illegal value for RADIX use 8, 10 or 16"),
112*4882a593Smuzhiyun KDBMSG(NOTENV, "Cannot find environment variable"),
113*4882a593Smuzhiyun KDBMSG(NOENVVALUE, "Environment variable should have value"),
114*4882a593Smuzhiyun KDBMSG(NOTIMP, "Command not implemented"),
115*4882a593Smuzhiyun KDBMSG(ENVFULL, "Environment full"),
116*4882a593Smuzhiyun KDBMSG(ENVBUFFULL, "Environment buffer full"),
117*4882a593Smuzhiyun KDBMSG(TOOMANYBPT, "Too many breakpoints defined"),
118*4882a593Smuzhiyun #ifdef CONFIG_CPU_XSCALE
119*4882a593Smuzhiyun KDBMSG(TOOMANYDBREGS, "More breakpoints than ibcr registers defined"),
120*4882a593Smuzhiyun #else
121*4882a593Smuzhiyun KDBMSG(TOOMANYDBREGS, "More breakpoints than db registers defined"),
122*4882a593Smuzhiyun #endif
123*4882a593Smuzhiyun KDBMSG(DUPBPT, "Duplicate breakpoint address"),
124*4882a593Smuzhiyun KDBMSG(BPTNOTFOUND, "Breakpoint not found"),
125*4882a593Smuzhiyun KDBMSG(BADMODE, "Invalid IDMODE"),
126*4882a593Smuzhiyun KDBMSG(BADINT, "Illegal numeric value"),
127*4882a593Smuzhiyun KDBMSG(INVADDRFMT, "Invalid symbolic address format"),
128*4882a593Smuzhiyun KDBMSG(BADREG, "Invalid register name"),
129*4882a593Smuzhiyun KDBMSG(BADCPUNUM, "Invalid cpu number"),
130*4882a593Smuzhiyun KDBMSG(BADLENGTH, "Invalid length field"),
131*4882a593Smuzhiyun KDBMSG(NOBP, "No Breakpoint exists"),
132*4882a593Smuzhiyun KDBMSG(BADADDR, "Invalid address"),
133*4882a593Smuzhiyun KDBMSG(NOPERM, "Permission denied"),
134*4882a593Smuzhiyun };
135*4882a593Smuzhiyun #undef KDBMSG
136*4882a593Smuzhiyun
137*4882a593Smuzhiyun static const int __nkdb_err = ARRAY_SIZE(kdbmsgs);
138*4882a593Smuzhiyun
139*4882a593Smuzhiyun
140*4882a593Smuzhiyun /*
141*4882a593Smuzhiyun * Initial environment. This is all kept static and local to
142*4882a593Smuzhiyun * this file. We don't want to rely on the memory allocation
143*4882a593Smuzhiyun * mechanisms in the kernel, so we use a very limited allocate-only
144*4882a593Smuzhiyun * heap for new and altered environment variables. The entire
145*4882a593Smuzhiyun * environment is limited to a fixed number of entries (add more
146*4882a593Smuzhiyun * to __env[] if required) and a fixed amount of heap (add more to
147*4882a593Smuzhiyun * KDB_ENVBUFSIZE if required).
148*4882a593Smuzhiyun */
149*4882a593Smuzhiyun
150*4882a593Smuzhiyun static char *__env[] = {
151*4882a593Smuzhiyun #if defined(CONFIG_SMP)
152*4882a593Smuzhiyun "PROMPT=[%d]kdb> ",
153*4882a593Smuzhiyun #else
154*4882a593Smuzhiyun "PROMPT=kdb> ",
155*4882a593Smuzhiyun #endif
156*4882a593Smuzhiyun "MOREPROMPT=more> ",
157*4882a593Smuzhiyun "RADIX=16",
158*4882a593Smuzhiyun "MDCOUNT=8", /* lines of md output */
159*4882a593Smuzhiyun KDB_PLATFORM_ENV,
160*4882a593Smuzhiyun "DTABCOUNT=30",
161*4882a593Smuzhiyun "NOSECT=1",
162*4882a593Smuzhiyun (char *)0,
163*4882a593Smuzhiyun (char *)0,
164*4882a593Smuzhiyun (char *)0,
165*4882a593Smuzhiyun (char *)0,
166*4882a593Smuzhiyun (char *)0,
167*4882a593Smuzhiyun (char *)0,
168*4882a593Smuzhiyun (char *)0,
169*4882a593Smuzhiyun (char *)0,
170*4882a593Smuzhiyun (char *)0,
171*4882a593Smuzhiyun (char *)0,
172*4882a593Smuzhiyun (char *)0,
173*4882a593Smuzhiyun (char *)0,
174*4882a593Smuzhiyun (char *)0,
175*4882a593Smuzhiyun (char *)0,
176*4882a593Smuzhiyun (char *)0,
177*4882a593Smuzhiyun (char *)0,
178*4882a593Smuzhiyun (char *)0,
179*4882a593Smuzhiyun (char *)0,
180*4882a593Smuzhiyun (char *)0,
181*4882a593Smuzhiyun (char *)0,
182*4882a593Smuzhiyun (char *)0,
183*4882a593Smuzhiyun (char *)0,
184*4882a593Smuzhiyun (char *)0,
185*4882a593Smuzhiyun (char *)0,
186*4882a593Smuzhiyun };
187*4882a593Smuzhiyun
188*4882a593Smuzhiyun static const int __nenv = ARRAY_SIZE(__env);
189*4882a593Smuzhiyun
kdb_curr_task(int cpu)190*4882a593Smuzhiyun struct task_struct *kdb_curr_task(int cpu)
191*4882a593Smuzhiyun {
192*4882a593Smuzhiyun struct task_struct *p = curr_task(cpu);
193*4882a593Smuzhiyun #ifdef _TIF_MCA_INIT
194*4882a593Smuzhiyun if ((task_thread_info(p)->flags & _TIF_MCA_INIT) && KDB_TSK(cpu))
195*4882a593Smuzhiyun p = krp->p;
196*4882a593Smuzhiyun #endif
197*4882a593Smuzhiyun return p;
198*4882a593Smuzhiyun }
199*4882a593Smuzhiyun
200*4882a593Smuzhiyun /*
201*4882a593Smuzhiyun * Update the permissions flags (kdb_cmd_enabled) to match the
202*4882a593Smuzhiyun * current lockdown state.
203*4882a593Smuzhiyun *
204*4882a593Smuzhiyun * Within this function the calls to security_locked_down() are "lazy". We
205*4882a593Smuzhiyun * avoid calling them if the current value of kdb_cmd_enabled already excludes
206*4882a593Smuzhiyun * flags that might be subject to lockdown. Additionally we deliberately check
207*4882a593Smuzhiyun * the lockdown flags independently (even though read lockdown implies write
208*4882a593Smuzhiyun * lockdown) since that results in both simpler code and clearer messages to
209*4882a593Smuzhiyun * the user on first-time debugger entry.
210*4882a593Smuzhiyun *
211*4882a593Smuzhiyun * The permission masks during a read+write lockdown permits the following
212*4882a593Smuzhiyun * flags: INSPECT, SIGNAL, REBOOT (and ALWAYS_SAFE).
213*4882a593Smuzhiyun *
214*4882a593Smuzhiyun * The INSPECT commands are not blocked during lockdown because they are
215*4882a593Smuzhiyun * not arbitrary memory reads. INSPECT covers the backtrace family (sometimes
216*4882a593Smuzhiyun * forcing them to have no arguments) and lsmod. These commands do expose
217*4882a593Smuzhiyun * some kernel state but do not allow the developer seated at the console to
218*4882a593Smuzhiyun * choose what state is reported. SIGNAL and REBOOT should not be controversial,
219*4882a593Smuzhiyun * given these are allowed for root during lockdown already.
220*4882a593Smuzhiyun */
kdb_check_for_lockdown(void)221*4882a593Smuzhiyun static void kdb_check_for_lockdown(void)
222*4882a593Smuzhiyun {
223*4882a593Smuzhiyun const int write_flags = KDB_ENABLE_MEM_WRITE |
224*4882a593Smuzhiyun KDB_ENABLE_REG_WRITE |
225*4882a593Smuzhiyun KDB_ENABLE_FLOW_CTRL;
226*4882a593Smuzhiyun const int read_flags = KDB_ENABLE_MEM_READ |
227*4882a593Smuzhiyun KDB_ENABLE_REG_READ;
228*4882a593Smuzhiyun
229*4882a593Smuzhiyun bool need_to_lockdown_write = false;
230*4882a593Smuzhiyun bool need_to_lockdown_read = false;
231*4882a593Smuzhiyun
232*4882a593Smuzhiyun if (kdb_cmd_enabled & (KDB_ENABLE_ALL | write_flags))
233*4882a593Smuzhiyun need_to_lockdown_write =
234*4882a593Smuzhiyun security_locked_down(LOCKDOWN_DBG_WRITE_KERNEL);
235*4882a593Smuzhiyun
236*4882a593Smuzhiyun if (kdb_cmd_enabled & (KDB_ENABLE_ALL | read_flags))
237*4882a593Smuzhiyun need_to_lockdown_read =
238*4882a593Smuzhiyun security_locked_down(LOCKDOWN_DBG_READ_KERNEL);
239*4882a593Smuzhiyun
240*4882a593Smuzhiyun /* De-compose KDB_ENABLE_ALL if required */
241*4882a593Smuzhiyun if (need_to_lockdown_write || need_to_lockdown_read)
242*4882a593Smuzhiyun if (kdb_cmd_enabled & KDB_ENABLE_ALL)
243*4882a593Smuzhiyun kdb_cmd_enabled = KDB_ENABLE_MASK & ~KDB_ENABLE_ALL;
244*4882a593Smuzhiyun
245*4882a593Smuzhiyun if (need_to_lockdown_write)
246*4882a593Smuzhiyun kdb_cmd_enabled &= ~write_flags;
247*4882a593Smuzhiyun
248*4882a593Smuzhiyun if (need_to_lockdown_read)
249*4882a593Smuzhiyun kdb_cmd_enabled &= ~read_flags;
250*4882a593Smuzhiyun }
251*4882a593Smuzhiyun
252*4882a593Smuzhiyun /*
253*4882a593Smuzhiyun * Check whether the flags of the current command, the permissions of the kdb
254*4882a593Smuzhiyun * console and the lockdown state allow a command to be run.
255*4882a593Smuzhiyun */
kdb_check_flags(kdb_cmdflags_t flags,int permissions,bool no_args)256*4882a593Smuzhiyun static bool kdb_check_flags(kdb_cmdflags_t flags, int permissions,
257*4882a593Smuzhiyun bool no_args)
258*4882a593Smuzhiyun {
259*4882a593Smuzhiyun /* permissions comes from userspace so needs massaging slightly */
260*4882a593Smuzhiyun permissions &= KDB_ENABLE_MASK;
261*4882a593Smuzhiyun permissions |= KDB_ENABLE_ALWAYS_SAFE;
262*4882a593Smuzhiyun
263*4882a593Smuzhiyun /* some commands change group when launched with no arguments */
264*4882a593Smuzhiyun if (no_args)
265*4882a593Smuzhiyun permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT;
266*4882a593Smuzhiyun
267*4882a593Smuzhiyun flags |= KDB_ENABLE_ALL;
268*4882a593Smuzhiyun
269*4882a593Smuzhiyun return permissions & flags;
270*4882a593Smuzhiyun }
271*4882a593Smuzhiyun
272*4882a593Smuzhiyun /*
273*4882a593Smuzhiyun * kdbgetenv - This function will return the character string value of
274*4882a593Smuzhiyun * an environment variable.
275*4882a593Smuzhiyun * Parameters:
276*4882a593Smuzhiyun * match A character string representing an environment variable.
277*4882a593Smuzhiyun * Returns:
278*4882a593Smuzhiyun * NULL No environment variable matches 'match'
279*4882a593Smuzhiyun * char* Pointer to string value of environment variable.
280*4882a593Smuzhiyun */
kdbgetenv(const char * match)281*4882a593Smuzhiyun char *kdbgetenv(const char *match)
282*4882a593Smuzhiyun {
283*4882a593Smuzhiyun char **ep = __env;
284*4882a593Smuzhiyun int matchlen = strlen(match);
285*4882a593Smuzhiyun int i;
286*4882a593Smuzhiyun
287*4882a593Smuzhiyun for (i = 0; i < __nenv; i++) {
288*4882a593Smuzhiyun char *e = *ep++;
289*4882a593Smuzhiyun
290*4882a593Smuzhiyun if (!e)
291*4882a593Smuzhiyun continue;
292*4882a593Smuzhiyun
293*4882a593Smuzhiyun if ((strncmp(match, e, matchlen) == 0)
294*4882a593Smuzhiyun && ((e[matchlen] == '\0')
295*4882a593Smuzhiyun || (e[matchlen] == '='))) {
296*4882a593Smuzhiyun char *cp = strchr(e, '=');
297*4882a593Smuzhiyun return cp ? ++cp : "";
298*4882a593Smuzhiyun }
299*4882a593Smuzhiyun }
300*4882a593Smuzhiyun return NULL;
301*4882a593Smuzhiyun }
302*4882a593Smuzhiyun
303*4882a593Smuzhiyun /*
304*4882a593Smuzhiyun * kdballocenv - This function is used to allocate bytes for
305*4882a593Smuzhiyun * environment entries.
306*4882a593Smuzhiyun * Parameters:
307*4882a593Smuzhiyun * match A character string representing a numeric value
308*4882a593Smuzhiyun * Outputs:
309*4882a593Smuzhiyun * *value the unsigned long representation of the env variable 'match'
310*4882a593Smuzhiyun * Returns:
311*4882a593Smuzhiyun * Zero on success, a kdb diagnostic on failure.
312*4882a593Smuzhiyun * Remarks:
313*4882a593Smuzhiyun * We use a static environment buffer (envbuffer) to hold the values
314*4882a593Smuzhiyun * of dynamically generated environment variables (see kdb_set). Buffer
315*4882a593Smuzhiyun * space once allocated is never free'd, so over time, the amount of space
316*4882a593Smuzhiyun * (currently 512 bytes) will be exhausted if env variables are changed
317*4882a593Smuzhiyun * frequently.
318*4882a593Smuzhiyun */
kdballocenv(size_t bytes)319*4882a593Smuzhiyun static char *kdballocenv(size_t bytes)
320*4882a593Smuzhiyun {
321*4882a593Smuzhiyun #define KDB_ENVBUFSIZE 512
322*4882a593Smuzhiyun static char envbuffer[KDB_ENVBUFSIZE];
323*4882a593Smuzhiyun static int envbufsize;
324*4882a593Smuzhiyun char *ep = NULL;
325*4882a593Smuzhiyun
326*4882a593Smuzhiyun if ((KDB_ENVBUFSIZE - envbufsize) >= bytes) {
327*4882a593Smuzhiyun ep = &envbuffer[envbufsize];
328*4882a593Smuzhiyun envbufsize += bytes;
329*4882a593Smuzhiyun }
330*4882a593Smuzhiyun return ep;
331*4882a593Smuzhiyun }
332*4882a593Smuzhiyun
333*4882a593Smuzhiyun /*
334*4882a593Smuzhiyun * kdbgetulenv - This function will return the value of an unsigned
335*4882a593Smuzhiyun * long-valued environment variable.
336*4882a593Smuzhiyun * Parameters:
337*4882a593Smuzhiyun * match A character string representing a numeric value
338*4882a593Smuzhiyun * Outputs:
339*4882a593Smuzhiyun * *value the unsigned long represntation of the env variable 'match'
340*4882a593Smuzhiyun * Returns:
341*4882a593Smuzhiyun * Zero on success, a kdb diagnostic on failure.
342*4882a593Smuzhiyun */
kdbgetulenv(const char * match,unsigned long * value)343*4882a593Smuzhiyun static int kdbgetulenv(const char *match, unsigned long *value)
344*4882a593Smuzhiyun {
345*4882a593Smuzhiyun char *ep;
346*4882a593Smuzhiyun
347*4882a593Smuzhiyun ep = kdbgetenv(match);
348*4882a593Smuzhiyun if (!ep)
349*4882a593Smuzhiyun return KDB_NOTENV;
350*4882a593Smuzhiyun if (strlen(ep) == 0)
351*4882a593Smuzhiyun return KDB_NOENVVALUE;
352*4882a593Smuzhiyun
353*4882a593Smuzhiyun *value = simple_strtoul(ep, NULL, 0);
354*4882a593Smuzhiyun
355*4882a593Smuzhiyun return 0;
356*4882a593Smuzhiyun }
357*4882a593Smuzhiyun
358*4882a593Smuzhiyun /*
359*4882a593Smuzhiyun * kdbgetintenv - This function will return the value of an
360*4882a593Smuzhiyun * integer-valued environment variable.
361*4882a593Smuzhiyun * Parameters:
362*4882a593Smuzhiyun * match A character string representing an integer-valued env variable
363*4882a593Smuzhiyun * Outputs:
364*4882a593Smuzhiyun * *value the integer representation of the environment variable 'match'
365*4882a593Smuzhiyun * Returns:
366*4882a593Smuzhiyun * Zero on success, a kdb diagnostic on failure.
367*4882a593Smuzhiyun */
kdbgetintenv(const char * match,int * value)368*4882a593Smuzhiyun int kdbgetintenv(const char *match, int *value)
369*4882a593Smuzhiyun {
370*4882a593Smuzhiyun unsigned long val;
371*4882a593Smuzhiyun int diag;
372*4882a593Smuzhiyun
373*4882a593Smuzhiyun diag = kdbgetulenv(match, &val);
374*4882a593Smuzhiyun if (!diag)
375*4882a593Smuzhiyun *value = (int) val;
376*4882a593Smuzhiyun return diag;
377*4882a593Smuzhiyun }
378*4882a593Smuzhiyun
379*4882a593Smuzhiyun /*
380*4882a593Smuzhiyun * kdbgetularg - This function will convert a numeric string into an
381*4882a593Smuzhiyun * unsigned long value.
382*4882a593Smuzhiyun * Parameters:
383*4882a593Smuzhiyun * arg A character string representing a numeric value
384*4882a593Smuzhiyun * Outputs:
385*4882a593Smuzhiyun * *value the unsigned long represntation of arg.
386*4882a593Smuzhiyun * Returns:
387*4882a593Smuzhiyun * Zero on success, a kdb diagnostic on failure.
388*4882a593Smuzhiyun */
kdbgetularg(const char * arg,unsigned long * value)389*4882a593Smuzhiyun int kdbgetularg(const char *arg, unsigned long *value)
390*4882a593Smuzhiyun {
391*4882a593Smuzhiyun char *endp;
392*4882a593Smuzhiyun unsigned long val;
393*4882a593Smuzhiyun
394*4882a593Smuzhiyun val = simple_strtoul(arg, &endp, 0);
395*4882a593Smuzhiyun
396*4882a593Smuzhiyun if (endp == arg) {
397*4882a593Smuzhiyun /*
398*4882a593Smuzhiyun * Also try base 16, for us folks too lazy to type the
399*4882a593Smuzhiyun * leading 0x...
400*4882a593Smuzhiyun */
401*4882a593Smuzhiyun val = simple_strtoul(arg, &endp, 16);
402*4882a593Smuzhiyun if (endp == arg)
403*4882a593Smuzhiyun return KDB_BADINT;
404*4882a593Smuzhiyun }
405*4882a593Smuzhiyun
406*4882a593Smuzhiyun *value = val;
407*4882a593Smuzhiyun
408*4882a593Smuzhiyun return 0;
409*4882a593Smuzhiyun }
410*4882a593Smuzhiyun
kdbgetu64arg(const char * arg,u64 * value)411*4882a593Smuzhiyun int kdbgetu64arg(const char *arg, u64 *value)
412*4882a593Smuzhiyun {
413*4882a593Smuzhiyun char *endp;
414*4882a593Smuzhiyun u64 val;
415*4882a593Smuzhiyun
416*4882a593Smuzhiyun val = simple_strtoull(arg, &endp, 0);
417*4882a593Smuzhiyun
418*4882a593Smuzhiyun if (endp == arg) {
419*4882a593Smuzhiyun
420*4882a593Smuzhiyun val = simple_strtoull(arg, &endp, 16);
421*4882a593Smuzhiyun if (endp == arg)
422*4882a593Smuzhiyun return KDB_BADINT;
423*4882a593Smuzhiyun }
424*4882a593Smuzhiyun
425*4882a593Smuzhiyun *value = val;
426*4882a593Smuzhiyun
427*4882a593Smuzhiyun return 0;
428*4882a593Smuzhiyun }
429*4882a593Smuzhiyun
430*4882a593Smuzhiyun /*
431*4882a593Smuzhiyun * kdb_set - This function implements the 'set' command. Alter an
432*4882a593Smuzhiyun * existing environment variable or create a new one.
433*4882a593Smuzhiyun */
kdb_set(int argc,const char ** argv)434*4882a593Smuzhiyun int kdb_set(int argc, const char **argv)
435*4882a593Smuzhiyun {
436*4882a593Smuzhiyun int i;
437*4882a593Smuzhiyun char *ep;
438*4882a593Smuzhiyun size_t varlen, vallen;
439*4882a593Smuzhiyun
440*4882a593Smuzhiyun /*
441*4882a593Smuzhiyun * we can be invoked two ways:
442*4882a593Smuzhiyun * set var=value argv[1]="var", argv[2]="value"
443*4882a593Smuzhiyun * set var = value argv[1]="var", argv[2]="=", argv[3]="value"
444*4882a593Smuzhiyun * - if the latter, shift 'em down.
445*4882a593Smuzhiyun */
446*4882a593Smuzhiyun if (argc == 3) {
447*4882a593Smuzhiyun argv[2] = argv[3];
448*4882a593Smuzhiyun argc--;
449*4882a593Smuzhiyun }
450*4882a593Smuzhiyun
451*4882a593Smuzhiyun if (argc != 2)
452*4882a593Smuzhiyun return KDB_ARGCOUNT;
453*4882a593Smuzhiyun
454*4882a593Smuzhiyun /*
455*4882a593Smuzhiyun * Censor sensitive variables
456*4882a593Smuzhiyun */
457*4882a593Smuzhiyun if (strcmp(argv[1], "PROMPT") == 0 &&
458*4882a593Smuzhiyun !kdb_check_flags(KDB_ENABLE_MEM_READ, kdb_cmd_enabled, false))
459*4882a593Smuzhiyun return KDB_NOPERM;
460*4882a593Smuzhiyun
461*4882a593Smuzhiyun /*
462*4882a593Smuzhiyun * Check for internal variables
463*4882a593Smuzhiyun */
464*4882a593Smuzhiyun if (strcmp(argv[1], "KDBDEBUG") == 0) {
465*4882a593Smuzhiyun unsigned int debugflags;
466*4882a593Smuzhiyun char *cp;
467*4882a593Smuzhiyun
468*4882a593Smuzhiyun debugflags = simple_strtoul(argv[2], &cp, 0);
469*4882a593Smuzhiyun if (cp == argv[2] || debugflags & ~KDB_DEBUG_FLAG_MASK) {
470*4882a593Smuzhiyun kdb_printf("kdb: illegal debug flags '%s'\n",
471*4882a593Smuzhiyun argv[2]);
472*4882a593Smuzhiyun return 0;
473*4882a593Smuzhiyun }
474*4882a593Smuzhiyun kdb_flags = (kdb_flags & ~KDB_DEBUG(MASK))
475*4882a593Smuzhiyun | (debugflags << KDB_DEBUG_FLAG_SHIFT);
476*4882a593Smuzhiyun
477*4882a593Smuzhiyun return 0;
478*4882a593Smuzhiyun }
479*4882a593Smuzhiyun
480*4882a593Smuzhiyun /*
481*4882a593Smuzhiyun * Tokenizer squashed the '=' sign. argv[1] is variable
482*4882a593Smuzhiyun * name, argv[2] = value.
483*4882a593Smuzhiyun */
484*4882a593Smuzhiyun varlen = strlen(argv[1]);
485*4882a593Smuzhiyun vallen = strlen(argv[2]);
486*4882a593Smuzhiyun ep = kdballocenv(varlen + vallen + 2);
487*4882a593Smuzhiyun if (ep == (char *)0)
488*4882a593Smuzhiyun return KDB_ENVBUFFULL;
489*4882a593Smuzhiyun
490*4882a593Smuzhiyun sprintf(ep, "%s=%s", argv[1], argv[2]);
491*4882a593Smuzhiyun
492*4882a593Smuzhiyun ep[varlen+vallen+1] = '\0';
493*4882a593Smuzhiyun
494*4882a593Smuzhiyun for (i = 0; i < __nenv; i++) {
495*4882a593Smuzhiyun if (__env[i]
496*4882a593Smuzhiyun && ((strncmp(__env[i], argv[1], varlen) == 0)
497*4882a593Smuzhiyun && ((__env[i][varlen] == '\0')
498*4882a593Smuzhiyun || (__env[i][varlen] == '=')))) {
499*4882a593Smuzhiyun __env[i] = ep;
500*4882a593Smuzhiyun return 0;
501*4882a593Smuzhiyun }
502*4882a593Smuzhiyun }
503*4882a593Smuzhiyun
504*4882a593Smuzhiyun /*
505*4882a593Smuzhiyun * Wasn't existing variable. Fit into slot.
506*4882a593Smuzhiyun */
507*4882a593Smuzhiyun for (i = 0; i < __nenv-1; i++) {
508*4882a593Smuzhiyun if (__env[i] == (char *)0) {
509*4882a593Smuzhiyun __env[i] = ep;
510*4882a593Smuzhiyun return 0;
511*4882a593Smuzhiyun }
512*4882a593Smuzhiyun }
513*4882a593Smuzhiyun
514*4882a593Smuzhiyun return KDB_ENVFULL;
515*4882a593Smuzhiyun }
516*4882a593Smuzhiyun
kdb_check_regs(void)517*4882a593Smuzhiyun static int kdb_check_regs(void)
518*4882a593Smuzhiyun {
519*4882a593Smuzhiyun if (!kdb_current_regs) {
520*4882a593Smuzhiyun kdb_printf("No current kdb registers."
521*4882a593Smuzhiyun " You may need to select another task\n");
522*4882a593Smuzhiyun return KDB_BADREG;
523*4882a593Smuzhiyun }
524*4882a593Smuzhiyun return 0;
525*4882a593Smuzhiyun }
526*4882a593Smuzhiyun
527*4882a593Smuzhiyun /*
528*4882a593Smuzhiyun * kdbgetaddrarg - This function is responsible for parsing an
529*4882a593Smuzhiyun * address-expression and returning the value of the expression,
530*4882a593Smuzhiyun * symbol name, and offset to the caller.
531*4882a593Smuzhiyun *
532*4882a593Smuzhiyun * The argument may consist of a numeric value (decimal or
533*4882a593Smuzhiyun * hexidecimal), a symbol name, a register name (preceded by the
534*4882a593Smuzhiyun * percent sign), an environment variable with a numeric value
535*4882a593Smuzhiyun * (preceded by a dollar sign) or a simple arithmetic expression
536*4882a593Smuzhiyun * consisting of a symbol name, +/-, and a numeric constant value
537*4882a593Smuzhiyun * (offset).
538*4882a593Smuzhiyun * Parameters:
539*4882a593Smuzhiyun * argc - count of arguments in argv
540*4882a593Smuzhiyun * argv - argument vector
541*4882a593Smuzhiyun * *nextarg - index to next unparsed argument in argv[]
542*4882a593Smuzhiyun * regs - Register state at time of KDB entry
543*4882a593Smuzhiyun * Outputs:
544*4882a593Smuzhiyun * *value - receives the value of the address-expression
545*4882a593Smuzhiyun * *offset - receives the offset specified, if any
546*4882a593Smuzhiyun * *name - receives the symbol name, if any
547*4882a593Smuzhiyun * *nextarg - index to next unparsed argument in argv[]
548*4882a593Smuzhiyun * Returns:
549*4882a593Smuzhiyun * zero is returned on success, a kdb diagnostic code is
550*4882a593Smuzhiyun * returned on error.
551*4882a593Smuzhiyun */
kdbgetaddrarg(int argc,const char ** argv,int * nextarg,unsigned long * value,long * offset,char ** name)552*4882a593Smuzhiyun int kdbgetaddrarg(int argc, const char **argv, int *nextarg,
553*4882a593Smuzhiyun unsigned long *value, long *offset,
554*4882a593Smuzhiyun char **name)
555*4882a593Smuzhiyun {
556*4882a593Smuzhiyun unsigned long addr;
557*4882a593Smuzhiyun unsigned long off = 0;
558*4882a593Smuzhiyun int positive;
559*4882a593Smuzhiyun int diag;
560*4882a593Smuzhiyun int found = 0;
561*4882a593Smuzhiyun char *symname;
562*4882a593Smuzhiyun char symbol = '\0';
563*4882a593Smuzhiyun char *cp;
564*4882a593Smuzhiyun kdb_symtab_t symtab;
565*4882a593Smuzhiyun
566*4882a593Smuzhiyun /*
567*4882a593Smuzhiyun * If the enable flags prohibit both arbitrary memory access
568*4882a593Smuzhiyun * and flow control then there are no reasonable grounds to
569*4882a593Smuzhiyun * provide symbol lookup.
570*4882a593Smuzhiyun */
571*4882a593Smuzhiyun if (!kdb_check_flags(KDB_ENABLE_MEM_READ | KDB_ENABLE_FLOW_CTRL,
572*4882a593Smuzhiyun kdb_cmd_enabled, false))
573*4882a593Smuzhiyun return KDB_NOPERM;
574*4882a593Smuzhiyun
575*4882a593Smuzhiyun /*
576*4882a593Smuzhiyun * Process arguments which follow the following syntax:
577*4882a593Smuzhiyun *
578*4882a593Smuzhiyun * symbol | numeric-address [+/- numeric-offset]
579*4882a593Smuzhiyun * %register
580*4882a593Smuzhiyun * $environment-variable
581*4882a593Smuzhiyun */
582*4882a593Smuzhiyun
583*4882a593Smuzhiyun if (*nextarg > argc)
584*4882a593Smuzhiyun return KDB_ARGCOUNT;
585*4882a593Smuzhiyun
586*4882a593Smuzhiyun symname = (char *)argv[*nextarg];
587*4882a593Smuzhiyun
588*4882a593Smuzhiyun /*
589*4882a593Smuzhiyun * If there is no whitespace between the symbol
590*4882a593Smuzhiyun * or address and the '+' or '-' symbols, we
591*4882a593Smuzhiyun * remember the character and replace it with a
592*4882a593Smuzhiyun * null so the symbol/value can be properly parsed
593*4882a593Smuzhiyun */
594*4882a593Smuzhiyun cp = strpbrk(symname, "+-");
595*4882a593Smuzhiyun if (cp != NULL) {
596*4882a593Smuzhiyun symbol = *cp;
597*4882a593Smuzhiyun *cp++ = '\0';
598*4882a593Smuzhiyun }
599*4882a593Smuzhiyun
600*4882a593Smuzhiyun if (symname[0] == '$') {
601*4882a593Smuzhiyun diag = kdbgetulenv(&symname[1], &addr);
602*4882a593Smuzhiyun if (diag)
603*4882a593Smuzhiyun return diag;
604*4882a593Smuzhiyun } else if (symname[0] == '%') {
605*4882a593Smuzhiyun diag = kdb_check_regs();
606*4882a593Smuzhiyun if (diag)
607*4882a593Smuzhiyun return diag;
608*4882a593Smuzhiyun /* Implement register values with % at a later time as it is
609*4882a593Smuzhiyun * arch optional.
610*4882a593Smuzhiyun */
611*4882a593Smuzhiyun return KDB_NOTIMP;
612*4882a593Smuzhiyun } else {
613*4882a593Smuzhiyun found = kdbgetsymval(symname, &symtab);
614*4882a593Smuzhiyun if (found) {
615*4882a593Smuzhiyun addr = symtab.sym_start;
616*4882a593Smuzhiyun } else {
617*4882a593Smuzhiyun diag = kdbgetularg(argv[*nextarg], &addr);
618*4882a593Smuzhiyun if (diag)
619*4882a593Smuzhiyun return diag;
620*4882a593Smuzhiyun }
621*4882a593Smuzhiyun }
622*4882a593Smuzhiyun
623*4882a593Smuzhiyun if (!found)
624*4882a593Smuzhiyun found = kdbnearsym(addr, &symtab);
625*4882a593Smuzhiyun
626*4882a593Smuzhiyun (*nextarg)++;
627*4882a593Smuzhiyun
628*4882a593Smuzhiyun if (name)
629*4882a593Smuzhiyun *name = symname;
630*4882a593Smuzhiyun if (value)
631*4882a593Smuzhiyun *value = addr;
632*4882a593Smuzhiyun if (offset && name && *name)
633*4882a593Smuzhiyun *offset = addr - symtab.sym_start;
634*4882a593Smuzhiyun
635*4882a593Smuzhiyun if ((*nextarg > argc)
636*4882a593Smuzhiyun && (symbol == '\0'))
637*4882a593Smuzhiyun return 0;
638*4882a593Smuzhiyun
639*4882a593Smuzhiyun /*
640*4882a593Smuzhiyun * check for +/- and offset
641*4882a593Smuzhiyun */
642*4882a593Smuzhiyun
643*4882a593Smuzhiyun if (symbol == '\0') {
644*4882a593Smuzhiyun if ((argv[*nextarg][0] != '+')
645*4882a593Smuzhiyun && (argv[*nextarg][0] != '-')) {
646*4882a593Smuzhiyun /*
647*4882a593Smuzhiyun * Not our argument. Return.
648*4882a593Smuzhiyun */
649*4882a593Smuzhiyun return 0;
650*4882a593Smuzhiyun } else {
651*4882a593Smuzhiyun positive = (argv[*nextarg][0] == '+');
652*4882a593Smuzhiyun (*nextarg)++;
653*4882a593Smuzhiyun }
654*4882a593Smuzhiyun } else
655*4882a593Smuzhiyun positive = (symbol == '+');
656*4882a593Smuzhiyun
657*4882a593Smuzhiyun /*
658*4882a593Smuzhiyun * Now there must be an offset!
659*4882a593Smuzhiyun */
660*4882a593Smuzhiyun if ((*nextarg > argc)
661*4882a593Smuzhiyun && (symbol == '\0')) {
662*4882a593Smuzhiyun return KDB_INVADDRFMT;
663*4882a593Smuzhiyun }
664*4882a593Smuzhiyun
665*4882a593Smuzhiyun if (!symbol) {
666*4882a593Smuzhiyun cp = (char *)argv[*nextarg];
667*4882a593Smuzhiyun (*nextarg)++;
668*4882a593Smuzhiyun }
669*4882a593Smuzhiyun
670*4882a593Smuzhiyun diag = kdbgetularg(cp, &off);
671*4882a593Smuzhiyun if (diag)
672*4882a593Smuzhiyun return diag;
673*4882a593Smuzhiyun
674*4882a593Smuzhiyun if (!positive)
675*4882a593Smuzhiyun off = -off;
676*4882a593Smuzhiyun
677*4882a593Smuzhiyun if (offset)
678*4882a593Smuzhiyun *offset += off;
679*4882a593Smuzhiyun
680*4882a593Smuzhiyun if (value)
681*4882a593Smuzhiyun *value += off;
682*4882a593Smuzhiyun
683*4882a593Smuzhiyun return 0;
684*4882a593Smuzhiyun }
685*4882a593Smuzhiyun
kdb_cmderror(int diag)686*4882a593Smuzhiyun static void kdb_cmderror(int diag)
687*4882a593Smuzhiyun {
688*4882a593Smuzhiyun int i;
689*4882a593Smuzhiyun
690*4882a593Smuzhiyun if (diag >= 0) {
691*4882a593Smuzhiyun kdb_printf("no error detected (diagnostic is %d)\n", diag);
692*4882a593Smuzhiyun return;
693*4882a593Smuzhiyun }
694*4882a593Smuzhiyun
695*4882a593Smuzhiyun for (i = 0; i < __nkdb_err; i++) {
696*4882a593Smuzhiyun if (kdbmsgs[i].km_diag == diag) {
697*4882a593Smuzhiyun kdb_printf("diag: %d: %s\n", diag, kdbmsgs[i].km_msg);
698*4882a593Smuzhiyun return;
699*4882a593Smuzhiyun }
700*4882a593Smuzhiyun }
701*4882a593Smuzhiyun
702*4882a593Smuzhiyun kdb_printf("Unknown diag %d\n", -diag);
703*4882a593Smuzhiyun }
704*4882a593Smuzhiyun
705*4882a593Smuzhiyun /*
706*4882a593Smuzhiyun * kdb_defcmd, kdb_defcmd2 - This function implements the 'defcmd'
707*4882a593Smuzhiyun * command which defines one command as a set of other commands,
708*4882a593Smuzhiyun * terminated by endefcmd. kdb_defcmd processes the initial
709*4882a593Smuzhiyun * 'defcmd' command, kdb_defcmd2 is invoked from kdb_parse for
710*4882a593Smuzhiyun * the following commands until 'endefcmd'.
711*4882a593Smuzhiyun * Inputs:
712*4882a593Smuzhiyun * argc argument count
713*4882a593Smuzhiyun * argv argument vector
714*4882a593Smuzhiyun * Returns:
715*4882a593Smuzhiyun * zero for success, a kdb diagnostic if error
716*4882a593Smuzhiyun */
717*4882a593Smuzhiyun struct defcmd_set {
718*4882a593Smuzhiyun int count;
719*4882a593Smuzhiyun bool usable;
720*4882a593Smuzhiyun char *name;
721*4882a593Smuzhiyun char *usage;
722*4882a593Smuzhiyun char *help;
723*4882a593Smuzhiyun char **command;
724*4882a593Smuzhiyun };
725*4882a593Smuzhiyun static struct defcmd_set *defcmd_set;
726*4882a593Smuzhiyun static int defcmd_set_count;
727*4882a593Smuzhiyun static bool defcmd_in_progress;
728*4882a593Smuzhiyun
729*4882a593Smuzhiyun /* Forward references */
730*4882a593Smuzhiyun static int kdb_exec_defcmd(int argc, const char **argv);
731*4882a593Smuzhiyun
kdb_defcmd2(const char * cmdstr,const char * argv0)732*4882a593Smuzhiyun static int kdb_defcmd2(const char *cmdstr, const char *argv0)
733*4882a593Smuzhiyun {
734*4882a593Smuzhiyun struct defcmd_set *s = defcmd_set + defcmd_set_count - 1;
735*4882a593Smuzhiyun char **save_command = s->command;
736*4882a593Smuzhiyun if (strcmp(argv0, "endefcmd") == 0) {
737*4882a593Smuzhiyun defcmd_in_progress = false;
738*4882a593Smuzhiyun if (!s->count)
739*4882a593Smuzhiyun s->usable = false;
740*4882a593Smuzhiyun if (s->usable)
741*4882a593Smuzhiyun /* macros are always safe because when executed each
742*4882a593Smuzhiyun * internal command re-enters kdb_parse() and is
743*4882a593Smuzhiyun * safety checked individually.
744*4882a593Smuzhiyun */
745*4882a593Smuzhiyun kdb_register_flags(s->name, kdb_exec_defcmd, s->usage,
746*4882a593Smuzhiyun s->help, 0,
747*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
748*4882a593Smuzhiyun return 0;
749*4882a593Smuzhiyun }
750*4882a593Smuzhiyun if (!s->usable)
751*4882a593Smuzhiyun return KDB_NOTIMP;
752*4882a593Smuzhiyun s->command = kcalloc(s->count + 1, sizeof(*(s->command)), GFP_KDB);
753*4882a593Smuzhiyun if (!s->command) {
754*4882a593Smuzhiyun kdb_printf("Could not allocate new kdb_defcmd table for %s\n",
755*4882a593Smuzhiyun cmdstr);
756*4882a593Smuzhiyun s->usable = false;
757*4882a593Smuzhiyun return KDB_NOTIMP;
758*4882a593Smuzhiyun }
759*4882a593Smuzhiyun memcpy(s->command, save_command, s->count * sizeof(*(s->command)));
760*4882a593Smuzhiyun s->command[s->count++] = kdb_strdup(cmdstr, GFP_KDB);
761*4882a593Smuzhiyun kfree(save_command);
762*4882a593Smuzhiyun return 0;
763*4882a593Smuzhiyun }
764*4882a593Smuzhiyun
kdb_defcmd(int argc,const char ** argv)765*4882a593Smuzhiyun static int kdb_defcmd(int argc, const char **argv)
766*4882a593Smuzhiyun {
767*4882a593Smuzhiyun struct defcmd_set *save_defcmd_set = defcmd_set, *s;
768*4882a593Smuzhiyun if (defcmd_in_progress) {
769*4882a593Smuzhiyun kdb_printf("kdb: nested defcmd detected, assuming missing "
770*4882a593Smuzhiyun "endefcmd\n");
771*4882a593Smuzhiyun kdb_defcmd2("endefcmd", "endefcmd");
772*4882a593Smuzhiyun }
773*4882a593Smuzhiyun if (argc == 0) {
774*4882a593Smuzhiyun int i;
775*4882a593Smuzhiyun for (s = defcmd_set; s < defcmd_set + defcmd_set_count; ++s) {
776*4882a593Smuzhiyun kdb_printf("defcmd %s \"%s\" \"%s\"\n", s->name,
777*4882a593Smuzhiyun s->usage, s->help);
778*4882a593Smuzhiyun for (i = 0; i < s->count; ++i)
779*4882a593Smuzhiyun kdb_printf("%s", s->command[i]);
780*4882a593Smuzhiyun kdb_printf("endefcmd\n");
781*4882a593Smuzhiyun }
782*4882a593Smuzhiyun return 0;
783*4882a593Smuzhiyun }
784*4882a593Smuzhiyun if (argc != 3)
785*4882a593Smuzhiyun return KDB_ARGCOUNT;
786*4882a593Smuzhiyun if (in_dbg_master()) {
787*4882a593Smuzhiyun kdb_printf("Command only available during kdb_init()\n");
788*4882a593Smuzhiyun return KDB_NOTIMP;
789*4882a593Smuzhiyun }
790*4882a593Smuzhiyun defcmd_set = kmalloc_array(defcmd_set_count + 1, sizeof(*defcmd_set),
791*4882a593Smuzhiyun GFP_KDB);
792*4882a593Smuzhiyun if (!defcmd_set)
793*4882a593Smuzhiyun goto fail_defcmd;
794*4882a593Smuzhiyun memcpy(defcmd_set, save_defcmd_set,
795*4882a593Smuzhiyun defcmd_set_count * sizeof(*defcmd_set));
796*4882a593Smuzhiyun s = defcmd_set + defcmd_set_count;
797*4882a593Smuzhiyun memset(s, 0, sizeof(*s));
798*4882a593Smuzhiyun s->usable = true;
799*4882a593Smuzhiyun s->name = kdb_strdup(argv[1], GFP_KDB);
800*4882a593Smuzhiyun if (!s->name)
801*4882a593Smuzhiyun goto fail_name;
802*4882a593Smuzhiyun s->usage = kdb_strdup(argv[2], GFP_KDB);
803*4882a593Smuzhiyun if (!s->usage)
804*4882a593Smuzhiyun goto fail_usage;
805*4882a593Smuzhiyun s->help = kdb_strdup(argv[3], GFP_KDB);
806*4882a593Smuzhiyun if (!s->help)
807*4882a593Smuzhiyun goto fail_help;
808*4882a593Smuzhiyun if (s->usage[0] == '"') {
809*4882a593Smuzhiyun strcpy(s->usage, argv[2]+1);
810*4882a593Smuzhiyun s->usage[strlen(s->usage)-1] = '\0';
811*4882a593Smuzhiyun }
812*4882a593Smuzhiyun if (s->help[0] == '"') {
813*4882a593Smuzhiyun strcpy(s->help, argv[3]+1);
814*4882a593Smuzhiyun s->help[strlen(s->help)-1] = '\0';
815*4882a593Smuzhiyun }
816*4882a593Smuzhiyun ++defcmd_set_count;
817*4882a593Smuzhiyun defcmd_in_progress = true;
818*4882a593Smuzhiyun kfree(save_defcmd_set);
819*4882a593Smuzhiyun return 0;
820*4882a593Smuzhiyun fail_help:
821*4882a593Smuzhiyun kfree(s->usage);
822*4882a593Smuzhiyun fail_usage:
823*4882a593Smuzhiyun kfree(s->name);
824*4882a593Smuzhiyun fail_name:
825*4882a593Smuzhiyun kfree(defcmd_set);
826*4882a593Smuzhiyun fail_defcmd:
827*4882a593Smuzhiyun kdb_printf("Could not allocate new defcmd_set entry for %s\n", argv[1]);
828*4882a593Smuzhiyun defcmd_set = save_defcmd_set;
829*4882a593Smuzhiyun return KDB_NOTIMP;
830*4882a593Smuzhiyun }
831*4882a593Smuzhiyun
832*4882a593Smuzhiyun /*
833*4882a593Smuzhiyun * kdb_exec_defcmd - Execute the set of commands associated with this
834*4882a593Smuzhiyun * defcmd name.
835*4882a593Smuzhiyun * Inputs:
836*4882a593Smuzhiyun * argc argument count
837*4882a593Smuzhiyun * argv argument vector
838*4882a593Smuzhiyun * Returns:
839*4882a593Smuzhiyun * zero for success, a kdb diagnostic if error
840*4882a593Smuzhiyun */
kdb_exec_defcmd(int argc,const char ** argv)841*4882a593Smuzhiyun static int kdb_exec_defcmd(int argc, const char **argv)
842*4882a593Smuzhiyun {
843*4882a593Smuzhiyun int i, ret;
844*4882a593Smuzhiyun struct defcmd_set *s;
845*4882a593Smuzhiyun if (argc != 0)
846*4882a593Smuzhiyun return KDB_ARGCOUNT;
847*4882a593Smuzhiyun for (s = defcmd_set, i = 0; i < defcmd_set_count; ++i, ++s) {
848*4882a593Smuzhiyun if (strcmp(s->name, argv[0]) == 0)
849*4882a593Smuzhiyun break;
850*4882a593Smuzhiyun }
851*4882a593Smuzhiyun if (i == defcmd_set_count) {
852*4882a593Smuzhiyun kdb_printf("kdb_exec_defcmd: could not find commands for %s\n",
853*4882a593Smuzhiyun argv[0]);
854*4882a593Smuzhiyun return KDB_NOTIMP;
855*4882a593Smuzhiyun }
856*4882a593Smuzhiyun for (i = 0; i < s->count; ++i) {
857*4882a593Smuzhiyun /* Recursive use of kdb_parse, do not use argv after
858*4882a593Smuzhiyun * this point */
859*4882a593Smuzhiyun argv = NULL;
860*4882a593Smuzhiyun kdb_printf("[%s]kdb> %s\n", s->name, s->command[i]);
861*4882a593Smuzhiyun ret = kdb_parse(s->command[i]);
862*4882a593Smuzhiyun if (ret)
863*4882a593Smuzhiyun return ret;
864*4882a593Smuzhiyun }
865*4882a593Smuzhiyun return 0;
866*4882a593Smuzhiyun }
867*4882a593Smuzhiyun
868*4882a593Smuzhiyun /* Command history */
869*4882a593Smuzhiyun #define KDB_CMD_HISTORY_COUNT 32
870*4882a593Smuzhiyun #define CMD_BUFLEN 200 /* kdb_printf: max printline
871*4882a593Smuzhiyun * size == 256 */
872*4882a593Smuzhiyun static unsigned int cmd_head, cmd_tail;
873*4882a593Smuzhiyun static unsigned int cmdptr;
874*4882a593Smuzhiyun static char cmd_hist[KDB_CMD_HISTORY_COUNT][CMD_BUFLEN];
875*4882a593Smuzhiyun static char cmd_cur[CMD_BUFLEN];
876*4882a593Smuzhiyun
877*4882a593Smuzhiyun /*
878*4882a593Smuzhiyun * The "str" argument may point to something like | grep xyz
879*4882a593Smuzhiyun */
parse_grep(const char * str)880*4882a593Smuzhiyun static void parse_grep(const char *str)
881*4882a593Smuzhiyun {
882*4882a593Smuzhiyun int len;
883*4882a593Smuzhiyun char *cp = (char *)str, *cp2;
884*4882a593Smuzhiyun
885*4882a593Smuzhiyun /* sanity check: we should have been called with the \ first */
886*4882a593Smuzhiyun if (*cp != '|')
887*4882a593Smuzhiyun return;
888*4882a593Smuzhiyun cp++;
889*4882a593Smuzhiyun while (isspace(*cp))
890*4882a593Smuzhiyun cp++;
891*4882a593Smuzhiyun if (!str_has_prefix(cp, "grep ")) {
892*4882a593Smuzhiyun kdb_printf("invalid 'pipe', see grephelp\n");
893*4882a593Smuzhiyun return;
894*4882a593Smuzhiyun }
895*4882a593Smuzhiyun cp += 5;
896*4882a593Smuzhiyun while (isspace(*cp))
897*4882a593Smuzhiyun cp++;
898*4882a593Smuzhiyun cp2 = strchr(cp, '\n');
899*4882a593Smuzhiyun if (cp2)
900*4882a593Smuzhiyun *cp2 = '\0'; /* remove the trailing newline */
901*4882a593Smuzhiyun len = strlen(cp);
902*4882a593Smuzhiyun if (len == 0) {
903*4882a593Smuzhiyun kdb_printf("invalid 'pipe', see grephelp\n");
904*4882a593Smuzhiyun return;
905*4882a593Smuzhiyun }
906*4882a593Smuzhiyun /* now cp points to a nonzero length search string */
907*4882a593Smuzhiyun if (*cp == '"') {
908*4882a593Smuzhiyun /* allow it be "x y z" by removing the "'s - there must
909*4882a593Smuzhiyun be two of them */
910*4882a593Smuzhiyun cp++;
911*4882a593Smuzhiyun cp2 = strchr(cp, '"');
912*4882a593Smuzhiyun if (!cp2) {
913*4882a593Smuzhiyun kdb_printf("invalid quoted string, see grephelp\n");
914*4882a593Smuzhiyun return;
915*4882a593Smuzhiyun }
916*4882a593Smuzhiyun *cp2 = '\0'; /* end the string where the 2nd " was */
917*4882a593Smuzhiyun }
918*4882a593Smuzhiyun kdb_grep_leading = 0;
919*4882a593Smuzhiyun if (*cp == '^') {
920*4882a593Smuzhiyun kdb_grep_leading = 1;
921*4882a593Smuzhiyun cp++;
922*4882a593Smuzhiyun }
923*4882a593Smuzhiyun len = strlen(cp);
924*4882a593Smuzhiyun kdb_grep_trailing = 0;
925*4882a593Smuzhiyun if (*(cp+len-1) == '$') {
926*4882a593Smuzhiyun kdb_grep_trailing = 1;
927*4882a593Smuzhiyun *(cp+len-1) = '\0';
928*4882a593Smuzhiyun }
929*4882a593Smuzhiyun len = strlen(cp);
930*4882a593Smuzhiyun if (!len)
931*4882a593Smuzhiyun return;
932*4882a593Smuzhiyun if (len >= KDB_GREP_STRLEN) {
933*4882a593Smuzhiyun kdb_printf("search string too long\n");
934*4882a593Smuzhiyun return;
935*4882a593Smuzhiyun }
936*4882a593Smuzhiyun strcpy(kdb_grep_string, cp);
937*4882a593Smuzhiyun kdb_grepping_flag++;
938*4882a593Smuzhiyun return;
939*4882a593Smuzhiyun }
940*4882a593Smuzhiyun
941*4882a593Smuzhiyun /*
942*4882a593Smuzhiyun * kdb_parse - Parse the command line, search the command table for a
943*4882a593Smuzhiyun * matching command and invoke the command function. This
944*4882a593Smuzhiyun * function may be called recursively, if it is, the second call
945*4882a593Smuzhiyun * will overwrite argv and cbuf. It is the caller's
946*4882a593Smuzhiyun * responsibility to save their argv if they recursively call
947*4882a593Smuzhiyun * kdb_parse().
948*4882a593Smuzhiyun * Parameters:
949*4882a593Smuzhiyun * cmdstr The input command line to be parsed.
950*4882a593Smuzhiyun * regs The registers at the time kdb was entered.
951*4882a593Smuzhiyun * Returns:
952*4882a593Smuzhiyun * Zero for success, a kdb diagnostic if failure.
953*4882a593Smuzhiyun * Remarks:
954*4882a593Smuzhiyun * Limited to 20 tokens.
955*4882a593Smuzhiyun *
956*4882a593Smuzhiyun * Real rudimentary tokenization. Basically only whitespace
957*4882a593Smuzhiyun * is considered a token delimeter (but special consideration
958*4882a593Smuzhiyun * is taken of the '=' sign as used by the 'set' command).
959*4882a593Smuzhiyun *
960*4882a593Smuzhiyun * The algorithm used to tokenize the input string relies on
961*4882a593Smuzhiyun * there being at least one whitespace (or otherwise useless)
962*4882a593Smuzhiyun * character between tokens as the character immediately following
963*4882a593Smuzhiyun * the token is altered in-place to a null-byte to terminate the
964*4882a593Smuzhiyun * token string.
965*4882a593Smuzhiyun */
966*4882a593Smuzhiyun
967*4882a593Smuzhiyun #define MAXARGC 20
968*4882a593Smuzhiyun
kdb_parse(const char * cmdstr)969*4882a593Smuzhiyun int kdb_parse(const char *cmdstr)
970*4882a593Smuzhiyun {
971*4882a593Smuzhiyun static char *argv[MAXARGC];
972*4882a593Smuzhiyun static int argc;
973*4882a593Smuzhiyun static char cbuf[CMD_BUFLEN+2];
974*4882a593Smuzhiyun char *cp;
975*4882a593Smuzhiyun char *cpp, quoted;
976*4882a593Smuzhiyun kdbtab_t *tp;
977*4882a593Smuzhiyun int i, escaped, ignore_errors = 0, check_grep = 0;
978*4882a593Smuzhiyun
979*4882a593Smuzhiyun /*
980*4882a593Smuzhiyun * First tokenize the command string.
981*4882a593Smuzhiyun */
982*4882a593Smuzhiyun cp = (char *)cmdstr;
983*4882a593Smuzhiyun
984*4882a593Smuzhiyun if (KDB_FLAG(CMD_INTERRUPT)) {
985*4882a593Smuzhiyun /* Previous command was interrupted, newline must not
986*4882a593Smuzhiyun * repeat the command */
987*4882a593Smuzhiyun KDB_FLAG_CLEAR(CMD_INTERRUPT);
988*4882a593Smuzhiyun KDB_STATE_SET(PAGER);
989*4882a593Smuzhiyun argc = 0; /* no repeat */
990*4882a593Smuzhiyun }
991*4882a593Smuzhiyun
992*4882a593Smuzhiyun if (*cp != '\n' && *cp != '\0') {
993*4882a593Smuzhiyun argc = 0;
994*4882a593Smuzhiyun cpp = cbuf;
995*4882a593Smuzhiyun while (*cp) {
996*4882a593Smuzhiyun /* skip whitespace */
997*4882a593Smuzhiyun while (isspace(*cp))
998*4882a593Smuzhiyun cp++;
999*4882a593Smuzhiyun if ((*cp == '\0') || (*cp == '\n') ||
1000*4882a593Smuzhiyun (*cp == '#' && !defcmd_in_progress))
1001*4882a593Smuzhiyun break;
1002*4882a593Smuzhiyun /* special case: check for | grep pattern */
1003*4882a593Smuzhiyun if (*cp == '|') {
1004*4882a593Smuzhiyun check_grep++;
1005*4882a593Smuzhiyun break;
1006*4882a593Smuzhiyun }
1007*4882a593Smuzhiyun if (cpp >= cbuf + CMD_BUFLEN) {
1008*4882a593Smuzhiyun kdb_printf("kdb_parse: command buffer "
1009*4882a593Smuzhiyun "overflow, command ignored\n%s\n",
1010*4882a593Smuzhiyun cmdstr);
1011*4882a593Smuzhiyun return KDB_NOTFOUND;
1012*4882a593Smuzhiyun }
1013*4882a593Smuzhiyun if (argc >= MAXARGC - 1) {
1014*4882a593Smuzhiyun kdb_printf("kdb_parse: too many arguments, "
1015*4882a593Smuzhiyun "command ignored\n%s\n", cmdstr);
1016*4882a593Smuzhiyun return KDB_NOTFOUND;
1017*4882a593Smuzhiyun }
1018*4882a593Smuzhiyun argv[argc++] = cpp;
1019*4882a593Smuzhiyun escaped = 0;
1020*4882a593Smuzhiyun quoted = '\0';
1021*4882a593Smuzhiyun /* Copy to next unquoted and unescaped
1022*4882a593Smuzhiyun * whitespace or '=' */
1023*4882a593Smuzhiyun while (*cp && *cp != '\n' &&
1024*4882a593Smuzhiyun (escaped || quoted || !isspace(*cp))) {
1025*4882a593Smuzhiyun if (cpp >= cbuf + CMD_BUFLEN)
1026*4882a593Smuzhiyun break;
1027*4882a593Smuzhiyun if (escaped) {
1028*4882a593Smuzhiyun escaped = 0;
1029*4882a593Smuzhiyun *cpp++ = *cp++;
1030*4882a593Smuzhiyun continue;
1031*4882a593Smuzhiyun }
1032*4882a593Smuzhiyun if (*cp == '\\') {
1033*4882a593Smuzhiyun escaped = 1;
1034*4882a593Smuzhiyun ++cp;
1035*4882a593Smuzhiyun continue;
1036*4882a593Smuzhiyun }
1037*4882a593Smuzhiyun if (*cp == quoted)
1038*4882a593Smuzhiyun quoted = '\0';
1039*4882a593Smuzhiyun else if (*cp == '\'' || *cp == '"')
1040*4882a593Smuzhiyun quoted = *cp;
1041*4882a593Smuzhiyun *cpp = *cp++;
1042*4882a593Smuzhiyun if (*cpp == '=' && !quoted)
1043*4882a593Smuzhiyun break;
1044*4882a593Smuzhiyun ++cpp;
1045*4882a593Smuzhiyun }
1046*4882a593Smuzhiyun *cpp++ = '\0'; /* Squash a ws or '=' character */
1047*4882a593Smuzhiyun }
1048*4882a593Smuzhiyun }
1049*4882a593Smuzhiyun if (!argc)
1050*4882a593Smuzhiyun return 0;
1051*4882a593Smuzhiyun if (check_grep)
1052*4882a593Smuzhiyun parse_grep(cp);
1053*4882a593Smuzhiyun if (defcmd_in_progress) {
1054*4882a593Smuzhiyun int result = kdb_defcmd2(cmdstr, argv[0]);
1055*4882a593Smuzhiyun if (!defcmd_in_progress) {
1056*4882a593Smuzhiyun argc = 0; /* avoid repeat on endefcmd */
1057*4882a593Smuzhiyun *(argv[0]) = '\0';
1058*4882a593Smuzhiyun }
1059*4882a593Smuzhiyun return result;
1060*4882a593Smuzhiyun }
1061*4882a593Smuzhiyun if (argv[0][0] == '-' && argv[0][1] &&
1062*4882a593Smuzhiyun (argv[0][1] < '0' || argv[0][1] > '9')) {
1063*4882a593Smuzhiyun ignore_errors = 1;
1064*4882a593Smuzhiyun ++argv[0];
1065*4882a593Smuzhiyun }
1066*4882a593Smuzhiyun
1067*4882a593Smuzhiyun for_each_kdbcmd(tp, i) {
1068*4882a593Smuzhiyun if (tp->cmd_name) {
1069*4882a593Smuzhiyun /*
1070*4882a593Smuzhiyun * If this command is allowed to be abbreviated,
1071*4882a593Smuzhiyun * check to see if this is it.
1072*4882a593Smuzhiyun */
1073*4882a593Smuzhiyun
1074*4882a593Smuzhiyun if (tp->cmd_minlen
1075*4882a593Smuzhiyun && (strlen(argv[0]) <= tp->cmd_minlen)) {
1076*4882a593Smuzhiyun if (strncmp(argv[0],
1077*4882a593Smuzhiyun tp->cmd_name,
1078*4882a593Smuzhiyun tp->cmd_minlen) == 0) {
1079*4882a593Smuzhiyun break;
1080*4882a593Smuzhiyun }
1081*4882a593Smuzhiyun }
1082*4882a593Smuzhiyun
1083*4882a593Smuzhiyun if (strcmp(argv[0], tp->cmd_name) == 0)
1084*4882a593Smuzhiyun break;
1085*4882a593Smuzhiyun }
1086*4882a593Smuzhiyun }
1087*4882a593Smuzhiyun
1088*4882a593Smuzhiyun /*
1089*4882a593Smuzhiyun * If we don't find a command by this name, see if the first
1090*4882a593Smuzhiyun * few characters of this match any of the known commands.
1091*4882a593Smuzhiyun * e.g., md1c20 should match md.
1092*4882a593Smuzhiyun */
1093*4882a593Smuzhiyun if (i == kdb_max_commands) {
1094*4882a593Smuzhiyun for_each_kdbcmd(tp, i) {
1095*4882a593Smuzhiyun if (tp->cmd_name) {
1096*4882a593Smuzhiyun if (strncmp(argv[0],
1097*4882a593Smuzhiyun tp->cmd_name,
1098*4882a593Smuzhiyun strlen(tp->cmd_name)) == 0) {
1099*4882a593Smuzhiyun break;
1100*4882a593Smuzhiyun }
1101*4882a593Smuzhiyun }
1102*4882a593Smuzhiyun }
1103*4882a593Smuzhiyun }
1104*4882a593Smuzhiyun
1105*4882a593Smuzhiyun if (i < kdb_max_commands) {
1106*4882a593Smuzhiyun int result;
1107*4882a593Smuzhiyun
1108*4882a593Smuzhiyun if (!kdb_check_flags(tp->cmd_flags, kdb_cmd_enabled, argc <= 1))
1109*4882a593Smuzhiyun return KDB_NOPERM;
1110*4882a593Smuzhiyun
1111*4882a593Smuzhiyun KDB_STATE_SET(CMD);
1112*4882a593Smuzhiyun result = (*tp->cmd_func)(argc-1, (const char **)argv);
1113*4882a593Smuzhiyun if (result && ignore_errors && result > KDB_CMD_GO)
1114*4882a593Smuzhiyun result = 0;
1115*4882a593Smuzhiyun KDB_STATE_CLEAR(CMD);
1116*4882a593Smuzhiyun
1117*4882a593Smuzhiyun if (tp->cmd_flags & KDB_REPEAT_WITH_ARGS)
1118*4882a593Smuzhiyun return result;
1119*4882a593Smuzhiyun
1120*4882a593Smuzhiyun argc = tp->cmd_flags & KDB_REPEAT_NO_ARGS ? 1 : 0;
1121*4882a593Smuzhiyun if (argv[argc])
1122*4882a593Smuzhiyun *(argv[argc]) = '\0';
1123*4882a593Smuzhiyun return result;
1124*4882a593Smuzhiyun }
1125*4882a593Smuzhiyun
1126*4882a593Smuzhiyun /*
1127*4882a593Smuzhiyun * If the input with which we were presented does not
1128*4882a593Smuzhiyun * map to an existing command, attempt to parse it as an
1129*4882a593Smuzhiyun * address argument and display the result. Useful for
1130*4882a593Smuzhiyun * obtaining the address of a variable, or the nearest symbol
1131*4882a593Smuzhiyun * to an address contained in a register.
1132*4882a593Smuzhiyun */
1133*4882a593Smuzhiyun {
1134*4882a593Smuzhiyun unsigned long value;
1135*4882a593Smuzhiyun char *name = NULL;
1136*4882a593Smuzhiyun long offset;
1137*4882a593Smuzhiyun int nextarg = 0;
1138*4882a593Smuzhiyun
1139*4882a593Smuzhiyun if (kdbgetaddrarg(0, (const char **)argv, &nextarg,
1140*4882a593Smuzhiyun &value, &offset, &name)) {
1141*4882a593Smuzhiyun return KDB_NOTFOUND;
1142*4882a593Smuzhiyun }
1143*4882a593Smuzhiyun
1144*4882a593Smuzhiyun kdb_printf("%s = ", argv[0]);
1145*4882a593Smuzhiyun kdb_symbol_print(value, NULL, KDB_SP_DEFAULT);
1146*4882a593Smuzhiyun kdb_printf("\n");
1147*4882a593Smuzhiyun return 0;
1148*4882a593Smuzhiyun }
1149*4882a593Smuzhiyun }
1150*4882a593Smuzhiyun
1151*4882a593Smuzhiyun
handle_ctrl_cmd(char * cmd)1152*4882a593Smuzhiyun static int handle_ctrl_cmd(char *cmd)
1153*4882a593Smuzhiyun {
1154*4882a593Smuzhiyun #define CTRL_P 16
1155*4882a593Smuzhiyun #define CTRL_N 14
1156*4882a593Smuzhiyun
1157*4882a593Smuzhiyun /* initial situation */
1158*4882a593Smuzhiyun if (cmd_head == cmd_tail)
1159*4882a593Smuzhiyun return 0;
1160*4882a593Smuzhiyun switch (*cmd) {
1161*4882a593Smuzhiyun case CTRL_P:
1162*4882a593Smuzhiyun if (cmdptr != cmd_tail)
1163*4882a593Smuzhiyun cmdptr = (cmdptr + KDB_CMD_HISTORY_COUNT - 1) %
1164*4882a593Smuzhiyun KDB_CMD_HISTORY_COUNT;
1165*4882a593Smuzhiyun strscpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN);
1166*4882a593Smuzhiyun return 1;
1167*4882a593Smuzhiyun case CTRL_N:
1168*4882a593Smuzhiyun if (cmdptr != cmd_head)
1169*4882a593Smuzhiyun cmdptr = (cmdptr+1) % KDB_CMD_HISTORY_COUNT;
1170*4882a593Smuzhiyun strscpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN);
1171*4882a593Smuzhiyun return 1;
1172*4882a593Smuzhiyun }
1173*4882a593Smuzhiyun return 0;
1174*4882a593Smuzhiyun }
1175*4882a593Smuzhiyun
1176*4882a593Smuzhiyun /*
1177*4882a593Smuzhiyun * kdb_reboot - This function implements the 'reboot' command. Reboot
1178*4882a593Smuzhiyun * the system immediately, or loop for ever on failure.
1179*4882a593Smuzhiyun */
kdb_reboot(int argc,const char ** argv)1180*4882a593Smuzhiyun static int kdb_reboot(int argc, const char **argv)
1181*4882a593Smuzhiyun {
1182*4882a593Smuzhiyun emergency_restart();
1183*4882a593Smuzhiyun kdb_printf("Hmm, kdb_reboot did not reboot, spinning here\n");
1184*4882a593Smuzhiyun while (1)
1185*4882a593Smuzhiyun cpu_relax();
1186*4882a593Smuzhiyun /* NOTREACHED */
1187*4882a593Smuzhiyun return 0;
1188*4882a593Smuzhiyun }
1189*4882a593Smuzhiyun
kdb_dumpregs(struct pt_regs * regs)1190*4882a593Smuzhiyun static void kdb_dumpregs(struct pt_regs *regs)
1191*4882a593Smuzhiyun {
1192*4882a593Smuzhiyun int old_lvl = console_loglevel;
1193*4882a593Smuzhiyun console_loglevel = CONSOLE_LOGLEVEL_MOTORMOUTH;
1194*4882a593Smuzhiyun kdb_trap_printk++;
1195*4882a593Smuzhiyun show_regs(regs);
1196*4882a593Smuzhiyun kdb_trap_printk--;
1197*4882a593Smuzhiyun kdb_printf("\n");
1198*4882a593Smuzhiyun console_loglevel = old_lvl;
1199*4882a593Smuzhiyun }
1200*4882a593Smuzhiyun
kdb_set_current_task(struct task_struct * p)1201*4882a593Smuzhiyun static void kdb_set_current_task(struct task_struct *p)
1202*4882a593Smuzhiyun {
1203*4882a593Smuzhiyun kdb_current_task = p;
1204*4882a593Smuzhiyun
1205*4882a593Smuzhiyun if (kdb_task_has_cpu(p)) {
1206*4882a593Smuzhiyun kdb_current_regs = KDB_TSKREGS(kdb_process_cpu(p));
1207*4882a593Smuzhiyun return;
1208*4882a593Smuzhiyun }
1209*4882a593Smuzhiyun kdb_current_regs = NULL;
1210*4882a593Smuzhiyun }
1211*4882a593Smuzhiyun
drop_newline(char * buf)1212*4882a593Smuzhiyun static void drop_newline(char *buf)
1213*4882a593Smuzhiyun {
1214*4882a593Smuzhiyun size_t len = strlen(buf);
1215*4882a593Smuzhiyun
1216*4882a593Smuzhiyun if (len == 0)
1217*4882a593Smuzhiyun return;
1218*4882a593Smuzhiyun if (*(buf + len - 1) == '\n')
1219*4882a593Smuzhiyun *(buf + len - 1) = '\0';
1220*4882a593Smuzhiyun }
1221*4882a593Smuzhiyun
1222*4882a593Smuzhiyun /*
1223*4882a593Smuzhiyun * kdb_local - The main code for kdb. This routine is invoked on a
1224*4882a593Smuzhiyun * specific processor, it is not global. The main kdb() routine
1225*4882a593Smuzhiyun * ensures that only one processor at a time is in this routine.
1226*4882a593Smuzhiyun * This code is called with the real reason code on the first
1227*4882a593Smuzhiyun * entry to a kdb session, thereafter it is called with reason
1228*4882a593Smuzhiyun * SWITCH, even if the user goes back to the original cpu.
1229*4882a593Smuzhiyun * Inputs:
1230*4882a593Smuzhiyun * reason The reason KDB was invoked
1231*4882a593Smuzhiyun * error The hardware-defined error code
1232*4882a593Smuzhiyun * regs The exception frame at time of fault/breakpoint.
1233*4882a593Smuzhiyun * db_result Result code from the break or debug point.
1234*4882a593Smuzhiyun * Returns:
1235*4882a593Smuzhiyun * 0 KDB was invoked for an event which it wasn't responsible
1236*4882a593Smuzhiyun * 1 KDB handled the event for which it was invoked.
1237*4882a593Smuzhiyun * KDB_CMD_GO User typed 'go'.
1238*4882a593Smuzhiyun * KDB_CMD_CPU User switched to another cpu.
1239*4882a593Smuzhiyun * KDB_CMD_SS Single step.
1240*4882a593Smuzhiyun */
kdb_local(kdb_reason_t reason,int error,struct pt_regs * regs,kdb_dbtrap_t db_result)1241*4882a593Smuzhiyun static int kdb_local(kdb_reason_t reason, int error, struct pt_regs *regs,
1242*4882a593Smuzhiyun kdb_dbtrap_t db_result)
1243*4882a593Smuzhiyun {
1244*4882a593Smuzhiyun char *cmdbuf;
1245*4882a593Smuzhiyun int diag;
1246*4882a593Smuzhiyun struct task_struct *kdb_current =
1247*4882a593Smuzhiyun kdb_curr_task(raw_smp_processor_id());
1248*4882a593Smuzhiyun
1249*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_local 1", reason);
1250*4882a593Smuzhiyun
1251*4882a593Smuzhiyun kdb_check_for_lockdown();
1252*4882a593Smuzhiyun
1253*4882a593Smuzhiyun kdb_go_count = 0;
1254*4882a593Smuzhiyun if (reason == KDB_REASON_DEBUG) {
1255*4882a593Smuzhiyun /* special case below */
1256*4882a593Smuzhiyun } else {
1257*4882a593Smuzhiyun kdb_printf("\nEntering kdb (current=0x%px, pid %d) ",
1258*4882a593Smuzhiyun kdb_current, kdb_current ? kdb_current->pid : 0);
1259*4882a593Smuzhiyun #if defined(CONFIG_SMP)
1260*4882a593Smuzhiyun kdb_printf("on processor %d ", raw_smp_processor_id());
1261*4882a593Smuzhiyun #endif
1262*4882a593Smuzhiyun }
1263*4882a593Smuzhiyun
1264*4882a593Smuzhiyun switch (reason) {
1265*4882a593Smuzhiyun case KDB_REASON_DEBUG:
1266*4882a593Smuzhiyun {
1267*4882a593Smuzhiyun /*
1268*4882a593Smuzhiyun * If re-entering kdb after a single step
1269*4882a593Smuzhiyun * command, don't print the message.
1270*4882a593Smuzhiyun */
1271*4882a593Smuzhiyun switch (db_result) {
1272*4882a593Smuzhiyun case KDB_DB_BPT:
1273*4882a593Smuzhiyun kdb_printf("\nEntering kdb (0x%px, pid %d) ",
1274*4882a593Smuzhiyun kdb_current, kdb_current->pid);
1275*4882a593Smuzhiyun #if defined(CONFIG_SMP)
1276*4882a593Smuzhiyun kdb_printf("on processor %d ", raw_smp_processor_id());
1277*4882a593Smuzhiyun #endif
1278*4882a593Smuzhiyun kdb_printf("due to Debug @ " kdb_machreg_fmt "\n",
1279*4882a593Smuzhiyun instruction_pointer(regs));
1280*4882a593Smuzhiyun break;
1281*4882a593Smuzhiyun case KDB_DB_SS:
1282*4882a593Smuzhiyun break;
1283*4882a593Smuzhiyun case KDB_DB_SSBPT:
1284*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_local 4", reason);
1285*4882a593Smuzhiyun return 1; /* kdba_db_trap did the work */
1286*4882a593Smuzhiyun default:
1287*4882a593Smuzhiyun kdb_printf("kdb: Bad result from kdba_db_trap: %d\n",
1288*4882a593Smuzhiyun db_result);
1289*4882a593Smuzhiyun break;
1290*4882a593Smuzhiyun }
1291*4882a593Smuzhiyun
1292*4882a593Smuzhiyun }
1293*4882a593Smuzhiyun break;
1294*4882a593Smuzhiyun case KDB_REASON_ENTER:
1295*4882a593Smuzhiyun if (KDB_STATE(KEYBOARD))
1296*4882a593Smuzhiyun kdb_printf("due to Keyboard Entry\n");
1297*4882a593Smuzhiyun else
1298*4882a593Smuzhiyun kdb_printf("due to KDB_ENTER()\n");
1299*4882a593Smuzhiyun break;
1300*4882a593Smuzhiyun case KDB_REASON_KEYBOARD:
1301*4882a593Smuzhiyun KDB_STATE_SET(KEYBOARD);
1302*4882a593Smuzhiyun kdb_printf("due to Keyboard Entry\n");
1303*4882a593Smuzhiyun break;
1304*4882a593Smuzhiyun case KDB_REASON_ENTER_SLAVE:
1305*4882a593Smuzhiyun /* drop through, slaves only get released via cpu switch */
1306*4882a593Smuzhiyun case KDB_REASON_SWITCH:
1307*4882a593Smuzhiyun kdb_printf("due to cpu switch\n");
1308*4882a593Smuzhiyun break;
1309*4882a593Smuzhiyun case KDB_REASON_OOPS:
1310*4882a593Smuzhiyun kdb_printf("Oops: %s\n", kdb_diemsg);
1311*4882a593Smuzhiyun kdb_printf("due to oops @ " kdb_machreg_fmt "\n",
1312*4882a593Smuzhiyun instruction_pointer(regs));
1313*4882a593Smuzhiyun kdb_dumpregs(regs);
1314*4882a593Smuzhiyun break;
1315*4882a593Smuzhiyun case KDB_REASON_SYSTEM_NMI:
1316*4882a593Smuzhiyun kdb_printf("due to System NonMaskable Interrupt\n");
1317*4882a593Smuzhiyun break;
1318*4882a593Smuzhiyun case KDB_REASON_NMI:
1319*4882a593Smuzhiyun kdb_printf("due to NonMaskable Interrupt @ "
1320*4882a593Smuzhiyun kdb_machreg_fmt "\n",
1321*4882a593Smuzhiyun instruction_pointer(regs));
1322*4882a593Smuzhiyun break;
1323*4882a593Smuzhiyun case KDB_REASON_SSTEP:
1324*4882a593Smuzhiyun case KDB_REASON_BREAK:
1325*4882a593Smuzhiyun kdb_printf("due to %s @ " kdb_machreg_fmt "\n",
1326*4882a593Smuzhiyun reason == KDB_REASON_BREAK ?
1327*4882a593Smuzhiyun "Breakpoint" : "SS trap", instruction_pointer(regs));
1328*4882a593Smuzhiyun /*
1329*4882a593Smuzhiyun * Determine if this breakpoint is one that we
1330*4882a593Smuzhiyun * are interested in.
1331*4882a593Smuzhiyun */
1332*4882a593Smuzhiyun if (db_result != KDB_DB_BPT) {
1333*4882a593Smuzhiyun kdb_printf("kdb: error return from kdba_bp_trap: %d\n",
1334*4882a593Smuzhiyun db_result);
1335*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_local 6", reason);
1336*4882a593Smuzhiyun return 0; /* Not for us, dismiss it */
1337*4882a593Smuzhiyun }
1338*4882a593Smuzhiyun break;
1339*4882a593Smuzhiyun case KDB_REASON_RECURSE:
1340*4882a593Smuzhiyun kdb_printf("due to Recursion @ " kdb_machreg_fmt "\n",
1341*4882a593Smuzhiyun instruction_pointer(regs));
1342*4882a593Smuzhiyun break;
1343*4882a593Smuzhiyun default:
1344*4882a593Smuzhiyun kdb_printf("kdb: unexpected reason code: %d\n", reason);
1345*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_local 8", reason);
1346*4882a593Smuzhiyun return 0; /* Not for us, dismiss it */
1347*4882a593Smuzhiyun }
1348*4882a593Smuzhiyun
1349*4882a593Smuzhiyun while (1) {
1350*4882a593Smuzhiyun /*
1351*4882a593Smuzhiyun * Initialize pager context.
1352*4882a593Smuzhiyun */
1353*4882a593Smuzhiyun kdb_nextline = 1;
1354*4882a593Smuzhiyun KDB_STATE_CLEAR(SUPPRESS);
1355*4882a593Smuzhiyun kdb_grepping_flag = 0;
1356*4882a593Smuzhiyun /* ensure the old search does not leak into '/' commands */
1357*4882a593Smuzhiyun kdb_grep_string[0] = '\0';
1358*4882a593Smuzhiyun
1359*4882a593Smuzhiyun cmdbuf = cmd_cur;
1360*4882a593Smuzhiyun *cmdbuf = '\0';
1361*4882a593Smuzhiyun *(cmd_hist[cmd_head]) = '\0';
1362*4882a593Smuzhiyun
1363*4882a593Smuzhiyun do_full_getstr:
1364*4882a593Smuzhiyun /* PROMPT can only be set if we have MEM_READ permission. */
1365*4882a593Smuzhiyun snprintf(kdb_prompt_str, CMD_BUFLEN, kdbgetenv("PROMPT"),
1366*4882a593Smuzhiyun raw_smp_processor_id());
1367*4882a593Smuzhiyun if (defcmd_in_progress)
1368*4882a593Smuzhiyun strncat(kdb_prompt_str, "[defcmd]", CMD_BUFLEN);
1369*4882a593Smuzhiyun
1370*4882a593Smuzhiyun /*
1371*4882a593Smuzhiyun * Fetch command from keyboard
1372*4882a593Smuzhiyun */
1373*4882a593Smuzhiyun cmdbuf = kdb_getstr(cmdbuf, CMD_BUFLEN, kdb_prompt_str);
1374*4882a593Smuzhiyun if (*cmdbuf != '\n') {
1375*4882a593Smuzhiyun if (*cmdbuf < 32) {
1376*4882a593Smuzhiyun if (cmdptr == cmd_head) {
1377*4882a593Smuzhiyun strscpy(cmd_hist[cmd_head], cmd_cur,
1378*4882a593Smuzhiyun CMD_BUFLEN);
1379*4882a593Smuzhiyun *(cmd_hist[cmd_head] +
1380*4882a593Smuzhiyun strlen(cmd_hist[cmd_head])-1) = '\0';
1381*4882a593Smuzhiyun }
1382*4882a593Smuzhiyun if (!handle_ctrl_cmd(cmdbuf))
1383*4882a593Smuzhiyun *(cmd_cur+strlen(cmd_cur)-1) = '\0';
1384*4882a593Smuzhiyun cmdbuf = cmd_cur;
1385*4882a593Smuzhiyun goto do_full_getstr;
1386*4882a593Smuzhiyun } else {
1387*4882a593Smuzhiyun strscpy(cmd_hist[cmd_head], cmd_cur,
1388*4882a593Smuzhiyun CMD_BUFLEN);
1389*4882a593Smuzhiyun }
1390*4882a593Smuzhiyun
1391*4882a593Smuzhiyun cmd_head = (cmd_head+1) % KDB_CMD_HISTORY_COUNT;
1392*4882a593Smuzhiyun if (cmd_head == cmd_tail)
1393*4882a593Smuzhiyun cmd_tail = (cmd_tail+1) % KDB_CMD_HISTORY_COUNT;
1394*4882a593Smuzhiyun }
1395*4882a593Smuzhiyun
1396*4882a593Smuzhiyun cmdptr = cmd_head;
1397*4882a593Smuzhiyun diag = kdb_parse(cmdbuf);
1398*4882a593Smuzhiyun if (diag == KDB_NOTFOUND) {
1399*4882a593Smuzhiyun drop_newline(cmdbuf);
1400*4882a593Smuzhiyun kdb_printf("Unknown kdb command: '%s'\n", cmdbuf);
1401*4882a593Smuzhiyun diag = 0;
1402*4882a593Smuzhiyun }
1403*4882a593Smuzhiyun if (diag == KDB_CMD_GO
1404*4882a593Smuzhiyun || diag == KDB_CMD_CPU
1405*4882a593Smuzhiyun || diag == KDB_CMD_SS
1406*4882a593Smuzhiyun || diag == KDB_CMD_KGDB)
1407*4882a593Smuzhiyun break;
1408*4882a593Smuzhiyun
1409*4882a593Smuzhiyun if (diag)
1410*4882a593Smuzhiyun kdb_cmderror(diag);
1411*4882a593Smuzhiyun }
1412*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_local 9", diag);
1413*4882a593Smuzhiyun return diag;
1414*4882a593Smuzhiyun }
1415*4882a593Smuzhiyun
1416*4882a593Smuzhiyun
1417*4882a593Smuzhiyun /*
1418*4882a593Smuzhiyun * kdb_print_state - Print the state data for the current processor
1419*4882a593Smuzhiyun * for debugging.
1420*4882a593Smuzhiyun * Inputs:
1421*4882a593Smuzhiyun * text Identifies the debug point
1422*4882a593Smuzhiyun * value Any integer value to be printed, e.g. reason code.
1423*4882a593Smuzhiyun */
kdb_print_state(const char * text,int value)1424*4882a593Smuzhiyun void kdb_print_state(const char *text, int value)
1425*4882a593Smuzhiyun {
1426*4882a593Smuzhiyun kdb_printf("state: %s cpu %d value %d initial %d state %x\n",
1427*4882a593Smuzhiyun text, raw_smp_processor_id(), value, kdb_initial_cpu,
1428*4882a593Smuzhiyun kdb_state);
1429*4882a593Smuzhiyun }
1430*4882a593Smuzhiyun
1431*4882a593Smuzhiyun /*
1432*4882a593Smuzhiyun * kdb_main_loop - After initial setup and assignment of the
1433*4882a593Smuzhiyun * controlling cpu, all cpus are in this loop. One cpu is in
1434*4882a593Smuzhiyun * control and will issue the kdb prompt, the others will spin
1435*4882a593Smuzhiyun * until 'go' or cpu switch.
1436*4882a593Smuzhiyun *
1437*4882a593Smuzhiyun * To get a consistent view of the kernel stacks for all
1438*4882a593Smuzhiyun * processes, this routine is invoked from the main kdb code via
1439*4882a593Smuzhiyun * an architecture specific routine. kdba_main_loop is
1440*4882a593Smuzhiyun * responsible for making the kernel stacks consistent for all
1441*4882a593Smuzhiyun * processes, there should be no difference between a blocked
1442*4882a593Smuzhiyun * process and a running process as far as kdb is concerned.
1443*4882a593Smuzhiyun * Inputs:
1444*4882a593Smuzhiyun * reason The reason KDB was invoked
1445*4882a593Smuzhiyun * error The hardware-defined error code
1446*4882a593Smuzhiyun * reason2 kdb's current reason code.
1447*4882a593Smuzhiyun * Initially error but can change
1448*4882a593Smuzhiyun * according to kdb state.
1449*4882a593Smuzhiyun * db_result Result code from break or debug point.
1450*4882a593Smuzhiyun * regs The exception frame at time of fault/breakpoint.
1451*4882a593Smuzhiyun * should always be valid.
1452*4882a593Smuzhiyun * Returns:
1453*4882a593Smuzhiyun * 0 KDB was invoked for an event which it wasn't responsible
1454*4882a593Smuzhiyun * 1 KDB handled the event for which it was invoked.
1455*4882a593Smuzhiyun */
kdb_main_loop(kdb_reason_t reason,kdb_reason_t reason2,int error,kdb_dbtrap_t db_result,struct pt_regs * regs)1456*4882a593Smuzhiyun int kdb_main_loop(kdb_reason_t reason, kdb_reason_t reason2, int error,
1457*4882a593Smuzhiyun kdb_dbtrap_t db_result, struct pt_regs *regs)
1458*4882a593Smuzhiyun {
1459*4882a593Smuzhiyun int result = 1;
1460*4882a593Smuzhiyun /* Stay in kdb() until 'go', 'ss[b]' or an error */
1461*4882a593Smuzhiyun while (1) {
1462*4882a593Smuzhiyun /*
1463*4882a593Smuzhiyun * All processors except the one that is in control
1464*4882a593Smuzhiyun * will spin here.
1465*4882a593Smuzhiyun */
1466*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_main_loop 1", reason);
1467*4882a593Smuzhiyun while (KDB_STATE(HOLD_CPU)) {
1468*4882a593Smuzhiyun /* state KDB is turned off by kdb_cpu to see if the
1469*4882a593Smuzhiyun * other cpus are still live, each cpu in this loop
1470*4882a593Smuzhiyun * turns it back on.
1471*4882a593Smuzhiyun */
1472*4882a593Smuzhiyun if (!KDB_STATE(KDB))
1473*4882a593Smuzhiyun KDB_STATE_SET(KDB);
1474*4882a593Smuzhiyun }
1475*4882a593Smuzhiyun
1476*4882a593Smuzhiyun KDB_STATE_CLEAR(SUPPRESS);
1477*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_main_loop 2", reason);
1478*4882a593Smuzhiyun if (KDB_STATE(LEAVING))
1479*4882a593Smuzhiyun break; /* Another cpu said 'go' */
1480*4882a593Smuzhiyun /* Still using kdb, this processor is in control */
1481*4882a593Smuzhiyun result = kdb_local(reason2, error, regs, db_result);
1482*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_main_loop 3", result);
1483*4882a593Smuzhiyun
1484*4882a593Smuzhiyun if (result == KDB_CMD_CPU)
1485*4882a593Smuzhiyun break;
1486*4882a593Smuzhiyun
1487*4882a593Smuzhiyun if (result == KDB_CMD_SS) {
1488*4882a593Smuzhiyun KDB_STATE_SET(DOING_SS);
1489*4882a593Smuzhiyun break;
1490*4882a593Smuzhiyun }
1491*4882a593Smuzhiyun
1492*4882a593Smuzhiyun if (result == KDB_CMD_KGDB) {
1493*4882a593Smuzhiyun if (!KDB_STATE(DOING_KGDB))
1494*4882a593Smuzhiyun kdb_printf("Entering please attach debugger "
1495*4882a593Smuzhiyun "or use $D#44+ or $3#33\n");
1496*4882a593Smuzhiyun break;
1497*4882a593Smuzhiyun }
1498*4882a593Smuzhiyun if (result && result != 1 && result != KDB_CMD_GO)
1499*4882a593Smuzhiyun kdb_printf("\nUnexpected kdb_local return code %d\n",
1500*4882a593Smuzhiyun result);
1501*4882a593Smuzhiyun KDB_DEBUG_STATE("kdb_main_loop 4", reason);
1502*4882a593Smuzhiyun break;
1503*4882a593Smuzhiyun }
1504*4882a593Smuzhiyun if (KDB_STATE(DOING_SS))
1505*4882a593Smuzhiyun KDB_STATE_CLEAR(SSBPT);
1506*4882a593Smuzhiyun
1507*4882a593Smuzhiyun /* Clean up any keyboard devices before leaving */
1508*4882a593Smuzhiyun kdb_kbd_cleanup_state();
1509*4882a593Smuzhiyun
1510*4882a593Smuzhiyun return result;
1511*4882a593Smuzhiyun }
1512*4882a593Smuzhiyun
1513*4882a593Smuzhiyun /*
1514*4882a593Smuzhiyun * kdb_mdr - This function implements the guts of the 'mdr', memory
1515*4882a593Smuzhiyun * read command.
1516*4882a593Smuzhiyun * mdr <addr arg>,<byte count>
1517*4882a593Smuzhiyun * Inputs:
1518*4882a593Smuzhiyun * addr Start address
1519*4882a593Smuzhiyun * count Number of bytes
1520*4882a593Smuzhiyun * Returns:
1521*4882a593Smuzhiyun * Always 0. Any errors are detected and printed by kdb_getarea.
1522*4882a593Smuzhiyun */
kdb_mdr(unsigned long addr,unsigned int count)1523*4882a593Smuzhiyun static int kdb_mdr(unsigned long addr, unsigned int count)
1524*4882a593Smuzhiyun {
1525*4882a593Smuzhiyun unsigned char c;
1526*4882a593Smuzhiyun while (count--) {
1527*4882a593Smuzhiyun if (kdb_getarea(c, addr))
1528*4882a593Smuzhiyun return 0;
1529*4882a593Smuzhiyun kdb_printf("%02x", c);
1530*4882a593Smuzhiyun addr++;
1531*4882a593Smuzhiyun }
1532*4882a593Smuzhiyun kdb_printf("\n");
1533*4882a593Smuzhiyun return 0;
1534*4882a593Smuzhiyun }
1535*4882a593Smuzhiyun
1536*4882a593Smuzhiyun /*
1537*4882a593Smuzhiyun * kdb_md - This function implements the 'md', 'md1', 'md2', 'md4',
1538*4882a593Smuzhiyun * 'md8' 'mdr' and 'mds' commands.
1539*4882a593Smuzhiyun *
1540*4882a593Smuzhiyun * md|mds [<addr arg> [<line count> [<radix>]]]
1541*4882a593Smuzhiyun * mdWcN [<addr arg> [<line count> [<radix>]]]
1542*4882a593Smuzhiyun * where W = is the width (1, 2, 4 or 8) and N is the count.
1543*4882a593Smuzhiyun * for eg., md1c20 reads 20 bytes, 1 at a time.
1544*4882a593Smuzhiyun * mdr <addr arg>,<byte count>
1545*4882a593Smuzhiyun */
kdb_md_line(const char * fmtstr,unsigned long addr,int symbolic,int nosect,int bytesperword,int num,int repeat,int phys)1546*4882a593Smuzhiyun static void kdb_md_line(const char *fmtstr, unsigned long addr,
1547*4882a593Smuzhiyun int symbolic, int nosect, int bytesperword,
1548*4882a593Smuzhiyun int num, int repeat, int phys)
1549*4882a593Smuzhiyun {
1550*4882a593Smuzhiyun /* print just one line of data */
1551*4882a593Smuzhiyun kdb_symtab_t symtab;
1552*4882a593Smuzhiyun char cbuf[32];
1553*4882a593Smuzhiyun char *c = cbuf;
1554*4882a593Smuzhiyun int i;
1555*4882a593Smuzhiyun int j;
1556*4882a593Smuzhiyun unsigned long word;
1557*4882a593Smuzhiyun
1558*4882a593Smuzhiyun memset(cbuf, '\0', sizeof(cbuf));
1559*4882a593Smuzhiyun if (phys)
1560*4882a593Smuzhiyun kdb_printf("phys " kdb_machreg_fmt0 " ", addr);
1561*4882a593Smuzhiyun else
1562*4882a593Smuzhiyun kdb_printf(kdb_machreg_fmt0 " ", addr);
1563*4882a593Smuzhiyun
1564*4882a593Smuzhiyun for (i = 0; i < num && repeat--; i++) {
1565*4882a593Smuzhiyun if (phys) {
1566*4882a593Smuzhiyun if (kdb_getphysword(&word, addr, bytesperword))
1567*4882a593Smuzhiyun break;
1568*4882a593Smuzhiyun } else if (kdb_getword(&word, addr, bytesperword))
1569*4882a593Smuzhiyun break;
1570*4882a593Smuzhiyun kdb_printf(fmtstr, word);
1571*4882a593Smuzhiyun if (symbolic)
1572*4882a593Smuzhiyun kdbnearsym(word, &symtab);
1573*4882a593Smuzhiyun else
1574*4882a593Smuzhiyun memset(&symtab, 0, sizeof(symtab));
1575*4882a593Smuzhiyun if (symtab.sym_name) {
1576*4882a593Smuzhiyun kdb_symbol_print(word, &symtab, 0);
1577*4882a593Smuzhiyun if (!nosect) {
1578*4882a593Smuzhiyun kdb_printf("\n");
1579*4882a593Smuzhiyun kdb_printf(" %s %s "
1580*4882a593Smuzhiyun kdb_machreg_fmt " "
1581*4882a593Smuzhiyun kdb_machreg_fmt " "
1582*4882a593Smuzhiyun kdb_machreg_fmt, symtab.mod_name,
1583*4882a593Smuzhiyun symtab.sec_name, symtab.sec_start,
1584*4882a593Smuzhiyun symtab.sym_start, symtab.sym_end);
1585*4882a593Smuzhiyun }
1586*4882a593Smuzhiyun addr += bytesperword;
1587*4882a593Smuzhiyun } else {
1588*4882a593Smuzhiyun union {
1589*4882a593Smuzhiyun u64 word;
1590*4882a593Smuzhiyun unsigned char c[8];
1591*4882a593Smuzhiyun } wc;
1592*4882a593Smuzhiyun unsigned char *cp;
1593*4882a593Smuzhiyun #ifdef __BIG_ENDIAN
1594*4882a593Smuzhiyun cp = wc.c + 8 - bytesperword;
1595*4882a593Smuzhiyun #else
1596*4882a593Smuzhiyun cp = wc.c;
1597*4882a593Smuzhiyun #endif
1598*4882a593Smuzhiyun wc.word = word;
1599*4882a593Smuzhiyun #define printable_char(c) \
1600*4882a593Smuzhiyun ({unsigned char __c = c; isascii(__c) && isprint(__c) ? __c : '.'; })
1601*4882a593Smuzhiyun for (j = 0; j < bytesperword; j++)
1602*4882a593Smuzhiyun *c++ = printable_char(*cp++);
1603*4882a593Smuzhiyun addr += bytesperword;
1604*4882a593Smuzhiyun #undef printable_char
1605*4882a593Smuzhiyun }
1606*4882a593Smuzhiyun }
1607*4882a593Smuzhiyun kdb_printf("%*s %s\n", (int)((num-i)*(2*bytesperword + 1)+1),
1608*4882a593Smuzhiyun " ", cbuf);
1609*4882a593Smuzhiyun }
1610*4882a593Smuzhiyun
kdb_md(int argc,const char ** argv)1611*4882a593Smuzhiyun static int kdb_md(int argc, const char **argv)
1612*4882a593Smuzhiyun {
1613*4882a593Smuzhiyun static unsigned long last_addr;
1614*4882a593Smuzhiyun static int last_radix, last_bytesperword, last_repeat;
1615*4882a593Smuzhiyun int radix = 16, mdcount = 8, bytesperword = KDB_WORD_SIZE, repeat;
1616*4882a593Smuzhiyun int nosect = 0;
1617*4882a593Smuzhiyun char fmtchar, fmtstr[64];
1618*4882a593Smuzhiyun unsigned long addr;
1619*4882a593Smuzhiyun unsigned long word;
1620*4882a593Smuzhiyun long offset = 0;
1621*4882a593Smuzhiyun int symbolic = 0;
1622*4882a593Smuzhiyun int valid = 0;
1623*4882a593Smuzhiyun int phys = 0;
1624*4882a593Smuzhiyun int raw = 0;
1625*4882a593Smuzhiyun
1626*4882a593Smuzhiyun kdbgetintenv("MDCOUNT", &mdcount);
1627*4882a593Smuzhiyun kdbgetintenv("RADIX", &radix);
1628*4882a593Smuzhiyun kdbgetintenv("BYTESPERWORD", &bytesperword);
1629*4882a593Smuzhiyun
1630*4882a593Smuzhiyun /* Assume 'md <addr>' and start with environment values */
1631*4882a593Smuzhiyun repeat = mdcount * 16 / bytesperword;
1632*4882a593Smuzhiyun
1633*4882a593Smuzhiyun if (strcmp(argv[0], "mdr") == 0) {
1634*4882a593Smuzhiyun if (argc == 2 || (argc == 0 && last_addr != 0))
1635*4882a593Smuzhiyun valid = raw = 1;
1636*4882a593Smuzhiyun else
1637*4882a593Smuzhiyun return KDB_ARGCOUNT;
1638*4882a593Smuzhiyun } else if (isdigit(argv[0][2])) {
1639*4882a593Smuzhiyun bytesperword = (int)(argv[0][2] - '0');
1640*4882a593Smuzhiyun if (bytesperword == 0) {
1641*4882a593Smuzhiyun bytesperword = last_bytesperword;
1642*4882a593Smuzhiyun if (bytesperword == 0)
1643*4882a593Smuzhiyun bytesperword = 4;
1644*4882a593Smuzhiyun }
1645*4882a593Smuzhiyun last_bytesperword = bytesperword;
1646*4882a593Smuzhiyun repeat = mdcount * 16 / bytesperword;
1647*4882a593Smuzhiyun if (!argv[0][3])
1648*4882a593Smuzhiyun valid = 1;
1649*4882a593Smuzhiyun else if (argv[0][3] == 'c' && argv[0][4]) {
1650*4882a593Smuzhiyun char *p;
1651*4882a593Smuzhiyun repeat = simple_strtoul(argv[0] + 4, &p, 10);
1652*4882a593Smuzhiyun mdcount = ((repeat * bytesperword) + 15) / 16;
1653*4882a593Smuzhiyun valid = !*p;
1654*4882a593Smuzhiyun }
1655*4882a593Smuzhiyun last_repeat = repeat;
1656*4882a593Smuzhiyun } else if (strcmp(argv[0], "md") == 0)
1657*4882a593Smuzhiyun valid = 1;
1658*4882a593Smuzhiyun else if (strcmp(argv[0], "mds") == 0)
1659*4882a593Smuzhiyun valid = 1;
1660*4882a593Smuzhiyun else if (strcmp(argv[0], "mdp") == 0) {
1661*4882a593Smuzhiyun phys = valid = 1;
1662*4882a593Smuzhiyun }
1663*4882a593Smuzhiyun if (!valid)
1664*4882a593Smuzhiyun return KDB_NOTFOUND;
1665*4882a593Smuzhiyun
1666*4882a593Smuzhiyun if (argc == 0) {
1667*4882a593Smuzhiyun if (last_addr == 0)
1668*4882a593Smuzhiyun return KDB_ARGCOUNT;
1669*4882a593Smuzhiyun addr = last_addr;
1670*4882a593Smuzhiyun radix = last_radix;
1671*4882a593Smuzhiyun bytesperword = last_bytesperword;
1672*4882a593Smuzhiyun repeat = last_repeat;
1673*4882a593Smuzhiyun if (raw)
1674*4882a593Smuzhiyun mdcount = repeat;
1675*4882a593Smuzhiyun else
1676*4882a593Smuzhiyun mdcount = ((repeat * bytesperword) + 15) / 16;
1677*4882a593Smuzhiyun }
1678*4882a593Smuzhiyun
1679*4882a593Smuzhiyun if (argc) {
1680*4882a593Smuzhiyun unsigned long val;
1681*4882a593Smuzhiyun int diag, nextarg = 1;
1682*4882a593Smuzhiyun diag = kdbgetaddrarg(argc, argv, &nextarg, &addr,
1683*4882a593Smuzhiyun &offset, NULL);
1684*4882a593Smuzhiyun if (diag)
1685*4882a593Smuzhiyun return diag;
1686*4882a593Smuzhiyun if (argc > nextarg+2)
1687*4882a593Smuzhiyun return KDB_ARGCOUNT;
1688*4882a593Smuzhiyun
1689*4882a593Smuzhiyun if (argc >= nextarg) {
1690*4882a593Smuzhiyun diag = kdbgetularg(argv[nextarg], &val);
1691*4882a593Smuzhiyun if (!diag) {
1692*4882a593Smuzhiyun mdcount = (int) val;
1693*4882a593Smuzhiyun if (raw)
1694*4882a593Smuzhiyun repeat = mdcount;
1695*4882a593Smuzhiyun else
1696*4882a593Smuzhiyun repeat = mdcount * 16 / bytesperword;
1697*4882a593Smuzhiyun }
1698*4882a593Smuzhiyun }
1699*4882a593Smuzhiyun if (argc >= nextarg+1) {
1700*4882a593Smuzhiyun diag = kdbgetularg(argv[nextarg+1], &val);
1701*4882a593Smuzhiyun if (!diag)
1702*4882a593Smuzhiyun radix = (int) val;
1703*4882a593Smuzhiyun }
1704*4882a593Smuzhiyun }
1705*4882a593Smuzhiyun
1706*4882a593Smuzhiyun if (strcmp(argv[0], "mdr") == 0) {
1707*4882a593Smuzhiyun int ret;
1708*4882a593Smuzhiyun last_addr = addr;
1709*4882a593Smuzhiyun ret = kdb_mdr(addr, mdcount);
1710*4882a593Smuzhiyun last_addr += mdcount;
1711*4882a593Smuzhiyun last_repeat = mdcount;
1712*4882a593Smuzhiyun last_bytesperword = bytesperword; // to make REPEAT happy
1713*4882a593Smuzhiyun return ret;
1714*4882a593Smuzhiyun }
1715*4882a593Smuzhiyun
1716*4882a593Smuzhiyun switch (radix) {
1717*4882a593Smuzhiyun case 10:
1718*4882a593Smuzhiyun fmtchar = 'd';
1719*4882a593Smuzhiyun break;
1720*4882a593Smuzhiyun case 16:
1721*4882a593Smuzhiyun fmtchar = 'x';
1722*4882a593Smuzhiyun break;
1723*4882a593Smuzhiyun case 8:
1724*4882a593Smuzhiyun fmtchar = 'o';
1725*4882a593Smuzhiyun break;
1726*4882a593Smuzhiyun default:
1727*4882a593Smuzhiyun return KDB_BADRADIX;
1728*4882a593Smuzhiyun }
1729*4882a593Smuzhiyun
1730*4882a593Smuzhiyun last_radix = radix;
1731*4882a593Smuzhiyun
1732*4882a593Smuzhiyun if (bytesperword > KDB_WORD_SIZE)
1733*4882a593Smuzhiyun return KDB_BADWIDTH;
1734*4882a593Smuzhiyun
1735*4882a593Smuzhiyun switch (bytesperword) {
1736*4882a593Smuzhiyun case 8:
1737*4882a593Smuzhiyun sprintf(fmtstr, "%%16.16l%c ", fmtchar);
1738*4882a593Smuzhiyun break;
1739*4882a593Smuzhiyun case 4:
1740*4882a593Smuzhiyun sprintf(fmtstr, "%%8.8l%c ", fmtchar);
1741*4882a593Smuzhiyun break;
1742*4882a593Smuzhiyun case 2:
1743*4882a593Smuzhiyun sprintf(fmtstr, "%%4.4l%c ", fmtchar);
1744*4882a593Smuzhiyun break;
1745*4882a593Smuzhiyun case 1:
1746*4882a593Smuzhiyun sprintf(fmtstr, "%%2.2l%c ", fmtchar);
1747*4882a593Smuzhiyun break;
1748*4882a593Smuzhiyun default:
1749*4882a593Smuzhiyun return KDB_BADWIDTH;
1750*4882a593Smuzhiyun }
1751*4882a593Smuzhiyun
1752*4882a593Smuzhiyun last_repeat = repeat;
1753*4882a593Smuzhiyun last_bytesperword = bytesperword;
1754*4882a593Smuzhiyun
1755*4882a593Smuzhiyun if (strcmp(argv[0], "mds") == 0) {
1756*4882a593Smuzhiyun symbolic = 1;
1757*4882a593Smuzhiyun /* Do not save these changes as last_*, they are temporary mds
1758*4882a593Smuzhiyun * overrides.
1759*4882a593Smuzhiyun */
1760*4882a593Smuzhiyun bytesperword = KDB_WORD_SIZE;
1761*4882a593Smuzhiyun repeat = mdcount;
1762*4882a593Smuzhiyun kdbgetintenv("NOSECT", &nosect);
1763*4882a593Smuzhiyun }
1764*4882a593Smuzhiyun
1765*4882a593Smuzhiyun /* Round address down modulo BYTESPERWORD */
1766*4882a593Smuzhiyun
1767*4882a593Smuzhiyun addr &= ~(bytesperword-1);
1768*4882a593Smuzhiyun
1769*4882a593Smuzhiyun while (repeat > 0) {
1770*4882a593Smuzhiyun unsigned long a;
1771*4882a593Smuzhiyun int n, z, num = (symbolic ? 1 : (16 / bytesperword));
1772*4882a593Smuzhiyun
1773*4882a593Smuzhiyun if (KDB_FLAG(CMD_INTERRUPT))
1774*4882a593Smuzhiyun return 0;
1775*4882a593Smuzhiyun for (a = addr, z = 0; z < repeat; a += bytesperword, ++z) {
1776*4882a593Smuzhiyun if (phys) {
1777*4882a593Smuzhiyun if (kdb_getphysword(&word, a, bytesperword)
1778*4882a593Smuzhiyun || word)
1779*4882a593Smuzhiyun break;
1780*4882a593Smuzhiyun } else if (kdb_getword(&word, a, bytesperword) || word)
1781*4882a593Smuzhiyun break;
1782*4882a593Smuzhiyun }
1783*4882a593Smuzhiyun n = min(num, repeat);
1784*4882a593Smuzhiyun kdb_md_line(fmtstr, addr, symbolic, nosect, bytesperword,
1785*4882a593Smuzhiyun num, repeat, phys);
1786*4882a593Smuzhiyun addr += bytesperword * n;
1787*4882a593Smuzhiyun repeat -= n;
1788*4882a593Smuzhiyun z = (z + num - 1) / num;
1789*4882a593Smuzhiyun if (z > 2) {
1790*4882a593Smuzhiyun int s = num * (z-2);
1791*4882a593Smuzhiyun kdb_printf(kdb_machreg_fmt0 "-" kdb_machreg_fmt0
1792*4882a593Smuzhiyun " zero suppressed\n",
1793*4882a593Smuzhiyun addr, addr + bytesperword * s - 1);
1794*4882a593Smuzhiyun addr += bytesperword * s;
1795*4882a593Smuzhiyun repeat -= s;
1796*4882a593Smuzhiyun }
1797*4882a593Smuzhiyun }
1798*4882a593Smuzhiyun last_addr = addr;
1799*4882a593Smuzhiyun
1800*4882a593Smuzhiyun return 0;
1801*4882a593Smuzhiyun }
1802*4882a593Smuzhiyun
1803*4882a593Smuzhiyun /*
1804*4882a593Smuzhiyun * kdb_mm - This function implements the 'mm' command.
1805*4882a593Smuzhiyun * mm address-expression new-value
1806*4882a593Smuzhiyun * Remarks:
1807*4882a593Smuzhiyun * mm works on machine words, mmW works on bytes.
1808*4882a593Smuzhiyun */
kdb_mm(int argc,const char ** argv)1809*4882a593Smuzhiyun static int kdb_mm(int argc, const char **argv)
1810*4882a593Smuzhiyun {
1811*4882a593Smuzhiyun int diag;
1812*4882a593Smuzhiyun unsigned long addr;
1813*4882a593Smuzhiyun long offset = 0;
1814*4882a593Smuzhiyun unsigned long contents;
1815*4882a593Smuzhiyun int nextarg;
1816*4882a593Smuzhiyun int width;
1817*4882a593Smuzhiyun
1818*4882a593Smuzhiyun if (argv[0][2] && !isdigit(argv[0][2]))
1819*4882a593Smuzhiyun return KDB_NOTFOUND;
1820*4882a593Smuzhiyun
1821*4882a593Smuzhiyun if (argc < 2)
1822*4882a593Smuzhiyun return KDB_ARGCOUNT;
1823*4882a593Smuzhiyun
1824*4882a593Smuzhiyun nextarg = 1;
1825*4882a593Smuzhiyun diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL);
1826*4882a593Smuzhiyun if (diag)
1827*4882a593Smuzhiyun return diag;
1828*4882a593Smuzhiyun
1829*4882a593Smuzhiyun if (nextarg > argc)
1830*4882a593Smuzhiyun return KDB_ARGCOUNT;
1831*4882a593Smuzhiyun diag = kdbgetaddrarg(argc, argv, &nextarg, &contents, NULL, NULL);
1832*4882a593Smuzhiyun if (diag)
1833*4882a593Smuzhiyun return diag;
1834*4882a593Smuzhiyun
1835*4882a593Smuzhiyun if (nextarg != argc + 1)
1836*4882a593Smuzhiyun return KDB_ARGCOUNT;
1837*4882a593Smuzhiyun
1838*4882a593Smuzhiyun width = argv[0][2] ? (argv[0][2] - '0') : (KDB_WORD_SIZE);
1839*4882a593Smuzhiyun diag = kdb_putword(addr, contents, width);
1840*4882a593Smuzhiyun if (diag)
1841*4882a593Smuzhiyun return diag;
1842*4882a593Smuzhiyun
1843*4882a593Smuzhiyun kdb_printf(kdb_machreg_fmt " = " kdb_machreg_fmt "\n", addr, contents);
1844*4882a593Smuzhiyun
1845*4882a593Smuzhiyun return 0;
1846*4882a593Smuzhiyun }
1847*4882a593Smuzhiyun
1848*4882a593Smuzhiyun /*
1849*4882a593Smuzhiyun * kdb_go - This function implements the 'go' command.
1850*4882a593Smuzhiyun * go [address-expression]
1851*4882a593Smuzhiyun */
kdb_go(int argc,const char ** argv)1852*4882a593Smuzhiyun static int kdb_go(int argc, const char **argv)
1853*4882a593Smuzhiyun {
1854*4882a593Smuzhiyun unsigned long addr;
1855*4882a593Smuzhiyun int diag;
1856*4882a593Smuzhiyun int nextarg;
1857*4882a593Smuzhiyun long offset;
1858*4882a593Smuzhiyun
1859*4882a593Smuzhiyun if (raw_smp_processor_id() != kdb_initial_cpu) {
1860*4882a593Smuzhiyun kdb_printf("go must execute on the entry cpu, "
1861*4882a593Smuzhiyun "please use \"cpu %d\" and then execute go\n",
1862*4882a593Smuzhiyun kdb_initial_cpu);
1863*4882a593Smuzhiyun return KDB_BADCPUNUM;
1864*4882a593Smuzhiyun }
1865*4882a593Smuzhiyun if (argc == 1) {
1866*4882a593Smuzhiyun nextarg = 1;
1867*4882a593Smuzhiyun diag = kdbgetaddrarg(argc, argv, &nextarg,
1868*4882a593Smuzhiyun &addr, &offset, NULL);
1869*4882a593Smuzhiyun if (diag)
1870*4882a593Smuzhiyun return diag;
1871*4882a593Smuzhiyun } else if (argc) {
1872*4882a593Smuzhiyun return KDB_ARGCOUNT;
1873*4882a593Smuzhiyun }
1874*4882a593Smuzhiyun
1875*4882a593Smuzhiyun diag = KDB_CMD_GO;
1876*4882a593Smuzhiyun if (KDB_FLAG(CATASTROPHIC)) {
1877*4882a593Smuzhiyun kdb_printf("Catastrophic error detected\n");
1878*4882a593Smuzhiyun kdb_printf("kdb_continue_catastrophic=%d, ",
1879*4882a593Smuzhiyun kdb_continue_catastrophic);
1880*4882a593Smuzhiyun if (kdb_continue_catastrophic == 0 && kdb_go_count++ == 0) {
1881*4882a593Smuzhiyun kdb_printf("type go a second time if you really want "
1882*4882a593Smuzhiyun "to continue\n");
1883*4882a593Smuzhiyun return 0;
1884*4882a593Smuzhiyun }
1885*4882a593Smuzhiyun if (kdb_continue_catastrophic == 2) {
1886*4882a593Smuzhiyun kdb_printf("forcing reboot\n");
1887*4882a593Smuzhiyun kdb_reboot(0, NULL);
1888*4882a593Smuzhiyun }
1889*4882a593Smuzhiyun kdb_printf("attempting to continue\n");
1890*4882a593Smuzhiyun }
1891*4882a593Smuzhiyun return diag;
1892*4882a593Smuzhiyun }
1893*4882a593Smuzhiyun
1894*4882a593Smuzhiyun /*
1895*4882a593Smuzhiyun * kdb_rd - This function implements the 'rd' command.
1896*4882a593Smuzhiyun */
kdb_rd(int argc,const char ** argv)1897*4882a593Smuzhiyun static int kdb_rd(int argc, const char **argv)
1898*4882a593Smuzhiyun {
1899*4882a593Smuzhiyun int len = kdb_check_regs();
1900*4882a593Smuzhiyun #if DBG_MAX_REG_NUM > 0
1901*4882a593Smuzhiyun int i;
1902*4882a593Smuzhiyun char *rname;
1903*4882a593Smuzhiyun int rsize;
1904*4882a593Smuzhiyun u64 reg64;
1905*4882a593Smuzhiyun u32 reg32;
1906*4882a593Smuzhiyun u16 reg16;
1907*4882a593Smuzhiyun u8 reg8;
1908*4882a593Smuzhiyun
1909*4882a593Smuzhiyun if (len)
1910*4882a593Smuzhiyun return len;
1911*4882a593Smuzhiyun
1912*4882a593Smuzhiyun for (i = 0; i < DBG_MAX_REG_NUM; i++) {
1913*4882a593Smuzhiyun rsize = dbg_reg_def[i].size * 2;
1914*4882a593Smuzhiyun if (rsize > 16)
1915*4882a593Smuzhiyun rsize = 2;
1916*4882a593Smuzhiyun if (len + strlen(dbg_reg_def[i].name) + 4 + rsize > 80) {
1917*4882a593Smuzhiyun len = 0;
1918*4882a593Smuzhiyun kdb_printf("\n");
1919*4882a593Smuzhiyun }
1920*4882a593Smuzhiyun if (len)
1921*4882a593Smuzhiyun len += kdb_printf(" ");
1922*4882a593Smuzhiyun switch(dbg_reg_def[i].size * 8) {
1923*4882a593Smuzhiyun case 8:
1924*4882a593Smuzhiyun rname = dbg_get_reg(i, ®8, kdb_current_regs);
1925*4882a593Smuzhiyun if (!rname)
1926*4882a593Smuzhiyun break;
1927*4882a593Smuzhiyun len += kdb_printf("%s: %02x", rname, reg8);
1928*4882a593Smuzhiyun break;
1929*4882a593Smuzhiyun case 16:
1930*4882a593Smuzhiyun rname = dbg_get_reg(i, ®16, kdb_current_regs);
1931*4882a593Smuzhiyun if (!rname)
1932*4882a593Smuzhiyun break;
1933*4882a593Smuzhiyun len += kdb_printf("%s: %04x", rname, reg16);
1934*4882a593Smuzhiyun break;
1935*4882a593Smuzhiyun case 32:
1936*4882a593Smuzhiyun rname = dbg_get_reg(i, ®32, kdb_current_regs);
1937*4882a593Smuzhiyun if (!rname)
1938*4882a593Smuzhiyun break;
1939*4882a593Smuzhiyun len += kdb_printf("%s: %08x", rname, reg32);
1940*4882a593Smuzhiyun break;
1941*4882a593Smuzhiyun case 64:
1942*4882a593Smuzhiyun rname = dbg_get_reg(i, ®64, kdb_current_regs);
1943*4882a593Smuzhiyun if (!rname)
1944*4882a593Smuzhiyun break;
1945*4882a593Smuzhiyun len += kdb_printf("%s: %016llx", rname, reg64);
1946*4882a593Smuzhiyun break;
1947*4882a593Smuzhiyun default:
1948*4882a593Smuzhiyun len += kdb_printf("%s: ??", dbg_reg_def[i].name);
1949*4882a593Smuzhiyun }
1950*4882a593Smuzhiyun }
1951*4882a593Smuzhiyun kdb_printf("\n");
1952*4882a593Smuzhiyun #else
1953*4882a593Smuzhiyun if (len)
1954*4882a593Smuzhiyun return len;
1955*4882a593Smuzhiyun
1956*4882a593Smuzhiyun kdb_dumpregs(kdb_current_regs);
1957*4882a593Smuzhiyun #endif
1958*4882a593Smuzhiyun return 0;
1959*4882a593Smuzhiyun }
1960*4882a593Smuzhiyun
1961*4882a593Smuzhiyun /*
1962*4882a593Smuzhiyun * kdb_rm - This function implements the 'rm' (register modify) command.
1963*4882a593Smuzhiyun * rm register-name new-contents
1964*4882a593Smuzhiyun * Remarks:
1965*4882a593Smuzhiyun * Allows register modification with the same restrictions as gdb
1966*4882a593Smuzhiyun */
kdb_rm(int argc,const char ** argv)1967*4882a593Smuzhiyun static int kdb_rm(int argc, const char **argv)
1968*4882a593Smuzhiyun {
1969*4882a593Smuzhiyun #if DBG_MAX_REG_NUM > 0
1970*4882a593Smuzhiyun int diag;
1971*4882a593Smuzhiyun const char *rname;
1972*4882a593Smuzhiyun int i;
1973*4882a593Smuzhiyun u64 reg64;
1974*4882a593Smuzhiyun u32 reg32;
1975*4882a593Smuzhiyun u16 reg16;
1976*4882a593Smuzhiyun u8 reg8;
1977*4882a593Smuzhiyun
1978*4882a593Smuzhiyun if (argc != 2)
1979*4882a593Smuzhiyun return KDB_ARGCOUNT;
1980*4882a593Smuzhiyun /*
1981*4882a593Smuzhiyun * Allow presence or absence of leading '%' symbol.
1982*4882a593Smuzhiyun */
1983*4882a593Smuzhiyun rname = argv[1];
1984*4882a593Smuzhiyun if (*rname == '%')
1985*4882a593Smuzhiyun rname++;
1986*4882a593Smuzhiyun
1987*4882a593Smuzhiyun diag = kdbgetu64arg(argv[2], ®64);
1988*4882a593Smuzhiyun if (diag)
1989*4882a593Smuzhiyun return diag;
1990*4882a593Smuzhiyun
1991*4882a593Smuzhiyun diag = kdb_check_regs();
1992*4882a593Smuzhiyun if (diag)
1993*4882a593Smuzhiyun return diag;
1994*4882a593Smuzhiyun
1995*4882a593Smuzhiyun diag = KDB_BADREG;
1996*4882a593Smuzhiyun for (i = 0; i < DBG_MAX_REG_NUM; i++) {
1997*4882a593Smuzhiyun if (strcmp(rname, dbg_reg_def[i].name) == 0) {
1998*4882a593Smuzhiyun diag = 0;
1999*4882a593Smuzhiyun break;
2000*4882a593Smuzhiyun }
2001*4882a593Smuzhiyun }
2002*4882a593Smuzhiyun if (!diag) {
2003*4882a593Smuzhiyun switch(dbg_reg_def[i].size * 8) {
2004*4882a593Smuzhiyun case 8:
2005*4882a593Smuzhiyun reg8 = reg64;
2006*4882a593Smuzhiyun dbg_set_reg(i, ®8, kdb_current_regs);
2007*4882a593Smuzhiyun break;
2008*4882a593Smuzhiyun case 16:
2009*4882a593Smuzhiyun reg16 = reg64;
2010*4882a593Smuzhiyun dbg_set_reg(i, ®16, kdb_current_regs);
2011*4882a593Smuzhiyun break;
2012*4882a593Smuzhiyun case 32:
2013*4882a593Smuzhiyun reg32 = reg64;
2014*4882a593Smuzhiyun dbg_set_reg(i, ®32, kdb_current_regs);
2015*4882a593Smuzhiyun break;
2016*4882a593Smuzhiyun case 64:
2017*4882a593Smuzhiyun dbg_set_reg(i, ®64, kdb_current_regs);
2018*4882a593Smuzhiyun break;
2019*4882a593Smuzhiyun }
2020*4882a593Smuzhiyun }
2021*4882a593Smuzhiyun return diag;
2022*4882a593Smuzhiyun #else
2023*4882a593Smuzhiyun kdb_printf("ERROR: Register set currently not implemented\n");
2024*4882a593Smuzhiyun return 0;
2025*4882a593Smuzhiyun #endif
2026*4882a593Smuzhiyun }
2027*4882a593Smuzhiyun
2028*4882a593Smuzhiyun #if defined(CONFIG_MAGIC_SYSRQ)
2029*4882a593Smuzhiyun /*
2030*4882a593Smuzhiyun * kdb_sr - This function implements the 'sr' (SYSRQ key) command
2031*4882a593Smuzhiyun * which interfaces to the soi-disant MAGIC SYSRQ functionality.
2032*4882a593Smuzhiyun * sr <magic-sysrq-code>
2033*4882a593Smuzhiyun */
kdb_sr(int argc,const char ** argv)2034*4882a593Smuzhiyun static int kdb_sr(int argc, const char **argv)
2035*4882a593Smuzhiyun {
2036*4882a593Smuzhiyun bool check_mask =
2037*4882a593Smuzhiyun !kdb_check_flags(KDB_ENABLE_ALL, kdb_cmd_enabled, false);
2038*4882a593Smuzhiyun
2039*4882a593Smuzhiyun if (argc != 1)
2040*4882a593Smuzhiyun return KDB_ARGCOUNT;
2041*4882a593Smuzhiyun
2042*4882a593Smuzhiyun kdb_trap_printk++;
2043*4882a593Smuzhiyun __handle_sysrq(*argv[1], check_mask);
2044*4882a593Smuzhiyun kdb_trap_printk--;
2045*4882a593Smuzhiyun
2046*4882a593Smuzhiyun return 0;
2047*4882a593Smuzhiyun }
2048*4882a593Smuzhiyun #endif /* CONFIG_MAGIC_SYSRQ */
2049*4882a593Smuzhiyun
2050*4882a593Smuzhiyun /*
2051*4882a593Smuzhiyun * kdb_ef - This function implements the 'regs' (display exception
2052*4882a593Smuzhiyun * frame) command. This command takes an address and expects to
2053*4882a593Smuzhiyun * find an exception frame at that address, formats and prints
2054*4882a593Smuzhiyun * it.
2055*4882a593Smuzhiyun * regs address-expression
2056*4882a593Smuzhiyun * Remarks:
2057*4882a593Smuzhiyun * Not done yet.
2058*4882a593Smuzhiyun */
kdb_ef(int argc,const char ** argv)2059*4882a593Smuzhiyun static int kdb_ef(int argc, const char **argv)
2060*4882a593Smuzhiyun {
2061*4882a593Smuzhiyun int diag;
2062*4882a593Smuzhiyun unsigned long addr;
2063*4882a593Smuzhiyun long offset;
2064*4882a593Smuzhiyun int nextarg;
2065*4882a593Smuzhiyun
2066*4882a593Smuzhiyun if (argc != 1)
2067*4882a593Smuzhiyun return KDB_ARGCOUNT;
2068*4882a593Smuzhiyun
2069*4882a593Smuzhiyun nextarg = 1;
2070*4882a593Smuzhiyun diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL);
2071*4882a593Smuzhiyun if (diag)
2072*4882a593Smuzhiyun return diag;
2073*4882a593Smuzhiyun show_regs((struct pt_regs *)addr);
2074*4882a593Smuzhiyun return 0;
2075*4882a593Smuzhiyun }
2076*4882a593Smuzhiyun
2077*4882a593Smuzhiyun #if defined(CONFIG_MODULES)
2078*4882a593Smuzhiyun /*
2079*4882a593Smuzhiyun * kdb_lsmod - This function implements the 'lsmod' command. Lists
2080*4882a593Smuzhiyun * currently loaded kernel modules.
2081*4882a593Smuzhiyun * Mostly taken from userland lsmod.
2082*4882a593Smuzhiyun */
kdb_lsmod(int argc,const char ** argv)2083*4882a593Smuzhiyun static int kdb_lsmod(int argc, const char **argv)
2084*4882a593Smuzhiyun {
2085*4882a593Smuzhiyun struct module *mod;
2086*4882a593Smuzhiyun
2087*4882a593Smuzhiyun if (argc != 0)
2088*4882a593Smuzhiyun return KDB_ARGCOUNT;
2089*4882a593Smuzhiyun
2090*4882a593Smuzhiyun kdb_printf("Module Size modstruct Used by\n");
2091*4882a593Smuzhiyun list_for_each_entry(mod, kdb_modules, list) {
2092*4882a593Smuzhiyun if (mod->state == MODULE_STATE_UNFORMED)
2093*4882a593Smuzhiyun continue;
2094*4882a593Smuzhiyun
2095*4882a593Smuzhiyun kdb_printf("%-20s%8u 0x%px ", mod->name,
2096*4882a593Smuzhiyun mod->core_layout.size, (void *)mod);
2097*4882a593Smuzhiyun #ifdef CONFIG_MODULE_UNLOAD
2098*4882a593Smuzhiyun kdb_printf("%4d ", module_refcount(mod));
2099*4882a593Smuzhiyun #endif
2100*4882a593Smuzhiyun if (mod->state == MODULE_STATE_GOING)
2101*4882a593Smuzhiyun kdb_printf(" (Unloading)");
2102*4882a593Smuzhiyun else if (mod->state == MODULE_STATE_COMING)
2103*4882a593Smuzhiyun kdb_printf(" (Loading)");
2104*4882a593Smuzhiyun else
2105*4882a593Smuzhiyun kdb_printf(" (Live)");
2106*4882a593Smuzhiyun kdb_printf(" 0x%px", mod->core_layout.base);
2107*4882a593Smuzhiyun
2108*4882a593Smuzhiyun #ifdef CONFIG_MODULE_UNLOAD
2109*4882a593Smuzhiyun {
2110*4882a593Smuzhiyun struct module_use *use;
2111*4882a593Smuzhiyun kdb_printf(" [ ");
2112*4882a593Smuzhiyun list_for_each_entry(use, &mod->source_list,
2113*4882a593Smuzhiyun source_list)
2114*4882a593Smuzhiyun kdb_printf("%s ", use->target->name);
2115*4882a593Smuzhiyun kdb_printf("]\n");
2116*4882a593Smuzhiyun }
2117*4882a593Smuzhiyun #endif
2118*4882a593Smuzhiyun }
2119*4882a593Smuzhiyun
2120*4882a593Smuzhiyun return 0;
2121*4882a593Smuzhiyun }
2122*4882a593Smuzhiyun
2123*4882a593Smuzhiyun #endif /* CONFIG_MODULES */
2124*4882a593Smuzhiyun
2125*4882a593Smuzhiyun /*
2126*4882a593Smuzhiyun * kdb_env - This function implements the 'env' command. Display the
2127*4882a593Smuzhiyun * current environment variables.
2128*4882a593Smuzhiyun */
2129*4882a593Smuzhiyun
kdb_env(int argc,const char ** argv)2130*4882a593Smuzhiyun static int kdb_env(int argc, const char **argv)
2131*4882a593Smuzhiyun {
2132*4882a593Smuzhiyun int i;
2133*4882a593Smuzhiyun
2134*4882a593Smuzhiyun for (i = 0; i < __nenv; i++) {
2135*4882a593Smuzhiyun if (__env[i])
2136*4882a593Smuzhiyun kdb_printf("%s\n", __env[i]);
2137*4882a593Smuzhiyun }
2138*4882a593Smuzhiyun
2139*4882a593Smuzhiyun if (KDB_DEBUG(MASK))
2140*4882a593Smuzhiyun kdb_printf("KDBDEBUG=0x%x\n",
2141*4882a593Smuzhiyun (kdb_flags & KDB_DEBUG(MASK)) >> KDB_DEBUG_FLAG_SHIFT);
2142*4882a593Smuzhiyun
2143*4882a593Smuzhiyun return 0;
2144*4882a593Smuzhiyun }
2145*4882a593Smuzhiyun
2146*4882a593Smuzhiyun #ifdef CONFIG_PRINTK
2147*4882a593Smuzhiyun /*
2148*4882a593Smuzhiyun * kdb_dmesg - This function implements the 'dmesg' command to display
2149*4882a593Smuzhiyun * the contents of the syslog buffer.
2150*4882a593Smuzhiyun * dmesg [lines] [adjust]
2151*4882a593Smuzhiyun */
kdb_dmesg(int argc,const char ** argv)2152*4882a593Smuzhiyun static int kdb_dmesg(int argc, const char **argv)
2153*4882a593Smuzhiyun {
2154*4882a593Smuzhiyun int diag;
2155*4882a593Smuzhiyun int logging;
2156*4882a593Smuzhiyun int lines = 0;
2157*4882a593Smuzhiyun int adjust = 0;
2158*4882a593Smuzhiyun int n = 0;
2159*4882a593Smuzhiyun int skip = 0;
2160*4882a593Smuzhiyun struct kmsg_dumper dumper = { .active = 1 };
2161*4882a593Smuzhiyun size_t len;
2162*4882a593Smuzhiyun char buf[201];
2163*4882a593Smuzhiyun
2164*4882a593Smuzhiyun if (argc > 2)
2165*4882a593Smuzhiyun return KDB_ARGCOUNT;
2166*4882a593Smuzhiyun if (argc) {
2167*4882a593Smuzhiyun char *cp;
2168*4882a593Smuzhiyun lines = simple_strtol(argv[1], &cp, 0);
2169*4882a593Smuzhiyun if (*cp)
2170*4882a593Smuzhiyun lines = 0;
2171*4882a593Smuzhiyun if (argc > 1) {
2172*4882a593Smuzhiyun adjust = simple_strtoul(argv[2], &cp, 0);
2173*4882a593Smuzhiyun if (*cp || adjust < 0)
2174*4882a593Smuzhiyun adjust = 0;
2175*4882a593Smuzhiyun }
2176*4882a593Smuzhiyun }
2177*4882a593Smuzhiyun
2178*4882a593Smuzhiyun /* disable LOGGING if set */
2179*4882a593Smuzhiyun diag = kdbgetintenv("LOGGING", &logging);
2180*4882a593Smuzhiyun if (!diag && logging) {
2181*4882a593Smuzhiyun const char *setargs[] = { "set", "LOGGING", "0" };
2182*4882a593Smuzhiyun kdb_set(2, setargs);
2183*4882a593Smuzhiyun }
2184*4882a593Smuzhiyun
2185*4882a593Smuzhiyun kmsg_dump_rewind_nolock(&dumper);
2186*4882a593Smuzhiyun while (kmsg_dump_get_line_nolock(&dumper, 1, NULL, 0, NULL))
2187*4882a593Smuzhiyun n++;
2188*4882a593Smuzhiyun
2189*4882a593Smuzhiyun if (lines < 0) {
2190*4882a593Smuzhiyun if (adjust >= n)
2191*4882a593Smuzhiyun kdb_printf("buffer only contains %d lines, nothing "
2192*4882a593Smuzhiyun "printed\n", n);
2193*4882a593Smuzhiyun else if (adjust - lines >= n)
2194*4882a593Smuzhiyun kdb_printf("buffer only contains %d lines, last %d "
2195*4882a593Smuzhiyun "lines printed\n", n, n - adjust);
2196*4882a593Smuzhiyun skip = adjust;
2197*4882a593Smuzhiyun lines = abs(lines);
2198*4882a593Smuzhiyun } else if (lines > 0) {
2199*4882a593Smuzhiyun skip = n - lines - adjust;
2200*4882a593Smuzhiyun lines = abs(lines);
2201*4882a593Smuzhiyun if (adjust >= n) {
2202*4882a593Smuzhiyun kdb_printf("buffer only contains %d lines, "
2203*4882a593Smuzhiyun "nothing printed\n", n);
2204*4882a593Smuzhiyun skip = n;
2205*4882a593Smuzhiyun } else if (skip < 0) {
2206*4882a593Smuzhiyun lines += skip;
2207*4882a593Smuzhiyun skip = 0;
2208*4882a593Smuzhiyun kdb_printf("buffer only contains %d lines, first "
2209*4882a593Smuzhiyun "%d lines printed\n", n, lines);
2210*4882a593Smuzhiyun }
2211*4882a593Smuzhiyun } else {
2212*4882a593Smuzhiyun lines = n;
2213*4882a593Smuzhiyun }
2214*4882a593Smuzhiyun
2215*4882a593Smuzhiyun if (skip >= n || skip < 0)
2216*4882a593Smuzhiyun return 0;
2217*4882a593Smuzhiyun
2218*4882a593Smuzhiyun kmsg_dump_rewind_nolock(&dumper);
2219*4882a593Smuzhiyun while (kmsg_dump_get_line_nolock(&dumper, 1, buf, sizeof(buf), &len)) {
2220*4882a593Smuzhiyun if (skip) {
2221*4882a593Smuzhiyun skip--;
2222*4882a593Smuzhiyun continue;
2223*4882a593Smuzhiyun }
2224*4882a593Smuzhiyun if (!lines--)
2225*4882a593Smuzhiyun break;
2226*4882a593Smuzhiyun if (KDB_FLAG(CMD_INTERRUPT))
2227*4882a593Smuzhiyun return 0;
2228*4882a593Smuzhiyun
2229*4882a593Smuzhiyun kdb_printf("%.*s\n", (int)len - 1, buf);
2230*4882a593Smuzhiyun }
2231*4882a593Smuzhiyun
2232*4882a593Smuzhiyun return 0;
2233*4882a593Smuzhiyun }
2234*4882a593Smuzhiyun #endif /* CONFIG_PRINTK */
2235*4882a593Smuzhiyun
2236*4882a593Smuzhiyun /* Make sure we balance enable/disable calls, must disable first. */
2237*4882a593Smuzhiyun static atomic_t kdb_nmi_disabled;
2238*4882a593Smuzhiyun
kdb_disable_nmi(int argc,const char * argv[])2239*4882a593Smuzhiyun static int kdb_disable_nmi(int argc, const char *argv[])
2240*4882a593Smuzhiyun {
2241*4882a593Smuzhiyun if (atomic_read(&kdb_nmi_disabled))
2242*4882a593Smuzhiyun return 0;
2243*4882a593Smuzhiyun atomic_set(&kdb_nmi_disabled, 1);
2244*4882a593Smuzhiyun arch_kgdb_ops.enable_nmi(0);
2245*4882a593Smuzhiyun return 0;
2246*4882a593Smuzhiyun }
2247*4882a593Smuzhiyun
kdb_param_enable_nmi(const char * val,const struct kernel_param * kp)2248*4882a593Smuzhiyun static int kdb_param_enable_nmi(const char *val, const struct kernel_param *kp)
2249*4882a593Smuzhiyun {
2250*4882a593Smuzhiyun if (!atomic_add_unless(&kdb_nmi_disabled, -1, 0))
2251*4882a593Smuzhiyun return -EINVAL;
2252*4882a593Smuzhiyun arch_kgdb_ops.enable_nmi(1);
2253*4882a593Smuzhiyun return 0;
2254*4882a593Smuzhiyun }
2255*4882a593Smuzhiyun
2256*4882a593Smuzhiyun static const struct kernel_param_ops kdb_param_ops_enable_nmi = {
2257*4882a593Smuzhiyun .set = kdb_param_enable_nmi,
2258*4882a593Smuzhiyun };
2259*4882a593Smuzhiyun module_param_cb(enable_nmi, &kdb_param_ops_enable_nmi, NULL, 0600);
2260*4882a593Smuzhiyun
2261*4882a593Smuzhiyun /*
2262*4882a593Smuzhiyun * kdb_cpu - This function implements the 'cpu' command.
2263*4882a593Smuzhiyun * cpu [<cpunum>]
2264*4882a593Smuzhiyun * Returns:
2265*4882a593Smuzhiyun * KDB_CMD_CPU for success, a kdb diagnostic if error
2266*4882a593Smuzhiyun */
kdb_cpu_status(void)2267*4882a593Smuzhiyun static void kdb_cpu_status(void)
2268*4882a593Smuzhiyun {
2269*4882a593Smuzhiyun int i, start_cpu, first_print = 1;
2270*4882a593Smuzhiyun char state, prev_state = '?';
2271*4882a593Smuzhiyun
2272*4882a593Smuzhiyun kdb_printf("Currently on cpu %d\n", raw_smp_processor_id());
2273*4882a593Smuzhiyun kdb_printf("Available cpus: ");
2274*4882a593Smuzhiyun for (start_cpu = -1, i = 0; i < NR_CPUS; i++) {
2275*4882a593Smuzhiyun if (!cpu_online(i)) {
2276*4882a593Smuzhiyun state = 'F'; /* cpu is offline */
2277*4882a593Smuzhiyun } else if (!kgdb_info[i].enter_kgdb) {
2278*4882a593Smuzhiyun state = 'D'; /* cpu is online but unresponsive */
2279*4882a593Smuzhiyun } else {
2280*4882a593Smuzhiyun state = ' '; /* cpu is responding to kdb */
2281*4882a593Smuzhiyun if (kdb_task_state_char(KDB_TSK(i)) == 'I')
2282*4882a593Smuzhiyun state = 'I'; /* idle task */
2283*4882a593Smuzhiyun }
2284*4882a593Smuzhiyun if (state != prev_state) {
2285*4882a593Smuzhiyun if (prev_state != '?') {
2286*4882a593Smuzhiyun if (!first_print)
2287*4882a593Smuzhiyun kdb_printf(", ");
2288*4882a593Smuzhiyun first_print = 0;
2289*4882a593Smuzhiyun kdb_printf("%d", start_cpu);
2290*4882a593Smuzhiyun if (start_cpu < i-1)
2291*4882a593Smuzhiyun kdb_printf("-%d", i-1);
2292*4882a593Smuzhiyun if (prev_state != ' ')
2293*4882a593Smuzhiyun kdb_printf("(%c)", prev_state);
2294*4882a593Smuzhiyun }
2295*4882a593Smuzhiyun prev_state = state;
2296*4882a593Smuzhiyun start_cpu = i;
2297*4882a593Smuzhiyun }
2298*4882a593Smuzhiyun }
2299*4882a593Smuzhiyun /* print the trailing cpus, ignoring them if they are all offline */
2300*4882a593Smuzhiyun if (prev_state != 'F') {
2301*4882a593Smuzhiyun if (!first_print)
2302*4882a593Smuzhiyun kdb_printf(", ");
2303*4882a593Smuzhiyun kdb_printf("%d", start_cpu);
2304*4882a593Smuzhiyun if (start_cpu < i-1)
2305*4882a593Smuzhiyun kdb_printf("-%d", i-1);
2306*4882a593Smuzhiyun if (prev_state != ' ')
2307*4882a593Smuzhiyun kdb_printf("(%c)", prev_state);
2308*4882a593Smuzhiyun }
2309*4882a593Smuzhiyun kdb_printf("\n");
2310*4882a593Smuzhiyun }
2311*4882a593Smuzhiyun
kdb_cpu(int argc,const char ** argv)2312*4882a593Smuzhiyun static int kdb_cpu(int argc, const char **argv)
2313*4882a593Smuzhiyun {
2314*4882a593Smuzhiyun unsigned long cpunum;
2315*4882a593Smuzhiyun int diag;
2316*4882a593Smuzhiyun
2317*4882a593Smuzhiyun if (argc == 0) {
2318*4882a593Smuzhiyun kdb_cpu_status();
2319*4882a593Smuzhiyun return 0;
2320*4882a593Smuzhiyun }
2321*4882a593Smuzhiyun
2322*4882a593Smuzhiyun if (argc != 1)
2323*4882a593Smuzhiyun return KDB_ARGCOUNT;
2324*4882a593Smuzhiyun
2325*4882a593Smuzhiyun diag = kdbgetularg(argv[1], &cpunum);
2326*4882a593Smuzhiyun if (diag)
2327*4882a593Smuzhiyun return diag;
2328*4882a593Smuzhiyun
2329*4882a593Smuzhiyun /*
2330*4882a593Smuzhiyun * Validate cpunum
2331*4882a593Smuzhiyun */
2332*4882a593Smuzhiyun if ((cpunum >= CONFIG_NR_CPUS) || !kgdb_info[cpunum].enter_kgdb)
2333*4882a593Smuzhiyun return KDB_BADCPUNUM;
2334*4882a593Smuzhiyun
2335*4882a593Smuzhiyun dbg_switch_cpu = cpunum;
2336*4882a593Smuzhiyun
2337*4882a593Smuzhiyun /*
2338*4882a593Smuzhiyun * Switch to other cpu
2339*4882a593Smuzhiyun */
2340*4882a593Smuzhiyun return KDB_CMD_CPU;
2341*4882a593Smuzhiyun }
2342*4882a593Smuzhiyun
2343*4882a593Smuzhiyun /* The user may not realize that ps/bta with no parameters does not print idle
2344*4882a593Smuzhiyun * or sleeping system daemon processes, so tell them how many were suppressed.
2345*4882a593Smuzhiyun */
kdb_ps_suppressed(void)2346*4882a593Smuzhiyun void kdb_ps_suppressed(void)
2347*4882a593Smuzhiyun {
2348*4882a593Smuzhiyun int idle = 0, daemon = 0;
2349*4882a593Smuzhiyun unsigned long mask_I = kdb_task_state_string("I"),
2350*4882a593Smuzhiyun mask_M = kdb_task_state_string("M");
2351*4882a593Smuzhiyun unsigned long cpu;
2352*4882a593Smuzhiyun const struct task_struct *p, *g;
2353*4882a593Smuzhiyun for_each_online_cpu(cpu) {
2354*4882a593Smuzhiyun p = kdb_curr_task(cpu);
2355*4882a593Smuzhiyun if (kdb_task_state(p, mask_I))
2356*4882a593Smuzhiyun ++idle;
2357*4882a593Smuzhiyun }
2358*4882a593Smuzhiyun for_each_process_thread(g, p) {
2359*4882a593Smuzhiyun if (kdb_task_state(p, mask_M))
2360*4882a593Smuzhiyun ++daemon;
2361*4882a593Smuzhiyun }
2362*4882a593Smuzhiyun if (idle || daemon) {
2363*4882a593Smuzhiyun if (idle)
2364*4882a593Smuzhiyun kdb_printf("%d idle process%s (state I)%s\n",
2365*4882a593Smuzhiyun idle, idle == 1 ? "" : "es",
2366*4882a593Smuzhiyun daemon ? " and " : "");
2367*4882a593Smuzhiyun if (daemon)
2368*4882a593Smuzhiyun kdb_printf("%d sleeping system daemon (state M) "
2369*4882a593Smuzhiyun "process%s", daemon,
2370*4882a593Smuzhiyun daemon == 1 ? "" : "es");
2371*4882a593Smuzhiyun kdb_printf(" suppressed,\nuse 'ps A' to see all.\n");
2372*4882a593Smuzhiyun }
2373*4882a593Smuzhiyun }
2374*4882a593Smuzhiyun
2375*4882a593Smuzhiyun /*
2376*4882a593Smuzhiyun * kdb_ps - This function implements the 'ps' command which shows a
2377*4882a593Smuzhiyun * list of the active processes.
2378*4882a593Smuzhiyun * ps [DRSTCZEUIMA] All processes, optionally filtered by state
2379*4882a593Smuzhiyun */
kdb_ps1(const struct task_struct * p)2380*4882a593Smuzhiyun void kdb_ps1(const struct task_struct *p)
2381*4882a593Smuzhiyun {
2382*4882a593Smuzhiyun int cpu;
2383*4882a593Smuzhiyun unsigned long tmp;
2384*4882a593Smuzhiyun
2385*4882a593Smuzhiyun if (!p ||
2386*4882a593Smuzhiyun copy_from_kernel_nofault(&tmp, (char *)p, sizeof(unsigned long)))
2387*4882a593Smuzhiyun return;
2388*4882a593Smuzhiyun
2389*4882a593Smuzhiyun cpu = kdb_process_cpu(p);
2390*4882a593Smuzhiyun kdb_printf("0x%px %8d %8d %d %4d %c 0x%px %c%s\n",
2391*4882a593Smuzhiyun (void *)p, p->pid, p->parent->pid,
2392*4882a593Smuzhiyun kdb_task_has_cpu(p), kdb_process_cpu(p),
2393*4882a593Smuzhiyun kdb_task_state_char(p),
2394*4882a593Smuzhiyun (void *)(&p->thread),
2395*4882a593Smuzhiyun p == kdb_curr_task(raw_smp_processor_id()) ? '*' : ' ',
2396*4882a593Smuzhiyun p->comm);
2397*4882a593Smuzhiyun if (kdb_task_has_cpu(p)) {
2398*4882a593Smuzhiyun if (!KDB_TSK(cpu)) {
2399*4882a593Smuzhiyun kdb_printf(" Error: no saved data for this cpu\n");
2400*4882a593Smuzhiyun } else {
2401*4882a593Smuzhiyun if (KDB_TSK(cpu) != p)
2402*4882a593Smuzhiyun kdb_printf(" Error: does not match running "
2403*4882a593Smuzhiyun "process table (0x%px)\n", KDB_TSK(cpu));
2404*4882a593Smuzhiyun }
2405*4882a593Smuzhiyun }
2406*4882a593Smuzhiyun }
2407*4882a593Smuzhiyun
kdb_ps(int argc,const char ** argv)2408*4882a593Smuzhiyun static int kdb_ps(int argc, const char **argv)
2409*4882a593Smuzhiyun {
2410*4882a593Smuzhiyun struct task_struct *g, *p;
2411*4882a593Smuzhiyun unsigned long mask, cpu;
2412*4882a593Smuzhiyun
2413*4882a593Smuzhiyun if (argc == 0)
2414*4882a593Smuzhiyun kdb_ps_suppressed();
2415*4882a593Smuzhiyun kdb_printf("%-*s Pid Parent [*] cpu State %-*s Command\n",
2416*4882a593Smuzhiyun (int)(2*sizeof(void *))+2, "Task Addr",
2417*4882a593Smuzhiyun (int)(2*sizeof(void *))+2, "Thread");
2418*4882a593Smuzhiyun mask = kdb_task_state_string(argc ? argv[1] : NULL);
2419*4882a593Smuzhiyun /* Run the active tasks first */
2420*4882a593Smuzhiyun for_each_online_cpu(cpu) {
2421*4882a593Smuzhiyun if (KDB_FLAG(CMD_INTERRUPT))
2422*4882a593Smuzhiyun return 0;
2423*4882a593Smuzhiyun p = kdb_curr_task(cpu);
2424*4882a593Smuzhiyun if (kdb_task_state(p, mask))
2425*4882a593Smuzhiyun kdb_ps1(p);
2426*4882a593Smuzhiyun }
2427*4882a593Smuzhiyun kdb_printf("\n");
2428*4882a593Smuzhiyun /* Now the real tasks */
2429*4882a593Smuzhiyun for_each_process_thread(g, p) {
2430*4882a593Smuzhiyun if (KDB_FLAG(CMD_INTERRUPT))
2431*4882a593Smuzhiyun return 0;
2432*4882a593Smuzhiyun if (kdb_task_state(p, mask))
2433*4882a593Smuzhiyun kdb_ps1(p);
2434*4882a593Smuzhiyun }
2435*4882a593Smuzhiyun
2436*4882a593Smuzhiyun return 0;
2437*4882a593Smuzhiyun }
2438*4882a593Smuzhiyun
2439*4882a593Smuzhiyun /*
2440*4882a593Smuzhiyun * kdb_pid - This function implements the 'pid' command which switches
2441*4882a593Smuzhiyun * the currently active process.
2442*4882a593Smuzhiyun * pid [<pid> | R]
2443*4882a593Smuzhiyun */
kdb_pid(int argc,const char ** argv)2444*4882a593Smuzhiyun static int kdb_pid(int argc, const char **argv)
2445*4882a593Smuzhiyun {
2446*4882a593Smuzhiyun struct task_struct *p;
2447*4882a593Smuzhiyun unsigned long val;
2448*4882a593Smuzhiyun int diag;
2449*4882a593Smuzhiyun
2450*4882a593Smuzhiyun if (argc > 1)
2451*4882a593Smuzhiyun return KDB_ARGCOUNT;
2452*4882a593Smuzhiyun
2453*4882a593Smuzhiyun if (argc) {
2454*4882a593Smuzhiyun if (strcmp(argv[1], "R") == 0) {
2455*4882a593Smuzhiyun p = KDB_TSK(kdb_initial_cpu);
2456*4882a593Smuzhiyun } else {
2457*4882a593Smuzhiyun diag = kdbgetularg(argv[1], &val);
2458*4882a593Smuzhiyun if (diag)
2459*4882a593Smuzhiyun return KDB_BADINT;
2460*4882a593Smuzhiyun
2461*4882a593Smuzhiyun p = find_task_by_pid_ns((pid_t)val, &init_pid_ns);
2462*4882a593Smuzhiyun if (!p) {
2463*4882a593Smuzhiyun kdb_printf("No task with pid=%d\n", (pid_t)val);
2464*4882a593Smuzhiyun return 0;
2465*4882a593Smuzhiyun }
2466*4882a593Smuzhiyun }
2467*4882a593Smuzhiyun kdb_set_current_task(p);
2468*4882a593Smuzhiyun }
2469*4882a593Smuzhiyun kdb_printf("KDB current process is %s(pid=%d)\n",
2470*4882a593Smuzhiyun kdb_current_task->comm,
2471*4882a593Smuzhiyun kdb_current_task->pid);
2472*4882a593Smuzhiyun
2473*4882a593Smuzhiyun return 0;
2474*4882a593Smuzhiyun }
2475*4882a593Smuzhiyun
kdb_kgdb(int argc,const char ** argv)2476*4882a593Smuzhiyun static int kdb_kgdb(int argc, const char **argv)
2477*4882a593Smuzhiyun {
2478*4882a593Smuzhiyun return KDB_CMD_KGDB;
2479*4882a593Smuzhiyun }
2480*4882a593Smuzhiyun
2481*4882a593Smuzhiyun /*
2482*4882a593Smuzhiyun * kdb_help - This function implements the 'help' and '?' commands.
2483*4882a593Smuzhiyun */
kdb_help(int argc,const char ** argv)2484*4882a593Smuzhiyun static int kdb_help(int argc, const char **argv)
2485*4882a593Smuzhiyun {
2486*4882a593Smuzhiyun kdbtab_t *kt;
2487*4882a593Smuzhiyun int i;
2488*4882a593Smuzhiyun
2489*4882a593Smuzhiyun kdb_printf("%-15.15s %-20.20s %s\n", "Command", "Usage", "Description");
2490*4882a593Smuzhiyun kdb_printf("-----------------------------"
2491*4882a593Smuzhiyun "-----------------------------\n");
2492*4882a593Smuzhiyun for_each_kdbcmd(kt, i) {
2493*4882a593Smuzhiyun char *space = "";
2494*4882a593Smuzhiyun if (KDB_FLAG(CMD_INTERRUPT))
2495*4882a593Smuzhiyun return 0;
2496*4882a593Smuzhiyun if (!kt->cmd_name)
2497*4882a593Smuzhiyun continue;
2498*4882a593Smuzhiyun if (!kdb_check_flags(kt->cmd_flags, kdb_cmd_enabled, true))
2499*4882a593Smuzhiyun continue;
2500*4882a593Smuzhiyun if (strlen(kt->cmd_usage) > 20)
2501*4882a593Smuzhiyun space = "\n ";
2502*4882a593Smuzhiyun kdb_printf("%-15.15s %-20s%s%s\n", kt->cmd_name,
2503*4882a593Smuzhiyun kt->cmd_usage, space, kt->cmd_help);
2504*4882a593Smuzhiyun }
2505*4882a593Smuzhiyun return 0;
2506*4882a593Smuzhiyun }
2507*4882a593Smuzhiyun
2508*4882a593Smuzhiyun /*
2509*4882a593Smuzhiyun * kdb_kill - This function implements the 'kill' commands.
2510*4882a593Smuzhiyun */
kdb_kill(int argc,const char ** argv)2511*4882a593Smuzhiyun static int kdb_kill(int argc, const char **argv)
2512*4882a593Smuzhiyun {
2513*4882a593Smuzhiyun long sig, pid;
2514*4882a593Smuzhiyun char *endp;
2515*4882a593Smuzhiyun struct task_struct *p;
2516*4882a593Smuzhiyun
2517*4882a593Smuzhiyun if (argc != 2)
2518*4882a593Smuzhiyun return KDB_ARGCOUNT;
2519*4882a593Smuzhiyun
2520*4882a593Smuzhiyun sig = simple_strtol(argv[1], &endp, 0);
2521*4882a593Smuzhiyun if (*endp)
2522*4882a593Smuzhiyun return KDB_BADINT;
2523*4882a593Smuzhiyun if ((sig >= 0) || !valid_signal(-sig)) {
2524*4882a593Smuzhiyun kdb_printf("Invalid signal parameter.<-signal>\n");
2525*4882a593Smuzhiyun return 0;
2526*4882a593Smuzhiyun }
2527*4882a593Smuzhiyun sig = -sig;
2528*4882a593Smuzhiyun
2529*4882a593Smuzhiyun pid = simple_strtol(argv[2], &endp, 0);
2530*4882a593Smuzhiyun if (*endp)
2531*4882a593Smuzhiyun return KDB_BADINT;
2532*4882a593Smuzhiyun if (pid <= 0) {
2533*4882a593Smuzhiyun kdb_printf("Process ID must be large than 0.\n");
2534*4882a593Smuzhiyun return 0;
2535*4882a593Smuzhiyun }
2536*4882a593Smuzhiyun
2537*4882a593Smuzhiyun /* Find the process. */
2538*4882a593Smuzhiyun p = find_task_by_pid_ns(pid, &init_pid_ns);
2539*4882a593Smuzhiyun if (!p) {
2540*4882a593Smuzhiyun kdb_printf("The specified process isn't found.\n");
2541*4882a593Smuzhiyun return 0;
2542*4882a593Smuzhiyun }
2543*4882a593Smuzhiyun p = p->group_leader;
2544*4882a593Smuzhiyun kdb_send_sig(p, sig);
2545*4882a593Smuzhiyun return 0;
2546*4882a593Smuzhiyun }
2547*4882a593Smuzhiyun
2548*4882a593Smuzhiyun /*
2549*4882a593Smuzhiyun * Most of this code has been lifted from kernel/timer.c::sys_sysinfo().
2550*4882a593Smuzhiyun * I cannot call that code directly from kdb, it has an unconditional
2551*4882a593Smuzhiyun * cli()/sti() and calls routines that take locks which can stop the debugger.
2552*4882a593Smuzhiyun */
kdb_sysinfo(struct sysinfo * val)2553*4882a593Smuzhiyun static void kdb_sysinfo(struct sysinfo *val)
2554*4882a593Smuzhiyun {
2555*4882a593Smuzhiyun u64 uptime = ktime_get_mono_fast_ns();
2556*4882a593Smuzhiyun
2557*4882a593Smuzhiyun memset(val, 0, sizeof(*val));
2558*4882a593Smuzhiyun val->uptime = div_u64(uptime, NSEC_PER_SEC);
2559*4882a593Smuzhiyun val->loads[0] = avenrun[0];
2560*4882a593Smuzhiyun val->loads[1] = avenrun[1];
2561*4882a593Smuzhiyun val->loads[2] = avenrun[2];
2562*4882a593Smuzhiyun val->procs = nr_threads-1;
2563*4882a593Smuzhiyun si_meminfo(val);
2564*4882a593Smuzhiyun
2565*4882a593Smuzhiyun return;
2566*4882a593Smuzhiyun }
2567*4882a593Smuzhiyun
2568*4882a593Smuzhiyun /*
2569*4882a593Smuzhiyun * kdb_summary - This function implements the 'summary' command.
2570*4882a593Smuzhiyun */
kdb_summary(int argc,const char ** argv)2571*4882a593Smuzhiyun static int kdb_summary(int argc, const char **argv)
2572*4882a593Smuzhiyun {
2573*4882a593Smuzhiyun time64_t now;
2574*4882a593Smuzhiyun struct tm tm;
2575*4882a593Smuzhiyun struct sysinfo val;
2576*4882a593Smuzhiyun
2577*4882a593Smuzhiyun if (argc)
2578*4882a593Smuzhiyun return KDB_ARGCOUNT;
2579*4882a593Smuzhiyun
2580*4882a593Smuzhiyun kdb_printf("sysname %s\n", init_uts_ns.name.sysname);
2581*4882a593Smuzhiyun kdb_printf("release %s\n", init_uts_ns.name.release);
2582*4882a593Smuzhiyun kdb_printf("version %s\n", init_uts_ns.name.version);
2583*4882a593Smuzhiyun kdb_printf("machine %s\n", init_uts_ns.name.machine);
2584*4882a593Smuzhiyun kdb_printf("nodename %s\n", init_uts_ns.name.nodename);
2585*4882a593Smuzhiyun kdb_printf("domainname %s\n", init_uts_ns.name.domainname);
2586*4882a593Smuzhiyun
2587*4882a593Smuzhiyun now = __ktime_get_real_seconds();
2588*4882a593Smuzhiyun time64_to_tm(now, 0, &tm);
2589*4882a593Smuzhiyun kdb_printf("date %04ld-%02d-%02d %02d:%02d:%02d "
2590*4882a593Smuzhiyun "tz_minuteswest %d\n",
2591*4882a593Smuzhiyun 1900+tm.tm_year, tm.tm_mon+1, tm.tm_mday,
2592*4882a593Smuzhiyun tm.tm_hour, tm.tm_min, tm.tm_sec,
2593*4882a593Smuzhiyun sys_tz.tz_minuteswest);
2594*4882a593Smuzhiyun
2595*4882a593Smuzhiyun kdb_sysinfo(&val);
2596*4882a593Smuzhiyun kdb_printf("uptime ");
2597*4882a593Smuzhiyun if (val.uptime > (24*60*60)) {
2598*4882a593Smuzhiyun int days = val.uptime / (24*60*60);
2599*4882a593Smuzhiyun val.uptime %= (24*60*60);
2600*4882a593Smuzhiyun kdb_printf("%d day%s ", days, days == 1 ? "" : "s");
2601*4882a593Smuzhiyun }
2602*4882a593Smuzhiyun kdb_printf("%02ld:%02ld\n", val.uptime/(60*60), (val.uptime/60)%60);
2603*4882a593Smuzhiyun
2604*4882a593Smuzhiyun kdb_printf("load avg %ld.%02ld %ld.%02ld %ld.%02ld\n",
2605*4882a593Smuzhiyun LOAD_INT(val.loads[0]), LOAD_FRAC(val.loads[0]),
2606*4882a593Smuzhiyun LOAD_INT(val.loads[1]), LOAD_FRAC(val.loads[1]),
2607*4882a593Smuzhiyun LOAD_INT(val.loads[2]), LOAD_FRAC(val.loads[2]));
2608*4882a593Smuzhiyun
2609*4882a593Smuzhiyun /* Display in kilobytes */
2610*4882a593Smuzhiyun #define K(x) ((x) << (PAGE_SHIFT - 10))
2611*4882a593Smuzhiyun kdb_printf("\nMemTotal: %8lu kB\nMemFree: %8lu kB\n"
2612*4882a593Smuzhiyun "Buffers: %8lu kB\n",
2613*4882a593Smuzhiyun K(val.totalram), K(val.freeram), K(val.bufferram));
2614*4882a593Smuzhiyun return 0;
2615*4882a593Smuzhiyun }
2616*4882a593Smuzhiyun
2617*4882a593Smuzhiyun /*
2618*4882a593Smuzhiyun * kdb_per_cpu - This function implements the 'per_cpu' command.
2619*4882a593Smuzhiyun */
kdb_per_cpu(int argc,const char ** argv)2620*4882a593Smuzhiyun static int kdb_per_cpu(int argc, const char **argv)
2621*4882a593Smuzhiyun {
2622*4882a593Smuzhiyun char fmtstr[64];
2623*4882a593Smuzhiyun int cpu, diag, nextarg = 1;
2624*4882a593Smuzhiyun unsigned long addr, symaddr, val, bytesperword = 0, whichcpu = ~0UL;
2625*4882a593Smuzhiyun
2626*4882a593Smuzhiyun if (argc < 1 || argc > 3)
2627*4882a593Smuzhiyun return KDB_ARGCOUNT;
2628*4882a593Smuzhiyun
2629*4882a593Smuzhiyun diag = kdbgetaddrarg(argc, argv, &nextarg, &symaddr, NULL, NULL);
2630*4882a593Smuzhiyun if (diag)
2631*4882a593Smuzhiyun return diag;
2632*4882a593Smuzhiyun
2633*4882a593Smuzhiyun if (argc >= 2) {
2634*4882a593Smuzhiyun diag = kdbgetularg(argv[2], &bytesperword);
2635*4882a593Smuzhiyun if (diag)
2636*4882a593Smuzhiyun return diag;
2637*4882a593Smuzhiyun }
2638*4882a593Smuzhiyun if (!bytesperword)
2639*4882a593Smuzhiyun bytesperword = KDB_WORD_SIZE;
2640*4882a593Smuzhiyun else if (bytesperword > KDB_WORD_SIZE)
2641*4882a593Smuzhiyun return KDB_BADWIDTH;
2642*4882a593Smuzhiyun sprintf(fmtstr, "%%0%dlx ", (int)(2*bytesperword));
2643*4882a593Smuzhiyun if (argc >= 3) {
2644*4882a593Smuzhiyun diag = kdbgetularg(argv[3], &whichcpu);
2645*4882a593Smuzhiyun if (diag)
2646*4882a593Smuzhiyun return diag;
2647*4882a593Smuzhiyun if (whichcpu >= nr_cpu_ids || !cpu_online(whichcpu)) {
2648*4882a593Smuzhiyun kdb_printf("cpu %ld is not online\n", whichcpu);
2649*4882a593Smuzhiyun return KDB_BADCPUNUM;
2650*4882a593Smuzhiyun }
2651*4882a593Smuzhiyun }
2652*4882a593Smuzhiyun
2653*4882a593Smuzhiyun /* Most architectures use __per_cpu_offset[cpu], some use
2654*4882a593Smuzhiyun * __per_cpu_offset(cpu), smp has no __per_cpu_offset.
2655*4882a593Smuzhiyun */
2656*4882a593Smuzhiyun #ifdef __per_cpu_offset
2657*4882a593Smuzhiyun #define KDB_PCU(cpu) __per_cpu_offset(cpu)
2658*4882a593Smuzhiyun #else
2659*4882a593Smuzhiyun #ifdef CONFIG_SMP
2660*4882a593Smuzhiyun #define KDB_PCU(cpu) __per_cpu_offset[cpu]
2661*4882a593Smuzhiyun #else
2662*4882a593Smuzhiyun #define KDB_PCU(cpu) 0
2663*4882a593Smuzhiyun #endif
2664*4882a593Smuzhiyun #endif
2665*4882a593Smuzhiyun for_each_online_cpu(cpu) {
2666*4882a593Smuzhiyun if (KDB_FLAG(CMD_INTERRUPT))
2667*4882a593Smuzhiyun return 0;
2668*4882a593Smuzhiyun
2669*4882a593Smuzhiyun if (whichcpu != ~0UL && whichcpu != cpu)
2670*4882a593Smuzhiyun continue;
2671*4882a593Smuzhiyun addr = symaddr + KDB_PCU(cpu);
2672*4882a593Smuzhiyun diag = kdb_getword(&val, addr, bytesperword);
2673*4882a593Smuzhiyun if (diag) {
2674*4882a593Smuzhiyun kdb_printf("%5d " kdb_bfd_vma_fmt0 " - unable to "
2675*4882a593Smuzhiyun "read, diag=%d\n", cpu, addr, diag);
2676*4882a593Smuzhiyun continue;
2677*4882a593Smuzhiyun }
2678*4882a593Smuzhiyun kdb_printf("%5d ", cpu);
2679*4882a593Smuzhiyun kdb_md_line(fmtstr, addr,
2680*4882a593Smuzhiyun bytesperword == KDB_WORD_SIZE,
2681*4882a593Smuzhiyun 1, bytesperword, 1, 1, 0);
2682*4882a593Smuzhiyun }
2683*4882a593Smuzhiyun #undef KDB_PCU
2684*4882a593Smuzhiyun return 0;
2685*4882a593Smuzhiyun }
2686*4882a593Smuzhiyun
2687*4882a593Smuzhiyun /*
2688*4882a593Smuzhiyun * display help for the use of cmd | grep pattern
2689*4882a593Smuzhiyun */
kdb_grep_help(int argc,const char ** argv)2690*4882a593Smuzhiyun static int kdb_grep_help(int argc, const char **argv)
2691*4882a593Smuzhiyun {
2692*4882a593Smuzhiyun kdb_printf("Usage of cmd args | grep pattern:\n");
2693*4882a593Smuzhiyun kdb_printf(" Any command's output may be filtered through an ");
2694*4882a593Smuzhiyun kdb_printf("emulated 'pipe'.\n");
2695*4882a593Smuzhiyun kdb_printf(" 'grep' is just a key word.\n");
2696*4882a593Smuzhiyun kdb_printf(" The pattern may include a very limited set of "
2697*4882a593Smuzhiyun "metacharacters:\n");
2698*4882a593Smuzhiyun kdb_printf(" pattern or ^pattern or pattern$ or ^pattern$\n");
2699*4882a593Smuzhiyun kdb_printf(" And if there are spaces in the pattern, you may "
2700*4882a593Smuzhiyun "quote it:\n");
2701*4882a593Smuzhiyun kdb_printf(" \"pat tern\" or \"^pat tern\" or \"pat tern$\""
2702*4882a593Smuzhiyun " or \"^pat tern$\"\n");
2703*4882a593Smuzhiyun return 0;
2704*4882a593Smuzhiyun }
2705*4882a593Smuzhiyun
2706*4882a593Smuzhiyun /*
2707*4882a593Smuzhiyun * kdb_register_flags - This function is used to register a kernel
2708*4882a593Smuzhiyun * debugger command.
2709*4882a593Smuzhiyun * Inputs:
2710*4882a593Smuzhiyun * cmd Command name
2711*4882a593Smuzhiyun * func Function to execute the command
2712*4882a593Smuzhiyun * usage A simple usage string showing arguments
2713*4882a593Smuzhiyun * help A simple help string describing command
2714*4882a593Smuzhiyun * repeat Does the command auto repeat on enter?
2715*4882a593Smuzhiyun * Returns:
2716*4882a593Smuzhiyun * zero for success, one if a duplicate command.
2717*4882a593Smuzhiyun */
2718*4882a593Smuzhiyun #define kdb_command_extend 50 /* arbitrary */
kdb_register_flags(char * cmd,kdb_func_t func,char * usage,char * help,short minlen,kdb_cmdflags_t flags)2719*4882a593Smuzhiyun int kdb_register_flags(char *cmd,
2720*4882a593Smuzhiyun kdb_func_t func,
2721*4882a593Smuzhiyun char *usage,
2722*4882a593Smuzhiyun char *help,
2723*4882a593Smuzhiyun short minlen,
2724*4882a593Smuzhiyun kdb_cmdflags_t flags)
2725*4882a593Smuzhiyun {
2726*4882a593Smuzhiyun int i;
2727*4882a593Smuzhiyun kdbtab_t *kp;
2728*4882a593Smuzhiyun
2729*4882a593Smuzhiyun /*
2730*4882a593Smuzhiyun * Brute force method to determine duplicates
2731*4882a593Smuzhiyun */
2732*4882a593Smuzhiyun for_each_kdbcmd(kp, i) {
2733*4882a593Smuzhiyun if (kp->cmd_name && (strcmp(kp->cmd_name, cmd) == 0)) {
2734*4882a593Smuzhiyun kdb_printf("Duplicate kdb command registered: "
2735*4882a593Smuzhiyun "%s, func %px help %s\n", cmd, func, help);
2736*4882a593Smuzhiyun return 1;
2737*4882a593Smuzhiyun }
2738*4882a593Smuzhiyun }
2739*4882a593Smuzhiyun
2740*4882a593Smuzhiyun /*
2741*4882a593Smuzhiyun * Insert command into first available location in table
2742*4882a593Smuzhiyun */
2743*4882a593Smuzhiyun for_each_kdbcmd(kp, i) {
2744*4882a593Smuzhiyun if (kp->cmd_name == NULL)
2745*4882a593Smuzhiyun break;
2746*4882a593Smuzhiyun }
2747*4882a593Smuzhiyun
2748*4882a593Smuzhiyun if (i >= kdb_max_commands) {
2749*4882a593Smuzhiyun kdbtab_t *new = kmalloc_array(kdb_max_commands -
2750*4882a593Smuzhiyun KDB_BASE_CMD_MAX +
2751*4882a593Smuzhiyun kdb_command_extend,
2752*4882a593Smuzhiyun sizeof(*new),
2753*4882a593Smuzhiyun GFP_KDB);
2754*4882a593Smuzhiyun if (!new) {
2755*4882a593Smuzhiyun kdb_printf("Could not allocate new kdb_command "
2756*4882a593Smuzhiyun "table\n");
2757*4882a593Smuzhiyun return 1;
2758*4882a593Smuzhiyun }
2759*4882a593Smuzhiyun if (kdb_commands) {
2760*4882a593Smuzhiyun memcpy(new, kdb_commands,
2761*4882a593Smuzhiyun (kdb_max_commands - KDB_BASE_CMD_MAX) * sizeof(*new));
2762*4882a593Smuzhiyun kfree(kdb_commands);
2763*4882a593Smuzhiyun }
2764*4882a593Smuzhiyun memset(new + kdb_max_commands - KDB_BASE_CMD_MAX, 0,
2765*4882a593Smuzhiyun kdb_command_extend * sizeof(*new));
2766*4882a593Smuzhiyun kdb_commands = new;
2767*4882a593Smuzhiyun kp = kdb_commands + kdb_max_commands - KDB_BASE_CMD_MAX;
2768*4882a593Smuzhiyun kdb_max_commands += kdb_command_extend;
2769*4882a593Smuzhiyun }
2770*4882a593Smuzhiyun
2771*4882a593Smuzhiyun kp->cmd_name = cmd;
2772*4882a593Smuzhiyun kp->cmd_func = func;
2773*4882a593Smuzhiyun kp->cmd_usage = usage;
2774*4882a593Smuzhiyun kp->cmd_help = help;
2775*4882a593Smuzhiyun kp->cmd_minlen = minlen;
2776*4882a593Smuzhiyun kp->cmd_flags = flags;
2777*4882a593Smuzhiyun
2778*4882a593Smuzhiyun return 0;
2779*4882a593Smuzhiyun }
2780*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(kdb_register_flags);
2781*4882a593Smuzhiyun
2782*4882a593Smuzhiyun
2783*4882a593Smuzhiyun /*
2784*4882a593Smuzhiyun * kdb_register - Compatibility register function for commands that do
2785*4882a593Smuzhiyun * not need to specify a repeat state. Equivalent to
2786*4882a593Smuzhiyun * kdb_register_flags with flags set to 0.
2787*4882a593Smuzhiyun * Inputs:
2788*4882a593Smuzhiyun * cmd Command name
2789*4882a593Smuzhiyun * func Function to execute the command
2790*4882a593Smuzhiyun * usage A simple usage string showing arguments
2791*4882a593Smuzhiyun * help A simple help string describing command
2792*4882a593Smuzhiyun * Returns:
2793*4882a593Smuzhiyun * zero for success, one if a duplicate command.
2794*4882a593Smuzhiyun */
kdb_register(char * cmd,kdb_func_t func,char * usage,char * help,short minlen)2795*4882a593Smuzhiyun int kdb_register(char *cmd,
2796*4882a593Smuzhiyun kdb_func_t func,
2797*4882a593Smuzhiyun char *usage,
2798*4882a593Smuzhiyun char *help,
2799*4882a593Smuzhiyun short minlen)
2800*4882a593Smuzhiyun {
2801*4882a593Smuzhiyun return kdb_register_flags(cmd, func, usage, help, minlen, 0);
2802*4882a593Smuzhiyun }
2803*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(kdb_register);
2804*4882a593Smuzhiyun
2805*4882a593Smuzhiyun /*
2806*4882a593Smuzhiyun * kdb_unregister - This function is used to unregister a kernel
2807*4882a593Smuzhiyun * debugger command. It is generally called when a module which
2808*4882a593Smuzhiyun * implements kdb commands is unloaded.
2809*4882a593Smuzhiyun * Inputs:
2810*4882a593Smuzhiyun * cmd Command name
2811*4882a593Smuzhiyun * Returns:
2812*4882a593Smuzhiyun * zero for success, one command not registered.
2813*4882a593Smuzhiyun */
kdb_unregister(char * cmd)2814*4882a593Smuzhiyun int kdb_unregister(char *cmd)
2815*4882a593Smuzhiyun {
2816*4882a593Smuzhiyun int i;
2817*4882a593Smuzhiyun kdbtab_t *kp;
2818*4882a593Smuzhiyun
2819*4882a593Smuzhiyun /*
2820*4882a593Smuzhiyun * find the command.
2821*4882a593Smuzhiyun */
2822*4882a593Smuzhiyun for_each_kdbcmd(kp, i) {
2823*4882a593Smuzhiyun if (kp->cmd_name && (strcmp(kp->cmd_name, cmd) == 0)) {
2824*4882a593Smuzhiyun kp->cmd_name = NULL;
2825*4882a593Smuzhiyun return 0;
2826*4882a593Smuzhiyun }
2827*4882a593Smuzhiyun }
2828*4882a593Smuzhiyun
2829*4882a593Smuzhiyun /* Couldn't find it. */
2830*4882a593Smuzhiyun return 1;
2831*4882a593Smuzhiyun }
2832*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(kdb_unregister);
2833*4882a593Smuzhiyun
2834*4882a593Smuzhiyun /* Initialize the kdb command table. */
kdb_inittab(void)2835*4882a593Smuzhiyun static void __init kdb_inittab(void)
2836*4882a593Smuzhiyun {
2837*4882a593Smuzhiyun int i;
2838*4882a593Smuzhiyun kdbtab_t *kp;
2839*4882a593Smuzhiyun
2840*4882a593Smuzhiyun for_each_kdbcmd(kp, i)
2841*4882a593Smuzhiyun kp->cmd_name = NULL;
2842*4882a593Smuzhiyun
2843*4882a593Smuzhiyun kdb_register_flags("md", kdb_md, "<vaddr>",
2844*4882a593Smuzhiyun "Display Memory Contents, also mdWcN, e.g. md8c1", 1,
2845*4882a593Smuzhiyun KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2846*4882a593Smuzhiyun kdb_register_flags("mdr", kdb_md, "<vaddr> <bytes>",
2847*4882a593Smuzhiyun "Display Raw Memory", 0,
2848*4882a593Smuzhiyun KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2849*4882a593Smuzhiyun kdb_register_flags("mdp", kdb_md, "<paddr> <bytes>",
2850*4882a593Smuzhiyun "Display Physical Memory", 0,
2851*4882a593Smuzhiyun KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2852*4882a593Smuzhiyun kdb_register_flags("mds", kdb_md, "<vaddr>",
2853*4882a593Smuzhiyun "Display Memory Symbolically", 0,
2854*4882a593Smuzhiyun KDB_ENABLE_MEM_READ | KDB_REPEAT_NO_ARGS);
2855*4882a593Smuzhiyun kdb_register_flags("mm", kdb_mm, "<vaddr> <contents>",
2856*4882a593Smuzhiyun "Modify Memory Contents", 0,
2857*4882a593Smuzhiyun KDB_ENABLE_MEM_WRITE | KDB_REPEAT_NO_ARGS);
2858*4882a593Smuzhiyun kdb_register_flags("go", kdb_go, "[<vaddr>]",
2859*4882a593Smuzhiyun "Continue Execution", 1,
2860*4882a593Smuzhiyun KDB_ENABLE_REG_WRITE | KDB_ENABLE_ALWAYS_SAFE_NO_ARGS);
2861*4882a593Smuzhiyun kdb_register_flags("rd", kdb_rd, "",
2862*4882a593Smuzhiyun "Display Registers", 0,
2863*4882a593Smuzhiyun KDB_ENABLE_REG_READ);
2864*4882a593Smuzhiyun kdb_register_flags("rm", kdb_rm, "<reg> <contents>",
2865*4882a593Smuzhiyun "Modify Registers", 0,
2866*4882a593Smuzhiyun KDB_ENABLE_REG_WRITE);
2867*4882a593Smuzhiyun kdb_register_flags("ef", kdb_ef, "<vaddr>",
2868*4882a593Smuzhiyun "Display exception frame", 0,
2869*4882a593Smuzhiyun KDB_ENABLE_MEM_READ);
2870*4882a593Smuzhiyun kdb_register_flags("bt", kdb_bt, "[<vaddr>]",
2871*4882a593Smuzhiyun "Stack traceback", 1,
2872*4882a593Smuzhiyun KDB_ENABLE_MEM_READ | KDB_ENABLE_INSPECT_NO_ARGS);
2873*4882a593Smuzhiyun kdb_register_flags("btp", kdb_bt, "<pid>",
2874*4882a593Smuzhiyun "Display stack for process <pid>", 0,
2875*4882a593Smuzhiyun KDB_ENABLE_INSPECT);
2876*4882a593Smuzhiyun kdb_register_flags("bta", kdb_bt, "[D|R|S|T|C|Z|E|U|I|M|A]",
2877*4882a593Smuzhiyun "Backtrace all processes matching state flag", 0,
2878*4882a593Smuzhiyun KDB_ENABLE_INSPECT);
2879*4882a593Smuzhiyun kdb_register_flags("btc", kdb_bt, "",
2880*4882a593Smuzhiyun "Backtrace current process on each cpu", 0,
2881*4882a593Smuzhiyun KDB_ENABLE_INSPECT);
2882*4882a593Smuzhiyun kdb_register_flags("btt", kdb_bt, "<vaddr>",
2883*4882a593Smuzhiyun "Backtrace process given its struct task address", 0,
2884*4882a593Smuzhiyun KDB_ENABLE_MEM_READ | KDB_ENABLE_INSPECT_NO_ARGS);
2885*4882a593Smuzhiyun kdb_register_flags("env", kdb_env, "",
2886*4882a593Smuzhiyun "Show environment variables", 0,
2887*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2888*4882a593Smuzhiyun kdb_register_flags("set", kdb_set, "",
2889*4882a593Smuzhiyun "Set environment variables", 0,
2890*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2891*4882a593Smuzhiyun kdb_register_flags("help", kdb_help, "",
2892*4882a593Smuzhiyun "Display Help Message", 1,
2893*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2894*4882a593Smuzhiyun kdb_register_flags("?", kdb_help, "",
2895*4882a593Smuzhiyun "Display Help Message", 0,
2896*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2897*4882a593Smuzhiyun kdb_register_flags("cpu", kdb_cpu, "<cpunum>",
2898*4882a593Smuzhiyun "Switch to new cpu", 0,
2899*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE_NO_ARGS);
2900*4882a593Smuzhiyun kdb_register_flags("kgdb", kdb_kgdb, "",
2901*4882a593Smuzhiyun "Enter kgdb mode", 0, 0);
2902*4882a593Smuzhiyun kdb_register_flags("ps", kdb_ps, "[<flags>|A]",
2903*4882a593Smuzhiyun "Display active task list", 0,
2904*4882a593Smuzhiyun KDB_ENABLE_INSPECT);
2905*4882a593Smuzhiyun kdb_register_flags("pid", kdb_pid, "<pidnum>",
2906*4882a593Smuzhiyun "Switch to another task", 0,
2907*4882a593Smuzhiyun KDB_ENABLE_INSPECT);
2908*4882a593Smuzhiyun kdb_register_flags("reboot", kdb_reboot, "",
2909*4882a593Smuzhiyun "Reboot the machine immediately", 0,
2910*4882a593Smuzhiyun KDB_ENABLE_REBOOT);
2911*4882a593Smuzhiyun #if defined(CONFIG_MODULES)
2912*4882a593Smuzhiyun kdb_register_flags("lsmod", kdb_lsmod, "",
2913*4882a593Smuzhiyun "List loaded kernel modules", 0,
2914*4882a593Smuzhiyun KDB_ENABLE_INSPECT);
2915*4882a593Smuzhiyun #endif
2916*4882a593Smuzhiyun #if defined(CONFIG_MAGIC_SYSRQ)
2917*4882a593Smuzhiyun kdb_register_flags("sr", kdb_sr, "<key>",
2918*4882a593Smuzhiyun "Magic SysRq key", 0,
2919*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2920*4882a593Smuzhiyun #endif
2921*4882a593Smuzhiyun #if defined(CONFIG_PRINTK)
2922*4882a593Smuzhiyun kdb_register_flags("dmesg", kdb_dmesg, "[lines]",
2923*4882a593Smuzhiyun "Display syslog buffer", 0,
2924*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2925*4882a593Smuzhiyun #endif
2926*4882a593Smuzhiyun if (arch_kgdb_ops.enable_nmi) {
2927*4882a593Smuzhiyun kdb_register_flags("disable_nmi", kdb_disable_nmi, "",
2928*4882a593Smuzhiyun "Disable NMI entry to KDB", 0,
2929*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2930*4882a593Smuzhiyun }
2931*4882a593Smuzhiyun kdb_register_flags("defcmd", kdb_defcmd, "name \"usage\" \"help\"",
2932*4882a593Smuzhiyun "Define a set of commands, down to endefcmd", 0,
2933*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2934*4882a593Smuzhiyun kdb_register_flags("kill", kdb_kill, "<-signal> <pid>",
2935*4882a593Smuzhiyun "Send a signal to a process", 0,
2936*4882a593Smuzhiyun KDB_ENABLE_SIGNAL);
2937*4882a593Smuzhiyun kdb_register_flags("summary", kdb_summary, "",
2938*4882a593Smuzhiyun "Summarize the system", 4,
2939*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2940*4882a593Smuzhiyun kdb_register_flags("per_cpu", kdb_per_cpu, "<sym> [<bytes>] [<cpu>]",
2941*4882a593Smuzhiyun "Display per_cpu variables", 3,
2942*4882a593Smuzhiyun KDB_ENABLE_MEM_READ);
2943*4882a593Smuzhiyun kdb_register_flags("grephelp", kdb_grep_help, "",
2944*4882a593Smuzhiyun "Display help on | grep", 0,
2945*4882a593Smuzhiyun KDB_ENABLE_ALWAYS_SAFE);
2946*4882a593Smuzhiyun }
2947*4882a593Smuzhiyun
2948*4882a593Smuzhiyun /* Execute any commands defined in kdb_cmds. */
kdb_cmd_init(void)2949*4882a593Smuzhiyun static void __init kdb_cmd_init(void)
2950*4882a593Smuzhiyun {
2951*4882a593Smuzhiyun int i, diag;
2952*4882a593Smuzhiyun for (i = 0; kdb_cmds[i]; ++i) {
2953*4882a593Smuzhiyun diag = kdb_parse(kdb_cmds[i]);
2954*4882a593Smuzhiyun if (diag)
2955*4882a593Smuzhiyun kdb_printf("kdb command %s failed, kdb diag %d\n",
2956*4882a593Smuzhiyun kdb_cmds[i], diag);
2957*4882a593Smuzhiyun }
2958*4882a593Smuzhiyun if (defcmd_in_progress) {
2959*4882a593Smuzhiyun kdb_printf("Incomplete 'defcmd' set, forcing endefcmd\n");
2960*4882a593Smuzhiyun kdb_parse("endefcmd");
2961*4882a593Smuzhiyun }
2962*4882a593Smuzhiyun }
2963*4882a593Smuzhiyun
2964*4882a593Smuzhiyun /* Initialize kdb_printf, breakpoint tables and kdb state */
kdb_init(int lvl)2965*4882a593Smuzhiyun void __init kdb_init(int lvl)
2966*4882a593Smuzhiyun {
2967*4882a593Smuzhiyun static int kdb_init_lvl = KDB_NOT_INITIALIZED;
2968*4882a593Smuzhiyun int i;
2969*4882a593Smuzhiyun
2970*4882a593Smuzhiyun if (kdb_init_lvl == KDB_INIT_FULL || lvl <= kdb_init_lvl)
2971*4882a593Smuzhiyun return;
2972*4882a593Smuzhiyun for (i = kdb_init_lvl; i < lvl; i++) {
2973*4882a593Smuzhiyun switch (i) {
2974*4882a593Smuzhiyun case KDB_NOT_INITIALIZED:
2975*4882a593Smuzhiyun kdb_inittab(); /* Initialize Command Table */
2976*4882a593Smuzhiyun kdb_initbptab(); /* Initialize Breakpoints */
2977*4882a593Smuzhiyun break;
2978*4882a593Smuzhiyun case KDB_INIT_EARLY:
2979*4882a593Smuzhiyun kdb_cmd_init(); /* Build kdb_cmds tables */
2980*4882a593Smuzhiyun break;
2981*4882a593Smuzhiyun }
2982*4882a593Smuzhiyun }
2983*4882a593Smuzhiyun kdb_init_lvl = lvl;
2984*4882a593Smuzhiyun }
2985