|  | /* | 
|  | * Kernel Debugger Architecture Independent Main Code | 
|  | * | 
|  | * This file is subject to the terms and conditions of the GNU General Public | 
|  | * License.  See the file "COPYING" in the main directory of this archive | 
|  | * for more details. | 
|  | * | 
|  | * Copyright (C) 1999-2004 Silicon Graphics, Inc.  All Rights Reserved. | 
|  | * Copyright (C) 2000 Stephane Eranian <eranian@hpl.hp.com> | 
|  | * Xscale (R) modifications copyright (C) 2003 Intel Corporation. | 
|  | * Copyright (c) 2009 Wind River Systems, Inc.  All Rights Reserved. | 
|  | */ | 
|  |  | 
|  | #include <linux/ctype.h> | 
|  | #include <linux/string.h> | 
|  | #include <linux/kernel.h> | 
|  | #include <linux/reboot.h> | 
|  | #include <linux/sched.h> | 
|  | #include <linux/sysrq.h> | 
|  | #include <linux/smp.h> | 
|  | #include <linux/utsname.h> | 
|  | #include <linux/vmalloc.h> | 
|  | #include <linux/module.h> | 
|  | #include <linux/mm.h> | 
|  | #include <linux/init.h> | 
|  | #include <linux/kallsyms.h> | 
|  | #include <linux/kgdb.h> | 
|  | #include <linux/kdb.h> | 
|  | #include <linux/notifier.h> | 
|  | #include <linux/interrupt.h> | 
|  | #include <linux/delay.h> | 
|  | #include <linux/nmi.h> | 
|  | #include <linux/time.h> | 
|  | #include <linux/ptrace.h> | 
|  | #include <linux/sysctl.h> | 
|  | #include <linux/cpu.h> | 
|  | #include <linux/kdebug.h> | 
|  | #include <linux/proc_fs.h> | 
|  | #include <linux/uaccess.h> | 
|  | #include <linux/slab.h> | 
|  | #include "kdb_private.h" | 
|  |  | 
|  | #define GREP_LEN 256 | 
|  | char kdb_grep_string[GREP_LEN]; | 
|  | int kdb_grepping_flag; | 
|  | EXPORT_SYMBOL(kdb_grepping_flag); | 
|  | int kdb_grep_leading; | 
|  | int kdb_grep_trailing; | 
|  |  | 
|  | /* | 
|  | * Kernel debugger state flags | 
|  | */ | 
|  | int kdb_flags; | 
|  | atomic_t kdb_event; | 
|  |  | 
|  | /* | 
|  | * kdb_lock protects updates to kdb_initial_cpu.  Used to | 
|  | * single thread processors through the kernel debugger. | 
|  | */ | 
|  | int kdb_initial_cpu = -1;	/* cpu number that owns kdb */ | 
|  | int kdb_nextline = 1; | 
|  | int kdb_state;			/* General KDB state */ | 
|  |  | 
|  | struct task_struct *kdb_current_task; | 
|  | EXPORT_SYMBOL(kdb_current_task); | 
|  | struct pt_regs *kdb_current_regs; | 
|  |  | 
|  | const char *kdb_diemsg; | 
|  | static int kdb_go_count; | 
|  | #ifdef CONFIG_KDB_CONTINUE_CATASTROPHIC | 
|  | static unsigned int kdb_continue_catastrophic = | 
|  | CONFIG_KDB_CONTINUE_CATASTROPHIC; | 
|  | #else | 
|  | static unsigned int kdb_continue_catastrophic; | 
|  | #endif | 
|  |  | 
|  | /* kdb_commands describes the available commands. */ | 
|  | static kdbtab_t *kdb_commands; | 
|  | #define KDB_BASE_CMD_MAX 50 | 
|  | static int kdb_max_commands = KDB_BASE_CMD_MAX; | 
|  | static kdbtab_t kdb_base_commands[KDB_BASE_CMD_MAX]; | 
|  | #define for_each_kdbcmd(cmd, num)					\ | 
|  | for ((cmd) = kdb_base_commands, (num) = 0;			\ | 
|  | num < kdb_max_commands;					\ | 
|  | num++, num == KDB_BASE_CMD_MAX ? cmd = kdb_commands : cmd++) | 
|  |  | 
|  | typedef struct _kdbmsg { | 
|  | int	km_diag;	/* kdb diagnostic */ | 
|  | char	*km_msg;	/* Corresponding message text */ | 
|  | } kdbmsg_t; | 
|  |  | 
|  | #define KDBMSG(msgnum, text) \ | 
|  | { KDB_##msgnum, text } | 
|  |  | 
|  | static kdbmsg_t kdbmsgs[] = { | 
|  | KDBMSG(NOTFOUND, "Command Not Found"), | 
|  | KDBMSG(ARGCOUNT, "Improper argument count, see usage."), | 
|  | KDBMSG(BADWIDTH, "Illegal value for BYTESPERWORD use 1, 2, 4 or 8, " | 
|  | "8 is only allowed on 64 bit systems"), | 
|  | KDBMSG(BADRADIX, "Illegal value for RADIX use 8, 10 or 16"), | 
|  | KDBMSG(NOTENV, "Cannot find environment variable"), | 
|  | KDBMSG(NOENVVALUE, "Environment variable should have value"), | 
|  | KDBMSG(NOTIMP, "Command not implemented"), | 
|  | KDBMSG(ENVFULL, "Environment full"), | 
|  | KDBMSG(ENVBUFFULL, "Environment buffer full"), | 
|  | KDBMSG(TOOMANYBPT, "Too many breakpoints defined"), | 
|  | #ifdef CONFIG_CPU_XSCALE | 
|  | KDBMSG(TOOMANYDBREGS, "More breakpoints than ibcr registers defined"), | 
|  | #else | 
|  | KDBMSG(TOOMANYDBREGS, "More breakpoints than db registers defined"), | 
|  | #endif | 
|  | KDBMSG(DUPBPT, "Duplicate breakpoint address"), | 
|  | KDBMSG(BPTNOTFOUND, "Breakpoint not found"), | 
|  | KDBMSG(BADMODE, "Invalid IDMODE"), | 
|  | KDBMSG(BADINT, "Illegal numeric value"), | 
|  | KDBMSG(INVADDRFMT, "Invalid symbolic address format"), | 
|  | KDBMSG(BADREG, "Invalid register name"), | 
|  | KDBMSG(BADCPUNUM, "Invalid cpu number"), | 
|  | KDBMSG(BADLENGTH, "Invalid length field"), | 
|  | KDBMSG(NOBP, "No Breakpoint exists"), | 
|  | KDBMSG(BADADDR, "Invalid address"), | 
|  | }; | 
|  | #undef KDBMSG | 
|  |  | 
|  | static const int __nkdb_err = sizeof(kdbmsgs) / sizeof(kdbmsg_t); | 
|  |  | 
|  |  | 
|  | /* | 
|  | * Initial environment.   This is all kept static and local to | 
|  | * this file.   We don't want to rely on the memory allocation | 
|  | * mechanisms in the kernel, so we use a very limited allocate-only | 
|  | * heap for new and altered environment variables.  The entire | 
|  | * environment is limited to a fixed number of entries (add more | 
|  | * to __env[] if required) and a fixed amount of heap (add more to | 
|  | * KDB_ENVBUFSIZE if required). | 
|  | */ | 
|  |  | 
|  | static char *__env[] = { | 
|  | #if defined(CONFIG_SMP) | 
|  | "PROMPT=[%d]kdb> ", | 
|  | "MOREPROMPT=[%d]more> ", | 
|  | #else | 
|  | "PROMPT=kdb> ", | 
|  | "MOREPROMPT=more> ", | 
|  | #endif | 
|  | "RADIX=16", | 
|  | "MDCOUNT=8",			/* lines of md output */ | 
|  | "BTARGS=9",			/* 9 possible args in bt */ | 
|  | KDB_PLATFORM_ENV, | 
|  | "DTABCOUNT=30", | 
|  | "NOSECT=1", | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | (char *)0, | 
|  | }; | 
|  |  | 
|  | static const int __nenv = (sizeof(__env) / sizeof(char *)); | 
|  |  | 
|  | struct task_struct *kdb_curr_task(int cpu) | 
|  | { | 
|  | struct task_struct *p = curr_task(cpu); | 
|  | #ifdef	_TIF_MCA_INIT | 
|  | if ((task_thread_info(p)->flags & _TIF_MCA_INIT) && KDB_TSK(cpu)) | 
|  | p = krp->p; | 
|  | #endif | 
|  | return p; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdbgetenv - This function will return the character string value of | 
|  | *	an environment variable. | 
|  | * Parameters: | 
|  | *	match	A character string representing an environment variable. | 
|  | * Returns: | 
|  | *	NULL	No environment variable matches 'match' | 
|  | *	char*	Pointer to string value of environment variable. | 
|  | */ | 
|  | char *kdbgetenv(const char *match) | 
|  | { | 
|  | char **ep = __env; | 
|  | int matchlen = strlen(match); | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < __nenv; i++) { | 
|  | char *e = *ep++; | 
|  |  | 
|  | if (!e) | 
|  | continue; | 
|  |  | 
|  | if ((strncmp(match, e, matchlen) == 0) | 
|  | && ((e[matchlen] == '\0') | 
|  | || (e[matchlen] == '='))) { | 
|  | char *cp = strchr(e, '='); | 
|  | return cp ? ++cp : ""; | 
|  | } | 
|  | } | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdballocenv - This function is used to allocate bytes for | 
|  | *	environment entries. | 
|  | * Parameters: | 
|  | *	match	A character string representing a numeric value | 
|  | * Outputs: | 
|  | *	*value  the unsigned long representation of the env variable 'match' | 
|  | * Returns: | 
|  | *	Zero on success, a kdb diagnostic on failure. | 
|  | * Remarks: | 
|  | *	We use a static environment buffer (envbuffer) to hold the values | 
|  | *	of dynamically generated environment variables (see kdb_set).  Buffer | 
|  | *	space once allocated is never free'd, so over time, the amount of space | 
|  | *	(currently 512 bytes) will be exhausted if env variables are changed | 
|  | *	frequently. | 
|  | */ | 
|  | static char *kdballocenv(size_t bytes) | 
|  | { | 
|  | #define	KDB_ENVBUFSIZE	512 | 
|  | static char envbuffer[KDB_ENVBUFSIZE]; | 
|  | static int envbufsize; | 
|  | char *ep = NULL; | 
|  |  | 
|  | if ((KDB_ENVBUFSIZE - envbufsize) >= bytes) { | 
|  | ep = &envbuffer[envbufsize]; | 
|  | envbufsize += bytes; | 
|  | } | 
|  | return ep; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdbgetulenv - This function will return the value of an unsigned | 
|  | *	long-valued environment variable. | 
|  | * Parameters: | 
|  | *	match	A character string representing a numeric value | 
|  | * Outputs: | 
|  | *	*value  the unsigned long represntation of the env variable 'match' | 
|  | * Returns: | 
|  | *	Zero on success, a kdb diagnostic on failure. | 
|  | */ | 
|  | static int kdbgetulenv(const char *match, unsigned long *value) | 
|  | { | 
|  | char *ep; | 
|  |  | 
|  | ep = kdbgetenv(match); | 
|  | if (!ep) | 
|  | return KDB_NOTENV; | 
|  | if (strlen(ep) == 0) | 
|  | return KDB_NOENVVALUE; | 
|  |  | 
|  | *value = simple_strtoul(ep, NULL, 0); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdbgetintenv - This function will return the value of an | 
|  | *	integer-valued environment variable. | 
|  | * Parameters: | 
|  | *	match	A character string representing an integer-valued env variable | 
|  | * Outputs: | 
|  | *	*value  the integer representation of the environment variable 'match' | 
|  | * Returns: | 
|  | *	Zero on success, a kdb diagnostic on failure. | 
|  | */ | 
|  | int kdbgetintenv(const char *match, int *value) | 
|  | { | 
|  | unsigned long val; | 
|  | int diag; | 
|  |  | 
|  | diag = kdbgetulenv(match, &val); | 
|  | if (!diag) | 
|  | *value = (int) val; | 
|  | return diag; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdbgetularg - This function will convert a numeric string into an | 
|  | *	unsigned long value. | 
|  | * Parameters: | 
|  | *	arg	A character string representing a numeric value | 
|  | * Outputs: | 
|  | *	*value  the unsigned long represntation of arg. | 
|  | * Returns: | 
|  | *	Zero on success, a kdb diagnostic on failure. | 
|  | */ | 
|  | int kdbgetularg(const char *arg, unsigned long *value) | 
|  | { | 
|  | char *endp; | 
|  | unsigned long val; | 
|  |  | 
|  | val = simple_strtoul(arg, &endp, 0); | 
|  |  | 
|  | if (endp == arg) { | 
|  | /* | 
|  | * Also try base 16, for us folks too lazy to type the | 
|  | * leading 0x... | 
|  | */ | 
|  | val = simple_strtoul(arg, &endp, 16); | 
|  | if (endp == arg) | 
|  | return KDB_BADINT; | 
|  | } | 
|  |  | 
|  | *value = val; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int kdbgetu64arg(const char *arg, u64 *value) | 
|  | { | 
|  | char *endp; | 
|  | u64 val; | 
|  |  | 
|  | val = simple_strtoull(arg, &endp, 0); | 
|  |  | 
|  | if (endp == arg) { | 
|  |  | 
|  | val = simple_strtoull(arg, &endp, 16); | 
|  | if (endp == arg) | 
|  | return KDB_BADINT; | 
|  | } | 
|  |  | 
|  | *value = val; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_set - This function implements the 'set' command.  Alter an | 
|  | *	existing environment variable or create a new one. | 
|  | */ | 
|  | int kdb_set(int argc, const char **argv) | 
|  | { | 
|  | int i; | 
|  | char *ep; | 
|  | size_t varlen, vallen; | 
|  |  | 
|  | /* | 
|  | * we can be invoked two ways: | 
|  | *   set var=value    argv[1]="var", argv[2]="value" | 
|  | *   set var = value  argv[1]="var", argv[2]="=", argv[3]="value" | 
|  | * - if the latter, shift 'em down. | 
|  | */ | 
|  | if (argc == 3) { | 
|  | argv[2] = argv[3]; | 
|  | argc--; | 
|  | } | 
|  |  | 
|  | if (argc != 2) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | /* | 
|  | * Check for internal variables | 
|  | */ | 
|  | if (strcmp(argv[1], "KDBDEBUG") == 0) { | 
|  | unsigned int debugflags; | 
|  | char *cp; | 
|  |  | 
|  | debugflags = simple_strtoul(argv[2], &cp, 0); | 
|  | if (cp == argv[2] || debugflags & ~KDB_DEBUG_FLAG_MASK) { | 
|  | kdb_printf("kdb: illegal debug flags '%s'\n", | 
|  | argv[2]); | 
|  | return 0; | 
|  | } | 
|  | kdb_flags = (kdb_flags & | 
|  | ~(KDB_DEBUG_FLAG_MASK << KDB_DEBUG_FLAG_SHIFT)) | 
|  | | (debugflags << KDB_DEBUG_FLAG_SHIFT); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * Tokenizer squashed the '=' sign.  argv[1] is variable | 
|  | * name, argv[2] = value. | 
|  | */ | 
|  | varlen = strlen(argv[1]); | 
|  | vallen = strlen(argv[2]); | 
|  | ep = kdballocenv(varlen + vallen + 2); | 
|  | if (ep == (char *)0) | 
|  | return KDB_ENVBUFFULL; | 
|  |  | 
|  | sprintf(ep, "%s=%s", argv[1], argv[2]); | 
|  |  | 
|  | ep[varlen+vallen+1] = '\0'; | 
|  |  | 
|  | for (i = 0; i < __nenv; i++) { | 
|  | if (__env[i] | 
|  | && ((strncmp(__env[i], argv[1], varlen) == 0) | 
|  | && ((__env[i][varlen] == '\0') | 
|  | || (__env[i][varlen] == '=')))) { | 
|  | __env[i] = ep; | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* | 
|  | * Wasn't existing variable.  Fit into slot. | 
|  | */ | 
|  | for (i = 0; i < __nenv-1; i++) { | 
|  | if (__env[i] == (char *)0) { | 
|  | __env[i] = ep; | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | return KDB_ENVFULL; | 
|  | } | 
|  |  | 
|  | static int kdb_check_regs(void) | 
|  | { | 
|  | if (!kdb_current_regs) { | 
|  | kdb_printf("No current kdb registers." | 
|  | "  You may need to select another task\n"); | 
|  | return KDB_BADREG; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdbgetaddrarg - This function is responsible for parsing an | 
|  | *	address-expression and returning the value of the expression, | 
|  | *	symbol name, and offset to the caller. | 
|  | * | 
|  | *	The argument may consist of a numeric value (decimal or | 
|  | *	hexidecimal), a symbol name, a register name (preceded by the | 
|  | *	percent sign), an environment variable with a numeric value | 
|  | *	(preceded by a dollar sign) or a simple arithmetic expression | 
|  | *	consisting of a symbol name, +/-, and a numeric constant value | 
|  | *	(offset). | 
|  | * Parameters: | 
|  | *	argc	- count of arguments in argv | 
|  | *	argv	- argument vector | 
|  | *	*nextarg - index to next unparsed argument in argv[] | 
|  | *	regs	- Register state at time of KDB entry | 
|  | * Outputs: | 
|  | *	*value	- receives the value of the address-expression | 
|  | *	*offset - receives the offset specified, if any | 
|  | *	*name   - receives the symbol name, if any | 
|  | *	*nextarg - index to next unparsed argument in argv[] | 
|  | * Returns: | 
|  | *	zero is returned on success, a kdb diagnostic code is | 
|  | *      returned on error. | 
|  | */ | 
|  | int kdbgetaddrarg(int argc, const char **argv, int *nextarg, | 
|  | unsigned long *value,  long *offset, | 
|  | char **name) | 
|  | { | 
|  | unsigned long addr; | 
|  | unsigned long off = 0; | 
|  | int positive; | 
|  | int diag; | 
|  | int found = 0; | 
|  | char *symname; | 
|  | char symbol = '\0'; | 
|  | char *cp; | 
|  | kdb_symtab_t symtab; | 
|  |  | 
|  | /* | 
|  | * Process arguments which follow the following syntax: | 
|  | * | 
|  | *  symbol | numeric-address [+/- numeric-offset] | 
|  | *  %register | 
|  | *  $environment-variable | 
|  | */ | 
|  |  | 
|  | if (*nextarg > argc) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | symname = (char *)argv[*nextarg]; | 
|  |  | 
|  | /* | 
|  | * If there is no whitespace between the symbol | 
|  | * or address and the '+' or '-' symbols, we | 
|  | * remember the character and replace it with a | 
|  | * null so the symbol/value can be properly parsed | 
|  | */ | 
|  | cp = strpbrk(symname, "+-"); | 
|  | if (cp != NULL) { | 
|  | symbol = *cp; | 
|  | *cp++ = '\0'; | 
|  | } | 
|  |  | 
|  | if (symname[0] == '$') { | 
|  | diag = kdbgetulenv(&symname[1], &addr); | 
|  | if (diag) | 
|  | return diag; | 
|  | } else if (symname[0] == '%') { | 
|  | diag = kdb_check_regs(); | 
|  | if (diag) | 
|  | return diag; | 
|  | /* Implement register values with % at a later time as it is | 
|  | * arch optional. | 
|  | */ | 
|  | return KDB_NOTIMP; | 
|  | } else { | 
|  | found = kdbgetsymval(symname, &symtab); | 
|  | if (found) { | 
|  | addr = symtab.sym_start; | 
|  | } else { | 
|  | diag = kdbgetularg(argv[*nextarg], &addr); | 
|  | if (diag) | 
|  | return diag; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (!found) | 
|  | found = kdbnearsym(addr, &symtab); | 
|  |  | 
|  | (*nextarg)++; | 
|  |  | 
|  | if (name) | 
|  | *name = symname; | 
|  | if (value) | 
|  | *value = addr; | 
|  | if (offset && name && *name) | 
|  | *offset = addr - symtab.sym_start; | 
|  |  | 
|  | if ((*nextarg > argc) | 
|  | && (symbol == '\0')) | 
|  | return 0; | 
|  |  | 
|  | /* | 
|  | * check for +/- and offset | 
|  | */ | 
|  |  | 
|  | if (symbol == '\0') { | 
|  | if ((argv[*nextarg][0] != '+') | 
|  | && (argv[*nextarg][0] != '-')) { | 
|  | /* | 
|  | * Not our argument.  Return. | 
|  | */ | 
|  | return 0; | 
|  | } else { | 
|  | positive = (argv[*nextarg][0] == '+'); | 
|  | (*nextarg)++; | 
|  | } | 
|  | } else | 
|  | positive = (symbol == '+'); | 
|  |  | 
|  | /* | 
|  | * Now there must be an offset! | 
|  | */ | 
|  | if ((*nextarg > argc) | 
|  | && (symbol == '\0')) { | 
|  | return KDB_INVADDRFMT; | 
|  | } | 
|  |  | 
|  | if (!symbol) { | 
|  | cp = (char *)argv[*nextarg]; | 
|  | (*nextarg)++; | 
|  | } | 
|  |  | 
|  | diag = kdbgetularg(cp, &off); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | if (!positive) | 
|  | off = -off; | 
|  |  | 
|  | if (offset) | 
|  | *offset += off; | 
|  |  | 
|  | if (value) | 
|  | *value += off; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void kdb_cmderror(int diag) | 
|  | { | 
|  | int i; | 
|  |  | 
|  | if (diag >= 0) { | 
|  | kdb_printf("no error detected (diagnostic is %d)\n", diag); | 
|  | return; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < __nkdb_err; i++) { | 
|  | if (kdbmsgs[i].km_diag == diag) { | 
|  | kdb_printf("diag: %d: %s\n", diag, kdbmsgs[i].km_msg); | 
|  | return; | 
|  | } | 
|  | } | 
|  |  | 
|  | kdb_printf("Unknown diag %d\n", -diag); | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_defcmd, kdb_defcmd2 - This function implements the 'defcmd' | 
|  | *	command which defines one command as a set of other commands, | 
|  | *	terminated by endefcmd.  kdb_defcmd processes the initial | 
|  | *	'defcmd' command, kdb_defcmd2 is invoked from kdb_parse for | 
|  | *	the following commands until 'endefcmd'. | 
|  | * Inputs: | 
|  | *	argc	argument count | 
|  | *	argv	argument vector | 
|  | * Returns: | 
|  | *	zero for success, a kdb diagnostic if error | 
|  | */ | 
|  | struct defcmd_set { | 
|  | int count; | 
|  | int usable; | 
|  | char *name; | 
|  | char *usage; | 
|  | char *help; | 
|  | char **command; | 
|  | }; | 
|  | static struct defcmd_set *defcmd_set; | 
|  | static int defcmd_set_count; | 
|  | static int defcmd_in_progress; | 
|  |  | 
|  | /* Forward references */ | 
|  | static int kdb_exec_defcmd(int argc, const char **argv); | 
|  |  | 
|  | static int kdb_defcmd2(const char *cmdstr, const char *argv0) | 
|  | { | 
|  | struct defcmd_set *s = defcmd_set + defcmd_set_count - 1; | 
|  | char **save_command = s->command; | 
|  | if (strcmp(argv0, "endefcmd") == 0) { | 
|  | defcmd_in_progress = 0; | 
|  | if (!s->count) | 
|  | s->usable = 0; | 
|  | if (s->usable) | 
|  | kdb_register(s->name, kdb_exec_defcmd, | 
|  | s->usage, s->help, 0); | 
|  | return 0; | 
|  | } | 
|  | if (!s->usable) | 
|  | return KDB_NOTIMP; | 
|  | s->command = kzalloc((s->count + 1) * sizeof(*(s->command)), GFP_KDB); | 
|  | if (!s->command) { | 
|  | kdb_printf("Could not allocate new kdb_defcmd table for %s\n", | 
|  | cmdstr); | 
|  | s->usable = 0; | 
|  | return KDB_NOTIMP; | 
|  | } | 
|  | memcpy(s->command, save_command, s->count * sizeof(*(s->command))); | 
|  | s->command[s->count++] = kdb_strdup(cmdstr, GFP_KDB); | 
|  | kfree(save_command); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int kdb_defcmd(int argc, const char **argv) | 
|  | { | 
|  | struct defcmd_set *save_defcmd_set = defcmd_set, *s; | 
|  | if (defcmd_in_progress) { | 
|  | kdb_printf("kdb: nested defcmd detected, assuming missing " | 
|  | "endefcmd\n"); | 
|  | kdb_defcmd2("endefcmd", "endefcmd"); | 
|  | } | 
|  | if (argc == 0) { | 
|  | int i; | 
|  | for (s = defcmd_set; s < defcmd_set + defcmd_set_count; ++s) { | 
|  | kdb_printf("defcmd %s \"%s\" \"%s\"\n", s->name, | 
|  | s->usage, s->help); | 
|  | for (i = 0; i < s->count; ++i) | 
|  | kdb_printf("%s", s->command[i]); | 
|  | kdb_printf("endefcmd\n"); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  | if (argc != 3) | 
|  | return KDB_ARGCOUNT; | 
|  | defcmd_set = kmalloc((defcmd_set_count + 1) * sizeof(*defcmd_set), | 
|  | GFP_KDB); | 
|  | if (!defcmd_set) { | 
|  | kdb_printf("Could not allocate new defcmd_set entry for %s\n", | 
|  | argv[1]); | 
|  | defcmd_set = save_defcmd_set; | 
|  | return KDB_NOTIMP; | 
|  | } | 
|  | memcpy(defcmd_set, save_defcmd_set, | 
|  | defcmd_set_count * sizeof(*defcmd_set)); | 
|  | kfree(save_defcmd_set); | 
|  | s = defcmd_set + defcmd_set_count; | 
|  | memset(s, 0, sizeof(*s)); | 
|  | s->usable = 1; | 
|  | s->name = kdb_strdup(argv[1], GFP_KDB); | 
|  | s->usage = kdb_strdup(argv[2], GFP_KDB); | 
|  | s->help = kdb_strdup(argv[3], GFP_KDB); | 
|  | if (s->usage[0] == '"') { | 
|  | strcpy(s->usage, s->usage+1); | 
|  | s->usage[strlen(s->usage)-1] = '\0'; | 
|  | } | 
|  | if (s->help[0] == '"') { | 
|  | strcpy(s->help, s->help+1); | 
|  | s->help[strlen(s->help)-1] = '\0'; | 
|  | } | 
|  | ++defcmd_set_count; | 
|  | defcmd_in_progress = 1; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_exec_defcmd - Execute the set of commands associated with this | 
|  | *	defcmd name. | 
|  | * Inputs: | 
|  | *	argc	argument count | 
|  | *	argv	argument vector | 
|  | * Returns: | 
|  | *	zero for success, a kdb diagnostic if error | 
|  | */ | 
|  | static int kdb_exec_defcmd(int argc, const char **argv) | 
|  | { | 
|  | int i, ret; | 
|  | struct defcmd_set *s; | 
|  | if (argc != 0) | 
|  | return KDB_ARGCOUNT; | 
|  | for (s = defcmd_set, i = 0; i < defcmd_set_count; ++i, ++s) { | 
|  | if (strcmp(s->name, argv[0]) == 0) | 
|  | break; | 
|  | } | 
|  | if (i == defcmd_set_count) { | 
|  | kdb_printf("kdb_exec_defcmd: could not find commands for %s\n", | 
|  | argv[0]); | 
|  | return KDB_NOTIMP; | 
|  | } | 
|  | for (i = 0; i < s->count; ++i) { | 
|  | /* Recursive use of kdb_parse, do not use argv after | 
|  | * this point */ | 
|  | argv = NULL; | 
|  | kdb_printf("[%s]kdb> %s\n", s->name, s->command[i]); | 
|  | ret = kdb_parse(s->command[i]); | 
|  | if (ret) | 
|  | return ret; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* Command history */ | 
|  | #define KDB_CMD_HISTORY_COUNT	32 | 
|  | #define CMD_BUFLEN		200	/* kdb_printf: max printline | 
|  | * size == 256 */ | 
|  | static unsigned int cmd_head, cmd_tail; | 
|  | static unsigned int cmdptr; | 
|  | static char cmd_hist[KDB_CMD_HISTORY_COUNT][CMD_BUFLEN]; | 
|  | static char cmd_cur[CMD_BUFLEN]; | 
|  |  | 
|  | /* | 
|  | * The "str" argument may point to something like  | grep xyz | 
|  | */ | 
|  | static void parse_grep(const char *str) | 
|  | { | 
|  | int	len; | 
|  | char	*cp = (char *)str, *cp2; | 
|  |  | 
|  | /* sanity check: we should have been called with the \ first */ | 
|  | if (*cp != '|') | 
|  | return; | 
|  | cp++; | 
|  | while (isspace(*cp)) | 
|  | cp++; | 
|  | if (strncmp(cp, "grep ", 5)) { | 
|  | kdb_printf("invalid 'pipe', see grephelp\n"); | 
|  | return; | 
|  | } | 
|  | cp += 5; | 
|  | while (isspace(*cp)) | 
|  | cp++; | 
|  | cp2 = strchr(cp, '\n'); | 
|  | if (cp2) | 
|  | *cp2 = '\0'; /* remove the trailing newline */ | 
|  | len = strlen(cp); | 
|  | if (len == 0) { | 
|  | kdb_printf("invalid 'pipe', see grephelp\n"); | 
|  | return; | 
|  | } | 
|  | /* now cp points to a nonzero length search string */ | 
|  | if (*cp == '"') { | 
|  | /* allow it be "x y z" by removing the "'s - there must | 
|  | be two of them */ | 
|  | cp++; | 
|  | cp2 = strchr(cp, '"'); | 
|  | if (!cp2) { | 
|  | kdb_printf("invalid quoted string, see grephelp\n"); | 
|  | return; | 
|  | } | 
|  | *cp2 = '\0'; /* end the string where the 2nd " was */ | 
|  | } | 
|  | kdb_grep_leading = 0; | 
|  | if (*cp == '^') { | 
|  | kdb_grep_leading = 1; | 
|  | cp++; | 
|  | } | 
|  | len = strlen(cp); | 
|  | kdb_grep_trailing = 0; | 
|  | if (*(cp+len-1) == '$') { | 
|  | kdb_grep_trailing = 1; | 
|  | *(cp+len-1) = '\0'; | 
|  | } | 
|  | len = strlen(cp); | 
|  | if (!len) | 
|  | return; | 
|  | if (len >= GREP_LEN) { | 
|  | kdb_printf("search string too long\n"); | 
|  | return; | 
|  | } | 
|  | strcpy(kdb_grep_string, cp); | 
|  | kdb_grepping_flag++; | 
|  | return; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_parse - Parse the command line, search the command table for a | 
|  | *	matching command and invoke the command function.  This | 
|  | *	function may be called recursively, if it is, the second call | 
|  | *	will overwrite argv and cbuf.  It is the caller's | 
|  | *	responsibility to save their argv if they recursively call | 
|  | *	kdb_parse(). | 
|  | * Parameters: | 
|  | *      cmdstr	The input command line to be parsed. | 
|  | *	regs	The registers at the time kdb was entered. | 
|  | * Returns: | 
|  | *	Zero for success, a kdb diagnostic if failure. | 
|  | * Remarks: | 
|  | *	Limited to 20 tokens. | 
|  | * | 
|  | *	Real rudimentary tokenization. Basically only whitespace | 
|  | *	is considered a token delimeter (but special consideration | 
|  | *	is taken of the '=' sign as used by the 'set' command). | 
|  | * | 
|  | *	The algorithm used to tokenize the input string relies on | 
|  | *	there being at least one whitespace (or otherwise useless) | 
|  | *	character between tokens as the character immediately following | 
|  | *	the token is altered in-place to a null-byte to terminate the | 
|  | *	token string. | 
|  | */ | 
|  |  | 
|  | #define MAXARGC	20 | 
|  |  | 
|  | int kdb_parse(const char *cmdstr) | 
|  | { | 
|  | static char *argv[MAXARGC]; | 
|  | static int argc; | 
|  | static char cbuf[CMD_BUFLEN+2]; | 
|  | char *cp; | 
|  | char *cpp, quoted; | 
|  | kdbtab_t *tp; | 
|  | int i, escaped, ignore_errors = 0, check_grep; | 
|  |  | 
|  | /* | 
|  | * First tokenize the command string. | 
|  | */ | 
|  | cp = (char *)cmdstr; | 
|  | kdb_grepping_flag = check_grep = 0; | 
|  |  | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) { | 
|  | /* Previous command was interrupted, newline must not | 
|  | * repeat the command */ | 
|  | KDB_FLAG_CLEAR(CMD_INTERRUPT); | 
|  | KDB_STATE_SET(PAGER); | 
|  | argc = 0;	/* no repeat */ | 
|  | } | 
|  |  | 
|  | if (*cp != '\n' && *cp != '\0') { | 
|  | argc = 0; | 
|  | cpp = cbuf; | 
|  | while (*cp) { | 
|  | /* skip whitespace */ | 
|  | while (isspace(*cp)) | 
|  | cp++; | 
|  | if ((*cp == '\0') || (*cp == '\n') || | 
|  | (*cp == '#' && !defcmd_in_progress)) | 
|  | break; | 
|  | /* special case: check for | grep pattern */ | 
|  | if (*cp == '|') { | 
|  | check_grep++; | 
|  | break; | 
|  | } | 
|  | if (cpp >= cbuf + CMD_BUFLEN) { | 
|  | kdb_printf("kdb_parse: command buffer " | 
|  | "overflow, command ignored\n%s\n", | 
|  | cmdstr); | 
|  | return KDB_NOTFOUND; | 
|  | } | 
|  | if (argc >= MAXARGC - 1) { | 
|  | kdb_printf("kdb_parse: too many arguments, " | 
|  | "command ignored\n%s\n", cmdstr); | 
|  | return KDB_NOTFOUND; | 
|  | } | 
|  | argv[argc++] = cpp; | 
|  | escaped = 0; | 
|  | quoted = '\0'; | 
|  | /* Copy to next unquoted and unescaped | 
|  | * whitespace or '=' */ | 
|  | while (*cp && *cp != '\n' && | 
|  | (escaped || quoted || !isspace(*cp))) { | 
|  | if (cpp >= cbuf + CMD_BUFLEN) | 
|  | break; | 
|  | if (escaped) { | 
|  | escaped = 0; | 
|  | *cpp++ = *cp++; | 
|  | continue; | 
|  | } | 
|  | if (*cp == '\\') { | 
|  | escaped = 1; | 
|  | ++cp; | 
|  | continue; | 
|  | } | 
|  | if (*cp == quoted) | 
|  | quoted = '\0'; | 
|  | else if (*cp == '\'' || *cp == '"') | 
|  | quoted = *cp; | 
|  | *cpp = *cp++; | 
|  | if (*cpp == '=' && !quoted) | 
|  | break; | 
|  | ++cpp; | 
|  | } | 
|  | *cpp++ = '\0';	/* Squash a ws or '=' character */ | 
|  | } | 
|  | } | 
|  | if (!argc) | 
|  | return 0; | 
|  | if (check_grep) | 
|  | parse_grep(cp); | 
|  | if (defcmd_in_progress) { | 
|  | int result = kdb_defcmd2(cmdstr, argv[0]); | 
|  | if (!defcmd_in_progress) { | 
|  | argc = 0;	/* avoid repeat on endefcmd */ | 
|  | *(argv[0]) = '\0'; | 
|  | } | 
|  | return result; | 
|  | } | 
|  | if (argv[0][0] == '-' && argv[0][1] && | 
|  | (argv[0][1] < '0' || argv[0][1] > '9')) { | 
|  | ignore_errors = 1; | 
|  | ++argv[0]; | 
|  | } | 
|  |  | 
|  | for_each_kdbcmd(tp, i) { | 
|  | if (tp->cmd_name) { | 
|  | /* | 
|  | * If this command is allowed to be abbreviated, | 
|  | * check to see if this is it. | 
|  | */ | 
|  |  | 
|  | if (tp->cmd_minlen | 
|  | && (strlen(argv[0]) <= tp->cmd_minlen)) { | 
|  | if (strncmp(argv[0], | 
|  | tp->cmd_name, | 
|  | tp->cmd_minlen) == 0) { | 
|  | break; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (strcmp(argv[0], tp->cmd_name) == 0) | 
|  | break; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* | 
|  | * If we don't find a command by this name, see if the first | 
|  | * few characters of this match any of the known commands. | 
|  | * e.g., md1c20 should match md. | 
|  | */ | 
|  | if (i == kdb_max_commands) { | 
|  | for_each_kdbcmd(tp, i) { | 
|  | if (tp->cmd_name) { | 
|  | if (strncmp(argv[0], | 
|  | tp->cmd_name, | 
|  | strlen(tp->cmd_name)) == 0) { | 
|  | break; | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | if (i < kdb_max_commands) { | 
|  | int result; | 
|  | KDB_STATE_SET(CMD); | 
|  | result = (*tp->cmd_func)(argc-1, (const char **)argv); | 
|  | if (result && ignore_errors && result > KDB_CMD_GO) | 
|  | result = 0; | 
|  | KDB_STATE_CLEAR(CMD); | 
|  | switch (tp->cmd_repeat) { | 
|  | case KDB_REPEAT_NONE: | 
|  | argc = 0; | 
|  | if (argv[0]) | 
|  | *(argv[0]) = '\0'; | 
|  | break; | 
|  | case KDB_REPEAT_NO_ARGS: | 
|  | argc = 1; | 
|  | if (argv[1]) | 
|  | *(argv[1]) = '\0'; | 
|  | break; | 
|  | case KDB_REPEAT_WITH_ARGS: | 
|  | break; | 
|  | } | 
|  | return result; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * If the input with which we were presented does not | 
|  | * map to an existing command, attempt to parse it as an | 
|  | * address argument and display the result.   Useful for | 
|  | * obtaining the address of a variable, or the nearest symbol | 
|  | * to an address contained in a register. | 
|  | */ | 
|  | { | 
|  | unsigned long value; | 
|  | char *name = NULL; | 
|  | long offset; | 
|  | int nextarg = 0; | 
|  |  | 
|  | if (kdbgetaddrarg(0, (const char **)argv, &nextarg, | 
|  | &value, &offset, &name)) { | 
|  | return KDB_NOTFOUND; | 
|  | } | 
|  |  | 
|  | kdb_printf("%s = ", argv[0]); | 
|  | kdb_symbol_print(value, NULL, KDB_SP_DEFAULT); | 
|  | kdb_printf("\n"); | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  |  | 
|  | static int handle_ctrl_cmd(char *cmd) | 
|  | { | 
|  | #define CTRL_P	16 | 
|  | #define CTRL_N	14 | 
|  |  | 
|  | /* initial situation */ | 
|  | if (cmd_head == cmd_tail) | 
|  | return 0; | 
|  | switch (*cmd) { | 
|  | case CTRL_P: | 
|  | if (cmdptr != cmd_tail) | 
|  | cmdptr = (cmdptr-1) % KDB_CMD_HISTORY_COUNT; | 
|  | strncpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN); | 
|  | return 1; | 
|  | case CTRL_N: | 
|  | if (cmdptr != cmd_head) | 
|  | cmdptr = (cmdptr+1) % KDB_CMD_HISTORY_COUNT; | 
|  | strncpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN); | 
|  | return 1; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_reboot - This function implements the 'reboot' command.  Reboot | 
|  | *	the system immediately, or loop for ever on failure. | 
|  | */ | 
|  | static int kdb_reboot(int argc, const char **argv) | 
|  | { | 
|  | emergency_restart(); | 
|  | kdb_printf("Hmm, kdb_reboot did not reboot, spinning here\n"); | 
|  | while (1) | 
|  | cpu_relax(); | 
|  | /* NOTREACHED */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void kdb_dumpregs(struct pt_regs *regs) | 
|  | { | 
|  | int old_lvl = console_loglevel; | 
|  | console_loglevel = 15; | 
|  | kdb_trap_printk++; | 
|  | show_regs(regs); | 
|  | kdb_trap_printk--; | 
|  | kdb_printf("\n"); | 
|  | console_loglevel = old_lvl; | 
|  | } | 
|  |  | 
|  | void kdb_set_current_task(struct task_struct *p) | 
|  | { | 
|  | kdb_current_task = p; | 
|  |  | 
|  | if (kdb_task_has_cpu(p)) { | 
|  | kdb_current_regs = KDB_TSKREGS(kdb_process_cpu(p)); | 
|  | return; | 
|  | } | 
|  | kdb_current_regs = NULL; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_local - The main code for kdb.  This routine is invoked on a | 
|  | *	specific processor, it is not global.  The main kdb() routine | 
|  | *	ensures that only one processor at a time is in this routine. | 
|  | *	This code is called with the real reason code on the first | 
|  | *	entry to a kdb session, thereafter it is called with reason | 
|  | *	SWITCH, even if the user goes back to the original cpu. | 
|  | * Inputs: | 
|  | *	reason		The reason KDB was invoked | 
|  | *	error		The hardware-defined error code | 
|  | *	regs		The exception frame at time of fault/breakpoint. | 
|  | *	db_result	Result code from the break or debug point. | 
|  | * Returns: | 
|  | *	0	KDB was invoked for an event which it wasn't responsible | 
|  | *	1	KDB handled the event for which it was invoked. | 
|  | *	KDB_CMD_GO	User typed 'go'. | 
|  | *	KDB_CMD_CPU	User switched to another cpu. | 
|  | *	KDB_CMD_SS	Single step. | 
|  | *	KDB_CMD_SSB	Single step until branch. | 
|  | */ | 
|  | static int kdb_local(kdb_reason_t reason, int error, struct pt_regs *regs, | 
|  | kdb_dbtrap_t db_result) | 
|  | { | 
|  | char *cmdbuf; | 
|  | int diag; | 
|  | struct task_struct *kdb_current = | 
|  | kdb_curr_task(raw_smp_processor_id()); | 
|  |  | 
|  | KDB_DEBUG_STATE("kdb_local 1", reason); | 
|  | kdb_go_count = 0; | 
|  | if (reason == KDB_REASON_DEBUG) { | 
|  | /* special case below */ | 
|  | } else { | 
|  | kdb_printf("\nEntering kdb (current=0x%p, pid %d) ", | 
|  | kdb_current, kdb_current ? kdb_current->pid : 0); | 
|  | #if defined(CONFIG_SMP) | 
|  | kdb_printf("on processor %d ", raw_smp_processor_id()); | 
|  | #endif | 
|  | } | 
|  |  | 
|  | switch (reason) { | 
|  | case KDB_REASON_DEBUG: | 
|  | { | 
|  | /* | 
|  | * If re-entering kdb after a single step | 
|  | * command, don't print the message. | 
|  | */ | 
|  | switch (db_result) { | 
|  | case KDB_DB_BPT: | 
|  | kdb_printf("\nEntering kdb (0x%p, pid %d) ", | 
|  | kdb_current, kdb_current->pid); | 
|  | #if defined(CONFIG_SMP) | 
|  | kdb_printf("on processor %d ", raw_smp_processor_id()); | 
|  | #endif | 
|  | kdb_printf("due to Debug @ " kdb_machreg_fmt "\n", | 
|  | instruction_pointer(regs)); | 
|  | break; | 
|  | case KDB_DB_SSB: | 
|  | /* | 
|  | * In the midst of ssb command. Just return. | 
|  | */ | 
|  | KDB_DEBUG_STATE("kdb_local 3", reason); | 
|  | return KDB_CMD_SSB;	/* Continue with SSB command */ | 
|  |  | 
|  | break; | 
|  | case KDB_DB_SS: | 
|  | break; | 
|  | case KDB_DB_SSBPT: | 
|  | KDB_DEBUG_STATE("kdb_local 4", reason); | 
|  | return 1;	/* kdba_db_trap did the work */ | 
|  | default: | 
|  | kdb_printf("kdb: Bad result from kdba_db_trap: %d\n", | 
|  | db_result); | 
|  | break; | 
|  | } | 
|  |  | 
|  | } | 
|  | break; | 
|  | case KDB_REASON_ENTER: | 
|  | if (KDB_STATE(KEYBOARD)) | 
|  | kdb_printf("due to Keyboard Entry\n"); | 
|  | else | 
|  | kdb_printf("due to KDB_ENTER()\n"); | 
|  | break; | 
|  | case KDB_REASON_KEYBOARD: | 
|  | KDB_STATE_SET(KEYBOARD); | 
|  | kdb_printf("due to Keyboard Entry\n"); | 
|  | break; | 
|  | case KDB_REASON_ENTER_SLAVE: | 
|  | /* drop through, slaves only get released via cpu switch */ | 
|  | case KDB_REASON_SWITCH: | 
|  | kdb_printf("due to cpu switch\n"); | 
|  | break; | 
|  | case KDB_REASON_OOPS: | 
|  | kdb_printf("Oops: %s\n", kdb_diemsg); | 
|  | kdb_printf("due to oops @ " kdb_machreg_fmt "\n", | 
|  | instruction_pointer(regs)); | 
|  | kdb_dumpregs(regs); | 
|  | break; | 
|  | case KDB_REASON_NMI: | 
|  | kdb_printf("due to NonMaskable Interrupt @ " | 
|  | kdb_machreg_fmt "\n", | 
|  | instruction_pointer(regs)); | 
|  | kdb_dumpregs(regs); | 
|  | break; | 
|  | case KDB_REASON_SSTEP: | 
|  | case KDB_REASON_BREAK: | 
|  | kdb_printf("due to %s @ " kdb_machreg_fmt "\n", | 
|  | reason == KDB_REASON_BREAK ? | 
|  | "Breakpoint" : "SS trap", instruction_pointer(regs)); | 
|  | /* | 
|  | * Determine if this breakpoint is one that we | 
|  | * are interested in. | 
|  | */ | 
|  | if (db_result != KDB_DB_BPT) { | 
|  | kdb_printf("kdb: error return from kdba_bp_trap: %d\n", | 
|  | db_result); | 
|  | KDB_DEBUG_STATE("kdb_local 6", reason); | 
|  | return 0;	/* Not for us, dismiss it */ | 
|  | } | 
|  | break; | 
|  | case KDB_REASON_RECURSE: | 
|  | kdb_printf("due to Recursion @ " kdb_machreg_fmt "\n", | 
|  | instruction_pointer(regs)); | 
|  | break; | 
|  | default: | 
|  | kdb_printf("kdb: unexpected reason code: %d\n", reason); | 
|  | KDB_DEBUG_STATE("kdb_local 8", reason); | 
|  | return 0;	/* Not for us, dismiss it */ | 
|  | } | 
|  |  | 
|  | while (1) { | 
|  | /* | 
|  | * Initialize pager context. | 
|  | */ | 
|  | kdb_nextline = 1; | 
|  | KDB_STATE_CLEAR(SUPPRESS); | 
|  |  | 
|  | cmdbuf = cmd_cur; | 
|  | *cmdbuf = '\0'; | 
|  | *(cmd_hist[cmd_head]) = '\0'; | 
|  |  | 
|  | if (KDB_FLAG(ONLY_DO_DUMP)) { | 
|  | /* kdb is off but a catastrophic error requires a dump. | 
|  | * Take the dump and reboot. | 
|  | * Turn on logging so the kdb output appears in the log | 
|  | * buffer in the dump. | 
|  | */ | 
|  | const char *setargs[] = { "set", "LOGGING", "1" }; | 
|  | kdb_set(2, setargs); | 
|  | kdb_reboot(0, NULL); | 
|  | /*NOTREACHED*/ | 
|  | } | 
|  |  | 
|  | do_full_getstr: | 
|  | #if defined(CONFIG_SMP) | 
|  | snprintf(kdb_prompt_str, CMD_BUFLEN, kdbgetenv("PROMPT"), | 
|  | raw_smp_processor_id()); | 
|  | #else | 
|  | snprintf(kdb_prompt_str, CMD_BUFLEN, kdbgetenv("PROMPT")); | 
|  | #endif | 
|  | if (defcmd_in_progress) | 
|  | strncat(kdb_prompt_str, "[defcmd]", CMD_BUFLEN); | 
|  |  | 
|  | /* | 
|  | * Fetch command from keyboard | 
|  | */ | 
|  | cmdbuf = kdb_getstr(cmdbuf, CMD_BUFLEN, kdb_prompt_str); | 
|  | if (*cmdbuf != '\n') { | 
|  | if (*cmdbuf < 32) { | 
|  | if (cmdptr == cmd_head) { | 
|  | strncpy(cmd_hist[cmd_head], cmd_cur, | 
|  | CMD_BUFLEN); | 
|  | *(cmd_hist[cmd_head] + | 
|  | strlen(cmd_hist[cmd_head])-1) = '\0'; | 
|  | } | 
|  | if (!handle_ctrl_cmd(cmdbuf)) | 
|  | *(cmd_cur+strlen(cmd_cur)-1) = '\0'; | 
|  | cmdbuf = cmd_cur; | 
|  | goto do_full_getstr; | 
|  | } else { | 
|  | strncpy(cmd_hist[cmd_head], cmd_cur, | 
|  | CMD_BUFLEN); | 
|  | } | 
|  |  | 
|  | cmd_head = (cmd_head+1) % KDB_CMD_HISTORY_COUNT; | 
|  | if (cmd_head == cmd_tail) | 
|  | cmd_tail = (cmd_tail+1) % KDB_CMD_HISTORY_COUNT; | 
|  | } | 
|  |  | 
|  | cmdptr = cmd_head; | 
|  | diag = kdb_parse(cmdbuf); | 
|  | if (diag == KDB_NOTFOUND) { | 
|  | kdb_printf("Unknown kdb command: '%s'\n", cmdbuf); | 
|  | diag = 0; | 
|  | } | 
|  | if (diag == KDB_CMD_GO | 
|  | || diag == KDB_CMD_CPU | 
|  | || diag == KDB_CMD_SS | 
|  | || diag == KDB_CMD_SSB | 
|  | || diag == KDB_CMD_KGDB) | 
|  | break; | 
|  |  | 
|  | if (diag) | 
|  | kdb_cmderror(diag); | 
|  | } | 
|  | KDB_DEBUG_STATE("kdb_local 9", diag); | 
|  | return diag; | 
|  | } | 
|  |  | 
|  |  | 
|  | /* | 
|  | * kdb_print_state - Print the state data for the current processor | 
|  | *	for debugging. | 
|  | * Inputs: | 
|  | *	text		Identifies the debug point | 
|  | *	value		Any integer value to be printed, e.g. reason code. | 
|  | */ | 
|  | void kdb_print_state(const char *text, int value) | 
|  | { | 
|  | kdb_printf("state: %s cpu %d value %d initial %d state %x\n", | 
|  | text, raw_smp_processor_id(), value, kdb_initial_cpu, | 
|  | kdb_state); | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_main_loop - After initial setup and assignment of the | 
|  | *	controlling cpu, all cpus are in this loop.  One cpu is in | 
|  | *	control and will issue the kdb prompt, the others will spin | 
|  | *	until 'go' or cpu switch. | 
|  | * | 
|  | *	To get a consistent view of the kernel stacks for all | 
|  | *	processes, this routine is invoked from the main kdb code via | 
|  | *	an architecture specific routine.  kdba_main_loop is | 
|  | *	responsible for making the kernel stacks consistent for all | 
|  | *	processes, there should be no difference between a blocked | 
|  | *	process and a running process as far as kdb is concerned. | 
|  | * Inputs: | 
|  | *	reason		The reason KDB was invoked | 
|  | *	error		The hardware-defined error code | 
|  | *	reason2		kdb's current reason code. | 
|  | *			Initially error but can change | 
|  | *			according to kdb state. | 
|  | *	db_result	Result code from break or debug point. | 
|  | *	regs		The exception frame at time of fault/breakpoint. | 
|  | *			should always be valid. | 
|  | * Returns: | 
|  | *	0	KDB was invoked for an event which it wasn't responsible | 
|  | *	1	KDB handled the event for which it was invoked. | 
|  | */ | 
|  | int kdb_main_loop(kdb_reason_t reason, kdb_reason_t reason2, int error, | 
|  | kdb_dbtrap_t db_result, struct pt_regs *regs) | 
|  | { | 
|  | int result = 1; | 
|  | /* Stay in kdb() until 'go', 'ss[b]' or an error */ | 
|  | while (1) { | 
|  | /* | 
|  | * All processors except the one that is in control | 
|  | * will spin here. | 
|  | */ | 
|  | KDB_DEBUG_STATE("kdb_main_loop 1", reason); | 
|  | while (KDB_STATE(HOLD_CPU)) { | 
|  | /* state KDB is turned off by kdb_cpu to see if the | 
|  | * other cpus are still live, each cpu in this loop | 
|  | * turns it back on. | 
|  | */ | 
|  | if (!KDB_STATE(KDB)) | 
|  | KDB_STATE_SET(KDB); | 
|  | } | 
|  |  | 
|  | KDB_STATE_CLEAR(SUPPRESS); | 
|  | KDB_DEBUG_STATE("kdb_main_loop 2", reason); | 
|  | if (KDB_STATE(LEAVING)) | 
|  | break;	/* Another cpu said 'go' */ | 
|  | /* Still using kdb, this processor is in control */ | 
|  | result = kdb_local(reason2, error, regs, db_result); | 
|  | KDB_DEBUG_STATE("kdb_main_loop 3", result); | 
|  |  | 
|  | if (result == KDB_CMD_CPU) | 
|  | break; | 
|  |  | 
|  | if (result == KDB_CMD_SS) { | 
|  | KDB_STATE_SET(DOING_SS); | 
|  | break; | 
|  | } | 
|  |  | 
|  | if (result == KDB_CMD_SSB) { | 
|  | KDB_STATE_SET(DOING_SS); | 
|  | KDB_STATE_SET(DOING_SSB); | 
|  | break; | 
|  | } | 
|  |  | 
|  | if (result == KDB_CMD_KGDB) { | 
|  | if (!(KDB_STATE(DOING_KGDB) || KDB_STATE(DOING_KGDB2))) | 
|  | kdb_printf("Entering please attach debugger " | 
|  | "or use $D#44+ or $3#33\n"); | 
|  | break; | 
|  | } | 
|  | if (result && result != 1 && result != KDB_CMD_GO) | 
|  | kdb_printf("\nUnexpected kdb_local return code %d\n", | 
|  | result); | 
|  | KDB_DEBUG_STATE("kdb_main_loop 4", reason); | 
|  | break; | 
|  | } | 
|  | if (KDB_STATE(DOING_SS)) | 
|  | KDB_STATE_CLEAR(SSBPT); | 
|  |  | 
|  | return result; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_mdr - This function implements the guts of the 'mdr', memory | 
|  | * read command. | 
|  | *	mdr  <addr arg>,<byte count> | 
|  | * Inputs: | 
|  | *	addr	Start address | 
|  | *	count	Number of bytes | 
|  | * Returns: | 
|  | *	Always 0.  Any errors are detected and printed by kdb_getarea. | 
|  | */ | 
|  | static int kdb_mdr(unsigned long addr, unsigned int count) | 
|  | { | 
|  | unsigned char c; | 
|  | while (count--) { | 
|  | if (kdb_getarea(c, addr)) | 
|  | return 0; | 
|  | kdb_printf("%02x", c); | 
|  | addr++; | 
|  | } | 
|  | kdb_printf("\n"); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_md - This function implements the 'md', 'md1', 'md2', 'md4', | 
|  | *	'md8' 'mdr' and 'mds' commands. | 
|  | * | 
|  | *	md|mds  [<addr arg> [<line count> [<radix>]]] | 
|  | *	mdWcN	[<addr arg> [<line count> [<radix>]]] | 
|  | *		where W = is the width (1, 2, 4 or 8) and N is the count. | 
|  | *		for eg., md1c20 reads 20 bytes, 1 at a time. | 
|  | *	mdr  <addr arg>,<byte count> | 
|  | */ | 
|  | static void kdb_md_line(const char *fmtstr, unsigned long addr, | 
|  | int symbolic, int nosect, int bytesperword, | 
|  | int num, int repeat, int phys) | 
|  | { | 
|  | /* print just one line of data */ | 
|  | kdb_symtab_t symtab; | 
|  | char cbuf[32]; | 
|  | char *c = cbuf; | 
|  | int i; | 
|  | unsigned long word; | 
|  |  | 
|  | memset(cbuf, '\0', sizeof(cbuf)); | 
|  | if (phys) | 
|  | kdb_printf("phys " kdb_machreg_fmt0 " ", addr); | 
|  | else | 
|  | kdb_printf(kdb_machreg_fmt0 " ", addr); | 
|  |  | 
|  | for (i = 0; i < num && repeat--; i++) { | 
|  | if (phys) { | 
|  | if (kdb_getphysword(&word, addr, bytesperword)) | 
|  | break; | 
|  | } else if (kdb_getword(&word, addr, bytesperword)) | 
|  | break; | 
|  | kdb_printf(fmtstr, word); | 
|  | if (symbolic) | 
|  | kdbnearsym(word, &symtab); | 
|  | else | 
|  | memset(&symtab, 0, sizeof(symtab)); | 
|  | if (symtab.sym_name) { | 
|  | kdb_symbol_print(word, &symtab, 0); | 
|  | if (!nosect) { | 
|  | kdb_printf("\n"); | 
|  | kdb_printf("                       %s %s " | 
|  | kdb_machreg_fmt " " | 
|  | kdb_machreg_fmt " " | 
|  | kdb_machreg_fmt, symtab.mod_name, | 
|  | symtab.sec_name, symtab.sec_start, | 
|  | symtab.sym_start, symtab.sym_end); | 
|  | } | 
|  | addr += bytesperword; | 
|  | } else { | 
|  | union { | 
|  | u64 word; | 
|  | unsigned char c[8]; | 
|  | } wc; | 
|  | unsigned char *cp; | 
|  | #ifdef	__BIG_ENDIAN | 
|  | cp = wc.c + 8 - bytesperword; | 
|  | #else | 
|  | cp = wc.c; | 
|  | #endif | 
|  | wc.word = word; | 
|  | #define printable_char(c) \ | 
|  | ({unsigned char __c = c; isascii(__c) && isprint(__c) ? __c : '.'; }) | 
|  | switch (bytesperword) { | 
|  | case 8: | 
|  | *c++ = printable_char(*cp++); | 
|  | *c++ = printable_char(*cp++); | 
|  | *c++ = printable_char(*cp++); | 
|  | *c++ = printable_char(*cp++); | 
|  | addr += 4; | 
|  | case 4: | 
|  | *c++ = printable_char(*cp++); | 
|  | *c++ = printable_char(*cp++); | 
|  | addr += 2; | 
|  | case 2: | 
|  | *c++ = printable_char(*cp++); | 
|  | addr++; | 
|  | case 1: | 
|  | *c++ = printable_char(*cp++); | 
|  | addr++; | 
|  | break; | 
|  | } | 
|  | #undef printable_char | 
|  | } | 
|  | } | 
|  | kdb_printf("%*s %s\n", (int)((num-i)*(2*bytesperword + 1)+1), | 
|  | " ", cbuf); | 
|  | } | 
|  |  | 
|  | static int kdb_md(int argc, const char **argv) | 
|  | { | 
|  | static unsigned long last_addr; | 
|  | static int last_radix, last_bytesperword, last_repeat; | 
|  | int radix = 16, mdcount = 8, bytesperword = KDB_WORD_SIZE, repeat; | 
|  | int nosect = 0; | 
|  | char fmtchar, fmtstr[64]; | 
|  | unsigned long addr; | 
|  | unsigned long word; | 
|  | long offset = 0; | 
|  | int symbolic = 0; | 
|  | int valid = 0; | 
|  | int phys = 0; | 
|  |  | 
|  | kdbgetintenv("MDCOUNT", &mdcount); | 
|  | kdbgetintenv("RADIX", &radix); | 
|  | kdbgetintenv("BYTESPERWORD", &bytesperword); | 
|  |  | 
|  | /* Assume 'md <addr>' and start with environment values */ | 
|  | repeat = mdcount * 16 / bytesperword; | 
|  |  | 
|  | if (strcmp(argv[0], "mdr") == 0) { | 
|  | if (argc != 2) | 
|  | return KDB_ARGCOUNT; | 
|  | valid = 1; | 
|  | } else if (isdigit(argv[0][2])) { | 
|  | bytesperword = (int)(argv[0][2] - '0'); | 
|  | if (bytesperword == 0) { | 
|  | bytesperword = last_bytesperword; | 
|  | if (bytesperword == 0) | 
|  | bytesperword = 4; | 
|  | } | 
|  | last_bytesperword = bytesperword; | 
|  | repeat = mdcount * 16 / bytesperword; | 
|  | if (!argv[0][3]) | 
|  | valid = 1; | 
|  | else if (argv[0][3] == 'c' && argv[0][4]) { | 
|  | char *p; | 
|  | repeat = simple_strtoul(argv[0] + 4, &p, 10); | 
|  | mdcount = ((repeat * bytesperword) + 15) / 16; | 
|  | valid = !*p; | 
|  | } | 
|  | last_repeat = repeat; | 
|  | } else if (strcmp(argv[0], "md") == 0) | 
|  | valid = 1; | 
|  | else if (strcmp(argv[0], "mds") == 0) | 
|  | valid = 1; | 
|  | else if (strcmp(argv[0], "mdp") == 0) { | 
|  | phys = valid = 1; | 
|  | } | 
|  | if (!valid) | 
|  | return KDB_NOTFOUND; | 
|  |  | 
|  | if (argc == 0) { | 
|  | if (last_addr == 0) | 
|  | return KDB_ARGCOUNT; | 
|  | addr = last_addr; | 
|  | radix = last_radix; | 
|  | bytesperword = last_bytesperword; | 
|  | repeat = last_repeat; | 
|  | mdcount = ((repeat * bytesperword) + 15) / 16; | 
|  | } | 
|  |  | 
|  | if (argc) { | 
|  | unsigned long val; | 
|  | int diag, nextarg = 1; | 
|  | diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, | 
|  | &offset, NULL); | 
|  | if (diag) | 
|  | return diag; | 
|  | if (argc > nextarg+2) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | if (argc >= nextarg) { | 
|  | diag = kdbgetularg(argv[nextarg], &val); | 
|  | if (!diag) { | 
|  | mdcount = (int) val; | 
|  | repeat = mdcount * 16 / bytesperword; | 
|  | } | 
|  | } | 
|  | if (argc >= nextarg+1) { | 
|  | diag = kdbgetularg(argv[nextarg+1], &val); | 
|  | if (!diag) | 
|  | radix = (int) val; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (strcmp(argv[0], "mdr") == 0) | 
|  | return kdb_mdr(addr, mdcount); | 
|  |  | 
|  | switch (radix) { | 
|  | case 10: | 
|  | fmtchar = 'd'; | 
|  | break; | 
|  | case 16: | 
|  | fmtchar = 'x'; | 
|  | break; | 
|  | case 8: | 
|  | fmtchar = 'o'; | 
|  | break; | 
|  | default: | 
|  | return KDB_BADRADIX; | 
|  | } | 
|  |  | 
|  | last_radix = radix; | 
|  |  | 
|  | if (bytesperword > KDB_WORD_SIZE) | 
|  | return KDB_BADWIDTH; | 
|  |  | 
|  | switch (bytesperword) { | 
|  | case 8: | 
|  | sprintf(fmtstr, "%%16.16l%c ", fmtchar); | 
|  | break; | 
|  | case 4: | 
|  | sprintf(fmtstr, "%%8.8l%c ", fmtchar); | 
|  | break; | 
|  | case 2: | 
|  | sprintf(fmtstr, "%%4.4l%c ", fmtchar); | 
|  | break; | 
|  | case 1: | 
|  | sprintf(fmtstr, "%%2.2l%c ", fmtchar); | 
|  | break; | 
|  | default: | 
|  | return KDB_BADWIDTH; | 
|  | } | 
|  |  | 
|  | last_repeat = repeat; | 
|  | last_bytesperword = bytesperword; | 
|  |  | 
|  | if (strcmp(argv[0], "mds") == 0) { | 
|  | symbolic = 1; | 
|  | /* Do not save these changes as last_*, they are temporary mds | 
|  | * overrides. | 
|  | */ | 
|  | bytesperword = KDB_WORD_SIZE; | 
|  | repeat = mdcount; | 
|  | kdbgetintenv("NOSECT", &nosect); | 
|  | } | 
|  |  | 
|  | /* Round address down modulo BYTESPERWORD */ | 
|  |  | 
|  | addr &= ~(bytesperword-1); | 
|  |  | 
|  | while (repeat > 0) { | 
|  | unsigned long a; | 
|  | int n, z, num = (symbolic ? 1 : (16 / bytesperword)); | 
|  |  | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) | 
|  | return 0; | 
|  | for (a = addr, z = 0; z < repeat; a += bytesperword, ++z) { | 
|  | if (phys) { | 
|  | if (kdb_getphysword(&word, a, bytesperword) | 
|  | || word) | 
|  | break; | 
|  | } else if (kdb_getword(&word, a, bytesperword) || word) | 
|  | break; | 
|  | } | 
|  | n = min(num, repeat); | 
|  | kdb_md_line(fmtstr, addr, symbolic, nosect, bytesperword, | 
|  | num, repeat, phys); | 
|  | addr += bytesperword * n; | 
|  | repeat -= n; | 
|  | z = (z + num - 1) / num; | 
|  | if (z > 2) { | 
|  | int s = num * (z-2); | 
|  | kdb_printf(kdb_machreg_fmt0 "-" kdb_machreg_fmt0 | 
|  | " zero suppressed\n", | 
|  | addr, addr + bytesperword * s - 1); | 
|  | addr += bytesperword * s; | 
|  | repeat -= s; | 
|  | } | 
|  | } | 
|  | last_addr = addr; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_mm - This function implements the 'mm' command. | 
|  | *	mm address-expression new-value | 
|  | * Remarks: | 
|  | *	mm works on machine words, mmW works on bytes. | 
|  | */ | 
|  | static int kdb_mm(int argc, const char **argv) | 
|  | { | 
|  | int diag; | 
|  | unsigned long addr; | 
|  | long offset = 0; | 
|  | unsigned long contents; | 
|  | int nextarg; | 
|  | int width; | 
|  |  | 
|  | if (argv[0][2] && !isdigit(argv[0][2])) | 
|  | return KDB_NOTFOUND; | 
|  |  | 
|  | if (argc < 2) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | nextarg = 1; | 
|  | diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | if (nextarg > argc) | 
|  | return KDB_ARGCOUNT; | 
|  | diag = kdbgetaddrarg(argc, argv, &nextarg, &contents, NULL, NULL); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | if (nextarg != argc + 1) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | width = argv[0][2] ? (argv[0][2] - '0') : (KDB_WORD_SIZE); | 
|  | diag = kdb_putword(addr, contents, width); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | kdb_printf(kdb_machreg_fmt " = " kdb_machreg_fmt "\n", addr, contents); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_go - This function implements the 'go' command. | 
|  | *	go [address-expression] | 
|  | */ | 
|  | static int kdb_go(int argc, const char **argv) | 
|  | { | 
|  | unsigned long addr; | 
|  | int diag; | 
|  | int nextarg; | 
|  | long offset; | 
|  |  | 
|  | if (raw_smp_processor_id() != kdb_initial_cpu) { | 
|  | kdb_printf("go must execute on the entry cpu, " | 
|  | "please use \"cpu %d\" and then execute go\n", | 
|  | kdb_initial_cpu); | 
|  | return KDB_BADCPUNUM; | 
|  | } | 
|  | if (argc == 1) { | 
|  | nextarg = 1; | 
|  | diag = kdbgetaddrarg(argc, argv, &nextarg, | 
|  | &addr, &offset, NULL); | 
|  | if (diag) | 
|  | return diag; | 
|  | } else if (argc) { | 
|  | return KDB_ARGCOUNT; | 
|  | } | 
|  |  | 
|  | diag = KDB_CMD_GO; | 
|  | if (KDB_FLAG(CATASTROPHIC)) { | 
|  | kdb_printf("Catastrophic error detected\n"); | 
|  | kdb_printf("kdb_continue_catastrophic=%d, ", | 
|  | kdb_continue_catastrophic); | 
|  | if (kdb_continue_catastrophic == 0 && kdb_go_count++ == 0) { | 
|  | kdb_printf("type go a second time if you really want " | 
|  | "to continue\n"); | 
|  | return 0; | 
|  | } | 
|  | if (kdb_continue_catastrophic == 2) { | 
|  | kdb_printf("forcing reboot\n"); | 
|  | kdb_reboot(0, NULL); | 
|  | } | 
|  | kdb_printf("attempting to continue\n"); | 
|  | } | 
|  | return diag; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_rd - This function implements the 'rd' command. | 
|  | */ | 
|  | static int kdb_rd(int argc, const char **argv) | 
|  | { | 
|  | int len = kdb_check_regs(); | 
|  | #if DBG_MAX_REG_NUM > 0 | 
|  | int i; | 
|  | char *rname; | 
|  | int rsize; | 
|  | u64 reg64; | 
|  | u32 reg32; | 
|  | u16 reg16; | 
|  | u8 reg8; | 
|  |  | 
|  | if (len) | 
|  | return len; | 
|  |  | 
|  | for (i = 0; i < DBG_MAX_REG_NUM; i++) { | 
|  | rsize = dbg_reg_def[i].size * 2; | 
|  | if (rsize > 16) | 
|  | rsize = 2; | 
|  | if (len + strlen(dbg_reg_def[i].name) + 4 + rsize > 80) { | 
|  | len = 0; | 
|  | kdb_printf("\n"); | 
|  | } | 
|  | if (len) | 
|  | len += kdb_printf("  "); | 
|  | switch(dbg_reg_def[i].size * 8) { | 
|  | case 8: | 
|  | rname = dbg_get_reg(i, ®8, kdb_current_regs); | 
|  | if (!rname) | 
|  | break; | 
|  | len += kdb_printf("%s: %02x", rname, reg8); | 
|  | break; | 
|  | case 16: | 
|  | rname = dbg_get_reg(i, ®16, kdb_current_regs); | 
|  | if (!rname) | 
|  | break; | 
|  | len += kdb_printf("%s: %04x", rname, reg16); | 
|  | break; | 
|  | case 32: | 
|  | rname = dbg_get_reg(i, ®32, kdb_current_regs); | 
|  | if (!rname) | 
|  | break; | 
|  | len += kdb_printf("%s: %08x", rname, reg32); | 
|  | break; | 
|  | case 64: | 
|  | rname = dbg_get_reg(i, ®64, kdb_current_regs); | 
|  | if (!rname) | 
|  | break; | 
|  | len += kdb_printf("%s: %016llx", rname, reg64); | 
|  | break; | 
|  | default: | 
|  | len += kdb_printf("%s: ??", dbg_reg_def[i].name); | 
|  | } | 
|  | } | 
|  | kdb_printf("\n"); | 
|  | #else | 
|  | if (len) | 
|  | return len; | 
|  |  | 
|  | kdb_dumpregs(kdb_current_regs); | 
|  | #endif | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_rm - This function implements the 'rm' (register modify)  command. | 
|  | *	rm register-name new-contents | 
|  | * Remarks: | 
|  | *	Allows register modification with the same restrictions as gdb | 
|  | */ | 
|  | static int kdb_rm(int argc, const char **argv) | 
|  | { | 
|  | #if DBG_MAX_REG_NUM > 0 | 
|  | int diag; | 
|  | const char *rname; | 
|  | int i; | 
|  | u64 reg64; | 
|  | u32 reg32; | 
|  | u16 reg16; | 
|  | u8 reg8; | 
|  |  | 
|  | if (argc != 2) | 
|  | return KDB_ARGCOUNT; | 
|  | /* | 
|  | * Allow presence or absence of leading '%' symbol. | 
|  | */ | 
|  | rname = argv[1]; | 
|  | if (*rname == '%') | 
|  | rname++; | 
|  |  | 
|  | diag = kdbgetu64arg(argv[2], ®64); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | diag = kdb_check_regs(); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | diag = KDB_BADREG; | 
|  | for (i = 0; i < DBG_MAX_REG_NUM; i++) { | 
|  | if (strcmp(rname, dbg_reg_def[i].name) == 0) { | 
|  | diag = 0; | 
|  | break; | 
|  | } | 
|  | } | 
|  | if (!diag) { | 
|  | switch(dbg_reg_def[i].size * 8) { | 
|  | case 8: | 
|  | reg8 = reg64; | 
|  | dbg_set_reg(i, ®8, kdb_current_regs); | 
|  | break; | 
|  | case 16: | 
|  | reg16 = reg64; | 
|  | dbg_set_reg(i, ®16, kdb_current_regs); | 
|  | break; | 
|  | case 32: | 
|  | reg32 = reg64; | 
|  | dbg_set_reg(i, ®32, kdb_current_regs); | 
|  | break; | 
|  | case 64: | 
|  | dbg_set_reg(i, ®64, kdb_current_regs); | 
|  | break; | 
|  | } | 
|  | } | 
|  | return diag; | 
|  | #else | 
|  | kdb_printf("ERROR: Register set currently not implemented\n"); | 
|  | return 0; | 
|  | #endif | 
|  | } | 
|  |  | 
|  | #if defined(CONFIG_MAGIC_SYSRQ) | 
|  | /* | 
|  | * kdb_sr - This function implements the 'sr' (SYSRQ key) command | 
|  | *	which interfaces to the soi-disant MAGIC SYSRQ functionality. | 
|  | *		sr <magic-sysrq-code> | 
|  | */ | 
|  | static int kdb_sr(int argc, const char **argv) | 
|  | { | 
|  | if (argc != 1) | 
|  | return KDB_ARGCOUNT; | 
|  | kdb_trap_printk++; | 
|  | __handle_sysrq(*argv[1], false); | 
|  | kdb_trap_printk--; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  | #endif	/* CONFIG_MAGIC_SYSRQ */ | 
|  |  | 
|  | /* | 
|  | * kdb_ef - This function implements the 'regs' (display exception | 
|  | *	frame) command.  This command takes an address and expects to | 
|  | *	find an exception frame at that address, formats and prints | 
|  | *	it. | 
|  | *		regs address-expression | 
|  | * Remarks: | 
|  | *	Not done yet. | 
|  | */ | 
|  | static int kdb_ef(int argc, const char **argv) | 
|  | { | 
|  | int diag; | 
|  | unsigned long addr; | 
|  | long offset; | 
|  | int nextarg; | 
|  |  | 
|  | if (argc != 1) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | nextarg = 1; | 
|  | diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL); | 
|  | if (diag) | 
|  | return diag; | 
|  | show_regs((struct pt_regs *)addr); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | #if defined(CONFIG_MODULES) | 
|  | /* | 
|  | * kdb_lsmod - This function implements the 'lsmod' command.  Lists | 
|  | *	currently loaded kernel modules. | 
|  | *	Mostly taken from userland lsmod. | 
|  | */ | 
|  | static int kdb_lsmod(int argc, const char **argv) | 
|  | { | 
|  | struct module *mod; | 
|  |  | 
|  | if (argc != 0) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | kdb_printf("Module                  Size  modstruct     Used by\n"); | 
|  | list_for_each_entry(mod, kdb_modules, list) { | 
|  |  | 
|  | kdb_printf("%-20s%8u  0x%p ", mod->name, | 
|  | mod->core_size, (void *)mod); | 
|  | #ifdef CONFIG_MODULE_UNLOAD | 
|  | kdb_printf("%4d ", module_refcount(mod)); | 
|  | #endif | 
|  | if (mod->state == MODULE_STATE_GOING) | 
|  | kdb_printf(" (Unloading)"); | 
|  | else if (mod->state == MODULE_STATE_COMING) | 
|  | kdb_printf(" (Loading)"); | 
|  | else | 
|  | kdb_printf(" (Live)"); | 
|  | kdb_printf(" 0x%p", mod->module_core); | 
|  |  | 
|  | #ifdef CONFIG_MODULE_UNLOAD | 
|  | { | 
|  | struct module_use *use; | 
|  | kdb_printf(" [ "); | 
|  | list_for_each_entry(use, &mod->source_list, | 
|  | source_list) | 
|  | kdb_printf("%s ", use->target->name); | 
|  | kdb_printf("]\n"); | 
|  | } | 
|  | #endif | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | #endif	/* CONFIG_MODULES */ | 
|  |  | 
|  | /* | 
|  | * kdb_env - This function implements the 'env' command.  Display the | 
|  | *	current environment variables. | 
|  | */ | 
|  |  | 
|  | static int kdb_env(int argc, const char **argv) | 
|  | { | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < __nenv; i++) { | 
|  | if (__env[i]) | 
|  | kdb_printf("%s\n", __env[i]); | 
|  | } | 
|  |  | 
|  | if (KDB_DEBUG(MASK)) | 
|  | kdb_printf("KDBFLAGS=0x%x\n", kdb_flags); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | #ifdef CONFIG_PRINTK | 
|  | /* | 
|  | * kdb_dmesg - This function implements the 'dmesg' command to display | 
|  | *	the contents of the syslog buffer. | 
|  | *		dmesg [lines] [adjust] | 
|  | */ | 
|  | static int kdb_dmesg(int argc, const char **argv) | 
|  | { | 
|  | char *syslog_data[4], *start, *end, c = '\0', *p; | 
|  | int diag, logging, logsize, lines = 0, adjust = 0, n; | 
|  |  | 
|  | if (argc > 2) | 
|  | return KDB_ARGCOUNT; | 
|  | if (argc) { | 
|  | char *cp; | 
|  | lines = simple_strtol(argv[1], &cp, 0); | 
|  | if (*cp) | 
|  | lines = 0; | 
|  | if (argc > 1) { | 
|  | adjust = simple_strtoul(argv[2], &cp, 0); | 
|  | if (*cp || adjust < 0) | 
|  | adjust = 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* disable LOGGING if set */ | 
|  | diag = kdbgetintenv("LOGGING", &logging); | 
|  | if (!diag && logging) { | 
|  | const char *setargs[] = { "set", "LOGGING", "0" }; | 
|  | kdb_set(2, setargs); | 
|  | } | 
|  |  | 
|  | /* syslog_data[0,1] physical start, end+1.  syslog_data[2,3] | 
|  | * logical start, end+1. */ | 
|  | kdb_syslog_data(syslog_data); | 
|  | if (syslog_data[2] == syslog_data[3]) | 
|  | return 0; | 
|  | logsize = syslog_data[1] - syslog_data[0]; | 
|  | start = syslog_data[2]; | 
|  | end = syslog_data[3]; | 
|  | #define KDB_WRAP(p) (((p - syslog_data[0]) % logsize) + syslog_data[0]) | 
|  | for (n = 0, p = start; p < end; ++p) { | 
|  | c = *KDB_WRAP(p); | 
|  | if (c == '\n') | 
|  | ++n; | 
|  | } | 
|  | if (c != '\n') | 
|  | ++n; | 
|  | if (lines < 0) { | 
|  | if (adjust >= n) | 
|  | kdb_printf("buffer only contains %d lines, nothing " | 
|  | "printed\n", n); | 
|  | else if (adjust - lines >= n) | 
|  | kdb_printf("buffer only contains %d lines, last %d " | 
|  | "lines printed\n", n, n - adjust); | 
|  | if (adjust) { | 
|  | for (; start < end && adjust; ++start) { | 
|  | if (*KDB_WRAP(start) == '\n') | 
|  | --adjust; | 
|  | } | 
|  | if (start < end) | 
|  | ++start; | 
|  | } | 
|  | for (p = start; p < end && lines; ++p) { | 
|  | if (*KDB_WRAP(p) == '\n') | 
|  | ++lines; | 
|  | } | 
|  | end = p; | 
|  | } else if (lines > 0) { | 
|  | int skip = n - (adjust + lines); | 
|  | if (adjust >= n) { | 
|  | kdb_printf("buffer only contains %d lines, " | 
|  | "nothing printed\n", n); | 
|  | skip = n; | 
|  | } else if (skip < 0) { | 
|  | lines += skip; | 
|  | skip = 0; | 
|  | kdb_printf("buffer only contains %d lines, first " | 
|  | "%d lines printed\n", n, lines); | 
|  | } | 
|  | for (; start < end && skip; ++start) { | 
|  | if (*KDB_WRAP(start) == '\n') | 
|  | --skip; | 
|  | } | 
|  | for (p = start; p < end && lines; ++p) { | 
|  | if (*KDB_WRAP(p) == '\n') | 
|  | --lines; | 
|  | } | 
|  | end = p; | 
|  | } | 
|  | /* Do a line at a time (max 200 chars) to reduce protocol overhead */ | 
|  | c = '\n'; | 
|  | while (start != end) { | 
|  | char buf[201]; | 
|  | p = buf; | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) | 
|  | return 0; | 
|  | while (start < end && (c = *KDB_WRAP(start)) && | 
|  | (p - buf) < sizeof(buf)-1) { | 
|  | ++start; | 
|  | *p++ = c; | 
|  | if (c == '\n') | 
|  | break; | 
|  | } | 
|  | *p = '\0'; | 
|  | kdb_printf("%s", buf); | 
|  | } | 
|  | if (c != '\n') | 
|  | kdb_printf("\n"); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  | #endif /* CONFIG_PRINTK */ | 
|  | /* | 
|  | * kdb_cpu - This function implements the 'cpu' command. | 
|  | *	cpu	[<cpunum>] | 
|  | * Returns: | 
|  | *	KDB_CMD_CPU for success, a kdb diagnostic if error | 
|  | */ | 
|  | static void kdb_cpu_status(void) | 
|  | { | 
|  | int i, start_cpu, first_print = 1; | 
|  | char state, prev_state = '?'; | 
|  |  | 
|  | kdb_printf("Currently on cpu %d\n", raw_smp_processor_id()); | 
|  | kdb_printf("Available cpus: "); | 
|  | for (start_cpu = -1, i = 0; i < NR_CPUS; i++) { | 
|  | if (!cpu_online(i)) { | 
|  | state = 'F';	/* cpu is offline */ | 
|  | } else { | 
|  | state = ' ';	/* cpu is responding to kdb */ | 
|  | if (kdb_task_state_char(KDB_TSK(i)) == 'I') | 
|  | state = 'I';	/* idle task */ | 
|  | } | 
|  | if (state != prev_state) { | 
|  | if (prev_state != '?') { | 
|  | if (!first_print) | 
|  | kdb_printf(", "); | 
|  | first_print = 0; | 
|  | kdb_printf("%d", start_cpu); | 
|  | if (start_cpu < i-1) | 
|  | kdb_printf("-%d", i-1); | 
|  | if (prev_state != ' ') | 
|  | kdb_printf("(%c)", prev_state); | 
|  | } | 
|  | prev_state = state; | 
|  | start_cpu = i; | 
|  | } | 
|  | } | 
|  | /* print the trailing cpus, ignoring them if they are all offline */ | 
|  | if (prev_state != 'F') { | 
|  | if (!first_print) | 
|  | kdb_printf(", "); | 
|  | kdb_printf("%d", start_cpu); | 
|  | if (start_cpu < i-1) | 
|  | kdb_printf("-%d", i-1); | 
|  | if (prev_state != ' ') | 
|  | kdb_printf("(%c)", prev_state); | 
|  | } | 
|  | kdb_printf("\n"); | 
|  | } | 
|  |  | 
|  | static int kdb_cpu(int argc, const char **argv) | 
|  | { | 
|  | unsigned long cpunum; | 
|  | int diag; | 
|  |  | 
|  | if (argc == 0) { | 
|  | kdb_cpu_status(); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | if (argc != 1) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | diag = kdbgetularg(argv[1], &cpunum); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | /* | 
|  | * Validate cpunum | 
|  | */ | 
|  | if ((cpunum > NR_CPUS) || !cpu_online(cpunum)) | 
|  | return KDB_BADCPUNUM; | 
|  |  | 
|  | dbg_switch_cpu = cpunum; | 
|  |  | 
|  | /* | 
|  | * Switch to other cpu | 
|  | */ | 
|  | return KDB_CMD_CPU; | 
|  | } | 
|  |  | 
|  | /* The user may not realize that ps/bta with no parameters does not print idle | 
|  | * or sleeping system daemon processes, so tell them how many were suppressed. | 
|  | */ | 
|  | void kdb_ps_suppressed(void) | 
|  | { | 
|  | int idle = 0, daemon = 0; | 
|  | unsigned long mask_I = kdb_task_state_string("I"), | 
|  | mask_M = kdb_task_state_string("M"); | 
|  | unsigned long cpu; | 
|  | const struct task_struct *p, *g; | 
|  | for_each_online_cpu(cpu) { | 
|  | p = kdb_curr_task(cpu); | 
|  | if (kdb_task_state(p, mask_I)) | 
|  | ++idle; | 
|  | } | 
|  | kdb_do_each_thread(g, p) { | 
|  | if (kdb_task_state(p, mask_M)) | 
|  | ++daemon; | 
|  | } kdb_while_each_thread(g, p); | 
|  | if (idle || daemon) { | 
|  | if (idle) | 
|  | kdb_printf("%d idle process%s (state I)%s\n", | 
|  | idle, idle == 1 ? "" : "es", | 
|  | daemon ? " and " : ""); | 
|  | if (daemon) | 
|  | kdb_printf("%d sleeping system daemon (state M) " | 
|  | "process%s", daemon, | 
|  | daemon == 1 ? "" : "es"); | 
|  | kdb_printf(" suppressed,\nuse 'ps A' to see all.\n"); | 
|  | } | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_ps - This function implements the 'ps' command which shows a | 
|  | *	list of the active processes. | 
|  | *		ps [DRSTCZEUIMA]   All processes, optionally filtered by state | 
|  | */ | 
|  | void kdb_ps1(const struct task_struct *p) | 
|  | { | 
|  | int cpu; | 
|  | unsigned long tmp; | 
|  |  | 
|  | if (!p || probe_kernel_read(&tmp, (char *)p, sizeof(unsigned long))) | 
|  | return; | 
|  |  | 
|  | cpu = kdb_process_cpu(p); | 
|  | kdb_printf("0x%p %8d %8d  %d %4d   %c  0x%p %c%s\n", | 
|  | (void *)p, p->pid, p->parent->pid, | 
|  | kdb_task_has_cpu(p), kdb_process_cpu(p), | 
|  | kdb_task_state_char(p), | 
|  | (void *)(&p->thread), | 
|  | p == kdb_curr_task(raw_smp_processor_id()) ? '*' : ' ', | 
|  | p->comm); | 
|  | if (kdb_task_has_cpu(p)) { | 
|  | if (!KDB_TSK(cpu)) { | 
|  | kdb_printf("  Error: no saved data for this cpu\n"); | 
|  | } else { | 
|  | if (KDB_TSK(cpu) != p) | 
|  | kdb_printf("  Error: does not match running " | 
|  | "process table (0x%p)\n", KDB_TSK(cpu)); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | static int kdb_ps(int argc, const char **argv) | 
|  | { | 
|  | struct task_struct *g, *p; | 
|  | unsigned long mask, cpu; | 
|  |  | 
|  | if (argc == 0) | 
|  | kdb_ps_suppressed(); | 
|  | kdb_printf("%-*s      Pid   Parent [*] cpu State %-*s Command\n", | 
|  | (int)(2*sizeof(void *))+2, "Task Addr", | 
|  | (int)(2*sizeof(void *))+2, "Thread"); | 
|  | mask = kdb_task_state_string(argc ? argv[1] : NULL); | 
|  | /* Run the active tasks first */ | 
|  | for_each_online_cpu(cpu) { | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) | 
|  | return 0; | 
|  | p = kdb_curr_task(cpu); | 
|  | if (kdb_task_state(p, mask)) | 
|  | kdb_ps1(p); | 
|  | } | 
|  | kdb_printf("\n"); | 
|  | /* Now the real tasks */ | 
|  | kdb_do_each_thread(g, p) { | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) | 
|  | return 0; | 
|  | if (kdb_task_state(p, mask)) | 
|  | kdb_ps1(p); | 
|  | } kdb_while_each_thread(g, p); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_pid - This function implements the 'pid' command which switches | 
|  | *	the currently active process. | 
|  | *		pid [<pid> | R] | 
|  | */ | 
|  | static int kdb_pid(int argc, const char **argv) | 
|  | { | 
|  | struct task_struct *p; | 
|  | unsigned long val; | 
|  | int diag; | 
|  |  | 
|  | if (argc > 1) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | if (argc) { | 
|  | if (strcmp(argv[1], "R") == 0) { | 
|  | p = KDB_TSK(kdb_initial_cpu); | 
|  | } else { | 
|  | diag = kdbgetularg(argv[1], &val); | 
|  | if (diag) | 
|  | return KDB_BADINT; | 
|  |  | 
|  | p = find_task_by_pid_ns((pid_t)val,	&init_pid_ns); | 
|  | if (!p) { | 
|  | kdb_printf("No task with pid=%d\n", (pid_t)val); | 
|  | return 0; | 
|  | } | 
|  | } | 
|  | kdb_set_current_task(p); | 
|  | } | 
|  | kdb_printf("KDB current process is %s(pid=%d)\n", | 
|  | kdb_current_task->comm, | 
|  | kdb_current_task->pid); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_ll - This function implements the 'll' command which follows a | 
|  | *	linked list and executes an arbitrary command for each | 
|  | *	element. | 
|  | */ | 
|  | static int kdb_ll(int argc, const char **argv) | 
|  | { | 
|  | int diag = 0; | 
|  | unsigned long addr; | 
|  | long offset = 0; | 
|  | unsigned long va; | 
|  | unsigned long linkoffset; | 
|  | int nextarg; | 
|  | const char *command; | 
|  |  | 
|  | if (argc != 3) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | nextarg = 1; | 
|  | diag = kdbgetaddrarg(argc, argv, &nextarg, &addr, &offset, NULL); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | diag = kdbgetularg(argv[2], &linkoffset); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | /* | 
|  | * Using the starting address as | 
|  | * the first element in the list, and assuming that | 
|  | * the list ends with a null pointer. | 
|  | */ | 
|  |  | 
|  | va = addr; | 
|  | command = kdb_strdup(argv[3], GFP_KDB); | 
|  | if (!command) { | 
|  | kdb_printf("%s: cannot duplicate command\n", __func__); | 
|  | return 0; | 
|  | } | 
|  | /* Recursive use of kdb_parse, do not use argv after this point */ | 
|  | argv = NULL; | 
|  |  | 
|  | while (va) { | 
|  | char buf[80]; | 
|  |  | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) | 
|  | goto out; | 
|  |  | 
|  | sprintf(buf, "%s " kdb_machreg_fmt "\n", command, va); | 
|  | diag = kdb_parse(buf); | 
|  | if (diag) | 
|  | goto out; | 
|  |  | 
|  | addr = va + linkoffset; | 
|  | if (kdb_getword(&va, addr, sizeof(va))) | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | out: | 
|  | kfree(command); | 
|  | return diag; | 
|  | } | 
|  |  | 
|  | static int kdb_kgdb(int argc, const char **argv) | 
|  | { | 
|  | return KDB_CMD_KGDB; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_help - This function implements the 'help' and '?' commands. | 
|  | */ | 
|  | static int kdb_help(int argc, const char **argv) | 
|  | { | 
|  | kdbtab_t *kt; | 
|  | int i; | 
|  |  | 
|  | kdb_printf("%-15.15s %-20.20s %s\n", "Command", "Usage", "Description"); | 
|  | kdb_printf("-----------------------------" | 
|  | "-----------------------------\n"); | 
|  | for_each_kdbcmd(kt, i) { | 
|  | if (kt->cmd_name) | 
|  | kdb_printf("%-15.15s %-20.20s %s\n", kt->cmd_name, | 
|  | kt->cmd_usage, kt->cmd_help); | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) | 
|  | return 0; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_kill - This function implements the 'kill' commands. | 
|  | */ | 
|  | static int kdb_kill(int argc, const char **argv) | 
|  | { | 
|  | long sig, pid; | 
|  | char *endp; | 
|  | struct task_struct *p; | 
|  | struct siginfo info; | 
|  |  | 
|  | if (argc != 2) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | sig = simple_strtol(argv[1], &endp, 0); | 
|  | if (*endp) | 
|  | return KDB_BADINT; | 
|  | if (sig >= 0) { | 
|  | kdb_printf("Invalid signal parameter.<-signal>\n"); | 
|  | return 0; | 
|  | } | 
|  | sig = -sig; | 
|  |  | 
|  | pid = simple_strtol(argv[2], &endp, 0); | 
|  | if (*endp) | 
|  | return KDB_BADINT; | 
|  | if (pid <= 0) { | 
|  | kdb_printf("Process ID must be large than 0.\n"); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* Find the process. */ | 
|  | p = find_task_by_pid_ns(pid, &init_pid_ns); | 
|  | if (!p) { | 
|  | kdb_printf("The specified process isn't found.\n"); | 
|  | return 0; | 
|  | } | 
|  | p = p->group_leader; | 
|  | info.si_signo = sig; | 
|  | info.si_errno = 0; | 
|  | info.si_code = SI_USER; | 
|  | info.si_pid = pid;  /* same capabilities as process being signalled */ | 
|  | info.si_uid = 0;    /* kdb has root authority */ | 
|  | kdb_send_sig_info(p, &info); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | struct kdb_tm { | 
|  | int tm_sec;	/* seconds */ | 
|  | int tm_min;	/* minutes */ | 
|  | int tm_hour;	/* hours */ | 
|  | int tm_mday;	/* day of the month */ | 
|  | int tm_mon;	/* month */ | 
|  | int tm_year;	/* year */ | 
|  | }; | 
|  |  | 
|  | static void kdb_gmtime(struct timespec *tv, struct kdb_tm *tm) | 
|  | { | 
|  | /* This will work from 1970-2099, 2100 is not a leap year */ | 
|  | static int mon_day[] = { 31, 29, 31, 30, 31, 30, 31, | 
|  | 31, 30, 31, 30, 31 }; | 
|  | memset(tm, 0, sizeof(*tm)); | 
|  | tm->tm_sec  = tv->tv_sec % (24 * 60 * 60); | 
|  | tm->tm_mday = tv->tv_sec / (24 * 60 * 60) + | 
|  | (2 * 365 + 1); /* shift base from 1970 to 1968 */ | 
|  | tm->tm_min =  tm->tm_sec / 60 % 60; | 
|  | tm->tm_hour = tm->tm_sec / 60 / 60; | 
|  | tm->tm_sec =  tm->tm_sec % 60; | 
|  | tm->tm_year = 68 + 4*(tm->tm_mday / (4*365+1)); | 
|  | tm->tm_mday %= (4*365+1); | 
|  | mon_day[1] = 29; | 
|  | while (tm->tm_mday >= mon_day[tm->tm_mon]) { | 
|  | tm->tm_mday -= mon_day[tm->tm_mon]; | 
|  | if (++tm->tm_mon == 12) { | 
|  | tm->tm_mon = 0; | 
|  | ++tm->tm_year; | 
|  | mon_day[1] = 28; | 
|  | } | 
|  | } | 
|  | ++tm->tm_mday; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * Most of this code has been lifted from kernel/timer.c::sys_sysinfo(). | 
|  | * I cannot call that code directly from kdb, it has an unconditional | 
|  | * cli()/sti() and calls routines that take locks which can stop the debugger. | 
|  | */ | 
|  | static void kdb_sysinfo(struct sysinfo *val) | 
|  | { | 
|  | struct timespec uptime; | 
|  | do_posix_clock_monotonic_gettime(&uptime); | 
|  | memset(val, 0, sizeof(*val)); | 
|  | val->uptime = uptime.tv_sec; | 
|  | val->loads[0] = avenrun[0]; | 
|  | val->loads[1] = avenrun[1]; | 
|  | val->loads[2] = avenrun[2]; | 
|  | val->procs = nr_threads-1; | 
|  | si_meminfo(val); | 
|  |  | 
|  | return; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_summary - This function implements the 'summary' command. | 
|  | */ | 
|  | static int kdb_summary(int argc, const char **argv) | 
|  | { | 
|  | struct timespec now; | 
|  | struct kdb_tm tm; | 
|  | struct sysinfo val; | 
|  |  | 
|  | if (argc) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | kdb_printf("sysname    %s\n", init_uts_ns.name.sysname); | 
|  | kdb_printf("release    %s\n", init_uts_ns.name.release); | 
|  | kdb_printf("version    %s\n", init_uts_ns.name.version); | 
|  | kdb_printf("machine    %s\n", init_uts_ns.name.machine); | 
|  | kdb_printf("nodename   %s\n", init_uts_ns.name.nodename); | 
|  | kdb_printf("domainname %s\n", init_uts_ns.name.domainname); | 
|  | kdb_printf("ccversion  %s\n", __stringify(CCVERSION)); | 
|  |  | 
|  | now = __current_kernel_time(); | 
|  | kdb_gmtime(&now, &tm); | 
|  | kdb_printf("date       %04d-%02d-%02d %02d:%02d:%02d " | 
|  | "tz_minuteswest %d\n", | 
|  | 1900+tm.tm_year, tm.tm_mon+1, tm.tm_mday, | 
|  | tm.tm_hour, tm.tm_min, tm.tm_sec, | 
|  | sys_tz.tz_minuteswest); | 
|  |  | 
|  | kdb_sysinfo(&val); | 
|  | kdb_printf("uptime     "); | 
|  | if (val.uptime > (24*60*60)) { | 
|  | int days = val.uptime / (24*60*60); | 
|  | val.uptime %= (24*60*60); | 
|  | kdb_printf("%d day%s ", days, days == 1 ? "" : "s"); | 
|  | } | 
|  | kdb_printf("%02ld:%02ld\n", val.uptime/(60*60), (val.uptime/60)%60); | 
|  |  | 
|  | /* lifted from fs/proc/proc_misc.c::loadavg_read_proc() */ | 
|  |  | 
|  | #define LOAD_INT(x) ((x) >> FSHIFT) | 
|  | #define LOAD_FRAC(x) LOAD_INT(((x) & (FIXED_1-1)) * 100) | 
|  | kdb_printf("load avg   %ld.%02ld %ld.%02ld %ld.%02ld\n", | 
|  | LOAD_INT(val.loads[0]), LOAD_FRAC(val.loads[0]), | 
|  | LOAD_INT(val.loads[1]), LOAD_FRAC(val.loads[1]), | 
|  | LOAD_INT(val.loads[2]), LOAD_FRAC(val.loads[2])); | 
|  | #undef LOAD_INT | 
|  | #undef LOAD_FRAC | 
|  | /* Display in kilobytes */ | 
|  | #define K(x) ((x) << (PAGE_SHIFT - 10)) | 
|  | kdb_printf("\nMemTotal:       %8lu kB\nMemFree:        %8lu kB\n" | 
|  | "Buffers:        %8lu kB\n", | 
|  | val.totalram, val.freeram, val.bufferram); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_per_cpu - This function implements the 'per_cpu' command. | 
|  | */ | 
|  | static int kdb_per_cpu(int argc, const char **argv) | 
|  | { | 
|  | char fmtstr[64]; | 
|  | int cpu, diag, nextarg = 1; | 
|  | unsigned long addr, symaddr, val, bytesperword = 0, whichcpu = ~0UL; | 
|  |  | 
|  | if (argc < 1 || argc > 3) | 
|  | return KDB_ARGCOUNT; | 
|  |  | 
|  | diag = kdbgetaddrarg(argc, argv, &nextarg, &symaddr, NULL, NULL); | 
|  | if (diag) | 
|  | return diag; | 
|  |  | 
|  | if (argc >= 2) { | 
|  | diag = kdbgetularg(argv[2], &bytesperword); | 
|  | if (diag) | 
|  | return diag; | 
|  | } | 
|  | if (!bytesperword) | 
|  | bytesperword = KDB_WORD_SIZE; | 
|  | else if (bytesperword > KDB_WORD_SIZE) | 
|  | return KDB_BADWIDTH; | 
|  | sprintf(fmtstr, "%%0%dlx ", (int)(2*bytesperword)); | 
|  | if (argc >= 3) { | 
|  | diag = kdbgetularg(argv[3], &whichcpu); | 
|  | if (diag) | 
|  | return diag; | 
|  | if (!cpu_online(whichcpu)) { | 
|  | kdb_printf("cpu %ld is not online\n", whichcpu); | 
|  | return KDB_BADCPUNUM; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Most architectures use __per_cpu_offset[cpu], some use | 
|  | * __per_cpu_offset(cpu), smp has no __per_cpu_offset. | 
|  | */ | 
|  | #ifdef	__per_cpu_offset | 
|  | #define KDB_PCU(cpu) __per_cpu_offset(cpu) | 
|  | #else | 
|  | #ifdef	CONFIG_SMP | 
|  | #define KDB_PCU(cpu) __per_cpu_offset[cpu] | 
|  | #else | 
|  | #define KDB_PCU(cpu) 0 | 
|  | #endif | 
|  | #endif | 
|  | for_each_online_cpu(cpu) { | 
|  | if (KDB_FLAG(CMD_INTERRUPT)) | 
|  | return 0; | 
|  |  | 
|  | if (whichcpu != ~0UL && whichcpu != cpu) | 
|  | continue; | 
|  | addr = symaddr + KDB_PCU(cpu); | 
|  | diag = kdb_getword(&val, addr, bytesperword); | 
|  | if (diag) { | 
|  | kdb_printf("%5d " kdb_bfd_vma_fmt0 " - unable to " | 
|  | "read, diag=%d\n", cpu, addr, diag); | 
|  | continue; | 
|  | } | 
|  | kdb_printf("%5d ", cpu); | 
|  | kdb_md_line(fmtstr, addr, | 
|  | bytesperword == KDB_WORD_SIZE, | 
|  | 1, bytesperword, 1, 1, 0); | 
|  | } | 
|  | #undef KDB_PCU | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * display help for the use of cmd | grep pattern | 
|  | */ | 
|  | static int kdb_grep_help(int argc, const char **argv) | 
|  | { | 
|  | kdb_printf("Usage of  cmd args | grep pattern:\n"); | 
|  | kdb_printf("  Any command's output may be filtered through an "); | 
|  | kdb_printf("emulated 'pipe'.\n"); | 
|  | kdb_printf("  'grep' is just a key word.\n"); | 
|  | kdb_printf("  The pattern may include a very limited set of " | 
|  | "metacharacters:\n"); | 
|  | kdb_printf("   pattern or ^pattern or pattern$ or ^pattern$\n"); | 
|  | kdb_printf("  And if there are spaces in the pattern, you may " | 
|  | "quote it:\n"); | 
|  | kdb_printf("   \"pat tern\" or \"^pat tern\" or \"pat tern$\"" | 
|  | " or \"^pat tern$\"\n"); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * kdb_register_repeat - This function is used to register a kernel | 
|  | * 	debugger command. | 
|  | * Inputs: | 
|  | *	cmd	Command name | 
|  | *	func	Function to execute the command | 
|  | *	usage	A simple usage string showing arguments | 
|  | *	help	A simple help string describing command | 
|  | *	repeat	Does the command auto repeat on enter? | 
|  | * Returns: | 
|  | *	zero for success, one if a duplicate command. | 
|  | */ | 
|  | #define kdb_command_extend 50	/* arbitrary */ | 
|  | int kdb_register_repeat(char *cmd, | 
|  | kdb_func_t func, | 
|  | char *usage, | 
|  | char *help, | 
|  | short minlen, | 
|  | kdb_repeat_t repeat) | 
|  | { | 
|  | int i; | 
|  | kdbtab_t *kp; | 
|  |  | 
|  | /* | 
|  | *  Brute force method to determine duplicates | 
|  | */ | 
|  | for_each_kdbcmd(kp, i) { | 
|  | if (kp->cmd_name && (strcmp(kp->cmd_name, cmd) == 0)) { | 
|  | kdb_printf("Duplicate kdb command registered: " | 
|  | "%s, func %p help %s\n", cmd, func, help); | 
|  | return 1; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* | 
|  | * Insert command into first available location in table | 
|  | */ | 
|  | for_each_kdbcmd(kp, i) { | 
|  | if (kp->cmd_name == NULL) | 
|  | break; | 
|  | } | 
|  |  | 
|  | if (i >= kdb_max_commands) { | 
|  | kdbtab_t *new = kmalloc((kdb_max_commands - KDB_BASE_CMD_MAX + | 
|  | kdb_command_extend) * sizeof(*new), GFP_KDB); | 
|  | if (!new) { | 
|  | kdb_printf("Could not allocate new kdb_command " | 
|  | "table\n"); | 
|  | return 1; | 
|  | } | 
|  | if (kdb_commands) { | 
|  | memcpy(new, kdb_commands, | 
|  | (kdb_max_commands - KDB_BASE_CMD_MAX) * sizeof(*new)); | 
|  | kfree(kdb_commands); | 
|  | } | 
|  | memset(new + kdb_max_commands, 0, | 
|  | kdb_command_extend * sizeof(*new)); | 
|  | kdb_commands = new; | 
|  | kp = kdb_commands + kdb_max_commands - KDB_BASE_CMD_MAX; | 
|  | kdb_max_commands += kdb_command_extend; | 
|  | } | 
|  |  | 
|  | kp->cmd_name   = cmd; | 
|  | kp->cmd_func   = func; | 
|  | kp->cmd_usage  = usage; | 
|  | kp->cmd_help   = help; | 
|  | kp->cmd_flags  = 0; | 
|  | kp->cmd_minlen = minlen; | 
|  | kp->cmd_repeat = repeat; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(kdb_register_repeat); | 
|  |  | 
|  |  | 
|  | /* | 
|  | * kdb_register - Compatibility register function for commands that do | 
|  | *	not need to specify a repeat state.  Equivalent to | 
|  | *	kdb_register_repeat with KDB_REPEAT_NONE. | 
|  | * Inputs: | 
|  | *	cmd	Command name | 
|  | *	func	Function to execute the command | 
|  | *	usage	A simple usage string showing arguments | 
|  | *	help	A simple help string describing command | 
|  | * Returns: | 
|  | *	zero for success, one if a duplicate command. | 
|  | */ | 
|  | int kdb_register(char *cmd, | 
|  | kdb_func_t func, | 
|  | char *usage, | 
|  | char *help, | 
|  | short minlen) | 
|  | { | 
|  | return kdb_register_repeat(cmd, func, usage, help, minlen, | 
|  | KDB_REPEAT_NONE); | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(kdb_register); | 
|  |  | 
|  | /* | 
|  | * kdb_unregister - This function is used to unregister a kernel | 
|  | *	debugger command.  It is generally called when a module which | 
|  | *	implements kdb commands is unloaded. | 
|  | * Inputs: | 
|  | *	cmd	Command name | 
|  | * Returns: | 
|  | *	zero for success, one command not registered. | 
|  | */ | 
|  | int kdb_unregister(char *cmd) | 
|  | { | 
|  | int i; | 
|  | kdbtab_t *kp; | 
|  |  | 
|  | /* | 
|  | *  find the command. | 
|  | */ | 
|  | for_each_kdbcmd(kp, i) { | 
|  | if (kp->cmd_name && (strcmp(kp->cmd_name, cmd) == 0)) { | 
|  | kp->cmd_name = NULL; | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Couldn't find it.  */ | 
|  | return 1; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(kdb_unregister); | 
|  |  | 
|  | /* Initialize the kdb command table. */ | 
|  | static void __init kdb_inittab(void) | 
|  | { | 
|  | int i; | 
|  | kdbtab_t *kp; | 
|  |  | 
|  | for_each_kdbcmd(kp, i) | 
|  | kp->cmd_name = NULL; | 
|  |  | 
|  | kdb_register_repeat("md", kdb_md, "<vaddr>", | 
|  | "Display Memory Contents, also mdWcN, e.g. md8c1", 1, | 
|  | KDB_REPEAT_NO_ARGS); | 
|  | kdb_register_repeat("mdr", kdb_md, "<vaddr> <bytes>", | 
|  | "Display Raw Memory", 0, KDB_REPEAT_NO_ARGS); | 
|  | kdb_register_repeat("mdp", kdb_md, "<paddr> <bytes>", | 
|  | "Display Physical Memory", 0, KDB_REPEAT_NO_ARGS); | 
|  | kdb_register_repeat("mds", kdb_md, "<vaddr>", | 
|  | "Display Memory Symbolically", 0, KDB_REPEAT_NO_ARGS); | 
|  | kdb_register_repeat("mm", kdb_mm, "<vaddr> <contents>", | 
|  | "Modify Memory Contents", 0, KDB_REPEAT_NO_ARGS); | 
|  | kdb_register_repeat("go", kdb_go, "[<vaddr>]", | 
|  | "Continue Execution", 1, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("rd", kdb_rd, "", | 
|  | "Display Registers", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("rm", kdb_rm, "<reg> <contents>", | 
|  | "Modify Registers", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("ef", kdb_ef, "<vaddr>", | 
|  | "Display exception frame", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("bt", kdb_bt, "[<vaddr>]", | 
|  | "Stack traceback", 1, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("btp", kdb_bt, "<pid>", | 
|  | "Display stack for process <pid>", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("bta", kdb_bt, "[DRSTCZEUIMA]", | 
|  | "Display stack all processes", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("btc", kdb_bt, "", | 
|  | "Backtrace current process on each cpu", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("btt", kdb_bt, "<vaddr>", | 
|  | "Backtrace process given its struct task address", 0, | 
|  | KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("ll", kdb_ll, "<first-element> <linkoffset> <cmd>", | 
|  | "Execute cmd for each element in linked list", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("env", kdb_env, "", | 
|  | "Show environment variables", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("set", kdb_set, "", | 
|  | "Set environment variables", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("help", kdb_help, "", | 
|  | "Display Help Message", 1, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("?", kdb_help, "", | 
|  | "Display Help Message", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("cpu", kdb_cpu, "<cpunum>", | 
|  | "Switch to new cpu", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("kgdb", kdb_kgdb, "", | 
|  | "Enter kgdb mode", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("ps", kdb_ps, "[<flags>|A]", | 
|  | "Display active task list", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("pid", kdb_pid, "<pidnum>", | 
|  | "Switch to another task", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("reboot", kdb_reboot, "", | 
|  | "Reboot the machine immediately", 0, KDB_REPEAT_NONE); | 
|  | #if defined(CONFIG_MODULES) | 
|  | kdb_register_repeat("lsmod", kdb_lsmod, "", | 
|  | "List loaded kernel modules", 0, KDB_REPEAT_NONE); | 
|  | #endif | 
|  | #if defined(CONFIG_MAGIC_SYSRQ) | 
|  | kdb_register_repeat("sr", kdb_sr, "<key>", | 
|  | "Magic SysRq key", 0, KDB_REPEAT_NONE); | 
|  | #endif | 
|  | #if defined(CONFIG_PRINTK) | 
|  | kdb_register_repeat("dmesg", kdb_dmesg, "[lines]", | 
|  | "Display syslog buffer", 0, KDB_REPEAT_NONE); | 
|  | #endif | 
|  | kdb_register_repeat("defcmd", kdb_defcmd, "name \"usage\" \"help\"", | 
|  | "Define a set of commands, down to endefcmd", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("kill", kdb_kill, "<-signal> <pid>", | 
|  | "Send a signal to a process", 0, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("summary", kdb_summary, "", | 
|  | "Summarize the system", 4, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("per_cpu", kdb_per_cpu, "<sym> [<bytes>] [<cpu>]", | 
|  | "Display per_cpu variables", 3, KDB_REPEAT_NONE); | 
|  | kdb_register_repeat("grephelp", kdb_grep_help, "", | 
|  | "Display help on | grep", 0, KDB_REPEAT_NONE); | 
|  | } | 
|  |  | 
|  | /* Execute any commands defined in kdb_cmds.  */ | 
|  | static void __init kdb_cmd_init(void) | 
|  | { | 
|  | int i, diag; | 
|  | for (i = 0; kdb_cmds[i]; ++i) { | 
|  | diag = kdb_parse(kdb_cmds[i]); | 
|  | if (diag) | 
|  | kdb_printf("kdb command %s failed, kdb diag %d\n", | 
|  | kdb_cmds[i], diag); | 
|  | } | 
|  | if (defcmd_in_progress) { | 
|  | kdb_printf("Incomplete 'defcmd' set, forcing endefcmd\n"); | 
|  | kdb_parse("endefcmd"); | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Initialize kdb_printf, breakpoint tables and kdb state */ | 
|  | void __init kdb_init(int lvl) | 
|  | { | 
|  | static int kdb_init_lvl = KDB_NOT_INITIALIZED; | 
|  | int i; | 
|  |  | 
|  | if (kdb_init_lvl == KDB_INIT_FULL || lvl <= kdb_init_lvl) | 
|  | return; | 
|  | for (i = kdb_init_lvl; i < lvl; i++) { | 
|  | switch (i) { | 
|  | case KDB_NOT_INITIALIZED: | 
|  | kdb_inittab();		/* Initialize Command Table */ | 
|  | kdb_initbptab();	/* Initialize Breakpoints */ | 
|  | break; | 
|  | case KDB_INIT_EARLY: | 
|  | kdb_cmd_init();		/* Build kdb_cmds tables */ | 
|  | break; | 
|  | } | 
|  | } | 
|  | kdb_init_lvl = lvl; | 
|  | } |