mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-11-01 17:08:10 +00:00
34aaff40b4
kdb_trap_printk allows to pass normal printk() messages to kdb via vkdb_printk(). For example, it is used to get backtrace using the classic show_stack(), see kdb_show_stack(). vkdb_printf() tries to avoid a potential infinite loop by disabling the trap. But this approach is racy, for example: CPU1 CPU2 vkdb_printf() // assume that kdb_trap_printk == 0 saved_trap_printk = kdb_trap_printk; kdb_trap_printk = 0; kdb_show_stack() kdb_trap_printk++; Problem1: Now, a nested printk() on CPU0 calls vkdb_printf() even when it should have been disabled. It will not cause a deadlock but... // using the outdated saved value: 0 kdb_trap_printk = saved_trap_printk; kdb_trap_printk--; Problem2: Now, kdb_trap_printk == -1 and will stay like this. It means that all messages will get passed to kdb from now on. This patch removes the racy saved_trap_printk handling. Instead, the recursion is prevented by a check for the locked CPU. The solution is still kind of racy. A non-related printk(), from another process, might get trapped by vkdb_printf(). And the wanted printk() might not get trapped because kdb_printf_cpu is assigned. But this problem existed even with the original code. A proper solution would be to get_cpu() before setting kdb_trap_printk and trap messages only from this CPU. I am not sure if it is worth the effort, though. In fact, the race is very theoretical. When kdb is running any of the commands that use kdb_trap_printk there is a single active CPU and the other CPUs should be in a holding pen inside kgdb_cpu_enter(). The only time this is violated is when there is a timeout waiting for the other CPUs to report to the holding pen. Finally, note that the situation is a bit schizophrenic. vkdb_printf() explicitly allows recursion but only from KDB code that calls kdb_printf() directly. On the other hand, the generic printk() recursion is not allowed because it might cause an infinite loop. This is why we could not hide the decision inside vkdb_printf() easily. Link: http://lkml.kernel.org/r/1480412276-16690-4-git-send-email-pmladek@suse.com Signed-off-by: Petr Mladek <pmladek@suse.com> Cc: Daniel Thompson <daniel.thompson@linaro.org> Cc: Jason Wessel <jason.wessel@windriver.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Sergey Senozhatsky <sergey.senozhatsky@gmail.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
221 lines
7.3 KiB
C
221 lines
7.3 KiB
C
#ifndef _KDB_H
|
|
#define _KDB_H
|
|
|
|
/*
|
|
* Kernel Debugger Architecture Independent Global Headers
|
|
*
|
|
* This file is subject to the terms and conditions of the GNU General Public
|
|
* License. See the file "COPYING" in the main directory of this archive
|
|
* for more details.
|
|
*
|
|
* Copyright (c) 2000-2007 Silicon Graphics, Inc. All Rights Reserved.
|
|
* Copyright (C) 2000 Stephane Eranian <eranian@hpl.hp.com>
|
|
* Copyright (C) 2009 Jason Wessel <jason.wessel@windriver.com>
|
|
*/
|
|
|
|
/* Shifted versions of the command enable bits are be used if the command
|
|
* has no arguments (see kdb_check_flags). This allows commands, such as
|
|
* go, to have different permissions depending upon whether it is called
|
|
* with an argument.
|
|
*/
|
|
#define KDB_ENABLE_NO_ARGS_SHIFT 10
|
|
|
|
typedef enum {
|
|
KDB_ENABLE_ALL = (1 << 0), /* Enable everything */
|
|
KDB_ENABLE_MEM_READ = (1 << 1),
|
|
KDB_ENABLE_MEM_WRITE = (1 << 2),
|
|
KDB_ENABLE_REG_READ = (1 << 3),
|
|
KDB_ENABLE_REG_WRITE = (1 << 4),
|
|
KDB_ENABLE_INSPECT = (1 << 5),
|
|
KDB_ENABLE_FLOW_CTRL = (1 << 6),
|
|
KDB_ENABLE_SIGNAL = (1 << 7),
|
|
KDB_ENABLE_REBOOT = (1 << 8),
|
|
/* User exposed values stop here, all remaining flags are
|
|
* exclusively used to describe a commands behaviour.
|
|
*/
|
|
|
|
KDB_ENABLE_ALWAYS_SAFE = (1 << 9),
|
|
KDB_ENABLE_MASK = (1 << KDB_ENABLE_NO_ARGS_SHIFT) - 1,
|
|
|
|
KDB_ENABLE_ALL_NO_ARGS = KDB_ENABLE_ALL << KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_MEM_READ_NO_ARGS = KDB_ENABLE_MEM_READ
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_MEM_WRITE_NO_ARGS = KDB_ENABLE_MEM_WRITE
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_REG_READ_NO_ARGS = KDB_ENABLE_REG_READ
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_REG_WRITE_NO_ARGS = KDB_ENABLE_REG_WRITE
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_INSPECT_NO_ARGS = KDB_ENABLE_INSPECT
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_FLOW_CTRL_NO_ARGS = KDB_ENABLE_FLOW_CTRL
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_SIGNAL_NO_ARGS = KDB_ENABLE_SIGNAL
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_REBOOT_NO_ARGS = KDB_ENABLE_REBOOT
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_ALWAYS_SAFE_NO_ARGS = KDB_ENABLE_ALWAYS_SAFE
|
|
<< KDB_ENABLE_NO_ARGS_SHIFT,
|
|
KDB_ENABLE_MASK_NO_ARGS = KDB_ENABLE_MASK << KDB_ENABLE_NO_ARGS_SHIFT,
|
|
|
|
KDB_REPEAT_NO_ARGS = 0x40000000, /* Repeat the command w/o arguments */
|
|
KDB_REPEAT_WITH_ARGS = 0x80000000, /* Repeat the command with args */
|
|
} kdb_cmdflags_t;
|
|
|
|
typedef int (*kdb_func_t)(int, const char **);
|
|
|
|
#ifdef CONFIG_KGDB_KDB
|
|
#include <linux/init.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/atomic.h>
|
|
|
|
#define KDB_POLL_FUNC_MAX 5
|
|
extern int kdb_poll_idx;
|
|
|
|
/*
|
|
* kdb_initial_cpu is initialized to -1, and is set to the cpu
|
|
* number whenever the kernel debugger is entered.
|
|
*/
|
|
extern int kdb_initial_cpu;
|
|
|
|
/* Types and messages used for dynamically added kdb shell commands */
|
|
|
|
#define KDB_MAXARGS 16 /* Maximum number of arguments to a function */
|
|
|
|
/* KDB return codes from a command or internal kdb function */
|
|
#define KDB_NOTFOUND (-1)
|
|
#define KDB_ARGCOUNT (-2)
|
|
#define KDB_BADWIDTH (-3)
|
|
#define KDB_BADRADIX (-4)
|
|
#define KDB_NOTENV (-5)
|
|
#define KDB_NOENVVALUE (-6)
|
|
#define KDB_NOTIMP (-7)
|
|
#define KDB_ENVFULL (-8)
|
|
#define KDB_ENVBUFFULL (-9)
|
|
#define KDB_TOOMANYBPT (-10)
|
|
#define KDB_TOOMANYDBREGS (-11)
|
|
#define KDB_DUPBPT (-12)
|
|
#define KDB_BPTNOTFOUND (-13)
|
|
#define KDB_BADMODE (-14)
|
|
#define KDB_BADINT (-15)
|
|
#define KDB_INVADDRFMT (-16)
|
|
#define KDB_BADREG (-17)
|
|
#define KDB_BADCPUNUM (-18)
|
|
#define KDB_BADLENGTH (-19)
|
|
#define KDB_NOBP (-20)
|
|
#define KDB_BADADDR (-21)
|
|
#define KDB_NOPERM (-22)
|
|
|
|
/*
|
|
* kdb_diemsg
|
|
*
|
|
* Contains a pointer to the last string supplied to the
|
|
* kernel 'die' panic function.
|
|
*/
|
|
extern const char *kdb_diemsg;
|
|
|
|
#define KDB_FLAG_EARLYKDB (1 << 0) /* set from boot parameter kdb=early */
|
|
#define KDB_FLAG_CATASTROPHIC (1 << 1) /* A catastrophic event has occurred */
|
|
#define KDB_FLAG_CMD_INTERRUPT (1 << 2) /* Previous command was interrupted */
|
|
#define KDB_FLAG_NOIPI (1 << 3) /* Do not send IPIs */
|
|
#define KDB_FLAG_NO_CONSOLE (1 << 5) /* No console is available,
|
|
* kdb is disabled */
|
|
#define KDB_FLAG_NO_VT_CONSOLE (1 << 6) /* No VT console is available, do
|
|
* not use keyboard */
|
|
#define KDB_FLAG_NO_I8042 (1 << 7) /* No i8042 chip is available, do
|
|
* not use keyboard */
|
|
|
|
extern int kdb_flags; /* Global flags, see kdb_state for per cpu state */
|
|
|
|
extern void kdb_save_flags(void);
|
|
extern void kdb_restore_flags(void);
|
|
|
|
#define KDB_FLAG(flag) (kdb_flags & KDB_FLAG_##flag)
|
|
#define KDB_FLAG_SET(flag) ((void)(kdb_flags |= KDB_FLAG_##flag))
|
|
#define KDB_FLAG_CLEAR(flag) ((void)(kdb_flags &= ~KDB_FLAG_##flag))
|
|
|
|
/*
|
|
* External entry point for the kernel debugger. The pt_regs
|
|
* at the time of entry are supplied along with the reason for
|
|
* entry to the kernel debugger.
|
|
*/
|
|
|
|
typedef enum {
|
|
KDB_REASON_ENTER = 1, /* KDB_ENTER() trap/fault - regs valid */
|
|
KDB_REASON_ENTER_SLAVE, /* KDB_ENTER_SLAVE() trap/fault - regs valid */
|
|
KDB_REASON_BREAK, /* Breakpoint inst. - regs valid */
|
|
KDB_REASON_DEBUG, /* Debug Fault - regs valid */
|
|
KDB_REASON_OOPS, /* Kernel Oops - regs valid */
|
|
KDB_REASON_SWITCH, /* CPU switch - regs valid*/
|
|
KDB_REASON_KEYBOARD, /* Keyboard entry - regs valid */
|
|
KDB_REASON_NMI, /* Non-maskable interrupt; regs valid */
|
|
KDB_REASON_RECURSE, /* Recursive entry to kdb;
|
|
* regs probably valid */
|
|
KDB_REASON_SSTEP, /* Single Step trap. - regs valid */
|
|
KDB_REASON_SYSTEM_NMI, /* In NMI due to SYSTEM cmd; regs valid */
|
|
} kdb_reason_t;
|
|
|
|
enum kdb_msgsrc {
|
|
KDB_MSGSRC_INTERNAL, /* direct call to kdb_printf() */
|
|
KDB_MSGSRC_PRINTK, /* trapped from printk() */
|
|
};
|
|
|
|
extern int kdb_trap_printk;
|
|
extern int kdb_printf_cpu;
|
|
extern __printf(2, 0) int vkdb_printf(enum kdb_msgsrc src, const char *fmt,
|
|
va_list args);
|
|
extern __printf(1, 2) int kdb_printf(const char *, ...);
|
|
typedef __printf(1, 2) int (*kdb_printf_t)(const char *, ...);
|
|
|
|
extern void kdb_init(int level);
|
|
|
|
/* Access to kdb specific polling devices */
|
|
typedef int (*get_char_func)(void);
|
|
extern get_char_func kdb_poll_funcs[];
|
|
extern int kdb_get_kbd_char(void);
|
|
|
|
static inline
|
|
int kdb_process_cpu(const struct task_struct *p)
|
|
{
|
|
unsigned int cpu = task_cpu(p);
|
|
if (cpu > num_possible_cpus())
|
|
cpu = 0;
|
|
return cpu;
|
|
}
|
|
|
|
/* kdb access to register set for stack dumping */
|
|
extern struct pt_regs *kdb_current_regs;
|
|
#ifdef CONFIG_KALLSYMS
|
|
extern const char *kdb_walk_kallsyms(loff_t *pos);
|
|
#else /* ! CONFIG_KALLSYMS */
|
|
static inline const char *kdb_walk_kallsyms(loff_t *pos)
|
|
{
|
|
return NULL;
|
|
}
|
|
#endif /* ! CONFIG_KALLSYMS */
|
|
|
|
/* Dynamic kdb shell command registration */
|
|
extern int kdb_register(char *, kdb_func_t, char *, char *, short);
|
|
extern int kdb_register_flags(char *, kdb_func_t, char *, char *,
|
|
short, kdb_cmdflags_t);
|
|
extern int kdb_unregister(char *);
|
|
#else /* ! CONFIG_KGDB_KDB */
|
|
static inline __printf(1, 2) int kdb_printf(const char *fmt, ...) { return 0; }
|
|
static inline void kdb_init(int level) {}
|
|
static inline int kdb_register(char *cmd, kdb_func_t func, char *usage,
|
|
char *help, short minlen) { return 0; }
|
|
static inline int kdb_register_flags(char *cmd, kdb_func_t func, char *usage,
|
|
char *help, short minlen,
|
|
kdb_cmdflags_t flags) { return 0; }
|
|
static inline int kdb_unregister(char *cmd) { return 0; }
|
|
#endif /* CONFIG_KGDB_KDB */
|
|
enum {
|
|
KDB_NOT_INITIALIZED,
|
|
KDB_INIT_EARLY,
|
|
KDB_INIT_FULL,
|
|
};
|
|
|
|
extern int kdbgetintenv(const char *, int *);
|
|
extern int kdb_set(int, const char **);
|
|
|
|
#endif /* !_KDB_H */
|