]>
Commit | Line | Data |
---|---|---|
5ba3f43e A |
1 | /* |
2 | * Copyright (c) 2007-2013 Apple Inc. All rights reserved. | |
3 | * | |
4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ | |
5 | * | |
6 | * This file contains Original Code and/or Modifications of Original Code | |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
14 | * | |
15 | * Please obtain a copy of the License at | |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
17 | * | |
18 | * The Original Code and all software distributed under the License are | |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, | |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. | |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
25 | * | |
26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ | |
27 | */ | |
28 | ||
29 | #include <debug.h> | |
30 | #include <mach_kdp.h> | |
31 | ||
32 | #include <kern/thread.h> | |
33 | #include <machine/pmap.h> | |
34 | #include <device/device_types.h> | |
35 | ||
36 | #include <mach/vm_param.h> | |
37 | #include <mach/clock_types.h> | |
38 | #include <mach/machine.h> | |
39 | #include <mach/kmod.h> | |
40 | #include <pexpert/boot.h> | |
41 | #include <pexpert/pexpert.h> | |
42 | ||
43 | #include <kern/misc_protos.h> | |
44 | #include <kern/startup.h> | |
45 | #include <kern/clock.h> | |
46 | #include <kern/debug.h> | |
47 | #include <kern/processor.h> | |
48 | #include <kdp/kdp_core.h> | |
49 | #if ALTERNATE_DEBUGGER | |
50 | #include <arm64/alternate_debugger.h> | |
51 | #endif | |
52 | #include <machine/atomic.h> | |
53 | #include <machine/trap.h> | |
54 | #include <kern/spl.h> | |
55 | #include <pexpert/pexpert.h> | |
56 | #include <kdp/kdp_callout.h> | |
57 | #include <kdp/kdp_dyld.h> | |
58 | #include <kdp/kdp_internal.h> | |
59 | #include <uuid/uuid.h> | |
60 | #include <sys/time.h> | |
61 | ||
62 | #include <IOKit/IOPlatformExpert.h> | |
63 | ||
64 | #include <mach/vm_prot.h> | |
65 | #include <vm/vm_map.h> | |
66 | #include <vm/pmap.h> | |
67 | #include <vm/vm_shared_region.h> | |
68 | #include <mach/time_value.h> | |
69 | #include <machine/machparam.h> /* for btop */ | |
70 | ||
71 | #include <console/video_console.h> | |
72 | #include <arm/cpu_data.h> | |
73 | #include <arm/cpu_data_internal.h> | |
74 | #include <arm/cpu_internal.h> | |
75 | #include <arm/misc_protos.h> | |
76 | #include <libkern/OSKextLibPrivate.h> | |
77 | #include <vm/vm_kern.h> | |
78 | #include <kern/kern_cdata.h> | |
79 | ||
80 | #if MACH_KDP | |
81 | void kdp_trap(unsigned int, struct arm_saved_state *); | |
82 | #endif | |
83 | ||
84 | extern kern_return_t do_stackshot(void *); | |
85 | extern void kdp_snapshot_preflight(int pid, void *tracebuf, | |
86 | uint32_t tracebuf_size, uint32_t flags, | |
87 | kcdata_descriptor_t data_p, | |
88 | boolean_t enable_faulting); | |
89 | extern int kdp_stack_snapshot_bytes_traced(void); | |
90 | ||
91 | /* | |
92 | * Increment the PANICLOG_VERSION if you change the format of the panic | |
93 | * log in any way. | |
94 | */ | |
95 | #define PANICLOG_VERSION 8 | |
96 | static struct kcdata_descriptor kc_panic_data; | |
97 | ||
98 | extern char firmware_version[]; | |
99 | extern volatile uint32_t debug_enabled; | |
100 | extern unsigned int not_in_kdp; | |
101 | ||
102 | extern int copyinframe(vm_address_t fp, uint32_t * frame); | |
103 | extern void kdp_callouts(kdp_event_t event); | |
104 | ||
105 | /* #include <sys/proc.h> */ | |
106 | #define MAXCOMLEN 16 | |
107 | extern int proc_pid(void *p); | |
108 | extern void proc_name_kdp(task_t, char *, int); | |
109 | ||
110 | extern const char version[]; | |
111 | extern char osversion[]; | |
112 | extern uint8_t gPlatformECID[8]; | |
113 | extern uint32_t gPlatformMemoryID; | |
114 | ||
115 | extern uint64_t last_hwaccess_thread; | |
116 | ||
117 | /*Choosing the size for gTargetTypeBuffer as 8 and size for gModelTypeBuffer as 32 | |
118 | since the target name and model name typically doesn't exceed this size */ | |
119 | extern char gTargetTypeBuffer[8]; | |
120 | extern char gModelTypeBuffer[32]; | |
121 | ||
122 | decl_simple_lock_data(extern,clock_lock) | |
123 | extern struct timeval gIOLastSleepTime; | |
124 | extern struct timeval gIOLastWakeTime; | |
125 | extern boolean_t is_clock_configured; | |
126 | extern uuid_t kernelcache_uuid; | |
127 | ||
128 | /* Definitions for frame pointers */ | |
129 | #define FP_ALIGNMENT_MASK ((uint32_t)(0x3)) | |
130 | #define FP_LR_OFFSET ((uint32_t)4) | |
131 | #define FP_LR_OFFSET64 ((uint32_t)8) | |
132 | #define FP_MAX_NUM_TO_EVALUATE (50) | |
133 | ||
134 | /* Timeout (in nanoseconds) for all processors responding to debug crosscall */ | |
135 | #define DEBUG_ACK_TIMEOUT ((uint64_t) 10000000) | |
136 | ||
137 | /* Forward functions definitions */ | |
138 | void panic_display_times(void) ; | |
139 | void panic_print_symbol_name(vm_address_t search); | |
140 | ||
141 | ||
142 | /* Global variables */ | |
143 | static uint32_t panic_bt_depth; | |
144 | boolean_t PanicInfoSaved = FALSE; | |
145 | boolean_t force_immediate_debug_halt = FALSE; | |
146 | unsigned int debug_ack_timeout_count = 0; | |
147 | volatile unsigned int debugger_sync = 0; | |
148 | volatile unsigned int mp_kdp_trap = 0; /* CPUs signalled by the debug CPU will spin on this */ | |
149 | unsigned int DebugContextCount = 0; | |
150 | ||
151 | // Convenient macros to easily validate one or more pointers if | |
152 | // they have defined types | |
153 | #define VALIDATE_PTR(ptr) \ | |
154 | validate_ptr((vm_offset_t)(ptr), sizeof(*(ptr)), #ptr) | |
155 | ||
156 | #define VALIDATE_PTR_2(ptr0, ptr1) \ | |
157 | VALIDATE_PTR(ptr0) && VALIDATE_PTR(ptr1) | |
158 | ||
159 | #define VALIDATE_PTR_3(ptr0, ptr1, ptr2) \ | |
160 | VALIDATE_PTR_2(ptr0, ptr1) && VALIDATE_PTR(ptr2) | |
161 | ||
162 | #define VALIDATE_PTR_4(ptr0, ptr1, ptr2, ptr3) \ | |
163 | VALIDATE_PTR_2(ptr0, ptr1) && VALIDATE_PTR_2(ptr2, ptr3) | |
164 | ||
165 | #define GET_MACRO(_1,_2,_3,_4,NAME,...) NAME | |
166 | ||
167 | #define VALIDATE_PTR_LIST(...) GET_MACRO(__VA_ARGS__, VALIDATE_PTR_4, VALIDATE_PTR_3, VALIDATE_PTR_2, VALIDATE_PTR)(__VA_ARGS__) | |
168 | ||
169 | /* | |
170 | * Evaluate if a pointer is valid | |
171 | * Print a message if pointer is invalid | |
172 | */ | |
173 | static boolean_t validate_ptr( | |
174 | vm_offset_t ptr, vm_size_t size, const char * ptr_name) | |
175 | { | |
176 | if (ptr) { | |
177 | if (ml_validate_nofault(ptr, size)) { | |
178 | return TRUE; | |
179 | } else { | |
180 | paniclog_append_noflush("Invalid %s pointer: %p size: %d\n", | |
181 | ptr_name, (void *)ptr, (int)size); | |
182 | return FALSE; | |
183 | } | |
184 | } else { | |
185 | paniclog_append_noflush("NULL %s pointer\n", ptr_name); | |
186 | return FALSE; | |
187 | } | |
188 | } | |
189 | ||
190 | /* | |
191 | * Backtrace a single frame. | |
192 | */ | |
193 | static void | |
194 | print_one_backtrace(pmap_t pmap, vm_offset_t topfp, const char *cur_marker, | |
195 | boolean_t is_64_bit) | |
196 | { | |
197 | int i = 0; | |
198 | addr64_t lr; | |
199 | addr64_t fp; | |
200 | addr64_t fp_for_ppn; | |
201 | ppnum_t ppn; | |
202 | boolean_t dump_kernel_stack; | |
203 | ||
204 | fp = topfp; | |
205 | fp_for_ppn = 0; | |
206 | ppn = (ppnum_t)NULL; | |
207 | ||
208 | if (fp >= VM_MIN_KERNEL_ADDRESS) | |
209 | dump_kernel_stack = TRUE; | |
210 | else | |
211 | dump_kernel_stack = FALSE; | |
212 | ||
213 | do { | |
214 | if ((fp == 0) || ((fp & FP_ALIGNMENT_MASK) != 0)) | |
215 | break; | |
216 | if (dump_kernel_stack && ((fp < VM_MIN_KERNEL_ADDRESS) || (fp > VM_MAX_KERNEL_ADDRESS))) | |
217 | break; | |
218 | if ((!dump_kernel_stack) && (fp >=VM_MIN_KERNEL_ADDRESS)) | |
219 | break; | |
220 | ||
221 | /* | |
222 | * Check to see if current address will result in a different | |
223 | * ppn than previously computed (to avoid recomputation) via | |
224 | * (addr) ^ fp_for_ppn) >> PAGE_SHIFT) | |
225 | */ | |
226 | if ((((fp + FP_LR_OFFSET) ^ fp_for_ppn) >> PAGE_SHIFT) != 0x0U) { | |
227 | ppn = pmap_find_phys(pmap, fp + FP_LR_OFFSET); | |
228 | fp_for_ppn = fp + (is_64_bit ? FP_LR_OFFSET64 : FP_LR_OFFSET); | |
229 | } | |
230 | if (ppn != (ppnum_t)NULL) { | |
231 | if (is_64_bit) { | |
232 | lr = ml_phys_read_double_64(((((vm_offset_t)ppn) << PAGE_SHIFT)) | ((fp + FP_LR_OFFSET64) & PAGE_MASK)); | |
233 | } else { | |
234 | lr = ml_phys_read_word(((((vm_offset_t)ppn) << PAGE_SHIFT)) | ((fp + FP_LR_OFFSET) & PAGE_MASK)); | |
235 | } | |
236 | } else { | |
237 | if (is_64_bit) { | |
238 | paniclog_append_noflush("%s\t Could not read LR from frame at 0x%016llx\n", cur_marker, fp + FP_LR_OFFSET64); | |
239 | } else { | |
240 | paniclog_append_noflush("%s\t Could not read LR from frame at 0x%08x\n", cur_marker, (uint32_t)(fp + FP_LR_OFFSET)); | |
241 | } | |
242 | break; | |
243 | } | |
244 | if (((fp ^ fp_for_ppn) >> PAGE_SHIFT) != 0x0U) { | |
245 | ppn = pmap_find_phys(pmap, fp); | |
246 | fp_for_ppn = fp; | |
247 | } | |
248 | if (ppn != (ppnum_t)NULL) { | |
249 | if (is_64_bit) { | |
250 | fp = ml_phys_read_double_64(((((vm_offset_t)ppn) << PAGE_SHIFT)) | (fp & PAGE_MASK)); | |
251 | } else { | |
252 | fp = ml_phys_read_word(((((vm_offset_t)ppn) << PAGE_SHIFT)) | (fp & PAGE_MASK)); | |
253 | } | |
254 | } else { | |
255 | if (is_64_bit) { | |
256 | paniclog_append_noflush("%s\t Could not read FP from frame at 0x%016llx\n", cur_marker, fp); | |
257 | } else { | |
258 | paniclog_append_noflush("%s\t Could not read FP from frame at 0x%08x\n", cur_marker, (uint32_t)fp); | |
259 | } | |
260 | break; | |
261 | } | |
262 | ||
263 | if (lr) { | |
264 | if (is_64_bit) { | |
265 | paniclog_append_noflush("%s\t lr: 0x%016llx fp: 0x%016llx\n", cur_marker, lr, fp); | |
266 | } else { | |
267 | paniclog_append_noflush("%s\t lr: 0x%08x fp: 0x%08x\n", cur_marker, (uint32_t)lr, (uint32_t)fp); | |
268 | } | |
269 | } | |
270 | } while ((++i < FP_MAX_NUM_TO_EVALUATE) && (fp != topfp)); | |
271 | } | |
272 | ||
273 | #define SANE_TASK_LIMIT 256 | |
274 | #define TOP_RUNNABLE_LIMIT 5 | |
275 | #define PANICLOG_UUID_BUF_SIZE 256 | |
276 | ||
277 | extern void panic_print_vnodes(void); | |
278 | ||
279 | static void | |
280 | do_print_all_backtraces( | |
281 | const char *message) | |
282 | { | |
283 | int logversion = PANICLOG_VERSION; | |
284 | thread_t cur_thread = current_thread(); | |
285 | uintptr_t cur_fp; | |
286 | task_t task; | |
287 | int i; | |
288 | size_t index; | |
289 | int print_vnodes = 0; | |
290 | const char *nohilite_thread_marker="\t"; | |
291 | ||
292 | /* end_marker_bytes set to 200 for printing END marker + stackshot summary info always */ | |
293 | int bytes_traced = 0, bytes_remaining = 0, end_marker_bytes = 200; | |
294 | uint64_t bytes_used = 0ULL; | |
295 | int err = 0; | |
296 | char *stackshot_begin_loc = NULL; | |
297 | ||
298 | #if defined(__arm__) | |
299 | __asm__ volatile("mov %0, r7":"=r"(cur_fp)); | |
300 | #elif defined(__arm64__) | |
301 | __asm__ volatile("add %0, xzr, fp":"=r"(cur_fp)); | |
302 | #else | |
303 | #error Unknown architecture. | |
304 | #endif | |
305 | if (panic_bt_depth != 0) | |
306 | return; | |
307 | panic_bt_depth++; | |
308 | ||
309 | /* Truncate panic string to 1200 bytes -- WDT log can be ~1100 bytes */ | |
310 | paniclog_append_noflush("Debugger message: %.1200s\n", message); | |
311 | if (debug_enabled) { | |
312 | paniclog_append_noflush("Device: %s\n", | |
313 | ('\0' != gTargetTypeBuffer[0]) ? gTargetTypeBuffer : "Not set yet"); | |
314 | paniclog_append_noflush("Hardware Model: %s\n", | |
315 | ('\0' != gModelTypeBuffer[0]) ? gModelTypeBuffer:"Not set yet"); | |
316 | paniclog_append_noflush("ECID: %02X%02X%02X%02X%02X%02X%02X%02X\n", gPlatformECID[7], | |
317 | gPlatformECID[6], gPlatformECID[5], gPlatformECID[4], gPlatformECID[3], | |
318 | gPlatformECID[2], gPlatformECID[1], gPlatformECID[0]); | |
319 | if (last_hwaccess_thread) { | |
320 | paniclog_append_noflush("AppleHWAccess Thread: 0x%llx\n", last_hwaccess_thread); | |
321 | } | |
322 | } | |
323 | paniclog_append_noflush("Memory ID: 0x%x\n", gPlatformMemoryID); | |
324 | paniclog_append_noflush("OS version: %.256s\n", | |
325 | ('\0' != osversion[0]) ? osversion : "Not set yet"); | |
326 | paniclog_append_noflush("Kernel version: %.512s\n", version); | |
327 | paniclog_append_noflush("KernelCache UUID: "); | |
328 | for (index = 0; index < sizeof(uuid_t); index++) { | |
329 | paniclog_append_noflush("%02X", kernelcache_uuid[index]); | |
330 | } | |
331 | paniclog_append_noflush("\n"); | |
332 | ||
333 | paniclog_append_noflush("iBoot version: %.128s\n", firmware_version); | |
334 | paniclog_append_noflush("secure boot?: %s\n", debug_enabled ? "NO": "YES"); | |
335 | paniclog_append_noflush("Paniclog version: %d\n", logversion); | |
336 | ||
337 | panic_display_kernel_aslr(); | |
338 | panic_display_times(); | |
339 | panic_display_zprint(); | |
340 | #if CONFIG_ZLEAKS | |
341 | panic_display_ztrace(); | |
342 | #endif /* CONFIG_ZLEAKS */ | |
343 | #if CONFIG_ECC_LOGGING | |
344 | panic_display_ecc_errors(); | |
345 | #endif /* CONFIG_ECC_LOGGING */ | |
346 | ||
347 | // Just print threads with high CPU usage for WDT timeouts | |
348 | if (strncmp(message, "WDT timeout", 11) == 0) { | |
349 | thread_t top_runnable[5] = {0}; | |
350 | thread_t thread; | |
351 | int total_cpu_usage = 0; | |
352 | ||
353 | print_vnodes = 1; | |
354 | ||
355 | ||
356 | for (thread = (thread_t)queue_first(&threads); | |
357 | VALIDATE_PTR(thread) && !queue_end(&threads, (queue_entry_t)thread); | |
358 | thread = (thread_t)queue_next(&thread->threads)) { | |
359 | ||
360 | total_cpu_usage += thread->cpu_usage; | |
361 | ||
362 | // Look for the 5 runnable threads with highest priority | |
363 | if (thread->state & TH_RUN) { | |
364 | int k; | |
365 | thread_t comparison_thread = thread; | |
366 | ||
367 | for (k = 0; k < TOP_RUNNABLE_LIMIT; k++) { | |
368 | if (top_runnable[k] == 0) { | |
369 | top_runnable[k] = comparison_thread; | |
370 | break; | |
371 | } else if (comparison_thread->sched_pri > top_runnable[k]->sched_pri) { | |
372 | thread_t temp = top_runnable[k]; | |
373 | top_runnable[k] = comparison_thread; | |
374 | comparison_thread = temp; | |
375 | } // if comparison thread has higher priority than previously saved thread | |
376 | } // loop through highest priority runnable threads | |
377 | } // Check if thread is runnable | |
378 | } // Loop through all threads | |
379 | ||
380 | // Print the relevant info for each thread identified | |
381 | paniclog_append_noflush("Total cpu_usage: %d\n", total_cpu_usage); | |
382 | paniclog_append_noflush("Thread task pri cpu_usage\n"); | |
383 | ||
384 | for (i = 0; i < TOP_RUNNABLE_LIMIT; i++) { | |
385 | ||
386 | if (top_runnable[i] && VALIDATE_PTR(top_runnable[i]->task) && | |
387 | validate_ptr((vm_offset_t)top_runnable[i]->task->bsd_info, 1, "bsd_info")) { | |
388 | ||
389 | char name[MAXCOMLEN + 1]; | |
390 | proc_name_kdp(top_runnable[i]->task, name, sizeof(name)); | |
391 | paniclog_append_noflush("%p %s %d %d\n", | |
392 | top_runnable[i], name, top_runnable[i]->sched_pri, top_runnable[i]->cpu_usage); | |
393 | } | |
394 | } // Loop through highest priority runnable threads | |
395 | paniclog_append_noflush("\n"); | |
396 | } // Check if message is "WDT timeout" | |
397 | ||
398 | // print current task info | |
399 | if (VALIDATE_PTR_LIST(cur_thread, cur_thread->task)) { | |
400 | ||
401 | task = cur_thread->task; | |
402 | ||
403 | if (VALIDATE_PTR_LIST(task->map, task->map->pmap)) { | |
404 | paniclog_append_noflush("Panicked task %p: %d pages, %d threads: ", | |
405 | task, task->map->pmap->stats.resident_count, task->thread_count); | |
406 | } else { | |
407 | paniclog_append_noflush("Panicked task %p: %d threads: ", | |
408 | task, task->thread_count); | |
409 | } | |
410 | ||
411 | if (validate_ptr((vm_offset_t)task->bsd_info, 1, "bsd_info")) { | |
412 | char name[MAXCOMLEN + 1]; | |
413 | int pid = proc_pid(task->bsd_info); | |
414 | proc_name_kdp(task, name, sizeof(name)); | |
415 | paniclog_append_noflush("pid %d: %s", pid, name); | |
416 | } else { | |
417 | paniclog_append_noflush("unknown task"); | |
418 | } | |
419 | ||
420 | paniclog_append_noflush("\n"); | |
421 | } | |
422 | ||
423 | if (cur_fp < VM_MAX_KERNEL_ADDRESS) { | |
424 | paniclog_append_noflush("Panicked thread: %p, backtrace: 0x%llx, tid: %llu\n", | |
425 | cur_thread, (addr64_t)cur_fp, thread_tid(cur_thread)); | |
426 | #if __LP64__ | |
427 | print_one_backtrace(kernel_pmap, cur_fp, nohilite_thread_marker, TRUE); | |
428 | #else | |
429 | print_one_backtrace(kernel_pmap, cur_fp, nohilite_thread_marker, FALSE); | |
430 | #endif | |
431 | } else { | |
432 | paniclog_append_noflush("Could not print panicked thread backtrace:" | |
433 | "frame pointer outside kernel vm.\n"); | |
434 | } | |
435 | ||
436 | paniclog_append_noflush("\n"); | |
437 | panic_info->eph_panic_log_len = PE_get_offset_into_panic_region(debug_buf_ptr) - panic_info->eph_panic_log_offset; | |
438 | ||
439 | if (debug_ack_timeout_count) { | |
440 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_DEBUGGERSYNC; | |
441 | panic_info->eph_other_log_offset = PE_get_offset_into_panic_region(debug_buf_ptr); | |
442 | paniclog_append_noflush("!! debugger synchronization failed, no stackshot !!\n"); | |
443 | } else if (stackshot_active()) { | |
444 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_NESTED; | |
445 | panic_info->eph_other_log_offset = PE_get_offset_into_panic_region(debug_buf_ptr); | |
446 | paniclog_append_noflush("!! panicked during stackshot, skipping panic stackshot !!\n"); | |
447 | } else { | |
448 | /* Align the stackshot buffer to an 8-byte address (especially important for armv7k devices) */ | |
449 | debug_buf_ptr += (8 - ((uintptr_t)debug_buf_ptr % 8)); | |
450 | stackshot_begin_loc = debug_buf_ptr; | |
451 | ||
452 | bytes_remaining = debug_buf_size - (unsigned int)((uintptr_t)stackshot_begin_loc - (uintptr_t)debug_buf_base); | |
453 | err = kcdata_memory_static_init(&kc_panic_data, (mach_vm_address_t)debug_buf_ptr, | |
454 | KCDATA_BUFFER_BEGIN_STACKSHOT, bytes_remaining - end_marker_bytes, | |
455 | KCFLAG_USE_MEMCOPY); | |
456 | if (err == KERN_SUCCESS) { | |
457 | kdp_snapshot_preflight(-1, stackshot_begin_loc, bytes_remaining - end_marker_bytes, | |
458 | (STACKSHOT_GET_GLOBAL_MEM_STATS | STACKSHOT_SAVE_LOADINFO | STACKSHOT_KCDATA_FORMAT | | |
459 | STACKSHOT_ENABLE_BT_FAULTING | STACKSHOT_ENABLE_UUID_FAULTING | STACKSHOT_FROM_PANIC | | |
460 | STACKSHOT_NO_IO_STATS | STACKSHOT_THREAD_WAITINFO), &kc_panic_data, 0); | |
461 | err = do_stackshot(NULL); | |
462 | bytes_traced = kdp_stack_snapshot_bytes_traced(); | |
463 | if (bytes_traced > 0 && !err) { | |
464 | debug_buf_ptr += bytes_traced; | |
465 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_SUCCEEDED; | |
466 | panic_info->eph_stackshot_offset = PE_get_offset_into_panic_region(stackshot_begin_loc); | |
467 | panic_info->eph_stackshot_len = bytes_traced; | |
468 | ||
469 | panic_info->eph_other_log_offset = PE_get_offset_into_panic_region(debug_buf_ptr); | |
470 | paniclog_append_noflush("\n** Stackshot Succeeded ** Bytes Traced %d **\n", bytes_traced); | |
471 | } else { | |
472 | bytes_used = kcdata_memory_get_used_bytes(&kc_panic_data); | |
473 | if (bytes_used > 0) { | |
474 | /* Zero out the stackshot data */ | |
475 | bzero(stackshot_begin_loc, bytes_used); | |
476 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_INCOMPLETE; | |
477 | ||
478 | panic_info->eph_other_log_offset = PE_get_offset_into_panic_region(debug_buf_ptr); | |
479 | paniclog_append_noflush("\n** Stackshot Incomplete ** Bytes Filled %llu **\n", bytes_used); | |
480 | } else { | |
481 | bzero(stackshot_begin_loc, bytes_used); | |
482 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_ERROR; | |
483 | ||
484 | panic_info->eph_other_log_offset = PE_get_offset_into_panic_region(debug_buf_ptr); | |
485 | paniclog_append_noflush("\n!! Stackshot Failed !! Bytes Traced %d, err %d\n", bytes_traced, err); | |
486 | } | |
487 | } | |
488 | } else { | |
489 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_ERROR; | |
490 | panic_info->eph_other_log_offset = PE_get_offset_into_panic_region(debug_buf_ptr); | |
491 | paniclog_append_noflush("\n!! Stackshot Failed !!\nkcdata_memory_static_init returned %d", err); | |
492 | } | |
493 | } | |
494 | ||
495 | assert(panic_info->eph_other_log_offset != 0); | |
496 | ||
497 | if (print_vnodes != 0) | |
498 | panic_print_vnodes(); | |
499 | ||
500 | panic_bt_depth--; | |
501 | } | |
502 | ||
503 | /* | |
504 | * Entry to print_all_backtraces is serialized by the debugger lock | |
505 | */ | |
506 | static void | |
507 | print_all_backtraces(const char *message) | |
508 | { | |
509 | unsigned int initial_not_in_kdp = not_in_kdp; | |
510 | ||
511 | cpu_data_t * cpu_data_ptr = getCpuDatap(); | |
512 | ||
513 | assert(cpu_data_ptr->PAB_active == FALSE); | |
514 | cpu_data_ptr->PAB_active = TRUE; | |
515 | ||
516 | /* | |
517 | * Because print all backtraces uses the pmap routines, it needs to | |
518 | * avoid taking pmap locks. Right now, this is conditionalized on | |
519 | * not_in_kdp. | |
520 | */ | |
521 | not_in_kdp = 0; | |
522 | do_print_all_backtraces(message); | |
523 | ||
524 | not_in_kdp = initial_not_in_kdp; | |
525 | ||
526 | cpu_data_ptr->PAB_active = FALSE; | |
527 | } | |
528 | ||
529 | void | |
530 | panic_display_times() | |
531 | { | |
532 | if (kdp_clock_is_locked()) { | |
533 | paniclog_append_noflush("Warning: clock is locked. Can't get time\n"); | |
534 | return; | |
535 | } | |
536 | ||
537 | if ((is_clock_configured) && (simple_lock_try(&clock_lock))) { | |
538 | clock_sec_t secs, boot_secs; | |
539 | clock_usec_t usecs, boot_usecs; | |
540 | ||
541 | simple_unlock(&clock_lock); | |
542 | ||
543 | clock_get_calendar_microtime(&secs, &usecs); | |
544 | clock_get_boottime_microtime(&boot_secs, &boot_usecs); | |
545 | ||
546 | paniclog_append_noflush("Epoch Time: sec usec\n"); | |
547 | paniclog_append_noflush(" Boot : 0x%08x 0x%08x\n", (unsigned int)boot_secs, (unsigned int)boot_usecs); | |
548 | paniclog_append_noflush(" Sleep : 0x%08x 0x%08x\n", (unsigned int)gIOLastSleepTime.tv_sec, (unsigned int)gIOLastSleepTime.tv_usec); | |
549 | paniclog_append_noflush(" Wake : 0x%08x 0x%08x\n", (unsigned int)gIOLastWakeTime.tv_sec, (unsigned int)gIOLastWakeTime.tv_usec); | |
550 | paniclog_append_noflush(" Calendar: 0x%08x 0x%08x\n\n", (unsigned int)secs, (unsigned int)usecs); | |
551 | } | |
552 | } | |
553 | ||
554 | void panic_print_symbol_name(vm_address_t search) | |
555 | { | |
556 | #pragma unused(search) | |
557 | // empty stub. Really only used on x86_64. | |
558 | return; | |
559 | } | |
560 | ||
561 | void | |
562 | SavePanicInfo( | |
563 | const char *message, __unused uint64_t panic_options) | |
564 | { | |
565 | ||
566 | /* This should be initialized by the time we get here */ | |
567 | assert(panic_info->eph_panic_log_offset != 0); | |
568 | ||
569 | if (panic_options & DEBUGGER_OPTION_PANICLOGANDREBOOT) { | |
570 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_BUTTON_RESET_PANIC; | |
571 | } | |
572 | ||
573 | if (panic_options & DEBUGGER_OPTION_COPROC_INITIATED_PANIC) { | |
574 | panic_info->eph_panic_flags |= EMBEDDED_PANIC_HEADER_FLAG_COPROC_INITIATED_PANIC; | |
575 | } | |
576 | ||
577 | /* | |
578 | * On newer targets, panic data is stored directly into the iBoot panic region. | |
579 | * If we re-enter SavePanicInfo (e.g. on a double panic) on such a target, update the | |
580 | * panic CRC so that iBoot can hopefully find *something* useful in the panic region. | |
581 | */ | |
582 | if (PanicInfoSaved && (debug_buf_base >= (char*)gPanicBase) && (debug_buf_base < (char*)gPanicBase + gPanicSize)) { | |
583 | unsigned int pi_size = (unsigned int)(debug_buf_ptr - gPanicBase); | |
584 | PE_save_buffer_to_vram((unsigned char*)gPanicBase, &pi_size); | |
585 | PE_sync_panic_buffers(); // extra precaution; panic path likely isn't reliable if we're here | |
586 | } | |
587 | ||
588 | if (PanicInfoSaved || (debug_buf_size == 0)) | |
589 | return; | |
590 | ||
591 | PanicInfoSaved = TRUE; | |
592 | ||
593 | print_all_backtraces(message); | |
594 | ||
595 | assert(panic_info->eph_panic_log_len != 0); | |
596 | panic_info->eph_other_log_len = PE_get_offset_into_panic_region(debug_buf_ptr) - panic_info->eph_other_log_offset; | |
597 | ||
598 | PEHaltRestart(kPEPanicSync); | |
599 | ||
600 | /* | |
601 | * Notifies registered IOPlatformPanicAction callbacks | |
602 | * (which includes one to disable the memcache) and flushes | |
603 | * the buffer contents from the cache | |
604 | */ | |
605 | paniclog_flush(); | |
606 | } | |
607 | ||
608 | void | |
609 | paniclog_flush() | |
610 | { | |
611 | unsigned int panicbuf_length = 0; | |
612 | ||
613 | panicbuf_length = (unsigned int)(debug_buf_ptr - gPanicBase); | |
614 | if (!panicbuf_length) | |
615 | return; | |
616 | ||
617 | /* | |
618 | * Updates the log length of the last part of the panic log. | |
619 | */ | |
620 | panic_info->eph_other_log_len = PE_get_offset_into_panic_region(debug_buf_ptr) - panic_info->eph_other_log_offset; | |
621 | ||
622 | /* | |
623 | * Updates the metadata at the beginning of the panic buffer, | |
624 | * updates the CRC. | |
625 | */ | |
626 | PE_save_buffer_to_vram((unsigned char *)gPanicBase, &panicbuf_length); | |
627 | ||
628 | /* | |
629 | * This is currently unused by platform KEXTs on embedded but is | |
630 | * kept for compatibility with the published IOKit interfaces. | |
631 | */ | |
632 | PESavePanicInfo((unsigned char *)gPanicBase, panicbuf_length); | |
633 | ||
634 | PE_sync_panic_buffers(); | |
635 | } | |
636 | ||
637 | /* | |
638 | * @function DebuggerXCallEnter | |
639 | * | |
640 | * @abstract IPI other cores so this core can run in a single-threaded context. | |
641 | * | |
642 | * @discussion This function should be called with the debugger lock held. It | |
643 | * signals the other cores to go into a busy loop so this core can run in a | |
644 | * single-threaded context and inspect kernel memory. | |
645 | * | |
646 | * @param proceed_on_sync_failure If true, then go ahead and try to debug even | |
647 | * if we can't synch with the other cores. This is inherently unsafe and should | |
648 | * only be used if the kernel is going down in flames anyway. | |
649 | * | |
650 | * @result returns KERN_OPERATION_TIMED_OUT if synchronization times out and | |
651 | * proceed_on_sync_failure is false. | |
652 | */ | |
653 | kern_return_t | |
654 | DebuggerXCallEnter( | |
655 | boolean_t proceed_on_sync_failure) | |
656 | { | |
657 | uint64_t max_mabs_time, current_mabs_time; | |
658 | int cpu; | |
659 | int max_cpu; | |
660 | cpu_data_t *target_cpu_datap; | |
661 | cpu_data_t *cpu_data_ptr = getCpuDatap(); | |
662 | ||
663 | /* Check for nested debugger entry. */ | |
664 | cpu_data_ptr->debugger_active++; | |
665 | if (cpu_data_ptr->debugger_active != 1) | |
666 | return KERN_SUCCESS; | |
667 | ||
668 | /* | |
669 | * If debugger_sync is not 0, someone responded excessively late to the last | |
670 | * debug request (we zero the sync variable in the return function). Zero it | |
671 | * again here. This should prevent us from getting out of sync (heh) and | |
672 | * timing out on every entry to the debugger if we timeout once. | |
673 | */ | |
674 | ||
675 | debugger_sync = 0; | |
676 | mp_kdp_trap = 1; | |
677 | ||
678 | /* | |
679 | * We need a barrier here to ensure CPUs see mp_kdp_trap and spin when responding | |
680 | * to the signal. | |
681 | */ | |
682 | __builtin_arm_dmb(DMB_ISH); | |
683 | ||
684 | /* | |
685 | * Try to signal all CPUs (except ourselves, of course). Use debugger_sync to | |
686 | * synchronize with every CPU that we appeared to signal successfully (cpu_signal | |
687 | * is not synchronous). | |
688 | */ | |
689 | bool cpu_signal_failed = false; | |
690 | max_cpu = ml_get_max_cpu_number(); | |
691 | ||
692 | boolean_t immediate_halt = FALSE; | |
693 | if (proceed_on_sync_failure && force_immediate_debug_halt) | |
694 | immediate_halt = TRUE; | |
695 | ||
696 | if (!immediate_halt) { | |
697 | for (cpu=0; cpu <= max_cpu; cpu++) { | |
698 | target_cpu_datap = (cpu_data_t *)CpuDataEntries[cpu].cpu_data_vaddr; | |
699 | ||
700 | if ((target_cpu_datap == NULL) || (target_cpu_datap == cpu_data_ptr)) | |
701 | continue; | |
702 | ||
703 | if(KERN_SUCCESS == cpu_signal(target_cpu_datap, SIGPdebug, (void *)NULL, NULL)) { | |
704 | (void)hw_atomic_add(&debugger_sync, 1); | |
705 | } else { | |
706 | cpu_signal_failed = true; | |
707 | kprintf("cpu_signal failed in DebuggerXCallEnter\n"); | |
708 | } | |
709 | } | |
710 | ||
711 | nanoseconds_to_absolutetime(DEBUG_ACK_TIMEOUT, &max_mabs_time); | |
712 | current_mabs_time = mach_absolute_time(); | |
713 | max_mabs_time += current_mabs_time; | |
714 | assert(max_mabs_time > current_mabs_time); | |
715 | ||
716 | /* | |
717 | * Wait for DEBUG_ACK_TIMEOUT ns for a response from everyone we IPI'd. If we | |
718 | * timeout, that is simply too bad; we don't have a true NMI, and one CPU may be | |
719 | * uninterruptibly spinning on someone else. The best we can hope for is that | |
720 | * all other CPUs have either responded or are spinning in a context that is | |
721 | * debugger safe. | |
722 | */ | |
723 | while ((debugger_sync != 0) && (current_mabs_time < max_mabs_time)) | |
724 | current_mabs_time = mach_absolute_time(); | |
725 | ||
726 | } | |
727 | ||
728 | if (cpu_signal_failed && !proceed_on_sync_failure) { | |
729 | DebuggerXCallReturn(); | |
730 | return KERN_FAILURE; | |
731 | } else if (immediate_halt || (current_mabs_time >= max_mabs_time)) { | |
732 | /* | |
733 | * For the moment, we're aiming for a timeout that the user shouldn't notice, | |
734 | * but will be sufficient to let the other core respond. | |
735 | */ | |
736 | __builtin_arm_dmb(DMB_ISH); | |
737 | for (cpu=0; cpu <= max_cpu; cpu++) { | |
738 | target_cpu_datap = (cpu_data_t *)CpuDataEntries[cpu].cpu_data_vaddr; | |
739 | ||
740 | if ((target_cpu_datap == NULL) || (target_cpu_datap == cpu_data_ptr)) | |
741 | continue; | |
742 | if (!(target_cpu_datap->cpu_signal & SIGPdebug) && !immediate_halt) | |
743 | continue; | |
744 | if (proceed_on_sync_failure) { | |
745 | paniclog_append_noflush("Attempting to forcibly halt cpu %d\n", cpu); | |
746 | dbgwrap_status_t halt_status = ml_dbgwrap_halt_cpu(cpu, 0); | |
747 | if (halt_status < 0) | |
748 | paniclog_append_noflush("Unable to halt cpu %d: %d\n", cpu, halt_status); | |
749 | else { | |
750 | if (halt_status > 0) | |
751 | paniclog_append_noflush("cpu %d halted with warning %d\n", cpu, halt_status); | |
752 | target_cpu_datap->halt_status = CPU_HALTED; | |
753 | } | |
754 | } else | |
755 | kprintf("Debugger synch pending on cpu %d\n", cpu); | |
756 | } | |
757 | if (proceed_on_sync_failure) { | |
758 | for (cpu = 0; cpu <= max_cpu; cpu++) { | |
759 | target_cpu_datap = (cpu_data_t *)CpuDataEntries[cpu].cpu_data_vaddr; | |
760 | ||
761 | if ((target_cpu_datap == NULL) || (target_cpu_datap == cpu_data_ptr) || | |
762 | (target_cpu_datap->halt_status == CPU_NOT_HALTED)) | |
763 | continue; | |
764 | dbgwrap_status_t halt_status = ml_dbgwrap_halt_cpu_with_state(cpu, | |
765 | NSEC_PER_SEC, &target_cpu_datap->halt_state); | |
766 | if ((halt_status < 0) || (halt_status == DBGWRAP_WARN_CPU_OFFLINE)) | |
767 | paniclog_append_noflush("Unable to obtain state for cpu %d: %d\n", cpu, halt_status); | |
768 | else | |
769 | target_cpu_datap->halt_status = CPU_HALTED_WITH_STATE; | |
770 | } | |
771 | if (immediate_halt) | |
772 | paniclog_append_noflush("Immediate halt requested on all cores\n"); | |
773 | else | |
774 | paniclog_append_noflush("Debugger synchronization timed out; waited %llu nanoseconds\n", DEBUG_ACK_TIMEOUT); | |
775 | debug_ack_timeout_count++; | |
776 | return KERN_SUCCESS; | |
777 | } else { | |
778 | DebuggerXCallReturn(); | |
779 | return KERN_OPERATION_TIMED_OUT; | |
780 | } | |
781 | } else { | |
782 | return KERN_SUCCESS; | |
783 | } | |
784 | } | |
785 | ||
786 | /* | |
787 | * @function DebuggerXCallReturn | |
788 | * | |
789 | * @abstract Resume normal multicore operation after DebuggerXCallEnter() | |
790 | * | |
791 | * @discussion This function should be called with debugger lock held. | |
792 | */ | |
793 | void | |
794 | DebuggerXCallReturn( | |
795 | void) | |
796 | { | |
797 | cpu_data_t *cpu_data_ptr = getCpuDatap(); | |
798 | ||
799 | cpu_data_ptr->debugger_active--; | |
800 | if (cpu_data_ptr->debugger_active != 0) | |
801 | return; | |
802 | ||
803 | mp_kdp_trap = 0; | |
804 | debugger_sync = 0; | |
805 | ||
806 | /* Do we need a barrier here? */ | |
807 | __builtin_arm_dmb(DMB_ISH); | |
808 | } | |
809 | ||
810 | void | |
811 | DebuggerXCall( | |
812 | void *ctx) | |
813 | { | |
814 | boolean_t save_context = FALSE; | |
815 | vm_offset_t kstackptr = 0; | |
816 | arm_saved_state_t *regs = (arm_saved_state_t *) ctx; | |
817 | ||
818 | if (regs != NULL) { | |
819 | #if defined(__arm64__) | |
820 | save_context = PSR64_IS_KERNEL(get_saved_state_cpsr(regs)); | |
821 | #else | |
822 | save_context = PSR_IS_KERNEL(regs->cpsr); | |
823 | #endif | |
824 | } | |
825 | ||
826 | kstackptr = current_thread()->machine.kstackptr; | |
827 | arm_saved_state_t *state = (arm_saved_state_t *)kstackptr; | |
828 | ||
829 | if (save_context) { | |
830 | /* Save the interrupted context before acknowledging the signal */ | |
831 | *state = *regs; | |
832 | } else if (regs) { | |
833 | /* zero old state so machine_trace_thread knows not to backtrace it */ | |
834 | set_saved_state_fp(state, 0); | |
835 | set_saved_state_pc(state, 0); | |
836 | set_saved_state_lr(state, 0); | |
837 | set_saved_state_sp(state, 0); | |
838 | } | |
839 | ||
840 | (void)hw_atomic_sub(&debugger_sync, 1); | |
841 | __builtin_arm_dmb(DMB_ISH); | |
842 | while (mp_kdp_trap); | |
843 | ||
844 | /* Any cleanup for our pushed context should go here */ | |
845 | } | |
846 | ||
847 | ||
848 | void | |
849 | DebuggerCall( | |
850 | unsigned int reason, | |
851 | void *ctx) | |
852 | { | |
853 | #if !MACH_KDP | |
854 | #pragma unused(reason,ctx) | |
855 | #endif /* !MACH_KDP */ | |
856 | ||
857 | #if ALTERNATE_DEBUGGER | |
858 | alternate_debugger_enter(); | |
859 | #endif | |
860 | ||
861 | #if MACH_KDP | |
862 | kdp_trap(reason, (struct arm_saved_state *)ctx); | |
863 | #else | |
864 | /* TODO: decide what to do if no debugger config */ | |
865 | #endif | |
866 | } | |
867 | ||
868 |