]> git.saurik.com Git - apple/xnu.git/blobdiff - bsd/kern/kdebug.c
xnu-1228.0.2.tar.gz
[apple/xnu.git] / bsd / kern / kdebug.c
index 286a9d8ce2387de0c7f9ee02db0b274b8b2d2a3e..952d2b87c3f7639d334b0f062ce4a48b81360f33 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2000-2005 Apple Computer, Inc. All rights reserved.
+ * Copyright (c) 2000-2006 Apple Computer, Inc. All rights reserved.
  *
  * @Apple_LICENSE_HEADER_START@
  * 
@@ -17,7 +17,7 @@
  * License for the specific language governing rights and limitations
  * under the License.
  * 
- * @APPLE_LICENSE_HEADER_END@
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
  */
 
 #include <machine/spl.h>
@@ -39,6 +39,7 @@
 
 #include <kern/thread.h>
 #include <kern/task.h>
+#include <kern/debug.h>
 #include <vm/vm_kern.h>
 #include <sys/lock.h>
 
@@ -67,9 +68,11 @@ void kdbg_mapinit(void);
 int kdbg_reinit(void);
 int kdbg_bootstrap(void);
 
-static int  create_buffers(void);
+static int create_buffers(void);
 static void delete_buffers(void);
 
+extern void IOSleep(int);
+
 #ifdef ppc
 extern uint32_t maxDec;
 #endif
@@ -181,7 +184,7 @@ typedef void (*kd_chudhook_fn) (unsigned int debugid, unsigned int arg1,
 
 kd_chudhook_fn kdebug_chudhook = 0;   /* pointer to CHUD toolkit function */
 
-__private_extern__ void stackshot_lock_init( void );
+__private_extern__ void stackshot_lock_init( void ) __attribute__((section("__TEXT, initcode")));
 
 /* Support syscall SYS_kdebug_trace */
 int
@@ -194,8 +197,6 @@ kdebug_trace(__unused struct proc *p, struct kdebug_trace_args *uap, __unused re
     return(0);
 }
 
-
-
 static int
 create_buffers(void)
 {
@@ -203,13 +204,15 @@ create_buffers(void)
        int     nentries;
 
        nentries = nkdbufs / kd_cpus;
+       nkdbufs = nentries * kd_cpus;
+
        kd_bufsize = nentries * sizeof(kd_buf);
 
        bzero((char *)kdbip, sizeof(struct kd_bufinfo) * kd_cpus);
 
        if (kdcopybuf == 0) {
                if (kmem_alloc(kernel_map, (unsigned int *)&kdcopybuf, (vm_size_t)KDCOPYBUF_SIZE) != KERN_SUCCESS)
-                       return ENOMEM;
+                       return(ENOMEM);
        }
        for (cpu = 0; cpu < kd_cpus; cpu++) {
                if (kmem_alloc(kernel_map, (unsigned int *)&kdbip[cpu].kd_buffer, kd_bufsize) != KERN_SUCCESS)
@@ -303,7 +306,7 @@ kernel_debug_internal(unsigned int debugid, unsigned int arg1, unsigned int arg2
          {
            /* If kdebug flag is not set for current proc, return  */
            curproc = current_proc();
-           if ((curproc && !(curproc->p_flag & P_KDEBUG)) &&
+           if ((curproc && !(curproc->p_kdebug)) &&
                ((debugid&0xffff0000) != (MACHDBG_CODE(DBG_MACH_SCHED, 0) | DBG_FUNC_NONE)))
                goto out;
          }
@@ -311,7 +314,7 @@ kernel_debug_internal(unsigned int debugid, unsigned int arg1, unsigned int arg2
          {
            /* If kdebug flag is set for current proc, return  */
            curproc = current_proc();
-           if ((curproc && (curproc->p_flag & P_KDEBUG)) &&
+           if ((curproc && curproc->p_kdebug) &&
                ((debugid&0xffff0000) != (MACHDBG_CODE(DBG_MACH_SCHED, 0) | DBG_FUNC_NONE)))
                goto out;
          }
@@ -393,7 +396,6 @@ kdbg_lock_init(void)
        host_basic_info_data_t hinfo;
        mach_msg_type_number_t count = HOST_BASIC_INFO_COUNT;
 
-
        if (kdebug_flags & KDBG_LOCKINIT)
                return;
 
@@ -402,7 +404,8 @@ kdbg_lock_init(void)
        host_info((host_t)BSD_HOST, HOST_BASIC_INFO, (host_info_t)&hinfo, &count);
        kd_cpus = hinfo.physical_cpu_max;
 
-       if (kmem_alloc(kernel_map, (unsigned int *)&kdbip, sizeof(struct kd_bufinfo) * kd_cpus) != KERN_SUCCESS)
+       if (kmem_alloc(kernel_map, (unsigned int *)&kdbip,
+                      sizeof(struct kd_bufinfo) * kd_cpus) != KERN_SUCCESS)
                return;
 
        /*
@@ -486,11 +489,9 @@ kdbg_trace_data(struct proc *proc, long *arg_pid)
 void
 kdbg_trace_string(struct proc *proc, long *arg1, long *arg2, long *arg3, long *arg4)
 {
-    int i;
     char *dbg_nameptr; 
     int dbg_namelen;
     long dbg_parms[4];
-
     if (!proc)
       {
        *arg1 = 0;
@@ -511,12 +512,7 @@ kdbg_trace_string(struct proc *proc, long *arg1, long *arg2, long *arg3, long *a
     if(dbg_namelen > (int)sizeof(dbg_parms))
       dbg_namelen = sizeof(dbg_parms);
     
-    for(i=0;dbg_namelen > 0; i++)
-      {
-       dbg_parms[i]=*(long*)dbg_nameptr;
-       dbg_nameptr += sizeof(long);
-       dbg_namelen -= sizeof(long);
-      }
+    strncpy((char *)dbg_parms, dbg_nameptr, dbg_namelen);
 
     *arg1=dbg_parms[0];
     *arg2=dbg_parms[1];
@@ -534,9 +530,8 @@ kdbg_resolve_map(thread_t th_act, void *opaque)
     {
       mapptr=&t->map[t->count];
       mapptr->thread  = (unsigned int)th_act;
-      (void) strncpy (mapptr->command, t->atts->task_comm,
-                     sizeof(t->atts->task_comm)-1);
-      mapptr->command[sizeof(t->atts->task_comm)-1] = '\0';
+      (void) strlcpy (mapptr->command, t->atts->task_comm,
+                     sizeof(t->atts->task_comm));
 
       /*
        Some kernel threads have no associated pid.
@@ -566,6 +561,9 @@ kdbg_mapinit(void)
         if (kdebug_flags & KDBG_MAPINIT)
          return;
 
+       /* need to use PROC_SCANPROCLIST with proc_iterate */
+       proc_list_lock();
+
        /* Calculate the sizes of map buffers*/
        for (p = allproc.lh_first, kd_mapcount=0, tts_count=0; p; 
             p = p->p_list.le_next)
@@ -574,6 +572,8 @@ kdbg_mapinit(void)
            tts_count++;
          }
 
+       proc_list_unlock();
+
        /*
         * The proc count could change during buffer allocation,
         * so introduce a small fudge factor to bump up the
@@ -611,20 +611,26 @@ kdbg_mapinit(void)
         */
 
        if (tts_mapptr) {
+               /* should use proc_iterate */
+               proc_list_lock();
+
                for (p = allproc.lh_first, i=0; p && i < tts_count; 
                     p = p->p_list.le_next) {
-                       if (p->p_flag & P_WEXIT)
+                       if (p->p_lflag & P_LEXIT)
                                continue;
 
                        if (p->task) {
                                task_reference(p->task);
                                tts_mapptr[i].task = p->task;
                                tts_mapptr[i].pid  = p->p_pid;
-                               (void)strncpy(tts_mapptr[i].task_comm, p->p_comm, sizeof(tts_mapptr[i].task_comm) - 1);
+                               (void)strlcpy(tts_mapptr[i].task_comm, p->p_comm, sizeof(tts_mapptr[i].task_comm));
                                i++;
                        }
                }
                tts_count = i;
+
+               proc_list_unlock();
+
        }
 
 
@@ -695,7 +701,7 @@ kdbg_setpid(kd_regtype *kdr)
 
   if (pid > 0)
     {
-      if ((p = pfind(pid)) == NULL)
+      if ((p = proc_find(pid)) == NULL)
        ret = ESRCH;
       else
        {
@@ -705,14 +711,15 @@ kdbg_setpid(kd_regtype *kdr)
              kdebug_flags &= ~KDBG_PIDEXCLUDE;
              kdebug_slowcheck |= SLOW_CHECKS;
 
-             p->p_flag |= P_KDEBUG;
+             p->p_kdebug = 1;
            }
          else  /* turn off pid check for this pid value */
            {
              /* Don't turn off all pid checking though */
              /* kdebug_flags &= ~KDBG_PIDCHECK;*/   
-             p->p_flag &= ~P_KDEBUG;
+             p->p_kdebug = 0;
            }
+       proc_rele(p);
        }
     }
   else
@@ -733,7 +740,7 @@ kdbg_setpidex(kd_regtype *kdr)
 
   if (pid > 0)
     {
-      if ((p = pfind(pid)) == NULL)
+      if ((p = proc_find(pid)) == NULL)
        ret = ESRCH;
       else
        {
@@ -743,14 +750,15 @@ kdbg_setpidex(kd_regtype *kdr)
              kdebug_flags &= ~KDBG_PIDCHECK;
              kdebug_slowcheck |= SLOW_CHECKS;
 
-             p->p_flag |= P_KDEBUG;
+             p->p_kdebug = 1;
            }
          else  /* turn off pid exclusion for this pid value */
            {
              /* Don't turn off all pid exclusion though */
              /* kdebug_flags &= ~KDBG_PIDEXCLUDE;*/   
-             p->p_flag &= ~P_KDEBUG;
+             p->p_kdebug = 0;
            }
+       proc_rele(p);
        }
     }
   else
@@ -993,6 +1001,22 @@ kdbg_getentropy (user_addr_t buffer, size_t *number, int ms_timeout)
 }
 
 
+static void
+kdbg_set_nkdbufs(unsigned int value)
+{
+        /*
+        * We allow a maximum buffer size of 25% of either ram or max mapped address, whichever is smaller
+        * 'value' is the desired number of trace entries
+        */
+        unsigned int max_entries = (sane_size/4) / sizeof(kd_buf);
+
+       if (value <= max_entries)
+               nkdbufs = value;
+       else
+               nkdbufs = max_entries;
+}
+
+
 /*
  * This function is provided for the CHUD toolkit only.
  *    int val:
@@ -1021,9 +1045,8 @@ kdbg_control_chud(int val, void *fn)
 int
 kdbg_control(int *name, __unused u_int namelen, user_addr_t where, size_t *sizep)
 {
-    int ret=0;
+        int ret=0;
        size_t size=*sizep;
-       unsigned int max_entries;
        unsigned int value = name[1];
        kd_regtype kd_Reg;
        kbufinfo_t kd_bufinfo;
@@ -1106,7 +1129,7 @@ kdbg_control(int *name, __unused u_int namelen, user_addr_t where, size_t *sizep
         if (global_state_pid == -1)
            global_state_pid = curpid;
        else if (global_state_pid != curpid) {
-           if ((p = pfind(global_state_pid)) == NULL) {
+           if ((p = proc_find(global_state_pid)) == NULL) {
                /*
                 * The global pid no longer exists
                 */
@@ -1115,6 +1138,7 @@ kdbg_control(int *name, __unused u_int namelen, user_addr_t where, size_t *sizep
                /*
                 * The global pid exists, deny this request
                 */
+               proc_rele(p);
                lck_mtx_unlock(kd_trace_mtx_sysctl);
 
                return(EBUSY);
@@ -1151,13 +1175,7 @@ kdbg_control(int *name, __unused u_int namelen, user_addr_t where, size_t *sizep
                    }
                  break;
                case KERN_KDSETBUF:
-                 /* We allow a maximum buffer size of 25% of either ram or max mapped address, whichever is smaller */
-                 /* 'value' is the desired number of trace entries */
-                       max_entries = (sane_size/4) / sizeof(kd_buf);
-                       if (value <= max_entries)
-                               nkdbufs = value;
-                       else
-                         nkdbufs = max_entries;
+                       kdbg_set_nkdbufs(value);
                        break;
                case KERN_KDSETUP:
                        ret=kdbg_reinit();
@@ -1254,6 +1272,8 @@ kdbg_read(user_addr_t buffer, size_t *number)
        uint32_t tempbuf_number;
        unsigned int old_kdebug_flags, new_kdebug_flags;
        unsigned int old_kdebug_slowcheck, new_kdebug_slowcheck;
+       boolean_t first_event = TRUE;
+
        count = *number/sizeof(kd_buf);
        *number = 0;
 
@@ -1305,6 +1325,9 @@ kdbg_read(user_addr_t buffer, size_t *number)
        if ((tempbuf_count = count) > KDCOPYBUF_COUNT)
                tempbuf_count = KDCOPYBUF_COUNT;
 
+       if (last_wrap_cpu == -1)
+               first_event = FALSE;
+
        while (count) {
                tempbuf = kdcopybuf;
                tempbuf_number = 0;
@@ -1329,10 +1352,29 @@ kdbg_read(user_addr_t buffer, size_t *number)
                                 */
                                break;
 
+                        if (first_event == TRUE) {
+                               /*
+                                * make sure we leave room for the
+                                * LAST_WRAPPER event we inject
+                                * by throwing away the first event
+                                * it's better to lose that one
+                                * than the last one
+                                */     
+                               first_event = FALSE;
+
+                               kdbip[mincpu].kd_readlast++;
+
+                               if (kdbip[mincpu].kd_readlast == kdbip[mincpu].kd_buflast)
+                                       kdbip[mincpu].kd_readlast = kdbip[mincpu].kd_buffer;
+                               if (kdbip[mincpu].kd_readlast == kdbip[mincpu].kd_stop)
+                                       kdbip[mincpu].kd_stop = 0;
+
+                               continue;
+                       }
                        if (last_wrap_cpu == mincpu) {
                                tempbuf->debugid = MISCDBG_CODE(DBG_BUFFER, 0) | DBG_FUNC_NONE;
-                               tempbuf->arg1 = 0;
-                               tempbuf->arg2 = 0;
+                               tempbuf->arg1 = kd_bufsize / sizeof(kd_buf);
+                               tempbuf->arg2 = kd_cpus;
                                tempbuf->arg3 = 0;
                                tempbuf->arg4 = 0;
                                tempbuf->arg5 = (int)current_thread();
@@ -1405,7 +1447,7 @@ unsigned char *getProcName(struct proc *proc) {
 #define TRAP_DEBUGGER __asm__ volatile("int3");
 #endif
 #ifdef __ppc__
-#define TRAP_DEBUGGER   __asm__ volatile("tw 4,r3,r3");
+#define TRAP_DEBUGGER __asm__ volatile("tw 4,r3,r3");
 #endif
 
 #define SANE_TRACEBUF_SIZE 2*1024*1024
@@ -1483,6 +1525,11 @@ stack_snapshot2(pid_t pid, user_addr_t tracebuf, uint32_t tracebuf_size, uint32_
 /* Trap to the debugger to obtain a coherent stack snapshot; this populates
  * the trace buffer
  */
+       if (panic_active()) {
+               error = ENOMEM;
+               goto error_exit;
+       }
+
        TRAP_DEBUGGER;
 
        bytesTraced = kdp_stack_snapshot_bytes_traced();
@@ -1513,3 +1560,16 @@ error_exit:
        STACKSHOT_SUBSYS_UNLOCK();
        return error;
 }
+
+void
+start_kern_tracing(unsigned int new_nkdbufs) {
+       if (!new_nkdbufs)
+               return;
+       kdbg_set_nkdbufs(new_nkdbufs);
+       kdbg_lock_init();
+       kdbg_reinit();
+       kdebug_enable |= KDEBUG_ENABLE_TRACE;
+       kdebug_slowcheck &= ~SLOW_NOLOG;
+       kdbg_mapinit();
+       printf("kernel tracing started\n");
+}