source: mainline/uspace/app/taskdump/taskdump.c@ adb7dfe1

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since adb7dfe1 was 1433ecda, checked in by Jiri Svoboda <jiri@…>, 8 years ago

Fix cstyle: make ccheck-fix and commit only files where all the changes are good.

  • Property mode set to 100644
File size: 10.9 KB
RevLine 
[336db295]1/*
2 * Copyright (c) 2010 Jiri Svoboda
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup taskdump
30 * @{
31 */
32/** @file
33 */
34
[ffa2c8ef]35#include <async.h>
[5baf209]36#include <elf/elf_linux.h>
[c1b979a]37#include <fibrildump.h>
[336db295]38#include <stdio.h>
39#include <stdlib.h>
[8d2dd7f2]40#include <stddef.h>
41#include <stdbool.h>
[9af1c61]42#include <str_error.h>
[336db295]43#include <errno.h>
44#include <udebug.h>
45#include <task.h>
[dafa2d04]46#include <as.h>
[80487bc5]47#include <libarch/istate.h>
[336db295]48#include <macros.h>
49#include <assert.h>
[1d6dd2a]50#include <str.h>
[336db295]51
[3698e44]52#include <symtab.h>
[dafa2d04]53#include <elf_core.h>
[e515b21a]54#include <stacktrace.h>
[c1b979a]55#include <taskdump.h>
[e515b21a]56
[336db295]57#define LINE_BYTES 16
58
[79ae36dd]59static async_sess_t *sess;
[336db295]60static task_id_t task_id;
[dafa2d04]61static bool write_core_file;
62static char *core_file_name;
[3698e44]63static char *app_name;
64static symtab_t *app_symtab;
[336db295]65
[b7fd2a0]66static errno_t connect_task(task_id_t task_id);
[336db295]67static int parse_args(int argc, char *argv[]);
[e515b21a]68static void print_syntax(void);
[b7fd2a0]69static errno_t threads_dump(void);
70static errno_t thread_dump(uintptr_t thash);
71static errno_t areas_dump(void);
72static errno_t td_read_uintptr(void *arg, uintptr_t addr, uintptr_t *value);
[336db295]73
[3698e44]74static void autoload_syms(void);
75static char *get_app_task_name(void);
76static char *fmt_sym_address(uintptr_t addr);
77
[5baf209]78static istate_t reg_state;
79
[c1b979a]80static stacktrace_ops_t td_stacktrace_ops = {
81 .read_uintptr = td_read_uintptr
[1b20da0]82};
[c1b979a]83
[336db295]84int main(int argc, char *argv[])
85{
[b7fd2a0]86 errno_t rc;
[336db295]87
88 printf("Task Dump Utility\n");
[dafa2d04]89 write_core_file = false;
[336db295]90
91 if (parse_args(argc, argv) < 0)
92 return 1;
93
94 rc = connect_task(task_id);
[d5c1051]95 if (rc != EOK) {
[7e752b2]96 printf("Failed connecting to task %" PRIu64 ".\n", task_id);
[336db295]97 return 1;
98 }
99
[3698e44]100 app_name = get_app_task_name();
101 app_symtab = NULL;
102
[7e752b2]103 printf("Dumping task '%s' (task ID %" PRIu64 ").\n", app_name, task_id);
[3698e44]104 autoload_syms();
105 putchar('\n');
[336db295]106
107 rc = threads_dump();
[d5c1051]108 if (rc != EOK)
[336db295]109 printf("Failed dumping threads.\n");
110
111 rc = areas_dump();
[d5c1051]112 if (rc != EOK)
[336db295]113 printf("Failed dumping address space areas.\n");
114
[c1b979a]115 rc = fibrils_dump(app_symtab, sess);
[d5c1051]116 if (rc != EOK)
[c1b979a]117 printf("Failed dumping fibrils.\n");
118
[79ae36dd]119 udebug_end(sess);
120 async_hangup(sess);
[336db295]121
122 return 0;
123}
124
[b7fd2a0]125static errno_t connect_task(task_id_t task_id)
[336db295]126{
[79ae36dd]127 async_sess_t *ksess = async_connect_kbox(task_id);
[a35b458]128
[79ae36dd]129 if (!ksess) {
130 if (errno == ENOTSUP) {
131 printf("You do not have userspace debugging support "
132 "compiled in the kernel.\n");
133 printf("Compile kernel with 'Support for userspace debuggers' "
134 "(CONFIG_UDEBUG) enabled.\n");
135 return errno;
136 }
[a35b458]137
[336db295]138 printf("Error connecting\n");
[9af1c61]139 printf("async_connect_kbox(%" PRIu64 ") -> %s", task_id, str_error_name(errno));
[79ae36dd]140 return errno;
[336db295]141 }
[a35b458]142
[b7fd2a0]143 errno_t rc = udebug_begin(ksess);
[d5c1051]144 if (rc != EOK) {
[c1694b6b]145 printf("udebug_begin() -> %s\n", str_error_name(rc));
[336db295]146 return rc;
147 }
[a35b458]148
[79ae36dd]149 sess = ksess;
[336db295]150 return 0;
151}
152
153static int parse_args(int argc, char *argv[])
154{
155 char *arg;
156 char *err_p;
157
158 task_id = 0;
159
[1433ecda]160 --argc;
161 ++argv;
[336db295]162
163 while (argc > 0) {
164 arg = *argv;
165 if (arg[0] == '-') {
166 if (arg[1] == 't' && arg[2] == '\0') {
167 /* Task ID */
[1433ecda]168 --argc;
169 ++argv;
[336db295]170 task_id = strtol(*argv, &err_p, 10);
171 if (*err_p) {
172 printf("Task ID syntax error\n");
173 print_syntax();
174 return -1;
175 }
[dafa2d04]176 } else if (arg[1] == 'c' && arg[2] == '\0') {
177 write_core_file = true;
178
[1433ecda]179 --argc;
180 ++argv;
[dafa2d04]181 core_file_name = *argv;
[336db295]182 } else {
[7e752b2]183 printf("Uknown option '%c'\n", arg[0]);
[336db295]184 print_syntax();
185 return -1;
186 }
187 } else {
188 break;
189 }
190
[1433ecda]191 --argc;
192 ++argv;
[336db295]193 }
194
195 if (task_id == 0) {
196 printf("Missing task ID argument\n");
197 print_syntax();
198 return -1;
199 }
200
201 if (argc != 0) {
202 printf("Extra arguments\n");
203 print_syntax();
204 return -1;
205 }
206
207 return 0;
208}
209
[e515b21a]210static void print_syntax(void)
[336db295]211{
[dafa2d04]212 printf("Syntax: taskdump [-c <core_file>] -t <task_id>\n");
213 printf("\t-c <core_file_id>\tName of core file to write.\n");
[336db295]214 printf("\t-t <task_id>\tWhich task to dump.\n");
215}
216
[b7fd2a0]217static errno_t threads_dump(void)
[336db295]218{
219 uintptr_t *thash_buf;
220 uintptr_t dummy_buf;
221 size_t buf_size, n_threads;
222
223 size_t copied;
224 size_t needed;
225 size_t i;
[b7fd2a0]226 errno_t rc;
[336db295]227
228 /* TODO: See why NULL does not work. */
[79ae36dd]229 rc = udebug_thread_read(sess, &dummy_buf, 0, &copied, &needed);
[d5c1051]230 if (rc != EOK) {
[c1694b6b]231 printf("udebug_thread_read() -> %s\n", str_error_name(rc));
[336db295]232 return rc;
233 }
234
235 if (needed == 0) {
236 printf("No threads.\n\n");
237 return 0;
238 }
239
240 buf_size = needed;
241 thash_buf = malloc(buf_size);
242
[79ae36dd]243 rc = udebug_thread_read(sess, thash_buf, buf_size, &copied, &needed);
[d5c1051]244 if (rc != EOK) {
[c1694b6b]245 printf("udebug_thread_read() -> %s\n", str_error_name(rc));
[336db295]246 return rc;
247 }
248
249 assert(copied == buf_size);
250 assert(needed == buf_size);
251
252 n_threads = copied / sizeof(uintptr_t);
253
254 printf("Threads:\n");
255 for (i = 0; i < n_threads; i++) {
[7e752b2]256 printf(" [%zu] hash: %p\n", 1 + i, (void *) thash_buf[i]);
[80487bc5]257
258 thread_dump(thash_buf[i]);
[336db295]259 }
260 putchar('\n');
261
262 free(thash_buf);
263
264 return 0;
265}
266
[b7fd2a0]267static errno_t areas_dump(void)
[336db295]268{
269 as_area_info_t *ainfo_buf;
270 as_area_info_t dummy_buf;
271 size_t buf_size, n_areas;
272
273 size_t copied;
274 size_t needed;
275 size_t i;
[b7fd2a0]276 errno_t rc;
[336db295]277
[79ae36dd]278 rc = udebug_areas_read(sess, &dummy_buf, 0, &copied, &needed);
[d5c1051]279 if (rc != EOK) {
[c1694b6b]280 printf("udebug_areas_read() -> %s\n", str_error_name(rc));
[336db295]281 return rc;
282 }
283
284 buf_size = needed;
285 ainfo_buf = malloc(buf_size);
286
[79ae36dd]287 rc = udebug_areas_read(sess, ainfo_buf, buf_size, &copied, &needed);
[d5c1051]288 if (rc != EOK) {
[c1694b6b]289 printf("udebug_areas_read() -> %s\n", str_error_name(rc));
[336db295]290 return rc;
291 }
292
293 assert(copied == buf_size);
294 assert(needed == buf_size);
295
296 n_areas = copied / sizeof(as_area_info_t);
297
298 printf("Address space areas:\n");
299 for (i = 0; i < n_areas; i++) {
[7e752b2]300 printf(" [%zu] flags: %c%c%c%c base: %p size: %zu\n", 1 + i,
[336db295]301 (ainfo_buf[i].flags & AS_AREA_READ) ? 'R' : '-',
302 (ainfo_buf[i].flags & AS_AREA_WRITE) ? 'W' : '-',
303 (ainfo_buf[i].flags & AS_AREA_EXEC) ? 'X' : '-',
304 (ainfo_buf[i].flags & AS_AREA_CACHEABLE) ? 'C' : '-',
[7e752b2]305 (void *) ainfo_buf[i].start_addr, ainfo_buf[i].size);
[336db295]306 }
307
308 putchar('\n');
309
[dafa2d04]310 if (write_core_file) {
311 printf("Writing core file '%s'\n", core_file_name);
[5baf209]312
313 rc = elf_core_save(core_file_name, ainfo_buf, n_areas, sess,
314 &reg_state);
315
[dafa2d04]316 if (rc != EOK) {
317 printf("Failed writing core file.\n");
318 return EIO;
319 }
320 }
321
[336db295]322 free(ainfo_buf);
323
324 return 0;
325}
326
[b7fd2a0]327errno_t td_stacktrace(uintptr_t fp, uintptr_t pc)
[c1b979a]328{
329 uintptr_t nfp;
330 stacktrace_t st;
331 char *sym_pc;
[b7fd2a0]332 errno_t rc;
[c1b979a]333
334 st.op_arg = NULL;
335 st.ops = &td_stacktrace_ops;
336
337 while (stacktrace_fp_valid(&st, fp)) {
338 sym_pc = fmt_sym_address(pc);
339 printf(" %p: %s\n", (void *) fp, sym_pc);
340 free(sym_pc);
341
342 rc = stacktrace_ra_get(&st, fp, &pc);
343 if (rc != EOK)
344 return rc;
345
346 rc = stacktrace_fp_prev(&st, fp, &nfp);
347 if (rc != EOK)
348 return rc;
349
350 fp = nfp;
351 }
352
353 return EOK;
354}
355
[b7fd2a0]356static errno_t thread_dump(uintptr_t thash)
[80487bc5]357{
358 istate_t istate;
[c1b979a]359 uintptr_t pc, fp;
[3698e44]360 char *sym_pc;
[b7fd2a0]361 errno_t rc;
[80487bc5]362
[79ae36dd]363 rc = udebug_regs_read(sess, thash, &istate);
[d5c1051]364 if (rc != EOK) {
[c1694b6b]365 printf("Failed reading registers: %s.\n", str_error_name(rc));
[80487bc5]366 return EIO;
367 }
368
369 pc = istate_get_pc(&istate);
370 fp = istate_get_fp(&istate);
371
[5baf209]372 /* Save register state for dumping to core file later. */
373 reg_state = istate;
374
[196a1439]375 sym_pc = fmt_sym_address(pc);
[63594c0]376 printf("Thread %p: PC = %s. FP = %p\n", (void *) thash,
[7e752b2]377 sym_pc, (void *) fp);
[196a1439]378 free(sym_pc);
[e515b21a]379
[c1b979a]380 (void) td_stacktrace(fp, pc);
[80487bc5]381
382 return EOK;
383}
384
[b7fd2a0]385static errno_t td_read_uintptr(void *arg, uintptr_t addr, uintptr_t *value)
[e515b21a]386{
387 uintptr_t data;
[b7fd2a0]388 errno_t rc;
[e515b21a]389
390 (void) arg;
391
[79ae36dd]392 rc = udebug_mem_read(sess, &data, addr, sizeof(data));
[d5c1051]393 if (rc != EOK) {
[e515b21a]394 printf("Warning: udebug_mem_read() failed.\n");
395 return rc;
396 }
397
398 *value = data;
399 return EOK;
400}
401
[3698e44]402/** Attempt to find the right executable file and load the symbol table. */
403static void autoload_syms(void)
404{
405 char *file_name;
[b7fd2a0]406 errno_t rc;
[d5c1051]407 int ret;
[3698e44]408
409 assert(app_name != NULL);
410 assert(app_symtab == NULL);
411
[d5c1051]412 ret = asprintf(&file_name, "/app/%s", app_name);
413 if (ret < 0) {
[3698e44]414 printf("Memory allocation failure.\n");
415 exit(1);
416 }
417
418 rc = symtab_load(file_name, &app_symtab);
419 if (rc == EOK) {
420 printf("Loaded symbol table from %s\n", file_name);
421 free(file_name);
422 return;
423 }
424
425 free(file_name);
426
[d5c1051]427 ret = asprintf(&file_name, "/srv/%s", app_name);
428 if (ret < 0) {
[3698e44]429 printf("Memory allocation failure.\n");
430 exit(1);
431 }
432
[196a1439]433 rc = symtab_load(file_name, &app_symtab);
[3698e44]434 if (rc == EOK) {
435 printf("Loaded symbol table from %s\n", file_name);
436 free(file_name);
437 return;
438 }
439
[d5c1051]440 ret = asprintf(&file_name, "/drv/%s/%s", app_name, app_name);
441 if (ret < 0) {
[6a343bdf]442 printf("Memory allocation failure.\n");
443 exit(1);
444 }
445
446 rc = symtab_load(file_name, &app_symtab);
447 if (rc == EOK) {
448 printf("Loaded symbol table from %s\n", file_name);
449 free(file_name);
450 return;
451 }
452
[3698e44]453 free(file_name);
454 printf("Failed autoloading symbol table.\n");
455}
456
457static char *get_app_task_name(void)
458{
459 char dummy_buf;
460 size_t copied, needed, name_size;
461 char *name;
[b7fd2a0]462 errno_t rc;
[3698e44]463
[79ae36dd]464 rc = udebug_name_read(sess, &dummy_buf, 0, &copied, &needed);
[d5c1051]465 if (rc != EOK)
[3698e44]466 return NULL;
467
468 name_size = needed;
469 name = malloc(name_size + 1);
[79ae36dd]470 rc = udebug_name_read(sess, name, name_size, &copied, &needed);
[d5c1051]471 if (rc != EOK) {
[3698e44]472 free(name);
473 return NULL;
474 }
475
476 assert(copied == name_size);
477 assert(copied == needed);
478 name[copied] = '\0';
479
480 return name;
481}
482
483/** Format address in symbolic form.
484 *
485 * Formats address as <symbol_name>+<offset> (<address>), if possible,
486 * otherwise as <address>.
487 *
488 * @param addr Address to format.
489 * @return Newly allocated string, address in symbolic form.
490 */
491static char *fmt_sym_address(uintptr_t addr)
492{
493 char *name;
494 size_t offs;
[b7fd2a0]495 errno_t rc;
[d5c1051]496 int ret;
[3698e44]497 char *str;
498
499 if (app_symtab != NULL) {
500 rc = symtab_addr_to_name(app_symtab, addr, &name, &offs);
501 } else {
502 rc = ENOTSUP;
503 }
504
505 if (rc == EOK) {
[d5c1051]506 ret = asprintf(&str, "%p (%s+%zu)", (void *) addr, name, offs);
[3698e44]507 } else {
[d5c1051]508 ret = asprintf(&str, "%p", (void *) addr);
[3698e44]509 }
510
[d5c1051]511 if (ret < 0) {
[3698e44]512 printf("Memory allocation error.\n");
513 exit(1);
514 }
515
516 return str;
517}
518
[336db295]519/** @}
520 */
Note: See TracBrowser for help on using the repository browser.