diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2012-03-23 12:29:44 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2012-03-23 12:29:44 -0400 |
commit | a20ae85abaefb02cc0edf19c34f78d19437c1cf1 (patch) | |
tree | 13174b718a7f7b955b7d79f5427506ad62a3054e /kernel/debug/kdb | |
parent | f0a5ec0e8da4521036799ced340172b2732845a8 (diff) | |
parent | 1ba0c1720eb0de2d0f3abf84c0b128d10af520d1 (diff) |
Merge tag 'for_linus-3.4-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/jwessel/kgdb
Pull KGDB/KDB updates from Jason Wessel:
"Fixes:
- Fix KDB keyboard repeat scan codes and leaked keyboard events
- Fix kernel crash with kdb_printf() for users who compile new
kdb_printf()'s in early code
- Return all segment registers to gdb on x86_64
Features:
- KDB/KGDB hook the reboot notifier and end user can control if it
stops, detaches or does nothing (updated docs as well)
- Notify users who use CONFIG_DEBUG_RODATA to use hw breakpoints"
* tag 'for_linus-3.4-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/jwessel/kgdb:
kdb: Add message about CONFIG_DEBUG_RODATA on failure to install breakpoint
kdb: Avoid using dbg_io_ops until it is initialized
kgdb,debug_core: add the ability to control the reboot notifier
KDB: Fix usability issues relating to the 'enter' key.
kgdb,debug-core,gdbstub: Hook the reboot notifier for debugger detach
kgdb: Respect that flush op is optional
kgdb: x86: Return all segment registers also in 64-bit mode
Diffstat (limited to 'kernel/debug/kdb')
-rw-r--r-- | kernel/debug/kdb/kdb_bp.c | 7 | ||||
-rw-r--r-- | kernel/debug/kdb/kdb_io.c | 2 | ||||
-rw-r--r-- | kernel/debug/kdb/kdb_keyboard.c | 95 | ||||
-rw-r--r-- | kernel/debug/kdb/kdb_main.c | 3 | ||||
-rw-r--r-- | kernel/debug/kdb/kdb_private.h | 7 |
5 files changed, 91 insertions, 23 deletions
diff --git a/kernel/debug/kdb/kdb_bp.c b/kernel/debug/kdb/kdb_bp.c index 20059ef4459a..8418c2f8ec5d 100644 --- a/kernel/debug/kdb/kdb_bp.c +++ b/kernel/debug/kdb/kdb_bp.c | |||
@@ -153,6 +153,13 @@ static int _kdb_bp_install(struct pt_regs *regs, kdb_bp_t *bp) | |||
153 | } else { | 153 | } else { |
154 | kdb_printf("%s: failed to set breakpoint at 0x%lx\n", | 154 | kdb_printf("%s: failed to set breakpoint at 0x%lx\n", |
155 | __func__, bp->bp_addr); | 155 | __func__, bp->bp_addr); |
156 | #ifdef CONFIG_DEBUG_RODATA | ||
157 | if (!bp->bp_type) { | ||
158 | kdb_printf("Software breakpoints are unavailable.\n" | ||
159 | " Change the kernel CONFIG_DEBUG_RODATA=n\n" | ||
160 | " OR use hw breaks: help bph\n"); | ||
161 | } | ||
162 | #endif | ||
156 | return 1; | 163 | return 1; |
157 | } | 164 | } |
158 | return 0; | 165 | return 0; |
diff --git a/kernel/debug/kdb/kdb_io.c b/kernel/debug/kdb/kdb_io.c index 4802eb5840e1..9b5f17da1c56 100644 --- a/kernel/debug/kdb/kdb_io.c +++ b/kernel/debug/kdb/kdb_io.c | |||
@@ -689,7 +689,7 @@ kdb_printit: | |||
689 | if (!dbg_kdb_mode && kgdb_connected) { | 689 | if (!dbg_kdb_mode && kgdb_connected) { |
690 | gdbstub_msg_write(kdb_buffer, retlen); | 690 | gdbstub_msg_write(kdb_buffer, retlen); |
691 | } else { | 691 | } else { |
692 | if (!dbg_io_ops->is_console) { | 692 | if (dbg_io_ops && !dbg_io_ops->is_console) { |
693 | len = strlen(kdb_buffer); | 693 | len = strlen(kdb_buffer); |
694 | cp = kdb_buffer; | 694 | cp = kdb_buffer; |
695 | while (len--) { | 695 | while (len--) { |
diff --git a/kernel/debug/kdb/kdb_keyboard.c b/kernel/debug/kdb/kdb_keyboard.c index 4bca634975c0..118527aa60ea 100644 --- a/kernel/debug/kdb/kdb_keyboard.c +++ b/kernel/debug/kdb/kdb_keyboard.c | |||
@@ -25,6 +25,7 @@ | |||
25 | #define KBD_STAT_MOUSE_OBF 0x20 /* Mouse output buffer full */ | 25 | #define KBD_STAT_MOUSE_OBF 0x20 /* Mouse output buffer full */ |
26 | 26 | ||
27 | static int kbd_exists; | 27 | static int kbd_exists; |
28 | static int kbd_last_ret; | ||
28 | 29 | ||
29 | /* | 30 | /* |
30 | * Check if the keyboard controller has a keypress for us. | 31 | * Check if the keyboard controller has a keypress for us. |
@@ -90,8 +91,11 @@ int kdb_get_kbd_char(void) | |||
90 | return -1; | 91 | return -1; |
91 | } | 92 | } |
92 | 93 | ||
93 | if ((scancode & 0x80) != 0) | 94 | if ((scancode & 0x80) != 0) { |
95 | if (scancode == 0x9c) | ||
96 | kbd_last_ret = 0; | ||
94 | return -1; | 97 | return -1; |
98 | } | ||
95 | 99 | ||
96 | scancode &= 0x7f; | 100 | scancode &= 0x7f; |
97 | 101 | ||
@@ -178,35 +182,82 @@ int kdb_get_kbd_char(void) | |||
178 | return -1; /* ignore unprintables */ | 182 | return -1; /* ignore unprintables */ |
179 | } | 183 | } |
180 | 184 | ||
181 | if ((scancode & 0x7f) == 0x1c) { | 185 | if (scancode == 0x1c) { |
182 | /* | 186 | kbd_last_ret = 1; |
183 | * enter key. All done. Absorb the release scancode. | 187 | return 13; |
184 | */ | 188 | } |
189 | |||
190 | return keychar & 0xff; | ||
191 | } | ||
192 | EXPORT_SYMBOL_GPL(kdb_get_kbd_char); | ||
193 | |||
194 | /* | ||
195 | * Best effort cleanup of ENTER break codes on leaving KDB. Called on | ||
196 | * exiting KDB, when we know we processed an ENTER or KP ENTER scan | ||
197 | * code. | ||
198 | */ | ||
199 | void kdb_kbd_cleanup_state(void) | ||
200 | { | ||
201 | int scancode, scanstatus; | ||
202 | |||
203 | /* | ||
204 | * Nothing to clean up, since either | ||
205 | * ENTER was never pressed, or has already | ||
206 | * gotten cleaned up. | ||
207 | */ | ||
208 | if (!kbd_last_ret) | ||
209 | return; | ||
210 | |||
211 | kbd_last_ret = 0; | ||
212 | /* | ||
213 | * Enter key. Need to absorb the break code here, lest it gets | ||
214 | * leaked out if we exit KDB as the result of processing 'g'. | ||
215 | * | ||
216 | * This has several interesting implications: | ||
217 | * + Need to handle KP ENTER, which has break code 0xe0 0x9c. | ||
218 | * + Need to handle repeat ENTER and repeat KP ENTER. Repeats | ||
219 | * only get a break code at the end of the repeated | ||
220 | * sequence. This means we can't propagate the repeated key | ||
221 | * press, and must swallow it away. | ||
222 | * + Need to handle possible PS/2 mouse input. | ||
223 | * + Need to handle mashed keys. | ||
224 | */ | ||
225 | |||
226 | while (1) { | ||
185 | while ((inb(KBD_STATUS_REG) & KBD_STAT_OBF) == 0) | 227 | while ((inb(KBD_STATUS_REG) & KBD_STAT_OBF) == 0) |
186 | ; | 228 | cpu_relax(); |
187 | 229 | ||
188 | /* | 230 | /* |
189 | * Fetch the scancode | 231 | * Fetch the scancode. |
190 | */ | 232 | */ |
191 | scancode = inb(KBD_DATA_REG); | 233 | scancode = inb(KBD_DATA_REG); |
192 | scanstatus = inb(KBD_STATUS_REG); | 234 | scanstatus = inb(KBD_STATUS_REG); |
193 | 235 | ||
194 | while (scanstatus & KBD_STAT_MOUSE_OBF) { | 236 | /* |
195 | scancode = inb(KBD_DATA_REG); | 237 | * Skip mouse input. |
196 | scanstatus = inb(KBD_STATUS_REG); | 238 | */ |
197 | } | 239 | if (scanstatus & KBD_STAT_MOUSE_OBF) |
240 | continue; | ||
198 | 241 | ||
199 | if (scancode != 0x9c) { | 242 | /* |
200 | /* | 243 | * If we see 0xe0, this is either a break code for KP |
201 | * Wasn't an enter-release, why not? | 244 | * ENTER, or a repeat make for KP ENTER. Either way, |
202 | */ | 245 | * since the second byte is equivalent to an ENTER, |
203 | kdb_printf("kdb: expected enter got 0x%x status 0x%x\n", | 246 | * skip the 0xe0 and try again. |
204 | scancode, scanstatus); | 247 | * |
205 | } | 248 | * If we see 0x1c, this must be a repeat ENTER or KP |
249 | * ENTER (and we swallowed 0xe0 before). Try again. | ||
250 | * | ||
251 | * We can also see make and break codes for other keys | ||
252 | * mashed before or after pressing ENTER. Thus, if we | ||
253 | * see anything other than 0x9c, we have to try again. | ||
254 | * | ||
255 | * Note, if you held some key as ENTER was depressed, | ||
256 | * that break code would get leaked out. | ||
257 | */ | ||
258 | if (scancode != 0x9c) | ||
259 | continue; | ||
206 | 260 | ||
207 | return 13; | 261 | return; |
208 | } | 262 | } |
209 | |||
210 | return keychar & 0xff; | ||
211 | } | 263 | } |
212 | EXPORT_SYMBOL_GPL(kdb_get_kbd_char); | ||
diff --git a/kernel/debug/kdb/kdb_main.c b/kernel/debug/kdb/kdb_main.c index e2ae7349437f..67b847dfa2bb 100644 --- a/kernel/debug/kdb/kdb_main.c +++ b/kernel/debug/kdb/kdb_main.c | |||
@@ -1400,6 +1400,9 @@ int kdb_main_loop(kdb_reason_t reason, kdb_reason_t reason2, int error, | |||
1400 | if (KDB_STATE(DOING_SS)) | 1400 | if (KDB_STATE(DOING_SS)) |
1401 | KDB_STATE_CLEAR(SSBPT); | 1401 | KDB_STATE_CLEAR(SSBPT); |
1402 | 1402 | ||
1403 | /* Clean up any keyboard devices before leaving */ | ||
1404 | kdb_kbd_cleanup_state(); | ||
1405 | |||
1403 | return result; | 1406 | return result; |
1404 | } | 1407 | } |
1405 | 1408 | ||
diff --git a/kernel/debug/kdb/kdb_private.h b/kernel/debug/kdb/kdb_private.h index e381d105b40b..47c4e56e513b 100644 --- a/kernel/debug/kdb/kdb_private.h +++ b/kernel/debug/kdb/kdb_private.h | |||
@@ -246,6 +246,13 @@ extern void debug_kusage(void); | |||
246 | 246 | ||
247 | extern void kdb_set_current_task(struct task_struct *); | 247 | extern void kdb_set_current_task(struct task_struct *); |
248 | extern struct task_struct *kdb_current_task; | 248 | extern struct task_struct *kdb_current_task; |
249 | |||
250 | #ifdef CONFIG_KDB_KEYBOARD | ||
251 | extern void kdb_kbd_cleanup_state(void); | ||
252 | #else /* ! CONFIG_KDB_KEYBOARD */ | ||
253 | #define kdb_kbd_cleanup_state() | ||
254 | #endif /* ! CONFIG_KDB_KEYBOARD */ | ||
255 | |||
249 | #ifdef CONFIG_MODULES | 256 | #ifdef CONFIG_MODULES |
250 | extern struct list_head *kdb_modules; | 257 | extern struct list_head *kdb_modules; |
251 | #endif /* CONFIG_MODULES */ | 258 | #endif /* CONFIG_MODULES */ |