GDB(4) | MidnightBSD Kernel Interfaces Manual | GDB(4) |
gdb
— external
kernel debugger
makeoptions DEBUG=-g
options DDB
The gdb
kernel debugger is a variation of
gdb(1) which understands
some aspects of the FreeBSD kernel environment. It
can be used in a number of ways:
When used for remote debugging, gdb
requires the presence of the
ddb(4) kernel debugger.
Commands exist to switch between gdb
and
ddb(4).
When debugging kernels, it is practically essential to have built
a kernel with debugging symbols (makeoptions
DEBUG=-g
). It is easiest to perform operations from the kernel build
directory, by default
/usr/obj/usr/src/sys/GENERIC.
First, ensure you have a copy of the debug macros in the directory:
make gdbinit
This command performs some transformations on the macros installed in /usr/src/tools/debugscripts to adapt them to the local environment.
To look at and change the contents of the memory of the system you are running on,
gdb -k -wcore kernel.debug
/dev/mem
In this mode, you need the -k
flag to
indicate to gdb(1) that the
“dump file” /dev/mem is a kernel data
file. You can look at live data, and if you include the
-wcore
option, you can change it at your peril. The
system does not stop (obviously), so a number of things will not work. You
can set breakpoints, but you cannot “continue” execution, so
they will not work.
By default, crash dumps are stored in the directory /var/crash. Investigate them from the kernel build directory with:
gdb -k kernel.debug
/var/crash/vmcore.29
In this mode, the system is obviously stopped, so you can only look at it.
In the following discussion, the term “local system” refers to the system running the debugger, and “remote system” refers to the live system being debugged.
To debug a live system with a remote link, the kernel must be
compiled with the option options DDB
. The option
options BREAK_TO_DEBUGGER
enables the debugging
machine stop the debugged machine once a connection has been established by
pressing ‘^C
’.
When using a serial port for the remote link on the i386 platform,
the serial port must be identified by setting the flag bit
0x80
for the specified interface. Generally, this
port will also be used as a serial console (flag bit
0x10
), so the entry in
/boot/device.hints should be:
hint.sio.0.flags="0x90"
As with serial debugging, to debug a live system with a firewire
link, the kernel must be compiled with the option options
DDB
.
A number of steps must be performed to set up a firewire link:
kldload firewire
On the remote system only:
kldload dcons kldload dcons_crom
You should see something like this in the dmesg(8) output of the remote system:
fwohci0: BUS reset fwohci0: node_id=0x8800ffc0, gen=2, non CYCLEMASTER mode firewire0: 2 nodes, maxhop <= 1, cable IRM = 1 firewire0: bus manager 1 firewire0: New S400 device ID:00c04f3226e88061 dcons_crom0: <dcons configuration ROM> on firewire0 dcons_crom0: bus_addr 0x22a000
It is a good idea to load these modules at boot time with the following entry in /boot/loader.conf:
dcons_crom_enable="YES"
This ensures that all three modules are loaded. There is no harm in loading dcons(4) and dcons_crom(4) on the local system, but if you only want to load the firewire(4) module, include the following in /boot/loader.conf:
firewire_enable="YES"
# fwcontrol 2 devices (info_len=2) node EUI64 status 1 0x00c04f3226e88061 0 0 0x000199000003622b 1
The first node is always the local system, so in this case, node 0 is the remote system. If there are more than two systems, check from the other end to find which node corresponds to the remote system. On the remote machine, it looks like this:
# fwcontrol 2 devices (info_len=2) node EUI64 status 0 0x000199000003622b 0 1 0x00c04f3226e88061 1
dconschat -br -G 5556 -t
0x000199000003622b
0x000199000003622b
is the EUI64
address of the remote node, as determined from the output of
fwcontrol(8)
above. When started in this manner,
dconschat(8)
establishes a local tunnel connection from port
localhost:5556
to the remote debugger. You can
also establish a console port connection with the
-C
option to the same invocation
dconschat(8). See
the dconschat(8)
manpage for further details.
The dconschat(8) utility does not return control to the user. It displays error messages and console output for the remote system, so it is a good idea to start it in its own window.
# gdb kernel.debug GNU gdb 5.2.1 (FreeBSD) (political statements omitted) Ready to go. Enter 'tr' to connect to the remote target with /dev/cuau0, 'tr /dev/cuau1' to connect to a different port or 'trf portno' to connect to the remote target with the firewire interface. portno defaults to 5556. Type 'getsyms' after connection to load kld symbols. If you are debugging a local system, you can use 'kldsyms' instead to load the kld symbols. That is a less obnoxious interface. (gdb) trf 0xc21bd378 in ?? ()
The trf
macro assumes a connection on
port 5556. If you want to use a different port (by changing the
invocation of
dconschat(8)
above), use the tr
macro instead. For example,
if you want to use port 4711, run
dconschat(8) like
this:
dconschat -br -G 4711 -t
0x000199000003622b
Then establish connection with:
(gdb) tr localhost:4711 0xc21bd378 in ?? ()
In addition to the conventional debugging via firewire described in the previous section, it is possible to debug a remote system without its cooperation, once an initial connection has been established. This corresponds to debugging a local machine using /dev/mem. It can be very useful if a system crashes and the debugger no longer responds. To use this method, set the sysctl(8) variables hw.firewire.fwmem.eui64_hi and hw.firewire.fwmem.eui64_lo to the upper and lower halves of the EUI64 ID of the remote system, respectively. From the previous example, the remote machine shows:
# fwcontrol 2 devices (info_len=2) node EUI64 status 0 0x000199000003622b 0 1 0x00c04f3226e88061 1
Enter:
# sysctl -w hw.firewire.fwmem.eui64_hi=0x00019900 hw.firewire.fwmem.eui64_hi: 0 -> 104704 # sysctl -w hw.firewire.fwmem.eui64_lo=0x0003622b hw.firewire.fwmem.eui64_lo: 0 -> 221739
Note that the variables must be explicitly stated in hexadecimal. After this, you can examine the remote machine's state with the following input:
# gdb -k kernel.debug /dev/fwmem0.0 GNU gdb 5.2.1 (FreeBSD) (messages omitted) Reading symbols from /boot/kernel/dcons.ko...done. Loaded symbols for /boot/kernel/dcons.ko Reading symbols from /boot/kernel/dcons_crom.ko...done. Loaded symbols for /boot/kernel/dcons_crom.ko #0 sched_switch (td=0xc0922fe0) at /usr/src/sys/kern/sched_4bsd.c:621 0xc21bd378 in ?? ()
In this case, it is not necessary to load the symbols explicitly. The remote system continues to run.
The user interface to gdb
is via
gdb(1), so
gdb(1) commands also work.
This section discusses only the extensions for kernel debugging that get
installed in the kernel build directory.
The following macros manipulate the debugging environment:
ddb
getsyms
kldstat
information for the target machine
and invite user to paste it back in. This is required because
gdb
does not allow data to be passed to shell
scripts. It is necessary for remote debugging and crash dumps; for local
memory debugging use kldsyms
instead.kldsyms
getsyms
instead.tr
interfacetr0
tr1
trf
The commands tr0
,
tr1
and trf
are convenience
commands which invoke tr
.
The following macros are convenience functions intended to make things easier than the standard gdb(1) commands.
f0
f1
f2
f3
f4
f5
xb
xi
xp
xp0
xp1
xp2
xp3
xp4
xs
xxp
z
zs
The following macros access other processes. The
gdb
debugger does not understand the concept of
multiple processes, so they effectively bypass the entire
gdb
environment.
btp
pidbtpa
btpp
defproc
.btr
ebpdefproc
pidfr
framedefproc
.pcb
procYou can use standard gdb(1) commands to look at most data structures. The macros in this section are convenience functions which typically display the data in a more readable format, or which omit less interesting parts of the structure.
bp
bpd
bpl
bpp
bpbx
vdev
checkmem
options DIAGNOSTIC
. This
causes the contents of free memory to be set to
0xdeadc0de
.dmesg
msgbuf
. It can take a very
long time over a serial line, and it is even slower via firewire or local
memory due to inefficiencies in gdb
. When
debugging a crash dump or over firewire, it is not necessary to start
gdb
to access the message buffer: instead, use an
appropriate variation of
dmesg -M /var/crash/vmcore.0 -N kernel.debug dmesg -M /dev/fwmem0.0 -N kernel.debug
kldstat
pname
ps
gdb
to display the
ps(1) output: instead, use
an appropriate variation of
ps -M /var/crash/vmcore.0 -N kernel.debug ps -M /dev/fwmem0.0 -N kernel.debug
y
gdb
window. Unfortunately, if
the macro is already defined, gdb
insists on
asking
Redefine foo?
It will not give up until you answer
‘y
’. This command is that answer.
It does nothing else except to print a warning message to remind you to
remove it again.
gdb(1), ps(1), ddb(4), firewire(4), dconschat(8), dmesg(8), fwcontrol(8), kldload(8)
This man page was written by Greg Lehey <grog@FreeBSD.org>.
The gdb(1) debugger was never designed to debug kernels, and it is not a very good match. Many problems exist.
The gdb
implementation is very
inefficient, and many operations are slow.
Serial debugging is even slower, and race conditions can make it difficult to run the link at more than 9600 bps. Firewire connections do not have this problem.
The debugging macros “just grew.” In general, the person who wrote them did so while looking for a specific problem, so they may not be general enough, and they may behave badly when used in ways for which they were not intended, even if those ways make sense.
Many of these commands only work on the ia32 architecture.
May 17, 2016 | midnightbsd-3.1 |