blob: a710f36b048d80f131512b42c656f4bfb50cc7a4 [file] [log] [blame]
Willy Tarreau4e2b6462019-05-16 17:44:30 +02001/*
2 * Process debugging functions.
3 *
4 * Copyright 2000-2019 Willy Tarreau <willy@haproxy.org>.
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Willy Tarreauf5b4e062020-03-03 15:40:23 +010013
Willy Tarreau5be7c192022-01-24 20:26:09 +010014#include <errno.h>
Willy Tarreau368bff42019-12-06 17:18:28 +010015#include <fcntl.h>
Willy Tarreau4e2b6462019-05-16 17:44:30 +020016#include <signal.h>
17#include <time.h>
18#include <stdio.h>
Willy Tarreau6bdf3e92019-05-20 14:25:05 +020019#include <stdlib.h>
Willy Tarreauaeed4a82020-06-04 22:01:04 +020020#include <syslog.h>
Willy Tarreau5be7c192022-01-24 20:26:09 +010021#include <sys/stat.h>
Willy Tarreau368bff42019-12-06 17:18:28 +010022#include <sys/types.h>
23#include <sys/wait.h>
Willy Tarreau5be7c192022-01-24 20:26:09 +010024#include <unistd.h>
25#ifdef USE_EPOLL
26#include <sys/epoll.h>
27#endif
Willy Tarreau4e2b6462019-05-16 17:44:30 +020028
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020029#include <haproxy/api.h>
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +020030#include <haproxy/applet.h>
Willy Tarreau8dabda72020-05-27 17:22:10 +020031#include <haproxy/buf.h>
Willy Tarreau83487a82020-06-04 20:19:54 +020032#include <haproxy/cli.h>
Willy Tarreau55542642021-10-08 09:33:24 +020033#include <haproxy/clock.h>
Willy Tarreau2a83d602020-05-27 16:58:08 +020034#include <haproxy/debug.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020035#include <haproxy/fd.h>
36#include <haproxy/global.h>
Willy Tarreau86416052020-06-04 09:20:54 +020037#include <haproxy/hlua.h>
Willy Tarreaub7fc4c42021-10-06 18:56:42 +020038#include <haproxy/http_ana.h>
Willy Tarreauaeed4a82020-06-04 22:01:04 +020039#include <haproxy/log.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020040#include <haproxy/net_helper.h>
Willy Tarreau5edca2f2022-05-27 09:25:10 +020041#include <haproxy/sc_strm.h>
Willy Tarreaucb086c62022-05-27 09:47:12 +020042#include <haproxy/stconn.h>
Willy Tarreaucea0e1b2020-06-04 17:25:40 +020043#include <haproxy/task.h>
Willy Tarreau3f567e42020-05-28 15:29:19 +020044#include <haproxy/thread.h>
Willy Tarreau55542642021-10-08 09:33:24 +020045#include <haproxy/time.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020046#include <haproxy/tools.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020047#include <import/ist.h>
Willy Tarreau4e2b6462019-05-16 17:44:30 +020048
Willy Tarreau4e2b6462019-05-16 17:44:30 +020049
Willy Tarreauf0c86dd2022-07-15 13:14:03 +020050/* The dump state is made of:
51 * - num_thread on the lowest 15 bits
52 * - a SYNC flag on bit 15 (waiting for sync start)
53 * - number of participating threads on bits 16-30
54 * Initiating a dump consists in setting it to SYNC and incrementing the
55 * num_thread part when entering the function. The first thread periodically
56 * recounts active threads and compares it to the ready ones, and clears SYNC
57 * and sets the number of participants to the value found, which serves as a
58 * start signal. A thread finished dumping looks up the TID of the next active
59 * thread after it and writes it in the lowest part. If there's none, it sets
60 * the thread counter to the number of participants and resets that part,
61 * which serves as an end-of-dump signal. All threads decrement the num_thread
62 * part. Then all threads wait for the value to reach zero. Only used when
63 * USE_THREAD_DUMP is set.
Willy Tarreaua37cb182019-07-31 19:20:39 +020064 */
Willy Tarreauf0c86dd2022-07-15 13:14:03 +020065#define THREAD_DUMP_TMASK 0x00007FFFU
66#define THREAD_DUMP_FSYNC 0x00008000U
67#define THREAD_DUMP_PMASK 0x7FFF0000U
68
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +020069/* Points to a copy of the buffer where the dump functions should write, when
70 * non-null. It's only used by debuggers for core dump analysis.
71 */
72struct buffer *thread_dump_buffer = NULL;
Willy Tarreau9b013702019-10-24 18:18:02 +020073unsigned int debug_commands_issued = 0;
Willy Tarreaua37cb182019-07-31 19:20:39 +020074
Willy Tarreau123fc972021-01-22 13:52:41 +010075/* dumps a backtrace of the current thread that is appended to buffer <buf>.
76 * Lines are prefixed with the string <prefix> which may be empty (used for
77 * indenting). It is recommended to use this at a function's tail so that
Willy Tarreau2bfce7e2021-01-22 14:48:34 +010078 * the function does not appear in the call stack. The <dump> argument
79 * indicates what dump state to start from, and should usually be zero. It
80 * may be among the following values:
81 * - 0: search usual callers before step 1, or directly jump to 2
82 * - 1: skip usual callers before step 2
83 * - 2: dump until polling loop, scheduler, or main() (excluded)
84 * - 3: end
85 * - 4-7: like 0 but stops *after* main.
Willy Tarreau123fc972021-01-22 13:52:41 +010086 */
Willy Tarreau2bfce7e2021-01-22 14:48:34 +010087void ha_dump_backtrace(struct buffer *buf, const char *prefix, int dump)
Willy Tarreau123fc972021-01-22 13:52:41 +010088{
89 struct buffer bak;
90 char pfx2[100];
91 void *callers[100];
92 int j, nptrs;
93 const void *addr;
Willy Tarreau123fc972021-01-22 13:52:41 +010094
95 nptrs = my_backtrace(callers, sizeof(callers)/sizeof(*callers));
96 if (!nptrs)
97 return;
98
99 if (snprintf(pfx2, sizeof(pfx2), "%s| ", prefix) > sizeof(pfx2))
100 pfx2[0] = 0;
101
102 /* The call backtrace_symbols_fd(callers, nptrs, STDOUT_FILENO would
103 * produce similar output to the following:
104 */
105 chunk_appendf(buf, "%scall trace(%d):\n", prefix, nptrs);
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100106 for (j = 0; (j < nptrs || (dump & 3) < 2); j++) {
107 if (j == nptrs && !(dump & 3)) {
Willy Tarreau123fc972021-01-22 13:52:41 +0100108 /* we failed to spot the starting point of the
109 * dump, let's start over dumping everything we
110 * have.
111 */
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100112 dump += 2;
Willy Tarreau123fc972021-01-22 13:52:41 +0100113 j = 0;
114 }
115 bak = *buf;
116 dump_addr_and_bytes(buf, pfx2, callers[j], 8);
117 addr = resolve_sym_name(buf, ": ", callers[j]);
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100118 if ((dump & 3) == 0) {
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200119 /* dump not started, will start *after* ha_thread_dump_one(),
Willy Tarreaua8459b22021-01-22 14:12:27 +0100120 * ha_thread_dump_all_to_trash, ha_panic and ha_backtrace_to_stderr
Willy Tarreau123fc972021-01-22 13:52:41 +0100121 */
Willy Tarreaua8459b22021-01-22 14:12:27 +0100122 if (addr == ha_thread_dump_all_to_trash || addr == ha_panic ||
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200123 addr == ha_backtrace_to_stderr || addr == ha_thread_dump_one)
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100124 dump++;
Willy Tarreau123fc972021-01-22 13:52:41 +0100125 *buf = bak;
126 continue;
127 }
128
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100129 if ((dump & 3) == 1) {
Willy Tarreau123fc972021-01-22 13:52:41 +0100130 /* starting */
Willy Tarreaua8459b22021-01-22 14:12:27 +0100131 if (addr == ha_thread_dump_all_to_trash || addr == ha_panic ||
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200132 addr == ha_backtrace_to_stderr || addr == ha_thread_dump_one) {
Willy Tarreau123fc972021-01-22 13:52:41 +0100133 *buf = bak;
134 continue;
135 }
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100136 dump++;
Willy Tarreau123fc972021-01-22 13:52:41 +0100137 }
138
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100139 if ((dump & 3) == 2) {
140 /* still dumping */
141 if (dump == 6) {
142 /* we only stop *after* main and we must send the LF */
143 if (addr == main) {
144 j = nptrs;
145 dump++;
146 }
147 }
148 else if (addr == run_poll_loop || addr == main || addr == run_tasks_from_lists) {
149 dump++;
Willy Tarreau123fc972021-01-22 13:52:41 +0100150 *buf = bak;
151 break;
152 }
153 }
154 /* OK, line dumped */
155 chunk_appendf(buf, "\n");
156 }
157}
158
Willy Tarreaua8459b22021-01-22 14:12:27 +0100159/* dump a backtrace of current thread's stack to stderr. */
Willy Tarreau7831e022022-05-06 15:16:19 +0200160void ha_backtrace_to_stderr(void)
Willy Tarreaua8459b22021-01-22 14:12:27 +0100161{
162 char area[2048];
163 struct buffer b = b_make(area, sizeof(area), 0, 0);
164
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100165 ha_dump_backtrace(&b, " ", 4);
Willy Tarreaua8459b22021-01-22 14:12:27 +0100166 if (b.data)
Willy Tarreau2cbe2e72021-01-22 15:58:26 +0100167 DISGUISE(write(2, b.area, b.data));
Willy Tarreaua8459b22021-01-22 14:12:27 +0100168}
169
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200170/* Dumps to the thread's buffer some known information for the desired thread,
171 * and optionally extra info when it's safe to do so (current thread or
172 * isolated). The dump will be appended to the buffer, so the caller is
173 * responsible for preliminary initializing it. The <from_signal> argument will
174 * indicate if the function is called from the debug signal handler, indicating
175 * the thread was dumped upon request from another one, otherwise if the thread
176 * it the current one, a star ('*') will be displayed in front of the thread to
177 * indicate the requesting one. Any stuck thread is also prefixed with a '>'.
178 * The caller is responsible for atomically setting up the thread's dump buffer
179 * to point to a valid buffer with enough room. Output will be truncated if it
180 * does not fit. When the dump is complete, the dump buffer will be switched to
181 * (void*)0x1 that the caller must turn to 0x0 once the contents are collected.
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200182 */
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200183void ha_thread_dump_one(int thr, int from_signal)
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200184{
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200185 struct buffer *buf = HA_ATOMIC_LOAD(&ha_thread_ctx[thr].thread_dump_buffer);
Willy Tarreau38d07122022-06-27 16:13:50 +0200186 unsigned long thr_bit = ha_thread_info[thr].ltid_bit;
Willy Tarreau45c38e22021-09-30 18:28:49 +0200187 unsigned long long p = ha_thread_ctx[thr].prev_cpu_time;
Willy Tarreau21694982021-10-08 15:09:17 +0200188 unsigned long long n = now_cpu_time_thread(thr);
Willy Tarreaua0b99532021-09-30 18:48:37 +0200189 int stuck = !!(ha_thread_ctx[thr].flags & TH_FL_STUCK);
Willy Tarreau03f9b352022-06-27 16:02:24 +0200190 int tgrp = ha_thread_info[thr].tgid;
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200191
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200192 chunk_appendf(buf,
Willy Tarreauf0e5da22020-05-01 12:26:03 +0200193 "%c%cThread %-2u: id=0x%llx act=%d glob=%d wq=%d rq=%d tl=%d tlsz=%d rqsz=%d\n"
Willy Tarreaua3870b72021-09-13 19:24:47 +0200194 " %2u/%-2u stuck=%d prof=%d",
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200195 (thr == tid && !from_signal) ? '*' : ' ', stuck ? '>' : ' ', thr + 1,
Willy Tarreauff64d3b2020-05-01 11:28:49 +0200196 ha_get_pthread_id(thr),
Olivier Houchardcfbb3e62019-05-29 19:22:43 +0200197 thread_has_tasks(),
Willy Tarreauc958c702022-06-16 15:59:36 +0200198 !eb_is_empty(&ha_thread_ctx[thr].rqueue_shared),
Willy Tarreau1a9c9222021-10-01 11:30:33 +0200199 !eb_is_empty(&ha_thread_ctx[thr].timers),
200 !eb_is_empty(&ha_thread_ctx[thr].rqueue),
201 !(LIST_ISEMPTY(&ha_thread_ctx[thr].tasklets[TL_URGENT]) &&
202 LIST_ISEMPTY(&ha_thread_ctx[thr].tasklets[TL_NORMAL]) &&
203 LIST_ISEMPTY(&ha_thread_ctx[thr].tasklets[TL_BULK]) &&
204 MT_LIST_ISEMPTY(&ha_thread_ctx[thr].shared_tasklet_list)),
205 ha_thread_ctx[thr].tasks_in_list,
206 ha_thread_ctx[thr].rq_total,
Willy Tarreau66ad98a2022-06-28 10:49:57 +0200207 ha_thread_info[thr].tgid, ha_thread_info[thr].ltid + 1,
Willy Tarreaue6a02fa2019-05-22 07:06:44 +0200208 stuck,
Willy Tarreaub30ced32023-05-04 11:30:55 +0200209 !!(ha_thread_ctx[thr].flags & TH_FL_TASK_PROFILING));
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200210
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200211 chunk_appendf(buf,
Willy Tarreaub30ced32023-05-04 11:30:55 +0200212 " harmless=%d isolated=%d",
Willy Tarreau03f9b352022-06-27 16:02:24 +0200213 !!(_HA_ATOMIC_LOAD(&ha_tgroup_ctx[tgrp-1].threads_harmless) & thr_bit),
Willy Tarreaub30ced32023-05-04 11:30:55 +0200214 isolated_thread == thr);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200215
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200216 chunk_appendf(buf, "\n");
Willy Tarreau9c8800a2019-05-20 20:52:20 +0200217 chunk_appendf(buf, " cpu_ns: poll=%llu now=%llu diff=%llu\n", p, n, n-p);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200218
Willy Tarreaua3870b72021-09-13 19:24:47 +0200219 /* this is the end of what we can dump from outside the current thread */
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200220
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200221 if (thr != tid && !thread_isolated())
222 goto leave;
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200223
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200224 chunk_appendf(buf, " curr_task=");
Willy Tarreau1a9c9222021-10-01 11:30:33 +0200225 ha_task_dump(buf, th_ctx->current, " ");
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100226
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200227 if (stuck && thr == tid) {
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100228 /* We only emit the backtrace for stuck threads in order not to
229 * waste precious output buffer space with non-interesting data.
Willy Tarreau123fc972021-01-22 13:52:41 +0100230 * Please leave this as the last instruction in this function
231 * so that the compiler uses tail merging and the current
232 * function does not appear in the stack.
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100233 */
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100234 ha_dump_backtrace(buf, " ", 0);
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100235 }
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200236 leave:
237 /* end of dump, setting the buffer to 0x1 will tell the caller we're done */
238 HA_ATOMIC_STORE(&ha_thread_ctx[thr].thread_dump_buffer, (void*)0x1UL);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200239}
240
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200241/* Triggers a thread dump from thread <thr>, either directly if it's the
242 * current thread or if thread dump signals are not implemented, or by sending
243 * a signal if it's a remote one and the feature is supported. The buffer <buf>
244 * will get the dump appended, and the caller is responsible for making sure
245 * there is enough room otherwise some contents will be truncated.
246 */
247void ha_thread_dump(struct buffer *buf, int thr)
248{
249 struct buffer *old = NULL;
250
251 /* try to impose our dump buffer and to reserve the target thread's
252 * next dump for us.
253 */
254 do {
255 if (old)
256 ha_thread_relax();
257 old = NULL;
258 } while (!HA_ATOMIC_CAS(&ha_thread_ctx[thr].thread_dump_buffer, &old, buf));
259
260#ifdef USE_THREAD_DUMP
261 /* asking the remote thread to dump itself allows to get more details
262 * including a backtrace.
263 */
264 if (thr != tid)
265 ha_tkill(thr, DEBUGSIG);
266 else
267#endif
268 ha_thread_dump_one(thr, thr != tid);
269
270 /* now wait for the dump to be done, and release it */
271 do {
272 if (old)
273 ha_thread_relax();
274 old = (void*)0x01;
275 } while (!HA_ATOMIC_CAS(&ha_thread_ctx[thr].thread_dump_buffer, &old, 0));
276}
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200277
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200278/* dumps into the buffer some information related to task <task> (which may
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200279 * either be a task or a tasklet, and prepend each line except the first one
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200280 * with <pfx>. The buffer is only appended and the first output starts by the
281 * pointer itself. The caller is responsible for making sure the task is not
282 * going to vanish during the dump.
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200283 */
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200284void ha_task_dump(struct buffer *buf, const struct task *task, const char *pfx)
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200285{
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200286 const struct stream *s = NULL;
Willy Tarreaua512b022019-08-21 14:12:19 +0200287 const struct appctx __maybe_unused *appctx = NULL;
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200288 struct hlua __maybe_unused *hlua = NULL;
Willy Tarreau52f238d2022-07-15 12:08:40 +0200289 const struct stconn *sc;
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200290
Willy Tarreau14a1ab72019-05-17 10:34:25 +0200291 if (!task) {
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200292 chunk_appendf(buf, "0\n");
Willy Tarreau231ec392019-05-17 10:39:47 +0200293 return;
294 }
295
Willy Tarreau20db9112019-05-17 14:14:35 +0200296 if (TASK_IS_TASKLET(task))
297 chunk_appendf(buf,
298 "%p (tasklet) calls=%u\n",
299 task,
300 task->calls);
301 else
302 chunk_appendf(buf,
303 "%p (task) calls=%u last=%llu%s\n",
304 task,
305 task->calls,
Willy Tarreau04e50b32022-09-07 14:49:50 +0200306 task->wake_date ? (unsigned long long)(now_mono_time() - task->wake_date) : 0,
307 task->wake_date ? " ns ago" : "");
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200308
Willy Tarreau2e89b092020-03-03 17:13:02 +0100309 chunk_appendf(buf, "%s fct=%p(", pfx, task->process);
310 resolve_sym_name(buf, NULL, task->process);
311 chunk_appendf(buf,") ctx=%p", task->context);
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200312
Willy Tarreaua512b022019-08-21 14:12:19 +0200313 if (task->process == task_run_applet && (appctx = task->context))
314 chunk_appendf(buf, "(%s)\n", appctx->applet->name);
315 else
316 chunk_appendf(buf, "\n");
317
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200318 if (task->process == process_stream && task->context)
319 s = (struct stream *)task->context;
Willy Tarreau52f238d2022-07-15 12:08:40 +0200320 else if (task->process == task_run_applet && task->context && (sc = appctx_sc((struct appctx *)task->context)))
321 s = sc_strm(sc);
Willy Tarreau462b9892022-05-18 18:06:53 +0200322 else if (task->process == sc_conn_io_cb && task->context)
Willy Tarreauea27f482022-05-18 16:10:52 +0200323 s = sc_strm(((struct stconn *)task->context));
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200324
325 if (s)
326 stream_dump(buf, s, pfx, '\n');
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200327
328#ifdef USE_LUA
329 hlua = NULL;
330 if (s && (hlua = s->hlua)) {
331 chunk_appendf(buf, "%sCurrent executing Lua from a stream analyser -- ", pfx);
332 }
333 else if (task->process == hlua_process_task && (hlua = task->context)) {
334 chunk_appendf(buf, "%sCurrent executing a Lua task -- ", pfx);
335 }
336 else if (task->process == task_run_applet && (appctx = task->context) &&
Willy Tarreaue23f33b2022-05-06 14:07:13 +0200337 (appctx->applet->fct == hlua_applet_tcp_fct)) {
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200338 chunk_appendf(buf, "%sCurrent executing a Lua TCP service -- ", pfx);
339 }
340 else if (task->process == task_run_applet && (appctx = task->context) &&
Willy Tarreauaa229cc2022-05-06 14:26:10 +0200341 (appctx->applet->fct == hlua_applet_http_fct)) {
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200342 chunk_appendf(buf, "%sCurrent executing a Lua HTTP service -- ", pfx);
343 }
344
Christopher Faulet471425f2020-07-24 19:08:05 +0200345 if (hlua && hlua->T) {
Christopher Fauletcc2c4f82021-03-24 14:52:24 +0100346 chunk_appendf(buf, "stack traceback:\n ");
347 append_prefixed_str(buf, hlua_traceback(hlua->T, "\n "), pfx, '\n', 0);
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200348 }
Willy Tarreaucb01f5d2023-05-04 16:28:30 +0200349
350 /* we may need to terminate the current line */
351 if (*b_peek(buf, b_data(buf)-1) != '\n')
Christopher Faulet471425f2020-07-24 19:08:05 +0200352 b_putchr(buf, '\n');
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200353#endif
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200354}
355
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200356/* This function dumps all profiling settings. It returns 0 if the output
357 * buffer is full and it needs to be called again, otherwise non-zero.
358 */
359static int cli_io_handler_show_threads(struct appctx *appctx)
360{
Willy Tarreauc12b3212022-05-27 11:08:15 +0200361 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200362 int thr;
363
Christopher Faulet87633c32023-04-03 18:32:50 +0200364 /* FIXME: Don't watch the other side !*/
Christopher Faulet208c7122023-04-13 16:16:15 +0200365 if (unlikely(sc_opposite(sc)->flags & SC_FL_SHUT_DONE))
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200366 return 1;
367
368 if (appctx->st0)
369 thr = appctx->st1;
370 else
371 thr = 0;
372
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200373 chunk_reset(&trash);
Willy Tarreauc7091d82019-05-17 10:08:49 +0200374 ha_thread_dump_all_to_trash();
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200375
Willy Tarreaud0a06d52022-05-18 15:07:19 +0200376 if (applet_putchk(appctx, &trash) == -1) {
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200377 /* failed, try again */
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200378 appctx->st1 = thr;
379 return 0;
380 }
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200381 return 1;
382}
383
Willy Tarreau6ab7b212021-12-28 09:57:10 +0100384#if defined(HA_HAVE_DUMP_LIBS)
385/* parse a "show libs" command. It returns 1 if it emits anything otherwise zero. */
386static int debug_parse_cli_show_libs(char **args, char *payload, struct appctx *appctx, void *private)
387{
388 if (!cli_has_level(appctx, ACCESS_LVL_OPER))
389 return 1;
390
391 chunk_reset(&trash);
392 if (dump_libs(&trash, 1))
393 return cli_msg(appctx, LOG_INFO, trash.area);
394 else
395 return 0;
396}
397#endif
398
Willy Tarreau880d1682023-05-04 18:52:51 +0200399/* Dumps a state of all threads into the trash and on fd #2, then aborts.
400 * A copy will be put into a trash chunk that's assigned to thread_dump_buffer
401 * so that the debugger can easily find it. This buffer might be truncated if
402 * too many threads are being dumped, but at least we'll dump them all on stderr.
403 * If thread_dump_buffer is set, it means that a panic has already begun.
404 */
Willy Tarreau56131ca2019-05-20 13:48:29 +0200405void ha_panic()
406{
Willy Tarreau880d1682023-05-04 18:52:51 +0200407 struct buffer *old;
408 unsigned int thr;
409
410 old = NULL;
411 if (!HA_ATOMIC_CAS(&thread_dump_buffer, &old, get_trash_chunk())) {
Willy Tarreau55433f92022-07-15 12:48:58 +0200412 /* a panic dump is already in progress, let's not disturb it,
413 * we'll be called via signal DEBUGSIG. By returning we may be
414 * able to leave a current signal handler (e.g. WDT) so that
415 * this will ensure more reliable signal delivery.
416 */
417 return;
418 }
Willy Tarreau880d1682023-05-04 18:52:51 +0200419
Willy Tarreau56131ca2019-05-20 13:48:29 +0200420 chunk_reset(&trash);
Willy Tarreaua9f9fc92019-05-20 17:45:35 +0200421 chunk_appendf(&trash, "Thread %u is about to kill the process.\n", tid + 1);
Willy Tarreau880d1682023-05-04 18:52:51 +0200422
423 for (thr = 0; thr < global.nbthread; thr++) {
424 ha_thread_dump(&trash, thr);
425 DISGUISE(write(2, trash.area, trash.data));
426 b_force_xfer(thread_dump_buffer, &trash, b_room(thread_dump_buffer));
427 chunk_reset(&trash);
428 }
429
Willy Tarreau56131ca2019-05-20 13:48:29 +0200430 for (;;)
431 abort();
432}
433
Willy Tarreau06e66c82022-03-02 15:52:03 +0100434/* Complain with message <msg> on stderr. If <counter> is not NULL, it is
435 * atomically incremented, and the message is only printed when the counter
436 * was zero, so that the message is only printed once. <taint> is only checked
437 * on bit 1, and will taint the process either for a bug (2) or warn (0).
438 */
439void complain(int *counter, const char *msg, int taint)
440{
441 if (counter && _HA_ATOMIC_FETCH_ADD(counter, 1))
442 return;
443 DISGUISE(write(2, msg, strlen(msg)));
444 if (taint & 2)
445 mark_tainted(TAINTED_BUG);
446 else
447 mark_tainted(TAINTED_WARN);
448}
449
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200450/* parse a "debug dev exit" command. It always returns 1, though it should never return. */
451static int debug_parse_cli_exit(char **args, char *payload, struct appctx *appctx, void *private)
452{
453 int code = atoi(args[3]);
454
455 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
456 return 1;
457
Willy Tarreau4781b152021-04-06 13:53:36 +0200458 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200459 exit(code);
460 return 1;
461}
462
Willy Tarreau5baf4fe2021-01-22 14:15:46 +0100463/* parse a "debug dev bug" command. It always returns 1, though it should never return.
464 * Note: we make sure not to make the function static so that it appears in the trace.
465 */
466int debug_parse_cli_bug(char **args, char *payload, struct appctx *appctx, void *private)
467{
468 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
469 return 1;
470
Willy Tarreau4781b152021-04-06 13:53:36 +0200471 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau5baf4fe2021-01-22 14:15:46 +0100472 BUG_ON(one > zero);
473 return 1;
474}
475
Willy Tarreau305cfbd2022-02-25 08:52:39 +0100476/* parse a "debug dev warn" command. It always returns 1.
477 * Note: we make sure not to make the function static so that it appears in the trace.
478 */
479int debug_parse_cli_warn(char **args, char *payload, struct appctx *appctx, void *private)
480{
481 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
482 return 1;
483
484 _HA_ATOMIC_INC(&debug_commands_issued);
485 WARN_ON(one > zero);
486 return 1;
487}
488
Willy Tarreau6d3f1e32022-02-28 11:51:23 +0100489/* parse a "debug dev check" command. It always returns 1.
Willy Tarreau4e0a8b12022-02-25 08:55:11 +0100490 * Note: we make sure not to make the function static so that it appears in the trace.
491 */
Willy Tarreau6d3f1e32022-02-28 11:51:23 +0100492int debug_parse_cli_check(char **args, char *payload, struct appctx *appctx, void *private)
Willy Tarreau4e0a8b12022-02-25 08:55:11 +0100493{
494 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
495 return 1;
496
497 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6d3f1e32022-02-28 11:51:23 +0100498 CHECK_IF(one > zero);
Willy Tarreau4e0a8b12022-02-25 08:55:11 +0100499 return 1;
500}
501
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200502/* parse a "debug dev close" command. It always returns 1. */
503static int debug_parse_cli_close(char **args, char *payload, struct appctx *appctx, void *private)
504{
505 int fd;
506
507 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
508 return 1;
509
Willy Tarreau9d008692019-08-09 11:21:01 +0200510 if (!*args[3])
511 return cli_err(appctx, "Missing file descriptor number.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200512
513 fd = atoi(args[3]);
Willy Tarreau9d008692019-08-09 11:21:01 +0200514 if (fd < 0 || fd >= global.maxsock)
515 return cli_err(appctx, "File descriptor out of range.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200516
Willy Tarreau9d008692019-08-09 11:21:01 +0200517 if (!fdtab[fd].owner)
518 return cli_msg(appctx, LOG_INFO, "File descriptor was already closed.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200519
Willy Tarreau4781b152021-04-06 13:53:36 +0200520 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200521 fd_delete(fd);
522 return 1;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200523}
524
Willy Tarreaudadf00e2022-07-15 08:25:03 +0200525/* this is meant to cause a deadlock when more than one task is running it or when run twice */
526static struct task *debug_run_cli_deadlock(struct task *task, void *ctx, unsigned int state)
527{
528 static HA_SPINLOCK_T lock __maybe_unused;
529
530 HA_SPIN_LOCK(OTHER_LOCK, &lock);
531 return NULL;
532}
533
534/* parse a "debug dev deadlock" command. It always returns 1. */
535static int debug_parse_cli_deadlock(char **args, char *payload, struct appctx *appctx, void *private)
536{
537 int tasks;
538
539 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
540 return 1;
541
542 _HA_ATOMIC_INC(&debug_commands_issued);
543 for (tasks = atoi(args[3]); tasks > 0; tasks--) {
544 struct task *t = task_new_on(tasks % global.nbthread);
545 if (!t)
546 continue;
547 t->process = debug_run_cli_deadlock;
548 t->context = NULL;
549 task_wakeup(t, TASK_WOKEN_INIT);
550 }
551
552 return 1;
553}
554
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200555/* parse a "debug dev delay" command. It always returns 1. */
556static int debug_parse_cli_delay(char **args, char *payload, struct appctx *appctx, void *private)
557{
558 int delay = atoi(args[3]);
559
560 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
561 return 1;
562
Willy Tarreau4781b152021-04-06 13:53:36 +0200563 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200564 usleep((long)delay * 1000);
565 return 1;
566}
567
568/* parse a "debug dev log" command. It always returns 1. */
569static int debug_parse_cli_log(char **args, char *payload, struct appctx *appctx, void *private)
570{
571 int arg;
572
573 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
574 return 1;
575
Willy Tarreau4781b152021-04-06 13:53:36 +0200576 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200577 chunk_reset(&trash);
578 for (arg = 3; *args[arg]; arg++) {
579 if (arg > 3)
580 chunk_strcat(&trash, " ");
581 chunk_strcat(&trash, args[arg]);
582 }
583
584 send_log(NULL, LOG_INFO, "%s\n", trash.area);
585 return 1;
586}
587
588/* parse a "debug dev loop" command. It always returns 1. */
589static int debug_parse_cli_loop(char **args, char *payload, struct appctx *appctx, void *private)
590{
591 struct timeval deadline, curr;
592 int loop = atoi(args[3]);
Willy Tarreaue5e62232023-05-04 11:50:26 +0200593 int isolate;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200594
595 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
596 return 1;
597
Willy Tarreaue5e62232023-05-04 11:50:26 +0200598 isolate = strcmp(args[4], "isolated") == 0;
599
Willy Tarreau4781b152021-04-06 13:53:36 +0200600 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200601 gettimeofday(&curr, NULL);
602 tv_ms_add(&deadline, &curr, loop);
603
Willy Tarreaue5e62232023-05-04 11:50:26 +0200604 if (isolate)
605 thread_isolate();
606
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200607 while (tv_ms_cmp(&curr, &deadline) < 0)
608 gettimeofday(&curr, NULL);
609
Willy Tarreaue5e62232023-05-04 11:50:26 +0200610 if (isolate)
611 thread_release();
612
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200613 return 1;
614}
615
616/* parse a "debug dev panic" command. It always returns 1, though it should never return. */
617static int debug_parse_cli_panic(char **args, char *payload, struct appctx *appctx, void *private)
618{
619 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
620 return 1;
621
Willy Tarreau4781b152021-04-06 13:53:36 +0200622 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200623 ha_panic();
624 return 1;
625}
626
627/* parse a "debug dev exec" command. It always returns 1. */
Willy Tarreaub24ab222019-10-24 18:03:39 +0200628#if defined(DEBUG_DEV)
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200629static int debug_parse_cli_exec(char **args, char *payload, struct appctx *appctx, void *private)
630{
Willy Tarreau368bff42019-12-06 17:18:28 +0100631 int pipefd[2];
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200632 int arg;
Willy Tarreau368bff42019-12-06 17:18:28 +0100633 int pid;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200634
635 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
636 return 1;
637
Willy Tarreau4781b152021-04-06 13:53:36 +0200638 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200639 chunk_reset(&trash);
640 for (arg = 3; *args[arg]; arg++) {
641 if (arg > 3)
642 chunk_strcat(&trash, " ");
643 chunk_strcat(&trash, args[arg]);
644 }
645
Willy Tarreau368bff42019-12-06 17:18:28 +0100646 thread_isolate();
647 if (pipe(pipefd) < 0)
648 goto fail_pipe;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200649
Willy Tarreau38247432022-04-26 10:24:14 +0200650 if (fd_set_cloexec(pipefd[0]) == -1)
Willy Tarreau368bff42019-12-06 17:18:28 +0100651 goto fail_fcntl;
652
Willy Tarreau38247432022-04-26 10:24:14 +0200653 if (fd_set_cloexec(pipefd[1]) == -1)
Willy Tarreau368bff42019-12-06 17:18:28 +0100654 goto fail_fcntl;
655
656 pid = fork();
657
658 if (pid < 0)
659 goto fail_fork;
660 else if (pid == 0) {
661 /* child */
662 char *cmd[4] = { "/bin/sh", "-c", 0, 0 };
663
664 close(0);
665 dup2(pipefd[1], 1);
666 dup2(pipefd[1], 2);
667
668 cmd[2] = trash.area;
669 execvp(cmd[0], cmd);
670 printf("execvp() failed\n");
671 exit(1);
672 }
673
674 /* parent */
675 thread_release();
676 close(pipefd[1]);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200677 chunk_reset(&trash);
678 while (1) {
Willy Tarreau368bff42019-12-06 17:18:28 +0100679 size_t ret = read(pipefd[0], trash.area + trash.data, trash.size - 20 - trash.data);
680 if (ret <= 0)
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200681 break;
682 trash.data += ret;
683 if (trash.data + 20 == trash.size) {
684 chunk_strcat(&trash, "\n[[[TRUNCATED]]]\n");
685 break;
686 }
687 }
Willy Tarreau368bff42019-12-06 17:18:28 +0100688 close(pipefd[0]);
689 waitpid(pid, NULL, WNOHANG);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200690 trash.area[trash.data] = 0;
Willy Tarreau9d008692019-08-09 11:21:01 +0200691 return cli_msg(appctx, LOG_INFO, trash.area);
Willy Tarreau368bff42019-12-06 17:18:28 +0100692
693 fail_fork:
694 fail_fcntl:
695 close(pipefd[0]);
696 close(pipefd[1]);
697 fail_pipe:
698 thread_release();
699 return cli_err(appctx, "Failed to execute command.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200700}
Willy Tarreaubd3b44e2023-03-09 08:25:01 +0100701
702/* handles SIGRTMAX to inject random delays on the receiving thread in order
703 * to try to increase the likelihood to reproduce inter-thread races. The
704 * signal is periodically sent by a task initiated by "debug dev delay-inj".
705 */
706void debug_delay_inj_sighandler(int sig, siginfo_t *si, void *arg)
707{
708 volatile int i = statistical_prng_range(10000);
709
710 while (i--)
711 __ha_cpu_relax();
712}
Willy Tarreaub24ab222019-10-24 18:03:39 +0200713#endif
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200714
715/* parse a "debug dev hex" command. It always returns 1. */
716static int debug_parse_cli_hex(char **args, char *payload, struct appctx *appctx, void *private)
717{
718 unsigned long start, len;
719
720 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
721 return 1;
722
Willy Tarreau9d008692019-08-09 11:21:01 +0200723 if (!*args[3])
724 return cli_err(appctx, "Missing memory address to dump from.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200725
726 start = strtoul(args[3], NULL, 0);
Willy Tarreau9d008692019-08-09 11:21:01 +0200727 if (!start)
728 return cli_err(appctx, "Will not dump from NULL address.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200729
Willy Tarreau4781b152021-04-06 13:53:36 +0200730 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau9b013702019-10-24 18:18:02 +0200731
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200732 /* by default, dump ~128 till next block of 16 */
733 len = strtoul(args[4], NULL, 0);
734 if (!len)
735 len = ((start + 128) & -16) - start;
736
737 chunk_reset(&trash);
Willy Tarreau37101052019-05-20 16:48:20 +0200738 dump_hex(&trash, " ", (const void *)start, len, 1);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200739 trash.area[trash.data] = 0;
Willy Tarreau9d008692019-08-09 11:21:01 +0200740 return cli_msg(appctx, LOG_INFO, trash.area);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200741}
742
Willy Tarreau48129be2021-05-04 18:40:50 +0200743/* parse a "debug dev sym <addr>" command. It always returns 1. */
744static int debug_parse_cli_sym(char **args, char *payload, struct appctx *appctx, void *private)
745{
746 unsigned long addr;
747
748 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
749 return 1;
750
751 if (!*args[3])
752 return cli_err(appctx, "Missing memory address to be resolved.\n");
753
754 _HA_ATOMIC_INC(&debug_commands_issued);
755
756 addr = strtoul(args[3], NULL, 0);
757 chunk_printf(&trash, "%#lx resolves to ", addr);
758 resolve_sym_name(&trash, NULL, (const void *)addr);
759 chunk_appendf(&trash, "\n");
760
761 return cli_msg(appctx, LOG_INFO, trash.area);
762}
763
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200764/* parse a "debug dev tkill" command. It always returns 1. */
765static int debug_parse_cli_tkill(char **args, char *payload, struct appctx *appctx, void *private)
766{
767 int thr = 0;
768 int sig = SIGABRT;
769
770 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
771 return 1;
772
773 if (*args[3])
774 thr = atoi(args[3]);
775
Willy Tarreau9d008692019-08-09 11:21:01 +0200776 if (thr < 0 || thr > global.nbthread)
777 return cli_err(appctx, "Thread number out of range (use 0 for current).\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200778
779 if (*args[4])
780 sig = atoi(args[4]);
781
Willy Tarreau4781b152021-04-06 13:53:36 +0200782 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200783 if (thr)
Willy Tarreaufade80d2019-05-22 08:46:59 +0200784 ha_tkill(thr - 1, sig);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200785 else
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200786 raise(sig);
787 return 1;
788}
789
Erwan Le Goas54966df2022-09-14 17:24:22 +0200790/* hashes 'word' in "debug dev hash 'word' ". */
791static int debug_parse_cli_hash(char **args, char *payload, struct appctx *appctx, void *private)
792{
793 char *msg = NULL;
794
795 cli_dynmsg(appctx, LOG_INFO, memprintf(&msg, "%s\n", HA_ANON_CLI(args[3])));
796 return 1;
797}
798
Willy Tarreau6cbe62b2020-03-05 17:16:24 +0100799/* parse a "debug dev write" command. It always returns 1. */
800static int debug_parse_cli_write(char **args, char *payload, struct appctx *appctx, void *private)
801{
802 unsigned long len;
803
804 if (!*args[3])
805 return cli_err(appctx, "Missing output size.\n");
806
807 len = strtoul(args[3], NULL, 0);
808 if (len >= trash.size)
809 return cli_err(appctx, "Output too large, must be <tune.bufsize.\n");
810
Willy Tarreau4781b152021-04-06 13:53:36 +0200811 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6cbe62b2020-03-05 17:16:24 +0100812
813 chunk_reset(&trash);
814 trash.data = len;
815 memset(trash.area, '.', trash.data);
816 trash.area[trash.data] = 0;
817 for (len = 64; len < trash.data; len += 64)
818 trash.area[len] = '\n';
819 return cli_msg(appctx, LOG_INFO, trash.area);
820}
821
Willy Tarreau68680bb2019-10-23 17:23:25 +0200822/* parse a "debug dev stream" command */
823/*
824 * debug dev stream [strm=<ptr>] [strm.f[{+-=}<flags>]] [txn.f[{+-=}<flags>]] \
825 * [req.f[{+-=}<flags>]] [res.f[{+-=}<flags>]] \
826 * [sif.f[{+-=<flags>]] [sib.f[{+-=<flags>]] \
827 * [sif.s[=<state>]] [sib.s[=<state>]]
828 */
829static int debug_parse_cli_stream(char **args, char *payload, struct appctx *appctx, void *private)
830{
Willy Tarreau0698c802022-05-11 14:09:57 +0200831 struct stream *s = appctx_strm(appctx);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200832 int arg;
833 void *ptr;
834 int size;
835 const char *word, *end;
836 struct ist name;
837 char *msg = NULL;
838 char *endarg;
839 unsigned long long old, new;
840
841 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
842 return 1;
843
844 ptr = NULL; size = 0;
845
846 if (!*args[3]) {
847 return cli_err(appctx,
Willy Tarreaudd014482023-05-02 16:37:13 +0200848 "Usage: debug dev stream [ strm=<ptr> ] { <obj> <op> <value> | wake }*\n"
849 " <obj> = { strm.f | strm.x | scf.s | scb.s | txn.f | req.f | res.f }\n"
Willy Tarreau68680bb2019-10-23 17:23:25 +0200850 " <op> = {'' (show) | '=' (assign) | '^' (xor) | '+' (or) | '-' (andnot)}\n"
851 " <value> = 'now' | 64-bit dec/hex integer (0x prefix supported)\n"
852 " 'wake' wakes the stream asssigned to 'strm' (default: current)\n"
853 );
854 }
855
Willy Tarreau4781b152021-04-06 13:53:36 +0200856 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200857 for (arg = 3; *args[arg]; arg++) {
858 old = 0;
859 end = word = args[arg];
860 while (*end && *end != '=' && *end != '^' && *end != '+' && *end != '-')
861 end++;
862 name = ist2(word, end - word);
863 if (isteq(name, ist("strm"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200864 ptr = (!s || !may_access(s)) ? NULL : &s; size = sizeof(s);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200865 } else if (isteq(name, ist("strm.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200866 ptr = (!s || !may_access(s)) ? NULL : &s->flags; size = sizeof(s->flags);
Christopher Fauletae024ce2022-03-29 19:02:31 +0200867 } else if (isteq(name, ist("strm.x"))) {
868 ptr = (!s || !may_access(s)) ? NULL : &s->conn_exp; size = sizeof(s->conn_exp);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200869 } else if (isteq(name, ist("txn.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200870 ptr = (!s || !may_access(s)) ? NULL : &s->txn->flags; size = sizeof(s->txn->flags);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200871 } else if (isteq(name, ist("req.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200872 ptr = (!s || !may_access(s)) ? NULL : &s->req.flags; size = sizeof(s->req.flags);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200873 } else if (isteq(name, ist("res.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200874 ptr = (!s || !may_access(s)) ? NULL : &s->res.flags; size = sizeof(s->res.flags);
Willy Tarreau7cb9e6c2022-05-17 19:40:40 +0200875 } else if (isteq(name, ist("scf.s"))) {
876 ptr = (!s || !may_access(s)) ? NULL : &s->scf->state; size = sizeof(s->scf->state);
877 } else if (isteq(name, ist("scb.s"))) {
878 ptr = (!s || !may_access(s)) ? NULL : &s->scf->state; size = sizeof(s->scb->state);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200879 } else if (isteq(name, ist("wake"))) {
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200880 if (s && may_access(s) && may_access((void *)s + sizeof(*s) - 1))
Willy Tarreau68680bb2019-10-23 17:23:25 +0200881 task_wakeup(s->task, TASK_WOKEN_TIMER|TASK_WOKEN_IO|TASK_WOKEN_MSG);
882 continue;
883 } else
884 return cli_dynerr(appctx, memprintf(&msg, "Unsupported field name: '%s'.\n", word));
885
886 /* read previous value */
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200887 if ((s || ptr == &s) && ptr && may_access(ptr) && may_access(ptr + size - 1)) {
Willy Tarreau68680bb2019-10-23 17:23:25 +0200888 if (size == 8)
889 old = read_u64(ptr);
890 else if (size == 4)
891 old = read_u32(ptr);
892 else if (size == 2)
893 old = read_u16(ptr);
894 else
895 old = *(const uint8_t *)ptr;
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200896 } else {
897 memprintf(&msg,
898 "%sSkipping inaccessible pointer %p for field '%.*s'.\n",
899 msg ? msg : "", ptr, (int)(end - word), word);
900 continue;
Willy Tarreau68680bb2019-10-23 17:23:25 +0200901 }
902
903 /* parse the new value . */
904 new = strtoll(end + 1, &endarg, 0);
905 if (end[1] && *endarg) {
906 if (strcmp(end + 1, "now") == 0)
907 new = now_ms;
908 else {
909 memprintf(&msg,
910 "%sIgnoring unparsable value '%s' for field '%.*s'.\n",
911 msg ? msg : "", end + 1, (int)(end - word), word);
912 continue;
913 }
914 }
915
916 switch (*end) {
917 case '\0': /* show */
918 memprintf(&msg, "%s%.*s=%#llx ", msg ? msg : "", (int)(end - word), word, old);
919 new = old; // do not change the value
920 break;
921
922 case '=': /* set */
923 break;
924
925 case '^': /* XOR */
926 new = old ^ new;
927 break;
928
929 case '+': /* OR */
930 new = old | new;
931 break;
932
933 case '-': /* AND NOT */
934 new = old & ~new;
935 break;
936
937 default:
938 break;
939 }
940
941 /* write the new value */
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200942 if (new != old) {
Willy Tarreau68680bb2019-10-23 17:23:25 +0200943 if (size == 8)
944 write_u64(ptr, new);
945 else if (size == 4)
946 write_u32(ptr, new);
947 else if (size == 2)
948 write_u16(ptr, new);
949 else
950 *(uint8_t *)ptr = new;
951 }
952 }
953
954 if (msg && *msg)
955 return cli_dynmsg(appctx, LOG_INFO, msg);
956 return 1;
957}
958
Willy Tarreau98679872023-05-03 11:22:45 +0200959/* parse a "debug dev stream" command */
960/*
961 * debug dev task <ptr> [ "wake" | "expire" | "kill" ]
962 * Show/change status of a task/tasklet
963 */
964static int debug_parse_cli_task(char **args, char *payload, struct appctx *appctx, void *private)
965{
966 const struct ha_caller *caller;
967 struct task *t;
968 char *endarg;
969 char *msg;
970 void *ptr;
971 int ret = 1;
972 int task_ok;
973 int arg;
974
975 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
976 return 1;
977
978 /* parse the pointer value */
979 ptr = (void *)strtoll(args[3], &endarg, 0);
980 if (!*args[3] || *endarg)
981 goto usage;
982
983 _HA_ATOMIC_INC(&debug_commands_issued);
984
985 /* everything below must run under thread isolation till reaching label "leave" */
986 thread_isolate();
987
988 /* struct tasklet is smaller than struct task and is sufficient to check
989 * the TASK_COMMON part.
990 */
991 if (!may_access(ptr) || !may_access(ptr + sizeof(struct tasklet) - 1) ||
992 ((const struct tasklet *)ptr)->tid < -1 ||
993 ((const struct tasklet *)ptr)->tid >= (int)MAX_THREADS) {
994 ret = cli_err(appctx, "The designated memory area doesn't look like a valid task/tasklet\n");
995 goto leave;
996 }
997
998 t = ptr;
999 caller = t->caller;
1000 msg = NULL;
1001 task_ok = may_access(t + sizeof(*t) - 1);
1002
1003 chunk_reset(&trash);
1004 resolve_sym_name(&trash, NULL, (const void *)t->process);
1005
1006 /* we need to be careful here because we may dump a freed task that's
1007 * still in the pool cache, containing garbage in pointers.
1008 */
1009 if (!*args[4]) {
1010 memprintf(&msg, "%s%p: %s state=%#x tid=%d process=%s ctx=%p calls=%d last=%s:%d intl=%d",
1011 msg ? msg : "", t, (t->state & TASK_F_TASKLET) ? "tasklet" : "task",
1012 t->state, t->tid, trash.area, t->context, t->calls,
Willy Tarreauff508f12023-05-03 16:28:54 +02001013 caller && may_access(caller) && may_access(caller->func) && isalnum((uchar)*caller->func) ? caller->func : "0",
Willy Tarreau98679872023-05-03 11:22:45 +02001014 caller ? t->caller->line : 0,
1015 (t->state & TASK_F_TASKLET) ? LIST_INLIST(&((const struct tasklet *)t)->list) : 0);
1016
1017 if (task_ok && !(t->state & TASK_F_TASKLET))
1018 memprintf(&msg, "%s inrq=%d inwq=%d exp=%d nice=%d",
1019 msg ? msg : "", task_in_rq(t), task_in_wq(t), t->expire, t->nice);
1020
1021 memprintf(&msg, "%s\n", msg ? msg : "");
1022 }
1023
1024 for (arg = 4; *args[arg]; arg++) {
1025 if (strcmp(args[arg], "expire") == 0) {
1026 if (t->state & TASK_F_TASKLET) {
1027 /* do nothing for tasklets */
1028 }
1029 else if (task_ok) {
1030 /* unlink task and wake with timer flag */
1031 __task_unlink_wq(t);
1032 t->expire = now_ms;
1033 task_wakeup(t, TASK_WOKEN_TIMER);
1034 }
1035 } else if (strcmp(args[arg], "wake") == 0) {
1036 /* wake with all flags but init / timer */
1037 if (t->state & TASK_F_TASKLET)
1038 tasklet_wakeup((struct tasklet *)t);
1039 else if (task_ok)
1040 task_wakeup(t, TASK_WOKEN_ANY & ~(TASK_WOKEN_INIT|TASK_WOKEN_TIMER));
1041 } else if (strcmp(args[arg], "kill") == 0) {
1042 /* Kill the task. This is not idempotent! */
1043 if (!(t->state & TASK_KILLED)) {
1044 if (t->state & TASK_F_TASKLET)
1045 tasklet_kill((struct tasklet *)t);
1046 else if (task_ok)
1047 task_kill(t);
1048 }
1049 } else {
1050 thread_release();
1051 goto usage;
1052 }
1053 }
1054
1055 if (msg && *msg)
1056 ret = cli_dynmsg(appctx, LOG_INFO, msg);
1057 leave:
1058 thread_release();
1059 return ret;
1060 usage:
1061 return cli_err(appctx,
1062 "Usage: debug dev task <ptr> [ wake | expire | kill ]\n"
1063 " By default, dumps some info on task/tasklet <ptr>. 'wake' will wake it up\n"
1064 " with all conditions flags but init/exp. 'expire' will expire the entry, and\n"
1065 " 'kill' will kill it (warning: may crash since later not idempotent!). All\n"
1066 " changes may crash the process if performed on a wrong object!\n"
1067 );
1068}
1069
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001070#if defined(DEBUG_DEV)
1071static struct task *debug_delay_inj_task(struct task *t, void *ctx, unsigned int state)
1072{
1073 unsigned long *tctx = ctx; // [0] = interval, [1] = nbwakeups
1074 unsigned long inter = tctx[0];
1075 unsigned long count = tctx[1];
1076 unsigned long rnd;
1077
1078 if (inter)
1079 t->expire = tick_add(now_ms, inter);
1080 else
1081 task_wakeup(t, TASK_WOKEN_MSG);
1082
1083 /* wake a random thread */
1084 while (count--) {
1085 rnd = statistical_prng_range(global.nbthread);
1086 ha_tkill(rnd, SIGRTMAX);
1087 }
1088 return t;
1089}
1090
1091/* parse a "debug dev delay-inj" command
1092 * debug dev delay-inj <inter> <count>
1093 */
1094static int debug_parse_delay_inj(char **args, char *payload, struct appctx *appctx, void *private)
1095{
1096 unsigned long *tctx; // [0] = inter, [2] = count
1097 struct task *task;
1098
1099 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
1100 return 1;
1101
1102 if (!*args[4])
1103 return cli_err(appctx, "Usage: debug dev delay-inj <inter_ms> <count>*\n");
1104
1105 _HA_ATOMIC_INC(&debug_commands_issued);
1106
1107 tctx = calloc(sizeof(*tctx), 2);
1108 if (!tctx)
1109 goto fail;
1110
1111 tctx[0] = atoi(args[3]);
1112 tctx[1] = atoi(args[4]);
1113
1114 task = task_new_here/*anywhere*/();
1115 if (!task)
1116 goto fail;
1117
1118 task->process = debug_delay_inj_task;
1119 task->context = tctx;
1120 task_wakeup(task, TASK_WOKEN_INIT);
1121 return 1;
1122
1123 fail:
1124 free(tctx);
1125 return cli_err(appctx, "Not enough memory");
1126}
1127#endif // DEBUG_DEV
1128
Willy Tarreau144f84a2021-03-02 16:09:26 +01001129static struct task *debug_task_handler(struct task *t, void *ctx, unsigned int state)
Willy Tarreaua5a44792020-11-29 17:12:15 +01001130{
1131 unsigned long *tctx = ctx; // [0] = #tasks, [1] = inter, [2+] = { tl | (tsk+1) }
1132 unsigned long inter = tctx[1];
1133 unsigned long rnd;
1134
1135 t->expire = tick_add(now_ms, inter);
1136
1137 /* half of the calls will wake up another entry */
Willy Tarreau06e69b52021-03-02 14:01:35 +01001138 rnd = statistical_prng();
Willy Tarreaua5a44792020-11-29 17:12:15 +01001139 if (rnd & 1) {
1140 rnd >>= 1;
1141 rnd %= tctx[0];
1142 rnd = tctx[rnd + 2];
1143
1144 if (rnd & 1)
1145 task_wakeup((struct task *)(rnd - 1), TASK_WOKEN_MSG);
1146 else
1147 tasklet_wakeup((struct tasklet *)rnd);
1148 }
1149 return t;
1150}
1151
Willy Tarreau144f84a2021-03-02 16:09:26 +01001152static struct task *debug_tasklet_handler(struct task *t, void *ctx, unsigned int state)
Willy Tarreaua5a44792020-11-29 17:12:15 +01001153{
1154 unsigned long *tctx = ctx; // [0] = #tasks, [1] = inter, [2+] = { tl | (tsk+1) }
1155 unsigned long rnd;
1156 int i;
1157
1158 /* wake up two random entries */
1159 for (i = 0; i < 2; i++) {
Willy Tarreau06e69b52021-03-02 14:01:35 +01001160 rnd = statistical_prng() % tctx[0];
Willy Tarreaua5a44792020-11-29 17:12:15 +01001161 rnd = tctx[rnd + 2];
1162
1163 if (rnd & 1)
1164 task_wakeup((struct task *)(rnd - 1), TASK_WOKEN_MSG);
1165 else
1166 tasklet_wakeup((struct tasklet *)rnd);
1167 }
1168 return t;
1169}
1170
1171/* parse a "debug dev sched" command
1172 * debug dev sched {task|tasklet} [count=<count>] [mask=<mask>] [single=<single>] [inter=<inter>]
1173 */
1174static int debug_parse_cli_sched(char **args, char *payload, struct appctx *appctx, void *private)
1175{
1176 int arg;
1177 void *ptr;
1178 int size;
1179 const char *word, *end;
1180 struct ist name;
1181 char *msg = NULL;
1182 char *endarg;
1183 unsigned long long new;
1184 unsigned long count = 0;
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001185 unsigned long thrid = tid;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001186 unsigned int inter = 0;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001187 unsigned long i;
1188 int mode = 0; // 0 = tasklet; 1 = task
Willy Tarreaua5a44792020-11-29 17:12:15 +01001189 unsigned long *tctx; // [0] = #tasks, [1] = inter, [2+] = { tl | (tsk+1) }
1190
1191 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
1192 return 1;
1193
1194 ptr = NULL; size = 0;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001195
1196 if (strcmp(args[3], "task") != 0 && strcmp(args[3], "tasklet") != 0) {
1197 return cli_err(appctx,
1198 "Usage: debug dev sched {task|tasklet} { <obj> = <value> }*\n"
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001199 " <obj> = {count | tid | inter }\n"
Willy Tarreaua5a44792020-11-29 17:12:15 +01001200 " <value> = 64-bit dec/hex integer (0x prefix supported)\n"
1201 );
1202 }
1203
1204 mode = strcmp(args[3], "task") == 0;
1205
Willy Tarreau4781b152021-04-06 13:53:36 +02001206 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001207 for (arg = 4; *args[arg]; arg++) {
1208 end = word = args[arg];
1209 while (*end && *end != '=' && *end != '^' && *end != '+' && *end != '-')
1210 end++;
1211 name = ist2(word, end - word);
1212 if (isteq(name, ist("count"))) {
1213 ptr = &count; size = sizeof(count);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001214 } else if (isteq(name, ist("tid"))) {
1215 ptr = &thrid; size = sizeof(thrid);
1216 } else if (isteq(name, ist("inter"))) {
1217 ptr = &inter; size = sizeof(inter);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001218 } else
1219 return cli_dynerr(appctx, memprintf(&msg, "Unsupported setting: '%s'.\n", word));
1220
1221 /* parse the new value . */
1222 new = strtoll(end + 1, &endarg, 0);
1223 if (end[1] && *endarg) {
1224 memprintf(&msg,
1225 "%sIgnoring unparsable value '%s' for field '%.*s'.\n",
1226 msg ? msg : "", end + 1, (int)(end - word), word);
1227 continue;
1228 }
1229
1230 /* write the new value */
1231 if (size == 8)
1232 write_u64(ptr, new);
1233 else if (size == 4)
1234 write_u32(ptr, new);
1235 else if (size == 2)
1236 write_u16(ptr, new);
1237 else
1238 *(uint8_t *)ptr = new;
1239 }
1240
1241 tctx = calloc(sizeof(*tctx), count + 2);
1242 if (!tctx)
1243 goto fail;
1244
1245 tctx[0] = (unsigned long)count;
1246 tctx[1] = (unsigned long)inter;
1247
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001248 if (thrid >= global.nbthread)
1249 thrid = tid;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001250
Willy Tarreaua5a44792020-11-29 17:12:15 +01001251 for (i = 0; i < count; i++) {
Willy Tarreaua5a44792020-11-29 17:12:15 +01001252 /* now, if poly or mask was set, tmask corresponds to the
1253 * valid thread mask to use, otherwise it remains zero.
1254 */
1255 //printf("%lu: mode=%d mask=%#lx\n", i, mode, tmask);
1256 if (mode == 0) {
1257 struct tasklet *tl = tasklet_new();
1258
1259 if (!tl)
1260 goto fail;
1261
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001262 tl->tid = thrid;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001263 tl->process = debug_tasklet_handler;
1264 tl->context = tctx;
1265 tctx[i + 2] = (unsigned long)tl;
1266 } else {
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001267 struct task *task = task_new_on(thrid);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001268
1269 if (!task)
1270 goto fail;
1271
1272 task->process = debug_task_handler;
1273 task->context = tctx;
1274 tctx[i + 2] = (unsigned long)task + 1;
1275 }
1276 }
1277
1278 /* start the tasks and tasklets */
1279 for (i = 0; i < count; i++) {
1280 unsigned long ctx = tctx[i + 2];
1281
1282 if (ctx & 1)
1283 task_wakeup((struct task *)(ctx - 1), TASK_WOKEN_INIT);
1284 else
1285 tasklet_wakeup((struct tasklet *)ctx);
1286 }
1287
1288 if (msg && *msg)
1289 return cli_dynmsg(appctx, LOG_INFO, msg);
1290 return 1;
1291
1292 fail:
1293 /* free partially allocated entries */
1294 for (i = 0; tctx && i < count; i++) {
1295 unsigned long ctx = tctx[i + 2];
1296
1297 if (!ctx)
1298 break;
1299
1300 if (ctx & 1)
1301 task_destroy((struct task *)(ctx - 1));
1302 else
1303 tasklet_free((struct tasklet *)ctx);
1304 }
1305
1306 free(tctx);
1307 return cli_err(appctx, "Not enough memory");
1308}
1309
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001310/* CLI state for "debug dev fd" */
1311struct dev_fd_ctx {
1312 int start_fd;
1313};
1314
Willy Tarreau5be7c192022-01-24 20:26:09 +01001315/* CLI parser for the "debug dev fd" command. The current FD to restart from is
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001316 * stored in a struct dev_fd_ctx pointed to by svcctx.
Willy Tarreau5be7c192022-01-24 20:26:09 +01001317 */
1318static int debug_parse_cli_fd(char **args, char *payload, struct appctx *appctx, void *private)
1319{
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001320 struct dev_fd_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
1321
Willy Tarreau5be7c192022-01-24 20:26:09 +01001322 if (!cli_has_level(appctx, ACCESS_LVL_OPER))
1323 return 1;
1324
1325 /* start at fd #0 */
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001326 ctx->start_fd = 0;
Willy Tarreau5be7c192022-01-24 20:26:09 +01001327 return 0;
1328}
1329
1330/* CLI I/O handler for the "debug dev fd" command. Dumps all FDs that are
1331 * accessible from the process but not known from fdtab. The FD number to
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001332 * restart from is stored in a struct dev_fd_ctx pointed to by svcctx.
Willy Tarreau5be7c192022-01-24 20:26:09 +01001333 */
1334static int debug_iohandler_fd(struct appctx *appctx)
1335{
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001336 struct dev_fd_ctx *ctx = appctx->svcctx;
Willy Tarreauc12b3212022-05-27 11:08:15 +02001337 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau5be7c192022-01-24 20:26:09 +01001338 struct sockaddr_storage sa;
1339 struct stat statbuf;
1340 socklen_t salen, vlen;
1341 int ret1, ret2, port;
1342 char *addrstr;
1343 int ret = 1;
1344 int i, fd;
1345
Christopher Faulet87633c32023-04-03 18:32:50 +02001346 /* FIXME: Don't watch the other side !*/
Christopher Faulet208c7122023-04-13 16:16:15 +02001347 if (unlikely(sc_opposite(sc)->flags & SC_FL_SHUT_DONE))
Willy Tarreau5be7c192022-01-24 20:26:09 +01001348 goto end;
1349
1350 chunk_reset(&trash);
1351
1352 thread_isolate();
1353
1354 /* we have two inner loops here, one for the proxy, the other one for
1355 * the buffer.
1356 */
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001357 for (fd = ctx->start_fd; fd < global.maxsock; fd++) {
Willy Tarreau5be7c192022-01-24 20:26:09 +01001358 /* check for FD's existence */
1359 ret1 = fcntl(fd, F_GETFD, 0);
1360 if (ret1 == -1)
1361 continue; // not known to the process
1362 if (fdtab[fd].owner)
1363 continue; // well-known
1364
1365 /* OK we're seeing an orphan let's try to retrieve as much
1366 * information as possible about it.
1367 */
1368 chunk_printf(&trash, "%5d", fd);
1369
1370 if (fstat(fd, &statbuf) != -1) {
1371 chunk_appendf(&trash, " type=%s mod=%04o dev=%#llx siz=%#llx uid=%lld gid=%lld fs=%#llx ino=%#llx",
1372 isatty(fd) ? "tty.":
1373 S_ISREG(statbuf.st_mode) ? "file":
1374 S_ISDIR(statbuf.st_mode) ? "dir.":
1375 S_ISCHR(statbuf.st_mode) ? "chr.":
1376 S_ISBLK(statbuf.st_mode) ? "blk.":
1377 S_ISFIFO(statbuf.st_mode) ? "pipe":
1378 S_ISLNK(statbuf.st_mode) ? "link":
1379 S_ISSOCK(statbuf.st_mode) ? "sock":
1380#ifdef USE_EPOLL
1381 epoll_wait(fd, NULL, 0, 0) != -1 || errno != EBADF ? "epol":
1382#endif
1383 "????",
1384 (uint)statbuf.st_mode & 07777,
1385
1386 (ullong)statbuf.st_rdev,
1387 (ullong)statbuf.st_size,
1388 (ullong)statbuf.st_uid,
1389 (ullong)statbuf.st_gid,
1390
1391 (ullong)statbuf.st_dev,
1392 (ullong)statbuf.st_ino);
1393 }
1394
1395 chunk_appendf(&trash, " getfd=%s+%#x",
1396 (ret1 & FD_CLOEXEC) ? "cloex" : "",
1397 ret1 &~ FD_CLOEXEC);
1398
1399 /* FD options */
1400 ret2 = fcntl(fd, F_GETFL, 0);
1401 if (ret2) {
1402 chunk_appendf(&trash, " getfl=%s",
1403 (ret1 & 3) >= 2 ? "O_RDWR" :
1404 (ret1 & 1) ? "O_WRONLY" : "O_RDONLY");
1405
1406 for (i = 2; i < 32; i++) {
1407 if (!(ret2 & (1UL << i)))
1408 continue;
1409 switch (1UL << i) {
1410 case O_CREAT: chunk_appendf(&trash, ",O_CREAT"); break;
1411 case O_EXCL: chunk_appendf(&trash, ",O_EXCL"); break;
1412 case O_NOCTTY: chunk_appendf(&trash, ",O_NOCTTY"); break;
1413 case O_TRUNC: chunk_appendf(&trash, ",O_TRUNC"); break;
1414 case O_APPEND: chunk_appendf(&trash, ",O_APPEND"); break;
Willy Tarreau410942b2022-01-25 14:51:53 +01001415#ifdef O_ASYNC
Willy Tarreau5be7c192022-01-24 20:26:09 +01001416 case O_ASYNC: chunk_appendf(&trash, ",O_ASYNC"); break;
Willy Tarreau410942b2022-01-25 14:51:53 +01001417#endif
Willy Tarreau5be7c192022-01-24 20:26:09 +01001418#ifdef O_DIRECT
1419 case O_DIRECT: chunk_appendf(&trash, ",O_DIRECT"); break;
1420#endif
1421#ifdef O_NOATIME
1422 case O_NOATIME: chunk_appendf(&trash, ",O_NOATIME"); break;
1423#endif
1424 }
1425 }
1426 }
1427
1428 vlen = sizeof(ret2);
1429 ret1 = getsockopt(fd, SOL_SOCKET, SO_TYPE, &ret2, &vlen);
1430 if (ret1 != -1)
1431 chunk_appendf(&trash, " so_type=%d", ret2);
1432
1433 vlen = sizeof(ret2);
1434 ret1 = getsockopt(fd, SOL_SOCKET, SO_ACCEPTCONN, &ret2, &vlen);
1435 if (ret1 != -1)
1436 chunk_appendf(&trash, " so_accept=%d", ret2);
1437
1438 vlen = sizeof(ret2);
1439 ret1 = getsockopt(fd, SOL_SOCKET, SO_ERROR, &ret2, &vlen);
1440 if (ret1 != -1)
1441 chunk_appendf(&trash, " so_error=%d", ret2);
1442
1443 salen = sizeof(sa);
1444 if (getsockname(fd, (struct sockaddr *)&sa, &salen) != -1) {
1445 if (sa.ss_family == AF_INET)
1446 port = ntohs(((const struct sockaddr_in *)&sa)->sin_port);
1447 else if (sa.ss_family == AF_INET6)
1448 port = ntohs(((const struct sockaddr_in6 *)&sa)->sin6_port);
1449 else
1450 port = 0;
1451 addrstr = sa2str(&sa, port, 0);
1452 chunk_appendf(&trash, " laddr=%s", addrstr);
1453 free(addrstr);
1454 }
1455
1456 salen = sizeof(sa);
1457 if (getpeername(fd, (struct sockaddr *)&sa, &salen) != -1) {
1458 if (sa.ss_family == AF_INET)
1459 port = ntohs(((const struct sockaddr_in *)&sa)->sin_port);
1460 else if (sa.ss_family == AF_INET6)
1461 port = ntohs(((const struct sockaddr_in6 *)&sa)->sin6_port);
1462 else
1463 port = 0;
1464 addrstr = sa2str(&sa, port, 0);
1465 chunk_appendf(&trash, " raddr=%s", addrstr);
1466 free(addrstr);
1467 }
1468
1469 chunk_appendf(&trash, "\n");
1470
Willy Tarreaud0a06d52022-05-18 15:07:19 +02001471 if (applet_putchk(appctx, &trash) == -1) {
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001472 ctx->start_fd = fd;
Willy Tarreau5be7c192022-01-24 20:26:09 +01001473 ret = 0;
1474 break;
1475 }
1476 }
1477
1478 thread_release();
1479 end:
1480 return ret;
1481}
1482
Willy Tarreaua6026a02020-07-02 09:14:48 +02001483#if defined(DEBUG_MEM_STATS)
Willy Tarreau40e952f2022-05-05 14:39:51 +02001484
1485/* CLI state for "debug dev memstats" */
1486struct dev_mem_ctx {
1487 struct mem_stats *start, *stop; /* begin/end of dump */
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001488 char *match; /* non-null if a name prefix is specified */
Willy Tarreau40e952f2022-05-05 14:39:51 +02001489 int show_all; /* show all entries if non-null */
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001490 int width; /* 1st column width */
1491 long tot_size; /* sum of alloc-free */
1492 ulong tot_calls; /* sum of calls */
Willy Tarreau40e952f2022-05-05 14:39:51 +02001493};
1494
1495/* CLI parser for the "debug dev memstats" command. Sets a dev_mem_ctx shown above. */
Willy Tarreaua6026a02020-07-02 09:14:48 +02001496static int debug_parse_cli_memstats(char **args, char *payload, struct appctx *appctx, void *private)
1497{
Willy Tarreau40e952f2022-05-05 14:39:51 +02001498 struct dev_mem_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
Willy Tarreau334d0912022-11-30 16:50:48 +01001499 int arg;
Willy Tarreau40e952f2022-05-05 14:39:51 +02001500
Willy Tarreaua6026a02020-07-02 09:14:48 +02001501 extern __attribute__((__weak__)) struct mem_stats __start_mem_stats;
1502 extern __attribute__((__weak__)) struct mem_stats __stop_mem_stats;
1503
1504 if (!cli_has_level(appctx, ACCESS_LVL_OPER))
1505 return 1;
1506
Willy Tarreau334d0912022-11-30 16:50:48 +01001507 for (arg = 3; *args[arg]; arg++) {
1508 if (strcmp(args[arg], "reset") == 0) {
1509 struct mem_stats *ptr;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001510
Willy Tarreau334d0912022-11-30 16:50:48 +01001511 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
1512 return 1;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001513
Willy Tarreau334d0912022-11-30 16:50:48 +01001514 for (ptr = &__start_mem_stats; ptr < &__stop_mem_stats; ptr++) {
1515 _HA_ATOMIC_STORE(&ptr->calls, 0);
1516 _HA_ATOMIC_STORE(&ptr->size, 0);
1517 }
1518 return 1;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001519 }
Willy Tarreau334d0912022-11-30 16:50:48 +01001520 else if (strcmp(args[arg], "all") == 0) {
1521 ctx->show_all = 1;
1522 continue;
1523 }
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001524 else if (strcmp(args[arg], "match") == 0 && *args[arg + 1]) {
1525 ha_free(&ctx->match);
1526 ctx->match = strdup(args[arg + 1]);
1527 arg++;
1528 continue;
1529 }
Willy Tarreau334d0912022-11-30 16:50:48 +01001530 else
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001531 return cli_err(appctx, "Expects either 'reset', 'all', or 'match <pfx>'.\n");
Willy Tarreaua6026a02020-07-02 09:14:48 +02001532 }
1533
Willy Tarreaua6026a02020-07-02 09:14:48 +02001534 /* otherwise proceed with the dump from p0 to p1 */
Willy Tarreau40e952f2022-05-05 14:39:51 +02001535 ctx->start = &__start_mem_stats;
1536 ctx->stop = &__stop_mem_stats;
Willy Tarreau4a426e22022-08-09 08:51:08 +02001537 ctx->width = 0;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001538 return 0;
1539}
1540
Willy Tarreau40e952f2022-05-05 14:39:51 +02001541/* CLI I/O handler for the "debug dev memstats" command using a dev_mem_ctx
1542 * found in appctx->svcctx. Dumps all mem_stats structs referenced by pointers
1543 * located between ->start and ->stop. Dumps all entries if ->show_all != 0,
1544 * otherwise only non-zero calls.
Willy Tarreaua6026a02020-07-02 09:14:48 +02001545 */
1546static int debug_iohandler_memstats(struct appctx *appctx)
1547{
Willy Tarreau40e952f2022-05-05 14:39:51 +02001548 struct dev_mem_ctx *ctx = appctx->svcctx;
Willy Tarreauc12b3212022-05-27 11:08:15 +02001549 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau4a426e22022-08-09 08:51:08 +02001550 struct mem_stats *ptr;
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001551 const char *pfx = ctx->match;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001552 int ret = 1;
1553
Christopher Faulet87633c32023-04-03 18:32:50 +02001554 /* FIXME: Don't watch the other side !*/
Christopher Faulet208c7122023-04-13 16:16:15 +02001555 if (unlikely(sc_opposite(sc)->flags & SC_FL_SHUT_DONE))
Willy Tarreaua6026a02020-07-02 09:14:48 +02001556 goto end;
1557
Willy Tarreau4a426e22022-08-09 08:51:08 +02001558 if (!ctx->width) {
1559 /* we don't know the first column's width, let's compute it
1560 * now based on a first pass on printable entries and their
1561 * expected width (approximated).
1562 */
1563 for (ptr = ctx->start; ptr != ctx->stop; ptr++) {
1564 const char *p, *name;
1565 int w = 0;
1566 char tmp;
1567
1568 if (!ptr->size && !ptr->calls && !ctx->show_all)
1569 continue;
1570
Willy Tarreaud96d2142022-09-06 08:05:59 +02001571 for (p = name = ptr->caller.file; *p; p++) {
Willy Tarreau4a426e22022-08-09 08:51:08 +02001572 if (*p == '/')
1573 name = p + 1;
1574 }
1575
1576 if (ctx->show_all)
Willy Tarreaud96d2142022-09-06 08:05:59 +02001577 w = snprintf(&tmp, 0, "%s(%s:%d) ", ptr->caller.func, name, ptr->caller.line);
Willy Tarreau4a426e22022-08-09 08:51:08 +02001578 else
Willy Tarreaud96d2142022-09-06 08:05:59 +02001579 w = snprintf(&tmp, 0, "%s:%d ", name, ptr->caller.line);
Willy Tarreau4a426e22022-08-09 08:51:08 +02001580
1581 if (w > ctx->width)
1582 ctx->width = w;
1583 }
1584 }
1585
Willy Tarreaua6026a02020-07-02 09:14:48 +02001586 /* we have two inner loops here, one for the proxy, the other one for
1587 * the buffer.
1588 */
Willy Tarreau4a426e22022-08-09 08:51:08 +02001589 for (ptr = ctx->start; ptr != ctx->stop; ptr++) {
Willy Tarreaua6026a02020-07-02 09:14:48 +02001590 const char *type;
1591 const char *name;
1592 const char *p;
Willy Tarreau55c950b2022-08-09 08:15:27 +02001593 const char *info = NULL;
Willy Tarreau17200dd2022-08-09 08:40:08 +02001594 const char *func = NULL;
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001595 int direction = 0; // neither alloc nor free (e.g. realloc)
Willy Tarreaua6026a02020-07-02 09:14:48 +02001596
Willy Tarreau40e952f2022-05-05 14:39:51 +02001597 if (!ptr->size && !ptr->calls && !ctx->show_all)
Willy Tarreaua6026a02020-07-02 09:14:48 +02001598 continue;
1599
1600 /* basename only */
Willy Tarreaud96d2142022-09-06 08:05:59 +02001601 for (p = name = ptr->caller.file; *p; p++) {
Willy Tarreaua6026a02020-07-02 09:14:48 +02001602 if (*p == '/')
1603 name = p + 1;
1604 }
1605
Willy Tarreaud96d2142022-09-06 08:05:59 +02001606 func = ptr->caller.func;
Willy Tarreau17200dd2022-08-09 08:40:08 +02001607
Willy Tarreaud96d2142022-09-06 08:05:59 +02001608 switch (ptr->caller.what) {
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001609 case MEM_STATS_TYPE_CALLOC: type = "CALLOC"; direction = 1; break;
1610 case MEM_STATS_TYPE_FREE: type = "FREE"; direction = -1; break;
1611 case MEM_STATS_TYPE_MALLOC: type = "MALLOC"; direction = 1; break;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001612 case MEM_STATS_TYPE_REALLOC: type = "REALLOC"; break;
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001613 case MEM_STATS_TYPE_STRDUP: type = "STRDUP"; direction = 1; break;
1614 case MEM_STATS_TYPE_P_ALLOC: type = "P_ALLOC"; direction = 1; if (ptr->extra) info = ((const struct pool_head *)ptr->extra)->name; break;
1615 case MEM_STATS_TYPE_P_FREE: type = "P_FREE"; direction = -1; if (ptr->extra) info = ((const struct pool_head *)ptr->extra)->name; break;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001616 default: type = "UNSET"; break;
1617 }
1618
1619 //chunk_printf(&trash,
1620 // "%20s:%-5d %7s size: %12lu calls: %9lu size/call: %6lu\n",
1621 // name, ptr->line, type,
1622 // (unsigned long)ptr->size, (unsigned long)ptr->calls,
1623 // (unsigned long)(ptr->calls ? (ptr->size / ptr->calls) : 0));
1624
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001625 /* only match requested prefixes */
1626 if (pfx && (!info || strncmp(info, pfx, strlen(pfx)) != 0))
1627 continue;
1628
Willy Tarreau17200dd2022-08-09 08:40:08 +02001629 chunk_reset(&trash);
1630 if (ctx->show_all)
1631 chunk_appendf(&trash, "%s(", func);
1632
Willy Tarreaud96d2142022-09-06 08:05:59 +02001633 chunk_appendf(&trash, "%s:%d", name, ptr->caller.line);
Willy Tarreau17200dd2022-08-09 08:40:08 +02001634
1635 if (ctx->show_all)
1636 chunk_appendf(&trash, ")");
1637
Willy Tarreau4a426e22022-08-09 08:51:08 +02001638 while (trash.data < ctx->width)
Willy Tarreaua6026a02020-07-02 09:14:48 +02001639 trash.area[trash.data++] = ' ';
Willy Tarreau17200dd2022-08-09 08:40:08 +02001640
Willy Tarreau55c950b2022-08-09 08:15:27 +02001641 chunk_appendf(&trash, "%7s size: %12lu calls: %9lu size/call: %6lu %s\n",
Willy Tarreaua6026a02020-07-02 09:14:48 +02001642 type,
1643 (unsigned long)ptr->size, (unsigned long)ptr->calls,
Willy Tarreau55c950b2022-08-09 08:15:27 +02001644 (unsigned long)(ptr->calls ? (ptr->size / ptr->calls) : 0),
1645 info ? info : "");
Willy Tarreaua6026a02020-07-02 09:14:48 +02001646
Willy Tarreaud0a06d52022-05-18 15:07:19 +02001647 if (applet_putchk(appctx, &trash) == -1) {
Willy Tarreau40e952f2022-05-05 14:39:51 +02001648 ctx->start = ptr;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001649 ret = 0;
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001650 goto end;
1651 }
1652 if (direction > 0) {
1653 ctx->tot_size += (ulong)ptr->size;
1654 ctx->tot_calls += (ulong)ptr->calls;
1655 }
1656 else if (direction < 0) {
1657 ctx->tot_size -= (ulong)ptr->size;
1658 ctx->tot_calls += (ulong)ptr->calls;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001659 }
1660 }
1661
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001662 /* now dump a summary */
1663 chunk_reset(&trash);
1664 chunk_appendf(&trash, "Total");
1665 while (trash.data < ctx->width)
1666 trash.area[trash.data++] = ' ';
1667
1668 chunk_appendf(&trash, "%7s size: %12ld calls: %9lu size/call: %6ld %s\n",
1669 "BALANCE",
1670 ctx->tot_size, ctx->tot_calls,
1671 (long)(ctx->tot_calls ? (ctx->tot_size / ctx->tot_calls) : 0),
1672 "(excl. realloc)");
1673
1674 if (applet_putchk(appctx, &trash) == -1) {
1675 ctx->start = ptr;
1676 ret = 0;
1677 goto end;
1678 }
Willy Tarreaua6026a02020-07-02 09:14:48 +02001679 end:
1680 return ret;
1681}
1682
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001683/* release the "show pools" context */
1684static void debug_release_memstats(struct appctx *appctx)
1685{
1686 struct dev_mem_ctx *ctx = appctx->svcctx;
1687
1688 ha_free(&ctx->match);
1689}
Willy Tarreaua6026a02020-07-02 09:14:48 +02001690#endif
1691
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001692/* This function dumps all threads' state to the trash. Depending on the
1693 * build options it will either inspect them directly or will signal each
1694 * thread in turn to report their own dump.
Willy Tarreauc7091d82019-05-17 10:08:49 +02001695 */
1696void ha_thread_dump_all_to_trash()
1697{
1698 unsigned int thr;
1699
1700 for (thr = 0; thr < global.nbthread; thr++)
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001701 ha_thread_dump(&trash, thr);
Willy Tarreauc7091d82019-05-17 10:08:49 +02001702}
1703
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001704#ifdef USE_THREAD_DUMP
Willy Tarreauc7091d82019-05-17 10:08:49 +02001705
Willy Tarreauf0c86dd2022-07-15 13:14:03 +02001706/* handles DEBUGSIG to dump the state of the thread it's working on. This is
1707 * appended at the end of thread_dump_buffer which must be protected against
1708 * reentrance from different threads (a thread-local buffer works fine).
1709 */
Willy Tarreauc7091d82019-05-17 10:08:49 +02001710void debug_handler(int sig, siginfo_t *si, void *arg)
1711{
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001712 struct buffer *buf = HA_ATOMIC_LOAD(&th_ctx->thread_dump_buffer);
Willy Tarreaua2b8ed42022-07-01 17:11:03 +02001713 int harmless = is_thread_harmless();
1714
Willy Tarreau82aafc42020-03-03 08:31:34 +01001715 /* first, let's check it's really for us and that we didn't just get
1716 * a spurious DEBUGSIG.
1717 */
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001718 if (!buf || buf == (void*)(0x1UL))
Willy Tarreau82aafc42020-03-03 08:31:34 +01001719 return;
1720
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001721 /* now dump the current state into the designated buffer, and indicate
1722 * we come from a sig handler.
Willy Tarreauf0c86dd2022-07-15 13:14:03 +02001723 */
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001724 ha_thread_dump_one(tid, 1);
Willy Tarreaue6a02fa2019-05-22 07:06:44 +02001725
1726 /* mark the current thread as stuck to detect it upon next invocation
1727 * if it didn't move.
1728 */
Willy Tarreaua2b8ed42022-07-01 17:11:03 +02001729 if (!harmless &&
Willy Tarreaue7475c82022-06-20 09:23:24 +02001730 !(_HA_ATOMIC_LOAD(&th_ctx->flags) & TH_FL_SLEEPING))
Willy Tarreaubdcd3252022-06-22 09:19:46 +02001731 _HA_ATOMIC_OR(&th_ctx->flags, TH_FL_STUCK);
Willy Tarreauc7091d82019-05-17 10:08:49 +02001732}
1733
1734static int init_debug_per_thread()
1735{
1736 sigset_t set;
1737
1738 /* unblock the DEBUGSIG signal we intend to use */
1739 sigemptyset(&set);
1740 sigaddset(&set, DEBUGSIG);
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001741#if defined(DEBUG_DEV)
1742 sigaddset(&set, SIGRTMAX);
1743#endif
Willy Tarreauc7091d82019-05-17 10:08:49 +02001744 ha_sigmask(SIG_UNBLOCK, &set, NULL);
1745 return 1;
1746}
1747
1748static int init_debug()
1749{
1750 struct sigaction sa;
Willy Tarreau2f1227e2021-01-22 12:12:29 +01001751 void *callers[1];
Willy Tarreauc7091d82019-05-17 10:08:49 +02001752
Willy Tarreau0214b452020-03-04 06:01:40 +01001753 /* calling backtrace() will access libgcc at runtime. We don't want to
1754 * do it after the chroot, so let's perform a first call to have it
1755 * ready in memory for later use.
1756 */
Willy Tarreau13faf162020-03-04 07:44:06 +01001757 my_backtrace(callers, sizeof(callers)/sizeof(*callers));
Willy Tarreauc7091d82019-05-17 10:08:49 +02001758 sa.sa_handler = NULL;
1759 sa.sa_sigaction = debug_handler;
1760 sigemptyset(&sa.sa_mask);
1761 sa.sa_flags = SA_SIGINFO;
1762 sigaction(DEBUGSIG, &sa, NULL);
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001763
1764#if defined(DEBUG_DEV)
1765 sa.sa_handler = NULL;
1766 sa.sa_sigaction = debug_delay_inj_sighandler;
1767 sigemptyset(&sa.sa_mask);
1768 sa.sa_flags = SA_SIGINFO;
1769 sigaction(SIGRTMAX, &sa, NULL);
1770#endif
Christopher Fauletfc633b62020-11-06 15:24:23 +01001771 return ERR_NONE;
Willy Tarreauc7091d82019-05-17 10:08:49 +02001772}
1773
1774REGISTER_POST_CHECK(init_debug);
1775REGISTER_PER_THREAD_INIT(init_debug_per_thread);
1776
1777#endif /* USE_THREAD_DUMP */
1778
Willy Tarreau4e2b6462019-05-16 17:44:30 +02001779/* register cli keywords */
1780static struct cli_kw_list cli_kws = {{ },{
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001781 {{ "debug", "dev", "bug", NULL }, "debug dev bug : call BUG_ON() and crash", debug_parse_cli_bug, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau6d3f1e32022-02-28 11:51:23 +01001782 {{ "debug", "dev", "check", NULL }, "debug dev check : call CHECK_IF() and possibly crash", debug_parse_cli_check, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001783 {{ "debug", "dev", "close", NULL }, "debug dev close <fd> : close this file descriptor", debug_parse_cli_close, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaudadf00e2022-07-15 08:25:03 +02001784 {{ "debug", "dev", "deadlock", NULL }, "debug dev deadlock [nbtask] : deadlock between this number of tasks", debug_parse_cli_deadlock, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001785 {{ "debug", "dev", "delay", NULL }, "debug dev delay [ms] : sleep this long", debug_parse_cli_delay, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau6bdf3e92019-05-20 14:25:05 +02001786#if defined(DEBUG_DEV)
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001787 {{ "debug", "dev", "delay-inj", NULL },"debug dev delay-inj <inter> <count> : inject random delays into threads", debug_parse_delay_inj, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001788 {{ "debug", "dev", "exec", NULL }, "debug dev exec [cmd] ... : show this command's output", debug_parse_cli_exec, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau6bdf3e92019-05-20 14:25:05 +02001789#endif
Willy Tarreau5be7c192022-01-24 20:26:09 +01001790 {{ "debug", "dev", "fd", NULL }, "debug dev fd : scan for rogue/unhandled FDs", debug_parse_cli_fd, debug_iohandler_fd, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001791 {{ "debug", "dev", "exit", NULL }, "debug dev exit [code] : immediately exit the process", debug_parse_cli_exit, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau111c7832022-11-30 17:51:47 +01001792 {{ "debug", "dev", "hash", NULL }, "debug dev hash [msg] : return msg hashed if anon is set", debug_parse_cli_hash, NULL, NULL, NULL, 0 },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001793 {{ "debug", "dev", "hex", NULL }, "debug dev hex <addr> [len] : dump a memory area", debug_parse_cli_hex, NULL, NULL, NULL, ACCESS_EXPERT },
1794 {{ "debug", "dev", "log", NULL }, "debug dev log [msg] ... : send this msg to global logs", debug_parse_cli_log, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaue5e62232023-05-04 11:50:26 +02001795 {{ "debug", "dev", "loop", NULL }, "debug dev loop <ms> [isolated] : loop this long, possibly isolated", debug_parse_cli_loop, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaua6026a02020-07-02 09:14:48 +02001796#if defined(DEBUG_MEM_STATS)
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001797 {{ "debug", "dev", "memstats", NULL }, "debug dev memstats [reset|all|match ...]: dump/reset memory statistics", debug_parse_cli_memstats, debug_iohandler_memstats, debug_release_memstats, NULL, 0 },
Willy Tarreaua6026a02020-07-02 09:14:48 +02001798#endif
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001799 {{ "debug", "dev", "panic", NULL }, "debug dev panic : immediately trigger a panic", debug_parse_cli_panic, NULL, NULL, NULL, ACCESS_EXPERT },
1800 {{ "debug", "dev", "sched", NULL }, "debug dev sched {task|tasklet} [k=v]* : stress the scheduler", debug_parse_cli_sched, NULL, NULL, NULL, ACCESS_EXPERT },
1801 {{ "debug", "dev", "stream",NULL }, "debug dev stream [k=v]* : show/manipulate stream flags", debug_parse_cli_stream,NULL, NULL, NULL, ACCESS_EXPERT },
1802 {{ "debug", "dev", "sym", NULL }, "debug dev sym <addr> : resolve symbol address", debug_parse_cli_sym, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau98679872023-05-03 11:22:45 +02001803 {{ "debug", "dev", "task", NULL }, "debug dev task <ptr> [wake|expire|kill] : show/wake/expire/kill task/tasklet", debug_parse_cli_task, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001804 {{ "debug", "dev", "tkill", NULL }, "debug dev tkill [thr] [sig] : send signal to thread", debug_parse_cli_tkill, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau305cfbd2022-02-25 08:52:39 +01001805 {{ "debug", "dev", "warn", NULL }, "debug dev warn : call WARN_ON() and possibly crash", debug_parse_cli_warn, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001806 {{ "debug", "dev", "write", NULL }, "debug dev write [size] : write that many bytes in return", debug_parse_cli_write, NULL, NULL, NULL, ACCESS_EXPERT },
Erwan Le Goas54966df2022-09-14 17:24:22 +02001807
Willy Tarreau6ab7b212021-12-28 09:57:10 +01001808#if defined(HA_HAVE_DUMP_LIBS)
1809 {{ "show", "libs", NULL, NULL }, "show libs : show loaded object files and libraries", debug_parse_cli_show_libs, NULL, NULL },
1810#endif
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001811 {{ "show", "threads", NULL, NULL }, "show threads : show some threads debugging information", NULL, cli_io_handler_show_threads, NULL },
Willy Tarreau4e2b6462019-05-16 17:44:30 +02001812 {{},}
1813}};
1814
1815INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);