blob: ce9d44cd6bc2c82c440ce997462dc7ef15b7e57a [file] [log] [blame]
Willy Tarreau4e2b6462019-05-16 17:44:30 +02001/*
2 * Process debugging functions.
3 *
4 * Copyright 2000-2019 Willy Tarreau <willy@haproxy.org>.
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Willy Tarreauf5b4e062020-03-03 15:40:23 +010013
Willy Tarreau5be7c192022-01-24 20:26:09 +010014#include <errno.h>
Willy Tarreau368bff42019-12-06 17:18:28 +010015#include <fcntl.h>
Willy Tarreau4e2b6462019-05-16 17:44:30 +020016#include <signal.h>
17#include <time.h>
18#include <stdio.h>
Willy Tarreau6bdf3e92019-05-20 14:25:05 +020019#include <stdlib.h>
Willy Tarreauaeed4a82020-06-04 22:01:04 +020020#include <syslog.h>
Willy Tarreau5be7c192022-01-24 20:26:09 +010021#include <sys/stat.h>
Willy Tarreau368bff42019-12-06 17:18:28 +010022#include <sys/types.h>
23#include <sys/wait.h>
Willy Tarreau5be7c192022-01-24 20:26:09 +010024#include <unistd.h>
25#ifdef USE_EPOLL
26#include <sys/epoll.h>
27#endif
Willy Tarreau4e2b6462019-05-16 17:44:30 +020028
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020029#include <haproxy/api.h>
Christopher Faulet6b0a0fb2022-04-04 11:29:28 +020030#include <haproxy/applet.h>
Willy Tarreau8dabda72020-05-27 17:22:10 +020031#include <haproxy/buf.h>
Willy Tarreau83487a82020-06-04 20:19:54 +020032#include <haproxy/cli.h>
Willy Tarreau55542642021-10-08 09:33:24 +020033#include <haproxy/clock.h>
Willy Tarreau2a83d602020-05-27 16:58:08 +020034#include <haproxy/debug.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020035#include <haproxy/fd.h>
36#include <haproxy/global.h>
Willy Tarreau86416052020-06-04 09:20:54 +020037#include <haproxy/hlua.h>
Willy Tarreaub7fc4c42021-10-06 18:56:42 +020038#include <haproxy/http_ana.h>
Willy Tarreauaeed4a82020-06-04 22:01:04 +020039#include <haproxy/log.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020040#include <haproxy/net_helper.h>
Willy Tarreau5edca2f2022-05-27 09:25:10 +020041#include <haproxy/sc_strm.h>
Willy Tarreaucb086c62022-05-27 09:47:12 +020042#include <haproxy/stconn.h>
Willy Tarreaucea0e1b2020-06-04 17:25:40 +020043#include <haproxy/task.h>
Willy Tarreau3f567e42020-05-28 15:29:19 +020044#include <haproxy/thread.h>
Willy Tarreau55542642021-10-08 09:33:24 +020045#include <haproxy/time.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020046#include <haproxy/tools.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020047#include <import/ist.h>
Willy Tarreau4e2b6462019-05-16 17:44:30 +020048
Willy Tarreau4e2b6462019-05-16 17:44:30 +020049
Willy Tarreauf0c86dd2022-07-15 13:14:03 +020050/* The dump state is made of:
51 * - num_thread on the lowest 15 bits
52 * - a SYNC flag on bit 15 (waiting for sync start)
53 * - number of participating threads on bits 16-30
54 * Initiating a dump consists in setting it to SYNC and incrementing the
55 * num_thread part when entering the function. The first thread periodically
56 * recounts active threads and compares it to the ready ones, and clears SYNC
57 * and sets the number of participants to the value found, which serves as a
58 * start signal. A thread finished dumping looks up the TID of the next active
59 * thread after it and writes it in the lowest part. If there's none, it sets
60 * the thread counter to the number of participants and resets that part,
61 * which serves as an end-of-dump signal. All threads decrement the num_thread
62 * part. Then all threads wait for the value to reach zero. Only used when
63 * USE_THREAD_DUMP is set.
Willy Tarreaua37cb182019-07-31 19:20:39 +020064 */
Willy Tarreauf0c86dd2022-07-15 13:14:03 +020065#define THREAD_DUMP_TMASK 0x00007FFFU
66#define THREAD_DUMP_FSYNC 0x00008000U
67#define THREAD_DUMP_PMASK 0x7FFF0000U
68
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +020069/* Points to a copy of the buffer where the dump functions should write, when
70 * non-null. It's only used by debuggers for core dump analysis.
71 */
72struct buffer *thread_dump_buffer = NULL;
Willy Tarreau9b013702019-10-24 18:18:02 +020073unsigned int debug_commands_issued = 0;
Willy Tarreaua37cb182019-07-31 19:20:39 +020074
Willy Tarreau123fc972021-01-22 13:52:41 +010075/* dumps a backtrace of the current thread that is appended to buffer <buf>.
76 * Lines are prefixed with the string <prefix> which may be empty (used for
77 * indenting). It is recommended to use this at a function's tail so that
Willy Tarreau2bfce7e2021-01-22 14:48:34 +010078 * the function does not appear in the call stack. The <dump> argument
79 * indicates what dump state to start from, and should usually be zero. It
80 * may be among the following values:
81 * - 0: search usual callers before step 1, or directly jump to 2
82 * - 1: skip usual callers before step 2
83 * - 2: dump until polling loop, scheduler, or main() (excluded)
84 * - 3: end
85 * - 4-7: like 0 but stops *after* main.
Willy Tarreau123fc972021-01-22 13:52:41 +010086 */
Willy Tarreau2bfce7e2021-01-22 14:48:34 +010087void ha_dump_backtrace(struct buffer *buf, const char *prefix, int dump)
Willy Tarreau123fc972021-01-22 13:52:41 +010088{
89 struct buffer bak;
90 char pfx2[100];
91 void *callers[100];
92 int j, nptrs;
93 const void *addr;
Willy Tarreau123fc972021-01-22 13:52:41 +010094
95 nptrs = my_backtrace(callers, sizeof(callers)/sizeof(*callers));
96 if (!nptrs)
97 return;
98
99 if (snprintf(pfx2, sizeof(pfx2), "%s| ", prefix) > sizeof(pfx2))
100 pfx2[0] = 0;
101
102 /* The call backtrace_symbols_fd(callers, nptrs, STDOUT_FILENO would
103 * produce similar output to the following:
104 */
105 chunk_appendf(buf, "%scall trace(%d):\n", prefix, nptrs);
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100106 for (j = 0; (j < nptrs || (dump & 3) < 2); j++) {
107 if (j == nptrs && !(dump & 3)) {
Willy Tarreau123fc972021-01-22 13:52:41 +0100108 /* we failed to spot the starting point of the
109 * dump, let's start over dumping everything we
110 * have.
111 */
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100112 dump += 2;
Willy Tarreau123fc972021-01-22 13:52:41 +0100113 j = 0;
114 }
115 bak = *buf;
116 dump_addr_and_bytes(buf, pfx2, callers[j], 8);
117 addr = resolve_sym_name(buf, ": ", callers[j]);
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100118 if ((dump & 3) == 0) {
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200119 /* dump not started, will start *after* ha_thread_dump_one(),
Willy Tarreaue69919d2023-05-04 19:19:04 +0200120 * ha_panic and ha_backtrace_to_stderr
Willy Tarreau123fc972021-01-22 13:52:41 +0100121 */
Willy Tarreaue69919d2023-05-04 19:19:04 +0200122 if (addr == ha_panic ||
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200123 addr == ha_backtrace_to_stderr || addr == ha_thread_dump_one)
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100124 dump++;
Willy Tarreau123fc972021-01-22 13:52:41 +0100125 *buf = bak;
126 continue;
127 }
128
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100129 if ((dump & 3) == 1) {
Willy Tarreau123fc972021-01-22 13:52:41 +0100130 /* starting */
Willy Tarreaue69919d2023-05-04 19:19:04 +0200131 if (addr == ha_panic ||
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200132 addr == ha_backtrace_to_stderr || addr == ha_thread_dump_one) {
Willy Tarreau123fc972021-01-22 13:52:41 +0100133 *buf = bak;
134 continue;
135 }
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100136 dump++;
Willy Tarreau123fc972021-01-22 13:52:41 +0100137 }
138
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100139 if ((dump & 3) == 2) {
140 /* still dumping */
141 if (dump == 6) {
142 /* we only stop *after* main and we must send the LF */
143 if (addr == main) {
144 j = nptrs;
145 dump++;
146 }
147 }
148 else if (addr == run_poll_loop || addr == main || addr == run_tasks_from_lists) {
149 dump++;
Willy Tarreau123fc972021-01-22 13:52:41 +0100150 *buf = bak;
151 break;
152 }
153 }
154 /* OK, line dumped */
155 chunk_appendf(buf, "\n");
156 }
157}
158
Willy Tarreaua8459b22021-01-22 14:12:27 +0100159/* dump a backtrace of current thread's stack to stderr. */
Willy Tarreau7831e022022-05-06 15:16:19 +0200160void ha_backtrace_to_stderr(void)
Willy Tarreaua8459b22021-01-22 14:12:27 +0100161{
162 char area[2048];
163 struct buffer b = b_make(area, sizeof(area), 0, 0);
164
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100165 ha_dump_backtrace(&b, " ", 4);
Willy Tarreaua8459b22021-01-22 14:12:27 +0100166 if (b.data)
Willy Tarreau2cbe2e72021-01-22 15:58:26 +0100167 DISGUISE(write(2, b.area, b.data));
Willy Tarreaua8459b22021-01-22 14:12:27 +0100168}
169
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200170/* Dumps to the thread's buffer some known information for the desired thread,
171 * and optionally extra info when it's safe to do so (current thread or
172 * isolated). The dump will be appended to the buffer, so the caller is
173 * responsible for preliminary initializing it. The <from_signal> argument will
174 * indicate if the function is called from the debug signal handler, indicating
175 * the thread was dumped upon request from another one, otherwise if the thread
176 * it the current one, a star ('*') will be displayed in front of the thread to
177 * indicate the requesting one. Any stuck thread is also prefixed with a '>'.
178 * The caller is responsible for atomically setting up the thread's dump buffer
179 * to point to a valid buffer with enough room. Output will be truncated if it
180 * does not fit. When the dump is complete, the dump buffer will be switched to
181 * (void*)0x1 that the caller must turn to 0x0 once the contents are collected.
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200182 */
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200183void ha_thread_dump_one(int thr, int from_signal)
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200184{
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200185 struct buffer *buf = HA_ATOMIC_LOAD(&ha_thread_ctx[thr].thread_dump_buffer);
Willy Tarreau38d07122022-06-27 16:13:50 +0200186 unsigned long thr_bit = ha_thread_info[thr].ltid_bit;
Willy Tarreau45c38e22021-09-30 18:28:49 +0200187 unsigned long long p = ha_thread_ctx[thr].prev_cpu_time;
Willy Tarreau21694982021-10-08 15:09:17 +0200188 unsigned long long n = now_cpu_time_thread(thr);
Willy Tarreaua0b99532021-09-30 18:48:37 +0200189 int stuck = !!(ha_thread_ctx[thr].flags & TH_FL_STUCK);
Willy Tarreau03f9b352022-06-27 16:02:24 +0200190 int tgrp = ha_thread_info[thr].tgid;
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200191
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200192 chunk_appendf(buf,
Willy Tarreauf0e5da22020-05-01 12:26:03 +0200193 "%c%cThread %-2u: id=0x%llx act=%d glob=%d wq=%d rq=%d tl=%d tlsz=%d rqsz=%d\n"
Willy Tarreaua3870b72021-09-13 19:24:47 +0200194 " %2u/%-2u stuck=%d prof=%d",
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200195 (thr == tid && !from_signal) ? '*' : ' ', stuck ? '>' : ' ', thr + 1,
Willy Tarreauff64d3b2020-05-01 11:28:49 +0200196 ha_get_pthread_id(thr),
Olivier Houchardcfbb3e62019-05-29 19:22:43 +0200197 thread_has_tasks(),
Willy Tarreauc958c702022-06-16 15:59:36 +0200198 !eb_is_empty(&ha_thread_ctx[thr].rqueue_shared),
Willy Tarreau1a9c9222021-10-01 11:30:33 +0200199 !eb_is_empty(&ha_thread_ctx[thr].timers),
200 !eb_is_empty(&ha_thread_ctx[thr].rqueue),
201 !(LIST_ISEMPTY(&ha_thread_ctx[thr].tasklets[TL_URGENT]) &&
202 LIST_ISEMPTY(&ha_thread_ctx[thr].tasklets[TL_NORMAL]) &&
203 LIST_ISEMPTY(&ha_thread_ctx[thr].tasklets[TL_BULK]) &&
204 MT_LIST_ISEMPTY(&ha_thread_ctx[thr].shared_tasklet_list)),
205 ha_thread_ctx[thr].tasks_in_list,
206 ha_thread_ctx[thr].rq_total,
Willy Tarreau66ad98a2022-06-28 10:49:57 +0200207 ha_thread_info[thr].tgid, ha_thread_info[thr].ltid + 1,
Willy Tarreaue6a02fa2019-05-22 07:06:44 +0200208 stuck,
Willy Tarreaub30ced32023-05-04 11:30:55 +0200209 !!(ha_thread_ctx[thr].flags & TH_FL_TASK_PROFILING));
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200210
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200211 chunk_appendf(buf,
Willy Tarreaub30ced32023-05-04 11:30:55 +0200212 " harmless=%d isolated=%d",
Willy Tarreau03f9b352022-06-27 16:02:24 +0200213 !!(_HA_ATOMIC_LOAD(&ha_tgroup_ctx[tgrp-1].threads_harmless) & thr_bit),
Willy Tarreaub30ced32023-05-04 11:30:55 +0200214 isolated_thread == thr);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200215
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200216 chunk_appendf(buf, "\n");
Willy Tarreau9c8800a2019-05-20 20:52:20 +0200217 chunk_appendf(buf, " cpu_ns: poll=%llu now=%llu diff=%llu\n", p, n, n-p);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200218
Willy Tarreaua3870b72021-09-13 19:24:47 +0200219 /* this is the end of what we can dump from outside the current thread */
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200220
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200221 if (thr != tid && !thread_isolated())
222 goto leave;
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200223
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200224 chunk_appendf(buf, " curr_task=");
Willy Tarreau1a9c9222021-10-01 11:30:33 +0200225 ha_task_dump(buf, th_ctx->current, " ");
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100226
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200227 if (stuck && thr == tid) {
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100228 /* We only emit the backtrace for stuck threads in order not to
229 * waste precious output buffer space with non-interesting data.
Willy Tarreau123fc972021-01-22 13:52:41 +0100230 * Please leave this as the last instruction in this function
231 * so that the compiler uses tail merging and the current
232 * function does not appear in the stack.
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100233 */
Willy Tarreau2bfce7e2021-01-22 14:48:34 +0100234 ha_dump_backtrace(buf, " ", 0);
Willy Tarreauf5b4e062020-03-03 15:40:23 +0100235 }
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200236 leave:
237 /* end of dump, setting the buffer to 0x1 will tell the caller we're done */
238 HA_ATOMIC_STORE(&ha_thread_ctx[thr].thread_dump_buffer, (void*)0x1UL);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200239}
240
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +0200241/* Triggers a thread dump from thread <thr>, either directly if it's the
242 * current thread or if thread dump signals are not implemented, or by sending
243 * a signal if it's a remote one and the feature is supported. The buffer <buf>
244 * will get the dump appended, and the caller is responsible for making sure
245 * there is enough room otherwise some contents will be truncated.
246 */
247void ha_thread_dump(struct buffer *buf, int thr)
248{
249 struct buffer *old = NULL;
250
251 /* try to impose our dump buffer and to reserve the target thread's
252 * next dump for us.
253 */
254 do {
255 if (old)
256 ha_thread_relax();
257 old = NULL;
258 } while (!HA_ATOMIC_CAS(&ha_thread_ctx[thr].thread_dump_buffer, &old, buf));
259
260#ifdef USE_THREAD_DUMP
261 /* asking the remote thread to dump itself allows to get more details
262 * including a backtrace.
263 */
264 if (thr != tid)
265 ha_tkill(thr, DEBUGSIG);
266 else
267#endif
268 ha_thread_dump_one(thr, thr != tid);
269
270 /* now wait for the dump to be done, and release it */
271 do {
272 if (old)
273 ha_thread_relax();
274 old = (void*)0x01;
275 } while (!HA_ATOMIC_CAS(&ha_thread_ctx[thr].thread_dump_buffer, &old, 0));
276}
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200277
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200278/* dumps into the buffer some information related to task <task> (which may
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200279 * either be a task or a tasklet, and prepend each line except the first one
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200280 * with <pfx>. The buffer is only appended and the first output starts by the
281 * pointer itself. The caller is responsible for making sure the task is not
282 * going to vanish during the dump.
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200283 */
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200284void ha_task_dump(struct buffer *buf, const struct task *task, const char *pfx)
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200285{
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200286 const struct stream *s = NULL;
Willy Tarreaua512b022019-08-21 14:12:19 +0200287 const struct appctx __maybe_unused *appctx = NULL;
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200288 struct hlua __maybe_unused *hlua = NULL;
Willy Tarreau52f238d2022-07-15 12:08:40 +0200289 const struct stconn *sc;
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200290
Willy Tarreau14a1ab72019-05-17 10:34:25 +0200291 if (!task) {
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200292 chunk_appendf(buf, "0\n");
Willy Tarreau231ec392019-05-17 10:39:47 +0200293 return;
294 }
295
Willy Tarreau20db9112019-05-17 14:14:35 +0200296 if (TASK_IS_TASKLET(task))
297 chunk_appendf(buf,
298 "%p (tasklet) calls=%u\n",
299 task,
300 task->calls);
301 else
302 chunk_appendf(buf,
303 "%p (task) calls=%u last=%llu%s\n",
304 task,
305 task->calls,
Willy Tarreau04e50b32022-09-07 14:49:50 +0200306 task->wake_date ? (unsigned long long)(now_mono_time() - task->wake_date) : 0,
307 task->wake_date ? " ns ago" : "");
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200308
Willy Tarreau2e89b092020-03-03 17:13:02 +0100309 chunk_appendf(buf, "%s fct=%p(", pfx, task->process);
310 resolve_sym_name(buf, NULL, task->process);
311 chunk_appendf(buf,") ctx=%p", task->context);
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200312
Willy Tarreaua512b022019-08-21 14:12:19 +0200313 if (task->process == task_run_applet && (appctx = task->context))
314 chunk_appendf(buf, "(%s)\n", appctx->applet->name);
315 else
316 chunk_appendf(buf, "\n");
317
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200318 if (task->process == process_stream && task->context)
319 s = (struct stream *)task->context;
Willy Tarreau52f238d2022-07-15 12:08:40 +0200320 else if (task->process == task_run_applet && task->context && (sc = appctx_sc((struct appctx *)task->context)))
321 s = sc_strm(sc);
Willy Tarreau462b9892022-05-18 18:06:53 +0200322 else if (task->process == sc_conn_io_cb && task->context)
Willy Tarreauea27f482022-05-18 16:10:52 +0200323 s = sc_strm(((struct stconn *)task->context));
Willy Tarreau578ea8b2019-05-22 09:43:09 +0200324
325 if (s)
326 stream_dump(buf, s, pfx, '\n');
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200327
328#ifdef USE_LUA
329 hlua = NULL;
330 if (s && (hlua = s->hlua)) {
331 chunk_appendf(buf, "%sCurrent executing Lua from a stream analyser -- ", pfx);
332 }
333 else if (task->process == hlua_process_task && (hlua = task->context)) {
334 chunk_appendf(buf, "%sCurrent executing a Lua task -- ", pfx);
335 }
336 else if (task->process == task_run_applet && (appctx = task->context) &&
Willy Tarreaue23f33b2022-05-06 14:07:13 +0200337 (appctx->applet->fct == hlua_applet_tcp_fct)) {
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200338 chunk_appendf(buf, "%sCurrent executing a Lua TCP service -- ", pfx);
339 }
340 else if (task->process == task_run_applet && (appctx = task->context) &&
Willy Tarreauaa229cc2022-05-06 14:26:10 +0200341 (appctx->applet->fct == hlua_applet_http_fct)) {
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200342 chunk_appendf(buf, "%sCurrent executing a Lua HTTP service -- ", pfx);
343 }
344
Christopher Faulet471425f2020-07-24 19:08:05 +0200345 if (hlua && hlua->T) {
Christopher Fauletcc2c4f82021-03-24 14:52:24 +0100346 chunk_appendf(buf, "stack traceback:\n ");
347 append_prefixed_str(buf, hlua_traceback(hlua->T, "\n "), pfx, '\n', 0);
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200348 }
Willy Tarreaucb01f5d2023-05-04 16:28:30 +0200349
350 /* we may need to terminate the current line */
351 if (*b_peek(buf, b_data(buf)-1) != '\n')
Christopher Faulet471425f2020-07-24 19:08:05 +0200352 b_putchr(buf, '\n');
Willy Tarreau78a7cb62019-08-21 14:16:02 +0200353#endif
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200354}
355
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200356/* This function dumps all profiling settings. It returns 0 if the output
357 * buffer is full and it needs to be called again, otherwise non-zero.
358 */
359static int cli_io_handler_show_threads(struct appctx *appctx)
360{
Willy Tarreauc12b3212022-05-27 11:08:15 +0200361 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200362 int thr;
363
Christopher Faulet87633c32023-04-03 18:32:50 +0200364 /* FIXME: Don't watch the other side !*/
Christopher Faulet208c7122023-04-13 16:16:15 +0200365 if (unlikely(sc_opposite(sc)->flags & SC_FL_SHUT_DONE))
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200366 return 1;
367
368 if (appctx->st0)
369 thr = appctx->st1;
370 else
371 thr = 0;
372
Willy Tarreau009b5512023-05-04 19:07:56 +0200373 do {
374 chunk_reset(&trash);
375 ha_thread_dump(&trash, thr);
376
377 if (applet_putchk(appctx, &trash) == -1) {
378 /* failed, try again */
379 appctx->st1 = thr;
380 return 0;
381 }
382 thr++;
383 } while (thr < global.nbthread);
Willy Tarreau5cf64dd2019-05-17 10:36:08 +0200384
Willy Tarreau4e2b6462019-05-16 17:44:30 +0200385 return 1;
386}
387
Willy Tarreau6ab7b212021-12-28 09:57:10 +0100388#if defined(HA_HAVE_DUMP_LIBS)
389/* parse a "show libs" command. It returns 1 if it emits anything otherwise zero. */
390static int debug_parse_cli_show_libs(char **args, char *payload, struct appctx *appctx, void *private)
391{
392 if (!cli_has_level(appctx, ACCESS_LVL_OPER))
393 return 1;
394
395 chunk_reset(&trash);
396 if (dump_libs(&trash, 1))
397 return cli_msg(appctx, LOG_INFO, trash.area);
398 else
399 return 0;
400}
401#endif
402
Willy Tarreau880d1682023-05-04 18:52:51 +0200403/* Dumps a state of all threads into the trash and on fd #2, then aborts.
404 * A copy will be put into a trash chunk that's assigned to thread_dump_buffer
405 * so that the debugger can easily find it. This buffer might be truncated if
406 * too many threads are being dumped, but at least we'll dump them all on stderr.
407 * If thread_dump_buffer is set, it means that a panic has already begun.
408 */
Willy Tarreau56131ca2019-05-20 13:48:29 +0200409void ha_panic()
410{
Willy Tarreau880d1682023-05-04 18:52:51 +0200411 struct buffer *old;
412 unsigned int thr;
413
414 old = NULL;
415 if (!HA_ATOMIC_CAS(&thread_dump_buffer, &old, get_trash_chunk())) {
Willy Tarreau55433f92022-07-15 12:48:58 +0200416 /* a panic dump is already in progress, let's not disturb it,
417 * we'll be called via signal DEBUGSIG. By returning we may be
418 * able to leave a current signal handler (e.g. WDT) so that
419 * this will ensure more reliable signal delivery.
420 */
421 return;
422 }
Willy Tarreau880d1682023-05-04 18:52:51 +0200423
Willy Tarreau56131ca2019-05-20 13:48:29 +0200424 chunk_reset(&trash);
Willy Tarreaua9f9fc92019-05-20 17:45:35 +0200425 chunk_appendf(&trash, "Thread %u is about to kill the process.\n", tid + 1);
Willy Tarreau880d1682023-05-04 18:52:51 +0200426
427 for (thr = 0; thr < global.nbthread; thr++) {
428 ha_thread_dump(&trash, thr);
429 DISGUISE(write(2, trash.area, trash.data));
430 b_force_xfer(thread_dump_buffer, &trash, b_room(thread_dump_buffer));
431 chunk_reset(&trash);
432 }
433
Willy Tarreau56131ca2019-05-20 13:48:29 +0200434 for (;;)
435 abort();
436}
437
Willy Tarreau06e66c82022-03-02 15:52:03 +0100438/* Complain with message <msg> on stderr. If <counter> is not NULL, it is
439 * atomically incremented, and the message is only printed when the counter
440 * was zero, so that the message is only printed once. <taint> is only checked
441 * on bit 1, and will taint the process either for a bug (2) or warn (0).
442 */
443void complain(int *counter, const char *msg, int taint)
444{
445 if (counter && _HA_ATOMIC_FETCH_ADD(counter, 1))
446 return;
447 DISGUISE(write(2, msg, strlen(msg)));
448 if (taint & 2)
449 mark_tainted(TAINTED_BUG);
450 else
451 mark_tainted(TAINTED_WARN);
452}
453
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200454/* parse a "debug dev exit" command. It always returns 1, though it should never return. */
455static int debug_parse_cli_exit(char **args, char *payload, struct appctx *appctx, void *private)
456{
457 int code = atoi(args[3]);
458
459 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
460 return 1;
461
Willy Tarreau4781b152021-04-06 13:53:36 +0200462 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200463 exit(code);
464 return 1;
465}
466
Willy Tarreau5baf4fe2021-01-22 14:15:46 +0100467/* parse a "debug dev bug" command. It always returns 1, though it should never return.
468 * Note: we make sure not to make the function static so that it appears in the trace.
469 */
470int debug_parse_cli_bug(char **args, char *payload, struct appctx *appctx, void *private)
471{
472 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
473 return 1;
474
Willy Tarreau4781b152021-04-06 13:53:36 +0200475 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau5baf4fe2021-01-22 14:15:46 +0100476 BUG_ON(one > zero);
477 return 1;
478}
479
Willy Tarreau305cfbd2022-02-25 08:52:39 +0100480/* parse a "debug dev warn" command. It always returns 1.
481 * Note: we make sure not to make the function static so that it appears in the trace.
482 */
483int debug_parse_cli_warn(char **args, char *payload, struct appctx *appctx, void *private)
484{
485 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
486 return 1;
487
488 _HA_ATOMIC_INC(&debug_commands_issued);
489 WARN_ON(one > zero);
490 return 1;
491}
492
Willy Tarreau6d3f1e32022-02-28 11:51:23 +0100493/* parse a "debug dev check" command. It always returns 1.
Willy Tarreau4e0a8b12022-02-25 08:55:11 +0100494 * Note: we make sure not to make the function static so that it appears in the trace.
495 */
Willy Tarreau6d3f1e32022-02-28 11:51:23 +0100496int debug_parse_cli_check(char **args, char *payload, struct appctx *appctx, void *private)
Willy Tarreau4e0a8b12022-02-25 08:55:11 +0100497{
498 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
499 return 1;
500
501 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6d3f1e32022-02-28 11:51:23 +0100502 CHECK_IF(one > zero);
Willy Tarreau4e0a8b12022-02-25 08:55:11 +0100503 return 1;
504}
505
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200506/* parse a "debug dev close" command. It always returns 1. */
507static int debug_parse_cli_close(char **args, char *payload, struct appctx *appctx, void *private)
508{
509 int fd;
510
511 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
512 return 1;
513
Willy Tarreau9d008692019-08-09 11:21:01 +0200514 if (!*args[3])
515 return cli_err(appctx, "Missing file descriptor number.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200516
517 fd = atoi(args[3]);
Willy Tarreau9d008692019-08-09 11:21:01 +0200518 if (fd < 0 || fd >= global.maxsock)
519 return cli_err(appctx, "File descriptor out of range.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200520
Willy Tarreau9d008692019-08-09 11:21:01 +0200521 if (!fdtab[fd].owner)
522 return cli_msg(appctx, LOG_INFO, "File descriptor was already closed.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200523
Willy Tarreau4781b152021-04-06 13:53:36 +0200524 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200525 fd_delete(fd);
526 return 1;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200527}
528
Willy Tarreaudadf00e2022-07-15 08:25:03 +0200529/* this is meant to cause a deadlock when more than one task is running it or when run twice */
530static struct task *debug_run_cli_deadlock(struct task *task, void *ctx, unsigned int state)
531{
532 static HA_SPINLOCK_T lock __maybe_unused;
533
534 HA_SPIN_LOCK(OTHER_LOCK, &lock);
535 return NULL;
536}
537
538/* parse a "debug dev deadlock" command. It always returns 1. */
539static int debug_parse_cli_deadlock(char **args, char *payload, struct appctx *appctx, void *private)
540{
541 int tasks;
542
543 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
544 return 1;
545
546 _HA_ATOMIC_INC(&debug_commands_issued);
547 for (tasks = atoi(args[3]); tasks > 0; tasks--) {
548 struct task *t = task_new_on(tasks % global.nbthread);
549 if (!t)
550 continue;
551 t->process = debug_run_cli_deadlock;
552 t->context = NULL;
553 task_wakeup(t, TASK_WOKEN_INIT);
554 }
555
556 return 1;
557}
558
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200559/* parse a "debug dev delay" command. It always returns 1. */
560static int debug_parse_cli_delay(char **args, char *payload, struct appctx *appctx, void *private)
561{
562 int delay = atoi(args[3]);
563
564 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
565 return 1;
566
Willy Tarreau4781b152021-04-06 13:53:36 +0200567 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200568 usleep((long)delay * 1000);
569 return 1;
570}
571
572/* parse a "debug dev log" command. It always returns 1. */
573static int debug_parse_cli_log(char **args, char *payload, struct appctx *appctx, void *private)
574{
575 int arg;
576
577 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
578 return 1;
579
Willy Tarreau4781b152021-04-06 13:53:36 +0200580 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200581 chunk_reset(&trash);
582 for (arg = 3; *args[arg]; arg++) {
583 if (arg > 3)
584 chunk_strcat(&trash, " ");
585 chunk_strcat(&trash, args[arg]);
586 }
587
588 send_log(NULL, LOG_INFO, "%s\n", trash.area);
589 return 1;
590}
591
592/* parse a "debug dev loop" command. It always returns 1. */
593static int debug_parse_cli_loop(char **args, char *payload, struct appctx *appctx, void *private)
594{
595 struct timeval deadline, curr;
596 int loop = atoi(args[3]);
Willy Tarreaue5e62232023-05-04 11:50:26 +0200597 int isolate;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200598
599 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
600 return 1;
601
Willy Tarreaue5e62232023-05-04 11:50:26 +0200602 isolate = strcmp(args[4], "isolated") == 0;
603
Willy Tarreau4781b152021-04-06 13:53:36 +0200604 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200605 gettimeofday(&curr, NULL);
606 tv_ms_add(&deadline, &curr, loop);
607
Willy Tarreaue5e62232023-05-04 11:50:26 +0200608 if (isolate)
609 thread_isolate();
610
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200611 while (tv_ms_cmp(&curr, &deadline) < 0)
612 gettimeofday(&curr, NULL);
613
Willy Tarreaue5e62232023-05-04 11:50:26 +0200614 if (isolate)
615 thread_release();
616
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200617 return 1;
618}
619
620/* parse a "debug dev panic" command. It always returns 1, though it should never return. */
621static int debug_parse_cli_panic(char **args, char *payload, struct appctx *appctx, void *private)
622{
623 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
624 return 1;
625
Willy Tarreau4781b152021-04-06 13:53:36 +0200626 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200627 ha_panic();
628 return 1;
629}
630
631/* parse a "debug dev exec" command. It always returns 1. */
Willy Tarreaub24ab222019-10-24 18:03:39 +0200632#if defined(DEBUG_DEV)
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200633static int debug_parse_cli_exec(char **args, char *payload, struct appctx *appctx, void *private)
634{
Willy Tarreau368bff42019-12-06 17:18:28 +0100635 int pipefd[2];
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200636 int arg;
Willy Tarreau368bff42019-12-06 17:18:28 +0100637 int pid;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200638
639 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
640 return 1;
641
Willy Tarreau4781b152021-04-06 13:53:36 +0200642 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200643 chunk_reset(&trash);
644 for (arg = 3; *args[arg]; arg++) {
645 if (arg > 3)
646 chunk_strcat(&trash, " ");
647 chunk_strcat(&trash, args[arg]);
648 }
649
Willy Tarreau368bff42019-12-06 17:18:28 +0100650 thread_isolate();
651 if (pipe(pipefd) < 0)
652 goto fail_pipe;
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200653
Willy Tarreau38247432022-04-26 10:24:14 +0200654 if (fd_set_cloexec(pipefd[0]) == -1)
Willy Tarreau368bff42019-12-06 17:18:28 +0100655 goto fail_fcntl;
656
Willy Tarreau38247432022-04-26 10:24:14 +0200657 if (fd_set_cloexec(pipefd[1]) == -1)
Willy Tarreau368bff42019-12-06 17:18:28 +0100658 goto fail_fcntl;
659
660 pid = fork();
661
662 if (pid < 0)
663 goto fail_fork;
664 else if (pid == 0) {
665 /* child */
666 char *cmd[4] = { "/bin/sh", "-c", 0, 0 };
667
668 close(0);
669 dup2(pipefd[1], 1);
670 dup2(pipefd[1], 2);
671
672 cmd[2] = trash.area;
673 execvp(cmd[0], cmd);
674 printf("execvp() failed\n");
675 exit(1);
676 }
677
678 /* parent */
679 thread_release();
680 close(pipefd[1]);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200681 chunk_reset(&trash);
682 while (1) {
Willy Tarreau368bff42019-12-06 17:18:28 +0100683 size_t ret = read(pipefd[0], trash.area + trash.data, trash.size - 20 - trash.data);
684 if (ret <= 0)
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200685 break;
686 trash.data += ret;
687 if (trash.data + 20 == trash.size) {
688 chunk_strcat(&trash, "\n[[[TRUNCATED]]]\n");
689 break;
690 }
691 }
Willy Tarreau368bff42019-12-06 17:18:28 +0100692 close(pipefd[0]);
693 waitpid(pid, NULL, WNOHANG);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200694 trash.area[trash.data] = 0;
Willy Tarreau9d008692019-08-09 11:21:01 +0200695 return cli_msg(appctx, LOG_INFO, trash.area);
Willy Tarreau368bff42019-12-06 17:18:28 +0100696
697 fail_fork:
698 fail_fcntl:
699 close(pipefd[0]);
700 close(pipefd[1]);
701 fail_pipe:
702 thread_release();
703 return cli_err(appctx, "Failed to execute command.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200704}
Willy Tarreaubd3b44e2023-03-09 08:25:01 +0100705
706/* handles SIGRTMAX to inject random delays on the receiving thread in order
707 * to try to increase the likelihood to reproduce inter-thread races. The
708 * signal is periodically sent by a task initiated by "debug dev delay-inj".
709 */
710void debug_delay_inj_sighandler(int sig, siginfo_t *si, void *arg)
711{
712 volatile int i = statistical_prng_range(10000);
713
714 while (i--)
715 __ha_cpu_relax();
716}
Willy Tarreaub24ab222019-10-24 18:03:39 +0200717#endif
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200718
719/* parse a "debug dev hex" command. It always returns 1. */
720static int debug_parse_cli_hex(char **args, char *payload, struct appctx *appctx, void *private)
721{
722 unsigned long start, len;
723
724 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
725 return 1;
726
Willy Tarreau9d008692019-08-09 11:21:01 +0200727 if (!*args[3])
728 return cli_err(appctx, "Missing memory address to dump from.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200729
730 start = strtoul(args[3], NULL, 0);
Willy Tarreau9d008692019-08-09 11:21:01 +0200731 if (!start)
732 return cli_err(appctx, "Will not dump from NULL address.\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200733
Willy Tarreau4781b152021-04-06 13:53:36 +0200734 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau9b013702019-10-24 18:18:02 +0200735
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200736 /* by default, dump ~128 till next block of 16 */
737 len = strtoul(args[4], NULL, 0);
738 if (!len)
739 len = ((start + 128) & -16) - start;
740
741 chunk_reset(&trash);
Willy Tarreau37101052019-05-20 16:48:20 +0200742 dump_hex(&trash, " ", (const void *)start, len, 1);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200743 trash.area[trash.data] = 0;
Willy Tarreau9d008692019-08-09 11:21:01 +0200744 return cli_msg(appctx, LOG_INFO, trash.area);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200745}
746
Willy Tarreau48129be2021-05-04 18:40:50 +0200747/* parse a "debug dev sym <addr>" command. It always returns 1. */
748static int debug_parse_cli_sym(char **args, char *payload, struct appctx *appctx, void *private)
749{
750 unsigned long addr;
751
752 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
753 return 1;
754
755 if (!*args[3])
756 return cli_err(appctx, "Missing memory address to be resolved.\n");
757
758 _HA_ATOMIC_INC(&debug_commands_issued);
759
760 addr = strtoul(args[3], NULL, 0);
761 chunk_printf(&trash, "%#lx resolves to ", addr);
762 resolve_sym_name(&trash, NULL, (const void *)addr);
763 chunk_appendf(&trash, "\n");
764
765 return cli_msg(appctx, LOG_INFO, trash.area);
766}
767
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200768/* parse a "debug dev tkill" command. It always returns 1. */
769static int debug_parse_cli_tkill(char **args, char *payload, struct appctx *appctx, void *private)
770{
771 int thr = 0;
772 int sig = SIGABRT;
773
774 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
775 return 1;
776
777 if (*args[3])
778 thr = atoi(args[3]);
779
Willy Tarreau9d008692019-08-09 11:21:01 +0200780 if (thr < 0 || thr > global.nbthread)
781 return cli_err(appctx, "Thread number out of range (use 0 for current).\n");
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200782
783 if (*args[4])
784 sig = atoi(args[4]);
785
Willy Tarreau4781b152021-04-06 13:53:36 +0200786 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200787 if (thr)
Willy Tarreaufade80d2019-05-22 08:46:59 +0200788 ha_tkill(thr - 1, sig);
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200789 else
Willy Tarreau6bdf3e92019-05-20 14:25:05 +0200790 raise(sig);
791 return 1;
792}
793
Erwan Le Goas54966df2022-09-14 17:24:22 +0200794/* hashes 'word' in "debug dev hash 'word' ". */
795static int debug_parse_cli_hash(char **args, char *payload, struct appctx *appctx, void *private)
796{
797 char *msg = NULL;
798
799 cli_dynmsg(appctx, LOG_INFO, memprintf(&msg, "%s\n", HA_ANON_CLI(args[3])));
800 return 1;
801}
802
Willy Tarreau6cbe62b2020-03-05 17:16:24 +0100803/* parse a "debug dev write" command. It always returns 1. */
804static int debug_parse_cli_write(char **args, char *payload, struct appctx *appctx, void *private)
805{
806 unsigned long len;
807
808 if (!*args[3])
809 return cli_err(appctx, "Missing output size.\n");
810
811 len = strtoul(args[3], NULL, 0);
812 if (len >= trash.size)
813 return cli_err(appctx, "Output too large, must be <tune.bufsize.\n");
814
Willy Tarreau4781b152021-04-06 13:53:36 +0200815 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau6cbe62b2020-03-05 17:16:24 +0100816
817 chunk_reset(&trash);
818 trash.data = len;
819 memset(trash.area, '.', trash.data);
820 trash.area[trash.data] = 0;
821 for (len = 64; len < trash.data; len += 64)
822 trash.area[len] = '\n';
823 return cli_msg(appctx, LOG_INFO, trash.area);
824}
825
Willy Tarreau68680bb2019-10-23 17:23:25 +0200826/* parse a "debug dev stream" command */
827/*
828 * debug dev stream [strm=<ptr>] [strm.f[{+-=}<flags>]] [txn.f[{+-=}<flags>]] \
829 * [req.f[{+-=}<flags>]] [res.f[{+-=}<flags>]] \
830 * [sif.f[{+-=<flags>]] [sib.f[{+-=<flags>]] \
831 * [sif.s[=<state>]] [sib.s[=<state>]]
832 */
833static int debug_parse_cli_stream(char **args, char *payload, struct appctx *appctx, void *private)
834{
Willy Tarreau0698c802022-05-11 14:09:57 +0200835 struct stream *s = appctx_strm(appctx);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200836 int arg;
837 void *ptr;
838 int size;
839 const char *word, *end;
840 struct ist name;
841 char *msg = NULL;
842 char *endarg;
843 unsigned long long old, new;
844
845 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
846 return 1;
847
848 ptr = NULL; size = 0;
849
850 if (!*args[3]) {
851 return cli_err(appctx,
Willy Tarreaudd014482023-05-02 16:37:13 +0200852 "Usage: debug dev stream [ strm=<ptr> ] { <obj> <op> <value> | wake }*\n"
853 " <obj> = { strm.f | strm.x | scf.s | scb.s | txn.f | req.f | res.f }\n"
Willy Tarreau68680bb2019-10-23 17:23:25 +0200854 " <op> = {'' (show) | '=' (assign) | '^' (xor) | '+' (or) | '-' (andnot)}\n"
855 " <value> = 'now' | 64-bit dec/hex integer (0x prefix supported)\n"
856 " 'wake' wakes the stream asssigned to 'strm' (default: current)\n"
857 );
858 }
859
Willy Tarreau4781b152021-04-06 13:53:36 +0200860 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200861 for (arg = 3; *args[arg]; arg++) {
862 old = 0;
863 end = word = args[arg];
864 while (*end && *end != '=' && *end != '^' && *end != '+' && *end != '-')
865 end++;
866 name = ist2(word, end - word);
867 if (isteq(name, ist("strm"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200868 ptr = (!s || !may_access(s)) ? NULL : &s; size = sizeof(s);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200869 } else if (isteq(name, ist("strm.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200870 ptr = (!s || !may_access(s)) ? NULL : &s->flags; size = sizeof(s->flags);
Christopher Fauletae024ce2022-03-29 19:02:31 +0200871 } else if (isteq(name, ist("strm.x"))) {
872 ptr = (!s || !may_access(s)) ? NULL : &s->conn_exp; size = sizeof(s->conn_exp);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200873 } else if (isteq(name, ist("txn.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200874 ptr = (!s || !may_access(s)) ? NULL : &s->txn->flags; size = sizeof(s->txn->flags);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200875 } else if (isteq(name, ist("req.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200876 ptr = (!s || !may_access(s)) ? NULL : &s->req.flags; size = sizeof(s->req.flags);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200877 } else if (isteq(name, ist("res.f"))) {
Willy Tarreaub2fee042019-10-25 10:06:55 +0200878 ptr = (!s || !may_access(s)) ? NULL : &s->res.flags; size = sizeof(s->res.flags);
Willy Tarreau7cb9e6c2022-05-17 19:40:40 +0200879 } else if (isteq(name, ist("scf.s"))) {
880 ptr = (!s || !may_access(s)) ? NULL : &s->scf->state; size = sizeof(s->scf->state);
881 } else if (isteq(name, ist("scb.s"))) {
882 ptr = (!s || !may_access(s)) ? NULL : &s->scf->state; size = sizeof(s->scb->state);
Willy Tarreau68680bb2019-10-23 17:23:25 +0200883 } else if (isteq(name, ist("wake"))) {
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200884 if (s && may_access(s) && may_access((void *)s + sizeof(*s) - 1))
Willy Tarreau68680bb2019-10-23 17:23:25 +0200885 task_wakeup(s->task, TASK_WOKEN_TIMER|TASK_WOKEN_IO|TASK_WOKEN_MSG);
886 continue;
887 } else
888 return cli_dynerr(appctx, memprintf(&msg, "Unsupported field name: '%s'.\n", word));
889
890 /* read previous value */
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200891 if ((s || ptr == &s) && ptr && may_access(ptr) && may_access(ptr + size - 1)) {
Willy Tarreau68680bb2019-10-23 17:23:25 +0200892 if (size == 8)
893 old = read_u64(ptr);
894 else if (size == 4)
895 old = read_u32(ptr);
896 else if (size == 2)
897 old = read_u16(ptr);
898 else
899 old = *(const uint8_t *)ptr;
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200900 } else {
901 memprintf(&msg,
902 "%sSkipping inaccessible pointer %p for field '%.*s'.\n",
903 msg ? msg : "", ptr, (int)(end - word), word);
904 continue;
Willy Tarreau68680bb2019-10-23 17:23:25 +0200905 }
906
907 /* parse the new value . */
908 new = strtoll(end + 1, &endarg, 0);
909 if (end[1] && *endarg) {
910 if (strcmp(end + 1, "now") == 0)
911 new = now_ms;
912 else {
913 memprintf(&msg,
914 "%sIgnoring unparsable value '%s' for field '%.*s'.\n",
915 msg ? msg : "", end + 1, (int)(end - word), word);
916 continue;
917 }
918 }
919
920 switch (*end) {
921 case '\0': /* show */
922 memprintf(&msg, "%s%.*s=%#llx ", msg ? msg : "", (int)(end - word), word, old);
923 new = old; // do not change the value
924 break;
925
926 case '=': /* set */
927 break;
928
929 case '^': /* XOR */
930 new = old ^ new;
931 break;
932
933 case '+': /* OR */
934 new = old | new;
935 break;
936
937 case '-': /* AND NOT */
938 new = old & ~new;
939 break;
940
941 default:
942 break;
943 }
944
945 /* write the new value */
Willy Tarreau2b5520d2019-10-24 18:28:23 +0200946 if (new != old) {
Willy Tarreau68680bb2019-10-23 17:23:25 +0200947 if (size == 8)
948 write_u64(ptr, new);
949 else if (size == 4)
950 write_u32(ptr, new);
951 else if (size == 2)
952 write_u16(ptr, new);
953 else
954 *(uint8_t *)ptr = new;
955 }
956 }
957
958 if (msg && *msg)
959 return cli_dynmsg(appctx, LOG_INFO, msg);
960 return 1;
961}
962
Willy Tarreau98679872023-05-03 11:22:45 +0200963/* parse a "debug dev stream" command */
964/*
965 * debug dev task <ptr> [ "wake" | "expire" | "kill" ]
966 * Show/change status of a task/tasklet
967 */
968static int debug_parse_cli_task(char **args, char *payload, struct appctx *appctx, void *private)
969{
970 const struct ha_caller *caller;
971 struct task *t;
972 char *endarg;
973 char *msg;
974 void *ptr;
975 int ret = 1;
976 int task_ok;
977 int arg;
978
979 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
980 return 1;
981
982 /* parse the pointer value */
983 ptr = (void *)strtoll(args[3], &endarg, 0);
984 if (!*args[3] || *endarg)
985 goto usage;
986
987 _HA_ATOMIC_INC(&debug_commands_issued);
988
989 /* everything below must run under thread isolation till reaching label "leave" */
990 thread_isolate();
991
992 /* struct tasklet is smaller than struct task and is sufficient to check
993 * the TASK_COMMON part.
994 */
995 if (!may_access(ptr) || !may_access(ptr + sizeof(struct tasklet) - 1) ||
996 ((const struct tasklet *)ptr)->tid < -1 ||
997 ((const struct tasklet *)ptr)->tid >= (int)MAX_THREADS) {
998 ret = cli_err(appctx, "The designated memory area doesn't look like a valid task/tasklet\n");
999 goto leave;
1000 }
1001
1002 t = ptr;
1003 caller = t->caller;
1004 msg = NULL;
1005 task_ok = may_access(t + sizeof(*t) - 1);
1006
1007 chunk_reset(&trash);
1008 resolve_sym_name(&trash, NULL, (const void *)t->process);
1009
1010 /* we need to be careful here because we may dump a freed task that's
1011 * still in the pool cache, containing garbage in pointers.
1012 */
1013 if (!*args[4]) {
1014 memprintf(&msg, "%s%p: %s state=%#x tid=%d process=%s ctx=%p calls=%d last=%s:%d intl=%d",
1015 msg ? msg : "", t, (t->state & TASK_F_TASKLET) ? "tasklet" : "task",
1016 t->state, t->tid, trash.area, t->context, t->calls,
Willy Tarreauff508f12023-05-03 16:28:54 +02001017 caller && may_access(caller) && may_access(caller->func) && isalnum((uchar)*caller->func) ? caller->func : "0",
Willy Tarreau98679872023-05-03 11:22:45 +02001018 caller ? t->caller->line : 0,
1019 (t->state & TASK_F_TASKLET) ? LIST_INLIST(&((const struct tasklet *)t)->list) : 0);
1020
1021 if (task_ok && !(t->state & TASK_F_TASKLET))
1022 memprintf(&msg, "%s inrq=%d inwq=%d exp=%d nice=%d",
1023 msg ? msg : "", task_in_rq(t), task_in_wq(t), t->expire, t->nice);
1024
1025 memprintf(&msg, "%s\n", msg ? msg : "");
1026 }
1027
1028 for (arg = 4; *args[arg]; arg++) {
1029 if (strcmp(args[arg], "expire") == 0) {
1030 if (t->state & TASK_F_TASKLET) {
1031 /* do nothing for tasklets */
1032 }
1033 else if (task_ok) {
1034 /* unlink task and wake with timer flag */
1035 __task_unlink_wq(t);
1036 t->expire = now_ms;
1037 task_wakeup(t, TASK_WOKEN_TIMER);
1038 }
1039 } else if (strcmp(args[arg], "wake") == 0) {
1040 /* wake with all flags but init / timer */
1041 if (t->state & TASK_F_TASKLET)
1042 tasklet_wakeup((struct tasklet *)t);
1043 else if (task_ok)
1044 task_wakeup(t, TASK_WOKEN_ANY & ~(TASK_WOKEN_INIT|TASK_WOKEN_TIMER));
1045 } else if (strcmp(args[arg], "kill") == 0) {
1046 /* Kill the task. This is not idempotent! */
1047 if (!(t->state & TASK_KILLED)) {
1048 if (t->state & TASK_F_TASKLET)
1049 tasklet_kill((struct tasklet *)t);
1050 else if (task_ok)
1051 task_kill(t);
1052 }
1053 } else {
1054 thread_release();
1055 goto usage;
1056 }
1057 }
1058
1059 if (msg && *msg)
1060 ret = cli_dynmsg(appctx, LOG_INFO, msg);
1061 leave:
1062 thread_release();
1063 return ret;
1064 usage:
1065 return cli_err(appctx,
1066 "Usage: debug dev task <ptr> [ wake | expire | kill ]\n"
1067 " By default, dumps some info on task/tasklet <ptr>. 'wake' will wake it up\n"
1068 " with all conditions flags but init/exp. 'expire' will expire the entry, and\n"
1069 " 'kill' will kill it (warning: may crash since later not idempotent!). All\n"
1070 " changes may crash the process if performed on a wrong object!\n"
1071 );
1072}
1073
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001074#if defined(DEBUG_DEV)
1075static struct task *debug_delay_inj_task(struct task *t, void *ctx, unsigned int state)
1076{
1077 unsigned long *tctx = ctx; // [0] = interval, [1] = nbwakeups
1078 unsigned long inter = tctx[0];
1079 unsigned long count = tctx[1];
1080 unsigned long rnd;
1081
1082 if (inter)
1083 t->expire = tick_add(now_ms, inter);
1084 else
1085 task_wakeup(t, TASK_WOKEN_MSG);
1086
1087 /* wake a random thread */
1088 while (count--) {
1089 rnd = statistical_prng_range(global.nbthread);
1090 ha_tkill(rnd, SIGRTMAX);
1091 }
1092 return t;
1093}
1094
1095/* parse a "debug dev delay-inj" command
1096 * debug dev delay-inj <inter> <count>
1097 */
1098static int debug_parse_delay_inj(char **args, char *payload, struct appctx *appctx, void *private)
1099{
1100 unsigned long *tctx; // [0] = inter, [2] = count
1101 struct task *task;
1102
1103 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
1104 return 1;
1105
1106 if (!*args[4])
1107 return cli_err(appctx, "Usage: debug dev delay-inj <inter_ms> <count>*\n");
1108
1109 _HA_ATOMIC_INC(&debug_commands_issued);
1110
1111 tctx = calloc(sizeof(*tctx), 2);
1112 if (!tctx)
1113 goto fail;
1114
1115 tctx[0] = atoi(args[3]);
1116 tctx[1] = atoi(args[4]);
1117
1118 task = task_new_here/*anywhere*/();
1119 if (!task)
1120 goto fail;
1121
1122 task->process = debug_delay_inj_task;
1123 task->context = tctx;
1124 task_wakeup(task, TASK_WOKEN_INIT);
1125 return 1;
1126
1127 fail:
1128 free(tctx);
1129 return cli_err(appctx, "Not enough memory");
1130}
1131#endif // DEBUG_DEV
1132
Willy Tarreau144f84a2021-03-02 16:09:26 +01001133static struct task *debug_task_handler(struct task *t, void *ctx, unsigned int state)
Willy Tarreaua5a44792020-11-29 17:12:15 +01001134{
1135 unsigned long *tctx = ctx; // [0] = #tasks, [1] = inter, [2+] = { tl | (tsk+1) }
1136 unsigned long inter = tctx[1];
1137 unsigned long rnd;
1138
1139 t->expire = tick_add(now_ms, inter);
1140
1141 /* half of the calls will wake up another entry */
Willy Tarreau06e69b52021-03-02 14:01:35 +01001142 rnd = statistical_prng();
Willy Tarreaua5a44792020-11-29 17:12:15 +01001143 if (rnd & 1) {
1144 rnd >>= 1;
1145 rnd %= tctx[0];
1146 rnd = tctx[rnd + 2];
1147
1148 if (rnd & 1)
1149 task_wakeup((struct task *)(rnd - 1), TASK_WOKEN_MSG);
1150 else
1151 tasklet_wakeup((struct tasklet *)rnd);
1152 }
1153 return t;
1154}
1155
Willy Tarreau144f84a2021-03-02 16:09:26 +01001156static struct task *debug_tasklet_handler(struct task *t, void *ctx, unsigned int state)
Willy Tarreaua5a44792020-11-29 17:12:15 +01001157{
1158 unsigned long *tctx = ctx; // [0] = #tasks, [1] = inter, [2+] = { tl | (tsk+1) }
1159 unsigned long rnd;
1160 int i;
1161
1162 /* wake up two random entries */
1163 for (i = 0; i < 2; i++) {
Willy Tarreau06e69b52021-03-02 14:01:35 +01001164 rnd = statistical_prng() % tctx[0];
Willy Tarreaua5a44792020-11-29 17:12:15 +01001165 rnd = tctx[rnd + 2];
1166
1167 if (rnd & 1)
1168 task_wakeup((struct task *)(rnd - 1), TASK_WOKEN_MSG);
1169 else
1170 tasklet_wakeup((struct tasklet *)rnd);
1171 }
1172 return t;
1173}
1174
1175/* parse a "debug dev sched" command
1176 * debug dev sched {task|tasklet} [count=<count>] [mask=<mask>] [single=<single>] [inter=<inter>]
1177 */
1178static int debug_parse_cli_sched(char **args, char *payload, struct appctx *appctx, void *private)
1179{
1180 int arg;
1181 void *ptr;
1182 int size;
1183 const char *word, *end;
1184 struct ist name;
1185 char *msg = NULL;
1186 char *endarg;
1187 unsigned long long new;
1188 unsigned long count = 0;
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001189 unsigned long thrid = tid;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001190 unsigned int inter = 0;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001191 unsigned long i;
1192 int mode = 0; // 0 = tasklet; 1 = task
Willy Tarreaua5a44792020-11-29 17:12:15 +01001193 unsigned long *tctx; // [0] = #tasks, [1] = inter, [2+] = { tl | (tsk+1) }
1194
1195 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
1196 return 1;
1197
1198 ptr = NULL; size = 0;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001199
1200 if (strcmp(args[3], "task") != 0 && strcmp(args[3], "tasklet") != 0) {
1201 return cli_err(appctx,
1202 "Usage: debug dev sched {task|tasklet} { <obj> = <value> }*\n"
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001203 " <obj> = {count | tid | inter }\n"
Willy Tarreaua5a44792020-11-29 17:12:15 +01001204 " <value> = 64-bit dec/hex integer (0x prefix supported)\n"
1205 );
1206 }
1207
1208 mode = strcmp(args[3], "task") == 0;
1209
Willy Tarreau4781b152021-04-06 13:53:36 +02001210 _HA_ATOMIC_INC(&debug_commands_issued);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001211 for (arg = 4; *args[arg]; arg++) {
1212 end = word = args[arg];
1213 while (*end && *end != '=' && *end != '^' && *end != '+' && *end != '-')
1214 end++;
1215 name = ist2(word, end - word);
1216 if (isteq(name, ist("count"))) {
1217 ptr = &count; size = sizeof(count);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001218 } else if (isteq(name, ist("tid"))) {
1219 ptr = &thrid; size = sizeof(thrid);
1220 } else if (isteq(name, ist("inter"))) {
1221 ptr = &inter; size = sizeof(inter);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001222 } else
1223 return cli_dynerr(appctx, memprintf(&msg, "Unsupported setting: '%s'.\n", word));
1224
1225 /* parse the new value . */
1226 new = strtoll(end + 1, &endarg, 0);
1227 if (end[1] && *endarg) {
1228 memprintf(&msg,
1229 "%sIgnoring unparsable value '%s' for field '%.*s'.\n",
1230 msg ? msg : "", end + 1, (int)(end - word), word);
1231 continue;
1232 }
1233
1234 /* write the new value */
1235 if (size == 8)
1236 write_u64(ptr, new);
1237 else if (size == 4)
1238 write_u32(ptr, new);
1239 else if (size == 2)
1240 write_u16(ptr, new);
1241 else
1242 *(uint8_t *)ptr = new;
1243 }
1244
1245 tctx = calloc(sizeof(*tctx), count + 2);
1246 if (!tctx)
1247 goto fail;
1248
1249 tctx[0] = (unsigned long)count;
1250 tctx[1] = (unsigned long)inter;
1251
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001252 if (thrid >= global.nbthread)
1253 thrid = tid;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001254
Willy Tarreaua5a44792020-11-29 17:12:15 +01001255 for (i = 0; i < count; i++) {
Willy Tarreaua5a44792020-11-29 17:12:15 +01001256 /* now, if poly or mask was set, tmask corresponds to the
1257 * valid thread mask to use, otherwise it remains zero.
1258 */
1259 //printf("%lu: mode=%d mask=%#lx\n", i, mode, tmask);
1260 if (mode == 0) {
1261 struct tasklet *tl = tasklet_new();
1262
1263 if (!tl)
1264 goto fail;
1265
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001266 tl->tid = thrid;
Willy Tarreaua5a44792020-11-29 17:12:15 +01001267 tl->process = debug_tasklet_handler;
1268 tl->context = tctx;
1269 tctx[i + 2] = (unsigned long)tl;
1270 } else {
Willy Tarreau8e5c53a2022-06-15 16:32:41 +02001271 struct task *task = task_new_on(thrid);
Willy Tarreaua5a44792020-11-29 17:12:15 +01001272
1273 if (!task)
1274 goto fail;
1275
1276 task->process = debug_task_handler;
1277 task->context = tctx;
1278 tctx[i + 2] = (unsigned long)task + 1;
1279 }
1280 }
1281
1282 /* start the tasks and tasklets */
1283 for (i = 0; i < count; i++) {
1284 unsigned long ctx = tctx[i + 2];
1285
1286 if (ctx & 1)
1287 task_wakeup((struct task *)(ctx - 1), TASK_WOKEN_INIT);
1288 else
1289 tasklet_wakeup((struct tasklet *)ctx);
1290 }
1291
1292 if (msg && *msg)
1293 return cli_dynmsg(appctx, LOG_INFO, msg);
1294 return 1;
1295
1296 fail:
1297 /* free partially allocated entries */
1298 for (i = 0; tctx && i < count; i++) {
1299 unsigned long ctx = tctx[i + 2];
1300
1301 if (!ctx)
1302 break;
1303
1304 if (ctx & 1)
1305 task_destroy((struct task *)(ctx - 1));
1306 else
1307 tasklet_free((struct tasklet *)ctx);
1308 }
1309
1310 free(tctx);
1311 return cli_err(appctx, "Not enough memory");
1312}
1313
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001314/* CLI state for "debug dev fd" */
1315struct dev_fd_ctx {
1316 int start_fd;
1317};
1318
Willy Tarreau5be7c192022-01-24 20:26:09 +01001319/* CLI parser for the "debug dev fd" command. The current FD to restart from is
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001320 * stored in a struct dev_fd_ctx pointed to by svcctx.
Willy Tarreau5be7c192022-01-24 20:26:09 +01001321 */
1322static int debug_parse_cli_fd(char **args, char *payload, struct appctx *appctx, void *private)
1323{
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001324 struct dev_fd_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
1325
Willy Tarreau5be7c192022-01-24 20:26:09 +01001326 if (!cli_has_level(appctx, ACCESS_LVL_OPER))
1327 return 1;
1328
1329 /* start at fd #0 */
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001330 ctx->start_fd = 0;
Willy Tarreau5be7c192022-01-24 20:26:09 +01001331 return 0;
1332}
1333
1334/* CLI I/O handler for the "debug dev fd" command. Dumps all FDs that are
1335 * accessible from the process but not known from fdtab. The FD number to
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001336 * restart from is stored in a struct dev_fd_ctx pointed to by svcctx.
Willy Tarreau5be7c192022-01-24 20:26:09 +01001337 */
1338static int debug_iohandler_fd(struct appctx *appctx)
1339{
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001340 struct dev_fd_ctx *ctx = appctx->svcctx;
Willy Tarreauc12b3212022-05-27 11:08:15 +02001341 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau5be7c192022-01-24 20:26:09 +01001342 struct sockaddr_storage sa;
1343 struct stat statbuf;
1344 socklen_t salen, vlen;
1345 int ret1, ret2, port;
1346 char *addrstr;
1347 int ret = 1;
1348 int i, fd;
1349
Christopher Faulet87633c32023-04-03 18:32:50 +02001350 /* FIXME: Don't watch the other side !*/
Christopher Faulet208c7122023-04-13 16:16:15 +02001351 if (unlikely(sc_opposite(sc)->flags & SC_FL_SHUT_DONE))
Willy Tarreau5be7c192022-01-24 20:26:09 +01001352 goto end;
1353
1354 chunk_reset(&trash);
1355
1356 thread_isolate();
1357
1358 /* we have two inner loops here, one for the proxy, the other one for
1359 * the buffer.
1360 */
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001361 for (fd = ctx->start_fd; fd < global.maxsock; fd++) {
Willy Tarreau5be7c192022-01-24 20:26:09 +01001362 /* check for FD's existence */
1363 ret1 = fcntl(fd, F_GETFD, 0);
1364 if (ret1 == -1)
1365 continue; // not known to the process
1366 if (fdtab[fd].owner)
1367 continue; // well-known
1368
1369 /* OK we're seeing an orphan let's try to retrieve as much
1370 * information as possible about it.
1371 */
1372 chunk_printf(&trash, "%5d", fd);
1373
1374 if (fstat(fd, &statbuf) != -1) {
1375 chunk_appendf(&trash, " type=%s mod=%04o dev=%#llx siz=%#llx uid=%lld gid=%lld fs=%#llx ino=%#llx",
1376 isatty(fd) ? "tty.":
1377 S_ISREG(statbuf.st_mode) ? "file":
1378 S_ISDIR(statbuf.st_mode) ? "dir.":
1379 S_ISCHR(statbuf.st_mode) ? "chr.":
1380 S_ISBLK(statbuf.st_mode) ? "blk.":
1381 S_ISFIFO(statbuf.st_mode) ? "pipe":
1382 S_ISLNK(statbuf.st_mode) ? "link":
1383 S_ISSOCK(statbuf.st_mode) ? "sock":
1384#ifdef USE_EPOLL
1385 epoll_wait(fd, NULL, 0, 0) != -1 || errno != EBADF ? "epol":
1386#endif
1387 "????",
1388 (uint)statbuf.st_mode & 07777,
1389
1390 (ullong)statbuf.st_rdev,
1391 (ullong)statbuf.st_size,
1392 (ullong)statbuf.st_uid,
1393 (ullong)statbuf.st_gid,
1394
1395 (ullong)statbuf.st_dev,
1396 (ullong)statbuf.st_ino);
1397 }
1398
1399 chunk_appendf(&trash, " getfd=%s+%#x",
1400 (ret1 & FD_CLOEXEC) ? "cloex" : "",
1401 ret1 &~ FD_CLOEXEC);
1402
1403 /* FD options */
1404 ret2 = fcntl(fd, F_GETFL, 0);
1405 if (ret2) {
1406 chunk_appendf(&trash, " getfl=%s",
1407 (ret1 & 3) >= 2 ? "O_RDWR" :
1408 (ret1 & 1) ? "O_WRONLY" : "O_RDONLY");
1409
1410 for (i = 2; i < 32; i++) {
1411 if (!(ret2 & (1UL << i)))
1412 continue;
1413 switch (1UL << i) {
1414 case O_CREAT: chunk_appendf(&trash, ",O_CREAT"); break;
1415 case O_EXCL: chunk_appendf(&trash, ",O_EXCL"); break;
1416 case O_NOCTTY: chunk_appendf(&trash, ",O_NOCTTY"); break;
1417 case O_TRUNC: chunk_appendf(&trash, ",O_TRUNC"); break;
1418 case O_APPEND: chunk_appendf(&trash, ",O_APPEND"); break;
Willy Tarreau410942b2022-01-25 14:51:53 +01001419#ifdef O_ASYNC
Willy Tarreau5be7c192022-01-24 20:26:09 +01001420 case O_ASYNC: chunk_appendf(&trash, ",O_ASYNC"); break;
Willy Tarreau410942b2022-01-25 14:51:53 +01001421#endif
Willy Tarreau5be7c192022-01-24 20:26:09 +01001422#ifdef O_DIRECT
1423 case O_DIRECT: chunk_appendf(&trash, ",O_DIRECT"); break;
1424#endif
1425#ifdef O_NOATIME
1426 case O_NOATIME: chunk_appendf(&trash, ",O_NOATIME"); break;
1427#endif
1428 }
1429 }
1430 }
1431
1432 vlen = sizeof(ret2);
1433 ret1 = getsockopt(fd, SOL_SOCKET, SO_TYPE, &ret2, &vlen);
1434 if (ret1 != -1)
1435 chunk_appendf(&trash, " so_type=%d", ret2);
1436
1437 vlen = sizeof(ret2);
1438 ret1 = getsockopt(fd, SOL_SOCKET, SO_ACCEPTCONN, &ret2, &vlen);
1439 if (ret1 != -1)
1440 chunk_appendf(&trash, " so_accept=%d", ret2);
1441
1442 vlen = sizeof(ret2);
1443 ret1 = getsockopt(fd, SOL_SOCKET, SO_ERROR, &ret2, &vlen);
1444 if (ret1 != -1)
1445 chunk_appendf(&trash, " so_error=%d", ret2);
1446
1447 salen = sizeof(sa);
1448 if (getsockname(fd, (struct sockaddr *)&sa, &salen) != -1) {
1449 if (sa.ss_family == AF_INET)
1450 port = ntohs(((const struct sockaddr_in *)&sa)->sin_port);
1451 else if (sa.ss_family == AF_INET6)
1452 port = ntohs(((const struct sockaddr_in6 *)&sa)->sin6_port);
1453 else
1454 port = 0;
1455 addrstr = sa2str(&sa, port, 0);
1456 chunk_appendf(&trash, " laddr=%s", addrstr);
1457 free(addrstr);
1458 }
1459
1460 salen = sizeof(sa);
1461 if (getpeername(fd, (struct sockaddr *)&sa, &salen) != -1) {
1462 if (sa.ss_family == AF_INET)
1463 port = ntohs(((const struct sockaddr_in *)&sa)->sin_port);
1464 else if (sa.ss_family == AF_INET6)
1465 port = ntohs(((const struct sockaddr_in6 *)&sa)->sin6_port);
1466 else
1467 port = 0;
1468 addrstr = sa2str(&sa, port, 0);
1469 chunk_appendf(&trash, " raddr=%s", addrstr);
1470 free(addrstr);
1471 }
1472
1473 chunk_appendf(&trash, "\n");
1474
Willy Tarreaud0a06d52022-05-18 15:07:19 +02001475 if (applet_putchk(appctx, &trash) == -1) {
Willy Tarreaue06bbf32022-05-05 14:26:28 +02001476 ctx->start_fd = fd;
Willy Tarreau5be7c192022-01-24 20:26:09 +01001477 ret = 0;
1478 break;
1479 }
1480 }
1481
1482 thread_release();
1483 end:
1484 return ret;
1485}
1486
Willy Tarreaua6026a02020-07-02 09:14:48 +02001487#if defined(DEBUG_MEM_STATS)
Willy Tarreau40e952f2022-05-05 14:39:51 +02001488
1489/* CLI state for "debug dev memstats" */
1490struct dev_mem_ctx {
1491 struct mem_stats *start, *stop; /* begin/end of dump */
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001492 char *match; /* non-null if a name prefix is specified */
Willy Tarreau40e952f2022-05-05 14:39:51 +02001493 int show_all; /* show all entries if non-null */
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001494 int width; /* 1st column width */
1495 long tot_size; /* sum of alloc-free */
1496 ulong tot_calls; /* sum of calls */
Willy Tarreau40e952f2022-05-05 14:39:51 +02001497};
1498
1499/* CLI parser for the "debug dev memstats" command. Sets a dev_mem_ctx shown above. */
Willy Tarreaua6026a02020-07-02 09:14:48 +02001500static int debug_parse_cli_memstats(char **args, char *payload, struct appctx *appctx, void *private)
1501{
Willy Tarreau40e952f2022-05-05 14:39:51 +02001502 struct dev_mem_ctx *ctx = applet_reserve_svcctx(appctx, sizeof(*ctx));
Willy Tarreau334d0912022-11-30 16:50:48 +01001503 int arg;
Willy Tarreau40e952f2022-05-05 14:39:51 +02001504
Willy Tarreaua6026a02020-07-02 09:14:48 +02001505 extern __attribute__((__weak__)) struct mem_stats __start_mem_stats;
1506 extern __attribute__((__weak__)) struct mem_stats __stop_mem_stats;
1507
1508 if (!cli_has_level(appctx, ACCESS_LVL_OPER))
1509 return 1;
1510
Willy Tarreau334d0912022-11-30 16:50:48 +01001511 for (arg = 3; *args[arg]; arg++) {
1512 if (strcmp(args[arg], "reset") == 0) {
1513 struct mem_stats *ptr;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001514
Willy Tarreau334d0912022-11-30 16:50:48 +01001515 if (!cli_has_level(appctx, ACCESS_LVL_ADMIN))
1516 return 1;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001517
Willy Tarreau334d0912022-11-30 16:50:48 +01001518 for (ptr = &__start_mem_stats; ptr < &__stop_mem_stats; ptr++) {
1519 _HA_ATOMIC_STORE(&ptr->calls, 0);
1520 _HA_ATOMIC_STORE(&ptr->size, 0);
1521 }
1522 return 1;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001523 }
Willy Tarreau334d0912022-11-30 16:50:48 +01001524 else if (strcmp(args[arg], "all") == 0) {
1525 ctx->show_all = 1;
1526 continue;
1527 }
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001528 else if (strcmp(args[arg], "match") == 0 && *args[arg + 1]) {
1529 ha_free(&ctx->match);
1530 ctx->match = strdup(args[arg + 1]);
1531 arg++;
1532 continue;
1533 }
Willy Tarreau334d0912022-11-30 16:50:48 +01001534 else
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001535 return cli_err(appctx, "Expects either 'reset', 'all', or 'match <pfx>'.\n");
Willy Tarreaua6026a02020-07-02 09:14:48 +02001536 }
1537
Willy Tarreaua6026a02020-07-02 09:14:48 +02001538 /* otherwise proceed with the dump from p0 to p1 */
Willy Tarreau40e952f2022-05-05 14:39:51 +02001539 ctx->start = &__start_mem_stats;
1540 ctx->stop = &__stop_mem_stats;
Willy Tarreau4a426e22022-08-09 08:51:08 +02001541 ctx->width = 0;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001542 return 0;
1543}
1544
Willy Tarreau40e952f2022-05-05 14:39:51 +02001545/* CLI I/O handler for the "debug dev memstats" command using a dev_mem_ctx
1546 * found in appctx->svcctx. Dumps all mem_stats structs referenced by pointers
1547 * located between ->start and ->stop. Dumps all entries if ->show_all != 0,
1548 * otherwise only non-zero calls.
Willy Tarreaua6026a02020-07-02 09:14:48 +02001549 */
1550static int debug_iohandler_memstats(struct appctx *appctx)
1551{
Willy Tarreau40e952f2022-05-05 14:39:51 +02001552 struct dev_mem_ctx *ctx = appctx->svcctx;
Willy Tarreauc12b3212022-05-27 11:08:15 +02001553 struct stconn *sc = appctx_sc(appctx);
Willy Tarreau4a426e22022-08-09 08:51:08 +02001554 struct mem_stats *ptr;
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001555 const char *pfx = ctx->match;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001556 int ret = 1;
1557
Christopher Faulet87633c32023-04-03 18:32:50 +02001558 /* FIXME: Don't watch the other side !*/
Christopher Faulet208c7122023-04-13 16:16:15 +02001559 if (unlikely(sc_opposite(sc)->flags & SC_FL_SHUT_DONE))
Willy Tarreaua6026a02020-07-02 09:14:48 +02001560 goto end;
1561
Willy Tarreau4a426e22022-08-09 08:51:08 +02001562 if (!ctx->width) {
1563 /* we don't know the first column's width, let's compute it
1564 * now based on a first pass on printable entries and their
1565 * expected width (approximated).
1566 */
1567 for (ptr = ctx->start; ptr != ctx->stop; ptr++) {
1568 const char *p, *name;
1569 int w = 0;
1570 char tmp;
1571
1572 if (!ptr->size && !ptr->calls && !ctx->show_all)
1573 continue;
1574
Willy Tarreaud96d2142022-09-06 08:05:59 +02001575 for (p = name = ptr->caller.file; *p; p++) {
Willy Tarreau4a426e22022-08-09 08:51:08 +02001576 if (*p == '/')
1577 name = p + 1;
1578 }
1579
1580 if (ctx->show_all)
Willy Tarreaud96d2142022-09-06 08:05:59 +02001581 w = snprintf(&tmp, 0, "%s(%s:%d) ", ptr->caller.func, name, ptr->caller.line);
Willy Tarreau4a426e22022-08-09 08:51:08 +02001582 else
Willy Tarreaud96d2142022-09-06 08:05:59 +02001583 w = snprintf(&tmp, 0, "%s:%d ", name, ptr->caller.line);
Willy Tarreau4a426e22022-08-09 08:51:08 +02001584
1585 if (w > ctx->width)
1586 ctx->width = w;
1587 }
1588 }
1589
Willy Tarreaua6026a02020-07-02 09:14:48 +02001590 /* we have two inner loops here, one for the proxy, the other one for
1591 * the buffer.
1592 */
Willy Tarreau4a426e22022-08-09 08:51:08 +02001593 for (ptr = ctx->start; ptr != ctx->stop; ptr++) {
Willy Tarreaua6026a02020-07-02 09:14:48 +02001594 const char *type;
1595 const char *name;
1596 const char *p;
Willy Tarreau55c950b2022-08-09 08:15:27 +02001597 const char *info = NULL;
Willy Tarreau17200dd2022-08-09 08:40:08 +02001598 const char *func = NULL;
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001599 int direction = 0; // neither alloc nor free (e.g. realloc)
Willy Tarreaua6026a02020-07-02 09:14:48 +02001600
Willy Tarreau40e952f2022-05-05 14:39:51 +02001601 if (!ptr->size && !ptr->calls && !ctx->show_all)
Willy Tarreaua6026a02020-07-02 09:14:48 +02001602 continue;
1603
1604 /* basename only */
Willy Tarreaud96d2142022-09-06 08:05:59 +02001605 for (p = name = ptr->caller.file; *p; p++) {
Willy Tarreaua6026a02020-07-02 09:14:48 +02001606 if (*p == '/')
1607 name = p + 1;
1608 }
1609
Willy Tarreaud96d2142022-09-06 08:05:59 +02001610 func = ptr->caller.func;
Willy Tarreau17200dd2022-08-09 08:40:08 +02001611
Willy Tarreaud96d2142022-09-06 08:05:59 +02001612 switch (ptr->caller.what) {
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001613 case MEM_STATS_TYPE_CALLOC: type = "CALLOC"; direction = 1; break;
1614 case MEM_STATS_TYPE_FREE: type = "FREE"; direction = -1; break;
1615 case MEM_STATS_TYPE_MALLOC: type = "MALLOC"; direction = 1; break;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001616 case MEM_STATS_TYPE_REALLOC: type = "REALLOC"; break;
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001617 case MEM_STATS_TYPE_STRDUP: type = "STRDUP"; direction = 1; break;
1618 case MEM_STATS_TYPE_P_ALLOC: type = "P_ALLOC"; direction = 1; if (ptr->extra) info = ((const struct pool_head *)ptr->extra)->name; break;
1619 case MEM_STATS_TYPE_P_FREE: type = "P_FREE"; direction = -1; if (ptr->extra) info = ((const struct pool_head *)ptr->extra)->name; break;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001620 default: type = "UNSET"; break;
1621 }
1622
1623 //chunk_printf(&trash,
1624 // "%20s:%-5d %7s size: %12lu calls: %9lu size/call: %6lu\n",
1625 // name, ptr->line, type,
1626 // (unsigned long)ptr->size, (unsigned long)ptr->calls,
1627 // (unsigned long)(ptr->calls ? (ptr->size / ptr->calls) : 0));
1628
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001629 /* only match requested prefixes */
1630 if (pfx && (!info || strncmp(info, pfx, strlen(pfx)) != 0))
1631 continue;
1632
Willy Tarreau17200dd2022-08-09 08:40:08 +02001633 chunk_reset(&trash);
1634 if (ctx->show_all)
1635 chunk_appendf(&trash, "%s(", func);
1636
Willy Tarreaud96d2142022-09-06 08:05:59 +02001637 chunk_appendf(&trash, "%s:%d", name, ptr->caller.line);
Willy Tarreau17200dd2022-08-09 08:40:08 +02001638
1639 if (ctx->show_all)
1640 chunk_appendf(&trash, ")");
1641
Willy Tarreau4a426e22022-08-09 08:51:08 +02001642 while (trash.data < ctx->width)
Willy Tarreaua6026a02020-07-02 09:14:48 +02001643 trash.area[trash.data++] = ' ';
Willy Tarreau17200dd2022-08-09 08:40:08 +02001644
Willy Tarreau55c950b2022-08-09 08:15:27 +02001645 chunk_appendf(&trash, "%7s size: %12lu calls: %9lu size/call: %6lu %s\n",
Willy Tarreaua6026a02020-07-02 09:14:48 +02001646 type,
1647 (unsigned long)ptr->size, (unsigned long)ptr->calls,
Willy Tarreau55c950b2022-08-09 08:15:27 +02001648 (unsigned long)(ptr->calls ? (ptr->size / ptr->calls) : 0),
1649 info ? info : "");
Willy Tarreaua6026a02020-07-02 09:14:48 +02001650
Willy Tarreaud0a06d52022-05-18 15:07:19 +02001651 if (applet_putchk(appctx, &trash) == -1) {
Willy Tarreau40e952f2022-05-05 14:39:51 +02001652 ctx->start = ptr;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001653 ret = 0;
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001654 goto end;
1655 }
1656 if (direction > 0) {
1657 ctx->tot_size += (ulong)ptr->size;
1658 ctx->tot_calls += (ulong)ptr->calls;
1659 }
1660 else if (direction < 0) {
1661 ctx->tot_size -= (ulong)ptr->size;
1662 ctx->tot_calls += (ulong)ptr->calls;
Willy Tarreaua6026a02020-07-02 09:14:48 +02001663 }
1664 }
1665
Willy Tarreaub59e3f62022-11-30 17:16:51 +01001666 /* now dump a summary */
1667 chunk_reset(&trash);
1668 chunk_appendf(&trash, "Total");
1669 while (trash.data < ctx->width)
1670 trash.area[trash.data++] = ' ';
1671
1672 chunk_appendf(&trash, "%7s size: %12ld calls: %9lu size/call: %6ld %s\n",
1673 "BALANCE",
1674 ctx->tot_size, ctx->tot_calls,
1675 (long)(ctx->tot_calls ? (ctx->tot_size / ctx->tot_calls) : 0),
1676 "(excl. realloc)");
1677
1678 if (applet_putchk(appctx, &trash) == -1) {
1679 ctx->start = ptr;
1680 ret = 0;
1681 goto end;
1682 }
Willy Tarreaua6026a02020-07-02 09:14:48 +02001683 end:
1684 return ret;
1685}
1686
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001687/* release the "show pools" context */
1688static void debug_release_memstats(struct appctx *appctx)
1689{
1690 struct dev_mem_ctx *ctx = appctx->svcctx;
1691
1692 ha_free(&ctx->match);
1693}
Willy Tarreaua6026a02020-07-02 09:14:48 +02001694#endif
1695
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001696#ifdef USE_THREAD_DUMP
Willy Tarreauc7091d82019-05-17 10:08:49 +02001697
Willy Tarreauf0c86dd2022-07-15 13:14:03 +02001698/* handles DEBUGSIG to dump the state of the thread it's working on. This is
1699 * appended at the end of thread_dump_buffer which must be protected against
1700 * reentrance from different threads (a thread-local buffer works fine).
1701 */
Willy Tarreauc7091d82019-05-17 10:08:49 +02001702void debug_handler(int sig, siginfo_t *si, void *arg)
1703{
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001704 struct buffer *buf = HA_ATOMIC_LOAD(&th_ctx->thread_dump_buffer);
Willy Tarreaua2b8ed42022-07-01 17:11:03 +02001705 int harmless = is_thread_harmless();
1706
Willy Tarreau82aafc42020-03-03 08:31:34 +01001707 /* first, let's check it's really for us and that we didn't just get
1708 * a spurious DEBUGSIG.
1709 */
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001710 if (!buf || buf == (void*)(0x1UL))
Willy Tarreau82aafc42020-03-03 08:31:34 +01001711 return;
1712
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001713 /* now dump the current state into the designated buffer, and indicate
1714 * we come from a sig handler.
Willy Tarreauf0c86dd2022-07-15 13:14:03 +02001715 */
Willy Tarreau9a6ecbd2023-05-04 16:23:51 +02001716 ha_thread_dump_one(tid, 1);
Willy Tarreaue6a02fa2019-05-22 07:06:44 +02001717
1718 /* mark the current thread as stuck to detect it upon next invocation
1719 * if it didn't move.
1720 */
Willy Tarreaua2b8ed42022-07-01 17:11:03 +02001721 if (!harmless &&
Willy Tarreaue7475c82022-06-20 09:23:24 +02001722 !(_HA_ATOMIC_LOAD(&th_ctx->flags) & TH_FL_SLEEPING))
Willy Tarreaubdcd3252022-06-22 09:19:46 +02001723 _HA_ATOMIC_OR(&th_ctx->flags, TH_FL_STUCK);
Willy Tarreauc7091d82019-05-17 10:08:49 +02001724}
1725
1726static int init_debug_per_thread()
1727{
1728 sigset_t set;
1729
1730 /* unblock the DEBUGSIG signal we intend to use */
1731 sigemptyset(&set);
1732 sigaddset(&set, DEBUGSIG);
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001733#if defined(DEBUG_DEV)
1734 sigaddset(&set, SIGRTMAX);
1735#endif
Willy Tarreauc7091d82019-05-17 10:08:49 +02001736 ha_sigmask(SIG_UNBLOCK, &set, NULL);
1737 return 1;
1738}
1739
1740static int init_debug()
1741{
1742 struct sigaction sa;
Willy Tarreau2f1227e2021-01-22 12:12:29 +01001743 void *callers[1];
Willy Tarreauc7091d82019-05-17 10:08:49 +02001744
Willy Tarreau0214b452020-03-04 06:01:40 +01001745 /* calling backtrace() will access libgcc at runtime. We don't want to
1746 * do it after the chroot, so let's perform a first call to have it
1747 * ready in memory for later use.
1748 */
Willy Tarreau13faf162020-03-04 07:44:06 +01001749 my_backtrace(callers, sizeof(callers)/sizeof(*callers));
Willy Tarreauc7091d82019-05-17 10:08:49 +02001750 sa.sa_handler = NULL;
1751 sa.sa_sigaction = debug_handler;
1752 sigemptyset(&sa.sa_mask);
1753 sa.sa_flags = SA_SIGINFO;
1754 sigaction(DEBUGSIG, &sa, NULL);
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001755
1756#if defined(DEBUG_DEV)
1757 sa.sa_handler = NULL;
1758 sa.sa_sigaction = debug_delay_inj_sighandler;
1759 sigemptyset(&sa.sa_mask);
1760 sa.sa_flags = SA_SIGINFO;
1761 sigaction(SIGRTMAX, &sa, NULL);
1762#endif
Christopher Fauletfc633b62020-11-06 15:24:23 +01001763 return ERR_NONE;
Willy Tarreauc7091d82019-05-17 10:08:49 +02001764}
1765
1766REGISTER_POST_CHECK(init_debug);
1767REGISTER_PER_THREAD_INIT(init_debug_per_thread);
1768
1769#endif /* USE_THREAD_DUMP */
1770
Willy Tarreau4e2b6462019-05-16 17:44:30 +02001771/* register cli keywords */
1772static struct cli_kw_list cli_kws = {{ },{
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001773 {{ "debug", "dev", "bug", NULL }, "debug dev bug : call BUG_ON() and crash", debug_parse_cli_bug, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau6d3f1e32022-02-28 11:51:23 +01001774 {{ "debug", "dev", "check", NULL }, "debug dev check : call CHECK_IF() and possibly crash", debug_parse_cli_check, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001775 {{ "debug", "dev", "close", NULL }, "debug dev close <fd> : close this file descriptor", debug_parse_cli_close, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaudadf00e2022-07-15 08:25:03 +02001776 {{ "debug", "dev", "deadlock", NULL }, "debug dev deadlock [nbtask] : deadlock between this number of tasks", debug_parse_cli_deadlock, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001777 {{ "debug", "dev", "delay", NULL }, "debug dev delay [ms] : sleep this long", debug_parse_cli_delay, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau6bdf3e92019-05-20 14:25:05 +02001778#if defined(DEBUG_DEV)
Willy Tarreaubd3b44e2023-03-09 08:25:01 +01001779 {{ "debug", "dev", "delay-inj", NULL },"debug dev delay-inj <inter> <count> : inject random delays into threads", debug_parse_delay_inj, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001780 {{ "debug", "dev", "exec", NULL }, "debug dev exec [cmd] ... : show this command's output", debug_parse_cli_exec, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau6bdf3e92019-05-20 14:25:05 +02001781#endif
Willy Tarreau5be7c192022-01-24 20:26:09 +01001782 {{ "debug", "dev", "fd", NULL }, "debug dev fd : scan for rogue/unhandled FDs", debug_parse_cli_fd, debug_iohandler_fd, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001783 {{ "debug", "dev", "exit", NULL }, "debug dev exit [code] : immediately exit the process", debug_parse_cli_exit, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau111c7832022-11-30 17:51:47 +01001784 {{ "debug", "dev", "hash", NULL }, "debug dev hash [msg] : return msg hashed if anon is set", debug_parse_cli_hash, NULL, NULL, NULL, 0 },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001785 {{ "debug", "dev", "hex", NULL }, "debug dev hex <addr> [len] : dump a memory area", debug_parse_cli_hex, NULL, NULL, NULL, ACCESS_EXPERT },
1786 {{ "debug", "dev", "log", NULL }, "debug dev log [msg] ... : send this msg to global logs", debug_parse_cli_log, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaue5e62232023-05-04 11:50:26 +02001787 {{ "debug", "dev", "loop", NULL }, "debug dev loop <ms> [isolated] : loop this long, possibly isolated", debug_parse_cli_loop, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaua6026a02020-07-02 09:14:48 +02001788#if defined(DEBUG_MEM_STATS)
Willy Tarreaue57fbed2022-11-30 16:42:54 +01001789 {{ "debug", "dev", "memstats", NULL }, "debug dev memstats [reset|all|match ...]: dump/reset memory statistics", debug_parse_cli_memstats, debug_iohandler_memstats, debug_release_memstats, NULL, 0 },
Willy Tarreaua6026a02020-07-02 09:14:48 +02001790#endif
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001791 {{ "debug", "dev", "panic", NULL }, "debug dev panic : immediately trigger a panic", debug_parse_cli_panic, NULL, NULL, NULL, ACCESS_EXPERT },
1792 {{ "debug", "dev", "sched", NULL }, "debug dev sched {task|tasklet} [k=v]* : stress the scheduler", debug_parse_cli_sched, NULL, NULL, NULL, ACCESS_EXPERT },
1793 {{ "debug", "dev", "stream",NULL }, "debug dev stream [k=v]* : show/manipulate stream flags", debug_parse_cli_stream,NULL, NULL, NULL, ACCESS_EXPERT },
1794 {{ "debug", "dev", "sym", NULL }, "debug dev sym <addr> : resolve symbol address", debug_parse_cli_sym, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau98679872023-05-03 11:22:45 +02001795 {{ "debug", "dev", "task", NULL }, "debug dev task <ptr> [wake|expire|kill] : show/wake/expire/kill task/tasklet", debug_parse_cli_task, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001796 {{ "debug", "dev", "tkill", NULL }, "debug dev tkill [thr] [sig] : send signal to thread", debug_parse_cli_tkill, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreau305cfbd2022-02-25 08:52:39 +01001797 {{ "debug", "dev", "warn", NULL }, "debug dev warn : call WARN_ON() and possibly crash", debug_parse_cli_warn, NULL, NULL, NULL, ACCESS_EXPERT },
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001798 {{ "debug", "dev", "write", NULL }, "debug dev write [size] : write that many bytes in return", debug_parse_cli_write, NULL, NULL, NULL, ACCESS_EXPERT },
Erwan Le Goas54966df2022-09-14 17:24:22 +02001799
Willy Tarreau6ab7b212021-12-28 09:57:10 +01001800#if defined(HA_HAVE_DUMP_LIBS)
1801 {{ "show", "libs", NULL, NULL }, "show libs : show loaded object files and libraries", debug_parse_cli_show_libs, NULL, NULL },
1802#endif
Willy Tarreaub205bfd2021-05-07 11:38:37 +02001803 {{ "show", "threads", NULL, NULL }, "show threads : show some threads debugging information", NULL, cli_io_handler_show_threads, NULL },
Willy Tarreau4e2b6462019-05-16 17:44:30 +02001804 {{},}
1805}};
1806
1807INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);