1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
23 * Copyright (c) 2013 by Delphix. All rights reserved.
24 *
25 * Copyright 2019 Joyent, Inc.
26 * Copyright 2025 Oxide Computer Company
27 */
28
29 #include <kmdb/kmdb_kvm.h>
30 #include <kmdb/kvm.h>
31 #include <kmdb/kmdb_kdi.h>
32 #include <kmdb/kmdb_promif.h>
33 #include <kmdb/kmdb_module.h>
34 #include <kmdb/kmdb_asmutil.h>
35 #include <mdb/mdb_types.h>
36 #include <mdb/mdb_conf.h>
37 #include <mdb/mdb_err.h>
38 #include <mdb/mdb_modapi.h>
39 #include <mdb/mdb_target_impl.h>
40 #include <mdb/mdb_debug.h>
41 #include <mdb/mdb_string.h>
42 #include <mdb/mdb_ctf.h>
43 #include <mdb/mdb_kreg_impl.h>
44 #include <mdb/mdb_ks.h>
45 #include <mdb/mdb.h>
46
47 #include <strings.h>
48 #include <dlfcn.h>
49 #include <sys/isa_defs.h>
50 #include <sys/kobj.h>
51 #include <sys/kobj_impl.h>
52 #include <sys/bitmap.h>
53 #include <sys/uuid.h>
54 #include <vm/as.h>
55
56 static const char KMT_RTLD_NAME[] = "krtld";
57 static const char KMT_MODULE[] = "mdb_ks";
58 static const char KMT_CTFPARENT[] = "genunix";
59
60 static mdb_list_t kmt_defbp_list; /* List of current deferred bp's */
61 static int kmt_defbp_lock; /* For list, running kernel holds */
62 static uint_t kmt_defbp_modchg_isload; /* Whether mod change is load/unload */
63 static struct modctl *kmt_defbp_modchg_modctl; /* modctl for defbp checking */
64 static uint_t kmt_defbp_num; /* Number of referenced def'd bp's */
65 static int kmt_defbp_bpspec; /* vespec for def'd bp activation bp */
66
67 static const mdb_se_ops_t kmt_brkpt_ops;
68 static const mdb_se_ops_t kmt_wapt_ops;
69
70 static void kmt_sync(mdb_tgt_t *);
71
72 typedef struct kmt_symarg {
73 mdb_tgt_sym_f *sym_cb; /* Caller's callback function */
74 void *sym_data; /* Callback function argument */
75 uint_t sym_type; /* Symbol type/binding filter */
76 mdb_syminfo_t sym_info; /* Symbol id and table id */
77 const char *sym_obj; /* Containing object */
78 } kmt_symarg_t;
79
80 typedef struct kmt_maparg {
81 mdb_tgt_t *map_target; /* Target used for mapping iter */
82 mdb_tgt_map_f *map_cb; /* Caller's callback function */
83 void *map_data; /* Callback function argument */
84 } kmt_maparg_t;
85
86 /*ARGSUSED*/
87 int
kmt_setflags(mdb_tgt_t * t,int flags)88 kmt_setflags(mdb_tgt_t *t, int flags)
89 {
90 /*
91 * We only handle one flag (ALLOWIO), and we can't fail to set or clear
92 * it, so we just blindly replace the t_flags version with the one
93 * passed.
94 */
95 t->t_flags = (t->t_flags & ~MDB_TGT_F_ALLOWIO) |
96 (flags & MDB_TGT_F_ALLOWIO);
97
98 return (0);
99 }
100
101 /*ARGSUSED*/
102 const char *
kmt_name(mdb_tgt_t * t)103 kmt_name(mdb_tgt_t *t)
104 {
105 return ("kmdb_kvm");
106 }
107
108 /*ARGSUSED*/
109 static const char *
kmt_platform(mdb_tgt_t * t)110 kmt_platform(mdb_tgt_t *t)
111 {
112 static char platform[SYS_NMLN];
113
114 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT)
115 return (mdb_conf_platform());
116
117 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, platform,
118 sizeof (platform), "unix", "platform") != sizeof (platform)) {
119 warn("'platform' symbol is missing from kernel\n");
120 return ("unknown");
121 }
122
123 return (platform);
124 }
125
126 static int
kmt_uname(mdb_tgt_t * t,struct utsname * utsp)127 kmt_uname(mdb_tgt_t *t, struct utsname *utsp)
128 {
129 return (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, utsp,
130 sizeof (struct utsname), MDB_TGT_OBJ_EXEC, "utsname"));
131 }
132
133 /*ARGSUSED*/
134 static int
kmt_dmodel(mdb_tgt_t * t)135 kmt_dmodel(mdb_tgt_t *t)
136 {
137 return (MDB_TGT_MODEL_NATIVE);
138 }
139
140 /*ARGSUSED*/
141 ssize_t
kmt_rw(mdb_tgt_t * t,void * buf,size_t nbytes,uint64_t addr,ssize_t (* rw)(void *,size_t,uint64_t))142 kmt_rw(mdb_tgt_t *t, void *buf, size_t nbytes, uint64_t addr,
143 ssize_t (*rw)(void *, size_t, uint64_t))
144 {
145 /*
146 * chunksz needs to be volatile because of the use of setjmp() in this
147 * function.
148 */
149 volatile size_t chunksz;
150 size_t n, ndone;
151 jmp_buf *oldpcb = NULL;
152 jmp_buf pcb;
153 ssize_t res;
154
155 kmdb_prom_check_interrupt();
156
157 if (nbytes == 0)
158 return (0);
159
160 /*
161 * Try to process the entire buffer, as requested. If we catch a fault,
162 * try smaller chunks. This allows us to handle regions that cross
163 * mapping boundaries.
164 */
165 chunksz = nbytes;
166 ndone = 0;
167 if (setjmp(pcb) != 0) {
168 if (chunksz == 1) {
169 /* We failed with the smallest chunk - give up */
170 kmdb_dpi_restore_fault_hdlr(oldpcb);
171 return (ndone > 0 ? ndone : -1); /* errno set for us */
172 } else if (chunksz > 4)
173 chunksz = 4;
174 else
175 chunksz = 1;
176 }
177
178 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb);
179 while (nbytes > 0) {
180 n = MIN(chunksz, nbytes);
181
182 if ((res = rw(buf, n, addr)) != n)
183 return (res < 0 ? res : ndone + res);
184
185 addr += n;
186 nbytes -= n;
187 ndone += n;
188 buf = ((caddr_t)buf + n);
189 }
190
191 kmdb_dpi_restore_fault_hdlr(oldpcb);
192
193 return (ndone);
194 }
195
196 static void
kmt_bcopy(const void * s1,void * s2,size_t n)197 kmt_bcopy(const void *s1, void *s2, size_t n)
198 {
199 /*
200 * We need to guarantee atomic accesses for certain sizes. bcopy won't
201 * make that guarantee, so we need to do it ourselves.
202 */
203 #ifdef _LP64
204 if (n == 8 && ((uintptr_t)s1 & 7) == 0 && ((uintptr_t)s2 & 7) == 0)
205 *(uint64_t *)s2 = *(uint64_t *)s1;
206 else
207 #endif
208 if (n == 4 && ((uintptr_t)s1 & 3) == 0 && ((uintptr_t)s2 & 3) == 0)
209 *(uint32_t *)s2 = *(uint32_t *)s1;
210 else if (n == 2 && ((uintptr_t)s1 & 1) == 0 && ((uintptr_t)s2 & 1) == 0)
211 *(uint16_t *)s2 = *(uint16_t *)s1;
212 else if (n == 1)
213 *(uint8_t *)s2 = *(uint8_t *)s1;
214 else
215 bcopy(s1, s2, n);
216 }
217
218 static ssize_t
kmt_reader(void * buf,size_t nbytes,uint64_t addr)219 kmt_reader(void *buf, size_t nbytes, uint64_t addr)
220 {
221 kmt_bcopy((void *)(uintptr_t)addr, buf, nbytes);
222 return (nbytes);
223 }
224
225 ssize_t
kmt_writer(void * buf,size_t nbytes,uint64_t addr)226 kmt_writer(void *buf, size_t nbytes, uint64_t addr)
227 {
228 kmt_bcopy(buf, (void *)(uintptr_t)addr, nbytes);
229 return (nbytes);
230 }
231
232 /*ARGSUSED*/
233 static ssize_t
kmt_read(mdb_tgt_t * t,void * buf,size_t nbytes,uintptr_t addr)234 kmt_read(mdb_tgt_t *t, void *buf, size_t nbytes, uintptr_t addr)
235 {
236 /*
237 * We don't want to allow reads of I/O-mapped memory. Multi-page reads
238 * that cross into I/O-mapped memory should be restricted to the initial
239 * non-I/O region. Reads that begin in I/O-mapped memory are failed
240 * outright.
241 */
242 if (!(t->t_flags & MDB_TGT_F_ALLOWIO) &&
243 (nbytes = kmdb_kdi_range_is_nontoxic(addr, nbytes, 0)) == 0)
244 return (set_errno(EMDB_NOMAP));
245
246 return (kmt_rw(t, buf, nbytes, addr, kmt_reader));
247 }
248
249 /*ARGSUSED*/
250 static ssize_t
kmt_pread(mdb_tgt_t * t,void * buf,size_t nbytes,physaddr_t addr)251 kmt_pread(mdb_tgt_t *t, void *buf, size_t nbytes, physaddr_t addr)
252 {
253 return (kmt_rw(t, buf, nbytes, addr, kmdb_kdi_pread));
254 }
255
256 /*ARGSUSED*/
257 ssize_t
kmt_pwrite(mdb_tgt_t * t,const void * buf,size_t nbytes,physaddr_t addr)258 kmt_pwrite(mdb_tgt_t *t, const void *buf, size_t nbytes, physaddr_t addr)
259 {
260 return (kmt_rw(t, (void *)buf, nbytes, addr, kmdb_kdi_pwrite));
261 }
262
263 static uintptr_t
kmt_read_kas(mdb_tgt_t * t)264 kmt_read_kas(mdb_tgt_t *t)
265 {
266 GElf_Sym sym;
267
268 if (mdb_tgt_lookup_by_name(t, "unix", "kas", &sym, NULL) < 0) {
269 warn("'kas' symbol is missing from kernel\n");
270 (void) set_errno(EMDB_NOSYM);
271 return (0);
272 }
273
274 return ((uintptr_t)sym.st_value);
275 }
276
277 static int
kmt_vtop(mdb_tgt_t * t,mdb_tgt_as_t as,uintptr_t va,physaddr_t * pap)278 kmt_vtop(mdb_tgt_t *t, mdb_tgt_as_t as, uintptr_t va, physaddr_t *pap)
279 {
280 mdb_module_t *mod;
281 struct as *asp;
282 mdb_var_t *v;
283
284 switch ((uintptr_t)as) {
285 case (uintptr_t)MDB_TGT_AS_PHYS:
286 case (uintptr_t)MDB_TGT_AS_FILE:
287 case (uintptr_t)MDB_TGT_AS_IO:
288 return (set_errno(EINVAL));
289 case (uintptr_t)MDB_TGT_AS_VIRT:
290 case (uintptr_t)MDB_TGT_AS_VIRT_I:
291 case (uintptr_t)MDB_TGT_AS_VIRT_S:
292 if ((asp = (struct as *)kmt_read_kas(t)) == NULL)
293 return (-1); /* errno is set for us */
294 break;
295 default:
296 asp = (struct as *)as;
297
298 /* We don't support non-kas vtop */
299 if (asp != (struct as *)kmt_read_kas(t))
300 return (set_errno(EMDB_TGTNOTSUP));
301 }
302
303 if (kmdb_prom_vtop(va, pap) == 0)
304 return (0);
305
306 if ((v = mdb_nv_lookup(&mdb.m_modules, "unix")) != NULL &&
307 (mod = mdb_nv_get_cookie(v)) != NULL) {
308 int (*fptr)(uintptr_t, struct as *, physaddr_t *);
309
310 fptr = (int (*)(uintptr_t, struct as *, physaddr_t *))
311 dlsym(mod->mod_hdl, "platform_vtop");
312
313 if ((fptr != NULL) && ((*fptr)(va, asp, pap) == 0))
314 return (0);
315 }
316
317 return (set_errno(EMDB_NOMAP));
318 }
319
320 /*ARGSUSED*/
321 static int
kmt_cpuregs(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)322 kmt_cpuregs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
323 {
324 const mdb_tgt_gregset_t *gregs;
325 intptr_t cpuid = DPI_MASTER_CPUID;
326 int i;
327
328 if (flags & DCMD_ADDRSPEC) {
329 if (argc != 0)
330 return (DCMD_USAGE);
331 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) {
332 (void) set_errno(EMDB_NOMAP);
333 mdb_warn("failed to find cpuid for cpu at %p", addr);
334 return (DCMD_ERR);
335 }
336 }
337
338 i = mdb_getopts(argc, argv,
339 'c', MDB_OPT_UINTPTR, &cpuid,
340 NULL);
341
342 argc -= i;
343 argv += i;
344
345 if (argc != 0)
346 return (DCMD_USAGE);
347
348 if ((gregs = kmdb_dpi_get_gregs(cpuid)) == NULL) {
349 warn("failed to retrieve registers for cpu %d", (int)cpuid);
350 return (DCMD_ERR);
351 }
352
353 kmt_printregs(gregs);
354
355 return (DCMD_OK);
356 }
357
358 static int
kmt_regs(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)359 kmt_regs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
360 {
361 if (flags & DCMD_ADDRSPEC)
362 return (DCMD_USAGE);
363
364 return (kmt_cpuregs(addr, flags, argc, argv));
365 }
366
367 static int
kmt_cpustack_dcmd(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)368 kmt_cpustack_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
369 {
370 intptr_t cpuid = DPI_MASTER_CPUID;
371 uint_t verbose = 0;
372 int i;
373
374 if (flags & DCMD_ADDRSPEC) {
375 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) {
376 (void) set_errno(EMDB_NOMAP);
377 mdb_warn("failed to find cpuid for cpu at %p", addr);
378 return (DCMD_ERR);
379 }
380 flags &= ~DCMD_ADDRSPEC;
381 }
382
383 i = mdb_getopts(argc, argv,
384 'c', MDB_OPT_UINTPTR, &cpuid,
385 'v', MDB_OPT_SETBITS, 1, &verbose,
386 NULL);
387
388 argc -= i;
389 argv += i;
390
391 return (kmt_cpustack(addr, flags, argc, argv, cpuid, verbose));
392 }
393
394 /*
395 * Lasciate ogne speranza, voi ch'intrate.
396 */
397 static int
kmt_call(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)398 kmt_call(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
399 {
400 uintptr_t *call_argv, rval;
401 int parse_strings = 1;
402 GElf_Sym sym;
403 jmp_buf *oldpcb = NULL;
404 jmp_buf pcb;
405 int i;
406
407 if (!(flags & DCMD_ADDRSPEC))
408 return (DCMD_USAGE);
409
410 if (mdb_tgt_lookup_by_addr(mdb.m_target, addr, MDB_TGT_SYM_EXACT,
411 NULL, 0, &sym, NULL) == 0 && GELF_ST_TYPE(sym.st_info) !=
412 STT_FUNC) {
413 warn("%a is not a function\n", addr);
414 return (DCMD_ERR);
415 }
416
417 if (argc > 1 && argv[0].a_type == MDB_TYPE_STRING &&
418 strcmp(argv[0].a_un.a_str, "-s") == 0) {
419 parse_strings = 0;
420 argc--;
421 argv++;
422 }
423
424 call_argv = mdb_alloc(sizeof (uintptr_t) * argc, UM_SLEEP);
425
426 for (i = 0; i < argc; i++) {
427 switch (argv[i].a_type) {
428 case MDB_TYPE_STRING:
429 /*
430 * mdb_strtoull doesn't return on error, so we have to
431 * pre-check strings suspected to contain numbers.
432 */
433 if (parse_strings && strisbasenum(argv[i].a_un.a_str)) {
434 call_argv[i] = (uintptr_t)mdb_strtoull(
435 argv[i].a_un.a_str);
436 } else
437 call_argv[i] = (uintptr_t)argv[i].a_un.a_str;
438
439 break;
440
441 case MDB_TYPE_IMMEDIATE:
442 call_argv[i] = argv[i].a_un.a_val;
443 break;
444
445 default:
446 mdb_free(call_argv,
447 sizeof (uintptr_t) * argc);
448 return (DCMD_USAGE);
449 }
450 }
451
452 if (setjmp(pcb) != 0) {
453 warn("call failed: caught a trap\n");
454
455 kmdb_dpi_restore_fault_hdlr(oldpcb);
456 mdb_free(call_argv, sizeof (uintptr_t) * argc);
457 return (DCMD_ERR);
458 }
459
460 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb);
461 rval = kmdb_dpi_call(addr, argc, call_argv);
462 kmdb_dpi_restore_fault_hdlr(oldpcb);
463
464 if (flags & DCMD_PIPE_OUT) {
465 mdb_printf("%p\n", rval);
466 } else {
467 /* pretty-print the results */
468 mdb_printf("%p = %a(", rval, addr);
469 for (i = 0; i < argc; i++) {
470 if (i > 0)
471 mdb_printf(", ");
472 if (argv[i].a_type == MDB_TYPE_STRING) {
473 /* I'm ashamed but amused */
474 char *quote = &("\""[parse_strings &&
475 strisbasenum(argv[i].a_un.a_str)]);
476
477 mdb_printf("%s%s%s", quote, argv[i].a_un.a_str,
478 quote);
479 } else
480 mdb_printf("%p", argv[i].a_un.a_val);
481 }
482 mdb_printf(");\n");
483 }
484
485 mdb_free(call_argv, sizeof (uintptr_t) * argc);
486
487 return (DCMD_OK);
488 }
489
490 /*ARGSUSED*/
491 int
kmt_dump_crumbs(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)492 kmt_dump_crumbs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
493 {
494 intptr_t cpu = -1;
495
496 if (flags & DCMD_ADDRSPEC) {
497 if (argc != 0)
498 return (DCMD_USAGE);
499 } else {
500 addr = 0;
501
502 if (mdb_getopts(argc, argv,
503 'c', MDB_OPT_UINTPTR, &cpu,
504 NULL) != argc)
505 return (DCMD_USAGE);
506 }
507
508 kmdb_dpi_dump_crumbs(addr, cpu);
509
510 return (DCMD_OK);
511 }
512
513 /*ARGSUSED*/
514 static int
kmt_noducttape(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)515 kmt_noducttape(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
516 {
517 int a = 0;
518
519 return (a/a);
520 }
521
522 static int
kmt_dmod_status(char * msg,int state)523 kmt_dmod_status(char *msg, int state)
524 {
525 kmdb_modctl_t *kmc;
526 mdb_var_t *v;
527 int first = 1, n = 0;
528
529 mdb_nv_rewind(&mdb.m_dmodctl);
530 while ((v = mdb_nv_advance(&mdb.m_dmodctl)) != NULL) {
531 kmc = MDB_NV_COOKIE(v);
532
533 if (kmc->kmc_state != state)
534 continue;
535
536 n++;
537
538 if (msg != NULL) {
539 if (first) {
540 mdb_printf(msg, NULL);
541 first = 0;
542 }
543
544 mdb_printf(" %s", kmc->kmc_modname);
545 }
546 }
547
548 if (!first && msg != NULL)
549 mdb_printf("\n");
550
551 return (n);
552 }
553
554 /*ARGSUSED*/
555 static int
kmt_status_dcmd(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)556 kmt_status_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
557 {
558 struct utsname uts;
559 char uuid[UUID_PRINTABLE_STRING_LENGTH];
560 kreg_t tt;
561
562 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, &uts, sizeof (uts),
563 "unix", "utsname") != sizeof (uts)) {
564 warn("failed to read 'utsname' struct from kernel\n");
565 bzero(&uts, sizeof (uts));
566 (void) strcpy(uts.nodename, "unknown machine");
567 }
568
569 mdb_printf("debugging live kernel (%d-bit) on %s\n",
570 (int)(sizeof (void *) * NBBY),
571 (*uts.nodename == '\0' ? "(not set)" : uts.nodename));
572 mdb_printf("operating system: %s %s (%s)\n",
573 uts.release, uts.version, uts.machine);
574
575 mdb_print_buildversion();
576
577 if (mdb_readsym(uuid, sizeof (uuid),
578 "dump_osimage_uuid") == sizeof (uuid) &&
579 uuid[sizeof (uuid) - 1] == '\0') {
580 mdb_printf("image uuid: %s\n", uuid[0] != '\0' ?
581 uuid : "(not set)");
582 }
583
584 mdb_printf("DTrace state: %s\n", (kmdb_kdi_dtrace_get_state() ==
585 KDI_DTSTATE_DTRACE_ACTIVE ? "active (debugger breakpoints cannot "
586 "be armed)" : "inactive"));
587
588 (void) kmdb_dpi_get_register("tt", &tt);
589 mdb_printf("stopped on: %s\n", kmt_trapname(tt));
590
591 (void) kmt_dmod_status("pending dmod loads:", KMDB_MC_STATE_LOADING);
592 (void) kmt_dmod_status("pending dmod unloads:",
593 KMDB_MC_STATE_UNLOADING);
594
595 return (DCMD_OK);
596 }
597
598 /*ARGSUSED*/
599 static int
kmt_switch(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)600 kmt_switch(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
601 {
602 if (!(flags & DCMD_ADDRSPEC) || argc != 0)
603 return (DCMD_USAGE);
604
605 if (kmdb_dpi_switch_master((int)addr) < 0) {
606 warn("failed to switch to CPU %d", (int)addr);
607 return (DCMD_ERR);
608 }
609
610 return (DCMD_OK);
611 }
612
613 static void
kmt_stack_help(void)614 kmt_stack_help(void)
615 {
616 mdb_printf(
617 "Options:\n"
618 " -s show the size of each stack frame to the left\n"
619 " -t where CTF is present, show types for functions and "
620 "arguments\n"
621 " -v include frame pointer information (this is the default "
622 "for %<b>$C%</b>)\n"
623 "\n"
624 "If the optional %<u>cnt%</u> is given, no more than %<u>cnt%</u> "
625 "arguments are shown\nfor each stack frame.\n");
626 }
627
628 static const mdb_dcmd_t kmt_dcmds[] = {
629 { "$c", "?[-stv] [cnt]", "print stack backtrace", kmt_stack,
630 kmt_stack_help },
631 { "$C", "?[-stv] [cnt]", "print stack backtrace", kmt_stackv,
632 kmt_stack_help },
633 { "$r", NULL, "print general-purpose registers", kmt_regs },
634 { "$?", NULL, "print status and registers", kmt_regs },
635 { ":x", ":", "change the active CPU", kmt_switch },
636 { "call", ":[arg ...]", "call a kernel function", kmt_call },
637 { "cpustack", "?[-v] [-c cpuid] [cnt]", "print stack backtrace for a "
638 "specific CPU", kmt_cpustack_dcmd },
639 { "cpuregs", "?[-c cpuid]", "print general-purpose registers for a "
640 "specific CPU", kmt_cpuregs },
641 { "crumbs", NULL, NULL, kmt_dump_crumbs },
642 #if defined(__i386) || defined(__amd64)
643 { "in", ":[-L len]", "read from I/O port", kmt_in_dcmd },
644 { "out", ":[-L len] val", "write to I/O port", kmt_out_dcmd },
645 { "rdmsr", ":", "read an MSR", kmt_rdmsr },
646 { "wrmsr", ": val", "write an MSR", kmt_wrmsr },
647 { "rdpcicfg", ": bus dev func", "read a register in PCI config space",
648 kmt_rdpcicfg },
649 { "wrpcicfg", ": bus dev func val",
650 "write a register in PCI config space", kmt_wrpcicfg },
651 #endif
652 { "noducttape", NULL, NULL, kmt_noducttape },
653 { "regs", NULL, "print general-purpose registers", kmt_regs },
654 { "stack", "?[-stv] [cnt]", "print stack backtrace", kmt_stack,
655 kmt_stack_help },
656 { "stackregs", "?[-stv] [cnt]", "print stack backtrace and registers",
657 kmt_stackr, kmt_stack_help },
658 { "status", NULL, "print summary of current target", kmt_status_dcmd },
659 { "switch", ":", "change the active CPU", kmt_switch },
660 { NULL }
661 };
662
663 static uintmax_t
kmt_reg_disc_get(const mdb_var_t * v)664 kmt_reg_disc_get(const mdb_var_t *v)
665 {
666 mdb_tgt_reg_t r = 0;
667
668 (void) mdb_tgt_getareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), &r);
669
670 return (r);
671 }
672
673 static void
kmt_reg_disc_set(mdb_var_t * v,uintmax_t r)674 kmt_reg_disc_set(mdb_var_t *v, uintmax_t r)
675 {
676 if (mdb_tgt_putareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), r) == -1)
677 warn("failed to modify %%%s register", mdb_nv_get_name(v));
678 }
679
680 static const mdb_nv_disc_t kmt_reg_disc = {
681 .disc_get = kmt_reg_disc_get,
682 .disc_set = kmt_reg_disc_set
683 };
684
685 /*ARGSUSED*/
686 static int
kmt_getareg(mdb_tgt_t * t,mdb_tgt_tid_t tid,const char * rname,mdb_tgt_reg_t * rp)687 kmt_getareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname,
688 mdb_tgt_reg_t *rp)
689 {
690 kreg_t val;
691
692 if (kmdb_dpi_get_register(rname, &val) < 0)
693 return (set_errno(EMDB_BADREG));
694
695 *rp = val;
696 return (0);
697 }
698
699 /*ARGSUSED*/
700 static int
kmt_putareg(mdb_tgt_t * t,mdb_tgt_tid_t tid,const char * rname,mdb_tgt_reg_t r)701 kmt_putareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, mdb_tgt_reg_t r)
702 {
703 if (kmdb_dpi_set_register(rname, r) < 0)
704 return (set_errno(EMDB_BADREG));
705
706 return (0);
707 }
708
709 static void
kmt_mod_destroy(kmt_module_t * km)710 kmt_mod_destroy(kmt_module_t *km)
711 {
712 if (km->km_name != NULL)
713 strfree(km->km_name);
714 if (km->km_symtab != NULL)
715 mdb_gelf_symtab_destroy(km->km_symtab);
716 if (km->km_ctfp != NULL)
717 mdb_ctf_close(km->km_ctfp);
718 }
719
720 static kmt_module_t *
kmt_mod_create(mdb_tgt_t * t,struct modctl * ctlp,char * name)721 kmt_mod_create(mdb_tgt_t *t, struct modctl *ctlp, char *name)
722 {
723 kmt_module_t *km = mdb_zalloc(sizeof (kmt_module_t), UM_SLEEP);
724 struct module *mod;
725
726 km->km_name = mdb_alloc(strlen(name) + 1, UM_SLEEP);
727 (void) strcpy(km->km_name, name);
728
729 bcopy(ctlp, &km->km_modctl, sizeof (struct modctl));
730
731 if (mdb_tgt_vread(t, &km->km_module, sizeof (struct module),
732 (uintptr_t)km->km_modctl.mod_mp) != sizeof (struct module))
733 goto create_module_cleanup;
734 mod = &km->km_module;
735
736 if (mod->symhdr != NULL && mod->strhdr != NULL && mod->symtbl != NULL &&
737 mod->strings != NULL) {
738 mdb_gelf_ehdr_to_gehdr(&mod->hdr, &km->km_ehdr);
739
740 km->km_symtab = mdb_gelf_symtab_create_raw(&km->km_ehdr,
741 mod->symhdr, mod->symtbl, mod->strhdr, mod->strings,
742 MDB_TGT_SYMTAB);
743
744 km->km_symtab_va = mod->symtbl;
745 km->km_strtab_va = mod->strings;
746
747 if (mdb_tgt_vread(t, &km->km_symtab_hdr, sizeof (Shdr),
748 (uintptr_t)mod->symhdr) != sizeof (Shdr) ||
749 mdb_tgt_vread(t, &km->km_strtab_hdr, sizeof (Shdr),
750 (uintptr_t)mod->strhdr) != sizeof (Shdr))
751 goto create_module_cleanup;
752 }
753
754 /*
755 * We don't want everyone rooting around in the module structure, so we
756 * make copies of the interesting members.
757 */
758 km->km_text_va = (uintptr_t)mod->text;
759 km->km_text_size = mod->text_size;
760 km->km_data_va = (uintptr_t)mod->data;
761 km->km_data_size = mod->data_size;
762 km->km_bss_va = (uintptr_t)mod->bss;
763 km->km_bss_size = mod->bss_size;
764 km->km_ctf_va = mod->ctfdata;
765 km->km_ctf_size = mod->ctfsize;
766
767 if (mod->flags & KOBJ_PRIM)
768 km->km_flags |= KM_F_PRIMARY;
769
770 return (km);
771
772 create_module_cleanup:
773 warn("failed to read module %s\n", name);
774 kmt_mod_destroy(km);
775 return (NULL);
776 }
777
778 static void
kmt_mod_remove(kmt_data_t * kmt,kmt_module_t * km)779 kmt_mod_remove(kmt_data_t *kmt, kmt_module_t *km)
780 {
781 mdb_var_t *v = mdb_nv_lookup(&kmt->kmt_modules, km->km_name);
782
783 ASSERT(v != NULL);
784
785 mdb_dprintf(MDB_DBG_KMOD, "removing module %s\n", km->km_name);
786
787 mdb_list_delete(&kmt->kmt_modlist, km);
788 mdb_nv_remove(&kmt->kmt_modules, v);
789 kmt_mod_destroy(km);
790 }
791
792 static int
kmt_modlist_update_cb(struct modctl * modp,void * arg)793 kmt_modlist_update_cb(struct modctl *modp, void *arg)
794 {
795 mdb_tgt_t *t = arg;
796 kmt_data_t *kmt = t->t_data;
797 kmt_module_t *km;
798 mdb_var_t *v;
799 char name[MAXNAMELEN];
800
801 if (mdb_tgt_readstr(t, MDB_TGT_AS_VIRT, name, MAXNAMELEN,
802 (uintptr_t)modp->mod_modname) <= 0) {
803 warn("failed to read module name at %p",
804 (void *)modp->mod_modname);
805 }
806
807 /* We only care about modules that are actually loaded */
808 if (!kmdb_kdi_mod_isloaded(modp))
809 return (0);
810
811 /*
812 * Skip the modules we already know about and that haven't
813 * changed since last time we were here.
814 */
815 if ((v = mdb_nv_lookup(&kmt->kmt_modules, name)) != NULL) {
816 km = MDB_NV_COOKIE(v);
817
818 if (kmdb_kdi_mod_haschanged(&km->km_modctl, &km->km_module,
819 modp, modp->mod_mp)) {
820 /*
821 * The module has changed since last we saw it. For
822 * safety, remove our old version, and treat it as a
823 * new module.
824 */
825 mdb_dprintf(MDB_DBG_KMOD, "stutter module %s\n", name);
826 kmt_mod_remove(kmt, km);
827 } else {
828 km->km_seen = 1;
829 return (0);
830 }
831 }
832
833 mdb_dprintf(MDB_DBG_KMOD, "found new module %s\n", name);
834
835 if ((km = kmt_mod_create(t, modp, name)) != NULL) {
836 mdb_list_append(&kmt->kmt_modlist, km);
837 (void) mdb_nv_insert(&kmt->kmt_modules, name, NULL,
838 (uintptr_t)km, 0);
839 km->km_seen = 1;
840 }
841
842 return (0);
843 }
844
845 static void
kmt_modlist_update(mdb_tgt_t * t)846 kmt_modlist_update(mdb_tgt_t *t)
847 {
848 kmt_data_t *kmt = t->t_data;
849 kmt_module_t *km, *kmn;
850
851 if (kmdb_kdi_mod_iter(kmt_modlist_update_cb, t) < 0) {
852 warn("failed to complete update of kernel module list\n");
853 return;
854 }
855
856 km = mdb_list_next(&kmt->kmt_modlist);
857 while (km != NULL) {
858 kmn = mdb_list_next(km);
859
860 if (km->km_seen == 1) {
861 /* Reset the mark for next time */
862 km->km_seen = 0;
863 } else {
864 /*
865 * We didn't see it on the kernel's module list, so
866 * remove it from our view of the world.
867 */
868 kmt_mod_remove(kmt, km);
869 }
870
871 km = kmn;
872 }
873 }
874
875 static void
kmt_periodic(mdb_tgt_t * t)876 kmt_periodic(mdb_tgt_t *t)
877 {
878 (void) mdb_tgt_status(t, &t->t_status);
879 }
880
881 int
kmt_lookup_by_addr(mdb_tgt_t * t,uintptr_t addr,uint_t flags,char * buf,size_t nbytes,GElf_Sym * symp,mdb_syminfo_t * sip)882 kmt_lookup_by_addr(mdb_tgt_t *t, uintptr_t addr, uint_t flags,
883 char *buf, size_t nbytes, GElf_Sym *symp, mdb_syminfo_t *sip)
884 {
885 kmt_data_t *kmt = t->t_data;
886 kmt_module_t *km = mdb_list_next(&kmt->kmt_modlist);
887 kmt_module_t *sym_km = NULL;
888 kmt_module_t prmod;
889 GElf_Sym sym;
890 uint_t symid;
891 const char *name;
892
893 /*
894 * We look through the private symbols (if any), then through the module
895 * symbols. We can simplify the loop if we pretend the private symbols
896 * come from a module.
897 */
898 if (mdb.m_prsym != NULL) {
899 bzero(&prmod, sizeof (kmt_module_t));
900 prmod.km_name = "<<<prmod>>>";
901 prmod.km_symtab = mdb.m_prsym;
902 prmod.km_list.ml_next = (mdb_list_t *)km;
903 km = &prmod;
904 }
905
906 /* Symbol resolution isn't available during initialization */
907 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT)
908 return (set_errno(EMDB_NOSYM));
909
910 for (; km != NULL; km = mdb_list_next(km)) {
911 if (km != &prmod && !kmt->kmt_symavail)
912 continue;
913
914 if (km->km_symtab == NULL)
915 continue;
916
917 if (mdb_gelf_symtab_lookup_by_addr(km->km_symtab, addr, flags,
918 buf, nbytes, symp, &sip->sym_id) != 0 ||
919 symp->st_value == 0)
920 continue;
921
922 if (flags & MDB_TGT_SYM_EXACT) {
923 sym_km = km;
924 goto found;
925 }
926
927 /*
928 * If this is the first match we've found, or if this symbol is
929 * closer to the specified address than the last one we found,
930 * use it.
931 */
932 if (sym_km == NULL || mdb_gelf_sym_closer(symp, &sym, addr)) {
933 sym_km = km;
934 sym = *symp;
935 symid = sip->sym_id;
936 }
937 }
938
939 /*
940 * kmdb dmods are normal kernel modules, loaded by krtld as such. To
941 * avoid polluting modinfo, and to keep from confusing the module
942 * subsystem (many dmods have the same names as real kernel modules),
943 * kmdb keeps their modctls separate, and doesn't allow their loading
944 * to be broadcast via the krtld module load/unload mechanism. As a
945 * result, kmdb_kvm doesn't find out about them, and can't turn their
946 * addresses into symbols. This can be most inconvenient during
947 * debugger faults, as the dmod frames will show up without names.
948 * We weren't able to turn the requested address into a symbol, so we'll
949 * take a spin through the dmods, trying to match our address against
950 * their symbols.
951 */
952 if (sym_km == NULL) {
953 return (kmdb_module_lookup_by_addr(addr, flags, buf, nbytes,
954 symp, sip));
955 }
956
957 *symp = sym;
958 sip->sym_id = symid;
959
960 found:
961 /*
962 * Once we've found something, copy the final name into the caller's
963 * buffer and prefix it with the load object name if appropriate.
964 */
965 name = mdb_gelf_sym_name(sym_km->km_symtab, symp);
966
967 if (sym_km == &prmod) {
968 if (buf != NULL) {
969 (void) strncpy(buf, name, nbytes);
970 buf[nbytes - 1] = '\0';
971 }
972 sip->sym_table = MDB_TGT_PRVSYM;
973 } else {
974 if (buf != NULL) {
975 if (sym_km->km_flags & KM_F_PRIMARY) {
976 (void) strncpy(buf, name, nbytes);
977 buf[nbytes - 1] = '\0';
978 } else {
979 (void) mdb_snprintf(buf, nbytes, "%s`%s",
980 sym_km->km_name, name);
981 }
982 }
983 sip->sym_table = MDB_TGT_SYMTAB;
984 }
985
986 return (0);
987 }
988
989 static int
kmt_lookup_by_name(mdb_tgt_t * t,const char * obj,const char * name,GElf_Sym * symp,mdb_syminfo_t * sip)990 kmt_lookup_by_name(mdb_tgt_t *t, const char *obj, const char *name,
991 GElf_Sym *symp, mdb_syminfo_t *sip)
992 {
993 kmt_data_t *kmt = t->t_data;
994 kmt_module_t *km;
995 mdb_var_t *v;
996 GElf_Sym sym;
997 uint_t symid;
998 int n;
999
1000 if (!kmt->kmt_symavail)
1001 return (set_errno(EMDB_NOSYM));
1002
1003 switch ((uintptr_t)obj) {
1004 case (uintptr_t)MDB_TGT_OBJ_EXEC:
1005 case (uintptr_t)MDB_TGT_OBJ_EVERY:
1006 km = mdb_list_next(&kmt->kmt_modlist);
1007 n = mdb_nv_size(&kmt->kmt_modules);
1008 break;
1009
1010 case (uintptr_t)MDB_TGT_OBJ_RTLD:
1011 obj = kmt->kmt_rtld_name;
1012 /*FALLTHROUGH*/
1013
1014 default:
1015 /*
1016 * If this is a request for a dmod symbol, let kmdb_module
1017 * handle it.
1018 */
1019 if (obj != NULL && strncmp(obj, "DMOD`", 5) == 0) {
1020 return (kmdb_module_lookup_by_name(obj + 5, name,
1021 symp, sip));
1022 }
1023
1024 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL)
1025 return (set_errno(EMDB_NOOBJ));
1026
1027 km = mdb_nv_get_cookie(v);
1028 n = 1;
1029 }
1030
1031 /*
1032 * kmdb's kvm target is at a bit of a disadvantage compared to mdb's
1033 * kvm target when it comes to global symbol lookups. mdb has ksyms,
1034 * which hides pesky things like symbols that are undefined in unix,
1035 * but which are defined in genunix. We don't have such a facility -
1036 * we simply iterate through the modules, looking for a given symbol
1037 * in each. Unless we're careful, we'll return the undef in the
1038 * aforementioned case.
1039 */
1040 for (; n > 0; n--, km = mdb_list_next(km)) {
1041 if (mdb_gelf_symtab_lookup_by_name(km->km_symtab, name,
1042 &sym, &symid) == 0 && sym.st_shndx != SHN_UNDEF)
1043 break;
1044 }
1045
1046 if (n == 0)
1047 return (set_errno(EMDB_NOSYM));
1048
1049 found:
1050 bcopy(&sym, symp, sizeof (GElf_Sym));
1051 sip->sym_id = symid;
1052 sip->sym_table = MDB_TGT_SYMTAB;
1053
1054 return (0);
1055 }
1056
1057 static int
kmt_symtab_func(void * data,const GElf_Sym * sym,const char * name,uint_t id)1058 kmt_symtab_func(void *data, const GElf_Sym *sym, const char *name, uint_t id)
1059 {
1060 kmt_symarg_t *arg = data;
1061
1062 if (mdb_tgt_sym_match(sym, arg->sym_type)) {
1063 arg->sym_info.sym_id = id;
1064
1065 return (arg->sym_cb(arg->sym_data, sym, name, &arg->sym_info,
1066 arg->sym_obj));
1067 }
1068
1069 return (0);
1070 }
1071
1072 static void
kmt_symtab_iter(mdb_gelf_symtab_t * gst,uint_t type,const char * obj,mdb_tgt_sym_f * cb,void * p)1073 kmt_symtab_iter(mdb_gelf_symtab_t *gst, uint_t type, const char *obj,
1074 mdb_tgt_sym_f *cb, void *p)
1075 {
1076 kmt_symarg_t arg;
1077
1078 arg.sym_cb = cb;
1079 arg.sym_data = p;
1080 arg.sym_type = type;
1081 arg.sym_info.sym_table = gst->gst_tabid;
1082 arg.sym_obj = obj;
1083
1084 mdb_gelf_symtab_iter(gst, kmt_symtab_func, &arg);
1085 }
1086
1087 static int
kmt_symbol_iter(mdb_tgt_t * t,const char * obj,uint_t which,uint_t type,mdb_tgt_sym_f * cb,void * data)1088 kmt_symbol_iter(mdb_tgt_t *t, const char *obj, uint_t which, uint_t type,
1089 mdb_tgt_sym_f *cb, void *data)
1090 {
1091 kmt_data_t *kmt = t->t_data;
1092 kmt_module_t *km;
1093
1094 mdb_gelf_symtab_t *symtab = NULL;
1095 mdb_var_t *v;
1096
1097 if (which == MDB_TGT_DYNSYM)
1098 return (set_errno(EMDB_TGTNOTSUP));
1099
1100 switch ((uintptr_t)obj) {
1101 case (uintptr_t)MDB_TGT_OBJ_EXEC:
1102 case (uintptr_t)MDB_TGT_OBJ_EVERY:
1103 mdb_nv_rewind(&kmt->kmt_modules);
1104 while ((v = mdb_nv_advance(&kmt->kmt_modules)) != NULL) {
1105 km = mdb_nv_get_cookie(v);
1106
1107 if (km->km_symtab != NULL) {
1108 kmt_symtab_iter(km->km_symtab, type,
1109 km->km_name, cb, data);
1110 }
1111 }
1112 return (0);
1113
1114 case (uintptr_t)MDB_TGT_OBJ_RTLD:
1115 obj = kmt->kmt_rtld_name;
1116 /*FALLTHROUGH*/
1117
1118 default:
1119 if (strncmp(obj, "DMOD`", 5) == 0) {
1120 return (kmdb_module_symbol_iter(obj + 5, type,
1121 cb, data));
1122 }
1123
1124 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL)
1125 return (set_errno(EMDB_NOOBJ));
1126 km = mdb_nv_get_cookie(v);
1127
1128 symtab = km->km_symtab;
1129 }
1130
1131 if (symtab != NULL)
1132 kmt_symtab_iter(symtab, type, obj, cb, data);
1133
1134 return (0);
1135 }
1136
1137 static int
kmt_mapping_walk(uintptr_t addr,const void * data,kmt_maparg_t * marg)1138 kmt_mapping_walk(uintptr_t addr, const void *data, kmt_maparg_t *marg)
1139 {
1140 /*
1141 * This is a bit sketchy but avoids problematic compilation of this
1142 * target against the current VM implementation. Now that we have
1143 * vmem, we can make this less broken and more informative by changing
1144 * this code to invoke the vmem walker in the near future.
1145 */
1146 const struct kmt_seg {
1147 caddr_t s_base;
1148 size_t s_size;
1149 } *segp = (const struct kmt_seg *)data;
1150
1151 mdb_map_t map;
1152 GElf_Sym sym;
1153 mdb_syminfo_t info;
1154
1155 map.map_base = (uintptr_t)segp->s_base;
1156 map.map_size = segp->s_size;
1157 map.map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X;
1158
1159 if (kmt_lookup_by_addr(marg->map_target, addr, MDB_TGT_SYM_EXACT,
1160 map.map_name, MDB_TGT_MAPSZ, &sym, &info) == -1) {
1161
1162 (void) mdb_iob_snprintf(map.map_name, MDB_TGT_MAPSZ,
1163 "%lr", addr);
1164 }
1165
1166 return (marg->map_cb(marg->map_data, &map, map.map_name));
1167 }
1168
1169 static int
kmt_mapping_iter(mdb_tgt_t * t,mdb_tgt_map_f * func,void * private)1170 kmt_mapping_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private)
1171 {
1172 kmt_maparg_t m;
1173 uintptr_t kas;
1174
1175 m.map_target = t;
1176 m.map_cb = func;
1177 m.map_data = private;
1178
1179 if ((kas = kmt_read_kas(t)) == 0)
1180 return (-1); /* errno is set for us */
1181
1182 return (mdb_pwalk("seg", (mdb_walk_cb_t)kmt_mapping_walk, &m, kas));
1183 }
1184
1185 static const mdb_map_t *
kmt_mod_to_map(kmt_module_t * km,mdb_map_t * map)1186 kmt_mod_to_map(kmt_module_t *km, mdb_map_t *map)
1187 {
1188 (void) strncpy(map->map_name, km->km_name, MDB_TGT_MAPSZ);
1189 map->map_name[MDB_TGT_MAPSZ - 1] = '\0';
1190 map->map_base = km->km_text_va;
1191 map->map_size = km->km_text_size;
1192 map->map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X;
1193
1194 return (map);
1195 }
1196
1197 static int
kmt_object_iter(mdb_tgt_t * t,mdb_tgt_map_f * func,void * private)1198 kmt_object_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private)
1199 {
1200 kmt_data_t *kmt = t->t_data;
1201 kmt_module_t *km;
1202 mdb_map_t m;
1203
1204 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1205 km = mdb_list_next(km)) {
1206 if (func(private, kmt_mod_to_map(km, &m), km->km_name) == -1)
1207 break;
1208 }
1209
1210 return (0);
1211 }
1212
1213 static const mdb_map_t *
kmt_addr_to_map(mdb_tgt_t * t,uintptr_t addr)1214 kmt_addr_to_map(mdb_tgt_t *t, uintptr_t addr)
1215 {
1216 kmt_data_t *kmt = t->t_data;
1217 kmt_module_t *km;
1218
1219 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1220 km = mdb_list_next(km)) {
1221 if (addr - km->km_text_va < km->km_text_size ||
1222 addr - km->km_data_va < km->km_data_size ||
1223 addr - km->km_bss_va < km->km_bss_size)
1224 return (kmt_mod_to_map(km, &kmt->kmt_map));
1225 }
1226
1227 (void) set_errno(EMDB_NOMAP);
1228 return (NULL);
1229 }
1230
1231 static kmt_module_t *
kmt_module_by_name(kmt_data_t * kmt,const char * name)1232 kmt_module_by_name(kmt_data_t *kmt, const char *name)
1233 {
1234 kmt_module_t *km;
1235
1236 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1237 km = mdb_list_next(km)) {
1238 if (strcmp(name, km->km_name) == 0)
1239 return (km);
1240 }
1241
1242 return (NULL);
1243 }
1244
1245 static const mdb_map_t *
kmt_name_to_map(mdb_tgt_t * t,const char * name)1246 kmt_name_to_map(mdb_tgt_t *t, const char *name)
1247 {
1248 kmt_data_t *kmt = t->t_data;
1249 kmt_module_t *km;
1250 mdb_map_t m;
1251
1252 /*
1253 * If name is MDB_TGT_OBJ_EXEC, return the first module on the list,
1254 * which will be unix since we keep kmt_modlist in load order.
1255 */
1256 if (name == MDB_TGT_OBJ_EXEC) {
1257 return (kmt_mod_to_map(mdb_list_next(&kmt->kmt_modlist),
1258 &m));
1259 }
1260
1261 if (name == MDB_TGT_OBJ_RTLD)
1262 name = kmt->kmt_rtld_name;
1263
1264 if ((km = kmt_module_by_name(kmt, name)) != NULL)
1265 return (kmt_mod_to_map(km, &m));
1266
1267 (void) set_errno(EMDB_NOOBJ);
1268 return (NULL);
1269 }
1270
1271 static ctf_file_t *
kmt_load_ctfdata(mdb_tgt_t * t,kmt_module_t * km)1272 kmt_load_ctfdata(mdb_tgt_t *t, kmt_module_t *km)
1273 {
1274 kmt_data_t *kmt = t->t_data;
1275 int err;
1276
1277 if (km->km_ctfp != NULL)
1278 return (km->km_ctfp);
1279
1280 if (km->km_ctf_va == NULL || km->km_symtab == NULL) {
1281 (void) set_errno(EMDB_NOCTF);
1282 return (NULL);
1283 }
1284
1285 if ((km->km_ctfp = mdb_ctf_bufopen(km->km_ctf_va, km->km_ctf_size,
1286 km->km_symtab_va, &km->km_symtab_hdr, km->km_strtab_va,
1287 &km->km_strtab_hdr, &err)) == NULL) {
1288 (void) set_errno(ctf_to_errno(err));
1289 return (NULL);
1290 }
1291
1292 mdb_dprintf(MDB_DBG_KMOD, "loaded %lu bytes of CTF data for %s\n",
1293 (ulong_t)km->km_ctf_size, km->km_name);
1294
1295 if (ctf_parent_name(km->km_ctfp) != NULL) {
1296 mdb_var_t *v;
1297
1298 if ((v = mdb_nv_lookup(&kmt->kmt_modules,
1299 ctf_parent_name(km->km_ctfp))) != NULL) {
1300 kmt_module_t *pm = mdb_nv_get_cookie(v);
1301
1302 if (pm->km_ctfp == NULL)
1303 (void) kmt_load_ctfdata(t, pm);
1304
1305 if (pm->km_ctfp != NULL && ctf_import(km->km_ctfp,
1306 pm->km_ctfp) == CTF_ERR) {
1307 warn("failed to import parent types into "
1308 "%s: %s\n", km->km_name,
1309 ctf_errmsg(ctf_errno(km->km_ctfp)));
1310 }
1311 } else {
1312 warn("failed to load CTF data for %s - parent %s not "
1313 "loaded\n", km->km_name,
1314 ctf_parent_name(km->km_ctfp));
1315 }
1316 }
1317
1318 return (km->km_ctfp);
1319 }
1320
1321 ctf_file_t *
kmt_addr_to_ctf(mdb_tgt_t * t,uintptr_t addr)1322 kmt_addr_to_ctf(mdb_tgt_t *t, uintptr_t addr)
1323 {
1324 kmt_data_t *kmt = t->t_data;
1325 kmt_module_t *km;
1326
1327 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1328 km = mdb_list_next(km)) {
1329 if (addr - km->km_text_va < km->km_text_size ||
1330 addr - km->km_data_va < km->km_data_size ||
1331 addr - km->km_bss_va < km->km_bss_size)
1332 return (kmt_load_ctfdata(t, km));
1333 }
1334
1335 return (kmdb_module_addr_to_ctf(addr));
1336 }
1337
1338 ctf_file_t *
kmt_name_to_ctf(mdb_tgt_t * t,const char * name)1339 kmt_name_to_ctf(mdb_tgt_t *t, const char *name)
1340 {
1341 kmt_data_t *kt = t->t_data;
1342 kmt_module_t *km;
1343
1344 if (name == MDB_TGT_OBJ_EXEC) {
1345 name = KMT_CTFPARENT;
1346 } else if (name == MDB_TGT_OBJ_RTLD) {
1347 name = kt->kmt_rtld_name;
1348 } else if (strncmp(name, "DMOD`", 5) == 0) {
1349 /* Request for CTF data for a DMOD symbol */
1350 return (kmdb_module_name_to_ctf(name + 5));
1351 }
1352
1353 if ((km = kmt_module_by_name(kt, name)) != NULL)
1354 return (kmt_load_ctfdata(t, km));
1355
1356 (void) set_errno(EMDB_NOOBJ);
1357 return (NULL);
1358 }
1359
1360 /*ARGSUSED*/
1361 static int
kmt_status(mdb_tgt_t * t,mdb_tgt_status_t * tsp)1362 kmt_status(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1363 {
1364 int state;
1365
1366 bzero(tsp, sizeof (mdb_tgt_status_t));
1367
1368 switch ((state = kmdb_dpi_get_state(NULL))) {
1369 case DPI_STATE_INIT:
1370 tsp->st_state = MDB_TGT_RUNNING;
1371 tsp->st_pc = 0;
1372 break;
1373
1374 case DPI_STATE_STOPPED:
1375 tsp->st_state = MDB_TGT_STOPPED;
1376
1377 (void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1378 break;
1379
1380 case DPI_STATE_FAULTED:
1381 tsp->st_state = MDB_TGT_STOPPED;
1382
1383 (void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1384
1385 tsp->st_flags |= MDB_TGT_ISTOP;
1386 break;
1387
1388 case DPI_STATE_LOST:
1389 tsp->st_state = MDB_TGT_LOST;
1390
1391 (void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1392 break;
1393 }
1394
1395 mdb_dprintf(MDB_DBG_KMOD, "kmt_status, dpi: %d tsp: %d, pc = %p %A\n",
1396 state, tsp->st_state, (void *)tsp->st_pc, tsp->st_pc);
1397
1398 return (0);
1399 }
1400
1401 /*
1402 * Invoked when kmt_defbp_enter_debugger is called, this routine activates and
1403 * deactivates deferred breakpoints in response to module load and unload
1404 * events.
1405 */
1406 /*ARGSUSED*/
1407 static void
kmt_defbp_event(mdb_tgt_t * t,int vid,void * private)1408 kmt_defbp_event(mdb_tgt_t *t, int vid, void *private)
1409 {
1410 if (kmt_defbp_modchg_isload) {
1411 if (!mdb_tgt_sespec_activate_all(t) &&
1412 (mdb.m_flags & MDB_FL_BPTNOSYMSTOP)) {
1413 /*
1414 * We weren't able to activate the breakpoints.
1415 * If so requested, we'll return without calling
1416 * continue, thus throwing the user into the debugger.
1417 */
1418 return;
1419 }
1420
1421 } else {
1422 mdb_sespec_t *sep, *nsep;
1423 const mdb_map_t *map, *bpmap;
1424 mdb_map_t modmap;
1425
1426 if ((map = kmt_addr_to_map(t,
1427 (uintptr_t)kmt_defbp_modchg_modctl->mod_text)) == NULL) {
1428 warn("module unload notification for unknown module %s",
1429 kmt_defbp_modchg_modctl->mod_modname);
1430 return; /* drop into the debugger */
1431 }
1432
1433 bcopy(map, &modmap, sizeof (mdb_map_t));
1434
1435 for (sep = mdb_list_next(&t->t_active); sep; sep = nsep) {
1436 nsep = mdb_list_next(sep);
1437
1438 if (sep->se_ops == &kmt_brkpt_ops) {
1439 kmt_brkpt_t *kb = sep->se_data;
1440
1441 if ((bpmap = kmt_addr_to_map(t,
1442 kb->kb_addr)) == NULL ||
1443 (bpmap->map_base == modmap.map_base &&
1444 bpmap->map_size == modmap.map_size)) {
1445 mdb_tgt_sespec_idle_one(t, sep,
1446 EMDB_NOMAP);
1447 }
1448 }
1449 }
1450 }
1451
1452 (void) mdb_tgt_continue(t, NULL);
1453 }
1454
1455 static void
kmt_defbp_enter_debugger(void)1456 kmt_defbp_enter_debugger(void)
1457 {
1458 /*
1459 * The debugger places a breakpoint here. We can't have a simple
1460 * nop function here, because GCC knows much more than we do, and
1461 * will optimize away the call to it.
1462 */
1463 (void) get_fp();
1464 }
1465
1466 /*
1467 * This routine is called while the kernel is running. It attempts to determine
1468 * whether any deferred breakpoints exist for the module being changed (loaded
1469 * or unloaded). If any such breakpoints exist, the debugger will be entered to
1470 * process them.
1471 */
1472 static void
kmt_defbp_modchg(struct modctl * mctl,int isload)1473 kmt_defbp_modchg(struct modctl *mctl, int isload)
1474 {
1475 kmt_defbp_t *dbp;
1476
1477 kmt_defbp_lock = 1;
1478
1479 for (dbp = mdb_list_next(&kmt_defbp_list); dbp;
1480 dbp = mdb_list_next(dbp)) {
1481 if (!dbp->dbp_ref)
1482 continue;
1483
1484 if (strcmp(mctl->mod_modname, dbp->dbp_objname) == 0) {
1485 /*
1486 * Activate the breakpoint
1487 */
1488 kmt_defbp_modchg_isload = isload;
1489 kmt_defbp_modchg_modctl = mctl;
1490
1491 kmt_defbp_enter_debugger();
1492 break;
1493 }
1494 }
1495
1496 kmt_defbp_lock = 0;
1497 }
1498
1499 /*ARGSUSED*/
1500 static int
kmt_continue(mdb_tgt_t * t,mdb_tgt_status_t * tsp)1501 kmt_continue(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1502 {
1503 int n;
1504
1505 kmdb_dpi_resume();
1506
1507 /*
1508 * The order of the following two calls is important. If there are
1509 * load acks on the work queue, we'll initialize the dmods they
1510 * represent. This will involve a call to _mdb_init, which may very
1511 * well result in a symbol lookup. If we haven't resynced our view
1512 * of symbols with the current state of the world, this lookup could
1513 * end very badly. We therefore make sure to sync before processing
1514 * the work queue.
1515 */
1516 kmt_sync(t);
1517 kmdb_dpi_process_work_queue();
1518
1519 if (kmdb_kdi_get_unload_request())
1520 t->t_flags |= MDB_TGT_F_UNLOAD;
1521
1522 (void) mdb_tgt_status(t, &t->t_status);
1523
1524 if ((n = kmt_dmod_status(NULL, KMDB_MC_STATE_LOADING) +
1525 kmt_dmod_status(NULL, KMDB_MC_STATE_UNLOADING)) != 0) {
1526 mdb_warn("%d dmod load%c/unload%c pending\n", n,
1527 "s"[n == 1], "s"[n == 1]);
1528 }
1529
1530 return (0);
1531 }
1532
1533 /*ARGSUSED*/
1534 static int
kmt_step(mdb_tgt_t * t,mdb_tgt_status_t * tsp)1535 kmt_step(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1536 {
1537 int rc;
1538
1539 if ((rc = kmdb_dpi_step()) == 0)
1540 (void) mdb_tgt_status(t, &t->t_status);
1541
1542 return (rc);
1543 }
1544
1545 static int
kmt_defbp_activate(mdb_tgt_t * t)1546 kmt_defbp_activate(mdb_tgt_t *t)
1547 {
1548 kmdb_dpi_modchg_register(kmt_defbp_modchg);
1549
1550 /*
1551 * The routines that add and arm breakpoints will check for the proper
1552 * DTrace state, but they'll just put this breakpoint on the idle list
1553 * if DTrace is active. It'll correctly move to the active list when
1554 * DTrace deactivates, but that's insufficient for our purposes -- we
1555 * need to do extra processing at that point. We won't get to do said
1556 * processing with with a normal idle->active transition, so we just
1557 * won't add it add it until we're sure that it'll stick.
1558 */
1559
1560 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1561 return (set_errno(EMDB_DTACTIVE));
1562
1563 kmt_defbp_bpspec = mdb_tgt_add_vbrkpt(t,
1564 (uintptr_t)kmt_defbp_enter_debugger,
1565 MDB_TGT_SPEC_HIDDEN, kmt_defbp_event, NULL);
1566
1567 return (0);
1568 }
1569
1570 static void
kmt_defbp_deactivate(mdb_tgt_t * t)1571 kmt_defbp_deactivate(mdb_tgt_t *t)
1572 {
1573 kmdb_dpi_modchg_cancel();
1574
1575 if (kmt_defbp_bpspec != 0) {
1576 if (t != NULL)
1577 (void) mdb_tgt_vespec_delete(t, kmt_defbp_bpspec);
1578
1579 kmt_defbp_bpspec = 0;
1580 }
1581 }
1582
1583 static kmt_defbp_t *
kmt_defbp_create(mdb_tgt_t * t,const char * objname,const char * symname)1584 kmt_defbp_create(mdb_tgt_t *t, const char *objname, const char *symname)
1585 {
1586 kmt_defbp_t *dbp = mdb_alloc(sizeof (kmt_defbp_t), UM_SLEEP);
1587
1588 mdb_dprintf(MDB_DBG_KMOD, "defbp_create %s`%s\n", objname, symname);
1589
1590 dbp->dbp_objname = strdup(objname);
1591 dbp->dbp_symname = strdup(symname);
1592 dbp->dbp_ref = 1;
1593
1594 kmt_defbp_num++;
1595
1596 if (kmt_defbp_num == 1 || kmt_defbp_bpspec == 0) {
1597 if (kmt_defbp_activate(t) < 0)
1598 warn("failed to activate deferred breakpoints");
1599 }
1600
1601 mdb_list_append(&kmt_defbp_list, dbp);
1602
1603 return (dbp);
1604 }
1605
1606 static void
kmt_defbp_destroy(kmt_defbp_t * dbp)1607 kmt_defbp_destroy(kmt_defbp_t *dbp)
1608 {
1609 mdb_dprintf(MDB_DBG_KMOD, "defbp_destroy %s`%s\n", dbp->dbp_objname,
1610 dbp->dbp_symname);
1611
1612 mdb_list_delete(&kmt_defbp_list, dbp);
1613
1614 strfree(dbp->dbp_objname);
1615 strfree(dbp->dbp_symname);
1616 mdb_free(dbp, sizeof (kmt_defbp_t));
1617 }
1618
1619 static void
kmt_defbp_prune_common(int all)1620 kmt_defbp_prune_common(int all)
1621 {
1622 kmt_defbp_t *dbp, *ndbp;
1623
1624 /* We can't remove items from the list while the driver is using it. */
1625 if (kmt_defbp_lock)
1626 return;
1627
1628 for (dbp = mdb_list_next(&kmt_defbp_list); dbp != NULL; dbp = ndbp) {
1629 ndbp = mdb_list_next(dbp);
1630
1631 if (!all && dbp->dbp_ref)
1632 continue;
1633
1634 kmt_defbp_destroy(dbp);
1635 }
1636 }
1637
1638 static void
kmt_defbp_prune(void)1639 kmt_defbp_prune(void)
1640 {
1641 kmt_defbp_prune_common(0);
1642 }
1643
1644 static void
kmt_defbp_destroy_all(void)1645 kmt_defbp_destroy_all(void)
1646 {
1647 kmt_defbp_prune_common(1);
1648 }
1649
1650 static void
kmt_defbp_delete(mdb_tgt_t * t,kmt_defbp_t * dbp)1651 kmt_defbp_delete(mdb_tgt_t *t, kmt_defbp_t *dbp)
1652 {
1653 dbp->dbp_ref = 0;
1654
1655 ASSERT(kmt_defbp_num > 0);
1656 kmt_defbp_num--;
1657
1658 if (kmt_defbp_num == 0)
1659 kmt_defbp_deactivate(t);
1660
1661 kmt_defbp_prune();
1662 }
1663
1664 static int
kmt_brkpt_ctor(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1665 kmt_brkpt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1666 {
1667 mdb_tgt_status_t tsp;
1668 kmt_bparg_t *ka = args;
1669 kmt_brkpt_t *kb;
1670 GElf_Sym s;
1671 mdb_instr_t instr;
1672
1673 (void) mdb_tgt_status(t, &tsp);
1674 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED)
1675 return (set_errno(EMDB_NOPROC));
1676
1677 if (ka->ka_symbol != NULL) {
1678 if (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, &s, NULL) == -1) {
1679 if (errno != EMDB_NOOBJ && !(errno == EMDB_NOSYM &&
1680 !(mdb.m_flags & MDB_FL_BPTNOSYMSTOP))) {
1681 warn("breakpoint %s activation failed",
1682 ka->ka_symbol);
1683 }
1684 return (-1); /* errno is set for us */
1685 }
1686
1687 ka->ka_addr = (uintptr_t)s.st_value;
1688 }
1689
1690 #ifdef __sparc
1691 if (ka->ka_addr & 3)
1692 return (set_errno(EMDB_BPALIGN));
1693 #endif
1694
1695 if (mdb_vread(&instr, sizeof (instr), ka->ka_addr) != sizeof (instr))
1696 return (-1); /* errno is set for us */
1697
1698 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1699 warn("breakpoint will not arm until DTrace is inactive\n");
1700
1701 kb = mdb_zalloc(sizeof (kmt_brkpt_t), UM_SLEEP);
1702 kb->kb_addr = ka->ka_addr;
1703 sep->se_data = kb;
1704
1705 return (0);
1706 }
1707
1708 /*ARGSUSED*/
1709 static void
kmt_brkpt_dtor(mdb_tgt_t * t,mdb_sespec_t * sep)1710 kmt_brkpt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep)
1711 {
1712 mdb_free(sep->se_data, sizeof (kmt_brkpt_t));
1713 }
1714
1715 /*ARGSUSED*/
1716 static char *
kmt_brkpt_info(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_vespec_t * vep,mdb_tgt_spec_desc_t * sp,char * buf,size_t nbytes)1717 kmt_brkpt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
1718 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
1719 {
1720 uintptr_t addr = 0;
1721
1722 if (vep != NULL) {
1723 kmt_bparg_t *ka = vep->ve_args;
1724
1725 if (ka->ka_symbol != NULL) {
1726 (void) mdb_iob_snprintf(buf, nbytes, "stop at %s",
1727 ka->ka_symbol);
1728 } else {
1729 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a",
1730 ka->ka_addr);
1731 addr = ka->ka_addr;
1732 }
1733
1734 } else {
1735 addr = ((kmt_brkpt_t *)sep->se_data)->kb_addr;
1736 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a", addr);
1737 }
1738
1739 sp->spec_base = addr;
1740 sp->spec_size = sizeof (mdb_instr_t);
1741
1742 return (buf);
1743 }
1744
1745 static int
kmt_brkpt_secmp(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1746 kmt_brkpt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1747 {
1748 kmt_brkpt_t *kb = sep->se_data;
1749 kmt_bparg_t *ka = args;
1750 GElf_Sym sym;
1751
1752 if (ka->ka_symbol != NULL) {
1753 return (mdb_tgt_lookup_by_scope(t, ka->ka_symbol,
1754 &sym, NULL) == 0 && sym.st_value == kb->kb_addr);
1755 }
1756
1757 return (ka->ka_addr == kb->kb_addr);
1758 }
1759
1760 /*ARGSUSED*/
1761 static int
kmt_brkpt_vecmp(mdb_tgt_t * t,mdb_vespec_t * vep,void * args)1762 kmt_brkpt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args)
1763 {
1764 kmt_bparg_t *ka1 = vep->ve_args;
1765 kmt_bparg_t *ka2 = args;
1766
1767 if (ka1->ka_symbol != NULL && ka2->ka_symbol != NULL)
1768 return (strcmp(ka1->ka_symbol, ka2->ka_symbol) == 0);
1769
1770 if (ka1->ka_symbol == NULL && ka2->ka_symbol == NULL)
1771 return (ka1->ka_addr == ka2->ka_addr);
1772
1773 return (0); /* fail if one is symbolic, other is an explicit address */
1774 }
1775
1776 static int
kmt_brkpt_arm(mdb_tgt_t * t,mdb_sespec_t * sep)1777 kmt_brkpt_arm(mdb_tgt_t *t, mdb_sespec_t *sep)
1778 {
1779 kmt_data_t *kmt = t->t_data;
1780 kmt_brkpt_t *kb = sep->se_data;
1781 int rv;
1782
1783 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1784 return (set_errno(EMDB_DTACTIVE));
1785
1786 if ((rv = kmdb_dpi_brkpt_arm(kb->kb_addr, &kb->kb_oinstr)) != 0)
1787 return (rv);
1788
1789 if (kmt->kmt_narmedbpts++ == 0)
1790 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_ACTIVATE);
1791
1792 return (0);
1793 }
1794
1795 static int
kmt_brkpt_disarm(mdb_tgt_t * t,mdb_sespec_t * sep)1796 kmt_brkpt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep)
1797 {
1798 kmt_data_t *kmt = t->t_data;
1799 kmt_brkpt_t *kb = sep->se_data;
1800 int rv;
1801
1802 ASSERT(kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_KMDB_BPT_ACTIVE);
1803
1804 if ((rv = kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr)) != 0)
1805 return (rv);
1806
1807 if (--kmt->kmt_narmedbpts == 0)
1808 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_DEACTIVATE);
1809
1810 return (0);
1811 }
1812
1813 /*
1814 * Determine whether the specified sespec is an armed watchpoint that overlaps
1815 * with the given breakpoint and has the given flags set. We use this to find
1816 * conflicts with breakpoints, below.
1817 */
1818 static int
kmt_wp_overlap(mdb_sespec_t * sep,kmt_brkpt_t * kb,int flags)1819 kmt_wp_overlap(mdb_sespec_t *sep, kmt_brkpt_t *kb, int flags)
1820 {
1821 const kmdb_wapt_t *wp = sep->se_data;
1822
1823 return (sep->se_state == MDB_TGT_SPEC_ARMED &&
1824 sep->se_ops == &kmt_wapt_ops && (wp->wp_wflags & flags) &&
1825 kb->kb_addr - wp->wp_addr < wp->wp_size);
1826 }
1827
1828 /*
1829 * We step over breakpoints using our single-stepper. If a conflicting
1830 * watchpoint is present, we must temporarily remove it before stepping over the
1831 * breakpoint so we don't immediately re-trigger the watchpoint. We know the
1832 * watchpoint has already triggered on our trap instruction as part of fetching
1833 * it. Before we return, we must re-install any disabled watchpoints.
1834 */
1835 static int
kmt_brkpt_cont(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)1836 kmt_brkpt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
1837 {
1838 kmt_brkpt_t *kb = sep->se_data;
1839 int status = -1;
1840 int error;
1841
1842 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
1843 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
1844 (void) kmdb_dpi_wapt_disarm(sep->se_data);
1845 }
1846
1847 if (kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr) == 0 &&
1848 kmt_step(t, tsp) == 0)
1849 status = kmt_status(t, tsp);
1850
1851 error = errno; /* save errno from disarm, step, or status */
1852
1853 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
1854 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
1855 kmdb_dpi_wapt_arm(sep->se_data);
1856 }
1857
1858 (void) set_errno(error);
1859 return (status);
1860 }
1861
1862 /*ARGSUSED*/
1863 static int
kmt_brkpt_match(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)1864 kmt_brkpt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
1865 {
1866 kmt_brkpt_t *kb = sep->se_data;
1867 int state, why;
1868 kreg_t pc;
1869
1870 state = kmdb_dpi_get_state(&why);
1871 (void) kmdb_dpi_get_register("pc", &pc);
1872
1873 return (state == DPI_STATE_FAULTED && why == DPI_STATE_WHY_BKPT &&
1874 pc == kb->kb_addr);
1875 }
1876
1877 static const mdb_se_ops_t kmt_brkpt_ops = {
1878 .se_ctor = kmt_brkpt_ctor,
1879 .se_dtor = kmt_brkpt_dtor,
1880 .se_info = kmt_brkpt_info,
1881 .se_secmp = kmt_brkpt_secmp,
1882 .se_vecmp = kmt_brkpt_vecmp,
1883 .se_arm = kmt_brkpt_arm,
1884 .se_disarm = kmt_brkpt_disarm,
1885 .se_cont = kmt_brkpt_cont,
1886 .se_match = kmt_brkpt_match,
1887 };
1888
1889 static int
kmt_wapt_ctor(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1890 kmt_wapt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1891 {
1892 mdb_tgt_status_t tsp;
1893 kmdb_wapt_t *vwp = args;
1894 kmdb_wapt_t *swp;
1895
1896 (void) mdb_tgt_status(t, &tsp);
1897 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED)
1898 return (set_errno(EMDB_NOPROC));
1899
1900 swp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP);
1901 bcopy(vwp, swp, sizeof (kmdb_wapt_t));
1902
1903 if (kmdb_dpi_wapt_reserve(swp) < 0) {
1904 mdb_free(swp, sizeof (kmdb_wapt_t));
1905 return (-1); /* errno is set for us */
1906 }
1907
1908 sep->se_data = swp;
1909
1910 return (0);
1911 }
1912
1913 /*ARGSUSED*/
1914 static void
kmt_wapt_dtor(mdb_tgt_t * t,mdb_sespec_t * sep)1915 kmt_wapt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep)
1916 {
1917 kmdb_wapt_t *wp = sep->se_data;
1918
1919 kmdb_dpi_wapt_release(wp);
1920 mdb_free(wp, sizeof (kmdb_wapt_t));
1921 }
1922
1923 /*ARGSUSED*/
1924 static char *
kmt_wapt_info(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_vespec_t * vep,mdb_tgt_spec_desc_t * sp,char * buf,size_t nbytes)1925 kmt_wapt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
1926 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
1927 {
1928 kmdb_wapt_t *wp = vep != NULL ? vep->ve_args : sep->se_data;
1929 const char *fmt;
1930 char desc[24];
1931
1932 ASSERT(wp->wp_wflags != 0);
1933 desc[0] = '\0';
1934
1935 switch (wp->wp_wflags) {
1936 case MDB_TGT_WA_R:
1937 (void) strcat(desc, "/read");
1938 break;
1939 case MDB_TGT_WA_W:
1940 (void) strcat(desc, "/write");
1941 break;
1942 case MDB_TGT_WA_X:
1943 (void) strcat(desc, "/exec");
1944 break;
1945 default:
1946 if (wp->wp_wflags & MDB_TGT_WA_R)
1947 (void) strcat(desc, "/r");
1948 if (wp->wp_wflags & MDB_TGT_WA_W)
1949 (void) strcat(desc, "/w");
1950 if (wp->wp_wflags & MDB_TGT_WA_X)
1951 (void) strcat(desc, "/x");
1952 }
1953
1954 switch (wp->wp_type) {
1955 case DPI_WAPT_TYPE_PHYS:
1956 fmt = "stop on %s of phys [%p, %p)";
1957 break;
1958
1959 case DPI_WAPT_TYPE_VIRT:
1960 fmt = "stop on %s of [%la, %la)";
1961 break;
1962
1963 case DPI_WAPT_TYPE_IO:
1964 if (wp->wp_size == 1)
1965 fmt = "stop on %s of I/O port %p";
1966 else
1967 fmt = "stop on %s of I/O port [%p, %p)";
1968 break;
1969
1970 default:
1971 fmt = "stop on %s of unknown [%p, %p]";
1972 break;
1973 }
1974
1975 (void) mdb_iob_snprintf(buf, nbytes, fmt, desc + 1, wp->wp_addr,
1976 wp->wp_addr + wp->wp_size);
1977
1978 sp->spec_base = wp->wp_addr;
1979 sp->spec_size = wp->wp_size;
1980
1981 return (buf);
1982 }
1983
1984 /*ARGSUSED*/
1985 static int
kmt_wapt_secmp(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1986 kmt_wapt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1987 {
1988 kmdb_wapt_t *wp1 = sep->se_data;
1989 kmdb_wapt_t *wp2 = args;
1990
1991 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size &&
1992 wp1->wp_wflags == wp2->wp_wflags);
1993 }
1994
1995 /*ARGSUSED*/
1996 static int
kmt_wapt_vecmp(mdb_tgt_t * t,mdb_vespec_t * vep,void * args)1997 kmt_wapt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args)
1998 {
1999 kmdb_wapt_t *wp1 = vep->ve_args;
2000 kmdb_wapt_t *wp2 = args;
2001
2002 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size &&
2003 wp1->wp_wflags == wp2->wp_wflags);
2004 }
2005
2006 /*ARGSUSED*/
2007 static int
kmt_wapt_arm(mdb_tgt_t * t,mdb_sespec_t * sep)2008 kmt_wapt_arm(mdb_tgt_t *t, mdb_sespec_t *sep)
2009 {
2010 kmdb_dpi_wapt_arm(sep->se_data);
2011
2012 return (0);
2013 }
2014
2015 /*ARGSUSED*/
2016 static int
kmt_wapt_disarm(mdb_tgt_t * t,mdb_sespec_t * sep)2017 kmt_wapt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep)
2018 {
2019 kmdb_dpi_wapt_disarm(sep->se_data);
2020
2021 return (0);
2022 }
2023
2024 /*
2025 * Determine whether the specified sespec is an armed breakpoint at the given
2026 * %pc. We use this to find conflicts with watchpoints below.
2027 */
2028 static int
kmt_bp_overlap(mdb_sespec_t * sep,uintptr_t pc)2029 kmt_bp_overlap(mdb_sespec_t *sep, uintptr_t pc)
2030 {
2031 kmt_brkpt_t *kb = sep->se_data;
2032
2033 return (sep->se_state == MDB_TGT_SPEC_ARMED &&
2034 sep->se_ops == &kmt_brkpt_ops && kb->kb_addr == pc);
2035 }
2036
2037 /*
2038 * We step over watchpoints using our single-stepper. If a conflicting
2039 * breakpoint is present, we must temporarily disarm it before stepping over
2040 * the watchpoint so we do not immediately re-trigger the breakpoint. This is
2041 * similar to the case handled in kmt_brkpt_cont(), above.
2042 */
2043 static int
kmt_wapt_cont(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)2044 kmt_wapt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2045 {
2046 mdb_sespec_t *bep = NULL;
2047 int status = -1;
2048 int error, why;
2049
2050 /*
2051 * If we stopped for anything other than a watchpoint, check to see
2052 * if there's a breakpoint here.
2053 */
2054 if (!(kmdb_dpi_get_state(&why) == DPI_STATE_FAULTED &&
2055 (why == DPI_STATE_WHY_V_WAPT || why == DPI_STATE_WHY_P_WAPT))) {
2056 kreg_t pc;
2057
2058 (void) kmdb_dpi_get_register("pc", &pc);
2059
2060 for (bep = mdb_list_next(&t->t_active); bep != NULL;
2061 bep = mdb_list_next(bep)) {
2062 if (kmt_bp_overlap(bep, pc)) {
2063 (void) bep->se_ops->se_disarm(t, bep);
2064 bep->se_state = MDB_TGT_SPEC_ACTIVE;
2065 break;
2066 }
2067 }
2068 }
2069
2070 kmdb_dpi_wapt_disarm(sep->se_data);
2071 if (kmt_step(t, tsp) == 0)
2072 status = kmt_status(t, tsp);
2073
2074 error = errno; /* save errno from step or status */
2075
2076 if (bep != NULL)
2077 mdb_tgt_sespec_arm_one(t, bep);
2078
2079 (void) set_errno(error);
2080 return (status);
2081 }
2082
2083 /*ARGSUSED*/
2084 static int
kmt_wapt_match(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)2085 kmt_wapt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2086 {
2087 return (kmdb_dpi_wapt_match(sep->se_data));
2088 }
2089
2090 static const mdb_se_ops_t kmt_wapt_ops = {
2091 .se_ctor = kmt_wapt_ctor,
2092 .se_dtor = kmt_wapt_dtor,
2093 .se_info = kmt_wapt_info,
2094 .se_secmp = kmt_wapt_secmp,
2095 .se_vecmp = kmt_wapt_vecmp,
2096 .se_arm = kmt_wapt_arm,
2097 .se_disarm = kmt_wapt_disarm,
2098 .se_cont = kmt_wapt_cont,
2099 .se_match = kmt_wapt_match,
2100 };
2101
2102 /*ARGSUSED*/
2103 static int
kmt_trap_ctor(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)2104 kmt_trap_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
2105 {
2106 sep->se_data = args; /* trap number */
2107
2108 return (0);
2109 }
2110
2111 /*ARGSUSED*/
2112 static char *
kmt_trap_info(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_vespec_t * vep,mdb_tgt_spec_desc_t * sp,char * buf,size_t nbytes)2113 kmt_trap_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
2114 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
2115 {
2116 const char *name;
2117 int trapnum;
2118
2119 if (vep != NULL)
2120 trapnum = (intptr_t)vep->ve_args;
2121 else
2122 trapnum = (intptr_t)sep->se_data;
2123
2124 if (trapnum == KMT_TRAP_ALL)
2125 name = "any trap";
2126 else if (trapnum == KMT_TRAP_NOTENUM)
2127 name = "miscellaneous trap";
2128 else
2129 name = kmt_trapname(trapnum);
2130
2131 (void) mdb_iob_snprintf(buf, nbytes, "single-step stop on %s", name);
2132
2133 return (buf);
2134 }
2135
2136 /*ARGSUSED2*/
2137 static int
kmt_trap_match(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)2138 kmt_trap_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2139 {
2140 int spectt = (intptr_t)sep->se_data;
2141 kmt_data_t *kmt = t->t_data;
2142 kreg_t tt;
2143
2144 (void) kmdb_dpi_get_register("tt", &tt);
2145
2146 switch (spectt) {
2147 case KMT_TRAP_ALL:
2148 return (1);
2149 case KMT_TRAP_NOTENUM:
2150 return (tt > kmt->kmt_trapmax ||
2151 !BT_TEST(kmt->kmt_trapmap, tt));
2152 default:
2153 return (tt == spectt);
2154 }
2155 }
2156
2157 static const mdb_se_ops_t kmt_trap_ops = {
2158 .se_ctor = kmt_trap_ctor,
2159 .se_dtor = no_se_dtor,
2160 .se_info = kmt_trap_info,
2161 .se_secmp = no_se_secmp,
2162 .se_vecmp = no_se_vecmp,
2163 .se_arm = no_se_arm,
2164 .se_disarm = no_se_disarm,
2165 .se_cont = no_se_cont,
2166 .se_match = kmt_trap_match,
2167 };
2168
2169 static void
kmt_bparg_dtor(mdb_vespec_t * vep)2170 kmt_bparg_dtor(mdb_vespec_t *vep)
2171 {
2172 kmt_bparg_t *ka = vep->ve_args;
2173
2174 if (ka->ka_symbol != NULL)
2175 strfree(ka->ka_symbol);
2176
2177 if (ka->ka_defbp != NULL)
2178 kmt_defbp_delete(mdb.m_target, ka->ka_defbp);
2179
2180 mdb_free(ka, sizeof (kmt_bparg_t));
2181 }
2182
2183 static int
kmt_add_vbrkpt(mdb_tgt_t * t,uintptr_t addr,int spec_flags,mdb_tgt_se_f * func,void * data)2184 kmt_add_vbrkpt(mdb_tgt_t *t, uintptr_t addr,
2185 int spec_flags, mdb_tgt_se_f *func, void *data)
2186 {
2187 kmt_bparg_t *ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP);
2188
2189 ka->ka_addr = addr;
2190 ka->ka_symbol = NULL;
2191 ka->ka_defbp = NULL;
2192
2193 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags,
2194 func, data, ka, kmt_bparg_dtor));
2195 }
2196
2197 static int
kmt_add_sbrkpt(mdb_tgt_t * t,const char * fullname,int spec_flags,mdb_tgt_se_f * func,void * data)2198 kmt_add_sbrkpt(mdb_tgt_t *t, const char *fullname,
2199 int spec_flags, mdb_tgt_se_f *func, void *data)
2200 {
2201 kmt_bparg_t *ka;
2202 kmt_defbp_t *dbp;
2203 GElf_Sym sym;
2204 char *tick, *objname, *symname;
2205 int serrno;
2206
2207 if ((tick = strchr(fullname, '`')) == fullname) {
2208 (void) set_errno(EMDB_NOOBJ);
2209 return (0);
2210 }
2211
2212 /*
2213 * Deferred breakpoints are always scoped. If we didn't find a tick,
2214 * there's no scope. We'll create a vbrkpt, but only if we can turn the
2215 * provided string into an address.
2216 */
2217 if (tick == NULL) {
2218 uintptr_t addr;
2219
2220 if (strisbasenum(fullname)) {
2221 addr = mdb_strtoull(fullname); /* a bare address */
2222 } else if (mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EVERY,
2223 fullname, &sym, NULL) < 0) {
2224 (void) set_errno(EMDB_NOSYM);
2225 return (0);
2226 } else {
2227 addr = (uintptr_t)sym.st_value; /* unscoped sym name */
2228 }
2229
2230 return (kmt_add_vbrkpt(t, addr, spec_flags, func, data));
2231 }
2232
2233 if (*(tick + 1) == '\0') {
2234 (void) set_errno(EMDB_NOSYM);
2235 return (0);
2236 }
2237
2238 objname = strndup(fullname, tick - fullname);
2239 symname = tick + 1;
2240
2241 if (mdb_tgt_lookup_by_name(t, objname, symname, NULL, NULL) < 0 &&
2242 errno != EMDB_NOOBJ) {
2243 serrno = errno;
2244 strfree(objname);
2245
2246 (void) set_errno(serrno);
2247 return (0); /* errno is set for us */
2248 }
2249
2250 dbp = kmt_defbp_create(t, objname, symname);
2251 strfree(objname);
2252
2253 ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP);
2254 ka->ka_symbol = strdup(fullname);
2255 ka->ka_addr = 0;
2256 ka->ka_defbp = dbp;
2257
2258 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags,
2259 func, data, ka, kmt_bparg_dtor));
2260 }
2261
2262 static int
kmt_wparg_overlap(const kmdb_wapt_t * wp1,const kmdb_wapt_t * wp2)2263 kmt_wparg_overlap(const kmdb_wapt_t *wp1, const kmdb_wapt_t *wp2)
2264 {
2265 /* Assume the watchpoint spaces don't overlap */
2266 if (wp1->wp_type != wp2->wp_type)
2267 return (0);
2268
2269 if (wp2->wp_addr + wp2->wp_size <= wp1->wp_addr)
2270 return (0); /* no range overlap */
2271
2272 if (wp1->wp_addr + wp1->wp_size <= wp2->wp_addr)
2273 return (0); /* no range overlap */
2274
2275 return (wp1->wp_addr != wp2->wp_addr || wp1->wp_size != wp2->wp_size ||
2276 wp1->wp_wflags != wp2->wp_wflags);
2277 }
2278
2279 static void
kmt_wparg_dtor(mdb_vespec_t * vep)2280 kmt_wparg_dtor(mdb_vespec_t *vep)
2281 {
2282 mdb_free(vep->ve_args, sizeof (kmdb_wapt_t));
2283 }
2284
2285 static int
kmt_add_wapt_common(mdb_tgt_t * t,uintptr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data,int type)2286 kmt_add_wapt_common(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2287 int spec_flags, mdb_tgt_se_f *func, void *data, int type)
2288 {
2289 kmdb_wapt_t *wp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP);
2290 mdb_sespec_t *sep;
2291
2292 wp->wp_addr = addr;
2293 wp->wp_size = len;
2294 wp->wp_type = type;
2295 wp->wp_wflags = wflags;
2296
2297 if (kmdb_dpi_wapt_validate(wp) < 0)
2298 return (0); /* errno is set for us */
2299
2300 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
2301 if (sep->se_ops == &kmt_wapt_ops &&
2302 mdb_list_next(&sep->se_velist) != NULL &&
2303 kmt_wparg_overlap(wp, sep->se_data))
2304 goto wapt_dup;
2305 }
2306
2307 for (sep = mdb_list_next(&t->t_idle); sep; sep = mdb_list_next(sep)) {
2308 if (sep->se_ops == &kmt_wapt_ops && kmt_wparg_overlap(wp,
2309 ((mdb_vespec_t *)mdb_list_next(&sep->se_velist))->ve_args))
2310 goto wapt_dup;
2311 }
2312
2313 return (mdb_tgt_vespec_insert(t, &kmt_wapt_ops, spec_flags,
2314 func, data, wp, kmt_wparg_dtor));
2315
2316 wapt_dup:
2317 mdb_free(wp, sizeof (kmdb_wapt_t));
2318 (void) set_errno(EMDB_WPDUP);
2319 return (0);
2320 }
2321
2322 static int
kmt_add_pwapt(mdb_tgt_t * t,physaddr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data)2323 kmt_add_pwapt(mdb_tgt_t *t, physaddr_t addr, size_t len, uint_t wflags,
2324 int spec_flags, mdb_tgt_se_f *func, void *data)
2325 {
2326 return (kmt_add_wapt_common(t, (uintptr_t)addr, len, wflags, spec_flags,
2327 func, data, DPI_WAPT_TYPE_PHYS));
2328 }
2329
2330 static int
kmt_add_vwapt(mdb_tgt_t * t,uintptr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data)2331 kmt_add_vwapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2332 int spec_flags, mdb_tgt_se_f *func, void *data)
2333 {
2334 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func,
2335 data, DPI_WAPT_TYPE_VIRT));
2336 }
2337
2338 static int
kmt_add_iowapt(mdb_tgt_t * t,uintptr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data)2339 kmt_add_iowapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2340 int spec_flags, mdb_tgt_se_f *func, void *data)
2341 {
2342 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func,
2343 data, DPI_WAPT_TYPE_IO));
2344 }
2345
2346 static int
kmt_add_trap(mdb_tgt_t * t,int trapnum,int spec_flags,mdb_tgt_se_f * func,void * data)2347 kmt_add_trap(mdb_tgt_t *t, int trapnum, int spec_flags, mdb_tgt_se_f *func,
2348 void *data)
2349 {
2350 kmt_data_t *kmt = t->t_data;
2351
2352 if (trapnum != KMT_TRAP_ALL && trapnum != KMT_TRAP_NOTENUM) {
2353 if (trapnum < 0 || trapnum > kmt->kmt_trapmax) {
2354 (void) set_errno(EMDB_BADFLTNUM);
2355 return (0);
2356 }
2357
2358 BT_SET(kmt->kmt_trapmap, trapnum);
2359 }
2360
2361 return (mdb_tgt_vespec_insert(t, &kmt_trap_ops, spec_flags, func, data,
2362 (void *)(uintptr_t)trapnum, no_ve_dtor));
2363 }
2364
2365 /*ARGSUSED*/
2366 static uintmax_t
kmt_cpuid_disc_get(const mdb_var_t * v)2367 kmt_cpuid_disc_get(const mdb_var_t *v)
2368 {
2369 return (kmdb_dpi_get_master_cpuid());
2370 }
2371
2372 static const mdb_nv_disc_t kmt_cpuid_disc = {
2373 .disc_get = kmt_cpuid_disc_get
2374 };
2375
2376 /*
2377 * This routine executes while the kernel is running.
2378 */
2379 void
kmt_activate(mdb_tgt_t * t)2380 kmt_activate(mdb_tgt_t *t)
2381 {
2382 kmt_data_t *kmt = t->t_data;
2383
2384 mdb_prop_postmortem = FALSE;
2385 mdb_prop_kernel = TRUE;
2386
2387 (void) mdb_tgt_register_dcmds(t, &kmt_dcmds[0], MDB_MOD_FORCE);
2388 mdb_tgt_register_regvars(t, kmt->kmt_rds, &kmt_reg_disc, 0);
2389
2390 /*
2391 * Force load of the MDB krtld module, in case it's been rolled into
2392 * unix.
2393 */
2394 (void) mdb_module_load(KMT_RTLD_NAME, MDB_MOD_SILENT | MDB_MOD_DEFER);
2395 }
2396
2397 static void
kmt_destroy(mdb_tgt_t * t)2398 kmt_destroy(mdb_tgt_t *t)
2399 {
2400 kmt_data_t *kmt = t->t_data;
2401 kmt_module_t *km, *pkm;
2402
2403 mdb_nv_destroy(&kmt->kmt_modules);
2404 for (km = mdb_list_prev(&kmt->kmt_modlist); km != NULL; km = pkm) {
2405 pkm = mdb_list_prev(km);
2406 mdb_free(km, sizeof (kmt_module_t));
2407 }
2408
2409 if (!kmt_defbp_lock)
2410 kmt_defbp_destroy_all();
2411
2412 if (kmt->kmt_trapmap != NULL)
2413 mdb_free(kmt->kmt_trapmap, BT_SIZEOFMAP(kmt->kmt_trapmax));
2414
2415 mdb_free(kmt, sizeof (kmt_data_t));
2416 }
2417
2418 static const mdb_tgt_ops_t kmt_ops = {
2419 .t_setflags = kmt_setflags,
2420 .t_setcontext = (int (*)())(uintptr_t)mdb_tgt_notsup,
2421 .t_activate = kmt_activate,
2422 .t_deactivate = (void (*)())(uintptr_t)mdb_tgt_nop,
2423 .t_periodic = kmt_periodic,
2424 .t_destroy = kmt_destroy,
2425 .t_name = kmt_name,
2426 .t_isa = (const char *(*)())mdb_conf_isa,
2427 .t_platform = kmt_platform,
2428 .t_uname = kmt_uname,
2429 .t_dmodel = kmt_dmodel,
2430 .t_aread = (ssize_t (*)())mdb_tgt_notsup,
2431 .t_awrite = (ssize_t (*)())mdb_tgt_notsup,
2432 .t_vread = kmt_read,
2433 .t_vwrite = kmt_write,
2434 .t_pread = kmt_pread,
2435 .t_pwrite = kmt_pwrite,
2436 .t_fread = kmt_read,
2437 .t_fwrite = kmt_write,
2438 .t_ioread = kmt_ioread,
2439 .t_iowrite = kmt_iowrite,
2440 .t_vtop = kmt_vtop,
2441 .t_lookup_by_name = kmt_lookup_by_name,
2442 .t_lookup_by_addr = kmt_lookup_by_addr,
2443 .t_symbol_iter = kmt_symbol_iter,
2444 .t_mapping_iter = kmt_mapping_iter,
2445 .t_object_iter = kmt_object_iter,
2446 .t_addr_to_map = kmt_addr_to_map,
2447 .t_name_to_map = kmt_name_to_map,
2448 .t_addr_to_ctf = kmt_addr_to_ctf,
2449 .t_name_to_ctf = kmt_name_to_ctf,
2450 .t_status = kmt_status,
2451 .t_run = (int (*)())(uintptr_t)mdb_tgt_notsup,
2452 .t_step = kmt_step,
2453 .t_step_out = kmt_step_out,
2454 .t_next = kmt_next,
2455 .t_cont = kmt_continue,
2456 .t_signal = (int (*)())(uintptr_t)mdb_tgt_notsup,
2457 .t_add_vbrkpt = kmt_add_vbrkpt,
2458 .t_add_sbrkpt = kmt_add_sbrkpt,
2459 .t_add_pwapt = kmt_add_pwapt,
2460 .t_add_vwapt = kmt_add_vwapt,
2461 .t_add_iowapt = kmt_add_iowapt,
2462 .t_add_sysenter = (int (*)())(uintptr_t)mdb_tgt_null,
2463 .t_add_sysexit = (int (*)())(uintptr_t)mdb_tgt_null,
2464 .t_add_signal = (int (*)())(uintptr_t)mdb_tgt_null,
2465 .t_add_fault = kmt_add_trap,
2466 .t_getareg = kmt_getareg,
2467 .t_putareg = kmt_putareg,
2468 .t_stack_iter = (int (*)())(uintptr_t)mdb_tgt_nop, /* XXX */
2469 .t_auxv = (int (*)())(uintptr_t)mdb_tgt_notsup,
2470 .t_thread_name = (int (*)())(uintptr_t)mdb_tgt_notsup,
2471 };
2472
2473 /*
2474 * Called immediately upon resumption of the system after a step or continue.
2475 * Allows us to synchronize kmt's view of the world with reality.
2476 */
2477 /*ARGSUSED*/
2478 static void
kmt_sync(mdb_tgt_t * t)2479 kmt_sync(mdb_tgt_t *t)
2480 {
2481 kmt_data_t *kmt = t->t_data;
2482 int symavail;
2483
2484 mdb_dprintf(MDB_DBG_KMOD, "synchronizing with kernel\n");
2485
2486 symavail = kmt->kmt_symavail;
2487 kmt->kmt_symavail = FALSE;
2488
2489 /*
2490 * Resync our view of the world if the modules have changed, or if we
2491 * didn't have any symbols coming into this function. The latter will
2492 * only happen on startup.
2493 */
2494 if (kmdb_kdi_mods_changed() || !symavail)
2495 kmt_modlist_update(t);
2496
2497 /*
2498 * It would be nice if we could run this less frequently, perhaps
2499 * after a dvec-initiated trigger.
2500 */
2501 kmdb_module_sync();
2502
2503 kmt->kmt_symavail = TRUE;
2504
2505 mdb_dprintf(MDB_DBG_KMOD, "synchronization complete\n");
2506
2507 kmt_defbp_prune();
2508
2509 if (kmt_defbp_num > 0 && kmt_defbp_bpspec == 0 &&
2510 kmdb_kdi_dtrace_get_state() != KDI_DTSTATE_DTRACE_ACTIVE) {
2511 /*
2512 * Deferred breakpoints were created while DTrace was active,
2513 * and consequently the deferred breakpoint enabling mechanism
2514 * wasn't activated. Activate it now, and then try to activate
2515 * the deferred breakpoints. We do this so that we can catch
2516 * the ones which may apply to modules that have been loaded
2517 * while they were waiting for DTrace to deactivate.
2518 */
2519 (void) kmt_defbp_activate(t);
2520 (void) mdb_tgt_sespec_activate_all(t);
2521 }
2522
2523 (void) mdb_tgt_status(t, &t->t_status);
2524 }
2525
2526 /*
2527 * This routine executes while the kernel is running.
2528 */
2529 /*ARGSUSED*/
2530 int
kmdb_kvm_create(mdb_tgt_t * t,int argc,const char * argv[])2531 kmdb_kvm_create(mdb_tgt_t *t, int argc, const char *argv[])
2532 {
2533 kmt_data_t *kmt;
2534
2535 if (argc != 0)
2536 return (set_errno(EINVAL));
2537
2538 kmt = mdb_zalloc(sizeof (kmt_data_t), UM_SLEEP);
2539 t->t_data = kmt;
2540 t->t_ops = &kmt_ops;
2541 t->t_flags |= MDB_TGT_F_RDWR; /* kmdb is always r/w */
2542
2543 (void) mdb_nv_insert(&mdb.m_nv, "cpuid", &kmt_cpuid_disc, 0,
2544 MDB_NV_PERSIST | MDB_NV_RDONLY);
2545
2546 (void) mdb_nv_create(&kmt->kmt_modules, UM_SLEEP);
2547
2548 kmt_init_isadep(t);
2549
2550 kmt->kmt_symavail = FALSE;
2551
2552 bzero(&kmt_defbp_list, sizeof (mdb_list_t));
2553
2554 return (0);
2555
2556 create_err:
2557 kmt_destroy(t);
2558
2559 return (-1);
2560 }
2561
2562 /*
2563 * This routine is called once, when kmdb first has control of the world.
2564 */
2565 void
kmdb_kvm_startup(void)2566 kmdb_kvm_startup(void)
2567 {
2568 kmt_data_t *kmt = mdb.m_target->t_data;
2569
2570 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm startup\n");
2571
2572 kmt_sync(mdb.m_target);
2573 (void) mdb_module_load_builtin(KMT_MODULE);
2574 kmt_startup_isadep(mdb.m_target);
2575
2576 /*
2577 * This is here because we need to write the deferred breakpoint
2578 * breakpoint when the debugger starts. Our normal r/o write routines
2579 * don't work when the kernel is running, so we have to do it during
2580 * startup.
2581 */
2582 (void) mdb_tgt_sespec_activate_all(mdb.m_target);
2583
2584 kmt->kmt_rtld_name = KMT_RTLD_NAME;
2585
2586 if (kmt_module_by_name(kmt, KMT_RTLD_NAME) == NULL)
2587 kmt->kmt_rtld_name = "unix";
2588 }
2589
2590 /*
2591 * This routine is called after kmdb has loaded its initial set of modules.
2592 */
2593 void
kmdb_kvm_poststartup(void)2594 kmdb_kvm_poststartup(void)
2595 {
2596 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm post-startup\n");
2597
2598 (void) mdb_dis_select(kmt_def_dismode());
2599 }
2600