xref: /illumos-gate/usr/src/cmd/mdb/common/kmdb/kmdb_kvm.c (revision 3350c9c925acb5854315e9d992703db756886095)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright (c) 2013 by Delphix. All rights reserved.
24  *
25  * Copyright 2019 Joyent, Inc.
26  * Copyright 2025 Oxide Computer Company
27  */
28 
29 #include <kmdb/kmdb_kvm.h>
30 #include <kmdb/kvm.h>
31 #include <kmdb/kmdb_kdi.h>
32 #include <kmdb/kmdb_promif.h>
33 #include <kmdb/kmdb_module.h>
34 #include <kmdb/kmdb_asmutil.h>
35 #include <mdb/mdb_types.h>
36 #include <mdb/mdb_conf.h>
37 #include <mdb/mdb_err.h>
38 #include <mdb/mdb_modapi.h>
39 #include <mdb/mdb_target_impl.h>
40 #include <mdb/mdb_debug.h>
41 #include <mdb/mdb_string.h>
42 #include <mdb/mdb_ctf.h>
43 #include <mdb/mdb_kreg_impl.h>
44 #include <mdb/mdb_ks.h>
45 #include <mdb/mdb.h>
46 
47 #include <strings.h>
48 #include <dlfcn.h>
49 #include <sys/isa_defs.h>
50 #include <sys/kobj.h>
51 #include <sys/kobj_impl.h>
52 #include <sys/bitmap.h>
53 #include <sys/uuid.h>
54 #include <vm/as.h>
55 
56 static const char KMT_RTLD_NAME[] = "krtld";
57 static const char KMT_MODULE[] = "mdb_ks";
58 static const char KMT_CTFPARENT[] = "genunix";
59 
60 static mdb_list_t kmt_defbp_list;	/* List of current deferred bp's */
61 static int kmt_defbp_lock;		/* For list, running kernel holds */
62 static uint_t kmt_defbp_modchg_isload;	/* Whether mod change is load/unload */
63 static struct modctl *kmt_defbp_modchg_modctl; /* modctl for defbp checking */
64 static uint_t kmt_defbp_num;		/* Number of referenced def'd bp's */
65 static int kmt_defbp_bpspec;		/* vespec for def'd bp activation bp */
66 
67 static const mdb_se_ops_t kmt_brkpt_ops;
68 static const mdb_se_ops_t kmt_wapt_ops;
69 
70 static void kmt_sync(mdb_tgt_t *);
71 
72 typedef struct kmt_symarg {
73 	mdb_tgt_sym_f *sym_cb;		/* Caller's callback function */
74 	void *sym_data;			/* Callback function argument */
75 	uint_t sym_type;		/* Symbol type/binding filter */
76 	mdb_syminfo_t sym_info;		/* Symbol id and table id */
77 	const char *sym_obj;		/* Containing object */
78 } kmt_symarg_t;
79 
80 typedef struct kmt_maparg {
81 	mdb_tgt_t *map_target;		/* Target used for mapping iter */
82 	mdb_tgt_map_f *map_cb;		/* Caller's callback function */
83 	void *map_data;			/* Callback function argument */
84 } kmt_maparg_t;
85 
86 /*ARGSUSED*/
87 int
kmt_setflags(mdb_tgt_t * t,int flags)88 kmt_setflags(mdb_tgt_t *t, int flags)
89 {
90 	/*
91 	 * We only handle one flag (ALLOWIO), and we can't fail to set or clear
92 	 * it, so we just blindly replace the t_flags version with the one
93 	 * passed.
94 	 */
95 	t->t_flags = (t->t_flags & ~MDB_TGT_F_ALLOWIO) |
96 	    (flags & MDB_TGT_F_ALLOWIO);
97 
98 	return (0);
99 }
100 
101 /*ARGSUSED*/
102 const char *
kmt_name(mdb_tgt_t * t)103 kmt_name(mdb_tgt_t *t)
104 {
105 	return ("kmdb_kvm");
106 }
107 
108 /*ARGSUSED*/
109 static const char *
kmt_platform(mdb_tgt_t * t)110 kmt_platform(mdb_tgt_t *t)
111 {
112 	static char platform[SYS_NMLN];
113 
114 	if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT)
115 		return (mdb_conf_platform());
116 
117 	if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, platform,
118 	    sizeof (platform), "unix", "platform") != sizeof (platform)) {
119 		warn("'platform' symbol is missing from kernel\n");
120 		return ("unknown");
121 	}
122 
123 	return (platform);
124 }
125 
126 static int
kmt_uname(mdb_tgt_t * t,struct utsname * utsp)127 kmt_uname(mdb_tgt_t *t, struct utsname *utsp)
128 {
129 	return (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, utsp,
130 	    sizeof (struct utsname), MDB_TGT_OBJ_EXEC, "utsname"));
131 }
132 
133 /*ARGSUSED*/
134 static int
kmt_dmodel(mdb_tgt_t * t)135 kmt_dmodel(mdb_tgt_t *t)
136 {
137 	return (MDB_TGT_MODEL_NATIVE);
138 }
139 
140 /*ARGSUSED*/
141 ssize_t
kmt_rw(mdb_tgt_t * t,void * buf,size_t nbytes,uint64_t addr,ssize_t (* rw)(void *,size_t,uint64_t))142 kmt_rw(mdb_tgt_t *t, void *buf, size_t nbytes, uint64_t addr,
143     ssize_t (*rw)(void *, size_t, uint64_t))
144 {
145 	/*
146 	 * chunksz needs to be volatile because of the use of setjmp() in this
147 	 * function.
148 	 */
149 	volatile size_t chunksz;
150 	size_t n, ndone;
151 	jmp_buf *oldpcb = NULL;
152 	jmp_buf pcb;
153 	ssize_t res;
154 
155 	kmdb_prom_check_interrupt();
156 
157 	if (nbytes == 0)
158 		return (0);
159 
160 	/*
161 	 * Try to process the entire buffer, as requested.  If we catch a fault,
162 	 * try smaller chunks.  This allows us to handle regions that cross
163 	 * mapping boundaries.
164 	 */
165 	chunksz = nbytes;
166 	ndone = 0;
167 	if (setjmp(pcb) != 0) {
168 		if (chunksz == 1) {
169 			/* We failed with the smallest chunk - give up */
170 			kmdb_dpi_restore_fault_hdlr(oldpcb);
171 			return (ndone > 0 ? ndone : -1); /* errno set for us */
172 		} else if (chunksz > 4)
173 			chunksz = 4;
174 		else
175 			chunksz = 1;
176 	}
177 
178 	oldpcb = kmdb_dpi_set_fault_hdlr(&pcb);
179 	while (nbytes > 0) {
180 		n = MIN(chunksz, nbytes);
181 
182 		if ((res = rw(buf, n, addr)) != n)
183 			return (res < 0 ? res : ndone + res);
184 
185 		addr += n;
186 		nbytes -= n;
187 		ndone += n;
188 		buf = ((caddr_t)buf + n);
189 	}
190 
191 	kmdb_dpi_restore_fault_hdlr(oldpcb);
192 
193 	return (ndone);
194 }
195 
196 static void
kmt_bcopy(const void * s1,void * s2,size_t n)197 kmt_bcopy(const void *s1, void *s2, size_t n)
198 {
199 	/*
200 	 * We need to guarantee atomic accesses for certain sizes.  bcopy won't
201 	 * make that guarantee, so we need to do it ourselves.
202 	 */
203 #ifdef	_LP64
204 	if (n == 8 && ((uintptr_t)s1 & 7) == 0 && ((uintptr_t)s2 & 7) == 0)
205 		*(uint64_t *)s2 = *(uint64_t *)s1;
206 	else
207 #endif
208 	if (n == 4 && ((uintptr_t)s1 & 3) == 0 && ((uintptr_t)s2 & 3) == 0)
209 		*(uint32_t *)s2 = *(uint32_t *)s1;
210 	else if (n == 2 && ((uintptr_t)s1 & 1) == 0 && ((uintptr_t)s2 & 1) == 0)
211 		*(uint16_t *)s2 = *(uint16_t *)s1;
212 	else if (n == 1)
213 		*(uint8_t *)s2 = *(uint8_t *)s1;
214 	else
215 		bcopy(s1, s2, n);
216 }
217 
218 static ssize_t
kmt_reader(void * buf,size_t nbytes,uint64_t addr)219 kmt_reader(void *buf, size_t nbytes, uint64_t addr)
220 {
221 	kmt_bcopy((void *)(uintptr_t)addr, buf, nbytes);
222 	return (nbytes);
223 }
224 
225 ssize_t
kmt_writer(void * buf,size_t nbytes,uint64_t addr)226 kmt_writer(void *buf, size_t nbytes, uint64_t addr)
227 {
228 	kmt_bcopy(buf, (void *)(uintptr_t)addr, nbytes);
229 	return (nbytes);
230 }
231 
232 /*ARGSUSED*/
233 static ssize_t
kmt_read(mdb_tgt_t * t,void * buf,size_t nbytes,uintptr_t addr)234 kmt_read(mdb_tgt_t *t, void *buf, size_t nbytes, uintptr_t addr)
235 {
236 	/*
237 	 * We don't want to allow reads of I/O-mapped memory.  Multi-page reads
238 	 * that cross into I/O-mapped memory should be restricted to the initial
239 	 * non-I/O region.  Reads that begin in I/O-mapped memory are failed
240 	 * outright.
241 	 */
242 	if (!(t->t_flags & MDB_TGT_F_ALLOWIO) &&
243 	    (nbytes = kmdb_kdi_range_is_nontoxic(addr, nbytes, 0)) == 0)
244 		return (set_errno(EMDB_NOMAP));
245 
246 	return (kmt_rw(t, buf, nbytes, addr, kmt_reader));
247 }
248 
249 /*ARGSUSED*/
250 static ssize_t
kmt_pread(mdb_tgt_t * t,void * buf,size_t nbytes,physaddr_t addr)251 kmt_pread(mdb_tgt_t *t, void *buf, size_t nbytes, physaddr_t addr)
252 {
253 	return (kmt_rw(t, buf, nbytes, addr, kmdb_kdi_pread));
254 }
255 
256 /*ARGSUSED*/
257 ssize_t
kmt_pwrite(mdb_tgt_t * t,const void * buf,size_t nbytes,physaddr_t addr)258 kmt_pwrite(mdb_tgt_t *t, const void *buf, size_t nbytes, physaddr_t addr)
259 {
260 	return (kmt_rw(t, (void *)buf, nbytes, addr, kmdb_kdi_pwrite));
261 }
262 
263 static uintptr_t
kmt_read_kas(mdb_tgt_t * t)264 kmt_read_kas(mdb_tgt_t *t)
265 {
266 	GElf_Sym sym;
267 
268 	if (mdb_tgt_lookup_by_name(t, "unix", "kas", &sym, NULL) < 0) {
269 		warn("'kas' symbol is missing from kernel\n");
270 		(void) set_errno(EMDB_NOSYM);
271 		return (0);
272 	}
273 
274 	return ((uintptr_t)sym.st_value);
275 }
276 
277 static int
kmt_vtop(mdb_tgt_t * t,mdb_tgt_as_t as,uintptr_t va,physaddr_t * pap)278 kmt_vtop(mdb_tgt_t *t, mdb_tgt_as_t as, uintptr_t va, physaddr_t *pap)
279 {
280 	mdb_module_t *mod;
281 	struct as *asp;
282 	mdb_var_t *v;
283 
284 	switch ((uintptr_t)as) {
285 	case (uintptr_t)MDB_TGT_AS_PHYS:
286 	case (uintptr_t)MDB_TGT_AS_FILE:
287 	case (uintptr_t)MDB_TGT_AS_IO:
288 		return (set_errno(EINVAL));
289 	case (uintptr_t)MDB_TGT_AS_VIRT:
290 	case (uintptr_t)MDB_TGT_AS_VIRT_I:
291 	case (uintptr_t)MDB_TGT_AS_VIRT_S:
292 		if ((asp = (struct as *)kmt_read_kas(t)) == NULL)
293 			return (-1); /* errno is set for us */
294 		break;
295 	default:
296 		asp = (struct as *)as;
297 
298 		/* We don't support non-kas vtop */
299 		if (asp != (struct as *)kmt_read_kas(t))
300 			return (set_errno(EMDB_TGTNOTSUP));
301 	}
302 
303 	if (kmdb_prom_vtop(va, pap) == 0)
304 		return (0);
305 
306 	if ((v = mdb_nv_lookup(&mdb.m_modules, "unix")) != NULL &&
307 	    (mod = mdb_nv_get_cookie(v)) != NULL) {
308 		int (*fptr)(uintptr_t, struct as *, physaddr_t *);
309 
310 		fptr = (int (*)(uintptr_t, struct as *, physaddr_t *))
311 		    dlsym(mod->mod_hdl, "platform_vtop");
312 
313 		if ((fptr != NULL) && ((*fptr)(va, asp, pap) == 0))
314 			return (0);
315 	}
316 
317 	return (set_errno(EMDB_NOMAP));
318 }
319 
320 /*ARGSUSED*/
321 static int
kmt_cpuregs(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)322 kmt_cpuregs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
323 {
324 	const mdb_tgt_gregset_t *gregs;
325 	intptr_t cpuid = DPI_MASTER_CPUID;
326 	int i;
327 
328 	if (flags & DCMD_ADDRSPEC) {
329 		if (argc != 0)
330 			return (DCMD_USAGE);
331 		if ((cpuid = mdb_cpu2cpuid(addr)) < 0) {
332 			(void) set_errno(EMDB_NOMAP);
333 			mdb_warn("failed to find cpuid for cpu at %p", addr);
334 			return (DCMD_ERR);
335 		}
336 	}
337 
338 	i = mdb_getopts(argc, argv,
339 	    'c', MDB_OPT_UINTPTR, &cpuid,
340 	    NULL);
341 
342 	argc -= i;
343 	argv += i;
344 
345 	if (argc != 0)
346 		return (DCMD_USAGE);
347 
348 	if ((gregs = kmdb_dpi_get_gregs(cpuid)) == NULL) {
349 		warn("failed to retrieve registers for cpu %d", (int)cpuid);
350 		return (DCMD_ERR);
351 	}
352 
353 	kmt_printregs(gregs);
354 
355 	return (DCMD_OK);
356 }
357 
358 static int
kmt_regs(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)359 kmt_regs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
360 {
361 	if (flags & DCMD_ADDRSPEC)
362 		return (DCMD_USAGE);
363 
364 	return (kmt_cpuregs(addr, flags, argc, argv));
365 }
366 
367 static int
kmt_cpustack_dcmd(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)368 kmt_cpustack_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
369 {
370 	intptr_t cpuid = DPI_MASTER_CPUID;
371 	uint_t verbose = 0;
372 	int i;
373 
374 	if (flags & DCMD_ADDRSPEC) {
375 		if ((cpuid = mdb_cpu2cpuid(addr)) < 0) {
376 			(void) set_errno(EMDB_NOMAP);
377 			mdb_warn("failed to find cpuid for cpu at %p", addr);
378 			return (DCMD_ERR);
379 		}
380 		flags &= ~DCMD_ADDRSPEC;
381 	}
382 
383 	i = mdb_getopts(argc, argv,
384 	    'c', MDB_OPT_UINTPTR, &cpuid,
385 	    'v', MDB_OPT_SETBITS, 1, &verbose,
386 	    NULL);
387 
388 	argc -= i;
389 	argv += i;
390 
391 	return (kmt_cpustack(addr, flags, argc, argv, cpuid, verbose));
392 }
393 
394 /*
395  * Lasciate ogne speranza, voi ch'intrate.
396  */
397 static int
kmt_call(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)398 kmt_call(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
399 {
400 	uintptr_t *call_argv, rval;
401 	int parse_strings = 1;
402 	GElf_Sym sym;
403 	jmp_buf *oldpcb = NULL;
404 	jmp_buf pcb;
405 	int i;
406 
407 	if (!(flags & DCMD_ADDRSPEC))
408 		return (DCMD_USAGE);
409 
410 	if (mdb_tgt_lookup_by_addr(mdb.m_target, addr, MDB_TGT_SYM_EXACT,
411 	    NULL, 0, &sym, NULL) == 0 && GELF_ST_TYPE(sym.st_info) !=
412 	    STT_FUNC) {
413 		warn("%a is not a function\n", addr);
414 		return (DCMD_ERR);
415 	}
416 
417 	if (argc > 1 && argv[0].a_type == MDB_TYPE_STRING &&
418 	    strcmp(argv[0].a_un.a_str, "-s") == 0) {
419 		parse_strings = 0;
420 		argc--;
421 		argv++;
422 	}
423 
424 	call_argv = mdb_alloc(sizeof (uintptr_t) * argc, UM_SLEEP);
425 
426 	for (i = 0; i < argc; i++) {
427 		switch (argv[i].a_type) {
428 		case MDB_TYPE_STRING:
429 			/*
430 			 * mdb_strtoull doesn't return on error, so we have to
431 			 * pre-check strings suspected to contain numbers.
432 			 */
433 			if (parse_strings && strisbasenum(argv[i].a_un.a_str)) {
434 				call_argv[i] = (uintptr_t)mdb_strtoull(
435 				    argv[i].a_un.a_str);
436 			} else
437 				call_argv[i] = (uintptr_t)argv[i].a_un.a_str;
438 
439 			break;
440 
441 		case MDB_TYPE_IMMEDIATE:
442 			call_argv[i] = argv[i].a_un.a_val;
443 			break;
444 
445 		default:
446 			mdb_free(call_argv,
447 			    sizeof (uintptr_t) * argc);
448 			return (DCMD_USAGE);
449 		}
450 	}
451 
452 	if (setjmp(pcb) != 0) {
453 		warn("call failed: caught a trap\n");
454 
455 		kmdb_dpi_restore_fault_hdlr(oldpcb);
456 		mdb_free(call_argv, sizeof (uintptr_t) * argc);
457 		return (DCMD_ERR);
458 	}
459 
460 	oldpcb = kmdb_dpi_set_fault_hdlr(&pcb);
461 	rval = kmdb_dpi_call(addr, argc, call_argv);
462 	kmdb_dpi_restore_fault_hdlr(oldpcb);
463 
464 	if (flags & DCMD_PIPE_OUT) {
465 		mdb_printf("%p\n", rval);
466 	} else {
467 		/* pretty-print the results */
468 		mdb_printf("%p = %a(", rval, addr);
469 		for (i = 0; i < argc; i++) {
470 			if (i > 0)
471 				mdb_printf(", ");
472 			if (argv[i].a_type == MDB_TYPE_STRING) {
473 				/* I'm ashamed but amused */
474 				char *quote = &("\""[parse_strings &&
475 				    strisbasenum(argv[i].a_un.a_str)]);
476 
477 				mdb_printf("%s%s%s", quote, argv[i].a_un.a_str,
478 				    quote);
479 			} else
480 				mdb_printf("%p", argv[i].a_un.a_val);
481 		}
482 		mdb_printf(");\n");
483 	}
484 
485 	mdb_free(call_argv, sizeof (uintptr_t) * argc);
486 
487 	return (DCMD_OK);
488 }
489 
490 /*ARGSUSED*/
491 int
kmt_dump_crumbs(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)492 kmt_dump_crumbs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
493 {
494 	intptr_t cpu = -1;
495 
496 	if (flags & DCMD_ADDRSPEC) {
497 		if (argc != 0)
498 			return (DCMD_USAGE);
499 	} else {
500 		addr = 0;
501 
502 		if (mdb_getopts(argc, argv,
503 		    'c', MDB_OPT_UINTPTR, &cpu,
504 		    NULL) != argc)
505 			return (DCMD_USAGE);
506 	}
507 
508 	kmdb_dpi_dump_crumbs(addr, cpu);
509 
510 	return (DCMD_OK);
511 }
512 
513 /*ARGSUSED*/
514 static int
kmt_noducttape(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)515 kmt_noducttape(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
516 {
517 	int a = 0;
518 
519 	return (a/a);
520 }
521 
522 static int
kmt_dmod_status(char * msg,int state)523 kmt_dmod_status(char *msg, int state)
524 {
525 	kmdb_modctl_t *kmc;
526 	mdb_var_t *v;
527 	int first = 1, n = 0;
528 
529 	mdb_nv_rewind(&mdb.m_dmodctl);
530 	while ((v = mdb_nv_advance(&mdb.m_dmodctl)) != NULL) {
531 		kmc = MDB_NV_COOKIE(v);
532 
533 		if (kmc->kmc_state != state)
534 			continue;
535 
536 		n++;
537 
538 		if (msg != NULL) {
539 			if (first) {
540 				mdb_printf(msg, NULL);
541 				first = 0;
542 			}
543 
544 			mdb_printf(" %s", kmc->kmc_modname);
545 		}
546 	}
547 
548 	if (!first && msg != NULL)
549 		mdb_printf("\n");
550 
551 	return (n);
552 }
553 
554 /*ARGSUSED*/
555 static int
kmt_status_dcmd(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)556 kmt_status_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
557 {
558 	struct utsname uts;
559 	char uuid[UUID_PRINTABLE_STRING_LENGTH];
560 	kreg_t tt;
561 
562 	if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, &uts, sizeof (uts),
563 	    "unix", "utsname") != sizeof (uts)) {
564 		warn("failed to read 'utsname' struct from kernel\n");
565 		bzero(&uts, sizeof (uts));
566 		(void) strcpy(uts.nodename, "unknown machine");
567 	}
568 
569 	mdb_printf("debugging live kernel (%d-bit) on %s\n",
570 	    (int)(sizeof (void *) * NBBY),
571 	    (*uts.nodename == '\0' ? "(not set)" : uts.nodename));
572 	mdb_printf("operating system: %s %s (%s)\n",
573 	    uts.release, uts.version, uts.machine);
574 
575 	mdb_print_buildversion();
576 
577 	if (mdb_readsym(uuid, sizeof (uuid),
578 	    "dump_osimage_uuid") == sizeof (uuid) &&
579 	    uuid[sizeof (uuid) - 1] == '\0') {
580 		mdb_printf("image uuid: %s\n", uuid[0] != '\0' ?
581 		    uuid : "(not set)");
582 	}
583 
584 	mdb_printf("DTrace state: %s\n", (kmdb_kdi_dtrace_get_state() ==
585 	    KDI_DTSTATE_DTRACE_ACTIVE ? "active (debugger breakpoints cannot "
586 	    "be armed)" : "inactive"));
587 
588 	(void) kmdb_dpi_get_register("tt", &tt);
589 	mdb_printf("stopped on: %s\n", kmt_trapname(tt));
590 
591 	(void) kmt_dmod_status("pending dmod loads:", KMDB_MC_STATE_LOADING);
592 	(void) kmt_dmod_status("pending dmod unloads:",
593 	    KMDB_MC_STATE_UNLOADING);
594 
595 	return (DCMD_OK);
596 }
597 
598 /*ARGSUSED*/
599 static int
kmt_switch(uintptr_t addr,uint_t flags,int argc,const mdb_arg_t * argv)600 kmt_switch(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
601 {
602 	if (!(flags & DCMD_ADDRSPEC) || argc != 0)
603 		return (DCMD_USAGE);
604 
605 	if (kmdb_dpi_switch_master((int)addr) < 0) {
606 		warn("failed to switch to CPU %d", (int)addr);
607 		return (DCMD_ERR);
608 	}
609 
610 	return (DCMD_OK);
611 }
612 
613 static void
kmt_stack_help(void)614 kmt_stack_help(void)
615 {
616 	mdb_printf(
617 	    "Options:\n"
618 	    "  -n   do not resolve addresses to names\n"
619 	    "  -s   show the size of each stack frame to the left\n"
620 	    "  -t   where CTF is present, show types for functions and "
621 	    "arguments\n"
622 	    "  -v   include frame pointer information (this is the default "
623 	    "for %<b>$C%</b>)\n"
624 	    "\n"
625 	    "If the optional %<u>cnt%</u> is given, no more than %<u>cnt%</u> "
626 	    "arguments are shown\nfor each stack frame.\n");
627 }
628 
629 static const mdb_dcmd_t kmt_dcmds[] = {
630 	{ "$c", "?[-nstv] [cnt]", "print stack backtrace", kmt_stack,
631 	    kmt_stack_help },
632 	{ "$C", "?[-nstv] [cnt]", "print stack backtrace", kmt_stackv,
633 	    kmt_stack_help },
634 	{ "$r", NULL, "print general-purpose registers", kmt_regs },
635 	{ "$?", NULL, "print status and registers", kmt_regs },
636 	{ ":x", ":", "change the active CPU", kmt_switch },
637 	{ "call", ":[arg ...]", "call a kernel function", kmt_call },
638 	{ "cpustack", "?[-v] [-c cpuid] [cnt]", "print stack backtrace for a "
639 	    "specific CPU", kmt_cpustack_dcmd },
640 	{ "cpuregs", "?[-c cpuid]", "print general-purpose registers for a "
641 	    "specific CPU", kmt_cpuregs },
642 	{ "crumbs", NULL, NULL, kmt_dump_crumbs },
643 #if defined(__i386) || defined(__amd64)
644 	{ "in", ":[-L len]", "read from I/O port", kmt_in_dcmd },
645 	{ "out", ":[-L len] val", "write to I/O port", kmt_out_dcmd },
646 	{ "rdmsr", ":", "read an MSR", kmt_rdmsr },
647 	{ "wrmsr", ": val", "write an MSR", kmt_wrmsr },
648 	{ "rdpcicfg", ": bus dev func", "read a register in PCI config space",
649 	    kmt_rdpcicfg },
650 	{ "wrpcicfg", ": bus dev func val",
651 	    "write a register in PCI config space", kmt_wrpcicfg },
652 #endif
653 	{ "noducttape", NULL, NULL, kmt_noducttape },
654 	{ "regs", NULL, "print general-purpose registers", kmt_regs },
655 	{ "stack", "?[-nstv] [cnt]", "print stack backtrace", kmt_stack,
656 	    kmt_stack_help },
657 	{ "stackregs", "?[-nstv] [cnt]", "print stack backtrace and registers",
658 	    kmt_stackr, kmt_stack_help },
659 	{ "status", NULL, "print summary of current target", kmt_status_dcmd },
660 	{ "switch", ":", "change the active CPU", kmt_switch },
661 	{ NULL }
662 };
663 
664 static uintmax_t
kmt_reg_disc_get(const mdb_var_t * v)665 kmt_reg_disc_get(const mdb_var_t *v)
666 {
667 	mdb_tgt_reg_t r = 0;
668 
669 	(void) mdb_tgt_getareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), &r);
670 
671 	return (r);
672 }
673 
674 static void
kmt_reg_disc_set(mdb_var_t * v,uintmax_t r)675 kmt_reg_disc_set(mdb_var_t *v, uintmax_t r)
676 {
677 	if (mdb_tgt_putareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), r) == -1)
678 		warn("failed to modify %%%s register", mdb_nv_get_name(v));
679 }
680 
681 static const mdb_nv_disc_t kmt_reg_disc = {
682 	.disc_get = kmt_reg_disc_get,
683 	.disc_set = kmt_reg_disc_set
684 };
685 
686 /*ARGSUSED*/
687 static int
kmt_getareg(mdb_tgt_t * t,mdb_tgt_tid_t tid,const char * rname,mdb_tgt_reg_t * rp)688 kmt_getareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname,
689     mdb_tgt_reg_t *rp)
690 {
691 	kreg_t val;
692 
693 	if (kmdb_dpi_get_register(rname, &val) < 0)
694 		return (set_errno(EMDB_BADREG));
695 
696 	*rp = val;
697 	return (0);
698 }
699 
700 /*ARGSUSED*/
701 static int
kmt_putareg(mdb_tgt_t * t,mdb_tgt_tid_t tid,const char * rname,mdb_tgt_reg_t r)702 kmt_putareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, mdb_tgt_reg_t r)
703 {
704 	if (kmdb_dpi_set_register(rname, r) < 0)
705 		return (set_errno(EMDB_BADREG));
706 
707 	return (0);
708 }
709 
710 static void
kmt_mod_destroy(kmt_module_t * km)711 kmt_mod_destroy(kmt_module_t *km)
712 {
713 	if (km->km_name != NULL)
714 		strfree(km->km_name);
715 	if (km->km_symtab != NULL)
716 		mdb_gelf_symtab_destroy(km->km_symtab);
717 	if (km->km_ctfp != NULL)
718 		mdb_ctf_close(km->km_ctfp);
719 }
720 
721 static kmt_module_t *
kmt_mod_create(mdb_tgt_t * t,struct modctl * ctlp,char * name)722 kmt_mod_create(mdb_tgt_t *t, struct modctl *ctlp, char *name)
723 {
724 	kmt_module_t *km = mdb_zalloc(sizeof (kmt_module_t), UM_SLEEP);
725 	struct module *mod;
726 
727 	km->km_name = mdb_alloc(strlen(name) + 1, UM_SLEEP);
728 	(void) strcpy(km->km_name, name);
729 
730 	bcopy(ctlp, &km->km_modctl, sizeof (struct modctl));
731 
732 	if (mdb_tgt_vread(t, &km->km_module, sizeof (struct module),
733 	    (uintptr_t)km->km_modctl.mod_mp) != sizeof (struct module))
734 		goto create_module_cleanup;
735 	mod = &km->km_module;
736 
737 	if (mod->symhdr != NULL && mod->strhdr != NULL && mod->symtbl != NULL &&
738 	    mod->strings != NULL) {
739 		mdb_gelf_ehdr_to_gehdr(&mod->hdr, &km->km_ehdr);
740 
741 		km->km_symtab = mdb_gelf_symtab_create_raw(&km->km_ehdr,
742 		    mod->symhdr, mod->symtbl, mod->strhdr, mod->strings,
743 		    MDB_TGT_SYMTAB);
744 
745 		km->km_symtab_va = mod->symtbl;
746 		km->km_strtab_va = mod->strings;
747 
748 		if (mdb_tgt_vread(t, &km->km_symtab_hdr, sizeof (Shdr),
749 		    (uintptr_t)mod->symhdr) != sizeof (Shdr) ||
750 		    mdb_tgt_vread(t, &km->km_strtab_hdr, sizeof (Shdr),
751 		    (uintptr_t)mod->strhdr) != sizeof (Shdr))
752 			goto create_module_cleanup;
753 	}
754 
755 	/*
756 	 * We don't want everyone rooting around in the module structure, so we
757 	 * make copies of the interesting members.
758 	 */
759 	km->km_text_va = (uintptr_t)mod->text;
760 	km->km_text_size = mod->text_size;
761 	km->km_data_va = (uintptr_t)mod->data;
762 	km->km_data_size = mod->data_size;
763 	km->km_bss_va = (uintptr_t)mod->bss;
764 	km->km_bss_size = mod->bss_size;
765 	km->km_ctf_va = mod->ctfdata;
766 	km->km_ctf_size = mod->ctfsize;
767 
768 	if (mod->flags & KOBJ_PRIM)
769 		km->km_flags |= KM_F_PRIMARY;
770 
771 	return (km);
772 
773 create_module_cleanup:
774 	warn("failed to read module %s\n", name);
775 	kmt_mod_destroy(km);
776 	return (NULL);
777 }
778 
779 static void
kmt_mod_remove(kmt_data_t * kmt,kmt_module_t * km)780 kmt_mod_remove(kmt_data_t *kmt, kmt_module_t *km)
781 {
782 	mdb_var_t *v = mdb_nv_lookup(&kmt->kmt_modules, km->km_name);
783 
784 	ASSERT(v != NULL);
785 
786 	mdb_dprintf(MDB_DBG_KMOD, "removing module %s\n", km->km_name);
787 
788 	mdb_list_delete(&kmt->kmt_modlist, km);
789 	mdb_nv_remove(&kmt->kmt_modules, v);
790 	kmt_mod_destroy(km);
791 }
792 
793 static int
kmt_modlist_update_cb(struct modctl * modp,void * arg)794 kmt_modlist_update_cb(struct modctl *modp, void *arg)
795 {
796 	mdb_tgt_t *t = arg;
797 	kmt_data_t *kmt = t->t_data;
798 	kmt_module_t *km;
799 	mdb_var_t *v;
800 	char name[MAXNAMELEN];
801 
802 	if (mdb_tgt_readstr(t, MDB_TGT_AS_VIRT, name, MAXNAMELEN,
803 	    (uintptr_t)modp->mod_modname) <= 0) {
804 		warn("failed to read module name at %p",
805 		    (void *)modp->mod_modname);
806 	}
807 
808 	/* We only care about modules that are actually loaded */
809 	if (!kmdb_kdi_mod_isloaded(modp))
810 		return (0);
811 
812 	/*
813 	 * Skip the modules we already know about and that haven't
814 	 * changed since last time we were here.
815 	 */
816 	if ((v = mdb_nv_lookup(&kmt->kmt_modules, name)) != NULL) {
817 		km = MDB_NV_COOKIE(v);
818 
819 		if (kmdb_kdi_mod_haschanged(&km->km_modctl, &km->km_module,
820 		    modp, modp->mod_mp)) {
821 			/*
822 			 * The module has changed since last we saw it.  For
823 			 * safety, remove our old version, and treat it as a
824 			 * new module.
825 			 */
826 			mdb_dprintf(MDB_DBG_KMOD, "stutter module %s\n", name);
827 			kmt_mod_remove(kmt, km);
828 		} else {
829 			km->km_seen = 1;
830 			return (0);
831 		}
832 	}
833 
834 	mdb_dprintf(MDB_DBG_KMOD, "found new module %s\n", name);
835 
836 	if ((km = kmt_mod_create(t, modp, name)) != NULL) {
837 		mdb_list_append(&kmt->kmt_modlist, km);
838 		(void) mdb_nv_insert(&kmt->kmt_modules, name, NULL,
839 		    (uintptr_t)km, 0);
840 		km->km_seen = 1;
841 	}
842 
843 	return (0);
844 }
845 
846 static void
kmt_modlist_update(mdb_tgt_t * t)847 kmt_modlist_update(mdb_tgt_t *t)
848 {
849 	kmt_data_t *kmt = t->t_data;
850 	kmt_module_t *km, *kmn;
851 
852 	if (kmdb_kdi_mod_iter(kmt_modlist_update_cb, t) < 0) {
853 		warn("failed to complete update of kernel module list\n");
854 		return;
855 	}
856 
857 	km = mdb_list_next(&kmt->kmt_modlist);
858 	while (km != NULL) {
859 		kmn = mdb_list_next(km);
860 
861 		if (km->km_seen == 1) {
862 			/* Reset the mark for next time */
863 			km->km_seen = 0;
864 		} else {
865 			/*
866 			 * We didn't see it on the kernel's module list, so
867 			 * remove it from our view of the world.
868 			 */
869 			kmt_mod_remove(kmt, km);
870 		}
871 
872 		km = kmn;
873 	}
874 }
875 
876 static void
kmt_periodic(mdb_tgt_t * t)877 kmt_periodic(mdb_tgt_t *t)
878 {
879 	(void) mdb_tgt_status(t, &t->t_status);
880 }
881 
882 int
kmt_lookup_by_addr(mdb_tgt_t * t,uintptr_t addr,uint_t flags,char * buf,size_t nbytes,GElf_Sym * symp,mdb_syminfo_t * sip)883 kmt_lookup_by_addr(mdb_tgt_t *t, uintptr_t addr, uint_t flags,
884     char *buf, size_t nbytes, GElf_Sym *symp, mdb_syminfo_t *sip)
885 {
886 	kmt_data_t *kmt = t->t_data;
887 	kmt_module_t *km = mdb_list_next(&kmt->kmt_modlist);
888 	kmt_module_t *sym_km = NULL;
889 	kmt_module_t prmod;
890 	GElf_Sym sym;
891 	uint_t symid;
892 	const char *name;
893 
894 	/*
895 	 * We look through the private symbols (if any), then through the module
896 	 * symbols.  We can simplify the loop if we pretend the private symbols
897 	 * come from a module.
898 	 */
899 	if (mdb.m_prsym != NULL) {
900 		bzero(&prmod, sizeof (kmt_module_t));
901 		prmod.km_name = "<<<prmod>>>";
902 		prmod.km_symtab = mdb.m_prsym;
903 		prmod.km_list.ml_next = (mdb_list_t *)km;
904 		km = &prmod;
905 	}
906 
907 	/* Symbol resolution isn't available during initialization */
908 	if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT)
909 		return (set_errno(EMDB_NOSYM));
910 
911 	for (; km != NULL; km = mdb_list_next(km)) {
912 		if (km != &prmod && !kmt->kmt_symavail)
913 			continue;
914 
915 		if (km->km_symtab == NULL)
916 			continue;
917 
918 		if (mdb_gelf_symtab_lookup_by_addr(km->km_symtab, addr, flags,
919 		    buf, nbytes, symp, &sip->sym_id) != 0 ||
920 		    symp->st_value == 0)
921 			continue;
922 
923 		if (flags & MDB_TGT_SYM_EXACT) {
924 			sym_km = km;
925 			goto found;
926 		}
927 
928 		/*
929 		 * If this is the first match we've found, or if this symbol is
930 		 * closer to the specified address than the last one we found,
931 		 * use it.
932 		 */
933 		if (sym_km == NULL || mdb_gelf_sym_closer(symp, &sym, addr)) {
934 			sym_km = km;
935 			sym = *symp;
936 			symid = sip->sym_id;
937 		}
938 	}
939 
940 	/*
941 	 * kmdb dmods are normal kernel modules, loaded by krtld as such.  To
942 	 * avoid polluting modinfo, and to keep from confusing the module
943 	 * subsystem (many dmods have the same names as real kernel modules),
944 	 * kmdb keeps their modctls separate, and doesn't allow their loading
945 	 * to be broadcast via the krtld module load/unload mechanism.  As a
946 	 * result, kmdb_kvm doesn't find out about them, and can't turn their
947 	 * addresses into symbols.  This can be most inconvenient during
948 	 * debugger faults, as the dmod frames will show up without names.
949 	 * We weren't able to turn the requested address into a symbol, so we'll
950 	 * take a spin through the dmods, trying to match our address against
951 	 * their symbols.
952 	 */
953 	if (sym_km == NULL) {
954 		return (kmdb_module_lookup_by_addr(addr, flags, buf, nbytes,
955 		    symp, sip));
956 	}
957 
958 	*symp = sym;
959 	sip->sym_id = symid;
960 
961 found:
962 	/*
963 	 * Once we've found something, copy the final name into the caller's
964 	 * buffer and prefix it with the load object name if appropriate.
965 	 */
966 	name = mdb_gelf_sym_name(sym_km->km_symtab, symp);
967 
968 	if (sym_km == &prmod) {
969 		if (buf != NULL) {
970 			(void) strncpy(buf, name, nbytes);
971 			buf[nbytes - 1] = '\0';
972 		}
973 		sip->sym_table = MDB_TGT_PRVSYM;
974 	} else {
975 		if (buf != NULL) {
976 			if (sym_km->km_flags & KM_F_PRIMARY) {
977 				(void) strncpy(buf, name, nbytes);
978 				buf[nbytes - 1] = '\0';
979 			} else {
980 				(void) mdb_snprintf(buf, nbytes, "%s`%s",
981 				    sym_km->km_name, name);
982 			}
983 		}
984 		sip->sym_table = MDB_TGT_SYMTAB;
985 	}
986 
987 	return (0);
988 }
989 
990 static int
kmt_lookup_by_name(mdb_tgt_t * t,const char * obj,const char * name,GElf_Sym * symp,mdb_syminfo_t * sip)991 kmt_lookup_by_name(mdb_tgt_t *t, const char *obj, const char *name,
992     GElf_Sym *symp, mdb_syminfo_t *sip)
993 {
994 	kmt_data_t *kmt = t->t_data;
995 	kmt_module_t *km;
996 	mdb_var_t *v;
997 	GElf_Sym sym;
998 	uint_t symid;
999 	int n;
1000 
1001 	if (!kmt->kmt_symavail)
1002 		return (set_errno(EMDB_NOSYM));
1003 
1004 	switch ((uintptr_t)obj) {
1005 	case (uintptr_t)MDB_TGT_OBJ_EXEC:
1006 	case (uintptr_t)MDB_TGT_OBJ_EVERY:
1007 		km = mdb_list_next(&kmt->kmt_modlist);
1008 		n = mdb_nv_size(&kmt->kmt_modules);
1009 		break;
1010 
1011 	case (uintptr_t)MDB_TGT_OBJ_RTLD:
1012 		obj = kmt->kmt_rtld_name;
1013 		/*FALLTHROUGH*/
1014 
1015 	default:
1016 		/*
1017 		 * If this is a request for a dmod symbol, let kmdb_module
1018 		 * handle it.
1019 		 */
1020 		if (obj != NULL && strncmp(obj, "DMOD`", 5) == 0) {
1021 			return (kmdb_module_lookup_by_name(obj + 5, name,
1022 			    symp, sip));
1023 		}
1024 
1025 		if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL)
1026 			return (set_errno(EMDB_NOOBJ));
1027 
1028 		km = mdb_nv_get_cookie(v);
1029 		n = 1;
1030 	}
1031 
1032 	/*
1033 	 * kmdb's kvm target is at a bit of a disadvantage compared to mdb's
1034 	 * kvm target when it comes to global symbol lookups.  mdb has ksyms,
1035 	 * which hides pesky things like symbols that are undefined in unix,
1036 	 * but which are defined in genunix.  We don't have such a facility -
1037 	 * we simply iterate through the modules, looking for a given symbol
1038 	 * in each.  Unless we're careful, we'll return the undef in the
1039 	 * aforementioned case.
1040 	 */
1041 	for (; n > 0; n--, km = mdb_list_next(km)) {
1042 		if (mdb_gelf_symtab_lookup_by_name(km->km_symtab, name,
1043 		    &sym, &symid) == 0 && sym.st_shndx != SHN_UNDEF)
1044 			break;
1045 	}
1046 
1047 	if (n == 0)
1048 		return (set_errno(EMDB_NOSYM));
1049 
1050 found:
1051 	bcopy(&sym, symp, sizeof (GElf_Sym));
1052 	sip->sym_id = symid;
1053 	sip->sym_table = MDB_TGT_SYMTAB;
1054 
1055 	return (0);
1056 }
1057 
1058 static int
kmt_symtab_func(void * data,const GElf_Sym * sym,const char * name,uint_t id)1059 kmt_symtab_func(void *data, const GElf_Sym *sym, const char *name, uint_t id)
1060 {
1061 	kmt_symarg_t *arg = data;
1062 
1063 	if (mdb_tgt_sym_match(sym, arg->sym_type)) {
1064 		arg->sym_info.sym_id = id;
1065 
1066 		return (arg->sym_cb(arg->sym_data, sym, name, &arg->sym_info,
1067 		    arg->sym_obj));
1068 	}
1069 
1070 	return (0);
1071 }
1072 
1073 static void
kmt_symtab_iter(mdb_gelf_symtab_t * gst,uint_t type,const char * obj,mdb_tgt_sym_f * cb,void * p)1074 kmt_symtab_iter(mdb_gelf_symtab_t *gst, uint_t type, const char *obj,
1075     mdb_tgt_sym_f *cb, void *p)
1076 {
1077 	kmt_symarg_t arg;
1078 
1079 	arg.sym_cb = cb;
1080 	arg.sym_data = p;
1081 	arg.sym_type = type;
1082 	arg.sym_info.sym_table = gst->gst_tabid;
1083 	arg.sym_obj = obj;
1084 
1085 	mdb_gelf_symtab_iter(gst, kmt_symtab_func, &arg);
1086 }
1087 
1088 static int
kmt_symbol_iter(mdb_tgt_t * t,const char * obj,uint_t which,uint_t type,mdb_tgt_sym_f * cb,void * data)1089 kmt_symbol_iter(mdb_tgt_t *t, const char *obj, uint_t which, uint_t type,
1090     mdb_tgt_sym_f *cb, void *data)
1091 {
1092 	kmt_data_t *kmt = t->t_data;
1093 	kmt_module_t *km;
1094 
1095 	mdb_gelf_symtab_t *symtab = NULL;
1096 	mdb_var_t *v;
1097 
1098 	if (which == MDB_TGT_DYNSYM)
1099 		return (set_errno(EMDB_TGTNOTSUP));
1100 
1101 	switch ((uintptr_t)obj) {
1102 	case (uintptr_t)MDB_TGT_OBJ_EXEC:
1103 	case (uintptr_t)MDB_TGT_OBJ_EVERY:
1104 		mdb_nv_rewind(&kmt->kmt_modules);
1105 		while ((v = mdb_nv_advance(&kmt->kmt_modules)) != NULL) {
1106 			km = mdb_nv_get_cookie(v);
1107 
1108 			if (km->km_symtab != NULL) {
1109 				kmt_symtab_iter(km->km_symtab, type,
1110 				    km->km_name, cb, data);
1111 			}
1112 		}
1113 		return (0);
1114 
1115 	case (uintptr_t)MDB_TGT_OBJ_RTLD:
1116 		obj = kmt->kmt_rtld_name;
1117 		/*FALLTHROUGH*/
1118 
1119 	default:
1120 		if (strncmp(obj, "DMOD`", 5) == 0) {
1121 			return (kmdb_module_symbol_iter(obj + 5, type,
1122 			    cb, data));
1123 		}
1124 
1125 		if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL)
1126 			return (set_errno(EMDB_NOOBJ));
1127 		km = mdb_nv_get_cookie(v);
1128 
1129 		symtab = km->km_symtab;
1130 	}
1131 
1132 	if (symtab != NULL)
1133 		kmt_symtab_iter(symtab, type, obj, cb, data);
1134 
1135 	return (0);
1136 }
1137 
1138 static int
kmt_mapping_walk(uintptr_t addr,const void * data,kmt_maparg_t * marg)1139 kmt_mapping_walk(uintptr_t addr, const void *data, kmt_maparg_t *marg)
1140 {
1141 	/*
1142 	 * This is a bit sketchy but avoids problematic compilation of this
1143 	 * target against the current VM implementation.  Now that we have
1144 	 * vmem, we can make this less broken and more informative by changing
1145 	 * this code to invoke the vmem walker in the near future.
1146 	 */
1147 	const struct kmt_seg {
1148 		caddr_t s_base;
1149 		size_t s_size;
1150 	} *segp = (const struct kmt_seg *)data;
1151 
1152 	mdb_map_t map;
1153 	GElf_Sym sym;
1154 	mdb_syminfo_t info;
1155 
1156 	map.map_base = (uintptr_t)segp->s_base;
1157 	map.map_size = segp->s_size;
1158 	map.map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X;
1159 
1160 	if (kmt_lookup_by_addr(marg->map_target, addr, MDB_TGT_SYM_EXACT,
1161 	    map.map_name, MDB_TGT_MAPSZ, &sym, &info) == -1) {
1162 
1163 		(void) mdb_iob_snprintf(map.map_name, MDB_TGT_MAPSZ,
1164 		    "%lr", addr);
1165 	}
1166 
1167 	return (marg->map_cb(marg->map_data, &map, map.map_name));
1168 }
1169 
1170 static int
kmt_mapping_iter(mdb_tgt_t * t,mdb_tgt_map_f * func,void * private)1171 kmt_mapping_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private)
1172 {
1173 	kmt_maparg_t m;
1174 	uintptr_t kas;
1175 
1176 	m.map_target = t;
1177 	m.map_cb = func;
1178 	m.map_data = private;
1179 
1180 	if ((kas = kmt_read_kas(t)) == 0)
1181 		return (-1); /* errno is set for us */
1182 
1183 	return (mdb_pwalk("seg", (mdb_walk_cb_t)kmt_mapping_walk, &m, kas));
1184 }
1185 
1186 static const mdb_map_t *
kmt_mod_to_map(kmt_module_t * km,mdb_map_t * map)1187 kmt_mod_to_map(kmt_module_t *km, mdb_map_t *map)
1188 {
1189 	(void) strncpy(map->map_name, km->km_name, MDB_TGT_MAPSZ);
1190 	map->map_name[MDB_TGT_MAPSZ - 1] = '\0';
1191 	map->map_base = km->km_text_va;
1192 	map->map_size = km->km_text_size;
1193 	map->map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X;
1194 
1195 	return (map);
1196 }
1197 
1198 static int
kmt_object_iter(mdb_tgt_t * t,mdb_tgt_map_f * func,void * private)1199 kmt_object_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private)
1200 {
1201 	kmt_data_t *kmt = t->t_data;
1202 	kmt_module_t *km;
1203 	mdb_map_t m;
1204 
1205 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1206 	    km = mdb_list_next(km)) {
1207 		if (func(private, kmt_mod_to_map(km, &m), km->km_name) == -1)
1208 			break;
1209 	}
1210 
1211 	return (0);
1212 }
1213 
1214 static const mdb_map_t *
kmt_addr_to_map(mdb_tgt_t * t,uintptr_t addr)1215 kmt_addr_to_map(mdb_tgt_t *t, uintptr_t addr)
1216 {
1217 	kmt_data_t *kmt = t->t_data;
1218 	kmt_module_t *km;
1219 
1220 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1221 	    km = mdb_list_next(km)) {
1222 		if (addr - km->km_text_va < km->km_text_size ||
1223 		    addr - km->km_data_va < km->km_data_size ||
1224 		    addr - km->km_bss_va < km->km_bss_size)
1225 			return (kmt_mod_to_map(km, &kmt->kmt_map));
1226 	}
1227 
1228 	(void) set_errno(EMDB_NOMAP);
1229 	return (NULL);
1230 }
1231 
1232 static kmt_module_t *
kmt_module_by_name(kmt_data_t * kmt,const char * name)1233 kmt_module_by_name(kmt_data_t *kmt, const char *name)
1234 {
1235 	kmt_module_t *km;
1236 
1237 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1238 	    km = mdb_list_next(km)) {
1239 		if (strcmp(name, km->km_name) == 0)
1240 			return (km);
1241 	}
1242 
1243 	return (NULL);
1244 }
1245 
1246 static const mdb_map_t *
kmt_name_to_map(mdb_tgt_t * t,const char * name)1247 kmt_name_to_map(mdb_tgt_t *t, const char *name)
1248 {
1249 	kmt_data_t *kmt = t->t_data;
1250 	kmt_module_t *km;
1251 	mdb_map_t m;
1252 
1253 	/*
1254 	 * If name is MDB_TGT_OBJ_EXEC, return the first module on the list,
1255 	 * which will be unix since we keep kmt_modlist in load order.
1256 	 */
1257 	if (name == MDB_TGT_OBJ_EXEC) {
1258 		return (kmt_mod_to_map(mdb_list_next(&kmt->kmt_modlist),
1259 		    &m));
1260 	}
1261 
1262 	if (name == MDB_TGT_OBJ_RTLD)
1263 		name = kmt->kmt_rtld_name;
1264 
1265 	if ((km = kmt_module_by_name(kmt, name)) != NULL)
1266 		return (kmt_mod_to_map(km, &m));
1267 
1268 	(void) set_errno(EMDB_NOOBJ);
1269 	return (NULL);
1270 }
1271 
1272 static ctf_file_t *
kmt_load_ctfdata(mdb_tgt_t * t,kmt_module_t * km)1273 kmt_load_ctfdata(mdb_tgt_t *t, kmt_module_t *km)
1274 {
1275 	kmt_data_t *kmt = t->t_data;
1276 	int err;
1277 
1278 	if (km->km_ctfp != NULL)
1279 		return (km->km_ctfp);
1280 
1281 	if (km->km_ctf_va == NULL || km->km_symtab == NULL) {
1282 		(void) set_errno(EMDB_NOCTF);
1283 		return (NULL);
1284 	}
1285 
1286 	if ((km->km_ctfp = mdb_ctf_bufopen(km->km_ctf_va, km->km_ctf_size,
1287 	    km->km_symtab_va, &km->km_symtab_hdr, km->km_strtab_va,
1288 	    &km->km_strtab_hdr, &err)) == NULL) {
1289 		(void) set_errno(ctf_to_errno(err));
1290 		return (NULL);
1291 	}
1292 
1293 	mdb_dprintf(MDB_DBG_KMOD, "loaded %lu bytes of CTF data for %s\n",
1294 	    (ulong_t)km->km_ctf_size, km->km_name);
1295 
1296 	if (ctf_parent_name(km->km_ctfp) != NULL) {
1297 		mdb_var_t *v;
1298 
1299 		if ((v = mdb_nv_lookup(&kmt->kmt_modules,
1300 		    ctf_parent_name(km->km_ctfp))) != NULL) {
1301 			kmt_module_t *pm = mdb_nv_get_cookie(v);
1302 
1303 			if (pm->km_ctfp == NULL)
1304 				(void) kmt_load_ctfdata(t, pm);
1305 
1306 			if (pm->km_ctfp != NULL && ctf_import(km->km_ctfp,
1307 			    pm->km_ctfp) == CTF_ERR) {
1308 				warn("failed to import parent types into "
1309 				    "%s: %s\n", km->km_name,
1310 				    ctf_errmsg(ctf_errno(km->km_ctfp)));
1311 			}
1312 		} else {
1313 			warn("failed to load CTF data for %s - parent %s not "
1314 			    "loaded\n", km->km_name,
1315 			    ctf_parent_name(km->km_ctfp));
1316 		}
1317 	}
1318 
1319 	return (km->km_ctfp);
1320 }
1321 
1322 ctf_file_t *
kmt_addr_to_ctf(mdb_tgt_t * t,uintptr_t addr)1323 kmt_addr_to_ctf(mdb_tgt_t *t, uintptr_t addr)
1324 {
1325 	kmt_data_t *kmt = t->t_data;
1326 	kmt_module_t *km;
1327 
1328 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1329 	    km = mdb_list_next(km)) {
1330 		if (addr - km->km_text_va < km->km_text_size ||
1331 		    addr - km->km_data_va < km->km_data_size ||
1332 		    addr - km->km_bss_va < km->km_bss_size)
1333 			return (kmt_load_ctfdata(t, km));
1334 	}
1335 
1336 	return (kmdb_module_addr_to_ctf(addr));
1337 }
1338 
1339 ctf_file_t *
kmt_name_to_ctf(mdb_tgt_t * t,const char * name)1340 kmt_name_to_ctf(mdb_tgt_t *t, const char *name)
1341 {
1342 	kmt_data_t *kt = t->t_data;
1343 	kmt_module_t *km;
1344 
1345 	if (name == MDB_TGT_OBJ_EXEC) {
1346 		name = KMT_CTFPARENT;
1347 	} else if (name == MDB_TGT_OBJ_RTLD) {
1348 		name = kt->kmt_rtld_name;
1349 	} else if (strncmp(name, "DMOD`", 5) == 0) {
1350 		/* Request for CTF data for a DMOD symbol */
1351 		return (kmdb_module_name_to_ctf(name + 5));
1352 	}
1353 
1354 	if ((km = kmt_module_by_name(kt, name)) != NULL)
1355 		return (kmt_load_ctfdata(t, km));
1356 
1357 	(void) set_errno(EMDB_NOOBJ);
1358 	return (NULL);
1359 }
1360 
1361 /*ARGSUSED*/
1362 static int
kmt_status(mdb_tgt_t * t,mdb_tgt_status_t * tsp)1363 kmt_status(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1364 {
1365 	int state;
1366 
1367 	bzero(tsp, sizeof (mdb_tgt_status_t));
1368 
1369 	switch ((state = kmdb_dpi_get_state(NULL))) {
1370 	case DPI_STATE_INIT:
1371 		tsp->st_state = MDB_TGT_RUNNING;
1372 		tsp->st_pc = 0;
1373 		break;
1374 
1375 	case DPI_STATE_STOPPED:
1376 		tsp->st_state = MDB_TGT_STOPPED;
1377 
1378 		(void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1379 		break;
1380 
1381 	case DPI_STATE_FAULTED:
1382 		tsp->st_state = MDB_TGT_STOPPED;
1383 
1384 		(void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1385 
1386 		tsp->st_flags |= MDB_TGT_ISTOP;
1387 		break;
1388 
1389 	case DPI_STATE_LOST:
1390 		tsp->st_state = MDB_TGT_LOST;
1391 
1392 		(void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1393 		break;
1394 	}
1395 
1396 	mdb_dprintf(MDB_DBG_KMOD, "kmt_status, dpi: %d tsp: %d, pc = %p %A\n",
1397 	    state, tsp->st_state, (void *)tsp->st_pc, tsp->st_pc);
1398 
1399 	return (0);
1400 }
1401 
1402 /*
1403  * Invoked when kmt_defbp_enter_debugger is called, this routine activates and
1404  * deactivates deferred breakpoints in response to module load and unload
1405  * events.
1406  */
1407 /*ARGSUSED*/
1408 static void
kmt_defbp_event(mdb_tgt_t * t,int vid,void * private)1409 kmt_defbp_event(mdb_tgt_t *t, int vid, void *private)
1410 {
1411 	if (kmt_defbp_modchg_isload) {
1412 		if (!mdb_tgt_sespec_activate_all(t) &&
1413 		    (mdb.m_flags & MDB_FL_BPTNOSYMSTOP)) {
1414 			/*
1415 			 * We weren't able to activate the breakpoints.
1416 			 * If so requested, we'll return without calling
1417 			 * continue, thus throwing the user into the debugger.
1418 			 */
1419 			return;
1420 		}
1421 
1422 	} else {
1423 		mdb_sespec_t *sep, *nsep;
1424 		const mdb_map_t *map, *bpmap;
1425 		mdb_map_t modmap;
1426 
1427 		if ((map = kmt_addr_to_map(t,
1428 		    (uintptr_t)kmt_defbp_modchg_modctl->mod_text)) == NULL) {
1429 			warn("module unload notification for unknown module %s",
1430 			    kmt_defbp_modchg_modctl->mod_modname);
1431 			return; /* drop into the debugger */
1432 		}
1433 
1434 		bcopy(map, &modmap, sizeof (mdb_map_t));
1435 
1436 		for (sep = mdb_list_next(&t->t_active); sep; sep = nsep) {
1437 			nsep = mdb_list_next(sep);
1438 
1439 			if (sep->se_ops == &kmt_brkpt_ops) {
1440 				kmt_brkpt_t *kb = sep->se_data;
1441 
1442 				if ((bpmap = kmt_addr_to_map(t,
1443 				    kb->kb_addr)) == NULL ||
1444 				    (bpmap->map_base == modmap.map_base &&
1445 				    bpmap->map_size == modmap.map_size)) {
1446 					mdb_tgt_sespec_idle_one(t, sep,
1447 					    EMDB_NOMAP);
1448 				}
1449 			}
1450 		}
1451 	}
1452 
1453 	(void) mdb_tgt_continue(t, NULL);
1454 }
1455 
1456 static void
kmt_defbp_enter_debugger(void)1457 kmt_defbp_enter_debugger(void)
1458 {
1459 	/*
1460 	 * The debugger places a breakpoint here.  We can't have a simple
1461 	 * nop function here, because GCC knows much more than we do, and
1462 	 * will optimize away the call to it.
1463 	 */
1464 	(void) get_fp();
1465 }
1466 
1467 /*
1468  * This routine is called while the kernel is running.  It attempts to determine
1469  * whether any deferred breakpoints exist for the module being changed (loaded
1470  * or unloaded).  If any such breakpoints exist, the debugger will be entered to
1471  * process them.
1472  */
1473 static void
kmt_defbp_modchg(struct modctl * mctl,int isload)1474 kmt_defbp_modchg(struct modctl *mctl, int isload)
1475 {
1476 	kmt_defbp_t *dbp;
1477 
1478 	kmt_defbp_lock = 1;
1479 
1480 	for (dbp = mdb_list_next(&kmt_defbp_list); dbp;
1481 	    dbp = mdb_list_next(dbp)) {
1482 		if (!dbp->dbp_ref)
1483 			continue;
1484 
1485 		if (strcmp(mctl->mod_modname, dbp->dbp_objname) == 0) {
1486 			/*
1487 			 * Activate the breakpoint
1488 			 */
1489 			kmt_defbp_modchg_isload = isload;
1490 			kmt_defbp_modchg_modctl = mctl;
1491 
1492 			kmt_defbp_enter_debugger();
1493 			break;
1494 		}
1495 	}
1496 
1497 	kmt_defbp_lock = 0;
1498 }
1499 
1500 /*ARGSUSED*/
1501 static int
kmt_continue(mdb_tgt_t * t,mdb_tgt_status_t * tsp)1502 kmt_continue(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1503 {
1504 	int n;
1505 
1506 	kmdb_dpi_resume();
1507 
1508 	/*
1509 	 * The order of the following two calls is important.  If there are
1510 	 * load acks on the work queue, we'll initialize the dmods they
1511 	 * represent.  This will involve a call to _mdb_init, which may very
1512 	 * well result in a symbol lookup.  If we haven't resynced our view
1513 	 * of symbols with the current state of the world, this lookup could
1514 	 * end very badly.  We therefore make sure to sync before processing
1515 	 * the work queue.
1516 	 */
1517 	kmt_sync(t);
1518 	kmdb_dpi_process_work_queue();
1519 
1520 	if (kmdb_kdi_get_unload_request())
1521 		t->t_flags |= MDB_TGT_F_UNLOAD;
1522 
1523 	(void) mdb_tgt_status(t, &t->t_status);
1524 
1525 	if ((n = kmt_dmod_status(NULL, KMDB_MC_STATE_LOADING) +
1526 	    kmt_dmod_status(NULL, KMDB_MC_STATE_UNLOADING)) != 0) {
1527 		mdb_warn("%d dmod load%c/unload%c pending\n", n,
1528 		    "s"[n == 1], "s"[n == 1]);
1529 	}
1530 
1531 	return (0);
1532 }
1533 
1534 /*ARGSUSED*/
1535 static int
kmt_step(mdb_tgt_t * t,mdb_tgt_status_t * tsp)1536 kmt_step(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1537 {
1538 	int rc;
1539 
1540 	if ((rc = kmdb_dpi_step()) == 0)
1541 		(void) mdb_tgt_status(t, &t->t_status);
1542 
1543 	return (rc);
1544 }
1545 
1546 static int
kmt_defbp_activate(mdb_tgt_t * t)1547 kmt_defbp_activate(mdb_tgt_t *t)
1548 {
1549 	kmdb_dpi_modchg_register(kmt_defbp_modchg);
1550 
1551 	/*
1552 	 * The routines that add and arm breakpoints will check for the proper
1553 	 * DTrace state, but they'll just put this breakpoint on the idle list
1554 	 * if DTrace is active.  It'll correctly move to the active list when
1555 	 * DTrace deactivates, but that's insufficient for our purposes -- we
1556 	 * need to do extra processing at that point.  We won't get to do said
1557 	 * processing with with a normal idle->active transition, so we just
1558 	 * won't add it add it until we're sure that it'll stick.
1559 	 */
1560 
1561 	if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1562 		return (set_errno(EMDB_DTACTIVE));
1563 
1564 	kmt_defbp_bpspec = mdb_tgt_add_vbrkpt(t,
1565 	    (uintptr_t)kmt_defbp_enter_debugger,
1566 	    MDB_TGT_SPEC_HIDDEN, kmt_defbp_event, NULL);
1567 
1568 	return (0);
1569 }
1570 
1571 static void
kmt_defbp_deactivate(mdb_tgt_t * t)1572 kmt_defbp_deactivate(mdb_tgt_t *t)
1573 {
1574 	kmdb_dpi_modchg_cancel();
1575 
1576 	if (kmt_defbp_bpspec != 0) {
1577 		if (t != NULL)
1578 			(void) mdb_tgt_vespec_delete(t, kmt_defbp_bpspec);
1579 
1580 		kmt_defbp_bpspec = 0;
1581 	}
1582 }
1583 
1584 static kmt_defbp_t *
kmt_defbp_create(mdb_tgt_t * t,const char * objname,const char * symname)1585 kmt_defbp_create(mdb_tgt_t *t, const char *objname, const char *symname)
1586 {
1587 	kmt_defbp_t *dbp = mdb_alloc(sizeof (kmt_defbp_t), UM_SLEEP);
1588 
1589 	mdb_dprintf(MDB_DBG_KMOD, "defbp_create %s`%s\n", objname, symname);
1590 
1591 	dbp->dbp_objname = strdup(objname);
1592 	dbp->dbp_symname = strdup(symname);
1593 	dbp->dbp_ref = 1;
1594 
1595 	kmt_defbp_num++;
1596 
1597 	if (kmt_defbp_num == 1 || kmt_defbp_bpspec == 0) {
1598 		if (kmt_defbp_activate(t) < 0)
1599 			warn("failed to activate deferred breakpoints");
1600 	}
1601 
1602 	mdb_list_append(&kmt_defbp_list, dbp);
1603 
1604 	return (dbp);
1605 }
1606 
1607 static void
kmt_defbp_destroy(kmt_defbp_t * dbp)1608 kmt_defbp_destroy(kmt_defbp_t *dbp)
1609 {
1610 	mdb_dprintf(MDB_DBG_KMOD, "defbp_destroy %s`%s\n", dbp->dbp_objname,
1611 	    dbp->dbp_symname);
1612 
1613 	mdb_list_delete(&kmt_defbp_list, dbp);
1614 
1615 	strfree(dbp->dbp_objname);
1616 	strfree(dbp->dbp_symname);
1617 	mdb_free(dbp, sizeof (kmt_defbp_t));
1618 }
1619 
1620 static void
kmt_defbp_prune_common(int all)1621 kmt_defbp_prune_common(int all)
1622 {
1623 	kmt_defbp_t *dbp, *ndbp;
1624 
1625 	/* We can't remove items from the list while the driver is using it. */
1626 	if (kmt_defbp_lock)
1627 		return;
1628 
1629 	for (dbp = mdb_list_next(&kmt_defbp_list); dbp != NULL; dbp = ndbp) {
1630 		ndbp = mdb_list_next(dbp);
1631 
1632 		if (!all && dbp->dbp_ref)
1633 			continue;
1634 
1635 		kmt_defbp_destroy(dbp);
1636 	}
1637 }
1638 
1639 static void
kmt_defbp_prune(void)1640 kmt_defbp_prune(void)
1641 {
1642 	kmt_defbp_prune_common(0);
1643 }
1644 
1645 static void
kmt_defbp_destroy_all(void)1646 kmt_defbp_destroy_all(void)
1647 {
1648 	kmt_defbp_prune_common(1);
1649 }
1650 
1651 static void
kmt_defbp_delete(mdb_tgt_t * t,kmt_defbp_t * dbp)1652 kmt_defbp_delete(mdb_tgt_t *t, kmt_defbp_t *dbp)
1653 {
1654 	dbp->dbp_ref = 0;
1655 
1656 	ASSERT(kmt_defbp_num > 0);
1657 	kmt_defbp_num--;
1658 
1659 	if (kmt_defbp_num == 0)
1660 		kmt_defbp_deactivate(t);
1661 
1662 	kmt_defbp_prune();
1663 }
1664 
1665 static int
kmt_brkpt_ctor(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1666 kmt_brkpt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1667 {
1668 	mdb_tgt_status_t tsp;
1669 	kmt_bparg_t *ka = args;
1670 	kmt_brkpt_t *kb;
1671 	GElf_Sym s;
1672 	mdb_instr_t instr;
1673 
1674 	(void) mdb_tgt_status(t, &tsp);
1675 	if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED)
1676 		return (set_errno(EMDB_NOPROC));
1677 
1678 	if (ka->ka_symbol != NULL) {
1679 		if (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, &s, NULL) == -1) {
1680 			if (errno != EMDB_NOOBJ && !(errno == EMDB_NOSYM &&
1681 			    !(mdb.m_flags & MDB_FL_BPTNOSYMSTOP))) {
1682 				warn("breakpoint %s activation failed",
1683 				    ka->ka_symbol);
1684 			}
1685 			return (-1); /* errno is set for us */
1686 		}
1687 
1688 		ka->ka_addr = (uintptr_t)s.st_value;
1689 	}
1690 
1691 #ifdef __sparc
1692 	if (ka->ka_addr & 3)
1693 		return (set_errno(EMDB_BPALIGN));
1694 #endif
1695 
1696 	if (mdb_vread(&instr, sizeof (instr), ka->ka_addr) != sizeof (instr))
1697 		return (-1); /* errno is set for us */
1698 
1699 	if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1700 		warn("breakpoint will not arm until DTrace is inactive\n");
1701 
1702 	kb = mdb_zalloc(sizeof (kmt_brkpt_t), UM_SLEEP);
1703 	kb->kb_addr = ka->ka_addr;
1704 	sep->se_data = kb;
1705 
1706 	return (0);
1707 }
1708 
1709 /*ARGSUSED*/
1710 static void
kmt_brkpt_dtor(mdb_tgt_t * t,mdb_sespec_t * sep)1711 kmt_brkpt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep)
1712 {
1713 	mdb_free(sep->se_data, sizeof (kmt_brkpt_t));
1714 }
1715 
1716 /*ARGSUSED*/
1717 static char *
kmt_brkpt_info(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_vespec_t * vep,mdb_tgt_spec_desc_t * sp,char * buf,size_t nbytes)1718 kmt_brkpt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
1719     mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
1720 {
1721 	uintptr_t addr = 0;
1722 
1723 	if (vep != NULL) {
1724 		kmt_bparg_t *ka = vep->ve_args;
1725 
1726 		if (ka->ka_symbol != NULL) {
1727 			(void) mdb_iob_snprintf(buf, nbytes, "stop at %s",
1728 			    ka->ka_symbol);
1729 		} else {
1730 			(void) mdb_iob_snprintf(buf, nbytes, "stop at %a",
1731 			    ka->ka_addr);
1732 			addr = ka->ka_addr;
1733 		}
1734 
1735 	} else {
1736 		addr = ((kmt_brkpt_t *)sep->se_data)->kb_addr;
1737 		(void) mdb_iob_snprintf(buf, nbytes, "stop at %a", addr);
1738 	}
1739 
1740 	sp->spec_base = addr;
1741 	sp->spec_size = sizeof (mdb_instr_t);
1742 
1743 	return (buf);
1744 }
1745 
1746 static int
kmt_brkpt_secmp(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1747 kmt_brkpt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1748 {
1749 	kmt_brkpt_t *kb = sep->se_data;
1750 	kmt_bparg_t *ka = args;
1751 	GElf_Sym sym;
1752 
1753 	if (ka->ka_symbol != NULL) {
1754 		return (mdb_tgt_lookup_by_scope(t, ka->ka_symbol,
1755 		    &sym, NULL) == 0 && sym.st_value == kb->kb_addr);
1756 	}
1757 
1758 	return (ka->ka_addr == kb->kb_addr);
1759 }
1760 
1761 /*ARGSUSED*/
1762 static int
kmt_brkpt_vecmp(mdb_tgt_t * t,mdb_vespec_t * vep,void * args)1763 kmt_brkpt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args)
1764 {
1765 	kmt_bparg_t *ka1 = vep->ve_args;
1766 	kmt_bparg_t *ka2 = args;
1767 
1768 	if (ka1->ka_symbol != NULL && ka2->ka_symbol != NULL)
1769 		return (strcmp(ka1->ka_symbol, ka2->ka_symbol) == 0);
1770 
1771 	if (ka1->ka_symbol == NULL && ka2->ka_symbol == NULL)
1772 		return (ka1->ka_addr == ka2->ka_addr);
1773 
1774 	return (0); /* fail if one is symbolic, other is an explicit address */
1775 }
1776 
1777 static int
kmt_brkpt_arm(mdb_tgt_t * t,mdb_sespec_t * sep)1778 kmt_brkpt_arm(mdb_tgt_t *t, mdb_sespec_t *sep)
1779 {
1780 	kmt_data_t *kmt = t->t_data;
1781 	kmt_brkpt_t *kb = sep->se_data;
1782 	int rv;
1783 
1784 	if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1785 		return (set_errno(EMDB_DTACTIVE));
1786 
1787 	if ((rv = kmdb_dpi_brkpt_arm(kb->kb_addr, &kb->kb_oinstr)) != 0)
1788 		return (rv);
1789 
1790 	if (kmt->kmt_narmedbpts++ == 0)
1791 		(void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_ACTIVATE);
1792 
1793 	return (0);
1794 }
1795 
1796 static int
kmt_brkpt_disarm(mdb_tgt_t * t,mdb_sespec_t * sep)1797 kmt_brkpt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep)
1798 {
1799 	kmt_data_t *kmt = t->t_data;
1800 	kmt_brkpt_t *kb = sep->se_data;
1801 	int rv;
1802 
1803 	ASSERT(kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_KMDB_BPT_ACTIVE);
1804 
1805 	if ((rv = kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr)) != 0)
1806 		return (rv);
1807 
1808 	if (--kmt->kmt_narmedbpts == 0)
1809 		(void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_DEACTIVATE);
1810 
1811 	return (0);
1812 }
1813 
1814 /*
1815  * Determine whether the specified sespec is an armed watchpoint that overlaps
1816  * with the given breakpoint and has the given flags set.  We use this to find
1817  * conflicts with breakpoints, below.
1818  */
1819 static int
kmt_wp_overlap(mdb_sespec_t * sep,kmt_brkpt_t * kb,int flags)1820 kmt_wp_overlap(mdb_sespec_t *sep, kmt_brkpt_t *kb, int flags)
1821 {
1822 	const kmdb_wapt_t *wp = sep->se_data;
1823 
1824 	return (sep->se_state == MDB_TGT_SPEC_ARMED &&
1825 	    sep->se_ops == &kmt_wapt_ops && (wp->wp_wflags & flags) &&
1826 	    kb->kb_addr - wp->wp_addr < wp->wp_size);
1827 }
1828 
1829 /*
1830  * We step over breakpoints using our single-stepper.  If a conflicting
1831  * watchpoint is present, we must temporarily remove it before stepping over the
1832  * breakpoint so we don't immediately re-trigger the watchpoint.  We know the
1833  * watchpoint has already triggered on our trap instruction as part of fetching
1834  * it.  Before we return, we must re-install any disabled watchpoints.
1835  */
1836 static int
kmt_brkpt_cont(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)1837 kmt_brkpt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
1838 {
1839 	kmt_brkpt_t *kb = sep->se_data;
1840 	int status = -1;
1841 	int error;
1842 
1843 	for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
1844 		if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
1845 			(void) kmdb_dpi_wapt_disarm(sep->se_data);
1846 	}
1847 
1848 	if (kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr) == 0 &&
1849 	    kmt_step(t, tsp) == 0)
1850 		status = kmt_status(t, tsp);
1851 
1852 	error = errno; /* save errno from disarm, step, or status */
1853 
1854 	for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
1855 		if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
1856 			kmdb_dpi_wapt_arm(sep->se_data);
1857 	}
1858 
1859 	(void) set_errno(error);
1860 	return (status);
1861 }
1862 
1863 /*ARGSUSED*/
1864 static int
kmt_brkpt_match(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)1865 kmt_brkpt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
1866 {
1867 	kmt_brkpt_t *kb = sep->se_data;
1868 	int state, why;
1869 	kreg_t pc;
1870 
1871 	state = kmdb_dpi_get_state(&why);
1872 	(void) kmdb_dpi_get_register("pc", &pc);
1873 
1874 	return (state == DPI_STATE_FAULTED && why == DPI_STATE_WHY_BKPT &&
1875 	    pc == kb->kb_addr);
1876 }
1877 
1878 static const mdb_se_ops_t kmt_brkpt_ops = {
1879 	.se_ctor = kmt_brkpt_ctor,
1880 	.se_dtor = kmt_brkpt_dtor,
1881 	.se_info = kmt_brkpt_info,
1882 	.se_secmp = kmt_brkpt_secmp,
1883 	.se_vecmp = kmt_brkpt_vecmp,
1884 	.se_arm = kmt_brkpt_arm,
1885 	.se_disarm = kmt_brkpt_disarm,
1886 	.se_cont = kmt_brkpt_cont,
1887 	.se_match = kmt_brkpt_match,
1888 };
1889 
1890 static int
kmt_wapt_ctor(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1891 kmt_wapt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1892 {
1893 	mdb_tgt_status_t tsp;
1894 	kmdb_wapt_t *vwp = args;
1895 	kmdb_wapt_t *swp;
1896 
1897 	(void) mdb_tgt_status(t, &tsp);
1898 	if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED)
1899 		return (set_errno(EMDB_NOPROC));
1900 
1901 	swp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP);
1902 	bcopy(vwp, swp, sizeof (kmdb_wapt_t));
1903 
1904 	if (kmdb_dpi_wapt_reserve(swp) < 0) {
1905 		mdb_free(swp, sizeof (kmdb_wapt_t));
1906 		return (-1); /* errno is set for us */
1907 	}
1908 
1909 	sep->se_data = swp;
1910 
1911 	return (0);
1912 }
1913 
1914 /*ARGSUSED*/
1915 static void
kmt_wapt_dtor(mdb_tgt_t * t,mdb_sespec_t * sep)1916 kmt_wapt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep)
1917 {
1918 	kmdb_wapt_t *wp = sep->se_data;
1919 
1920 	kmdb_dpi_wapt_release(wp);
1921 	mdb_free(wp, sizeof (kmdb_wapt_t));
1922 }
1923 
1924 /*ARGSUSED*/
1925 static char *
kmt_wapt_info(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_vespec_t * vep,mdb_tgt_spec_desc_t * sp,char * buf,size_t nbytes)1926 kmt_wapt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
1927     mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
1928 {
1929 	kmdb_wapt_t *wp = vep != NULL ? vep->ve_args : sep->se_data;
1930 	const char *fmt;
1931 	char desc[24];
1932 
1933 	ASSERT(wp->wp_wflags != 0);
1934 	desc[0] = '\0';
1935 
1936 	switch (wp->wp_wflags) {
1937 	case MDB_TGT_WA_R:
1938 		(void) strcat(desc, "/read");
1939 		break;
1940 	case MDB_TGT_WA_W:
1941 		(void) strcat(desc, "/write");
1942 		break;
1943 	case MDB_TGT_WA_X:
1944 		(void) strcat(desc, "/exec");
1945 		break;
1946 	default:
1947 		if (wp->wp_wflags & MDB_TGT_WA_R)
1948 			(void) strcat(desc, "/r");
1949 		if (wp->wp_wflags & MDB_TGT_WA_W)
1950 			(void) strcat(desc, "/w");
1951 		if (wp->wp_wflags & MDB_TGT_WA_X)
1952 			(void) strcat(desc, "/x");
1953 	}
1954 
1955 	switch (wp->wp_type) {
1956 	case DPI_WAPT_TYPE_PHYS:
1957 		fmt = "stop on %s of phys [%p, %p)";
1958 		break;
1959 
1960 	case DPI_WAPT_TYPE_VIRT:
1961 		fmt = "stop on %s of [%la, %la)";
1962 		break;
1963 
1964 	case DPI_WAPT_TYPE_IO:
1965 		if (wp->wp_size == 1)
1966 			fmt = "stop on %s of I/O port %p";
1967 		else
1968 			fmt = "stop on %s of I/O port [%p, %p)";
1969 		break;
1970 
1971 	default:
1972 		fmt = "stop on %s of unknown [%p, %p]";
1973 		break;
1974 	}
1975 
1976 	(void) mdb_iob_snprintf(buf, nbytes, fmt, desc + 1, wp->wp_addr,
1977 	    wp->wp_addr + wp->wp_size);
1978 
1979 	sp->spec_base = wp->wp_addr;
1980 	sp->spec_size = wp->wp_size;
1981 
1982 	return (buf);
1983 }
1984 
1985 /*ARGSUSED*/
1986 static int
kmt_wapt_secmp(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)1987 kmt_wapt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1988 {
1989 	kmdb_wapt_t *wp1 = sep->se_data;
1990 	kmdb_wapt_t *wp2 = args;
1991 
1992 	return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size &&
1993 	    wp1->wp_wflags == wp2->wp_wflags);
1994 }
1995 
1996 /*ARGSUSED*/
1997 static int
kmt_wapt_vecmp(mdb_tgt_t * t,mdb_vespec_t * vep,void * args)1998 kmt_wapt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args)
1999 {
2000 	kmdb_wapt_t *wp1 = vep->ve_args;
2001 	kmdb_wapt_t *wp2 = args;
2002 
2003 	return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size &&
2004 	    wp1->wp_wflags == wp2->wp_wflags);
2005 }
2006 
2007 /*ARGSUSED*/
2008 static int
kmt_wapt_arm(mdb_tgt_t * t,mdb_sespec_t * sep)2009 kmt_wapt_arm(mdb_tgt_t *t, mdb_sespec_t *sep)
2010 {
2011 	kmdb_dpi_wapt_arm(sep->se_data);
2012 
2013 	return (0);
2014 }
2015 
2016 /*ARGSUSED*/
2017 static int
kmt_wapt_disarm(mdb_tgt_t * t,mdb_sespec_t * sep)2018 kmt_wapt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep)
2019 {
2020 	kmdb_dpi_wapt_disarm(sep->se_data);
2021 
2022 	return (0);
2023 }
2024 
2025 /*
2026  * Determine whether the specified sespec is an armed breakpoint at the given
2027  * %pc.  We use this to find conflicts with watchpoints below.
2028  */
2029 static int
kmt_bp_overlap(mdb_sespec_t * sep,uintptr_t pc)2030 kmt_bp_overlap(mdb_sespec_t *sep, uintptr_t pc)
2031 {
2032 	kmt_brkpt_t *kb = sep->se_data;
2033 
2034 	return (sep->se_state == MDB_TGT_SPEC_ARMED &&
2035 	    sep->se_ops == &kmt_brkpt_ops && kb->kb_addr == pc);
2036 }
2037 
2038 /*
2039  * We step over watchpoints using our single-stepper.  If a conflicting
2040  * breakpoint is present, we must temporarily disarm it before stepping over
2041  * the watchpoint so we do not immediately re-trigger the breakpoint.  This is
2042  * similar to the case handled in kmt_brkpt_cont(), above.
2043  */
2044 static int
kmt_wapt_cont(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)2045 kmt_wapt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2046 {
2047 	mdb_sespec_t *bep = NULL;
2048 	int status = -1;
2049 	int error, why;
2050 
2051 	/*
2052 	 * If we stopped for anything other than a watchpoint, check to see
2053 	 * if there's a breakpoint here.
2054 	 */
2055 	if (!(kmdb_dpi_get_state(&why) == DPI_STATE_FAULTED &&
2056 	    (why == DPI_STATE_WHY_V_WAPT || why == DPI_STATE_WHY_P_WAPT))) {
2057 		kreg_t pc;
2058 
2059 		(void) kmdb_dpi_get_register("pc", &pc);
2060 
2061 		for (bep = mdb_list_next(&t->t_active); bep != NULL;
2062 		    bep = mdb_list_next(bep)) {
2063 			if (kmt_bp_overlap(bep, pc)) {
2064 				(void) bep->se_ops->se_disarm(t, bep);
2065 				bep->se_state = MDB_TGT_SPEC_ACTIVE;
2066 				break;
2067 			}
2068 		}
2069 	}
2070 
2071 	kmdb_dpi_wapt_disarm(sep->se_data);
2072 	if (kmt_step(t, tsp) == 0)
2073 		status = kmt_status(t, tsp);
2074 
2075 	error = errno; /* save errno from step or status */
2076 
2077 	if (bep != NULL)
2078 		mdb_tgt_sespec_arm_one(t, bep);
2079 
2080 	(void) set_errno(error);
2081 	return (status);
2082 }
2083 
2084 /*ARGSUSED*/
2085 static int
kmt_wapt_match(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)2086 kmt_wapt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2087 {
2088 	return (kmdb_dpi_wapt_match(sep->se_data));
2089 }
2090 
2091 static const mdb_se_ops_t kmt_wapt_ops = {
2092 	.se_ctor = kmt_wapt_ctor,
2093 	.se_dtor = kmt_wapt_dtor,
2094 	.se_info = kmt_wapt_info,
2095 	.se_secmp = kmt_wapt_secmp,
2096 	.se_vecmp = kmt_wapt_vecmp,
2097 	.se_arm = kmt_wapt_arm,
2098 	.se_disarm = kmt_wapt_disarm,
2099 	.se_cont = kmt_wapt_cont,
2100 	.se_match = kmt_wapt_match,
2101 };
2102 
2103 /*ARGSUSED*/
2104 static int
kmt_trap_ctor(mdb_tgt_t * t,mdb_sespec_t * sep,void * args)2105 kmt_trap_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
2106 {
2107 	sep->se_data = args; /* trap number */
2108 
2109 	return (0);
2110 }
2111 
2112 /*ARGSUSED*/
2113 static char *
kmt_trap_info(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_vespec_t * vep,mdb_tgt_spec_desc_t * sp,char * buf,size_t nbytes)2114 kmt_trap_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
2115     mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
2116 {
2117 	const char *name;
2118 	int trapnum;
2119 
2120 	if (vep != NULL)
2121 		trapnum = (intptr_t)vep->ve_args;
2122 	else
2123 		trapnum = (intptr_t)sep->se_data;
2124 
2125 	if (trapnum == KMT_TRAP_ALL)
2126 		name = "any trap";
2127 	else if (trapnum == KMT_TRAP_NOTENUM)
2128 		name = "miscellaneous trap";
2129 	else
2130 		name = kmt_trapname(trapnum);
2131 
2132 	(void) mdb_iob_snprintf(buf, nbytes, "single-step stop on %s", name);
2133 
2134 	return (buf);
2135 }
2136 
2137 /*ARGSUSED2*/
2138 static int
kmt_trap_match(mdb_tgt_t * t,mdb_sespec_t * sep,mdb_tgt_status_t * tsp)2139 kmt_trap_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2140 {
2141 	int spectt = (intptr_t)sep->se_data;
2142 	kmt_data_t *kmt = t->t_data;
2143 	kreg_t tt;
2144 
2145 	(void) kmdb_dpi_get_register("tt", &tt);
2146 
2147 	switch (spectt) {
2148 	case KMT_TRAP_ALL:
2149 		return (1);
2150 	case KMT_TRAP_NOTENUM:
2151 		return (tt > kmt->kmt_trapmax ||
2152 		    !BT_TEST(kmt->kmt_trapmap, tt));
2153 	default:
2154 		return (tt == spectt);
2155 	}
2156 }
2157 
2158 static const mdb_se_ops_t kmt_trap_ops = {
2159 	.se_ctor = kmt_trap_ctor,
2160 	.se_dtor = no_se_dtor,
2161 	.se_info = kmt_trap_info,
2162 	.se_secmp = no_se_secmp,
2163 	.se_vecmp = no_se_vecmp,
2164 	.se_arm = no_se_arm,
2165 	.se_disarm = no_se_disarm,
2166 	.se_cont = no_se_cont,
2167 	.se_match = kmt_trap_match,
2168 };
2169 
2170 static void
kmt_bparg_dtor(mdb_vespec_t * vep)2171 kmt_bparg_dtor(mdb_vespec_t *vep)
2172 {
2173 	kmt_bparg_t *ka = vep->ve_args;
2174 
2175 	if (ka->ka_symbol != NULL)
2176 		strfree(ka->ka_symbol);
2177 
2178 	if (ka->ka_defbp != NULL)
2179 		kmt_defbp_delete(mdb.m_target, ka->ka_defbp);
2180 
2181 	mdb_free(ka, sizeof (kmt_bparg_t));
2182 }
2183 
2184 static int
kmt_add_vbrkpt(mdb_tgt_t * t,uintptr_t addr,int spec_flags,mdb_tgt_se_f * func,void * data)2185 kmt_add_vbrkpt(mdb_tgt_t *t, uintptr_t addr,
2186     int spec_flags, mdb_tgt_se_f *func, void *data)
2187 {
2188 	kmt_bparg_t *ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP);
2189 
2190 	ka->ka_addr = addr;
2191 	ka->ka_symbol = NULL;
2192 	ka->ka_defbp = NULL;
2193 
2194 	return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags,
2195 	    func, data, ka, kmt_bparg_dtor));
2196 }
2197 
2198 static int
kmt_add_sbrkpt(mdb_tgt_t * t,const char * fullname,int spec_flags,mdb_tgt_se_f * func,void * data)2199 kmt_add_sbrkpt(mdb_tgt_t *t, const char *fullname,
2200     int spec_flags, mdb_tgt_se_f *func, void *data)
2201 {
2202 	kmt_bparg_t *ka;
2203 	kmt_defbp_t *dbp;
2204 	GElf_Sym sym;
2205 	char *tick, *objname, *symname;
2206 	int serrno;
2207 
2208 	if ((tick = strchr(fullname, '`')) == fullname) {
2209 		(void) set_errno(EMDB_NOOBJ);
2210 		return (0);
2211 	}
2212 
2213 	/*
2214 	 * Deferred breakpoints are always scoped.  If we didn't find a tick,
2215 	 * there's no scope.  We'll create a vbrkpt, but only if we can turn the
2216 	 * provided string into an address.
2217 	 */
2218 	if (tick == NULL) {
2219 		uintptr_t addr;
2220 
2221 		if (strisbasenum(fullname)) {
2222 			addr = mdb_strtoull(fullname); /* a bare address */
2223 		} else if (mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EVERY,
2224 		    fullname, &sym, NULL) < 0) {
2225 			(void) set_errno(EMDB_NOSYM);
2226 			return (0);
2227 		} else {
2228 			addr = (uintptr_t)sym.st_value; /* unscoped sym name */
2229 		}
2230 
2231 		return (kmt_add_vbrkpt(t, addr, spec_flags, func, data));
2232 	}
2233 
2234 	if (*(tick + 1) == '\0') {
2235 		(void) set_errno(EMDB_NOSYM);
2236 		return (0);
2237 	}
2238 
2239 	objname = strndup(fullname, tick - fullname);
2240 	symname = tick + 1;
2241 
2242 	if (mdb_tgt_lookup_by_name(t, objname, symname, NULL, NULL) < 0 &&
2243 	    errno != EMDB_NOOBJ) {
2244 		serrno = errno;
2245 		strfree(objname);
2246 
2247 		(void) set_errno(serrno);
2248 		return (0); /* errno is set for us */
2249 	}
2250 
2251 	dbp = kmt_defbp_create(t, objname, symname);
2252 	strfree(objname);
2253 
2254 	ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP);
2255 	ka->ka_symbol = strdup(fullname);
2256 	ka->ka_addr = 0;
2257 	ka->ka_defbp = dbp;
2258 
2259 	return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags,
2260 	    func, data, ka, kmt_bparg_dtor));
2261 }
2262 
2263 static int
kmt_wparg_overlap(const kmdb_wapt_t * wp1,const kmdb_wapt_t * wp2)2264 kmt_wparg_overlap(const kmdb_wapt_t *wp1, const kmdb_wapt_t *wp2)
2265 {
2266 	/* Assume the watchpoint spaces don't overlap */
2267 	if (wp1->wp_type != wp2->wp_type)
2268 		return (0);
2269 
2270 	if (wp2->wp_addr + wp2->wp_size <= wp1->wp_addr)
2271 		return (0); /* no range overlap */
2272 
2273 	if (wp1->wp_addr + wp1->wp_size <= wp2->wp_addr)
2274 		return (0); /* no range overlap */
2275 
2276 	return (wp1->wp_addr != wp2->wp_addr || wp1->wp_size != wp2->wp_size ||
2277 	    wp1->wp_wflags != wp2->wp_wflags);
2278 }
2279 
2280 static void
kmt_wparg_dtor(mdb_vespec_t * vep)2281 kmt_wparg_dtor(mdb_vespec_t *vep)
2282 {
2283 	mdb_free(vep->ve_args, sizeof (kmdb_wapt_t));
2284 }
2285 
2286 static int
kmt_add_wapt_common(mdb_tgt_t * t,uintptr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data,int type)2287 kmt_add_wapt_common(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2288     int spec_flags, mdb_tgt_se_f *func, void *data, int type)
2289 {
2290 	kmdb_wapt_t *wp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP);
2291 	mdb_sespec_t *sep;
2292 
2293 	wp->wp_addr = addr;
2294 	wp->wp_size = len;
2295 	wp->wp_type = type;
2296 	wp->wp_wflags = wflags;
2297 
2298 	if (kmdb_dpi_wapt_validate(wp) < 0)
2299 		return (0); /* errno is set for us */
2300 
2301 	for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
2302 		if (sep->se_ops == &kmt_wapt_ops &&
2303 		    mdb_list_next(&sep->se_velist) != NULL &&
2304 		    kmt_wparg_overlap(wp, sep->se_data))
2305 			goto wapt_dup;
2306 	}
2307 
2308 	for (sep = mdb_list_next(&t->t_idle); sep; sep = mdb_list_next(sep)) {
2309 		if (sep->se_ops == &kmt_wapt_ops && kmt_wparg_overlap(wp,
2310 		    ((mdb_vespec_t *)mdb_list_next(&sep->se_velist))->ve_args))
2311 			goto wapt_dup;
2312 	}
2313 
2314 	return (mdb_tgt_vespec_insert(t, &kmt_wapt_ops, spec_flags,
2315 	    func, data, wp, kmt_wparg_dtor));
2316 
2317 wapt_dup:
2318 	mdb_free(wp, sizeof (kmdb_wapt_t));
2319 	(void) set_errno(EMDB_WPDUP);
2320 	return (0);
2321 }
2322 
2323 static int
kmt_add_pwapt(mdb_tgt_t * t,physaddr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data)2324 kmt_add_pwapt(mdb_tgt_t *t, physaddr_t addr, size_t len, uint_t wflags,
2325     int spec_flags, mdb_tgt_se_f *func, void *data)
2326 {
2327 	return (kmt_add_wapt_common(t, (uintptr_t)addr, len, wflags, spec_flags,
2328 	    func, data, DPI_WAPT_TYPE_PHYS));
2329 }
2330 
2331 static int
kmt_add_vwapt(mdb_tgt_t * t,uintptr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data)2332 kmt_add_vwapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2333     int spec_flags, mdb_tgt_se_f *func, void *data)
2334 {
2335 	return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func,
2336 	    data, DPI_WAPT_TYPE_VIRT));
2337 }
2338 
2339 static int
kmt_add_iowapt(mdb_tgt_t * t,uintptr_t addr,size_t len,uint_t wflags,int spec_flags,mdb_tgt_se_f * func,void * data)2340 kmt_add_iowapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2341     int spec_flags, mdb_tgt_se_f *func, void *data)
2342 {
2343 	return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func,
2344 	    data, DPI_WAPT_TYPE_IO));
2345 }
2346 
2347 static int
kmt_add_trap(mdb_tgt_t * t,int trapnum,int spec_flags,mdb_tgt_se_f * func,void * data)2348 kmt_add_trap(mdb_tgt_t *t, int trapnum, int spec_flags, mdb_tgt_se_f *func,
2349     void *data)
2350 {
2351 	kmt_data_t *kmt = t->t_data;
2352 
2353 	if (trapnum != KMT_TRAP_ALL && trapnum != KMT_TRAP_NOTENUM) {
2354 		if (trapnum < 0 || trapnum > kmt->kmt_trapmax) {
2355 			(void) set_errno(EMDB_BADFLTNUM);
2356 			return (0);
2357 		}
2358 
2359 		BT_SET(kmt->kmt_trapmap, trapnum);
2360 	}
2361 
2362 	return (mdb_tgt_vespec_insert(t, &kmt_trap_ops, spec_flags, func, data,
2363 	    (void *)(uintptr_t)trapnum, no_ve_dtor));
2364 }
2365 
2366 /*ARGSUSED*/
2367 static uintmax_t
kmt_cpuid_disc_get(const mdb_var_t * v)2368 kmt_cpuid_disc_get(const mdb_var_t *v)
2369 {
2370 	return (kmdb_dpi_get_master_cpuid());
2371 }
2372 
2373 static const mdb_nv_disc_t kmt_cpuid_disc = {
2374 	.disc_get = kmt_cpuid_disc_get
2375 };
2376 
2377 /*
2378  * This routine executes while the kernel is running.
2379  */
2380 void
kmt_activate(mdb_tgt_t * t)2381 kmt_activate(mdb_tgt_t *t)
2382 {
2383 	kmt_data_t *kmt = t->t_data;
2384 
2385 	mdb_prop_postmortem = FALSE;
2386 	mdb_prop_kernel = TRUE;
2387 
2388 	(void) mdb_tgt_register_dcmds(t, &kmt_dcmds[0], MDB_MOD_FORCE);
2389 	mdb_tgt_register_regvars(t, kmt->kmt_rds, &kmt_reg_disc, 0);
2390 
2391 	/*
2392 	 * Force load of the MDB krtld module, in case it's been rolled into
2393 	 * unix.
2394 	 */
2395 	(void) mdb_module_load(KMT_RTLD_NAME, MDB_MOD_SILENT | MDB_MOD_DEFER);
2396 }
2397 
2398 static void
kmt_destroy(mdb_tgt_t * t)2399 kmt_destroy(mdb_tgt_t *t)
2400 {
2401 	kmt_data_t *kmt = t->t_data;
2402 	kmt_module_t *km, *pkm;
2403 
2404 	mdb_nv_destroy(&kmt->kmt_modules);
2405 	for (km = mdb_list_prev(&kmt->kmt_modlist); km != NULL; km = pkm) {
2406 		pkm = mdb_list_prev(km);
2407 		mdb_free(km, sizeof (kmt_module_t));
2408 	}
2409 
2410 	if (!kmt_defbp_lock)
2411 		kmt_defbp_destroy_all();
2412 
2413 	if (kmt->kmt_trapmap != NULL)
2414 		mdb_free(kmt->kmt_trapmap, BT_SIZEOFMAP(kmt->kmt_trapmax));
2415 
2416 	mdb_free(kmt, sizeof (kmt_data_t));
2417 }
2418 
2419 static const mdb_tgt_ops_t kmt_ops = {
2420 	.t_setflags = kmt_setflags,
2421 	.t_setcontext = (int (*)())(uintptr_t)mdb_tgt_notsup,
2422 	.t_activate = kmt_activate,
2423 	.t_deactivate = (void (*)())(uintptr_t)mdb_tgt_nop,
2424 	.t_periodic = kmt_periodic,
2425 	.t_destroy = kmt_destroy,
2426 	.t_name = kmt_name,
2427 	.t_isa = (const char *(*)())mdb_conf_isa,
2428 	.t_platform = kmt_platform,
2429 	.t_uname = kmt_uname,
2430 	.t_dmodel = kmt_dmodel,
2431 	.t_aread = (ssize_t (*)())mdb_tgt_notsup,
2432 	.t_awrite = (ssize_t (*)())mdb_tgt_notsup,
2433 	.t_vread = kmt_read,
2434 	.t_vwrite = kmt_write,
2435 	.t_pread = kmt_pread,
2436 	.t_pwrite = kmt_pwrite,
2437 	.t_fread = kmt_read,
2438 	.t_fwrite = kmt_write,
2439 	.t_ioread = kmt_ioread,
2440 	.t_iowrite = kmt_iowrite,
2441 	.t_vtop = kmt_vtop,
2442 	.t_lookup_by_name = kmt_lookup_by_name,
2443 	.t_lookup_by_addr = kmt_lookup_by_addr,
2444 	.t_symbol_iter = kmt_symbol_iter,
2445 	.t_mapping_iter = kmt_mapping_iter,
2446 	.t_object_iter = kmt_object_iter,
2447 	.t_addr_to_map = kmt_addr_to_map,
2448 	.t_name_to_map = kmt_name_to_map,
2449 	.t_addr_to_ctf = kmt_addr_to_ctf,
2450 	.t_name_to_ctf = kmt_name_to_ctf,
2451 	.t_status = kmt_status,
2452 	.t_run = (int (*)())(uintptr_t)mdb_tgt_notsup,
2453 	.t_step = kmt_step,
2454 	.t_step_out = kmt_step_out,
2455 	.t_next = kmt_next,
2456 	.t_cont = kmt_continue,
2457 	.t_signal = (int (*)())(uintptr_t)mdb_tgt_notsup,
2458 	.t_add_vbrkpt = kmt_add_vbrkpt,
2459 	.t_add_sbrkpt = kmt_add_sbrkpt,
2460 	.t_add_pwapt = kmt_add_pwapt,
2461 	.t_add_vwapt = kmt_add_vwapt,
2462 	.t_add_iowapt = kmt_add_iowapt,
2463 	.t_add_sysenter = (int (*)())(uintptr_t)mdb_tgt_null,
2464 	.t_add_sysexit = (int (*)())(uintptr_t)mdb_tgt_null,
2465 	.t_add_signal = (int (*)())(uintptr_t)mdb_tgt_null,
2466 	.t_add_fault = kmt_add_trap,
2467 	.t_getareg = kmt_getareg,
2468 	.t_putareg = kmt_putareg,
2469 	.t_stack_iter = (int (*)())(uintptr_t)mdb_tgt_nop,	/* XXX */
2470 	.t_auxv = (int (*)())(uintptr_t)mdb_tgt_notsup,
2471 	.t_thread_name = (int (*)())(uintptr_t)mdb_tgt_notsup,
2472 };
2473 
2474 /*
2475  * Called immediately upon resumption of the system after a step or continue.
2476  * Allows us to synchronize kmt's view of the world with reality.
2477  */
2478 /*ARGSUSED*/
2479 static void
kmt_sync(mdb_tgt_t * t)2480 kmt_sync(mdb_tgt_t *t)
2481 {
2482 	kmt_data_t *kmt = t->t_data;
2483 	int symavail;
2484 
2485 	mdb_dprintf(MDB_DBG_KMOD, "synchronizing with kernel\n");
2486 
2487 	symavail = kmt->kmt_symavail;
2488 	kmt->kmt_symavail = FALSE;
2489 
2490 	/*
2491 	 * Resync our view of the world if the modules have changed, or if we
2492 	 * didn't have any symbols coming into this function.  The latter will
2493 	 * only happen on startup.
2494 	 */
2495 	if (kmdb_kdi_mods_changed() || !symavail)
2496 		kmt_modlist_update(t);
2497 
2498 	/*
2499 	 * It would be nice if we could run this less frequently, perhaps
2500 	 * after a dvec-initiated trigger.
2501 	 */
2502 	kmdb_module_sync();
2503 
2504 	kmt->kmt_symavail = TRUE;
2505 
2506 	mdb_dprintf(MDB_DBG_KMOD, "synchronization complete\n");
2507 
2508 	kmt_defbp_prune();
2509 
2510 	if (kmt_defbp_num > 0 && kmt_defbp_bpspec == 0 &&
2511 	    kmdb_kdi_dtrace_get_state() != KDI_DTSTATE_DTRACE_ACTIVE) {
2512 		/*
2513 		 * Deferred breakpoints were created while DTrace was active,
2514 		 * and consequently the deferred breakpoint enabling mechanism
2515 		 * wasn't activated.  Activate it now, and then try to activate
2516 		 * the deferred breakpoints.  We do this so that we can catch
2517 		 * the ones which may apply to modules that have been loaded
2518 		 * while they were waiting for DTrace to deactivate.
2519 		 */
2520 		(void) kmt_defbp_activate(t);
2521 		(void) mdb_tgt_sespec_activate_all(t);
2522 	}
2523 
2524 	(void) mdb_tgt_status(t, &t->t_status);
2525 }
2526 
2527 /*
2528  * This routine executes while the kernel is running.
2529  */
2530 /*ARGSUSED*/
2531 int
kmdb_kvm_create(mdb_tgt_t * t,int argc,const char * argv[])2532 kmdb_kvm_create(mdb_tgt_t *t, int argc, const char *argv[])
2533 {
2534 	kmt_data_t *kmt;
2535 
2536 	if (argc != 0)
2537 		return (set_errno(EINVAL));
2538 
2539 	kmt = mdb_zalloc(sizeof (kmt_data_t), UM_SLEEP);
2540 	t->t_data = kmt;
2541 	t->t_ops = &kmt_ops;
2542 	t->t_flags |= MDB_TGT_F_RDWR;	/* kmdb is always r/w */
2543 
2544 	(void) mdb_nv_insert(&mdb.m_nv, "cpuid", &kmt_cpuid_disc, 0,
2545 	    MDB_NV_PERSIST | MDB_NV_RDONLY);
2546 
2547 	(void) mdb_nv_create(&kmt->kmt_modules, UM_SLEEP);
2548 
2549 	kmt_init_isadep(t);
2550 
2551 	kmt->kmt_symavail = FALSE;
2552 
2553 	bzero(&kmt_defbp_list, sizeof (mdb_list_t));
2554 
2555 	return (0);
2556 
2557 create_err:
2558 	kmt_destroy(t);
2559 
2560 	return (-1);
2561 }
2562 
2563 /*
2564  * This routine is called once, when kmdb first has control of the world.
2565  */
2566 void
kmdb_kvm_startup(void)2567 kmdb_kvm_startup(void)
2568 {
2569 	kmt_data_t *kmt = mdb.m_target->t_data;
2570 
2571 	mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm startup\n");
2572 
2573 	kmt_sync(mdb.m_target);
2574 	(void) mdb_module_load_builtin(KMT_MODULE);
2575 	kmt_startup_isadep(mdb.m_target);
2576 
2577 	/*
2578 	 * This is here because we need to write the deferred breakpoint
2579 	 * breakpoint when the debugger starts.  Our normal r/o write routines
2580 	 * don't work when the kernel is running, so we have to do it during
2581 	 * startup.
2582 	 */
2583 	(void) mdb_tgt_sespec_activate_all(mdb.m_target);
2584 
2585 	kmt->kmt_rtld_name = KMT_RTLD_NAME;
2586 
2587 	if (kmt_module_by_name(kmt, KMT_RTLD_NAME) == NULL)
2588 		kmt->kmt_rtld_name = "unix";
2589 }
2590 
2591 /*
2592  * This routine is called after kmdb has loaded its initial set of modules.
2593  */
2594 void
kmdb_kvm_poststartup(void)2595 kmdb_kvm_poststartup(void)
2596 {
2597 	mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm post-startup\n");
2598 
2599 	(void) mdb_dis_select(kmt_def_dismode());
2600 }
2601