1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 24 */ 25 /* 26 * Copyright (c) 2013, Joyent, Inc. All rights reserved. 27 * Copyright (c) 2016, Pedro Giffuni. All rights reserved. 28 */ 29 30 #include <sys/types.h> 31 #ifdef illumos 32 #include <sys/modctl.h> 33 #include <sys/kobj.h> 34 #include <sys/kobj_impl.h> 35 #include <sys/sysmacros.h> 36 #include <sys/elf.h> 37 #include <sys/task.h> 38 #else 39 #include <sys/param.h> 40 #include <sys/linker.h> 41 #include <sys/module.h> 42 #include <sys/stat.h> 43 #endif 44 45 #include <unistd.h> 46 #ifdef illumos 47 #include <project.h> 48 #endif 49 #include <strings.h> 50 #include <stdlib.h> 51 #include <libelf.h> 52 #include <limits.h> 53 #include <assert.h> 54 #include <errno.h> 55 #include <dirent.h> 56 #ifndef illumos 57 #include <fcntl.h> 58 #include <libproc_compat.h> 59 #endif 60 61 #include <dt_strtab.h> 62 #include <dt_module.h> 63 #include <dt_impl.h> 64 65 static const char *dt_module_strtab; /* active strtab for qsort callbacks */ 66 67 static void 68 dt_module_symhash_insert(dt_module_t *dmp, const char *name, uint_t id) 69 { 70 dt_sym_t *dsp = &dmp->dm_symchains[dmp->dm_symfree]; 71 uint_t h; 72 73 assert(dmp->dm_symfree < dmp->dm_nsymelems + 1); 74 75 dsp->ds_symid = id; 76 h = dt_strtab_hash(name, NULL) % dmp->dm_nsymbuckets; 77 dsp->ds_next = dmp->dm_symbuckets[h]; 78 dmp->dm_symbuckets[h] = dmp->dm_symfree++; 79 } 80 81 static uint_t 82 dt_module_syminit32(dt_module_t *dmp) 83 { 84 #if STT_NUM != (STT_TLS + 1) 85 #error "STT_NUM has grown. update dt_module_syminit32()" 86 #endif 87 88 Elf32_Sym *sym = dmp->dm_symtab.cts_data; 89 const char *base = dmp->dm_strtab.cts_data; 90 size_t ss_size = dmp->dm_strtab.cts_size; 91 uint_t i, n = dmp->dm_nsymelems; 92 uint_t asrsv = 0; 93 94 #if defined(__FreeBSD__) 95 GElf_Ehdr ehdr; 96 int is_elf_obj; 97 98 gelf_getehdr(dmp->dm_elf, &ehdr); 99 is_elf_obj = (ehdr.e_type == ET_REL); 100 #endif 101 102 for (i = 0; i < n; i++, sym++) { 103 const char *name = base + sym->st_name; 104 uchar_t type = ELF32_ST_TYPE(sym->st_info); 105 106 if (type >= STT_NUM || type == STT_SECTION) 107 continue; /* skip sections and unknown types */ 108 109 if (sym->st_name == 0 || sym->st_name >= ss_size) 110 continue; /* skip null or invalid names */ 111 112 if (sym->st_value != 0 && 113 (ELF32_ST_BIND(sym->st_info) != STB_LOCAL || sym->st_size)) { 114 asrsv++; /* reserve space in the address map */ 115 116 #if defined(__FreeBSD__) 117 sym->st_value += (Elf_Addr) dmp->dm_reloc_offset; 118 if (is_elf_obj && sym->st_shndx != SHN_UNDEF && 119 sym->st_shndx < ehdr.e_shnum) 120 sym->st_value += 121 dmp->dm_sec_offsets[sym->st_shndx]; 122 #endif 123 } 124 125 dt_module_symhash_insert(dmp, name, i); 126 } 127 128 return (asrsv); 129 } 130 131 static uint_t 132 dt_module_syminit64(dt_module_t *dmp) 133 { 134 #if STT_NUM != (STT_TLS + 1) 135 #error "STT_NUM has grown. update dt_module_syminit64()" 136 #endif 137 138 Elf64_Sym *sym = dmp->dm_symtab.cts_data; 139 const char *base = dmp->dm_strtab.cts_data; 140 size_t ss_size = dmp->dm_strtab.cts_size; 141 uint_t i, n = dmp->dm_nsymelems; 142 uint_t asrsv = 0; 143 144 #if defined(__FreeBSD__) 145 GElf_Ehdr ehdr; 146 int is_elf_obj; 147 148 gelf_getehdr(dmp->dm_elf, &ehdr); 149 is_elf_obj = (ehdr.e_type == ET_REL); 150 #endif 151 152 for (i = 0; i < n; i++, sym++) { 153 const char *name = base + sym->st_name; 154 uchar_t type = ELF64_ST_TYPE(sym->st_info); 155 156 if (type >= STT_NUM || type == STT_SECTION) 157 continue; /* skip sections and unknown types */ 158 159 if (sym->st_name == 0 || sym->st_name >= ss_size) 160 continue; /* skip null or invalid names */ 161 162 if (sym->st_value != 0 && 163 (ELF64_ST_BIND(sym->st_info) != STB_LOCAL || sym->st_size)) { 164 asrsv++; /* reserve space in the address map */ 165 #if defined(__FreeBSD__) 166 sym->st_value += (Elf_Addr) dmp->dm_reloc_offset; 167 if (is_elf_obj && sym->st_shndx != SHN_UNDEF && 168 sym->st_shndx < ehdr.e_shnum) 169 sym->st_value += 170 dmp->dm_sec_offsets[sym->st_shndx]; 171 #endif 172 } 173 174 dt_module_symhash_insert(dmp, name, i); 175 } 176 177 return (asrsv); 178 } 179 180 /* 181 * Sort comparison function for 32-bit symbol address-to-name lookups. We sort 182 * symbols by value. If values are equal, we prefer the symbol that is 183 * non-zero sized, typed, not weak, or lexically first, in that order. 184 */ 185 static int 186 dt_module_symcomp32(const void *lp, const void *rp) 187 { 188 Elf32_Sym *lhs = *((Elf32_Sym **)lp); 189 Elf32_Sym *rhs = *((Elf32_Sym **)rp); 190 191 if (lhs->st_value != rhs->st_value) 192 return (lhs->st_value > rhs->st_value ? 1 : -1); 193 194 if ((lhs->st_size == 0) != (rhs->st_size == 0)) 195 return (lhs->st_size == 0 ? 1 : -1); 196 197 if ((ELF32_ST_TYPE(lhs->st_info) == STT_NOTYPE) != 198 (ELF32_ST_TYPE(rhs->st_info) == STT_NOTYPE)) 199 return (ELF32_ST_TYPE(lhs->st_info) == STT_NOTYPE ? 1 : -1); 200 201 if ((ELF32_ST_BIND(lhs->st_info) == STB_WEAK) != 202 (ELF32_ST_BIND(rhs->st_info) == STB_WEAK)) 203 return (ELF32_ST_BIND(lhs->st_info) == STB_WEAK ? 1 : -1); 204 205 return (strcmp(dt_module_strtab + lhs->st_name, 206 dt_module_strtab + rhs->st_name)); 207 } 208 209 /* 210 * Sort comparison function for 64-bit symbol address-to-name lookups. We sort 211 * symbols by value. If values are equal, we prefer the symbol that is 212 * non-zero sized, typed, not weak, or lexically first, in that order. 213 */ 214 static int 215 dt_module_symcomp64(const void *lp, const void *rp) 216 { 217 Elf64_Sym *lhs = *((Elf64_Sym **)lp); 218 Elf64_Sym *rhs = *((Elf64_Sym **)rp); 219 220 if (lhs->st_value != rhs->st_value) 221 return (lhs->st_value > rhs->st_value ? 1 : -1); 222 223 if ((lhs->st_size == 0) != (rhs->st_size == 0)) 224 return (lhs->st_size == 0 ? 1 : -1); 225 226 if ((ELF64_ST_TYPE(lhs->st_info) == STT_NOTYPE) != 227 (ELF64_ST_TYPE(rhs->st_info) == STT_NOTYPE)) 228 return (ELF64_ST_TYPE(lhs->st_info) == STT_NOTYPE ? 1 : -1); 229 230 if ((ELF64_ST_BIND(lhs->st_info) == STB_WEAK) != 231 (ELF64_ST_BIND(rhs->st_info) == STB_WEAK)) 232 return (ELF64_ST_BIND(lhs->st_info) == STB_WEAK ? 1 : -1); 233 234 return (strcmp(dt_module_strtab + lhs->st_name, 235 dt_module_strtab + rhs->st_name)); 236 } 237 238 static void 239 dt_module_symsort32(dt_module_t *dmp) 240 { 241 Elf32_Sym *symtab = (Elf32_Sym *)dmp->dm_symtab.cts_data; 242 Elf32_Sym **sympp = (Elf32_Sym **)dmp->dm_asmap; 243 const dt_sym_t *dsp = dmp->dm_symchains + 1; 244 uint_t i, n = dmp->dm_symfree; 245 246 for (i = 1; i < n; i++, dsp++) { 247 Elf32_Sym *sym = symtab + dsp->ds_symid; 248 if (sym->st_value != 0 && 249 (ELF32_ST_BIND(sym->st_info) != STB_LOCAL || sym->st_size)) 250 *sympp++ = sym; 251 } 252 253 dmp->dm_aslen = (uint_t)(sympp - (Elf32_Sym **)dmp->dm_asmap); 254 assert(dmp->dm_aslen <= dmp->dm_asrsv); 255 256 dt_module_strtab = dmp->dm_strtab.cts_data; 257 qsort(dmp->dm_asmap, dmp->dm_aslen, 258 sizeof (Elf32_Sym *), dt_module_symcomp32); 259 dt_module_strtab = NULL; 260 } 261 262 static void 263 dt_module_symsort64(dt_module_t *dmp) 264 { 265 Elf64_Sym *symtab = (Elf64_Sym *)dmp->dm_symtab.cts_data; 266 Elf64_Sym **sympp = (Elf64_Sym **)dmp->dm_asmap; 267 const dt_sym_t *dsp = dmp->dm_symchains + 1; 268 uint_t i, n = dmp->dm_symfree; 269 270 for (i = 1; i < n; i++, dsp++) { 271 Elf64_Sym *sym = symtab + dsp->ds_symid; 272 if (sym->st_value != 0 && 273 (ELF64_ST_BIND(sym->st_info) != STB_LOCAL || sym->st_size)) 274 *sympp++ = sym; 275 } 276 277 dmp->dm_aslen = (uint_t)(sympp - (Elf64_Sym **)dmp->dm_asmap); 278 assert(dmp->dm_aslen <= dmp->dm_asrsv); 279 280 dt_module_strtab = dmp->dm_strtab.cts_data; 281 qsort(dmp->dm_asmap, dmp->dm_aslen, 282 sizeof (Elf64_Sym *), dt_module_symcomp64); 283 dt_module_strtab = NULL; 284 } 285 286 static GElf_Sym * 287 dt_module_symgelf32(const Elf32_Sym *src, GElf_Sym *dst) 288 { 289 if (dst != NULL) { 290 dst->st_name = src->st_name; 291 dst->st_info = src->st_info; 292 dst->st_other = src->st_other; 293 dst->st_shndx = src->st_shndx; 294 dst->st_value = src->st_value; 295 dst->st_size = src->st_size; 296 } 297 298 return (dst); 299 } 300 301 static GElf_Sym * 302 dt_module_symgelf64(const Elf64_Sym *src, GElf_Sym *dst) 303 { 304 if (dst != NULL) 305 bcopy(src, dst, sizeof (GElf_Sym)); 306 307 return (dst); 308 } 309 310 static GElf_Sym * 311 dt_module_symname32(dt_module_t *dmp, const char *name, 312 GElf_Sym *symp, uint_t *idp) 313 { 314 const Elf32_Sym *symtab = dmp->dm_symtab.cts_data; 315 const char *strtab = dmp->dm_strtab.cts_data; 316 317 const Elf32_Sym *sym; 318 const dt_sym_t *dsp; 319 uint_t i, h; 320 321 if (dmp->dm_nsymelems == 0) 322 return (NULL); 323 324 h = dt_strtab_hash(name, NULL) % dmp->dm_nsymbuckets; 325 326 for (i = dmp->dm_symbuckets[h]; i != 0; i = dsp->ds_next) { 327 dsp = &dmp->dm_symchains[i]; 328 sym = symtab + dsp->ds_symid; 329 330 if (strcmp(name, strtab + sym->st_name) == 0) { 331 if (idp != NULL) 332 *idp = dsp->ds_symid; 333 return (dt_module_symgelf32(sym, symp)); 334 } 335 } 336 337 return (NULL); 338 } 339 340 static GElf_Sym * 341 dt_module_symname64(dt_module_t *dmp, const char *name, 342 GElf_Sym *symp, uint_t *idp) 343 { 344 const Elf64_Sym *symtab = dmp->dm_symtab.cts_data; 345 const char *strtab = dmp->dm_strtab.cts_data; 346 347 const Elf64_Sym *sym; 348 const dt_sym_t *dsp; 349 uint_t i, h; 350 351 if (dmp->dm_nsymelems == 0) 352 return (NULL); 353 354 h = dt_strtab_hash(name, NULL) % dmp->dm_nsymbuckets; 355 356 for (i = dmp->dm_symbuckets[h]; i != 0; i = dsp->ds_next) { 357 dsp = &dmp->dm_symchains[i]; 358 sym = symtab + dsp->ds_symid; 359 360 if (strcmp(name, strtab + sym->st_name) == 0) { 361 if (idp != NULL) 362 *idp = dsp->ds_symid; 363 return (dt_module_symgelf64(sym, symp)); 364 } 365 } 366 367 return (NULL); 368 } 369 370 static GElf_Sym * 371 dt_module_symaddr32(dt_module_t *dmp, GElf_Addr addr, 372 GElf_Sym *symp, uint_t *idp) 373 { 374 const Elf32_Sym **asmap = (const Elf32_Sym **)dmp->dm_asmap; 375 const Elf32_Sym *symtab = dmp->dm_symtab.cts_data; 376 const Elf32_Sym *sym; 377 378 uint_t i, mid, lo = 0, hi = dmp->dm_aslen - 1; 379 Elf32_Addr v; 380 381 if (dmp->dm_aslen == 0) 382 return (NULL); 383 384 while (hi - lo > 1) { 385 mid = (lo + hi) / 2; 386 if (addr >= asmap[mid]->st_value) 387 lo = mid; 388 else 389 hi = mid; 390 } 391 392 i = addr < asmap[hi]->st_value ? lo : hi; 393 sym = asmap[i]; 394 v = sym->st_value; 395 396 /* 397 * If the previous entry has the same value, improve our choice. The 398 * order of equal-valued symbols is determined by the comparison func. 399 */ 400 while (i-- != 0 && asmap[i]->st_value == v) 401 sym = asmap[i]; 402 403 if (addr - sym->st_value < MAX(sym->st_size, 1)) { 404 if (idp != NULL) 405 *idp = (uint_t)(sym - symtab); 406 return (dt_module_symgelf32(sym, symp)); 407 } 408 409 return (NULL); 410 } 411 412 static GElf_Sym * 413 dt_module_symaddr64(dt_module_t *dmp, GElf_Addr addr, 414 GElf_Sym *symp, uint_t *idp) 415 { 416 const Elf64_Sym **asmap = (const Elf64_Sym **)dmp->dm_asmap; 417 const Elf64_Sym *symtab = dmp->dm_symtab.cts_data; 418 const Elf64_Sym *sym; 419 420 uint_t i, mid, lo = 0, hi = dmp->dm_aslen - 1; 421 Elf64_Addr v; 422 423 if (dmp->dm_aslen == 0) 424 return (NULL); 425 426 while (hi - lo > 1) { 427 mid = (lo + hi) / 2; 428 if (addr >= asmap[mid]->st_value) 429 lo = mid; 430 else 431 hi = mid; 432 } 433 434 i = addr < asmap[hi]->st_value ? lo : hi; 435 sym = asmap[i]; 436 v = sym->st_value; 437 438 /* 439 * If the previous entry has the same value, improve our choice. The 440 * order of equal-valued symbols is determined by the comparison func. 441 */ 442 while (i-- != 0 && asmap[i]->st_value == v) 443 sym = asmap[i]; 444 445 if (addr - sym->st_value < MAX(sym->st_size, 1)) { 446 if (idp != NULL) 447 *idp = (uint_t)(sym - symtab); 448 return (dt_module_symgelf64(sym, symp)); 449 } 450 451 return (NULL); 452 } 453 454 static const dt_modops_t dt_modops_32 = { 455 dt_module_syminit32, 456 dt_module_symsort32, 457 dt_module_symname32, 458 dt_module_symaddr32 459 }; 460 461 static const dt_modops_t dt_modops_64 = { 462 dt_module_syminit64, 463 dt_module_symsort64, 464 dt_module_symname64, 465 dt_module_symaddr64 466 }; 467 468 dt_module_t * 469 dt_module_create(dtrace_hdl_t *dtp, const char *name) 470 { 471 long pid; 472 char *eptr; 473 dt_ident_t *idp; 474 uint_t h = dt_strtab_hash(name, NULL) % dtp->dt_modbuckets; 475 dt_module_t *dmp; 476 477 for (dmp = dtp->dt_mods[h]; dmp != NULL; dmp = dmp->dm_next) { 478 if (strcmp(dmp->dm_name, name) == 0) 479 return (dmp); 480 } 481 482 if ((dmp = malloc(sizeof (dt_module_t))) == NULL) 483 return (NULL); /* caller must handle allocation failure */ 484 485 bzero(dmp, sizeof (dt_module_t)); 486 (void) strlcpy(dmp->dm_name, name, sizeof (dmp->dm_name)); 487 dt_list_append(&dtp->dt_modlist, dmp); 488 dmp->dm_next = dtp->dt_mods[h]; 489 dtp->dt_mods[h] = dmp; 490 dtp->dt_nmods++; 491 492 if (dtp->dt_conf.dtc_ctfmodel == CTF_MODEL_LP64) 493 dmp->dm_ops = &dt_modops_64; 494 else 495 dmp->dm_ops = &dt_modops_32; 496 497 /* 498 * Modules for userland processes are special. They always refer to a 499 * specific process and have a copy of their CTF data from a specific 500 * instant in time. Any dt_module_t that begins with 'pid' is a module 501 * for a specific process, much like how any probe description that 502 * begins with 'pid' is special. pid123 refers to process 123. A module 503 * that is just 'pid' refers specifically to pid$target. This is 504 * generally done as D does not currently allow for macros to be 505 * evaluated when working with types. 506 */ 507 if (strncmp(dmp->dm_name, "pid", 3) == 0) { 508 errno = 0; 509 if (dmp->dm_name[3] == '\0') { 510 idp = dt_idhash_lookup(dtp->dt_macros, "target"); 511 if (idp != NULL && idp->di_id != 0) 512 dmp->dm_pid = idp->di_id; 513 } else { 514 pid = strtol(dmp->dm_name + 3, &eptr, 10); 515 if (errno == 0 && *eptr == '\0') 516 dmp->dm_pid = (pid_t)pid; 517 else 518 dt_dprintf("encountered malformed pid " 519 "module: %s\n", dmp->dm_name); 520 } 521 } 522 523 return (dmp); 524 } 525 526 dt_module_t * 527 dt_module_lookup_by_name(dtrace_hdl_t *dtp, const char *name) 528 { 529 uint_t h = dt_strtab_hash(name, NULL) % dtp->dt_modbuckets; 530 dt_module_t *dmp; 531 532 for (dmp = dtp->dt_mods[h]; dmp != NULL; dmp = dmp->dm_next) { 533 if (strcmp(dmp->dm_name, name) == 0) 534 return (dmp); 535 } 536 537 return (NULL); 538 } 539 540 /*ARGSUSED*/ 541 dt_module_t * 542 dt_module_lookup_by_ctf(dtrace_hdl_t *dtp, ctf_file_t *ctfp) 543 { 544 return (ctfp ? ctf_getspecific(ctfp) : NULL); 545 } 546 547 #ifdef __FreeBSD__ 548 dt_kmodule_t * 549 dt_kmodule_lookup(dtrace_hdl_t *dtp, const char *name) 550 { 551 uint_t h = dt_strtab_hash(name, NULL) % dtp->dt_modbuckets; 552 dt_kmodule_t *dkmp; 553 554 for (dkmp = dtp->dt_kmods[h]; dkmp != NULL; dkmp = dkmp->dkm_next) { 555 if (strcmp(dkmp->dkm_name, name) == 0) 556 return (dkmp); 557 } 558 559 return (NULL); 560 } 561 #endif 562 563 static int 564 dt_module_load_sect(dtrace_hdl_t *dtp, dt_module_t *dmp, ctf_sect_t *ctsp) 565 { 566 const char *s; 567 size_t shstrs; 568 GElf_Shdr sh; 569 Elf_Data *dp; 570 Elf_Scn *sp; 571 572 if (elf_getshdrstrndx(dmp->dm_elf, &shstrs) == -1) 573 return (dt_set_errno(dtp, EDT_NOTLOADED)); 574 575 for (sp = NULL; (sp = elf_nextscn(dmp->dm_elf, sp)) != NULL; ) { 576 if (gelf_getshdr(sp, &sh) == NULL || sh.sh_type == SHT_NULL || 577 (s = elf_strptr(dmp->dm_elf, shstrs, sh.sh_name)) == NULL) 578 continue; /* skip any malformed sections */ 579 580 if (sh.sh_type == ctsp->cts_type && 581 sh.sh_entsize == ctsp->cts_entsize && 582 strcmp(s, ctsp->cts_name) == 0) 583 break; /* section matches specification */ 584 } 585 586 /* 587 * If the section isn't found, return success but leave cts_data set 588 * to NULL and cts_size set to zero for our caller. 589 */ 590 if (sp == NULL || (dp = elf_getdata(sp, NULL)) == NULL) 591 return (0); 592 593 #ifdef illumos 594 ctsp->cts_data = dp->d_buf; 595 #else 596 if ((ctsp->cts_data = malloc(dp->d_size)) == NULL) 597 return (0); 598 memcpy(ctsp->cts_data, dp->d_buf, dp->d_size); 599 #endif 600 ctsp->cts_size = dp->d_size; 601 602 dt_dprintf("loaded %s [%s] (%lu bytes)\n", 603 dmp->dm_name, ctsp->cts_name, (ulong_t)ctsp->cts_size); 604 605 return (0); 606 } 607 608 typedef struct dt_module_cb_arg { 609 struct ps_prochandle *dpa_proc; 610 dtrace_hdl_t *dpa_dtp; 611 dt_module_t *dpa_dmp; 612 uint_t dpa_count; 613 } dt_module_cb_arg_t; 614 615 /* ARGSUSED */ 616 static int 617 dt_module_load_proc_count(void *arg, const prmap_t *prmap, const char *obj) 618 { 619 ctf_file_t *fp; 620 dt_module_cb_arg_t *dcp = arg; 621 622 /* Try to grab a ctf container if it exists */ 623 fp = Pname_to_ctf(dcp->dpa_proc, obj); 624 if (fp != NULL) 625 dcp->dpa_count++; 626 return (0); 627 } 628 629 /* ARGSUSED */ 630 static int 631 dt_module_load_proc_build(void *arg, const prmap_t *prmap, const char *obj) 632 { 633 ctf_file_t *fp; 634 char buf[MAXPATHLEN], *p; 635 dt_module_cb_arg_t *dcp = arg; 636 int count = dcp->dpa_count; 637 Lmid_t lmid; 638 639 fp = Pname_to_ctf(dcp->dpa_proc, obj); 640 if (fp == NULL) 641 return (0); 642 fp = ctf_dup(fp); 643 if (fp == NULL) 644 return (0); 645 dcp->dpa_dmp->dm_libctfp[count] = fp; 646 /* 647 * While it'd be nice to simply use objname here, because of our prior 648 * actions we'll always get a resolved object name to its on disk file. 649 * Like the pid provider, we need to tell a bit of a lie here. The type 650 * that the user thinks of is in terms of the libraries they requested, 651 * eg. libc.so.1, they don't care about the fact that it's 652 * libc_hwcap.so.1. 653 */ 654 (void) Pobjname(dcp->dpa_proc, prmap->pr_vaddr, buf, sizeof (buf)); 655 if ((p = strrchr(buf, '/')) == NULL) 656 p = buf; 657 else 658 p++; 659 660 /* 661 * If for some reason we can't find a link map id for this module, which 662 * would be really quite weird. We instead just say the link map id is 663 * zero. 664 */ 665 if (Plmid(dcp->dpa_proc, prmap->pr_vaddr, &lmid) != 0) 666 lmid = 0; 667 668 if (lmid == 0) 669 dcp->dpa_dmp->dm_libctfn[count] = strdup(p); 670 else 671 (void) asprintf(&dcp->dpa_dmp->dm_libctfn[count], 672 "LM%x`%s", lmid, p); 673 if (dcp->dpa_dmp->dm_libctfn[count] == NULL) 674 return (1); 675 ctf_setspecific(fp, dcp->dpa_dmp); 676 dcp->dpa_count++; 677 return (0); 678 } 679 680 /* 681 * We've been asked to load data that belongs to another process. As such we're 682 * going to pgrab it at this instant, load everything that we might ever care 683 * about, and then drive on. The reason for this is that the process that we're 684 * interested in might be changing. As long as we have grabbed it, then this 685 * can't be a problem for us. 686 * 687 * For now, we're actually going to punt on most things and just try to get CTF 688 * data, nothing else. Basically this is only useful as a source of type 689 * information, we can't go and do the stacktrace lookups, etc. 690 */ 691 static int 692 dt_module_load_proc(dtrace_hdl_t *dtp, dt_module_t *dmp) 693 { 694 struct ps_prochandle *p; 695 dt_module_cb_arg_t arg; 696 697 /* 698 * Note that on success we do not release this hold. We must hold this 699 * for our life time. 700 */ 701 p = dt_proc_grab(dtp, dmp->dm_pid, 0, PGRAB_RDONLY | PGRAB_FORCE); 702 if (p == NULL) { 703 dt_dprintf("failed to grab pid: %d\n", (int)dmp->dm_pid); 704 return (dt_set_errno(dtp, EDT_CANTLOAD)); 705 } 706 dt_proc_lock(dtp, p); 707 708 arg.dpa_proc = p; 709 arg.dpa_dtp = dtp; 710 arg.dpa_dmp = dmp; 711 arg.dpa_count = 0; 712 if (Pobject_iter_resolved(p, dt_module_load_proc_count, &arg) != 0) { 713 dt_dprintf("failed to iterate objects\n"); 714 dt_proc_unlock(dtp, p); 715 dt_proc_release(dtp, p); 716 return (dt_set_errno(dtp, EDT_CANTLOAD)); 717 } 718 719 if (arg.dpa_count == 0) { 720 dt_dprintf("no ctf data present\n"); 721 dt_proc_unlock(dtp, p); 722 dt_proc_release(dtp, p); 723 return (dt_set_errno(dtp, EDT_CANTLOAD)); 724 } 725 726 dmp->dm_libctfp = calloc(arg.dpa_count, sizeof (ctf_file_t *)); 727 if (dmp->dm_libctfp == NULL) { 728 dt_proc_unlock(dtp, p); 729 dt_proc_release(dtp, p); 730 return (dt_set_errno(dtp, EDT_NOMEM)); 731 } 732 733 dmp->dm_libctfn = calloc(arg.dpa_count, sizeof (char *)); 734 if (dmp->dm_libctfn == NULL) { 735 free(dmp->dm_libctfp); 736 dt_proc_unlock(dtp, p); 737 dt_proc_release(dtp, p); 738 return (dt_set_errno(dtp, EDT_NOMEM)); 739 } 740 741 dmp->dm_nctflibs = arg.dpa_count; 742 743 arg.dpa_count = 0; 744 if (Pobject_iter_resolved(p, dt_module_load_proc_build, &arg) != 0) { 745 dt_proc_unlock(dtp, p); 746 dt_module_unload(dtp, dmp); 747 dt_proc_release(dtp, p); 748 return (dt_set_errno(dtp, EDT_CANTLOAD)); 749 } 750 assert(arg.dpa_count == dmp->dm_nctflibs); 751 dt_dprintf("loaded %d ctf modules for pid %d\n", arg.dpa_count, 752 (int)dmp->dm_pid); 753 754 dt_proc_unlock(dtp, p); 755 dt_proc_release(dtp, p); 756 dmp->dm_flags |= DT_DM_LOADED; 757 758 return (0); 759 } 760 761 int 762 dt_module_load(dtrace_hdl_t *dtp, dt_module_t *dmp) 763 { 764 if (dmp->dm_flags & DT_DM_LOADED) 765 return (0); /* module is already loaded */ 766 767 if (dmp->dm_pid != 0) 768 return (dt_module_load_proc(dtp, dmp)); 769 770 dmp->dm_ctdata.cts_name = ".SUNW_ctf"; 771 dmp->dm_ctdata.cts_type = SHT_PROGBITS; 772 dmp->dm_ctdata.cts_flags = 0; 773 dmp->dm_ctdata.cts_data = NULL; 774 dmp->dm_ctdata.cts_size = 0; 775 dmp->dm_ctdata.cts_entsize = 0; 776 dmp->dm_ctdata.cts_offset = 0; 777 778 dmp->dm_symtab.cts_name = ".symtab"; 779 dmp->dm_symtab.cts_type = SHT_SYMTAB; 780 dmp->dm_symtab.cts_flags = 0; 781 dmp->dm_symtab.cts_data = NULL; 782 dmp->dm_symtab.cts_size = 0; 783 dmp->dm_symtab.cts_entsize = dmp->dm_ops == &dt_modops_64 ? 784 sizeof (Elf64_Sym) : sizeof (Elf32_Sym); 785 dmp->dm_symtab.cts_offset = 0; 786 787 dmp->dm_strtab.cts_name = ".strtab"; 788 dmp->dm_strtab.cts_type = SHT_STRTAB; 789 dmp->dm_strtab.cts_flags = 0; 790 dmp->dm_strtab.cts_data = NULL; 791 dmp->dm_strtab.cts_size = 0; 792 dmp->dm_strtab.cts_entsize = 0; 793 dmp->dm_strtab.cts_offset = 0; 794 795 /* 796 * Attempt to load the module's CTF section, symbol table section, and 797 * string table section. Note that modules may not contain CTF data: 798 * this will result in a successful load_sect but data of size zero. 799 * We will then fail if dt_module_getctf() is called, as shown below. 800 */ 801 if (dt_module_load_sect(dtp, dmp, &dmp->dm_ctdata) == -1 || 802 dt_module_load_sect(dtp, dmp, &dmp->dm_symtab) == -1 || 803 dt_module_load_sect(dtp, dmp, &dmp->dm_strtab) == -1) { 804 dt_module_unload(dtp, dmp); 805 return (-1); /* dt_errno is set for us */ 806 } 807 808 /* 809 * Allocate the hash chains and hash buckets for symbol name lookup. 810 * This is relatively simple since the symbol table is of fixed size 811 * and is known in advance. We allocate one extra element since we 812 * use element indices instead of pointers and zero is our sentinel. 813 */ 814 dmp->dm_nsymelems = 815 dmp->dm_symtab.cts_size / dmp->dm_symtab.cts_entsize; 816 817 dmp->dm_nsymbuckets = _dtrace_strbuckets; 818 dmp->dm_symfree = 1; /* first free element is index 1 */ 819 820 dmp->dm_symbuckets = calloc(dmp->dm_nsymbuckets, sizeof (uint_t)); 821 dmp->dm_symchains = calloc(dmp->dm_nsymelems + 1, sizeof (dt_sym_t)); 822 823 if (dmp->dm_symbuckets == NULL || dmp->dm_symchains == NULL) { 824 dt_module_unload(dtp, dmp); 825 return (dt_set_errno(dtp, EDT_NOMEM)); 826 } 827 828 /* 829 * Iterate over the symbol table data buffer and insert each symbol 830 * name into the name hash if the name and type are valid. Then 831 * allocate the address map, fill it in, and sort it. 832 */ 833 dmp->dm_asrsv = dmp->dm_ops->do_syminit(dmp); 834 835 dt_dprintf("hashed %s [%s] (%u symbols)\n", 836 dmp->dm_name, dmp->dm_symtab.cts_name, dmp->dm_symfree - 1); 837 838 if ((dmp->dm_asmap = malloc(sizeof (void *) * dmp->dm_asrsv)) == NULL) { 839 dt_module_unload(dtp, dmp); 840 return (dt_set_errno(dtp, EDT_NOMEM)); 841 } 842 843 dmp->dm_ops->do_symsort(dmp); 844 845 dt_dprintf("sorted %s [%s] (%u symbols)\n", 846 dmp->dm_name, dmp->dm_symtab.cts_name, dmp->dm_aslen); 847 848 dmp->dm_flags |= DT_DM_LOADED; 849 return (0); 850 } 851 852 int 853 dt_module_hasctf(dtrace_hdl_t *dtp, dt_module_t *dmp) 854 { 855 if (dmp->dm_pid != 0 && dmp->dm_nctflibs > 0) 856 return (1); 857 return (dt_module_getctf(dtp, dmp) != NULL); 858 } 859 860 ctf_file_t * 861 dt_module_getctf(dtrace_hdl_t *dtp, dt_module_t *dmp) 862 { 863 const char *parent; 864 dt_module_t *pmp; 865 ctf_file_t *pfp; 866 int model; 867 868 if (dmp->dm_ctfp != NULL || dt_module_load(dtp, dmp) != 0) 869 return (dmp->dm_ctfp); 870 871 if (dmp->dm_ops == &dt_modops_64) 872 model = CTF_MODEL_LP64; 873 else 874 model = CTF_MODEL_ILP32; 875 876 /* 877 * If the data model of the module does not match our program data 878 * model, then do not permit CTF from this module to be opened and 879 * returned to the compiler. If we support mixed data models in the 880 * future for combined kernel/user tracing, this can be removed. 881 */ 882 if (dtp->dt_conf.dtc_ctfmodel != model) { 883 (void) dt_set_errno(dtp, EDT_DATAMODEL); 884 return (NULL); 885 } 886 887 if (dmp->dm_ctdata.cts_size == 0) { 888 (void) dt_set_errno(dtp, EDT_NOCTF); 889 return (NULL); 890 } 891 892 dmp->dm_ctfp = ctf_bufopen(&dmp->dm_ctdata, 893 &dmp->dm_symtab, &dmp->dm_strtab, &dtp->dt_ctferr); 894 895 if (dmp->dm_ctfp == NULL) { 896 (void) dt_set_errno(dtp, EDT_CTF); 897 return (NULL); 898 } 899 900 (void) ctf_setmodel(dmp->dm_ctfp, model); 901 ctf_setspecific(dmp->dm_ctfp, dmp); 902 903 if ((parent = ctf_parent_name(dmp->dm_ctfp)) != NULL) { 904 if ((pmp = dt_module_create(dtp, parent)) == NULL || 905 (pfp = dt_module_getctf(dtp, pmp)) == NULL) { 906 if (pmp == NULL) 907 (void) dt_set_errno(dtp, EDT_NOMEM); 908 goto err; 909 } 910 911 if (ctf_import(dmp->dm_ctfp, pfp) == CTF_ERR) { 912 dtp->dt_ctferr = ctf_errno(dmp->dm_ctfp); 913 (void) dt_set_errno(dtp, EDT_CTF); 914 goto err; 915 } 916 } 917 918 dt_dprintf("loaded CTF container for %s (%p)\n", 919 dmp->dm_name, (void *)dmp->dm_ctfp); 920 921 return (dmp->dm_ctfp); 922 923 err: 924 ctf_close(dmp->dm_ctfp); 925 dmp->dm_ctfp = NULL; 926 return (NULL); 927 } 928 929 /*ARGSUSED*/ 930 void 931 dt_module_unload(dtrace_hdl_t *dtp, dt_module_t *dmp) 932 { 933 int i; 934 935 ctf_close(dmp->dm_ctfp); 936 dmp->dm_ctfp = NULL; 937 938 #ifndef illumos 939 if (dmp->dm_ctdata.cts_data != NULL) { 940 free(dmp->dm_ctdata.cts_data); 941 } 942 if (dmp->dm_symtab.cts_data != NULL) { 943 free(dmp->dm_symtab.cts_data); 944 } 945 if (dmp->dm_strtab.cts_data != NULL) { 946 free(dmp->dm_strtab.cts_data); 947 } 948 #endif 949 950 if (dmp->dm_libctfp != NULL) { 951 for (i = 0; i < dmp->dm_nctflibs; i++) { 952 ctf_close(dmp->dm_libctfp[i]); 953 free(dmp->dm_libctfn[i]); 954 } 955 free(dmp->dm_libctfp); 956 free(dmp->dm_libctfn); 957 dmp->dm_libctfp = NULL; 958 dmp->dm_nctflibs = 0; 959 } 960 961 bzero(&dmp->dm_ctdata, sizeof (ctf_sect_t)); 962 bzero(&dmp->dm_symtab, sizeof (ctf_sect_t)); 963 bzero(&dmp->dm_strtab, sizeof (ctf_sect_t)); 964 965 if (dmp->dm_symbuckets != NULL) { 966 free(dmp->dm_symbuckets); 967 dmp->dm_symbuckets = NULL; 968 } 969 970 if (dmp->dm_symchains != NULL) { 971 free(dmp->dm_symchains); 972 dmp->dm_symchains = NULL; 973 } 974 975 if (dmp->dm_asmap != NULL) { 976 free(dmp->dm_asmap); 977 dmp->dm_asmap = NULL; 978 } 979 #if defined(__FreeBSD__) 980 if (dmp->dm_sec_offsets != NULL) { 981 free(dmp->dm_sec_offsets); 982 dmp->dm_sec_offsets = NULL; 983 } 984 #endif 985 dmp->dm_symfree = 0; 986 dmp->dm_nsymbuckets = 0; 987 dmp->dm_nsymelems = 0; 988 dmp->dm_asrsv = 0; 989 dmp->dm_aslen = 0; 990 991 dmp->dm_text_va = 0; 992 dmp->dm_text_size = 0; 993 dmp->dm_data_va = 0; 994 dmp->dm_data_size = 0; 995 dmp->dm_bss_va = 0; 996 dmp->dm_bss_size = 0; 997 998 if (dmp->dm_extern != NULL) { 999 dt_idhash_destroy(dmp->dm_extern); 1000 dmp->dm_extern = NULL; 1001 } 1002 1003 (void) elf_end(dmp->dm_elf); 1004 dmp->dm_elf = NULL; 1005 1006 dmp->dm_pid = 0; 1007 1008 dmp->dm_flags &= ~DT_DM_LOADED; 1009 } 1010 1011 void 1012 dt_module_destroy(dtrace_hdl_t *dtp, dt_module_t *dmp) 1013 { 1014 uint_t h = dt_strtab_hash(dmp->dm_name, NULL) % dtp->dt_modbuckets; 1015 dt_module_t **dmpp = &dtp->dt_mods[h]; 1016 1017 dt_list_delete(&dtp->dt_modlist, dmp); 1018 assert(dtp->dt_nmods != 0); 1019 dtp->dt_nmods--; 1020 1021 /* 1022 * Now remove this module from its hash chain. We expect to always 1023 * find the module on its hash chain, so in this loop we assert that 1024 * we don't run off the end of the list. 1025 */ 1026 while (*dmpp != dmp) { 1027 dmpp = &((*dmpp)->dm_next); 1028 assert(*dmpp != NULL); 1029 } 1030 1031 *dmpp = dmp->dm_next; 1032 1033 dt_module_unload(dtp, dmp); 1034 free(dmp); 1035 } 1036 1037 /* 1038 * Insert a new external symbol reference into the specified module. The new 1039 * symbol will be marked as undefined and is assigned a symbol index beyond 1040 * any existing cached symbols from this module. We use the ident's di_data 1041 * field to store a pointer to a copy of the dtrace_syminfo_t for this symbol. 1042 */ 1043 dt_ident_t * 1044 dt_module_extern(dtrace_hdl_t *dtp, dt_module_t *dmp, 1045 const char *name, const dtrace_typeinfo_t *tip) 1046 { 1047 dtrace_syminfo_t *sip; 1048 dt_ident_t *idp; 1049 uint_t id; 1050 1051 if (dmp->dm_extern == NULL && (dmp->dm_extern = dt_idhash_create( 1052 "extern", NULL, dmp->dm_nsymelems, UINT_MAX)) == NULL) { 1053 (void) dt_set_errno(dtp, EDT_NOMEM); 1054 return (NULL); 1055 } 1056 1057 if (dt_idhash_nextid(dmp->dm_extern, &id) == -1) { 1058 (void) dt_set_errno(dtp, EDT_SYMOFLOW); 1059 return (NULL); 1060 } 1061 1062 if ((sip = malloc(sizeof (dtrace_syminfo_t))) == NULL) { 1063 (void) dt_set_errno(dtp, EDT_NOMEM); 1064 return (NULL); 1065 } 1066 1067 idp = dt_idhash_insert(dmp->dm_extern, name, DT_IDENT_SYMBOL, 0, id, 1068 _dtrace_symattr, 0, &dt_idops_thaw, NULL, dtp->dt_gen); 1069 1070 if (idp == NULL) { 1071 (void) dt_set_errno(dtp, EDT_NOMEM); 1072 free(sip); 1073 return (NULL); 1074 } 1075 1076 sip->dts_object = dmp->dm_name; 1077 sip->dts_name = idp->di_name; 1078 sip->dts_id = idp->di_id; 1079 1080 idp->di_data = sip; 1081 idp->di_ctfp = tip->dtt_ctfp; 1082 idp->di_type = tip->dtt_type; 1083 1084 return (idp); 1085 } 1086 1087 const char * 1088 dt_module_modelname(dt_module_t *dmp) 1089 { 1090 if (dmp->dm_ops == &dt_modops_64) 1091 return ("64-bit"); 1092 else 1093 return ("32-bit"); 1094 } 1095 1096 /* ARGSUSED */ 1097 int 1098 dt_module_getlibid(dtrace_hdl_t *dtp, dt_module_t *dmp, const ctf_file_t *fp) 1099 { 1100 int i; 1101 1102 for (i = 0; i < dmp->dm_nctflibs; i++) { 1103 if (dmp->dm_libctfp[i] == fp) 1104 return (i); 1105 } 1106 1107 return (-1); 1108 } 1109 1110 /* ARGSUSED */ 1111 ctf_file_t * 1112 dt_module_getctflib(dtrace_hdl_t *dtp, dt_module_t *dmp, const char *name) 1113 { 1114 int i; 1115 1116 for (i = 0; i < dmp->dm_nctflibs; i++) { 1117 if (strcmp(dmp->dm_libctfn[i], name) == 0) 1118 return (dmp->dm_libctfp[i]); 1119 } 1120 1121 return (NULL); 1122 } 1123 1124 /* 1125 * Update our module cache by adding an entry for the specified module 'name'. 1126 * We create the dt_module_t and populate it using /system/object/<name>/. 1127 * 1128 * On FreeBSD, the module name is passed as the full module file name, 1129 * including the path. 1130 */ 1131 static void 1132 dt_module_update(dtrace_hdl_t *dtp, struct kld_file_stat *k_stat) 1133 { 1134 char fname[MAXPATHLEN]; 1135 struct stat64 st; 1136 int fd, err, bits; 1137 struct module_stat ms; 1138 dt_kmodule_t *dkmp; 1139 uint_t h; 1140 int modid; 1141 dt_module_t *dmp; 1142 const char *s; 1143 size_t shstrs; 1144 GElf_Shdr sh; 1145 Elf_Data *dp; 1146 Elf_Scn *sp; 1147 GElf_Ehdr ehdr; 1148 GElf_Phdr ph; 1149 char name[MAXPATHLEN]; 1150 uintptr_t mapbase, alignmask; 1151 int i = 0; 1152 int is_elf_obj; 1153 1154 (void) strlcpy(name, k_stat->name, sizeof(name)); 1155 (void) strlcpy(fname, k_stat->pathname, sizeof(fname)); 1156 1157 if ((fd = open(fname, O_RDONLY)) == -1 || fstat64(fd, &st) == -1 || 1158 (dmp = dt_module_create(dtp, name)) == NULL) { 1159 dt_dprintf("failed to open %s: %s\n", fname, strerror(errno)); 1160 (void) close(fd); 1161 return; 1162 } 1163 1164 (void) strlcpy(dmp->dm_file, fname, sizeof(dmp->dm_file)); 1165 dmp->dm_modid = k_stat->id; 1166 1167 /* 1168 * Since the module can unload out from under us (and /system/object 1169 * will return ENOENT), tell libelf to cook the entire file now and 1170 * then close the underlying file descriptor immediately. If this 1171 * succeeds, we know that we can continue safely using dmp->dm_elf. 1172 */ 1173 dmp->dm_elf = elf_begin(fd, ELF_C_READ, NULL); 1174 err = elf_cntl(dmp->dm_elf, ELF_C_FDREAD); 1175 (void) close(fd); 1176 1177 if (dmp->dm_elf == NULL || err == -1 || 1178 elf_getshdrstrndx(dmp->dm_elf, &shstrs) == -1) { 1179 dt_dprintf("failed to load %s: %s\n", 1180 fname, elf_errmsg(elf_errno())); 1181 dt_module_destroy(dtp, dmp); 1182 return; 1183 } 1184 1185 switch (gelf_getclass(dmp->dm_elf)) { 1186 case ELFCLASS32: 1187 dmp->dm_ops = &dt_modops_32; 1188 bits = 32; 1189 break; 1190 case ELFCLASS64: 1191 dmp->dm_ops = &dt_modops_64; 1192 bits = 64; 1193 break; 1194 default: 1195 dt_dprintf("failed to load %s: unknown ELF class\n", fname); 1196 dt_module_destroy(dtp, dmp); 1197 return; 1198 } 1199 mapbase = (uintptr_t)k_stat->address; 1200 gelf_getehdr(dmp->dm_elf, &ehdr); 1201 is_elf_obj = (ehdr.e_type == ET_REL); 1202 if (is_elf_obj) { 1203 dmp->dm_sec_offsets = 1204 malloc(ehdr.e_shnum * sizeof(*dmp->dm_sec_offsets)); 1205 if (dmp->dm_sec_offsets == NULL) { 1206 dt_dprintf("failed to allocate memory\n"); 1207 dt_module_destroy(dtp, dmp); 1208 return; 1209 } 1210 } 1211 /* 1212 * Iterate over the section headers locating various sections of 1213 * interest and use their attributes to flesh out the dt_module_t. 1214 */ 1215 for (sp = NULL; (sp = elf_nextscn(dmp->dm_elf, sp)) != NULL; ) { 1216 if (gelf_getshdr(sp, &sh) == NULL || sh.sh_type == SHT_NULL || 1217 (s = elf_strptr(dmp->dm_elf, shstrs, sh.sh_name)) == NULL) 1218 continue; /* skip any malformed sections */ 1219 if (sh.sh_size == 0) 1220 continue; 1221 if (sh.sh_type == SHT_PROGBITS || sh.sh_type == SHT_NOBITS) { 1222 alignmask = sh.sh_addralign - 1; 1223 mapbase += alignmask; 1224 mapbase &= ~alignmask; 1225 sh.sh_addr = mapbase; 1226 if (is_elf_obj) 1227 dmp->dm_sec_offsets[elf_ndxscn(sp)] = sh.sh_addr; 1228 mapbase += sh.sh_size; 1229 } 1230 if (strcmp(s, ".text") == 0) { 1231 dmp->dm_text_size = sh.sh_size; 1232 dmp->dm_text_va = sh.sh_addr; 1233 } else if (strcmp(s, ".data") == 0) { 1234 dmp->dm_data_size = sh.sh_size; 1235 dmp->dm_data_va = sh.sh_addr; 1236 } else if (strcmp(s, ".bss") == 0) { 1237 dmp->dm_bss_size = sh.sh_size; 1238 dmp->dm_bss_va = sh.sh_addr; 1239 } else if (strcmp(s, ".info") == 0 && 1240 (dp = elf_getdata(sp, NULL)) != NULL) { 1241 bcopy(dp->d_buf, &dmp->dm_info, 1242 MIN(sh.sh_size, sizeof (dmp->dm_info))); 1243 } 1244 } 1245 1246 dmp->dm_flags |= DT_DM_KERNEL; 1247 /* 1248 * Include .rodata and special sections into .text. 1249 * This depends on default section layout produced by GNU ld 1250 * for ELF objects and libraries: 1251 * [Text][R/O data][R/W data][Dynamic][BSS][Non loadable] 1252 */ 1253 dmp->dm_text_size = dmp->dm_data_va - dmp->dm_text_va; 1254 #if defined(__i386__) 1255 /* 1256 * Find the first load section and figure out the relocation 1257 * offset for the symbols. The kernel module will not need 1258 * relocation, but the kernel linker modules will. 1259 */ 1260 for (i = 0; gelf_getphdr(dmp->dm_elf, i, &ph) != NULL; i++) { 1261 if (ph.p_type == PT_LOAD) { 1262 dmp->dm_reloc_offset = k_stat->address - ph.p_vaddr; 1263 break; 1264 } 1265 } 1266 #endif 1267 1268 if (dmp->dm_info.objfs_info_primary) 1269 dmp->dm_flags |= DT_DM_PRIMARY; 1270 1271 ms.version = sizeof(ms); 1272 for (modid = kldfirstmod(k_stat->id); modid > 0; 1273 modid = modnext(modid)) { 1274 if (modstat(modid, &ms) != 0) { 1275 dt_dprintf("modstat failed for id %d in %s: %s\n", 1276 modid, k_stat->name, strerror(errno)); 1277 continue; 1278 } 1279 if (dt_kmodule_lookup(dtp, ms.name) != NULL) 1280 continue; 1281 1282 dkmp = malloc(sizeof (*dkmp)); 1283 if (dkmp == NULL) { 1284 dt_dprintf("failed to allocate memory\n"); 1285 dt_module_destroy(dtp, dmp); 1286 return; 1287 } 1288 1289 h = dt_strtab_hash(ms.name, NULL) % dtp->dt_modbuckets; 1290 dkmp->dkm_next = dtp->dt_kmods[h]; 1291 dkmp->dkm_name = strdup(ms.name); 1292 dkmp->dkm_module = dmp; 1293 dtp->dt_kmods[h] = dkmp; 1294 } 1295 1296 dt_dprintf("opened %d-bit module %s (%s) [%d]\n", 1297 bits, dmp->dm_name, dmp->dm_file, dmp->dm_modid); 1298 } 1299 1300 /* 1301 * Unload all the loaded modules and then refresh the module cache with the 1302 * latest list of loaded modules and their address ranges. 1303 */ 1304 void 1305 dtrace_update(dtrace_hdl_t *dtp) 1306 { 1307 dt_module_t *dmp; 1308 DIR *dirp; 1309 #if defined(__FreeBSD__) 1310 int fileid; 1311 #endif 1312 1313 for (dmp = dt_list_next(&dtp->dt_modlist); 1314 dmp != NULL; dmp = dt_list_next(dmp)) 1315 dt_module_unload(dtp, dmp); 1316 1317 #ifdef illumos 1318 /* 1319 * Open /system/object and attempt to create a libdtrace module for 1320 * each kernel module that is loaded on the current system. 1321 */ 1322 if (!(dtp->dt_oflags & DTRACE_O_NOSYS) && 1323 (dirp = opendir(OBJFS_ROOT)) != NULL) { 1324 struct dirent *dp; 1325 1326 while ((dp = readdir(dirp)) != NULL) { 1327 if (dp->d_name[0] != '.') 1328 dt_module_update(dtp, dp->d_name); 1329 } 1330 1331 (void) closedir(dirp); 1332 } 1333 #elif defined(__FreeBSD__) 1334 /* 1335 * Use FreeBSD's kernel loader interface to discover what kernel 1336 * modules are loaded and create a libdtrace module for each one. 1337 */ 1338 for (fileid = kldnext(0); fileid > 0; fileid = kldnext(fileid)) { 1339 struct kld_file_stat k_stat; 1340 k_stat.version = sizeof(k_stat); 1341 if (kldstat(fileid, &k_stat) == 0) 1342 dt_module_update(dtp, &k_stat); 1343 } 1344 #endif 1345 1346 /* 1347 * Look up all the macro identifiers and set di_id to the latest value. 1348 * This code collaborates with dt_lex.l on the use of di_id. We will 1349 * need to implement something fancier if we need to support non-ints. 1350 */ 1351 dt_idhash_lookup(dtp->dt_macros, "egid")->di_id = getegid(); 1352 dt_idhash_lookup(dtp->dt_macros, "euid")->di_id = geteuid(); 1353 dt_idhash_lookup(dtp->dt_macros, "gid")->di_id = getgid(); 1354 dt_idhash_lookup(dtp->dt_macros, "pid")->di_id = getpid(); 1355 dt_idhash_lookup(dtp->dt_macros, "pgid")->di_id = getpgid(0); 1356 dt_idhash_lookup(dtp->dt_macros, "ppid")->di_id = getppid(); 1357 #ifdef illumos 1358 dt_idhash_lookup(dtp->dt_macros, "projid")->di_id = getprojid(); 1359 #endif 1360 dt_idhash_lookup(dtp->dt_macros, "sid")->di_id = getsid(0); 1361 #ifdef illumos 1362 dt_idhash_lookup(dtp->dt_macros, "taskid")->di_id = gettaskid(); 1363 #endif 1364 dt_idhash_lookup(dtp->dt_macros, "uid")->di_id = getuid(); 1365 1366 /* 1367 * Cache the pointers to the modules representing the base executable 1368 * and the run-time linker in the dtrace client handle. Note that on 1369 * x86 krtld is folded into unix, so if we don't find it, use unix 1370 * instead. 1371 */ 1372 dtp->dt_exec = dt_module_lookup_by_name(dtp, "genunix"); 1373 dtp->dt_rtld = dt_module_lookup_by_name(dtp, "krtld"); 1374 if (dtp->dt_rtld == NULL) 1375 dtp->dt_rtld = dt_module_lookup_by_name(dtp, "unix"); 1376 1377 /* 1378 * If this is the first time we are initializing the module list, 1379 * remove the module for genunix from the module list and then move it 1380 * to the front of the module list. We do this so that type and symbol 1381 * queries encounter genunix and thereby optimize for the common case 1382 * in dtrace_lookup_by_name() and dtrace_lookup_by_type(), below. 1383 */ 1384 if (dtp->dt_exec != NULL && 1385 dtp->dt_cdefs == NULL && dtp->dt_ddefs == NULL) { 1386 dt_list_delete(&dtp->dt_modlist, dtp->dt_exec); 1387 dt_list_prepend(&dtp->dt_modlist, dtp->dt_exec); 1388 } 1389 } 1390 1391 static dt_module_t * 1392 dt_module_from_object(dtrace_hdl_t *dtp, const char *object) 1393 { 1394 int err = EDT_NOMOD; 1395 dt_module_t *dmp; 1396 1397 switch ((uintptr_t)object) { 1398 case (uintptr_t)DTRACE_OBJ_EXEC: 1399 dmp = dtp->dt_exec; 1400 break; 1401 case (uintptr_t)DTRACE_OBJ_RTLD: 1402 dmp = dtp->dt_rtld; 1403 break; 1404 case (uintptr_t)DTRACE_OBJ_CDEFS: 1405 dmp = dtp->dt_cdefs; 1406 break; 1407 case (uintptr_t)DTRACE_OBJ_DDEFS: 1408 dmp = dtp->dt_ddefs; 1409 break; 1410 default: 1411 dmp = dt_module_create(dtp, object); 1412 err = EDT_NOMEM; 1413 } 1414 1415 if (dmp == NULL) 1416 (void) dt_set_errno(dtp, err); 1417 1418 return (dmp); 1419 } 1420 1421 /* 1422 * Exported interface to look up a symbol by name. We return the GElf_Sym and 1423 * complete symbol information for the matching symbol. 1424 */ 1425 int 1426 dtrace_lookup_by_name(dtrace_hdl_t *dtp, const char *object, const char *name, 1427 GElf_Sym *symp, dtrace_syminfo_t *sip) 1428 { 1429 dt_module_t *dmp; 1430 dt_ident_t *idp; 1431 uint_t n, id; 1432 GElf_Sym sym; 1433 1434 uint_t mask = 0; /* mask of dt_module flags to match */ 1435 uint_t bits = 0; /* flag bits that must be present */ 1436 1437 if (object != DTRACE_OBJ_EVERY && 1438 object != DTRACE_OBJ_KMODS && 1439 object != DTRACE_OBJ_UMODS) { 1440 if ((dmp = dt_module_from_object(dtp, object)) == NULL) 1441 return (-1); /* dt_errno is set for us */ 1442 1443 if (dt_module_load(dtp, dmp) == -1) 1444 return (-1); /* dt_errno is set for us */ 1445 n = 1; 1446 1447 } else { 1448 if (object == DTRACE_OBJ_KMODS) 1449 mask = bits = DT_DM_KERNEL; 1450 else if (object == DTRACE_OBJ_UMODS) 1451 mask = DT_DM_KERNEL; 1452 1453 dmp = dt_list_next(&dtp->dt_modlist); 1454 n = dtp->dt_nmods; 1455 } 1456 1457 if (symp == NULL) 1458 symp = &sym; 1459 1460 for (; n > 0; n--, dmp = dt_list_next(dmp)) { 1461 if ((dmp->dm_flags & mask) != bits) 1462 continue; /* failed to match required attributes */ 1463 1464 if (dt_module_load(dtp, dmp) == -1) 1465 continue; /* failed to load symbol table */ 1466 1467 if (dmp->dm_ops->do_symname(dmp, name, symp, &id) != NULL) { 1468 if (sip != NULL) { 1469 sip->dts_object = dmp->dm_name; 1470 sip->dts_name = (const char *) 1471 dmp->dm_strtab.cts_data + symp->st_name; 1472 sip->dts_id = id; 1473 } 1474 return (0); 1475 } 1476 1477 if (dmp->dm_extern != NULL && 1478 (idp = dt_idhash_lookup(dmp->dm_extern, name)) != NULL) { 1479 if (symp != &sym) { 1480 symp->st_name = (uintptr_t)idp->di_name; 1481 symp->st_info = 1482 GELF_ST_INFO(STB_GLOBAL, STT_NOTYPE); 1483 symp->st_other = 0; 1484 symp->st_shndx = SHN_UNDEF; 1485 symp->st_value = 0; 1486 symp->st_size = 1487 ctf_type_size(idp->di_ctfp, idp->di_type); 1488 } 1489 1490 if (sip != NULL) { 1491 sip->dts_object = dmp->dm_name; 1492 sip->dts_name = idp->di_name; 1493 sip->dts_id = idp->di_id; 1494 } 1495 1496 return (0); 1497 } 1498 } 1499 1500 return (dt_set_errno(dtp, EDT_NOSYM)); 1501 } 1502 1503 /* 1504 * Exported interface to look up a symbol by address. We return the GElf_Sym 1505 * and complete symbol information for the matching symbol. 1506 */ 1507 int 1508 dtrace_lookup_by_addr(dtrace_hdl_t *dtp, GElf_Addr addr, 1509 GElf_Sym *symp, dtrace_syminfo_t *sip) 1510 { 1511 dt_module_t *dmp; 1512 uint_t id; 1513 const dtrace_vector_t *v = dtp->dt_vector; 1514 1515 if (v != NULL) 1516 return (v->dtv_lookup_by_addr(dtp->dt_varg, addr, symp, sip)); 1517 1518 for (dmp = dt_list_next(&dtp->dt_modlist); dmp != NULL; 1519 dmp = dt_list_next(dmp)) { 1520 if (addr - dmp->dm_text_va < dmp->dm_text_size || 1521 addr - dmp->dm_data_va < dmp->dm_data_size || 1522 addr - dmp->dm_bss_va < dmp->dm_bss_size) 1523 break; 1524 } 1525 1526 if (dmp == NULL) 1527 return (dt_set_errno(dtp, EDT_NOSYMADDR)); 1528 1529 if (dt_module_load(dtp, dmp) == -1) 1530 return (-1); /* dt_errno is set for us */ 1531 1532 if (symp != NULL) { 1533 if (dmp->dm_ops->do_symaddr(dmp, addr, symp, &id) == NULL) 1534 return (dt_set_errno(dtp, EDT_NOSYMADDR)); 1535 } 1536 1537 if (sip != NULL) { 1538 sip->dts_object = dmp->dm_name; 1539 1540 if (symp != NULL) { 1541 sip->dts_name = (const char *) 1542 dmp->dm_strtab.cts_data + symp->st_name; 1543 sip->dts_id = id; 1544 } else { 1545 sip->dts_name = NULL; 1546 sip->dts_id = 0; 1547 } 1548 } 1549 1550 return (0); 1551 } 1552 1553 int 1554 dtrace_lookup_by_type(dtrace_hdl_t *dtp, const char *object, const char *name, 1555 dtrace_typeinfo_t *tip) 1556 { 1557 dtrace_typeinfo_t ti; 1558 dt_module_t *dmp; 1559 int found = 0; 1560 ctf_id_t id; 1561 uint_t n, i; 1562 int justone; 1563 ctf_file_t *fp; 1564 char *buf, *p, *q; 1565 1566 uint_t mask = 0; /* mask of dt_module flags to match */ 1567 uint_t bits = 0; /* flag bits that must be present */ 1568 1569 if (object != DTRACE_OBJ_EVERY && 1570 object != DTRACE_OBJ_KMODS && 1571 object != DTRACE_OBJ_UMODS) { 1572 if ((dmp = dt_module_from_object(dtp, object)) == NULL) 1573 return (-1); /* dt_errno is set for us */ 1574 1575 if (dt_module_load(dtp, dmp) == -1) 1576 return (-1); /* dt_errno is set for us */ 1577 n = 1; 1578 justone = 1; 1579 } else { 1580 if (object == DTRACE_OBJ_KMODS) 1581 mask = bits = DT_DM_KERNEL; 1582 else if (object == DTRACE_OBJ_UMODS) 1583 mask = DT_DM_KERNEL; 1584 1585 dmp = dt_list_next(&dtp->dt_modlist); 1586 n = dtp->dt_nmods; 1587 justone = 0; 1588 } 1589 1590 if (tip == NULL) 1591 tip = &ti; 1592 1593 for (; n > 0; n--, dmp = dt_list_next(dmp)) { 1594 if ((dmp->dm_flags & mask) != bits) 1595 continue; /* failed to match required attributes */ 1596 1597 /* 1598 * If we can't load the CTF container, continue on to the next 1599 * module. If our search was scoped to only one module then 1600 * return immediately leaving dt_errno unmodified. 1601 */ 1602 if (dt_module_hasctf(dtp, dmp) == 0) { 1603 if (justone) 1604 return (-1); 1605 continue; 1606 } 1607 1608 /* 1609 * Look up the type in the module's CTF container. If our 1610 * match is a forward declaration tag, save this choice in 1611 * 'tip' and keep going in the hope that we will locate the 1612 * underlying structure definition. Otherwise just return. 1613 */ 1614 if (dmp->dm_pid == 0) { 1615 id = ctf_lookup_by_name(dmp->dm_ctfp, name); 1616 fp = dmp->dm_ctfp; 1617 } else { 1618 if ((p = strchr(name, '`')) != NULL) { 1619 buf = strdup(name); 1620 if (buf == NULL) 1621 return (dt_set_errno(dtp, EDT_NOMEM)); 1622 p = strchr(buf, '`'); 1623 if ((q = strchr(p + 1, '`')) != NULL) 1624 p = q; 1625 *p = '\0'; 1626 fp = dt_module_getctflib(dtp, dmp, buf); 1627 if (fp == NULL || (id = ctf_lookup_by_name(fp, 1628 p + 1)) == CTF_ERR) 1629 id = CTF_ERR; 1630 free(buf); 1631 } else { 1632 for (i = 0; i < dmp->dm_nctflibs; i++) { 1633 fp = dmp->dm_libctfp[i]; 1634 id = ctf_lookup_by_name(fp, name); 1635 if (id != CTF_ERR) 1636 break; 1637 } 1638 } 1639 } 1640 if (id != CTF_ERR) { 1641 tip->dtt_object = dmp->dm_name; 1642 tip->dtt_ctfp = fp; 1643 tip->dtt_type = id; 1644 if (ctf_type_kind(fp, ctf_type_resolve(fp, id)) != 1645 CTF_K_FORWARD) 1646 return (0); 1647 1648 found++; 1649 } 1650 } 1651 1652 if (found == 0) 1653 return (dt_set_errno(dtp, EDT_NOTYPE)); 1654 1655 return (0); 1656 } 1657 1658 int 1659 dtrace_symbol_type(dtrace_hdl_t *dtp, const GElf_Sym *symp, 1660 const dtrace_syminfo_t *sip, dtrace_typeinfo_t *tip) 1661 { 1662 dt_module_t *dmp; 1663 1664 tip->dtt_object = NULL; 1665 tip->dtt_ctfp = NULL; 1666 tip->dtt_type = CTF_ERR; 1667 tip->dtt_flags = 0; 1668 1669 if ((dmp = dt_module_lookup_by_name(dtp, sip->dts_object)) == NULL) 1670 return (dt_set_errno(dtp, EDT_NOMOD)); 1671 1672 if (symp->st_shndx == SHN_UNDEF && dmp->dm_extern != NULL) { 1673 dt_ident_t *idp = 1674 dt_idhash_lookup(dmp->dm_extern, sip->dts_name); 1675 1676 if (idp == NULL) 1677 return (dt_set_errno(dtp, EDT_NOSYM)); 1678 1679 tip->dtt_ctfp = idp->di_ctfp; 1680 tip->dtt_type = idp->di_type; 1681 1682 } else if (GELF_ST_TYPE(symp->st_info) != STT_FUNC) { 1683 if (dt_module_getctf(dtp, dmp) == NULL) 1684 return (-1); /* errno is set for us */ 1685 1686 tip->dtt_ctfp = dmp->dm_ctfp; 1687 tip->dtt_type = ctf_lookup_by_symbol(dmp->dm_ctfp, sip->dts_id); 1688 1689 if (tip->dtt_type == CTF_ERR) { 1690 dtp->dt_ctferr = ctf_errno(tip->dtt_ctfp); 1691 return (dt_set_errno(dtp, EDT_CTF)); 1692 } 1693 1694 } else { 1695 tip->dtt_ctfp = DT_FPTR_CTFP(dtp); 1696 tip->dtt_type = DT_FPTR_TYPE(dtp); 1697 } 1698 1699 tip->dtt_object = dmp->dm_name; 1700 return (0); 1701 } 1702 1703 static dtrace_objinfo_t * 1704 dt_module_info(const dt_module_t *dmp, dtrace_objinfo_t *dto) 1705 { 1706 dto->dto_name = dmp->dm_name; 1707 dto->dto_file = dmp->dm_file; 1708 dto->dto_id = dmp->dm_modid; 1709 dto->dto_flags = 0; 1710 1711 if (dmp->dm_flags & DT_DM_KERNEL) 1712 dto->dto_flags |= DTRACE_OBJ_F_KERNEL; 1713 if (dmp->dm_flags & DT_DM_PRIMARY) 1714 dto->dto_flags |= DTRACE_OBJ_F_PRIMARY; 1715 1716 dto->dto_text_va = dmp->dm_text_va; 1717 dto->dto_text_size = dmp->dm_text_size; 1718 dto->dto_data_va = dmp->dm_data_va; 1719 dto->dto_data_size = dmp->dm_data_size; 1720 dto->dto_bss_va = dmp->dm_bss_va; 1721 dto->dto_bss_size = dmp->dm_bss_size; 1722 1723 return (dto); 1724 } 1725 1726 int 1727 dtrace_object_iter(dtrace_hdl_t *dtp, dtrace_obj_f *func, void *data) 1728 { 1729 const dt_module_t *dmp = dt_list_next(&dtp->dt_modlist); 1730 dtrace_objinfo_t dto; 1731 int rv; 1732 1733 for (; dmp != NULL; dmp = dt_list_next(dmp)) { 1734 if ((rv = (*func)(dtp, dt_module_info(dmp, &dto), data)) != 0) 1735 return (rv); 1736 } 1737 1738 return (0); 1739 } 1740 1741 int 1742 dtrace_object_info(dtrace_hdl_t *dtp, const char *object, dtrace_objinfo_t *dto) 1743 { 1744 dt_module_t *dmp; 1745 1746 if (object == DTRACE_OBJ_EVERY || object == DTRACE_OBJ_KMODS || 1747 object == DTRACE_OBJ_UMODS || dto == NULL) 1748 return (dt_set_errno(dtp, EINVAL)); 1749 1750 if ((dmp = dt_module_from_object(dtp, object)) == NULL) 1751 return (-1); /* dt_errno is set for us */ 1752 1753 if (dt_module_load(dtp, dmp) == -1) 1754 return (-1); /* dt_errno is set for us */ 1755 1756 (void) dt_module_info(dmp, dto); 1757 return (0); 1758 } 1759