1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved. 23 * Copyright (c) 2013 by Delphix. All rights reserved. 24 * 25 * Copyright 2019 Joyent, Inc. 26 * Copyright 2025 Oxide Computer Company 27 */ 28 29 #include <kmdb/kmdb_kvm.h> 30 #include <kmdb/kvm.h> 31 #include <kmdb/kmdb_kdi.h> 32 #include <kmdb/kmdb_promif.h> 33 #include <kmdb/kmdb_module.h> 34 #include <kmdb/kmdb_asmutil.h> 35 #include <mdb/mdb_types.h> 36 #include <mdb/mdb_conf.h> 37 #include <mdb/mdb_err.h> 38 #include <mdb/mdb_modapi.h> 39 #include <mdb/mdb_target_impl.h> 40 #include <mdb/mdb_debug.h> 41 #include <mdb/mdb_string.h> 42 #include <mdb/mdb_ctf.h> 43 #include <mdb/mdb_kreg_impl.h> 44 #include <mdb/mdb_ks.h> 45 #include <mdb/mdb.h> 46 47 #include <strings.h> 48 #include <dlfcn.h> 49 #include <sys/isa_defs.h> 50 #include <sys/kobj.h> 51 #include <sys/kobj_impl.h> 52 #include <sys/bitmap.h> 53 #include <sys/uuid.h> 54 #include <vm/as.h> 55 56 static const char KMT_RTLD_NAME[] = "krtld"; 57 static const char KMT_MODULE[] = "mdb_ks"; 58 static const char KMT_CTFPARENT[] = "genunix"; 59 60 static mdb_list_t kmt_defbp_list; /* List of current deferred bp's */ 61 static int kmt_defbp_lock; /* For list, running kernel holds */ 62 static uint_t kmt_defbp_modchg_isload; /* Whether mod change is load/unload */ 63 static struct modctl *kmt_defbp_modchg_modctl; /* modctl for defbp checking */ 64 static uint_t kmt_defbp_num; /* Number of referenced def'd bp's */ 65 static int kmt_defbp_bpspec; /* vespec for def'd bp activation bp */ 66 67 static const mdb_se_ops_t kmt_brkpt_ops; 68 static const mdb_se_ops_t kmt_wapt_ops; 69 70 static void kmt_sync(mdb_tgt_t *); 71 72 typedef struct kmt_symarg { 73 mdb_tgt_sym_f *sym_cb; /* Caller's callback function */ 74 void *sym_data; /* Callback function argument */ 75 uint_t sym_type; /* Symbol type/binding filter */ 76 mdb_syminfo_t sym_info; /* Symbol id and table id */ 77 const char *sym_obj; /* Containing object */ 78 } kmt_symarg_t; 79 80 typedef struct kmt_maparg { 81 mdb_tgt_t *map_target; /* Target used for mapping iter */ 82 mdb_tgt_map_f *map_cb; /* Caller's callback function */ 83 void *map_data; /* Callback function argument */ 84 } kmt_maparg_t; 85 86 /*ARGSUSED*/ 87 int 88 kmt_setflags(mdb_tgt_t *t, int flags) 89 { 90 /* 91 * We only handle one flag (ALLOWIO), and we can't fail to set or clear 92 * it, so we just blindly replace the t_flags version with the one 93 * passed. 94 */ 95 t->t_flags = (t->t_flags & ~MDB_TGT_F_ALLOWIO) | 96 (flags & MDB_TGT_F_ALLOWIO); 97 98 return (0); 99 } 100 101 /*ARGSUSED*/ 102 const char * 103 kmt_name(mdb_tgt_t *t) 104 { 105 return ("kmdb_kvm"); 106 } 107 108 /*ARGSUSED*/ 109 static const char * 110 kmt_platform(mdb_tgt_t *t) 111 { 112 static char platform[SYS_NMLN]; 113 114 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT) 115 return (mdb_conf_platform()); 116 117 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, platform, 118 sizeof (platform), "unix", "platform") != sizeof (platform)) { 119 warn("'platform' symbol is missing from kernel\n"); 120 return ("unknown"); 121 } 122 123 return (platform); 124 } 125 126 static int 127 kmt_uname(mdb_tgt_t *t, struct utsname *utsp) 128 { 129 return (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, utsp, 130 sizeof (struct utsname), MDB_TGT_OBJ_EXEC, "utsname")); 131 } 132 133 /*ARGSUSED*/ 134 static int 135 kmt_dmodel(mdb_tgt_t *t) 136 { 137 return (MDB_TGT_MODEL_NATIVE); 138 } 139 140 /*ARGSUSED*/ 141 ssize_t 142 kmt_rw(mdb_tgt_t *t, void *buf, size_t nbytes, uint64_t addr, 143 ssize_t (*rw)(void *, size_t, uint64_t)) 144 { 145 /* 146 * chunksz needs to be volatile because of the use of setjmp() in this 147 * function. 148 */ 149 volatile size_t chunksz; 150 size_t n, ndone; 151 jmp_buf *oldpcb = NULL; 152 jmp_buf pcb; 153 ssize_t res; 154 155 kmdb_prom_check_interrupt(); 156 157 if (nbytes == 0) 158 return (0); 159 160 /* 161 * Try to process the entire buffer, as requested. If we catch a fault, 162 * try smaller chunks. This allows us to handle regions that cross 163 * mapping boundaries. 164 */ 165 chunksz = nbytes; 166 ndone = 0; 167 if (setjmp(pcb) != 0) { 168 if (chunksz == 1) { 169 /* We failed with the smallest chunk - give up */ 170 kmdb_dpi_restore_fault_hdlr(oldpcb); 171 return (ndone > 0 ? ndone : -1); /* errno set for us */ 172 } else if (chunksz > 4) 173 chunksz = 4; 174 else 175 chunksz = 1; 176 } 177 178 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb); 179 while (nbytes > 0) { 180 n = MIN(chunksz, nbytes); 181 182 if ((res = rw(buf, n, addr)) != n) 183 return (res < 0 ? res : ndone + res); 184 185 addr += n; 186 nbytes -= n; 187 ndone += n; 188 buf = ((caddr_t)buf + n); 189 } 190 191 kmdb_dpi_restore_fault_hdlr(oldpcb); 192 193 return (ndone); 194 } 195 196 static void 197 kmt_bcopy(const void *s1, void *s2, size_t n) 198 { 199 /* 200 * We need to guarantee atomic accesses for certain sizes. bcopy won't 201 * make that guarantee, so we need to do it ourselves. 202 */ 203 #ifdef _LP64 204 if (n == 8 && ((uintptr_t)s1 & 7) == 0 && ((uintptr_t)s2 & 7) == 0) 205 *(uint64_t *)s2 = *(uint64_t *)s1; 206 else 207 #endif 208 if (n == 4 && ((uintptr_t)s1 & 3) == 0 && ((uintptr_t)s2 & 3) == 0) 209 *(uint32_t *)s2 = *(uint32_t *)s1; 210 else if (n == 2 && ((uintptr_t)s1 & 1) == 0 && ((uintptr_t)s2 & 1) == 0) 211 *(uint16_t *)s2 = *(uint16_t *)s1; 212 else if (n == 1) 213 *(uint8_t *)s2 = *(uint8_t *)s1; 214 else 215 bcopy(s1, s2, n); 216 } 217 218 static ssize_t 219 kmt_reader(void *buf, size_t nbytes, uint64_t addr) 220 { 221 kmt_bcopy((void *)(uintptr_t)addr, buf, nbytes); 222 return (nbytes); 223 } 224 225 ssize_t 226 kmt_writer(void *buf, size_t nbytes, uint64_t addr) 227 { 228 kmt_bcopy(buf, (void *)(uintptr_t)addr, nbytes); 229 return (nbytes); 230 } 231 232 /*ARGSUSED*/ 233 static ssize_t 234 kmt_read(mdb_tgt_t *t, void *buf, size_t nbytes, uintptr_t addr) 235 { 236 /* 237 * We don't want to allow reads of I/O-mapped memory. Multi-page reads 238 * that cross into I/O-mapped memory should be restricted to the initial 239 * non-I/O region. Reads that begin in I/O-mapped memory are failed 240 * outright. 241 */ 242 if (!(t->t_flags & MDB_TGT_F_ALLOWIO) && 243 (nbytes = kmdb_kdi_range_is_nontoxic(addr, nbytes, 0)) == 0) 244 return (set_errno(EMDB_NOMAP)); 245 246 return (kmt_rw(t, buf, nbytes, addr, kmt_reader)); 247 } 248 249 /*ARGSUSED*/ 250 static ssize_t 251 kmt_pread(mdb_tgt_t *t, void *buf, size_t nbytes, physaddr_t addr) 252 { 253 return (kmt_rw(t, buf, nbytes, addr, kmdb_kdi_pread)); 254 } 255 256 /*ARGSUSED*/ 257 ssize_t 258 kmt_pwrite(mdb_tgt_t *t, const void *buf, size_t nbytes, physaddr_t addr) 259 { 260 return (kmt_rw(t, (void *)buf, nbytes, addr, kmdb_kdi_pwrite)); 261 } 262 263 static uintptr_t 264 kmt_read_kas(mdb_tgt_t *t) 265 { 266 GElf_Sym sym; 267 268 if (mdb_tgt_lookup_by_name(t, "unix", "kas", &sym, NULL) < 0) { 269 warn("'kas' symbol is missing from kernel\n"); 270 (void) set_errno(EMDB_NOSYM); 271 return (0); 272 } 273 274 return ((uintptr_t)sym.st_value); 275 } 276 277 static int 278 kmt_vtop(mdb_tgt_t *t, mdb_tgt_as_t as, uintptr_t va, physaddr_t *pap) 279 { 280 mdb_module_t *mod; 281 struct as *asp; 282 mdb_var_t *v; 283 284 switch ((uintptr_t)as) { 285 case (uintptr_t)MDB_TGT_AS_PHYS: 286 case (uintptr_t)MDB_TGT_AS_FILE: 287 case (uintptr_t)MDB_TGT_AS_IO: 288 return (set_errno(EINVAL)); 289 case (uintptr_t)MDB_TGT_AS_VIRT: 290 case (uintptr_t)MDB_TGT_AS_VIRT_I: 291 case (uintptr_t)MDB_TGT_AS_VIRT_S: 292 if ((asp = (struct as *)kmt_read_kas(t)) == NULL) 293 return (-1); /* errno is set for us */ 294 break; 295 default: 296 asp = (struct as *)as; 297 298 /* We don't support non-kas vtop */ 299 if (asp != (struct as *)kmt_read_kas(t)) 300 return (set_errno(EMDB_TGTNOTSUP)); 301 } 302 303 if (kmdb_prom_vtop(va, pap) == 0) 304 return (0); 305 306 if ((v = mdb_nv_lookup(&mdb.m_modules, "unix")) != NULL && 307 (mod = mdb_nv_get_cookie(v)) != NULL) { 308 int (*fptr)(uintptr_t, struct as *, physaddr_t *); 309 310 fptr = (int (*)(uintptr_t, struct as *, physaddr_t *)) 311 dlsym(mod->mod_hdl, "platform_vtop"); 312 313 if ((fptr != NULL) && ((*fptr)(va, asp, pap) == 0)) 314 return (0); 315 } 316 317 return (set_errno(EMDB_NOMAP)); 318 } 319 320 /*ARGSUSED*/ 321 static int 322 kmt_cpuregs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 323 { 324 const mdb_tgt_gregset_t *gregs; 325 intptr_t cpuid = DPI_MASTER_CPUID; 326 int i; 327 328 if (flags & DCMD_ADDRSPEC) { 329 if (argc != 0) 330 return (DCMD_USAGE); 331 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) { 332 (void) set_errno(EMDB_NOMAP); 333 mdb_warn("failed to find cpuid for cpu at %p", addr); 334 return (DCMD_ERR); 335 } 336 } 337 338 i = mdb_getopts(argc, argv, 339 'c', MDB_OPT_UINTPTR, &cpuid, 340 NULL); 341 342 argc -= i; 343 argv += i; 344 345 if (argc != 0) 346 return (DCMD_USAGE); 347 348 if ((gregs = kmdb_dpi_get_gregs(cpuid)) == NULL) { 349 warn("failed to retrieve registers for cpu %d", (int)cpuid); 350 return (DCMD_ERR); 351 } 352 353 kmt_printregs(gregs); 354 355 return (DCMD_OK); 356 } 357 358 static int 359 kmt_regs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 360 { 361 if (flags & DCMD_ADDRSPEC) 362 return (DCMD_USAGE); 363 364 return (kmt_cpuregs(addr, flags, argc, argv)); 365 } 366 367 static int 368 kmt_cpustack_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 369 { 370 intptr_t cpuid = DPI_MASTER_CPUID; 371 uint_t verbose = 0; 372 int i; 373 374 if (flags & DCMD_ADDRSPEC) { 375 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) { 376 (void) set_errno(EMDB_NOMAP); 377 mdb_warn("failed to find cpuid for cpu at %p", addr); 378 return (DCMD_ERR); 379 } 380 flags &= ~DCMD_ADDRSPEC; 381 } 382 383 i = mdb_getopts(argc, argv, 384 'c', MDB_OPT_UINTPTR, &cpuid, 385 'v', MDB_OPT_SETBITS, 1, &verbose, 386 NULL); 387 388 argc -= i; 389 argv += i; 390 391 return (kmt_cpustack(addr, flags, argc, argv, cpuid, verbose)); 392 } 393 394 /* 395 * Lasciate ogne speranza, voi ch'intrate. 396 */ 397 static int 398 kmt_call(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 399 { 400 uintptr_t *call_argv, rval; 401 int parse_strings = 1; 402 GElf_Sym sym; 403 jmp_buf *oldpcb = NULL; 404 jmp_buf pcb; 405 int i; 406 407 if (!(flags & DCMD_ADDRSPEC)) 408 return (DCMD_USAGE); 409 410 if (mdb_tgt_lookup_by_addr(mdb.m_target, addr, MDB_TGT_SYM_EXACT, 411 NULL, 0, &sym, NULL) == 0 && GELF_ST_TYPE(sym.st_info) != 412 STT_FUNC) { 413 warn("%a is not a function\n", addr); 414 return (DCMD_ERR); 415 } 416 417 if (argc > 1 && argv[0].a_type == MDB_TYPE_STRING && 418 strcmp(argv[0].a_un.a_str, "-s") == 0) { 419 parse_strings = 0; 420 argc--; 421 argv++; 422 } 423 424 call_argv = mdb_alloc(sizeof (uintptr_t) * argc, UM_SLEEP); 425 426 for (i = 0; i < argc; i++) { 427 switch (argv[i].a_type) { 428 case MDB_TYPE_STRING: 429 /* 430 * mdb_strtoull doesn't return on error, so we have to 431 * pre-check strings suspected to contain numbers. 432 */ 433 if (parse_strings && strisbasenum(argv[i].a_un.a_str)) { 434 call_argv[i] = (uintptr_t)mdb_strtoull( 435 argv[i].a_un.a_str); 436 } else 437 call_argv[i] = (uintptr_t)argv[i].a_un.a_str; 438 439 break; 440 441 case MDB_TYPE_IMMEDIATE: 442 call_argv[i] = argv[i].a_un.a_val; 443 break; 444 445 default: 446 mdb_free(call_argv, 447 sizeof (uintptr_t) * argc); 448 return (DCMD_USAGE); 449 } 450 } 451 452 if (setjmp(pcb) != 0) { 453 warn("call failed: caught a trap\n"); 454 455 kmdb_dpi_restore_fault_hdlr(oldpcb); 456 mdb_free(call_argv, sizeof (uintptr_t) * argc); 457 return (DCMD_ERR); 458 } 459 460 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb); 461 rval = kmdb_dpi_call(addr, argc, call_argv); 462 kmdb_dpi_restore_fault_hdlr(oldpcb); 463 464 if (flags & DCMD_PIPE_OUT) { 465 mdb_printf("%p\n", rval); 466 } else { 467 /* pretty-print the results */ 468 mdb_printf("%p = %a(", rval, addr); 469 for (i = 0; i < argc; i++) { 470 if (i > 0) 471 mdb_printf(", "); 472 if (argv[i].a_type == MDB_TYPE_STRING) { 473 /* I'm ashamed but amused */ 474 char *quote = &("\""[parse_strings && 475 strisbasenum(argv[i].a_un.a_str)]); 476 477 mdb_printf("%s%s%s", quote, argv[i].a_un.a_str, 478 quote); 479 } else 480 mdb_printf("%p", argv[i].a_un.a_val); 481 } 482 mdb_printf(");\n"); 483 } 484 485 mdb_free(call_argv, sizeof (uintptr_t) * argc); 486 487 return (DCMD_OK); 488 } 489 490 /*ARGSUSED*/ 491 int 492 kmt_dump_crumbs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 493 { 494 intptr_t cpu = -1; 495 496 if (flags & DCMD_ADDRSPEC) { 497 if (argc != 0) 498 return (DCMD_USAGE); 499 } else { 500 addr = 0; 501 502 if (mdb_getopts(argc, argv, 503 'c', MDB_OPT_UINTPTR, &cpu, 504 NULL) != argc) 505 return (DCMD_USAGE); 506 } 507 508 kmdb_dpi_dump_crumbs(addr, cpu); 509 510 return (DCMD_OK); 511 } 512 513 /*ARGSUSED*/ 514 static int 515 kmt_noducttape(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 516 { 517 int a = 0; 518 519 return (a/a); 520 } 521 522 static int 523 kmt_dmod_status(char *msg, int state) 524 { 525 kmdb_modctl_t *kmc; 526 mdb_var_t *v; 527 int first = 1, n = 0; 528 529 mdb_nv_rewind(&mdb.m_dmodctl); 530 while ((v = mdb_nv_advance(&mdb.m_dmodctl)) != NULL) { 531 kmc = MDB_NV_COOKIE(v); 532 533 if (kmc->kmc_state != state) 534 continue; 535 536 n++; 537 538 if (msg != NULL) { 539 if (first) { 540 mdb_printf(msg, NULL); 541 first = 0; 542 } 543 544 mdb_printf(" %s", kmc->kmc_modname); 545 } 546 } 547 548 if (!first && msg != NULL) 549 mdb_printf("\n"); 550 551 return (n); 552 } 553 554 /*ARGSUSED*/ 555 static int 556 kmt_status_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 557 { 558 struct utsname uts; 559 char uuid[UUID_PRINTABLE_STRING_LENGTH]; 560 kreg_t tt; 561 562 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, &uts, sizeof (uts), 563 "unix", "utsname") != sizeof (uts)) { 564 warn("failed to read 'utsname' struct from kernel\n"); 565 bzero(&uts, sizeof (uts)); 566 (void) strcpy(uts.nodename, "unknown machine"); 567 } 568 569 mdb_printf("debugging live kernel (%d-bit) on %s\n", 570 (int)(sizeof (void *) * NBBY), 571 (*uts.nodename == '\0' ? "(not set)" : uts.nodename)); 572 mdb_printf("operating system: %s %s (%s)\n", 573 uts.release, uts.version, uts.machine); 574 575 mdb_print_buildversion(); 576 577 if (mdb_readsym(uuid, sizeof (uuid), 578 "dump_osimage_uuid") == sizeof (uuid) && 579 uuid[sizeof (uuid) - 1] == '\0') { 580 mdb_printf("image uuid: %s\n", uuid[0] != '\0' ? 581 uuid : "(not set)"); 582 } 583 584 mdb_printf("DTrace state: %s\n", (kmdb_kdi_dtrace_get_state() == 585 KDI_DTSTATE_DTRACE_ACTIVE ? "active (debugger breakpoints cannot " 586 "be armed)" : "inactive")); 587 588 (void) kmdb_dpi_get_register("tt", &tt); 589 mdb_printf("stopped on: %s\n", kmt_trapname(tt)); 590 591 (void) kmt_dmod_status("pending dmod loads:", KMDB_MC_STATE_LOADING); 592 (void) kmt_dmod_status("pending dmod unloads:", 593 KMDB_MC_STATE_UNLOADING); 594 595 return (DCMD_OK); 596 } 597 598 /*ARGSUSED*/ 599 static int 600 kmt_switch(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 601 { 602 if (!(flags & DCMD_ADDRSPEC) || argc != 0) 603 return (DCMD_USAGE); 604 605 if (kmdb_dpi_switch_master((int)addr) < 0) { 606 warn("failed to switch to CPU %d", (int)addr); 607 return (DCMD_ERR); 608 } 609 610 return (DCMD_OK); 611 } 612 613 static void 614 kmt_stack_help(void) 615 { 616 mdb_printf( 617 "Options:\n" 618 " -n do not resolve addresses to names\n" 619 " -s show the size of each stack frame to the left\n" 620 " -t where CTF is present, show types for functions and " 621 "arguments\n" 622 " -v include frame pointer information (this is the default " 623 "for %<b>$C%</b>)\n" 624 "\n" 625 "If the optional %<u>cnt%</u> is given, no more than %<u>cnt%</u> " 626 "arguments are shown\nfor each stack frame.\n"); 627 } 628 629 static const mdb_dcmd_t kmt_dcmds[] = { 630 { "$c", "?[-nstv] [cnt]", "print stack backtrace", kmt_stack, 631 kmt_stack_help }, 632 { "$C", "?[-nstv] [cnt]", "print stack backtrace", kmt_stackv, 633 kmt_stack_help }, 634 { "$r", NULL, "print general-purpose registers", kmt_regs }, 635 { "$?", NULL, "print status and registers", kmt_regs }, 636 { ":x", ":", "change the active CPU", kmt_switch }, 637 { "call", ":[arg ...]", "call a kernel function", kmt_call }, 638 { "cpustack", "?[-v] [-c cpuid] [cnt]", "print stack backtrace for a " 639 "specific CPU", kmt_cpustack_dcmd }, 640 { "cpuregs", "?[-c cpuid]", "print general-purpose registers for a " 641 "specific CPU", kmt_cpuregs }, 642 { "crumbs", NULL, NULL, kmt_dump_crumbs }, 643 #if defined(__i386) || defined(__amd64) 644 { "in", ":[-L len]", "read from I/O port", kmt_in_dcmd }, 645 { "out", ":[-L len] val", "write to I/O port", kmt_out_dcmd }, 646 { "rdmsr", ":", "read an MSR", kmt_rdmsr }, 647 { "wrmsr", ": val", "write an MSR", kmt_wrmsr }, 648 { "rdpcicfg", ": bus dev func", "read a register in PCI config space", 649 kmt_rdpcicfg }, 650 { "wrpcicfg", ": bus dev func val", 651 "write a register in PCI config space", kmt_wrpcicfg }, 652 #endif 653 { "noducttape", NULL, NULL, kmt_noducttape }, 654 { "regs", NULL, "print general-purpose registers", kmt_regs }, 655 { "stack", "?[-nstv] [cnt]", "print stack backtrace", kmt_stack, 656 kmt_stack_help }, 657 { "stackregs", "?[-nstv] [cnt]", "print stack backtrace and registers", 658 kmt_stackr, kmt_stack_help }, 659 { "status", NULL, "print summary of current target", kmt_status_dcmd }, 660 { "switch", ":", "change the active CPU", kmt_switch }, 661 { NULL } 662 }; 663 664 static uintmax_t 665 kmt_reg_disc_get(const mdb_var_t *v) 666 { 667 mdb_tgt_reg_t r = 0; 668 669 (void) mdb_tgt_getareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), &r); 670 671 return (r); 672 } 673 674 static void 675 kmt_reg_disc_set(mdb_var_t *v, uintmax_t r) 676 { 677 if (mdb_tgt_putareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), r) == -1) 678 warn("failed to modify %%%s register", mdb_nv_get_name(v)); 679 } 680 681 static const mdb_nv_disc_t kmt_reg_disc = { 682 .disc_get = kmt_reg_disc_get, 683 .disc_set = kmt_reg_disc_set 684 }; 685 686 /*ARGSUSED*/ 687 static int 688 kmt_getareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, 689 mdb_tgt_reg_t *rp) 690 { 691 kreg_t val; 692 693 if (kmdb_dpi_get_register(rname, &val) < 0) 694 return (set_errno(EMDB_BADREG)); 695 696 *rp = val; 697 return (0); 698 } 699 700 /*ARGSUSED*/ 701 static int 702 kmt_putareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, mdb_tgt_reg_t r) 703 { 704 if (kmdb_dpi_set_register(rname, r) < 0) 705 return (set_errno(EMDB_BADREG)); 706 707 return (0); 708 } 709 710 static void 711 kmt_mod_destroy(kmt_module_t *km) 712 { 713 if (km->km_name != NULL) 714 strfree(km->km_name); 715 if (km->km_symtab != NULL) 716 mdb_gelf_symtab_destroy(km->km_symtab); 717 if (km->km_ctfp != NULL) 718 mdb_ctf_close(km->km_ctfp); 719 } 720 721 static kmt_module_t * 722 kmt_mod_create(mdb_tgt_t *t, struct modctl *ctlp, char *name) 723 { 724 kmt_module_t *km = mdb_zalloc(sizeof (kmt_module_t), UM_SLEEP); 725 struct module *mod; 726 727 km->km_name = mdb_alloc(strlen(name) + 1, UM_SLEEP); 728 (void) strcpy(km->km_name, name); 729 730 bcopy(ctlp, &km->km_modctl, sizeof (struct modctl)); 731 732 if (mdb_tgt_vread(t, &km->km_module, sizeof (struct module), 733 (uintptr_t)km->km_modctl.mod_mp) != sizeof (struct module)) 734 goto create_module_cleanup; 735 mod = &km->km_module; 736 737 if (mod->symhdr != NULL && mod->strhdr != NULL && mod->symtbl != NULL && 738 mod->strings != NULL) { 739 mdb_gelf_ehdr_to_gehdr(&mod->hdr, &km->km_ehdr); 740 741 km->km_symtab = mdb_gelf_symtab_create_raw(&km->km_ehdr, 742 mod->symhdr, mod->symtbl, mod->strhdr, mod->strings, 743 MDB_TGT_SYMTAB); 744 745 km->km_symtab_va = mod->symtbl; 746 km->km_strtab_va = mod->strings; 747 748 if (mdb_tgt_vread(t, &km->km_symtab_hdr, sizeof (Shdr), 749 (uintptr_t)mod->symhdr) != sizeof (Shdr) || 750 mdb_tgt_vread(t, &km->km_strtab_hdr, sizeof (Shdr), 751 (uintptr_t)mod->strhdr) != sizeof (Shdr)) 752 goto create_module_cleanup; 753 } 754 755 /* 756 * We don't want everyone rooting around in the module structure, so we 757 * make copies of the interesting members. 758 */ 759 km->km_text_va = (uintptr_t)mod->text; 760 km->km_text_size = mod->text_size; 761 km->km_data_va = (uintptr_t)mod->data; 762 km->km_data_size = mod->data_size; 763 km->km_bss_va = (uintptr_t)mod->bss; 764 km->km_bss_size = mod->bss_size; 765 km->km_ctf_va = mod->ctfdata; 766 km->km_ctf_size = mod->ctfsize; 767 768 if (mod->flags & KOBJ_PRIM) 769 km->km_flags |= KM_F_PRIMARY; 770 771 return (km); 772 773 create_module_cleanup: 774 warn("failed to read module %s\n", name); 775 kmt_mod_destroy(km); 776 return (NULL); 777 } 778 779 static void 780 kmt_mod_remove(kmt_data_t *kmt, kmt_module_t *km) 781 { 782 mdb_var_t *v = mdb_nv_lookup(&kmt->kmt_modules, km->km_name); 783 784 ASSERT(v != NULL); 785 786 mdb_dprintf(MDB_DBG_KMOD, "removing module %s\n", km->km_name); 787 788 mdb_list_delete(&kmt->kmt_modlist, km); 789 mdb_nv_remove(&kmt->kmt_modules, v); 790 kmt_mod_destroy(km); 791 } 792 793 static int 794 kmt_modlist_update_cb(struct modctl *modp, void *arg) 795 { 796 mdb_tgt_t *t = arg; 797 kmt_data_t *kmt = t->t_data; 798 kmt_module_t *km; 799 mdb_var_t *v; 800 char name[MAXNAMELEN]; 801 802 if (mdb_tgt_readstr(t, MDB_TGT_AS_VIRT, name, MAXNAMELEN, 803 (uintptr_t)modp->mod_modname) <= 0) { 804 warn("failed to read module name at %p", 805 (void *)modp->mod_modname); 806 } 807 808 /* We only care about modules that are actually loaded */ 809 if (!kmdb_kdi_mod_isloaded(modp)) 810 return (0); 811 812 /* 813 * Skip the modules we already know about and that haven't 814 * changed since last time we were here. 815 */ 816 if ((v = mdb_nv_lookup(&kmt->kmt_modules, name)) != NULL) { 817 km = MDB_NV_COOKIE(v); 818 819 if (kmdb_kdi_mod_haschanged(&km->km_modctl, &km->km_module, 820 modp, modp->mod_mp)) { 821 /* 822 * The module has changed since last we saw it. For 823 * safety, remove our old version, and treat it as a 824 * new module. 825 */ 826 mdb_dprintf(MDB_DBG_KMOD, "stutter module %s\n", name); 827 kmt_mod_remove(kmt, km); 828 } else { 829 km->km_seen = 1; 830 return (0); 831 } 832 } 833 834 mdb_dprintf(MDB_DBG_KMOD, "found new module %s\n", name); 835 836 if ((km = kmt_mod_create(t, modp, name)) != NULL) { 837 mdb_list_append(&kmt->kmt_modlist, km); 838 (void) mdb_nv_insert(&kmt->kmt_modules, name, NULL, 839 (uintptr_t)km, 0); 840 km->km_seen = 1; 841 } 842 843 return (0); 844 } 845 846 static void 847 kmt_modlist_update(mdb_tgt_t *t) 848 { 849 kmt_data_t *kmt = t->t_data; 850 kmt_module_t *km, *kmn; 851 852 if (kmdb_kdi_mod_iter(kmt_modlist_update_cb, t) < 0) { 853 warn("failed to complete update of kernel module list\n"); 854 return; 855 } 856 857 km = mdb_list_next(&kmt->kmt_modlist); 858 while (km != NULL) { 859 kmn = mdb_list_next(km); 860 861 if (km->km_seen == 1) { 862 /* Reset the mark for next time */ 863 km->km_seen = 0; 864 } else { 865 /* 866 * We didn't see it on the kernel's module list, so 867 * remove it from our view of the world. 868 */ 869 kmt_mod_remove(kmt, km); 870 } 871 872 km = kmn; 873 } 874 } 875 876 static void 877 kmt_periodic(mdb_tgt_t *t) 878 { 879 (void) mdb_tgt_status(t, &t->t_status); 880 } 881 882 int 883 kmt_lookup_by_addr(mdb_tgt_t *t, uintptr_t addr, uint_t flags, 884 char *buf, size_t nbytes, GElf_Sym *symp, mdb_syminfo_t *sip) 885 { 886 kmt_data_t *kmt = t->t_data; 887 kmt_module_t *km = mdb_list_next(&kmt->kmt_modlist); 888 kmt_module_t *sym_km = NULL; 889 kmt_module_t prmod; 890 GElf_Sym sym; 891 uint_t symid; 892 const char *name; 893 894 /* 895 * We look through the private symbols (if any), then through the module 896 * symbols. We can simplify the loop if we pretend the private symbols 897 * come from a module. 898 */ 899 if (mdb.m_prsym != NULL) { 900 bzero(&prmod, sizeof (kmt_module_t)); 901 prmod.km_name = "<<<prmod>>>"; 902 prmod.km_symtab = mdb.m_prsym; 903 prmod.km_list.ml_next = (mdb_list_t *)km; 904 km = &prmod; 905 } 906 907 /* Symbol resolution isn't available during initialization */ 908 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT) 909 return (set_errno(EMDB_NOSYM)); 910 911 for (; km != NULL; km = mdb_list_next(km)) { 912 if (km != &prmod && !kmt->kmt_symavail) 913 continue; 914 915 if (km->km_symtab == NULL) 916 continue; 917 918 if (mdb_gelf_symtab_lookup_by_addr(km->km_symtab, addr, flags, 919 buf, nbytes, symp, &sip->sym_id) != 0 || 920 symp->st_value == 0) 921 continue; 922 923 if (flags & MDB_TGT_SYM_EXACT) { 924 sym_km = km; 925 goto found; 926 } 927 928 /* 929 * If this is the first match we've found, or if this symbol is 930 * closer to the specified address than the last one we found, 931 * use it. 932 */ 933 if (sym_km == NULL || mdb_gelf_sym_closer(symp, &sym, addr)) { 934 sym_km = km; 935 sym = *symp; 936 symid = sip->sym_id; 937 } 938 } 939 940 /* 941 * kmdb dmods are normal kernel modules, loaded by krtld as such. To 942 * avoid polluting modinfo, and to keep from confusing the module 943 * subsystem (many dmods have the same names as real kernel modules), 944 * kmdb keeps their modctls separate, and doesn't allow their loading 945 * to be broadcast via the krtld module load/unload mechanism. As a 946 * result, kmdb_kvm doesn't find out about them, and can't turn their 947 * addresses into symbols. This can be most inconvenient during 948 * debugger faults, as the dmod frames will show up without names. 949 * We weren't able to turn the requested address into a symbol, so we'll 950 * take a spin through the dmods, trying to match our address against 951 * their symbols. 952 */ 953 if (sym_km == NULL) { 954 return (kmdb_module_lookup_by_addr(addr, flags, buf, nbytes, 955 symp, sip)); 956 } 957 958 *symp = sym; 959 sip->sym_id = symid; 960 961 found: 962 /* 963 * Once we've found something, copy the final name into the caller's 964 * buffer and prefix it with the load object name if appropriate. 965 */ 966 name = mdb_gelf_sym_name(sym_km->km_symtab, symp); 967 968 if (sym_km == &prmod) { 969 if (buf != NULL) { 970 (void) strncpy(buf, name, nbytes); 971 buf[nbytes - 1] = '\0'; 972 } 973 sip->sym_table = MDB_TGT_PRVSYM; 974 } else { 975 if (buf != NULL) { 976 if (sym_km->km_flags & KM_F_PRIMARY) { 977 (void) strncpy(buf, name, nbytes); 978 buf[nbytes - 1] = '\0'; 979 } else { 980 (void) mdb_snprintf(buf, nbytes, "%s`%s", 981 sym_km->km_name, name); 982 } 983 } 984 sip->sym_table = MDB_TGT_SYMTAB; 985 } 986 987 return (0); 988 } 989 990 static int 991 kmt_lookup_by_name(mdb_tgt_t *t, const char *obj, const char *name, 992 GElf_Sym *symp, mdb_syminfo_t *sip) 993 { 994 kmt_data_t *kmt = t->t_data; 995 kmt_module_t *km; 996 mdb_var_t *v; 997 GElf_Sym sym; 998 uint_t symid; 999 int n; 1000 1001 if (!kmt->kmt_symavail) 1002 return (set_errno(EMDB_NOSYM)); 1003 1004 switch ((uintptr_t)obj) { 1005 case (uintptr_t)MDB_TGT_OBJ_EXEC: 1006 case (uintptr_t)MDB_TGT_OBJ_EVERY: 1007 km = mdb_list_next(&kmt->kmt_modlist); 1008 n = mdb_nv_size(&kmt->kmt_modules); 1009 break; 1010 1011 case (uintptr_t)MDB_TGT_OBJ_RTLD: 1012 obj = kmt->kmt_rtld_name; 1013 /*FALLTHROUGH*/ 1014 1015 default: 1016 /* 1017 * If this is a request for a dmod symbol, let kmdb_module 1018 * handle it. 1019 */ 1020 if (obj != NULL && strncmp(obj, "DMOD`", 5) == 0) { 1021 return (kmdb_module_lookup_by_name(obj + 5, name, 1022 symp, sip)); 1023 } 1024 1025 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL) 1026 return (set_errno(EMDB_NOOBJ)); 1027 1028 km = mdb_nv_get_cookie(v); 1029 n = 1; 1030 } 1031 1032 /* 1033 * kmdb's kvm target is at a bit of a disadvantage compared to mdb's 1034 * kvm target when it comes to global symbol lookups. mdb has ksyms, 1035 * which hides pesky things like symbols that are undefined in unix, 1036 * but which are defined in genunix. We don't have such a facility - 1037 * we simply iterate through the modules, looking for a given symbol 1038 * in each. Unless we're careful, we'll return the undef in the 1039 * aforementioned case. 1040 */ 1041 for (; n > 0; n--, km = mdb_list_next(km)) { 1042 if (mdb_gelf_symtab_lookup_by_name(km->km_symtab, name, 1043 &sym, &symid) == 0 && sym.st_shndx != SHN_UNDEF) 1044 break; 1045 } 1046 1047 if (n == 0) 1048 return (set_errno(EMDB_NOSYM)); 1049 1050 bcopy(&sym, symp, sizeof (GElf_Sym)); 1051 sip->sym_id = symid; 1052 sip->sym_table = MDB_TGT_SYMTAB; 1053 1054 return (0); 1055 } 1056 1057 static int 1058 kmt_symtab_func(void *data, const GElf_Sym *sym, const char *name, uint_t id) 1059 { 1060 kmt_symarg_t *arg = data; 1061 1062 if (mdb_tgt_sym_match(sym, arg->sym_type)) { 1063 arg->sym_info.sym_id = id; 1064 1065 return (arg->sym_cb(arg->sym_data, sym, name, &arg->sym_info, 1066 arg->sym_obj)); 1067 } 1068 1069 return (0); 1070 } 1071 1072 static void 1073 kmt_symtab_iter(mdb_gelf_symtab_t *gst, uint_t type, const char *obj, 1074 mdb_tgt_sym_f *cb, void *p) 1075 { 1076 kmt_symarg_t arg; 1077 1078 arg.sym_cb = cb; 1079 arg.sym_data = p; 1080 arg.sym_type = type; 1081 arg.sym_info.sym_table = gst->gst_tabid; 1082 arg.sym_obj = obj; 1083 1084 mdb_gelf_symtab_iter(gst, kmt_symtab_func, &arg); 1085 } 1086 1087 static int 1088 kmt_symbol_iter(mdb_tgt_t *t, const char *obj, uint_t which, uint_t type, 1089 mdb_tgt_sym_f *cb, void *data) 1090 { 1091 kmt_data_t *kmt = t->t_data; 1092 kmt_module_t *km; 1093 1094 mdb_gelf_symtab_t *symtab = NULL; 1095 mdb_var_t *v; 1096 1097 if (which == MDB_TGT_DYNSYM) 1098 return (set_errno(EMDB_TGTNOTSUP)); 1099 1100 switch ((uintptr_t)obj) { 1101 case (uintptr_t)MDB_TGT_OBJ_EXEC: 1102 case (uintptr_t)MDB_TGT_OBJ_EVERY: 1103 mdb_nv_rewind(&kmt->kmt_modules); 1104 while ((v = mdb_nv_advance(&kmt->kmt_modules)) != NULL) { 1105 km = mdb_nv_get_cookie(v); 1106 1107 if (km->km_symtab != NULL) { 1108 kmt_symtab_iter(km->km_symtab, type, 1109 km->km_name, cb, data); 1110 } 1111 } 1112 return (0); 1113 1114 case (uintptr_t)MDB_TGT_OBJ_RTLD: 1115 obj = kmt->kmt_rtld_name; 1116 /*FALLTHROUGH*/ 1117 1118 default: 1119 if (strncmp(obj, "DMOD`", 5) == 0) { 1120 return (kmdb_module_symbol_iter(obj + 5, type, 1121 cb, data)); 1122 } 1123 1124 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL) 1125 return (set_errno(EMDB_NOOBJ)); 1126 km = mdb_nv_get_cookie(v); 1127 1128 symtab = km->km_symtab; 1129 } 1130 1131 if (symtab != NULL) 1132 kmt_symtab_iter(symtab, type, obj, cb, data); 1133 1134 return (0); 1135 } 1136 1137 static int 1138 kmt_mapping_walk(uintptr_t addr, const void *data, kmt_maparg_t *marg) 1139 { 1140 /* 1141 * This is a bit sketchy but avoids problematic compilation of this 1142 * target against the current VM implementation. Now that we have 1143 * vmem, we can make this less broken and more informative by changing 1144 * this code to invoke the vmem walker in the near future. 1145 */ 1146 const struct kmt_seg { 1147 caddr_t s_base; 1148 size_t s_size; 1149 } *segp = (const struct kmt_seg *)data; 1150 1151 mdb_map_t map; 1152 GElf_Sym sym; 1153 mdb_syminfo_t info; 1154 1155 map.map_base = (uintptr_t)segp->s_base; 1156 map.map_size = segp->s_size; 1157 map.map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X; 1158 1159 if (kmt_lookup_by_addr(marg->map_target, addr, MDB_TGT_SYM_EXACT, 1160 map.map_name, MDB_TGT_MAPSZ, &sym, &info) == -1) { 1161 1162 (void) mdb_iob_snprintf(map.map_name, MDB_TGT_MAPSZ, 1163 "%lr", addr); 1164 } 1165 1166 return (marg->map_cb(marg->map_data, &map, map.map_name)); 1167 } 1168 1169 static int 1170 kmt_mapping_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private) 1171 { 1172 kmt_maparg_t m; 1173 uintptr_t kas; 1174 1175 m.map_target = t; 1176 m.map_cb = func; 1177 m.map_data = private; 1178 1179 if ((kas = kmt_read_kas(t)) == 0) 1180 return (-1); /* errno is set for us */ 1181 1182 return (mdb_pwalk("seg", (mdb_walk_cb_t)kmt_mapping_walk, &m, kas)); 1183 } 1184 1185 static const mdb_map_t * 1186 kmt_mod_to_map(kmt_module_t *km, mdb_map_t *map) 1187 { 1188 (void) strncpy(map->map_name, km->km_name, MDB_TGT_MAPSZ); 1189 map->map_name[MDB_TGT_MAPSZ - 1] = '\0'; 1190 map->map_base = km->km_text_va; 1191 map->map_size = km->km_text_size; 1192 map->map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X; 1193 1194 return (map); 1195 } 1196 1197 static int 1198 kmt_object_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private) 1199 { 1200 kmt_data_t *kmt = t->t_data; 1201 kmt_module_t *km; 1202 mdb_map_t m; 1203 1204 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1205 km = mdb_list_next(km)) { 1206 if (func(private, kmt_mod_to_map(km, &m), km->km_name) == -1) 1207 break; 1208 } 1209 1210 return (0); 1211 } 1212 1213 static const mdb_map_t * 1214 kmt_addr_to_map(mdb_tgt_t *t, uintptr_t addr) 1215 { 1216 kmt_data_t *kmt = t->t_data; 1217 kmt_module_t *km; 1218 1219 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1220 km = mdb_list_next(km)) { 1221 if (addr - km->km_text_va < km->km_text_size || 1222 addr - km->km_data_va < km->km_data_size || 1223 addr - km->km_bss_va < km->km_bss_size) 1224 return (kmt_mod_to_map(km, &kmt->kmt_map)); 1225 } 1226 1227 (void) set_errno(EMDB_NOMAP); 1228 return (NULL); 1229 } 1230 1231 static kmt_module_t * 1232 kmt_module_by_name(kmt_data_t *kmt, const char *name) 1233 { 1234 kmt_module_t *km; 1235 1236 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1237 km = mdb_list_next(km)) { 1238 if (strcmp(name, km->km_name) == 0) 1239 return (km); 1240 } 1241 1242 return (NULL); 1243 } 1244 1245 static const mdb_map_t * 1246 kmt_name_to_map(mdb_tgt_t *t, const char *name) 1247 { 1248 kmt_data_t *kmt = t->t_data; 1249 kmt_module_t *km; 1250 mdb_map_t m; 1251 1252 /* 1253 * If name is MDB_TGT_OBJ_EXEC, return the first module on the list, 1254 * which will be unix since we keep kmt_modlist in load order. 1255 */ 1256 if (name == MDB_TGT_OBJ_EXEC) { 1257 return (kmt_mod_to_map(mdb_list_next(&kmt->kmt_modlist), 1258 &m)); 1259 } 1260 1261 if (name == MDB_TGT_OBJ_RTLD) 1262 name = kmt->kmt_rtld_name; 1263 1264 if ((km = kmt_module_by_name(kmt, name)) != NULL) 1265 return (kmt_mod_to_map(km, &m)); 1266 1267 (void) set_errno(EMDB_NOOBJ); 1268 return (NULL); 1269 } 1270 1271 static ctf_file_t * 1272 kmt_load_ctfdata(mdb_tgt_t *t, kmt_module_t *km) 1273 { 1274 kmt_data_t *kmt = t->t_data; 1275 int err; 1276 1277 if (km->km_ctfp != NULL) 1278 return (km->km_ctfp); 1279 1280 if (km->km_ctf_va == NULL || km->km_symtab == NULL) { 1281 (void) set_errno(EMDB_NOCTF); 1282 return (NULL); 1283 } 1284 1285 if ((km->km_ctfp = mdb_ctf_bufopen(km->km_ctf_va, km->km_ctf_size, 1286 km->km_symtab_va, &km->km_symtab_hdr, km->km_strtab_va, 1287 &km->km_strtab_hdr, &err)) == NULL) { 1288 (void) set_errno(ctf_to_errno(err)); 1289 return (NULL); 1290 } 1291 1292 mdb_dprintf(MDB_DBG_KMOD, "loaded %lu bytes of CTF data for %s\n", 1293 (ulong_t)km->km_ctf_size, km->km_name); 1294 1295 if (ctf_parent_name(km->km_ctfp) != NULL) { 1296 mdb_var_t *v; 1297 1298 if ((v = mdb_nv_lookup(&kmt->kmt_modules, 1299 ctf_parent_name(km->km_ctfp))) != NULL) { 1300 kmt_module_t *pm = mdb_nv_get_cookie(v); 1301 1302 if (pm->km_ctfp == NULL) 1303 (void) kmt_load_ctfdata(t, pm); 1304 1305 if (pm->km_ctfp != NULL && ctf_import(km->km_ctfp, 1306 pm->km_ctfp) == CTF_ERR) { 1307 warn("failed to import parent types into " 1308 "%s: %s\n", km->km_name, 1309 ctf_errmsg(ctf_errno(km->km_ctfp))); 1310 } 1311 } else { 1312 warn("failed to load CTF data for %s - parent %s not " 1313 "loaded\n", km->km_name, 1314 ctf_parent_name(km->km_ctfp)); 1315 } 1316 } 1317 1318 return (km->km_ctfp); 1319 } 1320 1321 ctf_file_t * 1322 kmt_addr_to_ctf(mdb_tgt_t *t, uintptr_t addr) 1323 { 1324 kmt_data_t *kmt = t->t_data; 1325 kmt_module_t *km; 1326 1327 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1328 km = mdb_list_next(km)) { 1329 if (addr - km->km_text_va < km->km_text_size || 1330 addr - km->km_data_va < km->km_data_size || 1331 addr - km->km_bss_va < km->km_bss_size) 1332 return (kmt_load_ctfdata(t, km)); 1333 } 1334 1335 return (kmdb_module_addr_to_ctf(addr)); 1336 } 1337 1338 ctf_file_t * 1339 kmt_name_to_ctf(mdb_tgt_t *t, const char *name) 1340 { 1341 kmt_data_t *kt = t->t_data; 1342 kmt_module_t *km; 1343 1344 if (name == MDB_TGT_OBJ_EXEC) { 1345 name = KMT_CTFPARENT; 1346 } else if (name == MDB_TGT_OBJ_RTLD) { 1347 name = kt->kmt_rtld_name; 1348 } else if (strncmp(name, "DMOD`", 5) == 0) { 1349 /* Request for CTF data for a DMOD symbol */ 1350 return (kmdb_module_name_to_ctf(name + 5)); 1351 } 1352 1353 if ((km = kmt_module_by_name(kt, name)) != NULL) 1354 return (kmt_load_ctfdata(t, km)); 1355 1356 (void) set_errno(EMDB_NOOBJ); 1357 return (NULL); 1358 } 1359 1360 /*ARGSUSED*/ 1361 static int 1362 kmt_status(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1363 { 1364 int state; 1365 1366 bzero(tsp, sizeof (mdb_tgt_status_t)); 1367 1368 switch ((state = kmdb_dpi_get_state(NULL))) { 1369 case DPI_STATE_INIT: 1370 tsp->st_state = MDB_TGT_RUNNING; 1371 tsp->st_pc = 0; 1372 break; 1373 1374 case DPI_STATE_STOPPED: 1375 tsp->st_state = MDB_TGT_STOPPED; 1376 1377 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1378 break; 1379 1380 case DPI_STATE_FAULTED: 1381 tsp->st_state = MDB_TGT_STOPPED; 1382 1383 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1384 1385 tsp->st_flags |= MDB_TGT_ISTOP; 1386 break; 1387 1388 case DPI_STATE_LOST: 1389 tsp->st_state = MDB_TGT_LOST; 1390 1391 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1392 break; 1393 } 1394 1395 mdb_dprintf(MDB_DBG_KMOD, "kmt_status, dpi: %d tsp: %d, pc = %p %A\n", 1396 state, tsp->st_state, (void *)tsp->st_pc, tsp->st_pc); 1397 1398 return (0); 1399 } 1400 1401 /* 1402 * Invoked when kmt_defbp_enter_debugger is called, this routine activates and 1403 * deactivates deferred breakpoints in response to module load and unload 1404 * events. 1405 */ 1406 /*ARGSUSED*/ 1407 static void 1408 kmt_defbp_event(mdb_tgt_t *t, int vid, void *private) 1409 { 1410 if (kmt_defbp_modchg_isload) { 1411 if (!mdb_tgt_sespec_activate_all(t) && 1412 (mdb.m_flags & MDB_FL_BPTNOSYMSTOP)) { 1413 /* 1414 * We weren't able to activate the breakpoints. 1415 * If so requested, we'll return without calling 1416 * continue, thus throwing the user into the debugger. 1417 */ 1418 return; 1419 } 1420 1421 } else { 1422 mdb_sespec_t *sep, *nsep; 1423 const mdb_map_t *map, *bpmap; 1424 mdb_map_t modmap; 1425 1426 if ((map = kmt_addr_to_map(t, 1427 (uintptr_t)kmt_defbp_modchg_modctl->mod_text)) == NULL) { 1428 warn("module unload notification for unknown module %s", 1429 kmt_defbp_modchg_modctl->mod_modname); 1430 return; /* drop into the debugger */ 1431 } 1432 1433 bcopy(map, &modmap, sizeof (mdb_map_t)); 1434 1435 for (sep = mdb_list_next(&t->t_active); sep; sep = nsep) { 1436 nsep = mdb_list_next(sep); 1437 1438 if (sep->se_ops == &kmt_brkpt_ops) { 1439 kmt_brkpt_t *kb = sep->se_data; 1440 1441 if ((bpmap = kmt_addr_to_map(t, 1442 kb->kb_addr)) == NULL || 1443 (bpmap->map_base == modmap.map_base && 1444 bpmap->map_size == modmap.map_size)) { 1445 mdb_tgt_sespec_idle_one(t, sep, 1446 EMDB_NOMAP); 1447 } 1448 } 1449 } 1450 } 1451 1452 (void) mdb_tgt_continue(t, NULL); 1453 } 1454 1455 static void 1456 kmt_defbp_enter_debugger(void) 1457 { 1458 /* 1459 * The debugger places a breakpoint here. We can't have a simple 1460 * nop function here, because GCC knows much more than we do, and 1461 * will optimize away the call to it. 1462 */ 1463 (void) get_fp(); 1464 } 1465 1466 /* 1467 * This routine is called while the kernel is running. It attempts to determine 1468 * whether any deferred breakpoints exist for the module being changed (loaded 1469 * or unloaded). If any such breakpoints exist, the debugger will be entered to 1470 * process them. 1471 */ 1472 static void 1473 kmt_defbp_modchg(struct modctl *mctl, int isload) 1474 { 1475 kmt_defbp_t *dbp; 1476 1477 kmt_defbp_lock = 1; 1478 1479 for (dbp = mdb_list_next(&kmt_defbp_list); dbp; 1480 dbp = mdb_list_next(dbp)) { 1481 if (!dbp->dbp_ref) 1482 continue; 1483 1484 if (strcmp(mctl->mod_modname, dbp->dbp_objname) == 0) { 1485 /* 1486 * Activate the breakpoint 1487 */ 1488 kmt_defbp_modchg_isload = isload; 1489 kmt_defbp_modchg_modctl = mctl; 1490 1491 kmt_defbp_enter_debugger(); 1492 break; 1493 } 1494 } 1495 1496 kmt_defbp_lock = 0; 1497 } 1498 1499 /*ARGSUSED*/ 1500 static int 1501 kmt_continue(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1502 { 1503 int n; 1504 1505 kmdb_dpi_resume(); 1506 1507 /* 1508 * The order of the following two calls is important. If there are 1509 * load acks on the work queue, we'll initialize the dmods they 1510 * represent. This will involve a call to _mdb_init, which may very 1511 * well result in a symbol lookup. If we haven't resynced our view 1512 * of symbols with the current state of the world, this lookup could 1513 * end very badly. We therefore make sure to sync before processing 1514 * the work queue. 1515 */ 1516 kmt_sync(t); 1517 kmdb_dpi_process_work_queue(); 1518 1519 if (kmdb_kdi_get_unload_request()) 1520 t->t_flags |= MDB_TGT_F_UNLOAD; 1521 1522 (void) mdb_tgt_status(t, &t->t_status); 1523 1524 if ((n = kmt_dmod_status(NULL, KMDB_MC_STATE_LOADING) + 1525 kmt_dmod_status(NULL, KMDB_MC_STATE_UNLOADING)) != 0) { 1526 mdb_warn("%d dmod load%c/unload%c pending\n", n, 1527 "s"[n == 1], "s"[n == 1]); 1528 } 1529 1530 return (0); 1531 } 1532 1533 /*ARGSUSED*/ 1534 static int 1535 kmt_step(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1536 { 1537 int rc; 1538 1539 if ((rc = kmdb_dpi_step()) == 0) 1540 (void) mdb_tgt_status(t, &t->t_status); 1541 1542 return (rc); 1543 } 1544 1545 static int 1546 kmt_defbp_activate(mdb_tgt_t *t) 1547 { 1548 kmdb_dpi_modchg_register(kmt_defbp_modchg); 1549 1550 /* 1551 * The routines that add and arm breakpoints will check for the proper 1552 * DTrace state, but they'll just put this breakpoint on the idle list 1553 * if DTrace is active. It'll correctly move to the active list when 1554 * DTrace deactivates, but that's insufficient for our purposes -- we 1555 * need to do extra processing at that point. We won't get to do said 1556 * processing with with a normal idle->active transition, so we just 1557 * won't add it add it until we're sure that it'll stick. 1558 */ 1559 1560 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1561 return (set_errno(EMDB_DTACTIVE)); 1562 1563 kmt_defbp_bpspec = mdb_tgt_add_vbrkpt(t, 1564 (uintptr_t)kmt_defbp_enter_debugger, 1565 MDB_TGT_SPEC_HIDDEN, kmt_defbp_event, NULL); 1566 1567 return (0); 1568 } 1569 1570 static void 1571 kmt_defbp_deactivate(mdb_tgt_t *t) 1572 { 1573 kmdb_dpi_modchg_cancel(); 1574 1575 if (kmt_defbp_bpspec != 0) { 1576 if (t != NULL) 1577 (void) mdb_tgt_vespec_delete(t, kmt_defbp_bpspec); 1578 1579 kmt_defbp_bpspec = 0; 1580 } 1581 } 1582 1583 static kmt_defbp_t * 1584 kmt_defbp_create(mdb_tgt_t *t, const char *objname, const char *symname) 1585 { 1586 kmt_defbp_t *dbp = mdb_alloc(sizeof (kmt_defbp_t), UM_SLEEP); 1587 1588 mdb_dprintf(MDB_DBG_KMOD, "defbp_create %s`%s\n", objname, symname); 1589 1590 dbp->dbp_objname = strdup(objname); 1591 dbp->dbp_symname = strdup(symname); 1592 dbp->dbp_ref = 1; 1593 1594 kmt_defbp_num++; 1595 1596 if (kmt_defbp_num == 1 || kmt_defbp_bpspec == 0) { 1597 if (kmt_defbp_activate(t) < 0) 1598 warn("failed to activate deferred breakpoints"); 1599 } 1600 1601 mdb_list_append(&kmt_defbp_list, dbp); 1602 1603 return (dbp); 1604 } 1605 1606 static void 1607 kmt_defbp_destroy(kmt_defbp_t *dbp) 1608 { 1609 mdb_dprintf(MDB_DBG_KMOD, "defbp_destroy %s`%s\n", dbp->dbp_objname, 1610 dbp->dbp_symname); 1611 1612 mdb_list_delete(&kmt_defbp_list, dbp); 1613 1614 strfree(dbp->dbp_objname); 1615 strfree(dbp->dbp_symname); 1616 mdb_free(dbp, sizeof (kmt_defbp_t)); 1617 } 1618 1619 static void 1620 kmt_defbp_prune_common(int all) 1621 { 1622 kmt_defbp_t *dbp, *ndbp; 1623 1624 /* We can't remove items from the list while the driver is using it. */ 1625 if (kmt_defbp_lock) 1626 return; 1627 1628 for (dbp = mdb_list_next(&kmt_defbp_list); dbp != NULL; dbp = ndbp) { 1629 ndbp = mdb_list_next(dbp); 1630 1631 if (!all && dbp->dbp_ref) 1632 continue; 1633 1634 kmt_defbp_destroy(dbp); 1635 } 1636 } 1637 1638 static void 1639 kmt_defbp_prune(void) 1640 { 1641 kmt_defbp_prune_common(0); 1642 } 1643 1644 static void 1645 kmt_defbp_destroy_all(void) 1646 { 1647 kmt_defbp_prune_common(1); 1648 } 1649 1650 static void 1651 kmt_defbp_delete(mdb_tgt_t *t, kmt_defbp_t *dbp) 1652 { 1653 dbp->dbp_ref = 0; 1654 1655 ASSERT(kmt_defbp_num > 0); 1656 kmt_defbp_num--; 1657 1658 if (kmt_defbp_num == 0) 1659 kmt_defbp_deactivate(t); 1660 1661 kmt_defbp_prune(); 1662 } 1663 1664 static int 1665 kmt_brkpt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1666 { 1667 mdb_tgt_status_t tsp; 1668 kmt_bparg_t *ka = args; 1669 kmt_brkpt_t *kb; 1670 GElf_Sym s; 1671 mdb_instr_t instr; 1672 1673 (void) mdb_tgt_status(t, &tsp); 1674 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED) 1675 return (set_errno(EMDB_NOPROC)); 1676 1677 if (ka->ka_symbol != NULL) { 1678 if (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, &s, NULL) == -1) { 1679 if (errno != EMDB_NOOBJ && !(errno == EMDB_NOSYM && 1680 !(mdb.m_flags & MDB_FL_BPTNOSYMSTOP))) { 1681 warn("breakpoint %s activation failed", 1682 ka->ka_symbol); 1683 } 1684 return (-1); /* errno is set for us */ 1685 } 1686 1687 ka->ka_addr = (uintptr_t)s.st_value; 1688 } 1689 1690 #ifdef __sparc 1691 if (ka->ka_addr & 3) 1692 return (set_errno(EMDB_BPALIGN)); 1693 #endif 1694 1695 if (mdb_vread(&instr, sizeof (instr), ka->ka_addr) != sizeof (instr)) 1696 return (-1); /* errno is set for us */ 1697 1698 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1699 warn("breakpoint will not arm until DTrace is inactive\n"); 1700 1701 kb = mdb_zalloc(sizeof (kmt_brkpt_t), UM_SLEEP); 1702 kb->kb_addr = ka->ka_addr; 1703 sep->se_data = kb; 1704 1705 return (0); 1706 } 1707 1708 /*ARGSUSED*/ 1709 static void 1710 kmt_brkpt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep) 1711 { 1712 mdb_free(sep->se_data, sizeof (kmt_brkpt_t)); 1713 } 1714 1715 /*ARGSUSED*/ 1716 static char * 1717 kmt_brkpt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 1718 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 1719 { 1720 uintptr_t addr = 0; 1721 1722 if (vep != NULL) { 1723 kmt_bparg_t *ka = vep->ve_args; 1724 1725 if (ka->ka_symbol != NULL) { 1726 (void) mdb_iob_snprintf(buf, nbytes, "stop at %s", 1727 ka->ka_symbol); 1728 } else { 1729 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a", 1730 ka->ka_addr); 1731 addr = ka->ka_addr; 1732 } 1733 1734 } else { 1735 addr = ((kmt_brkpt_t *)sep->se_data)->kb_addr; 1736 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a", addr); 1737 } 1738 1739 sp->spec_base = addr; 1740 sp->spec_size = sizeof (mdb_instr_t); 1741 1742 return (buf); 1743 } 1744 1745 static int 1746 kmt_brkpt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1747 { 1748 kmt_brkpt_t *kb = sep->se_data; 1749 kmt_bparg_t *ka = args; 1750 GElf_Sym sym; 1751 1752 if (ka->ka_symbol != NULL) { 1753 return (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, 1754 &sym, NULL) == 0 && sym.st_value == kb->kb_addr); 1755 } 1756 1757 return (ka->ka_addr == kb->kb_addr); 1758 } 1759 1760 /*ARGSUSED*/ 1761 static int 1762 kmt_brkpt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args) 1763 { 1764 kmt_bparg_t *ka1 = vep->ve_args; 1765 kmt_bparg_t *ka2 = args; 1766 1767 if (ka1->ka_symbol != NULL && ka2->ka_symbol != NULL) 1768 return (strcmp(ka1->ka_symbol, ka2->ka_symbol) == 0); 1769 1770 if (ka1->ka_symbol == NULL && ka2->ka_symbol == NULL) 1771 return (ka1->ka_addr == ka2->ka_addr); 1772 1773 return (0); /* fail if one is symbolic, other is an explicit address */ 1774 } 1775 1776 static int 1777 kmt_brkpt_arm(mdb_tgt_t *t, mdb_sespec_t *sep) 1778 { 1779 kmt_data_t *kmt = t->t_data; 1780 kmt_brkpt_t *kb = sep->se_data; 1781 int rv; 1782 1783 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1784 return (set_errno(EMDB_DTACTIVE)); 1785 1786 if ((rv = kmdb_dpi_brkpt_arm(kb->kb_addr, &kb->kb_oinstr)) != 0) 1787 return (rv); 1788 1789 if (kmt->kmt_narmedbpts++ == 0) 1790 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_ACTIVATE); 1791 1792 return (0); 1793 } 1794 1795 static int 1796 kmt_brkpt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep) 1797 { 1798 kmt_data_t *kmt = t->t_data; 1799 kmt_brkpt_t *kb = sep->se_data; 1800 int rv; 1801 1802 ASSERT(kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_KMDB_BPT_ACTIVE); 1803 1804 if ((rv = kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr)) != 0) 1805 return (rv); 1806 1807 if (--kmt->kmt_narmedbpts == 0) 1808 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_DEACTIVATE); 1809 1810 return (0); 1811 } 1812 1813 /* 1814 * Determine whether the specified sespec is an armed watchpoint that overlaps 1815 * with the given breakpoint and has the given flags set. We use this to find 1816 * conflicts with breakpoints, below. 1817 */ 1818 static int 1819 kmt_wp_overlap(mdb_sespec_t *sep, kmt_brkpt_t *kb, int flags) 1820 { 1821 const kmdb_wapt_t *wp = sep->se_data; 1822 1823 return (sep->se_state == MDB_TGT_SPEC_ARMED && 1824 sep->se_ops == &kmt_wapt_ops && (wp->wp_wflags & flags) && 1825 kb->kb_addr - wp->wp_addr < wp->wp_size); 1826 } 1827 1828 /* 1829 * We step over breakpoints using our single-stepper. If a conflicting 1830 * watchpoint is present, we must temporarily remove it before stepping over the 1831 * breakpoint so we don't immediately re-trigger the watchpoint. We know the 1832 * watchpoint has already triggered on our trap instruction as part of fetching 1833 * it. Before we return, we must re-install any disabled watchpoints. 1834 */ 1835 static int 1836 kmt_brkpt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 1837 { 1838 kmt_brkpt_t *kb = sep->se_data; 1839 int status = -1; 1840 int error; 1841 1842 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 1843 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X)) 1844 (void) kmdb_dpi_wapt_disarm(sep->se_data); 1845 } 1846 1847 if (kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr) == 0 && 1848 kmt_step(t, tsp) == 0) 1849 status = kmt_status(t, tsp); 1850 1851 error = errno; /* save errno from disarm, step, or status */ 1852 1853 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 1854 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X)) 1855 kmdb_dpi_wapt_arm(sep->se_data); 1856 } 1857 1858 (void) set_errno(error); 1859 return (status); 1860 } 1861 1862 /*ARGSUSED*/ 1863 static int 1864 kmt_brkpt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 1865 { 1866 kmt_brkpt_t *kb = sep->se_data; 1867 int state, why; 1868 kreg_t pc; 1869 1870 state = kmdb_dpi_get_state(&why); 1871 (void) kmdb_dpi_get_register("pc", &pc); 1872 1873 return (state == DPI_STATE_FAULTED && why == DPI_STATE_WHY_BKPT && 1874 pc == kb->kb_addr); 1875 } 1876 1877 static const mdb_se_ops_t kmt_brkpt_ops = { 1878 .se_ctor = kmt_brkpt_ctor, 1879 .se_dtor = kmt_brkpt_dtor, 1880 .se_info = kmt_brkpt_info, 1881 .se_secmp = kmt_brkpt_secmp, 1882 .se_vecmp = kmt_brkpt_vecmp, 1883 .se_arm = kmt_brkpt_arm, 1884 .se_disarm = kmt_brkpt_disarm, 1885 .se_cont = kmt_brkpt_cont, 1886 .se_match = kmt_brkpt_match, 1887 }; 1888 1889 static int 1890 kmt_wapt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1891 { 1892 mdb_tgt_status_t tsp; 1893 kmdb_wapt_t *vwp = args; 1894 kmdb_wapt_t *swp; 1895 1896 (void) mdb_tgt_status(t, &tsp); 1897 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED) 1898 return (set_errno(EMDB_NOPROC)); 1899 1900 swp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP); 1901 bcopy(vwp, swp, sizeof (kmdb_wapt_t)); 1902 1903 if (kmdb_dpi_wapt_reserve(swp) < 0) { 1904 mdb_free(swp, sizeof (kmdb_wapt_t)); 1905 return (-1); /* errno is set for us */ 1906 } 1907 1908 sep->se_data = swp; 1909 1910 return (0); 1911 } 1912 1913 /*ARGSUSED*/ 1914 static void 1915 kmt_wapt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep) 1916 { 1917 kmdb_wapt_t *wp = sep->se_data; 1918 1919 kmdb_dpi_wapt_release(wp); 1920 mdb_free(wp, sizeof (kmdb_wapt_t)); 1921 } 1922 1923 /*ARGSUSED*/ 1924 static char * 1925 kmt_wapt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 1926 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 1927 { 1928 kmdb_wapt_t *wp = vep != NULL ? vep->ve_args : sep->se_data; 1929 const char *fmt; 1930 char desc[24]; 1931 1932 ASSERT(wp->wp_wflags != 0); 1933 desc[0] = '\0'; 1934 1935 switch (wp->wp_wflags) { 1936 case MDB_TGT_WA_R: 1937 (void) strcat(desc, "/read"); 1938 break; 1939 case MDB_TGT_WA_W: 1940 (void) strcat(desc, "/write"); 1941 break; 1942 case MDB_TGT_WA_X: 1943 (void) strcat(desc, "/exec"); 1944 break; 1945 default: 1946 if (wp->wp_wflags & MDB_TGT_WA_R) 1947 (void) strcat(desc, "/r"); 1948 if (wp->wp_wflags & MDB_TGT_WA_W) 1949 (void) strcat(desc, "/w"); 1950 if (wp->wp_wflags & MDB_TGT_WA_X) 1951 (void) strcat(desc, "/x"); 1952 } 1953 1954 switch (wp->wp_type) { 1955 case DPI_WAPT_TYPE_PHYS: 1956 fmt = "stop on %s of phys [%p, %p)"; 1957 break; 1958 1959 case DPI_WAPT_TYPE_VIRT: 1960 fmt = "stop on %s of [%la, %la)"; 1961 break; 1962 1963 case DPI_WAPT_TYPE_IO: 1964 if (wp->wp_size == 1) 1965 fmt = "stop on %s of I/O port %p"; 1966 else 1967 fmt = "stop on %s of I/O port [%p, %p)"; 1968 break; 1969 1970 default: 1971 fmt = "stop on %s of unknown [%p, %p]"; 1972 break; 1973 } 1974 1975 (void) mdb_iob_snprintf(buf, nbytes, fmt, desc + 1, wp->wp_addr, 1976 wp->wp_addr + wp->wp_size); 1977 1978 sp->spec_base = wp->wp_addr; 1979 sp->spec_size = wp->wp_size; 1980 1981 return (buf); 1982 } 1983 1984 /*ARGSUSED*/ 1985 static int 1986 kmt_wapt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1987 { 1988 kmdb_wapt_t *wp1 = sep->se_data; 1989 kmdb_wapt_t *wp2 = args; 1990 1991 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size && 1992 wp1->wp_wflags == wp2->wp_wflags); 1993 } 1994 1995 /*ARGSUSED*/ 1996 static int 1997 kmt_wapt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args) 1998 { 1999 kmdb_wapt_t *wp1 = vep->ve_args; 2000 kmdb_wapt_t *wp2 = args; 2001 2002 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size && 2003 wp1->wp_wflags == wp2->wp_wflags); 2004 } 2005 2006 /*ARGSUSED*/ 2007 static int 2008 kmt_wapt_arm(mdb_tgt_t *t, mdb_sespec_t *sep) 2009 { 2010 kmdb_dpi_wapt_arm(sep->se_data); 2011 2012 return (0); 2013 } 2014 2015 /*ARGSUSED*/ 2016 static int 2017 kmt_wapt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep) 2018 { 2019 kmdb_dpi_wapt_disarm(sep->se_data); 2020 2021 return (0); 2022 } 2023 2024 /* 2025 * Determine whether the specified sespec is an armed breakpoint at the given 2026 * %pc. We use this to find conflicts with watchpoints below. 2027 */ 2028 static int 2029 kmt_bp_overlap(mdb_sespec_t *sep, uintptr_t pc) 2030 { 2031 kmt_brkpt_t *kb = sep->se_data; 2032 2033 return (sep->se_state == MDB_TGT_SPEC_ARMED && 2034 sep->se_ops == &kmt_brkpt_ops && kb->kb_addr == pc); 2035 } 2036 2037 /* 2038 * We step over watchpoints using our single-stepper. If a conflicting 2039 * breakpoint is present, we must temporarily disarm it before stepping over 2040 * the watchpoint so we do not immediately re-trigger the breakpoint. This is 2041 * similar to the case handled in kmt_brkpt_cont(), above. 2042 */ 2043 static int 2044 kmt_wapt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2045 { 2046 mdb_sespec_t *bep = NULL; 2047 int status = -1; 2048 int error, why; 2049 2050 /* 2051 * If we stopped for anything other than a watchpoint, check to see 2052 * if there's a breakpoint here. 2053 */ 2054 if (!(kmdb_dpi_get_state(&why) == DPI_STATE_FAULTED && 2055 (why == DPI_STATE_WHY_V_WAPT || why == DPI_STATE_WHY_P_WAPT))) { 2056 kreg_t pc; 2057 2058 (void) kmdb_dpi_get_register("pc", &pc); 2059 2060 for (bep = mdb_list_next(&t->t_active); bep != NULL; 2061 bep = mdb_list_next(bep)) { 2062 if (kmt_bp_overlap(bep, pc)) { 2063 (void) bep->se_ops->se_disarm(t, bep); 2064 bep->se_state = MDB_TGT_SPEC_ACTIVE; 2065 break; 2066 } 2067 } 2068 } 2069 2070 kmdb_dpi_wapt_disarm(sep->se_data); 2071 if (kmt_step(t, tsp) == 0) 2072 status = kmt_status(t, tsp); 2073 2074 error = errno; /* save errno from step or status */ 2075 2076 if (bep != NULL) 2077 mdb_tgt_sespec_arm_one(t, bep); 2078 2079 (void) set_errno(error); 2080 return (status); 2081 } 2082 2083 /*ARGSUSED*/ 2084 static int 2085 kmt_wapt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2086 { 2087 return (kmdb_dpi_wapt_match(sep->se_data)); 2088 } 2089 2090 static const mdb_se_ops_t kmt_wapt_ops = { 2091 .se_ctor = kmt_wapt_ctor, 2092 .se_dtor = kmt_wapt_dtor, 2093 .se_info = kmt_wapt_info, 2094 .se_secmp = kmt_wapt_secmp, 2095 .se_vecmp = kmt_wapt_vecmp, 2096 .se_arm = kmt_wapt_arm, 2097 .se_disarm = kmt_wapt_disarm, 2098 .se_cont = kmt_wapt_cont, 2099 .se_match = kmt_wapt_match, 2100 }; 2101 2102 /*ARGSUSED*/ 2103 static int 2104 kmt_trap_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 2105 { 2106 sep->se_data = args; /* trap number */ 2107 2108 return (0); 2109 } 2110 2111 /*ARGSUSED*/ 2112 static char * 2113 kmt_trap_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 2114 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 2115 { 2116 const char *name; 2117 int trapnum; 2118 2119 if (vep != NULL) 2120 trapnum = (intptr_t)vep->ve_args; 2121 else 2122 trapnum = (intptr_t)sep->se_data; 2123 2124 if (trapnum == KMT_TRAP_ALL) 2125 name = "any trap"; 2126 else if (trapnum == KMT_TRAP_NOTENUM) 2127 name = "miscellaneous trap"; 2128 else 2129 name = kmt_trapname(trapnum); 2130 2131 (void) mdb_iob_snprintf(buf, nbytes, "single-step stop on %s", name); 2132 2133 return (buf); 2134 } 2135 2136 /*ARGSUSED2*/ 2137 static int 2138 kmt_trap_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2139 { 2140 int spectt = (intptr_t)sep->se_data; 2141 kmt_data_t *kmt = t->t_data; 2142 kreg_t tt; 2143 2144 (void) kmdb_dpi_get_register("tt", &tt); 2145 2146 switch (spectt) { 2147 case KMT_TRAP_ALL: 2148 return (1); 2149 case KMT_TRAP_NOTENUM: 2150 return (tt > kmt->kmt_trapmax || 2151 !BT_TEST(kmt->kmt_trapmap, tt)); 2152 default: 2153 return (tt == spectt); 2154 } 2155 } 2156 2157 static const mdb_se_ops_t kmt_trap_ops = { 2158 .se_ctor = kmt_trap_ctor, 2159 .se_dtor = no_se_dtor, 2160 .se_info = kmt_trap_info, 2161 .se_secmp = no_se_secmp, 2162 .se_vecmp = no_se_vecmp, 2163 .se_arm = no_se_arm, 2164 .se_disarm = no_se_disarm, 2165 .se_cont = no_se_cont, 2166 .se_match = kmt_trap_match, 2167 }; 2168 2169 static void 2170 kmt_bparg_dtor(mdb_vespec_t *vep) 2171 { 2172 kmt_bparg_t *ka = vep->ve_args; 2173 2174 if (ka->ka_symbol != NULL) 2175 strfree(ka->ka_symbol); 2176 2177 if (ka->ka_defbp != NULL) 2178 kmt_defbp_delete(mdb.m_target, ka->ka_defbp); 2179 2180 mdb_free(ka, sizeof (kmt_bparg_t)); 2181 } 2182 2183 static int 2184 kmt_add_vbrkpt(mdb_tgt_t *t, uintptr_t addr, 2185 int spec_flags, mdb_tgt_se_f *func, void *data) 2186 { 2187 kmt_bparg_t *ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP); 2188 2189 ka->ka_addr = addr; 2190 ka->ka_symbol = NULL; 2191 ka->ka_defbp = NULL; 2192 2193 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags, 2194 func, data, ka, kmt_bparg_dtor)); 2195 } 2196 2197 static int 2198 kmt_add_sbrkpt(mdb_tgt_t *t, const char *fullname, 2199 int spec_flags, mdb_tgt_se_f *func, void *data) 2200 { 2201 kmt_bparg_t *ka; 2202 kmt_defbp_t *dbp; 2203 GElf_Sym sym; 2204 char *tick, *objname, *symname; 2205 int serrno; 2206 2207 if ((tick = strchr(fullname, '`')) == fullname) { 2208 (void) set_errno(EMDB_NOOBJ); 2209 return (0); 2210 } 2211 2212 /* 2213 * Deferred breakpoints are always scoped. If we didn't find a tick, 2214 * there's no scope. We'll create a vbrkpt, but only if we can turn the 2215 * provided string into an address. 2216 */ 2217 if (tick == NULL) { 2218 uintptr_t addr; 2219 2220 if (strisbasenum(fullname)) { 2221 addr = mdb_strtoull(fullname); /* a bare address */ 2222 } else if (mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EVERY, 2223 fullname, &sym, NULL) < 0) { 2224 (void) set_errno(EMDB_NOSYM); 2225 return (0); 2226 } else { 2227 addr = (uintptr_t)sym.st_value; /* unscoped sym name */ 2228 } 2229 2230 return (kmt_add_vbrkpt(t, addr, spec_flags, func, data)); 2231 } 2232 2233 if (*(tick + 1) == '\0') { 2234 (void) set_errno(EMDB_NOSYM); 2235 return (0); 2236 } 2237 2238 objname = strndup(fullname, tick - fullname); 2239 symname = tick + 1; 2240 2241 if (mdb_tgt_lookup_by_name(t, objname, symname, NULL, NULL) < 0 && 2242 errno != EMDB_NOOBJ) { 2243 serrno = errno; 2244 strfree(objname); 2245 2246 (void) set_errno(serrno); 2247 return (0); /* errno is set for us */ 2248 } 2249 2250 dbp = kmt_defbp_create(t, objname, symname); 2251 strfree(objname); 2252 2253 ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP); 2254 ka->ka_symbol = strdup(fullname); 2255 ka->ka_addr = 0; 2256 ka->ka_defbp = dbp; 2257 2258 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags, 2259 func, data, ka, kmt_bparg_dtor)); 2260 } 2261 2262 static int 2263 kmt_wparg_overlap(const kmdb_wapt_t *wp1, const kmdb_wapt_t *wp2) 2264 { 2265 /* Assume the watchpoint spaces don't overlap */ 2266 if (wp1->wp_type != wp2->wp_type) 2267 return (0); 2268 2269 if (wp2->wp_addr + wp2->wp_size <= wp1->wp_addr) 2270 return (0); /* no range overlap */ 2271 2272 if (wp1->wp_addr + wp1->wp_size <= wp2->wp_addr) 2273 return (0); /* no range overlap */ 2274 2275 return (wp1->wp_addr != wp2->wp_addr || wp1->wp_size != wp2->wp_size || 2276 wp1->wp_wflags != wp2->wp_wflags); 2277 } 2278 2279 static void 2280 kmt_wparg_dtor(mdb_vespec_t *vep) 2281 { 2282 mdb_free(vep->ve_args, sizeof (kmdb_wapt_t)); 2283 } 2284 2285 static int 2286 kmt_add_wapt_common(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2287 int spec_flags, mdb_tgt_se_f *func, void *data, int type) 2288 { 2289 kmdb_wapt_t *wp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP); 2290 mdb_sespec_t *sep; 2291 2292 wp->wp_addr = addr; 2293 wp->wp_size = len; 2294 wp->wp_type = type; 2295 wp->wp_wflags = wflags; 2296 2297 if (kmdb_dpi_wapt_validate(wp) < 0) 2298 return (0); /* errno is set for us */ 2299 2300 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 2301 if (sep->se_ops == &kmt_wapt_ops && 2302 mdb_list_next(&sep->se_velist) != NULL && 2303 kmt_wparg_overlap(wp, sep->se_data)) 2304 goto wapt_dup; 2305 } 2306 2307 for (sep = mdb_list_next(&t->t_idle); sep; sep = mdb_list_next(sep)) { 2308 if (sep->se_ops == &kmt_wapt_ops && kmt_wparg_overlap(wp, 2309 ((mdb_vespec_t *)mdb_list_next(&sep->se_velist))->ve_args)) 2310 goto wapt_dup; 2311 } 2312 2313 return (mdb_tgt_vespec_insert(t, &kmt_wapt_ops, spec_flags, 2314 func, data, wp, kmt_wparg_dtor)); 2315 2316 wapt_dup: 2317 mdb_free(wp, sizeof (kmdb_wapt_t)); 2318 (void) set_errno(EMDB_WPDUP); 2319 return (0); 2320 } 2321 2322 static int 2323 kmt_add_pwapt(mdb_tgt_t *t, physaddr_t addr, size_t len, uint_t wflags, 2324 int spec_flags, mdb_tgt_se_f *func, void *data) 2325 { 2326 return (kmt_add_wapt_common(t, (uintptr_t)addr, len, wflags, spec_flags, 2327 func, data, DPI_WAPT_TYPE_PHYS)); 2328 } 2329 2330 static int 2331 kmt_add_vwapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2332 int spec_flags, mdb_tgt_se_f *func, void *data) 2333 { 2334 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func, 2335 data, DPI_WAPT_TYPE_VIRT)); 2336 } 2337 2338 static int 2339 kmt_add_iowapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2340 int spec_flags, mdb_tgt_se_f *func, void *data) 2341 { 2342 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func, 2343 data, DPI_WAPT_TYPE_IO)); 2344 } 2345 2346 static int 2347 kmt_add_trap(mdb_tgt_t *t, int trapnum, int spec_flags, mdb_tgt_se_f *func, 2348 void *data) 2349 { 2350 kmt_data_t *kmt = t->t_data; 2351 2352 if (trapnum != KMT_TRAP_ALL && trapnum != KMT_TRAP_NOTENUM) { 2353 if (trapnum < 0 || trapnum > kmt->kmt_trapmax) { 2354 (void) set_errno(EMDB_BADFLTNUM); 2355 return (0); 2356 } 2357 2358 BT_SET(kmt->kmt_trapmap, trapnum); 2359 } 2360 2361 return (mdb_tgt_vespec_insert(t, &kmt_trap_ops, spec_flags, func, data, 2362 (void *)(uintptr_t)trapnum, no_ve_dtor)); 2363 } 2364 2365 /*ARGSUSED*/ 2366 static uintmax_t 2367 kmt_cpuid_disc_get(const mdb_var_t *v) 2368 { 2369 return (kmdb_dpi_get_master_cpuid()); 2370 } 2371 2372 static const mdb_nv_disc_t kmt_cpuid_disc = { 2373 .disc_get = kmt_cpuid_disc_get 2374 }; 2375 2376 /* 2377 * This routine executes while the kernel is running. 2378 */ 2379 void 2380 kmt_activate(mdb_tgt_t *t) 2381 { 2382 kmt_data_t *kmt = t->t_data; 2383 2384 mdb_prop_postmortem = FALSE; 2385 mdb_prop_kernel = TRUE; 2386 2387 (void) mdb_tgt_register_dcmds(t, &kmt_dcmds[0], MDB_MOD_FORCE); 2388 mdb_tgt_register_regvars(t, kmt->kmt_rds, &kmt_reg_disc, 0); 2389 2390 /* 2391 * Force load of the MDB krtld module, in case it's been rolled into 2392 * unix. 2393 */ 2394 (void) mdb_module_load(KMT_RTLD_NAME, MDB_MOD_SILENT | MDB_MOD_DEFER); 2395 } 2396 2397 static void 2398 kmt_destroy(mdb_tgt_t *t) 2399 { 2400 kmt_data_t *kmt = t->t_data; 2401 kmt_module_t *km, *pkm; 2402 2403 mdb_nv_destroy(&kmt->kmt_modules); 2404 for (km = mdb_list_prev(&kmt->kmt_modlist); km != NULL; km = pkm) { 2405 pkm = mdb_list_prev(km); 2406 mdb_free(km, sizeof (kmt_module_t)); 2407 } 2408 2409 if (!kmt_defbp_lock) 2410 kmt_defbp_destroy_all(); 2411 2412 if (kmt->kmt_trapmap != NULL) 2413 mdb_free(kmt->kmt_trapmap, BT_SIZEOFMAP(kmt->kmt_trapmax)); 2414 2415 mdb_free(kmt, sizeof (kmt_data_t)); 2416 } 2417 2418 static const mdb_tgt_ops_t kmt_ops = { 2419 .t_setflags = kmt_setflags, 2420 .t_setcontext = (int (*)())(uintptr_t)mdb_tgt_notsup, 2421 .t_activate = kmt_activate, 2422 .t_deactivate = (void (*)())(uintptr_t)mdb_tgt_nop, 2423 .t_periodic = kmt_periodic, 2424 .t_destroy = kmt_destroy, 2425 .t_name = kmt_name, 2426 .t_isa = (const char *(*)())mdb_conf_isa, 2427 .t_platform = kmt_platform, 2428 .t_uname = kmt_uname, 2429 .t_dmodel = kmt_dmodel, 2430 .t_aread = (ssize_t (*)())mdb_tgt_notsup, 2431 .t_awrite = (ssize_t (*)())mdb_tgt_notsup, 2432 .t_vread = kmt_read, 2433 .t_vwrite = kmt_write, 2434 .t_pread = kmt_pread, 2435 .t_pwrite = kmt_pwrite, 2436 .t_fread = kmt_read, 2437 .t_fwrite = kmt_write, 2438 .t_ioread = kmt_ioread, 2439 .t_iowrite = kmt_iowrite, 2440 .t_vtop = kmt_vtop, 2441 .t_lookup_by_name = kmt_lookup_by_name, 2442 .t_lookup_by_addr = kmt_lookup_by_addr, 2443 .t_symbol_iter = kmt_symbol_iter, 2444 .t_mapping_iter = kmt_mapping_iter, 2445 .t_object_iter = kmt_object_iter, 2446 .t_addr_to_map = kmt_addr_to_map, 2447 .t_name_to_map = kmt_name_to_map, 2448 .t_addr_to_ctf = kmt_addr_to_ctf, 2449 .t_name_to_ctf = kmt_name_to_ctf, 2450 .t_status = kmt_status, 2451 .t_run = (int (*)())(uintptr_t)mdb_tgt_notsup, 2452 .t_step = kmt_step, 2453 .t_step_out = kmt_step_out, 2454 .t_next = kmt_next, 2455 .t_cont = kmt_continue, 2456 .t_signal = (int (*)())(uintptr_t)mdb_tgt_notsup, 2457 .t_add_vbrkpt = kmt_add_vbrkpt, 2458 .t_add_sbrkpt = kmt_add_sbrkpt, 2459 .t_add_pwapt = kmt_add_pwapt, 2460 .t_add_vwapt = kmt_add_vwapt, 2461 .t_add_iowapt = kmt_add_iowapt, 2462 .t_add_sysenter = (int (*)())(uintptr_t)mdb_tgt_null, 2463 .t_add_sysexit = (int (*)())(uintptr_t)mdb_tgt_null, 2464 .t_add_signal = (int (*)())(uintptr_t)mdb_tgt_null, 2465 .t_add_fault = kmt_add_trap, 2466 .t_getareg = kmt_getareg, 2467 .t_putareg = kmt_putareg, 2468 .t_stack_iter = (int (*)())(uintptr_t)mdb_tgt_nop, /* XXX */ 2469 .t_auxv = (int (*)())(uintptr_t)mdb_tgt_notsup, 2470 .t_thread_name = (int (*)())(uintptr_t)mdb_tgt_notsup, 2471 }; 2472 2473 /* 2474 * Called immediately upon resumption of the system after a step or continue. 2475 * Allows us to synchronize kmt's view of the world with reality. 2476 */ 2477 /*ARGSUSED*/ 2478 static void 2479 kmt_sync(mdb_tgt_t *t) 2480 { 2481 kmt_data_t *kmt = t->t_data; 2482 int symavail; 2483 2484 mdb_dprintf(MDB_DBG_KMOD, "synchronizing with kernel\n"); 2485 2486 symavail = kmt->kmt_symavail; 2487 kmt->kmt_symavail = FALSE; 2488 2489 /* 2490 * Resync our view of the world if the modules have changed, or if we 2491 * didn't have any symbols coming into this function. The latter will 2492 * only happen on startup. 2493 */ 2494 if (kmdb_kdi_mods_changed() || !symavail) 2495 kmt_modlist_update(t); 2496 2497 /* 2498 * It would be nice if we could run this less frequently, perhaps 2499 * after a dvec-initiated trigger. 2500 */ 2501 kmdb_module_sync(); 2502 2503 kmt->kmt_symavail = TRUE; 2504 2505 mdb_dprintf(MDB_DBG_KMOD, "synchronization complete\n"); 2506 2507 kmt_defbp_prune(); 2508 2509 if (kmt_defbp_num > 0 && kmt_defbp_bpspec == 0 && 2510 kmdb_kdi_dtrace_get_state() != KDI_DTSTATE_DTRACE_ACTIVE) { 2511 /* 2512 * Deferred breakpoints were created while DTrace was active, 2513 * and consequently the deferred breakpoint enabling mechanism 2514 * wasn't activated. Activate it now, and then try to activate 2515 * the deferred breakpoints. We do this so that we can catch 2516 * the ones which may apply to modules that have been loaded 2517 * while they were waiting for DTrace to deactivate. 2518 */ 2519 (void) kmt_defbp_activate(t); 2520 (void) mdb_tgt_sespec_activate_all(t); 2521 } 2522 2523 (void) mdb_tgt_status(t, &t->t_status); 2524 } 2525 2526 /* 2527 * This routine executes while the kernel is running. 2528 */ 2529 /*ARGSUSED*/ 2530 int 2531 kmdb_kvm_create(mdb_tgt_t *t, int argc, const char *argv[]) 2532 { 2533 kmt_data_t *kmt; 2534 2535 if (argc != 0) 2536 return (set_errno(EINVAL)); 2537 2538 kmt = mdb_zalloc(sizeof (kmt_data_t), UM_SLEEP); 2539 t->t_data = kmt; 2540 t->t_ops = &kmt_ops; 2541 t->t_flags |= MDB_TGT_F_RDWR; /* kmdb is always r/w */ 2542 2543 (void) mdb_nv_insert(&mdb.m_nv, "cpuid", &kmt_cpuid_disc, 0, 2544 MDB_NV_PERSIST | MDB_NV_RDONLY); 2545 2546 (void) mdb_nv_create(&kmt->kmt_modules, UM_SLEEP); 2547 2548 kmt_init_isadep(t); 2549 2550 kmt->kmt_symavail = FALSE; 2551 2552 bzero(&kmt_defbp_list, sizeof (mdb_list_t)); 2553 2554 return (0); 2555 } 2556 2557 /* 2558 * This routine is called once, when kmdb first has control of the world. 2559 */ 2560 void 2561 kmdb_kvm_startup(void) 2562 { 2563 kmt_data_t *kmt = mdb.m_target->t_data; 2564 2565 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm startup\n"); 2566 2567 kmt_sync(mdb.m_target); 2568 (void) mdb_module_load_builtin(KMT_MODULE); 2569 kmt_startup_isadep(mdb.m_target); 2570 2571 /* 2572 * This is here because we need to write the deferred breakpoint 2573 * breakpoint when the debugger starts. Our normal r/o write routines 2574 * don't work when the kernel is running, so we have to do it during 2575 * startup. 2576 */ 2577 (void) mdb_tgt_sespec_activate_all(mdb.m_target); 2578 2579 kmt->kmt_rtld_name = KMT_RTLD_NAME; 2580 2581 if (kmt_module_by_name(kmt, KMT_RTLD_NAME) == NULL) 2582 kmt->kmt_rtld_name = "unix"; 2583 } 2584 2585 /* 2586 * This routine is called after kmdb has loaded its initial set of modules. 2587 */ 2588 void 2589 kmdb_kvm_poststartup(void) 2590 { 2591 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm post-startup\n"); 2592 2593 (void) mdb_dis_select(kmt_def_dismode()); 2594 } 2595