1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved. 23 * Copyright (c) 2013 by Delphix. All rights reserved. 24 * 25 * Copyright 2019 Joyent, Inc. 26 * Copyright 2025 Oxide Computer Company 27 */ 28 29 #include <kmdb/kmdb_kvm.h> 30 #include <kmdb/kvm.h> 31 #include <kmdb/kmdb_kdi.h> 32 #include <kmdb/kmdb_promif.h> 33 #include <kmdb/kmdb_module.h> 34 #include <kmdb/kmdb_asmutil.h> 35 #include <mdb/mdb_types.h> 36 #include <mdb/mdb_conf.h> 37 #include <mdb/mdb_err.h> 38 #include <mdb/mdb_modapi.h> 39 #include <mdb/mdb_target_impl.h> 40 #include <mdb/mdb_debug.h> 41 #include <mdb/mdb_string.h> 42 #include <mdb/mdb_ctf.h> 43 #include <mdb/mdb_kreg_impl.h> 44 #include <mdb/mdb_ks.h> 45 #include <mdb/mdb.h> 46 47 #include <strings.h> 48 #include <dlfcn.h> 49 #include <sys/isa_defs.h> 50 #include <sys/kobj.h> 51 #include <sys/kobj_impl.h> 52 #include <sys/bitmap.h> 53 #include <sys/uuid.h> 54 #include <vm/as.h> 55 56 static const char KMT_RTLD_NAME[] = "krtld"; 57 static const char KMT_MODULE[] = "mdb_ks"; 58 static const char KMT_CTFPARENT[] = "genunix"; 59 60 static mdb_list_t kmt_defbp_list; /* List of current deferred bp's */ 61 static int kmt_defbp_lock; /* For list, running kernel holds */ 62 static uint_t kmt_defbp_modchg_isload; /* Whether mod change is load/unload */ 63 static struct modctl *kmt_defbp_modchg_modctl; /* modctl for defbp checking */ 64 static uint_t kmt_defbp_num; /* Number of referenced def'd bp's */ 65 static int kmt_defbp_bpspec; /* vespec for def'd bp activation bp */ 66 67 static const mdb_se_ops_t kmt_brkpt_ops; 68 static const mdb_se_ops_t kmt_wapt_ops; 69 70 static void kmt_sync(mdb_tgt_t *); 71 72 typedef struct kmt_symarg { 73 mdb_tgt_sym_f *sym_cb; /* Caller's callback function */ 74 void *sym_data; /* Callback function argument */ 75 uint_t sym_type; /* Symbol type/binding filter */ 76 mdb_syminfo_t sym_info; /* Symbol id and table id */ 77 const char *sym_obj; /* Containing object */ 78 } kmt_symarg_t; 79 80 typedef struct kmt_maparg { 81 mdb_tgt_t *map_target; /* Target used for mapping iter */ 82 mdb_tgt_map_f *map_cb; /* Caller's callback function */ 83 void *map_data; /* Callback function argument */ 84 } kmt_maparg_t; 85 86 /*ARGSUSED*/ 87 int 88 kmt_setflags(mdb_tgt_t *t, int flags) 89 { 90 /* 91 * We only handle one flag (ALLOWIO), and we can't fail to set or clear 92 * it, so we just blindly replace the t_flags version with the one 93 * passed. 94 */ 95 t->t_flags = (t->t_flags & ~MDB_TGT_F_ALLOWIO) | 96 (flags & MDB_TGT_F_ALLOWIO); 97 98 return (0); 99 } 100 101 /*ARGSUSED*/ 102 const char * 103 kmt_name(mdb_tgt_t *t) 104 { 105 return ("kmdb_kvm"); 106 } 107 108 /*ARGSUSED*/ 109 static const char * 110 kmt_platform(mdb_tgt_t *t) 111 { 112 static char platform[SYS_NMLN]; 113 114 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT) 115 return (mdb_conf_platform()); 116 117 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, platform, 118 sizeof (platform), "unix", "platform") != sizeof (platform)) { 119 warn("'platform' symbol is missing from kernel\n"); 120 return ("unknown"); 121 } 122 123 return (platform); 124 } 125 126 static int 127 kmt_uname(mdb_tgt_t *t, struct utsname *utsp) 128 { 129 return (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, utsp, 130 sizeof (struct utsname), MDB_TGT_OBJ_EXEC, "utsname")); 131 } 132 133 /*ARGSUSED*/ 134 static int 135 kmt_dmodel(mdb_tgt_t *t) 136 { 137 return (MDB_TGT_MODEL_NATIVE); 138 } 139 140 /*ARGSUSED*/ 141 ssize_t 142 kmt_rw(mdb_tgt_t *t, void *buf, size_t nbytes, uint64_t addr, 143 ssize_t (*rw)(void *, size_t, uint64_t)) 144 { 145 /* 146 * chunksz needs to be volatile because of the use of setjmp() in this 147 * function. 148 */ 149 volatile size_t chunksz; 150 size_t n, ndone; 151 jmp_buf *oldpcb = NULL; 152 jmp_buf pcb; 153 ssize_t res; 154 155 kmdb_prom_check_interrupt(); 156 157 if (nbytes == 0) 158 return (0); 159 160 /* 161 * Try to process the entire buffer, as requested. If we catch a fault, 162 * try smaller chunks. This allows us to handle regions that cross 163 * mapping boundaries. 164 */ 165 chunksz = nbytes; 166 ndone = 0; 167 if (setjmp(pcb) != 0) { 168 if (chunksz == 1) { 169 /* We failed with the smallest chunk - give up */ 170 kmdb_dpi_restore_fault_hdlr(oldpcb); 171 return (ndone > 0 ? ndone : -1); /* errno set for us */ 172 } else if (chunksz > 4) 173 chunksz = 4; 174 else 175 chunksz = 1; 176 } 177 178 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb); 179 while (nbytes > 0) { 180 n = MIN(chunksz, nbytes); 181 182 if ((res = rw(buf, n, addr)) != n) 183 return (res < 0 ? res : ndone + res); 184 185 addr += n; 186 nbytes -= n; 187 ndone += n; 188 buf = ((caddr_t)buf + n); 189 } 190 191 kmdb_dpi_restore_fault_hdlr(oldpcb); 192 193 return (ndone); 194 } 195 196 static void 197 kmt_bcopy(const void *s1, void *s2, size_t n) 198 { 199 /* 200 * We need to guarantee atomic accesses for certain sizes. bcopy won't 201 * make that guarantee, so we need to do it ourselves. 202 */ 203 #ifdef _LP64 204 if (n == 8 && ((uintptr_t)s1 & 7) == 0 && ((uintptr_t)s2 & 7) == 0) 205 *(uint64_t *)s2 = *(uint64_t *)s1; 206 else 207 #endif 208 if (n == 4 && ((uintptr_t)s1 & 3) == 0 && ((uintptr_t)s2 & 3) == 0) 209 *(uint32_t *)s2 = *(uint32_t *)s1; 210 else if (n == 2 && ((uintptr_t)s1 & 1) == 0 && ((uintptr_t)s2 & 1) == 0) 211 *(uint16_t *)s2 = *(uint16_t *)s1; 212 else if (n == 1) 213 *(uint8_t *)s2 = *(uint8_t *)s1; 214 else 215 bcopy(s1, s2, n); 216 } 217 218 static ssize_t 219 kmt_reader(void *buf, size_t nbytes, uint64_t addr) 220 { 221 kmt_bcopy((void *)(uintptr_t)addr, buf, nbytes); 222 return (nbytes); 223 } 224 225 ssize_t 226 kmt_writer(void *buf, size_t nbytes, uint64_t addr) 227 { 228 kmt_bcopy(buf, (void *)(uintptr_t)addr, nbytes); 229 return (nbytes); 230 } 231 232 /*ARGSUSED*/ 233 static ssize_t 234 kmt_read(mdb_tgt_t *t, void *buf, size_t nbytes, uintptr_t addr) 235 { 236 /* 237 * We don't want to allow reads of I/O-mapped memory. Multi-page reads 238 * that cross into I/O-mapped memory should be restricted to the initial 239 * non-I/O region. Reads that begin in I/O-mapped memory are failed 240 * outright. 241 */ 242 if (!(t->t_flags & MDB_TGT_F_ALLOWIO) && 243 (nbytes = kmdb_kdi_range_is_nontoxic(addr, nbytes, 0)) == 0) 244 return (set_errno(EMDB_NOMAP)); 245 246 return (kmt_rw(t, buf, nbytes, addr, kmt_reader)); 247 } 248 249 /*ARGSUSED*/ 250 static ssize_t 251 kmt_pread(mdb_tgt_t *t, void *buf, size_t nbytes, physaddr_t addr) 252 { 253 return (kmt_rw(t, buf, nbytes, addr, kmdb_kdi_pread)); 254 } 255 256 /*ARGSUSED*/ 257 ssize_t 258 kmt_pwrite(mdb_tgt_t *t, const void *buf, size_t nbytes, physaddr_t addr) 259 { 260 return (kmt_rw(t, (void *)buf, nbytes, addr, kmdb_kdi_pwrite)); 261 } 262 263 static uintptr_t 264 kmt_read_kas(mdb_tgt_t *t) 265 { 266 GElf_Sym sym; 267 268 if (mdb_tgt_lookup_by_name(t, "unix", "kas", &sym, NULL) < 0) { 269 warn("'kas' symbol is missing from kernel\n"); 270 (void) set_errno(EMDB_NOSYM); 271 return (0); 272 } 273 274 return ((uintptr_t)sym.st_value); 275 } 276 277 static int 278 kmt_vtop(mdb_tgt_t *t, mdb_tgt_as_t as, uintptr_t va, physaddr_t *pap) 279 { 280 mdb_module_t *mod; 281 struct as *asp; 282 mdb_var_t *v; 283 284 switch ((uintptr_t)as) { 285 case (uintptr_t)MDB_TGT_AS_PHYS: 286 case (uintptr_t)MDB_TGT_AS_FILE: 287 case (uintptr_t)MDB_TGT_AS_IO: 288 return (set_errno(EINVAL)); 289 case (uintptr_t)MDB_TGT_AS_VIRT: 290 case (uintptr_t)MDB_TGT_AS_VIRT_I: 291 case (uintptr_t)MDB_TGT_AS_VIRT_S: 292 if ((asp = (struct as *)kmt_read_kas(t)) == NULL) 293 return (-1); /* errno is set for us */ 294 break; 295 default: 296 asp = (struct as *)as; 297 298 /* We don't support non-kas vtop */ 299 if (asp != (struct as *)kmt_read_kas(t)) 300 return (set_errno(EMDB_TGTNOTSUP)); 301 } 302 303 if (kmdb_prom_vtop(va, pap) == 0) 304 return (0); 305 306 if ((v = mdb_nv_lookup(&mdb.m_modules, "unix")) != NULL && 307 (mod = mdb_nv_get_cookie(v)) != NULL) { 308 int (*fptr)(uintptr_t, struct as *, physaddr_t *); 309 310 fptr = (int (*)(uintptr_t, struct as *, physaddr_t *)) 311 dlsym(mod->mod_hdl, "platform_vtop"); 312 313 if ((fptr != NULL) && ((*fptr)(va, asp, pap) == 0)) 314 return (0); 315 } 316 317 return (set_errno(EMDB_NOMAP)); 318 } 319 320 /*ARGSUSED*/ 321 static int 322 kmt_cpuregs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 323 { 324 const mdb_tgt_gregset_t *gregs; 325 intptr_t cpuid = DPI_MASTER_CPUID; 326 int i; 327 328 if (flags & DCMD_ADDRSPEC) { 329 if (argc != 0) 330 return (DCMD_USAGE); 331 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) { 332 (void) set_errno(EMDB_NOMAP); 333 mdb_warn("failed to find cpuid for cpu at %p", addr); 334 return (DCMD_ERR); 335 } 336 } 337 338 i = mdb_getopts(argc, argv, 339 'c', MDB_OPT_UINTPTR, &cpuid, 340 NULL); 341 342 argc -= i; 343 argv += i; 344 345 if (argc != 0) 346 return (DCMD_USAGE); 347 348 if ((gregs = kmdb_dpi_get_gregs(cpuid)) == NULL) { 349 warn("failed to retrieve registers for cpu %d", (int)cpuid); 350 return (DCMD_ERR); 351 } 352 353 kmt_printregs(gregs); 354 355 return (DCMD_OK); 356 } 357 358 static int 359 kmt_regs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 360 { 361 if (flags & DCMD_ADDRSPEC) 362 return (DCMD_USAGE); 363 364 return (kmt_cpuregs(addr, flags, argc, argv)); 365 } 366 367 static int 368 kmt_cpustack_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 369 { 370 intptr_t cpuid = DPI_MASTER_CPUID; 371 uint_t verbose = 0; 372 int i; 373 374 if (flags & DCMD_ADDRSPEC) { 375 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) { 376 (void) set_errno(EMDB_NOMAP); 377 mdb_warn("failed to find cpuid for cpu at %p", addr); 378 return (DCMD_ERR); 379 } 380 flags &= ~DCMD_ADDRSPEC; 381 } 382 383 i = mdb_getopts(argc, argv, 384 'c', MDB_OPT_UINTPTR, &cpuid, 385 'v', MDB_OPT_SETBITS, 1, &verbose, 386 NULL); 387 388 argc -= i; 389 argv += i; 390 391 return (kmt_cpustack(addr, flags, argc, argv, cpuid, verbose)); 392 } 393 394 /* 395 * Lasciate ogne speranza, voi ch'intrate. 396 */ 397 static int 398 kmt_call(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 399 { 400 uintptr_t *call_argv, rval; 401 int parse_strings = 1; 402 GElf_Sym sym; 403 jmp_buf *oldpcb = NULL; 404 jmp_buf pcb; 405 int i; 406 407 if (!(flags & DCMD_ADDRSPEC)) 408 return (DCMD_USAGE); 409 410 if (mdb_tgt_lookup_by_addr(mdb.m_target, addr, MDB_TGT_SYM_EXACT, 411 NULL, 0, &sym, NULL) == 0 && GELF_ST_TYPE(sym.st_info) != 412 STT_FUNC) { 413 warn("%a is not a function\n", addr); 414 return (DCMD_ERR); 415 } 416 417 if (argc > 1 && argv[0].a_type == MDB_TYPE_STRING && 418 strcmp(argv[0].a_un.a_str, "-s") == 0) { 419 parse_strings = 0; 420 argc--; 421 argv++; 422 } 423 424 call_argv = mdb_alloc(sizeof (uintptr_t) * argc, UM_SLEEP); 425 426 for (i = 0; i < argc; i++) { 427 switch (argv[i].a_type) { 428 case MDB_TYPE_STRING: 429 /* 430 * mdb_strtoull doesn't return on error, so we have to 431 * pre-check strings suspected to contain numbers. 432 */ 433 if (parse_strings && strisbasenum(argv[i].a_un.a_str)) { 434 call_argv[i] = (uintptr_t)mdb_strtoull( 435 argv[i].a_un.a_str); 436 } else 437 call_argv[i] = (uintptr_t)argv[i].a_un.a_str; 438 439 break; 440 441 case MDB_TYPE_IMMEDIATE: 442 call_argv[i] = argv[i].a_un.a_val; 443 break; 444 445 default: 446 mdb_free(call_argv, 447 sizeof (uintptr_t) * argc); 448 return (DCMD_USAGE); 449 } 450 } 451 452 if (setjmp(pcb) != 0) { 453 warn("call failed: caught a trap\n"); 454 455 kmdb_dpi_restore_fault_hdlr(oldpcb); 456 mdb_free(call_argv, sizeof (uintptr_t) * argc); 457 return (DCMD_ERR); 458 } 459 460 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb); 461 rval = kmdb_dpi_call(addr, argc, call_argv); 462 kmdb_dpi_restore_fault_hdlr(oldpcb); 463 464 if (flags & DCMD_PIPE_OUT) { 465 mdb_printf("%p\n", rval); 466 } else { 467 /* pretty-print the results */ 468 mdb_printf("%p = %a(", rval, addr); 469 for (i = 0; i < argc; i++) { 470 if (i > 0) 471 mdb_printf(", "); 472 if (argv[i].a_type == MDB_TYPE_STRING) { 473 /* I'm ashamed but amused */ 474 char *quote = &("\""[parse_strings && 475 strisbasenum(argv[i].a_un.a_str)]); 476 477 mdb_printf("%s%s%s", quote, argv[i].a_un.a_str, 478 quote); 479 } else 480 mdb_printf("%p", argv[i].a_un.a_val); 481 } 482 mdb_printf(");\n"); 483 } 484 485 mdb_free(call_argv, sizeof (uintptr_t) * argc); 486 487 return (DCMD_OK); 488 } 489 490 /*ARGSUSED*/ 491 int 492 kmt_dump_crumbs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 493 { 494 intptr_t cpu = -1; 495 496 if (flags & DCMD_ADDRSPEC) { 497 if (argc != 0) 498 return (DCMD_USAGE); 499 } else { 500 addr = 0; 501 502 if (mdb_getopts(argc, argv, 503 'c', MDB_OPT_UINTPTR, &cpu, 504 NULL) != argc) 505 return (DCMD_USAGE); 506 } 507 508 kmdb_dpi_dump_crumbs(addr, cpu); 509 510 return (DCMD_OK); 511 } 512 513 /*ARGSUSED*/ 514 static int 515 kmt_noducttape(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 516 { 517 int a = 0; 518 519 return (a/a); 520 } 521 522 static int 523 kmt_dmod_status(char *msg, int state) 524 { 525 kmdb_modctl_t *kmc; 526 mdb_var_t *v; 527 int first = 1, n = 0; 528 529 mdb_nv_rewind(&mdb.m_dmodctl); 530 while ((v = mdb_nv_advance(&mdb.m_dmodctl)) != NULL) { 531 kmc = MDB_NV_COOKIE(v); 532 533 if (kmc->kmc_state != state) 534 continue; 535 536 n++; 537 538 if (msg != NULL) { 539 if (first) { 540 mdb_printf(msg, NULL); 541 first = 0; 542 } 543 544 mdb_printf(" %s", kmc->kmc_modname); 545 } 546 } 547 548 if (!first && msg != NULL) 549 mdb_printf("\n"); 550 551 return (n); 552 } 553 554 /*ARGSUSED*/ 555 static int 556 kmt_status_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 557 { 558 struct utsname uts; 559 char uuid[UUID_PRINTABLE_STRING_LENGTH]; 560 kreg_t tt; 561 562 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, &uts, sizeof (uts), 563 "unix", "utsname") != sizeof (uts)) { 564 warn("failed to read 'utsname' struct from kernel\n"); 565 bzero(&uts, sizeof (uts)); 566 (void) strcpy(uts.nodename, "unknown machine"); 567 } 568 569 mdb_printf("debugging live kernel (%d-bit) on %s\n", 570 (int)(sizeof (void *) * NBBY), 571 (*uts.nodename == '\0' ? "(not set)" : uts.nodename)); 572 mdb_printf("operating system: %s %s (%s)\n", 573 uts.release, uts.version, uts.machine); 574 575 mdb_print_buildversion(); 576 577 if (mdb_readsym(uuid, sizeof (uuid), 578 "dump_osimage_uuid") == sizeof (uuid) && 579 uuid[sizeof (uuid) - 1] == '\0') { 580 mdb_printf("image uuid: %s\n", uuid[0] != '\0' ? 581 uuid : "(not set)"); 582 } 583 584 mdb_printf("DTrace state: %s\n", (kmdb_kdi_dtrace_get_state() == 585 KDI_DTSTATE_DTRACE_ACTIVE ? "active (debugger breakpoints cannot " 586 "be armed)" : "inactive")); 587 588 (void) kmdb_dpi_get_register("tt", &tt); 589 mdb_printf("stopped on: %s\n", kmt_trapname(tt)); 590 591 (void) kmt_dmod_status("pending dmod loads:", KMDB_MC_STATE_LOADING); 592 (void) kmt_dmod_status("pending dmod unloads:", 593 KMDB_MC_STATE_UNLOADING); 594 595 return (DCMD_OK); 596 } 597 598 /*ARGSUSED*/ 599 static int 600 kmt_switch(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 601 { 602 if (!(flags & DCMD_ADDRSPEC) || argc != 0) 603 return (DCMD_USAGE); 604 605 if (kmdb_dpi_switch_master((int)addr) < 0) { 606 warn("failed to switch to CPU %d", (int)addr); 607 return (DCMD_ERR); 608 } 609 610 return (DCMD_OK); 611 } 612 613 static void 614 kmt_stack_help(void) 615 { 616 mdb_printf( 617 "Options:\n" 618 " -n do not resolve addresses to names\n" 619 " -s show the size of each stack frame to the left\n" 620 " -t where CTF is present, show types for functions and " 621 "arguments\n" 622 " -v include frame pointer information (this is the default " 623 "for %<b>$C%</b>)\n" 624 "\n" 625 "If the optional %<u>cnt%</u> is given, no more than %<u>cnt%</u> " 626 "arguments are shown\nfor each stack frame.\n"); 627 } 628 629 static const mdb_dcmd_t kmt_dcmds[] = { 630 { "$c", "?[-nstv] [cnt]", "print stack backtrace", kmt_stack, 631 kmt_stack_help }, 632 { "$C", "?[-nstv] [cnt]", "print stack backtrace", kmt_stackv, 633 kmt_stack_help }, 634 { "$r", NULL, "print general-purpose registers", kmt_regs }, 635 { "$?", NULL, "print status and registers", kmt_regs }, 636 { ":x", ":", "change the active CPU", kmt_switch }, 637 { "call", ":[arg ...]", "call a kernel function", kmt_call }, 638 { "cpustack", "?[-v] [-c cpuid] [cnt]", "print stack backtrace for a " 639 "specific CPU", kmt_cpustack_dcmd }, 640 { "cpuregs", "?[-c cpuid]", "print general-purpose registers for a " 641 "specific CPU", kmt_cpuregs }, 642 { "crumbs", NULL, NULL, kmt_dump_crumbs }, 643 #if defined(__i386) || defined(__amd64) 644 { "in", ":[-L len]", "read from I/O port", kmt_in_dcmd }, 645 { "out", ":[-L len] val", "write to I/O port", kmt_out_dcmd }, 646 { "rdmsr", ":", "read an MSR", kmt_rdmsr }, 647 { "wrmsr", ": val", "write an MSR", kmt_wrmsr }, 648 { "rdpcicfg", ": bus dev func", "read a register in PCI config space", 649 kmt_rdpcicfg }, 650 { "wrpcicfg", ": bus dev func val", 651 "write a register in PCI config space", kmt_wrpcicfg }, 652 #endif 653 { "noducttape", NULL, NULL, kmt_noducttape }, 654 { "regs", NULL, "print general-purpose registers", kmt_regs }, 655 { "stack", "?[-nstv] [cnt]", "print stack backtrace", kmt_stack, 656 kmt_stack_help }, 657 { "stackregs", "?[-nstv] [cnt]", "print stack backtrace and registers", 658 kmt_stackr, kmt_stack_help }, 659 { "status", NULL, "print summary of current target", kmt_status_dcmd }, 660 { "switch", ":", "change the active CPU", kmt_switch }, 661 { NULL } 662 }; 663 664 static uintmax_t 665 kmt_reg_disc_get(const mdb_var_t *v) 666 { 667 mdb_tgt_reg_t r = 0; 668 669 (void) mdb_tgt_getareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), &r); 670 671 return (r); 672 } 673 674 static void 675 kmt_reg_disc_set(mdb_var_t *v, uintmax_t r) 676 { 677 if (mdb_tgt_putareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), r) == -1) 678 warn("failed to modify %%%s register", mdb_nv_get_name(v)); 679 } 680 681 static const mdb_nv_disc_t kmt_reg_disc = { 682 .disc_get = kmt_reg_disc_get, 683 .disc_set = kmt_reg_disc_set 684 }; 685 686 /*ARGSUSED*/ 687 static int 688 kmt_getareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, 689 mdb_tgt_reg_t *rp) 690 { 691 kreg_t val; 692 693 if (kmdb_dpi_get_register(rname, &val) < 0) 694 return (set_errno(EMDB_BADREG)); 695 696 *rp = val; 697 return (0); 698 } 699 700 /*ARGSUSED*/ 701 static int 702 kmt_putareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, mdb_tgt_reg_t r) 703 { 704 if (kmdb_dpi_set_register(rname, r) < 0) 705 return (set_errno(EMDB_BADREG)); 706 707 return (0); 708 } 709 710 static void 711 kmt_mod_destroy(kmt_module_t *km) 712 { 713 if (km->km_name != NULL) 714 strfree(km->km_name); 715 if (km->km_symtab != NULL) 716 mdb_gelf_symtab_destroy(km->km_symtab); 717 if (km->km_ctfp != NULL) 718 mdb_ctf_close(km->km_ctfp); 719 } 720 721 static kmt_module_t * 722 kmt_mod_create(mdb_tgt_t *t, struct modctl *ctlp, char *name) 723 { 724 kmt_module_t *km = mdb_zalloc(sizeof (kmt_module_t), UM_SLEEP); 725 struct module *mod; 726 727 km->km_name = mdb_alloc(strlen(name) + 1, UM_SLEEP); 728 (void) strcpy(km->km_name, name); 729 730 bcopy(ctlp, &km->km_modctl, sizeof (struct modctl)); 731 732 if (mdb_tgt_vread(t, &km->km_module, sizeof (struct module), 733 (uintptr_t)km->km_modctl.mod_mp) != sizeof (struct module)) 734 goto create_module_cleanup; 735 mod = &km->km_module; 736 737 if (mod->symhdr != NULL && mod->strhdr != NULL && mod->symtbl != NULL && 738 mod->strings != NULL) { 739 mdb_gelf_ehdr_to_gehdr(&mod->hdr, &km->km_ehdr); 740 741 km->km_symtab = mdb_gelf_symtab_create_raw(&km->km_ehdr, 742 mod->symhdr, mod->symtbl, mod->strhdr, mod->strings, 743 MDB_TGT_SYMTAB); 744 745 km->km_symtab_va = mod->symtbl; 746 km->km_strtab_va = mod->strings; 747 748 if (mdb_tgt_vread(t, &km->km_symtab_hdr, sizeof (Shdr), 749 (uintptr_t)mod->symhdr) != sizeof (Shdr) || 750 mdb_tgt_vread(t, &km->km_strtab_hdr, sizeof (Shdr), 751 (uintptr_t)mod->strhdr) != sizeof (Shdr)) 752 goto create_module_cleanup; 753 } 754 755 /* 756 * We don't want everyone rooting around in the module structure, so we 757 * make copies of the interesting members. 758 */ 759 km->km_text_va = (uintptr_t)mod->text; 760 km->km_text_size = mod->text_size; 761 km->km_data_va = (uintptr_t)mod->data; 762 km->km_data_size = mod->data_size; 763 km->km_bss_va = (uintptr_t)mod->bss; 764 km->km_bss_size = mod->bss_size; 765 km->km_ctf_va = mod->ctfdata; 766 km->km_ctf_size = mod->ctfsize; 767 768 if (mod->flags & KOBJ_PRIM) 769 km->km_flags |= KM_F_PRIMARY; 770 771 return (km); 772 773 create_module_cleanup: 774 warn("failed to read module %s\n", name); 775 kmt_mod_destroy(km); 776 return (NULL); 777 } 778 779 static void 780 kmt_mod_remove(kmt_data_t *kmt, kmt_module_t *km) 781 { 782 mdb_var_t *v = mdb_nv_lookup(&kmt->kmt_modules, km->km_name); 783 784 ASSERT(v != NULL); 785 786 mdb_dprintf(MDB_DBG_KMOD, "removing module %s\n", km->km_name); 787 788 mdb_list_delete(&kmt->kmt_modlist, km); 789 mdb_nv_remove(&kmt->kmt_modules, v); 790 kmt_mod_destroy(km); 791 } 792 793 static int 794 kmt_modlist_update_cb(struct modctl *modp, void *arg) 795 { 796 mdb_tgt_t *t = arg; 797 kmt_data_t *kmt = t->t_data; 798 kmt_module_t *km; 799 mdb_var_t *v; 800 char name[MAXNAMELEN]; 801 802 if (mdb_tgt_readstr(t, MDB_TGT_AS_VIRT, name, MAXNAMELEN, 803 (uintptr_t)modp->mod_modname) <= 0) { 804 warn("failed to read module name at %p", 805 (void *)modp->mod_modname); 806 } 807 808 /* We only care about modules that are actually loaded */ 809 if (!kmdb_kdi_mod_isloaded(modp)) 810 return (0); 811 812 /* 813 * Skip the modules we already know about and that haven't 814 * changed since last time we were here. 815 */ 816 if ((v = mdb_nv_lookup(&kmt->kmt_modules, name)) != NULL) { 817 km = MDB_NV_COOKIE(v); 818 819 if (kmdb_kdi_mod_haschanged(&km->km_modctl, &km->km_module, 820 modp, modp->mod_mp)) { 821 /* 822 * The module has changed since last we saw it. For 823 * safety, remove our old version, and treat it as a 824 * new module. 825 */ 826 mdb_dprintf(MDB_DBG_KMOD, "stutter module %s\n", name); 827 kmt_mod_remove(kmt, km); 828 } else { 829 km->km_seen = 1; 830 return (0); 831 } 832 } 833 834 mdb_dprintf(MDB_DBG_KMOD, "found new module %s\n", name); 835 836 if ((km = kmt_mod_create(t, modp, name)) != NULL) { 837 mdb_list_append(&kmt->kmt_modlist, km); 838 (void) mdb_nv_insert(&kmt->kmt_modules, name, NULL, 839 (uintptr_t)km, 0); 840 km->km_seen = 1; 841 } 842 843 return (0); 844 } 845 846 static void 847 kmt_modlist_update(mdb_tgt_t *t) 848 { 849 kmt_data_t *kmt = t->t_data; 850 kmt_module_t *km, *kmn; 851 852 if (kmdb_kdi_mod_iter(kmt_modlist_update_cb, t) < 0) { 853 warn("failed to complete update of kernel module list\n"); 854 return; 855 } 856 857 km = mdb_list_next(&kmt->kmt_modlist); 858 while (km != NULL) { 859 kmn = mdb_list_next(km); 860 861 if (km->km_seen == 1) { 862 /* Reset the mark for next time */ 863 km->km_seen = 0; 864 } else { 865 /* 866 * We didn't see it on the kernel's module list, so 867 * remove it from our view of the world. 868 */ 869 kmt_mod_remove(kmt, km); 870 } 871 872 km = kmn; 873 } 874 } 875 876 static void 877 kmt_periodic(mdb_tgt_t *t) 878 { 879 (void) mdb_tgt_status(t, &t->t_status); 880 } 881 882 int 883 kmt_lookup_by_addr(mdb_tgt_t *t, uintptr_t addr, uint_t flags, 884 char *buf, size_t nbytes, GElf_Sym *symp, mdb_syminfo_t *sip) 885 { 886 kmt_data_t *kmt = t->t_data; 887 kmt_module_t *km = mdb_list_next(&kmt->kmt_modlist); 888 kmt_module_t *sym_km = NULL; 889 kmt_module_t prmod; 890 GElf_Sym sym; 891 uint_t symid; 892 const char *name; 893 894 /* 895 * We look through the private symbols (if any), then through the module 896 * symbols. We can simplify the loop if we pretend the private symbols 897 * come from a module. 898 */ 899 if (mdb.m_prsym != NULL) { 900 bzero(&prmod, sizeof (kmt_module_t)); 901 prmod.km_name = "<<<prmod>>>"; 902 prmod.km_symtab = mdb.m_prsym; 903 prmod.km_list.ml_next = (mdb_list_t *)km; 904 km = &prmod; 905 } 906 907 /* Symbol resolution isn't available during initialization */ 908 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT) 909 return (set_errno(EMDB_NOSYM)); 910 911 for (; km != NULL; km = mdb_list_next(km)) { 912 if (km != &prmod && !kmt->kmt_symavail) 913 continue; 914 915 if (km->km_symtab == NULL) 916 continue; 917 918 if (mdb_gelf_symtab_lookup_by_addr(km->km_symtab, addr, flags, 919 buf, nbytes, symp, &sip->sym_id) != 0 || 920 symp->st_value == 0) 921 continue; 922 923 if (flags & MDB_TGT_SYM_EXACT) { 924 sym_km = km; 925 goto found; 926 } 927 928 /* 929 * If this is the first match we've found, or if this symbol is 930 * closer to the specified address than the last one we found, 931 * use it. 932 */ 933 if (sym_km == NULL || mdb_gelf_sym_closer(symp, &sym, addr)) { 934 sym_km = km; 935 sym = *symp; 936 symid = sip->sym_id; 937 } 938 } 939 940 /* 941 * kmdb dmods are normal kernel modules, loaded by krtld as such. To 942 * avoid polluting modinfo, and to keep from confusing the module 943 * subsystem (many dmods have the same names as real kernel modules), 944 * kmdb keeps their modctls separate, and doesn't allow their loading 945 * to be broadcast via the krtld module load/unload mechanism. As a 946 * result, kmdb_kvm doesn't find out about them, and can't turn their 947 * addresses into symbols. This can be most inconvenient during 948 * debugger faults, as the dmod frames will show up without names. 949 * We weren't able to turn the requested address into a symbol, so we'll 950 * take a spin through the dmods, trying to match our address against 951 * their symbols. 952 */ 953 if (sym_km == NULL) { 954 return (kmdb_module_lookup_by_addr(addr, flags, buf, nbytes, 955 symp, sip)); 956 } 957 958 *symp = sym; 959 sip->sym_id = symid; 960 961 found: 962 /* 963 * Once we've found something, copy the final name into the caller's 964 * buffer and prefix it with the load object name if appropriate. 965 */ 966 name = mdb_gelf_sym_name(sym_km->km_symtab, symp); 967 968 if (sym_km == &prmod) { 969 if (buf != NULL) { 970 (void) strncpy(buf, name, nbytes); 971 buf[nbytes - 1] = '\0'; 972 } 973 sip->sym_table = MDB_TGT_PRVSYM; 974 } else { 975 if (buf != NULL) { 976 if (sym_km->km_flags & KM_F_PRIMARY) { 977 (void) strncpy(buf, name, nbytes); 978 buf[nbytes - 1] = '\0'; 979 } else { 980 (void) mdb_snprintf(buf, nbytes, "%s`%s", 981 sym_km->km_name, name); 982 } 983 } 984 sip->sym_table = MDB_TGT_SYMTAB; 985 } 986 987 return (0); 988 } 989 990 static int 991 kmt_lookup_by_name(mdb_tgt_t *t, const char *obj, const char *name, 992 GElf_Sym *symp, mdb_syminfo_t *sip) 993 { 994 kmt_data_t *kmt = t->t_data; 995 kmt_module_t *km; 996 mdb_var_t *v; 997 GElf_Sym sym; 998 uint_t symid; 999 int n; 1000 1001 if (!kmt->kmt_symavail) 1002 return (set_errno(EMDB_NOSYM)); 1003 1004 switch ((uintptr_t)obj) { 1005 case (uintptr_t)MDB_TGT_OBJ_EXEC: 1006 case (uintptr_t)MDB_TGT_OBJ_EVERY: 1007 km = mdb_list_next(&kmt->kmt_modlist); 1008 n = mdb_nv_size(&kmt->kmt_modules); 1009 break; 1010 1011 case (uintptr_t)MDB_TGT_OBJ_RTLD: 1012 obj = kmt->kmt_rtld_name; 1013 /*FALLTHROUGH*/ 1014 1015 default: 1016 /* 1017 * If this is a request for a dmod symbol, let kmdb_module 1018 * handle it. 1019 */ 1020 if (obj != NULL && strncmp(obj, "DMOD`", 5) == 0) { 1021 return (kmdb_module_lookup_by_name(obj + 5, name, 1022 symp, sip)); 1023 } 1024 1025 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL) 1026 return (set_errno(EMDB_NOOBJ)); 1027 1028 km = mdb_nv_get_cookie(v); 1029 n = 1; 1030 } 1031 1032 /* 1033 * kmdb's kvm target is at a bit of a disadvantage compared to mdb's 1034 * kvm target when it comes to global symbol lookups. mdb has ksyms, 1035 * which hides pesky things like symbols that are undefined in unix, 1036 * but which are defined in genunix. We don't have such a facility - 1037 * we simply iterate through the modules, looking for a given symbol 1038 * in each. Unless we're careful, we'll return the undef in the 1039 * aforementioned case. 1040 */ 1041 for (; n > 0; n--, km = mdb_list_next(km)) { 1042 if (mdb_gelf_symtab_lookup_by_name(km->km_symtab, name, 1043 &sym, &symid) == 0 && sym.st_shndx != SHN_UNDEF) 1044 break; 1045 } 1046 1047 if (n == 0) 1048 return (set_errno(EMDB_NOSYM)); 1049 1050 found: 1051 bcopy(&sym, symp, sizeof (GElf_Sym)); 1052 sip->sym_id = symid; 1053 sip->sym_table = MDB_TGT_SYMTAB; 1054 1055 return (0); 1056 } 1057 1058 static int 1059 kmt_symtab_func(void *data, const GElf_Sym *sym, const char *name, uint_t id) 1060 { 1061 kmt_symarg_t *arg = data; 1062 1063 if (mdb_tgt_sym_match(sym, arg->sym_type)) { 1064 arg->sym_info.sym_id = id; 1065 1066 return (arg->sym_cb(arg->sym_data, sym, name, &arg->sym_info, 1067 arg->sym_obj)); 1068 } 1069 1070 return (0); 1071 } 1072 1073 static void 1074 kmt_symtab_iter(mdb_gelf_symtab_t *gst, uint_t type, const char *obj, 1075 mdb_tgt_sym_f *cb, void *p) 1076 { 1077 kmt_symarg_t arg; 1078 1079 arg.sym_cb = cb; 1080 arg.sym_data = p; 1081 arg.sym_type = type; 1082 arg.sym_info.sym_table = gst->gst_tabid; 1083 arg.sym_obj = obj; 1084 1085 mdb_gelf_symtab_iter(gst, kmt_symtab_func, &arg); 1086 } 1087 1088 static int 1089 kmt_symbol_iter(mdb_tgt_t *t, const char *obj, uint_t which, uint_t type, 1090 mdb_tgt_sym_f *cb, void *data) 1091 { 1092 kmt_data_t *kmt = t->t_data; 1093 kmt_module_t *km; 1094 1095 mdb_gelf_symtab_t *symtab = NULL; 1096 mdb_var_t *v; 1097 1098 if (which == MDB_TGT_DYNSYM) 1099 return (set_errno(EMDB_TGTNOTSUP)); 1100 1101 switch ((uintptr_t)obj) { 1102 case (uintptr_t)MDB_TGT_OBJ_EXEC: 1103 case (uintptr_t)MDB_TGT_OBJ_EVERY: 1104 mdb_nv_rewind(&kmt->kmt_modules); 1105 while ((v = mdb_nv_advance(&kmt->kmt_modules)) != NULL) { 1106 km = mdb_nv_get_cookie(v); 1107 1108 if (km->km_symtab != NULL) { 1109 kmt_symtab_iter(km->km_symtab, type, 1110 km->km_name, cb, data); 1111 } 1112 } 1113 return (0); 1114 1115 case (uintptr_t)MDB_TGT_OBJ_RTLD: 1116 obj = kmt->kmt_rtld_name; 1117 /*FALLTHROUGH*/ 1118 1119 default: 1120 if (strncmp(obj, "DMOD`", 5) == 0) { 1121 return (kmdb_module_symbol_iter(obj + 5, type, 1122 cb, data)); 1123 } 1124 1125 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL) 1126 return (set_errno(EMDB_NOOBJ)); 1127 km = mdb_nv_get_cookie(v); 1128 1129 symtab = km->km_symtab; 1130 } 1131 1132 if (symtab != NULL) 1133 kmt_symtab_iter(symtab, type, obj, cb, data); 1134 1135 return (0); 1136 } 1137 1138 static int 1139 kmt_mapping_walk(uintptr_t addr, const void *data, kmt_maparg_t *marg) 1140 { 1141 /* 1142 * This is a bit sketchy but avoids problematic compilation of this 1143 * target against the current VM implementation. Now that we have 1144 * vmem, we can make this less broken and more informative by changing 1145 * this code to invoke the vmem walker in the near future. 1146 */ 1147 const struct kmt_seg { 1148 caddr_t s_base; 1149 size_t s_size; 1150 } *segp = (const struct kmt_seg *)data; 1151 1152 mdb_map_t map; 1153 GElf_Sym sym; 1154 mdb_syminfo_t info; 1155 1156 map.map_base = (uintptr_t)segp->s_base; 1157 map.map_size = segp->s_size; 1158 map.map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X; 1159 1160 if (kmt_lookup_by_addr(marg->map_target, addr, MDB_TGT_SYM_EXACT, 1161 map.map_name, MDB_TGT_MAPSZ, &sym, &info) == -1) { 1162 1163 (void) mdb_iob_snprintf(map.map_name, MDB_TGT_MAPSZ, 1164 "%lr", addr); 1165 } 1166 1167 return (marg->map_cb(marg->map_data, &map, map.map_name)); 1168 } 1169 1170 static int 1171 kmt_mapping_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private) 1172 { 1173 kmt_maparg_t m; 1174 uintptr_t kas; 1175 1176 m.map_target = t; 1177 m.map_cb = func; 1178 m.map_data = private; 1179 1180 if ((kas = kmt_read_kas(t)) == 0) 1181 return (-1); /* errno is set for us */ 1182 1183 return (mdb_pwalk("seg", (mdb_walk_cb_t)kmt_mapping_walk, &m, kas)); 1184 } 1185 1186 static const mdb_map_t * 1187 kmt_mod_to_map(kmt_module_t *km, mdb_map_t *map) 1188 { 1189 (void) strncpy(map->map_name, km->km_name, MDB_TGT_MAPSZ); 1190 map->map_name[MDB_TGT_MAPSZ - 1] = '\0'; 1191 map->map_base = km->km_text_va; 1192 map->map_size = km->km_text_size; 1193 map->map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X; 1194 1195 return (map); 1196 } 1197 1198 static int 1199 kmt_object_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private) 1200 { 1201 kmt_data_t *kmt = t->t_data; 1202 kmt_module_t *km; 1203 mdb_map_t m; 1204 1205 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1206 km = mdb_list_next(km)) { 1207 if (func(private, kmt_mod_to_map(km, &m), km->km_name) == -1) 1208 break; 1209 } 1210 1211 return (0); 1212 } 1213 1214 static const mdb_map_t * 1215 kmt_addr_to_map(mdb_tgt_t *t, uintptr_t addr) 1216 { 1217 kmt_data_t *kmt = t->t_data; 1218 kmt_module_t *km; 1219 1220 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1221 km = mdb_list_next(km)) { 1222 if (addr - km->km_text_va < km->km_text_size || 1223 addr - km->km_data_va < km->km_data_size || 1224 addr - km->km_bss_va < km->km_bss_size) 1225 return (kmt_mod_to_map(km, &kmt->kmt_map)); 1226 } 1227 1228 (void) set_errno(EMDB_NOMAP); 1229 return (NULL); 1230 } 1231 1232 static kmt_module_t * 1233 kmt_module_by_name(kmt_data_t *kmt, const char *name) 1234 { 1235 kmt_module_t *km; 1236 1237 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1238 km = mdb_list_next(km)) { 1239 if (strcmp(name, km->km_name) == 0) 1240 return (km); 1241 } 1242 1243 return (NULL); 1244 } 1245 1246 static const mdb_map_t * 1247 kmt_name_to_map(mdb_tgt_t *t, const char *name) 1248 { 1249 kmt_data_t *kmt = t->t_data; 1250 kmt_module_t *km; 1251 mdb_map_t m; 1252 1253 /* 1254 * If name is MDB_TGT_OBJ_EXEC, return the first module on the list, 1255 * which will be unix since we keep kmt_modlist in load order. 1256 */ 1257 if (name == MDB_TGT_OBJ_EXEC) { 1258 return (kmt_mod_to_map(mdb_list_next(&kmt->kmt_modlist), 1259 &m)); 1260 } 1261 1262 if (name == MDB_TGT_OBJ_RTLD) 1263 name = kmt->kmt_rtld_name; 1264 1265 if ((km = kmt_module_by_name(kmt, name)) != NULL) 1266 return (kmt_mod_to_map(km, &m)); 1267 1268 (void) set_errno(EMDB_NOOBJ); 1269 return (NULL); 1270 } 1271 1272 static ctf_file_t * 1273 kmt_load_ctfdata(mdb_tgt_t *t, kmt_module_t *km) 1274 { 1275 kmt_data_t *kmt = t->t_data; 1276 int err; 1277 1278 if (km->km_ctfp != NULL) 1279 return (km->km_ctfp); 1280 1281 if (km->km_ctf_va == NULL || km->km_symtab == NULL) { 1282 (void) set_errno(EMDB_NOCTF); 1283 return (NULL); 1284 } 1285 1286 if ((km->km_ctfp = mdb_ctf_bufopen(km->km_ctf_va, km->km_ctf_size, 1287 km->km_symtab_va, &km->km_symtab_hdr, km->km_strtab_va, 1288 &km->km_strtab_hdr, &err)) == NULL) { 1289 (void) set_errno(ctf_to_errno(err)); 1290 return (NULL); 1291 } 1292 1293 mdb_dprintf(MDB_DBG_KMOD, "loaded %lu bytes of CTF data for %s\n", 1294 (ulong_t)km->km_ctf_size, km->km_name); 1295 1296 if (ctf_parent_name(km->km_ctfp) != NULL) { 1297 mdb_var_t *v; 1298 1299 if ((v = mdb_nv_lookup(&kmt->kmt_modules, 1300 ctf_parent_name(km->km_ctfp))) != NULL) { 1301 kmt_module_t *pm = mdb_nv_get_cookie(v); 1302 1303 if (pm->km_ctfp == NULL) 1304 (void) kmt_load_ctfdata(t, pm); 1305 1306 if (pm->km_ctfp != NULL && ctf_import(km->km_ctfp, 1307 pm->km_ctfp) == CTF_ERR) { 1308 warn("failed to import parent types into " 1309 "%s: %s\n", km->km_name, 1310 ctf_errmsg(ctf_errno(km->km_ctfp))); 1311 } 1312 } else { 1313 warn("failed to load CTF data for %s - parent %s not " 1314 "loaded\n", km->km_name, 1315 ctf_parent_name(km->km_ctfp)); 1316 } 1317 } 1318 1319 return (km->km_ctfp); 1320 } 1321 1322 ctf_file_t * 1323 kmt_addr_to_ctf(mdb_tgt_t *t, uintptr_t addr) 1324 { 1325 kmt_data_t *kmt = t->t_data; 1326 kmt_module_t *km; 1327 1328 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1329 km = mdb_list_next(km)) { 1330 if (addr - km->km_text_va < km->km_text_size || 1331 addr - km->km_data_va < km->km_data_size || 1332 addr - km->km_bss_va < km->km_bss_size) 1333 return (kmt_load_ctfdata(t, km)); 1334 } 1335 1336 return (kmdb_module_addr_to_ctf(addr)); 1337 } 1338 1339 ctf_file_t * 1340 kmt_name_to_ctf(mdb_tgt_t *t, const char *name) 1341 { 1342 kmt_data_t *kt = t->t_data; 1343 kmt_module_t *km; 1344 1345 if (name == MDB_TGT_OBJ_EXEC) { 1346 name = KMT_CTFPARENT; 1347 } else if (name == MDB_TGT_OBJ_RTLD) { 1348 name = kt->kmt_rtld_name; 1349 } else if (strncmp(name, "DMOD`", 5) == 0) { 1350 /* Request for CTF data for a DMOD symbol */ 1351 return (kmdb_module_name_to_ctf(name + 5)); 1352 } 1353 1354 if ((km = kmt_module_by_name(kt, name)) != NULL) 1355 return (kmt_load_ctfdata(t, km)); 1356 1357 (void) set_errno(EMDB_NOOBJ); 1358 return (NULL); 1359 } 1360 1361 /*ARGSUSED*/ 1362 static int 1363 kmt_status(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1364 { 1365 int state; 1366 1367 bzero(tsp, sizeof (mdb_tgt_status_t)); 1368 1369 switch ((state = kmdb_dpi_get_state(NULL))) { 1370 case DPI_STATE_INIT: 1371 tsp->st_state = MDB_TGT_RUNNING; 1372 tsp->st_pc = 0; 1373 break; 1374 1375 case DPI_STATE_STOPPED: 1376 tsp->st_state = MDB_TGT_STOPPED; 1377 1378 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1379 break; 1380 1381 case DPI_STATE_FAULTED: 1382 tsp->st_state = MDB_TGT_STOPPED; 1383 1384 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1385 1386 tsp->st_flags |= MDB_TGT_ISTOP; 1387 break; 1388 1389 case DPI_STATE_LOST: 1390 tsp->st_state = MDB_TGT_LOST; 1391 1392 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1393 break; 1394 } 1395 1396 mdb_dprintf(MDB_DBG_KMOD, "kmt_status, dpi: %d tsp: %d, pc = %p %A\n", 1397 state, tsp->st_state, (void *)tsp->st_pc, tsp->st_pc); 1398 1399 return (0); 1400 } 1401 1402 /* 1403 * Invoked when kmt_defbp_enter_debugger is called, this routine activates and 1404 * deactivates deferred breakpoints in response to module load and unload 1405 * events. 1406 */ 1407 /*ARGSUSED*/ 1408 static void 1409 kmt_defbp_event(mdb_tgt_t *t, int vid, void *private) 1410 { 1411 if (kmt_defbp_modchg_isload) { 1412 if (!mdb_tgt_sespec_activate_all(t) && 1413 (mdb.m_flags & MDB_FL_BPTNOSYMSTOP)) { 1414 /* 1415 * We weren't able to activate the breakpoints. 1416 * If so requested, we'll return without calling 1417 * continue, thus throwing the user into the debugger. 1418 */ 1419 return; 1420 } 1421 1422 } else { 1423 mdb_sespec_t *sep, *nsep; 1424 const mdb_map_t *map, *bpmap; 1425 mdb_map_t modmap; 1426 1427 if ((map = kmt_addr_to_map(t, 1428 (uintptr_t)kmt_defbp_modchg_modctl->mod_text)) == NULL) { 1429 warn("module unload notification for unknown module %s", 1430 kmt_defbp_modchg_modctl->mod_modname); 1431 return; /* drop into the debugger */ 1432 } 1433 1434 bcopy(map, &modmap, sizeof (mdb_map_t)); 1435 1436 for (sep = mdb_list_next(&t->t_active); sep; sep = nsep) { 1437 nsep = mdb_list_next(sep); 1438 1439 if (sep->se_ops == &kmt_brkpt_ops) { 1440 kmt_brkpt_t *kb = sep->se_data; 1441 1442 if ((bpmap = kmt_addr_to_map(t, 1443 kb->kb_addr)) == NULL || 1444 (bpmap->map_base == modmap.map_base && 1445 bpmap->map_size == modmap.map_size)) { 1446 mdb_tgt_sespec_idle_one(t, sep, 1447 EMDB_NOMAP); 1448 } 1449 } 1450 } 1451 } 1452 1453 (void) mdb_tgt_continue(t, NULL); 1454 } 1455 1456 static void 1457 kmt_defbp_enter_debugger(void) 1458 { 1459 /* 1460 * The debugger places a breakpoint here. We can't have a simple 1461 * nop function here, because GCC knows much more than we do, and 1462 * will optimize away the call to it. 1463 */ 1464 (void) get_fp(); 1465 } 1466 1467 /* 1468 * This routine is called while the kernel is running. It attempts to determine 1469 * whether any deferred breakpoints exist for the module being changed (loaded 1470 * or unloaded). If any such breakpoints exist, the debugger will be entered to 1471 * process them. 1472 */ 1473 static void 1474 kmt_defbp_modchg(struct modctl *mctl, int isload) 1475 { 1476 kmt_defbp_t *dbp; 1477 1478 kmt_defbp_lock = 1; 1479 1480 for (dbp = mdb_list_next(&kmt_defbp_list); dbp; 1481 dbp = mdb_list_next(dbp)) { 1482 if (!dbp->dbp_ref) 1483 continue; 1484 1485 if (strcmp(mctl->mod_modname, dbp->dbp_objname) == 0) { 1486 /* 1487 * Activate the breakpoint 1488 */ 1489 kmt_defbp_modchg_isload = isload; 1490 kmt_defbp_modchg_modctl = mctl; 1491 1492 kmt_defbp_enter_debugger(); 1493 break; 1494 } 1495 } 1496 1497 kmt_defbp_lock = 0; 1498 } 1499 1500 /*ARGSUSED*/ 1501 static int 1502 kmt_continue(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1503 { 1504 int n; 1505 1506 kmdb_dpi_resume(); 1507 1508 /* 1509 * The order of the following two calls is important. If there are 1510 * load acks on the work queue, we'll initialize the dmods they 1511 * represent. This will involve a call to _mdb_init, which may very 1512 * well result in a symbol lookup. If we haven't resynced our view 1513 * of symbols with the current state of the world, this lookup could 1514 * end very badly. We therefore make sure to sync before processing 1515 * the work queue. 1516 */ 1517 kmt_sync(t); 1518 kmdb_dpi_process_work_queue(); 1519 1520 if (kmdb_kdi_get_unload_request()) 1521 t->t_flags |= MDB_TGT_F_UNLOAD; 1522 1523 (void) mdb_tgt_status(t, &t->t_status); 1524 1525 if ((n = kmt_dmod_status(NULL, KMDB_MC_STATE_LOADING) + 1526 kmt_dmod_status(NULL, KMDB_MC_STATE_UNLOADING)) != 0) { 1527 mdb_warn("%d dmod load%c/unload%c pending\n", n, 1528 "s"[n == 1], "s"[n == 1]); 1529 } 1530 1531 return (0); 1532 } 1533 1534 /*ARGSUSED*/ 1535 static int 1536 kmt_step(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1537 { 1538 int rc; 1539 1540 if ((rc = kmdb_dpi_step()) == 0) 1541 (void) mdb_tgt_status(t, &t->t_status); 1542 1543 return (rc); 1544 } 1545 1546 static int 1547 kmt_defbp_activate(mdb_tgt_t *t) 1548 { 1549 kmdb_dpi_modchg_register(kmt_defbp_modchg); 1550 1551 /* 1552 * The routines that add and arm breakpoints will check for the proper 1553 * DTrace state, but they'll just put this breakpoint on the idle list 1554 * if DTrace is active. It'll correctly move to the active list when 1555 * DTrace deactivates, but that's insufficient for our purposes -- we 1556 * need to do extra processing at that point. We won't get to do said 1557 * processing with with a normal idle->active transition, so we just 1558 * won't add it add it until we're sure that it'll stick. 1559 */ 1560 1561 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1562 return (set_errno(EMDB_DTACTIVE)); 1563 1564 kmt_defbp_bpspec = mdb_tgt_add_vbrkpt(t, 1565 (uintptr_t)kmt_defbp_enter_debugger, 1566 MDB_TGT_SPEC_HIDDEN, kmt_defbp_event, NULL); 1567 1568 return (0); 1569 } 1570 1571 static void 1572 kmt_defbp_deactivate(mdb_tgt_t *t) 1573 { 1574 kmdb_dpi_modchg_cancel(); 1575 1576 if (kmt_defbp_bpspec != 0) { 1577 if (t != NULL) 1578 (void) mdb_tgt_vespec_delete(t, kmt_defbp_bpspec); 1579 1580 kmt_defbp_bpspec = 0; 1581 } 1582 } 1583 1584 static kmt_defbp_t * 1585 kmt_defbp_create(mdb_tgt_t *t, const char *objname, const char *symname) 1586 { 1587 kmt_defbp_t *dbp = mdb_alloc(sizeof (kmt_defbp_t), UM_SLEEP); 1588 1589 mdb_dprintf(MDB_DBG_KMOD, "defbp_create %s`%s\n", objname, symname); 1590 1591 dbp->dbp_objname = strdup(objname); 1592 dbp->dbp_symname = strdup(symname); 1593 dbp->dbp_ref = 1; 1594 1595 kmt_defbp_num++; 1596 1597 if (kmt_defbp_num == 1 || kmt_defbp_bpspec == 0) { 1598 if (kmt_defbp_activate(t) < 0) 1599 warn("failed to activate deferred breakpoints"); 1600 } 1601 1602 mdb_list_append(&kmt_defbp_list, dbp); 1603 1604 return (dbp); 1605 } 1606 1607 static void 1608 kmt_defbp_destroy(kmt_defbp_t *dbp) 1609 { 1610 mdb_dprintf(MDB_DBG_KMOD, "defbp_destroy %s`%s\n", dbp->dbp_objname, 1611 dbp->dbp_symname); 1612 1613 mdb_list_delete(&kmt_defbp_list, dbp); 1614 1615 strfree(dbp->dbp_objname); 1616 strfree(dbp->dbp_symname); 1617 mdb_free(dbp, sizeof (kmt_defbp_t)); 1618 } 1619 1620 static void 1621 kmt_defbp_prune_common(int all) 1622 { 1623 kmt_defbp_t *dbp, *ndbp; 1624 1625 /* We can't remove items from the list while the driver is using it. */ 1626 if (kmt_defbp_lock) 1627 return; 1628 1629 for (dbp = mdb_list_next(&kmt_defbp_list); dbp != NULL; dbp = ndbp) { 1630 ndbp = mdb_list_next(dbp); 1631 1632 if (!all && dbp->dbp_ref) 1633 continue; 1634 1635 kmt_defbp_destroy(dbp); 1636 } 1637 } 1638 1639 static void 1640 kmt_defbp_prune(void) 1641 { 1642 kmt_defbp_prune_common(0); 1643 } 1644 1645 static void 1646 kmt_defbp_destroy_all(void) 1647 { 1648 kmt_defbp_prune_common(1); 1649 } 1650 1651 static void 1652 kmt_defbp_delete(mdb_tgt_t *t, kmt_defbp_t *dbp) 1653 { 1654 dbp->dbp_ref = 0; 1655 1656 ASSERT(kmt_defbp_num > 0); 1657 kmt_defbp_num--; 1658 1659 if (kmt_defbp_num == 0) 1660 kmt_defbp_deactivate(t); 1661 1662 kmt_defbp_prune(); 1663 } 1664 1665 static int 1666 kmt_brkpt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1667 { 1668 mdb_tgt_status_t tsp; 1669 kmt_bparg_t *ka = args; 1670 kmt_brkpt_t *kb; 1671 GElf_Sym s; 1672 mdb_instr_t instr; 1673 1674 (void) mdb_tgt_status(t, &tsp); 1675 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED) 1676 return (set_errno(EMDB_NOPROC)); 1677 1678 if (ka->ka_symbol != NULL) { 1679 if (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, &s, NULL) == -1) { 1680 if (errno != EMDB_NOOBJ && !(errno == EMDB_NOSYM && 1681 !(mdb.m_flags & MDB_FL_BPTNOSYMSTOP))) { 1682 warn("breakpoint %s activation failed", 1683 ka->ka_symbol); 1684 } 1685 return (-1); /* errno is set for us */ 1686 } 1687 1688 ka->ka_addr = (uintptr_t)s.st_value; 1689 } 1690 1691 #ifdef __sparc 1692 if (ka->ka_addr & 3) 1693 return (set_errno(EMDB_BPALIGN)); 1694 #endif 1695 1696 if (mdb_vread(&instr, sizeof (instr), ka->ka_addr) != sizeof (instr)) 1697 return (-1); /* errno is set for us */ 1698 1699 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1700 warn("breakpoint will not arm until DTrace is inactive\n"); 1701 1702 kb = mdb_zalloc(sizeof (kmt_brkpt_t), UM_SLEEP); 1703 kb->kb_addr = ka->ka_addr; 1704 sep->se_data = kb; 1705 1706 return (0); 1707 } 1708 1709 /*ARGSUSED*/ 1710 static void 1711 kmt_brkpt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep) 1712 { 1713 mdb_free(sep->se_data, sizeof (kmt_brkpt_t)); 1714 } 1715 1716 /*ARGSUSED*/ 1717 static char * 1718 kmt_brkpt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 1719 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 1720 { 1721 uintptr_t addr = 0; 1722 1723 if (vep != NULL) { 1724 kmt_bparg_t *ka = vep->ve_args; 1725 1726 if (ka->ka_symbol != NULL) { 1727 (void) mdb_iob_snprintf(buf, nbytes, "stop at %s", 1728 ka->ka_symbol); 1729 } else { 1730 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a", 1731 ka->ka_addr); 1732 addr = ka->ka_addr; 1733 } 1734 1735 } else { 1736 addr = ((kmt_brkpt_t *)sep->se_data)->kb_addr; 1737 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a", addr); 1738 } 1739 1740 sp->spec_base = addr; 1741 sp->spec_size = sizeof (mdb_instr_t); 1742 1743 return (buf); 1744 } 1745 1746 static int 1747 kmt_brkpt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1748 { 1749 kmt_brkpt_t *kb = sep->se_data; 1750 kmt_bparg_t *ka = args; 1751 GElf_Sym sym; 1752 1753 if (ka->ka_symbol != NULL) { 1754 return (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, 1755 &sym, NULL) == 0 && sym.st_value == kb->kb_addr); 1756 } 1757 1758 return (ka->ka_addr == kb->kb_addr); 1759 } 1760 1761 /*ARGSUSED*/ 1762 static int 1763 kmt_brkpt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args) 1764 { 1765 kmt_bparg_t *ka1 = vep->ve_args; 1766 kmt_bparg_t *ka2 = args; 1767 1768 if (ka1->ka_symbol != NULL && ka2->ka_symbol != NULL) 1769 return (strcmp(ka1->ka_symbol, ka2->ka_symbol) == 0); 1770 1771 if (ka1->ka_symbol == NULL && ka2->ka_symbol == NULL) 1772 return (ka1->ka_addr == ka2->ka_addr); 1773 1774 return (0); /* fail if one is symbolic, other is an explicit address */ 1775 } 1776 1777 static int 1778 kmt_brkpt_arm(mdb_tgt_t *t, mdb_sespec_t *sep) 1779 { 1780 kmt_data_t *kmt = t->t_data; 1781 kmt_brkpt_t *kb = sep->se_data; 1782 int rv; 1783 1784 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1785 return (set_errno(EMDB_DTACTIVE)); 1786 1787 if ((rv = kmdb_dpi_brkpt_arm(kb->kb_addr, &kb->kb_oinstr)) != 0) 1788 return (rv); 1789 1790 if (kmt->kmt_narmedbpts++ == 0) 1791 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_ACTIVATE); 1792 1793 return (0); 1794 } 1795 1796 static int 1797 kmt_brkpt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep) 1798 { 1799 kmt_data_t *kmt = t->t_data; 1800 kmt_brkpt_t *kb = sep->se_data; 1801 int rv; 1802 1803 ASSERT(kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_KMDB_BPT_ACTIVE); 1804 1805 if ((rv = kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr)) != 0) 1806 return (rv); 1807 1808 if (--kmt->kmt_narmedbpts == 0) 1809 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_DEACTIVATE); 1810 1811 return (0); 1812 } 1813 1814 /* 1815 * Determine whether the specified sespec is an armed watchpoint that overlaps 1816 * with the given breakpoint and has the given flags set. We use this to find 1817 * conflicts with breakpoints, below. 1818 */ 1819 static int 1820 kmt_wp_overlap(mdb_sespec_t *sep, kmt_brkpt_t *kb, int flags) 1821 { 1822 const kmdb_wapt_t *wp = sep->se_data; 1823 1824 return (sep->se_state == MDB_TGT_SPEC_ARMED && 1825 sep->se_ops == &kmt_wapt_ops && (wp->wp_wflags & flags) && 1826 kb->kb_addr - wp->wp_addr < wp->wp_size); 1827 } 1828 1829 /* 1830 * We step over breakpoints using our single-stepper. If a conflicting 1831 * watchpoint is present, we must temporarily remove it before stepping over the 1832 * breakpoint so we don't immediately re-trigger the watchpoint. We know the 1833 * watchpoint has already triggered on our trap instruction as part of fetching 1834 * it. Before we return, we must re-install any disabled watchpoints. 1835 */ 1836 static int 1837 kmt_brkpt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 1838 { 1839 kmt_brkpt_t *kb = sep->se_data; 1840 int status = -1; 1841 int error; 1842 1843 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 1844 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X)) 1845 (void) kmdb_dpi_wapt_disarm(sep->se_data); 1846 } 1847 1848 if (kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr) == 0 && 1849 kmt_step(t, tsp) == 0) 1850 status = kmt_status(t, tsp); 1851 1852 error = errno; /* save errno from disarm, step, or status */ 1853 1854 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 1855 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X)) 1856 kmdb_dpi_wapt_arm(sep->se_data); 1857 } 1858 1859 (void) set_errno(error); 1860 return (status); 1861 } 1862 1863 /*ARGSUSED*/ 1864 static int 1865 kmt_brkpt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 1866 { 1867 kmt_brkpt_t *kb = sep->se_data; 1868 int state, why; 1869 kreg_t pc; 1870 1871 state = kmdb_dpi_get_state(&why); 1872 (void) kmdb_dpi_get_register("pc", &pc); 1873 1874 return (state == DPI_STATE_FAULTED && why == DPI_STATE_WHY_BKPT && 1875 pc == kb->kb_addr); 1876 } 1877 1878 static const mdb_se_ops_t kmt_brkpt_ops = { 1879 .se_ctor = kmt_brkpt_ctor, 1880 .se_dtor = kmt_brkpt_dtor, 1881 .se_info = kmt_brkpt_info, 1882 .se_secmp = kmt_brkpt_secmp, 1883 .se_vecmp = kmt_brkpt_vecmp, 1884 .se_arm = kmt_brkpt_arm, 1885 .se_disarm = kmt_brkpt_disarm, 1886 .se_cont = kmt_brkpt_cont, 1887 .se_match = kmt_brkpt_match, 1888 }; 1889 1890 static int 1891 kmt_wapt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1892 { 1893 mdb_tgt_status_t tsp; 1894 kmdb_wapt_t *vwp = args; 1895 kmdb_wapt_t *swp; 1896 1897 (void) mdb_tgt_status(t, &tsp); 1898 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED) 1899 return (set_errno(EMDB_NOPROC)); 1900 1901 swp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP); 1902 bcopy(vwp, swp, sizeof (kmdb_wapt_t)); 1903 1904 if (kmdb_dpi_wapt_reserve(swp) < 0) { 1905 mdb_free(swp, sizeof (kmdb_wapt_t)); 1906 return (-1); /* errno is set for us */ 1907 } 1908 1909 sep->se_data = swp; 1910 1911 return (0); 1912 } 1913 1914 /*ARGSUSED*/ 1915 static void 1916 kmt_wapt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep) 1917 { 1918 kmdb_wapt_t *wp = sep->se_data; 1919 1920 kmdb_dpi_wapt_release(wp); 1921 mdb_free(wp, sizeof (kmdb_wapt_t)); 1922 } 1923 1924 /*ARGSUSED*/ 1925 static char * 1926 kmt_wapt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 1927 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 1928 { 1929 kmdb_wapt_t *wp = vep != NULL ? vep->ve_args : sep->se_data; 1930 const char *fmt; 1931 char desc[24]; 1932 1933 ASSERT(wp->wp_wflags != 0); 1934 desc[0] = '\0'; 1935 1936 switch (wp->wp_wflags) { 1937 case MDB_TGT_WA_R: 1938 (void) strcat(desc, "/read"); 1939 break; 1940 case MDB_TGT_WA_W: 1941 (void) strcat(desc, "/write"); 1942 break; 1943 case MDB_TGT_WA_X: 1944 (void) strcat(desc, "/exec"); 1945 break; 1946 default: 1947 if (wp->wp_wflags & MDB_TGT_WA_R) 1948 (void) strcat(desc, "/r"); 1949 if (wp->wp_wflags & MDB_TGT_WA_W) 1950 (void) strcat(desc, "/w"); 1951 if (wp->wp_wflags & MDB_TGT_WA_X) 1952 (void) strcat(desc, "/x"); 1953 } 1954 1955 switch (wp->wp_type) { 1956 case DPI_WAPT_TYPE_PHYS: 1957 fmt = "stop on %s of phys [%p, %p)"; 1958 break; 1959 1960 case DPI_WAPT_TYPE_VIRT: 1961 fmt = "stop on %s of [%la, %la)"; 1962 break; 1963 1964 case DPI_WAPT_TYPE_IO: 1965 if (wp->wp_size == 1) 1966 fmt = "stop on %s of I/O port %p"; 1967 else 1968 fmt = "stop on %s of I/O port [%p, %p)"; 1969 break; 1970 1971 default: 1972 fmt = "stop on %s of unknown [%p, %p]"; 1973 break; 1974 } 1975 1976 (void) mdb_iob_snprintf(buf, nbytes, fmt, desc + 1, wp->wp_addr, 1977 wp->wp_addr + wp->wp_size); 1978 1979 sp->spec_base = wp->wp_addr; 1980 sp->spec_size = wp->wp_size; 1981 1982 return (buf); 1983 } 1984 1985 /*ARGSUSED*/ 1986 static int 1987 kmt_wapt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1988 { 1989 kmdb_wapt_t *wp1 = sep->se_data; 1990 kmdb_wapt_t *wp2 = args; 1991 1992 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size && 1993 wp1->wp_wflags == wp2->wp_wflags); 1994 } 1995 1996 /*ARGSUSED*/ 1997 static int 1998 kmt_wapt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args) 1999 { 2000 kmdb_wapt_t *wp1 = vep->ve_args; 2001 kmdb_wapt_t *wp2 = args; 2002 2003 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size && 2004 wp1->wp_wflags == wp2->wp_wflags); 2005 } 2006 2007 /*ARGSUSED*/ 2008 static int 2009 kmt_wapt_arm(mdb_tgt_t *t, mdb_sespec_t *sep) 2010 { 2011 kmdb_dpi_wapt_arm(sep->se_data); 2012 2013 return (0); 2014 } 2015 2016 /*ARGSUSED*/ 2017 static int 2018 kmt_wapt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep) 2019 { 2020 kmdb_dpi_wapt_disarm(sep->se_data); 2021 2022 return (0); 2023 } 2024 2025 /* 2026 * Determine whether the specified sespec is an armed breakpoint at the given 2027 * %pc. We use this to find conflicts with watchpoints below. 2028 */ 2029 static int 2030 kmt_bp_overlap(mdb_sespec_t *sep, uintptr_t pc) 2031 { 2032 kmt_brkpt_t *kb = sep->se_data; 2033 2034 return (sep->se_state == MDB_TGT_SPEC_ARMED && 2035 sep->se_ops == &kmt_brkpt_ops && kb->kb_addr == pc); 2036 } 2037 2038 /* 2039 * We step over watchpoints using our single-stepper. If a conflicting 2040 * breakpoint is present, we must temporarily disarm it before stepping over 2041 * the watchpoint so we do not immediately re-trigger the breakpoint. This is 2042 * similar to the case handled in kmt_brkpt_cont(), above. 2043 */ 2044 static int 2045 kmt_wapt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2046 { 2047 mdb_sespec_t *bep = NULL; 2048 int status = -1; 2049 int error, why; 2050 2051 /* 2052 * If we stopped for anything other than a watchpoint, check to see 2053 * if there's a breakpoint here. 2054 */ 2055 if (!(kmdb_dpi_get_state(&why) == DPI_STATE_FAULTED && 2056 (why == DPI_STATE_WHY_V_WAPT || why == DPI_STATE_WHY_P_WAPT))) { 2057 kreg_t pc; 2058 2059 (void) kmdb_dpi_get_register("pc", &pc); 2060 2061 for (bep = mdb_list_next(&t->t_active); bep != NULL; 2062 bep = mdb_list_next(bep)) { 2063 if (kmt_bp_overlap(bep, pc)) { 2064 (void) bep->se_ops->se_disarm(t, bep); 2065 bep->se_state = MDB_TGT_SPEC_ACTIVE; 2066 break; 2067 } 2068 } 2069 } 2070 2071 kmdb_dpi_wapt_disarm(sep->se_data); 2072 if (kmt_step(t, tsp) == 0) 2073 status = kmt_status(t, tsp); 2074 2075 error = errno; /* save errno from step or status */ 2076 2077 if (bep != NULL) 2078 mdb_tgt_sespec_arm_one(t, bep); 2079 2080 (void) set_errno(error); 2081 return (status); 2082 } 2083 2084 /*ARGSUSED*/ 2085 static int 2086 kmt_wapt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2087 { 2088 return (kmdb_dpi_wapt_match(sep->se_data)); 2089 } 2090 2091 static const mdb_se_ops_t kmt_wapt_ops = { 2092 .se_ctor = kmt_wapt_ctor, 2093 .se_dtor = kmt_wapt_dtor, 2094 .se_info = kmt_wapt_info, 2095 .se_secmp = kmt_wapt_secmp, 2096 .se_vecmp = kmt_wapt_vecmp, 2097 .se_arm = kmt_wapt_arm, 2098 .se_disarm = kmt_wapt_disarm, 2099 .se_cont = kmt_wapt_cont, 2100 .se_match = kmt_wapt_match, 2101 }; 2102 2103 /*ARGSUSED*/ 2104 static int 2105 kmt_trap_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 2106 { 2107 sep->se_data = args; /* trap number */ 2108 2109 return (0); 2110 } 2111 2112 /*ARGSUSED*/ 2113 static char * 2114 kmt_trap_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 2115 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 2116 { 2117 const char *name; 2118 int trapnum; 2119 2120 if (vep != NULL) 2121 trapnum = (intptr_t)vep->ve_args; 2122 else 2123 trapnum = (intptr_t)sep->se_data; 2124 2125 if (trapnum == KMT_TRAP_ALL) 2126 name = "any trap"; 2127 else if (trapnum == KMT_TRAP_NOTENUM) 2128 name = "miscellaneous trap"; 2129 else 2130 name = kmt_trapname(trapnum); 2131 2132 (void) mdb_iob_snprintf(buf, nbytes, "single-step stop on %s", name); 2133 2134 return (buf); 2135 } 2136 2137 /*ARGSUSED2*/ 2138 static int 2139 kmt_trap_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2140 { 2141 int spectt = (intptr_t)sep->se_data; 2142 kmt_data_t *kmt = t->t_data; 2143 kreg_t tt; 2144 2145 (void) kmdb_dpi_get_register("tt", &tt); 2146 2147 switch (spectt) { 2148 case KMT_TRAP_ALL: 2149 return (1); 2150 case KMT_TRAP_NOTENUM: 2151 return (tt > kmt->kmt_trapmax || 2152 !BT_TEST(kmt->kmt_trapmap, tt)); 2153 default: 2154 return (tt == spectt); 2155 } 2156 } 2157 2158 static const mdb_se_ops_t kmt_trap_ops = { 2159 .se_ctor = kmt_trap_ctor, 2160 .se_dtor = no_se_dtor, 2161 .se_info = kmt_trap_info, 2162 .se_secmp = no_se_secmp, 2163 .se_vecmp = no_se_vecmp, 2164 .se_arm = no_se_arm, 2165 .se_disarm = no_se_disarm, 2166 .se_cont = no_se_cont, 2167 .se_match = kmt_trap_match, 2168 }; 2169 2170 static void 2171 kmt_bparg_dtor(mdb_vespec_t *vep) 2172 { 2173 kmt_bparg_t *ka = vep->ve_args; 2174 2175 if (ka->ka_symbol != NULL) 2176 strfree(ka->ka_symbol); 2177 2178 if (ka->ka_defbp != NULL) 2179 kmt_defbp_delete(mdb.m_target, ka->ka_defbp); 2180 2181 mdb_free(ka, sizeof (kmt_bparg_t)); 2182 } 2183 2184 static int 2185 kmt_add_vbrkpt(mdb_tgt_t *t, uintptr_t addr, 2186 int spec_flags, mdb_tgt_se_f *func, void *data) 2187 { 2188 kmt_bparg_t *ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP); 2189 2190 ka->ka_addr = addr; 2191 ka->ka_symbol = NULL; 2192 ka->ka_defbp = NULL; 2193 2194 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags, 2195 func, data, ka, kmt_bparg_dtor)); 2196 } 2197 2198 static int 2199 kmt_add_sbrkpt(mdb_tgt_t *t, const char *fullname, 2200 int spec_flags, mdb_tgt_se_f *func, void *data) 2201 { 2202 kmt_bparg_t *ka; 2203 kmt_defbp_t *dbp; 2204 GElf_Sym sym; 2205 char *tick, *objname, *symname; 2206 int serrno; 2207 2208 if ((tick = strchr(fullname, '`')) == fullname) { 2209 (void) set_errno(EMDB_NOOBJ); 2210 return (0); 2211 } 2212 2213 /* 2214 * Deferred breakpoints are always scoped. If we didn't find a tick, 2215 * there's no scope. We'll create a vbrkpt, but only if we can turn the 2216 * provided string into an address. 2217 */ 2218 if (tick == NULL) { 2219 uintptr_t addr; 2220 2221 if (strisbasenum(fullname)) { 2222 addr = mdb_strtoull(fullname); /* a bare address */ 2223 } else if (mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EVERY, 2224 fullname, &sym, NULL) < 0) { 2225 (void) set_errno(EMDB_NOSYM); 2226 return (0); 2227 } else { 2228 addr = (uintptr_t)sym.st_value; /* unscoped sym name */ 2229 } 2230 2231 return (kmt_add_vbrkpt(t, addr, spec_flags, func, data)); 2232 } 2233 2234 if (*(tick + 1) == '\0') { 2235 (void) set_errno(EMDB_NOSYM); 2236 return (0); 2237 } 2238 2239 objname = strndup(fullname, tick - fullname); 2240 symname = tick + 1; 2241 2242 if (mdb_tgt_lookup_by_name(t, objname, symname, NULL, NULL) < 0 && 2243 errno != EMDB_NOOBJ) { 2244 serrno = errno; 2245 strfree(objname); 2246 2247 (void) set_errno(serrno); 2248 return (0); /* errno is set for us */ 2249 } 2250 2251 dbp = kmt_defbp_create(t, objname, symname); 2252 strfree(objname); 2253 2254 ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP); 2255 ka->ka_symbol = strdup(fullname); 2256 ka->ka_addr = 0; 2257 ka->ka_defbp = dbp; 2258 2259 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags, 2260 func, data, ka, kmt_bparg_dtor)); 2261 } 2262 2263 static int 2264 kmt_wparg_overlap(const kmdb_wapt_t *wp1, const kmdb_wapt_t *wp2) 2265 { 2266 /* Assume the watchpoint spaces don't overlap */ 2267 if (wp1->wp_type != wp2->wp_type) 2268 return (0); 2269 2270 if (wp2->wp_addr + wp2->wp_size <= wp1->wp_addr) 2271 return (0); /* no range overlap */ 2272 2273 if (wp1->wp_addr + wp1->wp_size <= wp2->wp_addr) 2274 return (0); /* no range overlap */ 2275 2276 return (wp1->wp_addr != wp2->wp_addr || wp1->wp_size != wp2->wp_size || 2277 wp1->wp_wflags != wp2->wp_wflags); 2278 } 2279 2280 static void 2281 kmt_wparg_dtor(mdb_vespec_t *vep) 2282 { 2283 mdb_free(vep->ve_args, sizeof (kmdb_wapt_t)); 2284 } 2285 2286 static int 2287 kmt_add_wapt_common(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2288 int spec_flags, mdb_tgt_se_f *func, void *data, int type) 2289 { 2290 kmdb_wapt_t *wp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP); 2291 mdb_sespec_t *sep; 2292 2293 wp->wp_addr = addr; 2294 wp->wp_size = len; 2295 wp->wp_type = type; 2296 wp->wp_wflags = wflags; 2297 2298 if (kmdb_dpi_wapt_validate(wp) < 0) 2299 return (0); /* errno is set for us */ 2300 2301 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 2302 if (sep->se_ops == &kmt_wapt_ops && 2303 mdb_list_next(&sep->se_velist) != NULL && 2304 kmt_wparg_overlap(wp, sep->se_data)) 2305 goto wapt_dup; 2306 } 2307 2308 for (sep = mdb_list_next(&t->t_idle); sep; sep = mdb_list_next(sep)) { 2309 if (sep->se_ops == &kmt_wapt_ops && kmt_wparg_overlap(wp, 2310 ((mdb_vespec_t *)mdb_list_next(&sep->se_velist))->ve_args)) 2311 goto wapt_dup; 2312 } 2313 2314 return (mdb_tgt_vespec_insert(t, &kmt_wapt_ops, spec_flags, 2315 func, data, wp, kmt_wparg_dtor)); 2316 2317 wapt_dup: 2318 mdb_free(wp, sizeof (kmdb_wapt_t)); 2319 (void) set_errno(EMDB_WPDUP); 2320 return (0); 2321 } 2322 2323 static int 2324 kmt_add_pwapt(mdb_tgt_t *t, physaddr_t addr, size_t len, uint_t wflags, 2325 int spec_flags, mdb_tgt_se_f *func, void *data) 2326 { 2327 return (kmt_add_wapt_common(t, (uintptr_t)addr, len, wflags, spec_flags, 2328 func, data, DPI_WAPT_TYPE_PHYS)); 2329 } 2330 2331 static int 2332 kmt_add_vwapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2333 int spec_flags, mdb_tgt_se_f *func, void *data) 2334 { 2335 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func, 2336 data, DPI_WAPT_TYPE_VIRT)); 2337 } 2338 2339 static int 2340 kmt_add_iowapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2341 int spec_flags, mdb_tgt_se_f *func, void *data) 2342 { 2343 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func, 2344 data, DPI_WAPT_TYPE_IO)); 2345 } 2346 2347 static int 2348 kmt_add_trap(mdb_tgt_t *t, int trapnum, int spec_flags, mdb_tgt_se_f *func, 2349 void *data) 2350 { 2351 kmt_data_t *kmt = t->t_data; 2352 2353 if (trapnum != KMT_TRAP_ALL && trapnum != KMT_TRAP_NOTENUM) { 2354 if (trapnum < 0 || trapnum > kmt->kmt_trapmax) { 2355 (void) set_errno(EMDB_BADFLTNUM); 2356 return (0); 2357 } 2358 2359 BT_SET(kmt->kmt_trapmap, trapnum); 2360 } 2361 2362 return (mdb_tgt_vespec_insert(t, &kmt_trap_ops, spec_flags, func, data, 2363 (void *)(uintptr_t)trapnum, no_ve_dtor)); 2364 } 2365 2366 /*ARGSUSED*/ 2367 static uintmax_t 2368 kmt_cpuid_disc_get(const mdb_var_t *v) 2369 { 2370 return (kmdb_dpi_get_master_cpuid()); 2371 } 2372 2373 static const mdb_nv_disc_t kmt_cpuid_disc = { 2374 .disc_get = kmt_cpuid_disc_get 2375 }; 2376 2377 /* 2378 * This routine executes while the kernel is running. 2379 */ 2380 void 2381 kmt_activate(mdb_tgt_t *t) 2382 { 2383 kmt_data_t *kmt = t->t_data; 2384 2385 mdb_prop_postmortem = FALSE; 2386 mdb_prop_kernel = TRUE; 2387 2388 (void) mdb_tgt_register_dcmds(t, &kmt_dcmds[0], MDB_MOD_FORCE); 2389 mdb_tgt_register_regvars(t, kmt->kmt_rds, &kmt_reg_disc, 0); 2390 2391 /* 2392 * Force load of the MDB krtld module, in case it's been rolled into 2393 * unix. 2394 */ 2395 (void) mdb_module_load(KMT_RTLD_NAME, MDB_MOD_SILENT | MDB_MOD_DEFER); 2396 } 2397 2398 static void 2399 kmt_destroy(mdb_tgt_t *t) 2400 { 2401 kmt_data_t *kmt = t->t_data; 2402 kmt_module_t *km, *pkm; 2403 2404 mdb_nv_destroy(&kmt->kmt_modules); 2405 for (km = mdb_list_prev(&kmt->kmt_modlist); km != NULL; km = pkm) { 2406 pkm = mdb_list_prev(km); 2407 mdb_free(km, sizeof (kmt_module_t)); 2408 } 2409 2410 if (!kmt_defbp_lock) 2411 kmt_defbp_destroy_all(); 2412 2413 if (kmt->kmt_trapmap != NULL) 2414 mdb_free(kmt->kmt_trapmap, BT_SIZEOFMAP(kmt->kmt_trapmax)); 2415 2416 mdb_free(kmt, sizeof (kmt_data_t)); 2417 } 2418 2419 static const mdb_tgt_ops_t kmt_ops = { 2420 .t_setflags = kmt_setflags, 2421 .t_setcontext = (int (*)())(uintptr_t)mdb_tgt_notsup, 2422 .t_activate = kmt_activate, 2423 .t_deactivate = (void (*)())(uintptr_t)mdb_tgt_nop, 2424 .t_periodic = kmt_periodic, 2425 .t_destroy = kmt_destroy, 2426 .t_name = kmt_name, 2427 .t_isa = (const char *(*)())mdb_conf_isa, 2428 .t_platform = kmt_platform, 2429 .t_uname = kmt_uname, 2430 .t_dmodel = kmt_dmodel, 2431 .t_aread = (ssize_t (*)())mdb_tgt_notsup, 2432 .t_awrite = (ssize_t (*)())mdb_tgt_notsup, 2433 .t_vread = kmt_read, 2434 .t_vwrite = kmt_write, 2435 .t_pread = kmt_pread, 2436 .t_pwrite = kmt_pwrite, 2437 .t_fread = kmt_read, 2438 .t_fwrite = kmt_write, 2439 .t_ioread = kmt_ioread, 2440 .t_iowrite = kmt_iowrite, 2441 .t_vtop = kmt_vtop, 2442 .t_lookup_by_name = kmt_lookup_by_name, 2443 .t_lookup_by_addr = kmt_lookup_by_addr, 2444 .t_symbol_iter = kmt_symbol_iter, 2445 .t_mapping_iter = kmt_mapping_iter, 2446 .t_object_iter = kmt_object_iter, 2447 .t_addr_to_map = kmt_addr_to_map, 2448 .t_name_to_map = kmt_name_to_map, 2449 .t_addr_to_ctf = kmt_addr_to_ctf, 2450 .t_name_to_ctf = kmt_name_to_ctf, 2451 .t_status = kmt_status, 2452 .t_run = (int (*)())(uintptr_t)mdb_tgt_notsup, 2453 .t_step = kmt_step, 2454 .t_step_out = kmt_step_out, 2455 .t_next = kmt_next, 2456 .t_cont = kmt_continue, 2457 .t_signal = (int (*)())(uintptr_t)mdb_tgt_notsup, 2458 .t_add_vbrkpt = kmt_add_vbrkpt, 2459 .t_add_sbrkpt = kmt_add_sbrkpt, 2460 .t_add_pwapt = kmt_add_pwapt, 2461 .t_add_vwapt = kmt_add_vwapt, 2462 .t_add_iowapt = kmt_add_iowapt, 2463 .t_add_sysenter = (int (*)())(uintptr_t)mdb_tgt_null, 2464 .t_add_sysexit = (int (*)())(uintptr_t)mdb_tgt_null, 2465 .t_add_signal = (int (*)())(uintptr_t)mdb_tgt_null, 2466 .t_add_fault = kmt_add_trap, 2467 .t_getareg = kmt_getareg, 2468 .t_putareg = kmt_putareg, 2469 .t_stack_iter = (int (*)())(uintptr_t)mdb_tgt_nop, /* XXX */ 2470 .t_auxv = (int (*)())(uintptr_t)mdb_tgt_notsup, 2471 .t_thread_name = (int (*)())(uintptr_t)mdb_tgt_notsup, 2472 }; 2473 2474 /* 2475 * Called immediately upon resumption of the system after a step or continue. 2476 * Allows us to synchronize kmt's view of the world with reality. 2477 */ 2478 /*ARGSUSED*/ 2479 static void 2480 kmt_sync(mdb_tgt_t *t) 2481 { 2482 kmt_data_t *kmt = t->t_data; 2483 int symavail; 2484 2485 mdb_dprintf(MDB_DBG_KMOD, "synchronizing with kernel\n"); 2486 2487 symavail = kmt->kmt_symavail; 2488 kmt->kmt_symavail = FALSE; 2489 2490 /* 2491 * Resync our view of the world if the modules have changed, or if we 2492 * didn't have any symbols coming into this function. The latter will 2493 * only happen on startup. 2494 */ 2495 if (kmdb_kdi_mods_changed() || !symavail) 2496 kmt_modlist_update(t); 2497 2498 /* 2499 * It would be nice if we could run this less frequently, perhaps 2500 * after a dvec-initiated trigger. 2501 */ 2502 kmdb_module_sync(); 2503 2504 kmt->kmt_symavail = TRUE; 2505 2506 mdb_dprintf(MDB_DBG_KMOD, "synchronization complete\n"); 2507 2508 kmt_defbp_prune(); 2509 2510 if (kmt_defbp_num > 0 && kmt_defbp_bpspec == 0 && 2511 kmdb_kdi_dtrace_get_state() != KDI_DTSTATE_DTRACE_ACTIVE) { 2512 /* 2513 * Deferred breakpoints were created while DTrace was active, 2514 * and consequently the deferred breakpoint enabling mechanism 2515 * wasn't activated. Activate it now, and then try to activate 2516 * the deferred breakpoints. We do this so that we can catch 2517 * the ones which may apply to modules that have been loaded 2518 * while they were waiting for DTrace to deactivate. 2519 */ 2520 (void) kmt_defbp_activate(t); 2521 (void) mdb_tgt_sespec_activate_all(t); 2522 } 2523 2524 (void) mdb_tgt_status(t, &t->t_status); 2525 } 2526 2527 /* 2528 * This routine executes while the kernel is running. 2529 */ 2530 /*ARGSUSED*/ 2531 int 2532 kmdb_kvm_create(mdb_tgt_t *t, int argc, const char *argv[]) 2533 { 2534 kmt_data_t *kmt; 2535 2536 if (argc != 0) 2537 return (set_errno(EINVAL)); 2538 2539 kmt = mdb_zalloc(sizeof (kmt_data_t), UM_SLEEP); 2540 t->t_data = kmt; 2541 t->t_ops = &kmt_ops; 2542 t->t_flags |= MDB_TGT_F_RDWR; /* kmdb is always r/w */ 2543 2544 (void) mdb_nv_insert(&mdb.m_nv, "cpuid", &kmt_cpuid_disc, 0, 2545 MDB_NV_PERSIST | MDB_NV_RDONLY); 2546 2547 (void) mdb_nv_create(&kmt->kmt_modules, UM_SLEEP); 2548 2549 kmt_init_isadep(t); 2550 2551 kmt->kmt_symavail = FALSE; 2552 2553 bzero(&kmt_defbp_list, sizeof (mdb_list_t)); 2554 2555 return (0); 2556 2557 create_err: 2558 kmt_destroy(t); 2559 2560 return (-1); 2561 } 2562 2563 /* 2564 * This routine is called once, when kmdb first has control of the world. 2565 */ 2566 void 2567 kmdb_kvm_startup(void) 2568 { 2569 kmt_data_t *kmt = mdb.m_target->t_data; 2570 2571 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm startup\n"); 2572 2573 kmt_sync(mdb.m_target); 2574 (void) mdb_module_load_builtin(KMT_MODULE); 2575 kmt_startup_isadep(mdb.m_target); 2576 2577 /* 2578 * This is here because we need to write the deferred breakpoint 2579 * breakpoint when the debugger starts. Our normal r/o write routines 2580 * don't work when the kernel is running, so we have to do it during 2581 * startup. 2582 */ 2583 (void) mdb_tgt_sespec_activate_all(mdb.m_target); 2584 2585 kmt->kmt_rtld_name = KMT_RTLD_NAME; 2586 2587 if (kmt_module_by_name(kmt, KMT_RTLD_NAME) == NULL) 2588 kmt->kmt_rtld_name = "unix"; 2589 } 2590 2591 /* 2592 * This routine is called after kmdb has loaded its initial set of modules. 2593 */ 2594 void 2595 kmdb_kvm_poststartup(void) 2596 { 2597 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm post-startup\n"); 2598 2599 (void) mdb_dis_select(kmt_def_dismode()); 2600 } 2601