1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <kmdb/kmdb_kvm.h> 27 #include <kmdb/kvm.h> 28 #include <kmdb/kmdb_kdi.h> 29 #include <kmdb/kmdb_promif.h> 30 #include <kmdb/kmdb_module.h> 31 #include <kmdb/kmdb_asmutil.h> 32 #include <mdb/mdb_types.h> 33 #include <mdb/mdb_conf.h> 34 #include <mdb/mdb_err.h> 35 #include <mdb/mdb_modapi.h> 36 #include <mdb/mdb_target_impl.h> 37 #include <mdb/mdb_debug.h> 38 #include <mdb/mdb_string.h> 39 #include <mdb/mdb_ctf.h> 40 #include <mdb/mdb_kreg_impl.h> 41 #include <mdb/mdb_ks.h> 42 #include <mdb/mdb.h> 43 44 #include <strings.h> 45 #include <dlfcn.h> 46 #include <sys/isa_defs.h> 47 #include <sys/kobj.h> 48 #include <sys/kobj_impl.h> 49 #include <sys/bitmap.h> 50 #include <vm/as.h> 51 52 static const char KMT_RTLD_NAME[] = "krtld"; 53 static const char KMT_MODULE[] = "mdb_ks"; 54 static const char KMT_CTFPARENT[] = "genunix"; 55 56 static mdb_list_t kmt_defbp_list; /* List of current deferred bp's */ 57 static int kmt_defbp_lock; /* For list, running kernel holds */ 58 static uint_t kmt_defbp_modchg_isload; /* Whether mod change is load/unload */ 59 static struct modctl *kmt_defbp_modchg_modctl; /* modctl for defbp checking */ 60 static uint_t kmt_defbp_num; /* Number of referenced def'd bp's */ 61 static int kmt_defbp_bpspec; /* vespec for def'd bp activation bp */ 62 63 static const mdb_se_ops_t kmt_brkpt_ops; 64 static const mdb_se_ops_t kmt_wapt_ops; 65 66 static void kmt_sync(mdb_tgt_t *); 67 68 typedef struct kmt_symarg { 69 mdb_tgt_sym_f *sym_cb; /* Caller's callback function */ 70 void *sym_data; /* Callback function argument */ 71 uint_t sym_type; /* Symbol type/binding filter */ 72 mdb_syminfo_t sym_info; /* Symbol id and table id */ 73 const char *sym_obj; /* Containing object */ 74 } kmt_symarg_t; 75 76 typedef struct kmt_maparg { 77 mdb_tgt_t *map_target; /* Target used for mapping iter */ 78 mdb_tgt_map_f *map_cb; /* Caller's callback function */ 79 void *map_data; /* Callback function argument */ 80 } kmt_maparg_t; 81 82 /*ARGSUSED*/ 83 int 84 kmt_setflags(mdb_tgt_t *t, int flags) 85 { 86 /* 87 * We only handle one flag (ALLOWIO), and we can't fail to set or clear 88 * it, so we just blindly replace the t_flags version with the one 89 * passed. 90 */ 91 t->t_flags = (t->t_flags & ~MDB_TGT_F_ALLOWIO) | 92 (flags & MDB_TGT_F_ALLOWIO); 93 94 return (0); 95 } 96 97 /*ARGSUSED*/ 98 const char * 99 kmt_name(mdb_tgt_t *t) 100 { 101 return ("kmdb_kvm"); 102 } 103 104 /*ARGSUSED*/ 105 static const char * 106 kmt_platform(mdb_tgt_t *t) 107 { 108 static char platform[SYS_NMLN]; 109 110 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT) 111 return (mdb_conf_platform()); 112 113 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, platform, 114 sizeof (platform), "unix", "platform") != sizeof (platform)) { 115 warn("'platform' symbol is missing from kernel\n"); 116 return ("unknown"); 117 } 118 119 return (platform); 120 } 121 122 static int 123 kmt_uname(mdb_tgt_t *t, struct utsname *utsp) 124 { 125 return (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, utsp, 126 sizeof (struct utsname), MDB_TGT_OBJ_EXEC, "utsname")); 127 } 128 129 /*ARGSUSED*/ 130 static int 131 kmt_dmodel(mdb_tgt_t *t) 132 { 133 return (MDB_TGT_MODEL_NATIVE); 134 } 135 136 /*ARGSUSED*/ 137 ssize_t 138 kmt_rw(mdb_tgt_t *t, void *buf, size_t nbytes, uint64_t addr, 139 ssize_t (*rw)(void *, size_t, uint64_t)) 140 { 141 size_t n, ndone, chunksz; 142 jmp_buf *oldpcb = NULL; 143 jmp_buf pcb; 144 ssize_t res; 145 146 kmdb_prom_check_interrupt(); 147 148 if (nbytes == 0) 149 return (0); 150 151 /* 152 * Try to process the entire buffer, as requested. If we catch a fault, 153 * try smaller chunks. This allows us to handle regions that cross 154 * mapping boundaries. 155 */ 156 chunksz = nbytes; 157 ndone = 0; 158 if (setjmp(pcb) != 0) { 159 if (chunksz == 1) { 160 /* We failed with the smallest chunk - give up */ 161 kmdb_dpi_restore_fault_hdlr(oldpcb); 162 return (ndone > 0 ? ndone : -1); /* errno set for us */ 163 } else if (chunksz > 4) 164 chunksz = 4; 165 else 166 chunksz = 1; 167 } 168 169 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb); 170 while (nbytes > 0) { 171 n = MIN(chunksz, nbytes); 172 173 if ((res = rw(buf, n, addr)) != n) 174 return (res < 0 ? res : ndone + res); 175 176 addr += n; 177 nbytes -= n; 178 ndone += n; 179 buf = ((caddr_t)buf + n); 180 } 181 182 kmdb_dpi_restore_fault_hdlr(oldpcb); 183 184 return (ndone); 185 } 186 187 static void 188 kmt_bcopy(const void *s1, void *s2, size_t n) 189 { 190 /* 191 * We need to guarantee atomic accesses for certain sizes. bcopy won't 192 * make that guarantee, so we need to do it ourselves. 193 */ 194 #ifdef _LP64 195 if (n == 8 && ((uintptr_t)s1 & 7) == 0 && ((uintptr_t)s2 & 7) == 0) 196 *(uint64_t *)s2 = *(uint64_t *)s1; 197 else 198 #endif 199 if (n == 4 && ((uintptr_t)s1 & 3) == 0 && ((uintptr_t)s2 & 3) == 0) 200 *(uint32_t *)s2 = *(uint32_t *)s1; 201 else if (n == 2 && ((uintptr_t)s1 & 1) == 0 && ((uintptr_t)s2 & 1) == 0) 202 *(uint16_t *)s2 = *(uint16_t *)s1; 203 else if (n == 1) 204 *(uint8_t *)s2 = *(uint8_t *)s1; 205 else 206 bcopy(s1, s2, n); 207 } 208 209 static ssize_t 210 kmt_reader(void *buf, size_t nbytes, uint64_t addr) 211 { 212 kmt_bcopy((void *)(uintptr_t)addr, buf, nbytes); 213 return (nbytes); 214 } 215 216 ssize_t 217 kmt_writer(void *buf, size_t nbytes, uint64_t addr) 218 { 219 kmt_bcopy(buf, (void *)(uintptr_t)addr, nbytes); 220 return (nbytes); 221 } 222 223 /*ARGSUSED*/ 224 static ssize_t 225 kmt_read(mdb_tgt_t *t, void *buf, size_t nbytes, uintptr_t addr) 226 { 227 /* 228 * We don't want to allow reads of I/O-mapped memory. Multi-page reads 229 * that cross into I/O-mapped memory should be restricted to the initial 230 * non-I/O region. Reads that begin in I/O-mapped memory are failed 231 * outright. 232 */ 233 if (!(t->t_flags & MDB_TGT_F_ALLOWIO) && 234 (nbytes = kmdb_kdi_range_is_nontoxic(addr, nbytes, 0)) == 0) 235 return (set_errno(EMDB_NOMAP)); 236 237 return (kmt_rw(t, buf, nbytes, addr, kmt_reader)); 238 } 239 240 /*ARGSUSED*/ 241 static ssize_t 242 kmt_pread(mdb_tgt_t *t, void *buf, size_t nbytes, physaddr_t addr) 243 { 244 return (kmt_rw(t, buf, nbytes, addr, kmdb_kdi_pread)); 245 } 246 247 /*ARGSUSED*/ 248 ssize_t 249 kmt_pwrite(mdb_tgt_t *t, const void *buf, size_t nbytes, physaddr_t addr) 250 { 251 return (kmt_rw(t, (void *)buf, nbytes, addr, kmdb_kdi_pwrite)); 252 } 253 254 static uintptr_t 255 kmt_read_kas(mdb_tgt_t *t) 256 { 257 GElf_Sym sym; 258 259 if (mdb_tgt_lookup_by_name(t, "unix", "kas", &sym, NULL) < 0) { 260 warn("'kas' symbol is missing from kernel\n"); 261 (void) set_errno(EMDB_NOSYM); 262 return (0); 263 } 264 265 return ((uintptr_t)sym.st_value); 266 } 267 268 static int 269 kmt_vtop(mdb_tgt_t *t, mdb_tgt_as_t as, uintptr_t va, physaddr_t *pap) 270 { 271 mdb_module_t *mod; 272 struct as *asp; 273 mdb_var_t *v; 274 275 switch ((uintptr_t)as) { 276 case (uintptr_t)MDB_TGT_AS_PHYS: 277 case (uintptr_t)MDB_TGT_AS_FILE: 278 case (uintptr_t)MDB_TGT_AS_IO: 279 return (set_errno(EINVAL)); 280 case (uintptr_t)MDB_TGT_AS_VIRT: 281 if ((asp = (struct as *)kmt_read_kas(t)) == NULL) 282 return (-1); /* errno is set for us */ 283 break; 284 default: 285 asp = (struct as *)as; 286 287 /* We don't support non-kas vtop */ 288 if (asp != (struct as *)kmt_read_kas(t)) 289 return (set_errno(EMDB_TGTNOTSUP)); 290 } 291 292 if (kmdb_prom_vtop(va, pap) == 0) 293 return (0); 294 295 if ((v = mdb_nv_lookup(&mdb.m_modules, "unix")) != NULL && 296 (mod = mdb_nv_get_cookie(v)) != NULL) { 297 int (*fptr)(uintptr_t, struct as *, physaddr_t *); 298 299 fptr = (int (*)(uintptr_t, struct as *, physaddr_t *)) 300 dlsym(mod->mod_hdl, "platform_vtop"); 301 302 if ((fptr != NULL) && ((*fptr)(va, asp, pap) == 0)) 303 return (0); 304 } 305 306 return (set_errno(EMDB_NOMAP)); 307 } 308 309 /*ARGSUSED*/ 310 static int 311 kmt_cpuregs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 312 { 313 const mdb_tgt_gregset_t *gregs; 314 intptr_t cpuid = DPI_MASTER_CPUID; 315 int i; 316 317 if (flags & DCMD_ADDRSPEC) { 318 if (argc != 0) 319 return (DCMD_USAGE); 320 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) { 321 (void) set_errno(EMDB_NOMAP); 322 mdb_warn("failed to find cpuid for cpu at %p", addr); 323 return (DCMD_ERR); 324 } 325 } 326 327 i = mdb_getopts(argc, argv, 328 'c', MDB_OPT_UINTPTR, &cpuid, 329 NULL); 330 331 argc -= i; 332 argv += i; 333 334 if (argc != 0) 335 return (DCMD_USAGE); 336 337 if ((gregs = kmdb_dpi_get_gregs(cpuid)) == NULL) { 338 warn("failed to retrieve registers for cpu %d", (int)cpuid); 339 return (DCMD_ERR); 340 } 341 342 kmt_printregs(gregs); 343 344 return (DCMD_OK); 345 } 346 347 static int 348 kmt_regs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 349 { 350 if (flags & DCMD_ADDRSPEC) 351 return (DCMD_USAGE); 352 353 return (kmt_cpuregs(addr, flags, argc, argv)); 354 } 355 356 static int 357 kmt_cpustack_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 358 { 359 intptr_t cpuid = DPI_MASTER_CPUID; 360 uint_t verbose = 0; 361 int i; 362 363 if (flags & DCMD_ADDRSPEC) { 364 if ((cpuid = mdb_cpu2cpuid(addr)) < 0) { 365 (void) set_errno(EMDB_NOMAP); 366 mdb_warn("failed to find cpuid for cpu at %p", addr); 367 return (DCMD_ERR); 368 } 369 flags &= ~DCMD_ADDRSPEC; 370 } 371 372 i = mdb_getopts(argc, argv, 373 'c', MDB_OPT_UINTPTR, &cpuid, 374 'v', MDB_OPT_SETBITS, 1, &verbose, 375 NULL); 376 377 argc -= i; 378 argv += i; 379 380 return (kmt_cpustack(addr, flags, argc, argv, cpuid, verbose)); 381 } 382 383 /* 384 * Lasciate ogne speranza, voi ch'intrate. 385 */ 386 static int 387 kmt_call(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 388 { 389 uintptr_t *call_argv, rval; 390 int parse_strings = 1; 391 GElf_Sym sym; 392 jmp_buf *oldpcb = NULL; 393 jmp_buf pcb; 394 int i; 395 396 if (!(flags & DCMD_ADDRSPEC)) 397 return (DCMD_USAGE); 398 399 if (mdb_tgt_lookup_by_addr(mdb.m_target, addr, MDB_TGT_SYM_EXACT, 400 NULL, 0, &sym, NULL) == 0 && GELF_ST_TYPE(sym.st_info) != 401 STT_FUNC) { 402 warn("%a is not a function\n", addr); 403 return (DCMD_ERR); 404 } 405 406 if (argc > 1 && argv[0].a_type == MDB_TYPE_STRING && 407 strcmp(argv[0].a_un.a_str, "-s") == 0) { 408 parse_strings = 0; 409 argc--; 410 argv++; 411 } 412 413 call_argv = mdb_alloc(sizeof (uintptr_t) * argc, UM_SLEEP); 414 415 for (i = 0; i < argc; i++) { 416 switch (argv[i].a_type) { 417 case MDB_TYPE_STRING: 418 /* 419 * mdb_strtoull doesn't return on error, so we have to 420 * pre-check strings suspected to contain numbers. 421 */ 422 if (parse_strings && strisbasenum(argv[i].a_un.a_str)) { 423 call_argv[i] = (uintptr_t)mdb_strtoull( 424 argv[i].a_un.a_str); 425 } else 426 call_argv[i] = (uintptr_t)argv[i].a_un.a_str; 427 428 break; 429 430 case MDB_TYPE_IMMEDIATE: 431 call_argv[i] = argv[i].a_un.a_val; 432 break; 433 434 default: 435 mdb_free(call_argv, 436 sizeof (uintptr_t) * argc); 437 return (DCMD_USAGE); 438 } 439 } 440 441 if (setjmp(pcb) != 0) { 442 warn("call failed: caught a trap\n"); 443 444 kmdb_dpi_restore_fault_hdlr(oldpcb); 445 mdb_free(call_argv, sizeof (uintptr_t) * argc); 446 return (DCMD_ERR); 447 } 448 449 oldpcb = kmdb_dpi_set_fault_hdlr(&pcb); 450 rval = kmdb_dpi_call(addr, argc, call_argv); 451 kmdb_dpi_restore_fault_hdlr(oldpcb); 452 453 if (flags & DCMD_PIPE_OUT) { 454 mdb_printf("%p\n", rval); 455 } else { 456 /* pretty-print the results */ 457 mdb_printf("%p = %a(", rval, addr); 458 for (i = 0; i < argc; i++) { 459 if (i > 0) 460 mdb_printf(", "); 461 if (argv[i].a_type == MDB_TYPE_STRING) { 462 /* I'm ashamed but amused */ 463 char *quote = &("\""[parse_strings && 464 strisbasenum(argv[i].a_un.a_str)]); 465 466 mdb_printf("%s%s%s", quote, argv[i].a_un.a_str, 467 quote); 468 } else 469 mdb_printf("%p", argv[i].a_un.a_val); 470 } 471 mdb_printf(");\n"); 472 } 473 474 mdb_free(call_argv, sizeof (uintptr_t) * argc); 475 476 return (DCMD_OK); 477 } 478 479 /*ARGSUSED*/ 480 int 481 kmt_dump_crumbs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 482 { 483 intptr_t cpu = -1; 484 485 if (flags & DCMD_ADDRSPEC) { 486 if (argc != 0) 487 return (DCMD_USAGE); 488 } else { 489 addr = 0; 490 491 if (mdb_getopts(argc, argv, 492 'c', MDB_OPT_UINTPTR, &cpu, 493 NULL) != argc) 494 return (DCMD_USAGE); 495 } 496 497 kmdb_dpi_dump_crumbs(addr, cpu); 498 499 return (DCMD_OK); 500 } 501 502 /*ARGSUSED*/ 503 static int 504 kmt_noducttape(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 505 { 506 int a = 0; 507 508 return (a/a); 509 } 510 511 static int 512 kmt_dmod_status(char *msg, int state) 513 { 514 kmdb_modctl_t *kmc; 515 mdb_var_t *v; 516 int first = 1, n = 0; 517 518 mdb_nv_rewind(&mdb.m_dmodctl); 519 while ((v = mdb_nv_advance(&mdb.m_dmodctl)) != NULL) { 520 kmc = MDB_NV_COOKIE(v); 521 522 if (kmc->kmc_state != state) 523 continue; 524 525 n++; 526 527 if (msg != NULL) { 528 if (first) { 529 mdb_printf(msg, NULL); 530 first = 0; 531 } 532 533 mdb_printf(" %s", kmc->kmc_modname); 534 } 535 } 536 537 if (!first && msg != NULL) 538 mdb_printf("\n"); 539 540 return (n); 541 } 542 543 /*ARGSUSED*/ 544 static int 545 kmt_status_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 546 { 547 kmt_data_t *kmt = mdb.m_target->t_data; 548 struct utsname uts; 549 kreg_t tt; 550 551 if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, &uts, sizeof (uts), 552 "unix", "utsname") != sizeof (uts)) { 553 warn("failed to read 'utsname' struct from kernel\n"); 554 bzero(&uts, sizeof (uts)); 555 (void) strcpy(uts.nodename, "unknown machine"); 556 } 557 558 mdb_printf("debugging live kernel (%d-bit) on %s\n", 559 (int)(sizeof (void *) * NBBY), 560 (*uts.nodename == '\0' ? "(not set)" : uts.nodename)); 561 mdb_printf("operating system: %s %s (%s)\n", 562 uts.release, uts.version, uts.machine); 563 564 if (kmt->kmt_cpu != NULL) { 565 mdb_printf("CPU-specific support: %s\n", 566 kmt_cpu_name(kmt->kmt_cpu)); 567 } 568 569 mdb_printf("DTrace state: %s\n", (kmdb_kdi_dtrace_get_state() == 570 KDI_DTSTATE_DTRACE_ACTIVE ? "active (debugger breakpoints cannot " 571 "be armed)" : "inactive")); 572 573 (void) kmdb_dpi_get_register("tt", &tt); 574 mdb_printf("stopped on: %s\n", kmt_trapname(tt)); 575 576 (void) kmt_dmod_status("pending dmod loads:", KMDB_MC_STATE_LOADING); 577 (void) kmt_dmod_status("pending dmod unloads:", 578 KMDB_MC_STATE_UNLOADING); 579 580 return (DCMD_OK); 581 } 582 583 /*ARGSUSED*/ 584 static int 585 kmt_switch(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv) 586 { 587 if (!(flags & DCMD_ADDRSPEC) || argc != 0) 588 return (DCMD_USAGE); 589 590 if (kmdb_dpi_switch_master((int)addr) < 0) { 591 warn("failed to switch to CPU %d", (int)addr); 592 return (DCMD_ERR); 593 } 594 595 return (DCMD_OK); 596 } 597 598 static const mdb_dcmd_t kmt_dcmds[] = { 599 { "$c", "?[cnt]", "print stack backtrace", kmt_stack }, 600 { "$C", "?[cnt]", "print stack backtrace", kmt_stackv }, 601 { "$r", NULL, "print general-purpose registers", kmt_regs }, 602 { "$?", NULL, "print status and registers", kmt_regs }, 603 { ":x", ":", "change the active CPU", kmt_switch }, 604 { "call", ":[arg ...]", "call a kernel function", kmt_call }, 605 { "cpustack", "?[-v] [-c cpuid] [cnt]", "print stack backtrace for a " 606 "specific CPU", kmt_cpustack_dcmd }, 607 { "cpuregs", "?[-c cpuid]", "print general-purpose registers for a " 608 "specific CPU", kmt_cpuregs }, 609 { "crumbs", NULL, NULL, kmt_dump_crumbs }, 610 #if defined(__i386) || defined(__amd64) 611 { "in", ":[-L len]", "read from I/O port", kmt_in_dcmd }, 612 { "out", ":[-L len] val", "write to I/O port", kmt_out_dcmd }, 613 { "rdmsr", ":", "read an MSR", kmt_rdmsr }, 614 { "wrmsr", ": val", "write an MSR", kmt_wrmsr }, 615 { "rdpcicfg", ": bus dev func", "read a register in PCI config space", 616 kmt_rdpcicfg }, 617 { "wrpcicfg", ": bus dev func val", "write a register in PCI config " 618 "space", kmt_wrpcicfg }, 619 #endif 620 { "noducttape", NULL, NULL, kmt_noducttape }, 621 { "regs", NULL, "print general-purpose registers", kmt_regs }, 622 { "stack", "?[cnt]", "print stack backtrace", kmt_stack }, 623 { "stackregs", "?", "print stack backtrace and registers", kmt_stackr }, 624 { "status", NULL, "print summary of current target", kmt_status_dcmd }, 625 { "switch", ":", "change the active CPU", kmt_switch }, 626 { NULL } 627 }; 628 629 static uintmax_t 630 kmt_reg_disc_get(const mdb_var_t *v) 631 { 632 mdb_tgt_reg_t r = 0; 633 634 (void) mdb_tgt_getareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), &r); 635 636 return (r); 637 } 638 639 static void 640 kmt_reg_disc_set(mdb_var_t *v, uintmax_t r) 641 { 642 if (mdb_tgt_putareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), r) == -1) 643 warn("failed to modify %%%s register", mdb_nv_get_name(v)); 644 } 645 646 static const mdb_nv_disc_t kmt_reg_disc = { 647 kmt_reg_disc_set, 648 kmt_reg_disc_get 649 }; 650 651 /*ARGSUSED*/ 652 static int 653 kmt_getareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, 654 mdb_tgt_reg_t *rp) 655 { 656 kreg_t val; 657 658 if (kmdb_dpi_get_register(rname, &val) < 0) 659 return (set_errno(EMDB_BADREG)); 660 661 *rp = val; 662 return (0); 663 } 664 665 /*ARGSUSED*/ 666 static int 667 kmt_putareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, mdb_tgt_reg_t r) 668 { 669 if (kmdb_dpi_set_register(rname, r) < 0) 670 return (set_errno(EMDB_BADREG)); 671 672 return (0); 673 } 674 675 static void 676 kmt_mod_destroy(kmt_module_t *km) 677 { 678 if (km->km_name != NULL) 679 strfree(km->km_name); 680 if (km->km_symtab != NULL) 681 mdb_gelf_symtab_destroy(km->km_symtab); 682 if (km->km_ctfp != NULL) 683 mdb_ctf_close(km->km_ctfp); 684 } 685 686 static kmt_module_t * 687 kmt_mod_create(mdb_tgt_t *t, struct modctl *ctlp, char *name) 688 { 689 kmt_module_t *km = mdb_zalloc(sizeof (kmt_module_t), UM_SLEEP); 690 struct module *mod; 691 692 km->km_name = mdb_alloc(strlen(name) + 1, UM_SLEEP); 693 (void) strcpy(km->km_name, name); 694 695 bcopy(ctlp, &km->km_modctl, sizeof (struct modctl)); 696 697 if (mdb_tgt_vread(t, &km->km_module, sizeof (struct module), 698 (uintptr_t)km->km_modctl.mod_mp) != sizeof (struct module)) 699 goto create_module_cleanup; 700 mod = &km->km_module; 701 702 if (mod->symhdr != NULL && mod->strhdr != NULL && mod->symtbl != NULL && 703 mod->strings != NULL) { 704 mdb_gelf_ehdr_to_gehdr(&mod->hdr, &km->km_ehdr); 705 706 km->km_symtab = mdb_gelf_symtab_create_raw(&km->km_ehdr, 707 mod->symhdr, mod->symtbl, mod->strhdr, mod->strings, 708 MDB_TGT_SYMTAB); 709 710 km->km_symtab_va = mod->symtbl; 711 km->km_strtab_va = mod->strings; 712 713 if (mdb_tgt_vread(t, &km->km_symtab_hdr, sizeof (Shdr), 714 (uintptr_t)mod->symhdr) != sizeof (Shdr) || 715 mdb_tgt_vread(t, &km->km_strtab_hdr, sizeof (Shdr), 716 (uintptr_t)mod->strhdr) != sizeof (Shdr)) 717 goto create_module_cleanup; 718 } 719 720 /* 721 * We don't want everyone rooting around in the module structure, so we 722 * make copies of the interesting members. 723 */ 724 km->km_text_va = (uintptr_t)mod->text; 725 km->km_text_size = mod->text_size; 726 km->km_data_va = (uintptr_t)mod->data; 727 km->km_data_size = mod->data_size; 728 km->km_bss_va = (uintptr_t)mod->bss; 729 km->km_bss_size = mod->bss_size; 730 km->km_ctf_va = mod->ctfdata; 731 km->km_ctf_size = mod->ctfsize; 732 733 if (mod->flags & KOBJ_PRIM) 734 km->km_flags |= KM_F_PRIMARY; 735 736 return (km); 737 738 create_module_cleanup: 739 warn("failed to read module %s\n", name); 740 kmt_mod_destroy(km); 741 return (NULL); 742 } 743 744 static void 745 kmt_mod_remove(kmt_data_t *kmt, kmt_module_t *km) 746 { 747 mdb_var_t *v = mdb_nv_lookup(&kmt->kmt_modules, km->km_name); 748 749 ASSERT(v != NULL); 750 751 mdb_dprintf(MDB_DBG_KMOD, "removing module %s\n", km->km_name); 752 753 mdb_list_delete(&kmt->kmt_modlist, km); 754 mdb_nv_remove(&kmt->kmt_modules, v); 755 kmt_mod_destroy(km); 756 } 757 758 static int 759 kmt_modlist_update_cb(struct modctl *modp, void *arg) 760 { 761 mdb_tgt_t *t = arg; 762 kmt_data_t *kmt = t->t_data; 763 kmt_module_t *km; 764 mdb_var_t *v; 765 char name[MAXNAMELEN]; 766 767 if (mdb_tgt_readstr(t, MDB_TGT_AS_VIRT, name, MAXNAMELEN, 768 (uintptr_t)modp->mod_modname) <= 0) { 769 warn("failed to read module name at %p", 770 (void *)modp->mod_modname); 771 } 772 773 /* We only care about modules that are actually loaded */ 774 if (!kmdb_kdi_mod_isloaded(modp)) 775 return (0); 776 777 /* 778 * Skip the modules we already know about and that haven't 779 * changed since last time we were here. 780 */ 781 if ((v = mdb_nv_lookup(&kmt->kmt_modules, name)) != NULL) { 782 km = MDB_NV_COOKIE(v); 783 784 if (kmdb_kdi_mod_haschanged(&km->km_modctl, &km->km_module, 785 modp, modp->mod_mp)) { 786 /* 787 * The module has changed since last we saw it. For 788 * safety, remove our old version, and treat it as a 789 * new module. 790 */ 791 mdb_dprintf(MDB_DBG_KMOD, "stutter module %s\n", name); 792 kmt_mod_remove(kmt, km); 793 } else { 794 km->km_seen = 1; 795 return (0); 796 } 797 } 798 799 mdb_dprintf(MDB_DBG_KMOD, "found new module %s\n", name); 800 801 if ((km = kmt_mod_create(t, modp, name)) != NULL) { 802 mdb_list_append(&kmt->kmt_modlist, km); 803 (void) mdb_nv_insert(&kmt->kmt_modules, name, NULL, 804 (uintptr_t)km, 0); 805 km->km_seen = 1; 806 } 807 808 return (0); 809 } 810 811 static void 812 kmt_modlist_update(mdb_tgt_t *t) 813 { 814 kmt_data_t *kmt = t->t_data; 815 kmt_module_t *km, *kmn; 816 817 if (kmdb_kdi_mod_iter(kmt_modlist_update_cb, t) < 0) { 818 warn("failed to complete update of kernel module list\n"); 819 return; 820 } 821 822 km = mdb_list_next(&kmt->kmt_modlist); 823 while (km != NULL) { 824 kmn = mdb_list_next(km); 825 826 if (km->km_seen == 1) { 827 /* Reset the mark for next time */ 828 km->km_seen = 0; 829 } else { 830 /* 831 * We didn't see it on the kernel's module list, so 832 * remove it from our view of the world. 833 */ 834 kmt_mod_remove(kmt, km); 835 } 836 837 km = kmn; 838 } 839 } 840 841 static void 842 kmt_periodic(mdb_tgt_t *t) 843 { 844 (void) mdb_tgt_status(t, &t->t_status); 845 } 846 847 int 848 kmt_lookup_by_addr(mdb_tgt_t *t, uintptr_t addr, uint_t flags, 849 char *buf, size_t nbytes, GElf_Sym *symp, mdb_syminfo_t *sip) 850 { 851 kmt_data_t *kmt = t->t_data; 852 kmt_module_t *km = mdb_list_next(&kmt->kmt_modlist); 853 kmt_module_t *sym_km = NULL; 854 kmt_module_t prmod; 855 GElf_Sym sym; 856 uint_t symid; 857 const char *name; 858 859 /* 860 * We look through the private symbols (if any), then through the module 861 * symbols. We can simplify the loop if we pretend the private symbols 862 * come from a module. 863 */ 864 if (mdb.m_prsym != NULL) { 865 bzero(&prmod, sizeof (kmt_module_t)); 866 prmod.km_name = "<<<prmod>>>"; 867 prmod.km_symtab = mdb.m_prsym; 868 prmod.km_list.ml_next = (mdb_list_t *)km; 869 km = &prmod; 870 } 871 872 /* Symbol resolution isn't available during initialization */ 873 if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT) 874 return (set_errno(EMDB_NOSYM)); 875 876 for (; km != NULL; km = mdb_list_next(km)) { 877 if (km != &prmod && !kmt->kmt_symavail) 878 continue; 879 880 if (km->km_symtab == NULL) 881 continue; 882 883 if (mdb_gelf_symtab_lookup_by_addr(km->km_symtab, addr, flags, 884 buf, nbytes, symp, &sip->sym_id) != 0 || 885 symp->st_value == 0) 886 continue; 887 888 if (flags & MDB_TGT_SYM_EXACT) { 889 sym_km = km; 890 goto found; 891 } 892 893 /* 894 * If this is the first match we've found, or if this symbol is 895 * closer to the specified address than the last one we found, 896 * use it. 897 */ 898 if (sym_km == NULL || mdb_gelf_sym_closer(symp, &sym, addr)) { 899 sym_km = km; 900 sym = *symp; 901 symid = sip->sym_id; 902 } 903 } 904 905 /* 906 * kmdb dmods are normal kernel modules, loaded by krtld as such. To 907 * avoid polluting modinfo, and to keep from confusing the module 908 * subsystem (many dmods have the same names as real kernel modules), 909 * kmdb keeps their modctls separate, and doesn't allow their loading 910 * to be broadcast via the krtld module load/unload mechanism. As a 911 * result, kmdb_kvm doesn't find out about them, and can't turn their 912 * addresses into symbols. This can be most inconvenient during 913 * debugger faults, as the dmod frames will show up without names. 914 * We weren't able to turn the requested address into a symbol, so we'll 915 * take a spin through the dmods, trying to match our address against 916 * their symbols. 917 */ 918 if (sym_km == NULL) { 919 return (kmdb_module_lookup_by_addr(addr, flags, buf, nbytes, 920 symp, sip)); 921 } 922 923 *symp = sym; 924 sip->sym_id = symid; 925 926 found: 927 /* 928 * Once we've found something, copy the final name into the caller's 929 * buffer and prefix it with the load object name if appropriate. 930 */ 931 name = mdb_gelf_sym_name(sym_km->km_symtab, symp); 932 933 if (sym_km == &prmod) { 934 if (buf != NULL) { 935 (void) strncpy(buf, name, nbytes); 936 buf[nbytes - 1] = '\0'; 937 } 938 sip->sym_table = MDB_TGT_PRVSYM; 939 } else { 940 if (buf != NULL) { 941 if (sym_km->km_flags & KM_F_PRIMARY) { 942 (void) strncpy(buf, name, nbytes); 943 buf[nbytes - 1] = '\0'; 944 } else { 945 (void) mdb_snprintf(buf, nbytes, "%s`%s", 946 sym_km->km_name, name); 947 } 948 } 949 sip->sym_table = MDB_TGT_SYMTAB; 950 } 951 952 return (0); 953 } 954 955 static int 956 kmt_lookup_by_name(mdb_tgt_t *t, const char *obj, const char *name, 957 GElf_Sym *symp, mdb_syminfo_t *sip) 958 { 959 kmt_data_t *kmt = t->t_data; 960 kmt_module_t *km; 961 mdb_var_t *v; 962 GElf_Sym sym; 963 uint_t symid; 964 int n; 965 966 if (!kmt->kmt_symavail) 967 return (set_errno(EMDB_NOSYM)); 968 969 switch ((uintptr_t)obj) { 970 case (uintptr_t)MDB_TGT_OBJ_EXEC: 971 case (uintptr_t)MDB_TGT_OBJ_EVERY: 972 km = mdb_list_next(&kmt->kmt_modlist); 973 n = mdb_nv_size(&kmt->kmt_modules); 974 break; 975 976 case (uintptr_t)MDB_TGT_OBJ_RTLD: 977 obj = kmt->kmt_rtld_name; 978 /*FALLTHROUGH*/ 979 980 default: 981 /* 982 * If this is a request for a dmod symbol, let kmdb_module 983 * handle it. 984 */ 985 if (obj != NULL && strncmp(obj, "DMOD`", 5) == 0) { 986 return (kmdb_module_lookup_by_name(obj + 5, name, 987 symp, sip)); 988 } 989 990 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL) 991 return (set_errno(EMDB_NOOBJ)); 992 993 km = mdb_nv_get_cookie(v); 994 n = 1; 995 } 996 997 /* 998 * kmdb's kvm target is at a bit of a disadvantage compared to mdb's 999 * kvm target when it comes to global symbol lookups. mdb has ksyms, 1000 * which hides pesky things like symbols that are undefined in unix, 1001 * but which are defined in genunix. We don't have such a facility - 1002 * we simply iterate through the modules, looking for a given symbol 1003 * in each. Unless we're careful, we'll return the undef in the 1004 * aforementioned case. 1005 */ 1006 for (; n > 0; n--, km = mdb_list_next(km)) { 1007 if (mdb_gelf_symtab_lookup_by_name(km->km_symtab, name, 1008 &sym, &symid) == 0 && sym.st_shndx != SHN_UNDEF) 1009 break; 1010 } 1011 1012 if (n == 0) 1013 return (set_errno(EMDB_NOSYM)); 1014 1015 found: 1016 bcopy(&sym, symp, sizeof (GElf_Sym)); 1017 sip->sym_id = symid; 1018 sip->sym_table = MDB_TGT_SYMTAB; 1019 1020 return (0); 1021 } 1022 1023 static int 1024 kmt_symtab_func(void *data, const GElf_Sym *sym, const char *name, uint_t id) 1025 { 1026 kmt_symarg_t *arg = data; 1027 1028 if (mdb_tgt_sym_match(sym, arg->sym_type)) { 1029 arg->sym_info.sym_id = id; 1030 1031 return (arg->sym_cb(arg->sym_data, sym, name, &arg->sym_info, 1032 arg->sym_obj)); 1033 } 1034 1035 return (0); 1036 } 1037 1038 static void 1039 kmt_symtab_iter(mdb_gelf_symtab_t *gst, uint_t type, const char *obj, 1040 mdb_tgt_sym_f *cb, void *p) 1041 { 1042 kmt_symarg_t arg; 1043 1044 arg.sym_cb = cb; 1045 arg.sym_data = p; 1046 arg.sym_type = type; 1047 arg.sym_info.sym_table = gst->gst_tabid; 1048 arg.sym_obj = obj; 1049 1050 mdb_gelf_symtab_iter(gst, kmt_symtab_func, &arg); 1051 } 1052 1053 static int 1054 kmt_symbol_iter(mdb_tgt_t *t, const char *obj, uint_t which, uint_t type, 1055 mdb_tgt_sym_f *cb, void *data) 1056 { 1057 kmt_data_t *kmt = t->t_data; 1058 kmt_module_t *km; 1059 1060 mdb_gelf_symtab_t *symtab = NULL; 1061 mdb_var_t *v; 1062 1063 if (which == MDB_TGT_DYNSYM) 1064 return (set_errno(EMDB_TGTNOTSUP)); 1065 1066 switch ((uintptr_t)obj) { 1067 case (uintptr_t)MDB_TGT_OBJ_EXEC: 1068 case (uintptr_t)MDB_TGT_OBJ_EVERY: 1069 mdb_nv_rewind(&kmt->kmt_modules); 1070 while ((v = mdb_nv_advance(&kmt->kmt_modules)) != NULL) { 1071 km = mdb_nv_get_cookie(v); 1072 1073 if (km->km_symtab != NULL) { 1074 kmt_symtab_iter(km->km_symtab, type, 1075 km->km_name, cb, data); 1076 } 1077 } 1078 return (0); 1079 1080 case (uintptr_t)MDB_TGT_OBJ_RTLD: 1081 obj = kmt->kmt_rtld_name; 1082 /*FALLTHROUGH*/ 1083 1084 default: 1085 if (strncmp(obj, "DMOD`", 5) == 0) { 1086 return (kmdb_module_symbol_iter(obj + 5, type, 1087 cb, data)); 1088 } 1089 1090 if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL) 1091 return (set_errno(EMDB_NOOBJ)); 1092 km = mdb_nv_get_cookie(v); 1093 1094 symtab = km->km_symtab; 1095 } 1096 1097 if (symtab != NULL) 1098 kmt_symtab_iter(symtab, type, obj, cb, data); 1099 1100 return (0); 1101 } 1102 1103 static int 1104 kmt_mapping_walk(uintptr_t addr, const void *data, kmt_maparg_t *marg) 1105 { 1106 /* 1107 * This is a bit sketchy but avoids problematic compilation of this 1108 * target against the current VM implementation. Now that we have 1109 * vmem, we can make this less broken and more informative by changing 1110 * this code to invoke the vmem walker in the near future. 1111 */ 1112 const struct kmt_seg { 1113 caddr_t s_base; 1114 size_t s_size; 1115 } *segp = (const struct kmt_seg *)data; 1116 1117 mdb_map_t map; 1118 GElf_Sym sym; 1119 mdb_syminfo_t info; 1120 1121 map.map_base = (uintptr_t)segp->s_base; 1122 map.map_size = segp->s_size; 1123 map.map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X; 1124 1125 if (kmt_lookup_by_addr(marg->map_target, addr, MDB_TGT_SYM_EXACT, 1126 map.map_name, MDB_TGT_MAPSZ, &sym, &info) == -1) { 1127 1128 (void) mdb_iob_snprintf(map.map_name, MDB_TGT_MAPSZ, 1129 "%lr", addr); 1130 } 1131 1132 return (marg->map_cb(marg->map_data, &map, map.map_name)); 1133 } 1134 1135 static int 1136 kmt_mapping_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private) 1137 { 1138 kmt_maparg_t m; 1139 uintptr_t kas; 1140 1141 m.map_target = t; 1142 m.map_cb = func; 1143 m.map_data = private; 1144 1145 if ((kas = kmt_read_kas(t)) == NULL) 1146 return (-1); /* errno is set for us */ 1147 1148 return (mdb_pwalk("seg", (mdb_walk_cb_t)kmt_mapping_walk, &m, kas)); 1149 } 1150 1151 static const mdb_map_t * 1152 kmt_mod_to_map(kmt_module_t *km, mdb_map_t *map) 1153 { 1154 (void) strncpy(map->map_name, km->km_name, MDB_TGT_MAPSZ); 1155 map->map_name[MDB_TGT_MAPSZ - 1] = '\0'; 1156 map->map_base = km->km_text_va; 1157 map->map_size = km->km_text_size; 1158 map->map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X; 1159 1160 return (map); 1161 } 1162 1163 static int 1164 kmt_object_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private) 1165 { 1166 kmt_data_t *kmt = t->t_data; 1167 kmt_module_t *km; 1168 mdb_map_t m; 1169 1170 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1171 km = mdb_list_next(km)) { 1172 if (func(private, kmt_mod_to_map(km, &m), km->km_name) == -1) 1173 break; 1174 } 1175 1176 return (0); 1177 } 1178 1179 static const mdb_map_t * 1180 kmt_addr_to_map(mdb_tgt_t *t, uintptr_t addr) 1181 { 1182 kmt_data_t *kmt = t->t_data; 1183 kmt_module_t *km; 1184 1185 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1186 km = mdb_list_next(km)) { 1187 if (addr - km->km_text_va < km->km_text_size || 1188 addr - km->km_data_va < km->km_data_size || 1189 addr - km->km_bss_va < km->km_bss_size) 1190 return (kmt_mod_to_map(km, &kmt->kmt_map)); 1191 } 1192 1193 (void) set_errno(EMDB_NOMAP); 1194 return (NULL); 1195 } 1196 1197 static kmt_module_t * 1198 kmt_module_by_name(kmt_data_t *kmt, const char *name) 1199 { 1200 kmt_module_t *km; 1201 1202 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1203 km = mdb_list_next(km)) { 1204 if (strcmp(name, km->km_name) == 0) 1205 return (km); 1206 } 1207 1208 return (NULL); 1209 } 1210 1211 static const mdb_map_t * 1212 kmt_name_to_map(mdb_tgt_t *t, const char *name) 1213 { 1214 kmt_data_t *kmt = t->t_data; 1215 kmt_module_t *km; 1216 mdb_map_t m; 1217 1218 /* 1219 * If name is MDB_TGT_OBJ_EXEC, return the first module on the list, 1220 * which will be unix since we keep kmt_modlist in load order. 1221 */ 1222 if (name == MDB_TGT_OBJ_EXEC) { 1223 return (kmt_mod_to_map(mdb_list_next(&kmt->kmt_modlist), 1224 &m)); 1225 } 1226 1227 if (name == MDB_TGT_OBJ_RTLD) 1228 name = kmt->kmt_rtld_name; 1229 1230 if ((km = kmt_module_by_name(kmt, name)) != NULL) 1231 return (kmt_mod_to_map(km, &m)); 1232 1233 (void) set_errno(EMDB_NOOBJ); 1234 return (NULL); 1235 } 1236 1237 static ctf_file_t * 1238 kmt_load_ctfdata(mdb_tgt_t *t, kmt_module_t *km) 1239 { 1240 kmt_data_t *kmt = t->t_data; 1241 int err; 1242 1243 if (km->km_ctfp != NULL) 1244 return (km->km_ctfp); 1245 1246 if (km->km_ctf_va == NULL || km->km_symtab == NULL) { 1247 (void) set_errno(EMDB_NOCTF); 1248 return (NULL); 1249 } 1250 1251 if ((km->km_ctfp = mdb_ctf_bufopen(km->km_ctf_va, km->km_ctf_size, 1252 km->km_symtab_va, &km->km_symtab_hdr, km->km_strtab_va, 1253 &km->km_strtab_hdr, &err)) == NULL) { 1254 (void) set_errno(ctf_to_errno(err)); 1255 return (NULL); 1256 } 1257 1258 mdb_dprintf(MDB_DBG_KMOD, "loaded %lu bytes of CTF data for %s\n", 1259 (ulong_t)km->km_ctf_size, km->km_name); 1260 1261 if (ctf_parent_name(km->km_ctfp) != NULL) { 1262 mdb_var_t *v; 1263 1264 if ((v = mdb_nv_lookup(&kmt->kmt_modules, 1265 ctf_parent_name(km->km_ctfp))) != NULL) { 1266 kmt_module_t *pm = mdb_nv_get_cookie(v); 1267 1268 if (pm->km_ctfp == NULL) 1269 (void) kmt_load_ctfdata(t, pm); 1270 1271 if (pm->km_ctfp != NULL && ctf_import(km->km_ctfp, 1272 pm->km_ctfp) == CTF_ERR) { 1273 warn("failed to import parent types into " 1274 "%s: %s\n", km->km_name, 1275 ctf_errmsg(ctf_errno(km->km_ctfp))); 1276 } 1277 } else { 1278 warn("failed to load CTF data for %s - parent %s not " 1279 "loaded\n", km->km_name, 1280 ctf_parent_name(km->km_ctfp)); 1281 } 1282 } 1283 1284 return (km->km_ctfp); 1285 } 1286 1287 ctf_file_t * 1288 kmt_addr_to_ctf(mdb_tgt_t *t, uintptr_t addr) 1289 { 1290 kmt_data_t *kmt = t->t_data; 1291 kmt_module_t *km; 1292 1293 for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL; 1294 km = mdb_list_next(km)) { 1295 if (addr - km->km_text_va < km->km_text_size || 1296 addr - km->km_data_va < km->km_data_size || 1297 addr - km->km_bss_va < km->km_bss_size) 1298 return (kmt_load_ctfdata(t, km)); 1299 } 1300 1301 return (kmdb_module_addr_to_ctf(addr)); 1302 } 1303 1304 ctf_file_t * 1305 kmt_name_to_ctf(mdb_tgt_t *t, const char *name) 1306 { 1307 kmt_data_t *kt = t->t_data; 1308 kmt_module_t *km; 1309 1310 if (name == MDB_TGT_OBJ_EXEC) { 1311 name = KMT_CTFPARENT; 1312 } else if (name == MDB_TGT_OBJ_RTLD) { 1313 name = kt->kmt_rtld_name; 1314 } else if (strncmp(name, "DMOD`", 5) == 0) { 1315 /* Request for CTF data for a DMOD symbol */ 1316 return (kmdb_module_name_to_ctf(name + 5)); 1317 } 1318 1319 if ((km = kmt_module_by_name(kt, name)) != NULL) 1320 return (kmt_load_ctfdata(t, km)); 1321 1322 (void) set_errno(EMDB_NOOBJ); 1323 return (NULL); 1324 } 1325 1326 /*ARGSUSED*/ 1327 static int 1328 kmt_status(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1329 { 1330 int state; 1331 1332 bzero(tsp, sizeof (mdb_tgt_status_t)); 1333 1334 switch ((state = kmdb_dpi_get_state(NULL))) { 1335 case DPI_STATE_INIT: 1336 tsp->st_state = MDB_TGT_RUNNING; 1337 tsp->st_pc = 0; 1338 break; 1339 1340 case DPI_STATE_STOPPED: 1341 tsp->st_state = MDB_TGT_STOPPED; 1342 1343 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1344 break; 1345 1346 case DPI_STATE_FAULTED: 1347 tsp->st_state = MDB_TGT_STOPPED; 1348 1349 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1350 1351 tsp->st_flags |= MDB_TGT_ISTOP; 1352 break; 1353 1354 case DPI_STATE_LOST: 1355 tsp->st_state = MDB_TGT_LOST; 1356 1357 (void) kmdb_dpi_get_register("pc", &tsp->st_pc); 1358 break; 1359 } 1360 1361 mdb_dprintf(MDB_DBG_KMOD, "kmt_status, dpi: %d tsp: %d, pc = %p %A\n", 1362 state, tsp->st_state, (void *)tsp->st_pc, tsp->st_pc); 1363 1364 return (0); 1365 } 1366 1367 /* 1368 * Invoked when kmt_defbp_enter_debugger is called, this routine activates and 1369 * deactivates deferred breakpoints in response to module load and unload 1370 * events. 1371 */ 1372 /*ARGSUSED*/ 1373 static void 1374 kmt_defbp_event(mdb_tgt_t *t, int vid, void *private) 1375 { 1376 if (kmt_defbp_modchg_isload) { 1377 if (!mdb_tgt_sespec_activate_all(t) && 1378 (mdb.m_flags & MDB_FL_BPTNOSYMSTOP)) { 1379 /* 1380 * We weren't able to activate the breakpoints. 1381 * If so requested, we'll return without calling 1382 * continue, thus throwing the user into the debugger. 1383 */ 1384 return; 1385 } 1386 1387 } else { 1388 mdb_sespec_t *sep, *nsep; 1389 const mdb_map_t *map, *bpmap; 1390 mdb_map_t modmap; 1391 1392 if ((map = kmt_addr_to_map(t, 1393 (uintptr_t)kmt_defbp_modchg_modctl->mod_text)) == NULL) { 1394 warn("module unload notification for unknown module %s", 1395 kmt_defbp_modchg_modctl->mod_modname); 1396 return; /* drop into the debugger */ 1397 } 1398 1399 bcopy(map, &modmap, sizeof (mdb_map_t)); 1400 1401 for (sep = mdb_list_next(&t->t_active); sep; sep = nsep) { 1402 nsep = mdb_list_next(sep); 1403 1404 if (sep->se_ops == &kmt_brkpt_ops) { 1405 kmt_brkpt_t *kb = sep->se_data; 1406 1407 if ((bpmap = kmt_addr_to_map(t, 1408 kb->kb_addr)) == NULL || 1409 (bpmap->map_base == modmap.map_base && 1410 bpmap->map_size == modmap.map_size)) { 1411 mdb_tgt_sespec_idle_one(t, sep, 1412 EMDB_NOMAP); 1413 } 1414 } 1415 } 1416 } 1417 1418 (void) mdb_tgt_continue(t, NULL); 1419 } 1420 1421 static void 1422 kmt_defbp_enter_debugger(void) 1423 { 1424 /* 1425 * The debugger places a breakpoint here. We can't have a simple 1426 * nop function here, because GCC knows much more than we do, and 1427 * will optimize away the call to it. 1428 */ 1429 (void) get_fp(); 1430 } 1431 1432 /* 1433 * This routine is called while the kernel is running. It attempts to determine 1434 * whether any deferred breakpoints exist for the module being changed (loaded 1435 * or unloaded). If any such breakpoints exist, the debugger will be entered to 1436 * process them. 1437 */ 1438 static void 1439 kmt_defbp_modchg(struct modctl *mctl, int isload) 1440 { 1441 kmt_defbp_t *dbp; 1442 1443 kmt_defbp_lock = 1; 1444 1445 for (dbp = mdb_list_next(&kmt_defbp_list); dbp; 1446 dbp = mdb_list_next(dbp)) { 1447 if (!dbp->dbp_ref) 1448 continue; 1449 1450 if (strcmp(mctl->mod_modname, dbp->dbp_objname) == 0) { 1451 /* 1452 * Activate the breakpoint 1453 */ 1454 kmt_defbp_modchg_isload = isload; 1455 kmt_defbp_modchg_modctl = mctl; 1456 1457 kmt_defbp_enter_debugger(); 1458 break; 1459 } 1460 } 1461 1462 kmt_defbp_lock = 0; 1463 } 1464 1465 /*ARGSUSED*/ 1466 static int 1467 kmt_continue(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1468 { 1469 int n; 1470 1471 kmdb_dpi_resume(); 1472 1473 /* 1474 * The order of the following two calls is important. If there are 1475 * load acks on the work queue, we'll initialize the dmods they 1476 * represent. This will involve a call to _mdb_init, which may very 1477 * well result in a symbol lookup. If we haven't resynced our view 1478 * of symbols with the current state of the world, this lookup could 1479 * end very badly. We therefore make sure to sync before processing 1480 * the work queue. 1481 */ 1482 kmt_sync(t); 1483 kmdb_dpi_process_work_queue(); 1484 1485 if (kmdb_kdi_get_unload_request()) 1486 t->t_flags |= MDB_TGT_F_UNLOAD; 1487 1488 (void) mdb_tgt_status(t, &t->t_status); 1489 1490 if ((n = kmt_dmod_status(NULL, KMDB_MC_STATE_LOADING) + 1491 kmt_dmod_status(NULL, KMDB_MC_STATE_UNLOADING)) != 0) { 1492 mdb_warn("%d dmod load%c/unload%c pending\n", n, 1493 "s"[n == 1], "s"[n == 1]); 1494 } 1495 1496 return (0); 1497 } 1498 1499 /*ARGSUSED*/ 1500 static int 1501 kmt_step(mdb_tgt_t *t, mdb_tgt_status_t *tsp) 1502 { 1503 int rc; 1504 1505 if ((rc = kmdb_dpi_step()) == 0) 1506 (void) mdb_tgt_status(t, &t->t_status); 1507 1508 return (rc); 1509 } 1510 1511 static int 1512 kmt_defbp_activate(mdb_tgt_t *t) 1513 { 1514 kmdb_dpi_modchg_register(kmt_defbp_modchg); 1515 1516 /* 1517 * The routines that add and arm breakpoints will check for the proper 1518 * DTrace state, but they'll just put this breakpoint on the idle list 1519 * if DTrace is active. It'll correctly move to the active list when 1520 * DTrace deactivates, but that's insufficient for our purposes -- we 1521 * need to do extra processing at that point. We won't get to do said 1522 * processing with with a normal idle->active transition, so we just 1523 * won't add it add it until we're sure that it'll stick. 1524 */ 1525 1526 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1527 return (set_errno(EMDB_DTACTIVE)); 1528 1529 kmt_defbp_bpspec = mdb_tgt_add_vbrkpt(t, 1530 (uintptr_t)kmt_defbp_enter_debugger, 1531 MDB_TGT_SPEC_HIDDEN, kmt_defbp_event, NULL); 1532 1533 return (0); 1534 } 1535 1536 static void 1537 kmt_defbp_deactivate(mdb_tgt_t *t) 1538 { 1539 kmdb_dpi_modchg_cancel(); 1540 1541 if (kmt_defbp_bpspec != 0) { 1542 if (t != NULL) 1543 (void) mdb_tgt_vespec_delete(t, kmt_defbp_bpspec); 1544 1545 kmt_defbp_bpspec = 0; 1546 } 1547 } 1548 1549 static kmt_defbp_t * 1550 kmt_defbp_create(mdb_tgt_t *t, const char *objname, const char *symname) 1551 { 1552 kmt_defbp_t *dbp = mdb_alloc(sizeof (kmt_defbp_t), UM_SLEEP); 1553 1554 mdb_dprintf(MDB_DBG_KMOD, "defbp_create %s`%s\n", objname, symname); 1555 1556 dbp->dbp_objname = strdup(objname); 1557 dbp->dbp_symname = strdup(symname); 1558 dbp->dbp_ref = 1; 1559 1560 kmt_defbp_num++; 1561 1562 if (kmt_defbp_num == 1 || kmt_defbp_bpspec == 0) { 1563 if (kmt_defbp_activate(t) < 0) 1564 warn("failed to activate deferred breakpoints"); 1565 } 1566 1567 mdb_list_append(&kmt_defbp_list, dbp); 1568 1569 return (dbp); 1570 } 1571 1572 static void 1573 kmt_defbp_destroy(kmt_defbp_t *dbp) 1574 { 1575 mdb_dprintf(MDB_DBG_KMOD, "defbp_destroy %s`%s\n", dbp->dbp_objname, 1576 dbp->dbp_symname); 1577 1578 mdb_list_delete(&kmt_defbp_list, dbp); 1579 1580 strfree(dbp->dbp_objname); 1581 strfree(dbp->dbp_symname); 1582 mdb_free(dbp, sizeof (kmt_defbp_t)); 1583 } 1584 1585 static void 1586 kmt_defbp_prune_common(int all) 1587 { 1588 kmt_defbp_t *dbp, *ndbp; 1589 1590 /* We can't remove items from the list while the driver is using it. */ 1591 if (kmt_defbp_lock) 1592 return; 1593 1594 for (dbp = mdb_list_next(&kmt_defbp_list); dbp != NULL; dbp = ndbp) { 1595 ndbp = mdb_list_next(dbp); 1596 1597 if (!all && dbp->dbp_ref) 1598 continue; 1599 1600 kmt_defbp_destroy(dbp); 1601 } 1602 } 1603 1604 static void 1605 kmt_defbp_prune(void) 1606 { 1607 kmt_defbp_prune_common(0); 1608 } 1609 1610 static void 1611 kmt_defbp_destroy_all(void) 1612 { 1613 kmt_defbp_prune_common(1); 1614 } 1615 1616 static void 1617 kmt_defbp_delete(mdb_tgt_t *t, kmt_defbp_t *dbp) 1618 { 1619 dbp->dbp_ref = 0; 1620 1621 ASSERT(kmt_defbp_num > 0); 1622 kmt_defbp_num--; 1623 1624 if (kmt_defbp_num == 0) 1625 kmt_defbp_deactivate(t); 1626 1627 kmt_defbp_prune(); 1628 } 1629 1630 static int 1631 kmt_brkpt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1632 { 1633 mdb_tgt_status_t tsp; 1634 kmt_bparg_t *ka = args; 1635 kmt_brkpt_t *kb; 1636 GElf_Sym s; 1637 mdb_instr_t instr; 1638 1639 (void) mdb_tgt_status(t, &tsp); 1640 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED) 1641 return (set_errno(EMDB_NOPROC)); 1642 1643 if (ka->ka_symbol != NULL) { 1644 if (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, &s, NULL) == -1) { 1645 if (errno != EMDB_NOOBJ && !(errno == EMDB_NOSYM && 1646 !(mdb.m_flags & MDB_FL_BPTNOSYMSTOP))) { 1647 warn("breakpoint %s activation failed", 1648 ka->ka_symbol); 1649 } 1650 return (-1); /* errno is set for us */ 1651 } 1652 1653 ka->ka_addr = (uintptr_t)s.st_value; 1654 } 1655 1656 #ifdef __sparc 1657 if (ka->ka_addr & 3) 1658 return (set_errno(EMDB_BPALIGN)); 1659 #endif 1660 1661 if (mdb_vread(&instr, sizeof (instr), ka->ka_addr) != sizeof (instr)) 1662 return (-1); /* errno is set for us */ 1663 1664 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1665 warn("breakpoint will not arm until DTrace is inactive\n"); 1666 1667 kb = mdb_zalloc(sizeof (kmt_brkpt_t), UM_SLEEP); 1668 kb->kb_addr = ka->ka_addr; 1669 sep->se_data = kb; 1670 1671 return (0); 1672 } 1673 1674 /*ARGSUSED*/ 1675 static void 1676 kmt_brkpt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep) 1677 { 1678 mdb_free(sep->se_data, sizeof (kmt_brkpt_t)); 1679 } 1680 1681 /*ARGSUSED*/ 1682 static char * 1683 kmt_brkpt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 1684 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 1685 { 1686 uintptr_t addr = NULL; 1687 1688 if (vep != NULL) { 1689 kmt_bparg_t *ka = vep->ve_args; 1690 1691 if (ka->ka_symbol != NULL) { 1692 (void) mdb_iob_snprintf(buf, nbytes, "stop at %s", 1693 ka->ka_symbol); 1694 } else { 1695 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a", 1696 ka->ka_addr); 1697 addr = ka->ka_addr; 1698 } 1699 1700 } else { 1701 addr = ((kmt_brkpt_t *)sep->se_data)->kb_addr; 1702 (void) mdb_iob_snprintf(buf, nbytes, "stop at %a", addr); 1703 } 1704 1705 sp->spec_base = addr; 1706 sp->spec_size = sizeof (mdb_instr_t); 1707 1708 return (buf); 1709 } 1710 1711 static int 1712 kmt_brkpt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1713 { 1714 kmt_brkpt_t *kb = sep->se_data; 1715 kmt_bparg_t *ka = args; 1716 GElf_Sym sym; 1717 1718 if (ka->ka_symbol != NULL) { 1719 return (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, 1720 &sym, NULL) == 0 && sym.st_value == kb->kb_addr); 1721 } 1722 1723 return (ka->ka_addr == kb->kb_addr); 1724 } 1725 1726 /*ARGSUSED*/ 1727 static int 1728 kmt_brkpt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args) 1729 { 1730 kmt_bparg_t *ka1 = vep->ve_args; 1731 kmt_bparg_t *ka2 = args; 1732 1733 if (ka1->ka_symbol != NULL && ka2->ka_symbol != NULL) 1734 return (strcmp(ka1->ka_symbol, ka2->ka_symbol) == 0); 1735 1736 if (ka1->ka_symbol == NULL && ka2->ka_symbol == NULL) 1737 return (ka1->ka_addr == ka2->ka_addr); 1738 1739 return (0); /* fail if one is symbolic, other is an explicit address */ 1740 } 1741 1742 static int 1743 kmt_brkpt_arm(mdb_tgt_t *t, mdb_sespec_t *sep) 1744 { 1745 kmt_data_t *kmt = t->t_data; 1746 kmt_brkpt_t *kb = sep->se_data; 1747 int rv; 1748 1749 if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE) 1750 return (set_errno(EMDB_DTACTIVE)); 1751 1752 if ((rv = kmdb_dpi_brkpt_arm(kb->kb_addr, &kb->kb_oinstr)) != 0) 1753 return (rv); 1754 1755 if (kmt->kmt_narmedbpts++ == 0) 1756 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_ACTIVATE); 1757 1758 return (0); 1759 } 1760 1761 static int 1762 kmt_brkpt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep) 1763 { 1764 kmt_data_t *kmt = t->t_data; 1765 kmt_brkpt_t *kb = sep->se_data; 1766 int rv; 1767 1768 ASSERT(kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_KMDB_BPT_ACTIVE); 1769 1770 if ((rv = kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr)) != 0) 1771 return (rv); 1772 1773 if (--kmt->kmt_narmedbpts == 0) 1774 (void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_DEACTIVATE); 1775 1776 return (0); 1777 } 1778 1779 /* 1780 * Determine whether the specified sespec is an armed watchpoint that overlaps 1781 * with the given breakpoint and has the given flags set. We use this to find 1782 * conflicts with breakpoints, below. 1783 */ 1784 static int 1785 kmt_wp_overlap(mdb_sespec_t *sep, kmt_brkpt_t *kb, int flags) 1786 { 1787 const kmdb_wapt_t *wp = sep->se_data; 1788 1789 return (sep->se_state == MDB_TGT_SPEC_ARMED && 1790 sep->se_ops == &kmt_wapt_ops && (wp->wp_wflags & flags) && 1791 kb->kb_addr - wp->wp_addr < wp->wp_size); 1792 } 1793 1794 /* 1795 * We step over breakpoints using our single-stepper. If a conflicting 1796 * watchpoint is present, we must temporarily remove it before stepping over the 1797 * breakpoint so we don't immediately re-trigger the watchpoint. We know the 1798 * watchpoint has already triggered on our trap instruction as part of fetching 1799 * it. Before we return, we must re-install any disabled watchpoints. 1800 */ 1801 static int 1802 kmt_brkpt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 1803 { 1804 kmt_brkpt_t *kb = sep->se_data; 1805 int status = -1; 1806 int error; 1807 1808 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 1809 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X)) 1810 (void) kmdb_dpi_wapt_disarm(sep->se_data); 1811 } 1812 1813 if (kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr) == 0 && 1814 kmt_step(t, tsp) == 0) 1815 status = kmt_status(t, tsp); 1816 1817 error = errno; /* save errno from disarm, step, or status */ 1818 1819 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 1820 if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X)) 1821 kmdb_dpi_wapt_arm(sep->se_data); 1822 } 1823 1824 (void) set_errno(error); 1825 return (status); 1826 } 1827 1828 /*ARGSUSED*/ 1829 static int 1830 kmt_brkpt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 1831 { 1832 kmt_brkpt_t *kb = sep->se_data; 1833 int state, why; 1834 kreg_t pc; 1835 1836 state = kmdb_dpi_get_state(&why); 1837 (void) kmdb_dpi_get_register("pc", &pc); 1838 1839 return (state == DPI_STATE_FAULTED && why == DPI_STATE_WHY_BKPT && 1840 pc == kb->kb_addr); 1841 } 1842 1843 static const mdb_se_ops_t kmt_brkpt_ops = { 1844 kmt_brkpt_ctor, /* se_ctor */ 1845 kmt_brkpt_dtor, /* se_dtor */ 1846 kmt_brkpt_info, /* se_info */ 1847 kmt_brkpt_secmp, /* se_secmp */ 1848 kmt_brkpt_vecmp, /* se_vecmp */ 1849 kmt_brkpt_arm, /* se_arm */ 1850 kmt_brkpt_disarm, /* se_disarm */ 1851 kmt_brkpt_cont, /* se_cont */ 1852 kmt_brkpt_match /* se_match */ 1853 }; 1854 1855 static int 1856 kmt_wapt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1857 { 1858 mdb_tgt_status_t tsp; 1859 kmdb_wapt_t *vwp = args; 1860 kmdb_wapt_t *swp; 1861 1862 (void) mdb_tgt_status(t, &tsp); 1863 if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED) 1864 return (set_errno(EMDB_NOPROC)); 1865 1866 swp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP); 1867 bcopy(vwp, swp, sizeof (kmdb_wapt_t)); 1868 1869 if (kmdb_dpi_wapt_reserve(swp) < 0) { 1870 mdb_free(swp, sizeof (kmdb_wapt_t)); 1871 return (-1); /* errno is set for us */ 1872 } 1873 1874 sep->se_data = swp; 1875 1876 return (0); 1877 } 1878 1879 /*ARGSUSED*/ 1880 static void 1881 kmt_wapt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep) 1882 { 1883 kmdb_wapt_t *wp = sep->se_data; 1884 1885 kmdb_dpi_wapt_release(wp); 1886 mdb_free(wp, sizeof (kmdb_wapt_t)); 1887 } 1888 1889 /*ARGSUSED*/ 1890 static char * 1891 kmt_wapt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 1892 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 1893 { 1894 kmdb_wapt_t *wp = vep != NULL ? vep->ve_args : sep->se_data; 1895 const char *fmt; 1896 char desc[24]; 1897 1898 ASSERT(wp->wp_wflags != 0); 1899 desc[0] = '\0'; 1900 1901 switch (wp->wp_wflags) { 1902 case MDB_TGT_WA_R: 1903 (void) strcat(desc, "/read"); 1904 break; 1905 case MDB_TGT_WA_W: 1906 (void) strcat(desc, "/write"); 1907 break; 1908 case MDB_TGT_WA_X: 1909 (void) strcat(desc, "/exec"); 1910 break; 1911 default: 1912 if (wp->wp_wflags & MDB_TGT_WA_R) 1913 (void) strcat(desc, "/r"); 1914 if (wp->wp_wflags & MDB_TGT_WA_W) 1915 (void) strcat(desc, "/w"); 1916 if (wp->wp_wflags & MDB_TGT_WA_X) 1917 (void) strcat(desc, "/x"); 1918 } 1919 1920 switch (wp->wp_type) { 1921 case DPI_WAPT_TYPE_PHYS: 1922 fmt = "stop on %s of phys [%p, %p)"; 1923 break; 1924 1925 case DPI_WAPT_TYPE_VIRT: 1926 fmt = "stop on %s of [%la, %la)"; 1927 break; 1928 1929 case DPI_WAPT_TYPE_IO: 1930 if (wp->wp_size == 1) 1931 fmt = "stop on %s of I/O port %p"; 1932 else 1933 fmt = "stop on %s of I/O port [%p, %p)"; 1934 break; 1935 } 1936 1937 (void) mdb_iob_snprintf(buf, nbytes, fmt, desc + 1, wp->wp_addr, 1938 wp->wp_addr + wp->wp_size); 1939 1940 sp->spec_base = wp->wp_addr; 1941 sp->spec_size = wp->wp_size; 1942 1943 return (buf); 1944 } 1945 1946 /*ARGSUSED*/ 1947 static int 1948 kmt_wapt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 1949 { 1950 kmdb_wapt_t *wp1 = sep->se_data; 1951 kmdb_wapt_t *wp2 = args; 1952 1953 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size && 1954 wp1->wp_wflags == wp2->wp_wflags); 1955 } 1956 1957 /*ARGSUSED*/ 1958 static int 1959 kmt_wapt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args) 1960 { 1961 kmdb_wapt_t *wp1 = vep->ve_args; 1962 kmdb_wapt_t *wp2 = args; 1963 1964 return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size && 1965 wp1->wp_wflags == wp2->wp_wflags); 1966 } 1967 1968 /*ARGSUSED*/ 1969 static int 1970 kmt_wapt_arm(mdb_tgt_t *t, mdb_sespec_t *sep) 1971 { 1972 kmdb_dpi_wapt_arm(sep->se_data); 1973 1974 return (0); 1975 } 1976 1977 /*ARGSUSED*/ 1978 static int 1979 kmt_wapt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep) 1980 { 1981 kmdb_dpi_wapt_disarm(sep->se_data); 1982 1983 return (0); 1984 } 1985 1986 /* 1987 * Determine whether the specified sespec is an armed breakpoint at the given 1988 * %pc. We use this to find conflicts with watchpoints below. 1989 */ 1990 static int 1991 kmt_bp_overlap(mdb_sespec_t *sep, uintptr_t pc) 1992 { 1993 kmt_brkpt_t *kb = sep->se_data; 1994 1995 return (sep->se_state == MDB_TGT_SPEC_ARMED && 1996 sep->se_ops == &kmt_brkpt_ops && kb->kb_addr == pc); 1997 } 1998 1999 /* 2000 * We step over watchpoints using our single-stepper. If a conflicting 2001 * breakpoint is present, we must temporarily disarm it before stepping over 2002 * the watchpoint so we do not immediately re-trigger the breakpoint. This is 2003 * similar to the case handled in kmt_brkpt_cont(), above. 2004 */ 2005 static int 2006 kmt_wapt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2007 { 2008 mdb_sespec_t *bep = NULL; 2009 int status = -1; 2010 int error, why; 2011 2012 /* 2013 * If we stopped for anything other than a watchpoint, check to see 2014 * if there's a breakpoint here. 2015 */ 2016 if (!(kmdb_dpi_get_state(&why) == DPI_STATE_FAULTED && 2017 (why == DPI_STATE_WHY_V_WAPT || why == DPI_STATE_WHY_P_WAPT))) { 2018 kreg_t pc; 2019 2020 (void) kmdb_dpi_get_register("pc", &pc); 2021 2022 for (bep = mdb_list_next(&t->t_active); bep != NULL; 2023 bep = mdb_list_next(bep)) { 2024 if (kmt_bp_overlap(bep, pc)) { 2025 (void) bep->se_ops->se_disarm(t, bep); 2026 bep->se_state = MDB_TGT_SPEC_ACTIVE; 2027 break; 2028 } 2029 } 2030 } 2031 2032 kmdb_dpi_wapt_disarm(sep->se_data); 2033 if (kmt_step(t, tsp) == 0) 2034 status = kmt_status(t, tsp); 2035 2036 error = errno; /* save errno from step or status */ 2037 2038 if (bep != NULL) 2039 mdb_tgt_sespec_arm_one(t, bep); 2040 2041 (void) set_errno(error); 2042 return (status); 2043 } 2044 2045 /*ARGSUSED*/ 2046 static int 2047 kmt_wapt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2048 { 2049 return (kmdb_dpi_wapt_match(sep->se_data)); 2050 } 2051 2052 static const mdb_se_ops_t kmt_wapt_ops = { 2053 kmt_wapt_ctor, /* se_ctor */ 2054 kmt_wapt_dtor, /* se_dtor */ 2055 kmt_wapt_info, /* se_info */ 2056 kmt_wapt_secmp, /* se_secmp */ 2057 kmt_wapt_vecmp, /* se_vecmp */ 2058 kmt_wapt_arm, /* se_arm */ 2059 kmt_wapt_disarm, /* se_disarm */ 2060 kmt_wapt_cont, /* se_cont */ 2061 kmt_wapt_match /* se_match */ 2062 }; 2063 2064 /*ARGSUSED*/ 2065 static int 2066 kmt_trap_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args) 2067 { 2068 sep->se_data = args; /* trap number */ 2069 2070 return (0); 2071 } 2072 2073 /*ARGSUSED*/ 2074 static char * 2075 kmt_trap_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep, 2076 mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes) 2077 { 2078 const char *name; 2079 int trapnum; 2080 2081 if (vep != NULL) 2082 trapnum = (intptr_t)vep->ve_args; 2083 else 2084 trapnum = (intptr_t)sep->se_data; 2085 2086 if (trapnum == KMT_TRAP_ALL) 2087 name = "any trap"; 2088 else if (trapnum == KMT_TRAP_NOTENUM) 2089 name = "miscellaneous trap"; 2090 else 2091 name = kmt_trapname(trapnum); 2092 2093 (void) mdb_iob_snprintf(buf, nbytes, "single-step stop on %s", name); 2094 2095 return (buf); 2096 } 2097 2098 /*ARGSUSED2*/ 2099 static int 2100 kmt_trap_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp) 2101 { 2102 int spectt = (intptr_t)sep->se_data; 2103 kmt_data_t *kmt = t->t_data; 2104 kreg_t tt; 2105 2106 (void) kmdb_dpi_get_register("tt", &tt); 2107 2108 switch (spectt) { 2109 case KMT_TRAP_ALL: 2110 return (1); 2111 case KMT_TRAP_NOTENUM: 2112 return (tt > kmt->kmt_trapmax || 2113 !BT_TEST(kmt->kmt_trapmap, tt)); 2114 default: 2115 return (tt == spectt); 2116 } 2117 } 2118 2119 static const mdb_se_ops_t kmt_trap_ops = { 2120 kmt_trap_ctor, /* se_ctor */ 2121 no_se_dtor, /* se_dtor */ 2122 kmt_trap_info, /* se_info */ 2123 no_se_secmp, /* se_secmp */ 2124 no_se_vecmp, /* se_vecmp */ 2125 no_se_arm, /* se_arm */ 2126 no_se_disarm, /* se_disarm */ 2127 no_se_cont, /* se_cont */ 2128 kmt_trap_match /* se_match */ 2129 }; 2130 2131 static void 2132 kmt_bparg_dtor(mdb_vespec_t *vep) 2133 { 2134 kmt_bparg_t *ka = vep->ve_args; 2135 2136 if (ka->ka_symbol != NULL) 2137 strfree(ka->ka_symbol); 2138 2139 if (ka->ka_defbp != NULL) 2140 kmt_defbp_delete(mdb.m_target, ka->ka_defbp); 2141 2142 mdb_free(ka, sizeof (kmt_bparg_t)); 2143 } 2144 2145 static int 2146 kmt_add_vbrkpt(mdb_tgt_t *t, uintptr_t addr, 2147 int spec_flags, mdb_tgt_se_f *func, void *data) 2148 { 2149 kmt_bparg_t *ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP); 2150 2151 ka->ka_addr = addr; 2152 ka->ka_symbol = NULL; 2153 ka->ka_defbp = NULL; 2154 2155 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags, 2156 func, data, ka, kmt_bparg_dtor)); 2157 } 2158 2159 static int 2160 kmt_add_sbrkpt(mdb_tgt_t *t, const char *fullname, 2161 int spec_flags, mdb_tgt_se_f *func, void *data) 2162 { 2163 kmt_bparg_t *ka; 2164 kmt_defbp_t *dbp; 2165 GElf_Sym sym; 2166 char *tick, *objname, *symname; 2167 int serrno; 2168 2169 if ((tick = strchr(fullname, '`')) == fullname) { 2170 (void) set_errno(EMDB_NOOBJ); 2171 return (0); 2172 } 2173 2174 /* 2175 * Deferred breakpoints are always scoped. If we didn't find a tick, 2176 * there's no scope. We'll create a vbrkpt, but only if we can turn the 2177 * provided string into an address. 2178 */ 2179 if (tick == NULL) { 2180 uintptr_t addr; 2181 2182 if (strisbasenum(fullname)) { 2183 addr = mdb_strtoull(fullname); /* a bare address */ 2184 } else if (mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EVERY, 2185 fullname, &sym, NULL) < 0) { 2186 (void) set_errno(EMDB_NOSYM); 2187 return (0); 2188 } else { 2189 addr = (uintptr_t)sym.st_value; /* unscoped sym name */ 2190 } 2191 2192 return (kmt_add_vbrkpt(t, addr, spec_flags, func, data)); 2193 } 2194 2195 if (*(tick + 1) == '\0') { 2196 (void) set_errno(EMDB_NOSYM); 2197 return (0); 2198 } 2199 2200 objname = strndup(fullname, tick - fullname); 2201 symname = tick + 1; 2202 2203 if (mdb_tgt_lookup_by_name(t, objname, symname, NULL, NULL) < 0 && 2204 errno != EMDB_NOOBJ) { 2205 serrno = errno; 2206 strfree(objname); 2207 2208 (void) set_errno(serrno); 2209 return (0); /* errno is set for us */ 2210 } 2211 2212 dbp = kmt_defbp_create(t, objname, symname); 2213 strfree(objname); 2214 2215 ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP); 2216 ka->ka_symbol = strdup(fullname); 2217 ka->ka_addr = NULL; 2218 ka->ka_defbp = dbp; 2219 2220 return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags, 2221 func, data, ka, kmt_bparg_dtor)); 2222 } 2223 2224 static int 2225 kmt_wparg_overlap(const kmdb_wapt_t *wp1, const kmdb_wapt_t *wp2) 2226 { 2227 /* Assume the watchpoint spaces don't overlap */ 2228 if (wp1->wp_type != wp2->wp_type) 2229 return (0); 2230 2231 if (wp2->wp_addr + wp2->wp_size <= wp1->wp_addr) 2232 return (0); /* no range overlap */ 2233 2234 if (wp1->wp_addr + wp1->wp_size <= wp2->wp_addr) 2235 return (0); /* no range overlap */ 2236 2237 return (wp1->wp_addr != wp2->wp_addr || wp1->wp_size != wp2->wp_size || 2238 wp1->wp_wflags != wp2->wp_wflags); 2239 } 2240 2241 static void 2242 kmt_wparg_dtor(mdb_vespec_t *vep) 2243 { 2244 mdb_free(vep->ve_args, sizeof (kmdb_wapt_t)); 2245 } 2246 2247 static int 2248 kmt_add_wapt_common(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2249 int spec_flags, mdb_tgt_se_f *func, void *data, int type) 2250 { 2251 kmdb_wapt_t *wp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP); 2252 mdb_sespec_t *sep; 2253 2254 wp->wp_addr = addr; 2255 wp->wp_size = len; 2256 wp->wp_type = type; 2257 wp->wp_wflags = wflags; 2258 2259 if (kmdb_dpi_wapt_validate(wp) < 0) 2260 return (0); /* errno is set for us */ 2261 2262 for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) { 2263 if (sep->se_ops == &kmt_wapt_ops && 2264 mdb_list_next(&sep->se_velist) != NULL && 2265 kmt_wparg_overlap(wp, sep->se_data)) 2266 goto wapt_dup; 2267 } 2268 2269 for (sep = mdb_list_next(&t->t_idle); sep; sep = mdb_list_next(sep)) { 2270 if (sep->se_ops == &kmt_wapt_ops && kmt_wparg_overlap(wp, 2271 ((mdb_vespec_t *)mdb_list_next(&sep->se_velist))->ve_args)) 2272 goto wapt_dup; 2273 } 2274 2275 return (mdb_tgt_vespec_insert(t, &kmt_wapt_ops, spec_flags, 2276 func, data, wp, kmt_wparg_dtor)); 2277 2278 wapt_dup: 2279 mdb_free(wp, sizeof (kmdb_wapt_t)); 2280 (void) set_errno(EMDB_WPDUP); 2281 return (0); 2282 } 2283 2284 static int 2285 kmt_add_pwapt(mdb_tgt_t *t, physaddr_t addr, size_t len, uint_t wflags, 2286 int spec_flags, mdb_tgt_se_f *func, void *data) 2287 { 2288 return (kmt_add_wapt_common(t, (uintptr_t)addr, len, wflags, spec_flags, 2289 func, data, DPI_WAPT_TYPE_PHYS)); 2290 } 2291 2292 static int 2293 kmt_add_vwapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2294 int spec_flags, mdb_tgt_se_f *func, void *data) 2295 { 2296 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func, 2297 data, DPI_WAPT_TYPE_VIRT)); 2298 } 2299 2300 static int 2301 kmt_add_iowapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags, 2302 int spec_flags, mdb_tgt_se_f *func, void *data) 2303 { 2304 return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func, 2305 data, DPI_WAPT_TYPE_IO)); 2306 } 2307 2308 static int 2309 kmt_add_trap(mdb_tgt_t *t, int trapnum, int spec_flags, mdb_tgt_se_f *func, 2310 void *data) 2311 { 2312 kmt_data_t *kmt = t->t_data; 2313 2314 if (trapnum != KMT_TRAP_ALL && trapnum != KMT_TRAP_NOTENUM) { 2315 if (trapnum < 0 || trapnum > kmt->kmt_trapmax) { 2316 (void) set_errno(EMDB_BADFLTNUM); 2317 return (0); 2318 } 2319 2320 BT_SET(kmt->kmt_trapmap, trapnum); 2321 } 2322 2323 return (mdb_tgt_vespec_insert(t, &kmt_trap_ops, spec_flags, func, data, 2324 (void *)(uintptr_t)trapnum, no_ve_dtor)); 2325 } 2326 2327 /*ARGSUSED*/ 2328 static uintmax_t 2329 kmt_cpuid_disc_get(const mdb_var_t *v) 2330 { 2331 return (kmdb_dpi_get_master_cpuid()); 2332 } 2333 2334 static const mdb_nv_disc_t kmt_cpuid_disc = { 2335 NULL, 2336 kmt_cpuid_disc_get 2337 }; 2338 2339 /* 2340 * This routine executes while the kernel is running. 2341 */ 2342 void 2343 kmt_activate(mdb_tgt_t *t) 2344 { 2345 kmt_data_t *kmt = t->t_data; 2346 2347 mdb_prop_postmortem = FALSE; 2348 mdb_prop_kernel = TRUE; 2349 2350 (void) mdb_tgt_register_dcmds(t, &kmt_dcmds[0], MDB_MOD_FORCE); 2351 mdb_tgt_register_regvars(t, kmt->kmt_rds, &kmt_reg_disc, 0); 2352 2353 /* 2354 * Force load of the MDB krtld module, in case it's been rolled into 2355 * unix. 2356 */ 2357 (void) mdb_module_load(KMT_RTLD_NAME, MDB_MOD_SILENT | MDB_MOD_DEFER); 2358 } 2359 2360 static void 2361 kmt_destroy(mdb_tgt_t *t) 2362 { 2363 kmt_data_t *kmt = t->t_data; 2364 kmt_module_t *km, *pkm; 2365 2366 mdb_nv_destroy(&kmt->kmt_modules); 2367 for (km = mdb_list_prev(&kmt->kmt_modlist); km != NULL; km = pkm) { 2368 pkm = mdb_list_prev(km); 2369 mdb_free(km, sizeof (kmt_module_t)); 2370 } 2371 2372 if (!kmt_defbp_lock) 2373 kmt_defbp_destroy_all(); 2374 2375 if (kmt->kmt_trapmap != NULL) 2376 mdb_free(kmt->kmt_trapmap, BT_SIZEOFMAP(kmt->kmt_trapmax)); 2377 2378 if (kmt->kmt_cpu != NULL) 2379 kmt_cpu_destroy(kmt->kmt_cpu); 2380 2381 if (kmt != NULL) 2382 mdb_free(kmt, sizeof (kmt_data_t)); 2383 } 2384 2385 static const mdb_tgt_ops_t kmt_ops = { 2386 kmt_setflags, /* t_setflags */ 2387 (int (*)()) mdb_tgt_notsup, /* t_setcontext */ 2388 kmt_activate, /* t_activate */ 2389 (void (*)()) mdb_tgt_nop, /* t_deactivate */ 2390 kmt_periodic, /* t_periodic */ 2391 kmt_destroy, /* t_destroy */ 2392 kmt_name, /* t_name */ 2393 (const char *(*)()) mdb_conf_isa, /* t_isa */ 2394 kmt_platform, /* t_platform */ 2395 kmt_uname, /* t_uname */ 2396 kmt_dmodel, /* t_dmodel */ 2397 (ssize_t (*)()) mdb_tgt_notsup, /* t_aread */ 2398 (ssize_t (*)()) mdb_tgt_notsup, /* t_awrite */ 2399 kmt_read, /* t_vread */ 2400 kmt_write, /* t_vwrite */ 2401 kmt_pread, /* t_pread */ 2402 kmt_pwrite, /* t_pwrite */ 2403 kmt_read, /* t_fread */ 2404 kmt_write, /* t_fwrite */ 2405 kmt_ioread, /* t_ioread */ 2406 kmt_iowrite, /* t_iowrite */ 2407 kmt_vtop, /* t_vtop */ 2408 kmt_lookup_by_name, /* t_lookup_by_name */ 2409 kmt_lookup_by_addr, /* t_lookup_by_addr */ 2410 kmt_symbol_iter, /* t_symbol_iter */ 2411 kmt_mapping_iter, /* t_mapping_iter */ 2412 kmt_object_iter, /* t_object_iter */ 2413 kmt_addr_to_map, /* t_addr_to_map */ 2414 kmt_name_to_map, /* t_name_to_map */ 2415 kmt_addr_to_ctf, /* t_addr_to_ctf */ 2416 kmt_name_to_ctf, /* t_name_to_ctf */ 2417 kmt_status, /* t_status */ 2418 (int (*)()) mdb_tgt_notsup, /* t_run */ 2419 kmt_step, /* t_step */ 2420 kmt_step_out, /* t_step_out */ 2421 kmt_step_branch, /* t_step_branch */ 2422 kmt_next, /* t_next */ 2423 kmt_continue, /* t_cont */ 2424 (int (*)()) mdb_tgt_notsup, /* t_signal */ 2425 kmt_add_vbrkpt, /* t_add_vbrkpt */ 2426 kmt_add_sbrkpt, /* t_add_sbrkpt */ 2427 kmt_add_pwapt, /* t_add_pwapt */ 2428 kmt_add_vwapt, /* t_add_vwapt */ 2429 kmt_add_iowapt, /* t_add_iowapt */ 2430 (int (*)()) mdb_tgt_null, /* t_add_sysenter */ 2431 (int (*)()) mdb_tgt_null, /* t_add_sysexit */ 2432 (int (*)()) mdb_tgt_null, /* t_add_signal */ 2433 kmt_add_trap, /* t_add_fault */ 2434 kmt_getareg, /* t_getareg */ 2435 kmt_putareg, /* t_putareg */ 2436 (int (*)()) mdb_tgt_nop, /* XXX t_stack_iter */ 2437 (int (*)()) mdb_tgt_notsup /* t_auxv */ 2438 }; 2439 2440 /* 2441 * Called immediately upon resumption of the system after a step or continue. 2442 * Allows us to synchronize kmt's view of the world with reality. 2443 */ 2444 /*ARGSUSED*/ 2445 static void 2446 kmt_sync(mdb_tgt_t *t) 2447 { 2448 kmt_data_t *kmt = t->t_data; 2449 int symavail; 2450 2451 mdb_dprintf(MDB_DBG_KMOD, "synchronizing with kernel\n"); 2452 2453 symavail = kmt->kmt_symavail; 2454 kmt->kmt_symavail = FALSE; 2455 2456 /* 2457 * Resync our view of the world if the modules have changed, or if we 2458 * didn't have any symbols coming into this function. The latter will 2459 * only happen on startup. 2460 */ 2461 if (kmdb_kdi_mods_changed() || !symavail) 2462 kmt_modlist_update(t); 2463 2464 /* 2465 * It would be nice if we could run this less frequently, perhaps 2466 * after a dvec-initiated trigger. 2467 */ 2468 kmdb_module_sync(); 2469 2470 kmt->kmt_symavail = TRUE; 2471 2472 mdb_dprintf(MDB_DBG_KMOD, "synchronization complete\n"); 2473 2474 kmt_defbp_prune(); 2475 2476 if (kmt_defbp_num > 0 && kmt_defbp_bpspec == 0 && 2477 kmdb_kdi_dtrace_get_state() != KDI_DTSTATE_DTRACE_ACTIVE) { 2478 /* 2479 * Deferred breakpoints were created while DTrace was active, 2480 * and consequently the deferred breakpoint enabling mechanism 2481 * wasn't activated. Activate it now, and then try to activate 2482 * the deferred breakpoints. We do this so that we can catch 2483 * the ones which may apply to modules that have been loaded 2484 * while they were waiting for DTrace to deactivate. 2485 */ 2486 (void) kmt_defbp_activate(t); 2487 (void) mdb_tgt_sespec_activate_all(t); 2488 } 2489 2490 if (kmt->kmt_cpu_retry && ((kmt->kmt_cpu = kmt_cpu_create(t)) != 2491 NULL || errno != EAGAIN)) 2492 kmt->kmt_cpu_retry = FALSE; 2493 2494 (void) mdb_tgt_status(t, &t->t_status); 2495 } 2496 2497 /* 2498 * This routine executes while the kernel is running. 2499 */ 2500 /*ARGSUSED*/ 2501 int 2502 kmdb_kvm_create(mdb_tgt_t *t, int argc, const char *argv[]) 2503 { 2504 kmt_data_t *kmt; 2505 2506 if (argc != 0) 2507 return (set_errno(EINVAL)); 2508 2509 kmt = mdb_zalloc(sizeof (kmt_data_t), UM_SLEEP); 2510 t->t_data = kmt; 2511 t->t_ops = &kmt_ops; 2512 t->t_flags |= MDB_TGT_F_RDWR; /* kmdb is always r/w */ 2513 2514 (void) mdb_nv_insert(&mdb.m_nv, "cpuid", &kmt_cpuid_disc, 0, 2515 MDB_NV_PERSIST | MDB_NV_RDONLY); 2516 2517 (void) mdb_nv_create(&kmt->kmt_modules, UM_SLEEP); 2518 2519 kmt_init_isadep(t); 2520 2521 kmt->kmt_symavail = FALSE; 2522 kmt->kmt_cpu_retry = TRUE; 2523 2524 bzero(&kmt_defbp_list, sizeof (mdb_list_t)); 2525 2526 return (0); 2527 2528 create_err: 2529 kmt_destroy(t); 2530 2531 return (-1); 2532 } 2533 2534 /* 2535 * This routine is called once, when kmdb first has control of the world. 2536 */ 2537 void 2538 kmdb_kvm_startup(void) 2539 { 2540 kmt_data_t *kmt = mdb.m_target->t_data; 2541 2542 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm startup\n"); 2543 2544 kmt_sync(mdb.m_target); 2545 (void) mdb_module_load_builtin(KMT_MODULE); 2546 kmt_startup_isadep(mdb.m_target); 2547 2548 /* 2549 * This is here because we need to write the deferred breakpoint 2550 * breakpoint when the debugger starts. Our normal r/o write routines 2551 * don't work when the kernel is running, so we have to do it during 2552 * startup. 2553 */ 2554 (void) mdb_tgt_sespec_activate_all(mdb.m_target); 2555 2556 kmt->kmt_rtld_name = KMT_RTLD_NAME; 2557 2558 if (kmt_module_by_name(kmt, KMT_RTLD_NAME) == NULL) 2559 kmt->kmt_rtld_name = "unix"; 2560 } 2561 2562 /* 2563 * This routine is called after kmdb has loaded its initial set of modules. 2564 */ 2565 void 2566 kmdb_kvm_poststartup(void) 2567 { 2568 mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm post-startup\n"); 2569 2570 (void) mdb_dis_select(kmt_def_dismode()); 2571 } 2572