xref: /illumos-gate/usr/src/cmd/mdb/intel/mdb/kvm_ia32dep.c (revision 7c478bd95313f5f23a4c958a745db2134aa03244)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28 
29 /*
30  * Libkvm Kernel Target Intel 32-bit component
31  *
32  * This file provides the ISA-dependent portion of the libkvm kernel target.
33  * For more details on the implementation refer to mdb_kvm.c.
34  */
35 
36 #include <sys/types.h>
37 #include <sys/regset.h>
38 #include <sys/frame.h>
39 #include <sys/stack.h>
40 #include <sys/sysmacros.h>
41 #include <sys/panic.h>
42 #include <strings.h>
43 
44 #include <mdb/mdb_target_impl.h>
45 #include <mdb/mdb_disasm.h>
46 #include <mdb/mdb_modapi.h>
47 #include <mdb/mdb_conf.h>
48 #include <mdb/mdb_kreg_impl.h>
49 #include <mdb/mdb_ia32util.h>
50 #include <mdb/mdb_kvm.h>
51 #include <mdb/mdb_err.h>
52 #include <mdb/mdb_debug.h>
53 #include <mdb/mdb.h>
54 
55 static int
56 kt_getareg(mdb_tgt_t *t, mdb_tgt_tid_t tid,
57     const char *rname, mdb_tgt_reg_t *rp)
58 {
59 	const mdb_tgt_regdesc_t *rdp;
60 	kt_data_t *kt = t->t_data;
61 
62 	if (tid != kt->k_tid)
63 		return (set_errno(EMDB_NOREGS));
64 
65 	for (rdp = kt->k_rds; rdp->rd_name != NULL; rdp++) {
66 		if (strcmp(rname, rdp->rd_name) == 0) {
67 			*rp = kt->k_regs->kregs[rdp->rd_num];
68 			return (0);
69 		}
70 	}
71 
72 	return (set_errno(EMDB_BADREG));
73 }
74 
75 static int
76 kt_putareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, mdb_tgt_reg_t r)
77 {
78 	const mdb_tgt_regdesc_t *rdp;
79 	kt_data_t *kt = t->t_data;
80 
81 	if (tid != kt->k_tid)
82 		return (set_errno(EMDB_NOREGS));
83 
84 	for (rdp = kt->k_rds; rdp->rd_name != NULL; rdp++) {
85 		if (strcmp(rname, rdp->rd_name) == 0) {
86 			kt->k_regs->kregs[rdp->rd_num] = (kreg_t)r;
87 			return (0);
88 		}
89 	}
90 
91 	return (set_errno(EMDB_BADREG));
92 }
93 
94 /*ARGSUSED*/
95 int
96 kt_regs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
97 {
98 	kt_data_t *kt = mdb.m_target->t_data;
99 
100 	if (argc != 0 || (flags & DCMD_ADDRSPEC))
101 		return (DCMD_USAGE);
102 
103 	mdb_ia32_printregs(kt->k_regs);
104 
105 	return (DCMD_OK);
106 }
107 
108 /*
109  * Return a flag indicating if the specified %eip is likely to have an
110  * interrupt frame on the stack.  We do this by comparing the address to the
111  * range of addresses spanned by several well-known routines, and looking
112  * to see if the next and previous %ebp values are "far" apart.  Sigh.
113  */
114 int
115 mdb_kvm_intrframe(mdb_tgt_t *t, uintptr_t pc, uintptr_t fp,
116     uintptr_t prevfp)
117 {
118 	kt_data_t *kt = t->t_data;
119 
120 	return ((pc >= kt->k_intr_sym.st_value &&
121 	    (pc < kt->k_intr_sym.st_value + kt->k_intr_sym.st_size)) ||
122 	    (pc >= kt->k_trap_sym.st_value &&
123 	    (pc < kt->k_trap_sym.st_value + kt->k_trap_sym.st_size)) ||
124 	    (fp >= prevfp + 0x2000) || (fp <= prevfp - 0x2000));
125 }
126 
127 static int
128 kt_stack_common(uintptr_t addr, uint_t flags, int argc,
129     const mdb_arg_t *argv, mdb_tgt_stack_f *func)
130 {
131 	kt_data_t *kt = mdb.m_target->t_data;
132 	void *arg = (void *)mdb.m_nargs;
133 	mdb_tgt_gregset_t gregs, *grp;
134 
135 	if (flags & DCMD_ADDRSPEC) {
136 		bzero(&gregs, sizeof (gregs));
137 		gregs.kregs[KREG_EBP] = addr;
138 		grp = &gregs;
139 	} else
140 		grp = kt->k_regs;
141 
142 	if (argc != 0) {
143 		if (argv->a_type == MDB_TYPE_CHAR || argc > 1)
144 			return (DCMD_USAGE);
145 
146 		if (argv->a_type == MDB_TYPE_STRING)
147 			arg = (void *)(uint_t)mdb_strtoull(argv->a_un.a_str);
148 		else
149 			arg = (void *)(uint_t)argv->a_un.a_val;
150 	}
151 
152 	(void) mdb_ia32_kvm_stack_iter(mdb.m_target, grp, func, arg);
153 	return (DCMD_OK);
154 }
155 
156 static int
157 kt_stack(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
158 {
159 	return (kt_stack_common(addr, flags, argc, argv, mdb_ia32_kvm_frame));
160 }
161 
162 static int
163 kt_stackv(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
164 {
165 	return (kt_stack_common(addr, flags, argc, argv, mdb_ia32_kvm_framev));
166 }
167 
168 const mdb_tgt_ops_t kt_ia32_ops = {
169 	kt_setflags,				/* t_setflags */
170 	kt_setcontext,				/* t_setcontext */
171 	kt_activate,				/* t_activate */
172 	kt_deactivate,				/* t_deactivate */
173 	(void (*)()) mdb_tgt_nop,		/* t_periodic */
174 	kt_destroy,				/* t_destroy */
175 	kt_name,				/* t_name */
176 	(const char *(*)()) mdb_conf_isa,	/* t_isa */
177 	kt_platform,				/* t_platform */
178 	kt_uname,				/* t_uname */
179 	kt_dmodel,				/* t_dmodel */
180 	kt_aread,				/* t_aread */
181 	kt_awrite,				/* t_awrite */
182 	kt_vread,				/* t_vread */
183 	kt_vwrite,				/* t_vwrite */
184 	kt_pread,				/* t_pread */
185 	kt_pwrite,				/* t_pwrite */
186 	kt_fread,				/* t_fread */
187 	kt_fwrite,				/* t_fwrite */
188 	(ssize_t (*)()) mdb_tgt_notsup,		/* t_ioread */
189 	(ssize_t (*)()) mdb_tgt_notsup,		/* t_iowrite */
190 	kt_vtop,				/* t_vtop */
191 	kt_lookup_by_name,			/* t_lookup_by_name */
192 	kt_lookup_by_addr,			/* t_lookup_by_addr */
193 	kt_symbol_iter,				/* t_symbol_iter */
194 	kt_mapping_iter,			/* t_mapping_iter */
195 	kt_object_iter,				/* t_object_iter */
196 	kt_addr_to_map,				/* t_addr_to_map */
197 	kt_name_to_map,				/* t_name_to_map */
198 	kt_addr_to_ctf,				/* t_addr_to_ctf */
199 	kt_name_to_ctf,				/* t_name_to_ctf */
200 	kt_status,				/* t_status */
201 	(int (*)()) mdb_tgt_notsup,		/* t_run */
202 	(int (*)()) mdb_tgt_notsup,		/* t_step */
203 	(int (*)()) mdb_tgt_notsup,		/* t_step_out */
204 	(int (*)()) mdb_tgt_notsup,		/* t_step_branch */
205 	(int (*)()) mdb_tgt_notsup,		/* t_next */
206 	(int (*)()) mdb_tgt_notsup,		/* t_cont */
207 	(int (*)()) mdb_tgt_notsup,		/* t_signal */
208 	(int (*)()) mdb_tgt_null,		/* t_add_vbrkpt */
209 	(int (*)()) mdb_tgt_null,		/* t_add_sbrkpt */
210 	(int (*)()) mdb_tgt_null,		/* t_add_pwapt */
211 	(int (*)()) mdb_tgt_null,		/* t_add_vwapt */
212 	(int (*)()) mdb_tgt_null,		/* t_add_iowapt */
213 	(int (*)()) mdb_tgt_null,		/* t_add_sysenter */
214 	(int (*)()) mdb_tgt_null,		/* t_add_sysexit */
215 	(int (*)()) mdb_tgt_null,		/* t_add_signal */
216 	(int (*)()) mdb_tgt_null,		/* t_add_fault */
217 	kt_getareg,				/* t_getareg */
218 	kt_putareg,				/* t_putareg */
219 	mdb_ia32_kvm_stack_iter,		/* t_stack_iter */
220 };
221 
222 void
223 kt_ia32_init(mdb_tgt_t *t)
224 {
225 	kt_data_t *kt = t->t_data;
226 
227 	panic_data_t pd;
228 	kreg_t *kregs;
229 	label_t label;
230 	struct regs regs;
231 	uintptr_t addr;
232 
233 	/*
234 	 * Initialize the machine-dependent parts of the kernel target
235 	 * structure.  Once this is complete and we fill in the ops
236 	 * vector, the target is now fully constructed and we can use
237 	 * the target API itself to perform the rest of our initialization.
238 	 */
239 	kt->k_rds = mdb_ia32_kregs;
240 	kt->k_regs = mdb_zalloc(sizeof (mdb_tgt_gregset_t), UM_SLEEP);
241 	kt->k_regsize = sizeof (mdb_tgt_gregset_t);
242 	kt->k_dcmd_regs = kt_regs;
243 	kt->k_dcmd_stack = kt_stack;
244 	kt->k_dcmd_stackv = kt_stackv;
245 	kt->k_dcmd_stackr = kt_stackv;
246 
247 	t->t_ops = &kt_ia32_ops;
248 	kregs = kt->k_regs->kregs;
249 
250 	(void) mdb_dis_select("ia32");
251 
252 	/*
253 	 * Lookup the symbols corresponding to subroutines in locore.s where
254 	 * we expect a saved regs structure to be pushed on the stack.  When
255 	 * performing stack tracebacks we will attempt to detect interrupt
256 	 * frames by comparing the %eip value to these symbols.
257 	 */
258 	(void) mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EXEC,
259 	    "cmnint", &kt->k_intr_sym, NULL);
260 
261 	(void) mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EXEC,
262 	    "cmntrap", &kt->k_trap_sym, NULL);
263 
264 	/*
265 	 * Don't attempt to load any thread or register information if
266 	 * we're examining the live operating system.
267 	 */
268 	if (strcmp(kt->k_symfile, "/dev/ksyms") == 0)
269 		return;
270 
271 	/*
272 	 * If the panicbuf symbol is present and we can consume a panicbuf
273 	 * header of the appropriate version from this address, then we can
274 	 * initialize our current register set based on its contents.
275 	 * Prior to the re-structuring of panicbuf, our only register data
276 	 * was the panic_regs label_t, into which a setjmp() was performed,
277 	 * or the panic_reg register pointer, which was only non-zero if
278 	 * the system panicked as a result of a trap calling die().
279 	 */
280 	if (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, &pd, sizeof (pd),
281 	    MDB_TGT_OBJ_EXEC, "panicbuf") == sizeof (pd) &&
282 	    pd.pd_version == PANICBUFVERS) {
283 
284 		size_t pd_size = MIN(PANICBUFSIZE, pd.pd_msgoff);
285 		panic_data_t *pdp = mdb_zalloc(pd_size, UM_SLEEP);
286 		uint_t i, n;
287 
288 		(void) mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, pdp, pd_size,
289 		    MDB_TGT_OBJ_EXEC, "panicbuf");
290 
291 		n = (pd_size - (sizeof (panic_data_t) -
292 		    sizeof (panic_nv_t))) / sizeof (panic_nv_t);
293 
294 		for (i = 0; i < n; i++) {
295 			(void) kt_putareg(t, kt->k_tid,
296 			    pdp->pd_nvdata[i].pnv_name,
297 			    pdp->pd_nvdata[i].pnv_value);
298 		}
299 
300 		mdb_free(pdp, pd_size);
301 
302 	} else if (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, &addr, sizeof (addr),
303 	    MDB_TGT_OBJ_EXEC, "panic_reg") == sizeof (addr) && addr != NULL &&
304 	    mdb_tgt_vread(t, &regs, sizeof (regs), addr) == sizeof (regs)) {
305 
306 		kregs[KREG_SAVFP] = regs.r_savfp;
307 		kregs[KREG_SAVPC] = regs.r_savpc;
308 		kregs[KREG_EAX] = regs.r_eax;
309 		kregs[KREG_EBX] = regs.r_ebx;
310 		kregs[KREG_ECX] = regs.r_ecx;
311 		kregs[KREG_EDX] = regs.r_edx;
312 		kregs[KREG_ESI] = regs.r_esi;
313 		kregs[KREG_EDI] = regs.r_edi;
314 		kregs[KREG_EBP] = regs.r_ebp;
315 		kregs[KREG_ESP] = regs.r_esp;
316 		kregs[KREG_CS] = regs.r_cs;
317 		kregs[KREG_DS] = regs.r_ds;
318 		kregs[KREG_SS] = regs.r_ss;
319 		kregs[KREG_ES] = regs.r_es;
320 		kregs[KREG_FS] = regs.r_fs;
321 		kregs[KREG_GS] = regs.r_gs;
322 		kregs[KREG_EFLAGS] = regs.r_efl;
323 		kregs[KREG_EIP] = regs.r_eip;
324 		kregs[KREG_UESP] = regs.r_uesp;
325 		kregs[KREG_TRAPNO] = regs.r_trapno;
326 		kregs[KREG_ERR] = regs.r_err;
327 
328 	} else if (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, &label, sizeof (label),
329 	    MDB_TGT_OBJ_EXEC, "panic_regs") == sizeof (label)) {
330 
331 		kregs[KREG_EDI] = label.val[0];
332 		kregs[KREG_ESI] = label.val[1];
333 		kregs[KREG_EBX] = label.val[2];
334 		kregs[KREG_EBP] = label.val[3];
335 		kregs[KREG_ESP] = label.val[4];
336 		kregs[KREG_EIP] = label.val[5];
337 
338 	} else {
339 		warn("failed to read panicbuf, panic_reg and panic_regs -- "
340 		    "current register set will be unavailable\n");
341 	}
342 }
343