void kt_amd64_init(mdb_tgt_t *t) { kt_data_t *kt = t->t_data; panic_data_t pd; struct regs regs; uintptr_t addr; /* * Initialize the machine-dependent parts of the kernel target * structure. Once this is complete and we fill in the ops * vector, the target is now fully constructed and we can use * the target API itself to perform the rest of our initialization. */ kt->k_rds = mdb_amd64_kregs; kt->k_regs = mdb_zalloc(sizeof (mdb_tgt_gregset_t), UM_SLEEP); kt->k_regsize = sizeof (mdb_tgt_gregset_t); kt->k_dcmd_regs = kt_regs; kt->k_dcmd_stack = kt_stack; kt->k_dcmd_stackv = kt_stackv; kt->k_dcmd_stackr = kt_stackv; kt->k_dcmd_cpustack = kt_cpustack; kt->k_dcmd_cpuregs = kt_cpuregs; t->t_ops = &kt_amd64_ops; (void) mdb_dis_select("amd64"); /* * Lookup the symbols corresponding to subroutines in locore.s where * we expect a saved regs structure to be pushed on the stack. When * performing stack tracebacks we will attempt to detect interrupt * frames by comparing the %eip value to these symbols. */ (void) mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EXEC, "cmnint", &kt->k_intr_sym, NULL); (void) mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EXEC, "cmntrap", &kt->k_trap_sym, NULL); /* * Don't attempt to load any thread or register information if * we're examining the live operating system. */ if (kt->k_symfile != NULL && strcmp(kt->k_symfile, "/dev/ksyms") == 0) return; /* * If the panicbuf symbol is present and we can consume a panicbuf * header of the appropriate version from this address, then we can * initialize our current register set based on its contents. * Prior to the re-structuring of panicbuf, our only register data * was the panic_regs label_t, into which a setjmp() was performed, * or the panic_reg register pointer, which was only non-zero if * the system panicked as a result of a trap calling die(). */ if (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, &pd, sizeof (pd), MDB_TGT_OBJ_EXEC, "panicbuf") == sizeof (pd) && pd.pd_version == PANICBUFVERS) { size_t pd_size = MIN(PANICBUFSIZE, pd.pd_msgoff); panic_data_t *pdp = mdb_zalloc(pd_size, UM_SLEEP); uint_t i, n; (void) mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, pdp, pd_size, MDB_TGT_OBJ_EXEC, "panicbuf"); n = (pd_size - (sizeof (panic_data_t) - sizeof (panic_nv_t))) / sizeof (panic_nv_t); for (i = 0; i < n; i++) { (void) kt_putareg(t, kt->k_tid, pdp->pd_nvdata[i].pnv_name, pdp->pd_nvdata[i].pnv_value); } mdb_free(pdp, pd_size); return; }; if (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, &addr, sizeof (addr), MDB_TGT_OBJ_EXEC, "panic_reg") == sizeof (addr) && addr != NULL && mdb_tgt_vread(t, ®s, sizeof (regs), addr) == sizeof (regs)) { kt_regs_to_kregs(®s, kt->k_regs); return; } /* * If we can't read any panic regs, then our final try is for any CPU * context that may have been stored (for example, in Xen core dumps). */ if (kt_kvmregs(t, 0, kt->k_regs) == 0) return; warn("failed to read panicbuf and panic_reg -- " "current register set will be unavailable\n"); }
void kt_amd64_init(mdb_tgt_t *t) { kt_data_t *kt = t->t_data; panic_data_t pd; kreg_t *kregs; struct regs regs; uintptr_t addr; /* * Initialize the machine-dependent parts of the kernel target * structure. Once this is complete and we fill in the ops * vector, the target is now fully constructed and we can use * the target API itself to perform the rest of our initialization. */ kt->k_rds = mdb_amd64_kregs; kt->k_regs = mdb_zalloc(sizeof (mdb_tgt_gregset_t), UM_SLEEP); kt->k_regsize = sizeof (mdb_tgt_gregset_t); kt->k_dcmd_regs = kt_regs; kt->k_dcmd_stack = kt_stack; kt->k_dcmd_stackv = kt_stackv; kt->k_dcmd_stackr = kt_stackv; t->t_ops = &kt_amd64_ops; kregs = kt->k_regs->kregs; (void) mdb_dis_select("amd64"); /* * Lookup the symbols corresponding to subroutines in locore.s where * we expect a saved regs structure to be pushed on the stack. When * performing stack tracebacks we will attempt to detect interrupt * frames by comparing the %eip value to these symbols. */ (void) mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EXEC, "cmnint", &kt->k_intr_sym, NULL); (void) mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EXEC, "cmntrap", &kt->k_trap_sym, NULL); /* * Don't attempt to load any thread or register information if * we're examining the live operating system. */ if (strcmp(kt->k_symfile, "/dev/ksyms") == 0) return; /* * If the panicbuf symbol is present and we can consume a panicbuf * header of the appropriate version from this address, then we can * initialize our current register set based on its contents. * Prior to the re-structuring of panicbuf, our only register data * was the panic_regs label_t, into which a setjmp() was performed, * or the panic_reg register pointer, which was only non-zero if * the system panicked as a result of a trap calling die(). */ if (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, &pd, sizeof (pd), MDB_TGT_OBJ_EXEC, "panicbuf") == sizeof (pd) && pd.pd_version == PANICBUFVERS) { size_t pd_size = MIN(PANICBUFSIZE, pd.pd_msgoff); panic_data_t *pdp = mdb_zalloc(pd_size, UM_SLEEP); uint_t i, n; (void) mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, pdp, pd_size, MDB_TGT_OBJ_EXEC, "panicbuf"); n = (pd_size - (sizeof (panic_data_t) - sizeof (panic_nv_t))) / sizeof (panic_nv_t); for (i = 0; i < n; i++) { (void) kt_putareg(t, kt->k_tid, pdp->pd_nvdata[i].pnv_name, pdp->pd_nvdata[i].pnv_value); } mdb_free(pdp, pd_size); } else if (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, &addr, sizeof (addr), MDB_TGT_OBJ_EXEC, "panic_reg") == sizeof (addr) && addr != NULL && mdb_tgt_vread(t, ®s, sizeof (regs), addr) == sizeof (regs)) { kregs[KREG_SAVFP] = regs.r_savfp; kregs[KREG_SAVPC] = regs.r_savpc; kregs[KREG_RDI] = regs.r_rdi; kregs[KREG_RSI] = regs.r_rsi; kregs[KREG_RDX] = regs.r_rdx; kregs[KREG_RCX] = regs.r_rcx; kregs[KREG_R8] = regs.r_r8; kregs[KREG_R9] = regs.r_r9; kregs[KREG_RAX] = regs.r_rax; kregs[KREG_RBX] = regs.r_rbx; kregs[KREG_RBP] = regs.r_rbp; kregs[KREG_R10] = regs.r_r10; kregs[KREG_R11] = regs.r_r11; kregs[KREG_R12] = regs.r_r12; kregs[KREG_R13] = regs.r_r13; kregs[KREG_R14] = regs.r_r14; kregs[KREG_R15] = regs.r_r15; kregs[KREG_FSBASE] = regs.r_fsbase; kregs[KREG_GSBASE] = regs.r_gsbase; kregs[KREG_DS] = regs.r_ds; kregs[KREG_ES] = regs.r_es; kregs[KREG_FS] = regs.r_fs; kregs[KREG_GS] = regs.r_gs; kregs[KREG_TRAPNO] = regs.r_trapno; kregs[KREG_ERR] = regs.r_err; kregs[KREG_RIP] = regs.r_rip; kregs[KREG_CS] = regs.r_cs; kregs[KREG_RFLAGS] = regs.r_rfl; kregs[KREG_RSP] = regs.r_rsp; kregs[KREG_SS] = regs.r_ss; } else { warn("failed to read panicbuf and panic_reg -- " "current register set will be unavailable\n"); } }