ports/devel/gdb/files/kgdb/fbsd-kld.c
John Baldwin 01ab520c16 Fix several issues with kgdb:
- The kld parsing code in kgdb was using basename() and dirname() which
  ended up being broken by the recent changes to make dirname() modify its
  input buffer.  Modify fbsd-kld.c to use the lbasename() and ldirname()
  wrappers in gdb.
- Add the kgdb.1 manpage from base and install it as 'kgdbNNN.1' which is
  helpful since stock HEAD no longer ships a kgdb manpage.
- Link libkvm into mips binaries so that the vmcore target links.
- Bump PORTREVISION.

PR:		219028
Reviewed by:	luca.pizzamiglio@gmail.com (maintainer)
Approved by:	rene
2017-05-08 19:02:25 +00:00

592 lines
15 KiB
C

/*
* Copyright (c) 2004 Marcel Moolenaar
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
#include <sys/param.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <libgen.h>
#include <defs.h>
#include <command.h>
#include <completer.h>
#include <environ.h>
#include <exec.h>
#include <frame-unwind.h>
#include <inferior.h>
#include <objfiles.h>
#include <gdbcore.h>
#include <language.h>
#include "solib.h"
#include <solist.h>
#include "kgdb.h"
struct lm_info {
CORE_ADDR base_address;
};
struct kld_info {
/* Offsets of fields in linker_file structure. */
CORE_ADDR off_address, off_filename, off_pathname, off_next;
/* KVA of 'linker_path' which corresponds to the kern.module_path sysctl .*/
CORE_ADDR module_path_addr;
CORE_ADDR linker_files_addr;
CORE_ADDR kernel_file_addr;
};
struct target_so_ops kld_so_ops;
/* Per-program-space data key. */
static const struct program_space_data *kld_pspace_data;
static void
kld_pspace_data_cleanup (struct program_space *pspace, void *arg)
{
struct kld_info *info = (struct kld_info *)arg;
xfree (info);
}
/* Get the current kld data. If none is found yet, add it now. This
function always returns a valid object. */
static struct kld_info *
get_kld_info (void)
{
struct kld_info *info;
info = (struct kld_info *)
program_space_data (current_program_space, kld_pspace_data);
if (info != NULL)
return info;
info = XCNEW (struct kld_info);
set_program_space_data (current_program_space, kld_pspace_data, info);
return info;
}
static int
kld_ok (char *path)
{
struct stat sb;
if (stat(path, &sb) == 0 && S_ISREG(sb.st_mode))
return (1);
return (0);
}
/*
* Look for a matching file checking for debug suffixes before the raw file:
* - filename + ".debug" (e.g. foo.ko.debug)
* - filename (e.g. foo.ko)
*/
static const char *kld_suffixes[] = {
".debug",
".symbols",
"",
NULL
};
static int
check_kld_path (char *path, size_t path_size)
{
const char **suffix;
char *ep;
ep = path + strlen(path);
suffix = kld_suffixes;
while (*suffix != NULL) {
if (strlcat(path, *suffix, path_size) < path_size) {
if (kld_ok(path))
return (1);
}
/* Restore original path to remove suffix. */
*ep = '\0';
suffix++;
}
return (0);
}
/*
* Try to find the path for a kld by looking in the kernel's directory and
* in the various paths in the module path.
*/
static int
find_kld_path (char *filename, char *path, size_t path_size)
{
struct kld_info *info;
struct cleanup *cleanup;
char *module_path;
char *kernel_dir, *module_dir, *cp;
int error;
info = get_kld_info();
if (exec_bfd) {
kernel_dir = ldirname(bfd_get_filename(exec_bfd));
if (kernel_dir != NULL) {
cleanup = make_cleanup(xfree, kernel_dir);
snprintf(path, path_size, "%s/%s", kernel_dir,
filename);
if (check_kld_path(path, path_size)) {
do_cleanups(cleanup);
return (1);
}
do_cleanups(cleanup);
}
}
if (info->module_path_addr != 0) {
target_read_string(info->module_path_addr, &module_path,
PATH_MAX, &error);
if (error == 0) {
cleanup = make_cleanup(xfree, module_path);
cp = module_path;
while ((module_dir = strsep(&cp, ";")) != NULL) {
snprintf(path, path_size, "%s/%s", module_dir,
filename);
if (check_kld_path(path, path_size)) {
do_cleanups(cleanup);
return (1);
}
}
do_cleanups(cleanup);
}
}
return (0);
}
/*
* Read a kernel pointer given a KVA in 'address'.
*/
static CORE_ADDR
read_pointer (CORE_ADDR address)
{
struct type *ptr_type;
gdb_byte ptr_buf[8];
int arch_size;
arch_size = bfd_get_arch_size (exec_bfd);
if (arch_size == -1)
return (0);
ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
if (target_read_memory(address, ptr_buf, arch_size / 8) != 0)
return (0);
return (extract_typed_address (ptr_buf, ptr_type));
}
/*
* Try to find this kld in the kernel linker's list of linker files.
*/
static int
find_kld_address (char *arg, CORE_ADDR *address)
{
struct kld_info *info;
CORE_ADDR kld;
char *kld_filename;
const char *filename;
int error;
info = get_kld_info();
if (info->linker_files_addr == 0 || info->off_address == 0 ||
info->off_filename == 0 || info->off_next == 0)
return (0);
filename = lbasename(arg);
for (kld = read_pointer(info->linker_files_addr); kld != 0;
kld = read_pointer(kld + info->off_next)) {
/* Try to read this linker file's filename. */
target_read_string(read_pointer(kld + info->off_filename),
&kld_filename, PATH_MAX, &error);
if (error)
continue;
/* Compare this kld's filename against our passed in name. */
if (strcmp(kld_filename, filename) != 0) {
xfree(kld_filename);
continue;
}
xfree(kld_filename);
/*
* We found a match, use its address as the base
* address if we can read it.
*/
*address = read_pointer(kld + info->off_address);
if (*address == 0)
return (0);
return (1);
}
return (0);
}
static void
adjust_section_address (struct target_section *sec, CORE_ADDR *curr_base)
{
struct bfd_section *asect = sec->the_bfd_section;
bfd *abfd = asect->owner;
if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0) {
sec->addr += *curr_base;
sec->endaddr += *curr_base;
return;
}
*curr_base = align_power(*curr_base,
bfd_get_section_alignment(abfd, asect));
sec->addr = *curr_base;
sec->endaddr = sec->addr + bfd_section_size(abfd, asect);
*curr_base = sec->endaddr;
}
static void
load_kld (char *path, CORE_ADDR base_addr, int from_tty)
{
struct section_addr_info *sap;
struct target_section *sections = NULL, *sections_end = NULL, *s;
struct cleanup *cleanup;
bfd *bfd;
CORE_ADDR curr_addr;
int add_flags, i;
/* Open the kld. */
bfd = bfd_openr(path, gnutarget);
if (bfd == NULL)
error("\"%s\": can't open: %s", path,
bfd_errmsg(bfd_get_error()));
cleanup = make_cleanup_bfd_unref(bfd);
if (!bfd_check_format(bfd, bfd_object))
error("\%s\": not an object file", path);
/* Make sure we have a .text section. */
if (bfd_get_section_by_name (bfd, ".text") == NULL)
error("\"%s\": can't find text section", path);
/* Build a section table from the bfd and relocate the sections. */
if (build_section_table (bfd, &sections, &sections_end))
error("\"%s\": can't find file sections", path);
make_cleanup(xfree, sections);
curr_addr = base_addr;
for (s = sections; s < sections_end; s++)
adjust_section_address(s, &curr_addr);
/* Build a section addr info to pass to symbol_file_add(). */
sap = build_section_addr_info_from_section_table (sections,
sections_end);
make_cleanup((make_cleanup_ftype *)free_section_addr_info, sap);
printf_unfiltered("add symbol table from file \"%s\" at\n", path);
for (i = 0; i < sap->num_sections; i++)
printf_unfiltered("\t%s_addr = %s\n", sap->other[i].name,
paddress(target_gdbarch(), sap->other[i].addr));
if (from_tty && (!query("%s", "")))
error("Not confirmed.");
add_flags = 0;
if (from_tty)
add_flags |= SYMFILE_VERBOSE;
symbol_file_add(path, add_flags, sap, OBJF_USERLOADED);
do_cleanups(cleanup);
}
static void
kgdb_add_kld_cmd (char *arg, int from_tty)
{
char path[PATH_MAX];
CORE_ADDR base_addr;
if (!exec_bfd)
error("No kernel symbol file");
/* Try to open the raw path to handle absolute paths first. */
snprintf(path, sizeof(path), "%s", arg);
if (!check_kld_path(path, sizeof(path))) {
/*
* If that didn't work, look in the various possible
* paths for the module.
*/
if (!find_kld_path(arg, path, sizeof(path))) {
error("Unable to locate kld");
return;
}
}
if (!find_kld_address(arg, &base_addr)) {
error("Unable to find kld in kernel");
return;
}
load_kld(path, base_addr, from_tty);
reinit_frame_cache();
}
static void
kld_relocate_section_addresses (struct so_list *so, struct target_section *sec)
{
static CORE_ADDR curr_addr;
if (sec == so->sections)
curr_addr = so->lm_info->base_address;
adjust_section_address(sec, &curr_addr);
}
static void
kld_free_so (struct so_list *so)
{
xfree(so->lm_info);
}
static void
kld_clear_so (struct so_list *so)
{
if (so->lm_info != NULL)
so->lm_info->base_address = 0;
}
static void
kld_clear_solib (void)
{
struct kld_info *info;
info = get_kld_info();
memset(info, 0, sizeof(*info));
}
static void
kld_solib_create_inferior_hook (int from_tty)
{
struct kld_info *info;
info = get_kld_info();
/*
* Compute offsets of relevant members in struct linker_file
* and the addresses of global variables. Newer kernels
* include constants we can use without requiring debug
* symbols. If those aren't present, fall back to using
* home-grown offsetof() equivalents.
*/
TRY {
info->off_address = parse_and_eval_long("kld_off_address");
info->off_filename = parse_and_eval_long("kld_off_filename");
info->off_pathname = parse_and_eval_long("kld_off_pathname");
info->off_next = parse_and_eval_long("kld_off_next");
} CATCH(e, RETURN_MASK_ERROR) {
TRY {
info->off_address = parse_and_eval_address(
"&((struct linker_file *)0)->address");
info->off_filename = parse_and_eval_address(
"&((struct linker_file *)0)->filename");
info->off_pathname = parse_and_eval_address(
"&((struct linker_file *)0)->pathname");
info->off_next = parse_and_eval_address(
"&((struct linker_file *)0)->link.tqe_next");
} CATCH(e, RETURN_MASK_ERROR) {
return;
}
END_CATCH
}
END_CATCH
TRY {
info->module_path_addr = parse_and_eval_address("linker_path");
info->linker_files_addr = kgdb_lookup("linker_files");
info->kernel_file_addr = kgdb_lookup("linker_kernel_file");
} CATCH(e, RETURN_MASK_ERROR) {
return;
}
END_CATCH
solib_add(NULL, 1, &current_target, auto_solib_add);
}
static void
kld_special_symbol_handling (void)
{
}
static struct so_list *
kld_current_sos (void)
{
struct so_list *head, **prev, *newobj;
struct kld_info *info;
CORE_ADDR kld, kernel;
char *path;
int error;
info = get_kld_info();
if (info->linker_files_addr == 0 || info->kernel_file_addr == 0 ||
info->off_address == 0 || info->off_filename == 0 ||
info->off_next == 0)
return (NULL);
head = NULL;
prev = &head;
/*
* Walk the list of linker files creating so_list entries for
* each non-kernel file.
*/
kernel = read_pointer(info->kernel_file_addr);
for (kld = read_pointer(info->linker_files_addr); kld != 0;
kld = read_pointer(kld + info->off_next)) {
/* Skip the main kernel file. */
if (kld == kernel)
continue;
newobj = XCNEW (struct so_list);
newobj->lm_info = XNEW (struct lm_info);
newobj->lm_info->base_address = 0;
/* Read the base filename and store it in so_original_name. */
target_read_string(read_pointer(kld + info->off_filename),
&path, sizeof(newobj->so_original_name), &error);
if (error != 0) {
warning("kld_current_sos: Can't read filename: %s\n",
safe_strerror(error));
free_so(newobj);
continue;
}
strlcpy(newobj->so_original_name, path,
sizeof(newobj->so_original_name));
xfree(path);
/*
* Try to read the pathname (if it exists) and store
* it in so_name.
*/
if (find_kld_path(newobj->so_original_name, newobj->so_name,
sizeof(newobj->so_name))) {
/* we found the kld */;
} else if (info->off_pathname != 0) {
target_read_string(read_pointer(kld +
info->off_pathname),
&path, sizeof(newobj->so_name), &error);
if (error != 0) {
warning(
"kld_current_sos: Can't read pathname for \"%s\": %s\n",
newobj->so_original_name,
safe_strerror(error));
strlcpy(newobj->so_name, newobj->so_original_name,
sizeof(newobj->so_name));
} else {
strlcpy(newobj->so_name, path,
sizeof(newobj->so_name));
xfree(path);
}
} else
strlcpy(newobj->so_name, newobj->so_original_name,
sizeof(newobj->so_name));
/* Read this kld's base address. */
newobj->lm_info->base_address = read_pointer(kld +
info->off_address);
if (newobj->lm_info->base_address == 0) {
warning(
"kld_current_sos: Invalid address for kld \"%s\"",
newobj->so_original_name);
free_so(newobj);
continue;
}
/* Append to the list. */
*prev = newobj;
prev = &newobj->next;
}
return (head);
}
static int
kld_open_symbol_file_object (void *from_ttyp)
{
return (0);
}
static int
kld_in_dynsym_resolve_code (CORE_ADDR pc)
{
return (0);
}
static int
kld_find_and_open_solib (char *solib, unsigned o_flags, char **temp_pathname)
{
char path[PATH_MAX];
int fd;
*temp_pathname = NULL;
if (!find_kld_path(solib, path, sizeof(path))) {
errno = ENOENT;
return (-1);
}
fd = open(path, o_flags, 0);
if (fd >= 0)
*temp_pathname = xstrdup(path);
return (fd);
}
void _initialize_kld_target(void);
void
_initialize_kld_target(void)
{
struct cmd_list_element *c;
kld_so_ops.relocate_section_addresses = kld_relocate_section_addresses;
kld_so_ops.free_so = kld_free_so;
kld_so_ops.clear_so = kld_clear_so;
kld_so_ops.clear_solib = kld_clear_solib;
kld_so_ops.solib_create_inferior_hook = kld_solib_create_inferior_hook;
kld_so_ops.special_symbol_handling = kld_special_symbol_handling;
kld_so_ops.current_sos = kld_current_sos;
kld_so_ops.open_symbol_file_object = kld_open_symbol_file_object;
kld_so_ops.in_dynsym_resolve_code = kld_in_dynsym_resolve_code;
kld_so_ops.bfd_open = solib_bfd_open;
kld_so_ops.find_and_open_solib = kld_find_and_open_solib;
c = add_com("add-kld", class_files, kgdb_add_kld_cmd,
"Usage: add-kld FILE\n\
Load the symbols from the kernel loadable module FILE.");
set_cmd_completer(c, filename_completer);
kld_pspace_data = register_program_space_data_with_cleanup (NULL,
kld_pspace_data_cleanup);
}