kvm.c revision 1.40 1 /*-
2 * Copyright (c) 1989, 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This code is derived from software developed by the Computer Systems
6 * Engineering group at Lawrence Berkeley Laboratory under DARPA contract
7 * BG 91-66 and contributed to Berkeley.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 */
37
38 #if defined(LIBC_SCCS) && !defined(lint)
39 static char sccsid[] = "@(#)kvm.c 8.2 (Berkeley) 2/13/94";
40 #endif /* LIBC_SCCS and not lint */
41
42 #include <sys/param.h>
43 #include <sys/user.h>
44 #include <sys/proc.h>
45 #include <sys/ioctl.h>
46 #include <sys/stat.h>
47 #include <sys/sysctl.h>
48
49 #include <sys/core.h>
50 #include <sys/exec_aout.h>
51 #include <sys/kcore.h>
52
53 #include <vm/vm.h>
54 #include <vm/vm_param.h>
55 #include <vm/swap_pager.h>
56
57 #include <machine/vmparam.h>
58 #include <machine/kcore.h>
59
60 #include <ctype.h>
61 #include <db.h>
62 #include <fcntl.h>
63 #include <kvm.h>
64 #include <limits.h>
65 #include <nlist.h>
66 #include <paths.h>
67 #include <stdio.h>
68 #include <stdlib.h>
69 #include <string.h>
70 #include <unistd.h>
71
72 #include "kvm_private.h"
73
74 static int kvm_dbopen __P((kvm_t *, const char *));
75 static int _kvm_get_header __P((kvm_t *));
76 static kvm_t *_kvm_open __P((kvm_t *, const char *, const char *,
77 const char *, int, char *));
78 static int clear_gap __P((kvm_t *, FILE *, int));
79 static off_t Lseek __P((kvm_t *, int, off_t, int));
80 static ssize_t Read __P(( kvm_t *, int, void *, size_t));
81
82 char *
83 kvm_geterr(kd)
84 kvm_t *kd;
85 {
86 return (kd->errbuf);
87 }
88
89 #if __STDC__
90 #include <stdarg.h>
91 #else
92 #include <varargs.h>
93 #endif
94
95 /*
96 * Report an error using printf style arguments. "program" is kd->program
97 * on hard errors, and 0 on soft errors, so that under sun error emulation,
98 * only hard errors are printed out (otherwise, programs like gdb will
99 * generate tons of error messages when trying to access bogus pointers).
100 */
101 void
102 #if __STDC__
103 _kvm_err(kvm_t *kd, const char *program, const char *fmt, ...)
104 #else
105 _kvm_err(kd, program, fmt, va_alist)
106 kvm_t *kd;
107 char *program, *fmt;
108 va_dcl
109 #endif
110 {
111 va_list ap;
112
113 #ifdef __STDC__
114 va_start(ap, fmt);
115 #else
116 va_start(ap);
117 #endif
118 if (program != NULL) {
119 (void)fprintf(stderr, "%s: ", program);
120 (void)vfprintf(stderr, fmt, ap);
121 (void)fputc('\n', stderr);
122 } else
123 (void)vsnprintf(kd->errbuf,
124 sizeof(kd->errbuf), (char *)fmt, ap);
125
126 va_end(ap);
127 }
128
129 void
130 #if __STDC__
131 _kvm_syserr(kvm_t *kd, const char *program, const char *fmt, ...)
132 #else
133 _kvm_syserr(kd, program, fmt, va_alist)
134 kvm_t *kd;
135 char *program, *fmt;
136 va_dcl
137 #endif
138 {
139 va_list ap;
140 register int n;
141
142 #if __STDC__
143 va_start(ap, fmt);
144 #else
145 va_start(ap);
146 #endif
147 if (program != NULL) {
148 (void)fprintf(stderr, "%s: ", program);
149 (void)vfprintf(stderr, fmt, ap);
150 (void)fprintf(stderr, ": %s\n", strerror(errno));
151 } else {
152 register char *cp = kd->errbuf;
153
154 (void)vsnprintf(cp, sizeof(kd->errbuf), (char *)fmt, ap);
155 n = strlen(cp);
156 (void)snprintf(&cp[n], sizeof(kd->errbuf) - n, ": %s",
157 strerror(errno));
158 }
159 va_end(ap);
160 }
161
162 void *
163 _kvm_malloc(kd, n)
164 register kvm_t *kd;
165 register size_t n;
166 {
167 void *p;
168
169 if ((p = malloc(n)) == NULL)
170 _kvm_err(kd, kd->program, strerror(errno));
171 return (p);
172 }
173
174 /*
175 * Wrappers for Lseek/Read system calls. They check for errors and
176 * call _kvm_syserr() if appropriate.
177 */
178 static off_t
179 Lseek(kd, fd, offset, whence)
180 kvm_t *kd;
181 int fd, whence;
182 off_t offset;
183 {
184 off_t off;
185
186 errno = 0;
187 if ((off = lseek(fd, offset, whence)) == -1 && errno != 0) {
188 _kvm_syserr(kd, kd->program, "Lseek");
189 return (-1);
190 }
191 return (off);
192 }
193
194 static ssize_t
195 Read(kd, fd, buf, nbytes)
196 kvm_t *kd;
197 int fd;
198 void *buf;
199 size_t nbytes;
200 {
201 ssize_t rv;
202
203 errno = 0;
204
205 if ((rv = read(fd, buf, nbytes)) != nbytes && errno != 0)
206 _kvm_syserr(kd, kd->program, "Read");
207 return (rv);
208 }
209
210 static kvm_t *
211 _kvm_open(kd, uf, mf, sf, flag, errout)
212 register kvm_t *kd;
213 const char *uf;
214 const char *mf;
215 const char *sf;
216 int flag;
217 char *errout;
218 {
219 struct stat st;
220
221 kd->db = 0;
222 kd->pmfd = -1;
223 kd->vmfd = -1;
224 kd->swfd = -1;
225 kd->nlfd = -1;
226 kd->procbase = 0;
227 kd->nbpg = getpagesize();
228 kd->swapspc = 0;
229 kd->argspc = 0;
230 kd->argbuf = 0;
231 kd->argv = 0;
232 kd->vmst = 0;
233 kd->vm_page_buckets = 0;
234 kd->kcore_hdr = 0;
235 kd->cpu_hdr = 0;
236 kd->dump_off = 0;
237
238 if (uf == 0)
239 uf = _PATH_UNIX;
240 else if (strlen(uf) >= MAXPATHLEN) {
241 _kvm_err(kd, kd->program, "exec file name too long");
242 goto failed;
243 }
244 if (flag & ~O_RDWR) {
245 _kvm_err(kd, kd->program, "bad flags arg");
246 goto failed;
247 }
248 if (mf == 0)
249 mf = _PATH_MEM;
250 if (sf == 0)
251 sf = _PATH_DRUM;
252
253 if ((kd->pmfd = open(mf, flag, 0)) < 0) {
254 _kvm_syserr(kd, kd->program, "%s", mf);
255 goto failed;
256 }
257 if (fstat(kd->pmfd, &st) < 0) {
258 _kvm_syserr(kd, kd->program, "%s", mf);
259 goto failed;
260 }
261 if (S_ISCHR(st.st_mode)) {
262 /*
263 * If this is a character special device, then check that
264 * it's /dev/mem. If so, open kmem too. (Maybe we should
265 * make it work for either /dev/mem or /dev/kmem -- in either
266 * case you're working with a live kernel.)
267 */
268 if (strcmp(mf, _PATH_MEM) != 0) { /* XXX */
269 _kvm_err(kd, kd->program,
270 "%s: not physical memory device", mf);
271 goto failed;
272 }
273 if ((kd->vmfd = open(_PATH_KMEM, flag)) < 0) {
274 _kvm_syserr(kd, kd->program, "%s", _PATH_KMEM);
275 goto failed;
276 }
277 if ((kd->swfd = open(sf, flag, 0)) < 0) {
278 _kvm_syserr(kd, kd->program, "%s", sf);
279 goto failed;
280 }
281 /*
282 * Open kvm nlist database. We go ahead and do this
283 * here so that we don't have to hold on to the vmunix
284 * path name. Since a kvm application will surely do
285 * a kvm_nlist(), this probably won't be a wasted effort.
286 * If the database cannot be opened, open the namelist
287 * argument so we revert to slow nlist() calls.
288 */
289 if (kvm_dbopen(kd, uf) < 0 &&
290 (kd->nlfd = open(uf, O_RDONLY, 0)) < 0) {
291 _kvm_syserr(kd, kd->program, "%s", uf);
292 goto failed;
293 }
294 } else {
295 /*
296 * This is a crash dump.
297 * Initalize the virtual address translation machinery,
298 * but first setup the namelist fd.
299 */
300 if ((kd->nlfd = open(uf, O_RDONLY, 0)) < 0) {
301 _kvm_syserr(kd, kd->program, "%s", uf);
302 goto failed;
303 }
304
305 /*
306 * If there is no valid core header, fail silently here.
307 * The address translations however will fail without
308 * header. Things can be made to run by calling
309 * kvm_dump_mkheader() before doing any translation.
310 */
311 if (_kvm_get_header(kd) == 0) {
312 if (_kvm_initvtop(kd) < 0)
313 goto failed;
314 }
315 }
316 return (kd);
317 failed:
318 /*
319 * Copy out the error if doing sane error semantics.
320 */
321 if (errout != 0)
322 strcpy(errout, kd->errbuf);
323 (void)kvm_close(kd);
324 return (0);
325 }
326
327 static int
328 _kvm_get_header(kd)
329 kvm_t *kd;
330 {
331 cpu_kcore_hdr_t ckhdr;
332 kcore_hdr_t khdr;
333 kcore_seg_t seghdr;
334 off_t offset;
335
336 if (Lseek(kd, kd->pmfd, (off_t)0, SEEK_SET) == -1)
337 return (-1);
338
339 if (Read(kd, kd->pmfd, &khdr, sizeof(khdr)) != sizeof(khdr))
340 return (-1);
341 offset = khdr.c_hdrsize;
342
343 /*
344 * Currently, we only support dump-files made by the current
345 * architecture...
346 */
347 if ((CORE_GETMAGIC(khdr) != KCORE_MAGIC)
348 || ((CORE_GETMID(khdr) != MID_MACHINE)))
349 return (-1);
350
351 /*
352 * Currently, we only support exactly 2 segments: cpu-segment
353 * and data-segment in exactly that order.
354 */
355 if (khdr.c_nseg != 2)
356 return (-1);
357
358 /*
359 * Read the next segment header: cpu segment
360 */
361 if (Lseek(kd, kd->pmfd, (off_t)offset, SEEK_SET) == -1)
362 return (-1);
363 if (Read(kd, kd->pmfd, &seghdr, sizeof(seghdr)) != sizeof(seghdr))
364 return (-1);
365 if (CORE_GETMAGIC(seghdr) != KCORESEG_MAGIC
366 || CORE_GETFLAG(seghdr) != CORE_CPU)
367 return (-1);
368 offset += khdr.c_seghdrsize;
369 if (Lseek(kd, kd->pmfd, (off_t)offset, SEEK_SET) == -1)
370 return (-1);
371 if (Read(kd, kd->pmfd, &ckhdr, sizeof(ckhdr)) != sizeof(ckhdr))
372 return (-1);
373 offset += seghdr.c_size;
374
375 /*
376 * Read the next segment header: data segment
377 */
378 if (Lseek(kd, kd->pmfd, (off_t)offset, SEEK_SET) == -1)
379 return (-1);
380 if (Read(kd, kd->pmfd, &seghdr, sizeof(seghdr)) != sizeof(seghdr))
381 return (-1);
382 offset += khdr.c_seghdrsize;
383
384 if (CORE_GETMAGIC(seghdr) != KCORESEG_MAGIC
385 || CORE_GETFLAG(seghdr) != CORE_DATA)
386 return (-1);
387
388 kd->kcore_hdr = (kcore_hdr_t *)_kvm_malloc(kd, sizeof(*kd->kcore_hdr));
389 if (kd->kcore_hdr == NULL)
390 return (-1);
391 kd->cpu_hdr = (cpu_kcore_hdr_t *)_kvm_malloc(kd, sizeof(*kd->cpu_hdr));
392 if (kd->cpu_hdr == NULL) {
393 free((void *)kd->kcore_hdr);
394 kd->kcore_hdr = NULL;
395 return (-1);
396 }
397
398 *kd->kcore_hdr = khdr;
399 *kd->cpu_hdr = ckhdr;
400 kd->dump_off = offset;
401 return (0);
402 }
403
404 /*
405 * Translate a physical address to a file-offset in the crash-dump.
406 */
407 off_t
408 _kvm_pa2off(kd, pa)
409 kvm_t *kd;
410 u_long pa;
411 {
412 off_t off;
413 phys_ram_seg_t *rsp;
414
415 off = 0;
416 for (rsp = kd->cpu_hdr->ram_segs; rsp->size; rsp++) {
417 if (pa >= rsp->start && pa < rsp->start + rsp->size) {
418 pa -= rsp->start;
419 break;
420 }
421 off += rsp->size;
422 }
423 return(pa + off + kd->dump_off);
424 }
425
426 int
427 kvm_dump_mkheader(kd_live, kd_dump, dump_off)
428 kvm_t *kd_live, *kd_dump;
429 off_t dump_off;
430 {
431 kcore_hdr_t kch;
432 kcore_seg_t kseg;
433 cpu_kcore_hdr_t ckhdr;
434 int hdr_size;
435
436 hdr_size = 0;
437 if (kd_dump->kcore_hdr != NULL) {
438 _kvm_err(kd_dump, kd_dump->program, "already has a dump header");
439 return (-1);
440 }
441 if (!ISALIVE(kd_live) || ISALIVE(kd_dump)) {
442 _kvm_err(kd_live, kd_live->program, "wrong arguments");
443 return (-1);
444 }
445
446 /*
447 * Check for new format crash dump
448 */
449 if (Lseek(kd_dump, kd_dump->pmfd, dump_off, SEEK_SET) == -1)
450 return (-1);
451 if (Read(kd_dump, kd_dump->pmfd, &kseg, sizeof(kseg)) != sizeof(kseg))
452 return (-1);
453 if ((CORE_GETMAGIC(kseg) == KCORE_MAGIC)
454 && ((CORE_GETMID(kseg) == MID_MACHINE))) {
455 hdr_size += ALIGN(sizeof(kcore_seg_t));
456 if (Lseek(kd_dump, kd_dump->pmfd, dump_off+hdr_size, SEEK_SET)
457 == -1)
458 return (-1);
459 if (Read(kd_dump, kd_dump->pmfd, &ckhdr, sizeof(ckhdr))
460 != sizeof(ckhdr))
461 return (-1);
462 hdr_size += kseg.c_size;
463 if (Lseek(kd_dump, kd_dump->pmfd, dump_off+hdr_size, SEEK_SET)
464 == -1)
465 return (-1);
466 kd_dump->cpu_hdr = (cpu_kcore_hdr_t *)
467 _kvm_malloc(kd_dump, sizeof(cpu_kcore_hdr_t));
468 *kd_dump->cpu_hdr = ckhdr;
469 }
470
471 /*
472 * Create a kcore_hdr.
473 */
474 kd_dump->kcore_hdr = (kcore_hdr_t *)
475 _kvm_malloc(kd_dump, sizeof(kcore_hdr_t));
476 if (kd_dump->kcore_hdr == NULL) {
477 if (kd_dump->cpu_hdr != NULL) {
478 free((void *)kd_dump->cpu_hdr);
479 kd_dump->cpu_hdr = NULL;
480 }
481 return (-1);
482 }
483
484 kd_dump->kcore_hdr->c_hdrsize = ALIGN(sizeof(kcore_hdr_t));
485 kd_dump->kcore_hdr->c_seghdrsize = ALIGN(sizeof(kcore_seg_t));
486 kd_dump->kcore_hdr->c_nseg = 2;
487 CORE_SETMAGIC(*(kd_dump->kcore_hdr), KCORE_MAGIC, MID_MACHINE,0);
488
489 /*
490 * If there is no cpu_hdr at this point, we probably have an
491 * old format crash dump.....bail out
492 */
493 if (kd_dump->cpu_hdr == NULL) {
494 free((void *)kd_dump->kcore_hdr);
495 kd_dump->kcore_hdr = NULL;
496 _kvm_err(kd_dump, kd_dump->program, "invalid dump");
497 }
498
499 kd_dump->dump_off = dump_off + hdr_size;
500
501 /*
502 * Now that we have a valid header, enable translations.
503 */
504 _kvm_initvtop(kd_dump);
505
506 return(hdr_size);
507 }
508
509 static int
510 clear_gap(kd, fp, size)
511 kvm_t *kd;
512 FILE *fp;
513 int size;
514 {
515 if (size <= 0) /* XXX - < 0 should never happen */
516 return (0);
517 while (size-- > 0) {
518 if (fputc(0, fp) == EOF) {
519 _kvm_syserr(kd, kd->program, "clear_gap");
520 return (-1);
521 }
522 }
523 return (0);
524 }
525
526 /*
527 * Write the dump header info to 'fp'. Note that we can't use fseek(3) here
528 * because 'fp' might be a file pointer obtained by zopen().
529 */
530 int
531 kvm_dump_wrtheader(kd, fp, dumpsize)
532 kvm_t *kd;
533 FILE *fp;
534 int dumpsize;
535 {
536 kcore_seg_t seghdr;
537 long offset;
538 int gap;
539
540 if (kd->kcore_hdr == NULL || kd->cpu_hdr == NULL) {
541 _kvm_err(kd, kd->program, "no valid dump header(s)");
542 return (-1);
543 }
544
545 /*
546 * Write the generic header
547 */
548 offset = 0;
549 if (fwrite((void*)kd->kcore_hdr, sizeof(kcore_hdr_t), 1, fp) <= 0) {
550 _kvm_syserr(kd, kd->program, "kvm_dump_wrtheader");
551 return (-1);
552 }
553 offset += kd->kcore_hdr->c_hdrsize;
554 gap = kd->kcore_hdr->c_hdrsize - sizeof(kcore_hdr_t);
555 if (clear_gap(kd, fp, gap) == -1)
556 return (-1);
557
558 /*
559 * Write the cpu header
560 */
561 CORE_SETMAGIC(seghdr, KCORESEG_MAGIC, 0, CORE_CPU);
562 seghdr.c_size = ALIGN(sizeof(cpu_kcore_hdr_t));
563 if (fwrite((void*)&seghdr, sizeof(seghdr), 1, fp) <= 0) {
564 _kvm_syserr(kd, kd->program, "kvm_dump_wrtheader");
565 return (-1);
566 }
567 offset += kd->kcore_hdr->c_seghdrsize;
568 gap = kd->kcore_hdr->c_seghdrsize - sizeof(seghdr);
569 if (clear_gap(kd, fp, gap) == -1)
570 return (-1);
571
572 if (fwrite((void*)kd->cpu_hdr, sizeof(cpu_kcore_hdr_t), 1, fp) <= 0) {
573 _kvm_syserr(kd, kd->program, "kvm_dump_wrtheader");
574 return (-1);
575 }
576 offset += seghdr.c_size;
577 gap = seghdr.c_size - sizeof(cpu_kcore_hdr_t);
578 if (clear_gap(kd, fp, gap) == -1)
579 return (-1);
580
581 /*
582 * Write the actual dump data segment header
583 */
584 CORE_SETMAGIC(seghdr, KCORESEG_MAGIC, 0, CORE_DATA);
585 seghdr.c_size = dumpsize;
586 if (fwrite((void*)&seghdr, sizeof(seghdr), 1, fp) <= 0) {
587 _kvm_syserr(kd, kd->program, "kvm_dump_wrtheader");
588 return (-1);
589 }
590 offset += kd->kcore_hdr->c_seghdrsize;
591 gap = kd->kcore_hdr->c_seghdrsize - sizeof(seghdr);
592 if (clear_gap(kd, fp, gap) == -1)
593 return (-1);
594
595 return (offset);
596 }
597
598 kvm_t *
599 kvm_openfiles(uf, mf, sf, flag, errout)
600 const char *uf;
601 const char *mf;
602 const char *sf;
603 int flag;
604 char *errout;
605 {
606 register kvm_t *kd;
607
608 if ((kd = malloc(sizeof(*kd))) == NULL) {
609 (void)strcpy(errout, strerror(errno));
610 return (0);
611 }
612 kd->program = 0;
613 return (_kvm_open(kd, uf, mf, sf, flag, errout));
614 }
615
616 kvm_t *
617 kvm_open(uf, mf, sf, flag, program)
618 const char *uf;
619 const char *mf;
620 const char *sf;
621 int flag;
622 const char *program;
623 {
624 register kvm_t *kd;
625
626 if ((kd = malloc(sizeof(*kd))) == NULL && program != NULL) {
627 (void)fprintf(stderr, "%s: %s\n", strerror(errno));
628 return (0);
629 }
630 kd->program = program;
631 return (_kvm_open(kd, uf, mf, sf, flag, NULL));
632 }
633
634 int
635 kvm_close(kd)
636 kvm_t *kd;
637 {
638 register int error = 0;
639
640 if (kd->pmfd >= 0)
641 error |= close(kd->pmfd);
642 if (kd->vmfd >= 0)
643 error |= close(kd->vmfd);
644 if (kd->nlfd >= 0)
645 error |= close(kd->nlfd);
646 if (kd->swfd >= 0)
647 error |= close(kd->swfd);
648 if (kd->db != 0)
649 error |= (kd->db->close)(kd->db);
650 if (kd->vmst)
651 _kvm_freevtop(kd);
652 if (kd->cpu_hdr != NULL)
653 free((void *)kd->cpu_hdr);
654 if (kd->kcore_hdr != NULL)
655 free((void *)kd->kcore_hdr);
656 if (kd->procbase != 0)
657 free((void *)kd->procbase);
658 if (kd->swapspc != 0)
659 free((void *)kd->swapspc);
660 if (kd->argspc != 0)
661 free((void *)kd->argspc);
662 if (kd->argbuf != 0)
663 free((void *)kd->argbuf);
664 if (kd->argv != 0)
665 free((void *)kd->argv);
666 free((void *)kd);
667
668 return (0);
669 }
670
671 /*
672 * Set up state necessary to do queries on the kernel namelist
673 * data base. If the data base is out-of-data/incompatible with
674 * given executable, set up things so we revert to standard nlist call.
675 * Only called for live kernels. Return 0 on success, -1 on failure.
676 */
677 static int
678 kvm_dbopen(kd, uf)
679 kvm_t *kd;
680 const char *uf;
681 {
682 char *cp;
683 DBT rec;
684 int dbversionlen;
685 struct nlist nitem;
686 char dbversion[_POSIX2_LINE_MAX];
687 char kversion[_POSIX2_LINE_MAX];
688 char dbname[MAXPATHLEN];
689
690 if ((cp = rindex(uf, '/')) != 0)
691 uf = cp + 1;
692
693 (void)snprintf(dbname, sizeof(dbname), "%skvm_%s.db", _PATH_VARDB, uf);
694 kd->db = dbopen(dbname, O_RDONLY, 0, DB_HASH, NULL);
695 if (kd->db == 0)
696 return (-1);
697 /*
698 * read version out of database
699 */
700 rec.data = VRS_KEY;
701 rec.size = sizeof(VRS_KEY) - 1;
702 if ((kd->db->get)(kd->db, (DBT *)&rec, (DBT *)&rec, 0))
703 goto close;
704 if (rec.data == 0 || rec.size > sizeof(dbversion))
705 goto close;
706
707 bcopy(rec.data, dbversion, rec.size);
708 dbversionlen = rec.size;
709 /*
710 * Read version string from kernel memory.
711 * Since we are dealing with a live kernel, we can call kvm_read()
712 * at this point.
713 */
714 rec.data = VRS_SYM;
715 rec.size = sizeof(VRS_SYM) - 1;
716 if ((kd->db->get)(kd->db, (DBT *)&rec, (DBT *)&rec, 0))
717 goto close;
718 if (rec.data == 0 || rec.size != sizeof(struct nlist))
719 goto close;
720 bcopy((char *)rec.data, (char *)&nitem, sizeof(nitem));
721 if (kvm_read(kd, (u_long)nitem.n_value, kversion, dbversionlen) !=
722 dbversionlen)
723 goto close;
724 /*
725 * If they match, we win - otherwise clear out kd->db so
726 * we revert to slow nlist().
727 */
728 if (bcmp(dbversion, kversion, dbversionlen) == 0)
729 return (0);
730 close:
731 (void)(kd->db->close)(kd->db);
732 kd->db = 0;
733
734 return (-1);
735 }
736
737 int
738 kvm_nlist(kd, nl)
739 kvm_t *kd;
740 struct nlist *nl;
741 {
742 register struct nlist *p;
743 register int nvalid;
744
745 /*
746 * If we can't use the data base, revert to the
747 * slow library call.
748 */
749 if (kd->db == 0)
750 return (__fdnlist(kd->nlfd, nl));
751
752 /*
753 * We can use the kvm data base. Go through each nlist entry
754 * and look it up with a db query.
755 */
756 nvalid = 0;
757 for (p = nl; p->n_name && p->n_name[0]; ++p) {
758 register int len;
759 DBT rec;
760
761 if ((len = strlen(p->n_name)) > 4096) {
762 /* sanity */
763 _kvm_err(kd, kd->program, "symbol too large");
764 return (-1);
765 }
766 rec.data = p->n_name;
767 rec.size = len;
768
769 /*
770 * Make sure that n_value = 0 when the symbol isn't found
771 */
772 p->n_value = 0;
773
774 if ((kd->db->get)(kd->db, (DBT *)&rec, (DBT *)&rec, 0))
775 continue;
776 if (rec.data == 0 || rec.size != sizeof(struct nlist))
777 continue;
778 ++nvalid;
779 /*
780 * Avoid alignment issues.
781 */
782 bcopy((char *)&((struct nlist *)rec.data)->n_type,
783 (char *)&p->n_type,
784 sizeof(p->n_type));
785 bcopy((char *)&((struct nlist *)rec.data)->n_value,
786 (char *)&p->n_value,
787 sizeof(p->n_value));
788 }
789 /*
790 * Return the number of entries that weren't found.
791 */
792 return ((p - nl) - nvalid);
793 }
794
795 int kvm_dump_inval(kd)
796 kvm_t *kd;
797 {
798 struct nlist nlist[2];
799 u_long pa;
800
801 if (ISALIVE(kd)) {
802 _kvm_err(kd, kd->program, "clearing dump on live kernel");
803 return (-1);
804 }
805 nlist[0].n_name = "_dumpmag";
806 nlist[1].n_name = NULL;
807
808 if (kvm_nlist(kd, nlist) == -1) {
809 _kvm_err(kd, 0, "bad namelist");
810 return (-1);
811 }
812 if (_kvm_kvatop(kd, (u_long)nlist[0].n_value, &pa) == 0)
813 return (-1);
814
815 errno = 0;
816 if (lseek(kd->pmfd, _kvm_pa2off(kd, pa), SEEK_SET) == -1
817 && errno != 0) {
818 _kvm_err(kd, 0, "cannot invalidate dump - lseek");
819 return (-1);
820 }
821 pa = 0;
822 if (write(kd->pmfd, &pa, sizeof(pa)) != sizeof(pa)) {
823 _kvm_err(kd, 0, "cannot invalidate dump - write");
824 return (-1);
825 }
826 return (0);
827 }
828
829 ssize_t
830 kvm_read(kd, kva, buf, len)
831 kvm_t *kd;
832 register u_long kva;
833 register void *buf;
834 register size_t len;
835 {
836 register int cc;
837 register void *cp;
838
839 if (ISALIVE(kd)) {
840 /*
841 * We're using /dev/kmem. Just read straight from the
842 * device and let the active kernel do the address translation.
843 */
844 errno = 0;
845 if (lseek(kd->vmfd, (off_t)kva, SEEK_SET) == -1
846 && errno != 0) {
847 _kvm_err(kd, 0, "invalid address (%x)", kva);
848 return (0);
849 }
850 cc = read(kd->vmfd, buf, len);
851 if (cc < 0) {
852 _kvm_syserr(kd, 0, "kvm_read");
853 return (0);
854 } else if (cc < len)
855 _kvm_err(kd, kd->program, "short read");
856 return (cc);
857 } else {
858 if ((kd->kcore_hdr == NULL) || (kd->cpu_hdr == NULL)) {
859 _kvm_err(kd, kd->program, "no valid dump header");
860 return (0);
861 }
862 cp = buf;
863 while (len > 0) {
864 u_long pa;
865 off_t foff;
866
867 cc = _kvm_kvatop(kd, kva, &pa);
868 if (cc == 0)
869 return (0);
870 if (cc > len)
871 cc = len;
872 foff = _kvm_pa2off(kd, pa);
873 errno = 0;
874 if (lseek(kd->pmfd, foff, SEEK_SET) == -1
875 && errno != 0) {
876 _kvm_syserr(kd, 0, _PATH_MEM);
877 break;
878 }
879 cc = read(kd->pmfd, cp, cc);
880 if (cc < 0) {
881 _kvm_syserr(kd, kd->program, "kvm_read");
882 break;
883 }
884 /*
885 * If kvm_kvatop returns a bogus value or our core
886 * file is truncated, we might wind up seeking beyond
887 * the end of the core file in which case the read will
888 * return 0 (EOF).
889 */
890 if (cc == 0)
891 break;
892 cp = (char *)cp + cc;
893 kva += cc;
894 len -= cc;
895 }
896 return ((char *)cp - (char *)buf);
897 }
898 /* NOTREACHED */
899 }
900
901 ssize_t
902 kvm_write(kd, kva, buf, len)
903 kvm_t *kd;
904 register u_long kva;
905 register const void *buf;
906 register size_t len;
907 {
908 register int cc;
909
910 if (ISALIVE(kd)) {
911 /*
912 * Just like kvm_read, only we write.
913 */
914 errno = 0;
915 if (lseek(kd->vmfd, (off_t)kva, SEEK_SET) == -1
916 && errno != 0) {
917 _kvm_err(kd, 0, "invalid address (%x)", kva);
918 return (0);
919 }
920 cc = write(kd->vmfd, buf, len);
921 if (cc < 0) {
922 _kvm_syserr(kd, 0, "kvm_write");
923 return (0);
924 } else if (cc < len)
925 _kvm_err(kd, kd->program, "short write");
926 return (cc);
927 } else {
928 _kvm_err(kd, kd->program,
929 "kvm_write not implemented for dead kernels");
930 return (0);
931 }
932 /* NOTREACHED */
933 }
934