a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * DBGPlugInSolaris - Debugger and Guest OS Digger Plugin For Solaris.
c58f1213e628a545081c70e26c6b67a841cff880vboxsync * Copyright (C) 2008-2013 Oracle Corporation
6ec4e1827eab6a424d672ef0e5a17b065e52db20vboxsync * This file is part of VirtualBox Open Source Edition (OSE), as
6ec4e1827eab6a424d672ef0e5a17b065e52db20vboxsync * available from http://www.virtualbox.org. This file is free software;
6ec4e1827eab6a424d672ef0e5a17b065e52db20vboxsync * you can redistribute it and/or modify it under the terms of the GNU
6ec4e1827eab6a424d672ef0e5a17b065e52db20vboxsync * General Public License (GPL) as published by the Free Software
6ec4e1827eab6a424d672ef0e5a17b065e52db20vboxsync * Foundation, in version 2 as it comes in the "COPYING" file of the
6ec4e1827eab6a424d672ef0e5a17b065e52db20vboxsync * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
6ec4e1827eab6a424d672ef0e5a17b065e52db20vboxsync * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/*******************************************************************************
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync* Header Files *
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync*******************************************************************************/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync#define LOG_GROUP LOG_GROUP_DBGF ///@todo add new log group.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/*******************************************************************************
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync* Defined Constants And Macros *
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync*******************************************************************************/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Solaris on little endian ASCII systems. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync#define DIG_SOL_MOD_TAG UINT64_C(0x00736972616c6f53)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/*******************************************************************************
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync* Structures and Typedefs *
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync*******************************************************************************/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** @name InternalSolaris structures
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync uint32_t mod_mp; /**< c Pointer to the kernel runtime loader bits. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync int8_t mod_prim; /**< 26 this is 1 for 'unix' and a few others. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync uint64_t mod_mp; /**< 18 Pointer to the kernel runtime loader bits. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync int8_t mod_prim; /**< 4a this is 1 for 'unix' and a few others. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync uint32_t mod_mp; /**< c Pointer to the kernel runtime loader bits. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* DIFF 4: 4 bytes added in v11 */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* DIFF 5: 8 bytes added in v11 */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync uint64_t mod_mp; /**< 18 Pointer to the kernel runtime loader bits. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync int32_t mod_stub; /**< 4c DIFF 1 - is this a pointer? */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* DIFF 5: 8 bytes added in v11 */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Solaris guest OS digger instance data.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /** Whether the information is valid or not.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * (For fending off illegal interface method calls.) */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /** Address of the 'unix' text segment.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * This is set during probing. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /** Address of the 'unix' text segment.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * This is set during probing. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /** Address of the 'unix' modctl_t (aka modules). */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /** modctl_t version number. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /** 64-bit/32-bit indicator. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Pointer to the solaris guest OS digger instance data. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/*******************************************************************************
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync* Defined Constants And Macros *
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync*******************************************************************************/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Min kernel address. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Max kernel address. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Min kernel address. */
ef862a94cf65ef72ba76e6e4ecc3d3eb5ac9d56evboxsync#define SOL64_MIN_KRNL_ADDR UINT64_C(0xFFFFC00000000000)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Max kernel address. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync#define SOL64_MAX_KRNL_ADDR UINT64_C(0xFFFFFFFFFFF00000)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Validates a 32-bit solaris kernel address */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync#if 0 /* OpenSolaris, early boot have symspace at 0x27a2000 */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync# define SOL32_VALID_ADDRESS(Addr) ((Addr) > SOL32_MIN_KRNL_ADDR && (Addr) < SOL32_MAX_KRNL_ADDR)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync# define SOL32_VALID_ADDRESS(Addr) ( ((Addr) > SOL32_MIN_KRNL_ADDR && (Addr) < SOL32_MAX_KRNL_ADDR) \
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || ((Addr) > UINT32_C(0x02000000) && (Addr) < UINT32_C(0x04000000)) /* boot */ )
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** Validates a 64-bit solaris kernel address */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync#define SOL64_VALID_ADDRESS(Addr) ( (Addr) > SOL64_MIN_KRNL_ADDR \
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** The max data segment size of the 'unix' module. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** The max code segment size of the 'unix' module.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * This is the same for both 64-bit and 32-bit. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/*******************************************************************************
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync* Internal Functions *
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync*******************************************************************************/
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(int) dbgDiggerSolarisInit(PUVM pUVM, void *pvData);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnQueryInterface
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(void *) dbgDiggerSolarisQueryInterface(PUVM pUVM, void *pvData, DBGFOSINTERFACE enmIf)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnQueryVersion
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(int) dbgDiggerSolarisQueryVersion(PUVM pUVM, void *pvData, char *pszVersion, size_t cchVersion)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync PDBGDIGGERSOLARIS pThis = (PDBGDIGGERSOLARIS)pvData;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * It's all in the utsname symbol...
98427c0ab08697e468c26dc33ee9571308577867vboxsync int rc = DBGFR3AsSymbolByName(pUVM, DBGF_AS_KERNEL, "utsname", &SymUtsName, NULL);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, SymUtsName.Value), &UtsName, sizeof(UtsName));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Try searching by the name...
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemScan(pUVM, 0, &pThis->AddrUnixData, SOL_UNIX_MAX_DATA_SEG_SIZE, 1,
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync &UtsName.sysname[0], sizeof(UtsName.sysname), &Addr);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, Addr.FlatPtr - RT_OFFSETOF(SOL_utsname_t, sysname)),
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Copy out the result (if any).
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync if ( UtsName.sysname[sizeof(UtsName.sysname) - 1] != '\0'
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || UtsName.nodename[sizeof(UtsName.nodename) - 1] != '\0'
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || UtsName.release[sizeof(UtsName.release) - 1] != '\0'
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || UtsName.version[sizeof(UtsName.version) - 1] != '\0'
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || UtsName.machine[sizeof(UtsName.machine) - 1] != '\0')
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync //rc = VERR_DBGF_UNEXPECTED_OS_DATA;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync RTStrPrintf(pszVersion, cchVersion, "failed - bogus utsname");
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync RTStrPrintf(pszVersion, cchVersion, "%s %s", UtsName.version, UtsName.release);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync RTStrPrintf(pszVersion, cchVersion, "failed - %Rrc", rc);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Processes a modctl_t.
98427c0ab08697e468c26dc33ee9571308577867vboxsync * @param pUVM The user mode VM handle.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @param pThis Our instance data.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @param pModCtl Pointer to the modctl structure.
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic void dbgDiggerSolarisProcessModCtl32(PUVM pUVM, PDBGDIGGERSOLARIS pThis, SOL_modctl_t const *pModCtl)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* skip it if it's not loaded and installed */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_32.mod_loaded, v9_32.mod_loaded);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_32.mod_installed, v9_32.mod_installed);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_32.mod_id, v9_32.mod_id);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Read the module and file names first
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_32.mod_modname, v9_32.mod_modname);
98427c0ab08697e468c26dc33ee9571308577867vboxsync int rc = DBGFR3MemReadString(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, pModCtl->v9_32.mod_modname), szModName, sizeof(szModName));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_32.mod_filename, v9_32.mod_filename);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemReadString(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, pModCtl->v9_32.mod_filename), szFilename, sizeof(szFilename));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync else if (!RTStrEnd(szFilename, sizeof(szFilename)))
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Then read the module struct and validate it.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_32.mod_mp, v9_32.mod_mp);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, pModCtl->v9_32.mod_mp), &Module, sizeof(Module));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Basic validations of the elf header. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || ASMMemIsAll8(&Module.hdr.e_ident[EI_PAD], EI_NIDENT - EI_PAD, 0) != NULL
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Basic validations of the rest of the stuff. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL32_VALID_ADDRESS(Module.symspace) && Module.symspace)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL32_VALID_ADDRESS(Module.symtbl) && Module.symtbl)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL32_VALID_ADDRESS(Module.strings) && Module.strings)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL32_VALID_ADDRESS(Module.head) && Module.head)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL32_VALID_ADDRESS(Module.tail) && Module.tail)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Ignore modules without symbols. */
8dbb6dcc855b489c0c3a50d1b41d930d34aaebb1vboxsync if (!Module.symtbl || !Module.strings || !Module.symspace || !Module.symsize)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Check that the symtbl and strings points inside the symspace. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync if (Module.strings - Module.symspace >= Module.symsize)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync if (Module.symtbl - Module.symspace >= Module.symsize)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Read the section headers, symbol table and string tables.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync size_t cb = Module.hdr.e_shnum * sizeof(Elf32_Shdr);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Elf32_Shdr *paShdrs = (Elf32_Shdr *)RTMemTmpAlloc(cb);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, Module.shdrs), paShdrs, cb);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync void *pvSymSpace = RTMemTmpAlloc(Module.symsize + 1);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, Module.symspace), pvSymSpace, Module.symsize);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Hand it over to the common ELF32 module parser.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync char const *pbStrings = (char const *)pvSymSpace + (Module.strings - Module.symspace);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync size_t cbMaxStrings = Module.symsize - (Module.strings - Module.symspace);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Elf32_Sym const *paSyms = (Elf32_Sym const *)((uintptr_t)pvSymSpace + (Module.symtbl - Module.symspace));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync size_t cMaxSyms = (Module.symsize - (Module.symtbl - Module.symspace)) / sizeof(Elf32_Sym);
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGDiggerCommonParseElf32Mod(pUVM, szModName, szFilename, DBG_DIGGER_ELF_FUNNY_SHDRS,
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync &Module.hdr, paShdrs, paSyms, cMaxSyms, pbStrings, cbMaxStrings,
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync SOL32_MIN_KRNL_ADDR, SOL32_MAX_KRNL_ADDR - 1, DIG_SOL_MOD_TAG);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Processes a modctl_t.
98427c0ab08697e468c26dc33ee9571308577867vboxsync * @param pUVM The user mode VM handle.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @param pThis Our instance data.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @param pModCtl Pointer to the modctl structure.
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic void dbgDiggerSolarisProcessModCtl64(PUVM pUVM, PDBGDIGGERSOLARIS pThis, SOL_modctl_t const *pModCtl)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* skip it if it's not loaded and installed */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_64.mod_loaded, v9_64.mod_loaded);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_64.mod_installed, v9_64.mod_installed);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_64.mod_id, v9_64.mod_id);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Read the module and file names first
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_64.mod_modname, v9_64.mod_modname);
98427c0ab08697e468c26dc33ee9571308577867vboxsync int rc = DBGFR3MemReadString(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, pModCtl->v9_64.mod_modname), szModName, sizeof(szModName));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_64.mod_filename, v9_64.mod_filename);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemReadString(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, pModCtl->v9_64.mod_filename), szFilename, sizeof(szFilename));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync else if (!RTStrEnd(szFilename, sizeof(szFilename)))
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Then read the module struct and validate it.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_64.mod_mp, v9_64.mod_mp);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, pModCtl->v9_64.mod_mp), &Module, sizeof(Module));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Basic validations of the elf header. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || ASMMemIsAll8(&Module.hdr.e_ident[EI_PAD], EI_NIDENT - EI_PAD, 0) != NULL
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Basic validations of the rest of the stuff. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL64_VALID_ADDRESS(Module.symspace) && Module.symspace)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL64_VALID_ADDRESS(Module.symtbl) && Module.symtbl)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL64_VALID_ADDRESS(Module.strings) && Module.strings)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL64_VALID_ADDRESS(Module.head) && Module.head)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync || (!SOL64_VALID_ADDRESS(Module.tail) && Module.tail)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Ignore modules without symbols. */
8dbb6dcc855b489c0c3a50d1b41d930d34aaebb1vboxsync if (!Module.symtbl || !Module.strings || !Module.symspace || !Module.symsize)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* Check that the symtbl and strings points inside the symspace. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync if (Module.strings - Module.symspace >= Module.symsize)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync if (Module.symtbl - Module.symspace >= Module.symsize)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Read the section headers, symbol table and string tables.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync size_t cb = Module.hdr.e_shnum * sizeof(Elf64_Shdr);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Elf64_Shdr *paShdrs = (Elf64_Shdr *)RTMemTmpAlloc(cb);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, Module.shdrs), paShdrs, cb);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync void *pvSymSpace = RTMemTmpAlloc(Module.symsize + 1);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, DBGFR3AddrFromFlat(pUVM, &Addr, Module.symspace), pvSymSpace, Module.symsize);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Hand it over to the common ELF64 module parser.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync char const *pbStrings = (char const *)pvSymSpace + (Module.strings - Module.symspace);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync size_t cbMaxStrings = Module.symsize - (Module.strings - Module.symspace);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Elf64_Sym const *paSyms = (Elf64_Sym const *)((uintptr_t)pvSymSpace + (uintptr_t)(Module.symtbl - Module.symspace));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync size_t cMaxSyms = (Module.symsize - (Module.symtbl - Module.symspace)) / sizeof(Elf32_Sym);
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGDiggerCommonParseElf64Mod(pUVM, szModName, szFilename, DBG_DIGGER_ELF_FUNNY_SHDRS,
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync &Module.hdr, paShdrs, paSyms, cMaxSyms, pbStrings, cbMaxStrings,
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync SOL64_MIN_KRNL_ADDR, SOL64_MAX_KRNL_ADDR - 1, DIG_SOL_MOD_TAG);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnTerm
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(void) dbgDiggerSolarisTerm(PUVM pUVM, void *pvData)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync PDBGDIGGERSOLARIS pThis = (PDBGDIGGERSOLARIS)pvData;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnRefresh
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(int) dbgDiggerSolarisRefresh(PUVM pUVM, void *pvData)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync PDBGDIGGERSOLARIS pThis = (PDBGDIGGERSOLARIS)pvData;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * For now we'll flush and reload everything.
98427c0ab08697e468c26dc33ee9571308577867vboxsync RTDBGAS hDbgAs = DBGFR3AsResolveAndRetain(pUVM, DBGF_AS_KERNEL);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync while (iMod-- > 0)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync RTDBGMOD hMod = RTDbgAsModuleByIndex(hDbgAs, iMod);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnInit
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(int) dbgDiggerSolarisInit(PUVM pUVM, void *pvData)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync PDBGDIGGERSOLARIS pThis = (PDBGDIGGERSOLARIS)pvData;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * On Solaris the kernel and is the global address space.
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AsSetAlias(pUVM, DBGF_AS_KERNEL, DBGF_AS_GLOBAL);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync/** @todo Use debug_info, build 7x / S10U6. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Find the 'unix' modctl_t structure (aka modules).
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * We know it resides in the unix data segment.
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &pThis->AddrUnixModCtl, 0);
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &MaxAddr, CurAddr.FlatPtr + SOL_UNIX_MAX_DATA_SEG_SIZE);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync const uint8_t *pbExpr = (const uint8_t *)&pThis->AddrUnixText.FlatPtr;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync const uint32_t cbExpr = pThis->f64Bit ? sizeof(uint64_t) : sizeof(uint32_t);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemScan(pUVM, 0, &CurAddr, MaxAddr.FlatPtr - CurAddr.FlatPtr, 1, pbExpr, cbExpr, &HitAddr);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Read out the modctl_t structure.
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &ModCtlAddr, HitAddr.FlatPtr - RT_OFFSETOF(SOL32v11_modctl_t, mod_text));
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &ModCtlAddr, &ModCtlv11, sizeof(ModCtlv11));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /*&& ModCtlv11.mod_text == pThis->AddrUnixText.FlatPtr*/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && ModCtlv11.mod_text_size < SOL_UNIX_MAX_CODE_SEG_SIZE
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &NameAddr, ModCtlv11.mod_modname);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &NameAddr, &szUnix, sizeof(szUnix));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Log(("sol64 mod_name=%.*s v11\n", sizeof(szUnix), szUnix));
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &ModCtlAddr, HitAddr.FlatPtr - RT_OFFSETOF(SOL32v11_modctl_t, mod_text));
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &ModCtlAddr, &ModCtlv11, sizeof(ModCtlv11));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /*&& ModCtlv11.mod_text == pThis->AddrUnixText.FlatPtr*/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && ModCtlv11.mod_text_size < SOL_UNIX_MAX_CODE_SEG_SIZE
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &NameAddr, ModCtlv11.mod_modname);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &NameAddr, &szUnix, sizeof(szUnix));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Log(("sol32 mod_name=%.*s v11\n", sizeof(szUnix), szUnix));
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &ModCtlAddr, HitAddr.FlatPtr - RT_OFFSETOF(SOL64v9_modctl_t, mod_text));
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &ModCtlAddr, &ModCtlv9, sizeof(ModCtlv9));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && (ModCtlv9.mod_loaded == 1 || ModCtlv9.mod_loaded == 0)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && (ModCtlv9.mod_installed == 1 || ModCtlv9.mod_installed == 0)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && (ModCtlv9.mod_loadcnt == 1 || ModCtlv9.mod_loadcnt == 0)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /*&& ModCtlv9.mod_text == pThis->AddrUnixText.FlatPtr*/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && ModCtlv9.mod_text_size < SOL_UNIX_MAX_CODE_SEG_SIZE)
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &NameAddr, ModCtlv9.mod_modname);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &NameAddr, &szUnix, sizeof(szUnix));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Log(("sol64 mod_name=%.*s v9\n", sizeof(szUnix), szUnix));
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &ModCtlAddr, HitAddr.FlatPtr - RT_OFFSETOF(SOL32v9_modctl_t, mod_text));
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &ModCtlAddr, &ModCtlv9, sizeof(ModCtlv9));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && (ModCtlv9.mod_loaded == 1 || ModCtlv9.mod_loaded == 0)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && (ModCtlv9.mod_installed == 1 || ModCtlv9.mod_installed == 0)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && (ModCtlv9.mod_loadcnt == 1 || ModCtlv9.mod_loadcnt == 0)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /*&& ModCtlv9.mod_text == pThis->AddrUnixText.FlatPtr*/
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync && ModCtlv9.mod_text_size < SOL_UNIX_MAX_CODE_SEG_SIZE )
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &NameAddr, ModCtlv9.mod_modname);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &NameAddr, &szUnix, sizeof(szUnix));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync Log(("sol32 mod_name=%.*s v9\n", sizeof(szUnix), szUnix));
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &CurAddr, HitAddr.FlatPtr + cbExpr);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Walk the module chain and add the modules and their symbols.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* read it */
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemRead(pUVM, 0, &CurAddr, &ModCtl, cbModCtl);
ef862a94cf65ef72ba76e6e4ecc3d3eb5ac9d56evboxsync LogRel(("sol: bad modctl_t chain for module %d: %RGv - %Rrc\n", iMod, CurAddr.FlatPtr, rc));
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* process it. */
98427c0ab08697e468c26dc33ee9571308577867vboxsync dbgDiggerSolarisProcessModCtl64(pUVM, pThis, &ModCtl);
98427c0ab08697e468c26dc33ee9571308577867vboxsync dbgDiggerSolarisProcessModCtl32(pUVM, pThis, &ModCtl);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_64.mod_next, v9_64.mod_next);
ef862a94cf65ef72ba76e6e4ecc3d3eb5ac9d56evboxsync LogRel(("sol64: bad modctl_t chain for module %d at %RGv: %RGv\n", iMod, CurAddr.FlatPtr, (RTGCUINTPTR)ModCtl.v9_64.mod_next));
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &CurAddr, ModCtl.v9_64.mod_next);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync AssertCompile2MemberOffsets(SOL_modctl_t, v11_32.mod_next, v9_32.mod_next);
ef862a94cf65ef72ba76e6e4ecc3d3eb5ac9d56evboxsync LogRel(("sol32: bad modctl_t chain for module %d at %RGv: %RGv\n", iMod, CurAddr.FlatPtr, (RTGCUINTPTR)ModCtl.v9_32.mod_next));
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &CurAddr, ModCtl.v9_32.mod_next);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync } while (CurAddr.FlatPtr != pThis->AddrUnixModCtl.FlatPtr);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnProbe
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(bool) dbgDiggerSolarisProbe(PUVM pUVM, void *pvData)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync PDBGDIGGERSOLARIS pThis = (PDBGDIGGERSOLARIS)pvData;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Look for "SunOS Release" in the text segment.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* 32-bit search range. */
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync static const uint8_t s_abSunRelease[] = "SunOS Release ";
98427c0ab08697e468c26dc33ee9571308577867vboxsync int rc = DBGFR3MemScan(pUVM, 0, &Addr, cbRange, 1, s_abSunRelease, sizeof(s_abSunRelease) - 1, &HitAddr);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* 64-bit.... */
98427c0ab08697e468c26dc33ee9571308577867vboxsync DBGFR3AddrFromFlat(pUVM, &Addr, UINT64_C(0xfffffffffb800000));
ef862a94cf65ef72ba76e6e4ecc3d3eb5ac9d56evboxsync cbRange = UINT64_C(0xfffffffffbd00000) - UINT64_C(0xfffffffffb800000);
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemScan(pUVM, 0, &Addr, cbRange, 1, s_abSunRelease, sizeof(s_abSunRelease) - 1, &HitAddr);
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync return false;
fd5c3224c7cbfb3c5c5115e1260d9f91033885e0vboxsync * Look for the copyright string too, just to be sure.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync static const uint8_t s_abSMI[] = "Sun Microsystems, Inc.";
fd5c3224c7cbfb3c5c5115e1260d9f91033885e0vboxsync static const uint8_t s_abORCL[] = "Oracle and/or its affiliates.";
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemScan(pUVM, 0, &Addr, cbRange, 1, s_abSMI, sizeof(s_abSMI) - 1, &HitAddr);
fd5c3224c7cbfb3c5c5115e1260d9f91033885e0vboxsync /* Try the alternate copyright string. */
98427c0ab08697e468c26dc33ee9571308577867vboxsync rc = DBGFR3MemScan(pUVM, 0, &Addr, cbRange, 1, s_abORCL, sizeof(s_abORCL) - 1, &HitAddr);
fd5c3224c7cbfb3c5c5115e1260d9f91033885e0vboxsync return false;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * Remember the unix text and data addresses and bitness.
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync return true;
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnDestruct
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(void) dbgDiggerSolarisDestruct(PUVM pUVM, void *pvData)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync * @copydoc DBGFOSREG::pfnConstruct
98427c0ab08697e468c26dc33ee9571308577867vboxsyncstatic DECLCALLBACK(int) dbgDiggerSolarisConstruct(PUVM pUVM, void *pvData)
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* .fFlags = */ 0,
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* .pfnQueryVersion = */ dbgDiggerSolarisQueryVersion,
a33af978add1a03aab11b2895f441af5cb2a11a6vboxsync /* .pfnQueryInterface = */ dbgDiggerSolarisQueryInterface,