xref: /freebsd/sys/cddl/dev/dtrace/amd64/dtrace_isa.c (revision 09a15aa38dd1c81b6672980a25c6bdd1edd65c2a)
191eaf3e1SJohn Birrell /*
291eaf3e1SJohn Birrell  * CDDL HEADER START
391eaf3e1SJohn Birrell  *
491eaf3e1SJohn Birrell  * The contents of this file are subject to the terms of the
591eaf3e1SJohn Birrell  * Common Development and Distribution License, Version 1.0 only
691eaf3e1SJohn Birrell  * (the "License").  You may not use this file except in compliance
791eaf3e1SJohn Birrell  * with the License.
891eaf3e1SJohn Birrell  *
991eaf3e1SJohn Birrell  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
1091eaf3e1SJohn Birrell  * or http://www.opensolaris.org/os/licensing.
1191eaf3e1SJohn Birrell  * See the License for the specific language governing permissions
1291eaf3e1SJohn Birrell  * and limitations under the License.
1391eaf3e1SJohn Birrell  *
1491eaf3e1SJohn Birrell  * When distributing Covered Code, include this CDDL HEADER in each
1591eaf3e1SJohn Birrell  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
1691eaf3e1SJohn Birrell  * If applicable, add the following below this CDDL HEADER, with the
1791eaf3e1SJohn Birrell  * fields enclosed by brackets "[]" replaced with your own identifying
1891eaf3e1SJohn Birrell  * information: Portions Copyright [yyyy] [name of copyright owner]
1991eaf3e1SJohn Birrell  *
2091eaf3e1SJohn Birrell  * CDDL HEADER END
2191eaf3e1SJohn Birrell  *
2291eaf3e1SJohn Birrell  * $FreeBSD$
2391eaf3e1SJohn Birrell  */
2491eaf3e1SJohn Birrell /*
2591eaf3e1SJohn Birrell  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
2691eaf3e1SJohn Birrell  * Use is subject to license terms.
2791eaf3e1SJohn Birrell  */
2891eaf3e1SJohn Birrell #include <sys/cdefs.h>
2991eaf3e1SJohn Birrell 
3091eaf3e1SJohn Birrell #include <sys/param.h>
3191eaf3e1SJohn Birrell #include <sys/systm.h>
3291eaf3e1SJohn Birrell #include <sys/kernel.h>
3391eaf3e1SJohn Birrell #include <sys/stack.h>
3491eaf3e1SJohn Birrell #include <sys/pcpu.h>
3591eaf3e1SJohn Birrell 
3691eaf3e1SJohn Birrell #include <machine/frame.h>
3791eaf3e1SJohn Birrell #include <machine/md_var.h>
3891eaf3e1SJohn Birrell #include <machine/reg.h>
3991eaf3e1SJohn Birrell #include <machine/stack.h>
4091eaf3e1SJohn Birrell 
4191eaf3e1SJohn Birrell #include <vm/vm.h>
4291eaf3e1SJohn Birrell #include <vm/vm_param.h>
4391eaf3e1SJohn Birrell #include <vm/pmap.h>
4491eaf3e1SJohn Birrell 
45c6f5742fSRui Paulo #include "regset.h"
4691eaf3e1SJohn Birrell 
4791eaf3e1SJohn Birrell uint8_t dtrace_fuword8_nocheck(void *);
4891eaf3e1SJohn Birrell uint16_t dtrace_fuword16_nocheck(void *);
4991eaf3e1SJohn Birrell uint32_t dtrace_fuword32_nocheck(void *);
5091eaf3e1SJohn Birrell uint64_t dtrace_fuword64_nocheck(void *);
5191eaf3e1SJohn Birrell 
52*09a15aa3SMark Johnston int	dtrace_ustackdepth_max = 2048;
53*09a15aa3SMark Johnston 
5491eaf3e1SJohn Birrell void
5591eaf3e1SJohn Birrell dtrace_getpcstack(pc_t *pcstack, int pcstack_limit, int aframes,
5691eaf3e1SJohn Birrell     uint32_t *intrpc)
5791eaf3e1SJohn Birrell {
5891eaf3e1SJohn Birrell 	int depth = 0;
5991eaf3e1SJohn Birrell 	register_t rbp;
6091eaf3e1SJohn Birrell 	struct amd64_frame *frame;
6191eaf3e1SJohn Birrell 	vm_offset_t callpc;
6291eaf3e1SJohn Birrell 	pc_t caller = (pc_t) solaris_cpu[curcpu].cpu_dtrace_caller;
6391eaf3e1SJohn Birrell 
6491eaf3e1SJohn Birrell 	if (intrpc != 0)
6591eaf3e1SJohn Birrell 		pcstack[depth++] = (pc_t) intrpc;
6691eaf3e1SJohn Birrell 
6791eaf3e1SJohn Birrell 	aframes++;
6891eaf3e1SJohn Birrell 
6991eaf3e1SJohn Birrell 	__asm __volatile("movq %%rbp,%0" : "=r" (rbp));
7091eaf3e1SJohn Birrell 
7191eaf3e1SJohn Birrell 	frame = (struct amd64_frame *)rbp;
7291eaf3e1SJohn Birrell 	while (depth < pcstack_limit) {
7391eaf3e1SJohn Birrell 		if (!INKERNEL((long) frame))
7491eaf3e1SJohn Birrell 			break;
7591eaf3e1SJohn Birrell 
7691eaf3e1SJohn Birrell 		callpc = frame->f_retaddr;
7791eaf3e1SJohn Birrell 
7891eaf3e1SJohn Birrell 		if (!INKERNEL(callpc))
7991eaf3e1SJohn Birrell 			break;
8091eaf3e1SJohn Birrell 
8191eaf3e1SJohn Birrell 		if (aframes > 0) {
8291eaf3e1SJohn Birrell 			aframes--;
8391eaf3e1SJohn Birrell 			if ((aframes == 0) && (caller != 0)) {
8491eaf3e1SJohn Birrell 				pcstack[depth++] = caller;
8591eaf3e1SJohn Birrell 			}
8691eaf3e1SJohn Birrell 		}
8791eaf3e1SJohn Birrell 		else {
8891eaf3e1SJohn Birrell 			pcstack[depth++] = callpc;
8991eaf3e1SJohn Birrell 		}
9091eaf3e1SJohn Birrell 
9191eaf3e1SJohn Birrell 		if (frame->f_frame <= frame ||
9291eaf3e1SJohn Birrell 		    (vm_offset_t)frame->f_frame >=
9391eaf3e1SJohn Birrell 		    (vm_offset_t)rbp + KSTACK_PAGES * PAGE_SIZE)
9491eaf3e1SJohn Birrell 			break;
9591eaf3e1SJohn Birrell 		frame = frame->f_frame;
9691eaf3e1SJohn Birrell 	}
9791eaf3e1SJohn Birrell 
9891eaf3e1SJohn Birrell 	for (; depth < pcstack_limit; depth++) {
9991eaf3e1SJohn Birrell 		pcstack[depth] = 0;
10091eaf3e1SJohn Birrell 	}
10191eaf3e1SJohn Birrell }
10291eaf3e1SJohn Birrell 
10391eaf3e1SJohn Birrell static int
10491eaf3e1SJohn Birrell dtrace_getustack_common(uint64_t *pcstack, int pcstack_limit, uintptr_t pc,
10591eaf3e1SJohn Birrell     uintptr_t sp)
10691eaf3e1SJohn Birrell {
107*09a15aa3SMark Johnston 	uintptr_t oldsp;
10891eaf3e1SJohn Birrell 	volatile uint16_t *flags =
10991eaf3e1SJohn Birrell 	    (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags;
11091eaf3e1SJohn Birrell 	int ret = 0;
11191eaf3e1SJohn Birrell 
11291eaf3e1SJohn Birrell 	ASSERT(pcstack == NULL || pcstack_limit > 0);
113*09a15aa3SMark Johnston 	ASSERT(dtrace_ustackdepth_max > 0);
11491eaf3e1SJohn Birrell 
115c6f5742fSRui Paulo 	while (pc != 0) {
116*09a15aa3SMark Johnston 		/*
117*09a15aa3SMark Johnston 		 * We limit the number of times we can go around this
118*09a15aa3SMark Johnston 		 * loop to account for a circular stack.
119*09a15aa3SMark Johnston 		 */
120*09a15aa3SMark Johnston 		if (ret++ >= dtrace_ustackdepth_max) {
121*09a15aa3SMark Johnston 			*flags |= CPU_DTRACE_BADSTACK;
122*09a15aa3SMark Johnston 			cpu_core[curcpu].cpuc_dtrace_illval = sp;
123*09a15aa3SMark Johnston 			break;
124*09a15aa3SMark Johnston 		}
125*09a15aa3SMark Johnston 
12691eaf3e1SJohn Birrell 		if (pcstack != NULL) {
12791eaf3e1SJohn Birrell 			*pcstack++ = (uint64_t)pc;
12891eaf3e1SJohn Birrell 			pcstack_limit--;
12991eaf3e1SJohn Birrell 			if (pcstack_limit <= 0)
13091eaf3e1SJohn Birrell 				break;
13191eaf3e1SJohn Birrell 		}
13291eaf3e1SJohn Birrell 
133c6f5742fSRui Paulo 		if (sp == 0)
134c6f5742fSRui Paulo 			break;
13591eaf3e1SJohn Birrell 
136*09a15aa3SMark Johnston 		oldsp = sp;
137*09a15aa3SMark Johnston 
138c6f5742fSRui Paulo 		pc = dtrace_fuword64((void *)(sp +
139c6f5742fSRui Paulo 			offsetof(struct amd64_frame, f_retaddr)));
140c6f5742fSRui Paulo 		sp = dtrace_fuword64((void *)sp);
14191eaf3e1SJohn Birrell 
142*09a15aa3SMark Johnston 		if (sp == oldsp) {
143*09a15aa3SMark Johnston 			*flags |= CPU_DTRACE_BADSTACK;
144*09a15aa3SMark Johnston 			cpu_core[curcpu].cpuc_dtrace_illval = sp;
145*09a15aa3SMark Johnston 			break;
146*09a15aa3SMark Johnston 		}
147*09a15aa3SMark Johnston 
14891eaf3e1SJohn Birrell 		/*
14991eaf3e1SJohn Birrell 		 * This is totally bogus:  if we faulted, we're going to clear
15091eaf3e1SJohn Birrell 		 * the fault and break.  This is to deal with the apparently
15191eaf3e1SJohn Birrell 		 * broken Java stacks on x86.
15291eaf3e1SJohn Birrell 		 */
15391eaf3e1SJohn Birrell 		if (*flags & CPU_DTRACE_FAULT) {
15491eaf3e1SJohn Birrell 			*flags &= ~CPU_DTRACE_FAULT;
15591eaf3e1SJohn Birrell 			break;
15691eaf3e1SJohn Birrell 		}
15791eaf3e1SJohn Birrell 	}
15891eaf3e1SJohn Birrell 
15991eaf3e1SJohn Birrell 	return (ret);
16091eaf3e1SJohn Birrell }
16191eaf3e1SJohn Birrell 
16291eaf3e1SJohn Birrell void
16391eaf3e1SJohn Birrell dtrace_getupcstack(uint64_t *pcstack, int pcstack_limit)
16491eaf3e1SJohn Birrell {
16591eaf3e1SJohn Birrell 	proc_t *p = curproc;
16691eaf3e1SJohn Birrell 	struct trapframe *tf;
167c6f5742fSRui Paulo 	uintptr_t pc, sp, fp;
16891eaf3e1SJohn Birrell 	volatile uint16_t *flags =
16991eaf3e1SJohn Birrell 	    (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags;
17091eaf3e1SJohn Birrell 	int n;
17191eaf3e1SJohn Birrell 
17291eaf3e1SJohn Birrell 	if (*flags & CPU_DTRACE_FAULT)
17391eaf3e1SJohn Birrell 		return;
17491eaf3e1SJohn Birrell 
17591eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
17691eaf3e1SJohn Birrell 		return;
17791eaf3e1SJohn Birrell 
17891eaf3e1SJohn Birrell 	/*
17991eaf3e1SJohn Birrell 	 * If there's no user context we still need to zero the stack.
18091eaf3e1SJohn Birrell 	 */
18191eaf3e1SJohn Birrell 	if (p == NULL || (tf = curthread->td_frame) == NULL)
18291eaf3e1SJohn Birrell 		goto zero;
18391eaf3e1SJohn Birrell 
18491eaf3e1SJohn Birrell 	*pcstack++ = (uint64_t)p->p_pid;
18591eaf3e1SJohn Birrell 	pcstack_limit--;
18691eaf3e1SJohn Birrell 
18791eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
18891eaf3e1SJohn Birrell 		return;
18991eaf3e1SJohn Birrell 
19091eaf3e1SJohn Birrell 	pc = tf->tf_rip;
191c6f5742fSRui Paulo 	fp = tf->tf_rbp;
19291eaf3e1SJohn Birrell 	sp = tf->tf_rsp;
19391eaf3e1SJohn Birrell 
19491eaf3e1SJohn Birrell 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) {
195c6f5742fSRui Paulo 		/*
196c6f5742fSRui Paulo 		 * In an entry probe.  The frame pointer has not yet been
197c6f5742fSRui Paulo 		 * pushed (that happens in the function prologue).  The
198c6f5742fSRui Paulo 		 * best approach is to add the current pc as a missing top
199c6f5742fSRui Paulo 		 * of stack and back the pc up to the caller, which is stored
200c6f5742fSRui Paulo 		 * at the current stack pointer address since the call
201c6f5742fSRui Paulo 		 * instruction puts it there right before the branch.
202c6f5742fSRui Paulo 		 */
203c6f5742fSRui Paulo 
20491eaf3e1SJohn Birrell 		*pcstack++ = (uint64_t)pc;
20591eaf3e1SJohn Birrell 		pcstack_limit--;
20691eaf3e1SJohn Birrell 		if (pcstack_limit <= 0)
20791eaf3e1SJohn Birrell 			return;
20891eaf3e1SJohn Birrell 
209c6f5742fSRui Paulo 		pc = dtrace_fuword64((void *) sp);
21091eaf3e1SJohn Birrell 	}
21191eaf3e1SJohn Birrell 
212c6f5742fSRui Paulo 	n = dtrace_getustack_common(pcstack, pcstack_limit, pc, fp);
21391eaf3e1SJohn Birrell 	ASSERT(n >= 0);
21491eaf3e1SJohn Birrell 	ASSERT(n <= pcstack_limit);
21591eaf3e1SJohn Birrell 
21691eaf3e1SJohn Birrell 	pcstack += n;
21791eaf3e1SJohn Birrell 	pcstack_limit -= n;
21891eaf3e1SJohn Birrell 
21991eaf3e1SJohn Birrell zero:
22091eaf3e1SJohn Birrell 	while (pcstack_limit-- > 0)
22191eaf3e1SJohn Birrell 		*pcstack++ = 0;
22291eaf3e1SJohn Birrell }
22391eaf3e1SJohn Birrell 
22491eaf3e1SJohn Birrell int
22591eaf3e1SJohn Birrell dtrace_getustackdepth(void)
22691eaf3e1SJohn Birrell {
22791eaf3e1SJohn Birrell 	proc_t *p = curproc;
22891eaf3e1SJohn Birrell 	struct trapframe *tf;
229c6f5742fSRui Paulo 	uintptr_t pc, fp, sp;
23091eaf3e1SJohn Birrell 	int n = 0;
23191eaf3e1SJohn Birrell 
23291eaf3e1SJohn Birrell 	if (p == NULL || (tf = curthread->td_frame) == NULL)
23391eaf3e1SJohn Birrell 		return (0);
23491eaf3e1SJohn Birrell 
23591eaf3e1SJohn Birrell 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_FAULT))
23691eaf3e1SJohn Birrell 		return (-1);
23791eaf3e1SJohn Birrell 
23891eaf3e1SJohn Birrell 	pc = tf->tf_rip;
239c6f5742fSRui Paulo 	fp = tf->tf_rbp;
24091eaf3e1SJohn Birrell 	sp = tf->tf_rsp;
24191eaf3e1SJohn Birrell 
24291eaf3e1SJohn Birrell 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) {
243c6f5742fSRui Paulo 		/*
244c6f5742fSRui Paulo 		 * In an entry probe.  The frame pointer has not yet been
245c6f5742fSRui Paulo 		 * pushed (that happens in the function prologue).  The
246c6f5742fSRui Paulo 		 * best approach is to add the current pc as a missing top
247c6f5742fSRui Paulo 		 * of stack and back the pc up to the caller, which is stored
248c6f5742fSRui Paulo 		 * at the current stack pointer address since the call
249c6f5742fSRui Paulo 		 * instruction puts it there right before the branch.
250c6f5742fSRui Paulo 		 */
25191eaf3e1SJohn Birrell 
252c6f5742fSRui Paulo 		pc = dtrace_fuword64((void *) sp);
253c6f5742fSRui Paulo 		n++;
25491eaf3e1SJohn Birrell 	}
25591eaf3e1SJohn Birrell 
256c6f5742fSRui Paulo 	n += dtrace_getustack_common(NULL, 0, pc, fp);
25791eaf3e1SJohn Birrell 
25891eaf3e1SJohn Birrell 	return (n);
25991eaf3e1SJohn Birrell }
26091eaf3e1SJohn Birrell 
26191eaf3e1SJohn Birrell void
26291eaf3e1SJohn Birrell dtrace_getufpstack(uint64_t *pcstack, uint64_t *fpstack, int pcstack_limit)
26391eaf3e1SJohn Birrell {
26491eaf3e1SJohn Birrell 	proc_t *p = curproc;
265c6f5742fSRui Paulo 	struct trapframe *tf;
266c6f5742fSRui Paulo 	uintptr_t pc, sp, fp;
26791eaf3e1SJohn Birrell 	volatile uint16_t *flags =
26891eaf3e1SJohn Birrell 	    (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags;
269c6f5742fSRui Paulo #ifdef notyet	/* XXX signal stack */
270c6f5742fSRui Paulo 	uintptr_t oldcontext;
27191eaf3e1SJohn Birrell 	size_t s1, s2;
272c6f5742fSRui Paulo #endif
27391eaf3e1SJohn Birrell 
27491eaf3e1SJohn Birrell 	if (*flags & CPU_DTRACE_FAULT)
27591eaf3e1SJohn Birrell 		return;
27691eaf3e1SJohn Birrell 
27791eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
27891eaf3e1SJohn Birrell 		return;
27991eaf3e1SJohn Birrell 
28091eaf3e1SJohn Birrell 	/*
28191eaf3e1SJohn Birrell 	 * If there's no user context we still need to zero the stack.
28291eaf3e1SJohn Birrell 	 */
283c6f5742fSRui Paulo 	if (p == NULL || (tf = curthread->td_frame) == NULL)
28491eaf3e1SJohn Birrell 		goto zero;
28591eaf3e1SJohn Birrell 
28691eaf3e1SJohn Birrell 	*pcstack++ = (uint64_t)p->p_pid;
28791eaf3e1SJohn Birrell 	pcstack_limit--;
28891eaf3e1SJohn Birrell 
28991eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
29091eaf3e1SJohn Birrell 		return;
29191eaf3e1SJohn Birrell 
292c6f5742fSRui Paulo 	pc = tf->tf_rip;
293c6f5742fSRui Paulo 	sp = tf->tf_rsp;
294c6f5742fSRui Paulo 	fp = tf->tf_rbp;
29591eaf3e1SJohn Birrell 
296c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */
297c6f5742fSRui Paulo 	oldcontext = lwp->lwp_oldcontext;
29891eaf3e1SJohn Birrell 	s1 = sizeof (struct xframe) + 2 * sizeof (long);
29991eaf3e1SJohn Birrell 	s2 = s1 + sizeof (siginfo_t);
300c6f5742fSRui Paulo #endif
30191eaf3e1SJohn Birrell 
30291eaf3e1SJohn Birrell 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) {
30391eaf3e1SJohn Birrell 		*pcstack++ = (uint64_t)pc;
30491eaf3e1SJohn Birrell 		*fpstack++ = 0;
30591eaf3e1SJohn Birrell 		pcstack_limit--;
30691eaf3e1SJohn Birrell 		if (pcstack_limit <= 0)
30791eaf3e1SJohn Birrell 			return;
30891eaf3e1SJohn Birrell 
309c6f5742fSRui Paulo 		pc = dtrace_fuword64((void *)sp);
31091eaf3e1SJohn Birrell 	}
31191eaf3e1SJohn Birrell 
312c6f5742fSRui Paulo 	while (pc != 0) {
31391eaf3e1SJohn Birrell 		*pcstack++ = (uint64_t)pc;
314c6f5742fSRui Paulo 		*fpstack++ = fp;
31591eaf3e1SJohn Birrell 		pcstack_limit--;
31691eaf3e1SJohn Birrell 		if (pcstack_limit <= 0)
31791eaf3e1SJohn Birrell 			break;
31891eaf3e1SJohn Birrell 
319c6f5742fSRui Paulo 		if (fp == 0)
320c6f5742fSRui Paulo 			break;
321c6f5742fSRui Paulo 
322c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */
32391eaf3e1SJohn Birrell 		if (oldcontext == sp + s1 || oldcontext == sp + s2) {
32491eaf3e1SJohn Birrell 			ucontext_t *ucp = (ucontext_t *)oldcontext;
32591eaf3e1SJohn Birrell 			greg_t *gregs = ucp->uc_mcontext.gregs;
32691eaf3e1SJohn Birrell 
32791eaf3e1SJohn Birrell 			sp = dtrace_fulword(&gregs[REG_FP]);
32891eaf3e1SJohn Birrell 			pc = dtrace_fulword(&gregs[REG_PC]);
32991eaf3e1SJohn Birrell 
33091eaf3e1SJohn Birrell 			oldcontext = dtrace_fulword(&ucp->uc_link);
331c6f5742fSRui Paulo 		} else
332c6f5742fSRui Paulo #endif /* XXX */
333c6f5742fSRui Paulo 		{
334c6f5742fSRui Paulo 			pc = dtrace_fuword64((void *)(fp +
335c6f5742fSRui Paulo 				offsetof(struct amd64_frame, f_retaddr)));
336c6f5742fSRui Paulo 			fp = dtrace_fuword64((void *)fp);
33791eaf3e1SJohn Birrell 		}
33891eaf3e1SJohn Birrell 
33991eaf3e1SJohn Birrell 		/*
34091eaf3e1SJohn Birrell 		 * This is totally bogus:  if we faulted, we're going to clear
34191eaf3e1SJohn Birrell 		 * the fault and break.  This is to deal with the apparently
34291eaf3e1SJohn Birrell 		 * broken Java stacks on x86.
34391eaf3e1SJohn Birrell 		 */
34491eaf3e1SJohn Birrell 		if (*flags & CPU_DTRACE_FAULT) {
34591eaf3e1SJohn Birrell 			*flags &= ~CPU_DTRACE_FAULT;
34691eaf3e1SJohn Birrell 			break;
34791eaf3e1SJohn Birrell 		}
34891eaf3e1SJohn Birrell 	}
34991eaf3e1SJohn Birrell 
35091eaf3e1SJohn Birrell zero:
35191eaf3e1SJohn Birrell 	while (pcstack_limit-- > 0)
352c6f5742fSRui Paulo 		*pcstack++ = 0;
35391eaf3e1SJohn Birrell }
35491eaf3e1SJohn Birrell 
35591eaf3e1SJohn Birrell /*ARGSUSED*/
35691eaf3e1SJohn Birrell uint64_t
35791eaf3e1SJohn Birrell dtrace_getarg(int arg, int aframes)
35891eaf3e1SJohn Birrell {
35991eaf3e1SJohn Birrell 	uintptr_t val;
36091eaf3e1SJohn Birrell 	struct amd64_frame *fp = (struct amd64_frame *)dtrace_getfp();
36191eaf3e1SJohn Birrell 	uintptr_t *stack;
36291eaf3e1SJohn Birrell 	int i;
36391eaf3e1SJohn Birrell 
36491eaf3e1SJohn Birrell 	/*
36591eaf3e1SJohn Birrell 	 * A total of 6 arguments are passed via registers; any argument with
36691eaf3e1SJohn Birrell 	 * index of 5 or lower is therefore in a register.
36791eaf3e1SJohn Birrell 	 */
36891eaf3e1SJohn Birrell 	int inreg = 5;
36991eaf3e1SJohn Birrell 
37091eaf3e1SJohn Birrell 	for (i = 1; i <= aframes; i++) {
37191eaf3e1SJohn Birrell 		fp = fp->f_frame;
37291eaf3e1SJohn Birrell 
3738382ec9eSMark Johnston 		if (P2ROUNDUP(fp->f_retaddr, 16) ==
3748382ec9eSMark Johnston 		    (long)dtrace_invop_callsite) {
37591eaf3e1SJohn Birrell 			/*
37691eaf3e1SJohn Birrell 			 * In the case of amd64, we will use the pointer to the
37791eaf3e1SJohn Birrell 			 * regs structure that was pushed when we took the
37891eaf3e1SJohn Birrell 			 * trap.  To get this structure, we must increment
37991eaf3e1SJohn Birrell 			 * beyond the frame structure, and then again beyond
38091eaf3e1SJohn Birrell 			 * the calling RIP stored in dtrace_invop().  If the
38191eaf3e1SJohn Birrell 			 * argument that we're seeking is passed on the stack,
38291eaf3e1SJohn Birrell 			 * we'll pull the true stack pointer out of the saved
38391eaf3e1SJohn Birrell 			 * registers and decrement our argument by the number
38491eaf3e1SJohn Birrell 			 * of arguments passed in registers; if the argument
38591eaf3e1SJohn Birrell 			 * we're seeking is passed in regsiters, we can just
38691eaf3e1SJohn Birrell 			 * load it directly.
38791eaf3e1SJohn Birrell 			 */
3888382ec9eSMark Johnston 			struct trapframe *tf =
3898382ec9eSMark Johnston 			    (struct trapframe *)((uintptr_t)&fp[1]);
39091eaf3e1SJohn Birrell 
39191eaf3e1SJohn Birrell 			if (arg <= inreg) {
3927e75d586SMark Johnston 				switch (arg) {
3937e75d586SMark Johnston 				case 0:
3948382ec9eSMark Johnston 					stack = (uintptr_t *)&tf->tf_rdi;
3957e75d586SMark Johnston 					break;
3967e75d586SMark Johnston 				case 1:
3978382ec9eSMark Johnston 					stack = (uintptr_t *)&tf->tf_rsi;
3987e75d586SMark Johnston 					break;
3997e75d586SMark Johnston 				case 2:
4008382ec9eSMark Johnston 					stack = (uintptr_t *)&tf->tf_rdx;
4017e75d586SMark Johnston 					break;
4027e75d586SMark Johnston 				case 3:
4038382ec9eSMark Johnston 					stack = (uintptr_t *)&tf->tf_rcx;
4047e75d586SMark Johnston 					break;
4057e75d586SMark Johnston 				case 4:
4068382ec9eSMark Johnston 					stack = (uintptr_t *)&tf->tf_r8;
4077e75d586SMark Johnston 					break;
4087e75d586SMark Johnston 				case 5:
4098382ec9eSMark Johnston 					stack = (uintptr_t *)&tf->tf_r9;
4107e75d586SMark Johnston 					break;
4117e75d586SMark Johnston 				}
4127e75d586SMark Johnston 				arg = 0;
41391eaf3e1SJohn Birrell 			} else {
4148382ec9eSMark Johnston 				stack = (uintptr_t *)(tf->tf_rsp);
41591eaf3e1SJohn Birrell 				arg -= inreg;
41691eaf3e1SJohn Birrell 			}
41791eaf3e1SJohn Birrell 			goto load;
41891eaf3e1SJohn Birrell 		}
41991eaf3e1SJohn Birrell 
42091eaf3e1SJohn Birrell 	}
42191eaf3e1SJohn Birrell 
42291eaf3e1SJohn Birrell 	/*
42391eaf3e1SJohn Birrell 	 * We know that we did not come through a trap to get into
42491eaf3e1SJohn Birrell 	 * dtrace_probe() -- the provider simply called dtrace_probe()
42591eaf3e1SJohn Birrell 	 * directly.  As this is the case, we need to shift the argument
42691eaf3e1SJohn Birrell 	 * that we're looking for:  the probe ID is the first argument to
42791eaf3e1SJohn Birrell 	 * dtrace_probe(), so the argument n will actually be found where
42891eaf3e1SJohn Birrell 	 * one would expect to find argument (n + 1).
42991eaf3e1SJohn Birrell 	 */
43091eaf3e1SJohn Birrell 	arg++;
43191eaf3e1SJohn Birrell 
43291eaf3e1SJohn Birrell 	if (arg <= inreg) {
43391eaf3e1SJohn Birrell 		/*
43491eaf3e1SJohn Birrell 		 * This shouldn't happen.  If the argument is passed in a
43591eaf3e1SJohn Birrell 		 * register then it should have been, well, passed in a
43691eaf3e1SJohn Birrell 		 * register...
43791eaf3e1SJohn Birrell 		 */
43891eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
43991eaf3e1SJohn Birrell 		return (0);
44091eaf3e1SJohn Birrell 	}
44191eaf3e1SJohn Birrell 
44291eaf3e1SJohn Birrell 	arg -= (inreg + 1);
443f263e440SMark Johnston 	stack = (uintptr_t *)fp + 2;
44491eaf3e1SJohn Birrell 
44591eaf3e1SJohn Birrell load:
44691eaf3e1SJohn Birrell 	DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT);
44791eaf3e1SJohn Birrell 	val = stack[arg];
44891eaf3e1SJohn Birrell 	DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT);
44991eaf3e1SJohn Birrell 
45091eaf3e1SJohn Birrell 	return (val);
45191eaf3e1SJohn Birrell 	return (0);
45291eaf3e1SJohn Birrell }
45391eaf3e1SJohn Birrell 
45491eaf3e1SJohn Birrell int
45591eaf3e1SJohn Birrell dtrace_getstackdepth(int aframes)
45691eaf3e1SJohn Birrell {
45791eaf3e1SJohn Birrell 	int depth = 0;
45891eaf3e1SJohn Birrell 	struct amd64_frame *frame;
45991eaf3e1SJohn Birrell 	vm_offset_t rbp;
46091eaf3e1SJohn Birrell 
46191eaf3e1SJohn Birrell 	aframes++;
46291eaf3e1SJohn Birrell 	rbp = dtrace_getfp();
46391eaf3e1SJohn Birrell 	frame = (struct amd64_frame *)rbp;
46491eaf3e1SJohn Birrell 	depth++;
46591eaf3e1SJohn Birrell 	for(;;) {
46691eaf3e1SJohn Birrell 		if (!INKERNEL((long) frame))
46791eaf3e1SJohn Birrell 			break;
46891eaf3e1SJohn Birrell 		if (!INKERNEL((long) frame->f_frame))
46991eaf3e1SJohn Birrell 			break;
47091eaf3e1SJohn Birrell 		depth++;
47191eaf3e1SJohn Birrell 		if (frame->f_frame <= frame ||
47291eaf3e1SJohn Birrell 		    (vm_offset_t)frame->f_frame >=
47391eaf3e1SJohn Birrell 		    (vm_offset_t)rbp + KSTACK_PAGES * PAGE_SIZE)
47491eaf3e1SJohn Birrell 			break;
47591eaf3e1SJohn Birrell 		frame = frame->f_frame;
47691eaf3e1SJohn Birrell 	}
47791eaf3e1SJohn Birrell 	if (depth < aframes)
47891eaf3e1SJohn Birrell 		return 0;
47991eaf3e1SJohn Birrell 	else
48091eaf3e1SJohn Birrell 		return depth - aframes;
48191eaf3e1SJohn Birrell }
48291eaf3e1SJohn Birrell 
48391eaf3e1SJohn Birrell ulong_t
484c6f5742fSRui Paulo dtrace_getreg(struct trapframe *rp, uint_t reg)
48591eaf3e1SJohn Birrell {
486c6f5742fSRui Paulo 	/* This table is dependent on reg.d. */
48791eaf3e1SJohn Birrell 	int regmap[] = {
488c6f5742fSRui Paulo 		REG_GS,		/* 0  GS */
489c6f5742fSRui Paulo 		REG_FS,		/* 1  FS */
490c6f5742fSRui Paulo 		REG_ES,		/* 2  ES */
491c6f5742fSRui Paulo 		REG_DS,		/* 3  DS */
492c6f5742fSRui Paulo 		REG_RDI,	/* 4  EDI */
493c6f5742fSRui Paulo 		REG_RSI,	/* 5  ESI */
494c6f5742fSRui Paulo 		REG_RBP,	/* 6  EBP, REG_FP */
495c6f5742fSRui Paulo 		REG_RSP,	/* 7  ESP */
496c6f5742fSRui Paulo 		REG_RBX,	/* 8  EBX, REG_R1 */
497c6f5742fSRui Paulo 		REG_RDX,	/* 9  EDX */
498c6f5742fSRui Paulo 		REG_RCX,	/* 10 ECX */
499c6f5742fSRui Paulo 		REG_RAX,	/* 11 EAX, REG_R0 */
500c6f5742fSRui Paulo 		REG_TRAPNO,	/* 12 TRAPNO */
501c6f5742fSRui Paulo 		REG_ERR,	/* 13 ERR */
502c6f5742fSRui Paulo 		REG_RIP,	/* 14 EIP, REG_PC */
503c6f5742fSRui Paulo 		REG_CS,		/* 15 CS */
504c6f5742fSRui Paulo 		REG_RFL,	/* 16 EFL, REG_PS */
505c6f5742fSRui Paulo 		REG_RSP,	/* 17 UESP, REG_SP */
506c6f5742fSRui Paulo 		REG_SS		/* 18 SS */
50791eaf3e1SJohn Birrell 	};
50891eaf3e1SJohn Birrell 
50991eaf3e1SJohn Birrell 	if (reg <= SS) {
51091eaf3e1SJohn Birrell 		if (reg >= sizeof (regmap) / sizeof (int)) {
51191eaf3e1SJohn Birrell 			DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
51291eaf3e1SJohn Birrell 			return (0);
51391eaf3e1SJohn Birrell 		}
51491eaf3e1SJohn Birrell 
51591eaf3e1SJohn Birrell 		reg = regmap[reg];
51691eaf3e1SJohn Birrell 	} else {
517c6f5742fSRui Paulo 		/* This is dependent on reg.d. */
51891eaf3e1SJohn Birrell 		reg -= SS + 1;
51991eaf3e1SJohn Birrell 	}
52091eaf3e1SJohn Birrell 
52191eaf3e1SJohn Birrell 	switch (reg) {
52291eaf3e1SJohn Birrell 	case REG_RDI:
523c6f5742fSRui Paulo 		return (rp->tf_rdi);
52491eaf3e1SJohn Birrell 	case REG_RSI:
525c6f5742fSRui Paulo 		return (rp->tf_rsi);
52691eaf3e1SJohn Birrell 	case REG_RDX:
527c6f5742fSRui Paulo 		return (rp->tf_rdx);
52891eaf3e1SJohn Birrell 	case REG_RCX:
529c6f5742fSRui Paulo 		return (rp->tf_rcx);
53091eaf3e1SJohn Birrell 	case REG_R8:
531c6f5742fSRui Paulo 		return (rp->tf_r8);
53291eaf3e1SJohn Birrell 	case REG_R9:
533c6f5742fSRui Paulo 		return (rp->tf_r9);
53491eaf3e1SJohn Birrell 	case REG_RAX:
535c6f5742fSRui Paulo 		return (rp->tf_rax);
53691eaf3e1SJohn Birrell 	case REG_RBX:
537c6f5742fSRui Paulo 		return (rp->tf_rbx);
53891eaf3e1SJohn Birrell 	case REG_RBP:
539c6f5742fSRui Paulo 		return (rp->tf_rbp);
54091eaf3e1SJohn Birrell 	case REG_R10:
541c6f5742fSRui Paulo 		return (rp->tf_r10);
54291eaf3e1SJohn Birrell 	case REG_R11:
543c6f5742fSRui Paulo 		return (rp->tf_r11);
54491eaf3e1SJohn Birrell 	case REG_R12:
545c6f5742fSRui Paulo 		return (rp->tf_r12);
54691eaf3e1SJohn Birrell 	case REG_R13:
547c6f5742fSRui Paulo 		return (rp->tf_r13);
54891eaf3e1SJohn Birrell 	case REG_R14:
549c6f5742fSRui Paulo 		return (rp->tf_r14);
55091eaf3e1SJohn Birrell 	case REG_R15:
551c6f5742fSRui Paulo 		return (rp->tf_r15);
55291eaf3e1SJohn Birrell 	case REG_DS:
553c6f5742fSRui Paulo 		return (rp->tf_ds);
55491eaf3e1SJohn Birrell 	case REG_ES:
555c6f5742fSRui Paulo 		return (rp->tf_es);
55691eaf3e1SJohn Birrell 	case REG_FS:
557c6f5742fSRui Paulo 		return (rp->tf_fs);
55891eaf3e1SJohn Birrell 	case REG_GS:
559c6f5742fSRui Paulo 		return (rp->tf_gs);
56091eaf3e1SJohn Birrell 	case REG_TRAPNO:
561c6f5742fSRui Paulo 		return (rp->tf_trapno);
56291eaf3e1SJohn Birrell 	case REG_ERR:
563c6f5742fSRui Paulo 		return (rp->tf_err);
56491eaf3e1SJohn Birrell 	case REG_RIP:
565c6f5742fSRui Paulo 		return (rp->tf_rip);
56691eaf3e1SJohn Birrell 	case REG_CS:
567c6f5742fSRui Paulo 		return (rp->tf_cs);
56891eaf3e1SJohn Birrell 	case REG_SS:
569c6f5742fSRui Paulo 		return (rp->tf_ss);
57091eaf3e1SJohn Birrell 	case REG_RFL:
571c6f5742fSRui Paulo 		return (rp->tf_rflags);
57291eaf3e1SJohn Birrell 	case REG_RSP:
573c6f5742fSRui Paulo 		return (rp->tf_rsp);
57491eaf3e1SJohn Birrell 	default:
57591eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
57691eaf3e1SJohn Birrell 		return (0);
57791eaf3e1SJohn Birrell 	}
57891eaf3e1SJohn Birrell }
57991eaf3e1SJohn Birrell 
58091eaf3e1SJohn Birrell static int
58191eaf3e1SJohn Birrell dtrace_copycheck(uintptr_t uaddr, uintptr_t kaddr, size_t size)
58291eaf3e1SJohn Birrell {
583f340e9feSAndriy Gapon 	ASSERT(INKERNEL(kaddr) && kaddr + size >= kaddr);
58491eaf3e1SJohn Birrell 
585f340e9feSAndriy Gapon 	if (uaddr + size > VM_MAXUSER_ADDRESS || uaddr + size < uaddr) {
58691eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
58791eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = uaddr;
58891eaf3e1SJohn Birrell 		return (0);
58991eaf3e1SJohn Birrell 	}
59091eaf3e1SJohn Birrell 
59191eaf3e1SJohn Birrell 	return (1);
59291eaf3e1SJohn Birrell }
59391eaf3e1SJohn Birrell 
59491eaf3e1SJohn Birrell void
59591eaf3e1SJohn Birrell dtrace_copyin(uintptr_t uaddr, uintptr_t kaddr, size_t size,
59691eaf3e1SJohn Birrell     volatile uint16_t *flags)
59791eaf3e1SJohn Birrell {
59891eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
59991eaf3e1SJohn Birrell 		dtrace_copy(uaddr, kaddr, size);
60091eaf3e1SJohn Birrell }
60191eaf3e1SJohn Birrell 
60291eaf3e1SJohn Birrell void
60391eaf3e1SJohn Birrell dtrace_copyout(uintptr_t kaddr, uintptr_t uaddr, size_t size,
60491eaf3e1SJohn Birrell     volatile uint16_t *flags)
60591eaf3e1SJohn Birrell {
60691eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
60791eaf3e1SJohn Birrell 		dtrace_copy(kaddr, uaddr, size);
60891eaf3e1SJohn Birrell }
60991eaf3e1SJohn Birrell 
61091eaf3e1SJohn Birrell void
61191eaf3e1SJohn Birrell dtrace_copyinstr(uintptr_t uaddr, uintptr_t kaddr, size_t size,
61291eaf3e1SJohn Birrell     volatile uint16_t *flags)
61391eaf3e1SJohn Birrell {
61491eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
61591eaf3e1SJohn Birrell 		dtrace_copystr(uaddr, kaddr, size, flags);
61691eaf3e1SJohn Birrell }
61791eaf3e1SJohn Birrell 
61891eaf3e1SJohn Birrell void
61991eaf3e1SJohn Birrell dtrace_copyoutstr(uintptr_t kaddr, uintptr_t uaddr, size_t size,
62091eaf3e1SJohn Birrell     volatile uint16_t *flags)
62191eaf3e1SJohn Birrell {
62291eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
62391eaf3e1SJohn Birrell 		dtrace_copystr(kaddr, uaddr, size, flags);
62491eaf3e1SJohn Birrell }
62591eaf3e1SJohn Birrell 
62691eaf3e1SJohn Birrell uint8_t
62791eaf3e1SJohn Birrell dtrace_fuword8(void *uaddr)
62891eaf3e1SJohn Birrell {
629f340e9feSAndriy Gapon 	if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) {
63091eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
63191eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
63291eaf3e1SJohn Birrell 		return (0);
63391eaf3e1SJohn Birrell 	}
63491eaf3e1SJohn Birrell 	return (dtrace_fuword8_nocheck(uaddr));
63591eaf3e1SJohn Birrell }
63691eaf3e1SJohn Birrell 
63791eaf3e1SJohn Birrell uint16_t
63891eaf3e1SJohn Birrell dtrace_fuword16(void *uaddr)
63991eaf3e1SJohn Birrell {
640f340e9feSAndriy Gapon 	if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) {
64191eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
64291eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
64391eaf3e1SJohn Birrell 		return (0);
64491eaf3e1SJohn Birrell 	}
64591eaf3e1SJohn Birrell 	return (dtrace_fuword16_nocheck(uaddr));
64691eaf3e1SJohn Birrell }
64791eaf3e1SJohn Birrell 
64891eaf3e1SJohn Birrell uint32_t
64991eaf3e1SJohn Birrell dtrace_fuword32(void *uaddr)
65091eaf3e1SJohn Birrell {
651f340e9feSAndriy Gapon 	if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) {
65291eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
65391eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
65491eaf3e1SJohn Birrell 		return (0);
65591eaf3e1SJohn Birrell 	}
65691eaf3e1SJohn Birrell 	return (dtrace_fuword32_nocheck(uaddr));
65791eaf3e1SJohn Birrell }
65891eaf3e1SJohn Birrell 
65991eaf3e1SJohn Birrell uint64_t
66091eaf3e1SJohn Birrell dtrace_fuword64(void *uaddr)
66191eaf3e1SJohn Birrell {
662f340e9feSAndriy Gapon 	if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) {
66391eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
66491eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
66591eaf3e1SJohn Birrell 		return (0);
66691eaf3e1SJohn Birrell 	}
66791eaf3e1SJohn Birrell 	return (dtrace_fuword64_nocheck(uaddr));
66891eaf3e1SJohn Birrell }
669