191eaf3e1SJohn Birrell /* 291eaf3e1SJohn Birrell * CDDL HEADER START 391eaf3e1SJohn Birrell * 491eaf3e1SJohn Birrell * The contents of this file are subject to the terms of the 591eaf3e1SJohn Birrell * Common Development and Distribution License, Version 1.0 only 691eaf3e1SJohn Birrell * (the "License"). You may not use this file except in compliance 791eaf3e1SJohn Birrell * with the License. 891eaf3e1SJohn Birrell * 991eaf3e1SJohn Birrell * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 1091eaf3e1SJohn Birrell * or http://www.opensolaris.org/os/licensing. 1191eaf3e1SJohn Birrell * See the License for the specific language governing permissions 1291eaf3e1SJohn Birrell * and limitations under the License. 1391eaf3e1SJohn Birrell * 1491eaf3e1SJohn Birrell * When distributing Covered Code, include this CDDL HEADER in each 1591eaf3e1SJohn Birrell * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 1691eaf3e1SJohn Birrell * If applicable, add the following below this CDDL HEADER, with the 1791eaf3e1SJohn Birrell * fields enclosed by brackets "[]" replaced with your own identifying 1891eaf3e1SJohn Birrell * information: Portions Copyright [yyyy] [name of copyright owner] 1991eaf3e1SJohn Birrell * 2091eaf3e1SJohn Birrell * CDDL HEADER END 2191eaf3e1SJohn Birrell * 2291eaf3e1SJohn Birrell * $FreeBSD$ 2391eaf3e1SJohn Birrell */ 2491eaf3e1SJohn Birrell /* 2591eaf3e1SJohn Birrell * Copyright 2005 Sun Microsystems, Inc. All rights reserved. 2691eaf3e1SJohn Birrell * Use is subject to license terms. 2791eaf3e1SJohn Birrell */ 2891eaf3e1SJohn Birrell #include <sys/cdefs.h> 2991eaf3e1SJohn Birrell 3091eaf3e1SJohn Birrell #include <sys/param.h> 3191eaf3e1SJohn Birrell #include <sys/systm.h> 3291eaf3e1SJohn Birrell #include <sys/kernel.h> 3391eaf3e1SJohn Birrell #include <sys/stack.h> 3491eaf3e1SJohn Birrell #include <sys/pcpu.h> 3591eaf3e1SJohn Birrell 3691eaf3e1SJohn Birrell #include <machine/frame.h> 3791eaf3e1SJohn Birrell #include <machine/md_var.h> 3891eaf3e1SJohn Birrell #include <machine/reg.h> 3991eaf3e1SJohn Birrell #include <machine/stack.h> 4091eaf3e1SJohn Birrell 4191eaf3e1SJohn Birrell #include <vm/vm.h> 4291eaf3e1SJohn Birrell #include <vm/vm_param.h> 4391eaf3e1SJohn Birrell #include <vm/pmap.h> 4491eaf3e1SJohn Birrell 45c6f5742fSRui Paulo #include "regset.h" 4691eaf3e1SJohn Birrell 4791eaf3e1SJohn Birrell uint8_t dtrace_fuword8_nocheck(void *); 4891eaf3e1SJohn Birrell uint16_t dtrace_fuword16_nocheck(void *); 4991eaf3e1SJohn Birrell uint32_t dtrace_fuword32_nocheck(void *); 5091eaf3e1SJohn Birrell uint64_t dtrace_fuword64_nocheck(void *); 5191eaf3e1SJohn Birrell 52*09a15aa3SMark Johnston int dtrace_ustackdepth_max = 2048; 53*09a15aa3SMark Johnston 5491eaf3e1SJohn Birrell void 5591eaf3e1SJohn Birrell dtrace_getpcstack(pc_t *pcstack, int pcstack_limit, int aframes, 5691eaf3e1SJohn Birrell uint32_t *intrpc) 5791eaf3e1SJohn Birrell { 5891eaf3e1SJohn Birrell int depth = 0; 5991eaf3e1SJohn Birrell register_t rbp; 6091eaf3e1SJohn Birrell struct amd64_frame *frame; 6191eaf3e1SJohn Birrell vm_offset_t callpc; 6291eaf3e1SJohn Birrell pc_t caller = (pc_t) solaris_cpu[curcpu].cpu_dtrace_caller; 6391eaf3e1SJohn Birrell 6491eaf3e1SJohn Birrell if (intrpc != 0) 6591eaf3e1SJohn Birrell pcstack[depth++] = (pc_t) intrpc; 6691eaf3e1SJohn Birrell 6791eaf3e1SJohn Birrell aframes++; 6891eaf3e1SJohn Birrell 6991eaf3e1SJohn Birrell __asm __volatile("movq %%rbp,%0" : "=r" (rbp)); 7091eaf3e1SJohn Birrell 7191eaf3e1SJohn Birrell frame = (struct amd64_frame *)rbp; 7291eaf3e1SJohn Birrell while (depth < pcstack_limit) { 7391eaf3e1SJohn Birrell if (!INKERNEL((long) frame)) 7491eaf3e1SJohn Birrell break; 7591eaf3e1SJohn Birrell 7691eaf3e1SJohn Birrell callpc = frame->f_retaddr; 7791eaf3e1SJohn Birrell 7891eaf3e1SJohn Birrell if (!INKERNEL(callpc)) 7991eaf3e1SJohn Birrell break; 8091eaf3e1SJohn Birrell 8191eaf3e1SJohn Birrell if (aframes > 0) { 8291eaf3e1SJohn Birrell aframes--; 8391eaf3e1SJohn Birrell if ((aframes == 0) && (caller != 0)) { 8491eaf3e1SJohn Birrell pcstack[depth++] = caller; 8591eaf3e1SJohn Birrell } 8691eaf3e1SJohn Birrell } 8791eaf3e1SJohn Birrell else { 8891eaf3e1SJohn Birrell pcstack[depth++] = callpc; 8991eaf3e1SJohn Birrell } 9091eaf3e1SJohn Birrell 9191eaf3e1SJohn Birrell if (frame->f_frame <= frame || 9291eaf3e1SJohn Birrell (vm_offset_t)frame->f_frame >= 9391eaf3e1SJohn Birrell (vm_offset_t)rbp + KSTACK_PAGES * PAGE_SIZE) 9491eaf3e1SJohn Birrell break; 9591eaf3e1SJohn Birrell frame = frame->f_frame; 9691eaf3e1SJohn Birrell } 9791eaf3e1SJohn Birrell 9891eaf3e1SJohn Birrell for (; depth < pcstack_limit; depth++) { 9991eaf3e1SJohn Birrell pcstack[depth] = 0; 10091eaf3e1SJohn Birrell } 10191eaf3e1SJohn Birrell } 10291eaf3e1SJohn Birrell 10391eaf3e1SJohn Birrell static int 10491eaf3e1SJohn Birrell dtrace_getustack_common(uint64_t *pcstack, int pcstack_limit, uintptr_t pc, 10591eaf3e1SJohn Birrell uintptr_t sp) 10691eaf3e1SJohn Birrell { 107*09a15aa3SMark Johnston uintptr_t oldsp; 10891eaf3e1SJohn Birrell volatile uint16_t *flags = 10991eaf3e1SJohn Birrell (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags; 11091eaf3e1SJohn Birrell int ret = 0; 11191eaf3e1SJohn Birrell 11291eaf3e1SJohn Birrell ASSERT(pcstack == NULL || pcstack_limit > 0); 113*09a15aa3SMark Johnston ASSERT(dtrace_ustackdepth_max > 0); 11491eaf3e1SJohn Birrell 115c6f5742fSRui Paulo while (pc != 0) { 116*09a15aa3SMark Johnston /* 117*09a15aa3SMark Johnston * We limit the number of times we can go around this 118*09a15aa3SMark Johnston * loop to account for a circular stack. 119*09a15aa3SMark Johnston */ 120*09a15aa3SMark Johnston if (ret++ >= dtrace_ustackdepth_max) { 121*09a15aa3SMark Johnston *flags |= CPU_DTRACE_BADSTACK; 122*09a15aa3SMark Johnston cpu_core[curcpu].cpuc_dtrace_illval = sp; 123*09a15aa3SMark Johnston break; 124*09a15aa3SMark Johnston } 125*09a15aa3SMark Johnston 12691eaf3e1SJohn Birrell if (pcstack != NULL) { 12791eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 12891eaf3e1SJohn Birrell pcstack_limit--; 12991eaf3e1SJohn Birrell if (pcstack_limit <= 0) 13091eaf3e1SJohn Birrell break; 13191eaf3e1SJohn Birrell } 13291eaf3e1SJohn Birrell 133c6f5742fSRui Paulo if (sp == 0) 134c6f5742fSRui Paulo break; 13591eaf3e1SJohn Birrell 136*09a15aa3SMark Johnston oldsp = sp; 137*09a15aa3SMark Johnston 138c6f5742fSRui Paulo pc = dtrace_fuword64((void *)(sp + 139c6f5742fSRui Paulo offsetof(struct amd64_frame, f_retaddr))); 140c6f5742fSRui Paulo sp = dtrace_fuword64((void *)sp); 14191eaf3e1SJohn Birrell 142*09a15aa3SMark Johnston if (sp == oldsp) { 143*09a15aa3SMark Johnston *flags |= CPU_DTRACE_BADSTACK; 144*09a15aa3SMark Johnston cpu_core[curcpu].cpuc_dtrace_illval = sp; 145*09a15aa3SMark Johnston break; 146*09a15aa3SMark Johnston } 147*09a15aa3SMark Johnston 14891eaf3e1SJohn Birrell /* 14991eaf3e1SJohn Birrell * This is totally bogus: if we faulted, we're going to clear 15091eaf3e1SJohn Birrell * the fault and break. This is to deal with the apparently 15191eaf3e1SJohn Birrell * broken Java stacks on x86. 15291eaf3e1SJohn Birrell */ 15391eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) { 15491eaf3e1SJohn Birrell *flags &= ~CPU_DTRACE_FAULT; 15591eaf3e1SJohn Birrell break; 15691eaf3e1SJohn Birrell } 15791eaf3e1SJohn Birrell } 15891eaf3e1SJohn Birrell 15991eaf3e1SJohn Birrell return (ret); 16091eaf3e1SJohn Birrell } 16191eaf3e1SJohn Birrell 16291eaf3e1SJohn Birrell void 16391eaf3e1SJohn Birrell dtrace_getupcstack(uint64_t *pcstack, int pcstack_limit) 16491eaf3e1SJohn Birrell { 16591eaf3e1SJohn Birrell proc_t *p = curproc; 16691eaf3e1SJohn Birrell struct trapframe *tf; 167c6f5742fSRui Paulo uintptr_t pc, sp, fp; 16891eaf3e1SJohn Birrell volatile uint16_t *flags = 16991eaf3e1SJohn Birrell (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags; 17091eaf3e1SJohn Birrell int n; 17191eaf3e1SJohn Birrell 17291eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) 17391eaf3e1SJohn Birrell return; 17491eaf3e1SJohn Birrell 17591eaf3e1SJohn Birrell if (pcstack_limit <= 0) 17691eaf3e1SJohn Birrell return; 17791eaf3e1SJohn Birrell 17891eaf3e1SJohn Birrell /* 17991eaf3e1SJohn Birrell * If there's no user context we still need to zero the stack. 18091eaf3e1SJohn Birrell */ 18191eaf3e1SJohn Birrell if (p == NULL || (tf = curthread->td_frame) == NULL) 18291eaf3e1SJohn Birrell goto zero; 18391eaf3e1SJohn Birrell 18491eaf3e1SJohn Birrell *pcstack++ = (uint64_t)p->p_pid; 18591eaf3e1SJohn Birrell pcstack_limit--; 18691eaf3e1SJohn Birrell 18791eaf3e1SJohn Birrell if (pcstack_limit <= 0) 18891eaf3e1SJohn Birrell return; 18991eaf3e1SJohn Birrell 19091eaf3e1SJohn Birrell pc = tf->tf_rip; 191c6f5742fSRui Paulo fp = tf->tf_rbp; 19291eaf3e1SJohn Birrell sp = tf->tf_rsp; 19391eaf3e1SJohn Birrell 19491eaf3e1SJohn Birrell if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) { 195c6f5742fSRui Paulo /* 196c6f5742fSRui Paulo * In an entry probe. The frame pointer has not yet been 197c6f5742fSRui Paulo * pushed (that happens in the function prologue). The 198c6f5742fSRui Paulo * best approach is to add the current pc as a missing top 199c6f5742fSRui Paulo * of stack and back the pc up to the caller, which is stored 200c6f5742fSRui Paulo * at the current stack pointer address since the call 201c6f5742fSRui Paulo * instruction puts it there right before the branch. 202c6f5742fSRui Paulo */ 203c6f5742fSRui Paulo 20491eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 20591eaf3e1SJohn Birrell pcstack_limit--; 20691eaf3e1SJohn Birrell if (pcstack_limit <= 0) 20791eaf3e1SJohn Birrell return; 20891eaf3e1SJohn Birrell 209c6f5742fSRui Paulo pc = dtrace_fuword64((void *) sp); 21091eaf3e1SJohn Birrell } 21191eaf3e1SJohn Birrell 212c6f5742fSRui Paulo n = dtrace_getustack_common(pcstack, pcstack_limit, pc, fp); 21391eaf3e1SJohn Birrell ASSERT(n >= 0); 21491eaf3e1SJohn Birrell ASSERT(n <= pcstack_limit); 21591eaf3e1SJohn Birrell 21691eaf3e1SJohn Birrell pcstack += n; 21791eaf3e1SJohn Birrell pcstack_limit -= n; 21891eaf3e1SJohn Birrell 21991eaf3e1SJohn Birrell zero: 22091eaf3e1SJohn Birrell while (pcstack_limit-- > 0) 22191eaf3e1SJohn Birrell *pcstack++ = 0; 22291eaf3e1SJohn Birrell } 22391eaf3e1SJohn Birrell 22491eaf3e1SJohn Birrell int 22591eaf3e1SJohn Birrell dtrace_getustackdepth(void) 22691eaf3e1SJohn Birrell { 22791eaf3e1SJohn Birrell proc_t *p = curproc; 22891eaf3e1SJohn Birrell struct trapframe *tf; 229c6f5742fSRui Paulo uintptr_t pc, fp, sp; 23091eaf3e1SJohn Birrell int n = 0; 23191eaf3e1SJohn Birrell 23291eaf3e1SJohn Birrell if (p == NULL || (tf = curthread->td_frame) == NULL) 23391eaf3e1SJohn Birrell return (0); 23491eaf3e1SJohn Birrell 23591eaf3e1SJohn Birrell if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_FAULT)) 23691eaf3e1SJohn Birrell return (-1); 23791eaf3e1SJohn Birrell 23891eaf3e1SJohn Birrell pc = tf->tf_rip; 239c6f5742fSRui Paulo fp = tf->tf_rbp; 24091eaf3e1SJohn Birrell sp = tf->tf_rsp; 24191eaf3e1SJohn Birrell 24291eaf3e1SJohn Birrell if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) { 243c6f5742fSRui Paulo /* 244c6f5742fSRui Paulo * In an entry probe. The frame pointer has not yet been 245c6f5742fSRui Paulo * pushed (that happens in the function prologue). The 246c6f5742fSRui Paulo * best approach is to add the current pc as a missing top 247c6f5742fSRui Paulo * of stack and back the pc up to the caller, which is stored 248c6f5742fSRui Paulo * at the current stack pointer address since the call 249c6f5742fSRui Paulo * instruction puts it there right before the branch. 250c6f5742fSRui Paulo */ 25191eaf3e1SJohn Birrell 252c6f5742fSRui Paulo pc = dtrace_fuword64((void *) sp); 253c6f5742fSRui Paulo n++; 25491eaf3e1SJohn Birrell } 25591eaf3e1SJohn Birrell 256c6f5742fSRui Paulo n += dtrace_getustack_common(NULL, 0, pc, fp); 25791eaf3e1SJohn Birrell 25891eaf3e1SJohn Birrell return (n); 25991eaf3e1SJohn Birrell } 26091eaf3e1SJohn Birrell 26191eaf3e1SJohn Birrell void 26291eaf3e1SJohn Birrell dtrace_getufpstack(uint64_t *pcstack, uint64_t *fpstack, int pcstack_limit) 26391eaf3e1SJohn Birrell { 26491eaf3e1SJohn Birrell proc_t *p = curproc; 265c6f5742fSRui Paulo struct trapframe *tf; 266c6f5742fSRui Paulo uintptr_t pc, sp, fp; 26791eaf3e1SJohn Birrell volatile uint16_t *flags = 26891eaf3e1SJohn Birrell (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags; 269c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */ 270c6f5742fSRui Paulo uintptr_t oldcontext; 27191eaf3e1SJohn Birrell size_t s1, s2; 272c6f5742fSRui Paulo #endif 27391eaf3e1SJohn Birrell 27491eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) 27591eaf3e1SJohn Birrell return; 27691eaf3e1SJohn Birrell 27791eaf3e1SJohn Birrell if (pcstack_limit <= 0) 27891eaf3e1SJohn Birrell return; 27991eaf3e1SJohn Birrell 28091eaf3e1SJohn Birrell /* 28191eaf3e1SJohn Birrell * If there's no user context we still need to zero the stack. 28291eaf3e1SJohn Birrell */ 283c6f5742fSRui Paulo if (p == NULL || (tf = curthread->td_frame) == NULL) 28491eaf3e1SJohn Birrell goto zero; 28591eaf3e1SJohn Birrell 28691eaf3e1SJohn Birrell *pcstack++ = (uint64_t)p->p_pid; 28791eaf3e1SJohn Birrell pcstack_limit--; 28891eaf3e1SJohn Birrell 28991eaf3e1SJohn Birrell if (pcstack_limit <= 0) 29091eaf3e1SJohn Birrell return; 29191eaf3e1SJohn Birrell 292c6f5742fSRui Paulo pc = tf->tf_rip; 293c6f5742fSRui Paulo sp = tf->tf_rsp; 294c6f5742fSRui Paulo fp = tf->tf_rbp; 29591eaf3e1SJohn Birrell 296c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */ 297c6f5742fSRui Paulo oldcontext = lwp->lwp_oldcontext; 29891eaf3e1SJohn Birrell s1 = sizeof (struct xframe) + 2 * sizeof (long); 29991eaf3e1SJohn Birrell s2 = s1 + sizeof (siginfo_t); 300c6f5742fSRui Paulo #endif 30191eaf3e1SJohn Birrell 30291eaf3e1SJohn Birrell if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) { 30391eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 30491eaf3e1SJohn Birrell *fpstack++ = 0; 30591eaf3e1SJohn Birrell pcstack_limit--; 30691eaf3e1SJohn Birrell if (pcstack_limit <= 0) 30791eaf3e1SJohn Birrell return; 30891eaf3e1SJohn Birrell 309c6f5742fSRui Paulo pc = dtrace_fuword64((void *)sp); 31091eaf3e1SJohn Birrell } 31191eaf3e1SJohn Birrell 312c6f5742fSRui Paulo while (pc != 0) { 31391eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 314c6f5742fSRui Paulo *fpstack++ = fp; 31591eaf3e1SJohn Birrell pcstack_limit--; 31691eaf3e1SJohn Birrell if (pcstack_limit <= 0) 31791eaf3e1SJohn Birrell break; 31891eaf3e1SJohn Birrell 319c6f5742fSRui Paulo if (fp == 0) 320c6f5742fSRui Paulo break; 321c6f5742fSRui Paulo 322c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */ 32391eaf3e1SJohn Birrell if (oldcontext == sp + s1 || oldcontext == sp + s2) { 32491eaf3e1SJohn Birrell ucontext_t *ucp = (ucontext_t *)oldcontext; 32591eaf3e1SJohn Birrell greg_t *gregs = ucp->uc_mcontext.gregs; 32691eaf3e1SJohn Birrell 32791eaf3e1SJohn Birrell sp = dtrace_fulword(&gregs[REG_FP]); 32891eaf3e1SJohn Birrell pc = dtrace_fulword(&gregs[REG_PC]); 32991eaf3e1SJohn Birrell 33091eaf3e1SJohn Birrell oldcontext = dtrace_fulword(&ucp->uc_link); 331c6f5742fSRui Paulo } else 332c6f5742fSRui Paulo #endif /* XXX */ 333c6f5742fSRui Paulo { 334c6f5742fSRui Paulo pc = dtrace_fuword64((void *)(fp + 335c6f5742fSRui Paulo offsetof(struct amd64_frame, f_retaddr))); 336c6f5742fSRui Paulo fp = dtrace_fuword64((void *)fp); 33791eaf3e1SJohn Birrell } 33891eaf3e1SJohn Birrell 33991eaf3e1SJohn Birrell /* 34091eaf3e1SJohn Birrell * This is totally bogus: if we faulted, we're going to clear 34191eaf3e1SJohn Birrell * the fault and break. This is to deal with the apparently 34291eaf3e1SJohn Birrell * broken Java stacks on x86. 34391eaf3e1SJohn Birrell */ 34491eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) { 34591eaf3e1SJohn Birrell *flags &= ~CPU_DTRACE_FAULT; 34691eaf3e1SJohn Birrell break; 34791eaf3e1SJohn Birrell } 34891eaf3e1SJohn Birrell } 34991eaf3e1SJohn Birrell 35091eaf3e1SJohn Birrell zero: 35191eaf3e1SJohn Birrell while (pcstack_limit-- > 0) 352c6f5742fSRui Paulo *pcstack++ = 0; 35391eaf3e1SJohn Birrell } 35491eaf3e1SJohn Birrell 35591eaf3e1SJohn Birrell /*ARGSUSED*/ 35691eaf3e1SJohn Birrell uint64_t 35791eaf3e1SJohn Birrell dtrace_getarg(int arg, int aframes) 35891eaf3e1SJohn Birrell { 35991eaf3e1SJohn Birrell uintptr_t val; 36091eaf3e1SJohn Birrell struct amd64_frame *fp = (struct amd64_frame *)dtrace_getfp(); 36191eaf3e1SJohn Birrell uintptr_t *stack; 36291eaf3e1SJohn Birrell int i; 36391eaf3e1SJohn Birrell 36491eaf3e1SJohn Birrell /* 36591eaf3e1SJohn Birrell * A total of 6 arguments are passed via registers; any argument with 36691eaf3e1SJohn Birrell * index of 5 or lower is therefore in a register. 36791eaf3e1SJohn Birrell */ 36891eaf3e1SJohn Birrell int inreg = 5; 36991eaf3e1SJohn Birrell 37091eaf3e1SJohn Birrell for (i = 1; i <= aframes; i++) { 37191eaf3e1SJohn Birrell fp = fp->f_frame; 37291eaf3e1SJohn Birrell 3738382ec9eSMark Johnston if (P2ROUNDUP(fp->f_retaddr, 16) == 3748382ec9eSMark Johnston (long)dtrace_invop_callsite) { 37591eaf3e1SJohn Birrell /* 37691eaf3e1SJohn Birrell * In the case of amd64, we will use the pointer to the 37791eaf3e1SJohn Birrell * regs structure that was pushed when we took the 37891eaf3e1SJohn Birrell * trap. To get this structure, we must increment 37991eaf3e1SJohn Birrell * beyond the frame structure, and then again beyond 38091eaf3e1SJohn Birrell * the calling RIP stored in dtrace_invop(). If the 38191eaf3e1SJohn Birrell * argument that we're seeking is passed on the stack, 38291eaf3e1SJohn Birrell * we'll pull the true stack pointer out of the saved 38391eaf3e1SJohn Birrell * registers and decrement our argument by the number 38491eaf3e1SJohn Birrell * of arguments passed in registers; if the argument 38591eaf3e1SJohn Birrell * we're seeking is passed in regsiters, we can just 38691eaf3e1SJohn Birrell * load it directly. 38791eaf3e1SJohn Birrell */ 3888382ec9eSMark Johnston struct trapframe *tf = 3898382ec9eSMark Johnston (struct trapframe *)((uintptr_t)&fp[1]); 39091eaf3e1SJohn Birrell 39191eaf3e1SJohn Birrell if (arg <= inreg) { 3927e75d586SMark Johnston switch (arg) { 3937e75d586SMark Johnston case 0: 3948382ec9eSMark Johnston stack = (uintptr_t *)&tf->tf_rdi; 3957e75d586SMark Johnston break; 3967e75d586SMark Johnston case 1: 3978382ec9eSMark Johnston stack = (uintptr_t *)&tf->tf_rsi; 3987e75d586SMark Johnston break; 3997e75d586SMark Johnston case 2: 4008382ec9eSMark Johnston stack = (uintptr_t *)&tf->tf_rdx; 4017e75d586SMark Johnston break; 4027e75d586SMark Johnston case 3: 4038382ec9eSMark Johnston stack = (uintptr_t *)&tf->tf_rcx; 4047e75d586SMark Johnston break; 4057e75d586SMark Johnston case 4: 4068382ec9eSMark Johnston stack = (uintptr_t *)&tf->tf_r8; 4077e75d586SMark Johnston break; 4087e75d586SMark Johnston case 5: 4098382ec9eSMark Johnston stack = (uintptr_t *)&tf->tf_r9; 4107e75d586SMark Johnston break; 4117e75d586SMark Johnston } 4127e75d586SMark Johnston arg = 0; 41391eaf3e1SJohn Birrell } else { 4148382ec9eSMark Johnston stack = (uintptr_t *)(tf->tf_rsp); 41591eaf3e1SJohn Birrell arg -= inreg; 41691eaf3e1SJohn Birrell } 41791eaf3e1SJohn Birrell goto load; 41891eaf3e1SJohn Birrell } 41991eaf3e1SJohn Birrell 42091eaf3e1SJohn Birrell } 42191eaf3e1SJohn Birrell 42291eaf3e1SJohn Birrell /* 42391eaf3e1SJohn Birrell * We know that we did not come through a trap to get into 42491eaf3e1SJohn Birrell * dtrace_probe() -- the provider simply called dtrace_probe() 42591eaf3e1SJohn Birrell * directly. As this is the case, we need to shift the argument 42691eaf3e1SJohn Birrell * that we're looking for: the probe ID is the first argument to 42791eaf3e1SJohn Birrell * dtrace_probe(), so the argument n will actually be found where 42891eaf3e1SJohn Birrell * one would expect to find argument (n + 1). 42991eaf3e1SJohn Birrell */ 43091eaf3e1SJohn Birrell arg++; 43191eaf3e1SJohn Birrell 43291eaf3e1SJohn Birrell if (arg <= inreg) { 43391eaf3e1SJohn Birrell /* 43491eaf3e1SJohn Birrell * This shouldn't happen. If the argument is passed in a 43591eaf3e1SJohn Birrell * register then it should have been, well, passed in a 43691eaf3e1SJohn Birrell * register... 43791eaf3e1SJohn Birrell */ 43891eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP); 43991eaf3e1SJohn Birrell return (0); 44091eaf3e1SJohn Birrell } 44191eaf3e1SJohn Birrell 44291eaf3e1SJohn Birrell arg -= (inreg + 1); 443f263e440SMark Johnston stack = (uintptr_t *)fp + 2; 44491eaf3e1SJohn Birrell 44591eaf3e1SJohn Birrell load: 44691eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT); 44791eaf3e1SJohn Birrell val = stack[arg]; 44891eaf3e1SJohn Birrell DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT); 44991eaf3e1SJohn Birrell 45091eaf3e1SJohn Birrell return (val); 45191eaf3e1SJohn Birrell return (0); 45291eaf3e1SJohn Birrell } 45391eaf3e1SJohn Birrell 45491eaf3e1SJohn Birrell int 45591eaf3e1SJohn Birrell dtrace_getstackdepth(int aframes) 45691eaf3e1SJohn Birrell { 45791eaf3e1SJohn Birrell int depth = 0; 45891eaf3e1SJohn Birrell struct amd64_frame *frame; 45991eaf3e1SJohn Birrell vm_offset_t rbp; 46091eaf3e1SJohn Birrell 46191eaf3e1SJohn Birrell aframes++; 46291eaf3e1SJohn Birrell rbp = dtrace_getfp(); 46391eaf3e1SJohn Birrell frame = (struct amd64_frame *)rbp; 46491eaf3e1SJohn Birrell depth++; 46591eaf3e1SJohn Birrell for(;;) { 46691eaf3e1SJohn Birrell if (!INKERNEL((long) frame)) 46791eaf3e1SJohn Birrell break; 46891eaf3e1SJohn Birrell if (!INKERNEL((long) frame->f_frame)) 46991eaf3e1SJohn Birrell break; 47091eaf3e1SJohn Birrell depth++; 47191eaf3e1SJohn Birrell if (frame->f_frame <= frame || 47291eaf3e1SJohn Birrell (vm_offset_t)frame->f_frame >= 47391eaf3e1SJohn Birrell (vm_offset_t)rbp + KSTACK_PAGES * PAGE_SIZE) 47491eaf3e1SJohn Birrell break; 47591eaf3e1SJohn Birrell frame = frame->f_frame; 47691eaf3e1SJohn Birrell } 47791eaf3e1SJohn Birrell if (depth < aframes) 47891eaf3e1SJohn Birrell return 0; 47991eaf3e1SJohn Birrell else 48091eaf3e1SJohn Birrell return depth - aframes; 48191eaf3e1SJohn Birrell } 48291eaf3e1SJohn Birrell 48391eaf3e1SJohn Birrell ulong_t 484c6f5742fSRui Paulo dtrace_getreg(struct trapframe *rp, uint_t reg) 48591eaf3e1SJohn Birrell { 486c6f5742fSRui Paulo /* This table is dependent on reg.d. */ 48791eaf3e1SJohn Birrell int regmap[] = { 488c6f5742fSRui Paulo REG_GS, /* 0 GS */ 489c6f5742fSRui Paulo REG_FS, /* 1 FS */ 490c6f5742fSRui Paulo REG_ES, /* 2 ES */ 491c6f5742fSRui Paulo REG_DS, /* 3 DS */ 492c6f5742fSRui Paulo REG_RDI, /* 4 EDI */ 493c6f5742fSRui Paulo REG_RSI, /* 5 ESI */ 494c6f5742fSRui Paulo REG_RBP, /* 6 EBP, REG_FP */ 495c6f5742fSRui Paulo REG_RSP, /* 7 ESP */ 496c6f5742fSRui Paulo REG_RBX, /* 8 EBX, REG_R1 */ 497c6f5742fSRui Paulo REG_RDX, /* 9 EDX */ 498c6f5742fSRui Paulo REG_RCX, /* 10 ECX */ 499c6f5742fSRui Paulo REG_RAX, /* 11 EAX, REG_R0 */ 500c6f5742fSRui Paulo REG_TRAPNO, /* 12 TRAPNO */ 501c6f5742fSRui Paulo REG_ERR, /* 13 ERR */ 502c6f5742fSRui Paulo REG_RIP, /* 14 EIP, REG_PC */ 503c6f5742fSRui Paulo REG_CS, /* 15 CS */ 504c6f5742fSRui Paulo REG_RFL, /* 16 EFL, REG_PS */ 505c6f5742fSRui Paulo REG_RSP, /* 17 UESP, REG_SP */ 506c6f5742fSRui Paulo REG_SS /* 18 SS */ 50791eaf3e1SJohn Birrell }; 50891eaf3e1SJohn Birrell 50991eaf3e1SJohn Birrell if (reg <= SS) { 51091eaf3e1SJohn Birrell if (reg >= sizeof (regmap) / sizeof (int)) { 51191eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP); 51291eaf3e1SJohn Birrell return (0); 51391eaf3e1SJohn Birrell } 51491eaf3e1SJohn Birrell 51591eaf3e1SJohn Birrell reg = regmap[reg]; 51691eaf3e1SJohn Birrell } else { 517c6f5742fSRui Paulo /* This is dependent on reg.d. */ 51891eaf3e1SJohn Birrell reg -= SS + 1; 51991eaf3e1SJohn Birrell } 52091eaf3e1SJohn Birrell 52191eaf3e1SJohn Birrell switch (reg) { 52291eaf3e1SJohn Birrell case REG_RDI: 523c6f5742fSRui Paulo return (rp->tf_rdi); 52491eaf3e1SJohn Birrell case REG_RSI: 525c6f5742fSRui Paulo return (rp->tf_rsi); 52691eaf3e1SJohn Birrell case REG_RDX: 527c6f5742fSRui Paulo return (rp->tf_rdx); 52891eaf3e1SJohn Birrell case REG_RCX: 529c6f5742fSRui Paulo return (rp->tf_rcx); 53091eaf3e1SJohn Birrell case REG_R8: 531c6f5742fSRui Paulo return (rp->tf_r8); 53291eaf3e1SJohn Birrell case REG_R9: 533c6f5742fSRui Paulo return (rp->tf_r9); 53491eaf3e1SJohn Birrell case REG_RAX: 535c6f5742fSRui Paulo return (rp->tf_rax); 53691eaf3e1SJohn Birrell case REG_RBX: 537c6f5742fSRui Paulo return (rp->tf_rbx); 53891eaf3e1SJohn Birrell case REG_RBP: 539c6f5742fSRui Paulo return (rp->tf_rbp); 54091eaf3e1SJohn Birrell case REG_R10: 541c6f5742fSRui Paulo return (rp->tf_r10); 54291eaf3e1SJohn Birrell case REG_R11: 543c6f5742fSRui Paulo return (rp->tf_r11); 54491eaf3e1SJohn Birrell case REG_R12: 545c6f5742fSRui Paulo return (rp->tf_r12); 54691eaf3e1SJohn Birrell case REG_R13: 547c6f5742fSRui Paulo return (rp->tf_r13); 54891eaf3e1SJohn Birrell case REG_R14: 549c6f5742fSRui Paulo return (rp->tf_r14); 55091eaf3e1SJohn Birrell case REG_R15: 551c6f5742fSRui Paulo return (rp->tf_r15); 55291eaf3e1SJohn Birrell case REG_DS: 553c6f5742fSRui Paulo return (rp->tf_ds); 55491eaf3e1SJohn Birrell case REG_ES: 555c6f5742fSRui Paulo return (rp->tf_es); 55691eaf3e1SJohn Birrell case REG_FS: 557c6f5742fSRui Paulo return (rp->tf_fs); 55891eaf3e1SJohn Birrell case REG_GS: 559c6f5742fSRui Paulo return (rp->tf_gs); 56091eaf3e1SJohn Birrell case REG_TRAPNO: 561c6f5742fSRui Paulo return (rp->tf_trapno); 56291eaf3e1SJohn Birrell case REG_ERR: 563c6f5742fSRui Paulo return (rp->tf_err); 56491eaf3e1SJohn Birrell case REG_RIP: 565c6f5742fSRui Paulo return (rp->tf_rip); 56691eaf3e1SJohn Birrell case REG_CS: 567c6f5742fSRui Paulo return (rp->tf_cs); 56891eaf3e1SJohn Birrell case REG_SS: 569c6f5742fSRui Paulo return (rp->tf_ss); 57091eaf3e1SJohn Birrell case REG_RFL: 571c6f5742fSRui Paulo return (rp->tf_rflags); 57291eaf3e1SJohn Birrell case REG_RSP: 573c6f5742fSRui Paulo return (rp->tf_rsp); 57491eaf3e1SJohn Birrell default: 57591eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP); 57691eaf3e1SJohn Birrell return (0); 57791eaf3e1SJohn Birrell } 57891eaf3e1SJohn Birrell } 57991eaf3e1SJohn Birrell 58091eaf3e1SJohn Birrell static int 58191eaf3e1SJohn Birrell dtrace_copycheck(uintptr_t uaddr, uintptr_t kaddr, size_t size) 58291eaf3e1SJohn Birrell { 583f340e9feSAndriy Gapon ASSERT(INKERNEL(kaddr) && kaddr + size >= kaddr); 58491eaf3e1SJohn Birrell 585f340e9feSAndriy Gapon if (uaddr + size > VM_MAXUSER_ADDRESS || uaddr + size < uaddr) { 58691eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 58791eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = uaddr; 58891eaf3e1SJohn Birrell return (0); 58991eaf3e1SJohn Birrell } 59091eaf3e1SJohn Birrell 59191eaf3e1SJohn Birrell return (1); 59291eaf3e1SJohn Birrell } 59391eaf3e1SJohn Birrell 59491eaf3e1SJohn Birrell void 59591eaf3e1SJohn Birrell dtrace_copyin(uintptr_t uaddr, uintptr_t kaddr, size_t size, 59691eaf3e1SJohn Birrell volatile uint16_t *flags) 59791eaf3e1SJohn Birrell { 59891eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 59991eaf3e1SJohn Birrell dtrace_copy(uaddr, kaddr, size); 60091eaf3e1SJohn Birrell } 60191eaf3e1SJohn Birrell 60291eaf3e1SJohn Birrell void 60391eaf3e1SJohn Birrell dtrace_copyout(uintptr_t kaddr, uintptr_t uaddr, size_t size, 60491eaf3e1SJohn Birrell volatile uint16_t *flags) 60591eaf3e1SJohn Birrell { 60691eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 60791eaf3e1SJohn Birrell dtrace_copy(kaddr, uaddr, size); 60891eaf3e1SJohn Birrell } 60991eaf3e1SJohn Birrell 61091eaf3e1SJohn Birrell void 61191eaf3e1SJohn Birrell dtrace_copyinstr(uintptr_t uaddr, uintptr_t kaddr, size_t size, 61291eaf3e1SJohn Birrell volatile uint16_t *flags) 61391eaf3e1SJohn Birrell { 61491eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 61591eaf3e1SJohn Birrell dtrace_copystr(uaddr, kaddr, size, flags); 61691eaf3e1SJohn Birrell } 61791eaf3e1SJohn Birrell 61891eaf3e1SJohn Birrell void 61991eaf3e1SJohn Birrell dtrace_copyoutstr(uintptr_t kaddr, uintptr_t uaddr, size_t size, 62091eaf3e1SJohn Birrell volatile uint16_t *flags) 62191eaf3e1SJohn Birrell { 62291eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 62391eaf3e1SJohn Birrell dtrace_copystr(kaddr, uaddr, size, flags); 62491eaf3e1SJohn Birrell } 62591eaf3e1SJohn Birrell 62691eaf3e1SJohn Birrell uint8_t 62791eaf3e1SJohn Birrell dtrace_fuword8(void *uaddr) 62891eaf3e1SJohn Birrell { 629f340e9feSAndriy Gapon if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) { 63091eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 63191eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 63291eaf3e1SJohn Birrell return (0); 63391eaf3e1SJohn Birrell } 63491eaf3e1SJohn Birrell return (dtrace_fuword8_nocheck(uaddr)); 63591eaf3e1SJohn Birrell } 63691eaf3e1SJohn Birrell 63791eaf3e1SJohn Birrell uint16_t 63891eaf3e1SJohn Birrell dtrace_fuword16(void *uaddr) 63991eaf3e1SJohn Birrell { 640f340e9feSAndriy Gapon if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) { 64191eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 64291eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 64391eaf3e1SJohn Birrell return (0); 64491eaf3e1SJohn Birrell } 64591eaf3e1SJohn Birrell return (dtrace_fuword16_nocheck(uaddr)); 64691eaf3e1SJohn Birrell } 64791eaf3e1SJohn Birrell 64891eaf3e1SJohn Birrell uint32_t 64991eaf3e1SJohn Birrell dtrace_fuword32(void *uaddr) 65091eaf3e1SJohn Birrell { 651f340e9feSAndriy Gapon if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) { 65291eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 65391eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 65491eaf3e1SJohn Birrell return (0); 65591eaf3e1SJohn Birrell } 65691eaf3e1SJohn Birrell return (dtrace_fuword32_nocheck(uaddr)); 65791eaf3e1SJohn Birrell } 65891eaf3e1SJohn Birrell 65991eaf3e1SJohn Birrell uint64_t 66091eaf3e1SJohn Birrell dtrace_fuword64(void *uaddr) 66191eaf3e1SJohn Birrell { 662f340e9feSAndriy Gapon if ((uintptr_t)uaddr > VM_MAXUSER_ADDRESS) { 66391eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 66491eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 66591eaf3e1SJohn Birrell return (0); 66691eaf3e1SJohn Birrell } 66791eaf3e1SJohn Birrell return (dtrace_fuword64_nocheck(uaddr)); 66891eaf3e1SJohn Birrell } 669