xref: /freebsd/sys/cddl/dev/dtrace/i386/dtrace_isa.c (revision 09a15aa38dd1c81b6672980a25c6bdd1edd65c2a)
191eaf3e1SJohn Birrell /*
291eaf3e1SJohn Birrell  * CDDL HEADER START
391eaf3e1SJohn Birrell  *
491eaf3e1SJohn Birrell  * The contents of this file are subject to the terms of the
591eaf3e1SJohn Birrell  * Common Development and Distribution License, Version 1.0 only
691eaf3e1SJohn Birrell  * (the "License").  You may not use this file except in compliance
791eaf3e1SJohn Birrell  * with the License.
891eaf3e1SJohn Birrell  *
991eaf3e1SJohn Birrell  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
1091eaf3e1SJohn Birrell  * or http://www.opensolaris.org/os/licensing.
1191eaf3e1SJohn Birrell  * See the License for the specific language governing permissions
1291eaf3e1SJohn Birrell  * and limitations under the License.
1391eaf3e1SJohn Birrell  *
1491eaf3e1SJohn Birrell  * When distributing Covered Code, include this CDDL HEADER in each
1591eaf3e1SJohn Birrell  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
1691eaf3e1SJohn Birrell  * If applicable, add the following below this CDDL HEADER, with the
1791eaf3e1SJohn Birrell  * fields enclosed by brackets "[]" replaced with your own identifying
1891eaf3e1SJohn Birrell  * information: Portions Copyright [yyyy] [name of copyright owner]
1991eaf3e1SJohn Birrell  *
2091eaf3e1SJohn Birrell  * CDDL HEADER END
2191eaf3e1SJohn Birrell  *
2291eaf3e1SJohn Birrell  * $FreeBSD$
2391eaf3e1SJohn Birrell  */
2491eaf3e1SJohn Birrell /*
2591eaf3e1SJohn Birrell  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
2691eaf3e1SJohn Birrell  * Use is subject to license terms.
2791eaf3e1SJohn Birrell  */
2891eaf3e1SJohn Birrell #include <sys/cdefs.h>
2991eaf3e1SJohn Birrell 
3091eaf3e1SJohn Birrell #include <sys/param.h>
3191eaf3e1SJohn Birrell #include <sys/systm.h>
3291eaf3e1SJohn Birrell #include <sys/kernel.h>
3391eaf3e1SJohn Birrell #include <sys/stack.h>
3491eaf3e1SJohn Birrell #include <sys/pcpu.h>
3591eaf3e1SJohn Birrell 
36c6f5742fSRui Paulo #include <machine/frame.h>
3791eaf3e1SJohn Birrell #include <machine/md_var.h>
38c6f5742fSRui Paulo #include <machine/pcb.h>
3991eaf3e1SJohn Birrell #include <machine/stack.h>
4091eaf3e1SJohn Birrell 
4191eaf3e1SJohn Birrell #include <vm/vm.h>
4291eaf3e1SJohn Birrell #include <vm/vm_param.h>
4391eaf3e1SJohn Birrell #include <vm/pmap.h>
4491eaf3e1SJohn Birrell 
45c6f5742fSRui Paulo #include "regset.h"
46c6f5742fSRui Paulo 
4791eaf3e1SJohn Birrell extern uintptr_t kernbase;
4891eaf3e1SJohn Birrell uintptr_t kernelbase = (uintptr_t) &kernbase;
4991eaf3e1SJohn Birrell 
5091eaf3e1SJohn Birrell #define INKERNEL(va) (((vm_offset_t)(va)) >= USRSTACK && \
5191eaf3e1SJohn Birrell 	 ((vm_offset_t)(va)) < VM_MAX_KERNEL_ADDRESS)
5291eaf3e1SJohn Birrell 
5391eaf3e1SJohn Birrell uint8_t dtrace_fuword8_nocheck(void *);
5491eaf3e1SJohn Birrell uint16_t dtrace_fuword16_nocheck(void *);
5591eaf3e1SJohn Birrell uint32_t dtrace_fuword32_nocheck(void *);
5691eaf3e1SJohn Birrell uint64_t dtrace_fuword64_nocheck(void *);
5791eaf3e1SJohn Birrell 
58*09a15aa3SMark Johnston int	dtrace_ustackdepth_max = 2048;
59*09a15aa3SMark Johnston 
6091eaf3e1SJohn Birrell void
6191eaf3e1SJohn Birrell dtrace_getpcstack(pc_t *pcstack, int pcstack_limit, int aframes,
6291eaf3e1SJohn Birrell     uint32_t *intrpc)
6391eaf3e1SJohn Birrell {
6491eaf3e1SJohn Birrell 	int depth = 0;
6591eaf3e1SJohn Birrell 	register_t ebp;
6691eaf3e1SJohn Birrell 	struct i386_frame *frame;
6791eaf3e1SJohn Birrell 	vm_offset_t callpc;
6891eaf3e1SJohn Birrell 	pc_t caller = (pc_t) solaris_cpu[curcpu].cpu_dtrace_caller;
6991eaf3e1SJohn Birrell 
7091eaf3e1SJohn Birrell 	if (intrpc != 0)
7191eaf3e1SJohn Birrell 		pcstack[depth++] = (pc_t) intrpc;
7291eaf3e1SJohn Birrell 
7391eaf3e1SJohn Birrell 	aframes++;
7491eaf3e1SJohn Birrell 
7591eaf3e1SJohn Birrell 	__asm __volatile("movl %%ebp,%0" : "=r" (ebp));
7691eaf3e1SJohn Birrell 
7791eaf3e1SJohn Birrell 	frame = (struct i386_frame *)ebp;
7891eaf3e1SJohn Birrell 	while (depth < pcstack_limit) {
7991eaf3e1SJohn Birrell 		if (!INKERNEL(frame))
8091eaf3e1SJohn Birrell 			break;
8191eaf3e1SJohn Birrell 
8291eaf3e1SJohn Birrell 		callpc = frame->f_retaddr;
8391eaf3e1SJohn Birrell 
8491eaf3e1SJohn Birrell 		if (!INKERNEL(callpc))
8591eaf3e1SJohn Birrell 			break;
8691eaf3e1SJohn Birrell 
8791eaf3e1SJohn Birrell 		if (aframes > 0) {
8891eaf3e1SJohn Birrell 			aframes--;
8991eaf3e1SJohn Birrell 			if ((aframes == 0) && (caller != 0)) {
9091eaf3e1SJohn Birrell 				pcstack[depth++] = caller;
9191eaf3e1SJohn Birrell 			}
9291eaf3e1SJohn Birrell 		}
9391eaf3e1SJohn Birrell 		else {
9491eaf3e1SJohn Birrell 			pcstack[depth++] = callpc;
9591eaf3e1SJohn Birrell 		}
9691eaf3e1SJohn Birrell 
9791eaf3e1SJohn Birrell 		if (frame->f_frame <= frame ||
9891eaf3e1SJohn Birrell 		    (vm_offset_t)frame->f_frame >=
9991eaf3e1SJohn Birrell 		    (vm_offset_t)ebp + KSTACK_PAGES * PAGE_SIZE)
10091eaf3e1SJohn Birrell 			break;
10191eaf3e1SJohn Birrell 		frame = frame->f_frame;
10291eaf3e1SJohn Birrell 	}
10391eaf3e1SJohn Birrell 
10491eaf3e1SJohn Birrell 	for (; depth < pcstack_limit; depth++) {
10591eaf3e1SJohn Birrell 		pcstack[depth] = 0;
10691eaf3e1SJohn Birrell 	}
10791eaf3e1SJohn Birrell }
10891eaf3e1SJohn Birrell 
10991eaf3e1SJohn Birrell static int
11091eaf3e1SJohn Birrell dtrace_getustack_common(uint64_t *pcstack, int pcstack_limit, uintptr_t pc,
11191eaf3e1SJohn Birrell     uintptr_t sp)
11291eaf3e1SJohn Birrell {
113c6f5742fSRui Paulo #ifdef notyet
11491eaf3e1SJohn Birrell 	proc_t *p = curproc;
115c6f5742fSRui Paulo 	uintptr_t oldcontext = lwp->lwp_oldcontext; /* XXX signal stack. */
116c6f5742fSRui Paulo 	size_t s1, s2;
117c6f5742fSRui Paulo #endif
118*09a15aa3SMark Johnston 	uintptr_t oldsp;
11991eaf3e1SJohn Birrell 	volatile uint16_t *flags =
12091eaf3e1SJohn Birrell 	    (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags;
12191eaf3e1SJohn Birrell 	int ret = 0;
12291eaf3e1SJohn Birrell 
12391eaf3e1SJohn Birrell 	ASSERT(pcstack == NULL || pcstack_limit > 0);
124*09a15aa3SMark Johnston 	ASSERT(dtrace_ustackdepth_max > 0);
12591eaf3e1SJohn Birrell 
126c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack. */
12791eaf3e1SJohn Birrell 	if (p->p_model == DATAMODEL_NATIVE) {
12891eaf3e1SJohn Birrell 		s1 = sizeof (struct frame) + 2 * sizeof (long);
12991eaf3e1SJohn Birrell 		s2 = s1 + sizeof (siginfo_t);
13091eaf3e1SJohn Birrell 	} else {
13191eaf3e1SJohn Birrell 		s1 = sizeof (struct frame32) + 3 * sizeof (int);
13291eaf3e1SJohn Birrell 		s2 = s1 + sizeof (siginfo32_t);
13391eaf3e1SJohn Birrell 	}
134c6f5742fSRui Paulo #endif
13591eaf3e1SJohn Birrell 
136c6f5742fSRui Paulo 	while (pc != 0) {
137*09a15aa3SMark Johnston 		/*
138*09a15aa3SMark Johnston 		 * We limit the number of times we can go around this
139*09a15aa3SMark Johnston 		 * loop to account for a circular stack.
140*09a15aa3SMark Johnston 		 */
141*09a15aa3SMark Johnston 		if (ret++ >= dtrace_ustackdepth_max) {
142*09a15aa3SMark Johnston 			*flags |= CPU_DTRACE_BADSTACK;
143*09a15aa3SMark Johnston 			cpu_core[curcpu].cpuc_dtrace_illval = sp;
144*09a15aa3SMark Johnston 			break;
145*09a15aa3SMark Johnston 		}
146*09a15aa3SMark Johnston 
14791eaf3e1SJohn Birrell 		if (pcstack != NULL) {
14891eaf3e1SJohn Birrell 			*pcstack++ = (uint64_t)pc;
14991eaf3e1SJohn Birrell 			pcstack_limit--;
15091eaf3e1SJohn Birrell 			if (pcstack_limit <= 0)
15191eaf3e1SJohn Birrell 				break;
15291eaf3e1SJohn Birrell 		}
15391eaf3e1SJohn Birrell 
154c6f5742fSRui Paulo 		if (sp == 0)
155c6f5742fSRui Paulo 			break;
156c6f5742fSRui Paulo 
157*09a15aa3SMark Johnston 		oldsp = sp;
158*09a15aa3SMark Johnston 
159c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack. */
16091eaf3e1SJohn Birrell 		if (oldcontext == sp + s1 || oldcontext == sp + s2) {
16191eaf3e1SJohn Birrell 			if (p->p_model == DATAMODEL_NATIVE) {
16291eaf3e1SJohn Birrell 				ucontext_t *ucp = (ucontext_t *)oldcontext;
16391eaf3e1SJohn Birrell 				greg_t *gregs = ucp->uc_mcontext.gregs;
16491eaf3e1SJohn Birrell 
16591eaf3e1SJohn Birrell 				sp = dtrace_fulword(&gregs[REG_FP]);
16691eaf3e1SJohn Birrell 				pc = dtrace_fulword(&gregs[REG_PC]);
16791eaf3e1SJohn Birrell 
16891eaf3e1SJohn Birrell 				oldcontext = dtrace_fulword(&ucp->uc_link);
16991eaf3e1SJohn Birrell 			} else {
17091eaf3e1SJohn Birrell 				ucontext32_t *ucp = (ucontext32_t *)oldcontext;
17191eaf3e1SJohn Birrell 				greg32_t *gregs = ucp->uc_mcontext.gregs;
17291eaf3e1SJohn Birrell 
17391eaf3e1SJohn Birrell 				sp = dtrace_fuword32(&gregs[EBP]);
17491eaf3e1SJohn Birrell 				pc = dtrace_fuword32(&gregs[EIP]);
17591eaf3e1SJohn Birrell 
17691eaf3e1SJohn Birrell 				oldcontext = dtrace_fuword32(&ucp->uc_link);
17791eaf3e1SJohn Birrell 			}
17891eaf3e1SJohn Birrell 		} else {
17991eaf3e1SJohn Birrell 			if (p->p_model == DATAMODEL_NATIVE) {
18091eaf3e1SJohn Birrell 				struct frame *fr = (struct frame *)sp;
18191eaf3e1SJohn Birrell 
18291eaf3e1SJohn Birrell 				pc = dtrace_fulword(&fr->fr_savpc);
18391eaf3e1SJohn Birrell 				sp = dtrace_fulword(&fr->fr_savfp);
18491eaf3e1SJohn Birrell 			} else {
18591eaf3e1SJohn Birrell 				struct frame32 *fr = (struct frame32 *)sp;
18691eaf3e1SJohn Birrell 
18791eaf3e1SJohn Birrell 				pc = dtrace_fuword32(&fr->fr_savpc);
18891eaf3e1SJohn Birrell 				sp = dtrace_fuword32(&fr->fr_savfp);
18991eaf3e1SJohn Birrell 			}
19091eaf3e1SJohn Birrell 		}
191c6f5742fSRui Paulo #else
192c6f5742fSRui Paulo 		pc = dtrace_fuword32((void *)(sp +
193c6f5742fSRui Paulo 			offsetof(struct i386_frame, f_retaddr)));
194c6f5742fSRui Paulo 		sp = dtrace_fuword32((void *)sp);
195c6f5742fSRui Paulo #endif /* ! notyet */
19691eaf3e1SJohn Birrell 
197*09a15aa3SMark Johnston 		if (sp == oldsp) {
198*09a15aa3SMark Johnston 			*flags |= CPU_DTRACE_BADSTACK;
199*09a15aa3SMark Johnston 			cpu_core[curcpu].cpuc_dtrace_illval = sp;
200*09a15aa3SMark Johnston 			break;
201*09a15aa3SMark Johnston 		}
202*09a15aa3SMark Johnston 
20391eaf3e1SJohn Birrell 		/*
20491eaf3e1SJohn Birrell 		 * This is totally bogus:  if we faulted, we're going to clear
20591eaf3e1SJohn Birrell 		 * the fault and break.  This is to deal with the apparently
20691eaf3e1SJohn Birrell 		 * broken Java stacks on x86.
20791eaf3e1SJohn Birrell 		 */
20891eaf3e1SJohn Birrell 		if (*flags & CPU_DTRACE_FAULT) {
20991eaf3e1SJohn Birrell 			*flags &= ~CPU_DTRACE_FAULT;
21091eaf3e1SJohn Birrell 			break;
21191eaf3e1SJohn Birrell 		}
21291eaf3e1SJohn Birrell 	}
21391eaf3e1SJohn Birrell 
21491eaf3e1SJohn Birrell 	return (ret);
21591eaf3e1SJohn Birrell }
21691eaf3e1SJohn Birrell 
21791eaf3e1SJohn Birrell void
21891eaf3e1SJohn Birrell dtrace_getupcstack(uint64_t *pcstack, int pcstack_limit)
21991eaf3e1SJohn Birrell {
22091eaf3e1SJohn Birrell 	proc_t *p = curproc;
221c6f5742fSRui Paulo 	struct trapframe *tf;
222c6f5742fSRui Paulo 	uintptr_t pc, sp, fp;
22391eaf3e1SJohn Birrell 	volatile uint16_t *flags =
22491eaf3e1SJohn Birrell 	    (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags;
22591eaf3e1SJohn Birrell 	int n;
22691eaf3e1SJohn Birrell 
22791eaf3e1SJohn Birrell 	if (*flags & CPU_DTRACE_FAULT)
22891eaf3e1SJohn Birrell 		return;
22991eaf3e1SJohn Birrell 
23091eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
23191eaf3e1SJohn Birrell 		return;
23291eaf3e1SJohn Birrell 
23391eaf3e1SJohn Birrell 	/*
23491eaf3e1SJohn Birrell 	 * If there's no user context we still need to zero the stack.
23591eaf3e1SJohn Birrell 	 */
236c6f5742fSRui Paulo 	if (p == NULL || (tf = curthread->td_frame) == NULL)
23791eaf3e1SJohn Birrell 		goto zero;
23891eaf3e1SJohn Birrell 
23991eaf3e1SJohn Birrell 	*pcstack++ = (uint64_t)p->p_pid;
24091eaf3e1SJohn Birrell 	pcstack_limit--;
24191eaf3e1SJohn Birrell 
24291eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
24391eaf3e1SJohn Birrell 		return;
24491eaf3e1SJohn Birrell 
245c6f5742fSRui Paulo 	pc = tf->tf_eip;
246c6f5742fSRui Paulo 	fp = tf->tf_ebp;
247c6f5742fSRui Paulo 	sp = tf->tf_esp;
24891eaf3e1SJohn Birrell 
24991eaf3e1SJohn Birrell 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) {
250c6f5742fSRui Paulo 		/*
251c6f5742fSRui Paulo 		 * In an entry probe.  The frame pointer has not yet been
252c6f5742fSRui Paulo 		 * pushed (that happens in the function prologue).  The
253c6f5742fSRui Paulo 		 * best approach is to add the current pc as a missing top
254c6f5742fSRui Paulo 		 * of stack and back the pc up to the caller, which is stored
255c6f5742fSRui Paulo 		 * at the current stack pointer address since the call
256c6f5742fSRui Paulo 		 * instruction puts it there right before the branch.
257c6f5742fSRui Paulo 		 */
258c6f5742fSRui Paulo 
25991eaf3e1SJohn Birrell 		*pcstack++ = (uint64_t)pc;
26091eaf3e1SJohn Birrell 		pcstack_limit--;
26191eaf3e1SJohn Birrell 		if (pcstack_limit <= 0)
26291eaf3e1SJohn Birrell 			return;
26391eaf3e1SJohn Birrell 
264c6f5742fSRui Paulo 		pc = dtrace_fuword32((void *) sp);
26591eaf3e1SJohn Birrell 	}
26691eaf3e1SJohn Birrell 
26791eaf3e1SJohn Birrell 	n = dtrace_getustack_common(pcstack, pcstack_limit, pc, sp);
26891eaf3e1SJohn Birrell 	ASSERT(n >= 0);
26991eaf3e1SJohn Birrell 	ASSERT(n <= pcstack_limit);
27091eaf3e1SJohn Birrell 
27191eaf3e1SJohn Birrell 	pcstack += n;
27291eaf3e1SJohn Birrell 	pcstack_limit -= n;
27391eaf3e1SJohn Birrell 
27491eaf3e1SJohn Birrell zero:
27591eaf3e1SJohn Birrell 	while (pcstack_limit-- > 0)
276c6f5742fSRui Paulo 		*pcstack++ = 0;
27791eaf3e1SJohn Birrell }
27891eaf3e1SJohn Birrell 
27991eaf3e1SJohn Birrell int
28091eaf3e1SJohn Birrell dtrace_getustackdepth(void)
28191eaf3e1SJohn Birrell {
282c6f5742fSRui Paulo 	proc_t *p = curproc;
283c6f5742fSRui Paulo 	struct trapframe *tf;
284c6f5742fSRui Paulo 	uintptr_t pc, fp, sp;
285c6f5742fSRui Paulo 	int n = 0;
286c6f5742fSRui Paulo 
287c6f5742fSRui Paulo 	if (p == NULL || (tf = curthread->td_frame) == NULL)
288c6f5742fSRui Paulo 		return (0);
289c6f5742fSRui Paulo 
290c6f5742fSRui Paulo 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_FAULT))
291c6f5742fSRui Paulo 		return (-1);
292c6f5742fSRui Paulo 
293c6f5742fSRui Paulo 	pc = tf->tf_eip;
294c6f5742fSRui Paulo 	fp = tf->tf_ebp;
295c6f5742fSRui Paulo 	sp = tf->tf_esp;
296c6f5742fSRui Paulo 
297c6f5742fSRui Paulo 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) {
298c6f5742fSRui Paulo 		/*
299c6f5742fSRui Paulo 		 * In an entry probe.  The frame pointer has not yet been
300c6f5742fSRui Paulo 		 * pushed (that happens in the function prologue).  The
301c6f5742fSRui Paulo 		 * best approach is to add the current pc as a missing top
302c6f5742fSRui Paulo 		 * of stack and back the pc up to the caller, which is stored
303c6f5742fSRui Paulo 		 * at the current stack pointer address since the call
304c6f5742fSRui Paulo 		 * instruction puts it there right before the branch.
305c6f5742fSRui Paulo 		 */
306c6f5742fSRui Paulo 
307c6f5742fSRui Paulo 		pc = dtrace_fuword32((void *) sp);
308c6f5742fSRui Paulo 		n++;
309c6f5742fSRui Paulo 	}
310c6f5742fSRui Paulo 
311c6f5742fSRui Paulo 	n += dtrace_getustack_common(NULL, 0, pc, fp);
312c6f5742fSRui Paulo 
313c6f5742fSRui Paulo 	return (n);
31491eaf3e1SJohn Birrell }
31591eaf3e1SJohn Birrell 
31691eaf3e1SJohn Birrell void
31791eaf3e1SJohn Birrell dtrace_getufpstack(uint64_t *pcstack, uint64_t *fpstack, int pcstack_limit)
31891eaf3e1SJohn Birrell {
31991eaf3e1SJohn Birrell 	proc_t *p = curproc;
320c6f5742fSRui Paulo 	struct trapframe *tf;
321c6f5742fSRui Paulo 	uintptr_t pc, sp, fp;
32291eaf3e1SJohn Birrell 	volatile uint16_t *flags =
32391eaf3e1SJohn Birrell 	    (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags;
324c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */
325c6f5742fSRui Paulo 	uintptr_t oldcontext;
32691eaf3e1SJohn Birrell 	size_t s1, s2;
327c6f5742fSRui Paulo #endif
32891eaf3e1SJohn Birrell 
32991eaf3e1SJohn Birrell 	if (*flags & CPU_DTRACE_FAULT)
33091eaf3e1SJohn Birrell 		return;
33191eaf3e1SJohn Birrell 
33291eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
33391eaf3e1SJohn Birrell 		return;
33491eaf3e1SJohn Birrell 
33591eaf3e1SJohn Birrell 	/*
33691eaf3e1SJohn Birrell 	 * If there's no user context we still need to zero the stack.
33791eaf3e1SJohn Birrell 	 */
338c6f5742fSRui Paulo 	if (p == NULL || (tf = curthread->td_frame) == NULL)
33991eaf3e1SJohn Birrell 		goto zero;
34091eaf3e1SJohn Birrell 
34191eaf3e1SJohn Birrell 	*pcstack++ = (uint64_t)p->p_pid;
34291eaf3e1SJohn Birrell 	pcstack_limit--;
34391eaf3e1SJohn Birrell 
34491eaf3e1SJohn Birrell 	if (pcstack_limit <= 0)
34591eaf3e1SJohn Birrell 		return;
34691eaf3e1SJohn Birrell 
347c6f5742fSRui Paulo 	pc = tf->tf_eip;
348c6f5742fSRui Paulo 	fp = tf->tf_ebp;
349c6f5742fSRui Paulo 	sp = tf->tf_esp;
350c6f5742fSRui Paulo 
351c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */
35291eaf3e1SJohn Birrell 	oldcontext = lwp->lwp_oldcontext;
35391eaf3e1SJohn Birrell 
35491eaf3e1SJohn Birrell 	if (p->p_model == DATAMODEL_NATIVE) {
35591eaf3e1SJohn Birrell 		s1 = sizeof (struct frame) + 2 * sizeof (long);
35691eaf3e1SJohn Birrell 		s2 = s1 + sizeof (siginfo_t);
35791eaf3e1SJohn Birrell 	} else {
35891eaf3e1SJohn Birrell 		s1 = sizeof (struct frame32) + 3 * sizeof (int);
35991eaf3e1SJohn Birrell 		s2 = s1 + sizeof (siginfo32_t);
36091eaf3e1SJohn Birrell 	}
361c6f5742fSRui Paulo #endif
36291eaf3e1SJohn Birrell 
36391eaf3e1SJohn Birrell 	if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) {
36491eaf3e1SJohn Birrell 		*pcstack++ = (uint64_t)pc;
36591eaf3e1SJohn Birrell 		*fpstack++ = 0;
36691eaf3e1SJohn Birrell 		pcstack_limit--;
36791eaf3e1SJohn Birrell 		if (pcstack_limit <= 0)
36891eaf3e1SJohn Birrell 			return;
36991eaf3e1SJohn Birrell 
370c6f5742fSRui Paulo 		pc = dtrace_fuword32((void *)sp);
37191eaf3e1SJohn Birrell 	}
37291eaf3e1SJohn Birrell 
373c6f5742fSRui Paulo 	while (pc != 0) {
37491eaf3e1SJohn Birrell 		*pcstack++ = (uint64_t)pc;
375c6f5742fSRui Paulo 		*fpstack++ = fp;
37691eaf3e1SJohn Birrell 		pcstack_limit--;
37791eaf3e1SJohn Birrell 		if (pcstack_limit <= 0)
37891eaf3e1SJohn Birrell 			break;
37991eaf3e1SJohn Birrell 
380c6f5742fSRui Paulo 		if (fp == 0)
381c6f5742fSRui Paulo 			break;
382c6f5742fSRui Paulo 
383c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */
38491eaf3e1SJohn Birrell 		if (oldcontext == sp + s1 || oldcontext == sp + s2) {
38591eaf3e1SJohn Birrell 			if (p->p_model == DATAMODEL_NATIVE) {
38691eaf3e1SJohn Birrell 				ucontext_t *ucp = (ucontext_t *)oldcontext;
38791eaf3e1SJohn Birrell 				greg_t *gregs = ucp->uc_mcontext.gregs;
38891eaf3e1SJohn Birrell 
38991eaf3e1SJohn Birrell 				sp = dtrace_fulword(&gregs[REG_FP]);
39091eaf3e1SJohn Birrell 				pc = dtrace_fulword(&gregs[REG_PC]);
39191eaf3e1SJohn Birrell 
39291eaf3e1SJohn Birrell 				oldcontext = dtrace_fulword(&ucp->uc_link);
39391eaf3e1SJohn Birrell 			} else {
39491eaf3e1SJohn Birrell 				ucontext_t *ucp = (ucontext_t *)oldcontext;
39591eaf3e1SJohn Birrell 				greg_t *gregs = ucp->uc_mcontext.gregs;
39691eaf3e1SJohn Birrell 
39791eaf3e1SJohn Birrell 				sp = dtrace_fuword32(&gregs[EBP]);
39891eaf3e1SJohn Birrell 				pc = dtrace_fuword32(&gregs[EIP]);
39991eaf3e1SJohn Birrell 
40091eaf3e1SJohn Birrell 				oldcontext = dtrace_fuword32(&ucp->uc_link);
40191eaf3e1SJohn Birrell 			}
402c6f5742fSRui Paulo 		} else
403c6f5742fSRui Paulo #endif /* XXX */
404c6f5742fSRui Paulo 		{
405c6f5742fSRui Paulo 			pc = dtrace_fuword32((void *)(fp +
406c6f5742fSRui Paulo 				offsetof(struct i386_frame, f_retaddr)));
407c6f5742fSRui Paulo 			fp = dtrace_fuword32((void *)fp);
40891eaf3e1SJohn Birrell 		}
40991eaf3e1SJohn Birrell 
41091eaf3e1SJohn Birrell 		/*
41191eaf3e1SJohn Birrell 		 * This is totally bogus:  if we faulted, we're going to clear
41291eaf3e1SJohn Birrell 		 * the fault and break.  This is to deal with the apparently
41391eaf3e1SJohn Birrell 		 * broken Java stacks on x86.
41491eaf3e1SJohn Birrell 		 */
41591eaf3e1SJohn Birrell 		if (*flags & CPU_DTRACE_FAULT) {
41691eaf3e1SJohn Birrell 			*flags &= ~CPU_DTRACE_FAULT;
41791eaf3e1SJohn Birrell 			break;
41891eaf3e1SJohn Birrell 		}
41991eaf3e1SJohn Birrell 	}
42091eaf3e1SJohn Birrell 
42191eaf3e1SJohn Birrell zero:
42291eaf3e1SJohn Birrell 	while (pcstack_limit-- > 0)
423c6f5742fSRui Paulo 		*pcstack++ = 0;
42491eaf3e1SJohn Birrell }
42591eaf3e1SJohn Birrell 
42691eaf3e1SJohn Birrell uint64_t
42791eaf3e1SJohn Birrell dtrace_getarg(int arg, int aframes)
42891eaf3e1SJohn Birrell {
42991eaf3e1SJohn Birrell 	uintptr_t val;
43091eaf3e1SJohn Birrell 	struct i386_frame *fp = (struct i386_frame *)dtrace_getfp();
43191eaf3e1SJohn Birrell 	uintptr_t *stack;
43291eaf3e1SJohn Birrell 	int i;
43391eaf3e1SJohn Birrell 
43491eaf3e1SJohn Birrell 	for (i = 1; i <= aframes; i++) {
43591eaf3e1SJohn Birrell 		fp = fp->f_frame;
43691eaf3e1SJohn Birrell 
437efa1aff6SMark Johnston 		if (P2ROUNDUP(fp->f_retaddr, 4) ==
438efa1aff6SMark Johnston 		    (long)dtrace_invop_callsite) {
43991eaf3e1SJohn Birrell 			/*
44091eaf3e1SJohn Birrell 			 * If we pass through the invalid op handler, we will
44191eaf3e1SJohn Birrell 			 * use the pointer that it passed to the stack as the
44291eaf3e1SJohn Birrell 			 * second argument to dtrace_invop() as the pointer to
44391eaf3e1SJohn Birrell 			 * the stack.  When using this stack, we must step
44491eaf3e1SJohn Birrell 			 * beyond the EIP/RIP that was pushed when the trap was
44591eaf3e1SJohn Birrell 			 * taken -- hence the "+ 1" below.
44691eaf3e1SJohn Birrell 			 */
447efa1aff6SMark Johnston 			stack = ((uintptr_t **)&fp[1])[0] + 1;
44891eaf3e1SJohn Birrell 			goto load;
44991eaf3e1SJohn Birrell 		}
45091eaf3e1SJohn Birrell 
45191eaf3e1SJohn Birrell 	}
45291eaf3e1SJohn Birrell 
45391eaf3e1SJohn Birrell 	/*
45491eaf3e1SJohn Birrell 	 * We know that we did not come through a trap to get into
45591eaf3e1SJohn Birrell 	 * dtrace_probe() -- the provider simply called dtrace_probe()
45691eaf3e1SJohn Birrell 	 * directly.  As this is the case, we need to shift the argument
45791eaf3e1SJohn Birrell 	 * that we're looking for:  the probe ID is the first argument to
45891eaf3e1SJohn Birrell 	 * dtrace_probe(), so the argument n will actually be found where
45991eaf3e1SJohn Birrell 	 * one would expect to find argument (n + 1).
46091eaf3e1SJohn Birrell 	 */
46191eaf3e1SJohn Birrell 	arg++;
46291eaf3e1SJohn Birrell 
463efa1aff6SMark Johnston 	stack = (uintptr_t *)fp + 2;
46491eaf3e1SJohn Birrell 
46591eaf3e1SJohn Birrell load:
46691eaf3e1SJohn Birrell 	DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT);
46791eaf3e1SJohn Birrell 	val = stack[arg];
46891eaf3e1SJohn Birrell 	DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT);
46991eaf3e1SJohn Birrell 
47091eaf3e1SJohn Birrell 	return (val);
47191eaf3e1SJohn Birrell }
47291eaf3e1SJohn Birrell 
47391eaf3e1SJohn Birrell int
47491eaf3e1SJohn Birrell dtrace_getstackdepth(int aframes)
47591eaf3e1SJohn Birrell {
47691eaf3e1SJohn Birrell 	int depth = 0;
47791eaf3e1SJohn Birrell 	struct i386_frame *frame;
47891eaf3e1SJohn Birrell 	vm_offset_t ebp;
47991eaf3e1SJohn Birrell 
48091eaf3e1SJohn Birrell 	aframes++;
48191eaf3e1SJohn Birrell 	ebp = dtrace_getfp();
48291eaf3e1SJohn Birrell 	frame = (struct i386_frame *)ebp;
48391eaf3e1SJohn Birrell 	depth++;
48491eaf3e1SJohn Birrell 	for(;;) {
48591eaf3e1SJohn Birrell 		if (!INKERNEL((long) frame))
48691eaf3e1SJohn Birrell 			break;
48791eaf3e1SJohn Birrell 		if (!INKERNEL((long) frame->f_frame))
48891eaf3e1SJohn Birrell 			break;
48991eaf3e1SJohn Birrell 		depth++;
49091eaf3e1SJohn Birrell 		if (frame->f_frame <= frame ||
49191eaf3e1SJohn Birrell 		    (vm_offset_t)frame->f_frame >=
49291eaf3e1SJohn Birrell 		    (vm_offset_t)ebp + KSTACK_PAGES * PAGE_SIZE)
49391eaf3e1SJohn Birrell 			break;
49491eaf3e1SJohn Birrell 		frame = frame->f_frame;
49591eaf3e1SJohn Birrell 	}
49691eaf3e1SJohn Birrell 	if (depth < aframes)
49791eaf3e1SJohn Birrell 		return 0;
49891eaf3e1SJohn Birrell 	else
49991eaf3e1SJohn Birrell 		return depth - aframes;
50091eaf3e1SJohn Birrell }
50191eaf3e1SJohn Birrell 
50291eaf3e1SJohn Birrell ulong_t
503c6f5742fSRui Paulo dtrace_getreg(struct trapframe *rp, uint_t reg)
50491eaf3e1SJohn Birrell {
505c6f5742fSRui Paulo 	struct pcb *pcb;
506c6f5742fSRui Paulo 	int regmap[] = {  /* Order is dependent on reg.d */
507c6f5742fSRui Paulo 		REG_GS,		/* 0  GS */
508c6f5742fSRui Paulo 		REG_FS,		/* 1  FS */
509c6f5742fSRui Paulo 		REG_ES,		/* 2  ES */
510c6f5742fSRui Paulo 		REG_DS,		/* 3  DS */
511c6f5742fSRui Paulo 		REG_RDI,	/* 4  EDI */
512c6f5742fSRui Paulo 		REG_RSI,	/* 5  ESI */
513c6f5742fSRui Paulo 		REG_RBP,	/* 6  EBP, REG_FP */
514c6f5742fSRui Paulo 		REG_RSP,	/* 7  ESP */
515c6f5742fSRui Paulo 		REG_RBX,	/* 8  EBX */
516c6f5742fSRui Paulo 		REG_RDX,	/* 9  EDX, REG_R1 */
517c6f5742fSRui Paulo 		REG_RCX,	/* 10 ECX */
518c6f5742fSRui Paulo 		REG_RAX,	/* 11 EAX, REG_R0 */
519c6f5742fSRui Paulo 		REG_TRAPNO,	/* 12 TRAPNO */
520c6f5742fSRui Paulo 		REG_ERR,	/* 13 ERR */
521c6f5742fSRui Paulo 		REG_RIP,	/* 14 EIP, REG_PC */
522c6f5742fSRui Paulo 		REG_CS,		/* 15 CS */
523c6f5742fSRui Paulo 		REG_RFL,	/* 16 EFL, REG_PS */
524c6f5742fSRui Paulo 		REG_RSP,	/* 17 UESP, REG_SP */
525c6f5742fSRui Paulo 		REG_SS		/* 18 SS */
52691eaf3e1SJohn Birrell 	};
52791eaf3e1SJohn Birrell 
528c6f5742fSRui Paulo 	if (reg > SS) {
529c6f5742fSRui Paulo 		DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
530c6f5742fSRui Paulo 		return (0);
531c6f5742fSRui Paulo 	}
532c6f5742fSRui Paulo 
53391eaf3e1SJohn Birrell 	if (reg >= sizeof (regmap) / sizeof (int)) {
53491eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
53591eaf3e1SJohn Birrell 		return (0);
53691eaf3e1SJohn Birrell 	}
53791eaf3e1SJohn Birrell 
53891eaf3e1SJohn Birrell 	reg = regmap[reg];
53991eaf3e1SJohn Birrell 
54091eaf3e1SJohn Birrell 	switch(reg) {
54191eaf3e1SJohn Birrell 	case REG_GS:
542c6f5742fSRui Paulo 		if ((pcb = curthread->td_pcb) == NULL) {
543c6f5742fSRui Paulo 			DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
544c6f5742fSRui Paulo 			return (0);
545c6f5742fSRui Paulo 		}
546c6f5742fSRui Paulo 		return (pcb->pcb_gs);
547c6f5742fSRui Paulo 	case REG_FS:
548c6f5742fSRui Paulo 		return (rp->tf_fs);
549c6f5742fSRui Paulo 	case REG_ES:
550c6f5742fSRui Paulo 		return (rp->tf_es);
551c6f5742fSRui Paulo 	case REG_DS:
552c6f5742fSRui Paulo 		return (rp->tf_ds);
553c6f5742fSRui Paulo 	case REG_RDI:
554c6f5742fSRui Paulo 		return (rp->tf_edi);
555c6f5742fSRui Paulo 	case REG_RSI:
556c6f5742fSRui Paulo 		return (rp->tf_esi);
557c6f5742fSRui Paulo 	case REG_RBP:
558c6f5742fSRui Paulo 		return (rp->tf_ebp);
55991eaf3e1SJohn Birrell 	case REG_RSP:
560c6f5742fSRui Paulo 		return (rp->tf_isp);
561c6f5742fSRui Paulo 	case REG_RBX:
562c6f5742fSRui Paulo 		return (rp->tf_ebx);
563c6f5742fSRui Paulo 	case REG_RCX:
564c6f5742fSRui Paulo 		return (rp->tf_ecx);
565c6f5742fSRui Paulo 	case REG_RAX:
566c6f5742fSRui Paulo 		return (rp->tf_eax);
567c6f5742fSRui Paulo 	case REG_TRAPNO:
568c6f5742fSRui Paulo 		return (rp->tf_trapno);
569c6f5742fSRui Paulo 	case REG_ERR:
570c6f5742fSRui Paulo 		return (rp->tf_err);
571c6f5742fSRui Paulo 	case REG_RIP:
572c6f5742fSRui Paulo 		return (rp->tf_eip);
573c6f5742fSRui Paulo 	case REG_CS:
574c6f5742fSRui Paulo 		return (rp->tf_cs);
575c6f5742fSRui Paulo 	case REG_RFL:
576c6f5742fSRui Paulo 		return (rp->tf_eflags);
577c6f5742fSRui Paulo #if 0
578c6f5742fSRui Paulo 	case REG_RSP:
579c6f5742fSRui Paulo 		return (rp->tf_esp);
580c6f5742fSRui Paulo #endif
581c6f5742fSRui Paulo 	case REG_SS:
582c6f5742fSRui Paulo 		return (rp->tf_ss);
58391eaf3e1SJohn Birrell 	default:
58491eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
58591eaf3e1SJohn Birrell 		return (0);
58691eaf3e1SJohn Birrell 	}
58791eaf3e1SJohn Birrell }
58891eaf3e1SJohn Birrell 
58991eaf3e1SJohn Birrell static int
59091eaf3e1SJohn Birrell dtrace_copycheck(uintptr_t uaddr, uintptr_t kaddr, size_t size)
59191eaf3e1SJohn Birrell {
59291eaf3e1SJohn Birrell 	ASSERT(kaddr >= kernelbase && kaddr + size >= kaddr);
59391eaf3e1SJohn Birrell 
59491eaf3e1SJohn Birrell 	if (uaddr + size >= kernelbase || uaddr + size < uaddr) {
59591eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
59691eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = uaddr;
59791eaf3e1SJohn Birrell 		return (0);
59891eaf3e1SJohn Birrell 	}
59991eaf3e1SJohn Birrell 
60091eaf3e1SJohn Birrell 	return (1);
60191eaf3e1SJohn Birrell }
60291eaf3e1SJohn Birrell 
60391eaf3e1SJohn Birrell void
60491eaf3e1SJohn Birrell dtrace_copyin(uintptr_t uaddr, uintptr_t kaddr, size_t size,
60591eaf3e1SJohn Birrell     volatile uint16_t *flags)
60691eaf3e1SJohn Birrell {
60791eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
60891eaf3e1SJohn Birrell 		dtrace_copy(uaddr, kaddr, size);
60991eaf3e1SJohn Birrell }
61091eaf3e1SJohn Birrell 
61191eaf3e1SJohn Birrell void
61291eaf3e1SJohn Birrell dtrace_copyout(uintptr_t kaddr, uintptr_t uaddr, size_t size,
61391eaf3e1SJohn Birrell     volatile uint16_t *flags)
61491eaf3e1SJohn Birrell {
61591eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
61691eaf3e1SJohn Birrell 		dtrace_copy(kaddr, uaddr, size);
61791eaf3e1SJohn Birrell }
61891eaf3e1SJohn Birrell 
61991eaf3e1SJohn Birrell void
62091eaf3e1SJohn Birrell dtrace_copyinstr(uintptr_t uaddr, uintptr_t kaddr, size_t size,
62191eaf3e1SJohn Birrell     volatile uint16_t *flags)
62291eaf3e1SJohn Birrell {
62391eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
62491eaf3e1SJohn Birrell 		dtrace_copystr(uaddr, kaddr, size, flags);
62591eaf3e1SJohn Birrell }
62691eaf3e1SJohn Birrell 
62791eaf3e1SJohn Birrell void
62891eaf3e1SJohn Birrell dtrace_copyoutstr(uintptr_t kaddr, uintptr_t uaddr, size_t size,
62991eaf3e1SJohn Birrell     volatile uint16_t *flags)
63091eaf3e1SJohn Birrell {
63191eaf3e1SJohn Birrell 	if (dtrace_copycheck(uaddr, kaddr, size))
63291eaf3e1SJohn Birrell 		dtrace_copystr(kaddr, uaddr, size, flags);
63391eaf3e1SJohn Birrell }
63491eaf3e1SJohn Birrell 
63591eaf3e1SJohn Birrell uint8_t
63691eaf3e1SJohn Birrell dtrace_fuword8(void *uaddr)
63791eaf3e1SJohn Birrell {
63891eaf3e1SJohn Birrell 	if ((uintptr_t)uaddr >= kernelbase) {
63991eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
64091eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
64191eaf3e1SJohn Birrell 		return (0);
64291eaf3e1SJohn Birrell 	}
64391eaf3e1SJohn Birrell 	return (dtrace_fuword8_nocheck(uaddr));
64491eaf3e1SJohn Birrell }
64591eaf3e1SJohn Birrell 
64691eaf3e1SJohn Birrell uint16_t
64791eaf3e1SJohn Birrell dtrace_fuword16(void *uaddr)
64891eaf3e1SJohn Birrell {
64991eaf3e1SJohn Birrell 	if ((uintptr_t)uaddr >= kernelbase) {
65091eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
65191eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
65291eaf3e1SJohn Birrell 		return (0);
65391eaf3e1SJohn Birrell 	}
65491eaf3e1SJohn Birrell 	return (dtrace_fuword16_nocheck(uaddr));
65591eaf3e1SJohn Birrell }
65691eaf3e1SJohn Birrell 
65791eaf3e1SJohn Birrell uint32_t
65891eaf3e1SJohn Birrell dtrace_fuword32(void *uaddr)
65991eaf3e1SJohn Birrell {
66091eaf3e1SJohn Birrell 	if ((uintptr_t)uaddr >= kernelbase) {
66191eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
66291eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
66391eaf3e1SJohn Birrell 		return (0);
66491eaf3e1SJohn Birrell 	}
66591eaf3e1SJohn Birrell 	return (dtrace_fuword32_nocheck(uaddr));
66691eaf3e1SJohn Birrell }
66791eaf3e1SJohn Birrell 
66891eaf3e1SJohn Birrell uint64_t
66991eaf3e1SJohn Birrell dtrace_fuword64(void *uaddr)
67091eaf3e1SJohn Birrell {
67191eaf3e1SJohn Birrell 	if ((uintptr_t)uaddr >= kernelbase) {
67291eaf3e1SJohn Birrell 		DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR);
67391eaf3e1SJohn Birrell 		cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr;
67491eaf3e1SJohn Birrell 		return (0);
67591eaf3e1SJohn Birrell 	}
67691eaf3e1SJohn Birrell 	return (dtrace_fuword64_nocheck(uaddr));
67791eaf3e1SJohn Birrell }
678