191eaf3e1SJohn Birrell /* 291eaf3e1SJohn Birrell * CDDL HEADER START 391eaf3e1SJohn Birrell * 491eaf3e1SJohn Birrell * The contents of this file are subject to the terms of the 591eaf3e1SJohn Birrell * Common Development and Distribution License, Version 1.0 only 691eaf3e1SJohn Birrell * (the "License"). You may not use this file except in compliance 791eaf3e1SJohn Birrell * with the License. 891eaf3e1SJohn Birrell * 991eaf3e1SJohn Birrell * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 1091eaf3e1SJohn Birrell * or http://www.opensolaris.org/os/licensing. 1191eaf3e1SJohn Birrell * See the License for the specific language governing permissions 1291eaf3e1SJohn Birrell * and limitations under the License. 1391eaf3e1SJohn Birrell * 1491eaf3e1SJohn Birrell * When distributing Covered Code, include this CDDL HEADER in each 1591eaf3e1SJohn Birrell * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 1691eaf3e1SJohn Birrell * If applicable, add the following below this CDDL HEADER, with the 1791eaf3e1SJohn Birrell * fields enclosed by brackets "[]" replaced with your own identifying 1891eaf3e1SJohn Birrell * information: Portions Copyright [yyyy] [name of copyright owner] 1991eaf3e1SJohn Birrell * 2091eaf3e1SJohn Birrell * CDDL HEADER END 2191eaf3e1SJohn Birrell * 2291eaf3e1SJohn Birrell * $FreeBSD$ 2391eaf3e1SJohn Birrell */ 2491eaf3e1SJohn Birrell /* 2591eaf3e1SJohn Birrell * Copyright 2005 Sun Microsystems, Inc. All rights reserved. 2691eaf3e1SJohn Birrell * Use is subject to license terms. 2791eaf3e1SJohn Birrell */ 2891eaf3e1SJohn Birrell #include <sys/cdefs.h> 2991eaf3e1SJohn Birrell 3091eaf3e1SJohn Birrell #include <sys/param.h> 3191eaf3e1SJohn Birrell #include <sys/systm.h> 3291eaf3e1SJohn Birrell #include <sys/kernel.h> 3391eaf3e1SJohn Birrell #include <sys/stack.h> 3491eaf3e1SJohn Birrell #include <sys/pcpu.h> 3591eaf3e1SJohn Birrell 36*c6f5742fSRui Paulo #include <machine/frame.h> 3791eaf3e1SJohn Birrell #include <machine/md_var.h> 38*c6f5742fSRui Paulo #include <machine/pcb.h> 3991eaf3e1SJohn Birrell #include <machine/stack.h> 4091eaf3e1SJohn Birrell 4191eaf3e1SJohn Birrell #include <vm/vm.h> 4291eaf3e1SJohn Birrell #include <vm/vm_param.h> 4391eaf3e1SJohn Birrell #include <vm/pmap.h> 4491eaf3e1SJohn Birrell 45*c6f5742fSRui Paulo #include "regset.h" 46*c6f5742fSRui Paulo 4791eaf3e1SJohn Birrell extern uintptr_t kernbase; 4891eaf3e1SJohn Birrell uintptr_t kernelbase = (uintptr_t) &kernbase; 4991eaf3e1SJohn Birrell 5091eaf3e1SJohn Birrell #define INKERNEL(va) (((vm_offset_t)(va)) >= USRSTACK && \ 5191eaf3e1SJohn Birrell ((vm_offset_t)(va)) < VM_MAX_KERNEL_ADDRESS) 5291eaf3e1SJohn Birrell 5391eaf3e1SJohn Birrell uint8_t dtrace_fuword8_nocheck(void *); 5491eaf3e1SJohn Birrell uint16_t dtrace_fuword16_nocheck(void *); 5591eaf3e1SJohn Birrell uint32_t dtrace_fuword32_nocheck(void *); 5691eaf3e1SJohn Birrell uint64_t dtrace_fuword64_nocheck(void *); 5791eaf3e1SJohn Birrell 5891eaf3e1SJohn Birrell void 5991eaf3e1SJohn Birrell dtrace_getpcstack(pc_t *pcstack, int pcstack_limit, int aframes, 6091eaf3e1SJohn Birrell uint32_t *intrpc) 6191eaf3e1SJohn Birrell { 6291eaf3e1SJohn Birrell int depth = 0; 6391eaf3e1SJohn Birrell register_t ebp; 6491eaf3e1SJohn Birrell struct i386_frame *frame; 6591eaf3e1SJohn Birrell vm_offset_t callpc; 6691eaf3e1SJohn Birrell pc_t caller = (pc_t) solaris_cpu[curcpu].cpu_dtrace_caller; 6791eaf3e1SJohn Birrell 6891eaf3e1SJohn Birrell if (intrpc != 0) 6991eaf3e1SJohn Birrell pcstack[depth++] = (pc_t) intrpc; 7091eaf3e1SJohn Birrell 7191eaf3e1SJohn Birrell aframes++; 7291eaf3e1SJohn Birrell 7391eaf3e1SJohn Birrell __asm __volatile("movl %%ebp,%0" : "=r" (ebp)); 7491eaf3e1SJohn Birrell 7591eaf3e1SJohn Birrell frame = (struct i386_frame *)ebp; 7691eaf3e1SJohn Birrell while (depth < pcstack_limit) { 7791eaf3e1SJohn Birrell if (!INKERNEL(frame)) 7891eaf3e1SJohn Birrell break; 7991eaf3e1SJohn Birrell 8091eaf3e1SJohn Birrell callpc = frame->f_retaddr; 8191eaf3e1SJohn Birrell 8291eaf3e1SJohn Birrell if (!INKERNEL(callpc)) 8391eaf3e1SJohn Birrell break; 8491eaf3e1SJohn Birrell 8591eaf3e1SJohn Birrell if (aframes > 0) { 8691eaf3e1SJohn Birrell aframes--; 8791eaf3e1SJohn Birrell if ((aframes == 0) && (caller != 0)) { 8891eaf3e1SJohn Birrell pcstack[depth++] = caller; 8991eaf3e1SJohn Birrell } 9091eaf3e1SJohn Birrell } 9191eaf3e1SJohn Birrell else { 9291eaf3e1SJohn Birrell pcstack[depth++] = callpc; 9391eaf3e1SJohn Birrell } 9491eaf3e1SJohn Birrell 9591eaf3e1SJohn Birrell if (frame->f_frame <= frame || 9691eaf3e1SJohn Birrell (vm_offset_t)frame->f_frame >= 9791eaf3e1SJohn Birrell (vm_offset_t)ebp + KSTACK_PAGES * PAGE_SIZE) 9891eaf3e1SJohn Birrell break; 9991eaf3e1SJohn Birrell frame = frame->f_frame; 10091eaf3e1SJohn Birrell } 10191eaf3e1SJohn Birrell 10291eaf3e1SJohn Birrell for (; depth < pcstack_limit; depth++) { 10391eaf3e1SJohn Birrell pcstack[depth] = 0; 10491eaf3e1SJohn Birrell } 10591eaf3e1SJohn Birrell } 10691eaf3e1SJohn Birrell 10791eaf3e1SJohn Birrell static int 10891eaf3e1SJohn Birrell dtrace_getustack_common(uint64_t *pcstack, int pcstack_limit, uintptr_t pc, 10991eaf3e1SJohn Birrell uintptr_t sp) 11091eaf3e1SJohn Birrell { 111*c6f5742fSRui Paulo #ifdef notyet 11291eaf3e1SJohn Birrell proc_t *p = curproc; 113*c6f5742fSRui Paulo uintptr_t oldcontext = lwp->lwp_oldcontext; /* XXX signal stack. */ 114*c6f5742fSRui Paulo size_t s1, s2; 115*c6f5742fSRui Paulo #endif 11691eaf3e1SJohn Birrell volatile uint16_t *flags = 11791eaf3e1SJohn Birrell (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags; 11891eaf3e1SJohn Birrell int ret = 0; 11991eaf3e1SJohn Birrell 12091eaf3e1SJohn Birrell ASSERT(pcstack == NULL || pcstack_limit > 0); 12191eaf3e1SJohn Birrell 122*c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack. */ 12391eaf3e1SJohn Birrell if (p->p_model == DATAMODEL_NATIVE) { 12491eaf3e1SJohn Birrell s1 = sizeof (struct frame) + 2 * sizeof (long); 12591eaf3e1SJohn Birrell s2 = s1 + sizeof (siginfo_t); 12691eaf3e1SJohn Birrell } else { 12791eaf3e1SJohn Birrell s1 = sizeof (struct frame32) + 3 * sizeof (int); 12891eaf3e1SJohn Birrell s2 = s1 + sizeof (siginfo32_t); 12991eaf3e1SJohn Birrell } 130*c6f5742fSRui Paulo #endif 13191eaf3e1SJohn Birrell 132*c6f5742fSRui Paulo while (pc != 0) { 13391eaf3e1SJohn Birrell ret++; 13491eaf3e1SJohn Birrell if (pcstack != NULL) { 13591eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 13691eaf3e1SJohn Birrell pcstack_limit--; 13791eaf3e1SJohn Birrell if (pcstack_limit <= 0) 13891eaf3e1SJohn Birrell break; 13991eaf3e1SJohn Birrell } 14091eaf3e1SJohn Birrell 141*c6f5742fSRui Paulo if (sp == 0) 142*c6f5742fSRui Paulo break; 143*c6f5742fSRui Paulo 144*c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack. */ 14591eaf3e1SJohn Birrell if (oldcontext == sp + s1 || oldcontext == sp + s2) { 14691eaf3e1SJohn Birrell if (p->p_model == DATAMODEL_NATIVE) { 14791eaf3e1SJohn Birrell ucontext_t *ucp = (ucontext_t *)oldcontext; 14891eaf3e1SJohn Birrell greg_t *gregs = ucp->uc_mcontext.gregs; 14991eaf3e1SJohn Birrell 15091eaf3e1SJohn Birrell sp = dtrace_fulword(&gregs[REG_FP]); 15191eaf3e1SJohn Birrell pc = dtrace_fulword(&gregs[REG_PC]); 15291eaf3e1SJohn Birrell 15391eaf3e1SJohn Birrell oldcontext = dtrace_fulword(&ucp->uc_link); 15491eaf3e1SJohn Birrell } else { 15591eaf3e1SJohn Birrell ucontext32_t *ucp = (ucontext32_t *)oldcontext; 15691eaf3e1SJohn Birrell greg32_t *gregs = ucp->uc_mcontext.gregs; 15791eaf3e1SJohn Birrell 15891eaf3e1SJohn Birrell sp = dtrace_fuword32(&gregs[EBP]); 15991eaf3e1SJohn Birrell pc = dtrace_fuword32(&gregs[EIP]); 16091eaf3e1SJohn Birrell 16191eaf3e1SJohn Birrell oldcontext = dtrace_fuword32(&ucp->uc_link); 16291eaf3e1SJohn Birrell } 16391eaf3e1SJohn Birrell } else { 16491eaf3e1SJohn Birrell if (p->p_model == DATAMODEL_NATIVE) { 16591eaf3e1SJohn Birrell struct frame *fr = (struct frame *)sp; 16691eaf3e1SJohn Birrell 16791eaf3e1SJohn Birrell pc = dtrace_fulword(&fr->fr_savpc); 16891eaf3e1SJohn Birrell sp = dtrace_fulword(&fr->fr_savfp); 16991eaf3e1SJohn Birrell } else { 17091eaf3e1SJohn Birrell struct frame32 *fr = (struct frame32 *)sp; 17191eaf3e1SJohn Birrell 17291eaf3e1SJohn Birrell pc = dtrace_fuword32(&fr->fr_savpc); 17391eaf3e1SJohn Birrell sp = dtrace_fuword32(&fr->fr_savfp); 17491eaf3e1SJohn Birrell } 17591eaf3e1SJohn Birrell } 176*c6f5742fSRui Paulo #else 177*c6f5742fSRui Paulo pc = dtrace_fuword32((void *)(sp + 178*c6f5742fSRui Paulo offsetof(struct i386_frame, f_retaddr))); 179*c6f5742fSRui Paulo sp = dtrace_fuword32((void *)sp); 180*c6f5742fSRui Paulo #endif /* ! notyet */ 18191eaf3e1SJohn Birrell 18291eaf3e1SJohn Birrell /* 18391eaf3e1SJohn Birrell * This is totally bogus: if we faulted, we're going to clear 18491eaf3e1SJohn Birrell * the fault and break. This is to deal with the apparently 18591eaf3e1SJohn Birrell * broken Java stacks on x86. 18691eaf3e1SJohn Birrell */ 18791eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) { 18891eaf3e1SJohn Birrell *flags &= ~CPU_DTRACE_FAULT; 18991eaf3e1SJohn Birrell break; 19091eaf3e1SJohn Birrell } 19191eaf3e1SJohn Birrell } 19291eaf3e1SJohn Birrell 19391eaf3e1SJohn Birrell return (ret); 19491eaf3e1SJohn Birrell } 19591eaf3e1SJohn Birrell 19691eaf3e1SJohn Birrell void 19791eaf3e1SJohn Birrell dtrace_getupcstack(uint64_t *pcstack, int pcstack_limit) 19891eaf3e1SJohn Birrell { 19991eaf3e1SJohn Birrell proc_t *p = curproc; 200*c6f5742fSRui Paulo struct trapframe *tf; 201*c6f5742fSRui Paulo uintptr_t pc, sp, fp; 20291eaf3e1SJohn Birrell volatile uint16_t *flags = 20391eaf3e1SJohn Birrell (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags; 20491eaf3e1SJohn Birrell int n; 20591eaf3e1SJohn Birrell 20691eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) 20791eaf3e1SJohn Birrell return; 20891eaf3e1SJohn Birrell 20991eaf3e1SJohn Birrell if (pcstack_limit <= 0) 21091eaf3e1SJohn Birrell return; 21191eaf3e1SJohn Birrell 21291eaf3e1SJohn Birrell /* 21391eaf3e1SJohn Birrell * If there's no user context we still need to zero the stack. 21491eaf3e1SJohn Birrell */ 215*c6f5742fSRui Paulo if (p == NULL || (tf = curthread->td_frame) == NULL) 21691eaf3e1SJohn Birrell goto zero; 21791eaf3e1SJohn Birrell 21891eaf3e1SJohn Birrell *pcstack++ = (uint64_t)p->p_pid; 21991eaf3e1SJohn Birrell pcstack_limit--; 22091eaf3e1SJohn Birrell 22191eaf3e1SJohn Birrell if (pcstack_limit <= 0) 22291eaf3e1SJohn Birrell return; 22391eaf3e1SJohn Birrell 224*c6f5742fSRui Paulo pc = tf->tf_eip; 225*c6f5742fSRui Paulo fp = tf->tf_ebp; 226*c6f5742fSRui Paulo sp = tf->tf_esp; 22791eaf3e1SJohn Birrell 22891eaf3e1SJohn Birrell if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) { 229*c6f5742fSRui Paulo /* 230*c6f5742fSRui Paulo * In an entry probe. The frame pointer has not yet been 231*c6f5742fSRui Paulo * pushed (that happens in the function prologue). The 232*c6f5742fSRui Paulo * best approach is to add the current pc as a missing top 233*c6f5742fSRui Paulo * of stack and back the pc up to the caller, which is stored 234*c6f5742fSRui Paulo * at the current stack pointer address since the call 235*c6f5742fSRui Paulo * instruction puts it there right before the branch. 236*c6f5742fSRui Paulo */ 237*c6f5742fSRui Paulo 23891eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 23991eaf3e1SJohn Birrell pcstack_limit--; 24091eaf3e1SJohn Birrell if (pcstack_limit <= 0) 24191eaf3e1SJohn Birrell return; 24291eaf3e1SJohn Birrell 243*c6f5742fSRui Paulo pc = dtrace_fuword32((void *) sp); 24491eaf3e1SJohn Birrell } 24591eaf3e1SJohn Birrell 24691eaf3e1SJohn Birrell n = dtrace_getustack_common(pcstack, pcstack_limit, pc, sp); 24791eaf3e1SJohn Birrell ASSERT(n >= 0); 24891eaf3e1SJohn Birrell ASSERT(n <= pcstack_limit); 24991eaf3e1SJohn Birrell 25091eaf3e1SJohn Birrell pcstack += n; 25191eaf3e1SJohn Birrell pcstack_limit -= n; 25291eaf3e1SJohn Birrell 25391eaf3e1SJohn Birrell zero: 25491eaf3e1SJohn Birrell while (pcstack_limit-- > 0) 255*c6f5742fSRui Paulo *pcstack++ = 0; 25691eaf3e1SJohn Birrell } 25791eaf3e1SJohn Birrell 25891eaf3e1SJohn Birrell int 25991eaf3e1SJohn Birrell dtrace_getustackdepth(void) 26091eaf3e1SJohn Birrell { 261*c6f5742fSRui Paulo proc_t *p = curproc; 262*c6f5742fSRui Paulo struct trapframe *tf; 263*c6f5742fSRui Paulo uintptr_t pc, fp, sp; 264*c6f5742fSRui Paulo int n = 0; 265*c6f5742fSRui Paulo 266*c6f5742fSRui Paulo if (p == NULL || (tf = curthread->td_frame) == NULL) 267*c6f5742fSRui Paulo return (0); 268*c6f5742fSRui Paulo 269*c6f5742fSRui Paulo if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_FAULT)) 270*c6f5742fSRui Paulo return (-1); 271*c6f5742fSRui Paulo 272*c6f5742fSRui Paulo pc = tf->tf_eip; 273*c6f5742fSRui Paulo fp = tf->tf_ebp; 274*c6f5742fSRui Paulo sp = tf->tf_esp; 275*c6f5742fSRui Paulo 276*c6f5742fSRui Paulo if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) { 277*c6f5742fSRui Paulo /* 278*c6f5742fSRui Paulo * In an entry probe. The frame pointer has not yet been 279*c6f5742fSRui Paulo * pushed (that happens in the function prologue). The 280*c6f5742fSRui Paulo * best approach is to add the current pc as a missing top 281*c6f5742fSRui Paulo * of stack and back the pc up to the caller, which is stored 282*c6f5742fSRui Paulo * at the current stack pointer address since the call 283*c6f5742fSRui Paulo * instruction puts it there right before the branch. 284*c6f5742fSRui Paulo */ 285*c6f5742fSRui Paulo 286*c6f5742fSRui Paulo pc = dtrace_fuword32((void *) sp); 287*c6f5742fSRui Paulo n++; 288*c6f5742fSRui Paulo } 289*c6f5742fSRui Paulo 290*c6f5742fSRui Paulo n += dtrace_getustack_common(NULL, 0, pc, fp); 291*c6f5742fSRui Paulo 292*c6f5742fSRui Paulo return (n); 29391eaf3e1SJohn Birrell } 29491eaf3e1SJohn Birrell 29591eaf3e1SJohn Birrell void 29691eaf3e1SJohn Birrell dtrace_getufpstack(uint64_t *pcstack, uint64_t *fpstack, int pcstack_limit) 29791eaf3e1SJohn Birrell { 29891eaf3e1SJohn Birrell proc_t *p = curproc; 299*c6f5742fSRui Paulo struct trapframe *tf; 300*c6f5742fSRui Paulo uintptr_t pc, sp, fp; 30191eaf3e1SJohn Birrell volatile uint16_t *flags = 30291eaf3e1SJohn Birrell (volatile uint16_t *)&cpu_core[curcpu].cpuc_dtrace_flags; 303*c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */ 304*c6f5742fSRui Paulo uintptr_t oldcontext; 30591eaf3e1SJohn Birrell size_t s1, s2; 306*c6f5742fSRui Paulo #endif 30791eaf3e1SJohn Birrell 30891eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) 30991eaf3e1SJohn Birrell return; 31091eaf3e1SJohn Birrell 31191eaf3e1SJohn Birrell if (pcstack_limit <= 0) 31291eaf3e1SJohn Birrell return; 31391eaf3e1SJohn Birrell 31491eaf3e1SJohn Birrell /* 31591eaf3e1SJohn Birrell * If there's no user context we still need to zero the stack. 31691eaf3e1SJohn Birrell */ 317*c6f5742fSRui Paulo if (p == NULL || (tf = curthread->td_frame) == NULL) 31891eaf3e1SJohn Birrell goto zero; 31991eaf3e1SJohn Birrell 32091eaf3e1SJohn Birrell *pcstack++ = (uint64_t)p->p_pid; 32191eaf3e1SJohn Birrell pcstack_limit--; 32291eaf3e1SJohn Birrell 32391eaf3e1SJohn Birrell if (pcstack_limit <= 0) 32491eaf3e1SJohn Birrell return; 32591eaf3e1SJohn Birrell 326*c6f5742fSRui Paulo pc = tf->tf_eip; 327*c6f5742fSRui Paulo fp = tf->tf_ebp; 328*c6f5742fSRui Paulo sp = tf->tf_esp; 329*c6f5742fSRui Paulo 330*c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */ 33191eaf3e1SJohn Birrell oldcontext = lwp->lwp_oldcontext; 33291eaf3e1SJohn Birrell 33391eaf3e1SJohn Birrell if (p->p_model == DATAMODEL_NATIVE) { 33491eaf3e1SJohn Birrell s1 = sizeof (struct frame) + 2 * sizeof (long); 33591eaf3e1SJohn Birrell s2 = s1 + sizeof (siginfo_t); 33691eaf3e1SJohn Birrell } else { 33791eaf3e1SJohn Birrell s1 = sizeof (struct frame32) + 3 * sizeof (int); 33891eaf3e1SJohn Birrell s2 = s1 + sizeof (siginfo32_t); 33991eaf3e1SJohn Birrell } 340*c6f5742fSRui Paulo #endif 34191eaf3e1SJohn Birrell 34291eaf3e1SJohn Birrell if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY)) { 34391eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 34491eaf3e1SJohn Birrell *fpstack++ = 0; 34591eaf3e1SJohn Birrell pcstack_limit--; 34691eaf3e1SJohn Birrell if (pcstack_limit <= 0) 34791eaf3e1SJohn Birrell return; 34891eaf3e1SJohn Birrell 349*c6f5742fSRui Paulo pc = dtrace_fuword32((void *)sp); 35091eaf3e1SJohn Birrell } 35191eaf3e1SJohn Birrell 352*c6f5742fSRui Paulo while (pc != 0) { 35391eaf3e1SJohn Birrell *pcstack++ = (uint64_t)pc; 354*c6f5742fSRui Paulo *fpstack++ = fp; 35591eaf3e1SJohn Birrell pcstack_limit--; 35691eaf3e1SJohn Birrell if (pcstack_limit <= 0) 35791eaf3e1SJohn Birrell break; 35891eaf3e1SJohn Birrell 359*c6f5742fSRui Paulo if (fp == 0) 360*c6f5742fSRui Paulo break; 361*c6f5742fSRui Paulo 362*c6f5742fSRui Paulo #ifdef notyet /* XXX signal stack */ 36391eaf3e1SJohn Birrell if (oldcontext == sp + s1 || oldcontext == sp + s2) { 36491eaf3e1SJohn Birrell if (p->p_model == DATAMODEL_NATIVE) { 36591eaf3e1SJohn Birrell ucontext_t *ucp = (ucontext_t *)oldcontext; 36691eaf3e1SJohn Birrell greg_t *gregs = ucp->uc_mcontext.gregs; 36791eaf3e1SJohn Birrell 36891eaf3e1SJohn Birrell sp = dtrace_fulword(&gregs[REG_FP]); 36991eaf3e1SJohn Birrell pc = dtrace_fulword(&gregs[REG_PC]); 37091eaf3e1SJohn Birrell 37191eaf3e1SJohn Birrell oldcontext = dtrace_fulword(&ucp->uc_link); 37291eaf3e1SJohn Birrell } else { 37391eaf3e1SJohn Birrell ucontext_t *ucp = (ucontext_t *)oldcontext; 37491eaf3e1SJohn Birrell greg_t *gregs = ucp->uc_mcontext.gregs; 37591eaf3e1SJohn Birrell 37691eaf3e1SJohn Birrell sp = dtrace_fuword32(&gregs[EBP]); 37791eaf3e1SJohn Birrell pc = dtrace_fuword32(&gregs[EIP]); 37891eaf3e1SJohn Birrell 37991eaf3e1SJohn Birrell oldcontext = dtrace_fuword32(&ucp->uc_link); 38091eaf3e1SJohn Birrell } 381*c6f5742fSRui Paulo } else 382*c6f5742fSRui Paulo #endif /* XXX */ 383*c6f5742fSRui Paulo { 384*c6f5742fSRui Paulo pc = dtrace_fuword32((void *)(fp + 385*c6f5742fSRui Paulo offsetof(struct i386_frame, f_retaddr))); 386*c6f5742fSRui Paulo fp = dtrace_fuword32((void *)fp); 38791eaf3e1SJohn Birrell } 38891eaf3e1SJohn Birrell 38991eaf3e1SJohn Birrell /* 39091eaf3e1SJohn Birrell * This is totally bogus: if we faulted, we're going to clear 39191eaf3e1SJohn Birrell * the fault and break. This is to deal with the apparently 39291eaf3e1SJohn Birrell * broken Java stacks on x86. 39391eaf3e1SJohn Birrell */ 39491eaf3e1SJohn Birrell if (*flags & CPU_DTRACE_FAULT) { 39591eaf3e1SJohn Birrell *flags &= ~CPU_DTRACE_FAULT; 39691eaf3e1SJohn Birrell break; 39791eaf3e1SJohn Birrell } 39891eaf3e1SJohn Birrell } 39991eaf3e1SJohn Birrell 40091eaf3e1SJohn Birrell zero: 40191eaf3e1SJohn Birrell while (pcstack_limit-- > 0) 402*c6f5742fSRui Paulo *pcstack++ = 0; 40391eaf3e1SJohn Birrell } 40491eaf3e1SJohn Birrell 40591eaf3e1SJohn Birrell uint64_t 40691eaf3e1SJohn Birrell dtrace_getarg(int arg, int aframes) 40791eaf3e1SJohn Birrell { 40891eaf3e1SJohn Birrell uintptr_t val; 40991eaf3e1SJohn Birrell struct i386_frame *fp = (struct i386_frame *)dtrace_getfp(); 41091eaf3e1SJohn Birrell uintptr_t *stack; 41191eaf3e1SJohn Birrell int i; 41291eaf3e1SJohn Birrell 41391eaf3e1SJohn Birrell for (i = 1; i <= aframes; i++) { 41491eaf3e1SJohn Birrell fp = fp->f_frame; 41591eaf3e1SJohn Birrell 41691eaf3e1SJohn Birrell if (fp->f_retaddr == (long)dtrace_invop_callsite) { 41791eaf3e1SJohn Birrell /* 41891eaf3e1SJohn Birrell * If we pass through the invalid op handler, we will 41991eaf3e1SJohn Birrell * use the pointer that it passed to the stack as the 42091eaf3e1SJohn Birrell * second argument to dtrace_invop() as the pointer to 42191eaf3e1SJohn Birrell * the stack. When using this stack, we must step 42291eaf3e1SJohn Birrell * beyond the EIP/RIP that was pushed when the trap was 42391eaf3e1SJohn Birrell * taken -- hence the "+ 1" below. 42491eaf3e1SJohn Birrell */ 42591eaf3e1SJohn Birrell stack = ((uintptr_t **)&fp[1])[1] + 1; 42691eaf3e1SJohn Birrell goto load; 42791eaf3e1SJohn Birrell } 42891eaf3e1SJohn Birrell 42991eaf3e1SJohn Birrell } 43091eaf3e1SJohn Birrell 43191eaf3e1SJohn Birrell /* 43291eaf3e1SJohn Birrell * We know that we did not come through a trap to get into 43391eaf3e1SJohn Birrell * dtrace_probe() -- the provider simply called dtrace_probe() 43491eaf3e1SJohn Birrell * directly. As this is the case, we need to shift the argument 43591eaf3e1SJohn Birrell * that we're looking for: the probe ID is the first argument to 43691eaf3e1SJohn Birrell * dtrace_probe(), so the argument n will actually be found where 43791eaf3e1SJohn Birrell * one would expect to find argument (n + 1). 43891eaf3e1SJohn Birrell */ 43991eaf3e1SJohn Birrell arg++; 44091eaf3e1SJohn Birrell 44191eaf3e1SJohn Birrell stack = (uintptr_t *)&fp[1]; 44291eaf3e1SJohn Birrell 44391eaf3e1SJohn Birrell load: 44491eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT); 44591eaf3e1SJohn Birrell val = stack[arg]; 44691eaf3e1SJohn Birrell DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT); 44791eaf3e1SJohn Birrell 44891eaf3e1SJohn Birrell return (val); 44991eaf3e1SJohn Birrell } 45091eaf3e1SJohn Birrell 45191eaf3e1SJohn Birrell int 45291eaf3e1SJohn Birrell dtrace_getstackdepth(int aframes) 45391eaf3e1SJohn Birrell { 45491eaf3e1SJohn Birrell int depth = 0; 45591eaf3e1SJohn Birrell struct i386_frame *frame; 45691eaf3e1SJohn Birrell vm_offset_t ebp; 45791eaf3e1SJohn Birrell 45891eaf3e1SJohn Birrell aframes++; 45991eaf3e1SJohn Birrell ebp = dtrace_getfp(); 46091eaf3e1SJohn Birrell frame = (struct i386_frame *)ebp; 46191eaf3e1SJohn Birrell depth++; 46291eaf3e1SJohn Birrell for(;;) { 46391eaf3e1SJohn Birrell if (!INKERNEL((long) frame)) 46491eaf3e1SJohn Birrell break; 46591eaf3e1SJohn Birrell if (!INKERNEL((long) frame->f_frame)) 46691eaf3e1SJohn Birrell break; 46791eaf3e1SJohn Birrell depth++; 46891eaf3e1SJohn Birrell if (frame->f_frame <= frame || 46991eaf3e1SJohn Birrell (vm_offset_t)frame->f_frame >= 47091eaf3e1SJohn Birrell (vm_offset_t)ebp + KSTACK_PAGES * PAGE_SIZE) 47191eaf3e1SJohn Birrell break; 47291eaf3e1SJohn Birrell frame = frame->f_frame; 47391eaf3e1SJohn Birrell } 47491eaf3e1SJohn Birrell if (depth < aframes) 47591eaf3e1SJohn Birrell return 0; 47691eaf3e1SJohn Birrell else 47791eaf3e1SJohn Birrell return depth - aframes; 47891eaf3e1SJohn Birrell } 47991eaf3e1SJohn Birrell 48091eaf3e1SJohn Birrell ulong_t 481*c6f5742fSRui Paulo dtrace_getreg(struct trapframe *rp, uint_t reg) 48291eaf3e1SJohn Birrell { 483*c6f5742fSRui Paulo struct pcb *pcb; 484*c6f5742fSRui Paulo int regmap[] = { /* Order is dependent on reg.d */ 485*c6f5742fSRui Paulo REG_GS, /* 0 GS */ 486*c6f5742fSRui Paulo REG_FS, /* 1 FS */ 487*c6f5742fSRui Paulo REG_ES, /* 2 ES */ 488*c6f5742fSRui Paulo REG_DS, /* 3 DS */ 489*c6f5742fSRui Paulo REG_RDI, /* 4 EDI */ 490*c6f5742fSRui Paulo REG_RSI, /* 5 ESI */ 491*c6f5742fSRui Paulo REG_RBP, /* 6 EBP, REG_FP */ 492*c6f5742fSRui Paulo REG_RSP, /* 7 ESP */ 493*c6f5742fSRui Paulo REG_RBX, /* 8 EBX */ 494*c6f5742fSRui Paulo REG_RDX, /* 9 EDX, REG_R1 */ 495*c6f5742fSRui Paulo REG_RCX, /* 10 ECX */ 496*c6f5742fSRui Paulo REG_RAX, /* 11 EAX, REG_R0 */ 497*c6f5742fSRui Paulo REG_TRAPNO, /* 12 TRAPNO */ 498*c6f5742fSRui Paulo REG_ERR, /* 13 ERR */ 499*c6f5742fSRui Paulo REG_RIP, /* 14 EIP, REG_PC */ 500*c6f5742fSRui Paulo REG_CS, /* 15 CS */ 501*c6f5742fSRui Paulo REG_RFL, /* 16 EFL, REG_PS */ 502*c6f5742fSRui Paulo REG_RSP, /* 17 UESP, REG_SP */ 503*c6f5742fSRui Paulo REG_SS /* 18 SS */ 50491eaf3e1SJohn Birrell }; 50591eaf3e1SJohn Birrell 506*c6f5742fSRui Paulo if (reg > SS) { 507*c6f5742fSRui Paulo DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP); 508*c6f5742fSRui Paulo return (0); 509*c6f5742fSRui Paulo } 510*c6f5742fSRui Paulo 51191eaf3e1SJohn Birrell if (reg >= sizeof (regmap) / sizeof (int)) { 51291eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP); 51391eaf3e1SJohn Birrell return (0); 51491eaf3e1SJohn Birrell } 51591eaf3e1SJohn Birrell 51691eaf3e1SJohn Birrell reg = regmap[reg]; 51791eaf3e1SJohn Birrell 51891eaf3e1SJohn Birrell switch(reg) { 51991eaf3e1SJohn Birrell case REG_GS: 520*c6f5742fSRui Paulo if ((pcb = curthread->td_pcb) == NULL) { 521*c6f5742fSRui Paulo DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP); 522*c6f5742fSRui Paulo return (0); 523*c6f5742fSRui Paulo } 524*c6f5742fSRui Paulo return (pcb->pcb_gs); 525*c6f5742fSRui Paulo case REG_FS: 526*c6f5742fSRui Paulo return (rp->tf_fs); 527*c6f5742fSRui Paulo case REG_ES: 528*c6f5742fSRui Paulo return (rp->tf_es); 529*c6f5742fSRui Paulo case REG_DS: 530*c6f5742fSRui Paulo return (rp->tf_ds); 531*c6f5742fSRui Paulo case REG_RDI: 532*c6f5742fSRui Paulo return (rp->tf_edi); 533*c6f5742fSRui Paulo case REG_RSI: 534*c6f5742fSRui Paulo return (rp->tf_esi); 535*c6f5742fSRui Paulo case REG_RBP: 536*c6f5742fSRui Paulo return (rp->tf_ebp); 53791eaf3e1SJohn Birrell case REG_RSP: 538*c6f5742fSRui Paulo return (rp->tf_isp); 539*c6f5742fSRui Paulo case REG_RBX: 540*c6f5742fSRui Paulo return (rp->tf_ebx); 541*c6f5742fSRui Paulo case REG_RCX: 542*c6f5742fSRui Paulo return (rp->tf_ecx); 543*c6f5742fSRui Paulo case REG_RAX: 544*c6f5742fSRui Paulo return (rp->tf_eax); 545*c6f5742fSRui Paulo case REG_TRAPNO: 546*c6f5742fSRui Paulo return (rp->tf_trapno); 547*c6f5742fSRui Paulo case REG_ERR: 548*c6f5742fSRui Paulo return (rp->tf_err); 549*c6f5742fSRui Paulo case REG_RIP: 550*c6f5742fSRui Paulo return (rp->tf_eip); 551*c6f5742fSRui Paulo case REG_CS: 552*c6f5742fSRui Paulo return (rp->tf_cs); 553*c6f5742fSRui Paulo case REG_RFL: 554*c6f5742fSRui Paulo return (rp->tf_eflags); 555*c6f5742fSRui Paulo #if 0 556*c6f5742fSRui Paulo case REG_RSP: 557*c6f5742fSRui Paulo return (rp->tf_esp); 558*c6f5742fSRui Paulo #endif 559*c6f5742fSRui Paulo case REG_SS: 560*c6f5742fSRui Paulo return (rp->tf_ss); 56191eaf3e1SJohn Birrell default: 56291eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP); 56391eaf3e1SJohn Birrell return (0); 56491eaf3e1SJohn Birrell } 56591eaf3e1SJohn Birrell } 56691eaf3e1SJohn Birrell 56791eaf3e1SJohn Birrell static int 56891eaf3e1SJohn Birrell dtrace_copycheck(uintptr_t uaddr, uintptr_t kaddr, size_t size) 56991eaf3e1SJohn Birrell { 57091eaf3e1SJohn Birrell ASSERT(kaddr >= kernelbase && kaddr + size >= kaddr); 57191eaf3e1SJohn Birrell 57291eaf3e1SJohn Birrell if (uaddr + size >= kernelbase || uaddr + size < uaddr) { 57391eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 57491eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = uaddr; 57591eaf3e1SJohn Birrell return (0); 57691eaf3e1SJohn Birrell } 57791eaf3e1SJohn Birrell 57891eaf3e1SJohn Birrell return (1); 57991eaf3e1SJohn Birrell } 58091eaf3e1SJohn Birrell 58191eaf3e1SJohn Birrell void 58291eaf3e1SJohn Birrell dtrace_copyin(uintptr_t uaddr, uintptr_t kaddr, size_t size, 58391eaf3e1SJohn Birrell volatile uint16_t *flags) 58491eaf3e1SJohn Birrell { 58591eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 58691eaf3e1SJohn Birrell dtrace_copy(uaddr, kaddr, size); 58791eaf3e1SJohn Birrell } 58891eaf3e1SJohn Birrell 58991eaf3e1SJohn Birrell void 59091eaf3e1SJohn Birrell dtrace_copyout(uintptr_t kaddr, uintptr_t uaddr, size_t size, 59191eaf3e1SJohn Birrell volatile uint16_t *flags) 59291eaf3e1SJohn Birrell { 59391eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 59491eaf3e1SJohn Birrell dtrace_copy(kaddr, uaddr, size); 59591eaf3e1SJohn Birrell } 59691eaf3e1SJohn Birrell 59791eaf3e1SJohn Birrell void 59891eaf3e1SJohn Birrell dtrace_copyinstr(uintptr_t uaddr, uintptr_t kaddr, size_t size, 59991eaf3e1SJohn Birrell volatile uint16_t *flags) 60091eaf3e1SJohn Birrell { 60191eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 60291eaf3e1SJohn Birrell dtrace_copystr(uaddr, kaddr, size, flags); 60391eaf3e1SJohn Birrell } 60491eaf3e1SJohn Birrell 60591eaf3e1SJohn Birrell void 60691eaf3e1SJohn Birrell dtrace_copyoutstr(uintptr_t kaddr, uintptr_t uaddr, size_t size, 60791eaf3e1SJohn Birrell volatile uint16_t *flags) 60891eaf3e1SJohn Birrell { 60991eaf3e1SJohn Birrell if (dtrace_copycheck(uaddr, kaddr, size)) 61091eaf3e1SJohn Birrell dtrace_copystr(kaddr, uaddr, size, flags); 61191eaf3e1SJohn Birrell } 61291eaf3e1SJohn Birrell 61391eaf3e1SJohn Birrell uint8_t 61491eaf3e1SJohn Birrell dtrace_fuword8(void *uaddr) 61591eaf3e1SJohn Birrell { 61691eaf3e1SJohn Birrell if ((uintptr_t)uaddr >= kernelbase) { 61791eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 61891eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 61991eaf3e1SJohn Birrell return (0); 62091eaf3e1SJohn Birrell } 62191eaf3e1SJohn Birrell return (dtrace_fuword8_nocheck(uaddr)); 62291eaf3e1SJohn Birrell } 62391eaf3e1SJohn Birrell 62491eaf3e1SJohn Birrell uint16_t 62591eaf3e1SJohn Birrell dtrace_fuword16(void *uaddr) 62691eaf3e1SJohn Birrell { 62791eaf3e1SJohn Birrell if ((uintptr_t)uaddr >= kernelbase) { 62891eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 62991eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 63091eaf3e1SJohn Birrell return (0); 63191eaf3e1SJohn Birrell } 63291eaf3e1SJohn Birrell return (dtrace_fuword16_nocheck(uaddr)); 63391eaf3e1SJohn Birrell } 63491eaf3e1SJohn Birrell 63591eaf3e1SJohn Birrell uint32_t 63691eaf3e1SJohn Birrell dtrace_fuword32(void *uaddr) 63791eaf3e1SJohn Birrell { 63891eaf3e1SJohn Birrell if ((uintptr_t)uaddr >= kernelbase) { 63991eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 64091eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 64191eaf3e1SJohn Birrell return (0); 64291eaf3e1SJohn Birrell } 64391eaf3e1SJohn Birrell return (dtrace_fuword32_nocheck(uaddr)); 64491eaf3e1SJohn Birrell } 64591eaf3e1SJohn Birrell 64691eaf3e1SJohn Birrell uint64_t 64791eaf3e1SJohn Birrell dtrace_fuword64(void *uaddr) 64891eaf3e1SJohn Birrell { 64991eaf3e1SJohn Birrell if ((uintptr_t)uaddr >= kernelbase) { 65091eaf3e1SJohn Birrell DTRACE_CPUFLAG_SET(CPU_DTRACE_BADADDR); 65191eaf3e1SJohn Birrell cpu_core[curcpu].cpuc_dtrace_illval = (uintptr_t)uaddr; 65291eaf3e1SJohn Birrell return (0); 65391eaf3e1SJohn Birrell } 65491eaf3e1SJohn Birrell return (dtrace_fuword64_nocheck(uaddr)); 65591eaf3e1SJohn Birrell } 656