]> git.saurik.com Git - apple/xnu.git/blame - bsd/dev/dtrace/sdt.c
xnu-6153.141.1.tar.gz
[apple/xnu.git] / bsd / dev / dtrace / sdt.c
CommitLineData
2d21ac55
A
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21/*
6d2010ae 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
2d21ac55
A
23 * Use is subject to license terms.
24 */
25
2d21ac55
A
26#include <sys/param.h>
27#include <sys/systm.h>
28#include <sys/errno.h>
29#include <sys/stat.h>
30#include <sys/ioctl.h>
31#include <sys/conf.h>
32#include <sys/fcntl.h>
33#include <miscfs/devfs/devfs.h>
34
5ba3f43e
A
35#if CONFIG_EMBEDDED
36#include <arm/caches_internal.h>
37#endif
39236c6e 38
2d21ac55
A
39#include <sys/dtrace.h>
40#include <sys/dtrace_impl.h>
41
42#include <sys/dtrace_glue.h>
43
44#include <sys/sdt_impl.h>
6d2010ae 45extern int dtrace_kernel_symbol_mode;
2d21ac55 46
fe8ab488 47/* #include <machine/trap.h */
2d21ac55 48struct savearea_t; /* Used anonymously */
2d21ac55 49
5ba3f43e
A
50#if defined(__arm__)
51typedef kern_return_t (*perfCallback)(int, struct savearea_t *, __unused int, __unused int);
52extern perfCallback tempDTraceTrapHook;
53extern kern_return_t fbt_perfCallback(int, struct savearea_t *, __unused int, __unused int);
0a7de745
A
54#define SDT_PATCHVAL 0xdefc
55#define SDT_AFRAMES 7
5ba3f43e
A
56#elif defined(__arm64__)
57typedef kern_return_t (*perfCallback)(int, struct savearea_t *, __unused int, __unused int);
58extern perfCallback tempDTraceTrapHook;
59extern kern_return_t fbt_perfCallback(int, struct savearea_t *, __unused int, __unused int);
0a7de745
A
60#define SDT_PATCHVAL 0xe7eeee7e
61#define SDT_AFRAMES 7
5ba3f43e 62#elif defined(__x86_64__)
fe8ab488 63typedef kern_return_t (*perfCallback)(int, struct savearea_t *, uintptr_t *, int);
2d21ac55 64extern perfCallback tempDTraceTrapHook;
fe8ab488 65extern kern_return_t fbt_perfCallback(int, struct savearea_t *, uintptr_t *, int);
0a7de745
A
66#define SDT_PATCHVAL 0xf0
67#define SDT_AFRAMES 6
2d21ac55
A
68#else
69#error Unknown architecture
70#endif
71
0a7de745 72#define SDT_PROBETAB_SIZE 0x1000 /* 4k entries -- 16K total */
2d21ac55 73
b0d623f7 74#define DTRACE_PROBE_PREFIX "_dtrace_probe$"
b0d623f7 75
0a7de745
A
76static int sdt_verbose = 0;
77sdt_probe_t **sdt_probetab;
78int sdt_probetab_size;
79int sdt_probetab_mask;
2d21ac55
A
80
81/*ARGSUSED*/
82static void
83__sdt_provide_module(void *arg, struct modctl *ctl)
84{
85#pragma unused(arg)
6d2010ae 86 struct module *mp = (struct module *)ctl->mod_address;
2d21ac55
A
87 char *modname = ctl->mod_modname;
88 sdt_probedesc_t *sdpd;
89 sdt_probe_t *sdp, *old;
90 sdt_provider_t *prov;
91 int len;
92
93 /*
94 * One for all, and all for one: if we haven't yet registered all of
95 * our providers, we'll refuse to provide anything.
96 */
97 for (prov = sdt_providers; prov->sdtp_name != NULL; prov++) {
0a7de745 98 if (prov->sdtp_id == DTRACE_PROVNONE) {
2d21ac55 99 return;
0a7de745 100 }
2d21ac55
A
101 }
102
0a7de745 103 if (!mp || mp->sdt_nprobes != 0 || (sdpd = mp->sdt_probes) == NULL) {
2d21ac55 104 return;
0a7de745 105 }
2d21ac55
A
106
107 for (sdpd = mp->sdt_probes; sdpd != NULL; sdpd = sdpd->sdpd_next) {
0a7de745
A
108 const char *name = sdpd->sdpd_name, *func;
109 char *nname;
2d21ac55
A
110 int i, j;
111 dtrace_id_t id;
112
113 for (prov = sdt_providers; prov->sdtp_prefix != NULL; prov++) {
b0d623f7 114 const char *prefpart, *prefix = prov->sdtp_prefix;
2d21ac55
A
115
116 if ((prefpart = strstr(name, prefix))) {
117 name = prefpart + strlen(prefix);
118 break;
119 }
120 }
121
122 nname = kmem_alloc(len = strlen(name) + 1, KM_SLEEP);
123
124 for (i = 0, j = 0; name[j] != '\0'; i++) {
125 if (name[j] == '_' && name[j + 1] == '_') {
126 nname[i] = '-';
127 j += 2;
128 } else {
129 nname[i] = name[j++];
130 }
131 }
132
133 nname[i] = '\0';
134
0a7de745 135 sdp = kmem_zalloc(sizeof(sdt_probe_t), KM_SLEEP);
2d21ac55
A
136 sdp->sdp_loadcnt = ctl->mod_loadcnt;
137 sdp->sdp_ctl = ctl;
138 sdp->sdp_name = nname;
139 sdp->sdp_namelen = len;
140 sdp->sdp_provider = prov;
141
142 func = sdpd->sdpd_func;
143
0a7de745 144 if (func == NULL) {
2d21ac55 145 func = "<unknown>";
0a7de745 146 }
2d21ac55
A
147
148 /*
149 * We have our provider. Now create the probe.
150 */
151 if ((id = dtrace_probe_lookup(prov->sdtp_id, modname,
152 func, nname)) != DTRACE_IDNONE) {
153 old = dtrace_probe_arg(prov->sdtp_id, id);
154 ASSERT(old != NULL);
155
156 sdp->sdp_next = old->sdp_next;
157 sdp->sdp_id = id;
158 old->sdp_next = sdp;
159 } else {
160 sdp->sdp_id = dtrace_probe_create(prov->sdtp_id,
161 modname, func, nname, SDT_AFRAMES, sdp);
162
163 mp->sdt_nprobes++;
164 }
165
0a7de745
A
166#if 0
167 printf("__sdt_provide_module: sdpd=0x%p sdp=0x%p name=%s, id=%d\n", sdpd, sdp, nname, sdp->sdp_id);
168#endif
39236c6e 169
2d21ac55
A
170 sdp->sdp_hashnext =
171 sdt_probetab[SDT_ADDR2NDX(sdpd->sdpd_offset)];
172 sdt_probetab[SDT_ADDR2NDX(sdpd->sdpd_offset)] = sdp;
173
174 sdp->sdp_patchval = SDT_PATCHVAL;
175 sdp->sdp_patchpoint = (sdt_instr_t *)sdpd->sdpd_offset;
176 sdp->sdp_savedval = *sdp->sdp_patchpoint;
177 }
178}
179
180/*ARGSUSED*/
181static void
182sdt_destroy(void *arg, dtrace_id_t id, void *parg)
183{
184#pragma unused(arg,id)
185 sdt_probe_t *sdp = parg, *old, *last, *hash;
186 int ndx;
fe8ab488 187
2d21ac55 188#if !defined(__APPLE__)
fe8ab488
A
189 /*
190 * APPLE NOTE: sdt probes for kexts not yet implemented
191 */
2d21ac55
A
192 struct modctl *ctl = sdp->sdp_ctl;
193
194 if (ctl != NULL && ctl->mod_loadcnt == sdp->sdp_loadcnt) {
195 if ((ctl->mod_loadcnt == sdp->sdp_loadcnt &&
196 ctl->mod_loaded)) {
197 ((struct module *)(ctl->mod_mp))->sdt_nprobes--;
198 }
199 }
200#endif /* __APPLE__ */
201
202 while (sdp != NULL) {
203 old = sdp;
204
205 /*
206 * Now we need to remove this probe from the sdt_probetab.
207 */
208 ndx = SDT_ADDR2NDX(sdp->sdp_patchpoint);
209 last = NULL;
210 hash = sdt_probetab[ndx];
211
212 while (hash != sdp) {
213 ASSERT(hash != NULL);
214 last = hash;
215 hash = hash->sdp_hashnext;
216 }
217
218 if (last != NULL) {
219 last->sdp_hashnext = sdp->sdp_hashnext;
220 } else {
221 sdt_probetab[ndx] = sdp->sdp_hashnext;
222 }
223
224 kmem_free(sdp->sdp_name, sdp->sdp_namelen);
225 sdp = sdp->sdp_next;
0a7de745 226 kmem_free(old, sizeof(sdt_probe_t));
2d21ac55
A
227 }
228}
229
230/*ARGSUSED*/
6d2010ae 231static int
2d21ac55
A
232sdt_enable(void *arg, dtrace_id_t id, void *parg)
233{
234#pragma unused(arg,id)
235 sdt_probe_t *sdp = parg;
236 struct modctl *ctl = sdp->sdp_ctl;
237
2d21ac55
A
238 ctl->mod_nenabled++;
239
240 /*
241 * If this module has disappeared since we discovered its probes,
242 * refuse to enable it.
243 */
244 if (!ctl->mod_loaded) {
245 if (sdt_verbose) {
246 cmn_err(CE_NOTE, "sdt is failing for probe %s "
247 "(module %s unloaded)",
248 sdp->sdp_name, ctl->mod_modname);
249 }
250 goto err;
251 }
252
253 /*
254 * Now check that our modctl has the expected load count. If it
255 * doesn't, this module must have been unloaded and reloaded -- and
256 * we're not going to touch it.
257 */
258 if (ctl->mod_loadcnt != sdp->sdp_loadcnt) {
259 if (sdt_verbose) {
260 cmn_err(CE_NOTE, "sdt is failing for probe %s "
261 "(module %s reloaded)",
262 sdp->sdp_name, ctl->mod_modname);
263 }
264 goto err;
265 }
2d21ac55 266
2d21ac55
A
267 dtrace_casptr(&tempDTraceTrapHook, NULL, fbt_perfCallback);
268 if (tempDTraceTrapHook != (perfCallback)fbt_perfCallback) {
269 if (sdt_verbose) {
270 cmn_err(CE_NOTE, "sdt_enable is failing for probe %s "
271 "in module %s: tempDTraceTrapHook already occupied.",
272 sdp->sdp_name, ctl->mod_modname);
273 }
0a7de745 274 return 0;
2d21ac55
A
275 }
276
277 while (sdp != NULL) {
0a7de745
A
278 (void)ml_nofault_copy((vm_offset_t)&sdp->sdp_patchval, (vm_offset_t)sdp->sdp_patchpoint,
279 (vm_size_t)sizeof(sdp->sdp_patchval));
39037602
A
280
281 /*
282 * Make the patched instruction visible via a data + instruction
283 * cache fush on platforms that need it
284 */
0a7de745
A
285 flush_dcache((vm_offset_t)sdp->sdp_patchpoint, (vm_size_t)sizeof(sdp->sdp_patchval), 0);
286 invalidate_icache((vm_offset_t)sdp->sdp_patchpoint, (vm_size_t)sizeof(sdp->sdp_patchval), 0);
39037602 287
2d21ac55
A
288 sdp = sdp->sdp_next;
289 }
6d2010ae 290
2d21ac55 291err:
0a7de745 292 return 0;
2d21ac55
A
293}
294
295/*ARGSUSED*/
296static void
297sdt_disable(void *arg, dtrace_id_t id, void *parg)
298{
299#pragma unused(arg,id)
300 sdt_probe_t *sdp = parg;
2d21ac55
A
301 struct modctl *ctl = sdp->sdp_ctl;
302
303 ctl->mod_nenabled--;
304
0a7de745 305 if (!ctl->mod_loaded || ctl->mod_loadcnt != sdp->sdp_loadcnt) {
2d21ac55 306 goto err;
0a7de745 307 }
2d21ac55
A
308
309 while (sdp != NULL) {
0a7de745
A
310 (void)ml_nofault_copy((vm_offset_t)&sdp->sdp_savedval, (vm_offset_t)sdp->sdp_patchpoint,
311 (vm_size_t)sizeof(sdp->sdp_savedval));
39037602
A
312 /*
313 * Make the patched instruction visible via a data + instruction
314 * cache flush on platforms that need it
315 */
0a7de745
A
316 flush_dcache((vm_offset_t)sdp->sdp_patchpoint, (vm_size_t)sizeof(sdp->sdp_savedval), 0);
317 invalidate_icache((vm_offset_t)sdp->sdp_patchpoint, (vm_size_t)sizeof(sdp->sdp_savedval), 0);
2d21ac55
A
318 sdp = sdp->sdp_next;
319 }
320
321err:
322 ;
323}
324
325static dtrace_pops_t sdt_pops = {
0a7de745
A
326 .dtps_provide = NULL,
327 .dtps_provide_module = sdt_provide_module,
328 .dtps_enable = sdt_enable,
329 .dtps_disable = sdt_disable,
330 .dtps_suspend = NULL,
331 .dtps_resume = NULL,
332 .dtps_getargdesc = sdt_getargdesc,
333 .dtps_getargval = sdt_getarg,
334 .dtps_usermode = NULL,
335 .dtps_destroy = sdt_destroy,
2d21ac55
A
336};
337
338/*ARGSUSED*/
339static int
d9a64523 340sdt_attach(dev_info_t *devi)
2d21ac55 341{
2d21ac55
A
342 sdt_provider_t *prov;
343
344 if (ddi_create_minor_node(devi, "sdt", S_IFCHR,
345 0, DDI_PSEUDO, 0) == DDI_FAILURE) {
346 cmn_err(CE_NOTE, "/dev/sdt couldn't create minor node");
347 ddi_remove_minor_node(devi, NULL);
0a7de745 348 return DDI_FAILURE;
2d21ac55
A
349 }
350
0a7de745 351 if (sdt_probetab_size == 0) {
2d21ac55 352 sdt_probetab_size = SDT_PROBETAB_SIZE;
0a7de745 353 }
2d21ac55
A
354
355 sdt_probetab_mask = sdt_probetab_size - 1;
356 sdt_probetab =
0a7de745 357 kmem_zalloc(sdt_probetab_size * sizeof(sdt_probe_t *), KM_SLEEP);
2d21ac55
A
358 dtrace_invop_add(sdt_invop);
359
360 for (prov = sdt_providers; prov->sdtp_name != NULL; prov++) {
361 if (dtrace_register(prov->sdtp_name, prov->sdtp_attr,
362 DTRACE_PRIV_KERNEL, NULL,
363 &sdt_pops, prov, &prov->sdtp_id) != 0) {
364 cmn_err(CE_WARN, "failed to register sdt provider %s",
365 prov->sdtp_name);
366 }
367 }
368
0a7de745 369 return DDI_SUCCESS;
2d21ac55
A
370}
371
fe8ab488
A
372/*
373 * APPLE NOTE: sdt_detach not implemented
374 */
2d21ac55
A
375#if !defined(__APPLE__)
376/*ARGSUSED*/
377static int
378sdt_detach(dev_info_t *dip, ddi_detach_cmd_t cmd)
379{
380 sdt_provider_t *prov;
381
382 switch (cmd) {
383 case DDI_DETACH:
384 break;
385
386 case DDI_SUSPEND:
0a7de745 387 return DDI_SUCCESS;
2d21ac55
A
388
389 default:
0a7de745 390 return DDI_FAILURE;
2d21ac55
A
391 }
392
393 for (prov = sdt_providers; prov->sdtp_name != NULL; prov++) {
394 if (prov->sdtp_id != DTRACE_PROVNONE) {
0a7de745
A
395 if (dtrace_unregister(prov->sdtp_id) != 0) {
396 return DDI_FAILURE;
397 }
2d21ac55
A
398
399 prov->sdtp_id = DTRACE_PROVNONE;
400 }
401 }
402
403 dtrace_invop_remove(sdt_invop);
0a7de745 404 kmem_free(sdt_probetab, sdt_probetab_size * sizeof(sdt_probe_t *));
2d21ac55 405
0a7de745 406 return DDI_SUCCESS;
2d21ac55 407}
fe8ab488 408#endif /* __APPLE__ */
2d21ac55 409
2d21ac55
A
410d_open_t _sdt_open;
411
0a7de745
A
412int
413_sdt_open(dev_t dev, int flags, int devtype, struct proc *p)
2d21ac55
A
414{
415#pragma unused(dev,flags,devtype,p)
416 return 0;
417}
418
419#define SDT_MAJOR -24 /* let the kernel pick the device number */
420
421/*
422 * A struct describing which functions will get invoked for certain
423 * actions.
424 */
425static struct cdevsw sdt_cdevsw =
426{
0a7de745
A
427 _sdt_open, /* open */
428 eno_opcl, /* close */
429 eno_rdwrt, /* read */
430 eno_rdwrt, /* write */
431 eno_ioctl, /* ioctl */
2d21ac55
A
432 (stop_fcn_t *)nulldev, /* stop */
433 (reset_fcn_t *)nulldev, /* reset */
0a7de745
A
434 NULL, /* tty's */
435 eno_select, /* select */
436 eno_mmap, /* mmap */
437 eno_strat, /* strategy */
438 eno_getc, /* getc */
439 eno_putc, /* putc */
440 0 /* type */
2d21ac55
A
441};
442
2d21ac55
A
443static struct modctl g_sdt_kernctl;
444static struct module g_sdt_mach_module;
445
2d21ac55 446#include <mach-o/nlist.h>
b0d623f7 447#include <libkern/kernel_mach_header.h>
2d21ac55 448
0a7de745
A
449void
450sdt_early_init( void )
2d21ac55 451{
d9a64523
A
452 if (dtrace_sdt_probes_restricted()) {
453 return;
454 }
455 if (MH_MAGIC_KERNEL != _mh_execute_header.magic) {
456 g_sdt_kernctl.mod_address = (vm_address_t)NULL;
457 g_sdt_kernctl.mod_size = 0;
458 } else {
459 kernel_mach_header_t *mh;
460 struct load_command *cmd;
461 kernel_segment_command_t *orig_ts = NULL, *orig_le = NULL;
462 struct symtab_command *orig_st = NULL;
0a7de745 463 kernel_nlist_t *sym = NULL;
d9a64523 464 char *strings;
0a7de745
A
465 unsigned int i;
466
d9a64523
A
467 g_sdt_mach_module.sdt_nprobes = 0;
468 g_sdt_mach_module.sdt_probes = NULL;
0a7de745 469
d9a64523
A
470 g_sdt_kernctl.mod_address = (vm_address_t)&g_sdt_mach_module;
471 g_sdt_kernctl.mod_size = 0;
472 strncpy((char *)&(g_sdt_kernctl.mod_modname), "mach_kernel", KMOD_MAX_NAME);
0a7de745 473
d9a64523
A
474 g_sdt_kernctl.mod_next = NULL;
475 g_sdt_kernctl.mod_stale = NULL;
476 g_sdt_kernctl.mod_id = 0;
477 g_sdt_kernctl.mod_loadcnt = 1;
478 g_sdt_kernctl.mod_loaded = 1;
479 g_sdt_kernctl.mod_flags = 0;
480 g_sdt_kernctl.mod_nenabled = 0;
0a7de745 481
d9a64523
A
482 mh = &_mh_execute_header;
483 cmd = (struct load_command*) &mh[1];
484 for (i = 0; i < mh->ncmds; i++) {
485 if (cmd->cmd == LC_SEGMENT_KERNEL) {
486 kernel_segment_command_t *orig_sg = (kernel_segment_command_t *) cmd;
0a7de745
A
487
488 if (LIT_STRNEQL(orig_sg->segname, SEG_TEXT)) {
d9a64523 489 orig_ts = orig_sg;
0a7de745 490 } else if (LIT_STRNEQL(orig_sg->segname, SEG_LINKEDIT)) {
d9a64523 491 orig_le = orig_sg;
0a7de745 492 } else if (LIT_STRNEQL(orig_sg->segname, "")) {
d9a64523 493 orig_ts = orig_sg; /* kexts have a single unnamed segment */
0a7de745
A
494 }
495 } else if (cmd->cmd == LC_SYMTAB) {
d9a64523 496 orig_st = (struct symtab_command *) cmd;
0a7de745
A
497 }
498
d9a64523 499 cmd = (struct load_command *) ((uintptr_t) cmd + cmd->cmdsize);
2d21ac55 500 }
0a7de745
A
501
502 if ((orig_ts == NULL) || (orig_st == NULL) || (orig_le == NULL)) {
3e170ce0 503 return;
0a7de745
A
504 }
505
d9a64523
A
506 sym = (kernel_nlist_t *)(orig_le->vmaddr + orig_st->symoff - orig_le->fileoff);
507 strings = (char *)(orig_le->vmaddr + orig_st->stroff - orig_le->fileoff);
0a7de745 508
d9a64523
A
509 for (i = 0; i < orig_st->nsyms; i++) {
510 uint8_t n_type = sym[i].n_type & (N_TYPE | N_EXT);
511 char *name = strings + sym[i].n_un.n_strx;
512 const char *prev_name;
513 unsigned long best;
514 unsigned int j;
0a7de745 515
d9a64523 516 /* Check that the symbol is a global and that it has a name. */
0a7de745 517 if (((N_SECT | N_EXT) != n_type && (N_ABS | N_EXT) != n_type)) {
d9a64523 518 continue;
0a7de745
A
519 }
520
521 if (0 == sym[i].n_un.n_strx) { /* iff a null, "", name. */
d9a64523 522 continue;
0a7de745
A
523 }
524
d9a64523 525 /* Lop off omnipresent leading underscore. */
0a7de745 526 if (*name == '_') {
d9a64523 527 name += 1;
0a7de745
A
528 }
529
d9a64523
A
530 if (strncmp(name, DTRACE_PROBE_PREFIX, sizeof(DTRACE_PROBE_PREFIX) - 1) == 0) {
531 sdt_probedesc_t *sdpd = kmem_alloc(sizeof(sdt_probedesc_t), KM_SLEEP);
532 int len = strlen(name) + 1;
0a7de745 533
d9a64523
A
534 sdpd->sdpd_name = kmem_alloc(len, KM_SLEEP);
535 strncpy(sdpd->sdpd_name, name, len); /* NUL termination is ensured. */
0a7de745 536
d9a64523
A
537 prev_name = "<unknown>";
538 best = 0;
0a7de745 539
d9a64523
A
540 /*
541 * Find the symbol immediately preceding the sdt probe site just discovered,
542 * that symbol names the function containing the sdt probe.
543 */
544 for (j = 0; j < orig_st->nsyms; j++) {
545 uint8_t jn_type = sym[j].n_type & N_TYPE;
546 char *jname = strings + sym[j].n_un.n_strx;
547
0a7de745 548 if ((N_SECT != jn_type && N_ABS != jn_type)) {
d9a64523 549 continue;
0a7de745 550 }
d9a64523 551
0a7de745 552 if (0 == sym[j].n_un.n_strx) { /* iff a null, "", name. */
d9a64523 553 continue;
0a7de745 554 }
d9a64523 555
0a7de745 556 if (*jname == '_') {
d9a64523 557 jname += 1;
0a7de745 558 }
d9a64523 559
0a7de745 560 if (*(unsigned long *)sym[i].n_value <= (unsigned long)sym[j].n_value) {
d9a64523 561 continue;
0a7de745 562 }
d9a64523
A
563
564 if ((unsigned long)sym[j].n_value > best) {
565 best = (unsigned long)sym[j].n_value;
566 prev_name = jname;
2d21ac55 567 }
d9a64523
A
568 }
569
570 sdpd->sdpd_func = kmem_alloc((len = strlen(prev_name) + 1), KM_SLEEP);
571 strncpy(sdpd->sdpd_func, prev_name, len); /* NUL termination is ensured. */
0a7de745 572
d9a64523 573 sdpd->sdpd_offset = *(unsigned long *)sym[i].n_value;
5ba3f43e 574#if defined(__arm__)
d9a64523
A
575 /* PR8353094 - mask off thumb-bit */
576 sdpd->sdpd_offset &= ~0x1U;
5ba3f43e 577#elif defined(__arm64__)
d9a64523 578 sdpd->sdpd_offset &= ~0x1LU;
5ba3f43e 579#endif /* __arm__ */
39236c6e
A
580
581#if 0
d9a64523 582 printf("sdt_init: sdpd_offset=0x%lx, n_value=0x%lx, name=%s\n",
0a7de745 583 sdpd->sdpd_offset, *(unsigned long *)sym[i].n_value, name);
39236c6e
A
584#endif
585
d9a64523
A
586 sdpd->sdpd_next = g_sdt_mach_module.sdt_probes;
587 g_sdt_mach_module.sdt_probes = sdpd;
588 } else {
589 prev_name = name;
2d21ac55
A
590 }
591 }
d9a64523
A
592 }
593}
594
0a7de745
A
595void
596sdt_init( void )
d9a64523
A
597{
598 int majdevno = cdevsw_add(SDT_MAJOR, &sdt_cdevsw);
0a7de745 599
d9a64523
A
600 if (majdevno < 0) {
601 printf("sdt_init: failed to allocate a major number!\n");
602 return;
603 }
604
605 if (dtrace_sdt_probes_restricted()) {
606 return;
607 }
608
609 sdt_attach((dev_info_t*)(uintptr_t)majdevno);
2d21ac55 610}
b0d623f7 611
2d21ac55
A
612#undef SDT_MAJOR
613
614/*ARGSUSED*/
615void
616sdt_provide_module(void *arg, struct modctl *ctl)
617{
c910b4d9 618#pragma unused(arg)
6d2010ae
A
619 ASSERT(ctl != NULL);
620 ASSERT(dtrace_kernel_symbol_mode != DTRACE_KERNEL_SYMBOLS_NEVER);
5ba3f43e 621 LCK_MTX_ASSERT(&mod_lock, LCK_MTX_ASSERT_OWNED);
0a7de745
A
622
623 if (MOD_SDT_DONE(ctl)) {
6d2010ae 624 return;
0a7de745
A
625 }
626
6d2010ae
A
627 if (MOD_IS_MACH_KERNEL(ctl)) {
628 __sdt_provide_module(arg, &g_sdt_kernctl);
0a7de745 629
6d2010ae
A
630 sdt_probedesc_t *sdpd = g_sdt_mach_module.sdt_probes;
631 while (sdpd) {
632 sdt_probedesc_t *this_sdpd = sdpd;
633 kmem_free((void *)sdpd->sdpd_name, strlen(sdpd->sdpd_name) + 1);
634 kmem_free((void *)sdpd->sdpd_func, strlen(sdpd->sdpd_func) + 1);
635 sdpd = sdpd->sdpd_next;
636 kmem_free((void *)this_sdpd, sizeof(sdt_probedesc_t));
637 }
638 g_sdt_mach_module.sdt_probes = NULL;
639 } else {
fe8ab488
A
640 /*
641 * APPLE NOTE: sdt probes for kexts not yet implemented
642 */
2d21ac55 643 }
0a7de745 644
6d2010ae
A
645 /* Need to mark this module as completed */
646 ctl->mod_flags |= MODCTL_SDT_PROBES_PROVIDED;
2d21ac55 647}