4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
22 * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
23 * Use is subject to license terms.
26 /* #pragma ident "@(#)sdt.c 1.9 08/07/01 SMI" */
30 #define _KERNEL /* Solaris vs. Darwin */
34 #define MACH__POSIX_C_SOURCE_PRIVATE 1 /* pulls in suitable savearea from mach/ppc/thread_status.h */
35 #include <kern/cpu_data.h>
36 #include <kern/thread.h>
37 #include <mach/thread_status.h>
38 #include <mach/vm_param.h>
40 #include <sys/dtrace.h>
41 #include <sys/dtrace_impl.h>
43 #include <sys/dtrace_glue.h>
45 #include <sys/sdt_impl.h>
47 extern sdt_probe_t
**sdt_probetab
;
52 sdt_invop(uintptr_t addr
, uintptr_t *stack
, uintptr_t eax
)
55 uintptr_t stack0
= 0, stack1
= 0, stack2
= 0, stack3
= 0, stack4
= 0;
56 sdt_probe_t
*sdt
= sdt_probetab
[SDT_ADDR2NDX(addr
)];
58 for (; sdt
!= NULL
; sdt
= sdt
->sdp_hashnext
) {
59 if ((uintptr_t)sdt
->sdp_patchpoint
== addr
) {
62 stacktop
= (uintptr_t *)dtrace_get_cpu_int_stack_top();
64 stacktop
= (uintptr_t *)(dtrace_get_kernel_stack(current_thread()) + kernel_stack_size
);
66 if (stack
<= stacktop
)
68 if (stack
<= stacktop
)
70 if (stack
<= stacktop
)
72 if (stack
<= stacktop
)
74 if (stack
<= stacktop
)
77 dtrace_probe(sdt
->sdp_id
, stack0
, stack1
, stack2
, stack3
, stack4
);
79 return (DTRACE_INVOP_NOP
);
85 #elif defined(__x86_64__)
88 sdt_invop(uintptr_t addr
, uintptr_t *stack
, uintptr_t eax
)
91 sdt_probe_t
*sdt
= sdt_probetab
[SDT_ADDR2NDX(addr
)];
93 for (; sdt
!= NULL
; sdt
= sdt
->sdp_hashnext
) {
94 if ((uintptr_t)sdt
->sdp_patchpoint
== addr
) {
95 x86_saved_state64_t
*regs
= (x86_saved_state64_t
*)stack
;
97 dtrace_probe(sdt
->sdp_id
, regs
->rdi
, regs
->rsi
, regs
->rdx
, regs
->rcx
, regs
->r8
);
99 return (DTRACE_INVOP_NOP
);
111 struct frame
*backchain
;
117 sdt_getarg(void *arg
, dtrace_id_t id
, void *parg
, int argno
, int aframes
)
119 #pragma unused(arg, id, parg)
121 struct frame
*fp
= (struct frame
*)__builtin_frame_address(0);
126 #if defined(__x86_64__)
128 * A total of 6 arguments are passed via registers; any argument with
129 * index of 5 or lower is therefore in a register.
134 for (i
= 1; i
<= aframes
; i
++) {
138 if (dtrace_invop_callsite_pre
!= NULL
139 && pc
> (uintptr_t)dtrace_invop_callsite_pre
140 && pc
<= (uintptr_t)dtrace_invop_callsite_post
) {
141 #if defined(__i386__)
143 * If we pass through the invalid op handler, we will
144 * use the pointer that it passed to the stack as the
145 * second argument to dtrace_invop() as the pointer to
146 * the frame we're hunting for.
149 stack
= (uintptr_t *)&fp
[1]; /* Find marshalled arguments */
150 fp
= (struct frame
*)stack
[1]; /* Grab *second* argument */
151 stack
= (uintptr_t *)&fp
[0]; /* Find marshalled arguments */
152 #elif defined(__x86_64__)
154 * In the case of x86_64, we will use the pointer to the
155 * save area structure that was pushed when we took the
156 * trap. To get this structure, we must increment
157 * beyond the frame structure. If the
158 * argument that we're seeking is passed on the stack,
159 * we'll pull the true stack pointer out of the saved
160 * registers and decrement our argument by the number
161 * of arguments passed in registers; if the argument
162 * we're seeking is passed in regsiters, we can just
166 /* fp points to frame of dtrace_invop() activation. */
167 fp
= fp
->backchain
; /* to fbt_perfcallback() activation. */
168 fp
= fp
->backchain
; /* to kernel_trap() activation. */
169 fp
= fp
->backchain
; /* to trap_from_kernel() activation. */
171 x86_saved_state_t
*tagged_regs
= (x86_saved_state_t
*)&fp
[1];
172 x86_saved_state64_t
*saved_state
= saved_state64(tagged_regs
);
174 if (argno
<= inreg
) {
175 stack
= (uintptr_t *)&saved_state
->rdi
;
177 fp
= (struct frame
*)(saved_state
->isf
.rsp
);
178 stack
= (uintptr_t *)&fp
[0]; /* Find marshalled
190 * We know that we did not come through a trap to get into
191 * dtrace_probe() -- We arrive here when the provider has
192 * called dtrace_probe() directly.
193 * The probe ID is the first argument to dtrace_probe().
194 * We must advance beyond that to get the argX.
196 argno
++; /* Advance past probeID */
198 #if defined(__x86_64__)
199 if (argno
<= inreg
) {
201 * This shouldn't happen. If the argument is passed in a
202 * register then it should have been, well, passed in a
205 DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP
);
209 argno
-= (inreg
+ 1);
211 stack
= (uintptr_t *)&fp
[1]; /* Find marshalled arguments */
214 DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT
);
215 /* dtrace_probe arguments arg0 ... arg4 are 64bits wide */
216 val
= (uint64_t)(*(((uintptr_t *)stack
) + argno
));
217 DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT
);