2  * Copyright (c) 2005-2018 Apple Computer, Inc. All rights reserved. 
   4  * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ 
   6  * This file contains Original Code and/or Modifications of Original Code 
   7  * as defined in and that are subject to the Apple Public Source License 
   8  * Version 2.0 (the 'License'). You may not use this file except in 
   9  * compliance with the License. The rights granted to you under the License 
  10  * may not be used to create, or enable the creation or redistribution of, 
  11  * unlawful or unlicensed copies of an Apple operating system, or to 
  12  * circumvent, violate, or enable the circumvention or violation of, any 
  13  * terms of an Apple operating system software license agreement. 
  15  * Please obtain a copy of the License at 
  16  * http://www.opensource.apple.com/apsl/ and read it before using this file. 
  18  * The Original Code and all software distributed under the License are 
  19  * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER 
  20  * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, 
  21  * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, 
  22  * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. 
  23  * Please see the License for the specific language governing rights and 
  24  * limitations under the License. 
  26  * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ 
  29 #include <arm/caches_internal.h> 
  30 #include <arm/proc_reg.h> 
  32 #include <kern/thread.h> 
  33 #include <mach/thread_status.h> 
  37 #include <sys/malloc.h> 
  39 #include <sys/systm.h> 
  41 #include <sys/proc_internal.h> 
  42 #include <sys/kauth.h> 
  43 #include <sys/dtrace.h> 
  44 #include <sys/dtrace_impl.h> 
  45 #include <machine/atomic.h> 
  46 #include <kern/simple_lock.h> 
  47 #include <kern/sched_prim.h>            /* for thread_wakeup() */ 
  48 #include <kern/thread_call.h> 
  49 #include <kern/task.h> 
  50 #include <miscfs/devfs/devfs.h> 
  51 #include <mach/vm_param.h> 
  53 extern struct arm_saved_state 
*find_kern_regs(thread_t
); 
  55 extern dtrace_id_t      dtrace_probeid_error
;   /* special ERROR probe */ 
  56 typedef arm_saved_state_t savearea_t
; 
  58 int dtrace_arm_condition_true(int condition
, int cpsr
); 
  61  * Atomicity and synchronization 
  64 dtrace_membar_producer(void) 
  66         __asm__ 
volatile ("dmb ish" : : : "memory"); 
  70 dtrace_membar_consumer(void) 
  72         __asm__ 
volatile ("dmb ish" : : : "memory"); 
  76  * Interrupt manipulation 
  77  * XXX dtrace_getipl() can be called from probe context. 
  83          * XXX Drat, get_interrupt_level is MACH_KERNEL_PRIVATE 
  84          * in osfmk/kern/cpu_data.h 
  86         /* return get_interrupt_level(); */ 
  87         return ml_at_interrupt_context() ? 1 : 0; 
  94 static LCK_MTX_DECLARE_ATTR(dt_xc_lock
, &dtrace_lck_grp
, &dtrace_lck_attr
); 
  95 static uint32_t dt_xc_sync
; 
  97 typedef struct xcArg 
{ 
 106         xcArg_t 
*pArg 
= (xcArg_t 
*) foo
; 
 108         if (pArg
->cpu 
== CPU
->cpu_id 
|| pArg
->cpu 
== DTRACE_CPUALL
) { 
 109                 (pArg
->f
)(pArg
->arg
); 
 112         if (os_atomic_dec(&dt_xc_sync
, relaxed
) == 0) { 
 113                 thread_wakeup((event_t
) &dt_xc_sync
); 
 118  * dtrace_xcall() is not called from probe context. 
 121 dtrace_xcall(processorid_t cpu
, dtrace_xcall_t f
, void *arg
) 
 123         /* Only one dtrace_xcall in flight allowed */ 
 124         lck_mtx_lock(&dt_xc_lock
); 
 132         cpu_broadcast_xcall(&dt_xc_sync
, TRUE
, xcRemote
, (void*) &xcArg
); 
 134         lck_mtx_unlock(&dt_xc_lock
); 
 142 dtrace_getreg(struct regs 
* savearea
, uint_t reg
) 
 144         struct arm_saved_state 
*regs 
= (struct arm_saved_state 
*) savearea
; 
 146                 DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP
); 
 149         /* beyond register limit? */ 
 150         if (reg 
> ARM_SAVED_STATE32_COUNT 
- 1) { 
 151                 DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP
); 
 155         return (uint64_t) ((unsigned int *) (&(regs
->r
)))[reg
]; 
 159 dtrace_getvmreg(uint_t ndx
) 
 162         DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP
); 
 166 #define RETURN_OFFSET 4 
 169 dtrace_getustack_common(uint64_t * pcstack
, int pcstack_limit
, user_addr_t pc
, 
 172         volatile uint16_t *flags 
= (volatile uint16_t *) &cpu_core
[CPU
->cpu_id
].cpuc_dtrace_flags
; 
 175         ASSERT(pcstack 
== NULL 
|| pcstack_limit 
> 0); 
 179                 if (pcstack 
!= NULL
) { 
 180                         *pcstack
++ = (uint64_t) pc
; 
 182                         if (pcstack_limit 
<= 0) { 
 191                 pc 
= dtrace_fuword32((sp 
+ RETURN_OFFSET
)); 
 192                 sp 
= dtrace_fuword32(sp
); 
 194                 /* Truncate ustack if the iterator causes fault. */ 
 195                 if (*flags 
& CPU_DTRACE_FAULT
) { 
 196                         *flags 
&= ~CPU_DTRACE_FAULT
; 
 205 dtrace_getupcstack(uint64_t * pcstack
, int pcstack_limit
) 
 207         thread_t        thread 
= current_thread(); 
 210         volatile uint16_t *flags 
= (volatile uint16_t *) &cpu_core
[CPU
->cpu_id
].cpuc_dtrace_flags
; 
 213         if (*flags 
& CPU_DTRACE_FAULT
) { 
 217         if (pcstack_limit 
<= 0) { 
 222          * If there's no user context we still need to zero the stack. 
 224         if (thread 
== NULL
) { 
 228         regs 
= (savearea_t 
*) find_user_regs(thread
); 
 233         *pcstack
++ = (uint64_t)dtrace_proc_selfpid(); 
 236         if (pcstack_limit 
<= 0) { 
 243         if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY
)) { 
 244                 *pcstack
++ = (uint64_t) pc
; 
 246                 if (pcstack_limit 
<= 0) { 
 253         n 
= dtrace_getustack_common(pcstack
, pcstack_limit
, pc
, regs
->r
[7]); 
 256         ASSERT(n 
<= pcstack_limit
); 
 262         while (pcstack_limit
-- > 0) { 
 268 dtrace_getustackdepth(void) 
 270         thread_t        thread 
= current_thread(); 
 275         if (thread 
== NULL
) { 
 279         if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_FAULT
)) { 
 283         regs 
= (savearea_t 
*) find_user_regs(thread
); 
 291         if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY
)) { 
 297          * Note that unlike ppc, the arm code does not use 
 298          * CPU_DTRACE_USTACK_FP. This is because arm always 
 299          * traces from the sp, even in syscall/profile/fbt 
 303         n 
+= dtrace_getustack_common(NULL
, 0, pc
, regs
->r
[7]); 
 309 dtrace_getufpstack(uint64_t * pcstack
, uint64_t * fpstack
, int pcstack_limit
) 
 311         /* XXX ARMTODO 64vs32 */ 
 312         thread_t        thread 
= current_thread(); 
 316         volatile        uint16_t  *flags 
= (volatile uint16_t *) &cpu_core
[CPU
->cpu_id
].cpuc_dtrace_flags
; 
 319         uintptr_t oldcontext
; 
 323         if (*flags 
& CPU_DTRACE_FAULT
) { 
 327         if (pcstack_limit 
<= 0) { 
 332          * If there's no user context we still need to zero the stack. 
 334         if (thread 
== NULL
) { 
 338         regs 
= (savearea_t 
*) find_user_regs(thread
); 
 343         *pcstack
++ = (uint64_t)dtrace_proc_selfpid(); 
 346         if (pcstack_limit 
<= 0) { 
 353 #if 0                           /* XXX signal stack crawl */ 
 354         oldcontext 
= lwp
->lwp_oldcontext
; 
 356         if (p
->p_model 
== DATAMODEL_NATIVE
) { 
 357                 s1 
= sizeof(struct frame
) + 2 * sizeof(long); 
 358                 s2 
= s1 
+ sizeof(siginfo_t
); 
 360                 s1 
= sizeof(struct frame32
) + 3 * sizeof(int); 
 361                 s2 
= s1 
+ sizeof(siginfo32_t
); 
 365         if (DTRACE_CPUFLAG_ISSET(CPU_DTRACE_ENTRY
)) { 
 366                 *pcstack
++ = (uint64_t) pc
; 
 369                 if (pcstack_limit 
<= 0) { 
 373                 pc 
= dtrace_fuword32(sp
); 
 375         while (pc 
!= 0 && sp 
!= 0) { 
 376                 *pcstack
++ = (uint64_t) pc
; 
 379                 if (pcstack_limit 
<= 0) { 
 383 #if 0                           /* XXX signal stack crawl */ 
 384                 if (oldcontext 
== sp 
+ s1 
|| oldcontext 
== sp 
+ s2
) { 
 385                         if (p
->p_model 
== DATAMODEL_NATIVE
) { 
 386                                 ucontext_t     
*ucp 
= (ucontext_t 
*) oldcontext
; 
 387                                 greg_t         
*gregs 
= ucp
->uc_mcontext
.gregs
; 
 389                                 sp 
= dtrace_fulword(&gregs
[REG_FP
]); 
 390                                 pc 
= dtrace_fulword(&gregs
[REG_PC
]); 
 392                                 oldcontext 
= dtrace_fulword(&ucp
->uc_link
); 
 394                                 ucontext_t     
*ucp 
= (ucontext_t 
*) oldcontext
; 
 395                                 greg_t         
*gregs 
= ucp
->uc_mcontext
.gregs
; 
 397                                 sp 
= dtrace_fuword32(&gregs
[EBP
]); 
 398                                 pc 
= dtrace_fuword32(&gregs
[EIP
]); 
 400                                 oldcontext 
= dtrace_fuword32(&ucp
->uc_link
); 
 405                         pc 
= dtrace_fuword32((sp 
+ RETURN_OFFSET
)); 
 406                         sp 
= dtrace_fuword32(sp
); 
 409                 /* Truncate ustack if the iterator causes fault. */ 
 410                 if (*flags 
& CPU_DTRACE_FAULT
) { 
 411                         *flags 
&= ~CPU_DTRACE_FAULT
; 
 417         while (pcstack_limit
-- > 0) { 
 423 dtrace_getpcstack(pc_t 
* pcstack
, int pcstack_limit
, int aframes
, 
 426         struct frame   
*fp 
= (struct frame 
*) __builtin_frame_address(0); 
 427         struct frame   
*nextfp
, *minfp
, *stacktop
; 
 432         uintptr_t       caller 
= CPU
->cpu_dtrace_caller
; 
 434         if ((on_intr 
= CPU_ON_INTR(CPU
)) != 0) { 
 435                 stacktop 
= (struct frame 
*) dtrace_get_cpu_int_stack_top(); 
 437                 stacktop 
= (struct frame 
*) (dtrace_get_kernel_stack(current_thread()) + kernel_stack_size
); 
 444         if (intrpc 
!= NULL 
&& depth 
< pcstack_limit
) { 
 445                 pcstack
[depth
++] = (pc_t
) intrpc
; 
 448         while (depth 
< pcstack_limit
) { 
 449                 nextfp 
= *(struct frame 
**) fp
; 
 450                 pc 
= *(uintptr_t *) (((uint32_t) fp
) + RETURN_OFFSET
); 
 452                 if (nextfp 
<= minfp 
|| nextfp 
>= stacktop
) { 
 455                                  * Hop from interrupt stack to thread stack. 
 457                                 arm_saved_state_t 
*arm_kern_regs 
= (arm_saved_state_t 
*) find_kern_regs(current_thread()); 
 459                                         nextfp 
= (struct frame 
*)arm_kern_regs
->r
[7]; 
 461                                         vm_offset_t kstack_base 
= dtrace_get_kernel_stack(current_thread()); 
 463                                         minfp 
= (struct frame 
*)kstack_base
; 
 464                                         stacktop 
= (struct frame 
*)(kstack_base 
+ kernel_stack_size
); 
 468                                         if (nextfp 
<= minfp 
|| nextfp 
>= stacktop
) { 
 473                                          * If this thread was on the interrupt stack, but did not 
 474                                          * take an interrupt (i.e, the idle thread), there is no 
 475                                          * explicit saved state for us to use. 
 481                                  * This is the last frame we can process; indicate 
 482                                  * that we should return after processing this frame. 
 488                         if (--aframes 
== 0 && caller 
!= (uintptr_t)NULL
) { 
 490                                  * We've just run out of artificial frames, 
 491                                  * and we have a valid caller -- fill it in 
 494                                 ASSERT(depth 
< pcstack_limit
); 
 495                                 pcstack
[depth
++] = (pc_t
) caller
; 
 496                                 caller 
= (uintptr_t)NULL
; 
 499                         if (depth 
< pcstack_limit
) { 
 500                                 pcstack
[depth
++] = (pc_t
) pc
; 
 505                         while (depth 
< pcstack_limit
) { 
 506                                 pcstack
[depth
++] = (pc_t
) NULL
; 
 516 dtrace_instr_size(uint32_t instr
, int thumb_mode
) 
 519                 uint16_t instr16 
= *(uint16_t*) &instr
; 
 520                 if (((instr16 
>> 11) & 0x1F) > 0x1C) { 
 531 dtrace_getarg(int arg
, int aframes
, dtrace_mstate_t 
*mstate
, dtrace_vstate_t 
*vstate
) 
 533 #pragma unused(arg, aframes, mstate, vstate) 
 537         uintptr_t *fp 
= (uintptr_t *)__builtin_frame_address(0); 
 542         for (i 
= 1; i 
<= aframes
; i
++) { 
 546                 if (dtrace_invop_callsite_pre 
!= NULL
 
 547                     && pc 
> (uintptr_t)dtrace_invop_callsite_pre
 
 548                     && pc 
<= (uintptr_t)dtrace_invop_callsite_post
) { 
 550                          * If we pass through the invalid op handler, we will 
 551                          * use the pointer that it passed to the stack as the 
 552                          * second argument to dtrace_invop() as the pointer to 
 553                          * the frame we're hunting for. 
 556                         stack 
= (uintptr_t *)&fp
[1]; /* Find marshalled arguments */ 
 557                         fp 
= (struct frame 
*)stack
[1]; /* Grab *second* argument */ 
 558                         stack 
= (uintptr_t *)&fp
[1]; /* Find marshalled arguments */ 
 559                         DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT
); 
 560                         val 
= (uint64_t)(stack
[arg
]); 
 561                         DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT
); 
 567          * Arrive here when provider has called dtrace_probe directly. 
 569         stack 
= (uintptr_t *)&fp
[1]; /* Find marshalled arguments */ 
 570         stack
++; /* Advance past probeID */ 
 572         DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT
); 
 573         val 
= *(((uint64_t *)stack
) + arg
); /* dtrace_probe arguments arg0 .. arg4 are 64bits wide */ 
 574         DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT
); 
 577         return 0xfeedfacedeafbeadLL
; 
 581 dtrace_probe_error(dtrace_state_t 
*state
, dtrace_epid_t epid
, int which
, 
 582     int fltoffs
, int fault
, uint64_t illval
) 
 586          * For the case of the error probe firing lets 
 587          * stash away "illval" here, and special-case retrieving it in DIF_VARIABLE_ARG. 
 589         state
->dts_arg_error_illval 
= illval
; 
 590         dtrace_probe( dtrace_probeid_error
, (uint64_t)(uintptr_t)state
, epid
, which
, fltoffs
, fault 
); 
 594 dtrace_toxic_ranges(void (*func
)(uintptr_t base
, uintptr_t limit
)) 
 596         /* XXX ARMTODO check copied from ppc/x86*/ 
 598          * "base" is the smallest toxic address in the range, "limit" is the first 
 599          * VALID address greater than "base". 
 601         func(0x0, VM_MIN_KERNEL_ADDRESS
); 
 602         if (VM_MAX_KERNEL_ADDRESS 
< ~(uintptr_t)0) { 
 603                 func(VM_MAX_KERNEL_ADDRESS 
+ 1, ~(uintptr_t)0); 
 608 dtrace_arm_condition_true(int cond
, int cpsr
) 
 611         int zf 
= (cpsr 
& PSR_ZF
) ? 1 : 0, 
 612             nf 
= (cpsr 
& PSR_NF
) ? 1 : 0, 
 613             cf 
= (cpsr 
& PSR_CF
) ? 1 : 0, 
 614             vf 
= (cpsr 
& PSR_VF
) ? 1 : 0; 
 617         case 0: taken 
= zf
; break; 
 618         case 1: taken 
= !zf
; break; 
 619         case 2: taken 
= cf
; break; 
 620         case 3: taken 
= !cf
; break; 
 621         case 4: taken 
= nf
; break; 
 622         case 5: taken 
= !nf
; break; 
 623         case 6: taken 
= vf
; break; 
 624         case 7: taken 
= !vf
; break; 
 625         case 8: taken 
= (cf 
&& !zf
); break; 
 626         case 9: taken 
= (!cf 
|| zf
); break; 
 627         case 10: taken 
= (nf 
== vf
); break; 
 628         case 11: taken 
= (nf 
!= vf
); break; 
 629         case 12: taken 
= (!zf 
&& (nf 
== vf
)); break; 
 630         case 13: taken 
= (zf 
|| (nf 
!= vf
)); break; 
 631         case 14: taken 
= 1; break; 
 632         case 15: taken 
= 1; break;         /* always "true" for ARM, unpredictable for THUMB. */ 
 639 dtrace_flush_caches(void) 
 641         /* TODO There were some problems with flushing just the cache line that had been modified. 
 642          * For now, we'll flush the entire cache, until we figure out how to flush just the patched block. 
 645         InvalidatePoU_Icache();