fbt.c revision 1.12 1 1.12 christos /* $NetBSD: fbt.c,v 1.12 2013/03/03 18:18:13 christos Exp $ */
2 1.2 darran
3 1.1 darran /*
4 1.1 darran * CDDL HEADER START
5 1.1 darran *
6 1.1 darran * The contents of this file are subject to the terms of the
7 1.1 darran * Common Development and Distribution License (the "License").
8 1.1 darran * You may not use this file except in compliance with the License.
9 1.1 darran *
10 1.1 darran * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
11 1.1 darran * or http://www.opensolaris.org/os/licensing.
12 1.1 darran * See the License for the specific language governing permissions
13 1.1 darran * and limitations under the License.
14 1.1 darran *
15 1.1 darran * When distributing Covered Code, include this CDDL HEADER in each
16 1.1 darran * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
17 1.1 darran * If applicable, add the following below this CDDL HEADER, with the
18 1.1 darran * fields enclosed by brackets "[]" replaced with your own identifying
19 1.1 darran * information: Portions Copyright [yyyy] [name of copyright owner]
20 1.1 darran *
21 1.1 darran * CDDL HEADER END
22 1.1 darran *
23 1.1 darran * Portions Copyright 2006-2008 John Birrell jb (at) freebsd.org
24 1.3 darran * Portions Copyright 2010 Darran Hunt darran (at) NetBSD.org
25 1.1 darran *
26 1.1 darran * $FreeBSD: src/sys/cddl/dev/fbt/fbt.c,v 1.1.4.1 2009/08/03 08:13:06 kensmith Exp $
27 1.1 darran *
28 1.1 darran */
29 1.1 darran
30 1.1 darran /*
31 1.1 darran * Copyright 2006 Sun Microsystems, Inc. All rights reserved.
32 1.1 darran * Use is subject to license terms.
33 1.1 darran */
34 1.1 darran
35 1.1 darran #include <sys/cdefs.h>
36 1.1 darran #include <sys/param.h>
37 1.1 darran #include <sys/systm.h>
38 1.1 darran #include <sys/conf.h>
39 1.1 darran #include <sys/cpuvar.h>
40 1.1 darran #include <sys/fcntl.h>
41 1.1 darran #include <sys/filio.h>
42 1.1 darran #include <sys/kernel.h>
43 1.1 darran #include <sys/kmem.h>
44 1.5 christos #include <sys/ksyms.h>
45 1.3 darran #include <sys/cpu.h>
46 1.1 darran #include <sys/kthread.h>
47 1.1 darran #include <sys/limits.h>
48 1.1 darran #include <sys/linker.h>
49 1.1 darran #include <sys/lock.h>
50 1.1 darran #include <sys/malloc.h>
51 1.1 darran #include <sys/module.h>
52 1.1 darran #include <sys/mutex.h>
53 1.1 darran #include <sys/poll.h>
54 1.1 darran #include <sys/proc.h>
55 1.1 darran #include <sys/selinfo.h>
56 1.1 darran #include <sys/syscall.h>
57 1.1 darran #include <sys/uio.h>
58 1.1 darran #include <sys/unistd.h>
59 1.1 darran
60 1.3 darran #include <machine/cpu.h>
61 1.3 darran #include <machine/cpufunc.h>
62 1.3 darran #include <machine/specialreg.h>
63 1.3 darran #if 0
64 1.3 darran #include <x86/cpuvar.h>
65 1.3 darran #endif
66 1.3 darran #include <x86/cputypes.h>
67 1.3 darran
68 1.3 darran #define ELFSIZE ARCH_ELFSIZE
69 1.3 darran #include <sys/exec_elf.h>
70 1.3 darran
71 1.1 darran #include <sys/dtrace.h>
72 1.1 darran #include <sys/dtrace_bsd.h>
73 1.3 darran #include <sys/kern_ctf.h>
74 1.7 tron #include <sys/dtrace_impl.h>
75 1.3 darran
76 1.3 darran mod_ctf_t *modptr;
77 1.1 darran
78 1.1 darran MALLOC_DEFINE(M_FBT, "fbt", "Function Boundary Tracing");
79 1.1 darran
80 1.1 darran #define FBT_PUSHL_EBP 0x55
81 1.1 darran #define FBT_MOVL_ESP_EBP0_V0 0x8b
82 1.1 darran #define FBT_MOVL_ESP_EBP1_V0 0xec
83 1.1 darran #define FBT_MOVL_ESP_EBP0_V1 0x89
84 1.1 darran #define FBT_MOVL_ESP_EBP1_V1 0xe5
85 1.1 darran #define FBT_REX_RSP_RBP 0x48
86 1.1 darran
87 1.1 darran #define FBT_POPL_EBP 0x5d
88 1.1 darran #define FBT_RET 0xc3
89 1.1 darran #define FBT_RET_IMM16 0xc2
90 1.1 darran #define FBT_LEAVE 0xc9
91 1.1 darran
92 1.1 darran #ifdef __amd64__
93 1.1 darran #define FBT_PATCHVAL 0xcc
94 1.1 darran #else
95 1.1 darran #define FBT_PATCHVAL 0xf0
96 1.1 darran #endif
97 1.1 darran
98 1.3 darran static dev_type_open(fbt_open);
99 1.1 darran static int fbt_unload(void);
100 1.1 darran static void fbt_getargdesc(void *, dtrace_id_t, void *, dtrace_argdesc_t *);
101 1.3 darran static void fbt_provide_module(void *, dtrace_modctl_t *);
102 1.1 darran static void fbt_destroy(void *, dtrace_id_t, void *);
103 1.3 darran static int fbt_enable(void *, dtrace_id_t, void *);
104 1.1 darran static void fbt_disable(void *, dtrace_id_t, void *);
105 1.3 darran static void fbt_load(void);
106 1.1 darran static void fbt_suspend(void *, dtrace_id_t, void *);
107 1.1 darran static void fbt_resume(void *, dtrace_id_t, void *);
108 1.1 darran
109 1.1 darran #define FBT_ENTRY "entry"
110 1.1 darran #define FBT_RETURN "return"
111 1.1 darran #define FBT_ADDR2NDX(addr) ((((uintptr_t)(addr)) >> 4) & fbt_probetab_mask)
112 1.1 darran #define FBT_PROBETAB_SIZE 0x8000 /* 32k entries -- 128K total */
113 1.1 darran
114 1.3 darran static const struct cdevsw fbt_cdevsw = {
115 1.3 darran fbt_open, noclose, noread, nowrite, noioctl,
116 1.3 darran nostop, notty, nopoll, nommap, nokqfilter,
117 1.3 darran D_OTHER
118 1.1 darran };
119 1.1 darran
120 1.1 darran static dtrace_pattr_t fbt_attr = {
121 1.1 darran { DTRACE_STABILITY_EVOLVING, DTRACE_STABILITY_EVOLVING, DTRACE_CLASS_COMMON },
122 1.1 darran { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_UNKNOWN },
123 1.1 darran { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_ISA },
124 1.1 darran { DTRACE_STABILITY_EVOLVING, DTRACE_STABILITY_EVOLVING, DTRACE_CLASS_COMMON },
125 1.1 darran { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_ISA },
126 1.1 darran };
127 1.1 darran
128 1.1 darran static dtrace_pops_t fbt_pops = {
129 1.1 darran NULL,
130 1.1 darran fbt_provide_module,
131 1.1 darran fbt_enable,
132 1.1 darran fbt_disable,
133 1.1 darran fbt_suspend,
134 1.1 darran fbt_resume,
135 1.1 darran fbt_getargdesc,
136 1.1 darran NULL,
137 1.1 darran NULL,
138 1.1 darran fbt_destroy
139 1.1 darran };
140 1.1 darran
141 1.1 darran typedef struct fbt_probe {
142 1.1 darran struct fbt_probe *fbtp_hashnext;
143 1.1 darran uint8_t *fbtp_patchpoint;
144 1.1 darran int8_t fbtp_rval;
145 1.1 darran uint8_t fbtp_patchval;
146 1.1 darran uint8_t fbtp_savedval;
147 1.1 darran uintptr_t fbtp_roffset;
148 1.1 darran dtrace_id_t fbtp_id;
149 1.1 darran const char *fbtp_name;
150 1.3 darran dtrace_modctl_t *fbtp_ctl;
151 1.1 darran int fbtp_loadcnt;
152 1.1 darran int fbtp_primary;
153 1.1 darran int fbtp_invop_cnt;
154 1.1 darran int fbtp_symindx;
155 1.1 darran struct fbt_probe *fbtp_next;
156 1.1 darran } fbt_probe_t;
157 1.1 darran
158 1.5 christos #ifdef notyet
159 1.1 darran static struct cdev *fbt_cdev;
160 1.5 christos static int fbt_verbose = 0;
161 1.5 christos #endif
162 1.1 darran static dtrace_provider_id_t fbt_id;
163 1.1 darran static fbt_probe_t **fbt_probetab;
164 1.1 darran static int fbt_probetab_size;
165 1.1 darran static int fbt_probetab_mask;
166 1.1 darran
167 1.1 darran static void
168 1.1 darran fbt_doubletrap(void)
169 1.1 darran {
170 1.1 darran fbt_probe_t *fbt;
171 1.1 darran int i;
172 1.1 darran
173 1.1 darran for (i = 0; i < fbt_probetab_size; i++) {
174 1.1 darran fbt = fbt_probetab[i];
175 1.1 darran
176 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
177 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_savedval;
178 1.1 darran }
179 1.1 darran }
180 1.1 darran
181 1.3 darran
182 1.1 darran static int
183 1.1 darran fbt_invop(uintptr_t addr, uintptr_t *stack, uintptr_t rval)
184 1.1 darran {
185 1.11 chs solaris_cpu_t *cpu = &solaris_cpu[cpu_number()];
186 1.1 darran uintptr_t stack0, stack1, stack2, stack3, stack4;
187 1.1 darran fbt_probe_t *fbt = fbt_probetab[FBT_ADDR2NDX(addr)];
188 1.1 darran
189 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_hashnext) {
190 1.1 darran if ((uintptr_t)fbt->fbtp_patchpoint == addr) {
191 1.1 darran fbt->fbtp_invop_cnt++;
192 1.1 darran if (fbt->fbtp_roffset == 0) {
193 1.1 darran int i = 0;
194 1.1 darran /*
195 1.1 darran * When accessing the arguments on the stack,
196 1.1 darran * we must protect against accessing beyond
197 1.1 darran * the stack. We can safely set NOFAULT here
198 1.1 darran * -- we know that interrupts are already
199 1.1 darran * disabled.
200 1.1 darran */
201 1.1 darran DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT);
202 1.11 chs cpu->cpu_dtrace_caller = stack[i++];
203 1.1 darran stack0 = stack[i++];
204 1.1 darran stack1 = stack[i++];
205 1.1 darran stack2 = stack[i++];
206 1.1 darran stack3 = stack[i++];
207 1.1 darran stack4 = stack[i++];
208 1.1 darran DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT |
209 1.1 darran CPU_DTRACE_BADADDR);
210 1.1 darran
211 1.1 darran dtrace_probe(fbt->fbtp_id, stack0, stack1,
212 1.1 darran stack2, stack3, stack4);
213 1.1 darran
214 1.11 chs cpu->cpu_dtrace_caller = 0;
215 1.1 darran } else {
216 1.1 darran #ifdef __amd64__
217 1.1 darran /*
218 1.1 darran * On amd64, we instrument the ret, not the
219 1.1 darran * leave. We therefore need to set the caller
220 1.1 darran * to assure that the top frame of a stack()
221 1.1 darran * action is correct.
222 1.1 darran */
223 1.1 darran DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT);
224 1.11 chs cpu->cpu_dtrace_caller = stack[0];
225 1.1 darran DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT |
226 1.1 darran CPU_DTRACE_BADADDR);
227 1.1 darran #endif
228 1.1 darran
229 1.1 darran dtrace_probe(fbt->fbtp_id, fbt->fbtp_roffset,
230 1.1 darran rval, 0, 0, 0);
231 1.11 chs cpu->cpu_dtrace_caller = 0;
232 1.1 darran }
233 1.1 darran
234 1.1 darran return (fbt->fbtp_rval);
235 1.1 darran }
236 1.1 darran }
237 1.1 darran
238 1.1 darran return (0);
239 1.1 darran }
240 1.1 darran
241 1.1 darran static int
242 1.3 darran fbt_provide_module_cb(const char *name, int symindx, void *value,
243 1.4 darran uint32_t symsize, int type, void *opaque)
244 1.1 darran {
245 1.1 darran fbt_probe_t *fbt, *retfbt;
246 1.3 darran u_int8_t *instr, *limit;
247 1.3 darran dtrace_modctl_t *mod = opaque;
248 1.3 darran const char *modname = mod->mod_info->mi_name;
249 1.1 darran int j;
250 1.4 darran int size;
251 1.3 darran
252 1.3 darran /* got a function? */
253 1.3 darran if (ELF_ST_TYPE(type) != STT_FUNC) {
254 1.3 darran return 0;
255 1.3 darran }
256 1.1 darran
257 1.1 darran if (strncmp(name, "dtrace_", 7) == 0 &&
258 1.1 darran strncmp(name, "dtrace_safe_", 12) != 0) {
259 1.1 darran /*
260 1.1 darran * Anything beginning with "dtrace_" may be called
261 1.1 darran * from probe context unless it explicitly indicates
262 1.1 darran * that it won't be called from probe context by
263 1.1 darran * using the prefix "dtrace_safe_".
264 1.1 darran */
265 1.1 darran return (0);
266 1.1 darran }
267 1.1 darran
268 1.1 darran if (name[0] == '_' && name[1] == '_')
269 1.1 darran return (0);
270 1.1 darran
271 1.10 yamt /*
272 1.10 yamt * Exclude some more symbols which can be called from probe context.
273 1.10 yamt */
274 1.10 yamt if (strcmp(name, "x86_curcpu") == 0 /* CPU */
275 1.10 yamt || strcmp(name, "x86_curlwp") == 0 /* curproc, curlwp, curthread */
276 1.10 yamt || strcmp(name, "cpu_index") == 0 /* cpu_number, curcpu_id */
277 1.10 yamt || strncmp(name, "db_", 3) == 0 /* debugger */
278 1.10 yamt || strncmp(name, "ddb_", 4) == 0 /* debugger */
279 1.10 yamt || strncmp(name, "kdb_", 4) == 0 /* debugger */
280 1.10 yamt || strncmp(name, "lockdebug_", 10) == 0 /* lockdebug XXX for now */
281 1.10 yamt || strncmp(name, "kauth_", 5) == 0 /* CRED XXX for now */
282 1.10 yamt ) {
283 1.10 yamt return 0;
284 1.10 yamt }
285 1.10 yamt
286 1.3 darran instr = (u_int8_t *) value;
287 1.4 darran limit = (u_int8_t *) value + symsize;
288 1.1 darran
289 1.1 darran #ifdef __amd64__
290 1.1 darran while (instr < limit) {
291 1.1 darran if (*instr == FBT_PUSHL_EBP)
292 1.1 darran break;
293 1.1 darran
294 1.1 darran if ((size = dtrace_instr_size(instr)) <= 0)
295 1.1 darran break;
296 1.1 darran
297 1.1 darran instr += size;
298 1.1 darran }
299 1.1 darran
300 1.1 darran if (instr >= limit || *instr != FBT_PUSHL_EBP) {
301 1.1 darran /*
302 1.1 darran * We either don't save the frame pointer in this
303 1.1 darran * function, or we ran into some disassembly
304 1.1 darran * screw-up. Either way, we bail.
305 1.1 darran */
306 1.1 darran return (0);
307 1.1 darran }
308 1.1 darran #else
309 1.3 darran if (instr[0] != FBT_PUSHL_EBP) {
310 1.1 darran return (0);
311 1.3 darran }
312 1.1 darran
313 1.1 darran if (!(instr[1] == FBT_MOVL_ESP_EBP0_V0 &&
314 1.1 darran instr[2] == FBT_MOVL_ESP_EBP1_V0) &&
315 1.1 darran !(instr[1] == FBT_MOVL_ESP_EBP0_V1 &&
316 1.3 darran instr[2] == FBT_MOVL_ESP_EBP1_V1)) {
317 1.1 darran return (0);
318 1.3 darran }
319 1.1 darran #endif
320 1.1 darran fbt = malloc(sizeof (fbt_probe_t), M_FBT, M_WAITOK | M_ZERO);
321 1.1 darran fbt->fbtp_name = name;
322 1.1 darran fbt->fbtp_id = dtrace_probe_create(fbt_id, modname,
323 1.1 darran name, FBT_ENTRY, 3, fbt);
324 1.1 darran fbt->fbtp_patchpoint = instr;
325 1.3 darran fbt->fbtp_ctl = mod;
326 1.3 darran /* fbt->fbtp_loadcnt = lf->loadcnt; */
327 1.1 darran fbt->fbtp_rval = DTRACE_INVOP_PUSHL_EBP;
328 1.1 darran fbt->fbtp_savedval = *instr;
329 1.1 darran fbt->fbtp_patchval = FBT_PATCHVAL;
330 1.1 darran fbt->fbtp_symindx = symindx;
331 1.1 darran
332 1.1 darran fbt->fbtp_hashnext = fbt_probetab[FBT_ADDR2NDX(instr)];
333 1.1 darran fbt_probetab[FBT_ADDR2NDX(instr)] = fbt;
334 1.3 darran mod->mod_fbtentries++;
335 1.1 darran
336 1.3 darran retfbt = NULL;
337 1.1 darran
338 1.3 darran while (instr < limit) {
339 1.3 darran if (instr >= limit)
340 1.3 darran return (0);
341 1.1 darran
342 1.3 darran /*
343 1.3 darran * If this disassembly fails, then we've likely walked off into
344 1.3 darran * a jump table or some other unsuitable area. Bail out of the
345 1.3 darran * disassembly now.
346 1.3 darran */
347 1.3 darran if ((size = dtrace_instr_size(instr)) <= 0)
348 1.3 darran return (0);
349 1.1 darran
350 1.1 darran #ifdef __amd64__
351 1.3 darran /*
352 1.3 darran * We only instrument "ret" on amd64 -- we don't yet instrument
353 1.3 darran * ret imm16, largely because the compiler doesn't seem to
354 1.3 darran * (yet) emit them in the kernel...
355 1.3 darran */
356 1.3 darran if (*instr != FBT_RET) {
357 1.3 darran instr += size;
358 1.3 darran continue;
359 1.3 darran }
360 1.1 darran #else
361 1.3 darran if (!(size == 1 &&
362 1.3 darran (*instr == FBT_POPL_EBP || *instr == FBT_LEAVE) &&
363 1.3 darran (*(instr + 1) == FBT_RET ||
364 1.3 darran *(instr + 1) == FBT_RET_IMM16))) {
365 1.3 darran instr += size;
366 1.3 darran continue;
367 1.3 darran }
368 1.1 darran #endif
369 1.1 darran
370 1.3 darran /*
371 1.3 darran * We (desperately) want to avoid erroneously instrumenting a
372 1.3 darran * jump table, especially given that our markers are pretty
373 1.3 darran * short: two bytes on x86, and just one byte on amd64. To
374 1.3 darran * determine if we're looking at a true instruction sequence
375 1.3 darran * or an inline jump table that happens to contain the same
376 1.3 darran * byte sequences, we resort to some heuristic sleeze: we
377 1.3 darran * treat this instruction as being contained within a pointer,
378 1.3 darran * and see if that pointer points to within the body of the
379 1.3 darran * function. If it does, we refuse to instrument it.
380 1.3 darran */
381 1.3 darran for (j = 0; j < sizeof (uintptr_t); j++) {
382 1.3 darran caddr_t check = (caddr_t) instr - j;
383 1.3 darran uint8_t *ptr;
384 1.1 darran
385 1.3 darran if (check < (caddr_t)value)
386 1.3 darran break;
387 1.1 darran
388 1.3 darran if (check + sizeof (caddr_t) > (caddr_t)limit)
389 1.3 darran continue;
390 1.1 darran
391 1.3 darran ptr = *(uint8_t **)check;
392 1.1 darran
393 1.3 darran if (ptr >= (uint8_t *) value && ptr < limit) {
394 1.3 darran instr += size;
395 1.3 darran continue;
396 1.3 darran }
397 1.1 darran }
398 1.1 darran
399 1.3 darran /*
400 1.3 darran * We have a winner!
401 1.3 darran */
402 1.3 darran fbt = malloc(sizeof (fbt_probe_t), M_FBT, M_WAITOK | M_ZERO);
403 1.3 darran fbt->fbtp_name = name;
404 1.1 darran
405 1.3 darran if (retfbt == NULL) {
406 1.3 darran fbt->fbtp_id = dtrace_probe_create(fbt_id, modname,
407 1.3 darran name, FBT_RETURN, 3, fbt);
408 1.3 darran } else {
409 1.3 darran retfbt->fbtp_next = fbt;
410 1.3 darran fbt->fbtp_id = retfbt->fbtp_id;
411 1.3 darran }
412 1.1 darran
413 1.3 darran retfbt = fbt;
414 1.3 darran fbt->fbtp_patchpoint = instr;
415 1.3 darran fbt->fbtp_ctl = mod;
416 1.3 darran /* fbt->fbtp_loadcnt = lf->loadcnt; */
417 1.3 darran fbt->fbtp_symindx = symindx;
418 1.1 darran
419 1.1 darran #ifndef __amd64__
420 1.3 darran if (*instr == FBT_POPL_EBP) {
421 1.3 darran fbt->fbtp_rval = DTRACE_INVOP_POPL_EBP;
422 1.3 darran } else {
423 1.3 darran ASSERT(*instr == FBT_LEAVE);
424 1.3 darran fbt->fbtp_rval = DTRACE_INVOP_LEAVE;
425 1.3 darran }
426 1.3 darran fbt->fbtp_roffset =
427 1.3 darran (uintptr_t)(instr - (uint8_t *) value) + 1;
428 1.1 darran
429 1.1 darran #else
430 1.3 darran ASSERT(*instr == FBT_RET);
431 1.3 darran fbt->fbtp_rval = DTRACE_INVOP_RET;
432 1.3 darran fbt->fbtp_roffset =
433 1.3 darran (uintptr_t)(instr - (uint8_t *) value);
434 1.1 darran #endif
435 1.1 darran
436 1.3 darran fbt->fbtp_savedval = *instr;
437 1.3 darran fbt->fbtp_patchval = FBT_PATCHVAL;
438 1.3 darran fbt->fbtp_hashnext = fbt_probetab[FBT_ADDR2NDX(instr)];
439 1.3 darran fbt_probetab[FBT_ADDR2NDX(instr)] = fbt;
440 1.3 darran
441 1.3 darran mod->mod_fbtentries++;
442 1.1 darran
443 1.3 darran instr += size;
444 1.3 darran }
445 1.1 darran
446 1.3 darran return 0;
447 1.1 darran }
448 1.1 darran
449 1.1 darran static void
450 1.3 darran fbt_provide_module(void *arg, dtrace_modctl_t *mod)
451 1.1 darran {
452 1.1 darran char modname[MAXPATHLEN];
453 1.1 darran int i;
454 1.1 darran size_t len;
455 1.1 darran
456 1.3 darran strlcpy(modname, mod->mod_info->mi_name, sizeof(modname));
457 1.1 darran len = strlen(modname);
458 1.3 darran if (len > 5 && strcmp(modname + len - 3, ".kmod") == 0)
459 1.3 darran modname[len - 4] = '\0';
460 1.1 darran
461 1.1 darran /*
462 1.1 darran * Employees of dtrace and their families are ineligible. Void
463 1.1 darran * where prohibited.
464 1.1 darran */
465 1.1 darran if (strcmp(modname, "dtrace") == 0)
466 1.1 darran return;
467 1.1 darran
468 1.1 darran /*
469 1.1 darran * The cyclic timer subsystem can be built as a module and DTrace
470 1.1 darran * depends on that, so it is ineligible too.
471 1.1 darran */
472 1.1 darran if (strcmp(modname, "cyclic") == 0)
473 1.1 darran return;
474 1.1 darran
475 1.1 darran /*
476 1.1 darran * To register with DTrace, a module must list 'dtrace' as a
477 1.1 darran * dependency in order for the kernel linker to resolve
478 1.1 darran * symbols like dtrace_register(). All modules with such a
479 1.1 darran * dependency are ineligible for FBT tracing.
480 1.1 darran */
481 1.3 darran for (i = 0; i < mod->mod_nrequired; i++) {
482 1.3 darran if (strncmp(mod->mod_required[i]->mod_info->mi_name,
483 1.3 darran "dtrace", 6) == 0)
484 1.1 darran return;
485 1.3 darran }
486 1.1 darran
487 1.3 darran if (mod->mod_fbtentries) {
488 1.1 darran /*
489 1.1 darran * This module has some FBT entries allocated; we're afraid
490 1.1 darran * to screw with it.
491 1.1 darran */
492 1.1 darran return;
493 1.1 darran }
494 1.1 darran
495 1.1 darran /*
496 1.1 darran * List the functions in the module and the symbol values.
497 1.1 darran */
498 1.3 darran ksyms_mod_foreach(modname, fbt_provide_module_cb, mod);
499 1.1 darran }
500 1.1 darran
501 1.1 darran static void
502 1.1 darran fbt_destroy(void *arg, dtrace_id_t id, void *parg)
503 1.1 darran {
504 1.1 darran fbt_probe_t *fbt = parg, *next, *hash, *last;
505 1.3 darran dtrace_modctl_t *ctl;
506 1.1 darran int ndx;
507 1.1 darran
508 1.1 darran do {
509 1.1 darran ctl = fbt->fbtp_ctl;
510 1.1 darran
511 1.3 darran ctl->mod_fbtentries--;
512 1.1 darran
513 1.1 darran /*
514 1.1 darran * Now we need to remove this probe from the fbt_probetab.
515 1.1 darran */
516 1.1 darran ndx = FBT_ADDR2NDX(fbt->fbtp_patchpoint);
517 1.1 darran last = NULL;
518 1.1 darran hash = fbt_probetab[ndx];
519 1.1 darran
520 1.1 darran while (hash != fbt) {
521 1.1 darran ASSERT(hash != NULL);
522 1.1 darran last = hash;
523 1.1 darran hash = hash->fbtp_hashnext;
524 1.1 darran }
525 1.1 darran
526 1.1 darran if (last != NULL) {
527 1.1 darran last->fbtp_hashnext = fbt->fbtp_hashnext;
528 1.1 darran } else {
529 1.1 darran fbt_probetab[ndx] = fbt->fbtp_hashnext;
530 1.1 darran }
531 1.1 darran
532 1.1 darran next = fbt->fbtp_next;
533 1.1 darran free(fbt, M_FBT);
534 1.1 darran
535 1.1 darran fbt = next;
536 1.1 darran } while (fbt != NULL);
537 1.1 darran }
538 1.1 darran
539 1.3 darran static int
540 1.1 darran fbt_enable(void *arg, dtrace_id_t id, void *parg)
541 1.1 darran {
542 1.1 darran fbt_probe_t *fbt = parg;
543 1.5 christos #if 0
544 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
545 1.5 christos #endif
546 1.3 darran u_long psl;
547 1.3 darran u_long cr0;
548 1.3 darran
549 1.1 darran
550 1.3 darran #if 0 /* XXX TBD */
551 1.1 darran ctl->nenabled++;
552 1.1 darran
553 1.1 darran /*
554 1.1 darran * Now check that our modctl has the expected load count. If it
555 1.1 darran * doesn't, this module must have been unloaded and reloaded -- and
556 1.1 darran * we're not going to touch it.
557 1.1 darran */
558 1.1 darran if (ctl->loadcnt != fbt->fbtp_loadcnt) {
559 1.1 darran if (fbt_verbose) {
560 1.1 darran printf("fbt is failing for probe %s "
561 1.1 darran "(module %s reloaded)",
562 1.1 darran fbt->fbtp_name, ctl->filename);
563 1.1 darran }
564 1.1 darran
565 1.1 darran return;
566 1.1 darran }
567 1.3 darran #endif
568 1.3 darran
569 1.3 darran /* Disable interrupts. */
570 1.3 darran psl = x86_read_psl();
571 1.3 darran x86_disable_intr();
572 1.3 darran
573 1.3 darran /* Disable write protection in supervisor mode. */
574 1.3 darran cr0 = rcr0();
575 1.3 darran lcr0(cr0 & ~CR0_WP);
576 1.1 darran
577 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next) {
578 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_patchval;
579 1.1 darran }
580 1.3 darran
581 1.3 darran /* Write back and invalidate cache, flush pipelines. */
582 1.3 darran wbinvd();
583 1.3 darran x86_flush();
584 1.3 darran x86_write_psl(psl);
585 1.3 darran
586 1.3 darran /* Re-enable write protection. */
587 1.3 darran lcr0(cr0);
588 1.3 darran
589 1.3 darran return 0;
590 1.1 darran }
591 1.1 darran
592 1.1 darran static void
593 1.1 darran fbt_disable(void *arg, dtrace_id_t id, void *parg)
594 1.1 darran {
595 1.1 darran fbt_probe_t *fbt = parg;
596 1.5 christos #if 0
597 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
598 1.5 christos #endif
599 1.3 darran u_long psl;
600 1.3 darran u_long cr0;
601 1.1 darran
602 1.3 darran #if 0 /* XXX TBD */
603 1.1 darran ASSERT(ctl->nenabled > 0);
604 1.1 darran ctl->nenabled--;
605 1.1 darran
606 1.1 darran if ((ctl->loadcnt != fbt->fbtp_loadcnt))
607 1.1 darran return;
608 1.3 darran #endif
609 1.3 darran /* Disable interrupts. */
610 1.3 darran psl = x86_read_psl();
611 1.3 darran x86_disable_intr();
612 1.3 darran
613 1.3 darran /* Disable write protection in supervisor mode. */
614 1.3 darran cr0 = rcr0();
615 1.3 darran lcr0(cr0 & ~CR0_WP);
616 1.1 darran
617 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
618 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_savedval;
619 1.3 darran
620 1.3 darran /* Write back and invalidate cache, flush pipelines. */
621 1.3 darran wbinvd();
622 1.3 darran x86_flush();
623 1.3 darran x86_write_psl(psl);
624 1.3 darran
625 1.3 darran /* Re-enable write protection. */
626 1.3 darran lcr0(cr0);
627 1.1 darran }
628 1.1 darran
629 1.1 darran static void
630 1.1 darran fbt_suspend(void *arg, dtrace_id_t id, void *parg)
631 1.1 darran {
632 1.1 darran fbt_probe_t *fbt = parg;
633 1.5 christos #if 0
634 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
635 1.5 christos #endif
636 1.3 darran u_long psl;
637 1.3 darran u_long cr0;
638 1.1 darran
639 1.3 darran #if 0 /* XXX TBD */
640 1.1 darran ASSERT(ctl->nenabled > 0);
641 1.1 darran
642 1.1 darran if ((ctl->loadcnt != fbt->fbtp_loadcnt))
643 1.1 darran return;
644 1.3 darran #endif
645 1.3 darran
646 1.3 darran /* Disable interrupts. */
647 1.3 darran psl = x86_read_psl();
648 1.3 darran x86_disable_intr();
649 1.3 darran
650 1.3 darran /* Disable write protection in supervisor mode. */
651 1.3 darran cr0 = rcr0();
652 1.3 darran lcr0(cr0 & ~CR0_WP);
653 1.1 darran
654 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
655 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_savedval;
656 1.3 darran
657 1.3 darran /* Write back and invalidate cache, flush pipelines. */
658 1.3 darran wbinvd();
659 1.3 darran x86_flush();
660 1.3 darran x86_write_psl(psl);
661 1.3 darran
662 1.3 darran /* Re-enable write protection. */
663 1.3 darran lcr0(cr0);
664 1.1 darran }
665 1.1 darran
666 1.1 darran static void
667 1.1 darran fbt_resume(void *arg, dtrace_id_t id, void *parg)
668 1.1 darran {
669 1.1 darran fbt_probe_t *fbt = parg;
670 1.5 christos #if 0
671 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
672 1.5 christos #endif
673 1.3 darran u_long psl;
674 1.3 darran u_long cr0;
675 1.1 darran
676 1.3 darran #if 0 /* XXX TBD */
677 1.1 darran ASSERT(ctl->nenabled > 0);
678 1.1 darran
679 1.1 darran if ((ctl->loadcnt != fbt->fbtp_loadcnt))
680 1.1 darran return;
681 1.3 darran #endif
682 1.3 darran /* Disable interrupts. */
683 1.3 darran psl = x86_read_psl();
684 1.3 darran x86_disable_intr();
685 1.3 darran
686 1.3 darran /* Disable write protection in supervisor mode. */
687 1.3 darran cr0 = rcr0();
688 1.3 darran lcr0(cr0 & ~CR0_WP);
689 1.1 darran
690 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
691 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_patchval;
692 1.3 darran
693 1.3 darran /* Write back and invalidate cache, flush pipelines. */
694 1.3 darran wbinvd();
695 1.3 darran x86_flush();
696 1.3 darran x86_write_psl(psl);
697 1.3 darran
698 1.3 darran /* Re-enable write protection. */
699 1.3 darran lcr0(cr0);
700 1.1 darran }
701 1.1 darran
702 1.1 darran static int
703 1.3 darran fbt_ctfoff_init(dtrace_modctl_t *mod, mod_ctf_t *mc)
704 1.1 darran {
705 1.3 darran const Elf_Sym *symp = mc->symtab;
706 1.1 darran const char *name;
707 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;
708 1.3 darran const uint8_t *ctfdata = mc->ctftab + sizeof(ctf_header_t);
709 1.1 darran int i;
710 1.1 darran uint32_t *ctfoff;
711 1.1 darran uint32_t objtoff = hp->cth_objtoff;
712 1.1 darran uint32_t funcoff = hp->cth_funcoff;
713 1.1 darran ushort_t info;
714 1.1 darran ushort_t vlen;
715 1.3 darran int nsyms = (mc->nmap != NULL) ? mc->nmapsize : mc->nsym;
716 1.1 darran
717 1.1 darran /* Sanity check. */
718 1.1 darran if (hp->cth_magic != CTF_MAGIC) {
719 1.3 darran printf("Bad magic value in CTF data of '%s'\n",
720 1.3 darran mod->mod_info->mi_name);
721 1.1 darran return (EINVAL);
722 1.1 darran }
723 1.1 darran
724 1.3 darran if (mc->symtab == NULL) {
725 1.3 darran printf("No symbol table in '%s'\n",
726 1.3 darran mod->mod_info->mi_name);
727 1.1 darran return (EINVAL);
728 1.1 darran }
729 1.1 darran
730 1.3 darran if ((ctfoff = malloc(sizeof(uint32_t) * nsyms, M_FBT, M_WAITOK)) == NULL)
731 1.1 darran return (ENOMEM);
732 1.1 darran
733 1.3 darran mc->ctfoffp = ctfoff;
734 1.3 darran
735 1.3 darran for (i = 0; i < nsyms; i++, ctfoff++, symp++) {
736 1.3 darran if (mc->nmap != NULL) {
737 1.3 darran if (mc->nmap[i] == 0) {
738 1.3 darran printf("%s.%d: Error! Got zero nmap!\n",
739 1.3 darran __func__, __LINE__);
740 1.3 darran continue;
741 1.3 darran }
742 1.3 darran
743 1.3 darran /* CTF expects the pre-sorted symbol ordering,
744 1.3 darran * so map it from that to the current sorted
745 1.3 darran * and trimmed symbol table.
746 1.3 darran * ctfoff[new-ind] = oldind symbol info.
747 1.3 darran */
748 1.3 darran
749 1.3 darran /* map old index to new symbol table */
750 1.3 darran symp = &mc->symtab[mc->nmap[i] - 1];
751 1.3 darran
752 1.3 darran /* map old index to new ctfoff index */
753 1.3 darran ctfoff = &mc->ctfoffp[mc->nmap[i]-1];
754 1.3 darran }
755 1.1 darran
756 1.1 darran if (symp->st_name == 0 || symp->st_shndx == SHN_UNDEF) {
757 1.1 darran *ctfoff = 0xffffffff;
758 1.1 darran continue;
759 1.1 darran }
760 1.1 darran
761 1.3 darran if (symp->st_name < mc->strcnt)
762 1.3 darran name = mc->strtab + symp->st_name;
763 1.1 darran else
764 1.1 darran name = "(?)";
765 1.1 darran
766 1.1 darran switch (ELF_ST_TYPE(symp->st_info)) {
767 1.1 darran case STT_OBJECT:
768 1.1 darran if (objtoff >= hp->cth_funcoff ||
769 1.1 darran (symp->st_shndx == SHN_ABS && symp->st_value == 0)) {
770 1.1 darran *ctfoff = 0xffffffff;
771 1.1 darran break;
772 1.1 darran }
773 1.1 darran
774 1.1 darran *ctfoff = objtoff;
775 1.1 darran objtoff += sizeof (ushort_t);
776 1.1 darran break;
777 1.1 darran
778 1.1 darran case STT_FUNC:
779 1.1 darran if (funcoff >= hp->cth_typeoff) {
780 1.1 darran *ctfoff = 0xffffffff;
781 1.1 darran break;
782 1.1 darran }
783 1.1 darran
784 1.1 darran *ctfoff = funcoff;
785 1.1 darran
786 1.1 darran info = *((const ushort_t *)(ctfdata + funcoff));
787 1.1 darran vlen = CTF_INFO_VLEN(info);
788 1.1 darran
789 1.1 darran /*
790 1.1 darran * If we encounter a zero pad at the end, just skip it.
791 1.1 darran * Otherwise skip over the function and its return type
792 1.1 darran * (+2) and the argument list (vlen).
793 1.1 darran */
794 1.1 darran if (CTF_INFO_KIND(info) == CTF_K_UNKNOWN && vlen == 0)
795 1.1 darran funcoff += sizeof (ushort_t); /* skip pad */
796 1.1 darran else
797 1.1 darran funcoff += sizeof (ushort_t) * (vlen + 2);
798 1.1 darran break;
799 1.1 darran
800 1.1 darran default:
801 1.1 darran *ctfoff = 0xffffffff;
802 1.1 darran break;
803 1.1 darran }
804 1.1 darran }
805 1.1 darran
806 1.1 darran return (0);
807 1.1 darran }
808 1.1 darran
809 1.1 darran static ssize_t
810 1.9 christos fbt_get_ctt_size(uint8_t xversion, const ctf_type_t *tp, ssize_t *sizep,
811 1.1 darran ssize_t *incrementp)
812 1.1 darran {
813 1.1 darran ssize_t size, increment;
814 1.1 darran
815 1.9 christos if (xversion > CTF_VERSION_1 &&
816 1.1 darran tp->ctt_size == CTF_LSIZE_SENT) {
817 1.1 darran size = CTF_TYPE_LSIZE(tp);
818 1.1 darran increment = sizeof (ctf_type_t);
819 1.1 darran } else {
820 1.1 darran size = tp->ctt_size;
821 1.1 darran increment = sizeof (ctf_stype_t);
822 1.1 darran }
823 1.1 darran
824 1.1 darran if (sizep)
825 1.1 darran *sizep = size;
826 1.1 darran if (incrementp)
827 1.1 darran *incrementp = increment;
828 1.1 darran
829 1.1 darran return (size);
830 1.1 darran }
831 1.1 darran
832 1.1 darran static int
833 1.3 darran fbt_typoff_init(mod_ctf_t *mc)
834 1.1 darran {
835 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;
836 1.1 darran const ctf_type_t *tbuf;
837 1.1 darran const ctf_type_t *tend;
838 1.1 darran const ctf_type_t *tp;
839 1.3 darran const uint8_t *ctfdata = mc->ctftab + sizeof(ctf_header_t);
840 1.1 darran int ctf_typemax = 0;
841 1.1 darran uint32_t *xp;
842 1.1 darran ulong_t pop[CTF_K_MAX + 1] = { 0 };
843 1.1 darran
844 1.1 darran /* Sanity check. */
845 1.1 darran if (hp->cth_magic != CTF_MAGIC)
846 1.1 darran return (EINVAL);
847 1.1 darran
848 1.1 darran tbuf = (const ctf_type_t *) (ctfdata + hp->cth_typeoff);
849 1.1 darran tend = (const ctf_type_t *) (ctfdata + hp->cth_stroff);
850 1.1 darran
851 1.1 darran int child = hp->cth_parname != 0;
852 1.1 darran
853 1.1 darran /*
854 1.1 darran * We make two passes through the entire type section. In this first
855 1.1 darran * pass, we count the number of each type and the total number of types.
856 1.1 darran */
857 1.1 darran for (tp = tbuf; tp < tend; ctf_typemax++) {
858 1.1 darran ushort_t kind = CTF_INFO_KIND(tp->ctt_info);
859 1.1 darran ulong_t vlen = CTF_INFO_VLEN(tp->ctt_info);
860 1.1 darran ssize_t size, increment;
861 1.1 darran
862 1.1 darran size_t vbytes;
863 1.1 darran uint_t n;
864 1.1 darran
865 1.1 darran (void) fbt_get_ctt_size(hp->cth_version, tp, &size, &increment);
866 1.1 darran
867 1.1 darran switch (kind) {
868 1.1 darran case CTF_K_INTEGER:
869 1.1 darran case CTF_K_FLOAT:
870 1.1 darran vbytes = sizeof (uint_t);
871 1.1 darran break;
872 1.1 darran case CTF_K_ARRAY:
873 1.1 darran vbytes = sizeof (ctf_array_t);
874 1.1 darran break;
875 1.1 darran case CTF_K_FUNCTION:
876 1.1 darran vbytes = sizeof (ushort_t) * (vlen + (vlen & 1));
877 1.1 darran break;
878 1.1 darran case CTF_K_STRUCT:
879 1.1 darran case CTF_K_UNION:
880 1.1 darran if (size < CTF_LSTRUCT_THRESH) {
881 1.1 darran ctf_member_t *mp = (ctf_member_t *)
882 1.1 darran ((uintptr_t)tp + increment);
883 1.1 darran
884 1.1 darran vbytes = sizeof (ctf_member_t) * vlen;
885 1.1 darran for (n = vlen; n != 0; n--, mp++)
886 1.1 darran child |= CTF_TYPE_ISCHILD(mp->ctm_type);
887 1.1 darran } else {
888 1.1 darran ctf_lmember_t *lmp = (ctf_lmember_t *)
889 1.1 darran ((uintptr_t)tp + increment);
890 1.1 darran
891 1.1 darran vbytes = sizeof (ctf_lmember_t) * vlen;
892 1.1 darran for (n = vlen; n != 0; n--, lmp++)
893 1.1 darran child |=
894 1.1 darran CTF_TYPE_ISCHILD(lmp->ctlm_type);
895 1.1 darran }
896 1.1 darran break;
897 1.1 darran case CTF_K_ENUM:
898 1.1 darran vbytes = sizeof (ctf_enum_t) * vlen;
899 1.1 darran break;
900 1.1 darran case CTF_K_FORWARD:
901 1.1 darran /*
902 1.1 darran * For forward declarations, ctt_type is the CTF_K_*
903 1.1 darran * kind for the tag, so bump that population count too.
904 1.1 darran * If ctt_type is unknown, treat the tag as a struct.
905 1.1 darran */
906 1.1 darran if (tp->ctt_type == CTF_K_UNKNOWN ||
907 1.1 darran tp->ctt_type >= CTF_K_MAX)
908 1.1 darran pop[CTF_K_STRUCT]++;
909 1.1 darran else
910 1.1 darran pop[tp->ctt_type]++;
911 1.1 darran /*FALLTHRU*/
912 1.1 darran case CTF_K_UNKNOWN:
913 1.1 darran vbytes = 0;
914 1.1 darran break;
915 1.1 darran case CTF_K_POINTER:
916 1.1 darran case CTF_K_TYPEDEF:
917 1.1 darran case CTF_K_VOLATILE:
918 1.1 darran case CTF_K_CONST:
919 1.1 darran case CTF_K_RESTRICT:
920 1.1 darran child |= CTF_TYPE_ISCHILD(tp->ctt_type);
921 1.1 darran vbytes = 0;
922 1.1 darran break;
923 1.1 darran default:
924 1.1 darran printf("%s(%d): detected invalid CTF kind -- %u\n", __func__, __LINE__, kind);
925 1.1 darran return (EIO);
926 1.1 darran }
927 1.1 darran tp = (ctf_type_t *)((uintptr_t)tp + increment + vbytes);
928 1.1 darran pop[kind]++;
929 1.1 darran }
930 1.1 darran
931 1.3 darran mc->typlen = ctf_typemax;
932 1.1 darran
933 1.3 darran if ((xp = malloc(sizeof(uint32_t) * ctf_typemax, M_FBT, M_ZERO | M_WAITOK)) == NULL)
934 1.1 darran return (ENOMEM);
935 1.1 darran
936 1.3 darran mc->typoffp = xp;
937 1.1 darran
938 1.1 darran /* type id 0 is used as a sentinel value */
939 1.1 darran *xp++ = 0;
940 1.1 darran
941 1.1 darran /*
942 1.1 darran * In the second pass, fill in the type offset.
943 1.1 darran */
944 1.1 darran for (tp = tbuf; tp < tend; xp++) {
945 1.1 darran ushort_t kind = CTF_INFO_KIND(tp->ctt_info);
946 1.1 darran ulong_t vlen = CTF_INFO_VLEN(tp->ctt_info);
947 1.1 darran ssize_t size, increment;
948 1.1 darran
949 1.1 darran size_t vbytes;
950 1.1 darran uint_t n;
951 1.1 darran
952 1.1 darran (void) fbt_get_ctt_size(hp->cth_version, tp, &size, &increment);
953 1.1 darran
954 1.1 darran switch (kind) {
955 1.1 darran case CTF_K_INTEGER:
956 1.1 darran case CTF_K_FLOAT:
957 1.1 darran vbytes = sizeof (uint_t);
958 1.1 darran break;
959 1.1 darran case CTF_K_ARRAY:
960 1.1 darran vbytes = sizeof (ctf_array_t);
961 1.1 darran break;
962 1.1 darran case CTF_K_FUNCTION:
963 1.1 darran vbytes = sizeof (ushort_t) * (vlen + (vlen & 1));
964 1.1 darran break;
965 1.1 darran case CTF_K_STRUCT:
966 1.1 darran case CTF_K_UNION:
967 1.1 darran if (size < CTF_LSTRUCT_THRESH) {
968 1.1 darran ctf_member_t *mp = (ctf_member_t *)
969 1.1 darran ((uintptr_t)tp + increment);
970 1.1 darran
971 1.1 darran vbytes = sizeof (ctf_member_t) * vlen;
972 1.1 darran for (n = vlen; n != 0; n--, mp++)
973 1.1 darran child |= CTF_TYPE_ISCHILD(mp->ctm_type);
974 1.1 darran } else {
975 1.1 darran ctf_lmember_t *lmp = (ctf_lmember_t *)
976 1.1 darran ((uintptr_t)tp + increment);
977 1.1 darran
978 1.1 darran vbytes = sizeof (ctf_lmember_t) * vlen;
979 1.1 darran for (n = vlen; n != 0; n--, lmp++)
980 1.1 darran child |=
981 1.1 darran CTF_TYPE_ISCHILD(lmp->ctlm_type);
982 1.1 darran }
983 1.1 darran break;
984 1.1 darran case CTF_K_ENUM:
985 1.1 darran vbytes = sizeof (ctf_enum_t) * vlen;
986 1.1 darran break;
987 1.1 darran case CTF_K_FORWARD:
988 1.1 darran case CTF_K_UNKNOWN:
989 1.1 darran vbytes = 0;
990 1.1 darran break;
991 1.1 darran case CTF_K_POINTER:
992 1.1 darran case CTF_K_TYPEDEF:
993 1.1 darran case CTF_K_VOLATILE:
994 1.1 darran case CTF_K_CONST:
995 1.1 darran case CTF_K_RESTRICT:
996 1.1 darran vbytes = 0;
997 1.1 darran break;
998 1.1 darran default:
999 1.1 darran printf("%s(%d): detected invalid CTF kind -- %u\n", __func__, __LINE__, kind);
1000 1.1 darran return (EIO);
1001 1.1 darran }
1002 1.1 darran *xp = (uint32_t)((uintptr_t) tp - (uintptr_t) ctfdata);
1003 1.1 darran tp = (ctf_type_t *)((uintptr_t)tp + increment + vbytes);
1004 1.1 darran }
1005 1.1 darran
1006 1.1 darran return (0);
1007 1.1 darran }
1008 1.1 darran
1009 1.1 darran /*
1010 1.1 darran * CTF Declaration Stack
1011 1.1 darran *
1012 1.1 darran * In order to implement ctf_type_name(), we must convert a type graph back
1013 1.1 darran * into a C type declaration. Unfortunately, a type graph represents a storage
1014 1.1 darran * class ordering of the type whereas a type declaration must obey the C rules
1015 1.1 darran * for operator precedence, and the two orderings are frequently in conflict.
1016 1.1 darran * For example, consider these CTF type graphs and their C declarations:
1017 1.1 darran *
1018 1.1 darran * CTF_K_POINTER -> CTF_K_FUNCTION -> CTF_K_INTEGER : int (*)()
1019 1.1 darran * CTF_K_POINTER -> CTF_K_ARRAY -> CTF_K_INTEGER : int (*)[]
1020 1.1 darran *
1021 1.1 darran * In each case, parentheses are used to raise operator * to higher lexical
1022 1.1 darran * precedence, so the string form of the C declaration cannot be constructed by
1023 1.1 darran * walking the type graph links and forming the string from left to right.
1024 1.1 darran *
1025 1.1 darran * The functions in this file build a set of stacks from the type graph nodes
1026 1.1 darran * corresponding to the C operator precedence levels in the appropriate order.
1027 1.1 darran * The code in ctf_type_name() can then iterate over the levels and nodes in
1028 1.1 darran * lexical precedence order and construct the final C declaration string.
1029 1.1 darran */
1030 1.1 darran typedef struct ctf_list {
1031 1.1 darran struct ctf_list *l_prev; /* previous pointer or tail pointer */
1032 1.1 darran struct ctf_list *l_next; /* next pointer or head pointer */
1033 1.1 darran } ctf_list_t;
1034 1.1 darran
1035 1.1 darran #define ctf_list_prev(elem) ((void *)(((ctf_list_t *)(elem))->l_prev))
1036 1.1 darran #define ctf_list_next(elem) ((void *)(((ctf_list_t *)(elem))->l_next))
1037 1.1 darran
1038 1.1 darran typedef enum {
1039 1.1 darran CTF_PREC_BASE,
1040 1.1 darran CTF_PREC_POINTER,
1041 1.1 darran CTF_PREC_ARRAY,
1042 1.1 darran CTF_PREC_FUNCTION,
1043 1.1 darran CTF_PREC_MAX
1044 1.1 darran } ctf_decl_prec_t;
1045 1.1 darran
1046 1.1 darran typedef struct ctf_decl_node {
1047 1.1 darran ctf_list_t cd_list; /* linked list pointers */
1048 1.1 darran ctf_id_t cd_type; /* type identifier */
1049 1.1 darran uint_t cd_kind; /* type kind */
1050 1.1 darran uint_t cd_n; /* type dimension if array */
1051 1.1 darran } ctf_decl_node_t;
1052 1.1 darran
1053 1.1 darran typedef struct ctf_decl {
1054 1.1 darran ctf_list_t cd_nodes[CTF_PREC_MAX]; /* declaration node stacks */
1055 1.1 darran int cd_order[CTF_PREC_MAX]; /* storage order of decls */
1056 1.1 darran ctf_decl_prec_t cd_qualp; /* qualifier precision */
1057 1.1 darran ctf_decl_prec_t cd_ordp; /* ordered precision */
1058 1.1 darran char *cd_buf; /* buffer for output */
1059 1.1 darran char *cd_ptr; /* buffer location */
1060 1.1 darran char *cd_end; /* buffer limit */
1061 1.1 darran size_t cd_len; /* buffer space required */
1062 1.1 darran int cd_err; /* saved error value */
1063 1.1 darran } ctf_decl_t;
1064 1.1 darran
1065 1.1 darran /*
1066 1.1 darran * Simple doubly-linked list append routine. This implementation assumes that
1067 1.1 darran * each list element contains an embedded ctf_list_t as the first member.
1068 1.1 darran * An additional ctf_list_t is used to store the head (l_next) and tail
1069 1.1 darran * (l_prev) pointers. The current head and tail list elements have their
1070 1.1 darran * previous and next pointers set to NULL, respectively.
1071 1.1 darran */
1072 1.1 darran static void
1073 1.1 darran ctf_list_append(ctf_list_t *lp, void *new)
1074 1.1 darran {
1075 1.1 darran ctf_list_t *p = lp->l_prev; /* p = tail list element */
1076 1.1 darran ctf_list_t *q = new; /* q = new list element */
1077 1.1 darran
1078 1.1 darran lp->l_prev = q;
1079 1.1 darran q->l_prev = p;
1080 1.1 darran q->l_next = NULL;
1081 1.1 darran
1082 1.1 darran if (p != NULL)
1083 1.1 darran p->l_next = q;
1084 1.1 darran else
1085 1.1 darran lp->l_next = q;
1086 1.1 darran }
1087 1.1 darran
1088 1.1 darran /*
1089 1.1 darran * Prepend the specified existing element to the given ctf_list_t. The
1090 1.1 darran * existing pointer should be pointing at a struct with embedded ctf_list_t.
1091 1.1 darran */
1092 1.1 darran static void
1093 1.1 darran ctf_list_prepend(ctf_list_t *lp, void *new)
1094 1.1 darran {
1095 1.1 darran ctf_list_t *p = new; /* p = new list element */
1096 1.1 darran ctf_list_t *q = lp->l_next; /* q = head list element */
1097 1.1 darran
1098 1.1 darran lp->l_next = p;
1099 1.1 darran p->l_prev = NULL;
1100 1.1 darran p->l_next = q;
1101 1.1 darran
1102 1.1 darran if (q != NULL)
1103 1.1 darran q->l_prev = p;
1104 1.1 darran else
1105 1.1 darran lp->l_prev = p;
1106 1.1 darran }
1107 1.1 darran
1108 1.1 darran static void
1109 1.1 darran ctf_decl_init(ctf_decl_t *cd, char *buf, size_t len)
1110 1.1 darran {
1111 1.1 darran int i;
1112 1.1 darran
1113 1.1 darran bzero(cd, sizeof (ctf_decl_t));
1114 1.1 darran
1115 1.1 darran for (i = CTF_PREC_BASE; i < CTF_PREC_MAX; i++)
1116 1.1 darran cd->cd_order[i] = CTF_PREC_BASE - 1;
1117 1.1 darran
1118 1.1 darran cd->cd_qualp = CTF_PREC_BASE;
1119 1.1 darran cd->cd_ordp = CTF_PREC_BASE;
1120 1.1 darran
1121 1.1 darran cd->cd_buf = buf;
1122 1.1 darran cd->cd_ptr = buf;
1123 1.1 darran cd->cd_end = buf + len;
1124 1.1 darran }
1125 1.1 darran
1126 1.1 darran static void
1127 1.1 darran ctf_decl_fini(ctf_decl_t *cd)
1128 1.1 darran {
1129 1.1 darran ctf_decl_node_t *cdp, *ndp;
1130 1.1 darran int i;
1131 1.1 darran
1132 1.1 darran for (i = CTF_PREC_BASE; i < CTF_PREC_MAX; i++) {
1133 1.1 darran for (cdp = ctf_list_next(&cd->cd_nodes[i]);
1134 1.1 darran cdp != NULL; cdp = ndp) {
1135 1.1 darran ndp = ctf_list_next(cdp);
1136 1.1 darran free(cdp, M_FBT);
1137 1.1 darran }
1138 1.1 darran }
1139 1.1 darran }
1140 1.1 darran
1141 1.1 darran static const ctf_type_t *
1142 1.3 darran ctf_lookup_by_id(mod_ctf_t *mc, ctf_id_t type)
1143 1.1 darran {
1144 1.1 darran const ctf_type_t *tp;
1145 1.1 darran uint32_t offset;
1146 1.3 darran uint32_t *typoff = mc->typoffp;
1147 1.1 darran
1148 1.3 darran if (type >= mc->typlen) {
1149 1.3 darran printf("%s(%d): type %d exceeds max %ld\n",__func__,__LINE__,(int) type,mc->typlen);
1150 1.1 darran return(NULL);
1151 1.1 darran }
1152 1.1 darran
1153 1.1 darran /* Check if the type isn't cross-referenced. */
1154 1.1 darran if ((offset = typoff[type]) == 0) {
1155 1.1 darran printf("%s(%d): type %d isn't cross referenced\n",__func__,__LINE__, (int) type);
1156 1.1 darran return(NULL);
1157 1.1 darran }
1158 1.1 darran
1159 1.3 darran tp = (const ctf_type_t *)(mc->ctftab + offset + sizeof(ctf_header_t));
1160 1.1 darran
1161 1.1 darran return (tp);
1162 1.1 darran }
1163 1.1 darran
1164 1.1 darran static void
1165 1.3 darran fbt_array_info(mod_ctf_t *mc, ctf_id_t type, ctf_arinfo_t *arp)
1166 1.1 darran {
1167 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;
1168 1.1 darran const ctf_type_t *tp;
1169 1.1 darran const ctf_array_t *ap;
1170 1.1 darran ssize_t increment;
1171 1.1 darran
1172 1.1 darran bzero(arp, sizeof(*arp));
1173 1.1 darran
1174 1.3 darran if ((tp = ctf_lookup_by_id(mc, type)) == NULL)
1175 1.1 darran return;
1176 1.1 darran
1177 1.1 darran if (CTF_INFO_KIND(tp->ctt_info) != CTF_K_ARRAY)
1178 1.1 darran return;
1179 1.1 darran
1180 1.1 darran (void) fbt_get_ctt_size(hp->cth_version, tp, NULL, &increment);
1181 1.1 darran
1182 1.1 darran ap = (const ctf_array_t *)((uintptr_t)tp + increment);
1183 1.1 darran arp->ctr_contents = ap->cta_contents;
1184 1.1 darran arp->ctr_index = ap->cta_index;
1185 1.1 darran arp->ctr_nelems = ap->cta_nelems;
1186 1.1 darran }
1187 1.1 darran
1188 1.1 darran static const char *
1189 1.3 darran ctf_strptr(mod_ctf_t *mc, int name)
1190 1.1 darran {
1191 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;;
1192 1.1 darran const char *strp = "";
1193 1.1 darran
1194 1.1 darran if (name < 0 || name >= hp->cth_strlen)
1195 1.1 darran return(strp);
1196 1.1 darran
1197 1.3 darran strp = (const char *)(mc->ctftab + hp->cth_stroff + name + sizeof(ctf_header_t));
1198 1.1 darran
1199 1.1 darran return (strp);
1200 1.1 darran }
1201 1.1 darran
1202 1.1 darran static void
1203 1.3 darran ctf_decl_push(ctf_decl_t *cd, mod_ctf_t *mc, ctf_id_t type)
1204 1.1 darran {
1205 1.1 darran ctf_decl_node_t *cdp;
1206 1.1 darran ctf_decl_prec_t prec;
1207 1.1 darran uint_t kind, n = 1;
1208 1.1 darran int is_qual = 0;
1209 1.1 darran
1210 1.1 darran const ctf_type_t *tp;
1211 1.1 darran ctf_arinfo_t ar;
1212 1.1 darran
1213 1.3 darran if ((tp = ctf_lookup_by_id(mc, type)) == NULL) {
1214 1.1 darran cd->cd_err = ENOENT;
1215 1.1 darran return;
1216 1.1 darran }
1217 1.1 darran
1218 1.1 darran switch (kind = CTF_INFO_KIND(tp->ctt_info)) {
1219 1.1 darran case CTF_K_ARRAY:
1220 1.3 darran fbt_array_info(mc, type, &ar);
1221 1.3 darran ctf_decl_push(cd, mc, ar.ctr_contents);
1222 1.1 darran n = ar.ctr_nelems;
1223 1.1 darran prec = CTF_PREC_ARRAY;
1224 1.1 darran break;
1225 1.1 darran
1226 1.1 darran case CTF_K_TYPEDEF:
1227 1.3 darran if (ctf_strptr(mc, tp->ctt_name)[0] == '\0') {
1228 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1229 1.1 darran return;
1230 1.1 darran }
1231 1.1 darran prec = CTF_PREC_BASE;
1232 1.1 darran break;
1233 1.1 darran
1234 1.1 darran case CTF_K_FUNCTION:
1235 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1236 1.1 darran prec = CTF_PREC_FUNCTION;
1237 1.1 darran break;
1238 1.1 darran
1239 1.1 darran case CTF_K_POINTER:
1240 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1241 1.1 darran prec = CTF_PREC_POINTER;
1242 1.1 darran break;
1243 1.1 darran
1244 1.1 darran case CTF_K_VOLATILE:
1245 1.1 darran case CTF_K_CONST:
1246 1.1 darran case CTF_K_RESTRICT:
1247 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1248 1.1 darran prec = cd->cd_qualp;
1249 1.1 darran is_qual++;
1250 1.1 darran break;
1251 1.1 darran
1252 1.1 darran default:
1253 1.1 darran prec = CTF_PREC_BASE;
1254 1.1 darran }
1255 1.1 darran
1256 1.1 darran if ((cdp = malloc(sizeof (ctf_decl_node_t), M_FBT, M_WAITOK)) == NULL) {
1257 1.1 darran cd->cd_err = EAGAIN;
1258 1.1 darran return;
1259 1.1 darran }
1260 1.1 darran
1261 1.1 darran cdp->cd_type = type;
1262 1.1 darran cdp->cd_kind = kind;
1263 1.1 darran cdp->cd_n = n;
1264 1.1 darran
1265 1.1 darran if (ctf_list_next(&cd->cd_nodes[prec]) == NULL)
1266 1.1 darran cd->cd_order[prec] = cd->cd_ordp++;
1267 1.1 darran
1268 1.1 darran /*
1269 1.1 darran * Reset cd_qualp to the highest precedence level that we've seen so
1270 1.1 darran * far that can be qualified (CTF_PREC_BASE or CTF_PREC_POINTER).
1271 1.1 darran */
1272 1.1 darran if (prec > cd->cd_qualp && prec < CTF_PREC_ARRAY)
1273 1.1 darran cd->cd_qualp = prec;
1274 1.1 darran
1275 1.1 darran /*
1276 1.1 darran * C array declarators are ordered inside out so prepend them. Also by
1277 1.1 darran * convention qualifiers of base types precede the type specifier (e.g.
1278 1.1 darran * const int vs. int const) even though the two forms are equivalent.
1279 1.1 darran */
1280 1.1 darran if (kind == CTF_K_ARRAY || (is_qual && prec == CTF_PREC_BASE))
1281 1.1 darran ctf_list_prepend(&cd->cd_nodes[prec], cdp);
1282 1.1 darran else
1283 1.1 darran ctf_list_append(&cd->cd_nodes[prec], cdp);
1284 1.1 darran }
1285 1.1 darran
1286 1.1 darran static void
1287 1.1 darran ctf_decl_sprintf(ctf_decl_t *cd, const char *format, ...)
1288 1.1 darran {
1289 1.1 darran size_t len = (size_t)(cd->cd_end - cd->cd_ptr);
1290 1.1 darran va_list ap;
1291 1.1 darran size_t n;
1292 1.1 darran
1293 1.1 darran va_start(ap, format);
1294 1.1 darran n = vsnprintf(cd->cd_ptr, len, format, ap);
1295 1.1 darran va_end(ap);
1296 1.1 darran
1297 1.1 darran cd->cd_ptr += MIN(n, len);
1298 1.1 darran cd->cd_len += n;
1299 1.1 darran }
1300 1.1 darran
1301 1.1 darran static ssize_t
1302 1.3 darran fbt_type_name(mod_ctf_t *mc, ctf_id_t type, char *buf, size_t len)
1303 1.1 darran {
1304 1.1 darran ctf_decl_t cd;
1305 1.1 darran ctf_decl_node_t *cdp;
1306 1.1 darran ctf_decl_prec_t prec, lp, rp;
1307 1.1 darran int ptr, arr;
1308 1.1 darran uint_t k;
1309 1.1 darran
1310 1.3 darran if (mc == NULL && type == CTF_ERR)
1311 1.1 darran return (-1); /* simplify caller code by permitting CTF_ERR */
1312 1.1 darran
1313 1.1 darran ctf_decl_init(&cd, buf, len);
1314 1.3 darran ctf_decl_push(&cd, mc, type);
1315 1.1 darran
1316 1.1 darran if (cd.cd_err != 0) {
1317 1.1 darran ctf_decl_fini(&cd);
1318 1.1 darran return (-1);
1319 1.1 darran }
1320 1.1 darran
1321 1.1 darran /*
1322 1.1 darran * If the type graph's order conflicts with lexical precedence order
1323 1.1 darran * for pointers or arrays, then we need to surround the declarations at
1324 1.1 darran * the corresponding lexical precedence with parentheses. This can
1325 1.1 darran * result in either a parenthesized pointer (*) as in int (*)() or
1326 1.1 darran * int (*)[], or in a parenthesized pointer and array as in int (*[])().
1327 1.1 darran */
1328 1.1 darran ptr = cd.cd_order[CTF_PREC_POINTER] > CTF_PREC_POINTER;
1329 1.1 darran arr = cd.cd_order[CTF_PREC_ARRAY] > CTF_PREC_ARRAY;
1330 1.1 darran
1331 1.1 darran rp = arr ? CTF_PREC_ARRAY : ptr ? CTF_PREC_POINTER : -1;
1332 1.1 darran lp = ptr ? CTF_PREC_POINTER : arr ? CTF_PREC_ARRAY : -1;
1333 1.1 darran
1334 1.1 darran k = CTF_K_POINTER; /* avoid leading whitespace (see below) */
1335 1.1 darran
1336 1.1 darran for (prec = CTF_PREC_BASE; prec < CTF_PREC_MAX; prec++) {
1337 1.1 darran for (cdp = ctf_list_next(&cd.cd_nodes[prec]);
1338 1.1 darran cdp != NULL; cdp = ctf_list_next(cdp)) {
1339 1.1 darran
1340 1.1 darran const ctf_type_t *tp =
1341 1.3 darran ctf_lookup_by_id(mc, cdp->cd_type);
1342 1.3 darran const char *name = ctf_strptr(mc, tp->ctt_name);
1343 1.1 darran
1344 1.1 darran if (k != CTF_K_POINTER && k != CTF_K_ARRAY)
1345 1.1 darran ctf_decl_sprintf(&cd, " ");
1346 1.1 darran
1347 1.1 darran if (lp == prec) {
1348 1.1 darran ctf_decl_sprintf(&cd, "(");
1349 1.1 darran lp = -1;
1350 1.1 darran }
1351 1.1 darran
1352 1.1 darran switch (cdp->cd_kind) {
1353 1.1 darran case CTF_K_INTEGER:
1354 1.1 darran case CTF_K_FLOAT:
1355 1.1 darran case CTF_K_TYPEDEF:
1356 1.1 darran ctf_decl_sprintf(&cd, "%s", name);
1357 1.1 darran break;
1358 1.1 darran case CTF_K_POINTER:
1359 1.1 darran ctf_decl_sprintf(&cd, "*");
1360 1.1 darran break;
1361 1.1 darran case CTF_K_ARRAY:
1362 1.1 darran ctf_decl_sprintf(&cd, "[%u]", cdp->cd_n);
1363 1.1 darran break;
1364 1.1 darran case CTF_K_FUNCTION:
1365 1.1 darran ctf_decl_sprintf(&cd, "()");
1366 1.1 darran break;
1367 1.1 darran case CTF_K_STRUCT:
1368 1.1 darran case CTF_K_FORWARD:
1369 1.1 darran ctf_decl_sprintf(&cd, "struct %s", name);
1370 1.1 darran break;
1371 1.1 darran case CTF_K_UNION:
1372 1.1 darran ctf_decl_sprintf(&cd, "union %s", name);
1373 1.1 darran break;
1374 1.1 darran case CTF_K_ENUM:
1375 1.1 darran ctf_decl_sprintf(&cd, "enum %s", name);
1376 1.1 darran break;
1377 1.1 darran case CTF_K_VOLATILE:
1378 1.1 darran ctf_decl_sprintf(&cd, "volatile");
1379 1.1 darran break;
1380 1.1 darran case CTF_K_CONST:
1381 1.1 darran ctf_decl_sprintf(&cd, "const");
1382 1.1 darran break;
1383 1.1 darran case CTF_K_RESTRICT:
1384 1.1 darran ctf_decl_sprintf(&cd, "restrict");
1385 1.1 darran break;
1386 1.1 darran }
1387 1.1 darran
1388 1.1 darran k = cdp->cd_kind;
1389 1.1 darran }
1390 1.1 darran
1391 1.1 darran if (rp == prec)
1392 1.1 darran ctf_decl_sprintf(&cd, ")");
1393 1.1 darran }
1394 1.1 darran
1395 1.1 darran ctf_decl_fini(&cd);
1396 1.1 darran return (cd.cd_len);
1397 1.1 darran }
1398 1.1 darran
1399 1.1 darran static void
1400 1.1 darran fbt_getargdesc(void *arg __unused, dtrace_id_t id __unused, void *parg, dtrace_argdesc_t *desc)
1401 1.1 darran {
1402 1.1 darran const ushort_t *dp;
1403 1.1 darran fbt_probe_t *fbt = parg;
1404 1.3 darran mod_ctf_t mc;
1405 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
1406 1.1 darran int ndx = desc->dtargd_ndx;
1407 1.1 darran int symindx = fbt->fbtp_symindx;
1408 1.1 darran uint32_t *ctfoff;
1409 1.1 darran uint32_t offset;
1410 1.1 darran ushort_t info, kind, n;
1411 1.3 darran int nsyms;
1412 1.1 darran
1413 1.1 darran desc->dtargd_ndx = DTRACE_ARGNONE;
1414 1.1 darran
1415 1.1 darran /* Get a pointer to the CTF data and it's length. */
1416 1.3 darran if (mod_ctf_get(ctl, &mc) != 0) {
1417 1.6 darran static int report=0;
1418 1.6 darran if (report < 1) {
1419 1.6 darran report++;
1420 1.6 darran printf("FBT: Error no CTF section found in module \"%s\"\n",
1421 1.6 darran ctl->mod_info->mi_name);
1422 1.6 darran }
1423 1.1 darran /* No CTF data? Something wrong? *shrug* */
1424 1.1 darran return;
1425 1.3 darran }
1426 1.3 darran
1427 1.3 darran nsyms = (mc.nmap != NULL) ? mc.nmapsize : mc.nsym;
1428 1.1 darran
1429 1.1 darran /* Check if this module hasn't been initialised yet. */
1430 1.3 darran if (mc.ctfoffp == NULL) {
1431 1.1 darran /*
1432 1.1 darran * Initialise the CTF object and function symindx to
1433 1.1 darran * byte offset array.
1434 1.1 darran */
1435 1.3 darran if (fbt_ctfoff_init(ctl, &mc) != 0) {
1436 1.1 darran return;
1437 1.3 darran }
1438 1.1 darran
1439 1.1 darran /* Initialise the CTF type to byte offset array. */
1440 1.3 darran if (fbt_typoff_init(&mc) != 0) {
1441 1.1 darran return;
1442 1.3 darran }
1443 1.1 darran }
1444 1.1 darran
1445 1.3 darran ctfoff = mc.ctfoffp;
1446 1.1 darran
1447 1.3 darran if (ctfoff == NULL || mc.typoffp == NULL) {
1448 1.1 darran return;
1449 1.3 darran }
1450 1.1 darran
1451 1.1 darran /* Check if the symbol index is out of range. */
1452 1.3 darran if (symindx >= nsyms)
1453 1.1 darran return;
1454 1.1 darran
1455 1.1 darran /* Check if the symbol isn't cross-referenced. */
1456 1.1 darran if ((offset = ctfoff[symindx]) == 0xffffffff)
1457 1.1 darran return;
1458 1.1 darran
1459 1.3 darran dp = (const ushort_t *)(mc.ctftab + offset + sizeof(ctf_header_t));
1460 1.1 darran
1461 1.1 darran info = *dp++;
1462 1.1 darran kind = CTF_INFO_KIND(info);
1463 1.1 darran n = CTF_INFO_VLEN(info);
1464 1.1 darran
1465 1.1 darran if (kind == CTF_K_UNKNOWN && n == 0) {
1466 1.12 christos printf("%s(%d): Unknown function %s!\n",__func__,__LINE__,
1467 1.12 christos fbt->fbtp_name);
1468 1.1 darran return;
1469 1.1 darran }
1470 1.1 darran
1471 1.1 darran if (kind != CTF_K_FUNCTION) {
1472 1.12 christos printf("%s(%d): Expected a function %s!\n",__func__,__LINE__,
1473 1.12 christos fbt->fbtp_name);
1474 1.1 darran return;
1475 1.1 darran }
1476 1.1 darran
1477 1.1 darran /* Check if the requested argument doesn't exist. */
1478 1.1 darran if (ndx >= n)
1479 1.1 darran return;
1480 1.1 darran
1481 1.1 darran /* Skip the return type and arguments up to the one requested. */
1482 1.1 darran dp += ndx + 1;
1483 1.1 darran
1484 1.3 darran if (fbt_type_name(&mc, *dp, desc->dtargd_native, sizeof(desc->dtargd_native)) > 0) {
1485 1.1 darran desc->dtargd_ndx = ndx;
1486 1.3 darran }
1487 1.1 darran
1488 1.1 darran return;
1489 1.1 darran }
1490 1.1 darran
1491 1.1 darran static void
1492 1.3 darran fbt_load(void)
1493 1.1 darran {
1494 1.1 darran /* Default the probe table size if not specified. */
1495 1.1 darran if (fbt_probetab_size == 0)
1496 1.1 darran fbt_probetab_size = FBT_PROBETAB_SIZE;
1497 1.1 darran
1498 1.1 darran /* Choose the hash mask for the probe table. */
1499 1.1 darran fbt_probetab_mask = fbt_probetab_size - 1;
1500 1.1 darran
1501 1.1 darran /* Allocate memory for the probe table. */
1502 1.1 darran fbt_probetab =
1503 1.1 darran malloc(fbt_probetab_size * sizeof (fbt_probe_t *), M_FBT, M_WAITOK | M_ZERO);
1504 1.1 darran
1505 1.1 darran dtrace_doubletrap_func = fbt_doubletrap;
1506 1.1 darran dtrace_invop_add(fbt_invop);
1507 1.1 darran
1508 1.1 darran if (dtrace_register("fbt", &fbt_attr, DTRACE_PRIV_USER,
1509 1.1 darran NULL, &fbt_pops, NULL, &fbt_id) != 0)
1510 1.1 darran return;
1511 1.1 darran }
1512 1.1 darran
1513 1.1 darran
1514 1.1 darran static int
1515 1.3 darran fbt_unload(void)
1516 1.1 darran {
1517 1.1 darran int error = 0;
1518 1.1 darran
1519 1.1 darran /* De-register the invalid opcode handler. */
1520 1.1 darran dtrace_invop_remove(fbt_invop);
1521 1.1 darran
1522 1.1 darran dtrace_doubletrap_func = NULL;
1523 1.1 darran
1524 1.1 darran /* De-register this DTrace provider. */
1525 1.1 darran if ((error = dtrace_unregister(fbt_id)) != 0)
1526 1.1 darran return (error);
1527 1.1 darran
1528 1.1 darran /* Free the probe table. */
1529 1.1 darran free(fbt_probetab, M_FBT);
1530 1.1 darran fbt_probetab = NULL;
1531 1.1 darran fbt_probetab_mask = 0;
1532 1.1 darran
1533 1.1 darran return (error);
1534 1.1 darran }
1535 1.1 darran
1536 1.3 darran
1537 1.1 darran static int
1538 1.3 darran fbt_modcmd(modcmd_t cmd, void *data)
1539 1.1 darran {
1540 1.3 darran int bmajor = -1, cmajor = -1;
1541 1.1 darran
1542 1.3 darran switch (cmd) {
1543 1.3 darran case MODULE_CMD_INIT:
1544 1.3 darran fbt_load();
1545 1.3 darran return devsw_attach("fbt", NULL, &bmajor,
1546 1.3 darran &fbt_cdevsw, &cmajor);
1547 1.3 darran case MODULE_CMD_FINI:
1548 1.3 darran fbt_unload();
1549 1.3 darran return devsw_detach(NULL, &fbt_cdevsw);
1550 1.1 darran default:
1551 1.3 darran return ENOTTY;
1552 1.1 darran }
1553 1.1 darran }
1554 1.1 darran
1555 1.1 darran static int
1556 1.3 darran fbt_open(dev_t dev, int flags, int mode, struct lwp *l)
1557 1.1 darran {
1558 1.1 darran return (0);
1559 1.1 darran }
1560 1.1 darran
1561 1.3 darran MODULE(MODULE_CLASS_MISC, fbt, "dtrace");
1562