fbt.c revision 1.3 1 1.3 darran /* $NetBSD: fbt.c,v 1.3 2010/03/12 21:53:15 darran Exp $ */
2 1.2 darran
3 1.1 darran /*
4 1.1 darran * CDDL HEADER START
5 1.1 darran *
6 1.1 darran * The contents of this file are subject to the terms of the
7 1.1 darran * Common Development and Distribution License (the "License").
8 1.1 darran * You may not use this file except in compliance with the License.
9 1.1 darran *
10 1.1 darran * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
11 1.1 darran * or http://www.opensolaris.org/os/licensing.
12 1.1 darran * See the License for the specific language governing permissions
13 1.1 darran * and limitations under the License.
14 1.1 darran *
15 1.1 darran * When distributing Covered Code, include this CDDL HEADER in each
16 1.1 darran * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
17 1.1 darran * If applicable, add the following below this CDDL HEADER, with the
18 1.1 darran * fields enclosed by brackets "[]" replaced with your own identifying
19 1.1 darran * information: Portions Copyright [yyyy] [name of copyright owner]
20 1.1 darran *
21 1.1 darran * CDDL HEADER END
22 1.1 darran *
23 1.1 darran * Portions Copyright 2006-2008 John Birrell jb (at) freebsd.org
24 1.3 darran * Portions Copyright 2010 Darran Hunt darran (at) NetBSD.org
25 1.1 darran *
26 1.1 darran * $FreeBSD: src/sys/cddl/dev/fbt/fbt.c,v 1.1.4.1 2009/08/03 08:13:06 kensmith Exp $
27 1.1 darran *
28 1.1 darran */
29 1.1 darran
30 1.1 darran /*
31 1.1 darran * Copyright 2006 Sun Microsystems, Inc. All rights reserved.
32 1.1 darran * Use is subject to license terms.
33 1.1 darran */
34 1.1 darran
35 1.1 darran #include <sys/cdefs.h>
36 1.1 darran #include <sys/param.h>
37 1.1 darran #include <sys/systm.h>
38 1.1 darran #include <sys/conf.h>
39 1.1 darran #include <sys/cpuvar.h>
40 1.1 darran #include <sys/fcntl.h>
41 1.1 darran #include <sys/filio.h>
42 1.1 darran #include <sys/kernel.h>
43 1.1 darran #include <sys/kmem.h>
44 1.3 darran #include <sys/cpu.h>
45 1.1 darran #include <sys/kthread.h>
46 1.1 darran #include <sys/limits.h>
47 1.1 darran #include <sys/linker.h>
48 1.1 darran #include <sys/lock.h>
49 1.1 darran #include <sys/malloc.h>
50 1.1 darran #include <sys/module.h>
51 1.1 darran #include <sys/mutex.h>
52 1.1 darran #include <sys/poll.h>
53 1.1 darran #include <sys/proc.h>
54 1.1 darran #include <sys/selinfo.h>
55 1.1 darran #include <sys/syscall.h>
56 1.1 darran #include <sys/uio.h>
57 1.1 darran #include <sys/unistd.h>
58 1.1 darran #include <machine/stdarg.h>
59 1.1 darran
60 1.3 darran #include <machine/cpu.h>
61 1.3 darran #include <machine/cpufunc.h>
62 1.3 darran #include <machine/specialreg.h>
63 1.3 darran #if 0
64 1.3 darran #include <x86/cpuvar.h>
65 1.3 darran #endif
66 1.3 darran #include <x86/cputypes.h>
67 1.3 darran
68 1.3 darran #define ELFSIZE ARCH_ELFSIZE
69 1.3 darran #include <sys/exec_elf.h>
70 1.3 darran
71 1.1 darran #include <sys/dtrace.h>
72 1.1 darran #include <sys/dtrace_bsd.h>
73 1.3 darran #include <sys/kern_ctf.h>
74 1.3 darran
75 1.3 darran mod_ctf_t *modptr;
76 1.1 darran
77 1.1 darran MALLOC_DEFINE(M_FBT, "fbt", "Function Boundary Tracing");
78 1.1 darran
79 1.1 darran #define FBT_PUSHL_EBP 0x55
80 1.1 darran #define FBT_MOVL_ESP_EBP0_V0 0x8b
81 1.1 darran #define FBT_MOVL_ESP_EBP1_V0 0xec
82 1.1 darran #define FBT_MOVL_ESP_EBP0_V1 0x89
83 1.1 darran #define FBT_MOVL_ESP_EBP1_V1 0xe5
84 1.1 darran #define FBT_REX_RSP_RBP 0x48
85 1.1 darran
86 1.1 darran #define FBT_POPL_EBP 0x5d
87 1.1 darran #define FBT_RET 0xc3
88 1.1 darran #define FBT_RET_IMM16 0xc2
89 1.1 darran #define FBT_LEAVE 0xc9
90 1.1 darran
91 1.1 darran #ifdef __amd64__
92 1.1 darran #define FBT_PATCHVAL 0xcc
93 1.1 darran #else
94 1.1 darran #define FBT_PATCHVAL 0xf0
95 1.1 darran #endif
96 1.1 darran
97 1.3 darran static dev_type_open(fbt_open);
98 1.1 darran static int fbt_unload(void);
99 1.1 darran static void fbt_getargdesc(void *, dtrace_id_t, void *, dtrace_argdesc_t *);
100 1.3 darran static void fbt_provide_module(void *, dtrace_modctl_t *);
101 1.1 darran static void fbt_destroy(void *, dtrace_id_t, void *);
102 1.3 darran static int fbt_enable(void *, dtrace_id_t, void *);
103 1.1 darran static void fbt_disable(void *, dtrace_id_t, void *);
104 1.3 darran static void fbt_load(void);
105 1.1 darran static void fbt_suspend(void *, dtrace_id_t, void *);
106 1.1 darran static void fbt_resume(void *, dtrace_id_t, void *);
107 1.1 darran
108 1.1 darran #define FBT_ENTRY "entry"
109 1.1 darran #define FBT_RETURN "return"
110 1.1 darran #define FBT_ADDR2NDX(addr) ((((uintptr_t)(addr)) >> 4) & fbt_probetab_mask)
111 1.1 darran #define FBT_PROBETAB_SIZE 0x8000 /* 32k entries -- 128K total */
112 1.1 darran
113 1.3 darran static const struct cdevsw fbt_cdevsw = {
114 1.3 darran fbt_open, noclose, noread, nowrite, noioctl,
115 1.3 darran nostop, notty, nopoll, nommap, nokqfilter,
116 1.3 darran D_OTHER
117 1.1 darran };
118 1.1 darran
119 1.1 darran static dtrace_pattr_t fbt_attr = {
120 1.1 darran { DTRACE_STABILITY_EVOLVING, DTRACE_STABILITY_EVOLVING, DTRACE_CLASS_COMMON },
121 1.1 darran { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_UNKNOWN },
122 1.1 darran { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_ISA },
123 1.1 darran { DTRACE_STABILITY_EVOLVING, DTRACE_STABILITY_EVOLVING, DTRACE_CLASS_COMMON },
124 1.1 darran { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_ISA },
125 1.1 darran };
126 1.1 darran
127 1.1 darran static dtrace_pops_t fbt_pops = {
128 1.1 darran NULL,
129 1.1 darran fbt_provide_module,
130 1.1 darran fbt_enable,
131 1.1 darran fbt_disable,
132 1.1 darran fbt_suspend,
133 1.1 darran fbt_resume,
134 1.1 darran fbt_getargdesc,
135 1.1 darran NULL,
136 1.1 darran NULL,
137 1.1 darran fbt_destroy
138 1.1 darran };
139 1.1 darran
140 1.1 darran typedef struct fbt_probe {
141 1.1 darran struct fbt_probe *fbtp_hashnext;
142 1.1 darran uint8_t *fbtp_patchpoint;
143 1.1 darran int8_t fbtp_rval;
144 1.1 darran uint8_t fbtp_patchval;
145 1.1 darran uint8_t fbtp_savedval;
146 1.1 darran uintptr_t fbtp_roffset;
147 1.1 darran dtrace_id_t fbtp_id;
148 1.1 darran const char *fbtp_name;
149 1.3 darran dtrace_modctl_t *fbtp_ctl;
150 1.1 darran int fbtp_loadcnt;
151 1.1 darran int fbtp_primary;
152 1.1 darran int fbtp_invop_cnt;
153 1.1 darran int fbtp_symindx;
154 1.1 darran struct fbt_probe *fbtp_next;
155 1.1 darran } fbt_probe_t;
156 1.1 darran
157 1.1 darran static struct cdev *fbt_cdev;
158 1.1 darran static dtrace_provider_id_t fbt_id;
159 1.1 darran static fbt_probe_t **fbt_probetab;
160 1.1 darran static int fbt_probetab_size;
161 1.1 darran static int fbt_probetab_mask;
162 1.1 darran static int fbt_verbose = 0;
163 1.1 darran
164 1.1 darran static void
165 1.1 darran fbt_doubletrap(void)
166 1.1 darran {
167 1.1 darran fbt_probe_t *fbt;
168 1.1 darran int i;
169 1.1 darran
170 1.1 darran for (i = 0; i < fbt_probetab_size; i++) {
171 1.1 darran fbt = fbt_probetab[i];
172 1.1 darran
173 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
174 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_savedval;
175 1.1 darran }
176 1.1 darran }
177 1.1 darran
178 1.3 darran
179 1.1 darran static int
180 1.1 darran fbt_invop(uintptr_t addr, uintptr_t *stack, uintptr_t rval)
181 1.1 darran {
182 1.3 darran solaris_cpu_t *cpu = &solaris_cpu[cpu_number()];
183 1.1 darran uintptr_t stack0, stack1, stack2, stack3, stack4;
184 1.1 darran fbt_probe_t *fbt = fbt_probetab[FBT_ADDR2NDX(addr)];
185 1.1 darran
186 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_hashnext) {
187 1.1 darran if ((uintptr_t)fbt->fbtp_patchpoint == addr) {
188 1.1 darran fbt->fbtp_invop_cnt++;
189 1.1 darran if (fbt->fbtp_roffset == 0) {
190 1.1 darran int i = 0;
191 1.1 darran /*
192 1.1 darran * When accessing the arguments on the stack,
193 1.1 darran * we must protect against accessing beyond
194 1.1 darran * the stack. We can safely set NOFAULT here
195 1.1 darran * -- we know that interrupts are already
196 1.1 darran * disabled.
197 1.1 darran */
198 1.1 darran DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT);
199 1.1 darran cpu->cpu_dtrace_caller = stack[i++];
200 1.1 darran stack0 = stack[i++];
201 1.1 darran stack1 = stack[i++];
202 1.1 darran stack2 = stack[i++];
203 1.1 darran stack3 = stack[i++];
204 1.1 darran stack4 = stack[i++];
205 1.1 darran DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT |
206 1.1 darran CPU_DTRACE_BADADDR);
207 1.1 darran
208 1.1 darran dtrace_probe(fbt->fbtp_id, stack0, stack1,
209 1.1 darran stack2, stack3, stack4);
210 1.1 darran
211 1.1 darran cpu->cpu_dtrace_caller = 0;
212 1.1 darran } else {
213 1.1 darran #ifdef __amd64__
214 1.1 darran /*
215 1.1 darran * On amd64, we instrument the ret, not the
216 1.1 darran * leave. We therefore need to set the caller
217 1.1 darran * to assure that the top frame of a stack()
218 1.1 darran * action is correct.
219 1.1 darran */
220 1.1 darran DTRACE_CPUFLAG_SET(CPU_DTRACE_NOFAULT);
221 1.1 darran cpu->cpu_dtrace_caller = stack[0];
222 1.1 darran DTRACE_CPUFLAG_CLEAR(CPU_DTRACE_NOFAULT |
223 1.1 darran CPU_DTRACE_BADADDR);
224 1.1 darran #endif
225 1.1 darran
226 1.1 darran dtrace_probe(fbt->fbtp_id, fbt->fbtp_roffset,
227 1.1 darran rval, 0, 0, 0);
228 1.1 darran cpu->cpu_dtrace_caller = 0;
229 1.1 darran }
230 1.1 darran
231 1.1 darran return (fbt->fbtp_rval);
232 1.1 darran }
233 1.1 darran }
234 1.1 darran
235 1.1 darran return (0);
236 1.1 darran }
237 1.1 darran
238 1.1 darran static int
239 1.3 darran fbt_provide_module_cb(const char *name, int symindx, void *value,
240 1.3 darran uint32_t size, int type, void *opaque)
241 1.1 darran {
242 1.1 darran fbt_probe_t *fbt, *retfbt;
243 1.3 darran u_int8_t *instr, *limit;
244 1.3 darran dtrace_modctl_t *mod = opaque;
245 1.3 darran const char *modname = mod->mod_info->mi_name;
246 1.1 darran int j;
247 1.3 darran int ind;
248 1.3 darran
249 1.3 darran /* got a function? */
250 1.3 darran if (ELF_ST_TYPE(type) != STT_FUNC) {
251 1.3 darran return 0;
252 1.3 darran }
253 1.1 darran
254 1.1 darran if (strncmp(name, "dtrace_", 7) == 0 &&
255 1.1 darran strncmp(name, "dtrace_safe_", 12) != 0) {
256 1.1 darran /*
257 1.1 darran * Anything beginning with "dtrace_" may be called
258 1.1 darran * from probe context unless it explicitly indicates
259 1.1 darran * that it won't be called from probe context by
260 1.1 darran * using the prefix "dtrace_safe_".
261 1.1 darran */
262 1.1 darran return (0);
263 1.1 darran }
264 1.1 darran
265 1.1 darran if (name[0] == '_' && name[1] == '_')
266 1.1 darran return (0);
267 1.1 darran
268 1.3 darran instr = (u_int8_t *) value;
269 1.3 darran limit = (u_int8_t *) value + size;
270 1.1 darran
271 1.1 darran #ifdef __amd64__
272 1.1 darran while (instr < limit) {
273 1.1 darran if (*instr == FBT_PUSHL_EBP)
274 1.1 darran break;
275 1.1 darran
276 1.1 darran if ((size = dtrace_instr_size(instr)) <= 0)
277 1.1 darran break;
278 1.1 darran
279 1.1 darran instr += size;
280 1.1 darran }
281 1.1 darran
282 1.1 darran if (instr >= limit || *instr != FBT_PUSHL_EBP) {
283 1.1 darran /*
284 1.1 darran * We either don't save the frame pointer in this
285 1.1 darran * function, or we ran into some disassembly
286 1.1 darran * screw-up. Either way, we bail.
287 1.1 darran */
288 1.1 darran return (0);
289 1.1 darran }
290 1.1 darran #else
291 1.3 darran if (instr[0] != FBT_PUSHL_EBP) {
292 1.1 darran return (0);
293 1.3 darran }
294 1.1 darran
295 1.1 darran if (!(instr[1] == FBT_MOVL_ESP_EBP0_V0 &&
296 1.1 darran instr[2] == FBT_MOVL_ESP_EBP1_V0) &&
297 1.1 darran !(instr[1] == FBT_MOVL_ESP_EBP0_V1 &&
298 1.3 darran instr[2] == FBT_MOVL_ESP_EBP1_V1)) {
299 1.1 darran return (0);
300 1.3 darran }
301 1.1 darran #endif
302 1.1 darran fbt = malloc(sizeof (fbt_probe_t), M_FBT, M_WAITOK | M_ZERO);
303 1.1 darran fbt->fbtp_name = name;
304 1.1 darran fbt->fbtp_id = dtrace_probe_create(fbt_id, modname,
305 1.1 darran name, FBT_ENTRY, 3, fbt);
306 1.1 darran fbt->fbtp_patchpoint = instr;
307 1.3 darran fbt->fbtp_ctl = mod;
308 1.3 darran /* fbt->fbtp_loadcnt = lf->loadcnt; */
309 1.1 darran fbt->fbtp_rval = DTRACE_INVOP_PUSHL_EBP;
310 1.1 darran fbt->fbtp_savedval = *instr;
311 1.1 darran fbt->fbtp_patchval = FBT_PATCHVAL;
312 1.1 darran fbt->fbtp_symindx = symindx;
313 1.1 darran
314 1.1 darran fbt->fbtp_hashnext = fbt_probetab[FBT_ADDR2NDX(instr)];
315 1.1 darran fbt_probetab[FBT_ADDR2NDX(instr)] = fbt;
316 1.3 darran mod->mod_fbtentries++;
317 1.1 darran
318 1.3 darran retfbt = NULL;
319 1.1 darran
320 1.3 darran while (instr < limit) {
321 1.3 darran if (instr >= limit)
322 1.3 darran return (0);
323 1.1 darran
324 1.3 darran /*
325 1.3 darran * If this disassembly fails, then we've likely walked off into
326 1.3 darran * a jump table or some other unsuitable area. Bail out of the
327 1.3 darran * disassembly now.
328 1.3 darran */
329 1.3 darran if ((size = dtrace_instr_size(instr)) <= 0)
330 1.3 darran return (0);
331 1.1 darran
332 1.1 darran #ifdef __amd64__
333 1.3 darran /*
334 1.3 darran * We only instrument "ret" on amd64 -- we don't yet instrument
335 1.3 darran * ret imm16, largely because the compiler doesn't seem to
336 1.3 darran * (yet) emit them in the kernel...
337 1.3 darran */
338 1.3 darran if (*instr != FBT_RET) {
339 1.3 darran instr += size;
340 1.3 darran continue;
341 1.3 darran }
342 1.1 darran #else
343 1.3 darran if (!(size == 1 &&
344 1.3 darran (*instr == FBT_POPL_EBP || *instr == FBT_LEAVE) &&
345 1.3 darran (*(instr + 1) == FBT_RET ||
346 1.3 darran *(instr + 1) == FBT_RET_IMM16))) {
347 1.3 darran instr += size;
348 1.3 darran continue;
349 1.3 darran }
350 1.1 darran #endif
351 1.1 darran
352 1.3 darran /*
353 1.3 darran * We (desperately) want to avoid erroneously instrumenting a
354 1.3 darran * jump table, especially given that our markers are pretty
355 1.3 darran * short: two bytes on x86, and just one byte on amd64. To
356 1.3 darran * determine if we're looking at a true instruction sequence
357 1.3 darran * or an inline jump table that happens to contain the same
358 1.3 darran * byte sequences, we resort to some heuristic sleeze: we
359 1.3 darran * treat this instruction as being contained within a pointer,
360 1.3 darran * and see if that pointer points to within the body of the
361 1.3 darran * function. If it does, we refuse to instrument it.
362 1.3 darran */
363 1.3 darran for (j = 0; j < sizeof (uintptr_t); j++) {
364 1.3 darran caddr_t check = (caddr_t) instr - j;
365 1.3 darran uint8_t *ptr;
366 1.1 darran
367 1.3 darran if (check < (caddr_t)value)
368 1.3 darran break;
369 1.1 darran
370 1.3 darran if (check + sizeof (caddr_t) > (caddr_t)limit)
371 1.3 darran continue;
372 1.1 darran
373 1.3 darran ptr = *(uint8_t **)check;
374 1.1 darran
375 1.3 darran if (ptr >= (uint8_t *) value && ptr < limit) {
376 1.3 darran instr += size;
377 1.3 darran continue;
378 1.3 darran }
379 1.1 darran }
380 1.1 darran
381 1.3 darran /*
382 1.3 darran * We have a winner!
383 1.3 darran */
384 1.3 darran fbt = malloc(sizeof (fbt_probe_t), M_FBT, M_WAITOK | M_ZERO);
385 1.3 darran fbt->fbtp_name = name;
386 1.1 darran
387 1.3 darran if (retfbt == NULL) {
388 1.3 darran fbt->fbtp_id = dtrace_probe_create(fbt_id, modname,
389 1.3 darran name, FBT_RETURN, 3, fbt);
390 1.3 darran } else {
391 1.3 darran retfbt->fbtp_next = fbt;
392 1.3 darran fbt->fbtp_id = retfbt->fbtp_id;
393 1.3 darran }
394 1.1 darran
395 1.3 darran retfbt = fbt;
396 1.3 darran fbt->fbtp_patchpoint = instr;
397 1.3 darran fbt->fbtp_ctl = mod;
398 1.3 darran /* fbt->fbtp_loadcnt = lf->loadcnt; */
399 1.3 darran fbt->fbtp_symindx = symindx;
400 1.1 darran
401 1.1 darran #ifndef __amd64__
402 1.3 darran if (*instr == FBT_POPL_EBP) {
403 1.3 darran fbt->fbtp_rval = DTRACE_INVOP_POPL_EBP;
404 1.3 darran } else {
405 1.3 darran ASSERT(*instr == FBT_LEAVE);
406 1.3 darran fbt->fbtp_rval = DTRACE_INVOP_LEAVE;
407 1.3 darran }
408 1.3 darran fbt->fbtp_roffset =
409 1.3 darran (uintptr_t)(instr - (uint8_t *) value) + 1;
410 1.1 darran
411 1.1 darran #else
412 1.3 darran ASSERT(*instr == FBT_RET);
413 1.3 darran fbt->fbtp_rval = DTRACE_INVOP_RET;
414 1.3 darran fbt->fbtp_roffset =
415 1.3 darran (uintptr_t)(instr - (uint8_t *) value);
416 1.1 darran #endif
417 1.1 darran
418 1.3 darran fbt->fbtp_savedval = *instr;
419 1.3 darran fbt->fbtp_patchval = FBT_PATCHVAL;
420 1.3 darran fbt->fbtp_hashnext = fbt_probetab[FBT_ADDR2NDX(instr)];
421 1.3 darran fbt_probetab[FBT_ADDR2NDX(instr)] = fbt;
422 1.3 darran
423 1.3 darran mod->mod_fbtentries++;
424 1.1 darran
425 1.3 darran instr += size;
426 1.3 darran }
427 1.1 darran
428 1.3 darran return 0;
429 1.1 darran }
430 1.1 darran
431 1.1 darran static void
432 1.3 darran fbt_provide_module(void *arg, dtrace_modctl_t *mod)
433 1.1 darran {
434 1.1 darran char modname[MAXPATHLEN];
435 1.1 darran int i;
436 1.1 darran size_t len;
437 1.1 darran
438 1.3 darran strlcpy(modname, mod->mod_info->mi_name, sizeof(modname));
439 1.1 darran len = strlen(modname);
440 1.3 darran if (len > 5 && strcmp(modname + len - 3, ".kmod") == 0)
441 1.3 darran modname[len - 4] = '\0';
442 1.1 darran
443 1.1 darran /*
444 1.1 darran * Employees of dtrace and their families are ineligible. Void
445 1.1 darran * where prohibited.
446 1.1 darran */
447 1.1 darran if (strcmp(modname, "dtrace") == 0)
448 1.1 darran return;
449 1.1 darran
450 1.1 darran /*
451 1.1 darran * The cyclic timer subsystem can be built as a module and DTrace
452 1.1 darran * depends on that, so it is ineligible too.
453 1.1 darran */
454 1.1 darran if (strcmp(modname, "cyclic") == 0)
455 1.1 darran return;
456 1.1 darran
457 1.1 darran /*
458 1.1 darran * To register with DTrace, a module must list 'dtrace' as a
459 1.1 darran * dependency in order for the kernel linker to resolve
460 1.1 darran * symbols like dtrace_register(). All modules with such a
461 1.1 darran * dependency are ineligible for FBT tracing.
462 1.1 darran */
463 1.3 darran for (i = 0; i < mod->mod_nrequired; i++) {
464 1.3 darran if (strncmp(mod->mod_required[i]->mod_info->mi_name,
465 1.3 darran "dtrace", 6) == 0)
466 1.1 darran return;
467 1.3 darran }
468 1.1 darran
469 1.3 darran if (mod->mod_fbtentries) {
470 1.1 darran /*
471 1.1 darran * This module has some FBT entries allocated; we're afraid
472 1.1 darran * to screw with it.
473 1.1 darran */
474 1.1 darran return;
475 1.1 darran }
476 1.1 darran
477 1.1 darran /*
478 1.1 darran * List the functions in the module and the symbol values.
479 1.1 darran */
480 1.3 darran ksyms_mod_foreach(modname, fbt_provide_module_cb, mod);
481 1.1 darran }
482 1.1 darran
483 1.1 darran static void
484 1.1 darran fbt_destroy(void *arg, dtrace_id_t id, void *parg)
485 1.1 darran {
486 1.1 darran fbt_probe_t *fbt = parg, *next, *hash, *last;
487 1.3 darran dtrace_modctl_t *ctl;
488 1.1 darran int ndx;
489 1.1 darran
490 1.1 darran do {
491 1.1 darran ctl = fbt->fbtp_ctl;
492 1.1 darran
493 1.3 darran ctl->mod_fbtentries--;
494 1.1 darran
495 1.1 darran /*
496 1.1 darran * Now we need to remove this probe from the fbt_probetab.
497 1.1 darran */
498 1.1 darran ndx = FBT_ADDR2NDX(fbt->fbtp_patchpoint);
499 1.1 darran last = NULL;
500 1.1 darran hash = fbt_probetab[ndx];
501 1.1 darran
502 1.1 darran while (hash != fbt) {
503 1.1 darran ASSERT(hash != NULL);
504 1.1 darran last = hash;
505 1.1 darran hash = hash->fbtp_hashnext;
506 1.1 darran }
507 1.1 darran
508 1.1 darran if (last != NULL) {
509 1.1 darran last->fbtp_hashnext = fbt->fbtp_hashnext;
510 1.1 darran } else {
511 1.1 darran fbt_probetab[ndx] = fbt->fbtp_hashnext;
512 1.1 darran }
513 1.1 darran
514 1.1 darran next = fbt->fbtp_next;
515 1.1 darran free(fbt, M_FBT);
516 1.1 darran
517 1.1 darran fbt = next;
518 1.1 darran } while (fbt != NULL);
519 1.1 darran }
520 1.1 darran
521 1.3 darran static int
522 1.1 darran fbt_enable(void *arg, dtrace_id_t id, void *parg)
523 1.1 darran {
524 1.1 darran fbt_probe_t *fbt = parg;
525 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
526 1.3 darran u_long psl;
527 1.3 darran u_long cr0;
528 1.3 darran
529 1.1 darran
530 1.3 darran #if 0 /* XXX TBD */
531 1.1 darran ctl->nenabled++;
532 1.1 darran
533 1.1 darran /*
534 1.1 darran * Now check that our modctl has the expected load count. If it
535 1.1 darran * doesn't, this module must have been unloaded and reloaded -- and
536 1.1 darran * we're not going to touch it.
537 1.1 darran */
538 1.1 darran if (ctl->loadcnt != fbt->fbtp_loadcnt) {
539 1.1 darran if (fbt_verbose) {
540 1.1 darran printf("fbt is failing for probe %s "
541 1.1 darran "(module %s reloaded)",
542 1.1 darran fbt->fbtp_name, ctl->filename);
543 1.1 darran }
544 1.1 darran
545 1.1 darran return;
546 1.1 darran }
547 1.3 darran #endif
548 1.3 darran
549 1.3 darran /* Disable interrupts. */
550 1.3 darran psl = x86_read_psl();
551 1.3 darran x86_disable_intr();
552 1.3 darran
553 1.3 darran /* Disable write protection in supervisor mode. */
554 1.3 darran cr0 = rcr0();
555 1.3 darran lcr0(cr0 & ~CR0_WP);
556 1.1 darran
557 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next) {
558 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_patchval;
559 1.1 darran }
560 1.3 darran
561 1.3 darran /* Write back and invalidate cache, flush pipelines. */
562 1.3 darran wbinvd();
563 1.3 darran x86_flush();
564 1.3 darran x86_write_psl(psl);
565 1.3 darran
566 1.3 darran /* Re-enable write protection. */
567 1.3 darran lcr0(cr0);
568 1.3 darran
569 1.3 darran return 0;
570 1.1 darran }
571 1.1 darran
572 1.1 darran static void
573 1.1 darran fbt_disable(void *arg, dtrace_id_t id, void *parg)
574 1.1 darran {
575 1.1 darran fbt_probe_t *fbt = parg;
576 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
577 1.3 darran u_long psl;
578 1.3 darran u_long cr0;
579 1.1 darran
580 1.3 darran #if 0 /* XXX TBD */
581 1.1 darran ASSERT(ctl->nenabled > 0);
582 1.1 darran ctl->nenabled--;
583 1.1 darran
584 1.1 darran if ((ctl->loadcnt != fbt->fbtp_loadcnt))
585 1.1 darran return;
586 1.3 darran #endif
587 1.3 darran /* Disable interrupts. */
588 1.3 darran psl = x86_read_psl();
589 1.3 darran x86_disable_intr();
590 1.3 darran
591 1.3 darran /* Disable write protection in supervisor mode. */
592 1.3 darran cr0 = rcr0();
593 1.3 darran lcr0(cr0 & ~CR0_WP);
594 1.1 darran
595 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
596 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_savedval;
597 1.3 darran
598 1.3 darran /* Write back and invalidate cache, flush pipelines. */
599 1.3 darran wbinvd();
600 1.3 darran x86_flush();
601 1.3 darran x86_write_psl(psl);
602 1.3 darran
603 1.3 darran /* Re-enable write protection. */
604 1.3 darran lcr0(cr0);
605 1.1 darran }
606 1.1 darran
607 1.1 darran static void
608 1.1 darran fbt_suspend(void *arg, dtrace_id_t id, void *parg)
609 1.1 darran {
610 1.1 darran fbt_probe_t *fbt = parg;
611 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
612 1.3 darran u_long psl;
613 1.3 darran u_long cr0;
614 1.1 darran
615 1.3 darran #if 0 /* XXX TBD */
616 1.1 darran ASSERT(ctl->nenabled > 0);
617 1.1 darran
618 1.1 darran if ((ctl->loadcnt != fbt->fbtp_loadcnt))
619 1.1 darran return;
620 1.3 darran #endif
621 1.3 darran
622 1.3 darran /* Disable interrupts. */
623 1.3 darran psl = x86_read_psl();
624 1.3 darran x86_disable_intr();
625 1.3 darran
626 1.3 darran /* Disable write protection in supervisor mode. */
627 1.3 darran cr0 = rcr0();
628 1.3 darran lcr0(cr0 & ~CR0_WP);
629 1.1 darran
630 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
631 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_savedval;
632 1.3 darran
633 1.3 darran /* Write back and invalidate cache, flush pipelines. */
634 1.3 darran wbinvd();
635 1.3 darran x86_flush();
636 1.3 darran x86_write_psl(psl);
637 1.3 darran
638 1.3 darran /* Re-enable write protection. */
639 1.3 darran lcr0(cr0);
640 1.1 darran }
641 1.1 darran
642 1.1 darran static void
643 1.1 darran fbt_resume(void *arg, dtrace_id_t id, void *parg)
644 1.1 darran {
645 1.1 darran fbt_probe_t *fbt = parg;
646 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
647 1.3 darran u_long psl;
648 1.3 darran u_long cr0;
649 1.1 darran
650 1.3 darran #if 0 /* XXX TBD */
651 1.1 darran ASSERT(ctl->nenabled > 0);
652 1.1 darran
653 1.1 darran if ((ctl->loadcnt != fbt->fbtp_loadcnt))
654 1.1 darran return;
655 1.3 darran #endif
656 1.3 darran /* Disable interrupts. */
657 1.3 darran psl = x86_read_psl();
658 1.3 darran x86_disable_intr();
659 1.3 darran
660 1.3 darran /* Disable write protection in supervisor mode. */
661 1.3 darran cr0 = rcr0();
662 1.3 darran lcr0(cr0 & ~CR0_WP);
663 1.1 darran
664 1.1 darran for (; fbt != NULL; fbt = fbt->fbtp_next)
665 1.1 darran *fbt->fbtp_patchpoint = fbt->fbtp_patchval;
666 1.3 darran
667 1.3 darran /* Write back and invalidate cache, flush pipelines. */
668 1.3 darran wbinvd();
669 1.3 darran x86_flush();
670 1.3 darran x86_write_psl(psl);
671 1.3 darran
672 1.3 darran /* Re-enable write protection. */
673 1.3 darran lcr0(cr0);
674 1.1 darran }
675 1.1 darran
676 1.1 darran static int
677 1.3 darran fbt_ctfoff_init(dtrace_modctl_t *mod, mod_ctf_t *mc)
678 1.1 darran {
679 1.3 darran const Elf_Sym *symp = mc->symtab;
680 1.1 darran const char *name;
681 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;
682 1.3 darran const uint8_t *ctfdata = mc->ctftab + sizeof(ctf_header_t);
683 1.1 darran int i;
684 1.1 darran uint32_t *ctfoff;
685 1.1 darran uint32_t objtoff = hp->cth_objtoff;
686 1.1 darran uint32_t funcoff = hp->cth_funcoff;
687 1.1 darran ushort_t info;
688 1.1 darran ushort_t vlen;
689 1.3 darran int nsyms = (mc->nmap != NULL) ? mc->nmapsize : mc->nsym;
690 1.1 darran
691 1.1 darran /* Sanity check. */
692 1.1 darran if (hp->cth_magic != CTF_MAGIC) {
693 1.3 darran printf("Bad magic value in CTF data of '%s'\n",
694 1.3 darran mod->mod_info->mi_name);
695 1.1 darran return (EINVAL);
696 1.1 darran }
697 1.1 darran
698 1.3 darran if (mc->symtab == NULL) {
699 1.3 darran printf("No symbol table in '%s'\n",
700 1.3 darran mod->mod_info->mi_name);
701 1.1 darran return (EINVAL);
702 1.1 darran }
703 1.1 darran
704 1.3 darran if ((ctfoff = malloc(sizeof(uint32_t) * nsyms, M_FBT, M_WAITOK)) == NULL)
705 1.1 darran return (ENOMEM);
706 1.1 darran
707 1.3 darran mc->ctfoffp = ctfoff;
708 1.3 darran
709 1.3 darran for (i = 0; i < nsyms; i++, ctfoff++, symp++) {
710 1.3 darran if (mc->nmap != NULL) {
711 1.3 darran if (mc->nmap[i] == 0) {
712 1.3 darran printf("%s.%d: Error! Got zero nmap!\n",
713 1.3 darran __func__, __LINE__);
714 1.3 darran continue;
715 1.3 darran }
716 1.3 darran
717 1.3 darran /* CTF expects the pre-sorted symbol ordering,
718 1.3 darran * so map it from that to the current sorted
719 1.3 darran * and trimmed symbol table.
720 1.3 darran * ctfoff[new-ind] = oldind symbol info.
721 1.3 darran */
722 1.3 darran
723 1.3 darran /* map old index to new symbol table */
724 1.3 darran symp = &mc->symtab[mc->nmap[i] - 1];
725 1.3 darran
726 1.3 darran /* map old index to new ctfoff index */
727 1.3 darran ctfoff = &mc->ctfoffp[mc->nmap[i]-1];
728 1.3 darran }
729 1.1 darran
730 1.1 darran if (symp->st_name == 0 || symp->st_shndx == SHN_UNDEF) {
731 1.1 darran *ctfoff = 0xffffffff;
732 1.1 darran continue;
733 1.1 darran }
734 1.1 darran
735 1.3 darran if (symp->st_name < mc->strcnt)
736 1.3 darran name = mc->strtab + symp->st_name;
737 1.1 darran else
738 1.1 darran name = "(?)";
739 1.1 darran
740 1.1 darran switch (ELF_ST_TYPE(symp->st_info)) {
741 1.1 darran case STT_OBJECT:
742 1.1 darran if (objtoff >= hp->cth_funcoff ||
743 1.1 darran (symp->st_shndx == SHN_ABS && symp->st_value == 0)) {
744 1.1 darran *ctfoff = 0xffffffff;
745 1.1 darran break;
746 1.1 darran }
747 1.1 darran
748 1.1 darran *ctfoff = objtoff;
749 1.1 darran objtoff += sizeof (ushort_t);
750 1.1 darran break;
751 1.1 darran
752 1.1 darran case STT_FUNC:
753 1.1 darran if (funcoff >= hp->cth_typeoff) {
754 1.1 darran *ctfoff = 0xffffffff;
755 1.1 darran break;
756 1.1 darran }
757 1.1 darran
758 1.1 darran *ctfoff = funcoff;
759 1.1 darran
760 1.1 darran info = *((const ushort_t *)(ctfdata + funcoff));
761 1.1 darran vlen = CTF_INFO_VLEN(info);
762 1.1 darran
763 1.1 darran /*
764 1.1 darran * If we encounter a zero pad at the end, just skip it.
765 1.1 darran * Otherwise skip over the function and its return type
766 1.1 darran * (+2) and the argument list (vlen).
767 1.1 darran */
768 1.1 darran if (CTF_INFO_KIND(info) == CTF_K_UNKNOWN && vlen == 0)
769 1.1 darran funcoff += sizeof (ushort_t); /* skip pad */
770 1.1 darran else
771 1.1 darran funcoff += sizeof (ushort_t) * (vlen + 2);
772 1.1 darran break;
773 1.1 darran
774 1.1 darran default:
775 1.1 darran *ctfoff = 0xffffffff;
776 1.1 darran break;
777 1.1 darran }
778 1.1 darran }
779 1.1 darran
780 1.1 darran return (0);
781 1.1 darran }
782 1.1 darran
783 1.1 darran static ssize_t
784 1.1 darran fbt_get_ctt_size(uint8_t version, const ctf_type_t *tp, ssize_t *sizep,
785 1.1 darran ssize_t *incrementp)
786 1.1 darran {
787 1.1 darran ssize_t size, increment;
788 1.1 darran
789 1.1 darran if (version > CTF_VERSION_1 &&
790 1.1 darran tp->ctt_size == CTF_LSIZE_SENT) {
791 1.1 darran size = CTF_TYPE_LSIZE(tp);
792 1.1 darran increment = sizeof (ctf_type_t);
793 1.1 darran } else {
794 1.1 darran size = tp->ctt_size;
795 1.1 darran increment = sizeof (ctf_stype_t);
796 1.1 darran }
797 1.1 darran
798 1.1 darran if (sizep)
799 1.1 darran *sizep = size;
800 1.1 darran if (incrementp)
801 1.1 darran *incrementp = increment;
802 1.1 darran
803 1.1 darran return (size);
804 1.1 darran }
805 1.1 darran
806 1.1 darran static int
807 1.3 darran fbt_typoff_init(mod_ctf_t *mc)
808 1.1 darran {
809 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;
810 1.1 darran const ctf_type_t *tbuf;
811 1.1 darran const ctf_type_t *tend;
812 1.1 darran const ctf_type_t *tp;
813 1.3 darran const uint8_t *ctfdata = mc->ctftab + sizeof(ctf_header_t);
814 1.1 darran int ctf_typemax = 0;
815 1.1 darran uint32_t *xp;
816 1.1 darran ulong_t pop[CTF_K_MAX + 1] = { 0 };
817 1.1 darran
818 1.1 darran /* Sanity check. */
819 1.1 darran if (hp->cth_magic != CTF_MAGIC)
820 1.1 darran return (EINVAL);
821 1.1 darran
822 1.1 darran tbuf = (const ctf_type_t *) (ctfdata + hp->cth_typeoff);
823 1.1 darran tend = (const ctf_type_t *) (ctfdata + hp->cth_stroff);
824 1.1 darran
825 1.1 darran int child = hp->cth_parname != 0;
826 1.1 darran
827 1.1 darran /*
828 1.1 darran * We make two passes through the entire type section. In this first
829 1.1 darran * pass, we count the number of each type and the total number of types.
830 1.1 darran */
831 1.1 darran for (tp = tbuf; tp < tend; ctf_typemax++) {
832 1.1 darran ushort_t kind = CTF_INFO_KIND(tp->ctt_info);
833 1.1 darran ulong_t vlen = CTF_INFO_VLEN(tp->ctt_info);
834 1.1 darran ssize_t size, increment;
835 1.1 darran
836 1.1 darran size_t vbytes;
837 1.1 darran uint_t n;
838 1.1 darran
839 1.1 darran (void) fbt_get_ctt_size(hp->cth_version, tp, &size, &increment);
840 1.1 darran
841 1.1 darran switch (kind) {
842 1.1 darran case CTF_K_INTEGER:
843 1.1 darran case CTF_K_FLOAT:
844 1.1 darran vbytes = sizeof (uint_t);
845 1.1 darran break;
846 1.1 darran case CTF_K_ARRAY:
847 1.1 darran vbytes = sizeof (ctf_array_t);
848 1.1 darran break;
849 1.1 darran case CTF_K_FUNCTION:
850 1.1 darran vbytes = sizeof (ushort_t) * (vlen + (vlen & 1));
851 1.1 darran break;
852 1.1 darran case CTF_K_STRUCT:
853 1.1 darran case CTF_K_UNION:
854 1.1 darran if (size < CTF_LSTRUCT_THRESH) {
855 1.1 darran ctf_member_t *mp = (ctf_member_t *)
856 1.1 darran ((uintptr_t)tp + increment);
857 1.1 darran
858 1.1 darran vbytes = sizeof (ctf_member_t) * vlen;
859 1.1 darran for (n = vlen; n != 0; n--, mp++)
860 1.1 darran child |= CTF_TYPE_ISCHILD(mp->ctm_type);
861 1.1 darran } else {
862 1.1 darran ctf_lmember_t *lmp = (ctf_lmember_t *)
863 1.1 darran ((uintptr_t)tp + increment);
864 1.1 darran
865 1.1 darran vbytes = sizeof (ctf_lmember_t) * vlen;
866 1.1 darran for (n = vlen; n != 0; n--, lmp++)
867 1.1 darran child |=
868 1.1 darran CTF_TYPE_ISCHILD(lmp->ctlm_type);
869 1.1 darran }
870 1.1 darran break;
871 1.1 darran case CTF_K_ENUM:
872 1.1 darran vbytes = sizeof (ctf_enum_t) * vlen;
873 1.1 darran break;
874 1.1 darran case CTF_K_FORWARD:
875 1.1 darran /*
876 1.1 darran * For forward declarations, ctt_type is the CTF_K_*
877 1.1 darran * kind for the tag, so bump that population count too.
878 1.1 darran * If ctt_type is unknown, treat the tag as a struct.
879 1.1 darran */
880 1.1 darran if (tp->ctt_type == CTF_K_UNKNOWN ||
881 1.1 darran tp->ctt_type >= CTF_K_MAX)
882 1.1 darran pop[CTF_K_STRUCT]++;
883 1.1 darran else
884 1.1 darran pop[tp->ctt_type]++;
885 1.1 darran /*FALLTHRU*/
886 1.1 darran case CTF_K_UNKNOWN:
887 1.1 darran vbytes = 0;
888 1.1 darran break;
889 1.1 darran case CTF_K_POINTER:
890 1.1 darran case CTF_K_TYPEDEF:
891 1.1 darran case CTF_K_VOLATILE:
892 1.1 darran case CTF_K_CONST:
893 1.1 darran case CTF_K_RESTRICT:
894 1.1 darran child |= CTF_TYPE_ISCHILD(tp->ctt_type);
895 1.1 darran vbytes = 0;
896 1.1 darran break;
897 1.1 darran default:
898 1.1 darran printf("%s(%d): detected invalid CTF kind -- %u\n", __func__, __LINE__, kind);
899 1.1 darran return (EIO);
900 1.1 darran }
901 1.1 darran tp = (ctf_type_t *)((uintptr_t)tp + increment + vbytes);
902 1.1 darran pop[kind]++;
903 1.1 darran }
904 1.1 darran
905 1.3 darran mc->typlen = ctf_typemax;
906 1.1 darran
907 1.3 darran if ((xp = malloc(sizeof(uint32_t) * ctf_typemax, M_FBT, M_ZERO | M_WAITOK)) == NULL)
908 1.1 darran return (ENOMEM);
909 1.1 darran
910 1.3 darran mc->typoffp = xp;
911 1.1 darran
912 1.1 darran /* type id 0 is used as a sentinel value */
913 1.1 darran *xp++ = 0;
914 1.1 darran
915 1.1 darran /*
916 1.1 darran * In the second pass, fill in the type offset.
917 1.1 darran */
918 1.1 darran for (tp = tbuf; tp < tend; xp++) {
919 1.1 darran ushort_t kind = CTF_INFO_KIND(tp->ctt_info);
920 1.1 darran ulong_t vlen = CTF_INFO_VLEN(tp->ctt_info);
921 1.1 darran ssize_t size, increment;
922 1.1 darran
923 1.1 darran size_t vbytes;
924 1.1 darran uint_t n;
925 1.1 darran
926 1.1 darran (void) fbt_get_ctt_size(hp->cth_version, tp, &size, &increment);
927 1.1 darran
928 1.1 darran switch (kind) {
929 1.1 darran case CTF_K_INTEGER:
930 1.1 darran case CTF_K_FLOAT:
931 1.1 darran vbytes = sizeof (uint_t);
932 1.1 darran break;
933 1.1 darran case CTF_K_ARRAY:
934 1.1 darran vbytes = sizeof (ctf_array_t);
935 1.1 darran break;
936 1.1 darran case CTF_K_FUNCTION:
937 1.1 darran vbytes = sizeof (ushort_t) * (vlen + (vlen & 1));
938 1.1 darran break;
939 1.1 darran case CTF_K_STRUCT:
940 1.1 darran case CTF_K_UNION:
941 1.1 darran if (size < CTF_LSTRUCT_THRESH) {
942 1.1 darran ctf_member_t *mp = (ctf_member_t *)
943 1.1 darran ((uintptr_t)tp + increment);
944 1.1 darran
945 1.1 darran vbytes = sizeof (ctf_member_t) * vlen;
946 1.1 darran for (n = vlen; n != 0; n--, mp++)
947 1.1 darran child |= CTF_TYPE_ISCHILD(mp->ctm_type);
948 1.1 darran } else {
949 1.1 darran ctf_lmember_t *lmp = (ctf_lmember_t *)
950 1.1 darran ((uintptr_t)tp + increment);
951 1.1 darran
952 1.1 darran vbytes = sizeof (ctf_lmember_t) * vlen;
953 1.1 darran for (n = vlen; n != 0; n--, lmp++)
954 1.1 darran child |=
955 1.1 darran CTF_TYPE_ISCHILD(lmp->ctlm_type);
956 1.1 darran }
957 1.1 darran break;
958 1.1 darran case CTF_K_ENUM:
959 1.1 darran vbytes = sizeof (ctf_enum_t) * vlen;
960 1.1 darran break;
961 1.1 darran case CTF_K_FORWARD:
962 1.1 darran case CTF_K_UNKNOWN:
963 1.1 darran vbytes = 0;
964 1.1 darran break;
965 1.1 darran case CTF_K_POINTER:
966 1.1 darran case CTF_K_TYPEDEF:
967 1.1 darran case CTF_K_VOLATILE:
968 1.1 darran case CTF_K_CONST:
969 1.1 darran case CTF_K_RESTRICT:
970 1.1 darran vbytes = 0;
971 1.1 darran break;
972 1.1 darran default:
973 1.1 darran printf("%s(%d): detected invalid CTF kind -- %u\n", __func__, __LINE__, kind);
974 1.1 darran return (EIO);
975 1.1 darran }
976 1.1 darran *xp = (uint32_t)((uintptr_t) tp - (uintptr_t) ctfdata);
977 1.1 darran tp = (ctf_type_t *)((uintptr_t)tp + increment + vbytes);
978 1.1 darran }
979 1.1 darran
980 1.1 darran return (0);
981 1.1 darran }
982 1.1 darran
983 1.1 darran /*
984 1.1 darran * CTF Declaration Stack
985 1.1 darran *
986 1.1 darran * In order to implement ctf_type_name(), we must convert a type graph back
987 1.1 darran * into a C type declaration. Unfortunately, a type graph represents a storage
988 1.1 darran * class ordering of the type whereas a type declaration must obey the C rules
989 1.1 darran * for operator precedence, and the two orderings are frequently in conflict.
990 1.1 darran * For example, consider these CTF type graphs and their C declarations:
991 1.1 darran *
992 1.1 darran * CTF_K_POINTER -> CTF_K_FUNCTION -> CTF_K_INTEGER : int (*)()
993 1.1 darran * CTF_K_POINTER -> CTF_K_ARRAY -> CTF_K_INTEGER : int (*)[]
994 1.1 darran *
995 1.1 darran * In each case, parentheses are used to raise operator * to higher lexical
996 1.1 darran * precedence, so the string form of the C declaration cannot be constructed by
997 1.1 darran * walking the type graph links and forming the string from left to right.
998 1.1 darran *
999 1.1 darran * The functions in this file build a set of stacks from the type graph nodes
1000 1.1 darran * corresponding to the C operator precedence levels in the appropriate order.
1001 1.1 darran * The code in ctf_type_name() can then iterate over the levels and nodes in
1002 1.1 darran * lexical precedence order and construct the final C declaration string.
1003 1.1 darran */
1004 1.1 darran typedef struct ctf_list {
1005 1.1 darran struct ctf_list *l_prev; /* previous pointer or tail pointer */
1006 1.1 darran struct ctf_list *l_next; /* next pointer or head pointer */
1007 1.1 darran } ctf_list_t;
1008 1.1 darran
1009 1.1 darran #define ctf_list_prev(elem) ((void *)(((ctf_list_t *)(elem))->l_prev))
1010 1.1 darran #define ctf_list_next(elem) ((void *)(((ctf_list_t *)(elem))->l_next))
1011 1.1 darran
1012 1.1 darran typedef enum {
1013 1.1 darran CTF_PREC_BASE,
1014 1.1 darran CTF_PREC_POINTER,
1015 1.1 darran CTF_PREC_ARRAY,
1016 1.1 darran CTF_PREC_FUNCTION,
1017 1.1 darran CTF_PREC_MAX
1018 1.1 darran } ctf_decl_prec_t;
1019 1.1 darran
1020 1.1 darran typedef struct ctf_decl_node {
1021 1.1 darran ctf_list_t cd_list; /* linked list pointers */
1022 1.1 darran ctf_id_t cd_type; /* type identifier */
1023 1.1 darran uint_t cd_kind; /* type kind */
1024 1.1 darran uint_t cd_n; /* type dimension if array */
1025 1.1 darran } ctf_decl_node_t;
1026 1.1 darran
1027 1.1 darran typedef struct ctf_decl {
1028 1.1 darran ctf_list_t cd_nodes[CTF_PREC_MAX]; /* declaration node stacks */
1029 1.1 darran int cd_order[CTF_PREC_MAX]; /* storage order of decls */
1030 1.1 darran ctf_decl_prec_t cd_qualp; /* qualifier precision */
1031 1.1 darran ctf_decl_prec_t cd_ordp; /* ordered precision */
1032 1.1 darran char *cd_buf; /* buffer for output */
1033 1.1 darran char *cd_ptr; /* buffer location */
1034 1.1 darran char *cd_end; /* buffer limit */
1035 1.1 darran size_t cd_len; /* buffer space required */
1036 1.1 darran int cd_err; /* saved error value */
1037 1.1 darran } ctf_decl_t;
1038 1.1 darran
1039 1.1 darran /*
1040 1.1 darran * Simple doubly-linked list append routine. This implementation assumes that
1041 1.1 darran * each list element contains an embedded ctf_list_t as the first member.
1042 1.1 darran * An additional ctf_list_t is used to store the head (l_next) and tail
1043 1.1 darran * (l_prev) pointers. The current head and tail list elements have their
1044 1.1 darran * previous and next pointers set to NULL, respectively.
1045 1.1 darran */
1046 1.1 darran static void
1047 1.1 darran ctf_list_append(ctf_list_t *lp, void *new)
1048 1.1 darran {
1049 1.1 darran ctf_list_t *p = lp->l_prev; /* p = tail list element */
1050 1.1 darran ctf_list_t *q = new; /* q = new list element */
1051 1.1 darran
1052 1.1 darran lp->l_prev = q;
1053 1.1 darran q->l_prev = p;
1054 1.1 darran q->l_next = NULL;
1055 1.1 darran
1056 1.1 darran if (p != NULL)
1057 1.1 darran p->l_next = q;
1058 1.1 darran else
1059 1.1 darran lp->l_next = q;
1060 1.1 darran }
1061 1.1 darran
1062 1.1 darran /*
1063 1.1 darran * Prepend the specified existing element to the given ctf_list_t. The
1064 1.1 darran * existing pointer should be pointing at a struct with embedded ctf_list_t.
1065 1.1 darran */
1066 1.1 darran static void
1067 1.1 darran ctf_list_prepend(ctf_list_t *lp, void *new)
1068 1.1 darran {
1069 1.1 darran ctf_list_t *p = new; /* p = new list element */
1070 1.1 darran ctf_list_t *q = lp->l_next; /* q = head list element */
1071 1.1 darran
1072 1.1 darran lp->l_next = p;
1073 1.1 darran p->l_prev = NULL;
1074 1.1 darran p->l_next = q;
1075 1.1 darran
1076 1.1 darran if (q != NULL)
1077 1.1 darran q->l_prev = p;
1078 1.1 darran else
1079 1.1 darran lp->l_prev = p;
1080 1.1 darran }
1081 1.1 darran
1082 1.1 darran static void
1083 1.1 darran ctf_decl_init(ctf_decl_t *cd, char *buf, size_t len)
1084 1.1 darran {
1085 1.1 darran int i;
1086 1.1 darran
1087 1.1 darran bzero(cd, sizeof (ctf_decl_t));
1088 1.1 darran
1089 1.1 darran for (i = CTF_PREC_BASE; i < CTF_PREC_MAX; i++)
1090 1.1 darran cd->cd_order[i] = CTF_PREC_BASE - 1;
1091 1.1 darran
1092 1.1 darran cd->cd_qualp = CTF_PREC_BASE;
1093 1.1 darran cd->cd_ordp = CTF_PREC_BASE;
1094 1.1 darran
1095 1.1 darran cd->cd_buf = buf;
1096 1.1 darran cd->cd_ptr = buf;
1097 1.1 darran cd->cd_end = buf + len;
1098 1.1 darran }
1099 1.1 darran
1100 1.1 darran static void
1101 1.1 darran ctf_decl_fini(ctf_decl_t *cd)
1102 1.1 darran {
1103 1.1 darran ctf_decl_node_t *cdp, *ndp;
1104 1.1 darran int i;
1105 1.1 darran
1106 1.1 darran for (i = CTF_PREC_BASE; i < CTF_PREC_MAX; i++) {
1107 1.1 darran for (cdp = ctf_list_next(&cd->cd_nodes[i]);
1108 1.1 darran cdp != NULL; cdp = ndp) {
1109 1.1 darran ndp = ctf_list_next(cdp);
1110 1.1 darran free(cdp, M_FBT);
1111 1.1 darran }
1112 1.1 darran }
1113 1.1 darran }
1114 1.1 darran
1115 1.1 darran static const ctf_type_t *
1116 1.3 darran ctf_lookup_by_id(mod_ctf_t *mc, ctf_id_t type)
1117 1.1 darran {
1118 1.1 darran const ctf_type_t *tp;
1119 1.1 darran uint32_t offset;
1120 1.3 darran uint32_t *typoff = mc->typoffp;
1121 1.1 darran
1122 1.3 darran if (type >= mc->typlen) {
1123 1.3 darran printf("%s(%d): type %d exceeds max %ld\n",__func__,__LINE__,(int) type,mc->typlen);
1124 1.1 darran return(NULL);
1125 1.1 darran }
1126 1.1 darran
1127 1.1 darran /* Check if the type isn't cross-referenced. */
1128 1.1 darran if ((offset = typoff[type]) == 0) {
1129 1.1 darran printf("%s(%d): type %d isn't cross referenced\n",__func__,__LINE__, (int) type);
1130 1.1 darran return(NULL);
1131 1.1 darran }
1132 1.1 darran
1133 1.3 darran tp = (const ctf_type_t *)(mc->ctftab + offset + sizeof(ctf_header_t));
1134 1.1 darran
1135 1.1 darran return (tp);
1136 1.1 darran }
1137 1.1 darran
1138 1.1 darran static void
1139 1.3 darran fbt_array_info(mod_ctf_t *mc, ctf_id_t type, ctf_arinfo_t *arp)
1140 1.1 darran {
1141 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;
1142 1.1 darran const ctf_type_t *tp;
1143 1.1 darran const ctf_array_t *ap;
1144 1.1 darran ssize_t increment;
1145 1.1 darran
1146 1.1 darran bzero(arp, sizeof(*arp));
1147 1.1 darran
1148 1.3 darran if ((tp = ctf_lookup_by_id(mc, type)) == NULL)
1149 1.1 darran return;
1150 1.1 darran
1151 1.1 darran if (CTF_INFO_KIND(tp->ctt_info) != CTF_K_ARRAY)
1152 1.1 darran return;
1153 1.1 darran
1154 1.1 darran (void) fbt_get_ctt_size(hp->cth_version, tp, NULL, &increment);
1155 1.1 darran
1156 1.1 darran ap = (const ctf_array_t *)((uintptr_t)tp + increment);
1157 1.1 darran arp->ctr_contents = ap->cta_contents;
1158 1.1 darran arp->ctr_index = ap->cta_index;
1159 1.1 darran arp->ctr_nelems = ap->cta_nelems;
1160 1.1 darran }
1161 1.1 darran
1162 1.1 darran static const char *
1163 1.3 darran ctf_strptr(mod_ctf_t *mc, int name)
1164 1.1 darran {
1165 1.3 darran const ctf_header_t *hp = (const ctf_header_t *) mc->ctftab;;
1166 1.1 darran const char *strp = "";
1167 1.1 darran
1168 1.1 darran if (name < 0 || name >= hp->cth_strlen)
1169 1.1 darran return(strp);
1170 1.1 darran
1171 1.3 darran strp = (const char *)(mc->ctftab + hp->cth_stroff + name + sizeof(ctf_header_t));
1172 1.1 darran
1173 1.1 darran return (strp);
1174 1.1 darran }
1175 1.1 darran
1176 1.1 darran static void
1177 1.3 darran ctf_decl_push(ctf_decl_t *cd, mod_ctf_t *mc, ctf_id_t type)
1178 1.1 darran {
1179 1.1 darran ctf_decl_node_t *cdp;
1180 1.1 darran ctf_decl_prec_t prec;
1181 1.1 darran uint_t kind, n = 1;
1182 1.1 darran int is_qual = 0;
1183 1.1 darran
1184 1.1 darran const ctf_type_t *tp;
1185 1.1 darran ctf_arinfo_t ar;
1186 1.1 darran
1187 1.3 darran if ((tp = ctf_lookup_by_id(mc, type)) == NULL) {
1188 1.1 darran cd->cd_err = ENOENT;
1189 1.1 darran return;
1190 1.1 darran }
1191 1.1 darran
1192 1.1 darran switch (kind = CTF_INFO_KIND(tp->ctt_info)) {
1193 1.1 darran case CTF_K_ARRAY:
1194 1.3 darran fbt_array_info(mc, type, &ar);
1195 1.3 darran ctf_decl_push(cd, mc, ar.ctr_contents);
1196 1.1 darran n = ar.ctr_nelems;
1197 1.1 darran prec = CTF_PREC_ARRAY;
1198 1.1 darran break;
1199 1.1 darran
1200 1.1 darran case CTF_K_TYPEDEF:
1201 1.3 darran if (ctf_strptr(mc, tp->ctt_name)[0] == '\0') {
1202 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1203 1.1 darran return;
1204 1.1 darran }
1205 1.1 darran prec = CTF_PREC_BASE;
1206 1.1 darran break;
1207 1.1 darran
1208 1.1 darran case CTF_K_FUNCTION:
1209 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1210 1.1 darran prec = CTF_PREC_FUNCTION;
1211 1.1 darran break;
1212 1.1 darran
1213 1.1 darran case CTF_K_POINTER:
1214 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1215 1.1 darran prec = CTF_PREC_POINTER;
1216 1.1 darran break;
1217 1.1 darran
1218 1.1 darran case CTF_K_VOLATILE:
1219 1.1 darran case CTF_K_CONST:
1220 1.1 darran case CTF_K_RESTRICT:
1221 1.3 darran ctf_decl_push(cd, mc, tp->ctt_type);
1222 1.1 darran prec = cd->cd_qualp;
1223 1.1 darran is_qual++;
1224 1.1 darran break;
1225 1.1 darran
1226 1.1 darran default:
1227 1.1 darran prec = CTF_PREC_BASE;
1228 1.1 darran }
1229 1.1 darran
1230 1.1 darran if ((cdp = malloc(sizeof (ctf_decl_node_t), M_FBT, M_WAITOK)) == NULL) {
1231 1.1 darran cd->cd_err = EAGAIN;
1232 1.1 darran return;
1233 1.1 darran }
1234 1.1 darran
1235 1.1 darran cdp->cd_type = type;
1236 1.1 darran cdp->cd_kind = kind;
1237 1.1 darran cdp->cd_n = n;
1238 1.1 darran
1239 1.1 darran if (ctf_list_next(&cd->cd_nodes[prec]) == NULL)
1240 1.1 darran cd->cd_order[prec] = cd->cd_ordp++;
1241 1.1 darran
1242 1.1 darran /*
1243 1.1 darran * Reset cd_qualp to the highest precedence level that we've seen so
1244 1.1 darran * far that can be qualified (CTF_PREC_BASE or CTF_PREC_POINTER).
1245 1.1 darran */
1246 1.1 darran if (prec > cd->cd_qualp && prec < CTF_PREC_ARRAY)
1247 1.1 darran cd->cd_qualp = prec;
1248 1.1 darran
1249 1.1 darran /*
1250 1.1 darran * C array declarators are ordered inside out so prepend them. Also by
1251 1.1 darran * convention qualifiers of base types precede the type specifier (e.g.
1252 1.1 darran * const int vs. int const) even though the two forms are equivalent.
1253 1.1 darran */
1254 1.1 darran if (kind == CTF_K_ARRAY || (is_qual && prec == CTF_PREC_BASE))
1255 1.1 darran ctf_list_prepend(&cd->cd_nodes[prec], cdp);
1256 1.1 darran else
1257 1.1 darran ctf_list_append(&cd->cd_nodes[prec], cdp);
1258 1.1 darran }
1259 1.1 darran
1260 1.1 darran static void
1261 1.1 darran ctf_decl_sprintf(ctf_decl_t *cd, const char *format, ...)
1262 1.1 darran {
1263 1.1 darran size_t len = (size_t)(cd->cd_end - cd->cd_ptr);
1264 1.1 darran va_list ap;
1265 1.1 darran size_t n;
1266 1.1 darran
1267 1.1 darran va_start(ap, format);
1268 1.1 darran n = vsnprintf(cd->cd_ptr, len, format, ap);
1269 1.1 darran va_end(ap);
1270 1.1 darran
1271 1.1 darran cd->cd_ptr += MIN(n, len);
1272 1.1 darran cd->cd_len += n;
1273 1.1 darran }
1274 1.1 darran
1275 1.1 darran static ssize_t
1276 1.3 darran fbt_type_name(mod_ctf_t *mc, ctf_id_t type, char *buf, size_t len)
1277 1.1 darran {
1278 1.1 darran ctf_decl_t cd;
1279 1.1 darran ctf_decl_node_t *cdp;
1280 1.1 darran ctf_decl_prec_t prec, lp, rp;
1281 1.1 darran int ptr, arr;
1282 1.1 darran uint_t k;
1283 1.1 darran
1284 1.3 darran if (mc == NULL && type == CTF_ERR)
1285 1.1 darran return (-1); /* simplify caller code by permitting CTF_ERR */
1286 1.1 darran
1287 1.1 darran ctf_decl_init(&cd, buf, len);
1288 1.3 darran ctf_decl_push(&cd, mc, type);
1289 1.1 darran
1290 1.1 darran if (cd.cd_err != 0) {
1291 1.1 darran ctf_decl_fini(&cd);
1292 1.1 darran return (-1);
1293 1.1 darran }
1294 1.1 darran
1295 1.1 darran /*
1296 1.1 darran * If the type graph's order conflicts with lexical precedence order
1297 1.1 darran * for pointers or arrays, then we need to surround the declarations at
1298 1.1 darran * the corresponding lexical precedence with parentheses. This can
1299 1.1 darran * result in either a parenthesized pointer (*) as in int (*)() or
1300 1.1 darran * int (*)[], or in a parenthesized pointer and array as in int (*[])().
1301 1.1 darran */
1302 1.1 darran ptr = cd.cd_order[CTF_PREC_POINTER] > CTF_PREC_POINTER;
1303 1.1 darran arr = cd.cd_order[CTF_PREC_ARRAY] > CTF_PREC_ARRAY;
1304 1.1 darran
1305 1.1 darran rp = arr ? CTF_PREC_ARRAY : ptr ? CTF_PREC_POINTER : -1;
1306 1.1 darran lp = ptr ? CTF_PREC_POINTER : arr ? CTF_PREC_ARRAY : -1;
1307 1.1 darran
1308 1.1 darran k = CTF_K_POINTER; /* avoid leading whitespace (see below) */
1309 1.1 darran
1310 1.1 darran for (prec = CTF_PREC_BASE; prec < CTF_PREC_MAX; prec++) {
1311 1.1 darran for (cdp = ctf_list_next(&cd.cd_nodes[prec]);
1312 1.1 darran cdp != NULL; cdp = ctf_list_next(cdp)) {
1313 1.1 darran
1314 1.1 darran const ctf_type_t *tp =
1315 1.3 darran ctf_lookup_by_id(mc, cdp->cd_type);
1316 1.3 darran const char *name = ctf_strptr(mc, tp->ctt_name);
1317 1.1 darran
1318 1.1 darran if (k != CTF_K_POINTER && k != CTF_K_ARRAY)
1319 1.1 darran ctf_decl_sprintf(&cd, " ");
1320 1.1 darran
1321 1.1 darran if (lp == prec) {
1322 1.1 darran ctf_decl_sprintf(&cd, "(");
1323 1.1 darran lp = -1;
1324 1.1 darran }
1325 1.1 darran
1326 1.1 darran switch (cdp->cd_kind) {
1327 1.1 darran case CTF_K_INTEGER:
1328 1.1 darran case CTF_K_FLOAT:
1329 1.1 darran case CTF_K_TYPEDEF:
1330 1.1 darran ctf_decl_sprintf(&cd, "%s", name);
1331 1.1 darran break;
1332 1.1 darran case CTF_K_POINTER:
1333 1.1 darran ctf_decl_sprintf(&cd, "*");
1334 1.1 darran break;
1335 1.1 darran case CTF_K_ARRAY:
1336 1.1 darran ctf_decl_sprintf(&cd, "[%u]", cdp->cd_n);
1337 1.1 darran break;
1338 1.1 darran case CTF_K_FUNCTION:
1339 1.1 darran ctf_decl_sprintf(&cd, "()");
1340 1.1 darran break;
1341 1.1 darran case CTF_K_STRUCT:
1342 1.1 darran case CTF_K_FORWARD:
1343 1.1 darran ctf_decl_sprintf(&cd, "struct %s", name);
1344 1.1 darran break;
1345 1.1 darran case CTF_K_UNION:
1346 1.1 darran ctf_decl_sprintf(&cd, "union %s", name);
1347 1.1 darran break;
1348 1.1 darran case CTF_K_ENUM:
1349 1.1 darran ctf_decl_sprintf(&cd, "enum %s", name);
1350 1.1 darran break;
1351 1.1 darran case CTF_K_VOLATILE:
1352 1.1 darran ctf_decl_sprintf(&cd, "volatile");
1353 1.1 darran break;
1354 1.1 darran case CTF_K_CONST:
1355 1.1 darran ctf_decl_sprintf(&cd, "const");
1356 1.1 darran break;
1357 1.1 darran case CTF_K_RESTRICT:
1358 1.1 darran ctf_decl_sprintf(&cd, "restrict");
1359 1.1 darran break;
1360 1.1 darran }
1361 1.1 darran
1362 1.1 darran k = cdp->cd_kind;
1363 1.1 darran }
1364 1.1 darran
1365 1.1 darran if (rp == prec)
1366 1.1 darran ctf_decl_sprintf(&cd, ")");
1367 1.1 darran }
1368 1.1 darran
1369 1.1 darran ctf_decl_fini(&cd);
1370 1.1 darran return (cd.cd_len);
1371 1.1 darran }
1372 1.1 darran
1373 1.1 darran static void
1374 1.1 darran fbt_getargdesc(void *arg __unused, dtrace_id_t id __unused, void *parg, dtrace_argdesc_t *desc)
1375 1.1 darran {
1376 1.1 darran const ushort_t *dp;
1377 1.1 darran fbt_probe_t *fbt = parg;
1378 1.3 darran mod_ctf_t mc;
1379 1.3 darran dtrace_modctl_t *ctl = fbt->fbtp_ctl;
1380 1.1 darran int ndx = desc->dtargd_ndx;
1381 1.1 darran int symindx = fbt->fbtp_symindx;
1382 1.1 darran uint32_t *ctfoff;
1383 1.1 darran uint32_t offset;
1384 1.1 darran ushort_t info, kind, n;
1385 1.3 darran int nsyms;
1386 1.1 darran
1387 1.1 darran desc->dtargd_ndx = DTRACE_ARGNONE;
1388 1.1 darran
1389 1.1 darran /* Get a pointer to the CTF data and it's length. */
1390 1.3 darran if (mod_ctf_get(ctl, &mc) != 0) {
1391 1.1 darran /* No CTF data? Something wrong? *shrug* */
1392 1.1 darran return;
1393 1.3 darran }
1394 1.3 darran
1395 1.3 darran nsyms = (mc.nmap != NULL) ? mc.nmapsize : mc.nsym;
1396 1.1 darran
1397 1.1 darran /* Check if this module hasn't been initialised yet. */
1398 1.3 darran if (mc.ctfoffp == NULL) {
1399 1.1 darran /*
1400 1.1 darran * Initialise the CTF object and function symindx to
1401 1.1 darran * byte offset array.
1402 1.1 darran */
1403 1.3 darran if (fbt_ctfoff_init(ctl, &mc) != 0) {
1404 1.1 darran return;
1405 1.3 darran }
1406 1.1 darran
1407 1.1 darran /* Initialise the CTF type to byte offset array. */
1408 1.3 darran if (fbt_typoff_init(&mc) != 0) {
1409 1.1 darran return;
1410 1.3 darran }
1411 1.1 darran }
1412 1.1 darran
1413 1.3 darran ctfoff = mc.ctfoffp;
1414 1.1 darran
1415 1.3 darran if (ctfoff == NULL || mc.typoffp == NULL) {
1416 1.1 darran return;
1417 1.3 darran }
1418 1.1 darran
1419 1.1 darran /* Check if the symbol index is out of range. */
1420 1.3 darran if (symindx >= nsyms)
1421 1.1 darran return;
1422 1.1 darran
1423 1.1 darran /* Check if the symbol isn't cross-referenced. */
1424 1.1 darran if ((offset = ctfoff[symindx]) == 0xffffffff)
1425 1.1 darran return;
1426 1.1 darran
1427 1.3 darran dp = (const ushort_t *)(mc.ctftab + offset + sizeof(ctf_header_t));
1428 1.1 darran
1429 1.1 darran info = *dp++;
1430 1.1 darran kind = CTF_INFO_KIND(info);
1431 1.1 darran n = CTF_INFO_VLEN(info);
1432 1.1 darran
1433 1.1 darran if (kind == CTF_K_UNKNOWN && n == 0) {
1434 1.1 darran printf("%s(%d): Unknown function!\n",__func__,__LINE__);
1435 1.1 darran return;
1436 1.1 darran }
1437 1.1 darran
1438 1.1 darran if (kind != CTF_K_FUNCTION) {
1439 1.1 darran printf("%s(%d): Expected a function!\n",__func__,__LINE__);
1440 1.1 darran return;
1441 1.1 darran }
1442 1.1 darran
1443 1.1 darran /* Check if the requested argument doesn't exist. */
1444 1.1 darran if (ndx >= n)
1445 1.1 darran return;
1446 1.1 darran
1447 1.1 darran /* Skip the return type and arguments up to the one requested. */
1448 1.1 darran dp += ndx + 1;
1449 1.1 darran
1450 1.3 darran if (fbt_type_name(&mc, *dp, desc->dtargd_native, sizeof(desc->dtargd_native)) > 0) {
1451 1.1 darran desc->dtargd_ndx = ndx;
1452 1.3 darran }
1453 1.1 darran
1454 1.1 darran return;
1455 1.1 darran }
1456 1.1 darran
1457 1.1 darran static void
1458 1.3 darran fbt_load(void)
1459 1.1 darran {
1460 1.1 darran /* Default the probe table size if not specified. */
1461 1.1 darran if (fbt_probetab_size == 0)
1462 1.1 darran fbt_probetab_size = FBT_PROBETAB_SIZE;
1463 1.1 darran
1464 1.1 darran /* Choose the hash mask for the probe table. */
1465 1.1 darran fbt_probetab_mask = fbt_probetab_size - 1;
1466 1.1 darran
1467 1.1 darran /* Allocate memory for the probe table. */
1468 1.1 darran fbt_probetab =
1469 1.1 darran malloc(fbt_probetab_size * sizeof (fbt_probe_t *), M_FBT, M_WAITOK | M_ZERO);
1470 1.1 darran
1471 1.1 darran dtrace_doubletrap_func = fbt_doubletrap;
1472 1.1 darran dtrace_invop_add(fbt_invop);
1473 1.1 darran
1474 1.1 darran if (dtrace_register("fbt", &fbt_attr, DTRACE_PRIV_USER,
1475 1.1 darran NULL, &fbt_pops, NULL, &fbt_id) != 0)
1476 1.1 darran return;
1477 1.1 darran }
1478 1.1 darran
1479 1.1 darran
1480 1.1 darran static int
1481 1.3 darran fbt_unload(void)
1482 1.1 darran {
1483 1.1 darran int error = 0;
1484 1.1 darran
1485 1.1 darran /* De-register the invalid opcode handler. */
1486 1.1 darran dtrace_invop_remove(fbt_invop);
1487 1.1 darran
1488 1.1 darran dtrace_doubletrap_func = NULL;
1489 1.1 darran
1490 1.1 darran /* De-register this DTrace provider. */
1491 1.1 darran if ((error = dtrace_unregister(fbt_id)) != 0)
1492 1.1 darran return (error);
1493 1.1 darran
1494 1.1 darran /* Free the probe table. */
1495 1.1 darran free(fbt_probetab, M_FBT);
1496 1.1 darran fbt_probetab = NULL;
1497 1.1 darran fbt_probetab_mask = 0;
1498 1.1 darran
1499 1.1 darran return (error);
1500 1.1 darran }
1501 1.1 darran
1502 1.3 darran
1503 1.1 darran static int
1504 1.3 darran fbt_modcmd(modcmd_t cmd, void *data)
1505 1.1 darran {
1506 1.3 darran int bmajor = -1, cmajor = -1;
1507 1.1 darran int error = 0;
1508 1.1 darran
1509 1.3 darran switch (cmd) {
1510 1.3 darran case MODULE_CMD_INIT:
1511 1.3 darran fbt_load();
1512 1.3 darran return devsw_attach("fbt", NULL, &bmajor,
1513 1.3 darran &fbt_cdevsw, &cmajor);
1514 1.3 darran case MODULE_CMD_FINI:
1515 1.3 darran fbt_unload();
1516 1.3 darran return devsw_detach(NULL, &fbt_cdevsw);
1517 1.1 darran default:
1518 1.3 darran return ENOTTY;
1519 1.1 darran }
1520 1.1 darran }
1521 1.1 darran
1522 1.1 darran static int
1523 1.3 darran fbt_open(dev_t dev, int flags, int mode, struct lwp *l)
1524 1.1 darran {
1525 1.1 darran return (0);
1526 1.1 darran }
1527 1.1 darran
1528 1.3 darran MODULE(MODULE_CLASS_MISC, fbt, "dtrace");
1529