10Sstevel@tonic-gate /* 20Sstevel@tonic-gate * CDDL HEADER START 30Sstevel@tonic-gate * 40Sstevel@tonic-gate * The contents of this file are subject to the terms of the 51677Sdp * Common Development and Distribution License (the "License"). 61677Sdp * You may not use this file except in compliance with the License. 70Sstevel@tonic-gate * 80Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 90Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 100Sstevel@tonic-gate * See the License for the specific language governing permissions 110Sstevel@tonic-gate * and limitations under the License. 120Sstevel@tonic-gate * 130Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 140Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 150Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 160Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 170Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 180Sstevel@tonic-gate * 190Sstevel@tonic-gate * CDDL HEADER END 200Sstevel@tonic-gate */ 21390Sraf 220Sstevel@tonic-gate /* 231677Sdp * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 240Sstevel@tonic-gate * Use is subject to license terms. 250Sstevel@tonic-gate */ 260Sstevel@tonic-gate 270Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 280Sstevel@tonic-gate 290Sstevel@tonic-gate #include <sys/atomic.h> 300Sstevel@tonic-gate #include <sys/errno.h> 310Sstevel@tonic-gate #include <sys/stat.h> 320Sstevel@tonic-gate #include <sys/modctl.h> 330Sstevel@tonic-gate #include <sys/conf.h> 340Sstevel@tonic-gate #include <sys/systm.h> 350Sstevel@tonic-gate #include <sys/ddi.h> 360Sstevel@tonic-gate #include <sys/sunddi.h> 370Sstevel@tonic-gate #include <sys/cpuvar.h> 380Sstevel@tonic-gate #include <sys/kmem.h> 390Sstevel@tonic-gate #include <sys/strsubr.h> 400Sstevel@tonic-gate #include <sys/fasttrap.h> 410Sstevel@tonic-gate #include <sys/fasttrap_impl.h> 420Sstevel@tonic-gate #include <sys/fasttrap_isa.h> 430Sstevel@tonic-gate #include <sys/dtrace.h> 440Sstevel@tonic-gate #include <sys/dtrace_impl.h> 450Sstevel@tonic-gate #include <sys/sysmacros.h> 460Sstevel@tonic-gate #include <sys/frame.h> 470Sstevel@tonic-gate #include <sys/stack.h> 480Sstevel@tonic-gate #include <sys/proc.h> 490Sstevel@tonic-gate #include <sys/priv.h> 500Sstevel@tonic-gate #include <sys/policy.h> 510Sstevel@tonic-gate #include <sys/ontrap.h> 520Sstevel@tonic-gate #include <sys/vmsystm.h> 530Sstevel@tonic-gate #include <sys/prsystm.h> 540Sstevel@tonic-gate 550Sstevel@tonic-gate #include <vm/as.h> 560Sstevel@tonic-gate #include <vm/seg.h> 570Sstevel@tonic-gate #include <vm/seg_dev.h> 580Sstevel@tonic-gate #include <vm/seg_vn.h> 590Sstevel@tonic-gate #include <vm/seg_spt.h> 600Sstevel@tonic-gate #include <vm/seg_kmem.h> 610Sstevel@tonic-gate 620Sstevel@tonic-gate /* 630Sstevel@tonic-gate * User-Land Trap-Based Tracing 640Sstevel@tonic-gate * ---------------------------- 650Sstevel@tonic-gate * 660Sstevel@tonic-gate * The fasttrap provider allows DTrace consumers to instrument any user-level 670Sstevel@tonic-gate * instruction to gather data; this includes probes with semantic 680Sstevel@tonic-gate * signifigance like entry and return as well as simple offsets into the 690Sstevel@tonic-gate * function. While the specific techniques used are very ISA specific, the 700Sstevel@tonic-gate * methodology is generalizable to any architecture. 710Sstevel@tonic-gate * 720Sstevel@tonic-gate * 730Sstevel@tonic-gate * The General Methodology 740Sstevel@tonic-gate * ----------------------- 750Sstevel@tonic-gate * 760Sstevel@tonic-gate * With the primary goal of tracing every user-land instruction and the 770Sstevel@tonic-gate * limitation that we can't trust user space so don't want to rely on much 780Sstevel@tonic-gate * information there, we begin by replacing the instructions we want to trace 790Sstevel@tonic-gate * with trap instructions. Each instruction we overwrite is saved into a hash 800Sstevel@tonic-gate * table keyed by process ID and pc address. When we enter the kernel due to 810Sstevel@tonic-gate * this trap instruction, we need the effects of the replaced instruction to 820Sstevel@tonic-gate * appear to have occurred before we proceed with the user thread's 830Sstevel@tonic-gate * execution. 840Sstevel@tonic-gate * 850Sstevel@tonic-gate * Each user level thread is represented by a ulwp_t structure which is 860Sstevel@tonic-gate * always easily accessible through a register. The most basic way to produce 870Sstevel@tonic-gate * the effects of the instruction we replaced is to copy that instruction out 880Sstevel@tonic-gate * to a bit of scratch space reserved in the user thread's ulwp_t structure 890Sstevel@tonic-gate * (a sort of kernel-private thread local storage), set the PC to that 900Sstevel@tonic-gate * scratch space and single step. When we reenter the kernel after single 910Sstevel@tonic-gate * stepping the instruction we must then adjust the PC to point to what would 920Sstevel@tonic-gate * normally be the next instruction. Of course, special care must be taken 930Sstevel@tonic-gate * for branches and jumps, but these represent such a small fraction of any 940Sstevel@tonic-gate * instruction set that writing the code to emulate these in the kernel is 950Sstevel@tonic-gate * not too difficult. 960Sstevel@tonic-gate * 970Sstevel@tonic-gate * Return probes may require several tracepoints to trace every return site, 980Sstevel@tonic-gate * and, conversely, each tracepoint may activate several probes (the entry 990Sstevel@tonic-gate * and offset 0 probes, for example). To solve this muliplexing problem, 1000Sstevel@tonic-gate * tracepoints contain lists of probes to activate and probes contain lists 1010Sstevel@tonic-gate * of tracepoints to enable. If a probe is activated, it adds its ID to 1020Sstevel@tonic-gate * existing tracepoints or creates new ones as necessary. 1030Sstevel@tonic-gate * 1040Sstevel@tonic-gate * Most probes are activated _before_ the instruction is executed, but return 1050Sstevel@tonic-gate * probes are activated _after_ the effects of the last instruction of the 1060Sstevel@tonic-gate * function are visible. Return probes must be fired _after_ we have 1070Sstevel@tonic-gate * single-stepped the instruction whereas all other probes are fired 1080Sstevel@tonic-gate * beforehand. 109*2179Sahl * 110*2179Sahl * 111*2179Sahl * Lock Ordering 112*2179Sahl * ------------- 113*2179Sahl * 114*2179Sahl * The lock ordering below -- both internally and with respect to the DTrace 115*2179Sahl * framework -- is a little tricky and bears some explanation. Each provider 116*2179Sahl * has a lock (ftp_mtx) that protects its members including reference counts 117*2179Sahl * for enabled probes (ftp_rcount), consumers actively creating probes 118*2179Sahl * (ftp_ccount) and USDT consumers (ftp_mcount); all three prevent a provider 119*2179Sahl * from being freed. A provider is looked up by taking the bucket lock for the 120*2179Sahl * provider hash table, and is returned with its lock held. The provider lock 121*2179Sahl * may be taken in functions invoked by the DTrace framework, but may not be 122*2179Sahl * held while calling functions in the DTrace framework. 123*2179Sahl * 124*2179Sahl * To ensure consistency over multiple calls to the DTrace framework, the 125*2179Sahl * creation lock (ftp_cmtx) should be held. Naturally, the creation lock may 126*2179Sahl * not be taken when holding the provider lock as that would create a cyclic 127*2179Sahl * lock ordering. In situations where one would naturally take the provider 128*2179Sahl * lock and then the creation lock, we instead up a reference count to prevent 129*2179Sahl * the provider from disappearing, drop the provider lock, and acquire the 130*2179Sahl * creation lock. 131*2179Sahl * 132*2179Sahl * Briefly: 133*2179Sahl * bucket lock before provider lock 134*2179Sahl * DTrace before provider lock 135*2179Sahl * creation lock before DTrace 136*2179Sahl * never hold the provider lock and creation lock simultaneously 1370Sstevel@tonic-gate */ 1380Sstevel@tonic-gate 1390Sstevel@tonic-gate static dev_info_t *fasttrap_devi; 1400Sstevel@tonic-gate static dtrace_meta_provider_id_t fasttrap_meta_id; 1410Sstevel@tonic-gate 1420Sstevel@tonic-gate static timeout_id_t fasttrap_timeout; 1430Sstevel@tonic-gate static kmutex_t fasttrap_cleanup_mtx; 1440Sstevel@tonic-gate static uint_t fasttrap_cleanup_work; 1450Sstevel@tonic-gate 1460Sstevel@tonic-gate /* 1470Sstevel@tonic-gate * Generation count on modifications to the global tracepoint lookup table. 1480Sstevel@tonic-gate */ 1490Sstevel@tonic-gate static volatile uint64_t fasttrap_mod_gen; 1500Sstevel@tonic-gate 1510Sstevel@tonic-gate /* 1520Sstevel@tonic-gate * When the fasttrap provider is loaded, fasttrap_max is set to either 1530Sstevel@tonic-gate * FASTTRAP_MAX_DEFAULT or the value for fasttrap-max-probes in the 1540Sstevel@tonic-gate * fasttrap.conf file. Each time a probe is created, fasttrap_total is 1550Sstevel@tonic-gate * incremented by the number of tracepoints that may be associated with that 1560Sstevel@tonic-gate * probe; fasttrap_total is capped at fasttrap_max. 1570Sstevel@tonic-gate */ 1580Sstevel@tonic-gate #define FASTTRAP_MAX_DEFAULT 250000 1590Sstevel@tonic-gate static uint32_t fasttrap_max; 1600Sstevel@tonic-gate static uint32_t fasttrap_total; 1610Sstevel@tonic-gate 1620Sstevel@tonic-gate 1630Sstevel@tonic-gate #define FASTTRAP_TPOINTS_DEFAULT_SIZE 0x4000 1640Sstevel@tonic-gate #define FASTTRAP_PROVIDERS_DEFAULT_SIZE 0x100 165532Sahl #define FASTTRAP_PROCS_DEFAULT_SIZE 0x100 1660Sstevel@tonic-gate 1670Sstevel@tonic-gate #define FASTTRAP_PID_NAME "pid" 1680Sstevel@tonic-gate 1690Sstevel@tonic-gate fasttrap_hash_t fasttrap_tpoints; 1700Sstevel@tonic-gate static fasttrap_hash_t fasttrap_provs; 171532Sahl static fasttrap_hash_t fasttrap_procs; 1720Sstevel@tonic-gate 173*2179Sahl static uint64_t fasttrap_pid_count; /* pid ref count */ 1740Sstevel@tonic-gate static kmutex_t fasttrap_count_mtx; /* lock on ref count */ 1750Sstevel@tonic-gate 176315Sahl #define FASTTRAP_ENABLE_FAIL 1 177315Sahl #define FASTTRAP_ENABLE_PARTIAL 2 178315Sahl 1790Sstevel@tonic-gate static int fasttrap_tracepoint_enable(proc_t *, fasttrap_probe_t *, uint_t); 1800Sstevel@tonic-gate static void fasttrap_tracepoint_disable(proc_t *, fasttrap_probe_t *, uint_t); 1810Sstevel@tonic-gate 1820Sstevel@tonic-gate static fasttrap_provider_t *fasttrap_provider_lookup(pid_t, const char *, 1830Sstevel@tonic-gate const dtrace_pattr_t *); 184935Sahl static void fasttrap_provider_retire(pid_t, const char *, int); 1850Sstevel@tonic-gate static void fasttrap_provider_free(fasttrap_provider_t *); 1860Sstevel@tonic-gate 187532Sahl static fasttrap_proc_t *fasttrap_proc_lookup(pid_t); 188532Sahl static void fasttrap_proc_release(fasttrap_proc_t *); 189532Sahl 1900Sstevel@tonic-gate #define FASTTRAP_PROVS_INDEX(pid, name) \ 1910Sstevel@tonic-gate ((fasttrap_hash_str(name) + (pid)) & fasttrap_provs.fth_mask) 1920Sstevel@tonic-gate 193532Sahl #define FASTTRAP_PROCS_INDEX(pid) ((pid) & fasttrap_procs.fth_mask) 194532Sahl 1950Sstevel@tonic-gate static int 1960Sstevel@tonic-gate fasttrap_highbit(ulong_t i) 1970Sstevel@tonic-gate { 1980Sstevel@tonic-gate int h = 1; 1990Sstevel@tonic-gate 2000Sstevel@tonic-gate if (i == 0) 2010Sstevel@tonic-gate return (0); 2020Sstevel@tonic-gate #ifdef _LP64 2030Sstevel@tonic-gate if (i & 0xffffffff00000000ul) { 2040Sstevel@tonic-gate h += 32; i >>= 32; 2050Sstevel@tonic-gate } 2060Sstevel@tonic-gate #endif 2070Sstevel@tonic-gate if (i & 0xffff0000) { 2080Sstevel@tonic-gate h += 16; i >>= 16; 2090Sstevel@tonic-gate } 2100Sstevel@tonic-gate if (i & 0xff00) { 2110Sstevel@tonic-gate h += 8; i >>= 8; 2120Sstevel@tonic-gate } 2130Sstevel@tonic-gate if (i & 0xf0) { 2140Sstevel@tonic-gate h += 4; i >>= 4; 2150Sstevel@tonic-gate } 2160Sstevel@tonic-gate if (i & 0xc) { 2170Sstevel@tonic-gate h += 2; i >>= 2; 2180Sstevel@tonic-gate } 2190Sstevel@tonic-gate if (i & 0x2) { 2200Sstevel@tonic-gate h += 1; 2210Sstevel@tonic-gate } 2220Sstevel@tonic-gate return (h); 2230Sstevel@tonic-gate } 2240Sstevel@tonic-gate 2250Sstevel@tonic-gate static uint_t 2260Sstevel@tonic-gate fasttrap_hash_str(const char *p) 2270Sstevel@tonic-gate { 2280Sstevel@tonic-gate unsigned int g; 2290Sstevel@tonic-gate uint_t hval = 0; 2300Sstevel@tonic-gate 2310Sstevel@tonic-gate while (*p) { 2320Sstevel@tonic-gate hval = (hval << 4) + *p++; 2330Sstevel@tonic-gate if ((g = (hval & 0xf0000000)) != 0) 2340Sstevel@tonic-gate hval ^= g >> 24; 2350Sstevel@tonic-gate hval &= ~g; 2360Sstevel@tonic-gate } 2370Sstevel@tonic-gate return (hval); 2380Sstevel@tonic-gate } 2390Sstevel@tonic-gate 2400Sstevel@tonic-gate void 2410Sstevel@tonic-gate fasttrap_sigtrap(proc_t *p, kthread_t *t, uintptr_t pc) 2420Sstevel@tonic-gate { 2430Sstevel@tonic-gate sigqueue_t *sqp = kmem_zalloc(sizeof (sigqueue_t), KM_SLEEP); 2440Sstevel@tonic-gate 2450Sstevel@tonic-gate sqp->sq_info.si_signo = SIGTRAP; 2460Sstevel@tonic-gate sqp->sq_info.si_code = TRAP_DTRACE; 2470Sstevel@tonic-gate sqp->sq_info.si_addr = (caddr_t)pc; 2480Sstevel@tonic-gate 2490Sstevel@tonic-gate mutex_enter(&p->p_lock); 2500Sstevel@tonic-gate sigaddqa(p, t, sqp); 2510Sstevel@tonic-gate mutex_exit(&p->p_lock); 2520Sstevel@tonic-gate 2530Sstevel@tonic-gate if (t != NULL) 2540Sstevel@tonic-gate aston(t); 2550Sstevel@tonic-gate } 2560Sstevel@tonic-gate 2570Sstevel@tonic-gate /* 2580Sstevel@tonic-gate * This function ensures that no threads are actively using the memory 2590Sstevel@tonic-gate * associated with probes that were formerly live. 2600Sstevel@tonic-gate */ 2610Sstevel@tonic-gate static void 2620Sstevel@tonic-gate fasttrap_mod_barrier(uint64_t gen) 2630Sstevel@tonic-gate { 2640Sstevel@tonic-gate int i; 2650Sstevel@tonic-gate 2660Sstevel@tonic-gate if (gen < fasttrap_mod_gen) 2670Sstevel@tonic-gate return; 2680Sstevel@tonic-gate 2690Sstevel@tonic-gate fasttrap_mod_gen++; 2700Sstevel@tonic-gate 2710Sstevel@tonic-gate for (i = 0; i < NCPU; i++) { 2720Sstevel@tonic-gate mutex_enter(&cpu_core[i].cpuc_pid_lock); 2730Sstevel@tonic-gate mutex_exit(&cpu_core[i].cpuc_pid_lock); 2740Sstevel@tonic-gate } 2750Sstevel@tonic-gate } 2760Sstevel@tonic-gate 2770Sstevel@tonic-gate /* 2780Sstevel@tonic-gate * This is the timeout's callback for cleaning up the providers and their 2790Sstevel@tonic-gate * probes. 2800Sstevel@tonic-gate */ 2810Sstevel@tonic-gate /*ARGSUSED*/ 2820Sstevel@tonic-gate static void 2830Sstevel@tonic-gate fasttrap_pid_cleanup_cb(void *data) 2840Sstevel@tonic-gate { 2850Sstevel@tonic-gate fasttrap_provider_t **fpp, *fp; 2860Sstevel@tonic-gate fasttrap_bucket_t *bucket; 2870Sstevel@tonic-gate dtrace_provider_id_t provid; 2880Sstevel@tonic-gate int i, later; 2890Sstevel@tonic-gate 2900Sstevel@tonic-gate static volatile int in = 0; 2910Sstevel@tonic-gate ASSERT(in == 0); 2920Sstevel@tonic-gate in = 1; 2930Sstevel@tonic-gate 2940Sstevel@tonic-gate mutex_enter(&fasttrap_cleanup_mtx); 2950Sstevel@tonic-gate while (fasttrap_cleanup_work) { 2960Sstevel@tonic-gate fasttrap_cleanup_work = 0; 2970Sstevel@tonic-gate mutex_exit(&fasttrap_cleanup_mtx); 2980Sstevel@tonic-gate 2990Sstevel@tonic-gate later = 0; 3000Sstevel@tonic-gate 3010Sstevel@tonic-gate /* 3020Sstevel@tonic-gate * Iterate over all the providers trying to remove the marked 303532Sahl * ones. If a provider is marked but not retired, we just 3040Sstevel@tonic-gate * have to take a crack at removing it -- it's no big deal if 3050Sstevel@tonic-gate * we can't. 3060Sstevel@tonic-gate */ 3070Sstevel@tonic-gate for (i = 0; i < fasttrap_provs.fth_nent; i++) { 3080Sstevel@tonic-gate bucket = &fasttrap_provs.fth_table[i]; 3090Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 3100Sstevel@tonic-gate fpp = (fasttrap_provider_t **)&bucket->ftb_data; 3110Sstevel@tonic-gate 3120Sstevel@tonic-gate while ((fp = *fpp) != NULL) { 3130Sstevel@tonic-gate if (!fp->ftp_marked) { 3140Sstevel@tonic-gate fpp = &fp->ftp_next; 3150Sstevel@tonic-gate continue; 3160Sstevel@tonic-gate } 3170Sstevel@tonic-gate 3180Sstevel@tonic-gate mutex_enter(&fp->ftp_mtx); 3190Sstevel@tonic-gate 3200Sstevel@tonic-gate /* 321*2179Sahl * If this provider has consumers actively 322*2179Sahl * creating probes (ftp_ccount) or is a USDT 323*2179Sahl * provider (ftp_mcount), we can't unregister 324*2179Sahl * or even condense. 3250Sstevel@tonic-gate */ 3261880Sahl if (fp->ftp_ccount != 0 || 3271880Sahl fp->ftp_mcount != 0) { 3280Sstevel@tonic-gate mutex_exit(&fp->ftp_mtx); 3290Sstevel@tonic-gate fp->ftp_marked = 0; 3300Sstevel@tonic-gate continue; 3310Sstevel@tonic-gate } 3320Sstevel@tonic-gate 333532Sahl if (!fp->ftp_retired || fp->ftp_rcount != 0) 3340Sstevel@tonic-gate fp->ftp_marked = 0; 3350Sstevel@tonic-gate 3360Sstevel@tonic-gate mutex_exit(&fp->ftp_mtx); 3370Sstevel@tonic-gate 3380Sstevel@tonic-gate /* 3390Sstevel@tonic-gate * If we successfully unregister this 3400Sstevel@tonic-gate * provider we can remove it from the hash 3410Sstevel@tonic-gate * chain and free the memory. If our attempt 342532Sahl * to unregister fails and this is a retired 3430Sstevel@tonic-gate * provider, increment our flag to try again 3440Sstevel@tonic-gate * pretty soon. If we've consumed more than 3450Sstevel@tonic-gate * half of our total permitted number of 3460Sstevel@tonic-gate * probes call dtrace_condense() to try to 3470Sstevel@tonic-gate * clean out the unenabled probes. 3480Sstevel@tonic-gate */ 3490Sstevel@tonic-gate provid = fp->ftp_provid; 3500Sstevel@tonic-gate if (dtrace_unregister(provid) != 0) { 3510Sstevel@tonic-gate if (fasttrap_total > fasttrap_max / 2) 3520Sstevel@tonic-gate (void) dtrace_condense(provid); 3530Sstevel@tonic-gate later += fp->ftp_marked; 3540Sstevel@tonic-gate fpp = &fp->ftp_next; 3550Sstevel@tonic-gate } else { 3560Sstevel@tonic-gate *fpp = fp->ftp_next; 3570Sstevel@tonic-gate fasttrap_provider_free(fp); 3580Sstevel@tonic-gate } 3590Sstevel@tonic-gate } 3600Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 3610Sstevel@tonic-gate } 3620Sstevel@tonic-gate 3630Sstevel@tonic-gate mutex_enter(&fasttrap_cleanup_mtx); 3640Sstevel@tonic-gate } 3650Sstevel@tonic-gate 3660Sstevel@tonic-gate ASSERT(fasttrap_timeout != 0); 3670Sstevel@tonic-gate 3680Sstevel@tonic-gate /* 369532Sahl * If we were unable to remove a retired provider, try again after 3700Sstevel@tonic-gate * a second. This situation can occur in certain circumstances where 3710Sstevel@tonic-gate * providers cannot be unregistered even though they have no probes 3720Sstevel@tonic-gate * enabled because of an execution of dtrace -l or something similar. 3730Sstevel@tonic-gate * If the timeout has been disabled (set to 1 because we're trying 3740Sstevel@tonic-gate * to detach), we set fasttrap_cleanup_work to ensure that we'll 3750Sstevel@tonic-gate * get a chance to do that work if and when the timeout is reenabled 3760Sstevel@tonic-gate * (if detach fails). 3770Sstevel@tonic-gate */ 3780Sstevel@tonic-gate if (later > 0 && fasttrap_timeout != (timeout_id_t)1) 3790Sstevel@tonic-gate fasttrap_timeout = timeout(&fasttrap_pid_cleanup_cb, NULL, hz); 3800Sstevel@tonic-gate else if (later > 0) 3810Sstevel@tonic-gate fasttrap_cleanup_work = 1; 3820Sstevel@tonic-gate else 3830Sstevel@tonic-gate fasttrap_timeout = 0; 3840Sstevel@tonic-gate 3850Sstevel@tonic-gate mutex_exit(&fasttrap_cleanup_mtx); 3860Sstevel@tonic-gate in = 0; 3870Sstevel@tonic-gate } 3880Sstevel@tonic-gate 3890Sstevel@tonic-gate /* 3900Sstevel@tonic-gate * Activates the asynchronous cleanup mechanism. 3910Sstevel@tonic-gate */ 3920Sstevel@tonic-gate static void 3930Sstevel@tonic-gate fasttrap_pid_cleanup(void) 3940Sstevel@tonic-gate { 3950Sstevel@tonic-gate mutex_enter(&fasttrap_cleanup_mtx); 3960Sstevel@tonic-gate fasttrap_cleanup_work = 1; 3970Sstevel@tonic-gate if (fasttrap_timeout == 0) 3980Sstevel@tonic-gate fasttrap_timeout = timeout(&fasttrap_pid_cleanup_cb, NULL, 1); 3990Sstevel@tonic-gate mutex_exit(&fasttrap_cleanup_mtx); 4000Sstevel@tonic-gate } 4010Sstevel@tonic-gate 4020Sstevel@tonic-gate /* 4030Sstevel@tonic-gate * This is called from cfork() via dtrace_fasttrap_fork(). The child 4040Sstevel@tonic-gate * process's address space is a (roughly) a copy of the parent process's so 4050Sstevel@tonic-gate * we have to remove all the instrumentation we had previously enabled in the 4060Sstevel@tonic-gate * parent. 4070Sstevel@tonic-gate */ 4080Sstevel@tonic-gate static void 4090Sstevel@tonic-gate fasttrap_fork(proc_t *p, proc_t *cp) 4100Sstevel@tonic-gate { 4110Sstevel@tonic-gate pid_t ppid = p->p_pid; 4120Sstevel@tonic-gate int i; 4130Sstevel@tonic-gate 4140Sstevel@tonic-gate ASSERT(curproc == p); 4150Sstevel@tonic-gate ASSERT(p->p_proc_flag & P_PR_LOCK); 4160Sstevel@tonic-gate ASSERT(p->p_dtrace_count > 0); 4170Sstevel@tonic-gate ASSERT(cp->p_dtrace_count == 0); 4180Sstevel@tonic-gate 4190Sstevel@tonic-gate /* 4200Sstevel@tonic-gate * This would be simpler and faster if we maintained per-process 4210Sstevel@tonic-gate * hash tables of enabled tracepoints. It could, however, potentially 4220Sstevel@tonic-gate * slow down execution of a tracepoint since we'd need to go 4230Sstevel@tonic-gate * through two levels of indirection. In the future, we should 4240Sstevel@tonic-gate * consider either maintaining per-process ancillary lists of 4250Sstevel@tonic-gate * enabled tracepoints or hanging a pointer to a per-process hash 4260Sstevel@tonic-gate * table of enabled tracepoints off the proc structure. 4270Sstevel@tonic-gate */ 4280Sstevel@tonic-gate 4290Sstevel@tonic-gate /* 4300Sstevel@tonic-gate * We don't have to worry about the child process disappearing 4310Sstevel@tonic-gate * because we're in fork(). 4320Sstevel@tonic-gate */ 4330Sstevel@tonic-gate mutex_enter(&cp->p_lock); 4340Sstevel@tonic-gate sprlock_proc(cp); 4350Sstevel@tonic-gate mutex_exit(&cp->p_lock); 4360Sstevel@tonic-gate 4370Sstevel@tonic-gate /* 4380Sstevel@tonic-gate * Iterate over every tracepoint looking for ones that belong to the 4390Sstevel@tonic-gate * parent process, and remove each from the child process. 4400Sstevel@tonic-gate */ 4410Sstevel@tonic-gate for (i = 0; i < fasttrap_tpoints.fth_nent; i++) { 4420Sstevel@tonic-gate fasttrap_tracepoint_t *tp; 4430Sstevel@tonic-gate fasttrap_bucket_t *bucket = &fasttrap_tpoints.fth_table[i]; 4440Sstevel@tonic-gate 4450Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 4460Sstevel@tonic-gate for (tp = bucket->ftb_data; tp != NULL; tp = tp->ftt_next) { 447532Sahl if (tp->ftt_pid == ppid && 448532Sahl !tp->ftt_proc->ftpc_defunct) { 4490Sstevel@tonic-gate int ret = fasttrap_tracepoint_remove(cp, tp); 4500Sstevel@tonic-gate ASSERT(ret == 0); 4510Sstevel@tonic-gate } 4520Sstevel@tonic-gate } 4530Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 4540Sstevel@tonic-gate } 4550Sstevel@tonic-gate 4560Sstevel@tonic-gate mutex_enter(&cp->p_lock); 4570Sstevel@tonic-gate sprunlock(cp); 4580Sstevel@tonic-gate } 4590Sstevel@tonic-gate 4600Sstevel@tonic-gate /* 4610Sstevel@tonic-gate * This is called from proc_exit() or from exec_common() if p_dtrace_probes 4620Sstevel@tonic-gate * is set on the proc structure to indicate that there is a pid provider 4630Sstevel@tonic-gate * associated with this process. 4640Sstevel@tonic-gate */ 4650Sstevel@tonic-gate static void 4660Sstevel@tonic-gate fasttrap_exec_exit(proc_t *p) 4670Sstevel@tonic-gate { 4680Sstevel@tonic-gate ASSERT(p == curproc); 4690Sstevel@tonic-gate ASSERT(MUTEX_HELD(&p->p_lock)); 4700Sstevel@tonic-gate 4710Sstevel@tonic-gate mutex_exit(&p->p_lock); 4720Sstevel@tonic-gate 4730Sstevel@tonic-gate /* 4740Sstevel@tonic-gate * We clean up the pid provider for this process here; user-land 4750Sstevel@tonic-gate * static probes are handled by the meta-provider remove entry point. 4760Sstevel@tonic-gate */ 477935Sahl fasttrap_provider_retire(p->p_pid, FASTTRAP_PID_NAME, 0); 4780Sstevel@tonic-gate 4790Sstevel@tonic-gate mutex_enter(&p->p_lock); 4800Sstevel@tonic-gate } 4810Sstevel@tonic-gate 4820Sstevel@tonic-gate 4830Sstevel@tonic-gate /*ARGSUSED*/ 4840Sstevel@tonic-gate static void 4850Sstevel@tonic-gate fasttrap_pid_provide(void *arg, const dtrace_probedesc_t *desc) 4860Sstevel@tonic-gate { 4870Sstevel@tonic-gate /* 4880Sstevel@tonic-gate * There are no "default" pid probes. 4890Sstevel@tonic-gate */ 4900Sstevel@tonic-gate } 4910Sstevel@tonic-gate 4920Sstevel@tonic-gate static int 4930Sstevel@tonic-gate fasttrap_tracepoint_enable(proc_t *p, fasttrap_probe_t *probe, uint_t index) 4940Sstevel@tonic-gate { 4950Sstevel@tonic-gate fasttrap_tracepoint_t *tp, *new_tp = NULL; 4960Sstevel@tonic-gate fasttrap_bucket_t *bucket; 4970Sstevel@tonic-gate fasttrap_id_t *id; 4980Sstevel@tonic-gate pid_t pid; 4990Sstevel@tonic-gate uintptr_t pc; 5000Sstevel@tonic-gate 5010Sstevel@tonic-gate ASSERT(index < probe->ftp_ntps); 5020Sstevel@tonic-gate 5030Sstevel@tonic-gate pid = probe->ftp_pid; 5040Sstevel@tonic-gate pc = probe->ftp_tps[index].fit_tp->ftt_pc; 5050Sstevel@tonic-gate id = &probe->ftp_tps[index].fit_id; 5060Sstevel@tonic-gate 5070Sstevel@tonic-gate ASSERT(probe->ftp_tps[index].fit_tp->ftt_pid == pid); 5080Sstevel@tonic-gate 5090Sstevel@tonic-gate ASSERT(!(p->p_flag & SVFORK)); 5100Sstevel@tonic-gate 5110Sstevel@tonic-gate /* 5120Sstevel@tonic-gate * Before we make any modifications, make sure we've imposed a barrier 5130Sstevel@tonic-gate * on the generation in which this probe was last modified. 5140Sstevel@tonic-gate */ 5150Sstevel@tonic-gate fasttrap_mod_barrier(probe->ftp_gen); 5160Sstevel@tonic-gate 5170Sstevel@tonic-gate bucket = &fasttrap_tpoints.fth_table[FASTTRAP_TPOINTS_INDEX(pid, pc)]; 5180Sstevel@tonic-gate 5190Sstevel@tonic-gate /* 5200Sstevel@tonic-gate * If the tracepoint has already been enabled, just add our id to the 5210Sstevel@tonic-gate * list of interested probes. This may be our second time through 5220Sstevel@tonic-gate * this path in which case we'll have constructed the tracepoint we'd 5230Sstevel@tonic-gate * like to install. If we can't find a match, and have an allocated 5240Sstevel@tonic-gate * tracepoint ready to go, enable that one now. 5250Sstevel@tonic-gate * 5261710Sahl * A tracepoint whose process is defunct is also considered defunct. 5270Sstevel@tonic-gate */ 5280Sstevel@tonic-gate again: 5290Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 5300Sstevel@tonic-gate for (tp = bucket->ftb_data; tp != NULL; tp = tp->ftt_next) { 5310Sstevel@tonic-gate if (tp->ftt_pid != pid || tp->ftt_pc != pc || 532532Sahl tp->ftt_proc->ftpc_defunct) 5330Sstevel@tonic-gate continue; 5340Sstevel@tonic-gate 5350Sstevel@tonic-gate /* 5360Sstevel@tonic-gate * Now that we've found a matching tracepoint, it would be 5370Sstevel@tonic-gate * a decent idea to confirm that the tracepoint is still 5380Sstevel@tonic-gate * enabled and the trap instruction hasn't been overwritten. 5390Sstevel@tonic-gate * Since this is a little hairy, we'll punt for now. 5400Sstevel@tonic-gate */ 5410Sstevel@tonic-gate 5420Sstevel@tonic-gate /* 5430Sstevel@tonic-gate * This can't be the first interested probe. We don't have 5440Sstevel@tonic-gate * to worry about another thread being in the midst of 5450Sstevel@tonic-gate * deleting this tracepoint (which would be the only valid 5460Sstevel@tonic-gate * reason for a tracepoint to have no interested probes) 5470Sstevel@tonic-gate * since we're holding P_PR_LOCK for this process. 5480Sstevel@tonic-gate */ 5490Sstevel@tonic-gate ASSERT(tp->ftt_ids != NULL || tp->ftt_retids != NULL); 5500Sstevel@tonic-gate 5511710Sahl switch (id->fti_ptype) { 5521710Sahl case DTFTP_ENTRY: 5531710Sahl case DTFTP_OFFSETS: 5541710Sahl case DTFTP_IS_ENABLED: 5551710Sahl id->fti_next = tp->ftt_ids; 5561710Sahl membar_producer(); 5571710Sahl tp->ftt_ids = id; 5581710Sahl membar_producer(); 5591710Sahl break; 5601710Sahl 5611710Sahl case DTFTP_RETURN: 5621710Sahl case DTFTP_POST_OFFSETS: 5630Sstevel@tonic-gate id->fti_next = tp->ftt_retids; 5640Sstevel@tonic-gate membar_producer(); 5650Sstevel@tonic-gate tp->ftt_retids = id; 5660Sstevel@tonic-gate membar_producer(); 5671710Sahl break; 5681710Sahl 5691710Sahl default: 5701710Sahl ASSERT(0); 5710Sstevel@tonic-gate } 5720Sstevel@tonic-gate 5730Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 5740Sstevel@tonic-gate 5750Sstevel@tonic-gate if (new_tp != NULL) { 5760Sstevel@tonic-gate new_tp->ftt_ids = NULL; 5770Sstevel@tonic-gate new_tp->ftt_retids = NULL; 5780Sstevel@tonic-gate } 5790Sstevel@tonic-gate 5800Sstevel@tonic-gate return (0); 5810Sstevel@tonic-gate } 5820Sstevel@tonic-gate 5830Sstevel@tonic-gate /* 5840Sstevel@tonic-gate * If we have a good tracepoint ready to go, install it now while 5850Sstevel@tonic-gate * we have the lock held and no one can screw with us. 5860Sstevel@tonic-gate */ 5870Sstevel@tonic-gate if (new_tp != NULL) { 588315Sahl int rc = 0; 5890Sstevel@tonic-gate 5900Sstevel@tonic-gate new_tp->ftt_next = bucket->ftb_data; 5910Sstevel@tonic-gate membar_producer(); 5920Sstevel@tonic-gate bucket->ftb_data = new_tp; 5930Sstevel@tonic-gate membar_producer(); 5940Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 5950Sstevel@tonic-gate 5960Sstevel@tonic-gate /* 597315Sahl * Activate the tracepoint in the ISA-specific manner. 598315Sahl * If this fails, we need to report the failure, but 599315Sahl * indicate that this tracepoint must still be disabled 600315Sahl * by calling fasttrap_tracepoint_disable(). 6010Sstevel@tonic-gate */ 602315Sahl if (fasttrap_tracepoint_install(p, new_tp) != 0) 603315Sahl rc = FASTTRAP_ENABLE_PARTIAL; 604315Sahl 605315Sahl /* 606315Sahl * Increment the count of the number of tracepoints active in 607315Sahl * the victim process. 608315Sahl */ 609315Sahl ASSERT(p->p_proc_flag & P_PR_LOCK); 610315Sahl p->p_dtrace_count++; 6110Sstevel@tonic-gate 6120Sstevel@tonic-gate return (rc); 6130Sstevel@tonic-gate } 6140Sstevel@tonic-gate 6150Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 6160Sstevel@tonic-gate 6170Sstevel@tonic-gate /* 6180Sstevel@tonic-gate * Initialize the tracepoint that's been preallocated with the probe. 6190Sstevel@tonic-gate */ 6200Sstevel@tonic-gate new_tp = probe->ftp_tps[index].fit_tp; 6210Sstevel@tonic-gate 6220Sstevel@tonic-gate ASSERT(new_tp->ftt_pid == pid); 6230Sstevel@tonic-gate ASSERT(new_tp->ftt_pc == pc); 624532Sahl ASSERT(new_tp->ftt_proc == probe->ftp_prov->ftp_proc); 6250Sstevel@tonic-gate ASSERT(new_tp->ftt_ids == NULL); 6260Sstevel@tonic-gate ASSERT(new_tp->ftt_retids == NULL); 6270Sstevel@tonic-gate 6281710Sahl switch (id->fti_ptype) { 6291710Sahl case DTFTP_ENTRY: 6301710Sahl case DTFTP_OFFSETS: 6311710Sahl case DTFTP_IS_ENABLED: 6321710Sahl id->fti_next = NULL; 6331710Sahl new_tp->ftt_ids = id; 6341710Sahl break; 6351710Sahl 6361710Sahl case DTFTP_RETURN: 6371710Sahl case DTFTP_POST_OFFSETS: 6380Sstevel@tonic-gate id->fti_next = NULL; 6390Sstevel@tonic-gate new_tp->ftt_retids = id; 6401710Sahl break; 6411710Sahl 6421710Sahl default: 6431710Sahl ASSERT(0); 6440Sstevel@tonic-gate } 6450Sstevel@tonic-gate 6460Sstevel@tonic-gate /* 647315Sahl * If the ISA-dependent initialization goes to plan, go back to the 6480Sstevel@tonic-gate * beginning and try to install this freshly made tracepoint. 6490Sstevel@tonic-gate */ 6501710Sahl if (fasttrap_tracepoint_init(p, new_tp, pc, id->fti_ptype) == 0) 6510Sstevel@tonic-gate goto again; 6520Sstevel@tonic-gate 6530Sstevel@tonic-gate new_tp->ftt_ids = NULL; 6540Sstevel@tonic-gate new_tp->ftt_retids = NULL; 6550Sstevel@tonic-gate 656315Sahl return (FASTTRAP_ENABLE_FAIL); 6570Sstevel@tonic-gate } 6580Sstevel@tonic-gate 6590Sstevel@tonic-gate static void 6600Sstevel@tonic-gate fasttrap_tracepoint_disable(proc_t *p, fasttrap_probe_t *probe, uint_t index) 6610Sstevel@tonic-gate { 6620Sstevel@tonic-gate fasttrap_bucket_t *bucket; 6630Sstevel@tonic-gate fasttrap_provider_t *provider = probe->ftp_prov; 6640Sstevel@tonic-gate fasttrap_tracepoint_t **pp, *tp; 6650Sstevel@tonic-gate fasttrap_id_t *id, **idp; 6660Sstevel@tonic-gate pid_t pid; 6670Sstevel@tonic-gate uintptr_t pc; 6680Sstevel@tonic-gate 6690Sstevel@tonic-gate ASSERT(index < probe->ftp_ntps); 6700Sstevel@tonic-gate 6710Sstevel@tonic-gate pid = probe->ftp_pid; 6720Sstevel@tonic-gate pc = probe->ftp_tps[index].fit_tp->ftt_pc; 6731710Sahl id = &probe->ftp_tps[index].fit_id; 6740Sstevel@tonic-gate 6750Sstevel@tonic-gate ASSERT(probe->ftp_tps[index].fit_tp->ftt_pid == pid); 6760Sstevel@tonic-gate 6770Sstevel@tonic-gate /* 6780Sstevel@tonic-gate * Find the tracepoint and make sure that our id is one of the 6790Sstevel@tonic-gate * ones registered with it. 6800Sstevel@tonic-gate */ 6810Sstevel@tonic-gate bucket = &fasttrap_tpoints.fth_table[FASTTRAP_TPOINTS_INDEX(pid, pc)]; 6820Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 6830Sstevel@tonic-gate for (tp = bucket->ftb_data; tp != NULL; tp = tp->ftt_next) { 6840Sstevel@tonic-gate if (tp->ftt_pid == pid && tp->ftt_pc == pc && 685532Sahl tp->ftt_proc == provider->ftp_proc) 6860Sstevel@tonic-gate break; 6870Sstevel@tonic-gate } 6880Sstevel@tonic-gate 6890Sstevel@tonic-gate /* 6900Sstevel@tonic-gate * If we somehow lost this tracepoint, we're in a world of hurt. 6910Sstevel@tonic-gate */ 6920Sstevel@tonic-gate ASSERT(tp != NULL); 6930Sstevel@tonic-gate 6941710Sahl switch (id->fti_ptype) { 6951710Sahl case DTFTP_ENTRY: 6961710Sahl case DTFTP_OFFSETS: 6971710Sahl case DTFTP_IS_ENABLED: 6981710Sahl ASSERT(tp->ftt_ids != NULL); 6991710Sahl idp = &tp->ftt_ids; 7001710Sahl break; 7011710Sahl 7021710Sahl case DTFTP_RETURN: 7031710Sahl case DTFTP_POST_OFFSETS: 7040Sstevel@tonic-gate ASSERT(tp->ftt_retids != NULL); 7050Sstevel@tonic-gate idp = &tp->ftt_retids; 7061710Sahl break; 7071710Sahl 7081710Sahl default: 7091710Sahl ASSERT(0); 7100Sstevel@tonic-gate } 7110Sstevel@tonic-gate 7120Sstevel@tonic-gate while ((*idp)->fti_probe != probe) { 7130Sstevel@tonic-gate idp = &(*idp)->fti_next; 7140Sstevel@tonic-gate ASSERT(*idp != NULL); 7150Sstevel@tonic-gate } 7160Sstevel@tonic-gate 7170Sstevel@tonic-gate id = *idp; 7180Sstevel@tonic-gate *idp = id->fti_next; 7190Sstevel@tonic-gate membar_producer(); 7200Sstevel@tonic-gate 7210Sstevel@tonic-gate ASSERT(id->fti_probe == probe); 7220Sstevel@tonic-gate 7230Sstevel@tonic-gate /* 7240Sstevel@tonic-gate * If there are other registered enablings of this tracepoint, we're 7250Sstevel@tonic-gate * all done, but if this was the last probe assocated with this 7260Sstevel@tonic-gate * this tracepoint, we need to remove and free it. 7270Sstevel@tonic-gate */ 7280Sstevel@tonic-gate if (tp->ftt_ids != NULL || tp->ftt_retids != NULL) { 7290Sstevel@tonic-gate 7300Sstevel@tonic-gate /* 7310Sstevel@tonic-gate * If the current probe's tracepoint is in use, swap it 7320Sstevel@tonic-gate * for an unused tracepoint. 7330Sstevel@tonic-gate */ 7340Sstevel@tonic-gate if (tp == probe->ftp_tps[index].fit_tp) { 7350Sstevel@tonic-gate fasttrap_probe_t *tmp_probe; 7360Sstevel@tonic-gate fasttrap_tracepoint_t **tmp_tp; 7370Sstevel@tonic-gate uint_t tmp_index; 7380Sstevel@tonic-gate 7390Sstevel@tonic-gate if (tp->ftt_ids != NULL) { 7400Sstevel@tonic-gate tmp_probe = tp->ftt_ids->fti_probe; 7410Sstevel@tonic-gate tmp_index = FASTTRAP_ID_INDEX(tp->ftt_ids); 7420Sstevel@tonic-gate tmp_tp = &tmp_probe->ftp_tps[tmp_index].fit_tp; 7430Sstevel@tonic-gate } else { 7440Sstevel@tonic-gate tmp_probe = tp->ftt_retids->fti_probe; 7450Sstevel@tonic-gate tmp_index = FASTTRAP_ID_INDEX(tp->ftt_retids); 7460Sstevel@tonic-gate tmp_tp = &tmp_probe->ftp_tps[tmp_index].fit_tp; 7470Sstevel@tonic-gate } 7480Sstevel@tonic-gate 7490Sstevel@tonic-gate ASSERT(*tmp_tp != NULL); 7500Sstevel@tonic-gate ASSERT(*tmp_tp != probe->ftp_tps[index].fit_tp); 7510Sstevel@tonic-gate ASSERT((*tmp_tp)->ftt_ids == NULL); 7520Sstevel@tonic-gate ASSERT((*tmp_tp)->ftt_retids == NULL); 7530Sstevel@tonic-gate 7540Sstevel@tonic-gate probe->ftp_tps[index].fit_tp = *tmp_tp; 7550Sstevel@tonic-gate *tmp_tp = tp; 7560Sstevel@tonic-gate 7570Sstevel@tonic-gate } 7580Sstevel@tonic-gate 7590Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 7600Sstevel@tonic-gate 7610Sstevel@tonic-gate /* 7620Sstevel@tonic-gate * Tag the modified probe with the generation in which it was 7630Sstevel@tonic-gate * changed. 7640Sstevel@tonic-gate */ 7650Sstevel@tonic-gate probe->ftp_gen = fasttrap_mod_gen; 7660Sstevel@tonic-gate return; 7670Sstevel@tonic-gate } 7680Sstevel@tonic-gate 7690Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 7700Sstevel@tonic-gate 7710Sstevel@tonic-gate /* 7720Sstevel@tonic-gate * We can't safely remove the tracepoint from the set of active 7730Sstevel@tonic-gate * tracepoints until we've actually removed the fasttrap instruction 7740Sstevel@tonic-gate * from the process's text. We can, however, operate on this 7750Sstevel@tonic-gate * tracepoint secure in the knowledge that no other thread is going to 7760Sstevel@tonic-gate * be looking at it since we hold P_PR_LOCK on the process if it's 7770Sstevel@tonic-gate * live or we hold the provider lock on the process if it's dead and 7780Sstevel@tonic-gate * gone. 7790Sstevel@tonic-gate */ 7800Sstevel@tonic-gate 7810Sstevel@tonic-gate /* 7820Sstevel@tonic-gate * We only need to remove the actual instruction if we're looking 7830Sstevel@tonic-gate * at an existing process 7840Sstevel@tonic-gate */ 7850Sstevel@tonic-gate if (p != NULL) { 7860Sstevel@tonic-gate /* 7870Sstevel@tonic-gate * If we fail to restore the instruction we need to kill 7880Sstevel@tonic-gate * this process since it's in a completely unrecoverable 7890Sstevel@tonic-gate * state. 7900Sstevel@tonic-gate */ 7910Sstevel@tonic-gate if (fasttrap_tracepoint_remove(p, tp) != 0) 7920Sstevel@tonic-gate fasttrap_sigtrap(p, NULL, pc); 7930Sstevel@tonic-gate 7940Sstevel@tonic-gate /* 7950Sstevel@tonic-gate * Decrement the count of the number of tracepoints active 7960Sstevel@tonic-gate * in the victim process. 7970Sstevel@tonic-gate */ 7980Sstevel@tonic-gate ASSERT(p->p_proc_flag & P_PR_LOCK); 7990Sstevel@tonic-gate p->p_dtrace_count--; 8000Sstevel@tonic-gate } 8010Sstevel@tonic-gate 8020Sstevel@tonic-gate /* 8030Sstevel@tonic-gate * Remove the probe from the hash table of active tracepoints. 8040Sstevel@tonic-gate */ 8050Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 8060Sstevel@tonic-gate pp = (fasttrap_tracepoint_t **)&bucket->ftb_data; 8070Sstevel@tonic-gate ASSERT(*pp != NULL); 8080Sstevel@tonic-gate while (*pp != tp) { 8090Sstevel@tonic-gate pp = &(*pp)->ftt_next; 8100Sstevel@tonic-gate ASSERT(*pp != NULL); 8110Sstevel@tonic-gate } 8120Sstevel@tonic-gate 8130Sstevel@tonic-gate *pp = tp->ftt_next; 8140Sstevel@tonic-gate membar_producer(); 8150Sstevel@tonic-gate 8160Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 8170Sstevel@tonic-gate 8180Sstevel@tonic-gate /* 8190Sstevel@tonic-gate * Tag the modified probe with the generation in which it was changed. 8200Sstevel@tonic-gate */ 8210Sstevel@tonic-gate probe->ftp_gen = fasttrap_mod_gen; 8220Sstevel@tonic-gate } 8230Sstevel@tonic-gate 8240Sstevel@tonic-gate static void 825*2179Sahl fasttrap_enable_callbacks(void) 8260Sstevel@tonic-gate { 8270Sstevel@tonic-gate /* 8280Sstevel@tonic-gate * We don't have to play the rw lock game here because we're 8290Sstevel@tonic-gate * providing something rather than taking something away -- 8300Sstevel@tonic-gate * we can be sure that no threads have tried to follow this 8310Sstevel@tonic-gate * function pointer yet. 8320Sstevel@tonic-gate */ 8330Sstevel@tonic-gate mutex_enter(&fasttrap_count_mtx); 834*2179Sahl if (fasttrap_pid_count == 0) { 835*2179Sahl ASSERT(dtrace_pid_probe_ptr == NULL); 836*2179Sahl ASSERT(dtrace_return_probe_ptr == NULL); 837*2179Sahl dtrace_pid_probe_ptr = &fasttrap_pid_probe; 838*2179Sahl dtrace_return_probe_ptr = &fasttrap_return_probe; 8390Sstevel@tonic-gate } 840*2179Sahl ASSERT(dtrace_pid_probe_ptr == &fasttrap_pid_probe); 841*2179Sahl ASSERT(dtrace_return_probe_ptr == &fasttrap_return_probe); 842*2179Sahl fasttrap_pid_count++; 8430Sstevel@tonic-gate mutex_exit(&fasttrap_count_mtx); 8440Sstevel@tonic-gate } 8450Sstevel@tonic-gate 8460Sstevel@tonic-gate static void 847*2179Sahl fasttrap_disable_callbacks(void) 8480Sstevel@tonic-gate { 8490Sstevel@tonic-gate ASSERT(MUTEX_HELD(&cpu_lock)); 8500Sstevel@tonic-gate 8510Sstevel@tonic-gate mutex_enter(&fasttrap_count_mtx); 852*2179Sahl ASSERT(fasttrap_pid_count > 0); 853*2179Sahl fasttrap_pid_count--; 854*2179Sahl if (fasttrap_pid_count == 0) { 8550Sstevel@tonic-gate cpu_t *cur, *cpu = CPU; 8560Sstevel@tonic-gate 8570Sstevel@tonic-gate for (cur = cpu->cpu_next_onln; cur != cpu; 8580Sstevel@tonic-gate cur = cur->cpu_next_onln) { 8590Sstevel@tonic-gate rw_enter(&cur->cpu_ft_lock, RW_WRITER); 8600Sstevel@tonic-gate } 8610Sstevel@tonic-gate 862*2179Sahl dtrace_pid_probe_ptr = NULL; 863*2179Sahl dtrace_return_probe_ptr = NULL; 8640Sstevel@tonic-gate 8650Sstevel@tonic-gate for (cur = cpu->cpu_next_onln; cur != cpu; 8660Sstevel@tonic-gate cur = cur->cpu_next_onln) { 8670Sstevel@tonic-gate rw_exit(&cur->cpu_ft_lock); 8680Sstevel@tonic-gate } 8690Sstevel@tonic-gate } 8700Sstevel@tonic-gate mutex_exit(&fasttrap_count_mtx); 8710Sstevel@tonic-gate } 8720Sstevel@tonic-gate 8730Sstevel@tonic-gate /*ARGSUSED*/ 8740Sstevel@tonic-gate static void 8750Sstevel@tonic-gate fasttrap_pid_enable(void *arg, dtrace_id_t id, void *parg) 8760Sstevel@tonic-gate { 8770Sstevel@tonic-gate fasttrap_probe_t *probe = parg; 8780Sstevel@tonic-gate proc_t *p; 879315Sahl int i, rc; 8800Sstevel@tonic-gate 8810Sstevel@tonic-gate ASSERT(probe != NULL); 8820Sstevel@tonic-gate ASSERT(!probe->ftp_enabled); 8830Sstevel@tonic-gate ASSERT(id == probe->ftp_id); 8840Sstevel@tonic-gate ASSERT(MUTEX_HELD(&cpu_lock)); 8850Sstevel@tonic-gate 8860Sstevel@tonic-gate /* 8870Sstevel@tonic-gate * Increment the count of enabled probes on this probe's provider; 8880Sstevel@tonic-gate * the provider can't go away while the probe still exists. We 8890Sstevel@tonic-gate * must increment this even if we aren't able to properly enable 8900Sstevel@tonic-gate * this probe. 8910Sstevel@tonic-gate */ 8920Sstevel@tonic-gate mutex_enter(&probe->ftp_prov->ftp_mtx); 8930Sstevel@tonic-gate probe->ftp_prov->ftp_rcount++; 8940Sstevel@tonic-gate mutex_exit(&probe->ftp_prov->ftp_mtx); 8950Sstevel@tonic-gate 8960Sstevel@tonic-gate /* 8971880Sahl * If this probe's provider is retired (meaning it was valid in a 8981880Sahl * previously exec'ed incarnation of this address space), bail out. The 8991880Sahl * provider can't go away while we're in this code path. 9001880Sahl */ 9011880Sahl if (probe->ftp_prov->ftp_retired) 9021880Sahl return; 9031880Sahl 9041880Sahl /* 9051880Sahl * If we can't find the process, it may be that we're in the context of 9061880Sahl * a fork in which the traced process is being born and we're copying 9071880Sahl * USDT probes. Otherwise, the process is gone so bail. 9080Sstevel@tonic-gate */ 9091880Sahl if ((p = sprlock(probe->ftp_pid)) == NULL) { 9101880Sahl if ((curproc->p_flag & SFORKING) == 0) 9111880Sahl return; 9121880Sahl 9131880Sahl mutex_enter(&pidlock); 9141880Sahl p = prfind(probe->ftp_pid); 9151880Sahl 9161880Sahl /* 9171880Sahl * Confirm that curproc is indeed forking the process in which 9181880Sahl * we're trying to enable probes. 9191880Sahl */ 9201880Sahl ASSERT(p != NULL); 9211880Sahl ASSERT(p->p_parent == curproc); 9221880Sahl ASSERT(p->p_stat == SIDL); 9231880Sahl 9241880Sahl mutex_enter(&p->p_lock); 9251880Sahl mutex_exit(&pidlock); 9261880Sahl 9271880Sahl sprlock_proc(p); 9281880Sahl } 9290Sstevel@tonic-gate 9300Sstevel@tonic-gate ASSERT(!(p->p_flag & SVFORK)); 9310Sstevel@tonic-gate mutex_exit(&p->p_lock); 9320Sstevel@tonic-gate 9330Sstevel@tonic-gate /* 934*2179Sahl * We have to enable the trap entry point before any user threads have 9350Sstevel@tonic-gate * the chance to execute the trap instruction we're about to place 9360Sstevel@tonic-gate * in their process's text. 9370Sstevel@tonic-gate */ 938*2179Sahl fasttrap_enable_callbacks(); 9390Sstevel@tonic-gate 9400Sstevel@tonic-gate /* 9410Sstevel@tonic-gate * Enable all the tracepoints and add this probe's id to each 9420Sstevel@tonic-gate * tracepoint's list of active probes. 9430Sstevel@tonic-gate */ 9440Sstevel@tonic-gate for (i = 0; i < probe->ftp_ntps; i++) { 945315Sahl if ((rc = fasttrap_tracepoint_enable(p, probe, i)) != 0) { 946315Sahl /* 947315Sahl * If enabling the tracepoint failed completely, 948315Sahl * we don't have to disable it; if the failure 949315Sahl * was only partial we must disable it. 950315Sahl */ 951315Sahl if (rc == FASTTRAP_ENABLE_FAIL) 952315Sahl i--; 953315Sahl else 954315Sahl ASSERT(rc == FASTTRAP_ENABLE_PARTIAL); 955315Sahl 9560Sstevel@tonic-gate /* 9570Sstevel@tonic-gate * Back up and pull out all the tracepoints we've 9580Sstevel@tonic-gate * created so far for this probe. 9590Sstevel@tonic-gate */ 960665Sahl while (i >= 0) { 9610Sstevel@tonic-gate fasttrap_tracepoint_disable(p, probe, i); 962665Sahl i--; 9630Sstevel@tonic-gate } 9640Sstevel@tonic-gate 9650Sstevel@tonic-gate mutex_enter(&p->p_lock); 9660Sstevel@tonic-gate sprunlock(p); 9670Sstevel@tonic-gate 9680Sstevel@tonic-gate /* 9690Sstevel@tonic-gate * Since we're not actually enabling this probe, 9700Sstevel@tonic-gate * drop our reference on the trap table entry. 9710Sstevel@tonic-gate */ 972*2179Sahl fasttrap_disable_callbacks(); 9730Sstevel@tonic-gate return; 9740Sstevel@tonic-gate } 9750Sstevel@tonic-gate } 9760Sstevel@tonic-gate 9770Sstevel@tonic-gate mutex_enter(&p->p_lock); 9780Sstevel@tonic-gate sprunlock(p); 9790Sstevel@tonic-gate 9800Sstevel@tonic-gate probe->ftp_enabled = 1; 9810Sstevel@tonic-gate } 9820Sstevel@tonic-gate 9830Sstevel@tonic-gate /*ARGSUSED*/ 9840Sstevel@tonic-gate static void 9850Sstevel@tonic-gate fasttrap_pid_disable(void *arg, dtrace_id_t id, void *parg) 9860Sstevel@tonic-gate { 9870Sstevel@tonic-gate fasttrap_probe_t *probe = parg; 9880Sstevel@tonic-gate fasttrap_provider_t *provider = probe->ftp_prov; 9890Sstevel@tonic-gate proc_t *p; 9900Sstevel@tonic-gate int i, whack = 0; 9910Sstevel@tonic-gate 9920Sstevel@tonic-gate if (!probe->ftp_enabled) { 9930Sstevel@tonic-gate mutex_enter(&provider->ftp_mtx); 9940Sstevel@tonic-gate provider->ftp_rcount--; 9950Sstevel@tonic-gate ASSERT(provider->ftp_rcount >= 0); 9960Sstevel@tonic-gate mutex_exit(&provider->ftp_mtx); 9970Sstevel@tonic-gate return; 9980Sstevel@tonic-gate } 9990Sstevel@tonic-gate 10000Sstevel@tonic-gate ASSERT(id == probe->ftp_id); 10010Sstevel@tonic-gate 10020Sstevel@tonic-gate /* 10030Sstevel@tonic-gate * We won't be able to acquire a /proc-esque lock on the process 10040Sstevel@tonic-gate * iff the process is dead and gone. In this case, we rely on the 10050Sstevel@tonic-gate * provider lock as a point of mutual exclusion to prevent other 10060Sstevel@tonic-gate * DTrace consumers from disabling this probe. 10070Sstevel@tonic-gate */ 10080Sstevel@tonic-gate if ((p = sprlock(probe->ftp_pid)) != NULL) { 10090Sstevel@tonic-gate ASSERT(!(p->p_flag & SVFORK)); 10100Sstevel@tonic-gate mutex_exit(&p->p_lock); 10110Sstevel@tonic-gate } 10120Sstevel@tonic-gate 10130Sstevel@tonic-gate mutex_enter(&provider->ftp_mtx); 10140Sstevel@tonic-gate 10150Sstevel@tonic-gate /* 10160Sstevel@tonic-gate * Disable all the associated tracepoints. 10170Sstevel@tonic-gate */ 10180Sstevel@tonic-gate for (i = 0; i < probe->ftp_ntps; i++) { 10190Sstevel@tonic-gate fasttrap_tracepoint_disable(p, probe, i); 10200Sstevel@tonic-gate } 10210Sstevel@tonic-gate 10220Sstevel@tonic-gate ASSERT(provider->ftp_rcount > 0); 10230Sstevel@tonic-gate provider->ftp_rcount--; 10240Sstevel@tonic-gate 10250Sstevel@tonic-gate if (p != NULL) { 10260Sstevel@tonic-gate /* 10270Sstevel@tonic-gate * Even though we may not be able to remove it entirely, we 1028532Sahl * mark this retired provider to get a chance to remove some 10290Sstevel@tonic-gate * of the associated probes. 10300Sstevel@tonic-gate */ 1031532Sahl if (provider->ftp_retired && !provider->ftp_marked) 10320Sstevel@tonic-gate whack = provider->ftp_marked = 1; 10330Sstevel@tonic-gate mutex_exit(&provider->ftp_mtx); 10340Sstevel@tonic-gate 10350Sstevel@tonic-gate mutex_enter(&p->p_lock); 10360Sstevel@tonic-gate sprunlock(p); 10370Sstevel@tonic-gate } else { 10380Sstevel@tonic-gate /* 10390Sstevel@tonic-gate * If the process is dead, we're just waiting for the 10400Sstevel@tonic-gate * last probe to be disabled to be able to free it. 10410Sstevel@tonic-gate */ 10420Sstevel@tonic-gate if (provider->ftp_rcount == 0 && !provider->ftp_marked) 10430Sstevel@tonic-gate whack = provider->ftp_marked = 1; 10440Sstevel@tonic-gate mutex_exit(&provider->ftp_mtx); 10450Sstevel@tonic-gate } 10460Sstevel@tonic-gate 10470Sstevel@tonic-gate if (whack) 10480Sstevel@tonic-gate fasttrap_pid_cleanup(); 10490Sstevel@tonic-gate 10500Sstevel@tonic-gate probe->ftp_enabled = 0; 10510Sstevel@tonic-gate 10520Sstevel@tonic-gate ASSERT(MUTEX_HELD(&cpu_lock)); 1053*2179Sahl fasttrap_disable_callbacks(); 10540Sstevel@tonic-gate } 10550Sstevel@tonic-gate 10560Sstevel@tonic-gate /*ARGSUSED*/ 10570Sstevel@tonic-gate static void 10580Sstevel@tonic-gate fasttrap_pid_getargdesc(void *arg, dtrace_id_t id, void *parg, 10590Sstevel@tonic-gate dtrace_argdesc_t *desc) 10600Sstevel@tonic-gate { 10610Sstevel@tonic-gate fasttrap_probe_t *probe = parg; 10620Sstevel@tonic-gate char *str; 10630Sstevel@tonic-gate int i; 10640Sstevel@tonic-gate 10650Sstevel@tonic-gate desc->dtargd_native[0] = '\0'; 10660Sstevel@tonic-gate desc->dtargd_xlate[0] = '\0'; 10670Sstevel@tonic-gate 1068532Sahl if (probe->ftp_prov->ftp_retired != 0 || 10690Sstevel@tonic-gate desc->dtargd_ndx >= probe->ftp_nargs) { 10700Sstevel@tonic-gate desc->dtargd_ndx = DTRACE_ARGNONE; 10710Sstevel@tonic-gate return; 10720Sstevel@tonic-gate } 10730Sstevel@tonic-gate 10740Sstevel@tonic-gate /* 10750Sstevel@tonic-gate * We only need to set this member if the argument is remapped. 10760Sstevel@tonic-gate */ 10770Sstevel@tonic-gate if (probe->ftp_argmap != NULL) 10780Sstevel@tonic-gate desc->dtargd_mapping = probe->ftp_argmap[desc->dtargd_ndx]; 10790Sstevel@tonic-gate 10800Sstevel@tonic-gate str = probe->ftp_ntypes; 10810Sstevel@tonic-gate for (i = 0; i < desc->dtargd_mapping; i++) { 10820Sstevel@tonic-gate str += strlen(str) + 1; 10830Sstevel@tonic-gate } 10840Sstevel@tonic-gate 10850Sstevel@tonic-gate ASSERT(strlen(str + 1) < sizeof (desc->dtargd_native)); 10860Sstevel@tonic-gate (void) strcpy(desc->dtargd_native, str); 10870Sstevel@tonic-gate 10880Sstevel@tonic-gate if (probe->ftp_xtypes == NULL) 10890Sstevel@tonic-gate return; 10900Sstevel@tonic-gate 10910Sstevel@tonic-gate str = probe->ftp_xtypes; 10920Sstevel@tonic-gate for (i = 0; i < desc->dtargd_ndx; i++) { 10930Sstevel@tonic-gate str += strlen(str) + 1; 10940Sstevel@tonic-gate } 10950Sstevel@tonic-gate 10960Sstevel@tonic-gate ASSERT(strlen(str + 1) < sizeof (desc->dtargd_xlate)); 10970Sstevel@tonic-gate (void) strcpy(desc->dtargd_xlate, str); 10980Sstevel@tonic-gate } 10990Sstevel@tonic-gate 11000Sstevel@tonic-gate /*ARGSUSED*/ 11010Sstevel@tonic-gate static void 11020Sstevel@tonic-gate fasttrap_pid_destroy(void *arg, dtrace_id_t id, void *parg) 11030Sstevel@tonic-gate { 11040Sstevel@tonic-gate fasttrap_probe_t *probe = parg; 11050Sstevel@tonic-gate int i; 11060Sstevel@tonic-gate size_t size; 11070Sstevel@tonic-gate 11080Sstevel@tonic-gate ASSERT(probe != NULL); 11090Sstevel@tonic-gate ASSERT(!probe->ftp_enabled); 11100Sstevel@tonic-gate ASSERT(fasttrap_total >= probe->ftp_ntps); 11110Sstevel@tonic-gate 11120Sstevel@tonic-gate atomic_add_32(&fasttrap_total, -probe->ftp_ntps); 11131880Sahl size = offsetof(fasttrap_probe_t, ftp_tps[probe->ftp_ntps]); 11140Sstevel@tonic-gate 11150Sstevel@tonic-gate if (probe->ftp_gen + 1 >= fasttrap_mod_gen) 11160Sstevel@tonic-gate fasttrap_mod_barrier(probe->ftp_gen); 11170Sstevel@tonic-gate 11180Sstevel@tonic-gate for (i = 0; i < probe->ftp_ntps; i++) { 11190Sstevel@tonic-gate kmem_free(probe->ftp_tps[i].fit_tp, 11200Sstevel@tonic-gate sizeof (fasttrap_tracepoint_t)); 11210Sstevel@tonic-gate } 11220Sstevel@tonic-gate 11230Sstevel@tonic-gate kmem_free(probe, size); 11240Sstevel@tonic-gate } 11250Sstevel@tonic-gate 11260Sstevel@tonic-gate 11270Sstevel@tonic-gate static const dtrace_pattr_t pid_attr = { 11280Sstevel@tonic-gate { DTRACE_STABILITY_EVOLVING, DTRACE_STABILITY_EVOLVING, DTRACE_CLASS_ISA }, 11290Sstevel@tonic-gate { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_UNKNOWN }, 11300Sstevel@tonic-gate { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_UNKNOWN }, 11310Sstevel@tonic-gate { DTRACE_STABILITY_EVOLVING, DTRACE_STABILITY_EVOLVING, DTRACE_CLASS_ISA }, 11320Sstevel@tonic-gate { DTRACE_STABILITY_PRIVATE, DTRACE_STABILITY_PRIVATE, DTRACE_CLASS_UNKNOWN }, 11330Sstevel@tonic-gate }; 11340Sstevel@tonic-gate 11350Sstevel@tonic-gate static dtrace_pops_t pid_pops = { 11360Sstevel@tonic-gate fasttrap_pid_provide, 11370Sstevel@tonic-gate NULL, 11380Sstevel@tonic-gate fasttrap_pid_enable, 11390Sstevel@tonic-gate fasttrap_pid_disable, 11400Sstevel@tonic-gate NULL, 11410Sstevel@tonic-gate NULL, 11420Sstevel@tonic-gate fasttrap_pid_getargdesc, 1143*2179Sahl fasttrap_pid_getarg, 11440Sstevel@tonic-gate NULL, 11450Sstevel@tonic-gate fasttrap_pid_destroy 11460Sstevel@tonic-gate }; 11470Sstevel@tonic-gate 11480Sstevel@tonic-gate static dtrace_pops_t usdt_pops = { 11490Sstevel@tonic-gate fasttrap_pid_provide, 11500Sstevel@tonic-gate NULL, 11510Sstevel@tonic-gate fasttrap_pid_enable, 11520Sstevel@tonic-gate fasttrap_pid_disable, 11530Sstevel@tonic-gate NULL, 11540Sstevel@tonic-gate NULL, 11550Sstevel@tonic-gate fasttrap_pid_getargdesc, 11560Sstevel@tonic-gate fasttrap_usdt_getarg, 11570Sstevel@tonic-gate NULL, 11580Sstevel@tonic-gate fasttrap_pid_destroy 11590Sstevel@tonic-gate }; 11600Sstevel@tonic-gate 1161532Sahl static fasttrap_proc_t * 1162532Sahl fasttrap_proc_lookup(pid_t pid) 1163532Sahl { 1164532Sahl fasttrap_bucket_t *bucket; 1165532Sahl fasttrap_proc_t *fprc, *new_fprc; 1166532Sahl 1167532Sahl bucket = &fasttrap_procs.fth_table[FASTTRAP_PROCS_INDEX(pid)]; 1168532Sahl mutex_enter(&bucket->ftb_mtx); 1169532Sahl 1170532Sahl for (fprc = bucket->ftb_data; fprc != NULL; fprc = fprc->ftpc_next) { 1171532Sahl if (fprc->ftpc_pid == pid && !fprc->ftpc_defunct) { 1172532Sahl mutex_enter(&fprc->ftpc_mtx); 1173532Sahl mutex_exit(&bucket->ftb_mtx); 1174532Sahl fprc->ftpc_count++; 1175532Sahl mutex_exit(&fprc->ftpc_mtx); 1176532Sahl 1177532Sahl return (fprc); 1178532Sahl } 1179532Sahl } 1180532Sahl 1181532Sahl /* 1182532Sahl * Drop the bucket lock so we don't try to perform a sleeping 1183532Sahl * allocation under it. 1184532Sahl */ 1185532Sahl mutex_exit(&bucket->ftb_mtx); 1186532Sahl 1187532Sahl new_fprc = kmem_zalloc(sizeof (fasttrap_proc_t), KM_SLEEP); 1188532Sahl new_fprc->ftpc_pid = pid; 1189532Sahl new_fprc->ftpc_count = 1; 1190532Sahl 1191532Sahl mutex_enter(&bucket->ftb_mtx); 1192532Sahl 1193532Sahl /* 1194532Sahl * Take another lap through the list to make sure a proc hasn't 1195532Sahl * been created for this pid while we weren't under the bucket lock. 1196532Sahl */ 1197532Sahl for (fprc = bucket->ftb_data; fprc != NULL; fprc = fprc->ftpc_next) { 1198532Sahl if (fprc->ftpc_pid == pid && !fprc->ftpc_defunct) { 1199532Sahl mutex_enter(&fprc->ftpc_mtx); 1200532Sahl mutex_exit(&bucket->ftb_mtx); 1201532Sahl fprc->ftpc_count++; 1202532Sahl mutex_exit(&fprc->ftpc_mtx); 1203532Sahl 1204532Sahl kmem_free(new_fprc, sizeof (fasttrap_proc_t)); 1205532Sahl 1206532Sahl return (fprc); 1207532Sahl } 1208532Sahl } 1209532Sahl 1210532Sahl new_fprc->ftpc_next = bucket->ftb_data; 1211532Sahl bucket->ftb_data = new_fprc; 1212532Sahl 1213532Sahl mutex_exit(&bucket->ftb_mtx); 1214532Sahl 1215532Sahl return (new_fprc); 1216532Sahl } 1217532Sahl 1218532Sahl static void 1219532Sahl fasttrap_proc_release(fasttrap_proc_t *proc) 1220532Sahl { 1221532Sahl fasttrap_bucket_t *bucket; 1222532Sahl fasttrap_proc_t *fprc, **fprcp; 1223532Sahl pid_t pid = proc->ftpc_pid; 1224532Sahl 1225532Sahl mutex_enter(&proc->ftpc_mtx); 1226532Sahl 1227532Sahl ASSERT(proc->ftpc_count != 0); 1228532Sahl 1229532Sahl if (--proc->ftpc_count != 0) { 1230532Sahl mutex_exit(&proc->ftpc_mtx); 1231532Sahl return; 1232532Sahl } 1233532Sahl 1234532Sahl mutex_exit(&proc->ftpc_mtx); 1235532Sahl 1236532Sahl bucket = &fasttrap_procs.fth_table[FASTTRAP_PROCS_INDEX(pid)]; 1237532Sahl mutex_enter(&bucket->ftb_mtx); 1238532Sahl 1239532Sahl fprcp = (fasttrap_proc_t **)&bucket->ftb_data; 1240532Sahl while ((fprc = *fprcp) != NULL) { 1241532Sahl if (fprc == proc) 1242532Sahl break; 1243532Sahl 1244532Sahl fprcp = &fprc->ftpc_next; 1245532Sahl } 1246532Sahl 1247532Sahl /* 1248532Sahl * Something strange has happened if we can't find the proc. 1249532Sahl */ 1250532Sahl ASSERT(fprc != NULL); 1251532Sahl 1252532Sahl *fprcp = fprc->ftpc_next; 1253532Sahl 1254532Sahl mutex_exit(&bucket->ftb_mtx); 1255532Sahl 1256532Sahl kmem_free(fprc, sizeof (fasttrap_proc_t)); 1257532Sahl } 1258532Sahl 12590Sstevel@tonic-gate /* 12600Sstevel@tonic-gate * Lookup a fasttrap-managed provider based on its name and associated pid. 12610Sstevel@tonic-gate * If the pattr argument is non-NULL, this function instantiates the provider 12620Sstevel@tonic-gate * if it doesn't exist otherwise it returns NULL. The provider is returned 12630Sstevel@tonic-gate * with its lock held. 12640Sstevel@tonic-gate */ 12650Sstevel@tonic-gate static fasttrap_provider_t * 12660Sstevel@tonic-gate fasttrap_provider_lookup(pid_t pid, const char *name, 12670Sstevel@tonic-gate const dtrace_pattr_t *pattr) 12680Sstevel@tonic-gate { 12690Sstevel@tonic-gate fasttrap_provider_t *fp, *new_fp = NULL; 12700Sstevel@tonic-gate fasttrap_bucket_t *bucket; 12710Sstevel@tonic-gate char provname[DTRACE_PROVNAMELEN]; 12720Sstevel@tonic-gate proc_t *p; 12731677Sdp cred_t *cred; 12740Sstevel@tonic-gate 12750Sstevel@tonic-gate ASSERT(strlen(name) < sizeof (fp->ftp_name)); 1276935Sahl ASSERT(pattr != NULL); 12770Sstevel@tonic-gate 12780Sstevel@tonic-gate bucket = &fasttrap_provs.fth_table[FASTTRAP_PROVS_INDEX(pid, name)]; 12790Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 12800Sstevel@tonic-gate 12810Sstevel@tonic-gate /* 12820Sstevel@tonic-gate * Take a lap through the list and return the match if we find it. 12830Sstevel@tonic-gate */ 12840Sstevel@tonic-gate for (fp = bucket->ftb_data; fp != NULL; fp = fp->ftp_next) { 12850Sstevel@tonic-gate if (fp->ftp_pid == pid && strcmp(fp->ftp_name, name) == 0 && 1286532Sahl !fp->ftp_retired) { 12870Sstevel@tonic-gate mutex_enter(&fp->ftp_mtx); 12880Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 12890Sstevel@tonic-gate return (fp); 12900Sstevel@tonic-gate } 12910Sstevel@tonic-gate } 12920Sstevel@tonic-gate 12930Sstevel@tonic-gate /* 12940Sstevel@tonic-gate * Drop the bucket lock so we don't try to perform a sleeping 12950Sstevel@tonic-gate * allocation under it. 12960Sstevel@tonic-gate */ 12970Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 12980Sstevel@tonic-gate 1299532Sahl /* 13000Sstevel@tonic-gate * Make sure the process exists, isn't a child created as the result 13011677Sdp * of a vfork(2), and isn't a zombie (but may be in fork). 13020Sstevel@tonic-gate */ 13030Sstevel@tonic-gate mutex_enter(&pidlock); 1304390Sraf if ((p = prfind(pid)) == NULL) { 13050Sstevel@tonic-gate mutex_exit(&pidlock); 13060Sstevel@tonic-gate return (NULL); 13070Sstevel@tonic-gate } 13080Sstevel@tonic-gate mutex_enter(&p->p_lock); 13090Sstevel@tonic-gate mutex_exit(&pidlock); 1310390Sraf if (p->p_flag & (SVFORK | SEXITING)) { 1311390Sraf mutex_exit(&p->p_lock); 1312390Sraf return (NULL); 1313390Sraf } 13140Sstevel@tonic-gate 13150Sstevel@tonic-gate /* 13160Sstevel@tonic-gate * Increment p_dtrace_probes so that the process knows to inform us 13170Sstevel@tonic-gate * when it exits or execs. fasttrap_provider_free() decrements this 13180Sstevel@tonic-gate * when we're done with this provider. 13190Sstevel@tonic-gate */ 13200Sstevel@tonic-gate p->p_dtrace_probes++; 13210Sstevel@tonic-gate 13221677Sdp /* 13231677Sdp * Grab the credentials for this process so we have 13241677Sdp * something to pass to dtrace_register(). 13251677Sdp */ 13260Sstevel@tonic-gate mutex_enter(&p->p_crlock); 13271677Sdp crhold(p->p_cred); 13281677Sdp cred = p->p_cred; 13290Sstevel@tonic-gate mutex_exit(&p->p_crlock); 13300Sstevel@tonic-gate mutex_exit(&p->p_lock); 13310Sstevel@tonic-gate 13320Sstevel@tonic-gate new_fp = kmem_zalloc(sizeof (fasttrap_provider_t), KM_SLEEP); 1333532Sahl new_fp->ftp_pid = pid; 1334532Sahl new_fp->ftp_proc = fasttrap_proc_lookup(pid); 1335532Sahl 1336532Sahl ASSERT(new_fp->ftp_proc != NULL); 13370Sstevel@tonic-gate 13380Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 13390Sstevel@tonic-gate 13400Sstevel@tonic-gate /* 13410Sstevel@tonic-gate * Take another lap through the list to make sure a provider hasn't 13420Sstevel@tonic-gate * been created for this pid while we weren't under the bucket lock. 13430Sstevel@tonic-gate */ 13440Sstevel@tonic-gate for (fp = bucket->ftb_data; fp != NULL; fp = fp->ftp_next) { 13450Sstevel@tonic-gate if (fp->ftp_pid == pid && strcmp(fp->ftp_name, name) == 0 && 1346532Sahl !fp->ftp_retired) { 13470Sstevel@tonic-gate mutex_enter(&fp->ftp_mtx); 13480Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 13490Sstevel@tonic-gate fasttrap_provider_free(new_fp); 13501677Sdp crfree(cred); 13510Sstevel@tonic-gate return (fp); 13520Sstevel@tonic-gate } 13530Sstevel@tonic-gate } 13540Sstevel@tonic-gate 13550Sstevel@tonic-gate (void) strcpy(new_fp->ftp_name, name); 13560Sstevel@tonic-gate 13570Sstevel@tonic-gate /* 13580Sstevel@tonic-gate * Fail and return NULL if either the provider name is too long 13590Sstevel@tonic-gate * or we fail to register this new provider with the DTrace 13600Sstevel@tonic-gate * framework. Note that this is the only place we ever construct 13610Sstevel@tonic-gate * the full provider name -- we keep it in pieces in the provider 13620Sstevel@tonic-gate * structure. 13630Sstevel@tonic-gate */ 13640Sstevel@tonic-gate if (snprintf(provname, sizeof (provname), "%s%u", name, (uint_t)pid) >= 13650Sstevel@tonic-gate sizeof (provname) || 13660Sstevel@tonic-gate dtrace_register(provname, pattr, 13671677Sdp DTRACE_PRIV_PROC | DTRACE_PRIV_OWNER | DTRACE_PRIV_ZONEOWNER, cred, 13680Sstevel@tonic-gate pattr == &pid_attr ? &pid_pops : &usdt_pops, new_fp, 13690Sstevel@tonic-gate &new_fp->ftp_provid) != 0) { 13700Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 13710Sstevel@tonic-gate fasttrap_provider_free(new_fp); 13721677Sdp crfree(cred); 13730Sstevel@tonic-gate return (NULL); 13740Sstevel@tonic-gate } 13750Sstevel@tonic-gate 13760Sstevel@tonic-gate new_fp->ftp_next = bucket->ftb_data; 13770Sstevel@tonic-gate bucket->ftb_data = new_fp; 13780Sstevel@tonic-gate 13790Sstevel@tonic-gate mutex_enter(&new_fp->ftp_mtx); 13800Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 13810Sstevel@tonic-gate 13821677Sdp crfree(cred); 13830Sstevel@tonic-gate return (new_fp); 13840Sstevel@tonic-gate } 13850Sstevel@tonic-gate 13860Sstevel@tonic-gate static void 13870Sstevel@tonic-gate fasttrap_provider_free(fasttrap_provider_t *provider) 13880Sstevel@tonic-gate { 13890Sstevel@tonic-gate pid_t pid = provider->ftp_pid; 13900Sstevel@tonic-gate proc_t *p; 13910Sstevel@tonic-gate 13920Sstevel@tonic-gate /* 13931880Sahl * There need to be no associated enabled probes, no consumers 13941880Sahl * creating probes, and no meta providers referencing this provider. 13950Sstevel@tonic-gate */ 13961880Sahl ASSERT(provider->ftp_rcount == 0); 13970Sstevel@tonic-gate ASSERT(provider->ftp_ccount == 0); 13981880Sahl ASSERT(provider->ftp_mcount == 0); 13990Sstevel@tonic-gate 1400532Sahl fasttrap_proc_release(provider->ftp_proc); 1401532Sahl 14020Sstevel@tonic-gate kmem_free(provider, sizeof (fasttrap_provider_t)); 14030Sstevel@tonic-gate 14040Sstevel@tonic-gate /* 14050Sstevel@tonic-gate * Decrement p_dtrace_probes on the process whose provider we're 14060Sstevel@tonic-gate * freeing. We don't have to worry about clobbering somone else's 14070Sstevel@tonic-gate * modifications to it because we have locked the bucket that 14080Sstevel@tonic-gate * corresponds to this process's hash chain in the provider hash 14090Sstevel@tonic-gate * table. Don't sweat it if we can't find the process. 14100Sstevel@tonic-gate */ 14110Sstevel@tonic-gate mutex_enter(&pidlock); 14120Sstevel@tonic-gate if ((p = prfind(pid)) == NULL) { 14130Sstevel@tonic-gate mutex_exit(&pidlock); 14140Sstevel@tonic-gate return; 14150Sstevel@tonic-gate } 14160Sstevel@tonic-gate 14170Sstevel@tonic-gate mutex_enter(&p->p_lock); 14180Sstevel@tonic-gate mutex_exit(&pidlock); 14190Sstevel@tonic-gate 14200Sstevel@tonic-gate p->p_dtrace_probes--; 14210Sstevel@tonic-gate mutex_exit(&p->p_lock); 14220Sstevel@tonic-gate } 14230Sstevel@tonic-gate 14240Sstevel@tonic-gate static void 14251880Sahl fasttrap_provider_retire(pid_t pid, const char *name, int mprov) 14260Sstevel@tonic-gate { 1427935Sahl fasttrap_provider_t *fp; 1428935Sahl fasttrap_bucket_t *bucket; 1429935Sahl dtrace_provider_id_t provid; 1430935Sahl 1431935Sahl ASSERT(strlen(name) < sizeof (fp->ftp_name)); 1432935Sahl 1433935Sahl bucket = &fasttrap_provs.fth_table[FASTTRAP_PROVS_INDEX(pid, name)]; 1434935Sahl mutex_enter(&bucket->ftb_mtx); 1435935Sahl 1436935Sahl for (fp = bucket->ftb_data; fp != NULL; fp = fp->ftp_next) { 1437935Sahl if (fp->ftp_pid == pid && strcmp(fp->ftp_name, name) == 0 && 1438935Sahl !fp->ftp_retired) 1439935Sahl break; 1440935Sahl } 1441935Sahl 1442935Sahl if (fp == NULL) { 1443935Sahl mutex_exit(&bucket->ftb_mtx); 1444935Sahl return; 1445935Sahl } 14460Sstevel@tonic-gate 14471880Sahl mutex_enter(&fp->ftp_mtx); 14481880Sahl ASSERT(!mprov || fp->ftp_mcount > 0); 14491880Sahl if (mprov && --fp->ftp_mcount != 0) { 14501880Sahl mutex_exit(&fp->ftp_mtx); 14511880Sahl mutex_exit(&bucket->ftb_mtx); 14521880Sahl return; 14531880Sahl } 14541880Sahl 14550Sstevel@tonic-gate /* 1456532Sahl * Mark the provider to be removed in our post-processing step, 1457532Sahl * mark it retired, and mark its proc as defunct (though it may 1458532Sahl * already be marked defunct by another provider that shares the 1459532Sahl * same proc). Marking it indicates that we should try to remove it; 1460532Sahl * setting the retired flag indicates that we're done with this 1461532Sahl * provider; setting the proc to be defunct indicates that all 1462532Sahl * tracepoints associated with the traced process should be ignored. 1463935Sahl * 1464935Sahl * We obviously need to take the bucket lock before the provider lock 1465935Sahl * to perform the lookup, but we need to drop the provider lock 1466935Sahl * before calling into the DTrace framework since we acquire the 1467935Sahl * provider lock in callbacks invoked from the DTrace framework. The 1468935Sahl * bucket lock therefore protects the integrity of the provider hash 1469935Sahl * table. 14700Sstevel@tonic-gate */ 1471935Sahl fp->ftp_proc->ftpc_defunct = 1; 1472935Sahl fp->ftp_retired = 1; 1473935Sahl fp->ftp_marked = 1; 1474935Sahl provid = fp->ftp_provid; 1475935Sahl mutex_exit(&fp->ftp_mtx); 14760Sstevel@tonic-gate 14770Sstevel@tonic-gate /* 14780Sstevel@tonic-gate * We don't have to worry about invalidating the same provider twice 14790Sstevel@tonic-gate * since fasttrap_provider_lookup() will ignore provider that have 1480532Sahl * been marked as retired. 14810Sstevel@tonic-gate */ 14820Sstevel@tonic-gate dtrace_invalidate(provid); 14830Sstevel@tonic-gate 1484935Sahl mutex_exit(&bucket->ftb_mtx); 1485935Sahl 14860Sstevel@tonic-gate fasttrap_pid_cleanup(); 14870Sstevel@tonic-gate } 14880Sstevel@tonic-gate 14890Sstevel@tonic-gate static int 14900Sstevel@tonic-gate fasttrap_add_probe(fasttrap_probe_spec_t *pdata) 14910Sstevel@tonic-gate { 14920Sstevel@tonic-gate fasttrap_provider_t *provider; 14930Sstevel@tonic-gate fasttrap_probe_t *pp; 14940Sstevel@tonic-gate fasttrap_tracepoint_t *tp; 14950Sstevel@tonic-gate char *name; 14960Sstevel@tonic-gate int i, aframes, whack; 14970Sstevel@tonic-gate 14980Sstevel@tonic-gate switch (pdata->ftps_type) { 14990Sstevel@tonic-gate case DTFTP_ENTRY: 15000Sstevel@tonic-gate name = "entry"; 15010Sstevel@tonic-gate aframes = FASTTRAP_ENTRY_AFRAMES; 15020Sstevel@tonic-gate break; 15030Sstevel@tonic-gate case DTFTP_RETURN: 15040Sstevel@tonic-gate name = "return"; 15050Sstevel@tonic-gate aframes = FASTTRAP_RETURN_AFRAMES; 15060Sstevel@tonic-gate break; 15070Sstevel@tonic-gate case DTFTP_OFFSETS: 15080Sstevel@tonic-gate name = NULL; 15090Sstevel@tonic-gate break; 15100Sstevel@tonic-gate default: 15110Sstevel@tonic-gate return (EINVAL); 15120Sstevel@tonic-gate } 15130Sstevel@tonic-gate 15140Sstevel@tonic-gate if ((provider = fasttrap_provider_lookup(pdata->ftps_pid, 15150Sstevel@tonic-gate FASTTRAP_PID_NAME, &pid_attr)) == NULL) 15160Sstevel@tonic-gate return (ESRCH); 15170Sstevel@tonic-gate 15180Sstevel@tonic-gate /* 15190Sstevel@tonic-gate * Increment this reference count to indicate that a consumer is 1520*2179Sahl * actively adding a new probe associated with this provider. This 1521*2179Sahl * prevents the provider from being deleted -- we'll need to check 1522*2179Sahl * for pending deletions when we drop this reference count. 15230Sstevel@tonic-gate */ 15240Sstevel@tonic-gate provider->ftp_ccount++; 15250Sstevel@tonic-gate mutex_exit(&provider->ftp_mtx); 15260Sstevel@tonic-gate 1527*2179Sahl /* 1528*2179Sahl * Grab the creation lock to ensure consistency between calls to 1529*2179Sahl * dtrace_probe_lookup() and dtrace_probe_create() in the face of 1530*2179Sahl * other threads creating probes. We must drop the provider lock 1531*2179Sahl * before taking this lock to avoid a three-way deadlock with the 1532*2179Sahl * DTrace framework. 1533*2179Sahl */ 1534*2179Sahl mutex_enter(&provider->ftp_cmtx); 15350Sstevel@tonic-gate 1536*2179Sahl if (name == NULL) { 15370Sstevel@tonic-gate for (i = 0; i < pdata->ftps_noffs; i++) { 15380Sstevel@tonic-gate char name_str[17]; 15390Sstevel@tonic-gate 15400Sstevel@tonic-gate (void) sprintf(name_str, "%llx", 15410Sstevel@tonic-gate (unsigned long long)pdata->ftps_offs[i]); 15420Sstevel@tonic-gate 15430Sstevel@tonic-gate if (dtrace_probe_lookup(provider->ftp_provid, 15440Sstevel@tonic-gate pdata->ftps_mod, pdata->ftps_func, name_str) != 0) 15450Sstevel@tonic-gate continue; 15460Sstevel@tonic-gate 15470Sstevel@tonic-gate atomic_add_32(&fasttrap_total, 1); 15480Sstevel@tonic-gate 15490Sstevel@tonic-gate if (fasttrap_total > fasttrap_max) { 15500Sstevel@tonic-gate atomic_add_32(&fasttrap_total, -1); 15510Sstevel@tonic-gate goto no_mem; 15520Sstevel@tonic-gate } 15530Sstevel@tonic-gate 15540Sstevel@tonic-gate pp = kmem_zalloc(sizeof (fasttrap_probe_t), KM_SLEEP); 15550Sstevel@tonic-gate 15560Sstevel@tonic-gate pp->ftp_prov = provider; 15570Sstevel@tonic-gate pp->ftp_faddr = pdata->ftps_pc; 15580Sstevel@tonic-gate pp->ftp_fsize = pdata->ftps_size; 15590Sstevel@tonic-gate pp->ftp_pid = pdata->ftps_pid; 15600Sstevel@tonic-gate pp->ftp_ntps = 1; 15610Sstevel@tonic-gate 15620Sstevel@tonic-gate tp = kmem_zalloc(sizeof (fasttrap_tracepoint_t), 15630Sstevel@tonic-gate KM_SLEEP); 15640Sstevel@tonic-gate 1565532Sahl tp->ftt_proc = provider->ftp_proc; 15660Sstevel@tonic-gate tp->ftt_pc = pdata->ftps_offs[i] + pdata->ftps_pc; 15670Sstevel@tonic-gate tp->ftt_pid = pdata->ftps_pid; 15680Sstevel@tonic-gate 15690Sstevel@tonic-gate pp->ftp_tps[0].fit_tp = tp; 15700Sstevel@tonic-gate pp->ftp_tps[0].fit_id.fti_probe = pp; 15711710Sahl pp->ftp_tps[0].fit_id.fti_ptype = pdata->ftps_type; 15720Sstevel@tonic-gate 15730Sstevel@tonic-gate pp->ftp_id = dtrace_probe_create(provider->ftp_provid, 15740Sstevel@tonic-gate pdata->ftps_mod, pdata->ftps_func, name_str, 15750Sstevel@tonic-gate FASTTRAP_OFFSET_AFRAMES, pp); 15760Sstevel@tonic-gate } 1577*2179Sahl 1578*2179Sahl } else if (dtrace_probe_lookup(provider->ftp_provid, pdata->ftps_mod, 1579*2179Sahl pdata->ftps_func, name) == 0) { 1580*2179Sahl atomic_add_32(&fasttrap_total, pdata->ftps_noffs); 1581*2179Sahl 1582*2179Sahl if (fasttrap_total > fasttrap_max) { 1583*2179Sahl atomic_add_32(&fasttrap_total, -pdata->ftps_noffs); 1584*2179Sahl goto no_mem; 1585*2179Sahl } 1586*2179Sahl 1587*2179Sahl ASSERT(pdata->ftps_noffs > 0); 1588*2179Sahl pp = kmem_zalloc(offsetof(fasttrap_probe_t, 1589*2179Sahl ftp_tps[pdata->ftps_noffs]), KM_SLEEP); 1590*2179Sahl 1591*2179Sahl pp->ftp_prov = provider; 1592*2179Sahl pp->ftp_faddr = pdata->ftps_pc; 1593*2179Sahl pp->ftp_fsize = pdata->ftps_size; 1594*2179Sahl pp->ftp_pid = pdata->ftps_pid; 1595*2179Sahl pp->ftp_ntps = pdata->ftps_noffs; 1596*2179Sahl 1597*2179Sahl for (i = 0; i < pdata->ftps_noffs; i++) { 1598*2179Sahl tp = kmem_zalloc(sizeof (fasttrap_tracepoint_t), 1599*2179Sahl KM_SLEEP); 1600*2179Sahl 1601*2179Sahl tp->ftt_proc = provider->ftp_proc; 1602*2179Sahl tp->ftt_pc = pdata->ftps_offs[i] + pdata->ftps_pc; 1603*2179Sahl tp->ftt_pid = pdata->ftps_pid; 1604*2179Sahl 1605*2179Sahl pp->ftp_tps[i].fit_tp = tp; 1606*2179Sahl pp->ftp_tps[i].fit_id.fti_probe = pp; 1607*2179Sahl pp->ftp_tps[i].fit_id.fti_ptype = pdata->ftps_type; 1608*2179Sahl } 1609*2179Sahl 1610*2179Sahl pp->ftp_id = dtrace_probe_create(provider->ftp_provid, 1611*2179Sahl pdata->ftps_mod, pdata->ftps_func, name, aframes, pp); 16120Sstevel@tonic-gate } 16130Sstevel@tonic-gate 1614*2179Sahl mutex_exit(&provider->ftp_cmtx); 1615*2179Sahl 16160Sstevel@tonic-gate /* 16170Sstevel@tonic-gate * We know that the provider is still valid since we incremented the 1618*2179Sahl * creation reference count. If someone tried to clean up this provider 1619*2179Sahl * while we were using it (e.g. because the process called exec(2) or 1620*2179Sahl * exit(2)), take note of that and try to clean it up now. 16210Sstevel@tonic-gate */ 16220Sstevel@tonic-gate mutex_enter(&provider->ftp_mtx); 16230Sstevel@tonic-gate provider->ftp_ccount--; 1624532Sahl whack = provider->ftp_retired; 16250Sstevel@tonic-gate mutex_exit(&provider->ftp_mtx); 16260Sstevel@tonic-gate 16270Sstevel@tonic-gate if (whack) 16280Sstevel@tonic-gate fasttrap_pid_cleanup(); 16290Sstevel@tonic-gate 16300Sstevel@tonic-gate return (0); 16310Sstevel@tonic-gate 16320Sstevel@tonic-gate no_mem: 16330Sstevel@tonic-gate /* 16340Sstevel@tonic-gate * If we've exhausted the allowable resources, we'll try to remove 16350Sstevel@tonic-gate * this provider to free some up. This is to cover the case where 16360Sstevel@tonic-gate * the user has accidentally created many more probes than was 16370Sstevel@tonic-gate * intended (e.g. pid123:::). 16380Sstevel@tonic-gate */ 1639*2179Sahl mutex_exit(&provider->ftp_cmtx); 16400Sstevel@tonic-gate mutex_enter(&provider->ftp_mtx); 16410Sstevel@tonic-gate provider->ftp_ccount--; 16420Sstevel@tonic-gate provider->ftp_marked = 1; 16430Sstevel@tonic-gate mutex_exit(&provider->ftp_mtx); 16440Sstevel@tonic-gate 16450Sstevel@tonic-gate fasttrap_pid_cleanup(); 16460Sstevel@tonic-gate 16470Sstevel@tonic-gate return (ENOMEM); 16480Sstevel@tonic-gate } 16490Sstevel@tonic-gate 16500Sstevel@tonic-gate /*ARGSUSED*/ 16510Sstevel@tonic-gate static void * 16520Sstevel@tonic-gate fasttrap_meta_provide(void *arg, dtrace_helper_provdesc_t *dhpv, pid_t pid) 16530Sstevel@tonic-gate { 16540Sstevel@tonic-gate fasttrap_provider_t *provider; 16550Sstevel@tonic-gate 16560Sstevel@tonic-gate /* 16570Sstevel@tonic-gate * A 32-bit unsigned integer (like a pid for example) can be 16580Sstevel@tonic-gate * expressed in 10 or fewer decimal digits. Make sure that we'll 16590Sstevel@tonic-gate * have enough space for the provider name. 16600Sstevel@tonic-gate */ 16610Sstevel@tonic-gate if (strlen(dhpv->dthpv_provname) + 10 >= 16620Sstevel@tonic-gate sizeof (provider->ftp_name)) { 16630Sstevel@tonic-gate cmn_err(CE_WARN, "failed to instantiate provider %s: " 16640Sstevel@tonic-gate "name too long to accomodate pid", dhpv->dthpv_provname); 16650Sstevel@tonic-gate return (NULL); 16660Sstevel@tonic-gate } 16670Sstevel@tonic-gate 16680Sstevel@tonic-gate /* 16690Sstevel@tonic-gate * Don't let folks spoof the true pid provider. 16700Sstevel@tonic-gate */ 16710Sstevel@tonic-gate if (strcmp(dhpv->dthpv_provname, FASTTRAP_PID_NAME) == 0) { 16720Sstevel@tonic-gate cmn_err(CE_WARN, "failed to instantiate provider %s: " 16730Sstevel@tonic-gate "%s is an invalid name", dhpv->dthpv_provname, 16740Sstevel@tonic-gate FASTTRAP_PID_NAME); 16750Sstevel@tonic-gate return (NULL); 16760Sstevel@tonic-gate } 16770Sstevel@tonic-gate 16780Sstevel@tonic-gate /* 16790Sstevel@tonic-gate * The highest stability class that fasttrap supports is ISA; cap 16800Sstevel@tonic-gate * the stability of the new provider accordingly. 16810Sstevel@tonic-gate */ 16820Sstevel@tonic-gate if (dhpv->dthpv_pattr.dtpa_provider.dtat_class >= DTRACE_CLASS_COMMON) 16830Sstevel@tonic-gate dhpv->dthpv_pattr.dtpa_provider.dtat_class = DTRACE_CLASS_ISA; 16840Sstevel@tonic-gate if (dhpv->dthpv_pattr.dtpa_mod.dtat_class >= DTRACE_CLASS_COMMON) 16850Sstevel@tonic-gate dhpv->dthpv_pattr.dtpa_mod.dtat_class = DTRACE_CLASS_ISA; 16860Sstevel@tonic-gate if (dhpv->dthpv_pattr.dtpa_func.dtat_class >= DTRACE_CLASS_COMMON) 16870Sstevel@tonic-gate dhpv->dthpv_pattr.dtpa_func.dtat_class = DTRACE_CLASS_ISA; 16880Sstevel@tonic-gate if (dhpv->dthpv_pattr.dtpa_name.dtat_class >= DTRACE_CLASS_COMMON) 16890Sstevel@tonic-gate dhpv->dthpv_pattr.dtpa_name.dtat_class = DTRACE_CLASS_ISA; 16900Sstevel@tonic-gate if (dhpv->dthpv_pattr.dtpa_args.dtat_class >= DTRACE_CLASS_COMMON) 16910Sstevel@tonic-gate dhpv->dthpv_pattr.dtpa_args.dtat_class = DTRACE_CLASS_ISA; 16920Sstevel@tonic-gate 16930Sstevel@tonic-gate if ((provider = fasttrap_provider_lookup(pid, dhpv->dthpv_provname, 16940Sstevel@tonic-gate &dhpv->dthpv_pattr)) == NULL) { 16950Sstevel@tonic-gate cmn_err(CE_WARN, "failed to instantiate provider %s for " 16960Sstevel@tonic-gate "process %u", dhpv->dthpv_provname, (uint_t)pid); 16970Sstevel@tonic-gate return (NULL); 16980Sstevel@tonic-gate } 16990Sstevel@tonic-gate 17000Sstevel@tonic-gate /* 17011880Sahl * Up the meta provider count so this provider isn't removed until 17021880Sahl * the meta provider has been told to remove it. 17030Sstevel@tonic-gate */ 17041880Sahl provider->ftp_mcount++; 17050Sstevel@tonic-gate 17060Sstevel@tonic-gate mutex_exit(&provider->ftp_mtx); 17070Sstevel@tonic-gate 17080Sstevel@tonic-gate return (provider); 17090Sstevel@tonic-gate } 17100Sstevel@tonic-gate 17110Sstevel@tonic-gate /*ARGSUSED*/ 17120Sstevel@tonic-gate static void 17130Sstevel@tonic-gate fasttrap_meta_create_probe(void *arg, void *parg, 17140Sstevel@tonic-gate dtrace_helper_probedesc_t *dhpb) 17150Sstevel@tonic-gate { 17160Sstevel@tonic-gate fasttrap_provider_t *provider = parg; 17170Sstevel@tonic-gate fasttrap_probe_t *pp; 17180Sstevel@tonic-gate fasttrap_tracepoint_t *tp; 17191710Sahl int i, j; 17201710Sahl uint32_t ntps; 17210Sstevel@tonic-gate 1722*2179Sahl /* 1723*2179Sahl * Since the meta provider count is non-zero we don't have to worry 1724*2179Sahl * about this provider disappearing. 1725*2179Sahl */ 1726*2179Sahl ASSERT(provider->ftp_mcount > 0); 1727*2179Sahl 1728*2179Sahl /* 1729*2179Sahl * Grab the creation lock to ensure consistency between calls to 1730*2179Sahl * dtrace_probe_lookup() and dtrace_probe_create() in the face of 1731*2179Sahl * other threads creating probes. 1732*2179Sahl */ 1733*2179Sahl mutex_enter(&provider->ftp_cmtx); 17340Sstevel@tonic-gate 17350Sstevel@tonic-gate if (dtrace_probe_lookup(provider->ftp_provid, dhpb->dthpb_mod, 17360Sstevel@tonic-gate dhpb->dthpb_func, dhpb->dthpb_name) != 0) { 1737*2179Sahl mutex_exit(&provider->ftp_cmtx); 17380Sstevel@tonic-gate return; 17390Sstevel@tonic-gate } 17400Sstevel@tonic-gate 17411710Sahl ntps = dhpb->dthpb_noffs + dhpb->dthpb_nenoffs; 17421880Sahl ASSERT(ntps > 0); 17431710Sahl 17441710Sahl atomic_add_32(&fasttrap_total, ntps); 17450Sstevel@tonic-gate 17460Sstevel@tonic-gate if (fasttrap_total > fasttrap_max) { 17471710Sahl atomic_add_32(&fasttrap_total, -ntps); 1748*2179Sahl mutex_exit(&provider->ftp_cmtx); 17490Sstevel@tonic-gate return; 17500Sstevel@tonic-gate } 17510Sstevel@tonic-gate 17521880Sahl pp = kmem_zalloc(offsetof(fasttrap_probe_t, ftp_tps[ntps]), KM_SLEEP); 17530Sstevel@tonic-gate 17540Sstevel@tonic-gate pp->ftp_prov = provider; 17550Sstevel@tonic-gate pp->ftp_pid = provider->ftp_pid; 17561710Sahl pp->ftp_ntps = ntps; 17570Sstevel@tonic-gate pp->ftp_nargs = dhpb->dthpb_xargc; 17580Sstevel@tonic-gate pp->ftp_xtypes = dhpb->dthpb_xtypes; 17590Sstevel@tonic-gate pp->ftp_ntypes = dhpb->dthpb_ntypes; 17600Sstevel@tonic-gate 17611710Sahl /* 17621710Sahl * First create a tracepoint for each actual point of interest. 17631710Sahl */ 17641710Sahl for (i = 0; i < dhpb->dthpb_noffs; i++) { 17650Sstevel@tonic-gate tp = kmem_zalloc(sizeof (fasttrap_tracepoint_t), KM_SLEEP); 17660Sstevel@tonic-gate 1767532Sahl tp->ftt_proc = provider->ftp_proc; 17680Sstevel@tonic-gate tp->ftt_pc = dhpb->dthpb_base + dhpb->dthpb_offs[i]; 17690Sstevel@tonic-gate tp->ftt_pid = provider->ftp_pid; 17700Sstevel@tonic-gate 17710Sstevel@tonic-gate pp->ftp_tps[i].fit_tp = tp; 17720Sstevel@tonic-gate pp->ftp_tps[i].fit_id.fti_probe = pp; 17731710Sahl #ifdef __sparc 17741710Sahl pp->ftp_tps[i].fit_id.fti_ptype = DTFTP_POST_OFFSETS; 17751710Sahl #else 17761710Sahl pp->ftp_tps[i].fit_id.fti_ptype = DTFTP_OFFSETS; 17771710Sahl #endif 17781710Sahl } 17791710Sahl 17801710Sahl /* 17811710Sahl * Then create a tracepoint for each is-enabled point. 17821710Sahl */ 17831710Sahl for (j = 0; i < ntps; i++, j++) { 17841710Sahl tp = kmem_zalloc(sizeof (fasttrap_tracepoint_t), KM_SLEEP); 17851710Sahl 17861710Sahl tp->ftt_proc = provider->ftp_proc; 17871710Sahl tp->ftt_pc = dhpb->dthpb_base + dhpb->dthpb_enoffs[j]; 17881710Sahl tp->ftt_pid = provider->ftp_pid; 17891710Sahl 17901710Sahl pp->ftp_tps[i].fit_tp = tp; 17911710Sahl pp->ftp_tps[i].fit_id.fti_probe = pp; 17921710Sahl pp->ftp_tps[i].fit_id.fti_ptype = DTFTP_IS_ENABLED; 17930Sstevel@tonic-gate } 17940Sstevel@tonic-gate 17950Sstevel@tonic-gate /* 17960Sstevel@tonic-gate * If the arguments are shuffled around we set the argument remapping 17970Sstevel@tonic-gate * table. Later, when the probe fires, we only remap the arguments 17980Sstevel@tonic-gate * if the table is non-NULL. 17990Sstevel@tonic-gate */ 18000Sstevel@tonic-gate for (i = 0; i < dhpb->dthpb_xargc; i++) { 18010Sstevel@tonic-gate if (dhpb->dthpb_args[i] != i) { 18020Sstevel@tonic-gate pp->ftp_argmap = dhpb->dthpb_args; 18030Sstevel@tonic-gate break; 18040Sstevel@tonic-gate } 18050Sstevel@tonic-gate } 18060Sstevel@tonic-gate 18070Sstevel@tonic-gate /* 18080Sstevel@tonic-gate * The probe is fully constructed -- register it with DTrace. 18090Sstevel@tonic-gate */ 18100Sstevel@tonic-gate pp->ftp_id = dtrace_probe_create(provider->ftp_provid, dhpb->dthpb_mod, 18110Sstevel@tonic-gate dhpb->dthpb_func, dhpb->dthpb_name, FASTTRAP_OFFSET_AFRAMES, pp); 18120Sstevel@tonic-gate 1813*2179Sahl mutex_exit(&provider->ftp_cmtx); 18140Sstevel@tonic-gate } 18150Sstevel@tonic-gate 18160Sstevel@tonic-gate /*ARGSUSED*/ 18170Sstevel@tonic-gate static void 18180Sstevel@tonic-gate fasttrap_meta_remove(void *arg, dtrace_helper_provdesc_t *dhpv, pid_t pid) 18190Sstevel@tonic-gate { 1820935Sahl /* 1821935Sahl * Clean up the USDT provider. There may be active consumers of the 1822935Sahl * provider busy adding probes, no damage will actually befall the 1823935Sahl * provider until that count has dropped to zero. This just puts 1824935Sahl * the provider on death row. 1825935Sahl */ 1826935Sahl fasttrap_provider_retire(pid, dhpv->dthpv_provname, 1); 18270Sstevel@tonic-gate } 18280Sstevel@tonic-gate 18290Sstevel@tonic-gate static dtrace_mops_t fasttrap_mops = { 18300Sstevel@tonic-gate fasttrap_meta_create_probe, 18310Sstevel@tonic-gate fasttrap_meta_provide, 18320Sstevel@tonic-gate fasttrap_meta_remove 18330Sstevel@tonic-gate }; 18340Sstevel@tonic-gate 18350Sstevel@tonic-gate /*ARGSUSED*/ 18360Sstevel@tonic-gate static int 18370Sstevel@tonic-gate fasttrap_open(dev_t *devp, int flag, int otyp, cred_t *cred_p) 18380Sstevel@tonic-gate { 18390Sstevel@tonic-gate return (0); 18400Sstevel@tonic-gate } 18410Sstevel@tonic-gate 18420Sstevel@tonic-gate /*ARGSUSED*/ 18430Sstevel@tonic-gate static int 18440Sstevel@tonic-gate fasttrap_ioctl(dev_t dev, int cmd, intptr_t arg, int md, cred_t *cr, int *rv) 18450Sstevel@tonic-gate { 18460Sstevel@tonic-gate if (!dtrace_attached()) 18470Sstevel@tonic-gate return (EAGAIN); 18480Sstevel@tonic-gate 18490Sstevel@tonic-gate if (cmd == FASTTRAPIOC_MAKEPROBE) { 18500Sstevel@tonic-gate fasttrap_probe_spec_t *uprobe = (void *)arg; 18510Sstevel@tonic-gate fasttrap_probe_spec_t *probe; 18520Sstevel@tonic-gate uint64_t noffs; 18530Sstevel@tonic-gate size_t size; 18540Sstevel@tonic-gate int ret; 18550Sstevel@tonic-gate char *c; 18560Sstevel@tonic-gate 18570Sstevel@tonic-gate if (copyin(&uprobe->ftps_noffs, &noffs, 18580Sstevel@tonic-gate sizeof (uprobe->ftps_noffs))) 18590Sstevel@tonic-gate return (EFAULT); 18600Sstevel@tonic-gate 18610Sstevel@tonic-gate /* 18620Sstevel@tonic-gate * Probes must have at least one tracepoint. 18630Sstevel@tonic-gate */ 18640Sstevel@tonic-gate if (noffs == 0) 18650Sstevel@tonic-gate return (EINVAL); 18660Sstevel@tonic-gate 18670Sstevel@tonic-gate size = sizeof (fasttrap_probe_spec_t) + 18680Sstevel@tonic-gate sizeof (probe->ftps_offs[0]) * (noffs - 1); 18690Sstevel@tonic-gate 18700Sstevel@tonic-gate if (size > 1024 * 1024) 18710Sstevel@tonic-gate return (ENOMEM); 18720Sstevel@tonic-gate 18730Sstevel@tonic-gate probe = kmem_alloc(size, KM_SLEEP); 18740Sstevel@tonic-gate 18750Sstevel@tonic-gate if (copyin(uprobe, probe, size) != 0) { 18760Sstevel@tonic-gate kmem_free(probe, size); 18770Sstevel@tonic-gate return (EFAULT); 18780Sstevel@tonic-gate } 18790Sstevel@tonic-gate 18800Sstevel@tonic-gate /* 18810Sstevel@tonic-gate * Verify that the function and module strings contain no 18820Sstevel@tonic-gate * funny characters. 18830Sstevel@tonic-gate */ 18840Sstevel@tonic-gate for (c = &probe->ftps_func[0]; *c != '\0'; c++) { 18850Sstevel@tonic-gate if (*c < 0x20 || 0x7f <= *c) { 18860Sstevel@tonic-gate ret = EINVAL; 18870Sstevel@tonic-gate goto err; 18880Sstevel@tonic-gate } 18890Sstevel@tonic-gate } 18900Sstevel@tonic-gate 18910Sstevel@tonic-gate for (c = &probe->ftps_mod[0]; *c != '\0'; c++) { 18920Sstevel@tonic-gate if (*c < 0x20 || 0x7f <= *c) { 18930Sstevel@tonic-gate ret = EINVAL; 18940Sstevel@tonic-gate goto err; 18950Sstevel@tonic-gate } 18960Sstevel@tonic-gate } 18970Sstevel@tonic-gate 18980Sstevel@tonic-gate if (!PRIV_POLICY_CHOICE(cr, PRIV_ALL, B_FALSE)) { 18990Sstevel@tonic-gate proc_t *p; 19000Sstevel@tonic-gate pid_t pid = probe->ftps_pid; 19010Sstevel@tonic-gate 19020Sstevel@tonic-gate mutex_enter(&pidlock); 19030Sstevel@tonic-gate /* 19040Sstevel@tonic-gate * Report an error if the process doesn't exist 19050Sstevel@tonic-gate * or is actively being birthed. 19060Sstevel@tonic-gate */ 19070Sstevel@tonic-gate if ((p = prfind(pid)) == NULL || p->p_stat == SIDL) { 19080Sstevel@tonic-gate mutex_exit(&pidlock); 19090Sstevel@tonic-gate return (ESRCH); 19100Sstevel@tonic-gate } 19110Sstevel@tonic-gate mutex_enter(&p->p_lock); 19120Sstevel@tonic-gate mutex_exit(&pidlock); 19130Sstevel@tonic-gate 19140Sstevel@tonic-gate if ((ret = priv_proc_cred_perm(cr, p, NULL, 19150Sstevel@tonic-gate VREAD | VWRITE)) != 0) { 19160Sstevel@tonic-gate mutex_exit(&p->p_lock); 19170Sstevel@tonic-gate return (ret); 19180Sstevel@tonic-gate } 19190Sstevel@tonic-gate 19200Sstevel@tonic-gate mutex_exit(&p->p_lock); 19210Sstevel@tonic-gate } 19220Sstevel@tonic-gate 19230Sstevel@tonic-gate ret = fasttrap_add_probe(probe); 19240Sstevel@tonic-gate err: 19250Sstevel@tonic-gate kmem_free(probe, size); 19260Sstevel@tonic-gate 19270Sstevel@tonic-gate return (ret); 19280Sstevel@tonic-gate 19290Sstevel@tonic-gate } else if (cmd == FASTTRAPIOC_GETINSTR) { 19300Sstevel@tonic-gate fasttrap_instr_query_t instr; 19310Sstevel@tonic-gate fasttrap_tracepoint_t *tp; 19320Sstevel@tonic-gate uint_t index; 19330Sstevel@tonic-gate int ret; 19340Sstevel@tonic-gate 19350Sstevel@tonic-gate if (copyin((void *)arg, &instr, sizeof (instr)) != 0) 19360Sstevel@tonic-gate return (EFAULT); 19370Sstevel@tonic-gate 19380Sstevel@tonic-gate if (!PRIV_POLICY_CHOICE(cr, PRIV_ALL, B_FALSE)) { 19390Sstevel@tonic-gate proc_t *p; 19400Sstevel@tonic-gate pid_t pid = instr.ftiq_pid; 19410Sstevel@tonic-gate 19420Sstevel@tonic-gate mutex_enter(&pidlock); 19430Sstevel@tonic-gate /* 19440Sstevel@tonic-gate * Report an error if the process doesn't exist 19450Sstevel@tonic-gate * or is actively being birthed. 19460Sstevel@tonic-gate */ 19470Sstevel@tonic-gate if ((p = prfind(pid)) == NULL || p->p_stat == SIDL) { 19480Sstevel@tonic-gate mutex_exit(&pidlock); 19490Sstevel@tonic-gate return (ESRCH); 19500Sstevel@tonic-gate } 19510Sstevel@tonic-gate mutex_enter(&p->p_lock); 19520Sstevel@tonic-gate mutex_exit(&pidlock); 19530Sstevel@tonic-gate 19540Sstevel@tonic-gate if ((ret = priv_proc_cred_perm(cr, p, NULL, 19550Sstevel@tonic-gate VREAD)) != 0) { 19560Sstevel@tonic-gate mutex_exit(&p->p_lock); 19570Sstevel@tonic-gate return (ret); 19580Sstevel@tonic-gate } 19590Sstevel@tonic-gate 19600Sstevel@tonic-gate mutex_exit(&p->p_lock); 19610Sstevel@tonic-gate } 19620Sstevel@tonic-gate 19630Sstevel@tonic-gate index = FASTTRAP_TPOINTS_INDEX(instr.ftiq_pid, instr.ftiq_pc); 19640Sstevel@tonic-gate 19650Sstevel@tonic-gate mutex_enter(&fasttrap_tpoints.fth_table[index].ftb_mtx); 19660Sstevel@tonic-gate tp = fasttrap_tpoints.fth_table[index].ftb_data; 19670Sstevel@tonic-gate while (tp != NULL) { 19680Sstevel@tonic-gate if (instr.ftiq_pid == tp->ftt_pid && 19690Sstevel@tonic-gate instr.ftiq_pc == tp->ftt_pc && 1970532Sahl !tp->ftt_proc->ftpc_defunct) 19710Sstevel@tonic-gate break; 19720Sstevel@tonic-gate 19730Sstevel@tonic-gate tp = tp->ftt_next; 19740Sstevel@tonic-gate } 19750Sstevel@tonic-gate 19760Sstevel@tonic-gate if (tp == NULL) { 19770Sstevel@tonic-gate mutex_exit(&fasttrap_tpoints.fth_table[index].ftb_mtx); 19780Sstevel@tonic-gate return (ENOENT); 19790Sstevel@tonic-gate } 19800Sstevel@tonic-gate 19810Sstevel@tonic-gate bcopy(&tp->ftt_instr, &instr.ftiq_instr, 19820Sstevel@tonic-gate sizeof (instr.ftiq_instr)); 19830Sstevel@tonic-gate mutex_exit(&fasttrap_tpoints.fth_table[index].ftb_mtx); 19840Sstevel@tonic-gate 19850Sstevel@tonic-gate if (copyout(&instr, (void *)arg, sizeof (instr)) != 0) 19860Sstevel@tonic-gate return (EFAULT); 19870Sstevel@tonic-gate 19880Sstevel@tonic-gate return (0); 19890Sstevel@tonic-gate } 19900Sstevel@tonic-gate 19910Sstevel@tonic-gate return (EINVAL); 19920Sstevel@tonic-gate } 19930Sstevel@tonic-gate 19940Sstevel@tonic-gate static struct cb_ops fasttrap_cb_ops = { 19950Sstevel@tonic-gate fasttrap_open, /* open */ 19960Sstevel@tonic-gate nodev, /* close */ 19970Sstevel@tonic-gate nulldev, /* strategy */ 19980Sstevel@tonic-gate nulldev, /* print */ 19990Sstevel@tonic-gate nodev, /* dump */ 20000Sstevel@tonic-gate nodev, /* read */ 20010Sstevel@tonic-gate nodev, /* write */ 20020Sstevel@tonic-gate fasttrap_ioctl, /* ioctl */ 20030Sstevel@tonic-gate nodev, /* devmap */ 20040Sstevel@tonic-gate nodev, /* mmap */ 20050Sstevel@tonic-gate nodev, /* segmap */ 20060Sstevel@tonic-gate nochpoll, /* poll */ 20070Sstevel@tonic-gate ddi_prop_op, /* cb_prop_op */ 20080Sstevel@tonic-gate 0, /* streamtab */ 20090Sstevel@tonic-gate D_NEW | D_MP /* Driver compatibility flag */ 20100Sstevel@tonic-gate }; 20110Sstevel@tonic-gate 20120Sstevel@tonic-gate /*ARGSUSED*/ 20130Sstevel@tonic-gate static int 20140Sstevel@tonic-gate fasttrap_info(dev_info_t *dip, ddi_info_cmd_t infocmd, void *arg, void **result) 20150Sstevel@tonic-gate { 20160Sstevel@tonic-gate int error; 20170Sstevel@tonic-gate 20180Sstevel@tonic-gate switch (infocmd) { 20190Sstevel@tonic-gate case DDI_INFO_DEVT2DEVINFO: 20200Sstevel@tonic-gate *result = (void *)fasttrap_devi; 20210Sstevel@tonic-gate error = DDI_SUCCESS; 20220Sstevel@tonic-gate break; 20230Sstevel@tonic-gate case DDI_INFO_DEVT2INSTANCE: 20240Sstevel@tonic-gate *result = (void *)0; 20250Sstevel@tonic-gate error = DDI_SUCCESS; 20260Sstevel@tonic-gate break; 20270Sstevel@tonic-gate default: 20280Sstevel@tonic-gate error = DDI_FAILURE; 20290Sstevel@tonic-gate } 20300Sstevel@tonic-gate return (error); 20310Sstevel@tonic-gate } 20320Sstevel@tonic-gate 20330Sstevel@tonic-gate static int 20340Sstevel@tonic-gate fasttrap_attach(dev_info_t *devi, ddi_attach_cmd_t cmd) 20350Sstevel@tonic-gate { 20360Sstevel@tonic-gate ulong_t nent; 20370Sstevel@tonic-gate 20380Sstevel@tonic-gate switch (cmd) { 20390Sstevel@tonic-gate case DDI_ATTACH: 20400Sstevel@tonic-gate break; 20410Sstevel@tonic-gate case DDI_RESUME: 20420Sstevel@tonic-gate return (DDI_SUCCESS); 20430Sstevel@tonic-gate default: 20440Sstevel@tonic-gate return (DDI_FAILURE); 20450Sstevel@tonic-gate } 20460Sstevel@tonic-gate 20470Sstevel@tonic-gate if (ddi_create_minor_node(devi, "fasttrap", S_IFCHR, 0, 2048*2179Sahl DDI_PSEUDO, NULL) == DDI_FAILURE) { 20490Sstevel@tonic-gate ddi_remove_minor_node(devi, NULL); 20500Sstevel@tonic-gate return (DDI_FAILURE); 20510Sstevel@tonic-gate } 20520Sstevel@tonic-gate 20530Sstevel@tonic-gate ddi_report_dev(devi); 20540Sstevel@tonic-gate fasttrap_devi = devi; 20550Sstevel@tonic-gate 20560Sstevel@tonic-gate /* 20570Sstevel@tonic-gate * Install our hooks into fork(2), exec(2), and exit(2). 20580Sstevel@tonic-gate */ 20590Sstevel@tonic-gate dtrace_fasttrap_fork_ptr = &fasttrap_fork; 20600Sstevel@tonic-gate dtrace_fasttrap_exit_ptr = &fasttrap_exec_exit; 20610Sstevel@tonic-gate dtrace_fasttrap_exec_ptr = &fasttrap_exec_exit; 20620Sstevel@tonic-gate 20630Sstevel@tonic-gate fasttrap_max = ddi_getprop(DDI_DEV_T_ANY, devi, DDI_PROP_DONTPASS, 20640Sstevel@tonic-gate "fasttrap-max-probes", FASTTRAP_MAX_DEFAULT); 20650Sstevel@tonic-gate fasttrap_total = 0; 20660Sstevel@tonic-gate 20670Sstevel@tonic-gate /* 20680Sstevel@tonic-gate * Conjure up the tracepoints hashtable... 20690Sstevel@tonic-gate */ 20700Sstevel@tonic-gate nent = ddi_getprop(DDI_DEV_T_ANY, devi, DDI_PROP_DONTPASS, 20710Sstevel@tonic-gate "fasttrap-hash-size", FASTTRAP_TPOINTS_DEFAULT_SIZE); 20720Sstevel@tonic-gate 20730Sstevel@tonic-gate if (nent <= 0 || nent > 0x1000000) 20740Sstevel@tonic-gate nent = FASTTRAP_TPOINTS_DEFAULT_SIZE; 20750Sstevel@tonic-gate 20760Sstevel@tonic-gate if ((nent & (nent - 1)) == 0) 20770Sstevel@tonic-gate fasttrap_tpoints.fth_nent = nent; 20780Sstevel@tonic-gate else 20790Sstevel@tonic-gate fasttrap_tpoints.fth_nent = 1 << fasttrap_highbit(nent); 20800Sstevel@tonic-gate ASSERT(fasttrap_tpoints.fth_nent > 0); 20810Sstevel@tonic-gate fasttrap_tpoints.fth_mask = fasttrap_tpoints.fth_nent - 1; 20820Sstevel@tonic-gate fasttrap_tpoints.fth_table = kmem_zalloc(fasttrap_tpoints.fth_nent * 20830Sstevel@tonic-gate sizeof (fasttrap_bucket_t), KM_SLEEP); 20840Sstevel@tonic-gate 20850Sstevel@tonic-gate /* 2086532Sahl * ... and the providers hash table... 20870Sstevel@tonic-gate */ 20880Sstevel@tonic-gate nent = FASTTRAP_PROVIDERS_DEFAULT_SIZE; 20890Sstevel@tonic-gate if ((nent & (nent - 1)) == 0) 20900Sstevel@tonic-gate fasttrap_provs.fth_nent = nent; 20910Sstevel@tonic-gate else 20920Sstevel@tonic-gate fasttrap_provs.fth_nent = 1 << fasttrap_highbit(nent); 20930Sstevel@tonic-gate ASSERT(fasttrap_provs.fth_nent > 0); 20940Sstevel@tonic-gate fasttrap_provs.fth_mask = fasttrap_provs.fth_nent - 1; 2095532Sahl fasttrap_provs.fth_table = kmem_zalloc(fasttrap_provs.fth_nent * 2096532Sahl sizeof (fasttrap_bucket_t), KM_SLEEP); 20970Sstevel@tonic-gate 2098532Sahl /* 2099532Sahl * ... and the procs hash table. 2100532Sahl */ 2101532Sahl nent = FASTTRAP_PROCS_DEFAULT_SIZE; 2102532Sahl if ((nent & (nent - 1)) == 0) 2103532Sahl fasttrap_procs.fth_nent = nent; 2104532Sahl else 2105532Sahl fasttrap_procs.fth_nent = 1 << fasttrap_highbit(nent); 2106532Sahl ASSERT(fasttrap_procs.fth_nent > 0); 2107532Sahl fasttrap_procs.fth_mask = fasttrap_procs.fth_nent - 1; 2108532Sahl fasttrap_procs.fth_table = kmem_zalloc(fasttrap_procs.fth_nent * 21090Sstevel@tonic-gate sizeof (fasttrap_bucket_t), KM_SLEEP); 21100Sstevel@tonic-gate 21110Sstevel@tonic-gate (void) dtrace_meta_register("fasttrap", &fasttrap_mops, NULL, 21120Sstevel@tonic-gate &fasttrap_meta_id); 21130Sstevel@tonic-gate 21140Sstevel@tonic-gate return (DDI_SUCCESS); 21150Sstevel@tonic-gate } 21160Sstevel@tonic-gate 21170Sstevel@tonic-gate static int 21180Sstevel@tonic-gate fasttrap_detach(dev_info_t *devi, ddi_detach_cmd_t cmd) 21190Sstevel@tonic-gate { 21200Sstevel@tonic-gate int i, fail = 0; 21210Sstevel@tonic-gate timeout_id_t tmp; 21220Sstevel@tonic-gate 21230Sstevel@tonic-gate switch (cmd) { 21240Sstevel@tonic-gate case DDI_DETACH: 21250Sstevel@tonic-gate break; 21260Sstevel@tonic-gate case DDI_SUSPEND: 21270Sstevel@tonic-gate return (DDI_SUCCESS); 21280Sstevel@tonic-gate default: 21290Sstevel@tonic-gate return (DDI_FAILURE); 21300Sstevel@tonic-gate } 21310Sstevel@tonic-gate 21320Sstevel@tonic-gate /* 21330Sstevel@tonic-gate * Unregister the meta-provider to make sure no new fasttrap- 21340Sstevel@tonic-gate * managed providers come along while we're trying to close up 21350Sstevel@tonic-gate * shop. If we fail to detach, we'll need to re-register as a 21360Sstevel@tonic-gate * meta-provider. We can fail to unregister as a meta-provider 21370Sstevel@tonic-gate * if providers we manage still exist. 21380Sstevel@tonic-gate */ 21390Sstevel@tonic-gate if (fasttrap_meta_id != DTRACE_METAPROVNONE && 21400Sstevel@tonic-gate dtrace_meta_unregister(fasttrap_meta_id) != 0) 21410Sstevel@tonic-gate return (DDI_FAILURE); 21420Sstevel@tonic-gate 21430Sstevel@tonic-gate /* 21440Sstevel@tonic-gate * Prevent any new timeouts from running by setting fasttrap_timeout 21450Sstevel@tonic-gate * to a non-zero value, and wait for the current timeout to complete. 21460Sstevel@tonic-gate */ 21470Sstevel@tonic-gate mutex_enter(&fasttrap_cleanup_mtx); 21480Sstevel@tonic-gate fasttrap_cleanup_work = 0; 21490Sstevel@tonic-gate 21500Sstevel@tonic-gate while (fasttrap_timeout != (timeout_id_t)1) { 21510Sstevel@tonic-gate tmp = fasttrap_timeout; 21520Sstevel@tonic-gate fasttrap_timeout = (timeout_id_t)1; 21530Sstevel@tonic-gate 21540Sstevel@tonic-gate if (tmp != 0) { 21550Sstevel@tonic-gate mutex_exit(&fasttrap_cleanup_mtx); 21560Sstevel@tonic-gate (void) untimeout(tmp); 21570Sstevel@tonic-gate mutex_enter(&fasttrap_cleanup_mtx); 21580Sstevel@tonic-gate } 21590Sstevel@tonic-gate } 21600Sstevel@tonic-gate 21610Sstevel@tonic-gate fasttrap_cleanup_work = 0; 21620Sstevel@tonic-gate mutex_exit(&fasttrap_cleanup_mtx); 21630Sstevel@tonic-gate 21640Sstevel@tonic-gate /* 21650Sstevel@tonic-gate * Iterate over all of our providers. If there's still a process 21660Sstevel@tonic-gate * that corresponds to that pid, fail to detach. 21670Sstevel@tonic-gate */ 21680Sstevel@tonic-gate for (i = 0; i < fasttrap_provs.fth_nent; i++) { 21690Sstevel@tonic-gate fasttrap_provider_t **fpp, *fp; 21700Sstevel@tonic-gate fasttrap_bucket_t *bucket = &fasttrap_provs.fth_table[i]; 21710Sstevel@tonic-gate 21720Sstevel@tonic-gate mutex_enter(&bucket->ftb_mtx); 21730Sstevel@tonic-gate fpp = (fasttrap_provider_t **)&bucket->ftb_data; 21740Sstevel@tonic-gate while ((fp = *fpp) != NULL) { 21750Sstevel@tonic-gate /* 21760Sstevel@tonic-gate * Acquire and release the lock as a simple way of 21770Sstevel@tonic-gate * waiting for any other consumer to finish with 21780Sstevel@tonic-gate * this provider. A thread must first acquire the 21790Sstevel@tonic-gate * bucket lock so there's no chance of another thread 2180935Sahl * blocking on the provider's lock. 21810Sstevel@tonic-gate */ 21820Sstevel@tonic-gate mutex_enter(&fp->ftp_mtx); 21830Sstevel@tonic-gate mutex_exit(&fp->ftp_mtx); 21840Sstevel@tonic-gate 21850Sstevel@tonic-gate if (dtrace_unregister(fp->ftp_provid) != 0) { 21860Sstevel@tonic-gate fail = 1; 21870Sstevel@tonic-gate fpp = &fp->ftp_next; 21880Sstevel@tonic-gate } else { 21890Sstevel@tonic-gate *fpp = fp->ftp_next; 21900Sstevel@tonic-gate fasttrap_provider_free(fp); 21910Sstevel@tonic-gate } 21920Sstevel@tonic-gate } 21930Sstevel@tonic-gate 21940Sstevel@tonic-gate mutex_exit(&bucket->ftb_mtx); 21950Sstevel@tonic-gate } 21960Sstevel@tonic-gate 2197*2179Sahl if (fail) { 21980Sstevel@tonic-gate uint_t work; 21990Sstevel@tonic-gate /* 22000Sstevel@tonic-gate * If we're failing to detach, we need to unblock timeouts 22010Sstevel@tonic-gate * and start a new timeout if any work has accumulated while 22020Sstevel@tonic-gate * we've been unsuccessfully trying to detach. 22030Sstevel@tonic-gate */ 22040Sstevel@tonic-gate mutex_enter(&fasttrap_cleanup_mtx); 22050Sstevel@tonic-gate fasttrap_timeout = 0; 22060Sstevel@tonic-gate work = fasttrap_cleanup_work; 22070Sstevel@tonic-gate mutex_exit(&fasttrap_cleanup_mtx); 22080Sstevel@tonic-gate 22090Sstevel@tonic-gate if (work) 22100Sstevel@tonic-gate fasttrap_pid_cleanup(); 22110Sstevel@tonic-gate 22120Sstevel@tonic-gate (void) dtrace_meta_register("fasttrap", &fasttrap_mops, NULL, 22130Sstevel@tonic-gate &fasttrap_meta_id); 22140Sstevel@tonic-gate 22150Sstevel@tonic-gate return (DDI_FAILURE); 22160Sstevel@tonic-gate } 22170Sstevel@tonic-gate 22180Sstevel@tonic-gate #ifdef DEBUG 22190Sstevel@tonic-gate mutex_enter(&fasttrap_count_mtx); 2220*2179Sahl ASSERT(fasttrap_pid_count == 0); 22210Sstevel@tonic-gate mutex_exit(&fasttrap_count_mtx); 22220Sstevel@tonic-gate #endif 22230Sstevel@tonic-gate 22240Sstevel@tonic-gate kmem_free(fasttrap_tpoints.fth_table, 22250Sstevel@tonic-gate fasttrap_tpoints.fth_nent * sizeof (fasttrap_bucket_t)); 22260Sstevel@tonic-gate fasttrap_tpoints.fth_nent = 0; 22270Sstevel@tonic-gate 22280Sstevel@tonic-gate kmem_free(fasttrap_provs.fth_table, 22290Sstevel@tonic-gate fasttrap_provs.fth_nent * sizeof (fasttrap_bucket_t)); 22300Sstevel@tonic-gate fasttrap_provs.fth_nent = 0; 22310Sstevel@tonic-gate 2232532Sahl kmem_free(fasttrap_procs.fth_table, 2233532Sahl fasttrap_procs.fth_nent * sizeof (fasttrap_bucket_t)); 2234532Sahl fasttrap_procs.fth_nent = 0; 2235532Sahl 22360Sstevel@tonic-gate /* 22370Sstevel@tonic-gate * We know there are no tracepoints in any process anywhere in 22380Sstevel@tonic-gate * the system so there is no process which has its p_dtrace_count 22390Sstevel@tonic-gate * greater than zero, therefore we know that no thread can actively 22400Sstevel@tonic-gate * be executing code in fasttrap_fork(). Similarly for p_dtrace_probes 22410Sstevel@tonic-gate * and fasttrap_exec() and fasttrap_exit(). 22420Sstevel@tonic-gate */ 22430Sstevel@tonic-gate ASSERT(dtrace_fasttrap_fork_ptr == &fasttrap_fork); 22440Sstevel@tonic-gate dtrace_fasttrap_fork_ptr = NULL; 22450Sstevel@tonic-gate 22460Sstevel@tonic-gate ASSERT(dtrace_fasttrap_exec_ptr == &fasttrap_exec_exit); 22470Sstevel@tonic-gate dtrace_fasttrap_exec_ptr = NULL; 22480Sstevel@tonic-gate 22490Sstevel@tonic-gate ASSERT(dtrace_fasttrap_exit_ptr == &fasttrap_exec_exit); 22500Sstevel@tonic-gate dtrace_fasttrap_exit_ptr = NULL; 22510Sstevel@tonic-gate 22520Sstevel@tonic-gate ddi_remove_minor_node(devi, NULL); 22530Sstevel@tonic-gate 22540Sstevel@tonic-gate return (DDI_SUCCESS); 22550Sstevel@tonic-gate } 22560Sstevel@tonic-gate 22570Sstevel@tonic-gate static struct dev_ops fasttrap_ops = { 22580Sstevel@tonic-gate DEVO_REV, /* devo_rev */ 22590Sstevel@tonic-gate 0, /* refcnt */ 22600Sstevel@tonic-gate fasttrap_info, /* get_dev_info */ 22610Sstevel@tonic-gate nulldev, /* identify */ 22620Sstevel@tonic-gate nulldev, /* probe */ 22630Sstevel@tonic-gate fasttrap_attach, /* attach */ 22640Sstevel@tonic-gate fasttrap_detach, /* detach */ 22650Sstevel@tonic-gate nodev, /* reset */ 22660Sstevel@tonic-gate &fasttrap_cb_ops, /* driver operations */ 22670Sstevel@tonic-gate NULL, /* bus operations */ 22680Sstevel@tonic-gate nodev /* dev power */ 22690Sstevel@tonic-gate }; 22700Sstevel@tonic-gate 22710Sstevel@tonic-gate /* 22720Sstevel@tonic-gate * Module linkage information for the kernel. 22730Sstevel@tonic-gate */ 22740Sstevel@tonic-gate static struct modldrv modldrv = { 22750Sstevel@tonic-gate &mod_driverops, /* module type (this is a pseudo driver) */ 22760Sstevel@tonic-gate "Fasttrap Tracing", /* name of module */ 22770Sstevel@tonic-gate &fasttrap_ops, /* driver ops */ 22780Sstevel@tonic-gate }; 22790Sstevel@tonic-gate 22800Sstevel@tonic-gate static struct modlinkage modlinkage = { 22810Sstevel@tonic-gate MODREV_1, 22820Sstevel@tonic-gate (void *)&modldrv, 22830Sstevel@tonic-gate NULL 22840Sstevel@tonic-gate }; 22850Sstevel@tonic-gate 22860Sstevel@tonic-gate int 22870Sstevel@tonic-gate _init(void) 22880Sstevel@tonic-gate { 22890Sstevel@tonic-gate return (mod_install(&modlinkage)); 22900Sstevel@tonic-gate } 22910Sstevel@tonic-gate 22920Sstevel@tonic-gate int 22930Sstevel@tonic-gate _info(struct modinfo *modinfop) 22940Sstevel@tonic-gate { 22950Sstevel@tonic-gate return (mod_info(&modlinkage, modinfop)); 22960Sstevel@tonic-gate } 22970Sstevel@tonic-gate 22980Sstevel@tonic-gate int 22990Sstevel@tonic-gate _fini(void) 23000Sstevel@tonic-gate { 23010Sstevel@tonic-gate return (mod_remove(&modlinkage)); 23020Sstevel@tonic-gate } 2303