subr_kcov.c revision 1.12 1 1.12 maxv /* $NetBSD: subr_kcov.c,v 1.12 2020/04/04 06:51:46 maxv Exp $ */
2 1.1 kamil
3 1.1 kamil /*
4 1.12 maxv * Copyright (c) 2019-2020 The NetBSD Foundation, Inc.
5 1.1 kamil * All rights reserved.
6 1.1 kamil *
7 1.1 kamil * This code is derived from software contributed to The NetBSD Foundation
8 1.1 kamil * by Siddharth Muralee.
9 1.1 kamil *
10 1.1 kamil * Redistribution and use in source and binary forms, with or without
11 1.1 kamil * modification, are permitted provided that the following conditions
12 1.1 kamil * are met:
13 1.1 kamil * 1. Redistributions of source code must retain the above copyright
14 1.1 kamil * notice, this list of conditions and the following disclaimer.
15 1.1 kamil * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 kamil * notice, this list of conditions and the following disclaimer in the
17 1.1 kamil * documentation and/or other materials provided with the distribution.
18 1.1 kamil *
19 1.1 kamil * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 kamil * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 kamil * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 kamil * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 kamil * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 kamil * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 kamil * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 kamil * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 kamil * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 kamil * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 kamil * POSSIBILITY OF SUCH DAMAGE.
30 1.1 kamil */
31 1.1 kamil
32 1.1 kamil #include <sys/cdefs.h>
33 1.1 kamil
34 1.1 kamil #include <sys/module.h>
35 1.1 kamil #include <sys/param.h>
36 1.1 kamil #include <sys/systm.h>
37 1.1 kamil #include <sys/kernel.h>
38 1.1 kamil
39 1.1 kamil #include <sys/conf.h>
40 1.1 kamil #include <sys/condvar.h>
41 1.4 kamil #include <sys/file.h>
42 1.4 kamil #include <sys/filedesc.h>
43 1.1 kamil #include <sys/kmem.h>
44 1.4 kamil #include <sys/mman.h>
45 1.1 kamil #include <sys/mutex.h>
46 1.1 kamil #include <sys/queue.h>
47 1.1 kamil
48 1.1 kamil #include <uvm/uvm_extern.h>
49 1.1 kamil #include <sys/kcov.h>
50 1.1 kamil
51 1.1 kamil #define KCOV_BUF_MAX_ENTRIES (256 << 10)
52 1.1 kamil
53 1.5 kamil #define KCOV_CMP_CONST 1
54 1.5 kamil #define KCOV_CMP_SIZE(x) ((x) << 1)
55 1.5 kamil
56 1.4 kamil static dev_type_open(kcov_open);
57 1.4 kamil
58 1.4 kamil const struct cdevsw kcov_cdevsw = {
59 1.4 kamil .d_open = kcov_open,
60 1.4 kamil .d_close = noclose,
61 1.4 kamil .d_read = noread,
62 1.4 kamil .d_write = nowrite,
63 1.4 kamil .d_ioctl = noioctl,
64 1.4 kamil .d_stop = nostop,
65 1.4 kamil .d_tty = notty,
66 1.4 kamil .d_poll = nopoll,
67 1.4 kamil .d_mmap = nommap,
68 1.4 kamil .d_kqfilter = nokqfilter,
69 1.4 kamil .d_discard = nodiscard,
70 1.4 kamil .d_flag = D_OTHER | D_MPSAFE
71 1.4 kamil };
72 1.4 kamil
73 1.4 kamil static int kcov_fops_ioctl(file_t *, u_long, void *);
74 1.4 kamil static int kcov_fops_close(file_t *);
75 1.4 kamil static int kcov_fops_mmap(file_t *, off_t *, size_t, int, int *, int *,
76 1.4 kamil struct uvm_object **, int *);
77 1.4 kamil
78 1.4 kamil const struct fileops kcov_fileops = {
79 1.4 kamil .fo_read = fbadop_read,
80 1.4 kamil .fo_write = fbadop_write,
81 1.4 kamil .fo_ioctl = kcov_fops_ioctl,
82 1.4 kamil .fo_fcntl = fnullop_fcntl,
83 1.4 kamil .fo_poll = fnullop_poll,
84 1.4 kamil .fo_stat = fbadop_stat,
85 1.4 kamil .fo_close = kcov_fops_close,
86 1.4 kamil .fo_kqfilter = fnullop_kqfilter,
87 1.4 kamil .fo_restart = fnullop_restart,
88 1.4 kamil .fo_mmap = kcov_fops_mmap,
89 1.4 kamil };
90 1.4 kamil
91 1.1 kamil /*
92 1.4 kamil * The KCOV descriptors (KD) are allocated during open(), and are associated
93 1.4 kamil * with a file descriptor.
94 1.4 kamil *
95 1.4 kamil * An LWP can 'enable' a KD. When this happens, this LWP becomes the owner of
96 1.4 kamil * the KD, and no LWP can 'disable' this KD except the owner.
97 1.1 kamil *
98 1.4 kamil * A KD is freed when its file descriptor is closed _iff_ the KD is not active
99 1.4 kamil * on an LWP. If it is, we ask the LWP to free it when it exits.
100 1.4 kamil *
101 1.4 kamil * The buffers mmapped are in a dedicated uobj, therefore there is no risk
102 1.4 kamil * that the kernel frees a buffer still mmapped in a process: the uobj
103 1.4 kamil * refcount will be non-zero, so the backing is not freed until an munmap
104 1.4 kamil * occurs on said process.
105 1.1 kamil */
106 1.1 kamil
107 1.1 kamil typedef struct kcov_desc {
108 1.1 kamil kmutex_t lock;
109 1.1 kamil kcov_int_t *buf;
110 1.4 kamil struct uvm_object *uobj;
111 1.1 kamil size_t bufnent;
112 1.1 kamil size_t bufsize;
113 1.5 kamil int mode;
114 1.4 kamil bool enabled;
115 1.4 kamil bool lwpfree;
116 1.1 kamil } kcov_t;
117 1.1 kamil
118 1.1 kamil static void
119 1.1 kamil kcov_lock(kcov_t *kd)
120 1.1 kamil {
121 1.1 kamil
122 1.1 kamil mutex_enter(&kd->lock);
123 1.1 kamil }
124 1.1 kamil
125 1.1 kamil static void
126 1.1 kamil kcov_unlock(kcov_t *kd)
127 1.1 kamil {
128 1.1 kamil
129 1.1 kamil mutex_exit(&kd->lock);
130 1.1 kamil }
131 1.1 kamil
132 1.1 kamil static void
133 1.4 kamil kcov_free(kcov_t *kd)
134 1.1 kamil {
135 1.1 kamil
136 1.4 kamil KASSERT(kd != NULL);
137 1.4 kamil if (kd->buf != NULL) {
138 1.4 kamil uvm_deallocate(kernel_map, (vaddr_t)kd->buf, kd->bufsize);
139 1.4 kamil }
140 1.4 kamil mutex_destroy(&kd->lock);
141 1.4 kamil kmem_free(kd, sizeof(*kd));
142 1.1 kamil }
143 1.1 kamil
144 1.12 maxv void
145 1.12 maxv kcov_lwp_free(struct lwp *l)
146 1.1 kamil {
147 1.12 maxv kcov_t *kd = (kcov_t *)l->l_kcov;
148 1.1 kamil
149 1.1 kamil if (kd == NULL) {
150 1.1 kamil return;
151 1.1 kamil }
152 1.1 kamil kcov_lock(kd);
153 1.4 kamil kd->enabled = false;
154 1.1 kamil kcov_unlock(kd);
155 1.4 kamil if (kd->lwpfree) {
156 1.4 kamil kcov_free(kd);
157 1.1 kamil }
158 1.1 kamil }
159 1.1 kamil
160 1.1 kamil static int
161 1.1 kamil kcov_allocbuf(kcov_t *kd, uint64_t nent)
162 1.1 kamil {
163 1.1 kamil size_t size;
164 1.4 kamil int error;
165 1.1 kamil
166 1.1 kamil if (nent < 2 || nent > KCOV_BUF_MAX_ENTRIES)
167 1.1 kamil return EINVAL;
168 1.1 kamil if (kd->buf != NULL)
169 1.1 kamil return EEXIST;
170 1.1 kamil
171 1.1 kamil size = roundup(nent * KCOV_ENTRY_SIZE, PAGE_SIZE);
172 1.1 kamil kd->bufnent = nent - 1;
173 1.1 kamil kd->bufsize = size;
174 1.4 kamil kd->uobj = uao_create(kd->bufsize, 0);
175 1.4 kamil
176 1.4 kamil /* Map the uobj into the kernel address space, as wired. */
177 1.4 kamil kd->buf = NULL;
178 1.4 kamil error = uvm_map(kernel_map, (vaddr_t *)&kd->buf, kd->bufsize, kd->uobj,
179 1.4 kamil 0, 0, UVM_MAPFLAG(UVM_PROT_RW, UVM_PROT_RW, UVM_INH_SHARE,
180 1.4 kamil UVM_ADV_RANDOM, 0));
181 1.4 kamil if (error) {
182 1.4 kamil uao_detach(kd->uobj);
183 1.4 kamil return error;
184 1.4 kamil }
185 1.4 kamil error = uvm_map_pageable(kernel_map, (vaddr_t)kd->buf,
186 1.4 kamil (vaddr_t)kd->buf + size, false, 0);
187 1.4 kamil if (error) {
188 1.4 kamil uvm_deallocate(kernel_map, (vaddr_t)kd->buf, size);
189 1.4 kamil return error;
190 1.4 kamil }
191 1.1 kamil
192 1.1 kamil return 0;
193 1.1 kamil }
194 1.1 kamil
195 1.1 kamil /* -------------------------------------------------------------------------- */
196 1.1 kamil
197 1.1 kamil static int
198 1.1 kamil kcov_open(dev_t dev, int flag, int mode, struct lwp *l)
199 1.1 kamil {
200 1.4 kamil struct file *fp;
201 1.4 kamil int error, fd;
202 1.1 kamil kcov_t *kd;
203 1.1 kamil
204 1.4 kamil error = fd_allocfile(&fp, &fd);
205 1.4 kamil if (error)
206 1.4 kamil return error;
207 1.1 kamil
208 1.1 kamil kd = kmem_zalloc(sizeof(*kd), KM_SLEEP);
209 1.1 kamil mutex_init(&kd->lock, MUTEX_DEFAULT, IPL_NONE);
210 1.1 kamil
211 1.4 kamil return fd_clone(fp, fd, flag, &kcov_fileops, kd);
212 1.1 kamil }
213 1.1 kamil
214 1.1 kamil static int
215 1.4 kamil kcov_fops_close(file_t *fp)
216 1.1 kamil {
217 1.4 kamil kcov_t *kd = fp->f_data;
218 1.4 kamil
219 1.4 kamil kcov_lock(kd);
220 1.4 kamil if (kd->enabled) {
221 1.4 kamil kd->lwpfree = true;
222 1.4 kamil kcov_unlock(kd);
223 1.4 kamil } else {
224 1.4 kamil kcov_unlock(kd);
225 1.4 kamil kcov_free(kd);
226 1.4 kamil }
227 1.4 kamil fp->f_data = NULL;
228 1.1 kamil
229 1.1 kamil return 0;
230 1.1 kamil }
231 1.1 kamil
232 1.1 kamil static int
233 1.4 kamil kcov_fops_ioctl(file_t *fp, u_long cmd, void *addr)
234 1.1 kamil {
235 1.12 maxv struct lwp *l = curlwp;
236 1.1 kamil int error = 0;
237 1.5 kamil int mode;
238 1.1 kamil kcov_t *kd;
239 1.1 kamil
240 1.4 kamil kd = fp->f_data;
241 1.1 kamil if (kd == NULL)
242 1.1 kamil return ENXIO;
243 1.1 kamil kcov_lock(kd);
244 1.1 kamil
245 1.1 kamil switch (cmd) {
246 1.1 kamil case KCOV_IOC_SETBUFSIZE:
247 1.4 kamil if (kd->enabled) {
248 1.1 kamil error = EBUSY;
249 1.1 kamil break;
250 1.1 kamil }
251 1.1 kamil error = kcov_allocbuf(kd, *((uint64_t *)addr));
252 1.1 kamil break;
253 1.1 kamil case KCOV_IOC_ENABLE:
254 1.4 kamil if (kd->enabled) {
255 1.4 kamil error = EBUSY;
256 1.4 kamil break;
257 1.4 kamil }
258 1.12 maxv if (l->l_kcov != NULL) {
259 1.1 kamil error = EBUSY;
260 1.1 kamil break;
261 1.1 kamil }
262 1.1 kamil if (kd->buf == NULL) {
263 1.1 kamil error = ENOBUFS;
264 1.1 kamil break;
265 1.1 kamil }
266 1.5 kamil
267 1.5 kamil mode = *((int *)addr);
268 1.5 kamil switch (mode) {
269 1.5 kamil case KCOV_MODE_NONE:
270 1.5 kamil case KCOV_MODE_TRACE_PC:
271 1.5 kamil case KCOV_MODE_TRACE_CMP:
272 1.5 kamil kd->mode = mode;
273 1.5 kamil break;
274 1.5 kamil default:
275 1.5 kamil error = EINVAL;
276 1.5 kamil }
277 1.5 kamil if (error)
278 1.5 kamil break;
279 1.5 kamil
280 1.12 maxv l->l_kcov = kd;
281 1.4 kamil kd->enabled = true;
282 1.1 kamil break;
283 1.1 kamil case KCOV_IOC_DISABLE:
284 1.4 kamil if (!kd->enabled) {
285 1.1 kamil error = ENOENT;
286 1.1 kamil break;
287 1.1 kamil }
288 1.12 maxv if (l->l_kcov != kd) {
289 1.4 kamil error = ENOENT;
290 1.4 kamil break;
291 1.4 kamil }
292 1.12 maxv l->l_kcov = NULL;
293 1.4 kamil kd->enabled = false;
294 1.1 kamil break;
295 1.1 kamil default:
296 1.1 kamil error = EINVAL;
297 1.1 kamil }
298 1.1 kamil
299 1.1 kamil kcov_unlock(kd);
300 1.1 kamil return error;
301 1.1 kamil }
302 1.1 kamil
303 1.4 kamil static int
304 1.4 kamil kcov_fops_mmap(file_t *fp, off_t *offp, size_t size, int prot, int *flagsp,
305 1.4 kamil int *advicep, struct uvm_object **uobjp, int *maxprotp)
306 1.1 kamil {
307 1.4 kamil off_t off = *offp;
308 1.1 kamil kcov_t *kd;
309 1.4 kamil int error = 0;
310 1.4 kamil
311 1.4 kamil if (prot & PROT_EXEC)
312 1.4 kamil return EACCES;
313 1.4 kamil if (off < 0)
314 1.4 kamil return EINVAL;
315 1.4 kamil if (size > KCOV_BUF_MAX_ENTRIES * KCOV_ENTRY_SIZE)
316 1.4 kamil return EINVAL;
317 1.4 kamil if (off > KCOV_BUF_MAX_ENTRIES * KCOV_ENTRY_SIZE)
318 1.4 kamil return EINVAL;
319 1.1 kamil
320 1.4 kamil kd = fp->f_data;
321 1.4 kamil if (kd == NULL)
322 1.4 kamil return ENXIO;
323 1.4 kamil kcov_lock(kd);
324 1.1 kamil
325 1.4 kamil if ((size + off) > kd->bufsize) {
326 1.4 kamil error = ENOMEM;
327 1.4 kamil goto out;
328 1.1 kamil }
329 1.1 kamil
330 1.4 kamil uao_reference(kd->uobj);
331 1.4 kamil
332 1.4 kamil *uobjp = kd->uobj;
333 1.4 kamil *maxprotp = prot;
334 1.4 kamil *advicep = UVM_ADV_RANDOM;
335 1.4 kamil
336 1.4 kamil out:
337 1.4 kamil kcov_unlock(kd);
338 1.4 kamil return error;
339 1.1 kamil }
340 1.1 kamil
341 1.12 maxv /* -------------------------------------------------------------------------- */
342 1.12 maxv
343 1.12 maxv /*
344 1.12 maxv * Constraints on the functions here: they must be marked with __nomsan, and
345 1.12 maxv * must not make any external call.
346 1.12 maxv */
347 1.12 maxv
348 1.9 maxv static inline bool __nomsan
349 1.1 kamil in_interrupt(void)
350 1.1 kamil {
351 1.11 kamil return curcpu()->ci_idepth >= 0;
352 1.1 kamil }
353 1.1 kamil
354 1.1 kamil void __sanitizer_cov_trace_pc(void);
355 1.1 kamil
356 1.9 maxv void __nomsan
357 1.1 kamil __sanitizer_cov_trace_pc(void)
358 1.1 kamil {
359 1.1 kamil extern int cold;
360 1.1 kamil uint64_t idx;
361 1.1 kamil kcov_t *kd;
362 1.1 kamil
363 1.1 kamil if (__predict_false(cold)) {
364 1.1 kamil /* Do not trace during boot. */
365 1.1 kamil return;
366 1.1 kamil }
367 1.1 kamil
368 1.1 kamil if (in_interrupt()) {
369 1.1 kamil /* Do not trace in interrupts. */
370 1.1 kamil return;
371 1.1 kamil }
372 1.1 kamil
373 1.12 maxv kd = curlwp->l_kcov;
374 1.1 kamil if (__predict_true(kd == NULL)) {
375 1.1 kamil /* Not traced. */
376 1.1 kamil return;
377 1.1 kamil }
378 1.1 kamil
379 1.4 kamil if (!kd->enabled) {
380 1.4 kamil /* Tracing not enabled */
381 1.4 kamil return;
382 1.4 kamil }
383 1.4 kamil
384 1.5 kamil if (kd->mode != KCOV_MODE_TRACE_PC) {
385 1.5 kamil /* PC tracing mode not enabled */
386 1.5 kamil return;
387 1.5 kamil }
388 1.5 kamil
389 1.8 kamil idx = kd->buf[0];
390 1.1 kamil if (idx < kd->bufnent) {
391 1.8 kamil kd->buf[idx+1] =
392 1.8 kamil (intptr_t)__builtin_return_address(0);
393 1.8 kamil kd->buf[0] = idx + 1;
394 1.1 kamil }
395 1.1 kamil }
396 1.1 kamil
397 1.9 maxv static void __nomsan
398 1.5 kamil trace_cmp(uint64_t type, uint64_t arg1, uint64_t arg2, intptr_t pc)
399 1.5 kamil {
400 1.5 kamil extern int cold;
401 1.5 kamil uint64_t idx;
402 1.5 kamil kcov_t *kd;
403 1.5 kamil
404 1.5 kamil if (__predict_false(cold)) {
405 1.5 kamil /* Do not trace during boot. */
406 1.5 kamil return;
407 1.5 kamil }
408 1.5 kamil
409 1.5 kamil if (in_interrupt()) {
410 1.5 kamil /* Do not trace in interrupts. */
411 1.5 kamil return;
412 1.5 kamil }
413 1.5 kamil
414 1.12 maxv kd = curlwp->l_kcov;
415 1.5 kamil if (__predict_true(kd == NULL)) {
416 1.5 kamil /* Not traced. */
417 1.5 kamil return;
418 1.5 kamil }
419 1.5 kamil
420 1.5 kamil if (!kd->enabled) {
421 1.5 kamil /* Tracing not enabled */
422 1.5 kamil return;
423 1.5 kamil }
424 1.5 kamil
425 1.5 kamil if (kd->mode != KCOV_MODE_TRACE_CMP) {
426 1.6 kamil /* CMP tracing mode not enabled */
427 1.5 kamil return;
428 1.5 kamil }
429 1.5 kamil
430 1.8 kamil idx = kd->buf[0];
431 1.5 kamil if ((idx * 4 + 4) <= kd->bufnent) {
432 1.8 kamil kd->buf[idx * 4 + 1] = type;
433 1.8 kamil kd->buf[idx * 4 + 2] = arg1;
434 1.8 kamil kd->buf[idx * 4 + 3] = arg2;
435 1.8 kamil kd->buf[idx * 4 + 4] = pc;
436 1.8 kamil kd->buf[0] = idx + 1;
437 1.5 kamil }
438 1.5 kamil }
439 1.5 kamil
440 1.5 kamil void __sanitizer_cov_trace_cmp1(uint8_t arg1, uint8_t arg2);
441 1.5 kamil
442 1.9 maxv void __nomsan
443 1.5 kamil __sanitizer_cov_trace_cmp1(uint8_t arg1, uint8_t arg2)
444 1.5 kamil {
445 1.5 kamil
446 1.5 kamil trace_cmp(KCOV_CMP_SIZE(0), arg1, arg2,
447 1.5 kamil (intptr_t)__builtin_return_address(0));
448 1.5 kamil }
449 1.5 kamil
450 1.5 kamil void __sanitizer_cov_trace_cmp2(uint16_t arg1, uint16_t arg2);
451 1.5 kamil
452 1.9 maxv void __nomsan
453 1.5 kamil __sanitizer_cov_trace_cmp2(uint16_t arg1, uint16_t arg2)
454 1.5 kamil {
455 1.5 kamil
456 1.5 kamil trace_cmp(KCOV_CMP_SIZE(1), arg1, arg2,
457 1.5 kamil (intptr_t)__builtin_return_address(0));
458 1.5 kamil }
459 1.5 kamil
460 1.5 kamil void __sanitizer_cov_trace_cmp4(uint32_t arg1, uint32_t arg2);
461 1.5 kamil
462 1.9 maxv void __nomsan
463 1.5 kamil __sanitizer_cov_trace_cmp4(uint32_t arg1, uint32_t arg2)
464 1.5 kamil {
465 1.5 kamil
466 1.5 kamil trace_cmp(KCOV_CMP_SIZE(2), arg1, arg2,
467 1.5 kamil (intptr_t)__builtin_return_address(0));
468 1.5 kamil }
469 1.5 kamil
470 1.5 kamil void __sanitizer_cov_trace_cmp8(uint64_t arg1, uint64_t arg2);
471 1.5 kamil
472 1.9 maxv void __nomsan
473 1.5 kamil __sanitizer_cov_trace_cmp8(uint64_t arg1, uint64_t arg2)
474 1.5 kamil {
475 1.5 kamil
476 1.5 kamil trace_cmp(KCOV_CMP_SIZE(3), arg1, arg2,
477 1.5 kamil (intptr_t)__builtin_return_address(0));
478 1.5 kamil }
479 1.5 kamil
480 1.5 kamil void __sanitizer_cov_trace_const_cmp1(uint8_t arg1, uint8_t arg2);
481 1.5 kamil
482 1.9 maxv void __nomsan
483 1.5 kamil __sanitizer_cov_trace_const_cmp1(uint8_t arg1, uint8_t arg2)
484 1.5 kamil {
485 1.5 kamil
486 1.5 kamil trace_cmp(KCOV_CMP_SIZE(0) | KCOV_CMP_CONST, arg1, arg2,
487 1.5 kamil (intptr_t)__builtin_return_address(0));
488 1.5 kamil }
489 1.5 kamil
490 1.5 kamil void __sanitizer_cov_trace_const_cmp2(uint16_t arg1, uint16_t arg2);
491 1.5 kamil
492 1.9 maxv void __nomsan
493 1.5 kamil __sanitizer_cov_trace_const_cmp2(uint16_t arg1, uint16_t arg2)
494 1.5 kamil {
495 1.5 kamil
496 1.5 kamil trace_cmp(KCOV_CMP_SIZE(1) | KCOV_CMP_CONST, arg1, arg2,
497 1.5 kamil (intptr_t)__builtin_return_address(0));
498 1.5 kamil }
499 1.5 kamil
500 1.5 kamil void __sanitizer_cov_trace_const_cmp4(uint32_t arg1, uint32_t arg2);
501 1.5 kamil
502 1.9 maxv void __nomsan
503 1.5 kamil __sanitizer_cov_trace_const_cmp4(uint32_t arg1, uint32_t arg2)
504 1.5 kamil {
505 1.5 kamil
506 1.5 kamil trace_cmp(KCOV_CMP_SIZE(2) | KCOV_CMP_CONST, arg1, arg2,
507 1.5 kamil (intptr_t)__builtin_return_address(0));
508 1.5 kamil }
509 1.5 kamil
510 1.5 kamil void __sanitizer_cov_trace_const_cmp8(uint64_t arg1, uint64_t arg2);
511 1.5 kamil
512 1.9 maxv void __nomsan
513 1.5 kamil __sanitizer_cov_trace_const_cmp8(uint64_t arg1, uint64_t arg2)
514 1.5 kamil {
515 1.5 kamil
516 1.5 kamil trace_cmp(KCOV_CMP_SIZE(3) | KCOV_CMP_CONST, arg1, arg2,
517 1.5 kamil (intptr_t)__builtin_return_address(0));
518 1.5 kamil }
519 1.5 kamil
520 1.5 kamil void __sanitizer_cov_trace_switch(uint64_t val, uint64_t *cases);
521 1.5 kamil
522 1.9 maxv void __nomsan
523 1.5 kamil __sanitizer_cov_trace_switch(uint64_t val, uint64_t *cases)
524 1.5 kamil {
525 1.5 kamil uint64_t i, nbits, ncases, type;
526 1.5 kamil intptr_t pc;
527 1.5 kamil
528 1.5 kamil pc = (intptr_t)__builtin_return_address(0);
529 1.5 kamil ncases = cases[0];
530 1.5 kamil nbits = cases[1];
531 1.5 kamil
532 1.5 kamil switch (nbits) {
533 1.5 kamil case 8:
534 1.5 kamil type = KCOV_CMP_SIZE(0);
535 1.5 kamil break;
536 1.5 kamil case 16:
537 1.5 kamil type = KCOV_CMP_SIZE(1);
538 1.5 kamil break;
539 1.5 kamil case 32:
540 1.5 kamil type = KCOV_CMP_SIZE(2);
541 1.5 kamil break;
542 1.5 kamil case 64:
543 1.5 kamil type = KCOV_CMP_SIZE(3);
544 1.5 kamil break;
545 1.5 kamil default:
546 1.5 kamil return;
547 1.5 kamil }
548 1.5 kamil type |= KCOV_CMP_CONST;
549 1.5 kamil
550 1.5 kamil for (i = 0; i < ncases; i++)
551 1.5 kamil trace_cmp(type, cases[i + 2], val, pc);
552 1.5 kamil }
553 1.5 kamil
554 1.1 kamil /* -------------------------------------------------------------------------- */
555 1.1 kamil
556 1.7 kamil MODULE(MODULE_CLASS_MISC, kcov, NULL);
557 1.1 kamil
558 1.1 kamil static int
559 1.1 kamil kcov_modcmd(modcmd_t cmd, void *arg)
560 1.1 kamil {
561 1.1 kamil
562 1.1 kamil switch (cmd) {
563 1.1 kamil case MODULE_CMD_INIT:
564 1.1 kamil return 0;
565 1.1 kamil case MODULE_CMD_FINI:
566 1.1 kamil return EINVAL;
567 1.1 kamil default:
568 1.1 kamil return ENOTTY;
569 1.1 kamil }
570 1.1 kamil }
571