Home | History | Annotate | Line # | Download | only in kern
subr_kcov.c revision 1.12
      1  1.12   maxv /*	$NetBSD: subr_kcov.c,v 1.12 2020/04/04 06:51:46 maxv Exp $	*/
      2   1.1  kamil 
      3   1.1  kamil /*
      4  1.12   maxv  * Copyright (c) 2019-2020 The NetBSD Foundation, Inc.
      5   1.1  kamil  * All rights reserved.
      6   1.1  kamil  *
      7   1.1  kamil  * This code is derived from software contributed to The NetBSD Foundation
      8   1.1  kamil  * by Siddharth Muralee.
      9   1.1  kamil  *
     10   1.1  kamil  * Redistribution and use in source and binary forms, with or without
     11   1.1  kamil  * modification, are permitted provided that the following conditions
     12   1.1  kamil  * are met:
     13   1.1  kamil  * 1. Redistributions of source code must retain the above copyright
     14   1.1  kamil  *    notice, this list of conditions and the following disclaimer.
     15   1.1  kamil  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.1  kamil  *    notice, this list of conditions and the following disclaimer in the
     17   1.1  kamil  *    documentation and/or other materials provided with the distribution.
     18   1.1  kamil  *
     19   1.1  kamil  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20   1.1  kamil  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21   1.1  kamil  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22   1.1  kamil  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23   1.1  kamil  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24   1.1  kamil  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25   1.1  kamil  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26   1.1  kamil  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27   1.1  kamil  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28   1.1  kamil  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29   1.1  kamil  * POSSIBILITY OF SUCH DAMAGE.
     30   1.1  kamil  */
     31   1.1  kamil 
     32   1.1  kamil #include <sys/cdefs.h>
     33   1.1  kamil 
     34   1.1  kamil #include <sys/module.h>
     35   1.1  kamil #include <sys/param.h>
     36   1.1  kamil #include <sys/systm.h>
     37   1.1  kamil #include <sys/kernel.h>
     38   1.1  kamil 
     39   1.1  kamil #include <sys/conf.h>
     40   1.1  kamil #include <sys/condvar.h>
     41   1.4  kamil #include <sys/file.h>
     42   1.4  kamil #include <sys/filedesc.h>
     43   1.1  kamil #include <sys/kmem.h>
     44   1.4  kamil #include <sys/mman.h>
     45   1.1  kamil #include <sys/mutex.h>
     46   1.1  kamil #include <sys/queue.h>
     47   1.1  kamil 
     48   1.1  kamil #include <uvm/uvm_extern.h>
     49   1.1  kamil #include <sys/kcov.h>
     50   1.1  kamil 
     51   1.1  kamil #define KCOV_BUF_MAX_ENTRIES	(256 << 10)
     52   1.1  kamil 
     53   1.5  kamil #define KCOV_CMP_CONST		1
     54   1.5  kamil #define KCOV_CMP_SIZE(x)	((x) << 1)
     55   1.5  kamil 
     56   1.4  kamil static dev_type_open(kcov_open);
     57   1.4  kamil 
     58   1.4  kamil const struct cdevsw kcov_cdevsw = {
     59   1.4  kamil 	.d_open = kcov_open,
     60   1.4  kamil 	.d_close = noclose,
     61   1.4  kamil 	.d_read = noread,
     62   1.4  kamil 	.d_write = nowrite,
     63   1.4  kamil 	.d_ioctl = noioctl,
     64   1.4  kamil 	.d_stop = nostop,
     65   1.4  kamil 	.d_tty = notty,
     66   1.4  kamil 	.d_poll = nopoll,
     67   1.4  kamil 	.d_mmap = nommap,
     68   1.4  kamil 	.d_kqfilter = nokqfilter,
     69   1.4  kamil 	.d_discard = nodiscard,
     70   1.4  kamil 	.d_flag = D_OTHER | D_MPSAFE
     71   1.4  kamil };
     72   1.4  kamil 
     73   1.4  kamil static int kcov_fops_ioctl(file_t *, u_long, void *);
     74   1.4  kamil static int kcov_fops_close(file_t *);
     75   1.4  kamil static int kcov_fops_mmap(file_t *, off_t *, size_t, int, int *, int *,
     76   1.4  kamil     struct uvm_object **, int *);
     77   1.4  kamil 
     78   1.4  kamil const struct fileops kcov_fileops = {
     79   1.4  kamil 	.fo_read = fbadop_read,
     80   1.4  kamil 	.fo_write = fbadop_write,
     81   1.4  kamil 	.fo_ioctl = kcov_fops_ioctl,
     82   1.4  kamil 	.fo_fcntl = fnullop_fcntl,
     83   1.4  kamil 	.fo_poll = fnullop_poll,
     84   1.4  kamil 	.fo_stat = fbadop_stat,
     85   1.4  kamil 	.fo_close = kcov_fops_close,
     86   1.4  kamil 	.fo_kqfilter = fnullop_kqfilter,
     87   1.4  kamil 	.fo_restart = fnullop_restart,
     88   1.4  kamil 	.fo_mmap = kcov_fops_mmap,
     89   1.4  kamil };
     90   1.4  kamil 
     91   1.1  kamil /*
     92   1.4  kamil  * The KCOV descriptors (KD) are allocated during open(), and are associated
     93   1.4  kamil  * with a file descriptor.
     94   1.4  kamil  *
     95   1.4  kamil  * An LWP can 'enable' a KD. When this happens, this LWP becomes the owner of
     96   1.4  kamil  * the KD, and no LWP can 'disable' this KD except the owner.
     97   1.1  kamil  *
     98   1.4  kamil  * A KD is freed when its file descriptor is closed _iff_ the KD is not active
     99   1.4  kamil  * on an LWP. If it is, we ask the LWP to free it when it exits.
    100   1.4  kamil  *
    101   1.4  kamil  * The buffers mmapped are in a dedicated uobj, therefore there is no risk
    102   1.4  kamil  * that the kernel frees a buffer still mmapped in a process: the uobj
    103   1.4  kamil  * refcount will be non-zero, so the backing is not freed until an munmap
    104   1.4  kamil  * occurs on said process.
    105   1.1  kamil  */
    106   1.1  kamil 
    107   1.1  kamil typedef struct kcov_desc {
    108   1.1  kamil 	kmutex_t lock;
    109   1.1  kamil 	kcov_int_t *buf;
    110   1.4  kamil 	struct uvm_object *uobj;
    111   1.1  kamil 	size_t bufnent;
    112   1.1  kamil 	size_t bufsize;
    113   1.5  kamil 	int mode;
    114   1.4  kamil 	bool enabled;
    115   1.4  kamil 	bool lwpfree;
    116   1.1  kamil } kcov_t;
    117   1.1  kamil 
    118   1.1  kamil static void
    119   1.1  kamil kcov_lock(kcov_t *kd)
    120   1.1  kamil {
    121   1.1  kamil 
    122   1.1  kamil 	mutex_enter(&kd->lock);
    123   1.1  kamil }
    124   1.1  kamil 
    125   1.1  kamil static void
    126   1.1  kamil kcov_unlock(kcov_t *kd)
    127   1.1  kamil {
    128   1.1  kamil 
    129   1.1  kamil 	mutex_exit(&kd->lock);
    130   1.1  kamil }
    131   1.1  kamil 
    132   1.1  kamil static void
    133   1.4  kamil kcov_free(kcov_t *kd)
    134   1.1  kamil {
    135   1.1  kamil 
    136   1.4  kamil 	KASSERT(kd != NULL);
    137   1.4  kamil 	if (kd->buf != NULL) {
    138   1.4  kamil 		uvm_deallocate(kernel_map, (vaddr_t)kd->buf, kd->bufsize);
    139   1.4  kamil 	}
    140   1.4  kamil 	mutex_destroy(&kd->lock);
    141   1.4  kamil 	kmem_free(kd, sizeof(*kd));
    142   1.1  kamil }
    143   1.1  kamil 
    144  1.12   maxv void
    145  1.12   maxv kcov_lwp_free(struct lwp *l)
    146   1.1  kamil {
    147  1.12   maxv 	kcov_t *kd = (kcov_t *)l->l_kcov;
    148   1.1  kamil 
    149   1.1  kamil 	if (kd == NULL) {
    150   1.1  kamil 		return;
    151   1.1  kamil 	}
    152   1.1  kamil 	kcov_lock(kd);
    153   1.4  kamil 	kd->enabled = false;
    154   1.1  kamil 	kcov_unlock(kd);
    155   1.4  kamil 	if (kd->lwpfree) {
    156   1.4  kamil 		kcov_free(kd);
    157   1.1  kamil 	}
    158   1.1  kamil }
    159   1.1  kamil 
    160   1.1  kamil static int
    161   1.1  kamil kcov_allocbuf(kcov_t *kd, uint64_t nent)
    162   1.1  kamil {
    163   1.1  kamil 	size_t size;
    164   1.4  kamil 	int error;
    165   1.1  kamil 
    166   1.1  kamil 	if (nent < 2 || nent > KCOV_BUF_MAX_ENTRIES)
    167   1.1  kamil 		return EINVAL;
    168   1.1  kamil 	if (kd->buf != NULL)
    169   1.1  kamil 		return EEXIST;
    170   1.1  kamil 
    171   1.1  kamil 	size = roundup(nent * KCOV_ENTRY_SIZE, PAGE_SIZE);
    172   1.1  kamil 	kd->bufnent = nent - 1;
    173   1.1  kamil 	kd->bufsize = size;
    174   1.4  kamil 	kd->uobj = uao_create(kd->bufsize, 0);
    175   1.4  kamil 
    176   1.4  kamil 	/* Map the uobj into the kernel address space, as wired. */
    177   1.4  kamil 	kd->buf = NULL;
    178   1.4  kamil 	error = uvm_map(kernel_map, (vaddr_t *)&kd->buf, kd->bufsize, kd->uobj,
    179   1.4  kamil 	    0, 0, UVM_MAPFLAG(UVM_PROT_RW, UVM_PROT_RW, UVM_INH_SHARE,
    180   1.4  kamil 	    UVM_ADV_RANDOM, 0));
    181   1.4  kamil 	if (error) {
    182   1.4  kamil 		uao_detach(kd->uobj);
    183   1.4  kamil 		return error;
    184   1.4  kamil 	}
    185   1.4  kamil 	error = uvm_map_pageable(kernel_map, (vaddr_t)kd->buf,
    186   1.4  kamil 	    (vaddr_t)kd->buf + size, false, 0);
    187   1.4  kamil 	if (error) {
    188   1.4  kamil 		uvm_deallocate(kernel_map, (vaddr_t)kd->buf, size);
    189   1.4  kamil 		return error;
    190   1.4  kamil 	}
    191   1.1  kamil 
    192   1.1  kamil 	return 0;
    193   1.1  kamil }
    194   1.1  kamil 
    195   1.1  kamil /* -------------------------------------------------------------------------- */
    196   1.1  kamil 
    197   1.1  kamil static int
    198   1.1  kamil kcov_open(dev_t dev, int flag, int mode, struct lwp *l)
    199   1.1  kamil {
    200   1.4  kamil 	struct file *fp;
    201   1.4  kamil 	int error, fd;
    202   1.1  kamil 	kcov_t *kd;
    203   1.1  kamil 
    204   1.4  kamil 	error = fd_allocfile(&fp, &fd);
    205   1.4  kamil 	if (error)
    206   1.4  kamil 		return error;
    207   1.1  kamil 
    208   1.1  kamil 	kd = kmem_zalloc(sizeof(*kd), KM_SLEEP);
    209   1.1  kamil 	mutex_init(&kd->lock, MUTEX_DEFAULT, IPL_NONE);
    210   1.1  kamil 
    211   1.4  kamil 	return fd_clone(fp, fd, flag, &kcov_fileops, kd);
    212   1.1  kamil }
    213   1.1  kamil 
    214   1.1  kamil static int
    215   1.4  kamil kcov_fops_close(file_t *fp)
    216   1.1  kamil {
    217   1.4  kamil 	kcov_t *kd = fp->f_data;
    218   1.4  kamil 
    219   1.4  kamil 	kcov_lock(kd);
    220   1.4  kamil 	if (kd->enabled) {
    221   1.4  kamil 		kd->lwpfree = true;
    222   1.4  kamil 		kcov_unlock(kd);
    223   1.4  kamil 	} else {
    224   1.4  kamil 		kcov_unlock(kd);
    225   1.4  kamil 		kcov_free(kd);
    226   1.4  kamil 	}
    227   1.4  kamil 	fp->f_data = NULL;
    228   1.1  kamil 
    229   1.1  kamil    	return 0;
    230   1.1  kamil }
    231   1.1  kamil 
    232   1.1  kamil static int
    233   1.4  kamil kcov_fops_ioctl(file_t *fp, u_long cmd, void *addr)
    234   1.1  kamil {
    235  1.12   maxv 	struct lwp *l = curlwp;
    236   1.1  kamil 	int error = 0;
    237   1.5  kamil 	int mode;
    238   1.1  kamil 	kcov_t *kd;
    239   1.1  kamil 
    240   1.4  kamil 	kd = fp->f_data;
    241   1.1  kamil 	if (kd == NULL)
    242   1.1  kamil 		return ENXIO;
    243   1.1  kamil 	kcov_lock(kd);
    244   1.1  kamil 
    245   1.1  kamil 	switch (cmd) {
    246   1.1  kamil 	case KCOV_IOC_SETBUFSIZE:
    247   1.4  kamil 		if (kd->enabled) {
    248   1.1  kamil 			error = EBUSY;
    249   1.1  kamil 			break;
    250   1.1  kamil 		}
    251   1.1  kamil 		error = kcov_allocbuf(kd, *((uint64_t *)addr));
    252   1.1  kamil 		break;
    253   1.1  kamil 	case KCOV_IOC_ENABLE:
    254   1.4  kamil 		if (kd->enabled) {
    255   1.4  kamil 			error = EBUSY;
    256   1.4  kamil 			break;
    257   1.4  kamil 		}
    258  1.12   maxv 		if (l->l_kcov != NULL) {
    259   1.1  kamil 			error = EBUSY;
    260   1.1  kamil 			break;
    261   1.1  kamil 		}
    262   1.1  kamil 		if (kd->buf == NULL) {
    263   1.1  kamil 			error = ENOBUFS;
    264   1.1  kamil 			break;
    265   1.1  kamil 		}
    266   1.5  kamil 
    267   1.5  kamil 		mode = *((int *)addr);
    268   1.5  kamil 		switch (mode) {
    269   1.5  kamil 		case KCOV_MODE_NONE:
    270   1.5  kamil 		case KCOV_MODE_TRACE_PC:
    271   1.5  kamil 		case KCOV_MODE_TRACE_CMP:
    272   1.5  kamil 			kd->mode = mode;
    273   1.5  kamil 			break;
    274   1.5  kamil 		default:
    275   1.5  kamil 			error = EINVAL;
    276   1.5  kamil 		}
    277   1.5  kamil 		if (error)
    278   1.5  kamil 			break;
    279   1.5  kamil 
    280  1.12   maxv 		l->l_kcov = kd;
    281   1.4  kamil 		kd->enabled = true;
    282   1.1  kamil 		break;
    283   1.1  kamil 	case KCOV_IOC_DISABLE:
    284   1.4  kamil 		if (!kd->enabled) {
    285   1.1  kamil 			error = ENOENT;
    286   1.1  kamil 			break;
    287   1.1  kamil 		}
    288  1.12   maxv 		if (l->l_kcov != kd) {
    289   1.4  kamil 			error = ENOENT;
    290   1.4  kamil 			break;
    291   1.4  kamil 		}
    292  1.12   maxv 		l->l_kcov = NULL;
    293   1.4  kamil 		kd->enabled = false;
    294   1.1  kamil 		break;
    295   1.1  kamil 	default:
    296   1.1  kamil 		error = EINVAL;
    297   1.1  kamil 	}
    298   1.1  kamil 
    299   1.1  kamil 	kcov_unlock(kd);
    300   1.1  kamil 	return error;
    301   1.1  kamil }
    302   1.1  kamil 
    303   1.4  kamil static int
    304   1.4  kamil kcov_fops_mmap(file_t *fp, off_t *offp, size_t size, int prot, int *flagsp,
    305   1.4  kamil     int *advicep, struct uvm_object **uobjp, int *maxprotp)
    306   1.1  kamil {
    307   1.4  kamil 	off_t off = *offp;
    308   1.1  kamil 	kcov_t *kd;
    309   1.4  kamil 	int error = 0;
    310   1.4  kamil 
    311   1.4  kamil 	if (prot & PROT_EXEC)
    312   1.4  kamil 		return EACCES;
    313   1.4  kamil 	if (off < 0)
    314   1.4  kamil 		return EINVAL;
    315   1.4  kamil 	if (size > KCOV_BUF_MAX_ENTRIES * KCOV_ENTRY_SIZE)
    316   1.4  kamil 		return EINVAL;
    317   1.4  kamil 	if (off > KCOV_BUF_MAX_ENTRIES * KCOV_ENTRY_SIZE)
    318   1.4  kamil 		return EINVAL;
    319   1.1  kamil 
    320   1.4  kamil 	kd = fp->f_data;
    321   1.4  kamil 	if (kd == NULL)
    322   1.4  kamil 		return ENXIO;
    323   1.4  kamil 	kcov_lock(kd);
    324   1.1  kamil 
    325   1.4  kamil 	if ((size + off) > kd->bufsize) {
    326   1.4  kamil 		error = ENOMEM;
    327   1.4  kamil 		goto out;
    328   1.1  kamil 	}
    329   1.1  kamil 
    330   1.4  kamil 	uao_reference(kd->uobj);
    331   1.4  kamil 
    332   1.4  kamil 	*uobjp = kd->uobj;
    333   1.4  kamil 	*maxprotp = prot;
    334   1.4  kamil 	*advicep = UVM_ADV_RANDOM;
    335   1.4  kamil 
    336   1.4  kamil out:
    337   1.4  kamil 	kcov_unlock(kd);
    338   1.4  kamil 	return error;
    339   1.1  kamil }
    340   1.1  kamil 
    341  1.12   maxv /* -------------------------------------------------------------------------- */
    342  1.12   maxv 
    343  1.12   maxv /*
    344  1.12   maxv  * Constraints on the functions here: they must be marked with __nomsan, and
    345  1.12   maxv  * must not make any external call.
    346  1.12   maxv  */
    347  1.12   maxv 
    348   1.9   maxv static inline bool __nomsan
    349   1.1  kamil in_interrupt(void)
    350   1.1  kamil {
    351  1.11  kamil 	return curcpu()->ci_idepth >= 0;
    352   1.1  kamil }
    353   1.1  kamil 
    354   1.1  kamil void __sanitizer_cov_trace_pc(void);
    355   1.1  kamil 
    356   1.9   maxv void __nomsan
    357   1.1  kamil __sanitizer_cov_trace_pc(void)
    358   1.1  kamil {
    359   1.1  kamil 	extern int cold;
    360   1.1  kamil 	uint64_t idx;
    361   1.1  kamil 	kcov_t *kd;
    362   1.1  kamil 
    363   1.1  kamil 	if (__predict_false(cold)) {
    364   1.1  kamil 		/* Do not trace during boot. */
    365   1.1  kamil 		return;
    366   1.1  kamil 	}
    367   1.1  kamil 
    368   1.1  kamil 	if (in_interrupt()) {
    369   1.1  kamil 		/* Do not trace in interrupts. */
    370   1.1  kamil 		return;
    371   1.1  kamil 	}
    372   1.1  kamil 
    373  1.12   maxv 	kd = curlwp->l_kcov;
    374   1.1  kamil 	if (__predict_true(kd == NULL)) {
    375   1.1  kamil 		/* Not traced. */
    376   1.1  kamil 		return;
    377   1.1  kamil 	}
    378   1.1  kamil 
    379   1.4  kamil 	if (!kd->enabled) {
    380   1.4  kamil 		/* Tracing not enabled */
    381   1.4  kamil 		return;
    382   1.4  kamil 	}
    383   1.4  kamil 
    384   1.5  kamil 	if (kd->mode != KCOV_MODE_TRACE_PC) {
    385   1.5  kamil 		/* PC tracing mode not enabled */
    386   1.5  kamil 		return;
    387   1.5  kamil 	}
    388   1.5  kamil 
    389   1.8  kamil 	idx = kd->buf[0];
    390   1.1  kamil 	if (idx < kd->bufnent) {
    391   1.8  kamil 		kd->buf[idx+1] =
    392   1.8  kamil 		    (intptr_t)__builtin_return_address(0);
    393   1.8  kamil 		kd->buf[0] = idx + 1;
    394   1.1  kamil 	}
    395   1.1  kamil }
    396   1.1  kamil 
    397   1.9   maxv static void __nomsan
    398   1.5  kamil trace_cmp(uint64_t type, uint64_t arg1, uint64_t arg2, intptr_t pc)
    399   1.5  kamil {
    400   1.5  kamil 	extern int cold;
    401   1.5  kamil 	uint64_t idx;
    402   1.5  kamil 	kcov_t *kd;
    403   1.5  kamil 
    404   1.5  kamil 	if (__predict_false(cold)) {
    405   1.5  kamil 		/* Do not trace during boot. */
    406   1.5  kamil 		return;
    407   1.5  kamil 	}
    408   1.5  kamil 
    409   1.5  kamil 	if (in_interrupt()) {
    410   1.5  kamil 		/* Do not trace in interrupts. */
    411   1.5  kamil 		return;
    412   1.5  kamil 	}
    413   1.5  kamil 
    414  1.12   maxv 	kd = curlwp->l_kcov;
    415   1.5  kamil 	if (__predict_true(kd == NULL)) {
    416   1.5  kamil 		/* Not traced. */
    417   1.5  kamil 		return;
    418   1.5  kamil 	}
    419   1.5  kamil 
    420   1.5  kamil 	if (!kd->enabled) {
    421   1.5  kamil 		/* Tracing not enabled */
    422   1.5  kamil 		return;
    423   1.5  kamil 	}
    424   1.5  kamil 
    425   1.5  kamil 	if (kd->mode != KCOV_MODE_TRACE_CMP) {
    426   1.6  kamil 		/* CMP tracing mode not enabled */
    427   1.5  kamil 		return;
    428   1.5  kamil 	}
    429   1.5  kamil 
    430   1.8  kamil 	idx = kd->buf[0];
    431   1.5  kamil 	if ((idx * 4 + 4) <= kd->bufnent) {
    432   1.8  kamil 		kd->buf[idx * 4 + 1] = type;
    433   1.8  kamil 		kd->buf[idx * 4 + 2] = arg1;
    434   1.8  kamil 		kd->buf[idx * 4 + 3] = arg2;
    435   1.8  kamil 		kd->buf[idx * 4 + 4] = pc;
    436   1.8  kamil 		kd->buf[0] = idx + 1;
    437   1.5  kamil 	}
    438   1.5  kamil }
    439   1.5  kamil 
    440   1.5  kamil void __sanitizer_cov_trace_cmp1(uint8_t arg1, uint8_t arg2);
    441   1.5  kamil 
    442   1.9   maxv void __nomsan
    443   1.5  kamil __sanitizer_cov_trace_cmp1(uint8_t arg1, uint8_t arg2)
    444   1.5  kamil {
    445   1.5  kamil 
    446   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(0), arg1, arg2,
    447   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    448   1.5  kamil }
    449   1.5  kamil 
    450   1.5  kamil void __sanitizer_cov_trace_cmp2(uint16_t arg1, uint16_t arg2);
    451   1.5  kamil 
    452   1.9   maxv void __nomsan
    453   1.5  kamil __sanitizer_cov_trace_cmp2(uint16_t arg1, uint16_t arg2)
    454   1.5  kamil {
    455   1.5  kamil 
    456   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(1), arg1, arg2,
    457   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    458   1.5  kamil }
    459   1.5  kamil 
    460   1.5  kamil void __sanitizer_cov_trace_cmp4(uint32_t arg1, uint32_t arg2);
    461   1.5  kamil 
    462   1.9   maxv void __nomsan
    463   1.5  kamil __sanitizer_cov_trace_cmp4(uint32_t arg1, uint32_t arg2)
    464   1.5  kamil {
    465   1.5  kamil 
    466   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(2), arg1, arg2,
    467   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    468   1.5  kamil }
    469   1.5  kamil 
    470   1.5  kamil void __sanitizer_cov_trace_cmp8(uint64_t arg1, uint64_t arg2);
    471   1.5  kamil 
    472   1.9   maxv void __nomsan
    473   1.5  kamil __sanitizer_cov_trace_cmp8(uint64_t arg1, uint64_t arg2)
    474   1.5  kamil {
    475   1.5  kamil 
    476   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(3), arg1, arg2,
    477   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    478   1.5  kamil }
    479   1.5  kamil 
    480   1.5  kamil void __sanitizer_cov_trace_const_cmp1(uint8_t arg1, uint8_t arg2);
    481   1.5  kamil 
    482   1.9   maxv void __nomsan
    483   1.5  kamil __sanitizer_cov_trace_const_cmp1(uint8_t arg1, uint8_t arg2)
    484   1.5  kamil {
    485   1.5  kamil 
    486   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(0) | KCOV_CMP_CONST, arg1, arg2,
    487   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    488   1.5  kamil }
    489   1.5  kamil 
    490   1.5  kamil void __sanitizer_cov_trace_const_cmp2(uint16_t arg1, uint16_t arg2);
    491   1.5  kamil 
    492   1.9   maxv void __nomsan
    493   1.5  kamil __sanitizer_cov_trace_const_cmp2(uint16_t arg1, uint16_t arg2)
    494   1.5  kamil {
    495   1.5  kamil 
    496   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(1) | KCOV_CMP_CONST, arg1, arg2,
    497   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    498   1.5  kamil }
    499   1.5  kamil 
    500   1.5  kamil void __sanitizer_cov_trace_const_cmp4(uint32_t arg1, uint32_t arg2);
    501   1.5  kamil 
    502   1.9   maxv void __nomsan
    503   1.5  kamil __sanitizer_cov_trace_const_cmp4(uint32_t arg1, uint32_t arg2)
    504   1.5  kamil {
    505   1.5  kamil 
    506   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(2) | KCOV_CMP_CONST, arg1, arg2,
    507   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    508   1.5  kamil }
    509   1.5  kamil 
    510   1.5  kamil void __sanitizer_cov_trace_const_cmp8(uint64_t arg1, uint64_t arg2);
    511   1.5  kamil 
    512   1.9   maxv void __nomsan
    513   1.5  kamil __sanitizer_cov_trace_const_cmp8(uint64_t arg1, uint64_t arg2)
    514   1.5  kamil {
    515   1.5  kamil 
    516   1.5  kamil 	trace_cmp(KCOV_CMP_SIZE(3) | KCOV_CMP_CONST, arg1, arg2,
    517   1.5  kamil 	    (intptr_t)__builtin_return_address(0));
    518   1.5  kamil }
    519   1.5  kamil 
    520   1.5  kamil void __sanitizer_cov_trace_switch(uint64_t val, uint64_t *cases);
    521   1.5  kamil 
    522   1.9   maxv void __nomsan
    523   1.5  kamil __sanitizer_cov_trace_switch(uint64_t val, uint64_t *cases)
    524   1.5  kamil {
    525   1.5  kamil 	uint64_t i, nbits, ncases, type;
    526   1.5  kamil 	intptr_t pc;
    527   1.5  kamil 
    528   1.5  kamil 	pc = (intptr_t)__builtin_return_address(0);
    529   1.5  kamil 	ncases = cases[0];
    530   1.5  kamil 	nbits = cases[1];
    531   1.5  kamil 
    532   1.5  kamil 	switch (nbits) {
    533   1.5  kamil 	case 8:
    534   1.5  kamil 		type = KCOV_CMP_SIZE(0);
    535   1.5  kamil 		break;
    536   1.5  kamil 	case 16:
    537   1.5  kamil 		type = KCOV_CMP_SIZE(1);
    538   1.5  kamil 		break;
    539   1.5  kamil 	case 32:
    540   1.5  kamil 		type = KCOV_CMP_SIZE(2);
    541   1.5  kamil 		break;
    542   1.5  kamil 	case 64:
    543   1.5  kamil 		type = KCOV_CMP_SIZE(3);
    544   1.5  kamil 		break;
    545   1.5  kamil 	default:
    546   1.5  kamil 		return;
    547   1.5  kamil 	}
    548   1.5  kamil 	type |= KCOV_CMP_CONST;
    549   1.5  kamil 
    550   1.5  kamil 	for (i = 0; i < ncases; i++)
    551   1.5  kamil 		trace_cmp(type, cases[i + 2], val, pc);
    552   1.5  kamil }
    553   1.5  kamil 
    554   1.1  kamil /* -------------------------------------------------------------------------- */
    555   1.1  kamil 
    556   1.7  kamil MODULE(MODULE_CLASS_MISC, kcov, NULL);
    557   1.1  kamil 
    558   1.1  kamil static int
    559   1.1  kamil kcov_modcmd(modcmd_t cmd, void *arg)
    560   1.1  kamil {
    561   1.1  kamil 
    562   1.1  kamil    	switch (cmd) {
    563   1.1  kamil 	case MODULE_CMD_INIT:
    564   1.1  kamil 		return 0;
    565   1.1  kamil 	case MODULE_CMD_FINI:
    566   1.1  kamil 		return EINVAL;
    567   1.1  kamil 	default:
    568   1.1  kamil 		return ENOTTY;
    569   1.1  kamil 	}
    570   1.1  kamil }
    571