Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include <string.h>
3#include "perf_regs.h"
4#include "thread.h"
5#include "map.h"
6#include "maps.h"
7#include "event.h"
8#include "debug.h"
9#include "tests/tests.h"
10
11#define STACK_SIZE 8192
12
13static int sample_ustack(struct perf_sample *sample,
14 struct thread *thread, u64 *regs)
15{
16 struct stack_dump *stack = &sample->user_stack;
17 struct map *map;
18 unsigned long sp;
19 u64 stack_size, *buf;
20
21 buf = malloc(STACK_SIZE);
22 if (!buf) {
23 pr_debug("failed to allocate sample uregs data\n");
24 return -1;
25 }
26
27 sp = (unsigned long) regs[PERF_REG_X86_SP];
28
29 map = maps__find(thread->maps, (u64)sp);
30 if (!map) {
31 pr_debug("failed to get stack map\n");
32 free(buf);
33 return -1;
34 }
35
36 stack_size = map->end - sp;
37 stack_size = stack_size > STACK_SIZE ? STACK_SIZE : stack_size;
38
39 memcpy(buf, (void *) sp, stack_size);
40#ifdef MEMORY_SANITIZER
41 /*
42 * Copying the stack may copy msan poison, avoid false positives in the
43 * unwinder by removing the poison here.
44 */
45 __msan_unpoison(buf, stack_size);
46#endif
47 stack->data = (char *) buf;
48 stack->size = stack_size;
49 return 0;
50}
51
52int test__arch_unwind_sample(struct perf_sample *sample,
53 struct thread *thread)
54{
55 struct regs_dump *regs = &sample->user_regs;
56 u64 *buf;
57
58 buf = malloc(sizeof(u64) * PERF_REGS_MAX);
59 if (!buf) {
60 pr_debug("failed to allocate sample uregs data\n");
61 return -1;
62 }
63
64#ifdef MEMORY_SANITIZER
65 /*
66 * Assignments to buf in the assembly function perf_regs_load aren't
67 * seen by memory sanitizer. Zero the memory to convince memory
68 * sanitizer the memory is initialized.
69 */
70 memset(buf, 0, sizeof(u64) * PERF_REGS_MAX);
71#endif
72 perf_regs_load(buf);
73 regs->abi = PERF_SAMPLE_REGS_ABI;
74 regs->regs = buf;
75 regs->mask = PERF_REGS_MASK;
76
77 return sample_ustack(sample, thread, buf);
78}
1// SPDX-License-Identifier: GPL-2.0
2#include <string.h>
3#include "perf_regs.h"
4#include "thread.h"
5#include "map.h"
6#include "maps.h"
7#include "event.h"
8#include "debug.h"
9#include "tests/tests.h"
10#include "arch-tests.h"
11
12#define STACK_SIZE 8192
13
14static int sample_ustack(struct perf_sample *sample,
15 struct thread *thread, u64 *regs)
16{
17 struct stack_dump *stack = &sample->user_stack;
18 struct map *map;
19 unsigned long sp;
20 u64 stack_size, *buf;
21
22 buf = malloc(STACK_SIZE);
23 if (!buf) {
24 pr_debug("failed to allocate sample uregs data\n");
25 return -1;
26 }
27
28 sp = (unsigned long) regs[PERF_REG_X86_SP];
29
30 map = maps__find(thread->maps, (u64)sp);
31 if (!map) {
32 pr_debug("failed to get stack map\n");
33 free(buf);
34 return -1;
35 }
36
37 stack_size = map->end - sp;
38 stack_size = stack_size > STACK_SIZE ? STACK_SIZE : stack_size;
39
40 memcpy(buf, (void *) sp, stack_size);
41 stack->data = (char *) buf;
42 stack->size = stack_size;
43 return 0;
44}
45
46int test__arch_unwind_sample(struct perf_sample *sample,
47 struct thread *thread)
48{
49 struct regs_dump *regs = &sample->user_regs;
50 u64 *buf;
51
52 buf = malloc(sizeof(u64) * PERF_REGS_MAX);
53 if (!buf) {
54 pr_debug("failed to allocate sample uregs data\n");
55 return -1;
56 }
57
58#ifdef MEMORY_SANITIZER
59 /*
60 * Assignments to buf in the assembly function perf_regs_load aren't
61 * seen by memory sanitizer. Zero the memory to convince memory
62 * sanitizer the memory is initialized.
63 */
64 memset(buf, 0, sizeof(u64) * PERF_REGS_MAX);
65#endif
66 perf_regs_load(buf);
67 regs->abi = PERF_SAMPLE_REGS_ABI;
68 regs->regs = buf;
69 regs->mask = PERF_REGS_MASK;
70
71 return sample_ustack(sample, thread, buf);
72}