xref: /freebsd/sys/kern/subr_msan.c (revision ca6cd604c8fcfc27c6468c620a7bee518ca02cde)
1a422084aSMark Johnston /*	$NetBSD: subr_msan.c,v 1.14 2020/09/09 16:29:59 maxv Exp $	*/
2a422084aSMark Johnston 
3a422084aSMark Johnston /*
4a422084aSMark Johnston  * Copyright (c) 2019-2020 Maxime Villard, m00nbsd.net
5a422084aSMark Johnston  * All rights reserved.
6a422084aSMark Johnston  * Copyright (c) 2021 The FreeBSD Foundation
7a422084aSMark Johnston  *
8a422084aSMark Johnston  * Portions of this software were developed by Mark Johnston under sponsorship
9a422084aSMark Johnston  * from the FreeBSD Foundation.
10a422084aSMark Johnston  *
11a422084aSMark Johnston  * This code is part of the KMSAN subsystem of the NetBSD kernel.
12a422084aSMark Johnston  *
13a422084aSMark Johnston  * Redistribution and use in source and binary forms, with or without
14a422084aSMark Johnston  * modification, are permitted provided that the following conditions
15a422084aSMark Johnston  * are met:
16a422084aSMark Johnston  * 1. Redistributions of source code must retain the above copyright
17a422084aSMark Johnston  *    notice, this list of conditions and the following disclaimer.
18a422084aSMark Johnston  * 2. Redistributions in binary form must reproduce the above copyright
19a422084aSMark Johnston  *    notice, this list of conditions and the following disclaimer in the
20a422084aSMark Johnston  *    documentation and/or other materials provided with the distribution.
21a422084aSMark Johnston  *
22a422084aSMark Johnston  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23a422084aSMark Johnston  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24a422084aSMark Johnston  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25a422084aSMark Johnston  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26a422084aSMark Johnston  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
27a422084aSMark Johnston  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
28a422084aSMark Johnston  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
29a422084aSMark Johnston  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
30a422084aSMark Johnston  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31a422084aSMark Johnston  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32a422084aSMark Johnston  * SUCH DAMAGE.
33a422084aSMark Johnston  */
34a422084aSMark Johnston 
35a422084aSMark Johnston #define	SAN_RUNTIME
36a422084aSMark Johnston 
37a422084aSMark Johnston #include <sys/cdefs.h>
38a422084aSMark Johnston __FBSDID("$FreeBSD$");
39a422084aSMark Johnston #if 0
40a422084aSMark Johnston __KERNEL_RCSID(0, "$NetBSD: subr_msan.c,v 1.14 2020/09/09 16:29:59 maxv Exp $");
41a422084aSMark Johnston #endif
42a422084aSMark Johnston 
43a422084aSMark Johnston #include <sys/param.h>
44a422084aSMark Johnston #include <sys/systm.h>
45a422084aSMark Johnston #include <sys/bio.h>
46a422084aSMark Johnston #include <sys/buf.h>
47a422084aSMark Johnston #include <sys/conf.h>
48a422084aSMark Johnston #include <sys/kdb.h>
49a422084aSMark Johnston #include <sys/kernel.h>
50a422084aSMark Johnston #include <sys/linker.h>
51a422084aSMark Johnston #include <sys/malloc.h>
52a422084aSMark Johnston #include <sys/mbuf.h>
53a422084aSMark Johnston #include <sys/memdesc.h>
54a422084aSMark Johnston #include <sys/msan.h>
55a422084aSMark Johnston #include <sys/proc.h>
56a422084aSMark Johnston #include <sys/stack.h>
57a422084aSMark Johnston #include <sys/sysctl.h>
58a422084aSMark Johnston #include <sys/uio.h>
59a422084aSMark Johnston 
60a422084aSMark Johnston #include <vm/vm.h>
61a422084aSMark Johnston #include <vm/pmap.h>
62a422084aSMark Johnston 
63a422084aSMark Johnston #include <machine/msan.h>
64a422084aSMark Johnston #include <machine/stdarg.h>
65a422084aSMark Johnston 
66a422084aSMark Johnston void kmsan_init_arg(size_t);
67a422084aSMark Johnston void kmsan_init_ret(size_t);
68a422084aSMark Johnston 
69a422084aSMark Johnston /* -------------------------------------------------------------------------- */
70a422084aSMark Johnston 
71a422084aSMark Johnston /*
72a422084aSMark Johnston  * Part of the compiler ABI.
73a422084aSMark Johnston  */
74a422084aSMark Johnston 
75a422084aSMark Johnston typedef struct {
76a422084aSMark Johnston 	uint8_t *shad;
77a422084aSMark Johnston 	msan_orig_t *orig;
78a422084aSMark Johnston } msan_meta_t;
79a422084aSMark Johnston 
80a422084aSMark Johnston #define MSAN_PARAM_SIZE		800
81a422084aSMark Johnston #define MSAN_RETVAL_SIZE	800
82a422084aSMark Johnston typedef struct {
83a422084aSMark Johnston 	uint8_t param_shadow[MSAN_PARAM_SIZE];
84a422084aSMark Johnston 	uint8_t retval_shadow[MSAN_RETVAL_SIZE];
85a422084aSMark Johnston 	uint8_t va_arg_shadow[MSAN_PARAM_SIZE];
86a422084aSMark Johnston 	uint8_t va_arg_origin[MSAN_PARAM_SIZE];
87a422084aSMark Johnston 	uint64_t va_arg_overflow_size;
88a422084aSMark Johnston 	msan_orig_t param_origin[MSAN_PARAM_SIZE / sizeof(msan_orig_t)];
89a422084aSMark Johnston 	msan_orig_t retval_origin;
90a422084aSMark Johnston } msan_tls_t;
91a422084aSMark Johnston 
92a422084aSMark Johnston /* -------------------------------------------------------------------------- */
93a422084aSMark Johnston 
94a422084aSMark Johnston #define MSAN_NCONTEXT	4
95a422084aSMark Johnston #define MSAN_ORIG_MASK	(~0x3)
96a422084aSMark Johnston 
97a422084aSMark Johnston typedef struct kmsan_td {
98a422084aSMark Johnston 	size_t ctx;
99a422084aSMark Johnston 	msan_tls_t tls[MSAN_NCONTEXT];
100a422084aSMark Johnston } msan_td_t;
101a422084aSMark Johnston 
102a422084aSMark Johnston static msan_tls_t dummy_tls;
103a422084aSMark Johnston 
104a422084aSMark Johnston /*
105a422084aSMark Johnston  * Use separate dummy regions for loads and stores: stores may mark the region
106a422084aSMark Johnston  * as uninitialized, and that can trigger false positives.
107a422084aSMark Johnston  */
108a422084aSMark Johnston static uint8_t msan_dummy_shad[PAGE_SIZE] __aligned(PAGE_SIZE);
109a422084aSMark Johnston static uint8_t msan_dummy_write_shad[PAGE_SIZE] __aligned(PAGE_SIZE);
110a422084aSMark Johnston static uint8_t msan_dummy_orig[PAGE_SIZE] __aligned(PAGE_SIZE);
111a422084aSMark Johnston static msan_td_t msan_thread0;
112a422084aSMark Johnston static bool kmsan_enabled __read_mostly;
113a422084aSMark Johnston 
114a422084aSMark Johnston static bool kmsan_reporting = false;
115a422084aSMark Johnston 
116a422084aSMark Johnston /*
117a422084aSMark Johnston  * Avoid clobbering any thread-local state before we panic.
118a422084aSMark Johnston  */
119a422084aSMark Johnston #define	kmsan_panic(f, ...) do {			\
120a422084aSMark Johnston 	kmsan_enabled = false;				\
121a422084aSMark Johnston 	panic(f, __VA_ARGS__);				\
122a422084aSMark Johnston } while (0)
123a422084aSMark Johnston 
124a422084aSMark Johnston #define	REPORT(f, ...) do {				\
125a422084aSMark Johnston 	if (panic_on_violation) {			\
126a422084aSMark Johnston 		kmsan_panic(f, __VA_ARGS__);		\
127a422084aSMark Johnston 	} else {					\
128a422084aSMark Johnston 		struct stack st;			\
129a422084aSMark Johnston 							\
130a422084aSMark Johnston 		stack_save(&st);			\
131a422084aSMark Johnston 		printf(f "\n", __VA_ARGS__);		\
132a422084aSMark Johnston 		stack_print_ddb(&st);			\
133a422084aSMark Johnston 	}						\
134a422084aSMark Johnston } while (0)
135a422084aSMark Johnston 
136a422084aSMark Johnston FEATURE(kmsan, "Kernel memory sanitizer");
137a422084aSMark Johnston 
138a422084aSMark Johnston static SYSCTL_NODE(_debug, OID_AUTO, kmsan, CTLFLAG_RD | CTLFLAG_MPSAFE, 0,
139a422084aSMark Johnston     "KMSAN options");
140a422084aSMark Johnston 
141a422084aSMark Johnston static bool panic_on_violation = 1;
142a422084aSMark Johnston SYSCTL_BOOL(_debug_kmsan, OID_AUTO, panic_on_violation, CTLFLAG_RWTUN,
143a422084aSMark Johnston     &panic_on_violation, 0,
144a422084aSMark Johnston     "Panic if an invalid access is detected");
145a422084aSMark Johnston 
146a422084aSMark Johnston static MALLOC_DEFINE(M_KMSAN, "kmsan", "Kernel memory sanitizer");
147a422084aSMark Johnston 
148a422084aSMark Johnston /* -------------------------------------------------------------------------- */
149a422084aSMark Johnston 
150a422084aSMark Johnston static inline const char *
151a422084aSMark Johnston kmsan_orig_name(int type)
152a422084aSMark Johnston {
153a422084aSMark Johnston 	switch (type) {
154a422084aSMark Johnston 	case KMSAN_TYPE_STACK:
155a422084aSMark Johnston 		return ("stack");
156a422084aSMark Johnston 	case KMSAN_TYPE_KMEM:
157a422084aSMark Johnston 		return ("kmem");
158a422084aSMark Johnston 	case KMSAN_TYPE_MALLOC:
159a422084aSMark Johnston 		return ("malloc");
160a422084aSMark Johnston 	case KMSAN_TYPE_UMA:
161a422084aSMark Johnston 		return ("UMA");
162a422084aSMark Johnston 	default:
163a422084aSMark Johnston 		return ("unknown");
164a422084aSMark Johnston 	}
165a422084aSMark Johnston }
166a422084aSMark Johnston 
167a422084aSMark Johnston static void
168*ca6cd604SMark Johnston kmsan_report_hook(const void *addr, msan_orig_t *orig, size_t size, size_t off,
169*ca6cd604SMark Johnston     const char *hook)
170a422084aSMark Johnston {
171a422084aSMark Johnston 	const char *typename;
172a422084aSMark Johnston 	char *var, *fn;
173a422084aSMark Johnston 	uintptr_t ptr;
174a422084aSMark Johnston 	long foff;
175a422084aSMark Johnston 	char buf[128];
176a422084aSMark Johnston 	int type;
177a422084aSMark Johnston 
17835eb9b10SMitchell Horne 	if (__predict_false(KERNEL_PANICKED() || kdb_active || kmsan_reporting))
179a422084aSMark Johnston 		return;
180a422084aSMark Johnston 
181a422084aSMark Johnston 	kmsan_reporting = true;
182a422084aSMark Johnston 	__compiler_membar();
183a422084aSMark Johnston 
184a422084aSMark Johnston 	if (*orig == 0) {
185a422084aSMark Johnston 		REPORT("MSan: Uninitialized memory in %s, offset %zu",
186a422084aSMark Johnston 		    hook, off);
187a422084aSMark Johnston 		goto out;
188a422084aSMark Johnston 	}
189a422084aSMark Johnston 
190a422084aSMark Johnston 	kmsan_md_orig_decode(*orig, &type, &ptr);
191a422084aSMark Johnston 	typename = kmsan_orig_name(type);
192a422084aSMark Johnston 
193a422084aSMark Johnston 	if (linker_ddb_search_symbol_name((caddr_t)ptr, buf,
194a422084aSMark Johnston 	    sizeof(buf), &foff) == 0) {
195a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory in %s, "
196a422084aSMark Johnston 		    "offset %zu/%zu, addr %p, from %s+%#lx",
197a422084aSMark Johnston 		    typename, hook, off, size, addr, buf, foff);
198a422084aSMark Johnston 	} else if (__builtin_memcmp((void *)ptr, "----", 4) == 0) {
199a422084aSMark Johnston 		/*
200a422084aSMark Johnston 		 * The format of the string is: "----var@function". Parse it to
201a422084aSMark Johnston 		 * display a nice warning.
202a422084aSMark Johnston 		 */
203a422084aSMark Johnston 		var = (char *)ptr + 4;
204a422084aSMark Johnston 		strlcpy(buf, var, sizeof(buf));
205a422084aSMark Johnston 		var = buf;
206a422084aSMark Johnston 		fn = strchr(buf, '@');
207a422084aSMark Johnston 		*fn++ = '\0';
208a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory in %s, offset %zu, "
209a422084aSMark Johnston 		    "variable '%s' from %s", typename, hook, off, var, fn);
210a422084aSMark Johnston 	} else {
211a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory in %s, "
212a422084aSMark Johnston 		    "offset %zu/%zu, addr %p, PC %p",
213a422084aSMark Johnston 		    typename, hook, off, size, addr, (void *)ptr);
214a422084aSMark Johnston 	}
215a422084aSMark Johnston 
216a422084aSMark Johnston out:
217a422084aSMark Johnston 	__compiler_membar();
218a422084aSMark Johnston 	kmsan_reporting = false;
219a422084aSMark Johnston }
220a422084aSMark Johnston 
221a422084aSMark Johnston static void
222a422084aSMark Johnston kmsan_report_inline(msan_orig_t orig, unsigned long pc)
223a422084aSMark Johnston {
224a422084aSMark Johnston 	const char *typename;
225a422084aSMark Johnston 	char *var, *fn;
226a422084aSMark Johnston 	uintptr_t ptr;
227a422084aSMark Johnston 	char buf[128];
228a422084aSMark Johnston 	long foff;
229a422084aSMark Johnston 	int type;
230a422084aSMark Johnston 
23135eb9b10SMitchell Horne 	if (__predict_false(KERNEL_PANICKED() || kdb_active || kmsan_reporting))
232a422084aSMark Johnston 		return;
233a422084aSMark Johnston 
234a422084aSMark Johnston 	kmsan_reporting = true;
235a422084aSMark Johnston 	__compiler_membar();
236a422084aSMark Johnston 
237a422084aSMark Johnston 	if (orig == 0) {
238a422084aSMark Johnston 		REPORT("MSan: uninitialized variable in %p", (void *)pc);
239a422084aSMark Johnston 		goto out;
240a422084aSMark Johnston 	}
241a422084aSMark Johnston 
242a422084aSMark Johnston 	kmsan_md_orig_decode(orig, &type, &ptr);
243a422084aSMark Johnston 	typename = kmsan_orig_name(type);
244a422084aSMark Johnston 
245a422084aSMark Johnston 	if (linker_ddb_search_symbol_name((caddr_t)ptr, buf,
246a422084aSMark Johnston 	    sizeof(buf), &foff) == 0) {
247a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory from %s+%#lx",
248a422084aSMark Johnston 		    typename, buf, foff);
249a422084aSMark Johnston 	} else if (__builtin_memcmp((void *)ptr, "----", 4) == 0) {
250a422084aSMark Johnston 		/*
251a422084aSMark Johnston 		 * The format of the string is: "----var@function". Parse it to
252a422084aSMark Johnston 		 * display a nice warning.
253a422084aSMark Johnston 		 */
254a422084aSMark Johnston 		var = (char *)ptr + 4;
255a422084aSMark Johnston 		strlcpy(buf, var, sizeof(buf));
256a422084aSMark Johnston 		var = buf;
257a422084aSMark Johnston 		fn = strchr(buf, '@');
258a422084aSMark Johnston 		*fn++ = '\0';
259a422084aSMark Johnston 		REPORT("MSan: Uninitialized variable '%s' from %s", var, fn);
260a422084aSMark Johnston 	} else {
261a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory, origin %x",
262a422084aSMark Johnston 		    typename, orig);
263a422084aSMark Johnston 	}
264a422084aSMark Johnston 
265a422084aSMark Johnston out:
266a422084aSMark Johnston 	__compiler_membar();
267a422084aSMark Johnston 	kmsan_reporting = false;
268a422084aSMark Johnston }
269a422084aSMark Johnston 
270a422084aSMark Johnston /* -------------------------------------------------------------------------- */
271a422084aSMark Johnston 
272a422084aSMark Johnston static inline msan_meta_t
273a422084aSMark Johnston kmsan_meta_get(const void *addr, size_t size, const bool write)
274a422084aSMark Johnston {
275a422084aSMark Johnston 	msan_meta_t ret;
276a422084aSMark Johnston 
277a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled)) {
278a422084aSMark Johnston 		ret.shad = write ? msan_dummy_write_shad : msan_dummy_shad;
279a422084aSMark Johnston 		ret.orig = (msan_orig_t *)msan_dummy_orig;
280a422084aSMark Johnston 	} else if (__predict_false(kmsan_md_unsupported((vm_offset_t)addr))) {
281a422084aSMark Johnston 		ret.shad = write ? msan_dummy_write_shad : msan_dummy_shad;
282a422084aSMark Johnston 		ret.orig = (msan_orig_t *)msan_dummy_orig;
283a422084aSMark Johnston 	} else {
284a422084aSMark Johnston 		ret.shad = (void *)kmsan_md_addr_to_shad((vm_offset_t)addr);
285a422084aSMark Johnston 		ret.orig =
286a422084aSMark Johnston 		    (msan_orig_t *)kmsan_md_addr_to_orig((vm_offset_t)addr);
287a422084aSMark Johnston 		ret.orig = (msan_orig_t *)((uintptr_t)ret.orig &
288a422084aSMark Johnston 		    MSAN_ORIG_MASK);
289a422084aSMark Johnston 	}
290a422084aSMark Johnston 
291a422084aSMark Johnston 	return (ret);
292a422084aSMark Johnston }
293a422084aSMark Johnston 
294a422084aSMark Johnston static inline void
295a422084aSMark Johnston kmsan_origin_fill(const void *addr, msan_orig_t o, size_t size)
296a422084aSMark Johnston {
297a422084aSMark Johnston 	msan_orig_t *orig;
298a422084aSMark Johnston 	size_t i;
299a422084aSMark Johnston 
300a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
301a422084aSMark Johnston 		return;
302a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported((vm_offset_t)addr)))
303a422084aSMark Johnston 		return;
304a422084aSMark Johnston 
305a422084aSMark Johnston 	orig = (msan_orig_t *)kmsan_md_addr_to_orig((vm_offset_t)addr);
306a422084aSMark Johnston 	size += ((uintptr_t)orig & (sizeof(*orig) - 1));
307a422084aSMark Johnston 	orig = (msan_orig_t *)((uintptr_t)orig & MSAN_ORIG_MASK);
308a422084aSMark Johnston 
309a422084aSMark Johnston 	for (i = 0; i < size; i += 4) {
310a422084aSMark Johnston 		orig[i / 4] = o;
311a422084aSMark Johnston 	}
312a422084aSMark Johnston }
313a422084aSMark Johnston 
314a422084aSMark Johnston static inline void
315a422084aSMark Johnston kmsan_shadow_fill(uintptr_t addr, uint8_t c, size_t size)
316a422084aSMark Johnston {
317a422084aSMark Johnston 	uint8_t *shad;
318a422084aSMark Johnston 
319a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
320a422084aSMark Johnston 		return;
321a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported(addr)))
322a422084aSMark Johnston 		return;
323a422084aSMark Johnston 
324a422084aSMark Johnston 	shad = (uint8_t *)kmsan_md_addr_to_shad(addr);
325a422084aSMark Johnston 	__builtin_memset(shad, c, size);
326a422084aSMark Johnston }
327a422084aSMark Johnston 
328a422084aSMark Johnston static inline void
329a422084aSMark Johnston kmsan_meta_copy(void *dst, const void *src, size_t size)
330a422084aSMark Johnston {
331a422084aSMark Johnston 	uint8_t *orig_src, *orig_dst;
332a422084aSMark Johnston 	uint8_t *shad_src, *shad_dst;
333a422084aSMark Johnston 	msan_orig_t *_src, *_dst;
334a422084aSMark Johnston 	size_t i;
335a422084aSMark Johnston 
336a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
337a422084aSMark Johnston 		return;
338a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported((vm_offset_t)dst)))
339a422084aSMark Johnston 		return;
340a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported((vm_offset_t)src))) {
341a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)dst, KMSAN_STATE_INITED, size);
342a422084aSMark Johnston 		return;
343a422084aSMark Johnston 	}
344a422084aSMark Johnston 
345a422084aSMark Johnston 	shad_src = (uint8_t *)kmsan_md_addr_to_shad((vm_offset_t)src);
346a422084aSMark Johnston 	shad_dst = (uint8_t *)kmsan_md_addr_to_shad((vm_offset_t)dst);
347a422084aSMark Johnston 	__builtin_memmove(shad_dst, shad_src, size);
348a422084aSMark Johnston 
349a422084aSMark Johnston 	orig_src = (uint8_t *)kmsan_md_addr_to_orig((vm_offset_t)src);
350a422084aSMark Johnston 	orig_dst = (uint8_t *)kmsan_md_addr_to_orig((vm_offset_t)dst);
351a422084aSMark Johnston 	for (i = 0; i < size; i++) {
352a422084aSMark Johnston 		_src = (msan_orig_t *)((uintptr_t)orig_src & MSAN_ORIG_MASK);
353a422084aSMark Johnston 		_dst = (msan_orig_t *)((uintptr_t)orig_dst & MSAN_ORIG_MASK);
354a422084aSMark Johnston 		*_dst = *_src;
355a422084aSMark Johnston 		orig_src++;
356a422084aSMark Johnston 		orig_dst++;
357a422084aSMark Johnston 	}
358a422084aSMark Johnston }
359a422084aSMark Johnston 
360a422084aSMark Johnston static inline void
361a422084aSMark Johnston kmsan_shadow_check(uintptr_t addr, size_t size, const char *hook)
362a422084aSMark Johnston {
363*ca6cd604SMark Johnston 	msan_orig_t *orig;
364a422084aSMark Johnston 	uint8_t *shad;
365a422084aSMark Johnston 	size_t i;
366a422084aSMark Johnston 
367a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
368a422084aSMark Johnston 		return;
369a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported(addr)))
370a422084aSMark Johnston 		return;
371a422084aSMark Johnston 
372a422084aSMark Johnston 	shad = (uint8_t *)kmsan_md_addr_to_shad(addr);
373a422084aSMark Johnston 	for (i = 0; i < size; i++) {
374a422084aSMark Johnston 		if (__predict_true(shad[i] == 0))
375a422084aSMark Johnston 			continue;
376*ca6cd604SMark Johnston 		orig = (msan_orig_t *)kmsan_md_addr_to_orig((vm_offset_t)&shad[i]);
377*ca6cd604SMark Johnston 		orig = (msan_orig_t *)((uintptr_t)orig & MSAN_ORIG_MASK);
378*ca6cd604SMark Johnston 		kmsan_report_hook((const char *)addr + i, orig, size, i, hook);
379a422084aSMark Johnston 		break;
380a422084aSMark Johnston 	}
381a422084aSMark Johnston }
382a422084aSMark Johnston 
383a422084aSMark Johnston void
384a422084aSMark Johnston kmsan_init_arg(size_t n)
385a422084aSMark Johnston {
386a422084aSMark Johnston 	msan_td_t *mtd;
387a422084aSMark Johnston 	uint8_t *arg;
388a422084aSMark Johnston 
389a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
390a422084aSMark Johnston 		return;
391a422084aSMark Johnston 	if (__predict_false(curthread == NULL))
392a422084aSMark Johnston 		return;
393a422084aSMark Johnston 	mtd = curthread->td_kmsan;
394a422084aSMark Johnston 	arg = mtd->tls[mtd->ctx].param_shadow;
395a422084aSMark Johnston 	__builtin_memset(arg, 0, n);
396a422084aSMark Johnston }
397a422084aSMark Johnston 
398a422084aSMark Johnston void
399a422084aSMark Johnston kmsan_init_ret(size_t n)
400a422084aSMark Johnston {
401a422084aSMark Johnston 	msan_td_t *mtd;
402a422084aSMark Johnston 	uint8_t *arg;
403a422084aSMark Johnston 
404a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
405a422084aSMark Johnston 		return;
406a422084aSMark Johnston 	if (__predict_false(curthread == NULL))
407a422084aSMark Johnston 		return;
408a422084aSMark Johnston 	mtd = curthread->td_kmsan;
409a422084aSMark Johnston 	arg = mtd->tls[mtd->ctx].retval_shadow;
410a422084aSMark Johnston 	__builtin_memset(arg, 0, n);
411a422084aSMark Johnston }
412a422084aSMark Johnston 
413a422084aSMark Johnston static void
414a422084aSMark Johnston kmsan_check_arg(size_t size, const char *hook)
415a422084aSMark Johnston {
416*ca6cd604SMark Johnston 	msan_orig_t *orig;
417a422084aSMark Johnston 	msan_td_t *mtd;
418a422084aSMark Johnston 	uint8_t *arg;
419*ca6cd604SMark Johnston 	size_t ctx, i;
420a422084aSMark Johnston 
421a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
422a422084aSMark Johnston 		return;
423a422084aSMark Johnston 	if (__predict_false(curthread == NULL))
424a422084aSMark Johnston 		return;
425a422084aSMark Johnston 	mtd = curthread->td_kmsan;
426*ca6cd604SMark Johnston 	ctx = mtd->ctx;
427*ca6cd604SMark Johnston 	arg = mtd->tls[ctx].param_shadow;
428a422084aSMark Johnston 
429a422084aSMark Johnston 	for (i = 0; i < size; i++) {
430a422084aSMark Johnston 		if (__predict_true(arg[i] == 0))
431a422084aSMark Johnston 			continue;
432*ca6cd604SMark Johnston 		orig = &mtd->tls[ctx].param_origin[i / sizeof(msan_orig_t)];
433*ca6cd604SMark Johnston 		kmsan_report_hook((const char *)arg + i, orig, size, i, hook);
434a422084aSMark Johnston 		break;
435a422084aSMark Johnston 	}
436a422084aSMark Johnston }
437a422084aSMark Johnston 
438a422084aSMark Johnston void
439a422084aSMark Johnston kmsan_thread_alloc(struct thread *td)
440a422084aSMark Johnston {
441a422084aSMark Johnston 	msan_td_t *mtd;
442a422084aSMark Johnston 
443a422084aSMark Johnston 	if (!kmsan_enabled)
444a422084aSMark Johnston 		return;
445a422084aSMark Johnston 
446a422084aSMark Johnston 	mtd = td->td_kmsan;
447a422084aSMark Johnston 	if (mtd == NULL) {
448a422084aSMark Johnston 		/* We might be recycling a thread. */
449a422084aSMark Johnston 		kmsan_init_arg(sizeof(size_t) + sizeof(struct malloc_type *) +
450a422084aSMark Johnston 		    sizeof(int));
451a422084aSMark Johnston 		mtd = malloc(sizeof(*mtd), M_KMSAN, M_WAITOK);
452a422084aSMark Johnston 	}
453a422084aSMark Johnston 	kmsan_memset(mtd, 0, sizeof(*mtd));
454a422084aSMark Johnston 	mtd->ctx = 0;
455a422084aSMark Johnston 
456a422084aSMark Johnston 	if (td->td_kstack != 0)
457a422084aSMark Johnston 		kmsan_mark((void *)td->td_kstack, ptoa(td->td_kstack_pages),
458a422084aSMark Johnston 		    KMSAN_STATE_UNINIT);
459a422084aSMark Johnston 
460a422084aSMark Johnston 	td->td_kmsan = mtd;
461a422084aSMark Johnston }
462a422084aSMark Johnston 
463a422084aSMark Johnston void
464a422084aSMark Johnston kmsan_thread_free(struct thread *td)
465a422084aSMark Johnston {
466a422084aSMark Johnston 	msan_td_t *mtd;
467a422084aSMark Johnston 
468a422084aSMark Johnston 	if (!kmsan_enabled)
469a422084aSMark Johnston 		return;
470a422084aSMark Johnston 	if (__predict_false(td == curthread))
471a422084aSMark Johnston 		kmsan_panic("%s: freeing KMSAN TLS for curthread", __func__);
472a422084aSMark Johnston 
473a422084aSMark Johnston 	mtd = td->td_kmsan;
474a422084aSMark Johnston 	kmsan_init_arg(sizeof(void *) + sizeof(struct malloc_type *));
475a422084aSMark Johnston 	free(mtd, M_KMSAN);
476a422084aSMark Johnston 	td->td_kmsan = NULL;
477a422084aSMark Johnston }
478a422084aSMark Johnston 
479a422084aSMark Johnston void kmsan_intr_enter(void);
480a422084aSMark Johnston void kmsan_intr_leave(void);
481a422084aSMark Johnston 
482a422084aSMark Johnston void
483a422084aSMark Johnston kmsan_intr_enter(void)
484a422084aSMark Johnston {
485a422084aSMark Johnston 	msan_td_t *mtd;
486a422084aSMark Johnston 
487a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
488a422084aSMark Johnston 		return;
489a422084aSMark Johnston 
490a422084aSMark Johnston 	mtd = curthread->td_kmsan;
491a422084aSMark Johnston 	mtd->ctx++;
492a422084aSMark Johnston 	if (__predict_false(mtd->ctx >= MSAN_NCONTEXT))
493a422084aSMark Johnston 		kmsan_panic("%s: mtd->ctx = %zu", __func__, mtd->ctx);
494a422084aSMark Johnston }
495a422084aSMark Johnston 
496a422084aSMark Johnston void
497a422084aSMark Johnston kmsan_intr_leave(void)
498a422084aSMark Johnston {
499a422084aSMark Johnston 	msan_td_t *mtd;
500a422084aSMark Johnston 
501a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
502a422084aSMark Johnston 		return;
503a422084aSMark Johnston 
504a422084aSMark Johnston 	mtd = curthread->td_kmsan;
505a422084aSMark Johnston 	if (__predict_false(mtd->ctx == 0))
506a422084aSMark Johnston 		kmsan_panic("%s: mtd->ctx = %zu", __func__, mtd->ctx);
507a422084aSMark Johnston 	mtd->ctx--;
508a422084aSMark Johnston }
509a422084aSMark Johnston 
510a422084aSMark Johnston /* -------------------------------------------------------------------------- */
511a422084aSMark Johnston 
512a422084aSMark Johnston void
513a422084aSMark Johnston kmsan_shadow_map(vm_offset_t addr, size_t size)
514a422084aSMark Johnston {
515a422084aSMark Johnston 	size_t npages, i;
516a422084aSMark Johnston 	vm_offset_t va;
517a422084aSMark Johnston 
518a422084aSMark Johnston 	MPASS(addr % PAGE_SIZE == 0);
519a422084aSMark Johnston 	MPASS(size % PAGE_SIZE == 0);
520a422084aSMark Johnston 
521a422084aSMark Johnston 	if (!kmsan_enabled)
522a422084aSMark Johnston 		return;
523a422084aSMark Johnston 
524a422084aSMark Johnston 	npages = atop(size);
525a422084aSMark Johnston 
526a422084aSMark Johnston 	va = kmsan_md_addr_to_shad(addr);
527a422084aSMark Johnston 	for (i = 0; i < npages; i++) {
528175d3380SMark Johnston 		pmap_san_enter(va + ptoa(i));
529a422084aSMark Johnston 	}
530a422084aSMark Johnston 
531a422084aSMark Johnston 	va = kmsan_md_addr_to_orig(addr);
532a422084aSMark Johnston 	for (i = 0; i < npages; i++) {
533175d3380SMark Johnston 		pmap_san_enter(va + ptoa(i));
534a422084aSMark Johnston 	}
535a422084aSMark Johnston }
536a422084aSMark Johnston 
537a422084aSMark Johnston void
538a422084aSMark Johnston kmsan_orig(const void *addr, size_t size, int type, uintptr_t pc)
539a422084aSMark Johnston {
540a422084aSMark Johnston 	msan_orig_t orig;
541a422084aSMark Johnston 
542a422084aSMark Johnston 	orig = kmsan_md_orig_encode(type, pc);
543a422084aSMark Johnston 	kmsan_origin_fill(addr, orig, size);
544a422084aSMark Johnston }
545a422084aSMark Johnston 
546a422084aSMark Johnston void
547a422084aSMark Johnston kmsan_mark(const void *addr, size_t size, uint8_t c)
548a422084aSMark Johnston {
549a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, c, size);
550a422084aSMark Johnston }
551a422084aSMark Johnston 
55210a8e93dSMark Johnston void
553a422084aSMark Johnston kmsan_mark_bio(const struct bio *bp, uint8_t c)
554a422084aSMark Johnston {
555a422084aSMark Johnston 	kmsan_mark(bp->bio_data, bp->bio_length, c);
556a422084aSMark Johnston }
557a422084aSMark Johnston 
55810a8e93dSMark Johnston void
559a422084aSMark Johnston kmsan_mark_mbuf(const struct mbuf *m, uint8_t c)
560a422084aSMark Johnston {
561a422084aSMark Johnston 	do {
562a422084aSMark Johnston 		if ((m->m_flags & M_EXTPG) == 0)
563a422084aSMark Johnston 			kmsan_mark(m->m_data, m->m_len, c);
564a422084aSMark Johnston 		m = m->m_next;
565a422084aSMark Johnston 	} while (m != NULL);
566a422084aSMark Johnston }
567a422084aSMark Johnston 
568a422084aSMark Johnston void
569a422084aSMark Johnston kmsan_check(const void *p, size_t sz, const char *descr)
570a422084aSMark Johnston {
571a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)p, sz, descr);
572a422084aSMark Johnston }
573a422084aSMark Johnston 
574a422084aSMark Johnston void
575a422084aSMark Johnston kmsan_check_bio(const struct bio *bp, const char *descr)
576a422084aSMark Johnston {
577a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)bp->bio_data, bp->bio_length, descr);
578a422084aSMark Johnston }
579a422084aSMark Johnston 
580a422084aSMark Johnston void
581a422084aSMark Johnston kmsan_check_mbuf(const struct mbuf *m, const char *descr)
582a422084aSMark Johnston {
583a422084aSMark Johnston 	do {
584a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)mtod(m, void *), m->m_len, descr);
585a422084aSMark Johnston 	} while ((m = m->m_next) != NULL);
586a422084aSMark Johnston }
587a422084aSMark Johnston 
588a422084aSMark Johnston void
589a422084aSMark Johnston kmsan_init(void)
590a422084aSMark Johnston {
591a422084aSMark Johnston 	int disabled;
592a422084aSMark Johnston 
593a422084aSMark Johnston 	disabled = 0;
594a422084aSMark Johnston 	TUNABLE_INT_FETCH("debug.kmsan.disabled", &disabled);
595a422084aSMark Johnston 	if (disabled)
596a422084aSMark Johnston 		return;
597a422084aSMark Johnston 
598a422084aSMark Johnston 	/* Initialize the TLS for curthread. */
599a422084aSMark Johnston 	msan_thread0.ctx = 0;
600a422084aSMark Johnston 	thread0.td_kmsan = &msan_thread0;
601a422084aSMark Johnston 
602a422084aSMark Johnston 	/* Now officially enabled. */
603a422084aSMark Johnston 	kmsan_enabled = true;
604a422084aSMark Johnston }
605a422084aSMark Johnston 
606a422084aSMark Johnston /* -------------------------------------------------------------------------- */
607a422084aSMark Johnston 
608a422084aSMark Johnston msan_meta_t __msan_metadata_ptr_for_load_n(void *, size_t);
609a422084aSMark Johnston msan_meta_t __msan_metadata_ptr_for_store_n(void *, size_t);
610a422084aSMark Johnston 
611a422084aSMark Johnston msan_meta_t
612a422084aSMark Johnston __msan_metadata_ptr_for_load_n(void *addr, size_t size)
613a422084aSMark Johnston {
614a422084aSMark Johnston 	return (kmsan_meta_get(addr, size, false));
615a422084aSMark Johnston }
616a422084aSMark Johnston 
617a422084aSMark Johnston msan_meta_t
618a422084aSMark Johnston __msan_metadata_ptr_for_store_n(void *addr, size_t size)
619a422084aSMark Johnston {
620a422084aSMark Johnston 	return (kmsan_meta_get(addr, size, true));
621a422084aSMark Johnston }
622a422084aSMark Johnston 
623a422084aSMark Johnston #define MSAN_META_FUNC(size)						\
624a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_load_##size(void *);	\
625a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_load_##size(void *addr)	\
626a422084aSMark Johnston 	{								\
627a422084aSMark Johnston 		return (kmsan_meta_get(addr, size, false));		\
628a422084aSMark Johnston 	}								\
629a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_store_##size(void *);	\
630a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_store_##size(void *addr)	\
631a422084aSMark Johnston 	{								\
632a422084aSMark Johnston 		return (kmsan_meta_get(addr, size, true));		\
633a422084aSMark Johnston 	}
634a422084aSMark Johnston 
635a422084aSMark Johnston MSAN_META_FUNC(1)
636a422084aSMark Johnston MSAN_META_FUNC(2)
637a422084aSMark Johnston MSAN_META_FUNC(4)
638a422084aSMark Johnston MSAN_META_FUNC(8)
639a422084aSMark Johnston 
640a422084aSMark Johnston void __msan_instrument_asm_store(const void *, size_t);
641a422084aSMark Johnston msan_orig_t __msan_chain_origin(msan_orig_t);
642a422084aSMark Johnston void __msan_poison(const void *, size_t);
643a422084aSMark Johnston void __msan_unpoison(const void *, size_t);
644a422084aSMark Johnston void __msan_poison_alloca(const void *, uint64_t, const char *);
645a422084aSMark Johnston void __msan_unpoison_alloca(const void *, uint64_t);
646a422084aSMark Johnston void __msan_warning(msan_orig_t);
647a422084aSMark Johnston msan_tls_t *__msan_get_context_state(void);
648a422084aSMark Johnston 
649a422084aSMark Johnston void
650a422084aSMark Johnston __msan_instrument_asm_store(const void *addr, size_t size)
651a422084aSMark Johnston {
652a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_INITED, size);
653a422084aSMark Johnston }
654a422084aSMark Johnston 
655a422084aSMark Johnston msan_orig_t
656a422084aSMark Johnston __msan_chain_origin(msan_orig_t origin)
657a422084aSMark Johnston {
658a422084aSMark Johnston 	return (origin);
659a422084aSMark Johnston }
660a422084aSMark Johnston 
661a422084aSMark Johnston void
662a422084aSMark Johnston __msan_poison(const void *addr, size_t size)
663a422084aSMark Johnston {
664a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_UNINIT, size);
665a422084aSMark Johnston }
666a422084aSMark Johnston 
667a422084aSMark Johnston void
668a422084aSMark Johnston __msan_unpoison(const void *addr, size_t size)
669a422084aSMark Johnston {
670a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_INITED, size);
671a422084aSMark Johnston }
672a422084aSMark Johnston 
673a422084aSMark Johnston void
674a422084aSMark Johnston __msan_poison_alloca(const void *addr, uint64_t size, const char *descr)
675a422084aSMark Johnston {
676a422084aSMark Johnston 	msan_orig_t orig;
677a422084aSMark Johnston 
678a422084aSMark Johnston 	orig = kmsan_md_orig_encode(KMSAN_TYPE_STACK, (uintptr_t)descr);
679a422084aSMark Johnston 	kmsan_origin_fill(addr, orig, size);
680a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_UNINIT, size);
681a422084aSMark Johnston }
682a422084aSMark Johnston 
683a422084aSMark Johnston void
684a422084aSMark Johnston __msan_unpoison_alloca(const void *addr, uint64_t size)
685a422084aSMark Johnston {
686a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_INITED, size);
687a422084aSMark Johnston }
688a422084aSMark Johnston 
689a422084aSMark Johnston void
690a422084aSMark Johnston __msan_warning(msan_orig_t origin)
691a422084aSMark Johnston {
692a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
693a422084aSMark Johnston 		return;
694a422084aSMark Johnston 	kmsan_report_inline(origin, KMSAN_RET_ADDR);
695a422084aSMark Johnston }
696a422084aSMark Johnston 
697a422084aSMark Johnston msan_tls_t *
698a422084aSMark Johnston __msan_get_context_state(void)
699a422084aSMark Johnston {
700a422084aSMark Johnston 	msan_td_t *mtd;
701a422084aSMark Johnston 
702a422084aSMark Johnston 	/*
703a422084aSMark Johnston 	 * When APs are started, they execute some C code before curthread is
704a422084aSMark Johnston 	 * set.  We have to handle that here.
705a422084aSMark Johnston 	 */
706a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled || curthread == NULL))
707a422084aSMark Johnston 		return (&dummy_tls);
708a422084aSMark Johnston 	mtd = curthread->td_kmsan;
709a422084aSMark Johnston 	return (&mtd->tls[mtd->ctx]);
710a422084aSMark Johnston }
711a422084aSMark Johnston 
712a422084aSMark Johnston /* -------------------------------------------------------------------------- */
713a422084aSMark Johnston 
714a422084aSMark Johnston /*
715a422084aSMark Johnston  * Function hooks. Mostly ASM functions which need KMSAN wrappers to handle
716a422084aSMark Johnston  * initialized areas properly.
717a422084aSMark Johnston  */
718a422084aSMark Johnston 
719a422084aSMark Johnston void *
720a422084aSMark Johnston kmsan_memcpy(void *dst, const void *src, size_t len)
721a422084aSMark Johnston {
722a422084aSMark Johnston 	/* No kmsan_check_arg, because inlined. */
723a422084aSMark Johnston 	kmsan_init_ret(sizeof(void *));
724a422084aSMark Johnston 	if (__predict_true(len != 0)) {
725a422084aSMark Johnston 		kmsan_meta_copy(dst, src, len);
726a422084aSMark Johnston 	}
727a422084aSMark Johnston 	return (__builtin_memcpy(dst, src, len));
728a422084aSMark Johnston }
729a422084aSMark Johnston 
730a422084aSMark Johnston int
731a422084aSMark Johnston kmsan_memcmp(const void *b1, const void *b2, size_t len)
732a422084aSMark Johnston {
733a422084aSMark Johnston 	const uint8_t *_b1 = b1, *_b2 = b2;
734a422084aSMark Johnston 	size_t i;
735a422084aSMark Johnston 
736a422084aSMark Johnston 	kmsan_check_arg(sizeof(b1) + sizeof(b2) + sizeof(len),
737a422084aSMark Johnston 	    "memcmp():args");
738a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
739a422084aSMark Johnston 
740a422084aSMark Johnston 	for (i = 0; i < len; i++) {
741a422084aSMark Johnston 		if (*_b1 != *_b2) {
742a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)b1, i + 1,
743a422084aSMark Johnston 			    "memcmp():arg1");
744a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)b2, i + 1,
745a422084aSMark Johnston 			    "memcmp():arg2");
746a422084aSMark Johnston 			return (*_b1 - *_b2);
747a422084aSMark Johnston 		}
748a422084aSMark Johnston 		_b1++, _b2++;
749a422084aSMark Johnston 	}
750a422084aSMark Johnston 
751a422084aSMark Johnston 	return (0);
752a422084aSMark Johnston }
753a422084aSMark Johnston 
754a422084aSMark Johnston void *
755a422084aSMark Johnston kmsan_memset(void *dst, int c, size_t len)
756a422084aSMark Johnston {
757a422084aSMark Johnston 	/* No kmsan_check_arg, because inlined. */
758a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)dst, KMSAN_STATE_INITED, len);
759a422084aSMark Johnston 	kmsan_init_ret(sizeof(void *));
760a422084aSMark Johnston 	return (__builtin_memset(dst, c, len));
761a422084aSMark Johnston }
762a422084aSMark Johnston 
763a422084aSMark Johnston void *
764a422084aSMark Johnston kmsan_memmove(void *dst, const void *src, size_t len)
765a422084aSMark Johnston {
766a422084aSMark Johnston 	/* No kmsan_check_arg, because inlined. */
767a422084aSMark Johnston 	if (__predict_true(len != 0)) {
768a422084aSMark Johnston 		kmsan_meta_copy(dst, src, len);
769a422084aSMark Johnston 	}
770a422084aSMark Johnston 	kmsan_init_ret(sizeof(void *));
771a422084aSMark Johnston 	return (__builtin_memmove(dst, src, len));
772a422084aSMark Johnston }
773a422084aSMark Johnston 
774a422084aSMark Johnston __strong_reference(kmsan_memcpy, __msan_memcpy);
775a422084aSMark Johnston __strong_reference(kmsan_memset, __msan_memset);
776a422084aSMark Johnston __strong_reference(kmsan_memmove, __msan_memmove);
777a422084aSMark Johnston 
778a422084aSMark Johnston char *
779a422084aSMark Johnston kmsan_strcpy(char *dst, const char *src)
780a422084aSMark Johnston {
781a422084aSMark Johnston 	const char *_src = src;
782a422084aSMark Johnston 	char *_dst = dst;
783a422084aSMark Johnston 	size_t len = 0;
784a422084aSMark Johnston 
785a422084aSMark Johnston 	kmsan_check_arg(sizeof(dst) + sizeof(src), "strcpy():args");
786a422084aSMark Johnston 
787a422084aSMark Johnston 	while (1) {
788a422084aSMark Johnston 		len++;
789a422084aSMark Johnston 		*dst = *src;
790a422084aSMark Johnston 		if (*src == '\0')
791a422084aSMark Johnston 			break;
792a422084aSMark Johnston 		src++, dst++;
793a422084aSMark Johnston 	}
794a422084aSMark Johnston 
795a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)_src, len, "strcpy():arg2");
796a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)_dst, KMSAN_STATE_INITED, len);
797a422084aSMark Johnston 	kmsan_init_ret(sizeof(char *));
798a422084aSMark Johnston 	return (_dst);
799a422084aSMark Johnston }
800a422084aSMark Johnston 
801a422084aSMark Johnston int
802a422084aSMark Johnston kmsan_strcmp(const char *s1, const char *s2)
803a422084aSMark Johnston {
804a422084aSMark Johnston 	const char *_s1 = s1, *_s2 = s2;
805a422084aSMark Johnston 	size_t len = 0;
806a422084aSMark Johnston 
807a422084aSMark Johnston 	kmsan_check_arg(sizeof(s1) + sizeof(s2), "strcmp():args");
808a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
809a422084aSMark Johnston 
810a422084aSMark Johnston 	while (1) {
811a422084aSMark Johnston 		len++;
812a422084aSMark Johnston 		if (*s1 != *s2)
813a422084aSMark Johnston 			break;
814a422084aSMark Johnston 		if (*s1 == '\0') {
815a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)_s1, len, "strcmp():arg1");
816a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)_s2, len, "strcmp():arg2");
817a422084aSMark Johnston 			return (0);
818a422084aSMark Johnston 		}
819a422084aSMark Johnston 		s1++, s2++;
820a422084aSMark Johnston 	}
821a422084aSMark Johnston 
822a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)_s1, len, "strcmp():arg1");
823a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)_s2, len, "strcmp():arg2");
824a422084aSMark Johnston 
825a422084aSMark Johnston 	return (*(const unsigned char *)s1 - *(const unsigned char *)s2);
826a422084aSMark Johnston }
827a422084aSMark Johnston 
828a422084aSMark Johnston size_t
829a422084aSMark Johnston kmsan_strlen(const char *str)
830a422084aSMark Johnston {
831a422084aSMark Johnston 	const char *s;
832a422084aSMark Johnston 
833a422084aSMark Johnston 	kmsan_check_arg(sizeof(str), "strlen():args");
834a422084aSMark Johnston 
835a422084aSMark Johnston 	s = str;
836a422084aSMark Johnston 	while (1) {
837a422084aSMark Johnston 		if (*s == '\0')
838a422084aSMark Johnston 			break;
839a422084aSMark Johnston 		s++;
840a422084aSMark Johnston 	}
841a422084aSMark Johnston 
842a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)str, (size_t)(s - str) + 1, "strlen():arg1");
843a422084aSMark Johnston 	kmsan_init_ret(sizeof(size_t));
844a422084aSMark Johnston 	return (s - str);
845a422084aSMark Johnston }
846a422084aSMark Johnston 
847a422084aSMark Johnston int	kmsan_copyin(const void *, void *, size_t);
848a422084aSMark Johnston int	kmsan_copyout(const void *, void *, size_t);
849a422084aSMark Johnston int	kmsan_copyinstr(const void *, void *, size_t, size_t *);
850a422084aSMark Johnston 
851a422084aSMark Johnston int
852a422084aSMark Johnston kmsan_copyin(const void *uaddr, void *kaddr, size_t len)
853a422084aSMark Johnston {
854a422084aSMark Johnston 	int ret;
855a422084aSMark Johnston 
856a422084aSMark Johnston 	kmsan_check_arg(sizeof(uaddr) + sizeof(kaddr) + sizeof(len),
857a422084aSMark Johnston 	    "copyin():args");
858a422084aSMark Johnston 	ret = copyin(uaddr, kaddr, len);
859a422084aSMark Johnston 	if (ret == 0)
860a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)kaddr, KMSAN_STATE_INITED, len);
861a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
862a422084aSMark Johnston 	return (ret);
863a422084aSMark Johnston }
864a422084aSMark Johnston 
865a422084aSMark Johnston int
866a422084aSMark Johnston kmsan_copyout(const void *kaddr, void *uaddr, size_t len)
867a422084aSMark Johnston {
868a422084aSMark Johnston 	kmsan_check_arg(sizeof(kaddr) + sizeof(uaddr) + sizeof(len),
869a422084aSMark Johnston 	    "copyout():args");
870a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)kaddr, len, "copyout():arg1");
871a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
872a422084aSMark Johnston 	return (copyout(kaddr, uaddr, len));
873a422084aSMark Johnston }
874a422084aSMark Johnston 
875a422084aSMark Johnston int
876a422084aSMark Johnston kmsan_copyinstr(const void *uaddr, void *kaddr, size_t len, size_t *done)
877a422084aSMark Johnston {
878a422084aSMark Johnston 	size_t _done;
879a422084aSMark Johnston 	int ret;
880a422084aSMark Johnston 
881a422084aSMark Johnston 	kmsan_check_arg(sizeof(uaddr) + sizeof(kaddr) +
882a422084aSMark Johnston 	    sizeof(len) + sizeof(done), "copyinstr():args");
883a422084aSMark Johnston 	ret = copyinstr(uaddr, kaddr, len, &_done);
884a422084aSMark Johnston 	if (ret == 0)
885a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)kaddr, KMSAN_STATE_INITED, _done);
886a422084aSMark Johnston 	if (done != NULL) {
887a422084aSMark Johnston 		*done = _done;
888a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)done, KMSAN_STATE_INITED, sizeof(size_t));
889a422084aSMark Johnston 	}
890a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
891a422084aSMark Johnston 	return (ret);
892a422084aSMark Johnston }
893a422084aSMark Johnston 
894a422084aSMark Johnston /* -------------------------------------------------------------------------- */
895a422084aSMark Johnston 
896a422084aSMark Johnston int
897a422084aSMark Johnston kmsan_fubyte(volatile const void *base)
898a422084aSMark Johnston {
899a422084aSMark Johnston 	int ret;
900a422084aSMark Johnston 
901a422084aSMark Johnston 	kmsan_check_arg(sizeof(base), "fubyte(): args");
902a422084aSMark Johnston 	ret = fubyte(base);
903a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
904a422084aSMark Johnston 	return (ret);
905a422084aSMark Johnston }
906a422084aSMark Johnston 
907a422084aSMark Johnston int
908a422084aSMark Johnston kmsan_fuword16(volatile const void *base)
909a422084aSMark Johnston {
910a422084aSMark Johnston 	int ret;
911a422084aSMark Johnston 
912a422084aSMark Johnston 	kmsan_check_arg(sizeof(base), "fuword16(): args");
913a422084aSMark Johnston 	ret = fuword16(base);
914a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
915a422084aSMark Johnston 	return (ret);
916a422084aSMark Johnston }
917a422084aSMark Johnston 
918a422084aSMark Johnston int
919a422084aSMark Johnston kmsan_fueword(volatile const void *base, long *val)
920a422084aSMark Johnston {
921a422084aSMark Johnston 	int ret;
922a422084aSMark Johnston 
923a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(val), "fueword(): args");
924a422084aSMark Johnston 	ret = fueword(base, val);
925a422084aSMark Johnston 	if (ret == 0)
926a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)val, KMSAN_STATE_INITED,
927a422084aSMark Johnston 		    sizeof(*val));
928a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
929a422084aSMark Johnston 	return (ret);
930a422084aSMark Johnston }
931a422084aSMark Johnston 
932a422084aSMark Johnston int
933a422084aSMark Johnston kmsan_fueword32(volatile const void *base, int32_t *val)
934a422084aSMark Johnston {
935a422084aSMark Johnston 	int ret;
936a422084aSMark Johnston 
937a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(val), "fueword32(): args");
938a422084aSMark Johnston 	ret = fueword32(base, val);
939a422084aSMark Johnston 	if (ret == 0)
940a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)val, KMSAN_STATE_INITED,
941a422084aSMark Johnston 		    sizeof(*val));
942a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
943a422084aSMark Johnston 	return (ret);
944a422084aSMark Johnston }
945a422084aSMark Johnston 
946a422084aSMark Johnston int
947a422084aSMark Johnston kmsan_fueword64(volatile const void *base, int64_t *val)
948a422084aSMark Johnston {
949a422084aSMark Johnston 	int ret;
950a422084aSMark Johnston 
951a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(val), "fueword64(): args");
952a422084aSMark Johnston 	ret = fueword64(base, val);
953a422084aSMark Johnston 	if (ret == 0)
954a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)val, KMSAN_STATE_INITED,
955a422084aSMark Johnston 		    sizeof(*val));
956a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
957a422084aSMark Johnston 	return (ret);
958a422084aSMark Johnston }
959a422084aSMark Johnston 
960a422084aSMark Johnston int
961a422084aSMark Johnston kmsan_subyte(volatile void *base, int byte)
962a422084aSMark Johnston {
963a422084aSMark Johnston 	int ret;
964a422084aSMark Johnston 
965a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(byte), "subyte():args");
966a422084aSMark Johnston 	ret = subyte(base, byte);
967a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
968a422084aSMark Johnston 	return (ret);
969a422084aSMark Johnston }
970a422084aSMark Johnston 
971a422084aSMark Johnston int
972a422084aSMark Johnston kmsan_suword(volatile void *base, long word)
973a422084aSMark Johnston {
974a422084aSMark Johnston 	int ret;
975a422084aSMark Johnston 
976a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword():args");
977a422084aSMark Johnston 	ret = suword(base, word);
978a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
979a422084aSMark Johnston 	return (ret);
980a422084aSMark Johnston }
981a422084aSMark Johnston 
982a422084aSMark Johnston int
983a422084aSMark Johnston kmsan_suword16(volatile void *base, int word)
984a422084aSMark Johnston {
985a422084aSMark Johnston 	int ret;
986a422084aSMark Johnston 
987a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword16():args");
988a422084aSMark Johnston 	ret = suword16(base, word);
989a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
990a422084aSMark Johnston 	return (ret);
991a422084aSMark Johnston }
992a422084aSMark Johnston 
993a422084aSMark Johnston int
994a422084aSMark Johnston kmsan_suword32(volatile void *base, int32_t word)
995a422084aSMark Johnston {
996a422084aSMark Johnston 	int ret;
997a422084aSMark Johnston 
998a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword32():args");
999a422084aSMark Johnston 	ret = suword32(base, word);
1000a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1001a422084aSMark Johnston 	return (ret);
1002a422084aSMark Johnston }
1003a422084aSMark Johnston 
1004a422084aSMark Johnston int
1005a422084aSMark Johnston kmsan_suword64(volatile void *base, int64_t word)
1006a422084aSMark Johnston {
1007a422084aSMark Johnston 	int ret;
1008a422084aSMark Johnston 
1009a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword64():args");
1010a422084aSMark Johnston 	ret = suword64(base, word);
1011a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1012a422084aSMark Johnston 	return (ret);
1013a422084aSMark Johnston }
1014a422084aSMark Johnston 
1015a422084aSMark Johnston int
1016a422084aSMark Johnston kmsan_casueword32(volatile uint32_t *base, uint32_t oldval, uint32_t *oldvalp,
1017a422084aSMark Johnston     uint32_t newval)
1018a422084aSMark Johnston {
1019a422084aSMark Johnston 	int ret;
1020a422084aSMark Johnston 
1021a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(oldval) + sizeof(oldvalp) +
1022a422084aSMark Johnston 	    sizeof(newval), "casueword32(): args");
1023a422084aSMark Johnston 	ret = casueword32(base, oldval, oldvalp, newval);
1024a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)oldvalp, KMSAN_STATE_INITED,
1025a422084aSMark Johnston 	    sizeof(*oldvalp));
1026a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1027a422084aSMark Johnston 	return (ret);
1028a422084aSMark Johnston }
1029a422084aSMark Johnston 
1030a422084aSMark Johnston int
1031a422084aSMark Johnston kmsan_casueword(volatile u_long *base, u_long oldval, u_long *oldvalp,
1032a422084aSMark Johnston     u_long newval)
1033a422084aSMark Johnston {
1034a422084aSMark Johnston 	int ret;
1035a422084aSMark Johnston 
1036a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(oldval) + sizeof(oldvalp) +
1037a422084aSMark Johnston 	    sizeof(newval), "casueword32(): args");
1038a422084aSMark Johnston 	ret = casueword(base, oldval, oldvalp, newval);
1039a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)oldvalp, KMSAN_STATE_INITED,
1040a422084aSMark Johnston 	    sizeof(*oldvalp));
1041a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1042a422084aSMark Johnston 	return (ret);
1043a422084aSMark Johnston }
1044a422084aSMark Johnston 
1045a422084aSMark Johnston /* -------------------------------------------------------------------------- */
1046a422084aSMark Johnston 
1047a422084aSMark Johnston #include <machine/atomic.h>
1048a422084aSMark Johnston #include <sys/atomic_san.h>
1049a422084aSMark Johnston 
1050a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_ADD(name, type)				\
1051a422084aSMark Johnston 	void kmsan_atomic_add_##name(volatile type *ptr, type val)	\
1052a422084aSMark Johnston 	{								\
1053a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1054a422084aSMark Johnston 		    "atomic_add_" #name "():args");			\
1055a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1056a422084aSMark Johnston 		    "atomic_add_" #name "():ptr");			\
1057a422084aSMark Johnston 		atomic_add_##name(ptr, val);				\
1058a422084aSMark Johnston 	}
1059a422084aSMark Johnston 
1060a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_ADD(name, type)				\
1061a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_ADD(name, type)				\
1062a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_ADD(acq_##name, type)				\
1063a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_ADD(rel_##name, type)
1064a422084aSMark Johnston 
1065a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_SUBTRACT(name, type)				\
1066a422084aSMark Johnston 	void kmsan_atomic_subtract_##name(volatile type *ptr, type val)	\
1067a422084aSMark Johnston 	{								\
1068a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1069a422084aSMark Johnston 		    "atomic_subtract_" #name "():args");		\
1070a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1071a422084aSMark Johnston 		    "atomic_subtract_" #name "():ptr");			\
1072a422084aSMark Johnston 		atomic_subtract_##name(ptr, val);			\
1073a422084aSMark Johnston 	}
1074a422084aSMark Johnston 
1075a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_SUBTRACT(name, type)				\
1076a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SUBTRACT(name, type)				\
1077a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SUBTRACT(acq_##name, type)			\
1078a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SUBTRACT(rel_##name, type)
1079a422084aSMark Johnston 
1080a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_SET(name, type)				\
1081a422084aSMark Johnston 	void kmsan_atomic_set_##name(volatile type *ptr, type val)	\
1082a422084aSMark Johnston 	{								\
1083a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1084a422084aSMark Johnston 		    "atomic_set_" #name "():args");			\
1085a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1086a422084aSMark Johnston 		    "atomic_set_" #name "():ptr");			\
1087a422084aSMark Johnston 		atomic_set_##name(ptr, val);				\
1088a422084aSMark Johnston 	}
1089a422084aSMark Johnston 
1090a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_SET(name, type)				\
1091a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SET(name, type)				\
1092a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SET(acq_##name, type)				\
1093a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SET(rel_##name, type)
1094a422084aSMark Johnston 
1095a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_CLEAR(name, type)				\
1096a422084aSMark Johnston 	void kmsan_atomic_clear_##name(volatile type *ptr, type val)	\
1097a422084aSMark Johnston 	{								\
1098a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1099a422084aSMark Johnston 		    "atomic_clear_" #name "():args");			\
1100a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1101a422084aSMark Johnston 		    "atomic_clear_" #name "():ptr");			\
1102a422084aSMark Johnston 		atomic_clear_##name(ptr, val);				\
1103a422084aSMark Johnston 	}
1104a422084aSMark Johnston 
1105a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_CLEAR(name, type)				\
1106a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CLEAR(name, type)				\
1107a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CLEAR(acq_##name, type)			\
1108a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CLEAR(rel_##name, type)
1109a422084aSMark Johnston 
1110a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_FETCHADD(name, type)				\
1111a422084aSMark Johnston 	type kmsan_atomic_fetchadd_##name(volatile type *ptr, type val)	\
1112a422084aSMark Johnston 	{								\
1113a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1114a422084aSMark Johnston 		    "atomic_fetchadd_" #name "():args");		\
1115a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1116a422084aSMark Johnston 		    "atomic_fetchadd_" #name "():ptr");			\
1117a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1118a422084aSMark Johnston 		return (atomic_fetchadd_##name(ptr, val));		\
1119a422084aSMark Johnston 	}
1120a422084aSMark Johnston 
1121a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_READANDCLEAR(name, type)			\
1122a422084aSMark Johnston 	type kmsan_atomic_readandclear_##name(volatile type *ptr)	\
1123a422084aSMark Johnston 	{								\
1124a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr),				\
1125a422084aSMark Johnston 		    "atomic_readandclear_" #name "():args");		\
1126a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1127a422084aSMark Johnston 		    "atomic_readandclear_" #name "():ptr");		\
1128a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1129a422084aSMark Johnston 		return (atomic_readandclear_##name(ptr));		\
1130a422084aSMark Johnston 	}
1131a422084aSMark Johnston 
1132a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_TESTANDCLEAR(name, type)			\
1133a422084aSMark Johnston 	int kmsan_atomic_testandclear_##name(volatile type *ptr, u_int v) \
1134a422084aSMark Johnston 	{								\
1135a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(v),		\
1136a422084aSMark Johnston 		    "atomic_testandclear_" #name "():args");		\
1137a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1138a422084aSMark Johnston 		    "atomic_testandclear_" #name "():ptr");		\
1139a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1140a422084aSMark Johnston 		return (atomic_testandclear_##name(ptr, v));		\
1141a422084aSMark Johnston 	}
1142a422084aSMark Johnston 
1143a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_TESTANDSET(name, type)				\
1144a422084aSMark Johnston 	int kmsan_atomic_testandset_##name(volatile type *ptr, u_int v) \
1145a422084aSMark Johnston 	{								\
1146a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(v),		\
1147a422084aSMark Johnston 		    "atomic_testandset_" #name "():args");		\
1148a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1149a422084aSMark Johnston 		    "atomic_testandset_" #name "():ptr");		\
1150a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1151a422084aSMark Johnston 		return (atomic_testandset_##name(ptr, v));		\
1152a422084aSMark Johnston 	}
1153a422084aSMark Johnston 
1154a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_SWAP(name, type)				\
1155a422084aSMark Johnston 	type kmsan_atomic_swap_##name(volatile type *ptr, type val)	\
1156a422084aSMark Johnston 	{								\
1157a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1158a422084aSMark Johnston 		    "atomic_swap_" #name "():args");			\
1159a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1160a422084aSMark Johnston 		    "atomic_swap_" #name "():ptr");			\
1161a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1162a422084aSMark Johnston 		return (atomic_swap_##name(ptr, val));			\
1163a422084aSMark Johnston 	}
1164a422084aSMark Johnston 
1165a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_CMPSET(name, type)				\
1166a422084aSMark Johnston 	int kmsan_atomic_cmpset_##name(volatile type *ptr, type oval,	\
1167a422084aSMark Johnston 	    type nval)							\
1168a422084aSMark Johnston 	{								\
1169a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(oval) +		\
1170a422084aSMark Johnston 		    sizeof(nval), "atomic_cmpset_" #name "():args");	\
1171a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1172a422084aSMark Johnston 		    "atomic_cmpset_" #name "():ptr");			\
1173a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1174a422084aSMark Johnston 		return (atomic_cmpset_##name(ptr, oval, nval));		\
1175a422084aSMark Johnston 	}
1176a422084aSMark Johnston 
1177a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_CMPSET(name, type)				\
1178a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CMPSET(name, type)				\
1179a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CMPSET(acq_##name, type)			\
1180a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CMPSET(rel_##name, type)
1181a422084aSMark Johnston 
1182a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_FCMPSET(name, type)				\
1183a422084aSMark Johnston 	int kmsan_atomic_fcmpset_##name(volatile type *ptr, type *oval,	\
1184a422084aSMark Johnston 	    type nval)							\
1185a422084aSMark Johnston 	{								\
1186a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(oval) +		\
1187a422084aSMark Johnston 		    sizeof(nval), "atomic_fcmpset_" #name "():args");	\
1188a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1189a422084aSMark Johnston 		    "atomic_fcmpset_" #name "():ptr");			\
1190a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1191a422084aSMark Johnston 		return (atomic_fcmpset_##name(ptr, oval, nval));	\
1192a422084aSMark Johnston 	}
1193a422084aSMark Johnston 
1194a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_FCMPSET(name, type)				\
1195a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_FCMPSET(name, type)				\
1196a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_FCMPSET(acq_##name, type)			\
1197a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_FCMPSET(rel_##name, type)
1198a422084aSMark Johnston 
1199a422084aSMark Johnston #define MSAN_ATOMIC_FUNC_THREAD_FENCE(name)				\
1200a422084aSMark Johnston 	void kmsan_atomic_thread_fence_##name(void)			\
1201a422084aSMark Johnston 	{								\
1202a422084aSMark Johnston 		atomic_thread_fence_##name();				\
1203a422084aSMark Johnston 	}
1204a422084aSMark Johnston 
1205a422084aSMark Johnston #define	_MSAN_ATOMIC_FUNC_LOAD(name, type)				\
1206a422084aSMark Johnston 	type kmsan_atomic_load_##name(volatile type *ptr)		\
1207a422084aSMark Johnston 	{								\
1208a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr),				\
1209a422084aSMark Johnston 		    "atomic_load_" #name "():args");			\
1210a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1211a422084aSMark Johnston 		    "atomic_load_" #name "():ptr");			\
1212a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1213a422084aSMark Johnston 		return (atomic_load_##name(ptr));			\
1214a422084aSMark Johnston 	}
1215a422084aSMark Johnston 
1216a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_LOAD(name, type)				\
1217a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_LOAD(name, type)				\
1218a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_LOAD(acq_##name, type)
1219a422084aSMark Johnston 
1220a422084aSMark Johnston #define	_MSAN_ATOMIC_FUNC_STORE(name, type)				\
1221a422084aSMark Johnston 	void kmsan_atomic_store_##name(volatile type *ptr, type val)	\
1222a422084aSMark Johnston 	{								\
1223a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1224a422084aSMark Johnston 		    "atomic_store_" #name "():args");			\
1225a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)ptr, KMSAN_STATE_INITED,	\
1226a422084aSMark Johnston 		    sizeof(type));					\
1227a422084aSMark Johnston 		atomic_store_##name(ptr, val);				\
1228a422084aSMark Johnston 	}
1229a422084aSMark Johnston 
1230a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_STORE(name, type)				\
1231a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_STORE(name, type)				\
1232a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_STORE(rel_##name, type)
1233a422084aSMark Johnston 
1234a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(8, uint8_t);
1235a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(16, uint16_t);
1236a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(32, uint32_t);
1237a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(64, uint64_t);
1238a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(int, u_int);
1239a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(long, u_long);
1240a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(ptr, uintptr_t);
1241a422084aSMark Johnston 
1242a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(8, uint8_t);
1243a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(16, uint16_t);
1244a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(32, uint32_t);
1245a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(64, uint64_t);
1246a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(int, u_int);
1247a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(long, u_long);
1248a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(ptr, uintptr_t);
1249a422084aSMark Johnston 
1250a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(8, uint8_t);
1251a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(16, uint16_t);
1252a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(32, uint32_t);
1253a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(64, uint64_t);
1254a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(int, u_int);
1255a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(long, u_long);
1256a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(ptr, uintptr_t);
1257a422084aSMark Johnston 
1258a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(8, uint8_t);
1259a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(16, uint16_t);
1260a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(32, uint32_t);
1261a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(64, uint64_t);
1262a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(int, u_int);
1263a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(long, u_long);
1264a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(ptr, uintptr_t);
1265a422084aSMark Johnston 
1266a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(32, uint32_t);
1267a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(64, uint64_t);
1268a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(int, u_int);
1269a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(long, u_long);
1270a422084aSMark Johnston 
1271a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(32, uint32_t);
1272a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(64, uint64_t);
1273a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(int, u_int);
1274a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(long, u_long);
1275a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(ptr, uintptr_t);
1276a422084aSMark Johnston 
1277a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(32, uint32_t);
1278a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(64, uint64_t);
1279a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(int, u_int);
1280a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(long, u_long);
1281a422084aSMark Johnston 
1282a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(32, uint32_t);
1283a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(64, uint64_t);
1284a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(int, u_int);
1285a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(long, u_long);
1286a422084aSMark Johnston 
1287a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(32, uint32_t);
1288a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(64, uint64_t);
1289a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(int, u_int);
1290a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(long, u_long);
1291a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(ptr, uintptr_t);
1292a422084aSMark Johnston 
1293a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(8, uint8_t);
1294a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(16, uint16_t);
1295a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(32, uint32_t);
1296a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(64, uint64_t);
1297a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(int, u_int);
1298a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(long, u_long);
1299a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(ptr, uintptr_t);
1300a422084aSMark Johnston 
1301a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(8, uint8_t);
1302a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(16, uint16_t);
1303a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(32, uint32_t);
1304a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(64, uint64_t);
1305a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(int, u_int);
1306a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(long, u_long);
1307a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(ptr, uintptr_t);
1308a422084aSMark Johnston 
13091f6b6cf1SMark Johnston _MSAN_ATOMIC_FUNC_LOAD(bool, bool);
1310a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(8, uint8_t);
1311a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(16, uint16_t);
1312a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(32, uint32_t);
1313a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(64, uint64_t);
1314a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(char, u_char);
1315a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(short, u_short);
1316a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(int, u_int);
1317a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(long, u_long);
1318a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(ptr, uintptr_t);
1319a422084aSMark Johnston 
13201f6b6cf1SMark Johnston _MSAN_ATOMIC_FUNC_STORE(bool, bool);
1321a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(8, uint8_t);
1322a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(16, uint16_t);
1323a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(32, uint32_t);
1324a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(64, uint64_t);
1325a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(char, u_char);
1326a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(short, u_short);
1327a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(int, u_int);
1328a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(long, u_long);
1329a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(ptr, uintptr_t);
1330a422084aSMark Johnston 
1331a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(acq);
1332a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(rel);
1333a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(acq_rel);
1334a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(seq_cst);
1335a422084aSMark Johnston 
1336a422084aSMark Johnston void
1337a422084aSMark Johnston kmsan_atomic_interrupt_fence(void)
1338a422084aSMark Johnston {
1339a422084aSMark Johnston 	atomic_interrupt_fence();
1340a422084aSMark Johnston }
1341a422084aSMark Johnston 
1342a422084aSMark Johnston /* -------------------------------------------------------------------------- */
1343a422084aSMark Johnston 
1344a422084aSMark Johnston #include <sys/bus.h>
1345a422084aSMark Johnston #include <machine/bus.h>
1346a422084aSMark Johnston #include <sys/bus_san.h>
1347a422084aSMark Johnston 
1348a422084aSMark Johnston int
1349a422084aSMark Johnston kmsan_bus_space_map(bus_space_tag_t tag, bus_addr_t hnd, bus_size_t size,
1350a422084aSMark Johnston     int flags, bus_space_handle_t *handlep)
1351a422084aSMark Johnston {
1352a422084aSMark Johnston 	return (bus_space_map(tag, hnd, size, flags, handlep));
1353a422084aSMark Johnston }
1354a422084aSMark Johnston 
1355a422084aSMark Johnston void
1356a422084aSMark Johnston kmsan_bus_space_unmap(bus_space_tag_t tag, bus_space_handle_t hnd,
1357a422084aSMark Johnston     bus_size_t size)
1358a422084aSMark Johnston {
1359a422084aSMark Johnston 	bus_space_unmap(tag, hnd, size);
1360a422084aSMark Johnston }
1361a422084aSMark Johnston 
1362a422084aSMark Johnston int
1363a422084aSMark Johnston kmsan_bus_space_subregion(bus_space_tag_t tag, bus_space_handle_t hnd,
1364a422084aSMark Johnston     bus_size_t offset, bus_size_t size, bus_space_handle_t *handlep)
1365a422084aSMark Johnston {
1366a422084aSMark Johnston 	return (bus_space_subregion(tag, hnd, offset, size, handlep));
1367a422084aSMark Johnston }
1368a422084aSMark Johnston 
1369a422084aSMark Johnston void
1370a422084aSMark Johnston kmsan_bus_space_free(bus_space_tag_t tag, bus_space_handle_t hnd,
1371a422084aSMark Johnston     bus_size_t size)
1372a422084aSMark Johnston {
1373a422084aSMark Johnston 	bus_space_free(tag, hnd, size);
1374a422084aSMark Johnston }
1375a422084aSMark Johnston 
1376a422084aSMark Johnston void
1377a422084aSMark Johnston kmsan_bus_space_barrier(bus_space_tag_t tag, bus_space_handle_t hnd,
1378a422084aSMark Johnston     bus_size_t offset, bus_size_t size, int flags)
1379a422084aSMark Johnston {
1380a422084aSMark Johnston 	bus_space_barrier(tag, hnd, offset, size, flags);
1381a422084aSMark Johnston }
1382a422084aSMark Johnston 
1383a422084aSMark Johnston /* XXXMJ x86-specific */
1384a422084aSMark Johnston #define MSAN_BUS_READ_FUNC(func, width, type)				\
1385a422084aSMark Johnston 	type kmsan_bus_space_read##func##_##width(bus_space_tag_t tag,	\
1386a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t offset)			\
1387a422084aSMark Johnston 	{								\
1388a422084aSMark Johnston 		type ret;						\
1389a422084aSMark Johnston 		if ((tag) != X86_BUS_SPACE_IO)				\
1390a422084aSMark Johnston 			kmsan_shadow_fill((uintptr_t)(hnd + offset),	\
1391a422084aSMark Johnston 			    KMSAN_STATE_INITED, (width));		\
1392a422084aSMark Johnston 		ret = bus_space_read##func##_##width(tag, hnd, offset);	\
1393a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1394a422084aSMark Johnston 		return (ret);						\
1395a422084aSMark Johnston 	}								\
1396a422084aSMark Johnston 
1397a422084aSMark Johnston #define MSAN_BUS_READ_PTR_FUNC(func, width, type)			\
1398a422084aSMark Johnston 	void kmsan_bus_space_read_##func##_##width(bus_space_tag_t tag,	\
1399a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t size, type *buf,		\
1400a422084aSMark Johnston 	    bus_size_t count)						\
1401a422084aSMark Johnston 	{								\
1402a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)buf, KMSAN_STATE_INITED,	\
1403a422084aSMark Johnston 		    (width) * count);					\
1404a422084aSMark Johnston 		bus_space_read_##func##_##width(tag, hnd, size, buf, 	\
1405a422084aSMark Johnston 		    count);						\
1406a422084aSMark Johnston 	}
1407a422084aSMark Johnston 
1408a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 1, uint8_t)
1409a422084aSMark Johnston MSAN_BUS_READ_FUNC(_stream, 1, uint8_t)
1410a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi, 1, uint8_t)
1411a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi_stream, 1, uint8_t)
1412a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region, 1, uint8_t)
1413a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region_stream, 1, uint8_t)
1414a422084aSMark Johnston 
1415a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 2, uint16_t)
1416a422084aSMark Johnston MSAN_BUS_READ_FUNC(_stream, 2, uint16_t)
1417a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi, 2, uint16_t)
1418a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi_stream, 2, uint16_t)
1419a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region, 2, uint16_t)
1420a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region_stream, 2, uint16_t)
1421a422084aSMark Johnston 
1422a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 4, uint32_t)
1423a422084aSMark Johnston MSAN_BUS_READ_FUNC(_stream, 4, uint32_t)
1424a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi, 4, uint32_t)
1425a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi_stream, 4, uint32_t)
1426a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region, 4, uint32_t)
1427a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region_stream, 4, uint32_t)
1428a422084aSMark Johnston 
1429a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 8, uint64_t)
1430a422084aSMark Johnston 
1431a422084aSMark Johnston #define	MSAN_BUS_WRITE_FUNC(func, width, type)				\
1432a422084aSMark Johnston 	void kmsan_bus_space_write##func##_##width(bus_space_tag_t tag,	\
1433a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t offset, type value)	\
1434a422084aSMark Johnston 	{								\
1435a422084aSMark Johnston 		bus_space_write##func##_##width(tag, hnd, offset, value);\
1436a422084aSMark Johnston 	}								\
1437a422084aSMark Johnston 
1438a422084aSMark Johnston #define	MSAN_BUS_WRITE_PTR_FUNC(func, width, type)			\
1439a422084aSMark Johnston 	void kmsan_bus_space_write_##func##_##width(bus_space_tag_t tag,\
1440a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t size, const type *buf,	\
1441a422084aSMark Johnston 	    bus_size_t count)						\
1442a422084aSMark Johnston 	{								\
1443a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)buf, sizeof(type) * count,\
1444a422084aSMark Johnston 		    "bus_space_write()");				\
1445a422084aSMark Johnston 		bus_space_write_##func##_##width(tag, hnd, size, buf, 	\
1446a422084aSMark Johnston 		    count);						\
1447a422084aSMark Johnston 	}
1448a422084aSMark Johnston 
1449a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 1, uint8_t)
1450a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(_stream, 1, uint8_t)
1451a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi, 1, uint8_t)
1452a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi_stream, 1, uint8_t)
1453a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region, 1, uint8_t)
1454a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region_stream, 1, uint8_t)
1455a422084aSMark Johnston 
1456a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 2, uint16_t)
1457a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(_stream, 2, uint16_t)
1458a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi, 2, uint16_t)
1459a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi_stream, 2, uint16_t)
1460a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region, 2, uint16_t)
1461a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region_stream, 2, uint16_t)
1462a422084aSMark Johnston 
1463a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 4, uint32_t)
1464a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(_stream, 4, uint32_t)
1465a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi, 4, uint32_t)
1466a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi_stream, 4, uint32_t)
1467a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region, 4, uint32_t)
1468a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region_stream, 4, uint32_t)
1469a422084aSMark Johnston 
1470a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 8, uint64_t)
1471a422084aSMark Johnston 
1472a422084aSMark Johnston #define	MSAN_BUS_SET_FUNC(func, width, type)				\
1473a422084aSMark Johnston 	void kmsan_bus_space_set_##func##_##width(bus_space_tag_t tag,	\
1474a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t offset, type value,	\
1475a422084aSMark Johnston 	    bus_size_t count)						\
1476a422084aSMark Johnston 	{								\
1477a422084aSMark Johnston 		bus_space_set_##func##_##width(tag, hnd, offset, value,	\
1478a422084aSMark Johnston 		    count);						\
1479a422084aSMark Johnston 	}
1480a422084aSMark Johnston 
1481a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi, 1, uint8_t)
1482a422084aSMark Johnston MSAN_BUS_SET_FUNC(region, 1, uint8_t)
1483a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi_stream, 1, uint8_t)
1484a422084aSMark Johnston MSAN_BUS_SET_FUNC(region_stream, 1, uint8_t)
1485a422084aSMark Johnston 
1486a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi, 2, uint16_t)
1487a422084aSMark Johnston MSAN_BUS_SET_FUNC(region, 2, uint16_t)
1488a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi_stream, 2, uint16_t)
1489a422084aSMark Johnston MSAN_BUS_SET_FUNC(region_stream, 2, uint16_t)
1490a422084aSMark Johnston 
1491a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi, 4, uint32_t)
1492a422084aSMark Johnston MSAN_BUS_SET_FUNC(region, 4, uint32_t)
1493a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi_stream, 4, uint32_t)
1494a422084aSMark Johnston MSAN_BUS_SET_FUNC(region_stream, 4, uint32_t)
1495a422084aSMark Johnston 
1496a422084aSMark Johnston /* -------------------------------------------------------------------------- */
1497a422084aSMark Johnston 
1498a422084aSMark Johnston void
1499a422084aSMark Johnston kmsan_bus_dmamap_sync(struct memdesc *desc, bus_dmasync_op_t op)
1500a422084aSMark Johnston {
1501a422084aSMark Johnston 	/*
1502a422084aSMark Johnston 	 * Some drivers, e.g., nvme, use the same code path for loading device
1503a422084aSMark Johnston 	 * read and write requests, and will thus specify both flags.  In this
1504a422084aSMark Johnston 	 * case we should not do any checking since it will generally lead to
1505a422084aSMark Johnston 	 * false positives.
1506a422084aSMark Johnston 	 */
1507a422084aSMark Johnston 	if ((op & (BUS_DMASYNC_PREREAD | BUS_DMASYNC_PREWRITE)) ==
1508a422084aSMark Johnston 	    BUS_DMASYNC_PREWRITE) {
1509a422084aSMark Johnston 		switch (desc->md_type) {
1510a422084aSMark Johnston 		case MEMDESC_VADDR:
15113dba010eSJohn Baldwin 			kmsan_check(desc->u.md_vaddr, desc->md_len,
1512a422084aSMark Johnston 			    "dmasync");
1513a422084aSMark Johnston 			break;
1514a422084aSMark Johnston 		case MEMDESC_MBUF:
1515a422084aSMark Johnston 			kmsan_check_mbuf(desc->u.md_mbuf, "dmasync");
1516a422084aSMark Johnston 			break;
1517a422084aSMark Johnston 		case 0:
1518a422084aSMark Johnston 			break;
1519a422084aSMark Johnston 		default:
1520a422084aSMark Johnston 			kmsan_panic("%s: unhandled memdesc type %d", __func__,
1521a422084aSMark Johnston 			    desc->md_type);
1522a422084aSMark Johnston 		}
1523a422084aSMark Johnston 	}
1524a422084aSMark Johnston 	if ((op & BUS_DMASYNC_POSTREAD) != 0) {
1525a422084aSMark Johnston 		switch (desc->md_type) {
1526a422084aSMark Johnston 		case MEMDESC_VADDR:
15273dba010eSJohn Baldwin 			kmsan_mark(desc->u.md_vaddr, desc->md_len,
1528a422084aSMark Johnston 			    KMSAN_STATE_INITED);
1529a422084aSMark Johnston 			break;
1530a422084aSMark Johnston 		case MEMDESC_MBUF:
1531a422084aSMark Johnston 			kmsan_mark_mbuf(desc->u.md_mbuf, KMSAN_STATE_INITED);
1532a422084aSMark Johnston 			break;
1533a422084aSMark Johnston 		case 0:
1534a422084aSMark Johnston 			break;
1535a422084aSMark Johnston 		default:
1536a422084aSMark Johnston 			kmsan_panic("%s: unhandled memdesc type %d", __func__,
1537a422084aSMark Johnston 			    desc->md_type);
1538a422084aSMark Johnston 		}
1539a422084aSMark Johnston 	}
1540a422084aSMark Johnston }
1541