xref: /freebsd/sys/kern/subr_msan.c (revision e5caed14067b40f1454d74e99789a28508d0eea3)
1a422084aSMark Johnston /*	$NetBSD: subr_msan.c,v 1.14 2020/09/09 16:29:59 maxv Exp $	*/
2a422084aSMark Johnston 
3a422084aSMark Johnston /*
4a422084aSMark Johnston  * Copyright (c) 2019-2020 Maxime Villard, m00nbsd.net
5a422084aSMark Johnston  * All rights reserved.
6a422084aSMark Johnston  * Copyright (c) 2021 The FreeBSD Foundation
7a422084aSMark Johnston  *
8a422084aSMark Johnston  * Portions of this software were developed by Mark Johnston under sponsorship
9a422084aSMark Johnston  * from the FreeBSD Foundation.
10a422084aSMark Johnston  *
11a422084aSMark Johnston  * This code is part of the KMSAN subsystem of the NetBSD kernel.
12a422084aSMark Johnston  *
13a422084aSMark Johnston  * Redistribution and use in source and binary forms, with or without
14a422084aSMark Johnston  * modification, are permitted provided that the following conditions
15a422084aSMark Johnston  * are met:
16a422084aSMark Johnston  * 1. Redistributions of source code must retain the above copyright
17a422084aSMark Johnston  *    notice, this list of conditions and the following disclaimer.
18a422084aSMark Johnston  * 2. Redistributions in binary form must reproduce the above copyright
19a422084aSMark Johnston  *    notice, this list of conditions and the following disclaimer in the
20a422084aSMark Johnston  *    documentation and/or other materials provided with the distribution.
21a422084aSMark Johnston  *
22a422084aSMark Johnston  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23a422084aSMark Johnston  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24a422084aSMark Johnston  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25a422084aSMark Johnston  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26a422084aSMark Johnston  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
27a422084aSMark Johnston  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
28a422084aSMark Johnston  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
29a422084aSMark Johnston  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
30a422084aSMark Johnston  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31a422084aSMark Johnston  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32a422084aSMark Johnston  * SUCH DAMAGE.
33a422084aSMark Johnston  */
34a422084aSMark Johnston 
35a422084aSMark Johnston #define	SAN_RUNTIME
36a422084aSMark Johnston 
37a422084aSMark Johnston #include <sys/cdefs.h>
38a422084aSMark Johnston #if 0
39a422084aSMark Johnston __KERNEL_RCSID(0, "$NetBSD: subr_msan.c,v 1.14 2020/09/09 16:29:59 maxv Exp $");
40a422084aSMark Johnston #endif
41a422084aSMark Johnston 
42a422084aSMark Johnston #include <sys/param.h>
43a422084aSMark Johnston #include <sys/systm.h>
44a422084aSMark Johnston #include <sys/bio.h>
45a422084aSMark Johnston #include <sys/buf.h>
46a422084aSMark Johnston #include <sys/conf.h>
47a422084aSMark Johnston #include <sys/kdb.h>
48a422084aSMark Johnston #include <sys/kernel.h>
49a422084aSMark Johnston #include <sys/linker.h>
50a422084aSMark Johnston #include <sys/malloc.h>
51a422084aSMark Johnston #include <sys/mbuf.h>
52a422084aSMark Johnston #include <sys/memdesc.h>
53a422084aSMark Johnston #include <sys/msan.h>
54a422084aSMark Johnston #include <sys/proc.h>
55a422084aSMark Johnston #include <sys/stack.h>
56a422084aSMark Johnston #include <sys/sysctl.h>
57a422084aSMark Johnston #include <sys/uio.h>
58a422084aSMark Johnston 
59a422084aSMark Johnston #include <vm/vm.h>
60a422084aSMark Johnston #include <vm/pmap.h>
61a422084aSMark Johnston 
62a422084aSMark Johnston #include <machine/msan.h>
63a422084aSMark Johnston #include <machine/stdarg.h>
64a422084aSMark Johnston 
65a422084aSMark Johnston void kmsan_init_arg(size_t);
66a422084aSMark Johnston void kmsan_init_ret(size_t);
67a422084aSMark Johnston 
68a422084aSMark Johnston /* -------------------------------------------------------------------------- */
69a422084aSMark Johnston 
70a422084aSMark Johnston /*
71a422084aSMark Johnston  * Part of the compiler ABI.
72a422084aSMark Johnston  */
73a422084aSMark Johnston 
74a422084aSMark Johnston typedef struct {
75a422084aSMark Johnston 	uint8_t *shad;
76a422084aSMark Johnston 	msan_orig_t *orig;
77a422084aSMark Johnston } msan_meta_t;
78a422084aSMark Johnston 
79a422084aSMark Johnston #define MSAN_PARAM_SIZE		800
80a422084aSMark Johnston #define MSAN_RETVAL_SIZE	800
81a422084aSMark Johnston typedef struct {
82a422084aSMark Johnston 	uint8_t param_shadow[MSAN_PARAM_SIZE];
83a422084aSMark Johnston 	uint8_t retval_shadow[MSAN_RETVAL_SIZE];
84a422084aSMark Johnston 	uint8_t va_arg_shadow[MSAN_PARAM_SIZE];
85a422084aSMark Johnston 	uint8_t va_arg_origin[MSAN_PARAM_SIZE];
86a422084aSMark Johnston 	uint64_t va_arg_overflow_size;
87a422084aSMark Johnston 	msan_orig_t param_origin[MSAN_PARAM_SIZE / sizeof(msan_orig_t)];
88a422084aSMark Johnston 	msan_orig_t retval_origin;
89a422084aSMark Johnston } msan_tls_t;
90a422084aSMark Johnston 
91a422084aSMark Johnston /* -------------------------------------------------------------------------- */
92a422084aSMark Johnston 
93a422084aSMark Johnston #define MSAN_NCONTEXT	4
94a422084aSMark Johnston #define MSAN_ORIG_MASK	(~0x3)
95a422084aSMark Johnston 
96a422084aSMark Johnston typedef struct kmsan_td {
97a422084aSMark Johnston 	size_t ctx;
98a422084aSMark Johnston 	msan_tls_t tls[MSAN_NCONTEXT];
99a422084aSMark Johnston } msan_td_t;
100a422084aSMark Johnston 
101a422084aSMark Johnston static msan_tls_t dummy_tls;
102a422084aSMark Johnston 
103a422084aSMark Johnston /*
104a422084aSMark Johnston  * Use separate dummy regions for loads and stores: stores may mark the region
105a422084aSMark Johnston  * as uninitialized, and that can trigger false positives.
106a422084aSMark Johnston  */
107a422084aSMark Johnston static uint8_t msan_dummy_shad[PAGE_SIZE] __aligned(PAGE_SIZE);
108a422084aSMark Johnston static uint8_t msan_dummy_write_shad[PAGE_SIZE] __aligned(PAGE_SIZE);
109a422084aSMark Johnston static uint8_t msan_dummy_orig[PAGE_SIZE] __aligned(PAGE_SIZE);
110a422084aSMark Johnston static msan_td_t msan_thread0;
111a422084aSMark Johnston static bool kmsan_reporting = false;
112a422084aSMark Johnston 
113a422084aSMark Johnston /*
114a422084aSMark Johnston  * Avoid clobbering any thread-local state before we panic.
115a422084aSMark Johnston  */
116a422084aSMark Johnston #define	kmsan_panic(f, ...) do {			\
1171d2b7437SZhenlei Huang 	kmsan_disabled = true;				\
118a422084aSMark Johnston 	panic(f, __VA_ARGS__);				\
119a422084aSMark Johnston } while (0)
120a422084aSMark Johnston 
121a422084aSMark Johnston #define	REPORT(f, ...) do {				\
122a422084aSMark Johnston 	if (panic_on_violation) {			\
123a422084aSMark Johnston 		kmsan_panic(f, __VA_ARGS__);		\
124a422084aSMark Johnston 	} else {					\
125a422084aSMark Johnston 		struct stack st;			\
126a422084aSMark Johnston 							\
127a422084aSMark Johnston 		stack_save(&st);			\
128a422084aSMark Johnston 		printf(f "\n", __VA_ARGS__);		\
129a422084aSMark Johnston 		stack_print_ddb(&st);			\
130a422084aSMark Johnston 	}						\
131a422084aSMark Johnston } while (0)
132a422084aSMark Johnston 
133a422084aSMark Johnston FEATURE(kmsan, "Kernel memory sanitizer");
134a422084aSMark Johnston 
135a422084aSMark Johnston static SYSCTL_NODE(_debug, OID_AUTO, kmsan, CTLFLAG_RD | CTLFLAG_MPSAFE, 0,
136a422084aSMark Johnston     "KMSAN options");
137a422084aSMark Johnston 
138a422084aSMark Johnston static bool panic_on_violation = 1;
139a422084aSMark Johnston SYSCTL_BOOL(_debug_kmsan, OID_AUTO, panic_on_violation, CTLFLAG_RWTUN,
140a422084aSMark Johnston     &panic_on_violation, 0,
141a422084aSMark Johnston     "Panic if an invalid access is detected");
142a422084aSMark Johnston 
1431d2b7437SZhenlei Huang static bool kmsan_disabled __read_mostly = true;
1441d2b7437SZhenlei Huang #define kmsan_enabled (!kmsan_disabled)
1451d2b7437SZhenlei Huang SYSCTL_BOOL(_debug_kmsan, OID_AUTO, disabled, CTLFLAG_RDTUN | CTLFLAG_NOFETCH,
1461d2b7437SZhenlei Huang     &kmsan_disabled, 0, "KMSAN is disabled");
1471d2b7437SZhenlei Huang 
148a422084aSMark Johnston static MALLOC_DEFINE(M_KMSAN, "kmsan", "Kernel memory sanitizer");
149a422084aSMark Johnston 
150a422084aSMark Johnston /* -------------------------------------------------------------------------- */
151a422084aSMark Johnston 
152a422084aSMark Johnston static inline const char *
153a422084aSMark Johnston kmsan_orig_name(int type)
154a422084aSMark Johnston {
155a422084aSMark Johnston 	switch (type) {
156a422084aSMark Johnston 	case KMSAN_TYPE_STACK:
157a422084aSMark Johnston 		return ("stack");
158a422084aSMark Johnston 	case KMSAN_TYPE_KMEM:
159a422084aSMark Johnston 		return ("kmem");
160a422084aSMark Johnston 	case KMSAN_TYPE_MALLOC:
161a422084aSMark Johnston 		return ("malloc");
162a422084aSMark Johnston 	case KMSAN_TYPE_UMA:
163a422084aSMark Johnston 		return ("UMA");
164a422084aSMark Johnston 	default:
165a422084aSMark Johnston 		return ("unknown");
166a422084aSMark Johnston 	}
167a422084aSMark Johnston }
168a422084aSMark Johnston 
169a422084aSMark Johnston static void
170ca6cd604SMark Johnston kmsan_report_hook(const void *addr, msan_orig_t *orig, size_t size, size_t off,
171ca6cd604SMark Johnston     const char *hook)
172a422084aSMark Johnston {
173a422084aSMark Johnston 	const char *typename;
174a422084aSMark Johnston 	char *var, *fn;
175a422084aSMark Johnston 	uintptr_t ptr;
176a422084aSMark Johnston 	long foff;
177a422084aSMark Johnston 	char buf[128];
178a422084aSMark Johnston 	int type;
179a422084aSMark Johnston 
18035eb9b10SMitchell Horne 	if (__predict_false(KERNEL_PANICKED() || kdb_active || kmsan_reporting))
181a422084aSMark Johnston 		return;
182a422084aSMark Johnston 
183a422084aSMark Johnston 	kmsan_reporting = true;
184a422084aSMark Johnston 	__compiler_membar();
185a422084aSMark Johnston 
186a422084aSMark Johnston 	if (*orig == 0) {
187a422084aSMark Johnston 		REPORT("MSan: Uninitialized memory in %s, offset %zu",
188a422084aSMark Johnston 		    hook, off);
189a422084aSMark Johnston 		goto out;
190a422084aSMark Johnston 	}
191a422084aSMark Johnston 
192a422084aSMark Johnston 	kmsan_md_orig_decode(*orig, &type, &ptr);
193a422084aSMark Johnston 	typename = kmsan_orig_name(type);
194a422084aSMark Johnston 
195a422084aSMark Johnston 	if (linker_ddb_search_symbol_name((caddr_t)ptr, buf,
196a422084aSMark Johnston 	    sizeof(buf), &foff) == 0) {
197a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory in %s, "
198a422084aSMark Johnston 		    "offset %zu/%zu, addr %p, from %s+%#lx",
199a422084aSMark Johnston 		    typename, hook, off, size, addr, buf, foff);
200a422084aSMark Johnston 	} else if (__builtin_memcmp((void *)ptr, "----", 4) == 0) {
201a422084aSMark Johnston 		/*
202a422084aSMark Johnston 		 * The format of the string is: "----var@function". Parse it to
203a422084aSMark Johnston 		 * display a nice warning.
204a422084aSMark Johnston 		 */
205a422084aSMark Johnston 		var = (char *)ptr + 4;
206a422084aSMark Johnston 		strlcpy(buf, var, sizeof(buf));
207a422084aSMark Johnston 		var = buf;
208a422084aSMark Johnston 		fn = strchr(buf, '@');
209a422084aSMark Johnston 		*fn++ = '\0';
210a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory in %s, offset %zu, "
211a422084aSMark Johnston 		    "variable '%s' from %s", typename, hook, off, var, fn);
212a422084aSMark Johnston 	} else {
213a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory in %s, "
214a422084aSMark Johnston 		    "offset %zu/%zu, addr %p, PC %p",
215a422084aSMark Johnston 		    typename, hook, off, size, addr, (void *)ptr);
216a422084aSMark Johnston 	}
217a422084aSMark Johnston 
218a422084aSMark Johnston out:
219a422084aSMark Johnston 	__compiler_membar();
220a422084aSMark Johnston 	kmsan_reporting = false;
221a422084aSMark Johnston }
222a422084aSMark Johnston 
223a422084aSMark Johnston static void
224a422084aSMark Johnston kmsan_report_inline(msan_orig_t orig, unsigned long pc)
225a422084aSMark Johnston {
226a422084aSMark Johnston 	const char *typename;
227a422084aSMark Johnston 	char *var, *fn;
228a422084aSMark Johnston 	uintptr_t ptr;
229a422084aSMark Johnston 	char buf[128];
230a422084aSMark Johnston 	long foff;
231a422084aSMark Johnston 	int type;
232a422084aSMark Johnston 
23335eb9b10SMitchell Horne 	if (__predict_false(KERNEL_PANICKED() || kdb_active || kmsan_reporting))
234a422084aSMark Johnston 		return;
235a422084aSMark Johnston 
236a422084aSMark Johnston 	kmsan_reporting = true;
237a422084aSMark Johnston 	__compiler_membar();
238a422084aSMark Johnston 
239a422084aSMark Johnston 	if (orig == 0) {
240a422084aSMark Johnston 		REPORT("MSan: uninitialized variable in %p", (void *)pc);
241a422084aSMark Johnston 		goto out;
242a422084aSMark Johnston 	}
243a422084aSMark Johnston 
244a422084aSMark Johnston 	kmsan_md_orig_decode(orig, &type, &ptr);
245a422084aSMark Johnston 	typename = kmsan_orig_name(type);
246a422084aSMark Johnston 
247a422084aSMark Johnston 	if (linker_ddb_search_symbol_name((caddr_t)ptr, buf,
248a422084aSMark Johnston 	    sizeof(buf), &foff) == 0) {
249a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory from %s+%#lx",
250a422084aSMark Johnston 		    typename, buf, foff);
251a422084aSMark Johnston 	} else if (__builtin_memcmp((void *)ptr, "----", 4) == 0) {
252a422084aSMark Johnston 		/*
253a422084aSMark Johnston 		 * The format of the string is: "----var@function". Parse it to
254a422084aSMark Johnston 		 * display a nice warning.
255a422084aSMark Johnston 		 */
256a422084aSMark Johnston 		var = (char *)ptr + 4;
257a422084aSMark Johnston 		strlcpy(buf, var, sizeof(buf));
258a422084aSMark Johnston 		var = buf;
259a422084aSMark Johnston 		fn = strchr(buf, '@');
260a422084aSMark Johnston 		*fn++ = '\0';
261a422084aSMark Johnston 		REPORT("MSan: Uninitialized variable '%s' from %s", var, fn);
262a422084aSMark Johnston 	} else {
263a422084aSMark Johnston 		REPORT("MSan: Uninitialized %s memory, origin %x",
264a422084aSMark Johnston 		    typename, orig);
265a422084aSMark Johnston 	}
266a422084aSMark Johnston 
267a422084aSMark Johnston out:
268a422084aSMark Johnston 	__compiler_membar();
269a422084aSMark Johnston 	kmsan_reporting = false;
270a422084aSMark Johnston }
271a422084aSMark Johnston 
272a422084aSMark Johnston /* -------------------------------------------------------------------------- */
273a422084aSMark Johnston 
274a422084aSMark Johnston static inline msan_meta_t
275a422084aSMark Johnston kmsan_meta_get(const void *addr, size_t size, const bool write)
276a422084aSMark Johnston {
277a422084aSMark Johnston 	msan_meta_t ret;
278a422084aSMark Johnston 
279a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled)) {
280a422084aSMark Johnston 		ret.shad = write ? msan_dummy_write_shad : msan_dummy_shad;
281a422084aSMark Johnston 		ret.orig = (msan_orig_t *)msan_dummy_orig;
282a422084aSMark Johnston 	} else if (__predict_false(kmsan_md_unsupported((vm_offset_t)addr))) {
283a422084aSMark Johnston 		ret.shad = write ? msan_dummy_write_shad : msan_dummy_shad;
284a422084aSMark Johnston 		ret.orig = (msan_orig_t *)msan_dummy_orig;
285a422084aSMark Johnston 	} else {
286a422084aSMark Johnston 		ret.shad = (void *)kmsan_md_addr_to_shad((vm_offset_t)addr);
287a422084aSMark Johnston 		ret.orig =
288a422084aSMark Johnston 		    (msan_orig_t *)kmsan_md_addr_to_orig((vm_offset_t)addr);
289a422084aSMark Johnston 		ret.orig = (msan_orig_t *)((uintptr_t)ret.orig &
290a422084aSMark Johnston 		    MSAN_ORIG_MASK);
291a422084aSMark Johnston 	}
292a422084aSMark Johnston 
293a422084aSMark Johnston 	return (ret);
294a422084aSMark Johnston }
295a422084aSMark Johnston 
296a422084aSMark Johnston static inline void
297a422084aSMark Johnston kmsan_origin_fill(const void *addr, msan_orig_t o, size_t size)
298a422084aSMark Johnston {
299a422084aSMark Johnston 	msan_orig_t *orig;
300a422084aSMark Johnston 	size_t i;
301a422084aSMark Johnston 
302a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
303a422084aSMark Johnston 		return;
304a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported((vm_offset_t)addr)))
305a422084aSMark Johnston 		return;
306a422084aSMark Johnston 
307a422084aSMark Johnston 	orig = (msan_orig_t *)kmsan_md_addr_to_orig((vm_offset_t)addr);
308a422084aSMark Johnston 	size += ((uintptr_t)orig & (sizeof(*orig) - 1));
309a422084aSMark Johnston 	orig = (msan_orig_t *)((uintptr_t)orig & MSAN_ORIG_MASK);
310a422084aSMark Johnston 
311a422084aSMark Johnston 	for (i = 0; i < size; i += 4) {
312a422084aSMark Johnston 		orig[i / 4] = o;
313a422084aSMark Johnston 	}
314a422084aSMark Johnston }
315a422084aSMark Johnston 
316a422084aSMark Johnston static inline void
317a422084aSMark Johnston kmsan_shadow_fill(uintptr_t addr, uint8_t c, size_t size)
318a422084aSMark Johnston {
319a422084aSMark Johnston 	uint8_t *shad;
320a422084aSMark Johnston 
321a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
322a422084aSMark Johnston 		return;
323a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported(addr)))
324a422084aSMark Johnston 		return;
325a422084aSMark Johnston 
326a422084aSMark Johnston 	shad = (uint8_t *)kmsan_md_addr_to_shad(addr);
327a422084aSMark Johnston 	__builtin_memset(shad, c, size);
328a422084aSMark Johnston }
329a422084aSMark Johnston 
330a422084aSMark Johnston static inline void
331a422084aSMark Johnston kmsan_meta_copy(void *dst, const void *src, size_t size)
332a422084aSMark Johnston {
333a422084aSMark Johnston 	uint8_t *orig_src, *orig_dst;
334a422084aSMark Johnston 	uint8_t *shad_src, *shad_dst;
335a422084aSMark Johnston 	msan_orig_t *_src, *_dst;
336a422084aSMark Johnston 	size_t i;
337a422084aSMark Johnston 
338a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
339a422084aSMark Johnston 		return;
340a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported((vm_offset_t)dst)))
341a422084aSMark Johnston 		return;
342a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported((vm_offset_t)src))) {
343a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)dst, KMSAN_STATE_INITED, size);
344a422084aSMark Johnston 		return;
345a422084aSMark Johnston 	}
346a422084aSMark Johnston 
347a422084aSMark Johnston 	shad_src = (uint8_t *)kmsan_md_addr_to_shad((vm_offset_t)src);
348a422084aSMark Johnston 	shad_dst = (uint8_t *)kmsan_md_addr_to_shad((vm_offset_t)dst);
349a422084aSMark Johnston 	__builtin_memmove(shad_dst, shad_src, size);
350a422084aSMark Johnston 
351a422084aSMark Johnston 	orig_src = (uint8_t *)kmsan_md_addr_to_orig((vm_offset_t)src);
352a422084aSMark Johnston 	orig_dst = (uint8_t *)kmsan_md_addr_to_orig((vm_offset_t)dst);
353a422084aSMark Johnston 	for (i = 0; i < size; i++) {
354a422084aSMark Johnston 		_src = (msan_orig_t *)((uintptr_t)orig_src & MSAN_ORIG_MASK);
355a422084aSMark Johnston 		_dst = (msan_orig_t *)((uintptr_t)orig_dst & MSAN_ORIG_MASK);
356a422084aSMark Johnston 		*_dst = *_src;
357a422084aSMark Johnston 		orig_src++;
358a422084aSMark Johnston 		orig_dst++;
359a422084aSMark Johnston 	}
360a422084aSMark Johnston }
361a422084aSMark Johnston 
362a422084aSMark Johnston static inline void
363a422084aSMark Johnston kmsan_shadow_check(uintptr_t addr, size_t size, const char *hook)
364a422084aSMark Johnston {
365ca6cd604SMark Johnston 	msan_orig_t *orig;
366a422084aSMark Johnston 	uint8_t *shad;
367a422084aSMark Johnston 	size_t i;
368a422084aSMark Johnston 
369a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
370a422084aSMark Johnston 		return;
371a422084aSMark Johnston 	if (__predict_false(kmsan_md_unsupported(addr)))
372a422084aSMark Johnston 		return;
373a422084aSMark Johnston 
374a422084aSMark Johnston 	shad = (uint8_t *)kmsan_md_addr_to_shad(addr);
375a422084aSMark Johnston 	for (i = 0; i < size; i++) {
376a422084aSMark Johnston 		if (__predict_true(shad[i] == 0))
377a422084aSMark Johnston 			continue;
378ca6cd604SMark Johnston 		orig = (msan_orig_t *)kmsan_md_addr_to_orig((vm_offset_t)&shad[i]);
379ca6cd604SMark Johnston 		orig = (msan_orig_t *)((uintptr_t)orig & MSAN_ORIG_MASK);
380ca6cd604SMark Johnston 		kmsan_report_hook((const char *)addr + i, orig, size, i, hook);
381a422084aSMark Johnston 		break;
382a422084aSMark Johnston 	}
383a422084aSMark Johnston }
384a422084aSMark Johnston 
385a422084aSMark Johnston void
386a422084aSMark Johnston kmsan_init_arg(size_t n)
387a422084aSMark Johnston {
388a422084aSMark Johnston 	msan_td_t *mtd;
389a422084aSMark Johnston 	uint8_t *arg;
390a422084aSMark Johnston 
391a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
392a422084aSMark Johnston 		return;
393a422084aSMark Johnston 	if (__predict_false(curthread == NULL))
394a422084aSMark Johnston 		return;
395a422084aSMark Johnston 	mtd = curthread->td_kmsan;
396a422084aSMark Johnston 	arg = mtd->tls[mtd->ctx].param_shadow;
397a422084aSMark Johnston 	__builtin_memset(arg, 0, n);
398a422084aSMark Johnston }
399a422084aSMark Johnston 
400a422084aSMark Johnston void
401a422084aSMark Johnston kmsan_init_ret(size_t n)
402a422084aSMark Johnston {
403a422084aSMark Johnston 	msan_td_t *mtd;
404a422084aSMark Johnston 	uint8_t *arg;
405a422084aSMark Johnston 
406a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
407a422084aSMark Johnston 		return;
408a422084aSMark Johnston 	if (__predict_false(curthread == NULL))
409a422084aSMark Johnston 		return;
410a422084aSMark Johnston 	mtd = curthread->td_kmsan;
411a422084aSMark Johnston 	arg = mtd->tls[mtd->ctx].retval_shadow;
412a422084aSMark Johnston 	__builtin_memset(arg, 0, n);
413a422084aSMark Johnston }
414a422084aSMark Johnston 
415a422084aSMark Johnston static void
416a422084aSMark Johnston kmsan_check_arg(size_t size, const char *hook)
417a422084aSMark Johnston {
418ca6cd604SMark Johnston 	msan_orig_t *orig;
419a422084aSMark Johnston 	msan_td_t *mtd;
420a422084aSMark Johnston 	uint8_t *arg;
421ca6cd604SMark Johnston 	size_t ctx, i;
422a422084aSMark Johnston 
423a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
424a422084aSMark Johnston 		return;
425a422084aSMark Johnston 	if (__predict_false(curthread == NULL))
426a422084aSMark Johnston 		return;
427a422084aSMark Johnston 	mtd = curthread->td_kmsan;
428ca6cd604SMark Johnston 	ctx = mtd->ctx;
429ca6cd604SMark Johnston 	arg = mtd->tls[ctx].param_shadow;
430a422084aSMark Johnston 
431a422084aSMark Johnston 	for (i = 0; i < size; i++) {
432a422084aSMark Johnston 		if (__predict_true(arg[i] == 0))
433a422084aSMark Johnston 			continue;
434ca6cd604SMark Johnston 		orig = &mtd->tls[ctx].param_origin[i / sizeof(msan_orig_t)];
435ca6cd604SMark Johnston 		kmsan_report_hook((const char *)arg + i, orig, size, i, hook);
436a422084aSMark Johnston 		break;
437a422084aSMark Johnston 	}
438a422084aSMark Johnston }
439a422084aSMark Johnston 
440a422084aSMark Johnston void
441a422084aSMark Johnston kmsan_thread_alloc(struct thread *td)
442a422084aSMark Johnston {
443a422084aSMark Johnston 	msan_td_t *mtd;
444a422084aSMark Johnston 
445a422084aSMark Johnston 	if (!kmsan_enabled)
446a422084aSMark Johnston 		return;
447a422084aSMark Johnston 
448a422084aSMark Johnston 	mtd = td->td_kmsan;
449a422084aSMark Johnston 	if (mtd == NULL) {
450a422084aSMark Johnston 		/* We might be recycling a thread. */
451a422084aSMark Johnston 		kmsan_init_arg(sizeof(size_t) + sizeof(struct malloc_type *) +
452a422084aSMark Johnston 		    sizeof(int));
453a422084aSMark Johnston 		mtd = malloc(sizeof(*mtd), M_KMSAN, M_WAITOK);
454a422084aSMark Johnston 	}
455*e5caed14SMark Johnston 	__builtin_memset(mtd, 0, sizeof(*mtd));
456a422084aSMark Johnston 	mtd->ctx = 0;
457a422084aSMark Johnston 
458a422084aSMark Johnston 	if (td->td_kstack != 0)
459a422084aSMark Johnston 		kmsan_mark((void *)td->td_kstack, ptoa(td->td_kstack_pages),
460a422084aSMark Johnston 		    KMSAN_STATE_UNINIT);
461a422084aSMark Johnston 
462a422084aSMark Johnston 	td->td_kmsan = mtd;
463a422084aSMark Johnston }
464a422084aSMark Johnston 
465a422084aSMark Johnston void
466a422084aSMark Johnston kmsan_thread_free(struct thread *td)
467a422084aSMark Johnston {
468a422084aSMark Johnston 	msan_td_t *mtd;
469a422084aSMark Johnston 
470a422084aSMark Johnston 	if (!kmsan_enabled)
471a422084aSMark Johnston 		return;
472a422084aSMark Johnston 	if (__predict_false(td == curthread))
473a422084aSMark Johnston 		kmsan_panic("%s: freeing KMSAN TLS for curthread", __func__);
474a422084aSMark Johnston 
475a422084aSMark Johnston 	mtd = td->td_kmsan;
476a422084aSMark Johnston 	kmsan_init_arg(sizeof(void *) + sizeof(struct malloc_type *));
477a422084aSMark Johnston 	free(mtd, M_KMSAN);
478a422084aSMark Johnston 	td->td_kmsan = NULL;
479a422084aSMark Johnston }
480a422084aSMark Johnston 
481a422084aSMark Johnston void kmsan_intr_enter(void);
482a422084aSMark Johnston void kmsan_intr_leave(void);
483a422084aSMark Johnston 
484a422084aSMark Johnston void
485a422084aSMark Johnston kmsan_intr_enter(void)
486a422084aSMark Johnston {
487a422084aSMark Johnston 	msan_td_t *mtd;
488a422084aSMark Johnston 
489a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
490a422084aSMark Johnston 		return;
491a422084aSMark Johnston 
492a422084aSMark Johnston 	mtd = curthread->td_kmsan;
493a422084aSMark Johnston 	mtd->ctx++;
494a422084aSMark Johnston 	if (__predict_false(mtd->ctx >= MSAN_NCONTEXT))
495a422084aSMark Johnston 		kmsan_panic("%s: mtd->ctx = %zu", __func__, mtd->ctx);
496a422084aSMark Johnston }
497a422084aSMark Johnston 
498a422084aSMark Johnston void
499a422084aSMark Johnston kmsan_intr_leave(void)
500a422084aSMark Johnston {
501a422084aSMark Johnston 	msan_td_t *mtd;
502a422084aSMark Johnston 
503a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
504a422084aSMark Johnston 		return;
505a422084aSMark Johnston 
506a422084aSMark Johnston 	mtd = curthread->td_kmsan;
507a422084aSMark Johnston 	if (__predict_false(mtd->ctx == 0))
508a422084aSMark Johnston 		kmsan_panic("%s: mtd->ctx = %zu", __func__, mtd->ctx);
509a422084aSMark Johnston 	mtd->ctx--;
510a422084aSMark Johnston }
511a422084aSMark Johnston 
512a422084aSMark Johnston /* -------------------------------------------------------------------------- */
513a422084aSMark Johnston 
514a422084aSMark Johnston void
515a422084aSMark Johnston kmsan_shadow_map(vm_offset_t addr, size_t size)
516a422084aSMark Johnston {
517a422084aSMark Johnston 	size_t npages, i;
518a422084aSMark Johnston 	vm_offset_t va;
519a422084aSMark Johnston 
520a422084aSMark Johnston 	MPASS(addr % PAGE_SIZE == 0);
521a422084aSMark Johnston 	MPASS(size % PAGE_SIZE == 0);
522a422084aSMark Johnston 
523a422084aSMark Johnston 	if (!kmsan_enabled)
524a422084aSMark Johnston 		return;
525a422084aSMark Johnston 
526a422084aSMark Johnston 	npages = atop(size);
527a422084aSMark Johnston 
528a422084aSMark Johnston 	va = kmsan_md_addr_to_shad(addr);
529a422084aSMark Johnston 	for (i = 0; i < npages; i++) {
530175d3380SMark Johnston 		pmap_san_enter(va + ptoa(i));
531a422084aSMark Johnston 	}
532a422084aSMark Johnston 
533a422084aSMark Johnston 	va = kmsan_md_addr_to_orig(addr);
534a422084aSMark Johnston 	for (i = 0; i < npages; i++) {
535175d3380SMark Johnston 		pmap_san_enter(va + ptoa(i));
536a422084aSMark Johnston 	}
537a422084aSMark Johnston }
538a422084aSMark Johnston 
539a422084aSMark Johnston void
540a422084aSMark Johnston kmsan_orig(const void *addr, size_t size, int type, uintptr_t pc)
541a422084aSMark Johnston {
542a422084aSMark Johnston 	msan_orig_t orig;
543a422084aSMark Johnston 
544a422084aSMark Johnston 	orig = kmsan_md_orig_encode(type, pc);
545a422084aSMark Johnston 	kmsan_origin_fill(addr, orig, size);
546a422084aSMark Johnston }
547a422084aSMark Johnston 
548a422084aSMark Johnston void
549a422084aSMark Johnston kmsan_mark(const void *addr, size_t size, uint8_t c)
550a422084aSMark Johnston {
551a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, c, size);
552a422084aSMark Johnston }
553a422084aSMark Johnston 
55410a8e93dSMark Johnston void
555a422084aSMark Johnston kmsan_mark_bio(const struct bio *bp, uint8_t c)
556a422084aSMark Johnston {
557a422084aSMark Johnston 	kmsan_mark(bp->bio_data, bp->bio_length, c);
558a422084aSMark Johnston }
559a422084aSMark Johnston 
56010a8e93dSMark Johnston void
561a422084aSMark Johnston kmsan_mark_mbuf(const struct mbuf *m, uint8_t c)
562a422084aSMark Johnston {
563a422084aSMark Johnston 	do {
564a422084aSMark Johnston 		if ((m->m_flags & M_EXTPG) == 0)
565a422084aSMark Johnston 			kmsan_mark(m->m_data, m->m_len, c);
566a422084aSMark Johnston 		m = m->m_next;
567a422084aSMark Johnston 	} while (m != NULL);
568a422084aSMark Johnston }
569a422084aSMark Johnston 
570a422084aSMark Johnston void
571a422084aSMark Johnston kmsan_check(const void *p, size_t sz, const char *descr)
572a422084aSMark Johnston {
573a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)p, sz, descr);
574a422084aSMark Johnston }
575a422084aSMark Johnston 
576a422084aSMark Johnston void
577a422084aSMark Johnston kmsan_check_bio(const struct bio *bp, const char *descr)
578a422084aSMark Johnston {
579a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)bp->bio_data, bp->bio_length, descr);
580a422084aSMark Johnston }
581a422084aSMark Johnston 
582a422084aSMark Johnston void
583a422084aSMark Johnston kmsan_check_mbuf(const struct mbuf *m, const char *descr)
584a422084aSMark Johnston {
585a422084aSMark Johnston 	do {
586a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)mtod(m, void *), m->m_len, descr);
587a422084aSMark Johnston 	} while ((m = m->m_next) != NULL);
588a422084aSMark Johnston }
589a422084aSMark Johnston 
590a422084aSMark Johnston void
591a422084aSMark Johnston kmsan_init(void)
592a422084aSMark Johnston {
593a422084aSMark Johnston 	int disabled;
594a422084aSMark Johnston 
595a422084aSMark Johnston 	disabled = 0;
596a422084aSMark Johnston 	TUNABLE_INT_FETCH("debug.kmsan.disabled", &disabled);
597a422084aSMark Johnston 	if (disabled)
598a422084aSMark Johnston 		return;
599a422084aSMark Johnston 
600a422084aSMark Johnston 	/* Initialize the TLS for curthread. */
601a422084aSMark Johnston 	msan_thread0.ctx = 0;
602a422084aSMark Johnston 	thread0.td_kmsan = &msan_thread0;
603a422084aSMark Johnston 
604a422084aSMark Johnston 	/* Now officially enabled. */
6051d2b7437SZhenlei Huang 	kmsan_disabled = false;
606a422084aSMark Johnston }
607a422084aSMark Johnston 
608a422084aSMark Johnston /* -------------------------------------------------------------------------- */
609a422084aSMark Johnston 
610a422084aSMark Johnston msan_meta_t __msan_metadata_ptr_for_load_n(void *, size_t);
611a422084aSMark Johnston msan_meta_t __msan_metadata_ptr_for_store_n(void *, size_t);
612a422084aSMark Johnston 
613a422084aSMark Johnston msan_meta_t
614a422084aSMark Johnston __msan_metadata_ptr_for_load_n(void *addr, size_t size)
615a422084aSMark Johnston {
616a422084aSMark Johnston 	return (kmsan_meta_get(addr, size, false));
617a422084aSMark Johnston }
618a422084aSMark Johnston 
619a422084aSMark Johnston msan_meta_t
620a422084aSMark Johnston __msan_metadata_ptr_for_store_n(void *addr, size_t size)
621a422084aSMark Johnston {
622a422084aSMark Johnston 	return (kmsan_meta_get(addr, size, true));
623a422084aSMark Johnston }
624a422084aSMark Johnston 
625a422084aSMark Johnston #define MSAN_META_FUNC(size)						\
626a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_load_##size(void *);	\
627a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_load_##size(void *addr)	\
628a422084aSMark Johnston 	{								\
629a422084aSMark Johnston 		return (kmsan_meta_get(addr, size, false));		\
630a422084aSMark Johnston 	}								\
631a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_store_##size(void *);	\
632a422084aSMark Johnston 	msan_meta_t __msan_metadata_ptr_for_store_##size(void *addr)	\
633a422084aSMark Johnston 	{								\
634a422084aSMark Johnston 		return (kmsan_meta_get(addr, size, true));		\
635a422084aSMark Johnston 	}
636a422084aSMark Johnston 
637a422084aSMark Johnston MSAN_META_FUNC(1)
638a422084aSMark Johnston MSAN_META_FUNC(2)
639a422084aSMark Johnston MSAN_META_FUNC(4)
640a422084aSMark Johnston MSAN_META_FUNC(8)
641a422084aSMark Johnston 
642a422084aSMark Johnston void __msan_instrument_asm_store(const void *, size_t);
643a422084aSMark Johnston msan_orig_t __msan_chain_origin(msan_orig_t);
644a422084aSMark Johnston void __msan_poison(const void *, size_t);
645a422084aSMark Johnston void __msan_unpoison(const void *, size_t);
646a422084aSMark Johnston void __msan_poison_alloca(const void *, uint64_t, const char *);
647a422084aSMark Johnston void __msan_unpoison_alloca(const void *, uint64_t);
648a422084aSMark Johnston void __msan_warning(msan_orig_t);
649a422084aSMark Johnston msan_tls_t *__msan_get_context_state(void);
650a422084aSMark Johnston 
651a422084aSMark Johnston void
652a422084aSMark Johnston __msan_instrument_asm_store(const void *addr, size_t size)
653a422084aSMark Johnston {
654a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_INITED, size);
655a422084aSMark Johnston }
656a422084aSMark Johnston 
657a422084aSMark Johnston msan_orig_t
658a422084aSMark Johnston __msan_chain_origin(msan_orig_t origin)
659a422084aSMark Johnston {
660a422084aSMark Johnston 	return (origin);
661a422084aSMark Johnston }
662a422084aSMark Johnston 
663a422084aSMark Johnston void
664a422084aSMark Johnston __msan_poison(const void *addr, size_t size)
665a422084aSMark Johnston {
666a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_UNINIT, size);
667a422084aSMark Johnston }
668a422084aSMark Johnston 
669a422084aSMark Johnston void
670a422084aSMark Johnston __msan_unpoison(const void *addr, size_t size)
671a422084aSMark Johnston {
672a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_INITED, size);
673a422084aSMark Johnston }
674a422084aSMark Johnston 
675a422084aSMark Johnston void
676a422084aSMark Johnston __msan_poison_alloca(const void *addr, uint64_t size, const char *descr)
677a422084aSMark Johnston {
678a422084aSMark Johnston 	msan_orig_t orig;
679a422084aSMark Johnston 
680a422084aSMark Johnston 	orig = kmsan_md_orig_encode(KMSAN_TYPE_STACK, (uintptr_t)descr);
681a422084aSMark Johnston 	kmsan_origin_fill(addr, orig, size);
682a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_UNINIT, size);
683a422084aSMark Johnston }
684a422084aSMark Johnston 
685a422084aSMark Johnston void
686a422084aSMark Johnston __msan_unpoison_alloca(const void *addr, uint64_t size)
687a422084aSMark Johnston {
688a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)addr, KMSAN_STATE_INITED, size);
689a422084aSMark Johnston }
690a422084aSMark Johnston 
691a422084aSMark Johnston void
692a422084aSMark Johnston __msan_warning(msan_orig_t origin)
693a422084aSMark Johnston {
694a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled))
695a422084aSMark Johnston 		return;
696a422084aSMark Johnston 	kmsan_report_inline(origin, KMSAN_RET_ADDR);
697a422084aSMark Johnston }
698a422084aSMark Johnston 
699a422084aSMark Johnston msan_tls_t *
700a422084aSMark Johnston __msan_get_context_state(void)
701a422084aSMark Johnston {
702a422084aSMark Johnston 	msan_td_t *mtd;
703a422084aSMark Johnston 
704a422084aSMark Johnston 	/*
705a422084aSMark Johnston 	 * When APs are started, they execute some C code before curthread is
706a422084aSMark Johnston 	 * set.  We have to handle that here.
707a422084aSMark Johnston 	 */
708a422084aSMark Johnston 	if (__predict_false(!kmsan_enabled || curthread == NULL))
709a422084aSMark Johnston 		return (&dummy_tls);
710a422084aSMark Johnston 	mtd = curthread->td_kmsan;
711a422084aSMark Johnston 	return (&mtd->tls[mtd->ctx]);
712a422084aSMark Johnston }
713a422084aSMark Johnston 
714a422084aSMark Johnston /* -------------------------------------------------------------------------- */
715a422084aSMark Johnston 
716a422084aSMark Johnston /*
717a422084aSMark Johnston  * Function hooks. Mostly ASM functions which need KMSAN wrappers to handle
718a422084aSMark Johnston  * initialized areas properly.
719a422084aSMark Johnston  */
720a422084aSMark Johnston 
721a422084aSMark Johnston void *
722a422084aSMark Johnston kmsan_memcpy(void *dst, const void *src, size_t len)
723a422084aSMark Johnston {
724a422084aSMark Johnston 	/* No kmsan_check_arg, because inlined. */
725a422084aSMark Johnston 	kmsan_init_ret(sizeof(void *));
726a422084aSMark Johnston 	if (__predict_true(len != 0)) {
727a422084aSMark Johnston 		kmsan_meta_copy(dst, src, len);
728a422084aSMark Johnston 	}
729a422084aSMark Johnston 	return (__builtin_memcpy(dst, src, len));
730a422084aSMark Johnston }
731a422084aSMark Johnston 
732a422084aSMark Johnston int
733a422084aSMark Johnston kmsan_memcmp(const void *b1, const void *b2, size_t len)
734a422084aSMark Johnston {
735a422084aSMark Johnston 	const uint8_t *_b1 = b1, *_b2 = b2;
736a422084aSMark Johnston 	size_t i;
737a422084aSMark Johnston 
738a422084aSMark Johnston 	kmsan_check_arg(sizeof(b1) + sizeof(b2) + sizeof(len),
739a422084aSMark Johnston 	    "memcmp():args");
740a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
741a422084aSMark Johnston 
742a422084aSMark Johnston 	for (i = 0; i < len; i++) {
743a422084aSMark Johnston 		if (*_b1 != *_b2) {
744a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)b1, i + 1,
745a422084aSMark Johnston 			    "memcmp():arg1");
746a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)b2, i + 1,
747a422084aSMark Johnston 			    "memcmp():arg2");
748a422084aSMark Johnston 			return (*_b1 - *_b2);
749a422084aSMark Johnston 		}
750a422084aSMark Johnston 		_b1++, _b2++;
751a422084aSMark Johnston 	}
752a422084aSMark Johnston 
753a422084aSMark Johnston 	return (0);
754a422084aSMark Johnston }
755a422084aSMark Johnston 
756a422084aSMark Johnston void *
757a422084aSMark Johnston kmsan_memset(void *dst, int c, size_t len)
758a422084aSMark Johnston {
759a422084aSMark Johnston 	/* No kmsan_check_arg, because inlined. */
760a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)dst, KMSAN_STATE_INITED, len);
761a422084aSMark Johnston 	kmsan_init_ret(sizeof(void *));
762a422084aSMark Johnston 	return (__builtin_memset(dst, c, len));
763a422084aSMark Johnston }
764a422084aSMark Johnston 
765a422084aSMark Johnston void *
766a422084aSMark Johnston kmsan_memmove(void *dst, const void *src, size_t len)
767a422084aSMark Johnston {
768a422084aSMark Johnston 	/* No kmsan_check_arg, because inlined. */
769a422084aSMark Johnston 	if (__predict_true(len != 0)) {
770a422084aSMark Johnston 		kmsan_meta_copy(dst, src, len);
771a422084aSMark Johnston 	}
772a422084aSMark Johnston 	kmsan_init_ret(sizeof(void *));
773a422084aSMark Johnston 	return (__builtin_memmove(dst, src, len));
774a422084aSMark Johnston }
775a422084aSMark Johnston 
776a422084aSMark Johnston __strong_reference(kmsan_memcpy, __msan_memcpy);
777a422084aSMark Johnston __strong_reference(kmsan_memset, __msan_memset);
778a422084aSMark Johnston __strong_reference(kmsan_memmove, __msan_memmove);
779a422084aSMark Johnston 
780a422084aSMark Johnston char *
781a422084aSMark Johnston kmsan_strcpy(char *dst, const char *src)
782a422084aSMark Johnston {
783a422084aSMark Johnston 	const char *_src = src;
784a422084aSMark Johnston 	char *_dst = dst;
785a422084aSMark Johnston 	size_t len = 0;
786a422084aSMark Johnston 
787a422084aSMark Johnston 	kmsan_check_arg(sizeof(dst) + sizeof(src), "strcpy():args");
788a422084aSMark Johnston 
789a422084aSMark Johnston 	while (1) {
790a422084aSMark Johnston 		len++;
791a422084aSMark Johnston 		*dst = *src;
792a422084aSMark Johnston 		if (*src == '\0')
793a422084aSMark Johnston 			break;
794a422084aSMark Johnston 		src++, dst++;
795a422084aSMark Johnston 	}
796a422084aSMark Johnston 
797a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)_src, len, "strcpy():arg2");
798a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)_dst, KMSAN_STATE_INITED, len);
799a422084aSMark Johnston 	kmsan_init_ret(sizeof(char *));
800a422084aSMark Johnston 	return (_dst);
801a422084aSMark Johnston }
802a422084aSMark Johnston 
803a422084aSMark Johnston int
804a422084aSMark Johnston kmsan_strcmp(const char *s1, const char *s2)
805a422084aSMark Johnston {
806a422084aSMark Johnston 	const char *_s1 = s1, *_s2 = s2;
807a422084aSMark Johnston 	size_t len = 0;
808a422084aSMark Johnston 
809a422084aSMark Johnston 	kmsan_check_arg(sizeof(s1) + sizeof(s2), "strcmp():args");
810a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
811a422084aSMark Johnston 
812a422084aSMark Johnston 	while (1) {
813a422084aSMark Johnston 		len++;
814a422084aSMark Johnston 		if (*s1 != *s2)
815a422084aSMark Johnston 			break;
816a422084aSMark Johnston 		if (*s1 == '\0') {
817a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)_s1, len, "strcmp():arg1");
818a422084aSMark Johnston 			kmsan_shadow_check((uintptr_t)_s2, len, "strcmp():arg2");
819a422084aSMark Johnston 			return (0);
820a422084aSMark Johnston 		}
821a422084aSMark Johnston 		s1++, s2++;
822a422084aSMark Johnston 	}
823a422084aSMark Johnston 
824a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)_s1, len, "strcmp():arg1");
825a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)_s2, len, "strcmp():arg2");
826a422084aSMark Johnston 
827a422084aSMark Johnston 	return (*(const unsigned char *)s1 - *(const unsigned char *)s2);
828a422084aSMark Johnston }
829a422084aSMark Johnston 
830a422084aSMark Johnston size_t
831a422084aSMark Johnston kmsan_strlen(const char *str)
832a422084aSMark Johnston {
833a422084aSMark Johnston 	const char *s;
834a422084aSMark Johnston 
835a422084aSMark Johnston 	kmsan_check_arg(sizeof(str), "strlen():args");
836a422084aSMark Johnston 
837a422084aSMark Johnston 	s = str;
838a422084aSMark Johnston 	while (1) {
839a422084aSMark Johnston 		if (*s == '\0')
840a422084aSMark Johnston 			break;
841a422084aSMark Johnston 		s++;
842a422084aSMark Johnston 	}
843a422084aSMark Johnston 
844a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)str, (size_t)(s - str) + 1, "strlen():arg1");
845a422084aSMark Johnston 	kmsan_init_ret(sizeof(size_t));
846a422084aSMark Johnston 	return (s - str);
847a422084aSMark Johnston }
848a422084aSMark Johnston 
849a422084aSMark Johnston int	kmsan_copyin(const void *, void *, size_t);
850a422084aSMark Johnston int	kmsan_copyout(const void *, void *, size_t);
851a422084aSMark Johnston int	kmsan_copyinstr(const void *, void *, size_t, size_t *);
852a422084aSMark Johnston 
853a422084aSMark Johnston int
854a422084aSMark Johnston kmsan_copyin(const void *uaddr, void *kaddr, size_t len)
855a422084aSMark Johnston {
856a422084aSMark Johnston 	int ret;
857a422084aSMark Johnston 
858a422084aSMark Johnston 	kmsan_check_arg(sizeof(uaddr) + sizeof(kaddr) + sizeof(len),
859a422084aSMark Johnston 	    "copyin():args");
860a422084aSMark Johnston 	ret = copyin(uaddr, kaddr, len);
861a422084aSMark Johnston 	if (ret == 0)
862a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)kaddr, KMSAN_STATE_INITED, len);
863a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
864a422084aSMark Johnston 	return (ret);
865a422084aSMark Johnston }
866a422084aSMark Johnston 
867a422084aSMark Johnston int
868a422084aSMark Johnston kmsan_copyout(const void *kaddr, void *uaddr, size_t len)
869a422084aSMark Johnston {
870a422084aSMark Johnston 	kmsan_check_arg(sizeof(kaddr) + sizeof(uaddr) + sizeof(len),
871a422084aSMark Johnston 	    "copyout():args");
872a422084aSMark Johnston 	kmsan_shadow_check((uintptr_t)kaddr, len, "copyout():arg1");
873a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
874a422084aSMark Johnston 	return (copyout(kaddr, uaddr, len));
875a422084aSMark Johnston }
876a422084aSMark Johnston 
877a422084aSMark Johnston int
878a422084aSMark Johnston kmsan_copyinstr(const void *uaddr, void *kaddr, size_t len, size_t *done)
879a422084aSMark Johnston {
880a422084aSMark Johnston 	size_t _done;
881a422084aSMark Johnston 	int ret;
882a422084aSMark Johnston 
883a422084aSMark Johnston 	kmsan_check_arg(sizeof(uaddr) + sizeof(kaddr) +
884a422084aSMark Johnston 	    sizeof(len) + sizeof(done), "copyinstr():args");
885a422084aSMark Johnston 	ret = copyinstr(uaddr, kaddr, len, &_done);
886a422084aSMark Johnston 	if (ret == 0)
887a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)kaddr, KMSAN_STATE_INITED, _done);
888a422084aSMark Johnston 	if (done != NULL) {
889a422084aSMark Johnston 		*done = _done;
890a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)done, KMSAN_STATE_INITED, sizeof(size_t));
891a422084aSMark Johnston 	}
892a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
893a422084aSMark Johnston 	return (ret);
894a422084aSMark Johnston }
895a422084aSMark Johnston 
896a422084aSMark Johnston /* -------------------------------------------------------------------------- */
897a422084aSMark Johnston 
898a422084aSMark Johnston int
899a422084aSMark Johnston kmsan_fubyte(volatile const void *base)
900a422084aSMark Johnston {
901a422084aSMark Johnston 	int ret;
902a422084aSMark Johnston 
903a422084aSMark Johnston 	kmsan_check_arg(sizeof(base), "fubyte(): args");
904a422084aSMark Johnston 	ret = fubyte(base);
905a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
906a422084aSMark Johnston 	return (ret);
907a422084aSMark Johnston }
908a422084aSMark Johnston 
909a422084aSMark Johnston int
910a422084aSMark Johnston kmsan_fuword16(volatile const void *base)
911a422084aSMark Johnston {
912a422084aSMark Johnston 	int ret;
913a422084aSMark Johnston 
914a422084aSMark Johnston 	kmsan_check_arg(sizeof(base), "fuword16(): args");
915a422084aSMark Johnston 	ret = fuword16(base);
916a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
917a422084aSMark Johnston 	return (ret);
918a422084aSMark Johnston }
919a422084aSMark Johnston 
920a422084aSMark Johnston int
921a422084aSMark Johnston kmsan_fueword(volatile const void *base, long *val)
922a422084aSMark Johnston {
923a422084aSMark Johnston 	int ret;
924a422084aSMark Johnston 
925a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(val), "fueword(): args");
926a422084aSMark Johnston 	ret = fueword(base, val);
927a422084aSMark Johnston 	if (ret == 0)
928a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)val, KMSAN_STATE_INITED,
929a422084aSMark Johnston 		    sizeof(*val));
930a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
931a422084aSMark Johnston 	return (ret);
932a422084aSMark Johnston }
933a422084aSMark Johnston 
934a422084aSMark Johnston int
935a422084aSMark Johnston kmsan_fueword32(volatile const void *base, int32_t *val)
936a422084aSMark Johnston {
937a422084aSMark Johnston 	int ret;
938a422084aSMark Johnston 
939a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(val), "fueword32(): args");
940a422084aSMark Johnston 	ret = fueword32(base, val);
941a422084aSMark Johnston 	if (ret == 0)
942a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)val, KMSAN_STATE_INITED,
943a422084aSMark Johnston 		    sizeof(*val));
944a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
945a422084aSMark Johnston 	return (ret);
946a422084aSMark Johnston }
947a422084aSMark Johnston 
948a422084aSMark Johnston int
949a422084aSMark Johnston kmsan_fueword64(volatile const void *base, int64_t *val)
950a422084aSMark Johnston {
951a422084aSMark Johnston 	int ret;
952a422084aSMark Johnston 
953a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(val), "fueword64(): args");
954a422084aSMark Johnston 	ret = fueword64(base, val);
955a422084aSMark Johnston 	if (ret == 0)
956a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)val, KMSAN_STATE_INITED,
957a422084aSMark Johnston 		    sizeof(*val));
958a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
959a422084aSMark Johnston 	return (ret);
960a422084aSMark Johnston }
961a422084aSMark Johnston 
962a422084aSMark Johnston int
963a422084aSMark Johnston kmsan_subyte(volatile void *base, int byte)
964a422084aSMark Johnston {
965a422084aSMark Johnston 	int ret;
966a422084aSMark Johnston 
967a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(byte), "subyte():args");
968a422084aSMark Johnston 	ret = subyte(base, byte);
969a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
970a422084aSMark Johnston 	return (ret);
971a422084aSMark Johnston }
972a422084aSMark Johnston 
973a422084aSMark Johnston int
974a422084aSMark Johnston kmsan_suword(volatile void *base, long word)
975a422084aSMark Johnston {
976a422084aSMark Johnston 	int ret;
977a422084aSMark Johnston 
978a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword():args");
979a422084aSMark Johnston 	ret = suword(base, word);
980a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
981a422084aSMark Johnston 	return (ret);
982a422084aSMark Johnston }
983a422084aSMark Johnston 
984a422084aSMark Johnston int
985a422084aSMark Johnston kmsan_suword16(volatile void *base, int word)
986a422084aSMark Johnston {
987a422084aSMark Johnston 	int ret;
988a422084aSMark Johnston 
989a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword16():args");
990a422084aSMark Johnston 	ret = suword16(base, word);
991a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
992a422084aSMark Johnston 	return (ret);
993a422084aSMark Johnston }
994a422084aSMark Johnston 
995a422084aSMark Johnston int
996a422084aSMark Johnston kmsan_suword32(volatile void *base, int32_t word)
997a422084aSMark Johnston {
998a422084aSMark Johnston 	int ret;
999a422084aSMark Johnston 
1000a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword32():args");
1001a422084aSMark Johnston 	ret = suword32(base, word);
1002a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1003a422084aSMark Johnston 	return (ret);
1004a422084aSMark Johnston }
1005a422084aSMark Johnston 
1006a422084aSMark Johnston int
1007a422084aSMark Johnston kmsan_suword64(volatile void *base, int64_t word)
1008a422084aSMark Johnston {
1009a422084aSMark Johnston 	int ret;
1010a422084aSMark Johnston 
1011a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(word), "suword64():args");
1012a422084aSMark Johnston 	ret = suword64(base, word);
1013a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1014a422084aSMark Johnston 	return (ret);
1015a422084aSMark Johnston }
1016a422084aSMark Johnston 
1017a422084aSMark Johnston int
1018a422084aSMark Johnston kmsan_casueword32(volatile uint32_t *base, uint32_t oldval, uint32_t *oldvalp,
1019a422084aSMark Johnston     uint32_t newval)
1020a422084aSMark Johnston {
1021a422084aSMark Johnston 	int ret;
1022a422084aSMark Johnston 
1023a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(oldval) + sizeof(oldvalp) +
1024a422084aSMark Johnston 	    sizeof(newval), "casueword32(): args");
1025a422084aSMark Johnston 	ret = casueword32(base, oldval, oldvalp, newval);
1026a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)oldvalp, KMSAN_STATE_INITED,
1027a422084aSMark Johnston 	    sizeof(*oldvalp));
1028a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1029a422084aSMark Johnston 	return (ret);
1030a422084aSMark Johnston }
1031a422084aSMark Johnston 
1032a422084aSMark Johnston int
1033a422084aSMark Johnston kmsan_casueword(volatile u_long *base, u_long oldval, u_long *oldvalp,
1034a422084aSMark Johnston     u_long newval)
1035a422084aSMark Johnston {
1036a422084aSMark Johnston 	int ret;
1037a422084aSMark Johnston 
1038a422084aSMark Johnston 	kmsan_check_arg(sizeof(base) + sizeof(oldval) + sizeof(oldvalp) +
1039a422084aSMark Johnston 	    sizeof(newval), "casueword32(): args");
1040a422084aSMark Johnston 	ret = casueword(base, oldval, oldvalp, newval);
1041a422084aSMark Johnston 	kmsan_shadow_fill((uintptr_t)oldvalp, KMSAN_STATE_INITED,
1042a422084aSMark Johnston 	    sizeof(*oldvalp));
1043a422084aSMark Johnston 	kmsan_init_ret(sizeof(int));
1044a422084aSMark Johnston 	return (ret);
1045a422084aSMark Johnston }
1046a422084aSMark Johnston 
1047a422084aSMark Johnston /* -------------------------------------------------------------------------- */
1048a422084aSMark Johnston 
1049a422084aSMark Johnston #include <machine/atomic.h>
1050a422084aSMark Johnston #include <sys/atomic_san.h>
1051a422084aSMark Johnston 
1052a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_ADD(name, type)				\
1053a422084aSMark Johnston 	void kmsan_atomic_add_##name(volatile type *ptr, type val)	\
1054a422084aSMark Johnston 	{								\
1055a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1056a422084aSMark Johnston 		    "atomic_add_" #name "():args");			\
1057a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1058a422084aSMark Johnston 		    "atomic_add_" #name "():ptr");			\
1059a422084aSMark Johnston 		atomic_add_##name(ptr, val);				\
1060a422084aSMark Johnston 	}
1061a422084aSMark Johnston 
1062a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_ADD(name, type)				\
1063a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_ADD(name, type)				\
1064a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_ADD(acq_##name, type)				\
1065a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_ADD(rel_##name, type)
1066a422084aSMark Johnston 
1067a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_SUBTRACT(name, type)				\
1068a422084aSMark Johnston 	void kmsan_atomic_subtract_##name(volatile type *ptr, type val)	\
1069a422084aSMark Johnston 	{								\
1070a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1071a422084aSMark Johnston 		    "atomic_subtract_" #name "():args");		\
1072a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1073a422084aSMark Johnston 		    "atomic_subtract_" #name "():ptr");			\
1074a422084aSMark Johnston 		atomic_subtract_##name(ptr, val);			\
1075a422084aSMark Johnston 	}
1076a422084aSMark Johnston 
1077a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_SUBTRACT(name, type)				\
1078a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SUBTRACT(name, type)				\
1079a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SUBTRACT(acq_##name, type)			\
1080a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SUBTRACT(rel_##name, type)
1081a422084aSMark Johnston 
1082a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_SET(name, type)				\
1083a422084aSMark Johnston 	void kmsan_atomic_set_##name(volatile type *ptr, type val)	\
1084a422084aSMark Johnston 	{								\
1085a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1086a422084aSMark Johnston 		    "atomic_set_" #name "():args");			\
1087a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1088a422084aSMark Johnston 		    "atomic_set_" #name "():ptr");			\
1089a422084aSMark Johnston 		atomic_set_##name(ptr, val);				\
1090a422084aSMark Johnston 	}
1091a422084aSMark Johnston 
1092a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_SET(name, type)				\
1093a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SET(name, type)				\
1094a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SET(acq_##name, type)				\
1095a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_SET(rel_##name, type)
1096a422084aSMark Johnston 
1097a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_CLEAR(name, type)				\
1098a422084aSMark Johnston 	void kmsan_atomic_clear_##name(volatile type *ptr, type val)	\
1099a422084aSMark Johnston 	{								\
1100a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1101a422084aSMark Johnston 		    "atomic_clear_" #name "():args");			\
1102a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1103a422084aSMark Johnston 		    "atomic_clear_" #name "():ptr");			\
1104a422084aSMark Johnston 		atomic_clear_##name(ptr, val);				\
1105a422084aSMark Johnston 	}
1106a422084aSMark Johnston 
1107a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_CLEAR(name, type)				\
1108a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CLEAR(name, type)				\
1109a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CLEAR(acq_##name, type)			\
1110a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CLEAR(rel_##name, type)
1111a422084aSMark Johnston 
1112a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_FETCHADD(name, type)				\
1113a422084aSMark Johnston 	type kmsan_atomic_fetchadd_##name(volatile type *ptr, type val)	\
1114a422084aSMark Johnston 	{								\
1115a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1116a422084aSMark Johnston 		    "atomic_fetchadd_" #name "():args");		\
1117a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1118a422084aSMark Johnston 		    "atomic_fetchadd_" #name "():ptr");			\
1119a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1120a422084aSMark Johnston 		return (atomic_fetchadd_##name(ptr, val));		\
1121a422084aSMark Johnston 	}
1122a422084aSMark Johnston 
1123a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_READANDCLEAR(name, type)			\
1124a422084aSMark Johnston 	type kmsan_atomic_readandclear_##name(volatile type *ptr)	\
1125a422084aSMark Johnston 	{								\
1126a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr),				\
1127a422084aSMark Johnston 		    "atomic_readandclear_" #name "():args");		\
1128a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1129a422084aSMark Johnston 		    "atomic_readandclear_" #name "():ptr");		\
1130a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1131a422084aSMark Johnston 		return (atomic_readandclear_##name(ptr));		\
1132a422084aSMark Johnston 	}
1133a422084aSMark Johnston 
1134a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_TESTANDCLEAR(name, type)			\
1135a422084aSMark Johnston 	int kmsan_atomic_testandclear_##name(volatile type *ptr, u_int v) \
1136a422084aSMark Johnston 	{								\
1137a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(v),		\
1138a422084aSMark Johnston 		    "atomic_testandclear_" #name "():args");		\
1139a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1140a422084aSMark Johnston 		    "atomic_testandclear_" #name "():ptr");		\
1141a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1142a422084aSMark Johnston 		return (atomic_testandclear_##name(ptr, v));		\
1143a422084aSMark Johnston 	}
1144a422084aSMark Johnston 
1145a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_TESTANDSET(name, type)				\
1146a422084aSMark Johnston 	int kmsan_atomic_testandset_##name(volatile type *ptr, u_int v) \
1147a422084aSMark Johnston 	{								\
1148a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(v),		\
1149a422084aSMark Johnston 		    "atomic_testandset_" #name "():args");		\
1150a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1151a422084aSMark Johnston 		    "atomic_testandset_" #name "():ptr");		\
1152a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1153a422084aSMark Johnston 		return (atomic_testandset_##name(ptr, v));		\
1154a422084aSMark Johnston 	}
1155a422084aSMark Johnston 
1156a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_SWAP(name, type)				\
1157a422084aSMark Johnston 	type kmsan_atomic_swap_##name(volatile type *ptr, type val)	\
1158a422084aSMark Johnston 	{								\
1159a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1160a422084aSMark Johnston 		    "atomic_swap_" #name "():args");			\
1161a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1162a422084aSMark Johnston 		    "atomic_swap_" #name "():ptr");			\
1163a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1164a422084aSMark Johnston 		return (atomic_swap_##name(ptr, val));			\
1165a422084aSMark Johnston 	}
1166a422084aSMark Johnston 
1167a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_CMPSET(name, type)				\
1168a422084aSMark Johnston 	int kmsan_atomic_cmpset_##name(volatile type *ptr, type oval,	\
1169a422084aSMark Johnston 	    type nval)							\
1170a422084aSMark Johnston 	{								\
1171a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(oval) +		\
1172a422084aSMark Johnston 		    sizeof(nval), "atomic_cmpset_" #name "():args");	\
1173a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1174a422084aSMark Johnston 		    "atomic_cmpset_" #name "():ptr");			\
1175a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1176a422084aSMark Johnston 		return (atomic_cmpset_##name(ptr, oval, nval));		\
1177a422084aSMark Johnston 	}
1178a422084aSMark Johnston 
1179a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_CMPSET(name, type)				\
1180a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CMPSET(name, type)				\
1181a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CMPSET(acq_##name, type)			\
1182a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_CMPSET(rel_##name, type)
1183a422084aSMark Johnston 
1184a422084aSMark Johnston #define _MSAN_ATOMIC_FUNC_FCMPSET(name, type)				\
1185a422084aSMark Johnston 	int kmsan_atomic_fcmpset_##name(volatile type *ptr, type *oval,	\
1186a422084aSMark Johnston 	    type nval)							\
1187a422084aSMark Johnston 	{								\
1188a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(oval) +		\
1189a422084aSMark Johnston 		    sizeof(nval), "atomic_fcmpset_" #name "():args");	\
1190a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1191a422084aSMark Johnston 		    "atomic_fcmpset_" #name "():ptr");			\
1192a422084aSMark Johnston 		kmsan_init_ret(sizeof(int));				\
1193a422084aSMark Johnston 		return (atomic_fcmpset_##name(ptr, oval, nval));	\
1194a422084aSMark Johnston 	}
1195a422084aSMark Johnston 
1196a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_FCMPSET(name, type)				\
1197a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_FCMPSET(name, type)				\
1198a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_FCMPSET(acq_##name, type)			\
1199a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_FCMPSET(rel_##name, type)
1200a422084aSMark Johnston 
1201a422084aSMark Johnston #define MSAN_ATOMIC_FUNC_THREAD_FENCE(name)				\
1202a422084aSMark Johnston 	void kmsan_atomic_thread_fence_##name(void)			\
1203a422084aSMark Johnston 	{								\
1204a422084aSMark Johnston 		atomic_thread_fence_##name();				\
1205a422084aSMark Johnston 	}
1206a422084aSMark Johnston 
1207a422084aSMark Johnston #define	_MSAN_ATOMIC_FUNC_LOAD(name, type)				\
1208a422084aSMark Johnston 	type kmsan_atomic_load_##name(volatile type *ptr)		\
1209a422084aSMark Johnston 	{								\
1210a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr),				\
1211a422084aSMark Johnston 		    "atomic_load_" #name "():args");			\
1212a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)ptr, sizeof(type),	\
1213a422084aSMark Johnston 		    "atomic_load_" #name "():ptr");			\
1214a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1215a422084aSMark Johnston 		return (atomic_load_##name(ptr));			\
1216a422084aSMark Johnston 	}
1217a422084aSMark Johnston 
1218a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_LOAD(name, type)				\
1219a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_LOAD(name, type)				\
1220a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_LOAD(acq_##name, type)
1221a422084aSMark Johnston 
1222a422084aSMark Johnston #define	_MSAN_ATOMIC_FUNC_STORE(name, type)				\
1223a422084aSMark Johnston 	void kmsan_atomic_store_##name(volatile type *ptr, type val)	\
1224a422084aSMark Johnston 	{								\
1225a422084aSMark Johnston 		kmsan_check_arg(sizeof(ptr) + sizeof(val),		\
1226a422084aSMark Johnston 		    "atomic_store_" #name "():args");			\
1227a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)ptr, KMSAN_STATE_INITED,	\
1228a422084aSMark Johnston 		    sizeof(type));					\
1229a422084aSMark Johnston 		atomic_store_##name(ptr, val);				\
1230a422084aSMark Johnston 	}
1231a422084aSMark Johnston 
1232a422084aSMark Johnston #define	MSAN_ATOMIC_FUNC_STORE(name, type)				\
1233a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_STORE(name, type)				\
1234a422084aSMark Johnston 	_MSAN_ATOMIC_FUNC_STORE(rel_##name, type)
1235a422084aSMark Johnston 
1236a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(8, uint8_t);
1237a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(16, uint16_t);
1238a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(32, uint32_t);
1239a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(64, uint64_t);
1240a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(int, u_int);
1241a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(long, u_long);
1242a422084aSMark Johnston MSAN_ATOMIC_FUNC_ADD(ptr, uintptr_t);
1243a422084aSMark Johnston 
1244a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(8, uint8_t);
1245a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(16, uint16_t);
1246a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(32, uint32_t);
1247a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(64, uint64_t);
1248a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(int, u_int);
1249a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(long, u_long);
1250a422084aSMark Johnston MSAN_ATOMIC_FUNC_SUBTRACT(ptr, uintptr_t);
1251a422084aSMark Johnston 
1252a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(8, uint8_t);
1253a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(16, uint16_t);
1254a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(32, uint32_t);
1255a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(64, uint64_t);
1256a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(int, u_int);
1257a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(long, u_long);
1258a422084aSMark Johnston MSAN_ATOMIC_FUNC_SET(ptr, uintptr_t);
1259a422084aSMark Johnston 
1260a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(8, uint8_t);
1261a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(16, uint16_t);
1262a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(32, uint32_t);
1263a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(64, uint64_t);
1264a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(int, u_int);
1265a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(long, u_long);
1266a422084aSMark Johnston MSAN_ATOMIC_FUNC_CLEAR(ptr, uintptr_t);
1267a422084aSMark Johnston 
1268a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(32, uint32_t);
1269a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(64, uint64_t);
1270a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(int, u_int);
1271a422084aSMark Johnston MSAN_ATOMIC_FUNC_FETCHADD(long, u_long);
1272a422084aSMark Johnston 
1273a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(32, uint32_t);
1274a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(64, uint64_t);
1275a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(int, u_int);
1276a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(long, u_long);
1277a422084aSMark Johnston MSAN_ATOMIC_FUNC_READANDCLEAR(ptr, uintptr_t);
1278a422084aSMark Johnston 
1279a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(32, uint32_t);
1280a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(64, uint64_t);
1281a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(int, u_int);
1282a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDCLEAR(long, u_long);
1283a422084aSMark Johnston 
1284a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(32, uint32_t);
1285a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(64, uint64_t);
1286a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(int, u_int);
1287a422084aSMark Johnston MSAN_ATOMIC_FUNC_TESTANDSET(long, u_long);
1288a422084aSMark Johnston 
1289a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(32, uint32_t);
1290a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(64, uint64_t);
1291a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(int, u_int);
1292a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(long, u_long);
1293a422084aSMark Johnston MSAN_ATOMIC_FUNC_SWAP(ptr, uintptr_t);
1294a422084aSMark Johnston 
1295a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(8, uint8_t);
1296a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(16, uint16_t);
1297a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(32, uint32_t);
1298a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(64, uint64_t);
1299a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(int, u_int);
1300a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(long, u_long);
1301a422084aSMark Johnston MSAN_ATOMIC_FUNC_CMPSET(ptr, uintptr_t);
1302a422084aSMark Johnston 
1303a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(8, uint8_t);
1304a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(16, uint16_t);
1305a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(32, uint32_t);
1306a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(64, uint64_t);
1307a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(int, u_int);
1308a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(long, u_long);
1309a422084aSMark Johnston MSAN_ATOMIC_FUNC_FCMPSET(ptr, uintptr_t);
1310a422084aSMark Johnston 
13111f6b6cf1SMark Johnston _MSAN_ATOMIC_FUNC_LOAD(bool, bool);
1312a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(8, uint8_t);
1313a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(16, uint16_t);
1314a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(32, uint32_t);
1315a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(64, uint64_t);
1316a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(char, u_char);
1317a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(short, u_short);
1318a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(int, u_int);
1319a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(long, u_long);
1320a422084aSMark Johnston MSAN_ATOMIC_FUNC_LOAD(ptr, uintptr_t);
1321a422084aSMark Johnston 
13221f6b6cf1SMark Johnston _MSAN_ATOMIC_FUNC_STORE(bool, bool);
1323a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(8, uint8_t);
1324a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(16, uint16_t);
1325a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(32, uint32_t);
1326a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(64, uint64_t);
1327a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(char, u_char);
1328a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(short, u_short);
1329a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(int, u_int);
1330a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(long, u_long);
1331a422084aSMark Johnston MSAN_ATOMIC_FUNC_STORE(ptr, uintptr_t);
1332a422084aSMark Johnston 
1333a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(acq);
1334a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(rel);
1335a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(acq_rel);
1336a422084aSMark Johnston MSAN_ATOMIC_FUNC_THREAD_FENCE(seq_cst);
1337a422084aSMark Johnston 
1338a422084aSMark Johnston void
1339a422084aSMark Johnston kmsan_atomic_interrupt_fence(void)
1340a422084aSMark Johnston {
1341a422084aSMark Johnston 	atomic_interrupt_fence();
1342a422084aSMark Johnston }
1343a422084aSMark Johnston 
1344a422084aSMark Johnston /* -------------------------------------------------------------------------- */
1345a422084aSMark Johnston 
1346a422084aSMark Johnston #include <sys/bus.h>
1347a422084aSMark Johnston #include <machine/bus.h>
1348a422084aSMark Johnston #include <sys/bus_san.h>
1349a422084aSMark Johnston 
1350a422084aSMark Johnston int
1351a422084aSMark Johnston kmsan_bus_space_map(bus_space_tag_t tag, bus_addr_t hnd, bus_size_t size,
1352a422084aSMark Johnston     int flags, bus_space_handle_t *handlep)
1353a422084aSMark Johnston {
1354a422084aSMark Johnston 	return (bus_space_map(tag, hnd, size, flags, handlep));
1355a422084aSMark Johnston }
1356a422084aSMark Johnston 
1357a422084aSMark Johnston void
1358a422084aSMark Johnston kmsan_bus_space_unmap(bus_space_tag_t tag, bus_space_handle_t hnd,
1359a422084aSMark Johnston     bus_size_t size)
1360a422084aSMark Johnston {
1361a422084aSMark Johnston 	bus_space_unmap(tag, hnd, size);
1362a422084aSMark Johnston }
1363a422084aSMark Johnston 
1364a422084aSMark Johnston int
1365a422084aSMark Johnston kmsan_bus_space_subregion(bus_space_tag_t tag, bus_space_handle_t hnd,
1366a422084aSMark Johnston     bus_size_t offset, bus_size_t size, bus_space_handle_t *handlep)
1367a422084aSMark Johnston {
1368a422084aSMark Johnston 	return (bus_space_subregion(tag, hnd, offset, size, handlep));
1369a422084aSMark Johnston }
1370a422084aSMark Johnston 
1371a422084aSMark Johnston void
1372a422084aSMark Johnston kmsan_bus_space_free(bus_space_tag_t tag, bus_space_handle_t hnd,
1373a422084aSMark Johnston     bus_size_t size)
1374a422084aSMark Johnston {
1375a422084aSMark Johnston 	bus_space_free(tag, hnd, size);
1376a422084aSMark Johnston }
1377a422084aSMark Johnston 
1378a422084aSMark Johnston void
1379a422084aSMark Johnston kmsan_bus_space_barrier(bus_space_tag_t tag, bus_space_handle_t hnd,
1380a422084aSMark Johnston     bus_size_t offset, bus_size_t size, int flags)
1381a422084aSMark Johnston {
1382a422084aSMark Johnston 	bus_space_barrier(tag, hnd, offset, size, flags);
1383a422084aSMark Johnston }
1384a422084aSMark Johnston 
1385a422084aSMark Johnston /* XXXMJ x86-specific */
1386a422084aSMark Johnston #define MSAN_BUS_READ_FUNC(func, width, type)				\
1387a422084aSMark Johnston 	type kmsan_bus_space_read##func##_##width(bus_space_tag_t tag,	\
1388a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t offset)			\
1389a422084aSMark Johnston 	{								\
1390a422084aSMark Johnston 		type ret;						\
1391a422084aSMark Johnston 		if ((tag) != X86_BUS_SPACE_IO)				\
1392a422084aSMark Johnston 			kmsan_shadow_fill((uintptr_t)(hnd + offset),	\
1393a422084aSMark Johnston 			    KMSAN_STATE_INITED, (width));		\
1394a422084aSMark Johnston 		ret = bus_space_read##func##_##width(tag, hnd, offset);	\
1395a422084aSMark Johnston 		kmsan_init_ret(sizeof(type));				\
1396a422084aSMark Johnston 		return (ret);						\
1397a422084aSMark Johnston 	}								\
1398a422084aSMark Johnston 
1399a422084aSMark Johnston #define MSAN_BUS_READ_PTR_FUNC(func, width, type)			\
1400a422084aSMark Johnston 	void kmsan_bus_space_read_##func##_##width(bus_space_tag_t tag,	\
1401a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t size, type *buf,		\
1402a422084aSMark Johnston 	    bus_size_t count)						\
1403a422084aSMark Johnston 	{								\
1404a422084aSMark Johnston 		kmsan_shadow_fill((uintptr_t)buf, KMSAN_STATE_INITED,	\
1405a422084aSMark Johnston 		    (width) * count);					\
1406a422084aSMark Johnston 		bus_space_read_##func##_##width(tag, hnd, size, buf, 	\
1407a422084aSMark Johnston 		    count);						\
1408a422084aSMark Johnston 	}
1409a422084aSMark Johnston 
1410a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 1, uint8_t)
1411a422084aSMark Johnston MSAN_BUS_READ_FUNC(_stream, 1, uint8_t)
1412a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi, 1, uint8_t)
1413a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi_stream, 1, uint8_t)
1414a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region, 1, uint8_t)
1415a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region_stream, 1, uint8_t)
1416a422084aSMark Johnston 
1417a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 2, uint16_t)
1418a422084aSMark Johnston MSAN_BUS_READ_FUNC(_stream, 2, uint16_t)
1419a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi, 2, uint16_t)
1420a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi_stream, 2, uint16_t)
1421a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region, 2, uint16_t)
1422a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region_stream, 2, uint16_t)
1423a422084aSMark Johnston 
1424a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 4, uint32_t)
1425a422084aSMark Johnston MSAN_BUS_READ_FUNC(_stream, 4, uint32_t)
1426a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi, 4, uint32_t)
1427a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(multi_stream, 4, uint32_t)
1428a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region, 4, uint32_t)
1429a422084aSMark Johnston MSAN_BUS_READ_PTR_FUNC(region_stream, 4, uint32_t)
1430a422084aSMark Johnston 
1431a422084aSMark Johnston MSAN_BUS_READ_FUNC(, 8, uint64_t)
1432a422084aSMark Johnston 
1433a422084aSMark Johnston #define	MSAN_BUS_WRITE_FUNC(func, width, type)				\
1434a422084aSMark Johnston 	void kmsan_bus_space_write##func##_##width(bus_space_tag_t tag,	\
1435a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t offset, type value)	\
1436a422084aSMark Johnston 	{								\
1437a422084aSMark Johnston 		bus_space_write##func##_##width(tag, hnd, offset, value);\
1438a422084aSMark Johnston 	}								\
1439a422084aSMark Johnston 
1440a422084aSMark Johnston #define	MSAN_BUS_WRITE_PTR_FUNC(func, width, type)			\
1441a422084aSMark Johnston 	void kmsan_bus_space_write_##func##_##width(bus_space_tag_t tag,\
1442a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t size, const type *buf,	\
1443a422084aSMark Johnston 	    bus_size_t count)						\
1444a422084aSMark Johnston 	{								\
1445a422084aSMark Johnston 		kmsan_shadow_check((uintptr_t)buf, sizeof(type) * count,\
1446a422084aSMark Johnston 		    "bus_space_write()");				\
1447a422084aSMark Johnston 		bus_space_write_##func##_##width(tag, hnd, size, buf, 	\
1448a422084aSMark Johnston 		    count);						\
1449a422084aSMark Johnston 	}
1450a422084aSMark Johnston 
1451a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 1, uint8_t)
1452a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(_stream, 1, uint8_t)
1453a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi, 1, uint8_t)
1454a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi_stream, 1, uint8_t)
1455a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region, 1, uint8_t)
1456a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region_stream, 1, uint8_t)
1457a422084aSMark Johnston 
1458a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 2, uint16_t)
1459a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(_stream, 2, uint16_t)
1460a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi, 2, uint16_t)
1461a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi_stream, 2, uint16_t)
1462a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region, 2, uint16_t)
1463a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region_stream, 2, uint16_t)
1464a422084aSMark Johnston 
1465a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 4, uint32_t)
1466a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(_stream, 4, uint32_t)
1467a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi, 4, uint32_t)
1468a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(multi_stream, 4, uint32_t)
1469a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region, 4, uint32_t)
1470a422084aSMark Johnston MSAN_BUS_WRITE_PTR_FUNC(region_stream, 4, uint32_t)
1471a422084aSMark Johnston 
1472a422084aSMark Johnston MSAN_BUS_WRITE_FUNC(, 8, uint64_t)
1473a422084aSMark Johnston 
1474a422084aSMark Johnston #define	MSAN_BUS_SET_FUNC(func, width, type)				\
1475a422084aSMark Johnston 	void kmsan_bus_space_set_##func##_##width(bus_space_tag_t tag,	\
1476a422084aSMark Johnston 	    bus_space_handle_t hnd, bus_size_t offset, type value,	\
1477a422084aSMark Johnston 	    bus_size_t count)						\
1478a422084aSMark Johnston 	{								\
1479a422084aSMark Johnston 		bus_space_set_##func##_##width(tag, hnd, offset, value,	\
1480a422084aSMark Johnston 		    count);						\
1481a422084aSMark Johnston 	}
1482a422084aSMark Johnston 
1483a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi, 1, uint8_t)
1484a422084aSMark Johnston MSAN_BUS_SET_FUNC(region, 1, uint8_t)
1485a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi_stream, 1, uint8_t)
1486a422084aSMark Johnston MSAN_BUS_SET_FUNC(region_stream, 1, uint8_t)
1487a422084aSMark Johnston 
1488a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi, 2, uint16_t)
1489a422084aSMark Johnston MSAN_BUS_SET_FUNC(region, 2, uint16_t)
1490a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi_stream, 2, uint16_t)
1491a422084aSMark Johnston MSAN_BUS_SET_FUNC(region_stream, 2, uint16_t)
1492a422084aSMark Johnston 
1493a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi, 4, uint32_t)
1494a422084aSMark Johnston MSAN_BUS_SET_FUNC(region, 4, uint32_t)
1495a422084aSMark Johnston MSAN_BUS_SET_FUNC(multi_stream, 4, uint32_t)
1496a422084aSMark Johnston MSAN_BUS_SET_FUNC(region_stream, 4, uint32_t)
1497a422084aSMark Johnston 
1498a422084aSMark Johnston /* -------------------------------------------------------------------------- */
1499a422084aSMark Johnston 
1500a422084aSMark Johnston void
1501a422084aSMark Johnston kmsan_bus_dmamap_sync(struct memdesc *desc, bus_dmasync_op_t op)
1502a422084aSMark Johnston {
1503a422084aSMark Johnston 	/*
1504a422084aSMark Johnston 	 * Some drivers, e.g., nvme, use the same code path for loading device
1505a422084aSMark Johnston 	 * read and write requests, and will thus specify both flags.  In this
1506a422084aSMark Johnston 	 * case we should not do any checking since it will generally lead to
1507a422084aSMark Johnston 	 * false positives.
1508a422084aSMark Johnston 	 */
1509a422084aSMark Johnston 	if ((op & (BUS_DMASYNC_PREREAD | BUS_DMASYNC_PREWRITE)) ==
1510a422084aSMark Johnston 	    BUS_DMASYNC_PREWRITE) {
1511a422084aSMark Johnston 		switch (desc->md_type) {
1512a422084aSMark Johnston 		case MEMDESC_VADDR:
15133dba010eSJohn Baldwin 			kmsan_check(desc->u.md_vaddr, desc->md_len,
1514a422084aSMark Johnston 			    "dmasync");
1515a422084aSMark Johnston 			break;
1516a422084aSMark Johnston 		case MEMDESC_MBUF:
1517a422084aSMark Johnston 			kmsan_check_mbuf(desc->u.md_mbuf, "dmasync");
1518a422084aSMark Johnston 			break;
1519a422084aSMark Johnston 		case 0:
1520a422084aSMark Johnston 			break;
1521a422084aSMark Johnston 		default:
1522a422084aSMark Johnston 			kmsan_panic("%s: unhandled memdesc type %d", __func__,
1523a422084aSMark Johnston 			    desc->md_type);
1524a422084aSMark Johnston 		}
1525a422084aSMark Johnston 	}
1526a422084aSMark Johnston 	if ((op & BUS_DMASYNC_POSTREAD) != 0) {
1527a422084aSMark Johnston 		switch (desc->md_type) {
1528a422084aSMark Johnston 		case MEMDESC_VADDR:
15293dba010eSJohn Baldwin 			kmsan_mark(desc->u.md_vaddr, desc->md_len,
1530a422084aSMark Johnston 			    KMSAN_STATE_INITED);
1531a422084aSMark Johnston 			break;
1532a422084aSMark Johnston 		case MEMDESC_MBUF:
1533a422084aSMark Johnston 			kmsan_mark_mbuf(desc->u.md_mbuf, KMSAN_STATE_INITED);
1534a422084aSMark Johnston 			break;
1535a422084aSMark Johnston 		case 0:
1536a422084aSMark Johnston 			break;
1537a422084aSMark Johnston 		default:
1538a422084aSMark Johnston 			kmsan_panic("%s: unhandled memdesc type %d", __func__,
1539a422084aSMark Johnston 			    desc->md_type);
1540a422084aSMark Johnston 		}
1541a422084aSMark Johnston 	}
1542a422084aSMark Johnston }
1543