svn commit: r354894 - in head/sys: kern sys
Andrew Turner
andrew at FreeBSD.org
Wed Nov 20 14:37:49 UTC 2019
Author: andrew
Date: Wed Nov 20 14:37:48 2019
New Revision: 354894
URL: https://svnweb.freebsd.org/changeset/base/354894
Log:
Import the NetBSD Kernel Concurrency Sanitizer (KCSAN) runtime.
KCSAN is a tool to find concurrent memory access that may race each other.
After a determined number of memory accesses a cell is created, this
describes the current access. It will then delay for a short period
to allow other CPUs a chance to race. If another CPU performs a memory
access to an overlapping region during this delay the race is reported.
This is a straight import of the NetBSD code, it will be adapted to
FreeBSD in a future commit.
Sponsored by: DARPA, AFRL
Added:
head/sys/kern/subr_csan.c (contents, props changed)
head/sys/sys/csan.h (contents, props changed)
Added: head/sys/kern/subr_csan.c
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/sys/kern/subr_csan.c Wed Nov 20 14:37:48 2019 (r354894)
@@ -0,0 +1,754 @@
+/* $NetBSD: subr_csan.c,v 1.5 2019/11/15 08:11:37 maxv Exp $ */
+
+/*
+ * Copyright (c) 2019 The NetBSD Foundation, Inc.
+ * All rights reserved.
+ *
+ * This code is derived from software contributed to The NetBSD Foundation
+ * by Maxime Villard.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <sys/cdefs.h>
+__KERNEL_RCSID(0, "$NetBSD: subr_csan.c,v 1.5 2019/11/15 08:11:37 maxv Exp $");
+
+#include <sys/param.h>
+#include <sys/device.h>
+#include <sys/kernel.h>
+#include <sys/param.h>
+#include <sys/conf.h>
+#include <sys/systm.h>
+#include <sys/types.h>
+#include <sys/csan.h>
+#include <sys/cpu.h>
+
+#ifdef KCSAN_PANIC
+#define REPORT panic
+#else
+#define REPORT printf
+#endif
+
+typedef struct {
+ uintptr_t addr;
+ uint32_t size;
+ bool write:1;
+ bool atomic:1;
+ uintptr_t pc;
+} csan_cell_t;
+
+typedef struct {
+ bool inited;
+ uint32_t cnt;
+ csan_cell_t cell;
+} csan_cpu_t;
+
+static csan_cpu_t kcsan_cpus[MAXCPUS];
+static bool kcsan_enabled __read_mostly;
+
+#define __RET_ADDR (uintptr_t)__builtin_return_address(0)
+
+#define KCSAN_NACCESSES 1024
+#define KCSAN_DELAY 10 /* 10 microseconds */
+
+/* -------------------------------------------------------------------------- */
+
+/* The MD code. */
+#include <machine/csan.h>
+
+/* -------------------------------------------------------------------------- */
+
+void
+kcsan_init(void)
+{
+ kcsan_enabled = true;
+}
+
+void
+kcsan_cpu_init(struct cpu_info *ci)
+{
+ kcsan_cpus[cpu_index(ci)].inited = true;
+}
+
+/* -------------------------------------------------------------------------- */
+
+static inline void
+kcsan_report(csan_cell_t *new, cpuid_t newcpu, csan_cell_t *old, cpuid_t oldcpu)
+{
+ const char *newsym, *oldsym;
+
+ if (ksyms_getname(NULL, &newsym, (vaddr_t)new->pc, KSYMS_PROC) != 0) {
+ newsym = "Unknown";
+ }
+ if (ksyms_getname(NULL, &oldsym, (vaddr_t)old->pc, KSYMS_PROC) != 0) {
+ oldsym = "Unknown";
+ }
+ REPORT("CSan: Racy Access "
+ "[Cpu%lu %s%s Addr=%p Size=%u PC=%p<%s>] "
+ "[Cpu%lu %s%s Addr=%p Size=%u PC=%p<%s>]\n",
+ newcpu,
+ (new->atomic ? "Atomic " : ""), (new->write ? "Write" : "Read"),
+ (void *)new->addr, new->size, (void *)new->pc, newsym,
+ oldcpu,
+ (old->atomic ? "Atomic " : ""), (old->write ? "Write" : "Read"),
+ (void *)old->addr, old->size, (void *)old->pc, oldsym);
+ kcsan_md_unwind();
+}
+
+static inline bool
+kcsan_access_is_atomic(csan_cell_t *new, csan_cell_t *old)
+{
+ if (new->write && !new->atomic)
+ return false;
+ if (old->write && !old->atomic)
+ return false;
+ return true;
+}
+
+static inline void
+kcsan_access(uintptr_t addr, size_t size, bool write, bool atomic, uintptr_t pc)
+{
+ csan_cell_t old, new;
+ csan_cpu_t *cpu;
+ uint64_t intr;
+ size_t i;
+
+ if (__predict_false(!kcsan_enabled))
+ return;
+ if (__predict_false(kcsan_md_unsupported((vaddr_t)addr)))
+ return;
+
+ new.addr = addr;
+ new.size = size;
+ new.write = write;
+ new.atomic = atomic;
+ new.pc = pc;
+
+ for (i = 0; i < ncpu; i++) {
+ __builtin_memcpy(&old, &kcsan_cpus[i].cell, sizeof(old));
+
+ if (old.addr + old.size <= new.addr)
+ continue;
+ if (new.addr + new.size <= old.addr)
+ continue;
+ if (__predict_true(!old.write && !new.write))
+ continue;
+ if (__predict_true(kcsan_access_is_atomic(&new, &old)))
+ continue;
+
+ kcsan_report(&new, cpu_number(), &old, i);
+ break;
+ }
+
+ if (__predict_false(!kcsan_md_is_avail()))
+ return;
+
+ kcsan_md_disable_intrs(&intr);
+
+ cpu = &kcsan_cpus[cpu_number()];
+ if (__predict_false(!cpu->inited))
+ goto out;
+ cpu->cnt = (cpu->cnt + 1) % KCSAN_NACCESSES;
+ if (__predict_true(cpu->cnt != 0))
+ goto out;
+
+ __builtin_memcpy(&cpu->cell, &new, sizeof(new));
+ kcsan_md_delay(KCSAN_DELAY);
+ __builtin_memset(&cpu->cell, 0, sizeof(new));
+
+out:
+ kcsan_md_enable_intrs(&intr);
+}
+
+#define CSAN_READ(size) \
+ void __tsan_read##size(uintptr_t); \
+ void __tsan_read##size(uintptr_t addr) \
+ { \
+ kcsan_access(addr, size, false, false, __RET_ADDR); \
+ }
+
+CSAN_READ(1)
+CSAN_READ(2)
+CSAN_READ(4)
+CSAN_READ(8)
+CSAN_READ(16)
+
+#define CSAN_WRITE(size) \
+ void __tsan_write##size(uintptr_t); \
+ void __tsan_write##size(uintptr_t addr) \
+ { \
+ kcsan_access(addr, size, true, false, __RET_ADDR); \
+ }
+
+CSAN_WRITE(1)
+CSAN_WRITE(2)
+CSAN_WRITE(4)
+CSAN_WRITE(8)
+CSAN_WRITE(16)
+
+void __tsan_read_range(uintptr_t, size_t);
+void __tsan_write_range(uintptr_t, size_t);
+
+void
+__tsan_read_range(uintptr_t addr, size_t size)
+{
+ kcsan_access(addr, size, false, false, __RET_ADDR);
+}
+
+void
+__tsan_write_range(uintptr_t addr, size_t size)
+{
+ kcsan_access(addr, size, true, false, __RET_ADDR);
+}
+
+void __tsan_init(void);
+void __tsan_func_entry(void *);
+void __tsan_func_exit(void);
+
+void
+__tsan_init(void)
+{
+}
+
+void
+__tsan_func_entry(void *call_pc)
+{
+}
+
+void
+__tsan_func_exit(void)
+{
+}
+
+/* -------------------------------------------------------------------------- */
+
+void *
+kcsan_memcpy(void *dst, const void *src, size_t len)
+{
+ kcsan_access((uintptr_t)src, len, false, false, __RET_ADDR);
+ kcsan_access((uintptr_t)dst, len, true, false, __RET_ADDR);
+ return __builtin_memcpy(dst, src, len);
+}
+
+int
+kcsan_memcmp(const void *b1, const void *b2, size_t len)
+{
+ kcsan_access((uintptr_t)b1, len, false, false, __RET_ADDR);
+ kcsan_access((uintptr_t)b2, len, false, false, __RET_ADDR);
+ return __builtin_memcmp(b1, b2, len);
+}
+
+void *
+kcsan_memset(void *b, int c, size_t len)
+{
+ kcsan_access((uintptr_t)b, len, true, false, __RET_ADDR);
+ return __builtin_memset(b, c, len);
+}
+
+void *
+kcsan_memmove(void *dst, const void *src, size_t len)
+{
+ kcsan_access((uintptr_t)src, len, false, false, __RET_ADDR);
+ kcsan_access((uintptr_t)dst, len, true, false, __RET_ADDR);
+ return __builtin_memmove(dst, src, len);
+}
+
+char *
+kcsan_strcpy(char *dst, const char *src)
+{
+ char *save = dst;
+
+ while (1) {
+ kcsan_access((uintptr_t)src, 1, false, false, __RET_ADDR);
+ kcsan_access((uintptr_t)dst, 1, true, false, __RET_ADDR);
+ *dst = *src;
+ if (*src == '\0')
+ break;
+ src++, dst++;
+ }
+
+ return save;
+}
+
+int
+kcsan_strcmp(const char *s1, const char *s2)
+{
+ while (1) {
+ kcsan_access((uintptr_t)s1, 1, false, false, __RET_ADDR);
+ kcsan_access((uintptr_t)s2, 1, false, false, __RET_ADDR);
+ if (*s1 != *s2)
+ break;
+ if (*s1 == '\0')
+ return 0;
+ s1++, s2++;
+ }
+
+ return (*(const unsigned char *)s1 - *(const unsigned char *)s2);
+}
+
+size_t
+kcsan_strlen(const char *str)
+{
+ const char *s;
+
+ s = str;
+ while (1) {
+ kcsan_access((uintptr_t)s, 1, false, false, __RET_ADDR);
+ if (*s == '\0')
+ break;
+ s++;
+ }
+
+ return (s - str);
+}
+
+#undef kcopy
+#undef copystr
+#undef copyinstr
+#undef copyoutstr
+#undef copyin
+#undef copyout
+
+int kcsan_kcopy(const void *, void *, size_t);
+int kcsan_copystr(const void *, void *, size_t, size_t *);
+int kcsan_copyinstr(const void *, void *, size_t, size_t *);
+int kcsan_copyoutstr(const void *, void *, size_t, size_t *);
+int kcsan_copyin(const void *, void *, size_t);
+int kcsan_copyout(const void *, void *, size_t);
+int kcopy(const void *, void *, size_t);
+int copystr(const void *, void *, size_t, size_t *);
+int copyinstr(const void *, void *, size_t, size_t *);
+int copyoutstr(const void *, void *, size_t, size_t *);
+int copyin(const void *, void *, size_t);
+int copyout(const void *, void *, size_t);
+
+int
+kcsan_kcopy(const void *src, void *dst, size_t len)
+{
+ kcsan_access((uintptr_t)src, len, false, false, __RET_ADDR);
+ kcsan_access((uintptr_t)dst, len, true, false, __RET_ADDR);
+ return kcopy(src, dst, len);
+}
+
+int
+kcsan_copystr(const void *kfaddr, void *kdaddr, size_t len, size_t *done)
+{
+ kcsan_access((uintptr_t)kdaddr, len, true, false, __RET_ADDR);
+ return copystr(kfaddr, kdaddr, len, done);
+}
+
+int
+kcsan_copyin(const void *uaddr, void *kaddr, size_t len)
+{
+ kcsan_access((uintptr_t)kaddr, len, true, false, __RET_ADDR);
+ return copyin(uaddr, kaddr, len);
+}
+
+int
+kcsan_copyout(const void *kaddr, void *uaddr, size_t len)
+{
+ kcsan_access((uintptr_t)kaddr, len, false, false, __RET_ADDR);
+ return copyout(kaddr, uaddr, len);
+}
+
+int
+kcsan_copyinstr(const void *uaddr, void *kaddr, size_t len, size_t *done)
+{
+ kcsan_access((uintptr_t)kaddr, len, true, false, __RET_ADDR);
+ return copyinstr(uaddr, kaddr, len, done);
+}
+
+int
+kcsan_copyoutstr(const void *kaddr, void *uaddr, size_t len, size_t *done)
+{
+ kcsan_access((uintptr_t)kaddr, len, false, false, __RET_ADDR);
+ return copyoutstr(kaddr, uaddr, len, done);
+}
+
+/* -------------------------------------------------------------------------- */
+
+#undef atomic_add_32
+#undef atomic_add_int
+#undef atomic_add_long
+#undef atomic_add_ptr
+#undef atomic_add_64
+#undef atomic_add_32_nv
+#undef atomic_add_int_nv
+#undef atomic_add_long_nv
+#undef atomic_add_ptr_nv
+#undef atomic_add_64_nv
+#undef atomic_and_32
+#undef atomic_and_uint
+#undef atomic_and_ulong
+#undef atomic_and_64
+#undef atomic_and_32_nv
+#undef atomic_and_uint_nv
+#undef atomic_and_ulong_nv
+#undef atomic_and_64_nv
+#undef atomic_or_32
+#undef atomic_or_uint
+#undef atomic_or_ulong
+#undef atomic_or_64
+#undef atomic_or_32_nv
+#undef atomic_or_uint_nv
+#undef atomic_or_ulong_nv
+#undef atomic_or_64_nv
+#undef atomic_cas_32
+#undef atomic_cas_uint
+#undef atomic_cas_ulong
+#undef atomic_cas_ptr
+#undef atomic_cas_64
+#undef atomic_cas_32_ni
+#undef atomic_cas_uint_ni
+#undef atomic_cas_ulong_ni
+#undef atomic_cas_ptr_ni
+#undef atomic_cas_64_ni
+#undef atomic_swap_32
+#undef atomic_swap_uint
+#undef atomic_swap_ulong
+#undef atomic_swap_ptr
+#undef atomic_swap_64
+#undef atomic_dec_32
+#undef atomic_dec_uint
+#undef atomic_dec_ulong
+#undef atomic_dec_ptr
+#undef atomic_dec_64
+#undef atomic_dec_32_nv
+#undef atomic_dec_uint_nv
+#undef atomic_dec_ulong_nv
+#undef atomic_dec_ptr_nv
+#undef atomic_dec_64_nv
+#undef atomic_inc_32
+#undef atomic_inc_uint
+#undef atomic_inc_ulong
+#undef atomic_inc_ptr
+#undef atomic_inc_64
+#undef atomic_inc_32_nv
+#undef atomic_inc_uint_nv
+#undef atomic_inc_ulong_nv
+#undef atomic_inc_ptr_nv
+#undef atomic_inc_64_nv
+
+#define CSAN_ATOMIC_FUNC_ADD(name, tret, targ1, targ2) \
+ void atomic_add_##name(volatile targ1 *, targ2); \
+ void kcsan_atomic_add_##name(volatile targ1 *, targ2); \
+ void kcsan_atomic_add_##name(volatile targ1 *ptr, targ2 val) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ atomic_add_##name(ptr, val); \
+ } \
+ tret atomic_add_##name##_nv(volatile targ1 *, targ2); \
+ tret kcsan_atomic_add_##name##_nv(volatile targ1 *, targ2); \
+ tret kcsan_atomic_add_##name##_nv(volatile targ1 *ptr, targ2 val) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_add_##name##_nv(ptr, val); \
+ }
+
+#define CSAN_ATOMIC_FUNC_AND(name, tret, targ1, targ2) \
+ void atomic_and_##name(volatile targ1 *, targ2); \
+ void kcsan_atomic_and_##name(volatile targ1 *, targ2); \
+ void kcsan_atomic_and_##name(volatile targ1 *ptr, targ2 val) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ atomic_and_##name(ptr, val); \
+ } \
+ tret atomic_and_##name##_nv(volatile targ1 *, targ2); \
+ tret kcsan_atomic_and_##name##_nv(volatile targ1 *, targ2); \
+ tret kcsan_atomic_and_##name##_nv(volatile targ1 *ptr, targ2 val) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_and_##name##_nv(ptr, val); \
+ }
+
+#define CSAN_ATOMIC_FUNC_OR(name, tret, targ1, targ2) \
+ void atomic_or_##name(volatile targ1 *, targ2); \
+ void kcsan_atomic_or_##name(volatile targ1 *, targ2); \
+ void kcsan_atomic_or_##name(volatile targ1 *ptr, targ2 val) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ atomic_or_##name(ptr, val); \
+ } \
+ tret atomic_or_##name##_nv(volatile targ1 *, targ2); \
+ tret kcsan_atomic_or_##name##_nv(volatile targ1 *, targ2); \
+ tret kcsan_atomic_or_##name##_nv(volatile targ1 *ptr, targ2 val) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_or_##name##_nv(ptr, val); \
+ }
+
+#define CSAN_ATOMIC_FUNC_CAS(name, tret, targ1, targ2) \
+ tret atomic_cas_##name(volatile targ1 *, targ2, targ2); \
+ tret kcsan_atomic_cas_##name(volatile targ1 *, targ2, targ2); \
+ tret kcsan_atomic_cas_##name(volatile targ1 *ptr, targ2 exp, targ2 new) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_cas_##name(ptr, exp, new); \
+ } \
+ tret atomic_cas_##name##_ni(volatile targ1 *, targ2, targ2); \
+ tret kcsan_atomic_cas_##name##_ni(volatile targ1 *, targ2, targ2); \
+ tret kcsan_atomic_cas_##name##_ni(volatile targ1 *ptr, targ2 exp, targ2 new) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_cas_##name##_ni(ptr, exp, new); \
+ }
+
+#define CSAN_ATOMIC_FUNC_SWAP(name, tret, targ1, targ2) \
+ tret atomic_swap_##name(volatile targ1 *, targ2); \
+ tret kcsan_atomic_swap_##name(volatile targ1 *, targ2); \
+ tret kcsan_atomic_swap_##name(volatile targ1 *ptr, targ2 val) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_swap_##name(ptr, val); \
+ }
+
+#define CSAN_ATOMIC_FUNC_DEC(name, tret, targ1) \
+ void atomic_dec_##name(volatile targ1 *); \
+ void kcsan_atomic_dec_##name(volatile targ1 *); \
+ void kcsan_atomic_dec_##name(volatile targ1 *ptr) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ atomic_dec_##name(ptr); \
+ } \
+ tret atomic_dec_##name##_nv(volatile targ1 *); \
+ tret kcsan_atomic_dec_##name##_nv(volatile targ1 *); \
+ tret kcsan_atomic_dec_##name##_nv(volatile targ1 *ptr) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_dec_##name##_nv(ptr); \
+ }
+
+#define CSAN_ATOMIC_FUNC_INC(name, tret, targ1) \
+ void atomic_inc_##name(volatile targ1 *); \
+ void kcsan_atomic_inc_##name(volatile targ1 *); \
+ void kcsan_atomic_inc_##name(volatile targ1 *ptr) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ atomic_inc_##name(ptr); \
+ } \
+ tret atomic_inc_##name##_nv(volatile targ1 *); \
+ tret kcsan_atomic_inc_##name##_nv(volatile targ1 *); \
+ tret kcsan_atomic_inc_##name##_nv(volatile targ1 *ptr) \
+ { \
+ kcsan_access((uintptr_t)ptr, sizeof(tret), true, true, \
+ __RET_ADDR); \
+ return atomic_inc_##name##_nv(ptr); \
+ }
+
+CSAN_ATOMIC_FUNC_ADD(32, uint32_t, uint32_t, int32_t);
+CSAN_ATOMIC_FUNC_ADD(64, uint64_t, uint64_t, int64_t);
+CSAN_ATOMIC_FUNC_ADD(int, unsigned int, unsigned int, int);
+CSAN_ATOMIC_FUNC_ADD(long, unsigned long, unsigned long, long);
+CSAN_ATOMIC_FUNC_ADD(ptr, void *, void, ssize_t);
+
+CSAN_ATOMIC_FUNC_AND(32, uint32_t, uint32_t, uint32_t);
+CSAN_ATOMIC_FUNC_AND(64, uint64_t, uint64_t, uint64_t);
+CSAN_ATOMIC_FUNC_AND(uint, unsigned int, unsigned int, unsigned int);
+CSAN_ATOMIC_FUNC_AND(ulong, unsigned long, unsigned long, unsigned long);
+
+CSAN_ATOMIC_FUNC_OR(32, uint32_t, uint32_t, uint32_t);
+CSAN_ATOMIC_FUNC_OR(64, uint64_t, uint64_t, uint64_t);
+CSAN_ATOMIC_FUNC_OR(uint, unsigned int, unsigned int, unsigned int);
+CSAN_ATOMIC_FUNC_OR(ulong, unsigned long, unsigned long, unsigned long);
+
+CSAN_ATOMIC_FUNC_CAS(32, uint32_t, uint32_t, uint32_t);
+CSAN_ATOMIC_FUNC_CAS(64, uint64_t, uint64_t, uint64_t);
+CSAN_ATOMIC_FUNC_CAS(uint, unsigned int, unsigned int, unsigned int);
+CSAN_ATOMIC_FUNC_CAS(ulong, unsigned long, unsigned long, unsigned long);
+CSAN_ATOMIC_FUNC_CAS(ptr, void *, void, void *);
+
+CSAN_ATOMIC_FUNC_SWAP(32, uint32_t, uint32_t, uint32_t);
+CSAN_ATOMIC_FUNC_SWAP(64, uint64_t, uint64_t, uint64_t);
+CSAN_ATOMIC_FUNC_SWAP(uint, unsigned int, unsigned int, unsigned int);
+CSAN_ATOMIC_FUNC_SWAP(ulong, unsigned long, unsigned long, unsigned long);
+CSAN_ATOMIC_FUNC_SWAP(ptr, void *, void, void *);
+
+CSAN_ATOMIC_FUNC_DEC(32, uint32_t, uint32_t)
+CSAN_ATOMIC_FUNC_DEC(64, uint64_t, uint64_t)
+CSAN_ATOMIC_FUNC_DEC(uint, unsigned int, unsigned int);
+CSAN_ATOMIC_FUNC_DEC(ulong, unsigned long, unsigned long);
+CSAN_ATOMIC_FUNC_DEC(ptr, void *, void);
+
+CSAN_ATOMIC_FUNC_INC(32, uint32_t, uint32_t)
+CSAN_ATOMIC_FUNC_INC(64, uint64_t, uint64_t)
+CSAN_ATOMIC_FUNC_INC(uint, unsigned int, unsigned int);
+CSAN_ATOMIC_FUNC_INC(ulong, unsigned long, unsigned long);
+CSAN_ATOMIC_FUNC_INC(ptr, void *, void);
+
+/* -------------------------------------------------------------------------- */
+
+#include <sys/bus.h>
+
+#undef bus_space_read_multi_1
+#undef bus_space_read_multi_2
+#undef bus_space_read_multi_4
+#undef bus_space_read_multi_8
+#undef bus_space_read_multi_stream_1
+#undef bus_space_read_multi_stream_2
+#undef bus_space_read_multi_stream_4
+#undef bus_space_read_multi_stream_8
+#undef bus_space_read_region_1
+#undef bus_space_read_region_2
+#undef bus_space_read_region_4
+#undef bus_space_read_region_8
+#undef bus_space_read_region_stream_1
+#undef bus_space_read_region_stream_2
+#undef bus_space_read_region_stream_4
+#undef bus_space_read_region_stream_8
+#undef bus_space_write_multi_1
+#undef bus_space_write_multi_2
+#undef bus_space_write_multi_4
+#undef bus_space_write_multi_8
+#undef bus_space_write_multi_stream_1
+#undef bus_space_write_multi_stream_2
+#undef bus_space_write_multi_stream_4
+#undef bus_space_write_multi_stream_8
+#undef bus_space_write_region_1
+#undef bus_space_write_region_2
+#undef bus_space_write_region_4
+#undef bus_space_write_region_8
+#undef bus_space_write_region_stream_1
+#undef bus_space_write_region_stream_2
+#undef bus_space_write_region_stream_4
+#undef bus_space_write_region_stream_8
+
+#define CSAN_BUS_READ_FUNC(bytes, bits) \
+ void bus_space_read_multi_##bytes(bus_space_tag_t, bus_space_handle_t, \
+ bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_multi_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_multi_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ false, false, __RET_ADDR); \
+ bus_space_read_multi_##bytes(tag, hnd, size, buf, count); \
+ } \
+ void bus_space_read_multi_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_multi_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_multi_stream_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ false, false, __RET_ADDR); \
+ bus_space_read_multi_stream_##bytes(tag, hnd, size, buf, count);\
+ } \
+ void bus_space_read_region_##bytes(bus_space_tag_t, bus_space_handle_t, \
+ bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_region_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_region_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ false, false, __RET_ADDR); \
+ bus_space_read_region_##bytes(tag, hnd, size, buf, count); \
+ } \
+ void bus_space_read_region_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_region_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_read_region_stream_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ false, false, __RET_ADDR); \
+ bus_space_read_region_stream_##bytes(tag, hnd, size, buf, count);\
+ }
+
+#define CSAN_BUS_WRITE_FUNC(bytes, bits) \
+ void bus_space_write_multi_##bytes(bus_space_tag_t, bus_space_handle_t, \
+ bus_size_t, const uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_write_multi_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, const uint##bits##_t *, bus_size_t);\
+ void kcsan_bus_space_write_multi_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, const uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ true, false, __RET_ADDR); \
+ bus_space_write_multi_##bytes(tag, hnd, size, buf, count); \
+ } \
+ void bus_space_write_multi_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, const uint##bits##_t *, bus_size_t);\
+ void kcsan_bus_space_write_multi_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, const uint##bits##_t *, bus_size_t);\
+ void kcsan_bus_space_write_multi_stream_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, const uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ true, false, __RET_ADDR); \
+ bus_space_write_multi_stream_##bytes(tag, hnd, size, buf, count);\
+ } \
+ void bus_space_write_region_##bytes(bus_space_tag_t, bus_space_handle_t,\
+ bus_size_t, const uint##bits##_t *, bus_size_t); \
+ void kcsan_bus_space_write_region_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, const uint##bits##_t *, bus_size_t);\
+ void kcsan_bus_space_write_region_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, const uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ true, false, __RET_ADDR); \
+ bus_space_write_region_##bytes(tag, hnd, size, buf, count); \
+ } \
+ void bus_space_write_region_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, const uint##bits##_t *, bus_size_t);\
+ void kcsan_bus_space_write_region_stream_##bytes(bus_space_tag_t, \
+ bus_space_handle_t, bus_size_t, const uint##bits##_t *, bus_size_t);\
+ void kcsan_bus_space_write_region_stream_##bytes(bus_space_tag_t tag, \
+ bus_space_handle_t hnd, bus_size_t size, const uint##bits##_t *buf, \
+ bus_size_t count) \
+ { \
+ kcsan_access((uintptr_t)buf, sizeof(uint##bits##_t) * count, \
+ true, false, __RET_ADDR); \
+ bus_space_write_region_stream_##bytes(tag, hnd, size, buf, count);\
+ }
+
+CSAN_BUS_READ_FUNC(1, 8)
+CSAN_BUS_READ_FUNC(2, 16)
+CSAN_BUS_READ_FUNC(4, 32)
+CSAN_BUS_READ_FUNC(8, 64)
+
+CSAN_BUS_WRITE_FUNC(1, 8)
+CSAN_BUS_WRITE_FUNC(2, 16)
+CSAN_BUS_WRITE_FUNC(4, 32)
+CSAN_BUS_WRITE_FUNC(8, 64)
Added: head/sys/sys/csan.h
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/sys/sys/csan.h Wed Nov 20 14:37:48 2019 (r354894)
@@ -0,0 +1,49 @@
+/* $NetBSD: csan.h,v 1.1 2019/11/05 20:19:18 maxv Exp $ */
+
+/*
+ * Copyright (c) 2019 The NetBSD Foundation, Inc.
+ * All rights reserved.
+ *
+ * This code is derived from software contributed to The NetBSD Foundation
+ * by Maxime Villard.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#ifndef _SYS_CSAN_H_
+#define _SYS_CSAN_H_
+
+#ifdef _KERNEL_OPT
+#include "opt_kcsan.h"
+#endif
+
+#include <sys/types.h>
+
+#ifdef KCSAN
+void kcsan_init(void);
+void kcsan_cpu_init(struct cpu_info *);
+#else
+#define kcsan_init() __nothing
+#define kcsan_cpu_init(ci) __nothing
+#endif
+
+#endif /* !_SYS_CSAN_H_ */
More information about the svn-src-all
mailing list