mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-28 07:04:00 +08:00
c3ee82ce47
The KASAN subsystem wraps calls to memcpy(), memset() and memmove() to sanitize the arguments before invoking the actual routines, which have been renamed to __memcpy(), __memset() and __memmove(), respectively. When CONFIG_KASAN is enabled for the kernel build but KASAN code generation is disabled for the compilation unit (which is needed for things like the EFI stub or the decompressor), the string routines are just #define'd to their __ prefixed names so that they are simply invoked directly. This does however rely on those __ prefixed names to exist in the symbol namespace, which is not currently the case for the x86 decompressor, which may lead to errors like drivers/firmware/efi/libstub/tpm.o: In function `efi_retrieve_tpm2_eventlog': tpm.c:(.text+0x2a8): undefined reference to `__memcpy' So let's expose the __ prefixed symbols in the decompressor when KASAN is enabled. Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Acked-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Cc: Andrey Konovalov <andreyknvl@google.com> Cc: Borislav Petkov <bp@alien8.de> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Matthew Garrett <matthewgarrett@google.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: linux-efi@vger.kernel.org Signed-off-by: Ingo Molnar <mingo@kernel.org>
82 lines
1.9 KiB
C
82 lines
1.9 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* This provides an optimized implementation of memcpy, and a simplified
|
|
* implementation of memset and memmove. These are used here because the
|
|
* standard kernel runtime versions are not yet available and we don't
|
|
* trust the gcc built-in implementations as they may do unexpected things
|
|
* (e.g. FPU ops) in the minimal decompression stub execution environment.
|
|
*/
|
|
#include "error.h"
|
|
|
|
#include "../string.c"
|
|
|
|
#ifdef CONFIG_X86_32
|
|
static void *____memcpy(void *dest, const void *src, size_t n)
|
|
{
|
|
int d0, d1, d2;
|
|
asm volatile(
|
|
"rep ; movsl\n\t"
|
|
"movl %4,%%ecx\n\t"
|
|
"rep ; movsb\n\t"
|
|
: "=&c" (d0), "=&D" (d1), "=&S" (d2)
|
|
: "0" (n >> 2), "g" (n & 3), "1" (dest), "2" (src)
|
|
: "memory");
|
|
|
|
return dest;
|
|
}
|
|
#else
|
|
static void *____memcpy(void *dest, const void *src, size_t n)
|
|
{
|
|
long d0, d1, d2;
|
|
asm volatile(
|
|
"rep ; movsq\n\t"
|
|
"movq %4,%%rcx\n\t"
|
|
"rep ; movsb\n\t"
|
|
: "=&c" (d0), "=&D" (d1), "=&S" (d2)
|
|
: "0" (n >> 3), "g" (n & 7), "1" (dest), "2" (src)
|
|
: "memory");
|
|
|
|
return dest;
|
|
}
|
|
#endif
|
|
|
|
void *memset(void *s, int c, size_t n)
|
|
{
|
|
int i;
|
|
char *ss = s;
|
|
|
|
for (i = 0; i < n; i++)
|
|
ss[i] = c;
|
|
return s;
|
|
}
|
|
|
|
void *memmove(void *dest, const void *src, size_t n)
|
|
{
|
|
unsigned char *d = dest;
|
|
const unsigned char *s = src;
|
|
|
|
if (d <= s || d - s >= n)
|
|
return ____memcpy(dest, src, n);
|
|
|
|
while (n-- > 0)
|
|
d[n] = s[n];
|
|
|
|
return dest;
|
|
}
|
|
|
|
/* Detect and warn about potential overlaps, but handle them with memmove. */
|
|
void *memcpy(void *dest, const void *src, size_t n)
|
|
{
|
|
if (dest > src && dest - src < n) {
|
|
warn("Avoiding potentially unsafe overlapping memcpy()!");
|
|
return memmove(dest, src, n);
|
|
}
|
|
return ____memcpy(dest, src, n);
|
|
}
|
|
|
|
#ifdef CONFIG_KASAN
|
|
extern void *__memset(void *s, int c, size_t n) __alias(memset);
|
|
extern void *__memmove(void *dest, const void *src, size_t n) __alias(memmove);
|
|
extern void *__memcpy(void *dest, const void *src, size_t n) __alias(memcpy);
|
|
#endif
|