Commit | Line | Data |
---|---|---|
0b24becc AR |
1 | #ifndef _LINUX_KASAN_H |
2 | #define _LINUX_KASAN_H | |
3 | ||
e3ae1163 | 4 | #include <linux/sched.h> |
0b24becc AR |
5 | #include <linux/types.h> |
6 | ||
7 | struct kmem_cache; | |
8 | struct page; | |
a5af5aa8 | 9 | struct vm_struct; |
0b24becc AR |
10 | |
11 | #ifdef CONFIG_KASAN | |
12 | ||
13 | #define KASAN_SHADOW_SCALE_SHIFT 3 | |
0b24becc AR |
14 | |
15 | #include <asm/kasan.h> | |
69786cdb | 16 | #include <asm/pgtable.h> |
0b24becc | 17 | |
69786cdb AR |
18 | extern unsigned char kasan_zero_page[PAGE_SIZE]; |
19 | extern pte_t kasan_zero_pte[PTRS_PER_PTE]; | |
20 | extern pmd_t kasan_zero_pmd[PTRS_PER_PMD]; | |
21 | extern pud_t kasan_zero_pud[PTRS_PER_PUD]; | |
22 | ||
23 | void kasan_populate_zero_shadow(const void *shadow_start, | |
24 | const void *shadow_end); | |
25 | ||
0b24becc AR |
26 | static inline void *kasan_mem_to_shadow(const void *addr) |
27 | { | |
28 | return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) | |
29 | + KASAN_SHADOW_OFFSET; | |
30 | } | |
31 | ||
32 | /* Enable reporting bugs after kasan_disable_current() */ | |
33 | static inline void kasan_enable_current(void) | |
34 | { | |
35 | current->kasan_depth++; | |
36 | } | |
37 | ||
38 | /* Disable reporting bugs for current task */ | |
39 | static inline void kasan_disable_current(void) | |
40 | { | |
41 | current->kasan_depth--; | |
42 | } | |
43 | ||
44 | void kasan_unpoison_shadow(const void *address, size_t size); | |
45 | ||
e3ae1163 MR |
46 | void kasan_unpoison_task_stack(struct task_struct *task); |
47 | ||
b8c73fc2 AR |
48 | void kasan_alloc_pages(struct page *page, unsigned int order); |
49 | void kasan_free_pages(struct page *page, unsigned int order); | |
50 | ||
7ed2f9e6 AP |
51 | void kasan_cache_create(struct kmem_cache *cache, size_t *size, |
52 | unsigned long *flags); | |
55834c59 AP |
53 | void kasan_cache_shrink(struct kmem_cache *cache); |
54 | void kasan_cache_destroy(struct kmem_cache *cache); | |
7ed2f9e6 | 55 | |
0316bec2 AR |
56 | void kasan_poison_slab(struct page *page); |
57 | void kasan_unpoison_object_data(struct kmem_cache *cache, void *object); | |
58 | void kasan_poison_object_data(struct kmem_cache *cache, void *object); | |
b3cbd9bf | 59 | void kasan_init_slab_obj(struct kmem_cache *cache, const void *object); |
0316bec2 | 60 | |
505f5dcb | 61 | void kasan_kmalloc_large(const void *ptr, size_t size, gfp_t flags); |
0316bec2 | 62 | void kasan_kfree_large(const void *ptr); |
9b75a867 | 63 | void kasan_poison_kfree(void *ptr); |
505f5dcb AP |
64 | void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size, |
65 | gfp_t flags); | |
66 | void kasan_krealloc(const void *object, size_t new_size, gfp_t flags); | |
0316bec2 | 67 | |
505f5dcb | 68 | void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags); |
55834c59 | 69 | bool kasan_slab_free(struct kmem_cache *s, void *object); |
0316bec2 | 70 | |
7ed2f9e6 AP |
71 | struct kasan_cache { |
72 | int alloc_meta_offset; | |
73 | int free_meta_offset; | |
74 | }; | |
75 | ||
bebf56a1 | 76 | int kasan_module_alloc(void *addr, size_t size); |
a5af5aa8 | 77 | void kasan_free_shadow(const struct vm_struct *vm); |
bebf56a1 | 78 | |
9b75a867 AR |
79 | size_t ksize(const void *); |
80 | static inline void kasan_unpoison_slab(const void *ptr) { ksize(ptr); } | |
80a9201a | 81 | size_t kasan_metadata_size(struct kmem_cache *cache); |
9b75a867 | 82 | |
0b24becc AR |
83 | #else /* CONFIG_KASAN */ |
84 | ||
85 | static inline void kasan_unpoison_shadow(const void *address, size_t size) {} | |
86 | ||
e3ae1163 MR |
87 | static inline void kasan_unpoison_task_stack(struct task_struct *task) {} |
88 | ||
0b24becc AR |
89 | static inline void kasan_enable_current(void) {} |
90 | static inline void kasan_disable_current(void) {} | |
91 | ||
b8c73fc2 AR |
92 | static inline void kasan_alloc_pages(struct page *page, unsigned int order) {} |
93 | static inline void kasan_free_pages(struct page *page, unsigned int order) {} | |
94 | ||
7ed2f9e6 AP |
95 | static inline void kasan_cache_create(struct kmem_cache *cache, |
96 | size_t *size, | |
97 | unsigned long *flags) {} | |
55834c59 AP |
98 | static inline void kasan_cache_shrink(struct kmem_cache *cache) {} |
99 | static inline void kasan_cache_destroy(struct kmem_cache *cache) {} | |
7ed2f9e6 | 100 | |
0316bec2 AR |
101 | static inline void kasan_poison_slab(struct page *page) {} |
102 | static inline void kasan_unpoison_object_data(struct kmem_cache *cache, | |
103 | void *object) {} | |
104 | static inline void kasan_poison_object_data(struct kmem_cache *cache, | |
105 | void *object) {} | |
b3cbd9bf AR |
106 | static inline void kasan_init_slab_obj(struct kmem_cache *cache, |
107 | const void *object) {} | |
0316bec2 | 108 | |
505f5dcb | 109 | static inline void kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags) {} |
0316bec2 | 110 | static inline void kasan_kfree_large(const void *ptr) {} |
9b75a867 | 111 | static inline void kasan_poison_kfree(void *ptr) {} |
0316bec2 | 112 | static inline void kasan_kmalloc(struct kmem_cache *s, const void *object, |
505f5dcb AP |
113 | size_t size, gfp_t flags) {} |
114 | static inline void kasan_krealloc(const void *object, size_t new_size, | |
115 | gfp_t flags) {} | |
0316bec2 | 116 | |
505f5dcb AP |
117 | static inline void kasan_slab_alloc(struct kmem_cache *s, void *object, |
118 | gfp_t flags) {} | |
55834c59 AP |
119 | static inline bool kasan_slab_free(struct kmem_cache *s, void *object) |
120 | { | |
121 | return false; | |
122 | } | |
0316bec2 | 123 | |
bebf56a1 | 124 | static inline int kasan_module_alloc(void *addr, size_t size) { return 0; } |
a5af5aa8 | 125 | static inline void kasan_free_shadow(const struct vm_struct *vm) {} |
bebf56a1 | 126 | |
9b75a867 | 127 | static inline void kasan_unpoison_slab(const void *ptr) { } |
80a9201a | 128 | static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; } |
9b75a867 | 129 | |
0b24becc AR |
130 | #endif /* CONFIG_KASAN */ |
131 | ||
132 | #endif /* LINUX_KASAN_H */ |