]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - include/linux/kasan.h
Merge tag 'topic/drm-misc-2016-03-22' of git://anongit.freedesktop.org/drm-intel...
[mirror_ubuntu-zesty-kernel.git] / include / linux / kasan.h
CommitLineData
0b24becc
AR
1#ifndef _LINUX_KASAN_H
2#define _LINUX_KASAN_H
3
e3ae1163 4#include <linux/sched.h>
0b24becc
AR
5#include <linux/types.h>
6
7struct kmem_cache;
8struct page;
a5af5aa8 9struct vm_struct;
0b24becc
AR
10
11#ifdef CONFIG_KASAN
12
13#define KASAN_SHADOW_SCALE_SHIFT 3
0b24becc
AR
14
15#include <asm/kasan.h>
69786cdb 16#include <asm/pgtable.h>
0b24becc 17
69786cdb
AR
18extern unsigned char kasan_zero_page[PAGE_SIZE];
19extern pte_t kasan_zero_pte[PTRS_PER_PTE];
20extern pmd_t kasan_zero_pmd[PTRS_PER_PMD];
21extern pud_t kasan_zero_pud[PTRS_PER_PUD];
22
23void kasan_populate_zero_shadow(const void *shadow_start,
24 const void *shadow_end);
25
0b24becc
AR
26static inline void *kasan_mem_to_shadow(const void *addr)
27{
28 return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT)
29 + KASAN_SHADOW_OFFSET;
30}
31
32/* Enable reporting bugs after kasan_disable_current() */
33static inline void kasan_enable_current(void)
34{
35 current->kasan_depth++;
36}
37
38/* Disable reporting bugs for current task */
39static inline void kasan_disable_current(void)
40{
41 current->kasan_depth--;
42}
43
44void kasan_unpoison_shadow(const void *address, size_t size);
45
e3ae1163
MR
46void kasan_unpoison_task_stack(struct task_struct *task);
47
b8c73fc2
AR
48void kasan_alloc_pages(struct page *page, unsigned int order);
49void kasan_free_pages(struct page *page, unsigned int order);
50
0316bec2
AR
51void kasan_poison_slab(struct page *page);
52void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
53void kasan_poison_object_data(struct kmem_cache *cache, void *object);
54
55void kasan_kmalloc_large(const void *ptr, size_t size);
56void kasan_kfree_large(const void *ptr);
92393615 57void kasan_kfree(void *ptr);
0316bec2
AR
58void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size);
59void kasan_krealloc(const void *object, size_t new_size);
60
61void kasan_slab_alloc(struct kmem_cache *s, void *object);
62void kasan_slab_free(struct kmem_cache *s, void *object);
63
bebf56a1 64int kasan_module_alloc(void *addr, size_t size);
a5af5aa8 65void kasan_free_shadow(const struct vm_struct *vm);
bebf56a1 66
0b24becc
AR
67#else /* CONFIG_KASAN */
68
69static inline void kasan_unpoison_shadow(const void *address, size_t size) {}
70
e3ae1163
MR
71static inline void kasan_unpoison_task_stack(struct task_struct *task) {}
72
0b24becc
AR
73static inline void kasan_enable_current(void) {}
74static inline void kasan_disable_current(void) {}
75
b8c73fc2
AR
76static inline void kasan_alloc_pages(struct page *page, unsigned int order) {}
77static inline void kasan_free_pages(struct page *page, unsigned int order) {}
78
0316bec2
AR
79static inline void kasan_poison_slab(struct page *page) {}
80static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
81 void *object) {}
82static inline void kasan_poison_object_data(struct kmem_cache *cache,
83 void *object) {}
84
85static inline void kasan_kmalloc_large(void *ptr, size_t size) {}
86static inline void kasan_kfree_large(const void *ptr) {}
92393615 87static inline void kasan_kfree(void *ptr) {}
0316bec2
AR
88static inline void kasan_kmalloc(struct kmem_cache *s, const void *object,
89 size_t size) {}
90static inline void kasan_krealloc(const void *object, size_t new_size) {}
91
92static inline void kasan_slab_alloc(struct kmem_cache *s, void *object) {}
93static inline void kasan_slab_free(struct kmem_cache *s, void *object) {}
94
bebf56a1 95static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
a5af5aa8 96static inline void kasan_free_shadow(const struct vm_struct *vm) {}
bebf56a1 97
0b24becc
AR
98#endif /* CONFIG_KASAN */
99
100#endif /* LINUX_KASAN_H */