]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - include/linux/kasan.h
<linux/uaccess.h>: Fix copy_in_user() declaration
[mirror_ubuntu-artful-kernel.git] / include / linux / kasan.h
CommitLineData
0b24becc
AR
1#ifndef _LINUX_KASAN_H
2#define _LINUX_KASAN_H
3
4#include <linux/types.h>
5
6struct kmem_cache;
7struct page;
a5af5aa8 8struct vm_struct;
5be9b730 9struct task_struct;
0b24becc
AR
10
11#ifdef CONFIG_KASAN
12
13#define KASAN_SHADOW_SCALE_SHIFT 3
0b24becc
AR
14
15#include <asm/kasan.h>
69786cdb 16#include <asm/pgtable.h>
0b24becc 17
69786cdb
AR
18extern unsigned char kasan_zero_page[PAGE_SIZE];
19extern pte_t kasan_zero_pte[PTRS_PER_PTE];
20extern pmd_t kasan_zero_pmd[PTRS_PER_PMD];
21extern pud_t kasan_zero_pud[PTRS_PER_PUD];
c2febafc 22extern p4d_t kasan_zero_p4d[PTRS_PER_P4D];
69786cdb
AR
23
24void kasan_populate_zero_shadow(const void *shadow_start,
25 const void *shadow_end);
26
0b24becc
AR
27static inline void *kasan_mem_to_shadow(const void *addr)
28{
29 return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT)
30 + KASAN_SHADOW_OFFSET;
31}
32
33/* Enable reporting bugs after kasan_disable_current() */
af8601ad 34extern void kasan_enable_current(void);
0b24becc
AR
35
36/* Disable reporting bugs for current task */
af8601ad 37extern void kasan_disable_current(void);
0b24becc
AR
38
39void kasan_unpoison_shadow(const void *address, size_t size);
40
e3ae1163 41void kasan_unpoison_task_stack(struct task_struct *task);
9f7d416c 42void kasan_unpoison_stack_above_sp_to(const void *watermark);
e3ae1163 43
b8c73fc2
AR
44void kasan_alloc_pages(struct page *page, unsigned int order);
45void kasan_free_pages(struct page *page, unsigned int order);
46
7ed2f9e6
AP
47void kasan_cache_create(struct kmem_cache *cache, size_t *size,
48 unsigned long *flags);
55834c59 49void kasan_cache_shrink(struct kmem_cache *cache);
f9fa1d91 50void kasan_cache_shutdown(struct kmem_cache *cache);
7ed2f9e6 51
0316bec2
AR
52void kasan_poison_slab(struct page *page);
53void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
54void kasan_poison_object_data(struct kmem_cache *cache, void *object);
b3cbd9bf 55void kasan_init_slab_obj(struct kmem_cache *cache, const void *object);
0316bec2 56
505f5dcb 57void kasan_kmalloc_large(const void *ptr, size_t size, gfp_t flags);
0316bec2 58void kasan_kfree_large(const void *ptr);
9b75a867 59void kasan_poison_kfree(void *ptr);
505f5dcb
AP
60void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size,
61 gfp_t flags);
62void kasan_krealloc(const void *object, size_t new_size, gfp_t flags);
0316bec2 63
505f5dcb 64void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags);
55834c59 65bool kasan_slab_free(struct kmem_cache *s, void *object);
0316bec2 66
7ed2f9e6
AP
67struct kasan_cache {
68 int alloc_meta_offset;
69 int free_meta_offset;
70};
71
bebf56a1 72int kasan_module_alloc(void *addr, size_t size);
a5af5aa8 73void kasan_free_shadow(const struct vm_struct *vm);
bebf56a1 74
9b75a867
AR
75size_t ksize(const void *);
76static inline void kasan_unpoison_slab(const void *ptr) { ksize(ptr); }
80a9201a 77size_t kasan_metadata_size(struct kmem_cache *cache);
9b75a867 78
b0845ce5
MR
79bool kasan_save_enable_multi_shot(void);
80void kasan_restore_multi_shot(bool enabled);
81
0b24becc
AR
82#else /* CONFIG_KASAN */
83
84static inline void kasan_unpoison_shadow(const void *address, size_t size) {}
85
e3ae1163 86static inline void kasan_unpoison_task_stack(struct task_struct *task) {}
9f7d416c 87static inline void kasan_unpoison_stack_above_sp_to(const void *watermark) {}
e3ae1163 88
0b24becc
AR
89static inline void kasan_enable_current(void) {}
90static inline void kasan_disable_current(void) {}
91
b8c73fc2
AR
92static inline void kasan_alloc_pages(struct page *page, unsigned int order) {}
93static inline void kasan_free_pages(struct page *page, unsigned int order) {}
94
7ed2f9e6
AP
95static inline void kasan_cache_create(struct kmem_cache *cache,
96 size_t *size,
97 unsigned long *flags) {}
55834c59 98static inline void kasan_cache_shrink(struct kmem_cache *cache) {}
f9fa1d91 99static inline void kasan_cache_shutdown(struct kmem_cache *cache) {}
7ed2f9e6 100
0316bec2
AR
101static inline void kasan_poison_slab(struct page *page) {}
102static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
103 void *object) {}
104static inline void kasan_poison_object_data(struct kmem_cache *cache,
105 void *object) {}
b3cbd9bf
AR
106static inline void kasan_init_slab_obj(struct kmem_cache *cache,
107 const void *object) {}
0316bec2 108
505f5dcb 109static inline void kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags) {}
0316bec2 110static inline void kasan_kfree_large(const void *ptr) {}
9b75a867 111static inline void kasan_poison_kfree(void *ptr) {}
0316bec2 112static inline void kasan_kmalloc(struct kmem_cache *s, const void *object,
505f5dcb
AP
113 size_t size, gfp_t flags) {}
114static inline void kasan_krealloc(const void *object, size_t new_size,
115 gfp_t flags) {}
0316bec2 116
505f5dcb
AP
117static inline void kasan_slab_alloc(struct kmem_cache *s, void *object,
118 gfp_t flags) {}
55834c59
AP
119static inline bool kasan_slab_free(struct kmem_cache *s, void *object)
120{
121 return false;
122}
0316bec2 123
bebf56a1 124static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
a5af5aa8 125static inline void kasan_free_shadow(const struct vm_struct *vm) {}
bebf56a1 126
9b75a867 127static inline void kasan_unpoison_slab(const void *ptr) { }
80a9201a 128static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; }
9b75a867 129
0b24becc
AR
130#endif /* CONFIG_KASAN */
131
132#endif /* LINUX_KASAN_H */