]>
Commit | Line | Data |
---|---|---|
0b24becc AR |
1 | #ifndef _LINUX_KASAN_H |
2 | #define _LINUX_KASAN_H | |
3 | ||
e3ae1163 | 4 | #include <linux/sched.h> |
0b24becc AR |
5 | #include <linux/types.h> |
6 | ||
7 | struct kmem_cache; | |
8 | struct page; | |
a5af5aa8 | 9 | struct vm_struct; |
0b24becc AR |
10 | |
11 | #ifdef CONFIG_KASAN | |
12 | ||
13 | #define KASAN_SHADOW_SCALE_SHIFT 3 | |
0b24becc AR |
14 | |
15 | #include <asm/kasan.h> | |
69786cdb | 16 | #include <asm/pgtable.h> |
0b24becc | 17 | |
69786cdb AR |
18 | extern unsigned char kasan_zero_page[PAGE_SIZE]; |
19 | extern pte_t kasan_zero_pte[PTRS_PER_PTE]; | |
20 | extern pmd_t kasan_zero_pmd[PTRS_PER_PMD]; | |
21 | extern pud_t kasan_zero_pud[PTRS_PER_PUD]; | |
22 | ||
23 | void kasan_populate_zero_shadow(const void *shadow_start, | |
24 | const void *shadow_end); | |
25 | ||
0b24becc AR |
26 | static inline void *kasan_mem_to_shadow(const void *addr) |
27 | { | |
28 | return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) | |
29 | + KASAN_SHADOW_OFFSET; | |
30 | } | |
31 | ||
32 | /* Enable reporting bugs after kasan_disable_current() */ | |
33 | static inline void kasan_enable_current(void) | |
34 | { | |
35 | current->kasan_depth++; | |
36 | } | |
37 | ||
38 | /* Disable reporting bugs for current task */ | |
39 | static inline void kasan_disable_current(void) | |
40 | { | |
41 | current->kasan_depth--; | |
42 | } | |
43 | ||
44 | void kasan_unpoison_shadow(const void *address, size_t size); | |
45 | ||
e3ae1163 MR |
46 | void kasan_unpoison_task_stack(struct task_struct *task); |
47 | ||
b8c73fc2 AR |
48 | void kasan_alloc_pages(struct page *page, unsigned int order); |
49 | void kasan_free_pages(struct page *page, unsigned int order); | |
50 | ||
7ed2f9e6 AP |
51 | void kasan_cache_create(struct kmem_cache *cache, size_t *size, |
52 | unsigned long *flags); | |
55834c59 AP |
53 | void kasan_cache_shrink(struct kmem_cache *cache); |
54 | void kasan_cache_destroy(struct kmem_cache *cache); | |
7ed2f9e6 | 55 | |
0316bec2 AR |
56 | void kasan_poison_slab(struct page *page); |
57 | void kasan_unpoison_object_data(struct kmem_cache *cache, void *object); | |
58 | void kasan_poison_object_data(struct kmem_cache *cache, void *object); | |
59 | ||
505f5dcb | 60 | void kasan_kmalloc_large(const void *ptr, size_t size, gfp_t flags); |
0316bec2 | 61 | void kasan_kfree_large(const void *ptr); |
9b75a867 | 62 | void kasan_poison_kfree(void *ptr); |
505f5dcb AP |
63 | void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size, |
64 | gfp_t flags); | |
65 | void kasan_krealloc(const void *object, size_t new_size, gfp_t flags); | |
0316bec2 | 66 | |
505f5dcb | 67 | void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags); |
55834c59 | 68 | bool kasan_slab_free(struct kmem_cache *s, void *object); |
0316bec2 | 69 | |
7ed2f9e6 AP |
70 | struct kasan_cache { |
71 | int alloc_meta_offset; | |
72 | int free_meta_offset; | |
73 | }; | |
74 | ||
bebf56a1 | 75 | int kasan_module_alloc(void *addr, size_t size); |
a5af5aa8 | 76 | void kasan_free_shadow(const struct vm_struct *vm); |
bebf56a1 | 77 | |
9b75a867 AR |
78 | size_t ksize(const void *); |
79 | static inline void kasan_unpoison_slab(const void *ptr) { ksize(ptr); } | |
80a9201a | 80 | size_t kasan_metadata_size(struct kmem_cache *cache); |
9b75a867 | 81 | |
0b24becc AR |
82 | #else /* CONFIG_KASAN */ |
83 | ||
84 | static inline void kasan_unpoison_shadow(const void *address, size_t size) {} | |
85 | ||
e3ae1163 MR |
86 | static inline void kasan_unpoison_task_stack(struct task_struct *task) {} |
87 | ||
0b24becc AR |
88 | static inline void kasan_enable_current(void) {} |
89 | static inline void kasan_disable_current(void) {} | |
90 | ||
b8c73fc2 AR |
91 | static inline void kasan_alloc_pages(struct page *page, unsigned int order) {} |
92 | static inline void kasan_free_pages(struct page *page, unsigned int order) {} | |
93 | ||
7ed2f9e6 AP |
94 | static inline void kasan_cache_create(struct kmem_cache *cache, |
95 | size_t *size, | |
96 | unsigned long *flags) {} | |
55834c59 AP |
97 | static inline void kasan_cache_shrink(struct kmem_cache *cache) {} |
98 | static inline void kasan_cache_destroy(struct kmem_cache *cache) {} | |
7ed2f9e6 | 99 | |
0316bec2 AR |
100 | static inline void kasan_poison_slab(struct page *page) {} |
101 | static inline void kasan_unpoison_object_data(struct kmem_cache *cache, | |
102 | void *object) {} | |
103 | static inline void kasan_poison_object_data(struct kmem_cache *cache, | |
104 | void *object) {} | |
105 | ||
505f5dcb | 106 | static inline void kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags) {} |
0316bec2 | 107 | static inline void kasan_kfree_large(const void *ptr) {} |
9b75a867 | 108 | static inline void kasan_poison_kfree(void *ptr) {} |
0316bec2 | 109 | static inline void kasan_kmalloc(struct kmem_cache *s, const void *object, |
505f5dcb AP |
110 | size_t size, gfp_t flags) {} |
111 | static inline void kasan_krealloc(const void *object, size_t new_size, | |
112 | gfp_t flags) {} | |
0316bec2 | 113 | |
505f5dcb AP |
114 | static inline void kasan_slab_alloc(struct kmem_cache *s, void *object, |
115 | gfp_t flags) {} | |
55834c59 AP |
116 | static inline bool kasan_slab_free(struct kmem_cache *s, void *object) |
117 | { | |
118 | return false; | |
119 | } | |
0316bec2 | 120 | |
bebf56a1 | 121 | static inline int kasan_module_alloc(void *addr, size_t size) { return 0; } |
a5af5aa8 | 122 | static inline void kasan_free_shadow(const struct vm_struct *vm) {} |
bebf56a1 | 123 | |
9b75a867 | 124 | static inline void kasan_unpoison_slab(const void *ptr) { } |
80a9201a | 125 | static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; } |
9b75a867 | 126 | |
0b24becc AR |
127 | #endif /* CONFIG_KASAN */ |
128 | ||
129 | #endif /* LINUX_KASAN_H */ |