]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - include/linux/kasan.h
net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
[mirror_ubuntu-bionic-kernel.git] / include / linux / kasan.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
0b24becc
AR
2#ifndef _LINUX_KASAN_H
3#define _LINUX_KASAN_H
4
5#include <linux/types.h>
6
7struct kmem_cache;
8struct page;
a5af5aa8 9struct vm_struct;
5be9b730 10struct task_struct;
0b24becc
AR
11
12#ifdef CONFIG_KASAN
13
14#define KASAN_SHADOW_SCALE_SHIFT 3
0b24becc
AR
15
16#include <asm/kasan.h>
69786cdb 17#include <asm/pgtable.h>
0b24becc 18
69786cdb
AR
19extern unsigned char kasan_zero_page[PAGE_SIZE];
20extern pte_t kasan_zero_pte[PTRS_PER_PTE];
21extern pmd_t kasan_zero_pmd[PTRS_PER_PMD];
22extern pud_t kasan_zero_pud[PTRS_PER_PUD];
c2febafc 23extern p4d_t kasan_zero_p4d[PTRS_PER_P4D];
69786cdb
AR
24
25void kasan_populate_zero_shadow(const void *shadow_start,
26 const void *shadow_end);
27
0b24becc
AR
28static inline void *kasan_mem_to_shadow(const void *addr)
29{
30 return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT)
31 + KASAN_SHADOW_OFFSET;
32}
33
34/* Enable reporting bugs after kasan_disable_current() */
af8601ad 35extern void kasan_enable_current(void);
0b24becc
AR
36
37/* Disable reporting bugs for current task */
af8601ad 38extern void kasan_disable_current(void);
0b24becc
AR
39
40void kasan_unpoison_shadow(const void *address, size_t size);
41
e3ae1163 42void kasan_unpoison_task_stack(struct task_struct *task);
9f7d416c 43void kasan_unpoison_stack_above_sp_to(const void *watermark);
e3ae1163 44
b8c73fc2
AR
45void kasan_alloc_pages(struct page *page, unsigned int order);
46void kasan_free_pages(struct page *page, unsigned int order);
47
7ed2f9e6 48void kasan_cache_create(struct kmem_cache *cache, size_t *size,
d50112ed 49 slab_flags_t *flags);
55834c59 50void kasan_cache_shrink(struct kmem_cache *cache);
f9fa1d91 51void kasan_cache_shutdown(struct kmem_cache *cache);
7ed2f9e6 52
0316bec2
AR
53void kasan_poison_slab(struct page *page);
54void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
55void kasan_poison_object_data(struct kmem_cache *cache, void *object);
b3cbd9bf 56void kasan_init_slab_obj(struct kmem_cache *cache, const void *object);
0316bec2 57
505f5dcb 58void kasan_kmalloc_large(const void *ptr, size_t size, gfp_t flags);
0316bec2 59void kasan_kfree_large(const void *ptr);
9b75a867 60void kasan_poison_kfree(void *ptr);
505f5dcb
AP
61void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size,
62 gfp_t flags);
63void kasan_krealloc(const void *object, size_t new_size, gfp_t flags);
0316bec2 64
505f5dcb 65void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags);
55834c59 66bool kasan_slab_free(struct kmem_cache *s, void *object);
0316bec2 67
7ed2f9e6
AP
68struct kasan_cache {
69 int alloc_meta_offset;
70 int free_meta_offset;
71};
72
bebf56a1 73int kasan_module_alloc(void *addr, size_t size);
a5af5aa8 74void kasan_free_shadow(const struct vm_struct *vm);
bebf56a1 75
9b75a867
AR
76size_t ksize(const void *);
77static inline void kasan_unpoison_slab(const void *ptr) { ksize(ptr); }
80a9201a 78size_t kasan_metadata_size(struct kmem_cache *cache);
9b75a867 79
b0845ce5
MR
80bool kasan_save_enable_multi_shot(void);
81void kasan_restore_multi_shot(bool enabled);
82
0b24becc
AR
83#else /* CONFIG_KASAN */
84
85static inline void kasan_unpoison_shadow(const void *address, size_t size) {}
86
e3ae1163 87static inline void kasan_unpoison_task_stack(struct task_struct *task) {}
9f7d416c 88static inline void kasan_unpoison_stack_above_sp_to(const void *watermark) {}
e3ae1163 89
0b24becc
AR
90static inline void kasan_enable_current(void) {}
91static inline void kasan_disable_current(void) {}
92
b8c73fc2
AR
93static inline void kasan_alloc_pages(struct page *page, unsigned int order) {}
94static inline void kasan_free_pages(struct page *page, unsigned int order) {}
95
7ed2f9e6
AP
96static inline void kasan_cache_create(struct kmem_cache *cache,
97 size_t *size,
d50112ed 98 slab_flags_t *flags) {}
55834c59 99static inline void kasan_cache_shrink(struct kmem_cache *cache) {}
f9fa1d91 100static inline void kasan_cache_shutdown(struct kmem_cache *cache) {}
7ed2f9e6 101
0316bec2
AR
102static inline void kasan_poison_slab(struct page *page) {}
103static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
104 void *object) {}
105static inline void kasan_poison_object_data(struct kmem_cache *cache,
106 void *object) {}
b3cbd9bf
AR
107static inline void kasan_init_slab_obj(struct kmem_cache *cache,
108 const void *object) {}
0316bec2 109
505f5dcb 110static inline void kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags) {}
0316bec2 111static inline void kasan_kfree_large(const void *ptr) {}
9b75a867 112static inline void kasan_poison_kfree(void *ptr) {}
0316bec2 113static inline void kasan_kmalloc(struct kmem_cache *s, const void *object,
505f5dcb
AP
114 size_t size, gfp_t flags) {}
115static inline void kasan_krealloc(const void *object, size_t new_size,
116 gfp_t flags) {}
0316bec2 117
505f5dcb
AP
118static inline void kasan_slab_alloc(struct kmem_cache *s, void *object,
119 gfp_t flags) {}
55834c59
AP
120static inline bool kasan_slab_free(struct kmem_cache *s, void *object)
121{
122 return false;
123}
0316bec2 124
bebf56a1 125static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
a5af5aa8 126static inline void kasan_free_shadow(const struct vm_struct *vm) {}
bebf56a1 127
9b75a867 128static inline void kasan_unpoison_slab(const void *ptr) { }
80a9201a 129static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; }
9b75a867 130
0b24becc
AR
131#endif /* CONFIG_KASAN */
132
133#endif /* LINUX_KASAN_H */