]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blame - include/linux/kasan.h
kasan, module, vmalloc: rework shadow allocation for modules
[mirror_ubuntu-hirsute-kernel.git] / include / linux / kasan.h
CommitLineData
0b24becc
AR
1#ifndef _LINUX_KASAN_H
2#define _LINUX_KASAN_H
3
4#include <linux/types.h>
5
6struct kmem_cache;
7struct page;
a5af5aa8 8struct vm_struct;
0b24becc
AR
9
10#ifdef CONFIG_KASAN
11
12#define KASAN_SHADOW_SCALE_SHIFT 3
13#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL)
14
15#include <asm/kasan.h>
16#include <linux/sched.h>
17
18static inline void *kasan_mem_to_shadow(const void *addr)
19{
20 return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT)
21 + KASAN_SHADOW_OFFSET;
22}
23
24/* Enable reporting bugs after kasan_disable_current() */
25static inline void kasan_enable_current(void)
26{
27 current->kasan_depth++;
28}
29
30/* Disable reporting bugs for current task */
31static inline void kasan_disable_current(void)
32{
33 current->kasan_depth--;
34}
35
36void kasan_unpoison_shadow(const void *address, size_t size);
37
b8c73fc2
AR
38void kasan_alloc_pages(struct page *page, unsigned int order);
39void kasan_free_pages(struct page *page, unsigned int order);
40
0316bec2
AR
41void kasan_poison_slab(struct page *page);
42void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
43void kasan_poison_object_data(struct kmem_cache *cache, void *object);
44
45void kasan_kmalloc_large(const void *ptr, size_t size);
46void kasan_kfree_large(const void *ptr);
47void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size);
48void kasan_krealloc(const void *object, size_t new_size);
49
50void kasan_slab_alloc(struct kmem_cache *s, void *object);
51void kasan_slab_free(struct kmem_cache *s, void *object);
52
bebf56a1
AR
53#define MODULE_ALIGN (PAGE_SIZE << KASAN_SHADOW_SCALE_SHIFT)
54
55int kasan_module_alloc(void *addr, size_t size);
a5af5aa8 56void kasan_free_shadow(const struct vm_struct *vm);
bebf56a1 57
0b24becc
AR
58#else /* CONFIG_KASAN */
59
bebf56a1
AR
60#define MODULE_ALIGN 1
61
0b24becc
AR
62static inline void kasan_unpoison_shadow(const void *address, size_t size) {}
63
64static inline void kasan_enable_current(void) {}
65static inline void kasan_disable_current(void) {}
66
b8c73fc2
AR
67static inline void kasan_alloc_pages(struct page *page, unsigned int order) {}
68static inline void kasan_free_pages(struct page *page, unsigned int order) {}
69
0316bec2
AR
70static inline void kasan_poison_slab(struct page *page) {}
71static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
72 void *object) {}
73static inline void kasan_poison_object_data(struct kmem_cache *cache,
74 void *object) {}
75
76static inline void kasan_kmalloc_large(void *ptr, size_t size) {}
77static inline void kasan_kfree_large(const void *ptr) {}
78static inline void kasan_kmalloc(struct kmem_cache *s, const void *object,
79 size_t size) {}
80static inline void kasan_krealloc(const void *object, size_t new_size) {}
81
82static inline void kasan_slab_alloc(struct kmem_cache *s, void *object) {}
83static inline void kasan_slab_free(struct kmem_cache *s, void *object) {}
84
bebf56a1 85static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
a5af5aa8 86static inline void kasan_free_shadow(const struct vm_struct *vm) {}
bebf56a1 87
0b24becc
AR
88#endif /* CONFIG_KASAN */
89
90#endif /* LINUX_KASAN_H */