]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - include/linux/kasan.h
UBUNTU: Ubuntu-4.10.0-37.41
[mirror_ubuntu-zesty-kernel.git] / include / linux / kasan.h
CommitLineData
0b24becc
AR
1#ifndef _LINUX_KASAN_H
2#define _LINUX_KASAN_H
3
e3ae1163 4#include <linux/sched.h>
0b24becc
AR
5#include <linux/types.h>
6
7struct kmem_cache;
8struct page;
a5af5aa8 9struct vm_struct;
0b24becc
AR
10
11#ifdef CONFIG_KASAN
12
13#define KASAN_SHADOW_SCALE_SHIFT 3
0b24becc
AR
14
15#include <asm/kasan.h>
69786cdb 16#include <asm/pgtable.h>
0b24becc 17
69786cdb
AR
18extern unsigned char kasan_zero_page[PAGE_SIZE];
19extern pte_t kasan_zero_pte[PTRS_PER_PTE];
20extern pmd_t kasan_zero_pmd[PTRS_PER_PMD];
21extern pud_t kasan_zero_pud[PTRS_PER_PUD];
22
23void kasan_populate_zero_shadow(const void *shadow_start,
24 const void *shadow_end);
25
0b24becc
AR
26static inline void *kasan_mem_to_shadow(const void *addr)
27{
28 return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT)
29 + KASAN_SHADOW_OFFSET;
30}
31
32/* Enable reporting bugs after kasan_disable_current() */
33static inline void kasan_enable_current(void)
34{
35 current->kasan_depth++;
36}
37
38/* Disable reporting bugs for current task */
39static inline void kasan_disable_current(void)
40{
41 current->kasan_depth--;
42}
43
44void kasan_unpoison_shadow(const void *address, size_t size);
45
e3ae1163 46void kasan_unpoison_task_stack(struct task_struct *task);
9f7d416c 47void kasan_unpoison_stack_above_sp_to(const void *watermark);
e3ae1163 48
b8c73fc2
AR
49void kasan_alloc_pages(struct page *page, unsigned int order);
50void kasan_free_pages(struct page *page, unsigned int order);
51
7ed2f9e6
AP
52void kasan_cache_create(struct kmem_cache *cache, size_t *size,
53 unsigned long *flags);
55834c59
AP
54void kasan_cache_shrink(struct kmem_cache *cache);
55void kasan_cache_destroy(struct kmem_cache *cache);
7ed2f9e6 56
0316bec2
AR
57void kasan_poison_slab(struct page *page);
58void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
59void kasan_poison_object_data(struct kmem_cache *cache, void *object);
b3cbd9bf 60void kasan_init_slab_obj(struct kmem_cache *cache, const void *object);
0316bec2 61
505f5dcb 62void kasan_kmalloc_large(const void *ptr, size_t size, gfp_t flags);
0316bec2 63void kasan_kfree_large(const void *ptr);
9b75a867 64void kasan_poison_kfree(void *ptr);
505f5dcb
AP
65void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size,
66 gfp_t flags);
67void kasan_krealloc(const void *object, size_t new_size, gfp_t flags);
0316bec2 68
505f5dcb 69void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags);
55834c59 70bool kasan_slab_free(struct kmem_cache *s, void *object);
0316bec2 71
7ed2f9e6
AP
72struct kasan_cache {
73 int alloc_meta_offset;
74 int free_meta_offset;
75};
76
bebf56a1 77int kasan_module_alloc(void *addr, size_t size);
a5af5aa8 78void kasan_free_shadow(const struct vm_struct *vm);
bebf56a1 79
9b75a867
AR
80size_t ksize(const void *);
81static inline void kasan_unpoison_slab(const void *ptr) { ksize(ptr); }
80a9201a 82size_t kasan_metadata_size(struct kmem_cache *cache);
9b75a867 83
0b24becc
AR
84#else /* CONFIG_KASAN */
85
86static inline void kasan_unpoison_shadow(const void *address, size_t size) {}
87
e3ae1163 88static inline void kasan_unpoison_task_stack(struct task_struct *task) {}
9f7d416c 89static inline void kasan_unpoison_stack_above_sp_to(const void *watermark) {}
e3ae1163 90
0b24becc
AR
91static inline void kasan_enable_current(void) {}
92static inline void kasan_disable_current(void) {}
93
b8c73fc2
AR
94static inline void kasan_alloc_pages(struct page *page, unsigned int order) {}
95static inline void kasan_free_pages(struct page *page, unsigned int order) {}
96
7ed2f9e6
AP
97static inline void kasan_cache_create(struct kmem_cache *cache,
98 size_t *size,
99 unsigned long *flags) {}
55834c59
AP
100static inline void kasan_cache_shrink(struct kmem_cache *cache) {}
101static inline void kasan_cache_destroy(struct kmem_cache *cache) {}
7ed2f9e6 102
0316bec2
AR
103static inline void kasan_poison_slab(struct page *page) {}
104static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
105 void *object) {}
106static inline void kasan_poison_object_data(struct kmem_cache *cache,
107 void *object) {}
b3cbd9bf
AR
108static inline void kasan_init_slab_obj(struct kmem_cache *cache,
109 const void *object) {}
0316bec2 110
505f5dcb 111static inline void kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags) {}
0316bec2 112static inline void kasan_kfree_large(const void *ptr) {}
9b75a867 113static inline void kasan_poison_kfree(void *ptr) {}
0316bec2 114static inline void kasan_kmalloc(struct kmem_cache *s, const void *object,
505f5dcb
AP
115 size_t size, gfp_t flags) {}
116static inline void kasan_krealloc(const void *object, size_t new_size,
117 gfp_t flags) {}
0316bec2 118
505f5dcb
AP
119static inline void kasan_slab_alloc(struct kmem_cache *s, void *object,
120 gfp_t flags) {}
55834c59
AP
121static inline bool kasan_slab_free(struct kmem_cache *s, void *object)
122{
123 return false;
124}
0316bec2 125
bebf56a1 126static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
a5af5aa8 127static inline void kasan_free_shadow(const struct vm_struct *vm) {}
bebf56a1 128
9b75a867 129static inline void kasan_unpoison_slab(const void *ptr) { }
80a9201a 130static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; }
9b75a867 131
0b24becc
AR
132#endif /* CONFIG_KASAN */
133
134#endif /* LINUX_KASAN_H */