Merge tag 'mt76-for-kvalo-2020-06-07' of https://github.com/nbd168/wireless
[linux-2.6-block.git] / include / linux / kasan.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
0b24becc
AR
2#ifndef _LINUX_KASAN_H
3#define _LINUX_KASAN_H
4
5#include <linux/types.h>
6
7struct kmem_cache;
8struct page;
a5af5aa8 9struct vm_struct;
5be9b730 10struct task_struct;
0b24becc
AR
11
12#ifdef CONFIG_KASAN
13
ca5999fd 14#include <linux/pgtable.h>
65fddcfc 15#include <asm/kasan.h>
0b24becc 16
9577dd74
AK
17extern unsigned char kasan_early_shadow_page[PAGE_SIZE];
18extern pte_t kasan_early_shadow_pte[PTRS_PER_PTE];
19extern pmd_t kasan_early_shadow_pmd[PTRS_PER_PMD];
20extern pud_t kasan_early_shadow_pud[PTRS_PER_PUD];
21extern p4d_t kasan_early_shadow_p4d[MAX_PTRS_PER_P4D];
69786cdb 22
9577dd74 23int kasan_populate_early_shadow(const void *shadow_start,
69786cdb
AR
24 const void *shadow_end);
25
0b24becc
AR
26static inline void *kasan_mem_to_shadow(const void *addr)
27{
28 return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT)
29 + KASAN_SHADOW_OFFSET;
30}
31
32/* Enable reporting bugs after kasan_disable_current() */
af8601ad 33extern void kasan_enable_current(void);
0b24becc
AR
34
35/* Disable reporting bugs for current task */
af8601ad 36extern void kasan_disable_current(void);
0b24becc
AR
37
38void kasan_unpoison_shadow(const void *address, size_t size);
39
e3ae1163 40void kasan_unpoison_task_stack(struct task_struct *task);
9f7d416c 41void kasan_unpoison_stack_above_sp_to(const void *watermark);
e3ae1163 42
b8c73fc2
AR
43void kasan_alloc_pages(struct page *page, unsigned int order);
44void kasan_free_pages(struct page *page, unsigned int order);
45
be4a7988 46void kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
d50112ed 47 slab_flags_t *flags);
7ed2f9e6 48
0316bec2
AR
49void kasan_poison_slab(struct page *page);
50void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
51void kasan_poison_object_data(struct kmem_cache *cache, void *object);
66afc7f1
AK
52void * __must_check kasan_init_slab_obj(struct kmem_cache *cache,
53 const void *object);
0316bec2 54
66afc7f1
AK
55void * __must_check kasan_kmalloc_large(const void *ptr, size_t size,
56 gfp_t flags);
ee3ce779 57void kasan_kfree_large(void *ptr, unsigned long ip);
6860f634 58void kasan_poison_kfree(void *ptr, unsigned long ip);
66afc7f1
AK
59void * __must_check kasan_kmalloc(struct kmem_cache *s, const void *object,
60 size_t size, gfp_t flags);
61void * __must_check kasan_krealloc(const void *object, size_t new_size,
62 gfp_t flags);
0316bec2 63
66afc7f1
AK
64void * __must_check kasan_slab_alloc(struct kmem_cache *s, void *object,
65 gfp_t flags);
ee3ce779 66bool kasan_slab_free(struct kmem_cache *s, void *object, unsigned long ip);
0316bec2 67
7ed2f9e6
AP
68struct kasan_cache {
69 int alloc_meta_offset;
70 int free_meta_offset;
71};
72
3c5c3cfb
DA
73/*
74 * These functions provide a special case to support backing module
75 * allocations with real shadow memory. With KASAN vmalloc, the special
76 * case is unnecessary, as the work is handled in the generic case.
77 */
78#ifndef CONFIG_KASAN_VMALLOC
bebf56a1 79int kasan_module_alloc(void *addr, size_t size);
a5af5aa8 80void kasan_free_shadow(const struct vm_struct *vm);
3c5c3cfb
DA
81#else
82static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
83static inline void kasan_free_shadow(const struct vm_struct *vm) {}
84#endif
bebf56a1 85
0207df4f
AR
86int kasan_add_zero_shadow(void *start, unsigned long size);
87void kasan_remove_zero_shadow(void *start, unsigned long size);
88
0d4ca4c9
ME
89size_t __ksize(const void *);
90static inline void kasan_unpoison_slab(const void *ptr)
91{
92 kasan_unpoison_shadow(ptr, __ksize(ptr));
93}
80a9201a 94size_t kasan_metadata_size(struct kmem_cache *cache);
9b75a867 95
b0845ce5
MR
96bool kasan_save_enable_multi_shot(void);
97void kasan_restore_multi_shot(bool enabled);
98
0b24becc
AR
99#else /* CONFIG_KASAN */
100
101static inline void kasan_unpoison_shadow(const void *address, size_t size) {}
102
e3ae1163 103static inline void kasan_unpoison_task_stack(struct task_struct *task) {}
9f7d416c 104static inline void kasan_unpoison_stack_above_sp_to(const void *watermark) {}
e3ae1163 105
0b24becc
AR
106static inline void kasan_enable_current(void) {}
107static inline void kasan_disable_current(void) {}
108
b8c73fc2
AR
109static inline void kasan_alloc_pages(struct page *page, unsigned int order) {}
110static inline void kasan_free_pages(struct page *page, unsigned int order) {}
111
7ed2f9e6 112static inline void kasan_cache_create(struct kmem_cache *cache,
be4a7988 113 unsigned int *size,
d50112ed 114 slab_flags_t *flags) {}
7ed2f9e6 115
0316bec2
AR
116static inline void kasan_poison_slab(struct page *page) {}
117static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
118 void *object) {}
119static inline void kasan_poison_object_data(struct kmem_cache *cache,
120 void *object) {}
0116523c
AK
121static inline void *kasan_init_slab_obj(struct kmem_cache *cache,
122 const void *object)
123{
124 return (void *)object;
125}
0316bec2 126
0116523c
AK
127static inline void *kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags)
128{
129 return ptr;
130}
ee3ce779 131static inline void kasan_kfree_large(void *ptr, unsigned long ip) {}
6860f634 132static inline void kasan_poison_kfree(void *ptr, unsigned long ip) {}
0116523c
AK
133static inline void *kasan_kmalloc(struct kmem_cache *s, const void *object,
134 size_t size, gfp_t flags)
135{
136 return (void *)object;
137}
138static inline void *kasan_krealloc(const void *object, size_t new_size,
139 gfp_t flags)
140{
141 return (void *)object;
142}
0316bec2 143
0116523c
AK
144static inline void *kasan_slab_alloc(struct kmem_cache *s, void *object,
145 gfp_t flags)
146{
147 return object;
148}
ee3ce779
DV
149static inline bool kasan_slab_free(struct kmem_cache *s, void *object,
150 unsigned long ip)
55834c59
AP
151{
152 return false;
153}
0316bec2 154
bebf56a1 155static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
a5af5aa8 156static inline void kasan_free_shadow(const struct vm_struct *vm) {}
bebf56a1 157
0207df4f
AR
158static inline int kasan_add_zero_shadow(void *start, unsigned long size)
159{
160 return 0;
161}
162static inline void kasan_remove_zero_shadow(void *start,
163 unsigned long size)
164{}
165
9b75a867 166static inline void kasan_unpoison_slab(const void *ptr) { }
80a9201a 167static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; }
9b75a867 168
0b24becc
AR
169#endif /* CONFIG_KASAN */
170
2bd926b4
AK
171#ifdef CONFIG_KASAN_GENERIC
172
080eb83f
AK
173#define KASAN_SHADOW_INIT 0
174
2bd926b4
AK
175void kasan_cache_shrink(struct kmem_cache *cache);
176void kasan_cache_shutdown(struct kmem_cache *cache);
177
178#else /* CONFIG_KASAN_GENERIC */
179
180static inline void kasan_cache_shrink(struct kmem_cache *cache) {}
181static inline void kasan_cache_shutdown(struct kmem_cache *cache) {}
182
183#endif /* CONFIG_KASAN_GENERIC */
184
080eb83f
AK
185#ifdef CONFIG_KASAN_SW_TAGS
186
187#define KASAN_SHADOW_INIT 0xFF
188
3c9e3aa1
AK
189void kasan_init_tags(void);
190
191void *kasan_reset_tag(const void *addr);
192
8cceeff4 193bool kasan_report(unsigned long addr, size_t size,
41eea9cd
AK
194 bool is_write, unsigned long ip);
195
3c9e3aa1
AK
196#else /* CONFIG_KASAN_SW_TAGS */
197
198static inline void kasan_init_tags(void) { }
199
200static inline void *kasan_reset_tag(const void *addr)
201{
202 return (void *)addr;
203}
204
080eb83f
AK
205#endif /* CONFIG_KASAN_SW_TAGS */
206
3c5c3cfb 207#ifdef CONFIG_KASAN_VMALLOC
d98c9e83
AR
208int kasan_populate_vmalloc(unsigned long addr, unsigned long size);
209void kasan_poison_vmalloc(const void *start, unsigned long size);
210void kasan_unpoison_vmalloc(const void *start, unsigned long size);
3c5c3cfb
DA
211void kasan_release_vmalloc(unsigned long start, unsigned long end,
212 unsigned long free_region_start,
213 unsigned long free_region_end);
214#else
d98c9e83
AR
215static inline int kasan_populate_vmalloc(unsigned long start,
216 unsigned long size)
3c5c3cfb
DA
217{
218 return 0;
219}
220
d98c9e83
AR
221static inline void kasan_poison_vmalloc(const void *start, unsigned long size)
222{ }
223static inline void kasan_unpoison_vmalloc(const void *start, unsigned long size)
224{ }
3c5c3cfb
DA
225static inline void kasan_release_vmalloc(unsigned long start,
226 unsigned long end,
227 unsigned long free_region_start,
228 unsigned long free_region_end) {}
229#endif
230
2f004eea
JH
231#ifdef CONFIG_KASAN_INLINE
232void kasan_non_canonical_hook(unsigned long addr);
233#else /* CONFIG_KASAN_INLINE */
234static inline void kasan_non_canonical_hook(unsigned long addr) { }
235#endif /* CONFIG_KASAN_INLINE */
236
0b24becc 237#endif /* LINUX_KASAN_H */