Commit | Line | Data |
---|---|---|
b2441318 | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
0b24becc AR |
2 | #ifndef _LINUX_KASAN_H |
3 | #define _LINUX_KASAN_H | |
4 | ||
5 | #include <linux/types.h> | |
6 | ||
7 | struct kmem_cache; | |
8 | struct page; | |
a5af5aa8 | 9 | struct vm_struct; |
5be9b730 | 10 | struct task_struct; |
0b24becc AR |
11 | |
12 | #ifdef CONFIG_KASAN | |
13 | ||
0b24becc | 14 | #include <asm/kasan.h> |
69786cdb | 15 | #include <asm/pgtable.h> |
0b24becc | 16 | |
9577dd74 AK |
17 | extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; |
18 | extern pte_t kasan_early_shadow_pte[PTRS_PER_PTE]; | |
19 | extern pmd_t kasan_early_shadow_pmd[PTRS_PER_PMD]; | |
20 | extern pud_t kasan_early_shadow_pud[PTRS_PER_PUD]; | |
21 | extern p4d_t kasan_early_shadow_p4d[MAX_PTRS_PER_P4D]; | |
69786cdb | 22 | |
9577dd74 | 23 | int kasan_populate_early_shadow(const void *shadow_start, |
69786cdb AR |
24 | const void *shadow_end); |
25 | ||
0b24becc AR |
26 | static inline void *kasan_mem_to_shadow(const void *addr) |
27 | { | |
28 | return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) | |
29 | + KASAN_SHADOW_OFFSET; | |
30 | } | |
31 | ||
32 | /* Enable reporting bugs after kasan_disable_current() */ | |
af8601ad | 33 | extern void kasan_enable_current(void); |
0b24becc AR |
34 | |
35 | /* Disable reporting bugs for current task */ | |
af8601ad | 36 | extern void kasan_disable_current(void); |
0b24becc AR |
37 | |
38 | void kasan_unpoison_shadow(const void *address, size_t size); | |
39 | ||
e3ae1163 | 40 | void kasan_unpoison_task_stack(struct task_struct *task); |
9f7d416c | 41 | void kasan_unpoison_stack_above_sp_to(const void *watermark); |
e3ae1163 | 42 | |
b8c73fc2 AR |
43 | void kasan_alloc_pages(struct page *page, unsigned int order); |
44 | void kasan_free_pages(struct page *page, unsigned int order); | |
45 | ||
be4a7988 | 46 | void kasan_cache_create(struct kmem_cache *cache, unsigned int *size, |
d50112ed | 47 | slab_flags_t *flags); |
7ed2f9e6 | 48 | |
0316bec2 AR |
49 | void kasan_poison_slab(struct page *page); |
50 | void kasan_unpoison_object_data(struct kmem_cache *cache, void *object); | |
51 | void kasan_poison_object_data(struct kmem_cache *cache, void *object); | |
66afc7f1 AK |
52 | void * __must_check kasan_init_slab_obj(struct kmem_cache *cache, |
53 | const void *object); | |
0316bec2 | 54 | |
66afc7f1 AK |
55 | void * __must_check kasan_kmalloc_large(const void *ptr, size_t size, |
56 | gfp_t flags); | |
ee3ce779 | 57 | void kasan_kfree_large(void *ptr, unsigned long ip); |
6860f634 | 58 | void kasan_poison_kfree(void *ptr, unsigned long ip); |
66afc7f1 AK |
59 | void * __must_check kasan_kmalloc(struct kmem_cache *s, const void *object, |
60 | size_t size, gfp_t flags); | |
61 | void * __must_check kasan_krealloc(const void *object, size_t new_size, | |
62 | gfp_t flags); | |
0316bec2 | 63 | |
66afc7f1 AK |
64 | void * __must_check kasan_slab_alloc(struct kmem_cache *s, void *object, |
65 | gfp_t flags); | |
ee3ce779 | 66 | bool kasan_slab_free(struct kmem_cache *s, void *object, unsigned long ip); |
0316bec2 | 67 | |
7ed2f9e6 AP |
68 | struct kasan_cache { |
69 | int alloc_meta_offset; | |
70 | int free_meta_offset; | |
71 | }; | |
72 | ||
bebf56a1 | 73 | int kasan_module_alloc(void *addr, size_t size); |
a5af5aa8 | 74 | void kasan_free_shadow(const struct vm_struct *vm); |
bebf56a1 | 75 | |
0207df4f AR |
76 | int kasan_add_zero_shadow(void *start, unsigned long size); |
77 | void kasan_remove_zero_shadow(void *start, unsigned long size); | |
78 | ||
0d4ca4c9 ME |
79 | size_t __ksize(const void *); |
80 | static inline void kasan_unpoison_slab(const void *ptr) | |
81 | { | |
82 | kasan_unpoison_shadow(ptr, __ksize(ptr)); | |
83 | } | |
80a9201a | 84 | size_t kasan_metadata_size(struct kmem_cache *cache); |
9b75a867 | 85 | |
b0845ce5 MR |
86 | bool kasan_save_enable_multi_shot(void); |
87 | void kasan_restore_multi_shot(bool enabled); | |
88 | ||
0b24becc AR |
89 | #else /* CONFIG_KASAN */ |
90 | ||
91 | static inline void kasan_unpoison_shadow(const void *address, size_t size) {} | |
92 | ||
e3ae1163 | 93 | static inline void kasan_unpoison_task_stack(struct task_struct *task) {} |
9f7d416c | 94 | static inline void kasan_unpoison_stack_above_sp_to(const void *watermark) {} |
e3ae1163 | 95 | |
0b24becc AR |
96 | static inline void kasan_enable_current(void) {} |
97 | static inline void kasan_disable_current(void) {} | |
98 | ||
b8c73fc2 AR |
99 | static inline void kasan_alloc_pages(struct page *page, unsigned int order) {} |
100 | static inline void kasan_free_pages(struct page *page, unsigned int order) {} | |
101 | ||
7ed2f9e6 | 102 | static inline void kasan_cache_create(struct kmem_cache *cache, |
be4a7988 | 103 | unsigned int *size, |
d50112ed | 104 | slab_flags_t *flags) {} |
7ed2f9e6 | 105 | |
0316bec2 AR |
106 | static inline void kasan_poison_slab(struct page *page) {} |
107 | static inline void kasan_unpoison_object_data(struct kmem_cache *cache, | |
108 | void *object) {} | |
109 | static inline void kasan_poison_object_data(struct kmem_cache *cache, | |
110 | void *object) {} | |
0116523c AK |
111 | static inline void *kasan_init_slab_obj(struct kmem_cache *cache, |
112 | const void *object) | |
113 | { | |
114 | return (void *)object; | |
115 | } | |
0316bec2 | 116 | |
0116523c AK |
117 | static inline void *kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags) |
118 | { | |
119 | return ptr; | |
120 | } | |
ee3ce779 | 121 | static inline void kasan_kfree_large(void *ptr, unsigned long ip) {} |
6860f634 | 122 | static inline void kasan_poison_kfree(void *ptr, unsigned long ip) {} |
0116523c AK |
123 | static inline void *kasan_kmalloc(struct kmem_cache *s, const void *object, |
124 | size_t size, gfp_t flags) | |
125 | { | |
126 | return (void *)object; | |
127 | } | |
128 | static inline void *kasan_krealloc(const void *object, size_t new_size, | |
129 | gfp_t flags) | |
130 | { | |
131 | return (void *)object; | |
132 | } | |
0316bec2 | 133 | |
0116523c AK |
134 | static inline void *kasan_slab_alloc(struct kmem_cache *s, void *object, |
135 | gfp_t flags) | |
136 | { | |
137 | return object; | |
138 | } | |
ee3ce779 DV |
139 | static inline bool kasan_slab_free(struct kmem_cache *s, void *object, |
140 | unsigned long ip) | |
55834c59 AP |
141 | { |
142 | return false; | |
143 | } | |
0316bec2 | 144 | |
bebf56a1 | 145 | static inline int kasan_module_alloc(void *addr, size_t size) { return 0; } |
a5af5aa8 | 146 | static inline void kasan_free_shadow(const struct vm_struct *vm) {} |
bebf56a1 | 147 | |
0207df4f AR |
148 | static inline int kasan_add_zero_shadow(void *start, unsigned long size) |
149 | { | |
150 | return 0; | |
151 | } | |
152 | static inline void kasan_remove_zero_shadow(void *start, | |
153 | unsigned long size) | |
154 | {} | |
155 | ||
9b75a867 | 156 | static inline void kasan_unpoison_slab(const void *ptr) { } |
80a9201a | 157 | static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; } |
9b75a867 | 158 | |
0b24becc AR |
159 | #endif /* CONFIG_KASAN */ |
160 | ||
2bd926b4 AK |
161 | #ifdef CONFIG_KASAN_GENERIC |
162 | ||
080eb83f AK |
163 | #define KASAN_SHADOW_INIT 0 |
164 | ||
2bd926b4 AK |
165 | void kasan_cache_shrink(struct kmem_cache *cache); |
166 | void kasan_cache_shutdown(struct kmem_cache *cache); | |
167 | ||
168 | #else /* CONFIG_KASAN_GENERIC */ | |
169 | ||
170 | static inline void kasan_cache_shrink(struct kmem_cache *cache) {} | |
171 | static inline void kasan_cache_shutdown(struct kmem_cache *cache) {} | |
172 | ||
173 | #endif /* CONFIG_KASAN_GENERIC */ | |
174 | ||
080eb83f AK |
175 | #ifdef CONFIG_KASAN_SW_TAGS |
176 | ||
177 | #define KASAN_SHADOW_INIT 0xFF | |
178 | ||
3c9e3aa1 AK |
179 | void kasan_init_tags(void); |
180 | ||
181 | void *kasan_reset_tag(const void *addr); | |
182 | ||
41eea9cd AK |
183 | void kasan_report(unsigned long addr, size_t size, |
184 | bool is_write, unsigned long ip); | |
185 | ||
3c9e3aa1 AK |
186 | #else /* CONFIG_KASAN_SW_TAGS */ |
187 | ||
188 | static inline void kasan_init_tags(void) { } | |
189 | ||
190 | static inline void *kasan_reset_tag(const void *addr) | |
191 | { | |
192 | return (void *)addr; | |
193 | } | |
194 | ||
080eb83f AK |
195 | #endif /* CONFIG_KASAN_SW_TAGS */ |
196 | ||
0b24becc | 197 | #endif /* LINUX_KASAN_H */ |