task_struct: only use anon struct under randstruct plugin
[linux-2.6-block.git] / include / linux / kasan.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
0b24becc
AR
2#ifndef _LINUX_KASAN_H
3#define _LINUX_KASAN_H
4
5#include <linux/types.h>
6
7struct kmem_cache;
8struct page;
a5af5aa8 9struct vm_struct;
5be9b730 10struct task_struct;
0b24becc
AR
11
12#ifdef CONFIG_KASAN
13
0b24becc 14#include <asm/kasan.h>
69786cdb 15#include <asm/pgtable.h>
0b24becc 16
69786cdb
AR
17extern unsigned char kasan_zero_page[PAGE_SIZE];
18extern pte_t kasan_zero_pte[PTRS_PER_PTE];
19extern pmd_t kasan_zero_pmd[PTRS_PER_PMD];
20extern pud_t kasan_zero_pud[PTRS_PER_PUD];
c65e774f 21extern p4d_t kasan_zero_p4d[MAX_PTRS_PER_P4D];
69786cdb
AR
22
23void kasan_populate_zero_shadow(const void *shadow_start,
24 const void *shadow_end);
25
0b24becc
AR
26static inline void *kasan_mem_to_shadow(const void *addr)
27{
28 return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT)
29 + KASAN_SHADOW_OFFSET;
30}
31
32/* Enable reporting bugs after kasan_disable_current() */
af8601ad 33extern void kasan_enable_current(void);
0b24becc
AR
34
35/* Disable reporting bugs for current task */
af8601ad 36extern void kasan_disable_current(void);
0b24becc
AR
37
38void kasan_unpoison_shadow(const void *address, size_t size);
39
e3ae1163 40void kasan_unpoison_task_stack(struct task_struct *task);
9f7d416c 41void kasan_unpoison_stack_above_sp_to(const void *watermark);
e3ae1163 42
b8c73fc2
AR
43void kasan_alloc_pages(struct page *page, unsigned int order);
44void kasan_free_pages(struct page *page, unsigned int order);
45
be4a7988 46void kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
d50112ed 47 slab_flags_t *flags);
55834c59 48void kasan_cache_shrink(struct kmem_cache *cache);
f9fa1d91 49void kasan_cache_shutdown(struct kmem_cache *cache);
7ed2f9e6 50
0316bec2
AR
51void kasan_poison_slab(struct page *page);
52void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
53void kasan_poison_object_data(struct kmem_cache *cache, void *object);
b3cbd9bf 54void kasan_init_slab_obj(struct kmem_cache *cache, const void *object);
0316bec2 55
505f5dcb 56void kasan_kmalloc_large(const void *ptr, size_t size, gfp_t flags);
ee3ce779 57void kasan_kfree_large(void *ptr, unsigned long ip);
6860f634 58void kasan_poison_kfree(void *ptr, unsigned long ip);
505f5dcb
AP
59void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size,
60 gfp_t flags);
61void kasan_krealloc(const void *object, size_t new_size, gfp_t flags);
0316bec2 62
505f5dcb 63void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags);
ee3ce779 64bool kasan_slab_free(struct kmem_cache *s, void *object, unsigned long ip);
0316bec2 65
7ed2f9e6
AP
66struct kasan_cache {
67 int alloc_meta_offset;
68 int free_meta_offset;
69};
70
bebf56a1 71int kasan_module_alloc(void *addr, size_t size);
a5af5aa8 72void kasan_free_shadow(const struct vm_struct *vm);
bebf56a1 73
9b75a867
AR
74size_t ksize(const void *);
75static inline void kasan_unpoison_slab(const void *ptr) { ksize(ptr); }
80a9201a 76size_t kasan_metadata_size(struct kmem_cache *cache);
9b75a867 77
b0845ce5
MR
78bool kasan_save_enable_multi_shot(void);
79void kasan_restore_multi_shot(bool enabled);
80
0b24becc
AR
81#else /* CONFIG_KASAN */
82
83static inline void kasan_unpoison_shadow(const void *address, size_t size) {}
84
e3ae1163 85static inline void kasan_unpoison_task_stack(struct task_struct *task) {}
9f7d416c 86static inline void kasan_unpoison_stack_above_sp_to(const void *watermark) {}
e3ae1163 87
0b24becc
AR
88static inline void kasan_enable_current(void) {}
89static inline void kasan_disable_current(void) {}
90
b8c73fc2
AR
91static inline void kasan_alloc_pages(struct page *page, unsigned int order) {}
92static inline void kasan_free_pages(struct page *page, unsigned int order) {}
93
7ed2f9e6 94static inline void kasan_cache_create(struct kmem_cache *cache,
be4a7988 95 unsigned int *size,
d50112ed 96 slab_flags_t *flags) {}
55834c59 97static inline void kasan_cache_shrink(struct kmem_cache *cache) {}
f9fa1d91 98static inline void kasan_cache_shutdown(struct kmem_cache *cache) {}
7ed2f9e6 99
0316bec2
AR
100static inline void kasan_poison_slab(struct page *page) {}
101static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
102 void *object) {}
103static inline void kasan_poison_object_data(struct kmem_cache *cache,
104 void *object) {}
b3cbd9bf
AR
105static inline void kasan_init_slab_obj(struct kmem_cache *cache,
106 const void *object) {}
0316bec2 107
505f5dcb 108static inline void kasan_kmalloc_large(void *ptr, size_t size, gfp_t flags) {}
ee3ce779 109static inline void kasan_kfree_large(void *ptr, unsigned long ip) {}
6860f634 110static inline void kasan_poison_kfree(void *ptr, unsigned long ip) {}
0316bec2 111static inline void kasan_kmalloc(struct kmem_cache *s, const void *object,
505f5dcb
AP
112 size_t size, gfp_t flags) {}
113static inline void kasan_krealloc(const void *object, size_t new_size,
114 gfp_t flags) {}
0316bec2 115
505f5dcb
AP
116static inline void kasan_slab_alloc(struct kmem_cache *s, void *object,
117 gfp_t flags) {}
ee3ce779
DV
118static inline bool kasan_slab_free(struct kmem_cache *s, void *object,
119 unsigned long ip)
55834c59
AP
120{
121 return false;
122}
0316bec2 123
bebf56a1 124static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
a5af5aa8 125static inline void kasan_free_shadow(const struct vm_struct *vm) {}
bebf56a1 126
9b75a867 127static inline void kasan_unpoison_slab(const void *ptr) { }
80a9201a 128static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; }
9b75a867 129
0b24becc
AR
130#endif /* CONFIG_KASAN */
131
132#endif /* LINUX_KASAN_H */