1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef _LINUX_KASAN_CHECKS_H
3 #define _LINUX_KASAN_CHECKS_H
4 
5 #include <linux/types.h>
6 
7 /*
8  * __kasan_check_*: Always available when KASAN is enabled. This may be used
9  * even in compilation units that selectively disable KASAN, but must use KASAN
10  * to validate access to an address.   Never use these in header files!
11  */
12 #ifdef CONFIG_KASAN
13 bool __kasan_check_read(const volatile void *p, unsigned int size);
14 bool __kasan_check_write(const volatile void *p, unsigned int size);
15 #else
__kasan_check_read(const volatile void * p,unsigned int size)16 static inline bool __kasan_check_read(const volatile void *p, unsigned int size)
17 {
18 	return true;
19 }
__kasan_check_write(const volatile void * p,unsigned int size)20 static inline bool __kasan_check_write(const volatile void *p, unsigned int size)
21 {
22 	return true;
23 }
24 #endif
25 
26 /*
27  * kasan_check_*: Only available when the particular compilation unit has KASAN
28  * instrumentation enabled. May be used in header files.
29  */
30 #ifdef __SANITIZE_ADDRESS__
31 #define kasan_check_read __kasan_check_read
32 #define kasan_check_write __kasan_check_write
33 #else
kasan_check_read(const volatile void * p,unsigned int size)34 static inline bool kasan_check_read(const volatile void *p, unsigned int size)
35 {
36 	return true;
37 }
kasan_check_write(const volatile void * p,unsigned int size)38 static inline bool kasan_check_write(const volatile void *p, unsigned int size)
39 {
40 	return true;
41 }
42 #endif
43 
44 #endif
45