* [PATCH v5 01/15] mm/kasan: add conditional checks in functions to return directly if kasan is disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
@ 2026-02-25 8:13 ` Baoquan He
2026-02-25 8:13 ` [PATCH v5 02/15] mm/kasan: rename 'kasan_arg' to 'kasan_arg_disabled' Baoquan He
` (13 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:13 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
The current codes only check if kasan is disabled for hw_tags
mode. Here add the conditional checks for functional functions of
generic mode and sw_tags mode.
And also add a helper __kasan_cache_shrink() in mm/kasan/generic.c
so that the conditional check is done in include/linux/kasan.h.
This is prepared for later adding kernel parameter kasan=on|off for
all three kasan modes.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
include/linux/kasan.h | 7 ++++++-
mm/kasan/generic.c | 16 ++++++++++++++--
mm/kasan/init.c | 6 ++++++
mm/kasan/quarantine.c | 3 +++
mm/kasan/report.c | 4 +++-
mm/kasan/shadow.c | 11 ++++++++++-
mm/kasan/sw_tags.c | 3 +++
7 files changed, 45 insertions(+), 5 deletions(-)
diff --git a/include/linux/kasan.h b/include/linux/kasan.h
index 338a1921a50a..a9b8d58d8699 100644
--- a/include/linux/kasan.h
+++ b/include/linux/kasan.h
@@ -492,7 +492,12 @@ size_t kasan_metadata_size(struct kmem_cache *cache, bool in_object);
void kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
slab_flags_t *flags);
-void kasan_cache_shrink(struct kmem_cache *cache);
+void __kasan_cache_shrink(struct kmem_cache *cache);
+static inline void kasan_cache_shrink(struct kmem_cache *cache)
+{
+ if (kasan_enabled())
+ __kasan_cache_shrink(cache);
+}
void kasan_cache_shutdown(struct kmem_cache *cache);
void kasan_record_aux_stack(void *ptr);
diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c
index 2b8e73f5f6a7..25850e7c2e00 100644
--- a/mm/kasan/generic.c
+++ b/mm/kasan/generic.c
@@ -212,14 +212,14 @@ bool kasan_byte_accessible(const void *addr)
return shadow_byte >= 0 && shadow_byte < KASAN_GRANULE_SIZE;
}
-void kasan_cache_shrink(struct kmem_cache *cache)
+void __kasan_cache_shrink(struct kmem_cache *cache)
{
kasan_quarantine_remove_cache(cache);
}
void kasan_cache_shutdown(struct kmem_cache *cache)
{
- if (!__kmem_cache_empty(cache))
+ if (kasan_enabled() && !__kmem_cache_empty(cache))
kasan_quarantine_remove_cache(cache);
}
@@ -239,6 +239,9 @@ void __asan_register_globals(void *ptr, ssize_t size)
int i;
struct kasan_global *globals = ptr;
+ if (!kasan_enabled())
+ return;
+
for (i = 0; i < size; i++)
register_global(&globals[i]);
}
@@ -369,6 +372,9 @@ void kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
unsigned int rem_free_meta_size;
unsigned int orig_alloc_meta_offset;
+ if (!kasan_enabled())
+ return;
+
if (!kasan_requires_meta())
return;
@@ -518,6 +524,9 @@ size_t kasan_metadata_size(struct kmem_cache *cache, bool in_object)
{
struct kasan_cache *info = &cache->kasan_info;
+ if (!kasan_enabled())
+ return 0;
+
if (!kasan_requires_meta())
return 0;
@@ -543,6 +552,9 @@ void kasan_record_aux_stack(void *addr)
struct kasan_alloc_meta *alloc_meta;
void *object;
+ if (!kasan_enabled())
+ return;
+
if (is_kfence_address(addr) || !slab)
return;
diff --git a/mm/kasan/init.c b/mm/kasan/init.c
index f084e7a5df1e..c78d77ed47bc 100644
--- a/mm/kasan/init.c
+++ b/mm/kasan/init.c
@@ -447,6 +447,9 @@ void kasan_remove_zero_shadow(void *start, unsigned long size)
unsigned long addr, end, next;
pgd_t *pgd;
+ if (!kasan_enabled())
+ return;
+
addr = (unsigned long)kasan_mem_to_shadow(start);
end = addr + (size >> KASAN_SHADOW_SCALE_SHIFT);
@@ -482,6 +485,9 @@ int kasan_add_zero_shadow(void *start, unsigned long size)
int ret;
void *shadow_start, *shadow_end;
+ if (!kasan_enabled())
+ return 0;
+
shadow_start = kasan_mem_to_shadow(start);
shadow_end = shadow_start + (size >> KASAN_SHADOW_SCALE_SHIFT);
diff --git a/mm/kasan/quarantine.c b/mm/kasan/quarantine.c
index 6958aa713c67..a6dc2c3d8a15 100644
--- a/mm/kasan/quarantine.c
+++ b/mm/kasan/quarantine.c
@@ -405,6 +405,9 @@ static int __init kasan_cpu_quarantine_init(void)
{
int ret = 0;
+ if (!kasan_enabled())
+ return 0;
+
ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mm/kasan:online",
kasan_cpu_online, kasan_cpu_offline);
if (ret < 0)
diff --git a/mm/kasan/report.c b/mm/kasan/report.c
index 27efb78eb32d..1a39b3f62c57 100644
--- a/mm/kasan/report.c
+++ b/mm/kasan/report.c
@@ -576,7 +576,9 @@ bool kasan_report(const void *addr, size_t size, bool is_write,
unsigned long irq_flags;
struct kasan_report_info info;
- if (unlikely(report_suppressed_sw()) || unlikely(!report_enabled())) {
+ if (unlikely(report_suppressed_sw()) ||
+ unlikely(!report_enabled()) ||
+ !kasan_enabled()) {
ret = false;
goto out;
}
diff --git a/mm/kasan/shadow.c b/mm/kasan/shadow.c
index d286e0a04543..87f517b76d6e 100644
--- a/mm/kasan/shadow.c
+++ b/mm/kasan/shadow.c
@@ -164,6 +164,8 @@ void kasan_unpoison(const void *addr, size_t size, bool init)
{
u8 tag = get_tag(addr);
+ if (!kasan_enabled())
+ return;
/*
* Perform shadow offset calculation based on untagged address, as
* some of the callers (e.g. kasan_unpoison_new_object) pass tagged
@@ -277,7 +279,8 @@ static int __meminit kasan_mem_notifier(struct notifier_block *nb,
static int __init kasan_memhotplug_init(void)
{
- hotplug_memory_notifier(kasan_mem_notifier, DEFAULT_CALLBACK_PRI);
+ if (kasan_enabled())
+ hotplug_memory_notifier(kasan_mem_notifier, DEFAULT_CALLBACK_PRI);
return 0;
}
@@ -660,6 +663,9 @@ int kasan_alloc_module_shadow(void *addr, size_t size, gfp_t gfp_mask)
size_t shadow_size;
unsigned long shadow_start;
+ if (!kasan_enabled())
+ return 0;
+
shadow_start = (unsigned long)kasan_mem_to_shadow(addr);
scaled_size = (size + KASAN_GRANULE_SIZE - 1) >>
KASAN_SHADOW_SCALE_SHIFT;
@@ -696,6 +702,9 @@ int kasan_alloc_module_shadow(void *addr, size_t size, gfp_t gfp_mask)
void kasan_free_module_shadow(const struct vm_struct *vm)
{
+ if (!kasan_enabled())
+ return;
+
if (IS_ENABLED(CONFIG_UML))
return;
diff --git a/mm/kasan/sw_tags.c b/mm/kasan/sw_tags.c
index c75741a74602..6c1caec4261a 100644
--- a/mm/kasan/sw_tags.c
+++ b/mm/kasan/sw_tags.c
@@ -79,6 +79,9 @@ bool kasan_check_range(const void *addr, size_t size, bool write,
u8 *shadow_first, *shadow_last, *shadow;
void *untagged_addr;
+ if (!kasan_enabled())
+ return true;
+
if (unlikely(size == 0))
return true;
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 02/15] mm/kasan: rename 'kasan_arg' to 'kasan_arg_disabled'
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
2026-02-25 8:13 ` [PATCH v5 01/15] mm/kasan: add conditional checks in functions to return directly if kasan is disabled Baoquan He
@ 2026-02-25 8:13 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 03/15] mm/kasan: mm/kasan: move kasan= code to common place Baoquan He
` (12 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:13 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
And change it to be a bool variable. This is prepared for later
usage.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
mm/kasan/hw_tags.c | 16 +++++-----------
1 file changed, 5 insertions(+), 11 deletions(-)
diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c
index cbef5e450954..26a69f0d822c 100644
--- a/mm/kasan/hw_tags.c
+++ b/mm/kasan/hw_tags.c
@@ -22,12 +22,6 @@
#include "kasan.h"
-enum kasan_arg {
- KASAN_ARG_DEFAULT,
- KASAN_ARG_OFF,
- KASAN_ARG_ON,
-};
-
enum kasan_arg_mode {
KASAN_ARG_MODE_DEFAULT,
KASAN_ARG_MODE_SYNC,
@@ -41,7 +35,7 @@ enum kasan_arg_vmalloc {
KASAN_ARG_VMALLOC_ON,
};
-static enum kasan_arg kasan_arg __ro_after_init;
+bool kasan_arg_disabled __ro_after_init;
static enum kasan_arg_mode kasan_arg_mode __ro_after_init;
static enum kasan_arg_vmalloc kasan_arg_vmalloc __initdata;
@@ -88,9 +82,9 @@ static int __init early_kasan_flag(char *arg)
return -EINVAL;
if (!strcmp(arg, "off"))
- kasan_arg = KASAN_ARG_OFF;
+ kasan_arg_disabled = true;
else if (!strcmp(arg, "on"))
- kasan_arg = KASAN_ARG_ON;
+ kasan_arg_disabled = false;
else
return -EINVAL;
@@ -222,7 +216,7 @@ void kasan_init_hw_tags_cpu(void)
* When this function is called, kasan_flag_enabled is not yet
* set by kasan_init_hw_tags(). Thus, check kasan_arg instead.
*/
- if (kasan_arg == KASAN_ARG_OFF)
+ if (kasan_arg_disabled)
return;
/*
@@ -240,7 +234,7 @@ void __init kasan_init_hw_tags(void)
return;
/* If KASAN is disabled via command line, don't initialize it. */
- if (kasan_arg == KASAN_ARG_OFF)
+ if (kasan_arg_disabled)
return;
switch (kasan_arg_mode) {
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 03/15] mm/kasan: mm/kasan: move kasan= code to common place
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
2026-02-25 8:13 ` [PATCH v5 01/15] mm/kasan: add conditional checks in functions to return directly if kasan is disabled Baoquan He
2026-02-25 8:13 ` [PATCH v5 02/15] mm/kasan: rename 'kasan_arg' to 'kasan_arg_disabled' Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 04/15] mm/kasan: make kasan=on|off take effect for all three modes Baoquan He
` (11 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
This allows generic and sw_tags to be set in kernel cmdline too.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
include/linux/kasan-enabled.h | 2 ++
mm/kasan/common.c | 21 +++++++++++++++++++++
mm/kasan/hw_tags.c | 18 ------------------
3 files changed, 23 insertions(+), 18 deletions(-)
diff --git a/include/linux/kasan-enabled.h b/include/linux/kasan-enabled.h
index 9eca967d8526..b7cb906825ca 100644
--- a/include/linux/kasan-enabled.h
+++ b/include/linux/kasan-enabled.h
@@ -35,6 +35,8 @@ static inline void kasan_enable(void) {}
#endif /* CONFIG_ARCH_DEFER_KASAN || CONFIG_KASAN_HW_TAGS */
#ifdef CONFIG_KASAN_HW_TAGS
+extern bool kasan_arg_disabled;
+
static inline bool kasan_hw_tags_enabled(void)
{
return kasan_enabled();
diff --git a/mm/kasan/common.c b/mm/kasan/common.c
index b7d05c2a6d93..0d788a468e96 100644
--- a/mm/kasan/common.c
+++ b/mm/kasan/common.c
@@ -42,6 +42,27 @@ DEFINE_STATIC_KEY_FALSE(kasan_flag_enabled);
EXPORT_SYMBOL_GPL(kasan_flag_enabled);
#endif
+#ifdef CONFIG_KASAN_HW_TAGS
+bool kasan_arg_disabled __ro_after_init;
+
+/* kasan=off/on */
+static int __init early_kasan_flag(char *arg)
+{
+ if (!arg)
+ return -EINVAL;
+
+ if (!strcmp(arg, "off"))
+ kasan_arg_disabled = true;
+ else if (!strcmp(arg, "on"))
+ kasan_arg_disabled = false;
+ else
+ return -EINVAL;
+
+ return 0;
+}
+early_param("kasan", early_kasan_flag);
+#endif
+
struct slab *kasan_addr_to_slab(const void *addr)
{
if (virt_addr_valid(addr))
diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c
index 26a69f0d822c..9602ea4861e2 100644
--- a/mm/kasan/hw_tags.c
+++ b/mm/kasan/hw_tags.c
@@ -35,7 +35,6 @@ enum kasan_arg_vmalloc {
KASAN_ARG_VMALLOC_ON,
};
-bool kasan_arg_disabled __ro_after_init;
static enum kasan_arg_mode kasan_arg_mode __ro_after_init;
static enum kasan_arg_vmalloc kasan_arg_vmalloc __initdata;
@@ -75,23 +74,6 @@ unsigned int kasan_page_alloc_sample_order = PAGE_ALLOC_SAMPLE_ORDER_DEFAULT;
DEFINE_PER_CPU(long, kasan_page_alloc_skip);
-/* kasan=off/on */
-static int __init early_kasan_flag(char *arg)
-{
- if (!arg)
- return -EINVAL;
-
- if (!strcmp(arg, "off"))
- kasan_arg_disabled = true;
- else if (!strcmp(arg, "on"))
- kasan_arg_disabled = false;
- else
- return -EINVAL;
-
- return 0;
-}
-early_param("kasan", early_kasan_flag);
-
/* kasan.mode=sync/async/asymm */
static int __init early_kasan_mode(char *arg)
{
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 04/15] mm/kasan: make kasan=on|off take effect for all three modes
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (2 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 03/15] mm/kasan: mm/kasan: move kasan= code to common place Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 05/15] mm/kasan/sw_tags: don't initialize kasan if it's disabled Baoquan He
` (10 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Now everything is ready, setting kasan=off can disable kasan for all
three modes.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
include/linux/kasan-enabled.h | 12 +++++-------
mm/kasan/common.c | 4 ----
2 files changed, 5 insertions(+), 11 deletions(-)
diff --git a/include/linux/kasan-enabled.h b/include/linux/kasan-enabled.h
index b7cb906825ca..cec21a08446e 100644
--- a/include/linux/kasan-enabled.h
+++ b/include/linux/kasan-enabled.h
@@ -4,10 +4,11 @@
#include <linux/static_key.h>
-#if defined(CONFIG_ARCH_DEFER_KASAN) || defined(CONFIG_KASAN_HW_TAGS)
+#ifdef CONFIG_KASAN
+extern bool kasan_arg_disabled;
+
/*
* Global runtime flag for KASAN modes that need runtime control.
- * Used by ARCH_DEFER_KASAN architectures and HW_TAGS mode.
*/
DECLARE_STATIC_KEY_FALSE(kasan_flag_enabled);
@@ -25,18 +26,15 @@ static inline void kasan_enable(void)
static_branch_enable(&kasan_flag_enabled);
}
#else
-/* For architectures that can enable KASAN early, use compile-time check. */
static __always_inline bool kasan_enabled(void)
{
- return IS_ENABLED(CONFIG_KASAN);
+ return false;
}
static inline void kasan_enable(void) {}
-#endif /* CONFIG_ARCH_DEFER_KASAN || CONFIG_KASAN_HW_TAGS */
+#endif
#ifdef CONFIG_KASAN_HW_TAGS
-extern bool kasan_arg_disabled;
-
static inline bool kasan_hw_tags_enabled(void)
{
return kasan_enabled();
diff --git a/mm/kasan/common.c b/mm/kasan/common.c
index 0d788a468e96..fc6513fa5795 100644
--- a/mm/kasan/common.c
+++ b/mm/kasan/common.c
@@ -33,16 +33,13 @@
#include "kasan.h"
#include "../slab.h"
-#if defined(CONFIG_ARCH_DEFER_KASAN) || defined(CONFIG_KASAN_HW_TAGS)
/*
* Definition of the unified static key declared in kasan-enabled.h.
* This provides consistent runtime enable/disable across KASAN modes.
*/
DEFINE_STATIC_KEY_FALSE(kasan_flag_enabled);
EXPORT_SYMBOL_GPL(kasan_flag_enabled);
-#endif
-#ifdef CONFIG_KASAN_HW_TAGS
bool kasan_arg_disabled __ro_after_init;
/* kasan=off/on */
@@ -61,7 +58,6 @@ static int __init early_kasan_flag(char *arg)
return 0;
}
early_param("kasan", early_kasan_flag);
-#endif
struct slab *kasan_addr_to_slab(const void *addr)
{
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 05/15] mm/kasan/sw_tags: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (3 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 04/15] mm/kasan: make kasan=on|off take effect for all three modes Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 06/15] arch/arm: " Baoquan He
` (9 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
mm/kasan/sw_tags.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/mm/kasan/sw_tags.c b/mm/kasan/sw_tags.c
index 6c1caec4261a..7757b69b1c86 100644
--- a/mm/kasan/sw_tags.c
+++ b/mm/kasan/sw_tags.c
@@ -40,6 +40,10 @@ void __init kasan_init_sw_tags(void)
{
int cpu;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
for_each_possible_cpu(cpu)
per_cpu(prng_state, cpu) = (u32)get_cycles();
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 06/15] arch/arm: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (4 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 05/15] mm/kasan/sw_tags: don't initialize kasan if it's disabled Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 07/15] arch/arm64: " Baoquan He
` (8 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also call jump_label_init() early in setup_arch() so that later
kasan_init() can enable static key kasan_flag_enabled. Put
jump_label_init() beofre parse_early_param() as other architectures
do.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-arm-kernel@lists.infradead.org
---
arch/arm/kernel/setup.c | 6 ++++++
arch/arm/mm/kasan_init.c | 3 +++
2 files changed, 9 insertions(+)
diff --git a/arch/arm/kernel/setup.c b/arch/arm/kernel/setup.c
index 0bfd66c7ada0..453a47a4c715 100644
--- a/arch/arm/kernel/setup.c
+++ b/arch/arm/kernel/setup.c
@@ -1135,6 +1135,12 @@ void __init setup_arch(char **cmdline_p)
early_fixmap_init();
early_ioremap_init();
+ /*
+ * Initialise the static keys early as they may be enabled by the
+ * kasan_init() or early parameters.
+ */
+ jump_label_init();
+
parse_early_param();
#ifdef CONFIG_MMU
diff --git a/arch/arm/mm/kasan_init.c b/arch/arm/mm/kasan_init.c
index c6625e808bf8..82ec043c891f 100644
--- a/arch/arm/mm/kasan_init.c
+++ b/arch/arm/mm/kasan_init.c
@@ -212,6 +212,9 @@ void __init kasan_init(void)
phys_addr_t pa_start, pa_end;
u64 i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
/*
* We are going to perform proper setup of shadow memory.
*
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 07/15] arch/arm64: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (5 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 06/15] arch/arm: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 08/15] arch/loongarch: " Baoquan He
` (7 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also need skip kasan_populate_early_vm_area_shadow() if kasan
is disabled.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-arm-kernel@lists.infradead.org
---
arch/arm64/mm/kasan_init.c | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c
index abeb81bf6ebd..4a58e609c81b 100644
--- a/arch/arm64/mm/kasan_init.c
+++ b/arch/arm64/mm/kasan_init.c
@@ -384,6 +384,9 @@ void __init kasan_populate_early_vm_area_shadow(void *start, unsigned long size)
{
unsigned long shadow_start, shadow_end;
+ if (!kasan_enabled())
+ return;
+
if (!is_vmalloc_or_module_addr(start))
return;
@@ -397,6 +400,10 @@ void __init kasan_populate_early_vm_area_shadow(void *start, unsigned long size)
void __init kasan_init(void)
{
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
kasan_init_shadow();
kasan_init_depth();
kasan_init_generic();
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 08/15] arch/loongarch: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (6 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 07/15] arch/arm64: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 09/15] arch/powerpc: " Baoquan He
` (6 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: loongarch@lists.linux.dev
---
arch/loongarch/mm/kasan_init.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/arch/loongarch/mm/kasan_init.c b/arch/loongarch/mm/kasan_init.c
index 0fc02ca06457..047a059544e1 100644
--- a/arch/loongarch/mm/kasan_init.c
+++ b/arch/loongarch/mm/kasan_init.c
@@ -269,6 +269,9 @@ void __init kasan_init(void)
u64 i;
phys_addr_t pa_start, pa_end;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
/*
* If PGDIR_SIZE is too large for cpu_vabits, KASAN_SHADOW_END will
* overflow UINTPTR_MAX and then looks like a user space address.
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 09/15] arch/powerpc: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (7 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 08/15] arch/loongarch: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 10/15] arch/riscv: " Baoquan He
` (5 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
This includes 32bit, book3s/64 and book3e/64.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linuxppc-dev@lists.ozlabs.org
---
arch/powerpc/mm/kasan/init_32.c | 6 +++++-
arch/powerpc/mm/kasan/init_book3e_64.c | 4 ++++
arch/powerpc/mm/kasan/init_book3s_64.c | 4 ++++
3 files changed, 13 insertions(+), 1 deletion(-)
diff --git a/arch/powerpc/mm/kasan/init_32.c b/arch/powerpc/mm/kasan/init_32.c
index 1d083597464f..0ea2a636c992 100644
--- a/arch/powerpc/mm/kasan/init_32.c
+++ b/arch/powerpc/mm/kasan/init_32.c
@@ -141,6 +141,10 @@ void __init kasan_init(void)
u64 i;
int ret;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
for_each_mem_range(i, &base, &end) {
phys_addr_t top = min(end, total_lowmem);
@@ -170,7 +174,7 @@ void __init kasan_init(void)
void __init kasan_late_init(void)
{
- if (IS_ENABLED(CONFIG_KASAN_VMALLOC))
+ if (IS_ENABLED(CONFIG_KASAN_VMALLOC) && kasan_enabled())
kasan_unmap_early_shadow_vmalloc();
}
diff --git a/arch/powerpc/mm/kasan/init_book3e_64.c b/arch/powerpc/mm/kasan/init_book3e_64.c
index 0d3a73d6d4b0..fbe4c9a7e460 100644
--- a/arch/powerpc/mm/kasan/init_book3e_64.c
+++ b/arch/powerpc/mm/kasan/init_book3e_64.c
@@ -111,6 +111,10 @@ void __init kasan_init(void)
u64 i;
pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page), PAGE_KERNEL_RO);
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
for_each_mem_range(i, &start, &end)
kasan_init_phys_region(phys_to_virt(start), phys_to_virt(end));
diff --git a/arch/powerpc/mm/kasan/init_book3s_64.c b/arch/powerpc/mm/kasan/init_book3s_64.c
index dcafa641804c..f7906f9ef9be 100644
--- a/arch/powerpc/mm/kasan/init_book3s_64.c
+++ b/arch/powerpc/mm/kasan/init_book3s_64.c
@@ -54,6 +54,10 @@ void __init kasan_init(void)
u64 i;
pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page), PAGE_KERNEL);
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
if (!early_radix_enabled()) {
pr_warn("KASAN not enabled as it requires radix!");
return;
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 10/15] arch/riscv: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (8 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 09/15] arch/powerpc: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 11/15] arch/x86: " Baoquan He
` (4 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-riscv@lists.infradead.org
---
arch/riscv/mm/kasan_init.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/arch/riscv/mm/kasan_init.c b/arch/riscv/mm/kasan_init.c
index c4a2a9e5586e..dc7cc0dcc7eb 100644
--- a/arch/riscv/mm/kasan_init.c
+++ b/arch/riscv/mm/kasan_init.c
@@ -485,6 +485,10 @@ void __init kasan_init(void)
phys_addr_t p_start, p_end;
u64 i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
create_tmp_mapping();
csr_write(CSR_SATP, PFN_DOWN(__pa(tmp_pg_dir)) | satp_mode);
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 11/15] arch/x86: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (9 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 10/15] arch/riscv: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 12/15] arch/xtensa: " Baoquan He
` (3 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: x86@kernel.org
---
arch/x86/mm/kasan_init_64.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/arch/x86/mm/kasan_init_64.c b/arch/x86/mm/kasan_init_64.c
index 998b6010d6d3..5ebf2850c77d 100644
--- a/arch/x86/mm/kasan_init_64.c
+++ b/arch/x86/mm/kasan_init_64.c
@@ -343,6 +343,10 @@ void __init kasan_init(void)
unsigned long shadow_cea_begin, shadow_cea_per_cpu_begin, shadow_cea_end;
int i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
memcpy(early_top_pgt, init_top_pgt, sizeof(early_top_pgt));
/*
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 12/15] arch/xtensa: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (10 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 11/15] arch/x86: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 13/15] arch/um: " Baoquan He
` (2 subsequent siblings)
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also call jump_label_init() early in setup_arch() so that later
kasan_init() can enable static key kasan_flag_enabled. Put
jump_label_init() beofre parse_early_param() as other architectures
do.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: Chris Zankel <chris@zankel.net>
Cc: Max Filippov <jcmvbkbc@gmail.com>
---
arch/xtensa/kernel/setup.c | 1 +
arch/xtensa/mm/kasan_init.c | 4 ++++
2 files changed, 5 insertions(+)
diff --git a/arch/xtensa/kernel/setup.c b/arch/xtensa/kernel/setup.c
index f72e280363be..aabeb23f41fa 100644
--- a/arch/xtensa/kernel/setup.c
+++ b/arch/xtensa/kernel/setup.c
@@ -352,6 +352,7 @@ void __init setup_arch(char **cmdline_p)
mem_reserve(__pa(_SecondaryResetVector_text_start),
__pa(_SecondaryResetVector_text_end));
#endif
+ jump_label_init();
parse_early_param();
bootmem_init();
kasan_init();
diff --git a/arch/xtensa/mm/kasan_init.c b/arch/xtensa/mm/kasan_init.c
index 0524b9ed5e63..eb367b801218 100644
--- a/arch/xtensa/mm/kasan_init.c
+++ b/arch/xtensa/mm/kasan_init.c
@@ -70,6 +70,10 @@ void __init kasan_init(void)
{
int i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
BUILD_BUG_ON(KASAN_SHADOW_OFFSET != KASAN_SHADOW_START -
(KASAN_START_VADDR >> KASAN_SHADOW_SCALE_SHIFT));
BUILD_BUG_ON(VMALLOC_START < KASAN_START_VADDR);
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 13/15] arch/um: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (11 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 12/15] arch/xtensa: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt Baoquan He
2026-02-25 8:14 ` [PATCH v5 15/15] mm/kasan: clean up unneeded ARCH_DEFER_KASAN and kasan_arch_is_ready Baoquan He
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also wrap up the kasan code into CONFIG_KASAN ifdeffery scope.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-um@lists.infradead.org
---
arch/um/kernel/mem.c | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/arch/um/kernel/mem.c b/arch/um/kernel/mem.c
index 89c8c8b94a79..2bf858ab35b5 100644
--- a/arch/um/kernel/mem.c
+++ b/arch/um/kernel/mem.c
@@ -62,8 +62,11 @@ static unsigned long brk_end;
void __init arch_mm_preinit(void)
{
+#ifdef CONFIG_KASAN
/* Safe to call after jump_label_init(). Enables KASAN. */
- kasan_init_generic();
+ if (!kasan_arg_disabled)
+ kasan_init_generic();
+#endif
/* clear the zero-page */
memset(empty_zero_page, 0, PAGE_SIZE);
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (12 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 13/15] arch/um: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 15/15] mm/kasan: clean up unneeded ARCH_DEFER_KASAN and kasan_arch_is_ready Baoquan He
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
And also remove the relevant description in dev-tools/kasan.rst
which is hw_tags specificially.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
Documentation/admin-guide/kernel-parameters.txt | 4 ++++
Documentation/dev-tools/kasan.rst | 2 --
2 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
index cb850e5290c2..e0115fad9e60 100644
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -2899,6 +2899,10 @@ Kernel parameters
js= [HW,JOY] Analog joystick
See Documentation/input/joydev/joystick.rst.
+ kasan= [KNL] controls whether KASAN is enabled.
+ Format: off | on
+ default: on
+
kasan_multi_shot
[KNL] Enforce KASAN (Kernel Address Sanitizer) to print
report on every invalid memory access. Without this
diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst
index a034700da7c4..eaae83fcb5e4 100644
--- a/Documentation/dev-tools/kasan.rst
+++ b/Documentation/dev-tools/kasan.rst
@@ -129,8 +129,6 @@ Hardware Tag-Based KASAN mode is intended for use in production as a security
mitigation. Therefore, it supports additional boot parameters that allow
disabling KASAN altogether or controlling its features:
-- ``kasan=off`` or ``=on`` controls whether KASAN is enabled (default: ``on``).
-
- ``kasan.mode=sync``, ``=async`` or ``=asymm`` controls whether KASAN
is configured in synchronous, asynchronous or asymmetric mode of
execution (default: ``sync``).
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread* [PATCH v5 15/15] mm/kasan: clean up unneeded ARCH_DEFER_KASAN and kasan_arch_is_ready
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (13 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
14 siblings, 0 replies; 16+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch,
linuxppc-dev, linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca,
Baoquan He
Since commit 1e338f4d99e6 ("kasan: introduce ARCH_DEFER_KASAN and unify
static key across modes"), kasan_arch_is_ready() has been dead code.
And up to now, ARCH_DEFER_KASAN is useless too because of code change
for 'kasan=on|off'.
Here clean them up.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
arch/loongarch/Kconfig | 1 -
arch/powerpc/Kconfig | 1 -
arch/um/Kconfig | 1 -
lib/Kconfig.kasan | 12 ------------
mm/kasan/kasan.h | 6 ------
5 files changed, 21 deletions(-)
diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig
index d211c6572b0a..4b7802d02911 100644
--- a/arch/loongarch/Kconfig
+++ b/arch/loongarch/Kconfig
@@ -9,7 +9,6 @@ config LOONGARCH
select ACPI_PPTT if ACPI
select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI
select ARCH_BINFMT_ELF_STATE
- select ARCH_NEEDS_DEFER_KASAN
select ARCH_DISABLE_KASAN_INLINE
select ARCH_ENABLE_MEMORY_HOTPLUG
select ARCH_ENABLE_MEMORY_HOTREMOVE
diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig
index ad7a2fe63a2a..b51fbc25bdc9 100644
--- a/arch/powerpc/Kconfig
+++ b/arch/powerpc/Kconfig
@@ -122,7 +122,6 @@ config PPC
# Please keep this list sorted alphabetically.
#
select ARCH_32BIT_OFF_T if PPC32
- select ARCH_NEEDS_DEFER_KASAN if PPC_RADIX_MMU
select ARCH_DISABLE_KASAN_INLINE if PPC_RADIX_MMU
select ARCH_DMA_DEFAULT_COHERENT if !NOT_COHERENT_CACHE
select ARCH_ENABLE_MEMORY_HOTPLUG
diff --git a/arch/um/Kconfig b/arch/um/Kconfig
index 098cda44db22..fd0bedd2c696 100644
--- a/arch/um/Kconfig
+++ b/arch/um/Kconfig
@@ -6,7 +6,6 @@ config UML
bool
default y
select ARCH_DISABLE_KASAN_INLINE if STATIC_LINK
- select ARCH_NEEDS_DEFER_KASAN if STATIC_LINK
select ARCH_WANTS_DYNAMIC_TASK_STRUCT
select ARCH_HAS_CACHE_LINE_SIZE
select ARCH_HAS_CPU_FINALIZE_INIT
diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan
index a4bb610a7a6f..f82889a830fa 100644
--- a/lib/Kconfig.kasan
+++ b/lib/Kconfig.kasan
@@ -19,18 +19,6 @@ config ARCH_DISABLE_KASAN_INLINE
Disables both inline and stack instrumentation. Selected by
architectures that do not support these instrumentation types.
-config ARCH_NEEDS_DEFER_KASAN
- bool
-
-config ARCH_DEFER_KASAN
- def_bool y
- depends on KASAN && ARCH_NEEDS_DEFER_KASAN
- help
- Architectures should select this if they need to defer KASAN
- initialization until shadow memory is properly set up. This
- enables runtime control via static keys. Otherwise, KASAN uses
- compile-time constants for better performance.
-
config CC_HAS_KASAN_GENERIC
def_bool $(cc-option, -fsanitize=kernel-address)
diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h
index fc9169a54766..f08f7f75c285 100644
--- a/mm/kasan/kasan.h
+++ b/mm/kasan/kasan.h
@@ -552,12 +552,6 @@ static inline void kasan_poison_last_granule(const void *address, size_t size) {
#endif /* CONFIG_KASAN_GENERIC */
-#ifndef kasan_arch_is_ready
-static inline bool kasan_arch_is_ready(void) { return true; }
-#elif !defined(CONFIG_KASAN_GENERIC) || !defined(CONFIG_KASAN_OUTLINE)
-#error kasan_arch_is_ready only works in KASAN generic outline mode!
-#endif
-
#if IS_ENABLED(CONFIG_KASAN_KUNIT_TEST)
void kasan_kunit_test_suite_start(void);
--
2.52.0
^ permalink raw reply [flat|nested] 16+ messages in thread