* [PATCH v5 01/15] mm/kasan: add conditional checks in functions to return directly if kasan is disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
@ 2026-02-25 8:13 ` Baoquan He
2026-02-25 8:13 ` [PATCH v5 02/15] mm/kasan: rename 'kasan_arg' to 'kasan_arg_disabled' Baoquan He
` (13 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:13 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
The current codes only check if kasan is disabled for hw_tags
mode. Here add the conditional checks for functional functions of
generic mode and sw_tags mode.
And also add a helper __kasan_cache_shrink() in mm/kasan/generic.c
so that the conditional check is done in include/linux/kasan.h.
This is prepared for later adding kernel parameter kasan=on|off for
all three kasan modes.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
include/linux/kasan.h | 7 ++++++-
mm/kasan/generic.c | 16 ++++++++++++++--
mm/kasan/init.c | 6 ++++++
mm/kasan/quarantine.c | 3 +++
mm/kasan/report.c | 4 +++-
mm/kasan/shadow.c | 11 ++++++++++-
mm/kasan/sw_tags.c | 3 +++
7 files changed, 45 insertions(+), 5 deletions(-)
diff --git a/include/linux/kasan.h b/include/linux/kasan.h
index 338a1921a50a..a9b8d58d8699 100644
--- a/include/linux/kasan.h
+++ b/include/linux/kasan.h
@@ -492,7 +492,12 @@ size_t kasan_metadata_size(struct kmem_cache *cache, bool in_object);
void kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
slab_flags_t *flags);
-void kasan_cache_shrink(struct kmem_cache *cache);
+void __kasan_cache_shrink(struct kmem_cache *cache);
+static inline void kasan_cache_shrink(struct kmem_cache *cache)
+{
+ if (kasan_enabled())
+ __kasan_cache_shrink(cache);
+}
void kasan_cache_shutdown(struct kmem_cache *cache);
void kasan_record_aux_stack(void *ptr);
diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c
index 2b8e73f5f6a7..25850e7c2e00 100644
--- a/mm/kasan/generic.c
+++ b/mm/kasan/generic.c
@@ -212,14 +212,14 @@ bool kasan_byte_accessible(const void *addr)
return shadow_byte >= 0 && shadow_byte < KASAN_GRANULE_SIZE;
}
-void kasan_cache_shrink(struct kmem_cache *cache)
+void __kasan_cache_shrink(struct kmem_cache *cache)
{
kasan_quarantine_remove_cache(cache);
}
void kasan_cache_shutdown(struct kmem_cache *cache)
{
- if (!__kmem_cache_empty(cache))
+ if (kasan_enabled() && !__kmem_cache_empty(cache))
kasan_quarantine_remove_cache(cache);
}
@@ -239,6 +239,9 @@ void __asan_register_globals(void *ptr, ssize_t size)
int i;
struct kasan_global *globals = ptr;
+ if (!kasan_enabled())
+ return;
+
for (i = 0; i < size; i++)
register_global(&globals[i]);
}
@@ -369,6 +372,9 @@ void kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
unsigned int rem_free_meta_size;
unsigned int orig_alloc_meta_offset;
+ if (!kasan_enabled())
+ return;
+
if (!kasan_requires_meta())
return;
@@ -518,6 +524,9 @@ size_t kasan_metadata_size(struct kmem_cache *cache, bool in_object)
{
struct kasan_cache *info = &cache->kasan_info;
+ if (!kasan_enabled())
+ return 0;
+
if (!kasan_requires_meta())
return 0;
@@ -543,6 +552,9 @@ void kasan_record_aux_stack(void *addr)
struct kasan_alloc_meta *alloc_meta;
void *object;
+ if (!kasan_enabled())
+ return;
+
if (is_kfence_address(addr) || !slab)
return;
diff --git a/mm/kasan/init.c b/mm/kasan/init.c
index f084e7a5df1e..c78d77ed47bc 100644
--- a/mm/kasan/init.c
+++ b/mm/kasan/init.c
@@ -447,6 +447,9 @@ void kasan_remove_zero_shadow(void *start, unsigned long size)
unsigned long addr, end, next;
pgd_t *pgd;
+ if (!kasan_enabled())
+ return;
+
addr = (unsigned long)kasan_mem_to_shadow(start);
end = addr + (size >> KASAN_SHADOW_SCALE_SHIFT);
@@ -482,6 +485,9 @@ int kasan_add_zero_shadow(void *start, unsigned long size)
int ret;
void *shadow_start, *shadow_end;
+ if (!kasan_enabled())
+ return 0;
+
shadow_start = kasan_mem_to_shadow(start);
shadow_end = shadow_start + (size >> KASAN_SHADOW_SCALE_SHIFT);
diff --git a/mm/kasan/quarantine.c b/mm/kasan/quarantine.c
index 6958aa713c67..a6dc2c3d8a15 100644
--- a/mm/kasan/quarantine.c
+++ b/mm/kasan/quarantine.c
@@ -405,6 +405,9 @@ static int __init kasan_cpu_quarantine_init(void)
{
int ret = 0;
+ if (!kasan_enabled())
+ return 0;
+
ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mm/kasan:online",
kasan_cpu_online, kasan_cpu_offline);
if (ret < 0)
diff --git a/mm/kasan/report.c b/mm/kasan/report.c
index 27efb78eb32d..1a39b3f62c57 100644
--- a/mm/kasan/report.c
+++ b/mm/kasan/report.c
@@ -576,7 +576,9 @@ bool kasan_report(const void *addr, size_t size, bool is_write,
unsigned long irq_flags;
struct kasan_report_info info;
- if (unlikely(report_suppressed_sw()) || unlikely(!report_enabled())) {
+ if (unlikely(report_suppressed_sw()) ||
+ unlikely(!report_enabled()) ||
+ !kasan_enabled()) {
ret = false;
goto out;
}
diff --git a/mm/kasan/shadow.c b/mm/kasan/shadow.c
index d286e0a04543..87f517b76d6e 100644
--- a/mm/kasan/shadow.c
+++ b/mm/kasan/shadow.c
@@ -164,6 +164,8 @@ void kasan_unpoison(const void *addr, size_t size, bool init)
{
u8 tag = get_tag(addr);
+ if (!kasan_enabled())
+ return;
/*
* Perform shadow offset calculation based on untagged address, as
* some of the callers (e.g. kasan_unpoison_new_object) pass tagged
@@ -277,7 +279,8 @@ static int __meminit kasan_mem_notifier(struct notifier_block *nb,
static int __init kasan_memhotplug_init(void)
{
- hotplug_memory_notifier(kasan_mem_notifier, DEFAULT_CALLBACK_PRI);
+ if (kasan_enabled())
+ hotplug_memory_notifier(kasan_mem_notifier, DEFAULT_CALLBACK_PRI);
return 0;
}
@@ -660,6 +663,9 @@ int kasan_alloc_module_shadow(void *addr, size_t size, gfp_t gfp_mask)
size_t shadow_size;
unsigned long shadow_start;
+ if (!kasan_enabled())
+ return 0;
+
shadow_start = (unsigned long)kasan_mem_to_shadow(addr);
scaled_size = (size + KASAN_GRANULE_SIZE - 1) >>
KASAN_SHADOW_SCALE_SHIFT;
@@ -696,6 +702,9 @@ int kasan_alloc_module_shadow(void *addr, size_t size, gfp_t gfp_mask)
void kasan_free_module_shadow(const struct vm_struct *vm)
{
+ if (!kasan_enabled())
+ return;
+
if (IS_ENABLED(CONFIG_UML))
return;
diff --git a/mm/kasan/sw_tags.c b/mm/kasan/sw_tags.c
index c75741a74602..6c1caec4261a 100644
--- a/mm/kasan/sw_tags.c
+++ b/mm/kasan/sw_tags.c
@@ -79,6 +79,9 @@ bool kasan_check_range(const void *addr, size_t size, bool write,
u8 *shadow_first, *shadow_last, *shadow;
void *untagged_addr;
+ if (!kasan_enabled())
+ return true;
+
if (unlikely(size == 0))
return true;
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 02/15] mm/kasan: rename 'kasan_arg' to 'kasan_arg_disabled'
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
2026-02-25 8:13 ` [PATCH v5 01/15] mm/kasan: add conditional checks in functions to return directly if kasan is disabled Baoquan He
@ 2026-02-25 8:13 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 03/15] mm/kasan: mm/kasan: move kasan= code to common place Baoquan He
` (12 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:13 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
And change it to be a bool variable. This is prepared for later
usage.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
mm/kasan/hw_tags.c | 16 +++++-----------
1 file changed, 5 insertions(+), 11 deletions(-)
diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c
index cbef5e450954..26a69f0d822c 100644
--- a/mm/kasan/hw_tags.c
+++ b/mm/kasan/hw_tags.c
@@ -22,12 +22,6 @@
#include "kasan.h"
-enum kasan_arg {
- KASAN_ARG_DEFAULT,
- KASAN_ARG_OFF,
- KASAN_ARG_ON,
-};
-
enum kasan_arg_mode {
KASAN_ARG_MODE_DEFAULT,
KASAN_ARG_MODE_SYNC,
@@ -41,7 +35,7 @@ enum kasan_arg_vmalloc {
KASAN_ARG_VMALLOC_ON,
};
-static enum kasan_arg kasan_arg __ro_after_init;
+bool kasan_arg_disabled __ro_after_init;
static enum kasan_arg_mode kasan_arg_mode __ro_after_init;
static enum kasan_arg_vmalloc kasan_arg_vmalloc __initdata;
@@ -88,9 +82,9 @@ static int __init early_kasan_flag(char *arg)
return -EINVAL;
if (!strcmp(arg, "off"))
- kasan_arg = KASAN_ARG_OFF;
+ kasan_arg_disabled = true;
else if (!strcmp(arg, "on"))
- kasan_arg = KASAN_ARG_ON;
+ kasan_arg_disabled = false;
else
return -EINVAL;
@@ -222,7 +216,7 @@ void kasan_init_hw_tags_cpu(void)
* When this function is called, kasan_flag_enabled is not yet
* set by kasan_init_hw_tags(). Thus, check kasan_arg instead.
*/
- if (kasan_arg == KASAN_ARG_OFF)
+ if (kasan_arg_disabled)
return;
/*
@@ -240,7 +234,7 @@ void __init kasan_init_hw_tags(void)
return;
/* If KASAN is disabled via command line, don't initialize it. */
- if (kasan_arg == KASAN_ARG_OFF)
+ if (kasan_arg_disabled)
return;
switch (kasan_arg_mode) {
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 03/15] mm/kasan: mm/kasan: move kasan= code to common place
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
2026-02-25 8:13 ` [PATCH v5 01/15] mm/kasan: add conditional checks in functions to return directly if kasan is disabled Baoquan He
2026-02-25 8:13 ` [PATCH v5 02/15] mm/kasan: rename 'kasan_arg' to 'kasan_arg_disabled' Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 04/15] mm/kasan: make kasan=on|off take effect for all three modes Baoquan He
` (11 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
This allows generic and sw_tags to be set in kernel cmdline too.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
include/linux/kasan-enabled.h | 2 ++
mm/kasan/common.c | 21 +++++++++++++++++++++
mm/kasan/hw_tags.c | 18 ------------------
3 files changed, 23 insertions(+), 18 deletions(-)
diff --git a/include/linux/kasan-enabled.h b/include/linux/kasan-enabled.h
index 9eca967d8526..b7cb906825ca 100644
--- a/include/linux/kasan-enabled.h
+++ b/include/linux/kasan-enabled.h
@@ -35,6 +35,8 @@ static inline void kasan_enable(void) {}
#endif /* CONFIG_ARCH_DEFER_KASAN || CONFIG_KASAN_HW_TAGS */
#ifdef CONFIG_KASAN_HW_TAGS
+extern bool kasan_arg_disabled;
+
static inline bool kasan_hw_tags_enabled(void)
{
return kasan_enabled();
diff --git a/mm/kasan/common.c b/mm/kasan/common.c
index b7d05c2a6d93..0d788a468e96 100644
--- a/mm/kasan/common.c
+++ b/mm/kasan/common.c
@@ -42,6 +42,27 @@ DEFINE_STATIC_KEY_FALSE(kasan_flag_enabled);
EXPORT_SYMBOL_GPL(kasan_flag_enabled);
#endif
+#ifdef CONFIG_KASAN_HW_TAGS
+bool kasan_arg_disabled __ro_after_init;
+
+/* kasan=off/on */
+static int __init early_kasan_flag(char *arg)
+{
+ if (!arg)
+ return -EINVAL;
+
+ if (!strcmp(arg, "off"))
+ kasan_arg_disabled = true;
+ else if (!strcmp(arg, "on"))
+ kasan_arg_disabled = false;
+ else
+ return -EINVAL;
+
+ return 0;
+}
+early_param("kasan", early_kasan_flag);
+#endif
+
struct slab *kasan_addr_to_slab(const void *addr)
{
if (virt_addr_valid(addr))
diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c
index 26a69f0d822c..9602ea4861e2 100644
--- a/mm/kasan/hw_tags.c
+++ b/mm/kasan/hw_tags.c
@@ -35,7 +35,6 @@ enum kasan_arg_vmalloc {
KASAN_ARG_VMALLOC_ON,
};
-bool kasan_arg_disabled __ro_after_init;
static enum kasan_arg_mode kasan_arg_mode __ro_after_init;
static enum kasan_arg_vmalloc kasan_arg_vmalloc __initdata;
@@ -75,23 +74,6 @@ unsigned int kasan_page_alloc_sample_order = PAGE_ALLOC_SAMPLE_ORDER_DEFAULT;
DEFINE_PER_CPU(long, kasan_page_alloc_skip);
-/* kasan=off/on */
-static int __init early_kasan_flag(char *arg)
-{
- if (!arg)
- return -EINVAL;
-
- if (!strcmp(arg, "off"))
- kasan_arg_disabled = true;
- else if (!strcmp(arg, "on"))
- kasan_arg_disabled = false;
- else
- return -EINVAL;
-
- return 0;
-}
-early_param("kasan", early_kasan_flag);
-
/* kasan.mode=sync/async/asymm */
static int __init early_kasan_mode(char *arg)
{
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 04/15] mm/kasan: make kasan=on|off take effect for all three modes
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (2 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 03/15] mm/kasan: mm/kasan: move kasan= code to common place Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 05/15] mm/kasan/sw_tags: don't initialize kasan if it's disabled Baoquan He
` (10 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Now everything is ready, setting kasan=off can disable kasan for all
three modes.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
include/linux/kasan-enabled.h | 12 +++++-------
mm/kasan/common.c | 4 ----
2 files changed, 5 insertions(+), 11 deletions(-)
diff --git a/include/linux/kasan-enabled.h b/include/linux/kasan-enabled.h
index b7cb906825ca..cec21a08446e 100644
--- a/include/linux/kasan-enabled.h
+++ b/include/linux/kasan-enabled.h
@@ -4,10 +4,11 @@
#include <linux/static_key.h>
-#if defined(CONFIG_ARCH_DEFER_KASAN) || defined(CONFIG_KASAN_HW_TAGS)
+#ifdef CONFIG_KASAN
+extern bool kasan_arg_disabled;
+
/*
* Global runtime flag for KASAN modes that need runtime control.
- * Used by ARCH_DEFER_KASAN architectures and HW_TAGS mode.
*/
DECLARE_STATIC_KEY_FALSE(kasan_flag_enabled);
@@ -25,18 +26,15 @@ static inline void kasan_enable(void)
static_branch_enable(&kasan_flag_enabled);
}
#else
-/* For architectures that can enable KASAN early, use compile-time check. */
static __always_inline bool kasan_enabled(void)
{
- return IS_ENABLED(CONFIG_KASAN);
+ return false;
}
static inline void kasan_enable(void) {}
-#endif /* CONFIG_ARCH_DEFER_KASAN || CONFIG_KASAN_HW_TAGS */
+#endif
#ifdef CONFIG_KASAN_HW_TAGS
-extern bool kasan_arg_disabled;
-
static inline bool kasan_hw_tags_enabled(void)
{
return kasan_enabled();
diff --git a/mm/kasan/common.c b/mm/kasan/common.c
index 0d788a468e96..fc6513fa5795 100644
--- a/mm/kasan/common.c
+++ b/mm/kasan/common.c
@@ -33,16 +33,13 @@
#include "kasan.h"
#include "../slab.h"
-#if defined(CONFIG_ARCH_DEFER_KASAN) || defined(CONFIG_KASAN_HW_TAGS)
/*
* Definition of the unified static key declared in kasan-enabled.h.
* This provides consistent runtime enable/disable across KASAN modes.
*/
DEFINE_STATIC_KEY_FALSE(kasan_flag_enabled);
EXPORT_SYMBOL_GPL(kasan_flag_enabled);
-#endif
-#ifdef CONFIG_KASAN_HW_TAGS
bool kasan_arg_disabled __ro_after_init;
/* kasan=off/on */
@@ -61,7 +58,6 @@ static int __init early_kasan_flag(char *arg)
return 0;
}
early_param("kasan", early_kasan_flag);
-#endif
struct slab *kasan_addr_to_slab(const void *addr)
{
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 05/15] mm/kasan/sw_tags: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (3 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 04/15] mm/kasan: make kasan=on|off take effect for all three modes Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 06/15] arch/arm: " Baoquan He
` (9 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
mm/kasan/sw_tags.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/mm/kasan/sw_tags.c b/mm/kasan/sw_tags.c
index 6c1caec4261a..7757b69b1c86 100644
--- a/mm/kasan/sw_tags.c
+++ b/mm/kasan/sw_tags.c
@@ -40,6 +40,10 @@ void __init kasan_init_sw_tags(void)
{
int cpu;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
for_each_possible_cpu(cpu)
per_cpu(prng_state, cpu) = (u32)get_cycles();
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 06/15] arch/arm: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (4 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 05/15] mm/kasan/sw_tags: don't initialize kasan if it's disabled Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 07/15] arch/arm64: " Baoquan He
` (8 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also call jump_label_init() early in setup_arch() so that later
kasan_init() can enable static key kasan_flag_enabled. Put
jump_label_init() beofre parse_early_param() as other architectures
do.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-arm-kernel@lists.infradead.org
---
arch/arm/kernel/setup.c | 6 ++++++
arch/arm/mm/kasan_init.c | 3 +++
2 files changed, 9 insertions(+)
diff --git a/arch/arm/kernel/setup.c b/arch/arm/kernel/setup.c
index 0bfd66c7ada0..453a47a4c715 100644
--- a/arch/arm/kernel/setup.c
+++ b/arch/arm/kernel/setup.c
@@ -1135,6 +1135,12 @@ void __init setup_arch(char **cmdline_p)
early_fixmap_init();
early_ioremap_init();
+ /*
+ * Initialise the static keys early as they may be enabled by the
+ * kasan_init() or early parameters.
+ */
+ jump_label_init();
+
parse_early_param();
#ifdef CONFIG_MMU
diff --git a/arch/arm/mm/kasan_init.c b/arch/arm/mm/kasan_init.c
index c6625e808bf8..82ec043c891f 100644
--- a/arch/arm/mm/kasan_init.c
+++ b/arch/arm/mm/kasan_init.c
@@ -212,6 +212,9 @@ void __init kasan_init(void)
phys_addr_t pa_start, pa_end;
u64 i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
/*
* We are going to perform proper setup of shadow memory.
*
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 07/15] arch/arm64: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (5 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 06/15] arch/arm: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 08/15] arch/loongarch: " Baoquan He
` (7 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also need skip kasan_populate_early_vm_area_shadow() if kasan
is disabled.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-arm-kernel@lists.infradead.org
---
arch/arm64/mm/kasan_init.c | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c
index abeb81bf6ebd..4a58e609c81b 100644
--- a/arch/arm64/mm/kasan_init.c
+++ b/arch/arm64/mm/kasan_init.c
@@ -384,6 +384,9 @@ void __init kasan_populate_early_vm_area_shadow(void *start, unsigned long size)
{
unsigned long shadow_start, shadow_end;
+ if (!kasan_enabled())
+ return;
+
if (!is_vmalloc_or_module_addr(start))
return;
@@ -397,6 +400,10 @@ void __init kasan_populate_early_vm_area_shadow(void *start, unsigned long size)
void __init kasan_init(void)
{
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
kasan_init_shadow();
kasan_init_depth();
kasan_init_generic();
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 08/15] arch/loongarch: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (6 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 07/15] arch/arm64: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 09/15] arch/powerpc: " Baoquan He
` (6 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: loongarch@lists.linux.dev
---
arch/loongarch/mm/kasan_init.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/arch/loongarch/mm/kasan_init.c b/arch/loongarch/mm/kasan_init.c
index 0fc02ca06457..047a059544e1 100644
--- a/arch/loongarch/mm/kasan_init.c
+++ b/arch/loongarch/mm/kasan_init.c
@@ -269,6 +269,9 @@ void __init kasan_init(void)
u64 i;
phys_addr_t pa_start, pa_end;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
/*
* If PGDIR_SIZE is too large for cpu_vabits, KASAN_SHADOW_END will
* overflow UINTPTR_MAX and then looks like a user space address.
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 09/15] arch/powerpc: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (7 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 08/15] arch/loongarch: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-03-12 11:12 ` Sourabh Jain
2026-02-25 8:14 ` [PATCH v5 10/15] arch/riscv: " Baoquan He
` (5 subsequent siblings)
14 siblings, 1 reply; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
This includes 32bit, book3s/64 and book3e/64.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linuxppc-dev@lists.ozlabs.org
---
arch/powerpc/mm/kasan/init_32.c | 6 +++++-
arch/powerpc/mm/kasan/init_book3e_64.c | 4 ++++
arch/powerpc/mm/kasan/init_book3s_64.c | 4 ++++
3 files changed, 13 insertions(+), 1 deletion(-)
diff --git a/arch/powerpc/mm/kasan/init_32.c b/arch/powerpc/mm/kasan/init_32.c
index 1d083597464f..0ea2a636c992 100644
--- a/arch/powerpc/mm/kasan/init_32.c
+++ b/arch/powerpc/mm/kasan/init_32.c
@@ -141,6 +141,10 @@ void __init kasan_init(void)
u64 i;
int ret;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
for_each_mem_range(i, &base, &end) {
phys_addr_t top = min(end, total_lowmem);
@@ -170,7 +174,7 @@ void __init kasan_init(void)
void __init kasan_late_init(void)
{
- if (IS_ENABLED(CONFIG_KASAN_VMALLOC))
+ if (IS_ENABLED(CONFIG_KASAN_VMALLOC) && kasan_enabled())
kasan_unmap_early_shadow_vmalloc();
}
diff --git a/arch/powerpc/mm/kasan/init_book3e_64.c b/arch/powerpc/mm/kasan/init_book3e_64.c
index 0d3a73d6d4b0..fbe4c9a7e460 100644
--- a/arch/powerpc/mm/kasan/init_book3e_64.c
+++ b/arch/powerpc/mm/kasan/init_book3e_64.c
@@ -111,6 +111,10 @@ void __init kasan_init(void)
u64 i;
pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page), PAGE_KERNEL_RO);
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
for_each_mem_range(i, &start, &end)
kasan_init_phys_region(phys_to_virt(start), phys_to_virt(end));
diff --git a/arch/powerpc/mm/kasan/init_book3s_64.c b/arch/powerpc/mm/kasan/init_book3s_64.c
index dcafa641804c..f7906f9ef9be 100644
--- a/arch/powerpc/mm/kasan/init_book3s_64.c
+++ b/arch/powerpc/mm/kasan/init_book3s_64.c
@@ -54,6 +54,10 @@ void __init kasan_init(void)
u64 i;
pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page), PAGE_KERNEL);
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
if (!early_radix_enabled()) {
pr_warn("KASAN not enabled as it requires radix!");
return;
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* Re: [PATCH v5 09/15] arch/powerpc: don't initialize kasan if it's disabled
2026-02-25 8:14 ` [PATCH v5 09/15] arch/powerpc: " Baoquan He
@ 2026-03-12 11:12 ` Sourabh Jain
2026-03-12 11:23 ` Christophe Leroy (CS GROUP)
0 siblings, 1 reply; 23+ messages in thread
From: Sourabh Jain @ 2026-03-12 11:12 UTC (permalink / raw)
To: Baoquan He, kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca
On 25/02/26 13:44, Baoquan He wrote:
> Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
>
> This includes 32bit, book3s/64 and book3e/64.
>
> Signed-off-by: Baoquan He <bhe@redhat.com>
> Cc: linuxppc-dev@lists.ozlabs.org
> ---
> arch/powerpc/mm/kasan/init_32.c | 6 +++++-
> arch/powerpc/mm/kasan/init_book3e_64.c | 4 ++++
> arch/powerpc/mm/kasan/init_book3s_64.c | 4 ++++
> 3 files changed, 13 insertions(+), 1 deletion(-)
>
> diff --git a/arch/powerpc/mm/kasan/init_32.c b/arch/powerpc/mm/kasan/init_32.c
> index 1d083597464f..0ea2a636c992 100644
> --- a/arch/powerpc/mm/kasan/init_32.c
> +++ b/arch/powerpc/mm/kasan/init_32.c
> @@ -141,6 +141,10 @@ void __init kasan_init(void)
> u64 i;
> int ret;
>
> + /* If KASAN is disabled via command line, don't initialize it. */
> + if (kasan_arg_disabled)
> + return;
> +
> for_each_mem_range(i, &base, &end) {
> phys_addr_t top = min(end, total_lowmem);
>
> @@ -170,7 +174,7 @@ void __init kasan_init(void)
>
> void __init kasan_late_init(void)
> {
> - if (IS_ENABLED(CONFIG_KASAN_VMALLOC))
> + if (IS_ENABLED(CONFIG_KASAN_VMALLOC) && kasan_enabled())
> kasan_unmap_early_shadow_vmalloc();
> }
>
> diff --git a/arch/powerpc/mm/kasan/init_book3e_64.c b/arch/powerpc/mm/kasan/init_book3e_64.c
> index 0d3a73d6d4b0..fbe4c9a7e460 100644
> --- a/arch/powerpc/mm/kasan/init_book3e_64.c
> +++ b/arch/powerpc/mm/kasan/init_book3e_64.c
> @@ -111,6 +111,10 @@ void __init kasan_init(void)
> u64 i;
> pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page), PAGE_KERNEL_RO);
>
> + /* If KASAN is disabled via command line, don't initialize it. */
> + if (kasan_arg_disabled)
> + return;
> +
> for_each_mem_range(i, &start, &end)
> kasan_init_phys_region(phys_to_virt(start), phys_to_virt(end));
>
> diff --git a/arch/powerpc/mm/kasan/init_book3s_64.c b/arch/powerpc/mm/kasan/init_book3s_64.c
> index dcafa641804c..f7906f9ef9be 100644
> --- a/arch/powerpc/mm/kasan/init_book3s_64.c
> +++ b/arch/powerpc/mm/kasan/init_book3s_64.c
> @@ -54,6 +54,10 @@ void __init kasan_init(void)
> u64 i;
> pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page), PAGE_KERNEL);
>
> + /* If KASAN is disabled via command line, don't initialize it. */
> + if (kasan_arg_disabled)
> + return;
> +
> if (!early_radix_enabled()) {
> pr_warn("KASAN not enabled as it requires radix!");
> return;
Should we log in the kernel log buffer that KASAN is disabled?
Right now, I don't see the kernel advertising the same.
$ dmesg | grep -i kasan
[ 0.000000] Kernel command line:
BOOT_IMAGE=(ieee1275//vdevice/v-scsi@30000070/disk@8100000000000000,msdos2)/vmlinuz-7.0.0-rc3+
crashkernel=2G kasan=off
Tested this series on powerpc Pseries platform.
So feel free to add:
Tested-by: Sourabh Jain <sourabhjain@linux.ibm.com>
- Sourabh Jain
^ permalink raw reply [flat|nested] 23+ messages in thread* Re: [PATCH v5 09/15] arch/powerpc: don't initialize kasan if it's disabled
2026-03-12 11:12 ` Sourabh Jain
@ 2026-03-12 11:23 ` Christophe Leroy (CS GROUP)
2026-03-17 2:10 ` Baoquan He
2026-03-17 2:39 ` Sourabh Jain
0 siblings, 2 replies; 23+ messages in thread
From: Christophe Leroy (CS GROUP) @ 2026-03-12 11:23 UTC (permalink / raw)
To: Sourabh Jain, Baoquan He, kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca
Le 12/03/2026 à 12:12, Sourabh Jain a écrit :
>
>
> On 25/02/26 13:44, Baoquan He wrote:
>> Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
>>
>> This includes 32bit, book3s/64 and book3e/64.
>>
>> Signed-off-by: Baoquan He <bhe@redhat.com>
>> Cc: linuxppc-dev@lists.ozlabs.org
>> ---
>> arch/powerpc/mm/kasan/init_32.c | 6 +++++-
>> arch/powerpc/mm/kasan/init_book3e_64.c | 4 ++++
>> arch/powerpc/mm/kasan/init_book3s_64.c | 4 ++++
>> 3 files changed, 13 insertions(+), 1 deletion(-)
>>
>> diff --git a/arch/powerpc/mm/kasan/init_32.c b/arch/powerpc/mm/kasan/
>> init_32.c
>> index 1d083597464f..0ea2a636c992 100644
>> --- a/arch/powerpc/mm/kasan/init_32.c
>> +++ b/arch/powerpc/mm/kasan/init_32.c
>> @@ -141,6 +141,10 @@ void __init kasan_init(void)
>> u64 i;
>> int ret;
>> + /* If KASAN is disabled via command line, don't initialize it. */
>> + if (kasan_arg_disabled)
>> + return;
>> +
>> for_each_mem_range(i, &base, &end) {
>> phys_addr_t top = min(end, total_lowmem);
>> @@ -170,7 +174,7 @@ void __init kasan_init(void)
>> void __init kasan_late_init(void)
>> {
>> - if (IS_ENABLED(CONFIG_KASAN_VMALLOC))
>> + if (IS_ENABLED(CONFIG_KASAN_VMALLOC) && kasan_enabled())
>> kasan_unmap_early_shadow_vmalloc();
>> }
>> diff --git a/arch/powerpc/mm/kasan/init_book3e_64.c b/arch/powerpc/mm/
>> kasan/init_book3e_64.c
>> index 0d3a73d6d4b0..fbe4c9a7e460 100644
>> --- a/arch/powerpc/mm/kasan/init_book3e_64.c
>> +++ b/arch/powerpc/mm/kasan/init_book3e_64.c
>> @@ -111,6 +111,10 @@ void __init kasan_init(void)
>> u64 i;
>> pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page),
>> PAGE_KERNEL_RO);
>> + /* If KASAN is disabled via command line, don't initialize it. */
>> + if (kasan_arg_disabled)
>> + return;
>> +
>> for_each_mem_range(i, &start, &end)
>> kasan_init_phys_region(phys_to_virt(start), phys_to_virt(end));
>> diff --git a/arch/powerpc/mm/kasan/init_book3s_64.c b/arch/powerpc/mm/
>> kasan/init_book3s_64.c
>> index dcafa641804c..f7906f9ef9be 100644
>> --- a/arch/powerpc/mm/kasan/init_book3s_64.c
>> +++ b/arch/powerpc/mm/kasan/init_book3s_64.c
>> @@ -54,6 +54,10 @@ void __init kasan_init(void)
>> u64 i;
>> pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page),
>> PAGE_KERNEL);
>> + /* If KASAN is disabled via command line, don't initialize it. */
>> + if (kasan_arg_disabled)
>> + return;
>> +
>> if (!early_radix_enabled()) {
>> pr_warn("KASAN not enabled as it requires radix!");
>> return;
>
> Should we log in the kernel log buffer that KASAN is disabled?
>
> Right now, I don't see the kernel advertising the same.
When KASAN is enabled it is advertised with:
pr_info("KernelAddressSanitizer initialized (generic)\n");
Isn't the absence of that message enough to understand KASAN is not there ?
>
> $ dmesg | grep -i kasan
> [ 0.000000] Kernel command line: BOOT_IMAGE=(ieee1275//vdevice/v-
> scsi@30000070/disk@8100000000000000,msdos2)/vmlinuz-7.0.0-rc3+
> crashkernel=2G kasan=off
>
> Tested this series on powerpc Pseries platform.
> So feel free to add:
> Tested-by: Sourabh Jain <sourabhjain@linux.ibm.com>
>
> - Sourabh Jain
>
^ permalink raw reply [flat|nested] 23+ messages in thread* Re: [PATCH v5 09/15] arch/powerpc: don't initialize kasan if it's disabled
2026-03-12 11:23 ` Christophe Leroy (CS GROUP)
@ 2026-03-17 2:10 ` Baoquan He
2026-03-17 2:39 ` Sourabh Jain
1 sibling, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-03-17 2:10 UTC (permalink / raw)
To: Sourabh Jain, Christophe Leroy (CS GROUP)
Cc: kasan-dev, linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch, linuxppc-dev,
linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca
On 03/12/26 at 12:23pm, Christophe Leroy (CS GROUP) wrote:
>
>
> Le 12/03/2026 à 12:12, Sourabh Jain a écrit :
> >
> >
> > On 25/02/26 13:44, Baoquan He wrote:
> > > Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
> > >
> > > This includes 32bit, book3s/64 and book3e/64.
> > >
> > > Signed-off-by: Baoquan He <bhe@redhat.com>
> > > Cc: linuxppc-dev@lists.ozlabs.org
> > > ---
> > > arch/powerpc/mm/kasan/init_32.c | 6 +++++-
> > > arch/powerpc/mm/kasan/init_book3e_64.c | 4 ++++
> > > arch/powerpc/mm/kasan/init_book3s_64.c | 4 ++++
> > > 3 files changed, 13 insertions(+), 1 deletion(-)
> > >
> > > diff --git a/arch/powerpc/mm/kasan/init_32.c
> > > b/arch/powerpc/mm/kasan/ init_32.c
> > > index 1d083597464f..0ea2a636c992 100644
> > > --- a/arch/powerpc/mm/kasan/init_32.c
> > > +++ b/arch/powerpc/mm/kasan/init_32.c
> > > @@ -141,6 +141,10 @@ void __init kasan_init(void)
> > > u64 i;
> > > int ret;
> > > + /* If KASAN is disabled via command line, don't initialize it. */
> > > + if (kasan_arg_disabled)
> > > + return;
> > > +
> > > for_each_mem_range(i, &base, &end) {
> > > phys_addr_t top = min(end, total_lowmem);
> > > @@ -170,7 +174,7 @@ void __init kasan_init(void)
> > > void __init kasan_late_init(void)
> > > {
> > > - if (IS_ENABLED(CONFIG_KASAN_VMALLOC))
> > > + if (IS_ENABLED(CONFIG_KASAN_VMALLOC) && kasan_enabled())
> > > kasan_unmap_early_shadow_vmalloc();
> > > }
> > > diff --git a/arch/powerpc/mm/kasan/init_book3e_64.c
> > > b/arch/powerpc/mm/ kasan/init_book3e_64.c
> > > index 0d3a73d6d4b0..fbe4c9a7e460 100644
> > > --- a/arch/powerpc/mm/kasan/init_book3e_64.c
> > > +++ b/arch/powerpc/mm/kasan/init_book3e_64.c
> > > @@ -111,6 +111,10 @@ void __init kasan_init(void)
> > > u64 i;
> > > pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page),
> > > PAGE_KERNEL_RO);
> > > + /* If KASAN is disabled via command line, don't initialize it. */
> > > + if (kasan_arg_disabled)
> > > + return;
> > > +
> > > for_each_mem_range(i, &start, &end)
> > > kasan_init_phys_region(phys_to_virt(start), phys_to_virt(end));
> > > diff --git a/arch/powerpc/mm/kasan/init_book3s_64.c
> > > b/arch/powerpc/mm/ kasan/init_book3s_64.c
> > > index dcafa641804c..f7906f9ef9be 100644
> > > --- a/arch/powerpc/mm/kasan/init_book3s_64.c
> > > +++ b/arch/powerpc/mm/kasan/init_book3s_64.c
> > > @@ -54,6 +54,10 @@ void __init kasan_init(void)
> > > u64 i;
> > > pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page),
> > > PAGE_KERNEL);
> > > + /* If KASAN is disabled via command line, don't initialize it. */
> > > + if (kasan_arg_disabled)
> > > + return;
> > > +
> > > if (!early_radix_enabled()) {
> > > pr_warn("KASAN not enabled as it requires radix!");
> > > return;
> >
> > Should we log in the kernel log buffer that KASAN is disabled?
> >
> > Right now, I don't see the kernel advertising the same.
>
> When KASAN is enabled it is advertised with:
>
> pr_info("KernelAddressSanitizer initialized (generic)\n");
>
> Isn't the absence of that message enough to understand KASAN is not there ?
Right, that's the way I took when I tested it.
>
> >
> > $ dmesg | grep -i kasan
> > [ 0.000000] Kernel command line: BOOT_IMAGE=(ieee1275//vdevice/v-
> > scsi@30000070/disk@8100000000000000,msdos2)/vmlinuz-7.0.0-rc3+
> > crashkernel=2G kasan=off
> >
> > Tested this series on powerpc Pseries platform.
> > So feel free to add:
> > Tested-by: Sourabh Jain <sourabhjain@linux.ibm.com>
Thanks for testing.
^ permalink raw reply [flat|nested] 23+ messages in thread* Re: [PATCH v5 09/15] arch/powerpc: don't initialize kasan if it's disabled
2026-03-12 11:23 ` Christophe Leroy (CS GROUP)
2026-03-17 2:10 ` Baoquan He
@ 2026-03-17 2:39 ` Sourabh Jain
1 sibling, 0 replies; 23+ messages in thread
From: Sourabh Jain @ 2026-03-17 2:39 UTC (permalink / raw)
To: Christophe Leroy (CS GROUP), Baoquan He, kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca
On 12/03/26 16:53, Christophe Leroy (CS GROUP) wrote:
>
>
> Le 12/03/2026 à 12:12, Sourabh Jain a écrit :
>>
>>
>> On 25/02/26 13:44, Baoquan He wrote:
>>> Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
>>>
>>> This includes 32bit, book3s/64 and book3e/64.
>>>
>>> Signed-off-by: Baoquan He <bhe@redhat.com>
>>> Cc: linuxppc-dev@lists.ozlabs.org
>>> ---
>>> arch/powerpc/mm/kasan/init_32.c | 6 +++++-
>>> arch/powerpc/mm/kasan/init_book3e_64.c | 4 ++++
>>> arch/powerpc/mm/kasan/init_book3s_64.c | 4 ++++
>>> 3 files changed, 13 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/arch/powerpc/mm/kasan/init_32.c
>>> b/arch/powerpc/mm/kasan/ init_32.c
>>> index 1d083597464f..0ea2a636c992 100644
>>> --- a/arch/powerpc/mm/kasan/init_32.c
>>> +++ b/arch/powerpc/mm/kasan/init_32.c
>>> @@ -141,6 +141,10 @@ void __init kasan_init(void)
>>> u64 i;
>>> int ret;
>>> + /* If KASAN is disabled via command line, don't initialize it. */
>>> + if (kasan_arg_disabled)
>>> + return;
>>> +
>>> for_each_mem_range(i, &base, &end) {
>>> phys_addr_t top = min(end, total_lowmem);
>>> @@ -170,7 +174,7 @@ void __init kasan_init(void)
>>> void __init kasan_late_init(void)
>>> {
>>> - if (IS_ENABLED(CONFIG_KASAN_VMALLOC))
>>> + if (IS_ENABLED(CONFIG_KASAN_VMALLOC) && kasan_enabled())
>>> kasan_unmap_early_shadow_vmalloc();
>>> }
>>> diff --git a/arch/powerpc/mm/kasan/init_book3e_64.c
>>> b/arch/powerpc/mm/ kasan/init_book3e_64.c
>>> index 0d3a73d6d4b0..fbe4c9a7e460 100644
>>> --- a/arch/powerpc/mm/kasan/init_book3e_64.c
>>> +++ b/arch/powerpc/mm/kasan/init_book3e_64.c
>>> @@ -111,6 +111,10 @@ void __init kasan_init(void)
>>> u64 i;
>>> pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page),
>>> PAGE_KERNEL_RO);
>>> + /* If KASAN is disabled via command line, don't initialize it. */
>>> + if (kasan_arg_disabled)
>>> + return;
>>> +
>>> for_each_mem_range(i, &start, &end)
>>> kasan_init_phys_region(phys_to_virt(start),
>>> phys_to_virt(end));
>>> diff --git a/arch/powerpc/mm/kasan/init_book3s_64.c
>>> b/arch/powerpc/mm/ kasan/init_book3s_64.c
>>> index dcafa641804c..f7906f9ef9be 100644
>>> --- a/arch/powerpc/mm/kasan/init_book3s_64.c
>>> +++ b/arch/powerpc/mm/kasan/init_book3s_64.c
>>> @@ -54,6 +54,10 @@ void __init kasan_init(void)
>>> u64 i;
>>> pte_t zero_pte = pfn_pte(virt_to_pfn(kasan_early_shadow_page),
>>> PAGE_KERNEL);
>>> + /* If KASAN is disabled via command line, don't initialize it. */
>>> + if (kasan_arg_disabled)
>>> + return;
>>> +
>>> if (!early_radix_enabled()) {
>>> pr_warn("KASAN not enabled as it requires radix!");
>>> return;
>>
>> Should we log in the kernel log buffer that KASAN is disabled?
>>
>> Right now, I don't see the kernel advertising the same.
>
> When KASAN is enabled it is advertised with:
>
> pr_info("KernelAddressSanitizer initialized (generic)\n");
>
> Isn't the absence of that message enough to understand KASAN is not
> there ?
Yes this should work. Thanks.
- Sourabh Jain
>
>>
>> $ dmesg | grep -i kasan
>> [ 0.000000] Kernel command line: BOOT_IMAGE=(ieee1275//vdevice/v-
>> scsi@30000070/disk@8100000000000000,msdos2)/vmlinuz-7.0.0-rc3+
>> crashkernel=2G kasan=off
>>
>> Tested this series on powerpc Pseries platform.
>> So feel free to add:
>> Tested-by: Sourabh Jain <sourabhjain@linux.ibm.com>
>>
>> - Sourabh Jain
>>
>
^ permalink raw reply [flat|nested] 23+ messages in thread
* [PATCH v5 10/15] arch/riscv: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (8 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 09/15] arch/powerpc: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 11/15] arch/x86: " Baoquan He
` (4 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-riscv@lists.infradead.org
---
arch/riscv/mm/kasan_init.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/arch/riscv/mm/kasan_init.c b/arch/riscv/mm/kasan_init.c
index c4a2a9e5586e..dc7cc0dcc7eb 100644
--- a/arch/riscv/mm/kasan_init.c
+++ b/arch/riscv/mm/kasan_init.c
@@ -485,6 +485,10 @@ void __init kasan_init(void)
phys_addr_t p_start, p_end;
u64 i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
create_tmp_mapping();
csr_write(CSR_SATP, PFN_DOWN(__pa(tmp_pg_dir)) | satp_mode);
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 11/15] arch/x86: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (9 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 10/15] arch/riscv: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 12/15] arch/xtensa: " Baoquan He
` (3 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: x86@kernel.org
---
arch/x86/mm/kasan_init_64.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/arch/x86/mm/kasan_init_64.c b/arch/x86/mm/kasan_init_64.c
index 998b6010d6d3..5ebf2850c77d 100644
--- a/arch/x86/mm/kasan_init_64.c
+++ b/arch/x86/mm/kasan_init_64.c
@@ -343,6 +343,10 @@ void __init kasan_init(void)
unsigned long shadow_cea_begin, shadow_cea_per_cpu_begin, shadow_cea_end;
int i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
memcpy(early_top_pgt, init_top_pgt, sizeof(early_top_pgt));
/*
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 12/15] arch/xtensa: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (10 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 11/15] arch/x86: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 13/15] arch/um: " Baoquan He
` (2 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also call jump_label_init() early in setup_arch() so that later
kasan_init() can enable static key kasan_flag_enabled. Put
jump_label_init() beofre parse_early_param() as other architectures
do.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: Chris Zankel <chris@zankel.net>
Cc: Max Filippov <jcmvbkbc@gmail.com>
---
arch/xtensa/kernel/setup.c | 1 +
arch/xtensa/mm/kasan_init.c | 4 ++++
2 files changed, 5 insertions(+)
diff --git a/arch/xtensa/kernel/setup.c b/arch/xtensa/kernel/setup.c
index f72e280363be..aabeb23f41fa 100644
--- a/arch/xtensa/kernel/setup.c
+++ b/arch/xtensa/kernel/setup.c
@@ -352,6 +352,7 @@ void __init setup_arch(char **cmdline_p)
mem_reserve(__pa(_SecondaryResetVector_text_start),
__pa(_SecondaryResetVector_text_end));
#endif
+ jump_label_init();
parse_early_param();
bootmem_init();
kasan_init();
diff --git a/arch/xtensa/mm/kasan_init.c b/arch/xtensa/mm/kasan_init.c
index 0524b9ed5e63..eb367b801218 100644
--- a/arch/xtensa/mm/kasan_init.c
+++ b/arch/xtensa/mm/kasan_init.c
@@ -70,6 +70,10 @@ void __init kasan_init(void)
{
int i;
+ /* If KASAN is disabled via command line, don't initialize it. */
+ if (kasan_arg_disabled)
+ return;
+
BUILD_BUG_ON(KASAN_SHADOW_OFFSET != KASAN_SHADOW_START -
(KASAN_START_VADDR >> KASAN_SHADOW_SCALE_SHIFT));
BUILD_BUG_ON(VMALLOC_START < KASAN_START_VADDR);
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 13/15] arch/um: don't initialize kasan if it's disabled
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (11 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 12/15] arch/xtensa: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-02-25 8:14 ` [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt Baoquan He
2026-02-25 8:14 ` [PATCH v5 15/15] mm/kasan: clean up unneeded ARCH_DEFER_KASAN and kasan_arch_is_ready Baoquan He
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Here, kasan is disabled if specified 'kasan=off' in kernel cmdline.
And also wrap up the kasan code into CONFIG_KASAN ifdeffery scope.
Signed-off-by: Baoquan He <bhe@redhat.com>
Cc: linux-um@lists.infradead.org
---
arch/um/kernel/mem.c | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/arch/um/kernel/mem.c b/arch/um/kernel/mem.c
index 89c8c8b94a79..2bf858ab35b5 100644
--- a/arch/um/kernel/mem.c
+++ b/arch/um/kernel/mem.c
@@ -62,8 +62,11 @@ static unsigned long brk_end;
void __init arch_mm_preinit(void)
{
+#ifdef CONFIG_KASAN
/* Safe to call after jump_label_init(). Enables KASAN. */
- kasan_init_generic();
+ if (!kasan_arg_disabled)
+ kasan_init_generic();
+#endif
/* clear the zero-page */
memset(empty_zero_page, 0, PAGE_SIZE);
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (12 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 13/15] arch/um: " Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
2026-03-12 12:53 ` Samuel Holland
2026-02-25 8:14 ` [PATCH v5 15/15] mm/kasan: clean up unneeded ARCH_DEFER_KASAN and kasan_arch_is_ready Baoquan He
14 siblings, 1 reply; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
And also remove the relevant description in dev-tools/kasan.rst
which is hw_tags specificially.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
Documentation/admin-guide/kernel-parameters.txt | 4 ++++
Documentation/dev-tools/kasan.rst | 2 --
2 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
index cb850e5290c2..e0115fad9e60 100644
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -2899,6 +2899,10 @@ Kernel parameters
js= [HW,JOY] Analog joystick
See Documentation/input/joydev/joystick.rst.
+ kasan= [KNL] controls whether KASAN is enabled.
+ Format: off | on
+ default: on
+
kasan_multi_shot
[KNL] Enforce KASAN (Kernel Address Sanitizer) to print
report on every invalid memory access. Without this
diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst
index a034700da7c4..eaae83fcb5e4 100644
--- a/Documentation/dev-tools/kasan.rst
+++ b/Documentation/dev-tools/kasan.rst
@@ -129,8 +129,6 @@ Hardware Tag-Based KASAN mode is intended for use in production as a security
mitigation. Therefore, it supports additional boot parameters that allow
disabling KASAN altogether or controlling its features:
-- ``kasan=off`` or ``=on`` controls whether KASAN is enabled (default: ``on``).
-
- ``kasan.mode=sync``, ``=async`` or ``=asymm`` controls whether KASAN
is configured in synchronous, asynchronous or asymmetric mode of
execution (default: ``sync``).
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread* Re: [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt
2026-02-25 8:14 ` [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt Baoquan He
@ 2026-03-12 12:53 ` Samuel Holland
2026-03-17 3:36 ` Baoquan He
0 siblings, 1 reply; 23+ messages in thread
From: Samuel Holland @ 2026-03-12 12:53 UTC (permalink / raw)
To: Baoquan He, kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca
Hi Baoquan,
On 2026-02-25 2:14 AM, Baoquan He wrote:
> And also remove the relevant description in dev-tools/kasan.rst
> which is hw_tags specificially.
>
> Signed-off-by: Baoquan He <bhe@redhat.com>
> ---
> Documentation/admin-guide/kernel-parameters.txt | 4 ++++
> Documentation/dev-tools/kasan.rst | 2 --
> 2 files changed, 4 insertions(+), 2 deletions(-)
>
> diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
> index cb850e5290c2..e0115fad9e60 100644
> --- a/Documentation/admin-guide/kernel-parameters.txt
> +++ b/Documentation/admin-guide/kernel-parameters.txt
> @@ -2899,6 +2899,10 @@ Kernel parameters
> js= [HW,JOY] Analog joystick
> See Documentation/input/joydev/joystick.rst.
>
> + kasan= [KNL] controls whether KASAN is enabled.
> + Format: off | on
> + default: on
> +
> kasan_multi_shot
> [KNL] Enforce KASAN (Kernel Address Sanitizer) to print
> report on every invalid memory access. Without this
> diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst
> index a034700da7c4..eaae83fcb5e4 100644
> --- a/Documentation/dev-tools/kasan.rst
> +++ b/Documentation/dev-tools/kasan.rst
> @@ -129,8 +129,6 @@ Hardware Tag-Based KASAN mode is intended for use in production as a security
> mitigation. Therefore, it supports additional boot parameters that allow
> disabling KASAN altogether or controlling its features:
The sentence above is now incorrect as well. I would recommend documenting the
parameter earlier in the "Boot parameters" section instead of removing it from
this document entirely.
Regards,
Samuel
>
> -- ``kasan=off`` or ``=on`` controls whether KASAN is enabled (default: ``on``).
> -
> - ``kasan.mode=sync``, ``=async`` or ``=asymm`` controls whether KASAN
> is configured in synchronous, asynchronous or asymmetric mode of
> execution (default: ``sync``).
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt
2026-03-12 12:53 ` Samuel Holland
@ 2026-03-17 3:36 ` Baoquan He
2026-03-17 3:49 ` Samuel Holland
0 siblings, 1 reply; 23+ messages in thread
From: Baoquan He @ 2026-03-17 3:36 UTC (permalink / raw)
To: Samuel Holland
Cc: kasan-dev, linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch, linuxppc-dev,
linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca
On 03/12/26 at 07:53am, Samuel Holland wrote:
> Hi Baoquan,
>
> On 2026-02-25 2:14 AM, Baoquan He wrote:
> > And also remove the relevant description in dev-tools/kasan.rst
> > which is hw_tags specificially.
> >
> > Signed-off-by: Baoquan He <bhe@redhat.com>
> > ---
> > Documentation/admin-guide/kernel-parameters.txt | 4 ++++
> > Documentation/dev-tools/kasan.rst | 2 --
> > 2 files changed, 4 insertions(+), 2 deletions(-)
> >
> > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
> > index cb850e5290c2..e0115fad9e60 100644
> > --- a/Documentation/admin-guide/kernel-parameters.txt
> > +++ b/Documentation/admin-guide/kernel-parameters.txt
> > @@ -2899,6 +2899,10 @@ Kernel parameters
> > js= [HW,JOY] Analog joystick
> > See Documentation/input/joydev/joystick.rst.
> >
> > + kasan= [KNL] controls whether KASAN is enabled.
> > + Format: off | on
> > + default: on
> > +
> > kasan_multi_shot
> > [KNL] Enforce KASAN (Kernel Address Sanitizer) to print
> > report on every invalid memory access. Without this
> > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst
> > index a034700da7c4..eaae83fcb5e4 100644
> > --- a/Documentation/dev-tools/kasan.rst
> > +++ b/Documentation/dev-tools/kasan.rst
> > @@ -129,8 +129,6 @@ Hardware Tag-Based KASAN mode is intended for use in production as a security
> > mitigation. Therefore, it supports additional boot parameters that allow
> > disabling KASAN altogether or controlling its features:
>
> The sentence above is now incorrect as well. I would recommend documenting the
> parameter earlier in the "Boot parameters" section instead of removing it from
> this document entirely.
Good catch and the suggestion is good to me. Thanks.
Is below change OK to you?
From 317be48b9c1bf9d33b8d8fff5e401e3155531d81 Mon Sep 17 00:00:00 2001
From: Baoquan He <bhe@redhat.com>
Date: Tue, 17 Mar 2026 11:28:39 +0800
Subject: [PATCH] mm/kasan: adjust documentation
Content-type: text/plain
To reflect the change of kasan=on|off.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
Documentation/dev-tools/kasan.rst | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst
index a034700da7c4..8e65bc04dbcd 100644
--- a/Documentation/dev-tools/kasan.rst
+++ b/Documentation/dev-tools/kasan.rst
@@ -103,6 +103,9 @@ Boot parameters
KASAN is affected by the generic ``panic_on_warn`` command line parameter.
When it is enabled, KASAN panics the kernel after printing a bug report.
+The generic ``kasan=off`` or ``=on`` command line parameter controls
+whether KASAN is enabled (default: ``on``).
+
By default, KASAN prints a bug report only for the first invalid memory access.
With ``kasan_multi_shot``, KASAN prints a report on every invalid access. This
effectively disables ``panic_on_warn`` for KASAN reports.
@@ -127,9 +130,7 @@ modes below) support altering stack trace collection behavior:
Hardware Tag-Based KASAN mode is intended for use in production as a security
mitigation. Therefore, it supports additional boot parameters that allow
-disabling KASAN altogether or controlling its features:
-
-- ``kasan=off`` or ``=on`` controls whether KASAN is enabled (default: ``on``).
+controlling its features:
- ``kasan.mode=sync``, ``=async`` or ``=asymm`` controls whether KASAN
is configured in synchronous, asynchronous or asymmetric mode of
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread
* Re: [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt
2026-03-17 3:36 ` Baoquan He
@ 2026-03-17 3:49 ` Samuel Holland
0 siblings, 0 replies; 23+ messages in thread
From: Samuel Holland @ 2026-03-17 3:49 UTC (permalink / raw)
To: Baoquan He
Cc: kasan-dev, linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov,
linux-kernel, linux-um, linux-arm-kernel, loongarch, linuxppc-dev,
linux-riscv, x86, chris, jcmvbkbc, linux-s390, hca
On 2026-03-16 10:36 PM, Baoquan He wrote:
> On 03/12/26 at 07:53am, Samuel Holland wrote:
>> Hi Baoquan,
>>
>> On 2026-02-25 2:14 AM, Baoquan He wrote:
>>> And also remove the relevant description in dev-tools/kasan.rst
>>> which is hw_tags specificially.
>>>
>>> Signed-off-by: Baoquan He <bhe@redhat.com>
>>> ---
>>> Documentation/admin-guide/kernel-parameters.txt | 4 ++++
>>> Documentation/dev-tools/kasan.rst | 2 --
>>> 2 files changed, 4 insertions(+), 2 deletions(-)
>>>
>>> diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
>>> index cb850e5290c2..e0115fad9e60 100644
>>> --- a/Documentation/admin-guide/kernel-parameters.txt
>>> +++ b/Documentation/admin-guide/kernel-parameters.txt
>>> @@ -2899,6 +2899,10 @@ Kernel parameters
>>> js= [HW,JOY] Analog joystick
>>> See Documentation/input/joydev/joystick.rst.
>>>
>>> + kasan= [KNL] controls whether KASAN is enabled.
>>> + Format: off | on
>>> + default: on
>>> +
>>> kasan_multi_shot
>>> [KNL] Enforce KASAN (Kernel Address Sanitizer) to print
>>> report on every invalid memory access. Without this
>>> diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst
>>> index a034700da7c4..eaae83fcb5e4 100644
>>> --- a/Documentation/dev-tools/kasan.rst
>>> +++ b/Documentation/dev-tools/kasan.rst
>>> @@ -129,8 +129,6 @@ Hardware Tag-Based KASAN mode is intended for use in production as a security
>>> mitigation. Therefore, it supports additional boot parameters that allow
>>> disabling KASAN altogether or controlling its features:
>>
>> The sentence above is now incorrect as well. I would recommend documenting the
>> parameter earlier in the "Boot parameters" section instead of removing it from
>> this document entirely.
>
> Good catch and the suggestion is good to me. Thanks.
>
> Is below change OK to you?
>
>
> From 317be48b9c1bf9d33b8d8fff5e401e3155531d81 Mon Sep 17 00:00:00 2001
> From: Baoquan He <bhe@redhat.com>
> Date: Tue, 17 Mar 2026 11:28:39 +0800
> Subject: [PATCH] mm/kasan: adjust documentation
I'd suggest something a bit more specific, maybe like "mm/kasan: document kasan=
for all modes".
> Content-type: text/plain
>
> To reflect the change of kasan=on|off.
>
> Signed-off-by: Baoquan He <bhe@redhat.com>
> ---
> Documentation/dev-tools/kasan.rst | 7 ++++---
> 1 file changed, 4 insertions(+), 3 deletions(-)
>
> diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst
> index a034700da7c4..8e65bc04dbcd 100644
> --- a/Documentation/dev-tools/kasan.rst
> +++ b/Documentation/dev-tools/kasan.rst
> @@ -103,6 +103,9 @@ Boot parameters
> KASAN is affected by the generic ``panic_on_warn`` command line parameter.
> When it is enabled, KASAN panics the kernel after printing a bug report.
>
> +The generic ``kasan=off`` or ``=on`` command line parameter controls
> +whether KASAN is enabled (default: ``on``).
> +
This is in the middle of paragraphs describing the fault reporting options. I'd
suggest to move it to the beginning of the section.
With those fixes, you can add
Reviewed-by: Samuel Holland <samuel.holland@sifive.com>
> By default, KASAN prints a bug report only for the first invalid memory access.
> With ``kasan_multi_shot``, KASAN prints a report on every invalid access. This
> effectively disables ``panic_on_warn`` for KASAN reports.
> @@ -127,9 +130,7 @@ modes below) support altering stack trace collection behavior:
>
> Hardware Tag-Based KASAN mode is intended for use in production as a security
> mitigation. Therefore, it supports additional boot parameters that allow
> -disabling KASAN altogether or controlling its features:
> -
> -- ``kasan=off`` or ``=on`` controls whether KASAN is enabled (default: ``on``).
> +controlling its features:
>
> - ``kasan.mode=sync``, ``=async`` or ``=asymm`` controls whether KASAN
> is configured in synchronous, asynchronous or asymmetric mode of
^ permalink raw reply [flat|nested] 23+ messages in thread
* [PATCH v5 15/15] mm/kasan: clean up unneeded ARCH_DEFER_KASAN and kasan_arch_is_ready
2026-02-25 8:13 [PATCH v5 00/15] mm/kasan: make kasan=on|off work for all three modes Baoquan He
` (13 preceding siblings ...)
2026-02-25 8:14 ` [PATCH v5 14/15] mm/kasan: add document into kernel-parameters.txt Baoquan He
@ 2026-02-25 8:14 ` Baoquan He
14 siblings, 0 replies; 23+ messages in thread
From: Baoquan He @ 2026-02-25 8:14 UTC (permalink / raw)
To: kasan-dev
Cc: linux-mm, andreyknvl, ryabinin.a.a, glider, dvyukov, linux-kernel,
linux-um, linux-arm-kernel, loongarch, linuxppc-dev, linux-riscv,
x86, chris, jcmvbkbc, linux-s390, hca, Baoquan He
Since commit 1e338f4d99e6 ("kasan: introduce ARCH_DEFER_KASAN and unify
static key across modes"), kasan_arch_is_ready() has been dead code.
And up to now, ARCH_DEFER_KASAN is useless too because of code change
for 'kasan=on|off'.
Here clean them up.
Signed-off-by: Baoquan He <bhe@redhat.com>
---
arch/loongarch/Kconfig | 1 -
arch/powerpc/Kconfig | 1 -
arch/um/Kconfig | 1 -
lib/Kconfig.kasan | 12 ------------
mm/kasan/kasan.h | 6 ------
5 files changed, 21 deletions(-)
diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig
index d211c6572b0a..4b7802d02911 100644
--- a/arch/loongarch/Kconfig
+++ b/arch/loongarch/Kconfig
@@ -9,7 +9,6 @@ config LOONGARCH
select ACPI_PPTT if ACPI
select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI
select ARCH_BINFMT_ELF_STATE
- select ARCH_NEEDS_DEFER_KASAN
select ARCH_DISABLE_KASAN_INLINE
select ARCH_ENABLE_MEMORY_HOTPLUG
select ARCH_ENABLE_MEMORY_HOTREMOVE
diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig
index ad7a2fe63a2a..b51fbc25bdc9 100644
--- a/arch/powerpc/Kconfig
+++ b/arch/powerpc/Kconfig
@@ -122,7 +122,6 @@ config PPC
# Please keep this list sorted alphabetically.
#
select ARCH_32BIT_OFF_T if PPC32
- select ARCH_NEEDS_DEFER_KASAN if PPC_RADIX_MMU
select ARCH_DISABLE_KASAN_INLINE if PPC_RADIX_MMU
select ARCH_DMA_DEFAULT_COHERENT if !NOT_COHERENT_CACHE
select ARCH_ENABLE_MEMORY_HOTPLUG
diff --git a/arch/um/Kconfig b/arch/um/Kconfig
index 098cda44db22..fd0bedd2c696 100644
--- a/arch/um/Kconfig
+++ b/arch/um/Kconfig
@@ -6,7 +6,6 @@ config UML
bool
default y
select ARCH_DISABLE_KASAN_INLINE if STATIC_LINK
- select ARCH_NEEDS_DEFER_KASAN if STATIC_LINK
select ARCH_WANTS_DYNAMIC_TASK_STRUCT
select ARCH_HAS_CACHE_LINE_SIZE
select ARCH_HAS_CPU_FINALIZE_INIT
diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan
index a4bb610a7a6f..f82889a830fa 100644
--- a/lib/Kconfig.kasan
+++ b/lib/Kconfig.kasan
@@ -19,18 +19,6 @@ config ARCH_DISABLE_KASAN_INLINE
Disables both inline and stack instrumentation. Selected by
architectures that do not support these instrumentation types.
-config ARCH_NEEDS_DEFER_KASAN
- bool
-
-config ARCH_DEFER_KASAN
- def_bool y
- depends on KASAN && ARCH_NEEDS_DEFER_KASAN
- help
- Architectures should select this if they need to defer KASAN
- initialization until shadow memory is properly set up. This
- enables runtime control via static keys. Otherwise, KASAN uses
- compile-time constants for better performance.
-
config CC_HAS_KASAN_GENERIC
def_bool $(cc-option, -fsanitize=kernel-address)
diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h
index fc9169a54766..f08f7f75c285 100644
--- a/mm/kasan/kasan.h
+++ b/mm/kasan/kasan.h
@@ -552,12 +552,6 @@ static inline void kasan_poison_last_granule(const void *address, size_t size) {
#endif /* CONFIG_KASAN_GENERIC */
-#ifndef kasan_arch_is_ready
-static inline bool kasan_arch_is_ready(void) { return true; }
-#elif !defined(CONFIG_KASAN_GENERIC) || !defined(CONFIG_KASAN_OUTLINE)
-#error kasan_arch_is_ready only works in KASAN generic outline mode!
-#endif
-
#if IS_ENABLED(CONFIG_KASAN_KUNIT_TEST)
void kasan_kunit_test_suite_start(void);
--
2.52.0
^ permalink raw reply related [flat|nested] 23+ messages in thread