xref: /openbmc/linux/arch/riscv/include/asm/kasan.h (revision e8a62cc2)
18ad8b727SNick Hu /* SPDX-License-Identifier: GPL-2.0 */
28ad8b727SNick Hu /* Copyright (C) 2019 Andes Technology Corporation */
38ad8b727SNick Hu 
48ad8b727SNick Hu #ifndef __ASM_KASAN_H
58ad8b727SNick Hu #define __ASM_KASAN_H
68ad8b727SNick Hu 
78ad8b727SNick Hu #ifndef __ASSEMBLY__
88ad8b727SNick Hu 
98ad8b727SNick Hu #ifdef CONFIG_KASAN
108ad8b727SNick Hu 
117899ed26SAlexandre Ghiti /*
127899ed26SAlexandre Ghiti  * The following comment was copied from arm64:
137899ed26SAlexandre Ghiti  * KASAN_SHADOW_START: beginning of the kernel virtual addresses.
147899ed26SAlexandre Ghiti  * KASAN_SHADOW_END: KASAN_SHADOW_START + 1/N of kernel virtual addresses,
157899ed26SAlexandre Ghiti  * where N = (1 << KASAN_SHADOW_SCALE_SHIFT).
167899ed26SAlexandre Ghiti  *
177899ed26SAlexandre Ghiti  * KASAN_SHADOW_OFFSET:
187899ed26SAlexandre Ghiti  * This value is used to map an address to the corresponding shadow
197899ed26SAlexandre Ghiti  * address by the following formula:
207899ed26SAlexandre Ghiti  *     shadow_addr = (address >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET
217899ed26SAlexandre Ghiti  *
227899ed26SAlexandre Ghiti  * (1 << (64 - KASAN_SHADOW_SCALE_SHIFT)) shadow addresses that lie in range
237899ed26SAlexandre Ghiti  * [KASAN_SHADOW_OFFSET, KASAN_SHADOW_END) cover all 64-bits of virtual
247899ed26SAlexandre Ghiti  * addresses. So KASAN_SHADOW_OFFSET should satisfy the following equation:
257899ed26SAlexandre Ghiti  *      KASAN_SHADOW_OFFSET = KASAN_SHADOW_END -
267899ed26SAlexandre Ghiti  *                              (1ULL << (64 - KASAN_SHADOW_SCALE_SHIFT))
277899ed26SAlexandre Ghiti  */
288ad8b727SNick Hu #define KASAN_SHADOW_SCALE_SHIFT	3
298ad8b727SNick Hu 
303270bfdbSAlexandre Ghiti #define KASAN_SHADOW_SIZE	(UL(1) << ((VA_BITS - 1) - KASAN_SHADOW_SCALE_SHIFT))
31*e8a62cc2SAlexandre Ghiti /*
32*e8a62cc2SAlexandre Ghiti  * Depending on the size of the virtual address space, the region may not be
33*e8a62cc2SAlexandre Ghiti  * aligned on PGDIR_SIZE, so force its alignment to ease its population.
34*e8a62cc2SAlexandre Ghiti  */
35*e8a62cc2SAlexandre Ghiti #define KASAN_SHADOW_START	((KASAN_SHADOW_END - KASAN_SHADOW_SIZE) & PGDIR_MASK)
36f7ae0233SAlexandre Ghiti #define KASAN_SHADOW_END	MODULES_LOWEST_VADDR
3754c5639dSAlexandre Ghiti #define KASAN_SHADOW_OFFSET	_AC(CONFIG_KASAN_SHADOW_OFFSET, UL)
388ad8b727SNick Hu 
398ad8b727SNick Hu void kasan_init(void);
408ad8b727SNick Hu asmlinkage void kasan_early_init(void);
412efad17eSAlexandre Ghiti void kasan_swapper_init(void);
428ad8b727SNick Hu 
438ad8b727SNick Hu #endif
448ad8b727SNick Hu #endif
458ad8b727SNick Hu #endif /* __ASM_KASAN_H */
46