Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp657947pxb; Thu, 12 Nov 2020 12:58:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJz5SOD5bSbETss1HGibrT1P/v7fAdiKmPVpWOwddqwOrcPio/ozKAsmUNsx8zg++hBFFY95 X-Received: by 2002:a17:906:19c3:: with SMTP id h3mr1172739ejd.395.1605214731434; Thu, 12 Nov 2020 12:58:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605214731; cv=none; d=google.com; s=arc-20160816; b=zb9onHdg5ZBhxQjVquYYdAq/SLeEDmXuG1jQqdjRDp5dAt7DKg/BXWATtVTToJQJNk aNA4zic++GckzUkflyGM4Qb11J1YD6fIQcnYOFLm7/d8OA/lKhg7vWReKjwGw3CouwcC 9yL079vmVa4YJQttzA5O++Q5l3PByo5bOej24HYigOG7bUHQi1U7aKodURVnOziDyB5t 6oZq1FEEPtJrNuOcZIWBIKayrsAgUCoSqoPMO2wcV06GCK8GWx89kygo7iLrLbm5rAL5 x20cYCN+7Sh3Rvhn9oLh4I2KZKLACQS1fYV+OQB8XFzqpAmtxzT2rWKC3EbeNE3GiEg7 m0VA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Kiz7admIpkh5f8na25jRX8719oxnjpCDxUfGo3ANCBE=; b=HDtahX/K+xNWegP0FAnxru87DPYSrGBw7tVi9VkAifyTis0F0jx1Js75rV8mVX9IDL C8z5sYc/PXi54C6Nu8KBYlCLWRZGMiugD6pSiHx069kCzTs8VzcJgCdggVJ5V//TYY8v dCiVXGyfqnQ1AxI0OChD2Mh/TETcSDDKYOXeXZ0EYHR3OtKa5fLzB67kJ8oKyoQS7Hfu z6Ug9iyOqjzPQLVE+wkwLu1B07DC8VQbz/3wS1ZkBhaoiawm6P8OUNYuTjPbLG37JYq4 a0HBkAfMI9L0CZCe5GAhWWkiQZmuzgeZcftHJX9GQY5Mz549dcThAza2jpCxfolALMws LHjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ctgie1D8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q20si4865197edv.517.2020.11.12.12.58.28; Thu, 12 Nov 2020 12:58:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ctgie1D8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727149AbgKLUzD (ORCPT + 99 others); Thu, 12 Nov 2020 15:55:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34428 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726893AbgKLUzD (ORCPT ); Thu, 12 Nov 2020 15:55:03 -0500 Received: from mail-pf1-x441.google.com (mail-pf1-x441.google.com [IPv6:2607:f8b0:4864:20::441]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5C824C0613D1 for ; Thu, 12 Nov 2020 12:54:50 -0800 (PST) Received: by mail-pf1-x441.google.com with SMTP id g7so5686807pfc.2 for ; Thu, 12 Nov 2020 12:54:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Kiz7admIpkh5f8na25jRX8719oxnjpCDxUfGo3ANCBE=; b=Ctgie1D8MC2g1hh3J3AczqEEFg61iZjZlh/Atgs1FXSuN1BBfr3ABTuFUMCX1A3CN5 MFvwljUQCJCrKtFGCOLQy6M8uxXt5L9hfKGDMd0GkNUqzv8iYyZRsHMN+stmXgL006yT VUSf+UXiq1qxuZmcR6nKhiOrOrqy/z70tiTQ8bVW7oMHjwpPKMNDHDuvWUsM4k/Lb3dr nK+HTBu78MxN9EqObzoctChp0htmgXuCoB8UnsY5VyXfUrPXZ/LB8/J9TDXhlyW5z0Gt yr+YchGQhT4cSML2uIyFoJWEe690nfsQoeFE4WsrKWyzex01bvfFivVCvpdoW/aaeiKf Qo8g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Kiz7admIpkh5f8na25jRX8719oxnjpCDxUfGo3ANCBE=; b=ayDDqFe3DHtI2d0Kxsj1wixOLS12l9uLGoXKNLZE8ZowZxn3k9Sh1YHgMnKzqQAuvr GGehhzR0xm8NldFXFfsmLvQ8VGe1lCRXNUwJ1coKM0KpoeERCS/2jYuNg4alvSZAfsYL SwQiUAKcyULn0V+zzwFNOxoQ0aPhvYam81RsmZwS3XbMpjZF5QIN9ZQUEvIW+I/HcuFP yUDr0e2owtgBqwOzSIwJpCmxU3bo2vc8b5bZTBfNAS4vy7ZIuxY5r+wxyJvqjCst/iPh DLq7bmu+mscQgQAijhoxSEFaPsX3WDgrp5C7bhjOhBItCxu1Rcqrnkjoh7tkEsbLAQly I0ew== X-Gm-Message-State: AOAM5315oMV5MDmNvZMNEyiR4EJWaLNckOteagd/KG+qL3knoTxBNVKM NUcaxIHFfL9csuccEjOhsDxXXKN+PnCRZEJBb6AsRg== X-Received: by 2002:a05:6a00:16c4:b029:162:bf9f:6458 with SMTP id l4-20020a056a0016c4b0290162bf9f6458mr1139365pfc.55.1605214489773; Thu, 12 Nov 2020 12:54:49 -0800 (PST) MIME-Version: 1.0 References: <0a9b63bff116734ab63d99ebd09c244332d71958.1605046662.git.andreyknvl@google.com> <20201111174902.GK517454@elver.google.com> In-Reply-To: From: Andrey Konovalov Date: Thu, 12 Nov 2020 21:54:38 +0100 Message-ID: Subject: Re: [PATCH v2 10/20] kasan: inline and rename kasan_unpoison_memory To: Marco Elver Cc: Dmitry Vyukov , Alexander Potapenko , Catalin Marinas , Will Deacon , Vincenzo Frascino , Evgenii Stepanov , Andrey Ryabinin , Branislav Rankov , Kevin Brodsky , Andrew Morton , kasan-dev , Linux ARM , Linux Memory Management List , LKML Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 12, 2020 at 8:52 PM Marco Elver wrote: > > On Thu, 12 Nov 2020 at 20:45, Andrey Konovalov wrote: > > > > On Wed, Nov 11, 2020 at 6:49 PM Marco Elver wrote: > > > > > > On Tue, Nov 10, 2020 at 11:20PM +0100, Andrey Konovalov wrote: > > > > Currently kasan_unpoison_memory() is used as both an external annotation > > > > and as an internal memory poisoning helper. Rename external annotation to > > > > kasan_unpoison_data() and inline the internal helper for hardware > > > > tag-based mode to avoid undeeded function calls. > > > > > > I don't understand why this needs to be renamed again. The users of > > > kasan_unpoison_memory() outweigh those of kasan_unpoison_slab(), of > > > which there seems to be only 1! > > > > The idea is to make kasan_(un)poison_memory() functions inlinable for > > internal use. It doesn't have anything to do with the number of times > > they are used. > > > > Perhaps we can drop the kasan_ prefix for the internal implementations > > though, and keep using kasan_unpoison_memory() externally. > > Whatever avoids changing the external interface, because it seems > really pointless. I can see why it's done, but it's a side-effect of > the various wrappers being added. It looks like unposion_memory() is already taken. Any suggestions for internal KASAN poisoning function names?