Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3542187pxb; Mon, 24 Jan 2022 11:49:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJyOt5o5eOCXghstIVL3WHdUwXpMJqt/7RyNv7UDEDGAhsFn7YytTKHpsP9vdQCVbf+OG8lB X-Received: by 2002:a05:6a00:17a4:b0:4c9:a178:22f8 with SMTP id s36-20020a056a0017a400b004c9a17822f8mr4952708pfg.0.1643053754055; Mon, 24 Jan 2022 11:49:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643053754; cv=none; d=google.com; s=arc-20160816; b=ik4LdCv0OHoEczzsGv1dzxBPuB7cbeDd9YPFHyTxbWUEqgObChR/1Rar3ZXU5TNPIj FU6XYw9vAi5Eopb8A0aUb/c5DdG7UQLsm35T3j4Seh4QGPlP1pG/+q5vsukTWZsdBcFP HYb/txpoAENzPlwgghY35rDFqg30A2z/+UmiJm0/Ix/Yf0QfJKkwAnVJfurESMWgJWQ3 muEY/pITJfanJ0hgYhA1LpfuiGsSzXO9rMUL4ll+qAgeuOE4XD8A3qRI10H9HbJ1ZVxc bjPoOn5r1QYtcclHw82tYd8zyt6t9M6M2Afyjgi5prCJ706gHvQWOqh+4Eh2KwhSThkK /svw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=PiyMHSnkvYvDw2LQdkJa/J+//+u8Wif2b5Y6jyI/vHU=; b=hckkfmidTpWoT/0E+x2+4vshqMvTevdG3lXK3IoCqo/dApWUOxSGzdEdlxSgbPGwsb dZxc9KHJWBEiKZ2AiFlBJcFSB4tNThIKVT4DJPIIQ786Tw3q8uTd9ltl6mUshIVp/Z03 YRgFBcOtmsc889+yxA7XQhueu/IJE//SuteVPcrHsceTosiOAciPe/r9odeVVcpbPIHP 03n0GLG5e5axPjC4UJf7J9y764tckYpwSmPz3QBeStabWFx4rFqDT36nHRe9KuR/fRFT Z2skB1PjFIFIjRI/h5q18gUKnTWthfoJF4L/ikkh5WMULnk6tiFPDDzvWe94o1nHtQVi q8nA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=T0BhkxS8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d4si14871825pfj.222.2022.01.24.11.49.01; Mon, 24 Jan 2022 11:49:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=T0BhkxS8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244931AbiAXSDJ (ORCPT + 99 others); Mon, 24 Jan 2022 13:03:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59774 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244814AbiAXSC6 (ORCPT ); Mon, 24 Jan 2022 13:02:58 -0500 Received: from out0.migadu.com (out0.migadu.com [IPv6:2001:41d0:2:267::]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2A934C06173B for ; Mon, 24 Jan 2022 10:02:58 -0800 (PST) X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1643047376; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=PiyMHSnkvYvDw2LQdkJa/J+//+u8Wif2b5Y6jyI/vHU=; b=T0BhkxS8FQtCOrCEEu43b/tiYymVHBuuhMlGSw9lgSOuRZ59FOHzvs9BRNnwju6wtuuQXG vM+LbdKxr0GgY11GYgXTKVcHwMBt1+4QWdQGHmK0K9v/CqhYWsiLO6FG47PslOJQCL3xkO dcoiVALdKidG+w5NsxE2ricY8hMXqoA= From: andrey.konovalov@linux.dev To: Andrew Morton Cc: Andrey Konovalov , Marco Elver , Alexander Potapenko , Dmitry Vyukov , Andrey Ryabinin , kasan-dev@googlegroups.com, linux-mm@kvack.org, Vincenzo Frascino , Catalin Marinas , Will Deacon , Mark Rutland , linux-arm-kernel@lists.infradead.org, Peter Collingbourne , Evgenii Stepanov , linux-kernel@vger.kernel.org, Andrey Konovalov Subject: [PATCH v6 04/39] kasan, page_alloc: simplify kasan_poison_pages call site Date: Mon, 24 Jan 2022 19:02:12 +0100 Message-Id: In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT X-Migadu-Auth-User: linux.dev Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andrey Konovalov Simplify the code around calling kasan_poison_pages() in free_pages_prepare(). This patch does no functional changes. Signed-off-by: Andrey Konovalov Reviewed-by: Alexander Potapenko --- Changes v1->v2: - Don't reorder kasan_poison_pages() and free_pages_prepare(). --- mm/page_alloc.c | 18 +++++------------- 1 file changed, 5 insertions(+), 13 deletions(-) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index e5f95c6ab0ac..60bc838a4d85 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -1302,6 +1302,7 @@ static __always_inline bool free_pages_prepare(struct page *page, { int bad = 0; bool skip_kasan_poison = should_skip_kasan_poison(page, fpi_flags); + bool init = want_init_on_free(); VM_BUG_ON_PAGE(PageTail(page), page); @@ -1374,19 +1375,10 @@ static __always_inline bool free_pages_prepare(struct page *page, * With hardware tag-based KASAN, memory tags must be set before the * page becomes unavailable via debug_pagealloc or arch_free_page. */ - if (kasan_has_integrated_init()) { - bool init = want_init_on_free(); - - if (!skip_kasan_poison) - kasan_poison_pages(page, order, init); - } else { - bool init = want_init_on_free(); - - if (init) - kernel_init_free_pages(page, 1 << order); - if (!skip_kasan_poison) - kasan_poison_pages(page, order, init); - } + if (init && !kasan_has_integrated_init()) + kernel_init_free_pages(page, 1 << order); + if (!skip_kasan_poison) + kasan_poison_pages(page, order, init); /* * arch_free_page() can make the page's contents inaccessible. s390 -- 2.25.1