From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-24.8 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9A982C433E0 for ; Tue, 2 Feb 2021 16:57:36 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id E7EC264E9A for ; Tue, 2 Feb 2021 16:57:35 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org E7EC264E9A Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 456B56B006C; Tue, 2 Feb 2021 11:57:35 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 3E0236B0070; Tue, 2 Feb 2021 11:57:35 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2CF196B0071; Tue, 2 Feb 2021 11:57:35 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0143.hostedemail.com [216.40.44.143]) by kanga.kvack.org (Postfix) with ESMTP id 188736B006C for ; Tue, 2 Feb 2021 11:57:35 -0500 (EST) Received: from smtpin04.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id C2B36181AEF1D for ; Tue, 2 Feb 2021 16:57:34 +0000 (UTC) X-FDA: 77773934028.04.pull43_1e00f0f275cc Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin04.hostedemail.com (Postfix) with ESMTP id A1BC6800BE91 for ; Tue, 2 Feb 2021 16:57:34 +0000 (UTC) X-HE-Tag: pull43_1e00f0f275cc X-Filterd-Recvd-Size: 5577 Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) by imf31.hostedemail.com (Postfix) with ESMTP for ; Tue, 2 Feb 2021 16:57:33 +0000 (UTC) Received: by mail-wm1-f50.google.com with SMTP id w4so1850772wmi.4 for ; Tue, 02 Feb 2021 08:57:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=lO7tj/Femn1+wEijzb4UKh0PnLxDA74JJSIXBjPCjcg=; b=emCtWBCSzNAR6zo9nqaF4fGZuOL3zOc2tIGPwlEafqDM3dv1vp5Ci1ONSFtdfh3++T mzX+vg6fhgdyhumEFT5SWWhOvljxP1Bso9nBLgTeZqdVWmcNTc9sNZ9za02+nsTsRahB E5Mi8/UGFb5X81E7RWyvc7gIrqqxwKHv9VcvGIxlOoQXSzl1hscp6gOeSXfkKFzfjMrv KSykYRzZvKF3sMMPyx0lkR1DypEcoQUnqiSk9cINQyKT9/3wwuibqVSr5JsWON+pGP1+ a1V1YgNJXJxrhczcOkiPxxx6wZcWXNkQ94120eEID0uRyslqRsYcrYZt3Mzl0uAkDKIH 5G/w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=lO7tj/Femn1+wEijzb4UKh0PnLxDA74JJSIXBjPCjcg=; b=jrqBlGpRuQpwSy40m+ZLs0HTdqPPQ/xA6MGUcMjXnlP2ynZydybAa6cvh7eL+t1XZs l6pRGM5aJV3oOFaTydLkiSIqiBoKau1Q8yFwstfu63NzH8eMnJIghazKHzYqHG++8d6t cRtZhIfQo7VFKqK1fY5B5hE4OuD+zUE6E1vJcfstRF83BexE5fFRu5Mop2PD0tUO2r43 YMVoycjEFTy4YfgcA15rEJ3Jz9kiMrJJlIU642E66Eu6QjTboLW32PK37mIVHkiNRYq9 oB7H0IStfen3ndBBInztydm280k95SW6cp2Jx++6IVhtw+pTS3PrzcdTDe26SgMNHWvp Z+ug== X-Gm-Message-State: AOAM532ZE719cWT2idXlGeks2fexK2KfCWQkZ/9EaVhh+u1ai+nZJy9G mX/9dtjciM2QHtkyxOu0817W3w== X-Google-Smtp-Source: ABdhPJzKnlEb49Qzq1C7WH6rqxehd7nnWuFwXqi876IGzxU89iMEg3PBoEY8CsMHZqoxchz2OXRvFA== X-Received: by 2002:a1c:5608:: with SMTP id k8mr4448012wmb.91.1612285052531; Tue, 02 Feb 2021 08:57:32 -0800 (PST) Received: from elver.google.com ([2a00:79e0:15:13:f693:9fff:fef4:2449]) by smtp.gmail.com with ESMTPSA id j4sm32514546wru.20.2021.02.02.08.57.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Feb 2021 08:57:31 -0800 (PST) Date: Tue, 2 Feb 2021 17:57:25 +0100 From: Marco Elver To: Andrey Konovalov Cc: Catalin Marinas , Vincenzo Frascino , Dmitry Vyukov , Alexander Potapenko , Andrew Morton , Will Deacon , Andrey Ryabinin , Peter Collingbourne , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 03/12] kasan: optimize large kmalloc poisoning Message-ID: References: <8fdbf86842f4eaf2458ecd23d0844058dbc2c7a2.1612208222.git.andreyknvl@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8fdbf86842f4eaf2458ecd23d0844058dbc2c7a2.1612208222.git.andreyknvl@google.com> User-Agent: Mutt/2.0.2 (2020-11-20) X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon, Feb 01, 2021 at 08:43PM +0100, Andrey Konovalov wrote: > Similarly to kasan_kmalloc(), kasan_kmalloc_large() doesn't need > to unpoison the object as it as already unpoisoned by alloc_pages() > (or by ksize() for krealloc()). > > This patch changes kasan_kmalloc_large() to only poison the redzone. > > Signed-off-by: Andrey Konovalov Reviewed-by: Marco Elver > --- > mm/kasan/common.c | 20 +++++++++++++++----- > 1 file changed, 15 insertions(+), 5 deletions(-) > > diff --git a/mm/kasan/common.c b/mm/kasan/common.c > index 128cb330ca73..a7eb553c8e91 100644 > --- a/mm/kasan/common.c > +++ b/mm/kasan/common.c > @@ -494,7 +494,6 @@ EXPORT_SYMBOL(__kasan_kmalloc); > void * __must_check __kasan_kmalloc_large(const void *ptr, size_t size, > gfp_t flags) > { > - struct page *page; > unsigned long redzone_start; > unsigned long redzone_end; > > @@ -504,12 +503,23 @@ void * __must_check __kasan_kmalloc_large(const void *ptr, size_t size, > if (unlikely(ptr == NULL)) > return NULL; > > - page = virt_to_page(ptr); > + /* > + * The object has already been unpoisoned by kasan_alloc_pages() for > + * alloc_pages() or by ksize() for krealloc(). > + */ > + > + /* > + * The redzone has byte-level precision for the generic mode. > + * Partially poison the last object granule to cover the unaligned > + * part of the redzone. > + */ > + if (IS_ENABLED(CONFIG_KASAN_GENERIC)) > + kasan_poison_last_granule(ptr, size); > + > + /* Poison the aligned part of the redzone. */ > redzone_start = round_up((unsigned long)(ptr + size), > KASAN_GRANULE_SIZE); > - redzone_end = (unsigned long)ptr + page_size(page); > - > - kasan_unpoison(ptr, size); > + redzone_end = (unsigned long)ptr + page_size(virt_to_page(ptr)); > kasan_poison((void *)redzone_start, redzone_end - redzone_start, > KASAN_PAGE_REDZONE); > > -- > 2.30.0.365.g02bc693789-goog >