And also do the kasan_arg_disabled chekcing before kasan_flag_enabled
enabling to make sure kernel parameter kasan=on|off has been parsed.

Signed-off-by: Baoquan He <[email protected]>
Cc: [email protected]
---
 arch/um/kernel/mem.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/arch/um/kernel/mem.c b/arch/um/kernel/mem.c
index 39c4a7e21c6f..08cd012a6bb8 100644
--- a/arch/um/kernel/mem.c
+++ b/arch/um/kernel/mem.c
@@ -62,8 +62,11 @@ static unsigned long brk_end;
 
 void __init arch_mm_preinit(void)
 {
+#ifdef CONFIG_KASAN
        /* Safe to call after jump_label_init(). Enables KASAN. */
-       kasan_init_generic();
+       if (!kasan_arg_disabled)
+               kasan_init_generic();
+#endif
 
        /* clear the zero-page */
        memset(empty_zero_page, 0, PAGE_SIZE);
-- 
2.41.0


Reply via email to