From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 15D49C76195 for ; Tue, 28 Mar 2023 12:15:42 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9320E6B0072; Tue, 28 Mar 2023 08:15:41 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 8E24A6B0074; Tue, 28 Mar 2023 08:15:41 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7AAD36B0075; Tue, 28 Mar 2023 08:15:41 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 6B7186B0072 for ; Tue, 28 Mar 2023 08:15:41 -0400 (EDT) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 3606880980 for ; Tue, 28 Mar 2023 12:15:41 +0000 (UTC) X-FDA: 80618202882.04.8706722 Received: from loongson.cn (mail.loongson.cn [114.242.206.163]) by imf24.hostedemail.com (Postfix) with ESMTP id 536C4180018 for ; Tue, 28 Mar 2023 12:15:37 +0000 (UTC) Authentication-Results: imf24.hostedemail.com; dkim=none; dmarc=none; spf=pass (imf24.hostedemail.com: domain of zhangqing@loongson.cn designates 114.242.206.163 as permitted sender) smtp.mailfrom=zhangqing@loongson.cn ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1680005739; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=t4nkZrvjBo+pqMwr4yUTaJ7nlD/nD4XCVCxtsOY7fyU=; b=gO8qMW+t+SWhZm4KLqbnssX/l063ejvOO9lQwUe3/+oZWw3Hxu7GEUwUEwxxnsdsszLBNa gSpNpFbyFjOtIpHzydod2TIgHLtGt+FcPIaDJ60ja/MWv1HtVC7RH39YNwCMV4xs+MxhvZ sZIdmplJ9sDomoZ03VRVvdHaBREXwUk= ARC-Authentication-Results: i=1; imf24.hostedemail.com; dkim=none; dmarc=none; spf=pass (imf24.hostedemail.com: domain of zhangqing@loongson.cn designates 114.242.206.163 as permitted sender) smtp.mailfrom=zhangqing@loongson.cn ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1680005739; a=rsa-sha256; cv=none; b=Syr8J7m9RuvVl1YctBwC9XjomCTT4cHlG64gkNC+qJWh7/PhYMFZL061cyQbCLxxBG6TLz EmBcjCfYhbBbdM+0l1bAE+RzIvWW98h4ixIquDfw/+mEYHFs384c3zVo0CZ9AtQM103hm/ nDr3+J0l0tqCiRe33xKHULyx/IDp2cw= Received: from loongson.cn (unknown [113.200.148.30]) by gateway (Coremail) with SMTP id _____8Ax69ln2iJkdBYTAA--.29048S3; Tue, 28 Mar 2023 20:15:35 +0800 (CST) Received: from [10.130.0.102] (unknown [113.200.148.30]) by localhost.localdomain (Coremail) with SMTP id AQAAf8Dxjb5l2iJkMWQPAA--.35747S3; Tue, 28 Mar 2023 20:15:35 +0800 (CST) Subject: Re: [PATCH] LoongArch: Add kernel address sanitizer support To: Xi Ruoyao , Andrey Ryabinin , Jonathan Corbet , Huacai Chen , Andrew Morton Cc: Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , WANG Xuerui , Jiaxun Yang , kasan-dev@googlegroups.com, linux-doc@vger.kernel.org, linux-mm@kvack.org, loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org References: <20230328111714.2056-1-zhangqing@loongson.cn> <9817aaa043e9f0ed964bd523773447bd64f6e2c0.camel@xry111.site> From: Qing Zhang Message-ID: <1c231587-3b70-22ab-d554-ebe3de407909@loongson.cn> Date: Tue, 28 Mar 2023 20:15:33 +0800 User-Agent: Mozilla/5.0 (X11; Linux mips64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <9817aaa043e9f0ed964bd523773447bd64f6e2c0.camel@xry111.site> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-CM-TRANSID:AQAAf8Dxjb5l2iJkMWQPAA--.35747S3 X-CM-SenderInfo: x2kd0wptlqwqxorr0wxvrqhubq/ X-Coremail-Antispam: 1Uk129KBjvJXoW7ArWDtw4rur15Gr1DuF1Dtrb_yoW8ZF4kpr ykJF15JrWrAr18Jr1qqw1DZryUXw1qq3W5Gr1DJFyrZw17Aryjgr4DXr1qgr1Dtr40gr15 Jr1UtF12vw1UJr7anT9S1TB71UUUUjUqnTZGkaVYY2UrUUUUj1kv1TuYvTs0mT0YCTnIWj qI5I8CrVACY4xI64kE6c02F40Ex7xfYxn0WfASr-VFAUDa7-sFnT9fnUUIcSsGvfJTRUUU bqxYFVCjjxCrM7AC8VAFwI0_Jr0_Gr1l1xkIjI8I6I8E6xAIw20EY4v20xvaj40_Wr0E3s 1l1IIY67AEw4v_Jrv_JF1l8cAvFVAK0II2c7xJM28CjxkF64kEwVA0rcxSw2x7M28EF7xv wVC0I7IYx2IY67AKxVW8JVW5JwA2z4x0Y4vE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwA2z4 x0Y4vEx4A2jsIE14v26r4UJVWxJr1l84ACjcxK6I8E87Iv6xkF7I0E14v26F4UJVW0owAa w2AFwI0_Jrv_JF1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqjxCEc2xF0cIa020Ex4CE44 I27wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_JF0_Jw1lYx0Ex4A2 jsIE14v26r4j6F4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvEwIxGrwCYjI0SjxkI62 AI1cAE67vIY487MxkF7I0En4kS14v26r126r1DMxAIw28IcxkI7VAKI48JMxC20s026xCa FVCjc4AY6r1j6r4UMxCIbckI1I0E14v26r4a6rW5MI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2 IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVW8ZVWrXwCIc40Y0x0EwIxGrwCI 42IY6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8JwCI42 IY6xAIw20EY4v20xvaj40_Jr0_JF4lIxAIcVC2z280aVAFwI0_Gr0_Cr1lIxAIcVC2z280 aVCY1x0267AKxVW8JVW8JrUvcSsGvfC2KfnxnUUI43ZEXa7IU0b6pPUUUUU== X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 536C4180018 X-Stat-Signature: 5bqk34s415qpj4p1hhzip4xxmdb8oex6 X-HE-Tag: 1680005737-748949 X-HE-Meta: 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 XXiA+gaS vGdHMkaOBdewpC6O+uIsrb5ImLG+a/iAZPjffWieh2FYi7dYLOzxIvyDJUpSKBXeDC4PgZnzOig72pp6b15F6PoHMfP8w/JQkHXGHoM+yH1ubUFk+V1Wh1EksVsrrKEcTbRej20erPrFmQjQ= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi, Ruoyao On 2023/3/28 下午7:39, Xi Ruoyao wrote: > On Tue, 2023-03-28 at 19:17 +0800, Qing Zhang wrote: > > /* snip */ > > >> -void * __init relocate_kernel(void) >> +unsigned long __init relocate_kernel(void) > > Why we must modify relocate_kernel for KASAN? When the CONFIG_RANDOMIZE_BASE is enabled, the kernel will be updated to a random new address. Kasan needs to call kasan_early_init before start_kernel. There are two situations: 1> After enabling CONFIG_RELOCATABLE, call kasan_early_init. 2> After CONFIG_RELOCATABLE is not enabled, call kasan_early_init. In order to prevent code redundancy and semantic problems caused by calling kasan_early_init (before jr a0) at the old PC. Thanks, -Qing > >>  { >>         unsigned long kernel_length; >>         unsigned long random_offset = 0; >>         void *location_new = _text; /* Default to original kernel start */ >> -       void *kernel_entry = start_kernel; /* Default to original kernel entry point */ >>         char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ >> >>         strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); >> @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) >> >>                 reloc_offset += random_offset; >> >> -               /* Return the new kernel's entry point */ >> -               kernel_entry = RELOCATED_KASLR(start_kernel); >> - >>                 /* The current thread is now within the relocated kernel */ >>                 __current_thread_info = RELOCATED_KASLR(__current_thread_info); >> >> @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) >> >>         relocate_absolute(random_offset); >> >> -       return kernel_entry; >> +       return random_offset; >