From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 801F5C433E0 for ; Thu, 4 Feb 2021 12:49:24 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 0D2A564F53 for ; Thu, 4 Feb 2021 12:49:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0D2A564F53 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 98FFC6B0005; Thu, 4 Feb 2021 07:49:23 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 9179C6B0070; Thu, 4 Feb 2021 07:49:23 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7DF3E6B0071; Thu, 4 Feb 2021 07:49:23 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 63E1C6B0005 for ; Thu, 4 Feb 2021 07:49:23 -0500 (EST) Received: from smtpin16.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 23B7D1EF1 for ; Thu, 4 Feb 2021 12:49:23 +0000 (UTC) X-FDA: 77780566206.16.mice27_021112c275dc Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin16.hostedemail.com (Postfix) with ESMTP id 04D6A100E690B for ; Thu, 4 Feb 2021 12:49:22 +0000 (UTC) X-HE-Tag: mice27_021112c275dc X-Filterd-Recvd-Size: 2583 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf19.hostedemail.com (Postfix) with ESMTP for ; Thu, 4 Feb 2021 12:49:22 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id 11F4464DF8; Thu, 4 Feb 2021 12:49:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1612442961; bh=evq41kJogdMign7eZfsMLjpvkEQt0WpyoEhGnh7ALbU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=U5ESek0ogYAsRxTgPFKCH2o4S7NHSkwWHsah5+WgKQ4R/NRNs8uKwOJpG2MbprQlh d2rBQMD0wt5M7hFw44yRDrzBEMaCF7nVCHPiCwxOifB0iD9inaqeUjHTkVjy0ECQ/B EpEHJ5xcmcIWyxRAsqp3bbuQeW1zftjtzUhAbpxiAIJHQ9a/SpIVB7HrxlBP2hx7Rw wUw/tHH1S/PZtziQBzQffSQKIhmLJRtOaL/jubf2IXPAIjPZGdCsjMROfrDlzHfla4 hQtkFBEmfZUqcYHjY9+p0hyrqlsbmXwaISOU1f2O5KDRajgYCoi+k4tBfdwkaew/gG jUfoa0i0RZqCg== Date: Thu, 4 Feb 2021 12:49:14 +0000 From: Will Deacon To: Lecopzer Chen Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, dan.j.williams@intel.com, aryabinin@virtuozzo.com, glider@google.com, dvyukov@google.com, akpm@linux-foundation.org, linux-mediatek@lists.infradead.org, yj.chiang@mediatek.com, catalin.marinas@arm.com, ardb@kernel.org, andreyknvl@google.com, broonie@kernel.org, linux@roeck-us.net, rppt@kernel.org, tyhicks@linux.microsoft.com, robin.murphy@arm.com, vincenzo.frascino@arm.com, gustavoars@kernel.org, Lecopzer Chen Subject: Re: [PATCH v2 0/4] arm64: kasan: support CONFIG_KASAN_VMALLOC Message-ID: <20210204124914.GC20468@willie-the-truck> References: <20210109103252.812517-1-lecopzer@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210109103252.812517-1-lecopzer@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Sat, Jan 09, 2021 at 06:32:48PM +0800, Lecopzer Chen wrote: > Linux supports KAsan for VMALLOC since commit 3c5c3cfb9ef4da9 > ("kasan: support backing vmalloc space with real shadow memory") > > Acroding to how x86 ported it [1], they early allocated p4d and pgd, > but in arm64 I just simulate how KAsan supports MODULES_VADDR in arm64 > by not to populate the vmalloc area except for kimg address. The one thing I've failed to grok from your series is how you deal with vmalloc allocations where the shadow overlaps with the shadow which has already been allocated for the kernel image. Please can you explain? Thanks, Will