linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: "Harry (Hyeonggon) Yoo" <42.hyeyoo@gmail.com>
To: Huacai Chen <chenhuacai@kernel.org>
Cc: Huacai Chen <chenhuacai@loongson.cn>,
	Andrew Morton <akpm@linux-foundation.org>,
	linux-mm@kvack.org, "Rafael J . Wysocki" <rafael@kernel.org>,
	Pavel Machek <pavel@kernel.org>,
	linux-pm@vger.kernel.org, GONG Ruiqi <gongruiqi@huaweicloud.com>,
	Xiu Jianfeng <xiujianfeng@huawei.com>,
	stable@vger.kernel.org, Yuli Wang <wangyuli@uniontech.com>,
	Vlastimil Babka <vbabka@suse.cz>,
	Christoph Lameter <cl@linux.com>,
	David Rientjes <rientjes@google.com>,
	Roman Gushchin <roman.gushchin@linux.dev>,
	Pekka Enberg <penberg@kernel.org>,
	Joonsoo Kim <iamjoonsoo.kim@lge.com>
Subject: How does swsusp work with randomization features? (was: mm/slab: Initialise random_kmalloc_seed after initcalls)
Date: Fri, 14 Feb 2025 18:33:22 +0900	[thread overview]
Message-ID: <Z68N4lTIIwudzcLY@MacBook-Air-5.local> (raw)
In-Reply-To: <CAAhV-H7i=WJmdFCCtY5DgE2eN657ddJwJwHGK1jgLKRte+VnEg@mail.gmail.com>

On Thu, Feb 13, 2025 at 11:20:22AM +0800, Huacai Chen wrote:
> Hi, Harry,
> 
> On Wed, Feb 12, 2025 at 11:39 PM Harry (Hyeonggon) Yoo
> <42.hyeyoo@gmail.com> wrote:
> > On Wed, Feb 12, 2025 at 11:17 PM Huacai Chen <chenhuacai@loongson.cn> wrote:
> > >
> > > Hibernation assumes the memory layout after resume be the same as that
> > > before sleep, but CONFIG_RANDOM_KMALLOC_CACHES breaks this assumption.
> >
> > Could you please elaborate what do you mean by
> > hibernation assumes 'the memory layout' after resume be the same as that
> > before sleep?
> >
> > I don't understand how updating random_kmalloc_seed breaks resuming from
> > hibernation. Changing random_kmalloc_seed affects which kmalloc caches
> > newly allocated objects are from, but it should not affect the objects that are
> > already allocated (before hibernation).
>
> When resuming, the booting kernel should switch to the target kernel,
> if the address of switch code (from the booting kernel) is the
> effective data of the target kernel, then the switch code may be
> overwritten.

Hmm... I'm still missing some pieces.
How is the kernel binary overwritten when slab allocations are randomized? 

Also, I'm not sure if it's even safe to assume that the memory layout is the
same across boots. But I'm not an expert on swsusp anyway...

It'd be really helpful for linux-pm folks to clarify 1) what are the
(architecture-independent) assumptions are for swsusp to work, and
2) how architectures dealt with other randomization features like kASLR... 

> For LoongArch there is an additional problem: the regular kernel
> function uses absolute address to call exception handlers, this means
> the code calls to exception handlers should at the same address for
> booting kernel and target kernel.

-- 
Harry


  reply	other threads:[~2025-02-14  9:33 UTC|newest]

Thread overview: 17+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-02-12 14:16 [PATCH] mm/slab: Initialise random_kmalloc_seed after initcalls Huacai Chen
2025-02-12 15:39 ` Harry (Hyeonggon) Yoo
2025-02-13  3:20   ` Huacai Chen
2025-02-14  9:33     ` Harry (Hyeonggon) Yoo [this message]
2025-02-14 10:02       ` How does swsusp work with randomization features? (was: mm/slab: Initialise random_kmalloc_seed after initcalls) Huacai Chen
2025-02-14 12:44         ` Harry (Hyeonggon) Yoo
2025-02-15  9:53           ` Huacai Chen
2025-02-15 14:05             ` Harry (Hyeonggon) Yoo
2025-02-16  5:08               ` Huacai Chen
2025-02-19 14:10                 ` How does swsusp work with randomization features? Vlastimil Babka
2025-02-19 17:25           ` How does swsusp work with randomization features? (was: mm/slab: Initialise random_kmalloc_seed after initcalls) Kees Cook
2025-02-19 18:09             ` Rafael J. Wysocki
2025-02-25 11:35               ` Huacai Chen
2025-02-25 20:41                 ` Kees Cook
2025-02-26  7:31                   ` Huacai Chen
2025-02-27  2:50                     ` ARM64 crashes when resuming from hibernation (randomization features enabled) Harry Yoo
2025-02-18  9:33 ` [PATCH] mm/slab: Initialise random_kmalloc_seed after initcalls WangYuli

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=Z68N4lTIIwudzcLY@MacBook-Air-5.local \
    --to=42.hyeyoo@gmail.com \
    --cc=akpm@linux-foundation.org \
    --cc=chenhuacai@kernel.org \
    --cc=chenhuacai@loongson.cn \
    --cc=cl@linux.com \
    --cc=gongruiqi@huaweicloud.com \
    --cc=iamjoonsoo.kim@lge.com \
    --cc=linux-mm@kvack.org \
    --cc=linux-pm@vger.kernel.org \
    --cc=pavel@kernel.org \
    --cc=penberg@kernel.org \
    --cc=rafael@kernel.org \
    --cc=rientjes@google.com \
    --cc=roman.gushchin@linux.dev \
    --cc=stable@vger.kernel.org \
    --cc=vbabka@suse.cz \
    --cc=wangyuli@uniontech.com \
    --cc=xiujianfeng@huawei.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox