Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp534170ybi; Wed, 17 Jul 2019 00:50:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqw6RCiVhJd4ETItbXsLCo0a6kR/ECs7EUX3Asz8UjtdzL8nJg1Ggyz0Ma/072ZvC7B78M3s X-Received: by 2002:a17:902:6a88:: with SMTP id n8mr41586575plk.70.1563349818582; Wed, 17 Jul 2019 00:50:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563349818; cv=none; d=google.com; s=arc-20160816; b=d3ZiNoLbwTeZGgrj/zZMhkFFRUlzqIDLUj6uNwzwwdtPPqXDuY6ke+KNBYfhzRQoyL yy8f6rCikc7lUAR1y5FSMMADxl3u99zJEyNo7spOciPzD3iKvW/NvErxixAssOzAnjN/ UnxzLWG06xWoale+Mn7XO978qPF1JtaqKe33T64HKrTputv9duC0hwPGn9RHG3l1vemi D0koWxK5FT8hHp2yq8UTqX1vX1vYP6OW/HRVMlVcHdAl97fw0rTNfZWJYPIiG9OSZZjp QEMub8Vkrtmz9JTYQOKKdDwag7mIy9tfO6ON/0Do/um+KZOCLbXqfErZ52qdiIkKidNk ZWuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=ecsTbbuFOydP144yNzz+6V0B3yRjO7tNc0EIG2EjLPo=; b=vqJWFc6LhUFASdxiJWL3PI9QNGpAIqf2jDov49e+T2FRkqNbu3VmLBfzKtFo31ocRp kSE7Q+VGmIk+St11mjGxIpPHNRi8mCBfRDo0rm1cJQV9h6OLm87YqBdXPT/hx/L7GUG9 GpUWxt/GqAhbeHr9j3yn8IzJa2lw8k3OcCAecmdsdI3wCdwToy+e243wSPedxh9guOsf C7+dd3U2f+xjF+wkc0HQ2gu/xX3T7wx75s08kdxDLJLBeHVKO//qEhIjjILkOfyVqQe/ D1f5WBT04S/Ec6EVgWtepQqKEAX2obFKYBB6XHc4oKAI6e7S/JesLAd4iuANNmjGHu9f DMkg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 4si23978829pgo.198.2019.07.17.00.50.02; Wed, 17 Jul 2019 00:50:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728869AbfGQHtc (ORCPT + 99 others); Wed, 17 Jul 2019 03:49:32 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:38066 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727019AbfGQHta (ORCPT ); Wed, 17 Jul 2019 03:49:30 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id C094CF2B200A73A2ECFF; Wed, 17 Jul 2019 15:49:28 +0800 (CST) Received: from huawei.com (10.175.124.28) by DGGEMS402-HUB.china.huawei.com (10.3.19.202) with Microsoft SMTP Server id 14.3.439.0; Wed, 17 Jul 2019 15:49:19 +0800 From: Jason Yan To: , , , , , , , , CC: , , , , , , Jason Yan Subject: [RFC PATCH 10/10] powerpc/fsl_booke/kaslr: dump out kernel offset information on panic Date: Wed, 17 Jul 2019 16:06:21 +0800 Message-ID: <20190717080621.40424-11-yanaijie@huawei.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20190717080621.40424-1-yanaijie@huawei.com> References: <20190717080621.40424-1-yanaijie@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.175.124.28] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When kaslr is enabled, the kernel offset is different for every boot. This brings some difficult to debug the kernel. Dump out the kernel offset when panic so that we can easily debug the kernel. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Nicholas Piggin Cc: Kees Cook --- arch/powerpc/include/asm/page.h | 5 +++++ arch/powerpc/kernel/machine_kexec.c | 1 + arch/powerpc/kernel/setup-common.c | 23 +++++++++++++++++++++++ 3 files changed, 29 insertions(+) diff --git a/arch/powerpc/include/asm/page.h b/arch/powerpc/include/asm/page.h index 60a68d3a54b1..cd3ac530e58d 100644 --- a/arch/powerpc/include/asm/page.h +++ b/arch/powerpc/include/asm/page.h @@ -317,6 +317,11 @@ struct vm_area_struct; extern unsigned long kimage_vaddr; +static inline unsigned long kaslr_offset(void) +{ + return kimage_vaddr - KERNELBASE; +} + #include #endif /* __ASSEMBLY__ */ #include diff --git a/arch/powerpc/kernel/machine_kexec.c b/arch/powerpc/kernel/machine_kexec.c index c4ed328a7b96..078fe3d76feb 100644 --- a/arch/powerpc/kernel/machine_kexec.c +++ b/arch/powerpc/kernel/machine_kexec.c @@ -86,6 +86,7 @@ void arch_crash_save_vmcoreinfo(void) VMCOREINFO_STRUCT_SIZE(mmu_psize_def); VMCOREINFO_OFFSET(mmu_psize_def, shift); #endif + vmcoreinfo_append_str("KERNELOFFSET=%lx\n", kaslr_offset()); } /* diff --git a/arch/powerpc/kernel/setup-common.c b/arch/powerpc/kernel/setup-common.c index 1f8db666468d..49e540c0adeb 100644 --- a/arch/powerpc/kernel/setup-common.c +++ b/arch/powerpc/kernel/setup-common.c @@ -715,12 +715,35 @@ static struct notifier_block ppc_panic_block = { .priority = INT_MIN /* may not return; must be done last */ }; +/* + * Dump out kernel offset information on panic. + */ +static int dump_kernel_offset(struct notifier_block *self, unsigned long v, + void *p) +{ + const unsigned long offset = kaslr_offset(); + + if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && offset > 0) + pr_emerg("Kernel Offset: 0x%lx from 0x%lx\n", + offset, KERNELBASE); + else + pr_emerg("Kernel Offset: disabled\n"); + + return 0; +} + +static struct notifier_block kernel_offset_notifier = { + .notifier_call = dump_kernel_offset +}; + void __init setup_panic(void) { /* PPC64 always does a hard irq disable in its panic handler */ if (!IS_ENABLED(CONFIG_PPC64) && !ppc_md.panic) return; atomic_notifier_chain_register(&panic_notifier_list, &ppc_panic_block); + atomic_notifier_chain_register(&panic_notifier_list, + &kernel_offset_notifier); } #ifdef CONFIG_CHECK_CACHE_COHERENCY -- 2.17.2