Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp5816685ybi; Wed, 31 Jul 2019 03:51:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqxFOBPPbYldi4rg8kOm4PpruyT/zcslpAdzioUhoE5cD6am5TXbRUFvQq0Bm/oRHrEm1lcV X-Received: by 2002:aa7:9a92:: with SMTP id w18mr46787068pfi.167.1564570267245; Wed, 31 Jul 2019 03:51:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564570267; cv=none; d=google.com; s=arc-20160816; b=U3TrmG3gtfEcKkfmHCzOqIGNmavjALxG2Cew9suDNCLyK/kOp7ZKajIMnbPx/wYPi2 /zTe9m+VLAGL3l22FYVSgDd2fWiYeQmIzSjKsy2Q3Owwr+sVGDGlyXi3Gnl1SvTsZFHe 48u3FVp2hXcXCrQmNdEA6h0jcCNXivw5RmNhbyZeCNeljKm2zXBXcNg7p3WyQIIbKfVZ 4Mu6ySmszrKHD77+kMhksyv6RL/bZIACk8TVtS8k2ouQB07q68oX3cnIPiqOjD8xJu26 FBU1Ckv0NyiFKnm6d7leDGXPntVaCOOOpD6pUm3Iafs2kEIHYzXc5ZJXvWEi/Y2ehBhV IpcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=Y+2XSGoR0YpdVjY4j3lE+MPdNRdOKQ2oQewpRRlarMc=; b=zwFsD28Hdt+MQ1MJBOyY06cpYCudVFaCBKiwC6iJNtCiIvYTQIcULh+k33DeDylY+4 JwwJXAY9BqFzmxIn97L+pFh9bVSdVvznyvglCHxB9kr4GTphfDgMa/UN+hc23+jOgAaO J7Jf46rQ70ks23Eeq/5SchyNTlKY6I0cSLpU8U/s8t++spsHmDPNbfsyFn3bmpu73PEG Yr9Zph3geIlAhklcDl9q2EisLY0cU1ueWh5cQW46aLcdLY8G74gBLFPuOL7sGQXtwv12 gEQ21bDpnRYjBRCbJG+9UtjF8XRzQgWmRhQY9dyudik/L8BVgHBbKBn7pOLf7PDztvML tWPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z5si31985128pgg.368.2019.07.31.03.50.51; Wed, 31 Jul 2019 03:51:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728845AbfGaJ0i (ORCPT + 99 others); Wed, 31 Jul 2019 05:26:38 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:42642 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728787AbfGaJ03 (ORCPT ); Wed, 31 Jul 2019 05:26:29 -0400 Received: from DGGEMS405-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 87BAE11AE981243BE807; Wed, 31 Jul 2019 17:26:28 +0800 (CST) Received: from huawei.com (10.175.124.28) by DGGEMS405-HUB.china.huawei.com (10.3.19.205) with Microsoft SMTP Server id 14.3.439.0; Wed, 31 Jul 2019 17:26:18 +0800 From: Jason Yan To: , , , , , , , , CC: , , , , , , , Jason Yan Subject: [PATCH v3 10/10] powerpc/fsl_booke/kaslr: dump out kernel offset information on panic Date: Wed, 31 Jul 2019 17:43:18 +0800 Message-ID: <20190731094318.26538-11-yanaijie@huawei.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20190731094318.26538-1-yanaijie@huawei.com> References: <20190731094318.26538-1-yanaijie@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.175.124.28] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When kaslr is enabled, the kernel offset is different for every boot. This brings some difficult to debug the kernel. Dump out the kernel offset when panic so that we can easily debug the kernel. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Nicholas Piggin Cc: Kees Cook Reviewed-by: Christophe Leroy --- arch/powerpc/include/asm/page.h | 5 +++++ arch/powerpc/kernel/machine_kexec.c | 1 + arch/powerpc/kernel/setup-common.c | 19 +++++++++++++++++++ 3 files changed, 25 insertions(+) diff --git a/arch/powerpc/include/asm/page.h b/arch/powerpc/include/asm/page.h index 60a68d3a54b1..cd3ac530e58d 100644 --- a/arch/powerpc/include/asm/page.h +++ b/arch/powerpc/include/asm/page.h @@ -317,6 +317,11 @@ struct vm_area_struct; extern unsigned long kimage_vaddr; +static inline unsigned long kaslr_offset(void) +{ + return kimage_vaddr - KERNELBASE; +} + #include #endif /* __ASSEMBLY__ */ #include diff --git a/arch/powerpc/kernel/machine_kexec.c b/arch/powerpc/kernel/machine_kexec.c index c4ed328a7b96..078fe3d76feb 100644 --- a/arch/powerpc/kernel/machine_kexec.c +++ b/arch/powerpc/kernel/machine_kexec.c @@ -86,6 +86,7 @@ void arch_crash_save_vmcoreinfo(void) VMCOREINFO_STRUCT_SIZE(mmu_psize_def); VMCOREINFO_OFFSET(mmu_psize_def, shift); #endif + vmcoreinfo_append_str("KERNELOFFSET=%lx\n", kaslr_offset()); } /* diff --git a/arch/powerpc/kernel/setup-common.c b/arch/powerpc/kernel/setup-common.c index 1f8db666468d..064075f02837 100644 --- a/arch/powerpc/kernel/setup-common.c +++ b/arch/powerpc/kernel/setup-common.c @@ -715,12 +715,31 @@ static struct notifier_block ppc_panic_block = { .priority = INT_MIN /* may not return; must be done last */ }; +/* + * Dump out kernel offset information on panic. + */ +static int dump_kernel_offset(struct notifier_block *self, unsigned long v, + void *p) +{ + pr_emerg("Kernel Offset: 0x%lx from 0x%lx\n", + kaslr_offset(), KERNELBASE); + + return 0; +} + +static struct notifier_block kernel_offset_notifier = { + .notifier_call = dump_kernel_offset +}; + void __init setup_panic(void) { /* PPC64 always does a hard irq disable in its panic handler */ if (!IS_ENABLED(CONFIG_PPC64) && !ppc_md.panic) return; atomic_notifier_chain_register(&panic_notifier_list, &ppc_panic_block); + if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && kaslr_offset() > 0) + atomic_notifier_chain_register(&panic_notifier_list, + &kernel_offset_notifier); } #ifdef CONFIG_CHECK_CACHE_COHERENCY -- 2.17.2