Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp39007pja; Fri, 22 Nov 2019 03:09:56 -0800 (PST) X-Google-Smtp-Source: APXvYqyUvI3KgfGjFRl0DYyUXwNHAbWTu6YZUN1WWA4+U1OEr7HinN0TArWdClxLm32Umlf9Wr3R X-Received: by 2002:a50:9b43:: with SMTP id a3mr338774edj.73.1574420996514; Fri, 22 Nov 2019 03:09:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574420996; cv=none; d=google.com; s=arc-20160816; b=cjK1EwGSitzZMiYV5bBUZEPs3BifUzJSVhUFfGAmx7Dhu90mBZDz6zGJ3m4o+Zry28 4D8DAB4qzMj5FHSlIxw2BS3lVDkvr/KFnyvCrYbjd4Cuj6XNVHlaUpWLEy3BMEN1o8nC WGdEM2bH3kwl86PQmrKy7ll7BzpIDbkm7rlUXoiS4Tf8q1xXrkk85m/jm0O9Zj4sRcHm 8dRE/eUGW5wYk719f4CvsdFo/Xfk4vC+rr6mV6of1fJykuS5UljXoAT7Hyl1t5L/JA05 Vqqy+1lxwG32Nfl8tGgwRurZtQf/aAc+o5mU+VP00iDcazIFEYOpAywQBUGof0TFD74S TpWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Ih+3yph08jXBGNh3WfriRd4KMAOXWwHgJJAAVMtX6Vo=; b=pSgVM96AePGub7D4mGZQkyzOA/O9d17EtPahzVJiXE2Fk0A/ODJ4vp4GZ96/4DaSQR o7DQRBVcsmyGNTJ2dqtOnfDHvNf0nnWZi6YTZ4+GiFa9wJnUFIn2bxR5gHooyS5/D0NW cKBEPGCkacjunK3bCuCZaU5OVUCr291VcBx7Inj+Spz2kqsAJUvMi6WVQJamHe/pgxIr HISnPLtESKn8576jsRC8Zm157oRo+9y/0LK+wTJP4aWW43AuR/aQSzVBZeUoEUbvN0Os fHzaAoNVX4nFdoe6JxHbkTojw4K91LrRi3huX+2nd6eJ1GksZC8dSTXeuropzhTjVTaw YHAQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0F1WRVWD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f19si4494515eda.435.2019.11.22.03.09.33; Fri, 22 Nov 2019 03:09:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0F1WRVWD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731834AbfKVLGR (ORCPT + 99 others); Fri, 22 Nov 2019 06:06:17 -0500 Received: from mail.kernel.org ([198.145.29.99]:34358 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731819AbfKVLGO (ORCPT ); Fri, 22 Nov 2019 06:06:14 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5585D2088F; Fri, 22 Nov 2019 11:06:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574420773; bh=3V4B+5FPwQ+goJN1+z1cIB2n93aSNpU3SDah4sLezHk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0F1WRVWDIbO+mXTO6bLqZ7hx3XsnDibAo6dNHnjPeUeAMsMwNv+MhL3amngWWMiYs +z9fHnf8zjRAKaMiRou/nwizk2Qhlni6s6zrDW4ixeXjYbcceMm3tWQFOlt/D0aF+x swUt+Dyv7ktsarBmXyjyr7CdUR1pUVSW3tfXY+fQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Martin Schwidefsky , Vasily Gorbik , Sasha Levin Subject: [PATCH 4.19 167/220] s390/kasan: avoid vdso instrumentation Date: Fri, 22 Nov 2019 11:28:52 +0100 Message-Id: <20191122100924.813862210@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191122100912.732983531@linuxfoundation.org> References: <20191122100912.732983531@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vasily Gorbik [ Upstream commit 348498458505e202df41b6b9a78da448d39298b7 ] vdso is mapped into user space processes, which won't have kasan shodow mapped. Reviewed-by: Martin Schwidefsky Signed-off-by: Vasily Gorbik Signed-off-by: Martin Schwidefsky Signed-off-by: Sasha Levin --- arch/s390/kernel/vdso32/Makefile | 3 ++- arch/s390/kernel/vdso64/Makefile | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/arch/s390/kernel/vdso32/Makefile b/arch/s390/kernel/vdso32/Makefile index 04dd3e2c3bd9b..e76309fbbcb3b 100644 --- a/arch/s390/kernel/vdso32/Makefile +++ b/arch/s390/kernel/vdso32/Makefile @@ -28,9 +28,10 @@ obj-y += vdso32_wrapper.o extra-y += vdso32.lds CPPFLAGS_vdso32.lds += -P -C -U$(ARCH) -# Disable gcov profiling and ubsan for VDSO code +# Disable gcov profiling, ubsan and kasan for VDSO code GCOV_PROFILE := n UBSAN_SANITIZE := n +KASAN_SANITIZE := n # Force dependency (incbin is bad) $(obj)/vdso32_wrapper.o : $(obj)/vdso32.so diff --git a/arch/s390/kernel/vdso64/Makefile b/arch/s390/kernel/vdso64/Makefile index ddebc26cd9494..f849ac61c5da0 100644 --- a/arch/s390/kernel/vdso64/Makefile +++ b/arch/s390/kernel/vdso64/Makefile @@ -28,9 +28,10 @@ obj-y += vdso64_wrapper.o extra-y += vdso64.lds CPPFLAGS_vdso64.lds += -P -C -U$(ARCH) -# Disable gcov profiling and ubsan for VDSO code +# Disable gcov profiling, ubsan and kasan for VDSO code GCOV_PROFILE := n UBSAN_SANITIZE := n +KASAN_SANITIZE := n # Force dependency (incbin is bad) $(obj)/vdso64_wrapper.o : $(obj)/vdso64.so -- 2.20.1