Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp885959ybl; Wed, 8 Jan 2020 07:29:25 -0800 (PST) X-Google-Smtp-Source: APXvYqwHp61f8WmsbrWEv08Ib+po8ySp202FZ6ImnM/wWESvS2rR2MaCuRGOKX2uZbPTYehbdpcf X-Received: by 2002:a9d:7c90:: with SMTP id q16mr4592675otn.191.1578497365465; Wed, 08 Jan 2020 07:29:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578497365; cv=none; d=google.com; s=arc-20160816; b=zUlLqaMd2RUJmJDNJpyMx7tEBZquJK2LV1o6YcpxPQ9jBFmm8VN6M3unhzFREvf/IP /N8BI/a+Q2YIvVCMq/pGvU7/u85Jk09Ha1PaDaRM9ZI3rNg1ImCVvOYuLqNok49KCM1V sJ4T70Kg8MD48apt13cwCwh26E/G60NrlmzdxEX3iwAiK4oGutcC5j3hrh+lOsK+c8Lj GsGxbIRGRJaQNuzXhHS8bJWGnXhpIfKmaAyTMItocN6LeO5PX+Jq/lBX56dhgFVF7tAG HW63UZtxpm2Id8F4uqD3zx+nDTrKd2YlqbexT/l2Yso9VcfdrKNJCyzNCzBVXlAXB1M5 VJBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from:ironport-sdr:dkim-signature; bh=T90N6M0/jg2EUM3Vw4qlTMYFloCXIcO0ZDMCB0pbAfA=; b=hxgNPsDxYSfJ3exC4UHsQlJKX4vm8r1k6p6iZaVU2jftVipypwAViJqR8NxIPxSTNj 0o6Z3c4ib9xY5Ek9TbKXvxkteQGAMlgW/EIufNc04Ud5d/6VQwCB3E4dIn8fcfgb7HbN N+YTTjz5sJs6KlWA+sIqR0siCTuD7W57RKP7rBGDiQEsiNR/XY6bmZIAuRe87fgnOd0a kdWh13AtVgxkq9EH+W6uLS3aJIZLcuY+JeT71cTcKQ7fiqY/GF95h0y1L0n7QS1CZQ9W pBkjQF3gPnK4juuDAifiVvnCofOhyXInLzRDWaRudKl3FuOLY6e9OrPW31uqkOPdX2qw qh2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@citrix.com header.s=securemail header.b=S7Y27RpV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=citrix.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f194si1941988oig.243.2020.01.08.07.29.13; Wed, 08 Jan 2020 07:29:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@citrix.com header.s=securemail header.b=S7Y27RpV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=citrix.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728783AbgAHP2W (ORCPT + 99 others); Wed, 8 Jan 2020 10:28:22 -0500 Received: from esa5.hc3370-68.iphmx.com ([216.71.155.168]:3495 "EHLO esa5.hc3370-68.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728218AbgAHP2V (ORCPT ); Wed, 8 Jan 2020 10:28:21 -0500 X-Greylist: delayed 426 seconds by postgrey-1.27 at vger.kernel.org; Wed, 08 Jan 2020 10:28:18 EST DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1578497301; h=from:to:cc:subject:date:message-id:mime-version; bh=Ao9HMdTBC+XACEJ1rqPy+5n52e0DdI0N2KnnuQhp+To=; b=S7Y27RpVRIfekqKW+xmtBIJIJOjAubnoWA2dvEe91yxrfN+BSpCtpThV Jc/ImCJ+7G8Gxm/GfM8hYMtBkQwcyT6v/42RvoS8pS6ASzY8MISy4ozee /cIDWg1aVGXOkKIU7Y8DkvSq/lClWJoapHY1/hW86T7DSDN1KScv6GgZE 8=; Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=sergey.dyasli@citrix.com; spf=Pass smtp.mailfrom=sergey.dyasli@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: None (esa5.hc3370-68.iphmx.com: no sender authenticity information available from domain of sergey.dyasli@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="sergey.dyasli@citrix.com"; x-sender="sergey.dyasli@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa5.hc3370-68.iphmx.com: domain of sergey.dyasli@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="sergey.dyasli@citrix.com"; x-sender="sergey.dyasli@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ip4:168.245.78.127 ~all" Received-SPF: None (esa5.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="sergey.dyasli@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: aV70Ec38LNGJHPyjmtz3ubeiTnr6mtH+1TOCC+rUdQpsyHfc0ycOuyMkNd8LI/THZ/TU7JqOOv J2EMt9YDA3dz5/DokVaJH6CTl/S0dcoWuwQeuBL5EH1lDvJUBxJqjLZyyVNAI0xRXUYaVc5/zQ J7xZ4F3n5EcB47TJwb3p9tdkRo8vRuUyZJfApAh7tNh38bQRzOPlTFDSL0Yg3gR6ny8iCS01/a 4leaynRNcoOnKITm0n+jg6lZkAlEuZPd30A4iqTn7Uns0uulDWrjpKs47Vvht/MLdLQUgcxrLU Eaw= X-SBRS: 2.7 X-MesageID: 11004140 X-Ironport-Server: esa5.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.69,410,1571716800"; d="scan'208";a="11004140" From: Sergey Dyasli To: , , , CC: Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Boris Ostrovsky , Juergen Gross , "Stefano Stabellini" , George Dunlap , Ross Lagerwall , Andrew Morton , Sergey Dyasli Subject: [PATCH v1 0/4] basic KASAN support for Xen PV domains Date: Wed, 8 Jan 2020 15:20:56 +0000 Message-ID: <20200108152100.7630-1-sergey.dyasli@citrix.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series allows to boot and run Xen PV kernels (Dom0 and DomU) with CONFIG_KASAN=y. It has been used internally for some time now with good results for finding memory corruption issues in Dom0 kernel. Only Outline instrumentation is supported at the moment. Sergey Dyasli (2): kasan: introduce set_pmd_early_shadow() x86/xen: add basic KASAN support for PV kernel Ross Lagerwall (2): xen: teach KASAN about grant tables xen/netback: Fix grant copy across page boundary with KASAN arch/x86/mm/kasan_init_64.c | 12 +++++++ arch/x86/xen/Makefile | 7 ++++ arch/x86/xen/enlighten_pv.c | 3 ++ arch/x86/xen/mmu_pv.c | 39 ++++++++++++++++++++ drivers/net/xen-netback/common.h | 2 +- drivers/net/xen-netback/netback.c | 59 +++++++++++++++++++++++++------ drivers/xen/Makefile | 2 ++ drivers/xen/grant-table.c | 5 ++- include/xen/xen-ops.h | 4 +++ kernel/Makefile | 2 ++ lib/Kconfig.kasan | 3 +- mm/kasan/init.c | 25 ++++++++----- 12 files changed, 141 insertions(+), 22 deletions(-) -- 2.17.1