Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp7495601ybl; Thu, 16 Jan 2020 00:13:35 -0800 (PST) X-Google-Smtp-Source: APXvYqyEEmUlv+PdnzP33MJFPLphqIf3Xcg2EVgdMqRa+NqvfPYeQUwTTQxat1rxQI/QGyORt6Xs X-Received: by 2002:aca:53c6:: with SMTP id h189mr3269956oib.11.1579162415224; Thu, 16 Jan 2020 00:13:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579162415; cv=none; d=google.com; s=arc-20160816; b=lVafspQXQUFiMUkTdHLlhgHzeaCcpL2DVq4vZgzfyOa4+ttbby7j8pHoysVEdyC6OH WBZb2YoEg83KUtjYTWQeFUAwL2/3er/HLcfEIKPzPrm1Jx1edEALjoy3C3twFSJgBRtM Z7XVSx0+xHbNA1dAfOaHzFgBNwH8TQgSe7lqgNO2YKnx4mKEgKGSAbZ52/mBm+FUJDM4 8evp0Wtx5OYeAkldIpBFw6jwyRE0Jwyzu2HuIG8i/77wnHPVrd2zIJDMGVIm7sT3Mdgu AhLOIMrpc3voAGV9Tp7gfRpEkQv4CjxpClx3OyH7vq98E3x/+nxxPZowKz78Ez3B6lMv 71NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=/8teiy/eZy3HypUMmCXg9Jl5AK6uICeWDUBuxMFHmxk=; b=nbhvx2pWwxDaL7/vV0LUmTAA6DFanx6ix1NTwSRe9asWo5AwpYihMR+4MGP8WByzmq DnreNKUerUcpqKC6YuSjnFxfr2irnmGvLOei2l8CkBnc7p+8OAtsnS9eNo7CKGWUqukV ZzgUiTNO9NTZreYBcrdzaMLSwnJtStWbyxtwV6CDd536qeCgthJprI8bRMCasqhgdR85 kfpPNWYwkNYEcqgxdIDaIZHFWuQPqw36rjcHT5A93xaVMu3UNWIYVZXpJiq36mKlIEBp ZR/TqC8nKuRkIBhWUDojnW3tVd8woApe4Z1uiZar6SOfuRHl7kNjJ170vfWIQ7pIcg7R n6ng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d17si10687157oij.136.2020.01.16.00.13.22; Thu, 16 Jan 2020 00:13:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730479AbgAPIDn (ORCPT + 99 others); Thu, 16 Jan 2020 03:03:43 -0500 Received: from s3.sipsolutions.net ([144.76.43.62]:48406 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726369AbgAPIDn (ORCPT ); Thu, 16 Jan 2020 03:03:43 -0500 Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1is07s-00BWUR-LH; Thu, 16 Jan 2020 09:03:36 +0100 Message-ID: Subject: Re: [RFC PATCH] UML: add support for KASAN under x86_64 From: Johannes Berg To: Patricia Alfonso Cc: richard@nod.at, jdike@addtoit.com, Brendan Higgins , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-um@lists.infradead.org, David Gow , aryabinin@virtuozzo.com, dvyukov@google.com, anton.ivanov@cambridgegreys.com Date: Thu, 16 Jan 2020 09:03:35 +0100 In-Reply-To: <4f382794416c023b6711ed2ca645abe4fb17d6da.camel@sipsolutions.net> References: <20200115182816.33892-1-trishalfonso@google.com> (sfid-20200115_235651_948442_0F0A0073) <4f382794416c023b6711ed2ca645abe4fb17d6da.camel@sipsolutions.net> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.2 (3.34.2-1.fc31) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2020-01-16 at 08:57 +0100, Johannes Berg wrote: > > And if I remember from looking at KASAN, some of the constructors there > depended on initializing after the KASAN data structures were set up (or > at least allocated)? It may be that you solved that by allocating the > shadow so very early though. Actually, no ... it's still after main(), and the constructors run before. So I _think_ with the CONFIG_CONSTRUCTORS revert, this will no longer work (but happy to be proven wrong!), if so then I guess we do have to find a way to initialize the KASAN things from another (somehow earlier?) constructor ... Or find a way to fix CONFIG_CONSTRUCTORS and not revert, but I looked at it quite a bit and didn't. johannes