Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp5193617ybf; Wed, 4 Mar 2020 19:21:38 -0800 (PST) X-Google-Smtp-Source: ADFU+vue3c7OXCebFla3+725nJ8931LM+QJQQFk/1GRieRjfraRcXelJ/6rBpr+1tSi89wzSfvAS X-Received: by 2002:a9d:53c4:: with SMTP id i4mr5234280oth.48.1583378497872; Wed, 04 Mar 2020 19:21:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583378497; cv=none; d=google.com; s=arc-20160816; b=fHZCEiy2+3TxjzV0U7qyYfvNFc4mWS3XS52tDRgSDi78/R3x+9QhvX7ULWEfGDR6Mv 3w3uAeva/8MRy+TdaIB/EmbiVizoh+8oZ3p9ttNyYb4EYnr4/mntkOLrntGsoxo8EMKX d7VxaKa2p9GyWEx421r8K5zafb0/Lo6mdH2R2ffefe7bhnjYT1JeHu8r0/+XCIM8o758 mUY0EnJ3uGE/0kbhxTN6pjb4vcho3b8A3Tdi+YbJwRW2eLti0HGTHUNw16a5wJd4Unr9 rA4McY+UTL6dQ1KZ13wYWRO29TC2vPqf7ppuSk+exqvey9qVlzZldyxCm/bPslwQFXAL DXvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=IOjE/qs2N2VjNOPzyn4qFocxZvWy3UGy/wmYEMnRn4k=; b=h5mEDibnQ0fhToeZVOYzsGQq12gPcMyhICwteEEXner2a2EHz6HkP4C9rUpleHPX6C WlCq5LnO8AHk8raUSMHxtCDRog+pjJBLKCjfy3N64CXkRt4RnMPoRZnIqGrdwrdFq4ku 4TaoI6AiwFfLKZMk+oLqQrEG7zPfxDuqhBrnqc8p9bKlcT9JwHfySJnTMHFc8jA0OlVU Q21Nr3PvsxTty0MXDGVvDFNIpYKpp511/DylICiaKr74V8MOkqbLwYfe17k7KQbwNFOS mKnaMeTjhPcSjqlsJiwO0cX2ZcOMlOPIk5HHuRCsSVA1WjIQXbEB+MMcl9QvNfMp9lT+ E7qw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 200si2392162oii.156.2020.03.04.19.21.25; Wed, 04 Mar 2020 19:21:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725880AbgCEDUr (ORCPT + 99 others); Wed, 4 Mar 2020 22:20:47 -0500 Received: from szxga07-in.huawei.com ([45.249.212.35]:48086 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725797AbgCEDUr (ORCPT ); Wed, 4 Mar 2020 22:20:47 -0500 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id D406473EA218C9E97C2D; Thu, 5 Mar 2020 11:20:45 +0800 (CST) Received: from [127.0.0.1] (10.173.221.195) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server id 14.3.439.0; Thu, 5 Mar 2020 11:20:39 +0800 Subject: Re: [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized To: Scott Wood , , , , , , , , , CC: , References: <20200206025825.22934-1-yanaijie@huawei.com> <20200206025825.22934-6-yanaijie@huawei.com> <5737c82b1ab4c80e53904e4846694884ca429569.camel@buserror.net> From: Jason Yan Message-ID: <71e25bac-bdf6-a754-c0f8-c9d99a393085@huawei.com> Date: Thu, 5 Mar 2020 11:20:38 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Thunderbird/68.4.2 MIME-Version: 1.0 In-Reply-To: <5737c82b1ab4c80e53904e4846694884ca429569.camel@buserror.net> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.173.221.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2020/3/5 5:53, Scott Wood 写道: > On Thu, 2020-02-06 at 10:58 +0800, Jason Yan wrote: >> The original kernel still exists in the memory, clear it now. >> >> Signed-off-by: Jason Yan >> Cc: Scott Wood >> Cc: Diana Craciun >> Cc: Michael Ellerman >> Cc: Christophe Leroy >> Cc: Benjamin Herrenschmidt >> Cc: Paul Mackerras >> Cc: Nicholas Piggin >> Cc: Kees Cook >> --- >> arch/powerpc/mm/nohash/kaslr_booke.c | 4 +++- >> 1 file changed, 3 insertions(+), 1 deletion(-) >> >> diff --git a/arch/powerpc/mm/nohash/kaslr_booke.c >> b/arch/powerpc/mm/nohash/kaslr_booke.c >> index c6f5c1db1394..ed1277059368 100644 >> --- a/arch/powerpc/mm/nohash/kaslr_booke.c >> +++ b/arch/powerpc/mm/nohash/kaslr_booke.c >> @@ -378,8 +378,10 @@ notrace void __init kaslr_early_init(void *dt_ptr, >> phys_addr_t size) >> unsigned int *__kaslr_offset = (unsigned int *)(KERNELBASE + 0x58); >> unsigned int *__run_at_load = (unsigned int *)(KERNELBASE + 0x5c); >> >> - if (*__run_at_load == 1) >> + if (*__run_at_load == 1) { >> + kaslr_late_init(); >> return; >> + } > > What if you're here because kexec set __run_at_load (or > CONFIG_RELOCATABLE_TEST is enabled), not because kaslr happened? > Nothing will happen because kaslr_late_init() only clears memory when kernstart_virt_addr is not KERNELBASE. When __run_at_load is set then KASLR will not take effect. > -Scott > > > > . >