Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3551501pxf; Mon, 29 Mar 2021 05:30:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+1Jae7u43BOZ+hJA6zJmbuzPqfSXAgToOXttmakyw1+ravFcfatD0Pwvj+LWx9SFNGwsy X-Received: by 2002:a17:906:7d7:: with SMTP id m23mr28676566ejc.205.1617021023076; Mon, 29 Mar 2021 05:30:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617021023; cv=none; d=google.com; s=arc-20160816; b=blF0hwls1s/CAbB1IR2Nsj6jSTA/rjBY9P1hizbiVDlxvw66/uhki2IuvWTGND8yxu jPpD8Zsj7sApWtwVZfJQ7aMZxl/HfA8U3q+djO228AGFmpJc0WESv59Jcs+RtDJ/gU67 vBHNSt2gpIF0uIDaHbt2+qUczPb1P9OqFUOfbZFvttbSeWoFQj9lbId0RLox7Rv1UEto 7R0lUeTOO8Vdw6fUZv1nxlurxaBJ8UEqfTWXkJJV2a6DLuwnSGAMCcMU4hxwQsx5kOVu esXD48v9GOtLCev8qtRMl8NMUFUHB/+F+HgTKZ6FbYLyN4+qRpl2oLIjD3T5lWWVO6n/ ey6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=VAxJpRUaSbNy/FTBdDtD9zoolKw4KbpZyN1PJMWhPng=; b=qUerTM5+ll60bA4z0A1RZar12Lyn5LepmEcmtIwvMwbAlXnJiALbk6QQvfporV7ovl z/fiNWv7kCQipnL7u3RUmTeIgHSjQ9sVWSLmiQPtv/KHRIKsuMuql8tWckVtcysXspEb fY5aEsQA1Sx6WTEY9BCOwW0Uk7ATcDC0/lY2j4NBekbM/wXUJUcRUkyOJnYarKO+VvXr qIUoIxFRaZfrx2beBHDUg208NDtH6kEv0ebtUMz+ZGhKUxnbMeLa702jyUuo6itc889K KrYUvvSGQZcgiZshnHPTzwDBRX2NfFoHqY9VxiNALlkU4uiLfmjN5J05ktdReEr5asZt jaBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m7si13375794edq.562.2021.03.29.05.30.00; Mon, 29 Mar 2021 05:30:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230358AbhC2M3F (ORCPT + 99 others); Mon, 29 Mar 2021 08:29:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:43650 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229711AbhC2M2l (ORCPT ); Mon, 29 Mar 2021 08:28:41 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 055C16192F; Mon, 29 Mar 2021 12:28:37 +0000 (UTC) From: Catalin Marinas To: kasan-dev@googlegroups.com, will@kernel.org, Lecopzer Chen , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: linux@roeck-us.net, ryabinin.a.a@gmail.com, andreyknvl@gmail.com, yj.chiang@mediatek.com, gustavoars@kernel.org, tyhicks@linux.microsoft.com, rppt@kernel.org, glider@google.com, maz@kernel.org, akpm@linux-foundation.org, dvyukov@google.com Subject: Re: [PATCH v4 0/5] arm64: kasan: support CONFIG_KASAN_VMALLOC Date: Mon, 29 Mar 2021 13:28:35 +0100 Message-Id: <161702091034.21347.12247252783807550442.b4-ty@arm.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210324040522.15548-1-lecopzer.chen@mediatek.com> References: <20210324040522.15548-1-lecopzer.chen@mediatek.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 24 Mar 2021 12:05:17 +0800, Lecopzer Chen wrote: > Linux supports KAsan for VMALLOC since commit 3c5c3cfb9ef4da9 > ("kasan: support backing vmalloc space with real shadow memory") > > Acroding to how x86 ported it [1], they early allocated p4d and pgd, > but in arm64 I just simulate how KAsan supports MODULES_VADDR in arm64 > by not to populate the vmalloc area except for kimg address. > > [...] Applied to arm64 (for-next/kasan-vmalloc), thanks! [1/5] arm64: kasan: don't populate vmalloc area for CONFIG_KASAN_VMALLOC https://git.kernel.org/arm64/c/9a0732efa774 [2/5] arm64: kasan: abstract _text and _end to KERNEL_START/END https://git.kernel.org/arm64/c/7d7b88ff5f8f [3/5] arm64: Kconfig: support CONFIG_KASAN_VMALLOC https://git.kernel.org/arm64/c/71b613fc0c69 [4/5] arm64: kaslr: support randomized module area with KASAN_VMALLOC https://git.kernel.org/arm64/c/31d02e7ab008 [5/5] arm64: Kconfig: select KASAN_VMALLOC if KANSAN_GENERIC is enabled https://git.kernel.org/arm64/c/acc3042d62cb -- Catalin