Message ID | 20230328111714.2056-1-zhangqing@loongson.cn (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | LoongArch: Add kernel address sanitizer support | expand |
On Tue, 2023-03-28 at 19:17 +0800, Qing Zhang wrote: /* snip */ > -void * __init relocate_kernel(void) > +unsigned long __init relocate_kernel(void) Why we must modify relocate_kernel for KASAN? > { > unsigned long kernel_length; > unsigned long random_offset = 0; > void *location_new = _text; /* Default to original kernel start */ > - void *kernel_entry = start_kernel; /* Default to original kernel entry point */ > char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ > > strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); > @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) > > reloc_offset += random_offset; > > - /* Return the new kernel's entry point */ > - kernel_entry = RELOCATED_KASLR(start_kernel); > - > /* The current thread is now within the relocated kernel */ > __current_thread_info = RELOCATED_KASLR(__current_thread_info); > > @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) > > relocate_absolute(random_offset); > > - return kernel_entry; > + return random_offset;
Hi, Qing On 03/28/2023 07:17 PM, Qing Zhang wrote: > 1/8 of kernel addresses reserved for shadow memory. But for LoongArch, > There are a lot of holes between different segments and valid address > space(256T available) is insufficient to map all these segments to kasan > shadow memory with the common formula provided by kasan core, saying > addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET > > So Loongarch has a ARCH specific mapping formula,different segments `Loongarch` -> `LoongArch` > are mapped individually, and only limited length of space of that > specific segment is mapped to shadow. > > At early boot stage the whole shadow region populated with just > one physical page (kasan_early_shadow_page). Later, this page is > reused as readonly zero shadow for some memory that Kasan currently > don't track. > After mapping the physical memory, pages for shadow memory are > allocated and mapped. > > Functions like memset/memmove/memcpy do a lot of memory accesses. > If bad pointer passed to one of these function it is important > to catch this. Compiler's instrumentation cannot do this since > these functions are written in assembly. > KASan replaces memory functions with manually instrumented variants. > Original functions declared as weak symbols so strong definitions > in mm/kasan/kasan.c could replace them. Original functions have aliases > with '__' prefix in name, so we could call non-instrumented variant > if needed. > > Signed-off-by: Qing Zhang <zhangqing@loongson.cn> > --- > Documentation/dev-tools/kasan.rst | 4 +- > .../features/debug/KASAN/arch-support.txt | 2 +- > arch/loongarch/Kconfig | 7 + > arch/loongarch/include/asm/kasan.h | 120 +++++++++ > arch/loongarch/include/asm/pgtable.h | 7 + > arch/loongarch/include/asm/setup.h | 2 +- > arch/loongarch/include/asm/string.h | 20 ++ > arch/loongarch/kernel/Makefile | 3 + > arch/loongarch/kernel/head.S | 14 +- > arch/loongarch/kernel/relocate.c | 8 +- > arch/loongarch/kernel/setup.c | 4 + > arch/loongarch/lib/memcpy.S | 4 +- > arch/loongarch/lib/memmove.S | 13 +- > arch/loongarch/lib/memset.S | 4 +- > arch/loongarch/mm/Makefile | 2 + > arch/loongarch/mm/kasan_init.c | 255 ++++++++++++++++++ > arch/loongarch/vdso/Makefile | 4 + > include/linux/kasan.h | 2 + > mm/kasan/generic.c | 5 + > mm/kasan/init.c | 10 +- > mm/kasan/kasan.h | 6 + > 21 files changed, 470 insertions(+), 26 deletions(-) > create mode 100644 arch/loongarch/include/asm/kasan.h > create mode 100644 arch/loongarch/mm/kasan_init.c > > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst > index e66916a483cd..ee91f2872767 100644 > --- a/Documentation/dev-tools/kasan.rst > +++ b/Documentation/dev-tools/kasan.rst > @@ -41,8 +41,8 @@ Support > Architectures > ~~~~~~~~~~~~~ > > -Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, and > -xtensa, and the tag-based KASAN modes are supported only on arm64. > +Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, xtensa, > +and loongarch, and the tag-based KASAN modes are supported only on arm64. > > Compilers > ~~~~~~~~~ > diff --git a/Documentation/features/debug/KASAN/arch-support.txt b/Documentation/features/debug/KASAN/arch-support.txt > index bf0124fae643..c4581c2edb28 100644 > --- a/Documentation/features/debug/KASAN/arch-support.txt > +++ b/Documentation/features/debug/KASAN/arch-support.txt > @@ -13,7 +13,7 @@ > | csky: | TODO | > | hexagon: | TODO | > | ia64: | TODO | > - | loongarch: | TODO | > + | loongarch: | ok | > | m68k: | TODO | > | microblaze: | TODO | > | mips: | TODO | > diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig > index 72dd00f48b8c..61f883c51045 100644 > --- a/arch/loongarch/Kconfig > +++ b/arch/loongarch/Kconfig > @@ -7,6 +7,7 @@ config LOONGARCH > select ACPI_MCFG if ACPI > select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI > select ARCH_BINFMT_ELF_STATE > + select ARCH_DISABLE_KASAN_INLINE > select ARCH_ENABLE_MEMORY_HOTPLUG > select ARCH_ENABLE_MEMORY_HOTREMOVE > select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI > @@ -83,6 +84,7 @@ config LOONGARCH > select HAVE_ARCH_AUDITSYSCALL > select HAVE_ARCH_MMAP_RND_BITS if MMU > select HAVE_ARCH_SECCOMP_FILTER > + select HAVE_ARCH_KASAN if 64BIT > select HAVE_ARCH_TRACEHOOK > select HAVE_ARCH_TRANSPARENT_HUGEPAGE > select HAVE_ASM_MODVERSIONS > @@ -626,6 +628,11 @@ config ARCH_MMAP_RND_BITS_MIN > config ARCH_MMAP_RND_BITS_MAX > default 18 > > +config KASAN_SHADOW_OFFSET > + hex > + default 0x0 > + depends on KASAN > + > menu "Power management options" > > config ARCH_SUSPEND_POSSIBLE > diff --git a/arch/loongarch/include/asm/kasan.h b/arch/loongarch/include/asm/kasan.h > new file mode 100644 > index 000000000000..582bcded311e > --- /dev/null > +++ b/arch/loongarch/include/asm/kasan.h > @@ -0,0 +1,120 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef __ASM_KASAN_H > +#define __ASM_KASAN_H > + > +#ifndef __ASSEMBLY__ > + > +#include <linux/linkage.h> > +#include <linux/mmzone.h> > +#include <asm/addrspace.h> > +#include <asm/io.h> > +#include <asm/pgtable.h> > + > +#define __HAVE_ARCH_SHADOW_MAP > + > +#define KASAN_SHADOW_SCALE_SHIFT 3 > +#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) > + > +#define XRANGE_SHIFT (48) > + > +/* Valid address length */ > +#define XRANGE_SHADOW_SHIFT (PGDIR_SHIFT + PAGE_SHIFT - 3) > +/* Used for taking out the valid address */ > +#define XRANGE_SHADOW_MASK GENMASK_ULL(XRANGE_SHADOW_SHIFT - 1, 0) > +/* One segment whole address space size */ > +#define XRANGE_SIZE (XRANGE_SHADOW_MASK + 1) > + > +/* 64-bit segment value. */ > +#define XKPRANGE_UC_SEG (0x8000) > +#define XKPRANGE_CC_SEG (0x9000) It is not recommended to use a fixed value, it can be as follows, CACHE_BASE >> DMW_PABITS UNCACHE_BASE >> DMW_PABITS > +#define XKVRANGE_VC_SEG (0xffff) > + > +/* Cached */ > +#define XKPRANGE_CC_START CACHE_BASE > +#define XKPRANGE_CC_SIZE XRANGE_SIZE > +#define XKPRANGE_CC_KASAN_OFFSET (0) > +#define XKPRANGE_CC_SHADOW_SIZE (XKPRANGE_CC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_CC_SHADOW_END (XKPRANGE_CC_KASAN_OFFSET + XKPRANGE_CC_SHADOW_SIZE) > + > +/* UnCached */ > +#define XKPRANGE_UC_START UNCACHE_BASE > +#define XKPRANGE_UC_SIZE XRANGE_SIZE > +#define XKPRANGE_UC_KASAN_OFFSET XKPRANGE_CC_SHADOW_END > +#define XKPRANGE_UC_SHADOW_SIZE (XKPRANGE_UC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_UC_SHADOW_END (XKPRANGE_UC_KASAN_OFFSET + XKPRANGE_UC_SHADOW_SIZE) > + > +/* VMALLOC (Cached or UnCached) */ > +#define XKVRANGE_VC_START MODULES_VADDR > +#define XKVRANGE_VC_SIZE round_up(VMEMMAP_END - MODULES_VADDR + 1, PGDIR_SIZE) > +#define XKVRANGE_VC_KASAN_OFFSET XKPRANGE_UC_SHADOW_END > +#define XKVRANGE_VC_SHADOW_SIZE (XKVRANGE_VC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKVRANGE_VC_SHADOW_END (XKVRANGE_VC_KASAN_OFFSET + XKVRANGE_VC_SHADOW_SIZE) > + > +/* Kasan shadow memory start right after vmalloc. */ > +#define KASAN_SHADOW_START round_up(VMEMMAP_END, PGDIR_SIZE) > +#define KASAN_SHADOW_SIZE (XKVRANGE_VC_SHADOW_END - XKPRANGE_CC_KASAN_OFFSET) > +#define KASAN_SHADOW_END round_up(KASAN_SHADOW_START + KASAN_SHADOW_SIZE, PGDIR_SIZE) > + > +#define XKPRANGE_CC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_CC_KASAN_OFFSET) > +#define XKPRANGE_UC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_UC_KASAN_OFFSET) > +#define XKVRANGE_VC_SHADOW_OFFSET (KASAN_SHADOW_START + XKVRANGE_VC_KASAN_OFFSET) > + > +extern bool kasan_early_stage; > +extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; > + > +static inline void *kasan_mem_to_shadow(const void *addr) > +{ > + if (kasan_early_stage) { > + return (void *)(kasan_early_shadow_page); > + } else { > + unsigned long maddr = (unsigned long)addr; > + unsigned long xrange = (maddr >> XRANGE_SHIFT) & 0xffff; > + unsigned long offset = 0; > + > + maddr &= XRANGE_SHADOW_MASK; > + switch (xrange) { > + case XKPRANGE_CC_SEG: > + offset = XKPRANGE_CC_SHADOW_OFFSET; > + break; > + case XKPRANGE_UC_SEG: > + offset = XKPRANGE_UC_SHADOW_OFFSET; > + break; > + case XKVRANGE_VC_SEG: > + offset = XKVRANGE_VC_SHADOW_OFFSET; > + break; > + default: > + WARN_ON(1); > + return NULL; > + } > + > + return (void *)((maddr >> KASAN_SHADOW_SCALE_SHIFT) + offset); > + } > +} > + > +static inline const void *kasan_shadow_to_mem(const void *shadow_addr) > +{ > + unsigned long addr = (unsigned long)shadow_addr; > + > + if (unlikely(addr > KASAN_SHADOW_END) || > + unlikely(addr < KASAN_SHADOW_START)) { > + WARN_ON(1); > + return NULL; > + } > + > + if (addr >= XKVRANGE_VC_SHADOW_OFFSET) > + return (void *)(((addr - XKVRANGE_VC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKVRANGE_VC_START); > + else if (addr >= XKPRANGE_UC_SHADOW_OFFSET) > + return (void *)(((addr - XKPRANGE_UC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_UC_START); > + else if (addr >= XKPRANGE_CC_SHADOW_OFFSET) > + return (void *)(((addr - XKPRANGE_CC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_CC_START); > + else { > + WARN_ON(1); > + return NULL; > + } > +} > + > +void kasan_init(void); > +asmlinkage void kasan_early_init(void); > + > +#endif > +#endif > diff --git a/arch/loongarch/include/asm/pgtable.h b/arch/loongarch/include/asm/pgtable.h > index d28fb9dbec59..5cfdf79b287e 100644 > --- a/arch/loongarch/include/asm/pgtable.h > +++ b/arch/loongarch/include/asm/pgtable.h > @@ -86,9 +86,16 @@ extern unsigned long zero_page_mask; > #define MODULES_END (MODULES_VADDR + SZ_256M) > > #define VMALLOC_START MODULES_END > + > +#ifndef CONFIG_KASAN > #define VMALLOC_END \ > (vm_map_base + \ > min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits)) - PMD_SIZE - VMEMMAP_SIZE) > +#else > +#define VMALLOC_END \ > + (vm_map_base + \ > + min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits) / 2) - PMD_SIZE - VMEMMAP_SIZE) > +#endif > > #define vmemmap ((struct page *)((VMALLOC_END + PMD_SIZE) & PMD_MASK)) > #define VMEMMAP_END ((unsigned long)vmemmap + VMEMMAP_SIZE - 1) > diff --git a/arch/loongarch/include/asm/setup.h b/arch/loongarch/include/asm/setup.h > index be05c0e706a2..2dca0d1dd90a 100644 > --- a/arch/loongarch/include/asm/setup.h > +++ b/arch/loongarch/include/asm/setup.h > @@ -33,7 +33,7 @@ extern long __la_abs_end; > extern long __rela_dyn_begin; > extern long __rela_dyn_end; > > -extern void * __init relocate_kernel(void); > +extern unsigned long __init relocate_kernel(void); > > #endif > > diff --git a/arch/loongarch/include/asm/string.h b/arch/loongarch/include/asm/string.h > index 7b29cc9c70aa..5bb5a90d2681 100644 > --- a/arch/loongarch/include/asm/string.h > +++ b/arch/loongarch/include/asm/string.h > @@ -7,11 +7,31 @@ > > #define __HAVE_ARCH_MEMSET > extern void *memset(void *__s, int __c, size_t __count); > +extern void *__memset(void *__s, int __c, size_t __count); > > #define __HAVE_ARCH_MEMCPY > extern void *memcpy(void *__to, __const__ void *__from, size_t __n); > +extern void *__memcpy(void *__to, __const__ void *__from, size_t __n); > > #define __HAVE_ARCH_MEMMOVE > extern void *memmove(void *__dest, __const__ void *__src, size_t __n); > +extern void *__memmove(void *__dest, __const__ void *__src, size_t __n); > + > +#if defined(CONFIG_KASAN) && !defined(__SANITIZE_ADDRESS__) > + > +/* > + * For files that are not instrumented (e.g. mm/slub.c) we > + * should use not instrumented version of mem* functions. > + */ > + > +#define memset(s, c, n) __memset(s, c, n) > +#define memcpy(dst, src, len) __memcpy(dst, src, len) > +#define memmove(dst, src, len) __memmove(dst, src, len) > + > +#ifndef __NO_FORTIFY > +#define __NO_FORTIFY /* FORTIFY_SOURCE uses __builtin_memcpy, etc. */ > +#endif > + > +#endif > > #endif /* _ASM_STRING_H */ > diff --git a/arch/loongarch/kernel/Makefile b/arch/loongarch/kernel/Makefile > index 9a72d91cd104..0055e7582e15 100644 > --- a/arch/loongarch/kernel/Makefile > +++ b/arch/loongarch/kernel/Makefile > @@ -30,6 +30,9 @@ ifdef CONFIG_FUNCTION_TRACER > CFLAGS_REMOVE_perf_event.o = $(CC_FLAGS_FTRACE) > endif > > +KASAN_SANITIZE_vdso.o := n > +KASAN_SANITIZE_efi.o := n > + > obj-$(CONFIG_MODULES) += module.o module-sections.o > obj-$(CONFIG_STACKTRACE) += stacktrace.o > > diff --git a/arch/loongarch/kernel/head.S b/arch/loongarch/kernel/head.S > index aa64b179744f..19d4be5c8381 100644 > --- a/arch/loongarch/kernel/head.S > +++ b/arch/loongarch/kernel/head.S > @@ -95,13 +95,17 @@ SYM_CODE_START(kernel_entry) # kernel entry point > PTR_LI sp, (_THREAD_SIZE - PT_SIZE) > PTR_ADD sp, sp, tp > set_saved_sp sp, t0, t1 > -#endif > - > - /* relocate_kernel() returns the new kernel entry point */ > - jr a0 > - ASM_BUG() > > + /* Jump to new kernel: new_pc = current_pc + random_offset */ > + pcaddi t0, 0 > + add.d t0, t0, a0 > + jirl zero, t0, 0xc > #endif > +#endif > + > + #ifdef CONFIG_KASAN > + bl kasan_early_init > + #endif No tab operation is required before `#ifdef`. > > bl start_kernel > ASM_BUG() > diff --git a/arch/loongarch/kernel/relocate.c b/arch/loongarch/kernel/relocate.c > index 01f94d1e3edf..6c3eff9af9fb 100644 > --- a/arch/loongarch/kernel/relocate.c > +++ b/arch/loongarch/kernel/relocate.c > @@ -157,12 +157,11 @@ static inline void __init update_reloc_offset(unsigned long *addr, long random_o > *new_addr = (unsigned long)reloc_offset; > } > > -void * __init relocate_kernel(void) > +unsigned long __init relocate_kernel(void) > { > unsigned long kernel_length; > unsigned long random_offset = 0; > void *location_new = _text; /* Default to original kernel start */ > - void *kernel_entry = start_kernel; /* Default to original kernel entry point */ > char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ > > strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); > @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) > > reloc_offset += random_offset; > > - /* Return the new kernel's entry point */ > - kernel_entry = RELOCATED_KASLR(start_kernel); > - > /* The current thread is now within the relocated kernel */ > __current_thread_info = RELOCATED_KASLR(__current_thread_info); > > @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) > > relocate_absolute(random_offset); > > - return kernel_entry; > + return random_offset; > } > > /* > diff --git a/arch/loongarch/kernel/setup.c b/arch/loongarch/kernel/setup.c > index 27f71f9531e1..18453f8cb9e8 100644 > --- a/arch/loongarch/kernel/setup.c > +++ b/arch/loongarch/kernel/setup.c > @@ -610,4 +610,8 @@ void __init setup_arch(char **cmdline_p) > #endif > > paging_init(); > + > +#if defined(CONFIG_KASAN) > + kasan_init(); > +#endif Can be added in arch/loongarch/include/asm/kasan.h, #else static inline void kasan_init(void) { } #endif Youling.
Hi, Qing On 03/28/2023 07:17 PM, Qing Zhang wrote: > 1/8 of kernel addresses reserved for shadow memory. But for LoongArch, > There are a lot of holes between different segments and valid address > space(256T available) is insufficient to map all these segments to kasan > shadow memory with the common formula provided by kasan core, saying > addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET If you can provide a virtual memory layout (similar to Documentation/riscv/vm-layout.rst), it will be convenient for everyone to review the relevant code, and it will also better explain why LoongArch needs to implement kasan_mem_to_shadow() separately. Thanks, Youling. > > So Loongarch has a ARCH specific mapping formula,different segments > are mapped individually, and only limited length of space of that > specific segment is mapped to shadow. > > At early boot stage the whole shadow region populated with just > one physical page (kasan_early_shadow_page). Later, this page is > reused as readonly zero shadow for some memory that Kasan currently > don't track. > After mapping the physical memory, pages for shadow memory are > allocated and mapped. > > Functions like memset/memmove/memcpy do a lot of memory accesses. > If bad pointer passed to one of these function it is important > to catch this. Compiler's instrumentation cannot do this since > these functions are written in assembly. > KASan replaces memory functions with manually instrumented variants. > Original functions declared as weak symbols so strong definitions > in mm/kasan/kasan.c could replace them. Original functions have aliases > with '__' prefix in name, so we could call non-instrumented variant > if needed. > > Signed-off-by: Qing Zhang <zhangqing@loongson.cn> > --- > Documentation/dev-tools/kasan.rst | 4 +- > .../features/debug/KASAN/arch-support.txt | 2 +- > arch/loongarch/Kconfig | 7 + > arch/loongarch/include/asm/kasan.h | 120 +++++++++ > arch/loongarch/include/asm/pgtable.h | 7 + > arch/loongarch/include/asm/setup.h | 2 +- > arch/loongarch/include/asm/string.h | 20 ++ > arch/loongarch/kernel/Makefile | 3 + > arch/loongarch/kernel/head.S | 14 +- > arch/loongarch/kernel/relocate.c | 8 +- > arch/loongarch/kernel/setup.c | 4 + > arch/loongarch/lib/memcpy.S | 4 +- > arch/loongarch/lib/memmove.S | 13 +- > arch/loongarch/lib/memset.S | 4 +- > arch/loongarch/mm/Makefile | 2 + > arch/loongarch/mm/kasan_init.c | 255 ++++++++++++++++++ > arch/loongarch/vdso/Makefile | 4 + > include/linux/kasan.h | 2 + > mm/kasan/generic.c | 5 + > mm/kasan/init.c | 10 +- > mm/kasan/kasan.h | 6 + > 21 files changed, 470 insertions(+), 26 deletions(-) > create mode 100644 arch/loongarch/include/asm/kasan.h > create mode 100644 arch/loongarch/mm/kasan_init.c > > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst > index e66916a483cd..ee91f2872767 100644 > --- a/Documentation/dev-tools/kasan.rst > +++ b/Documentation/dev-tools/kasan.rst > @@ -41,8 +41,8 @@ Support > Architectures > ~~~~~~~~~~~~~ > > -Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, and > -xtensa, and the tag-based KASAN modes are supported only on arm64. > +Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, xtensa, > +and loongarch, and the tag-based KASAN modes are supported only on arm64. > > Compilers > ~~~~~~~~~ > diff --git a/Documentation/features/debug/KASAN/arch-support.txt b/Documentation/features/debug/KASAN/arch-support.txt > index bf0124fae643..c4581c2edb28 100644 > --- a/Documentation/features/debug/KASAN/arch-support.txt > +++ b/Documentation/features/debug/KASAN/arch-support.txt > @@ -13,7 +13,7 @@ > | csky: | TODO | > | hexagon: | TODO | > | ia64: | TODO | > - | loongarch: | TODO | > + | loongarch: | ok | > | m68k: | TODO | > | microblaze: | TODO | > | mips: | TODO | > diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig > index 72dd00f48b8c..61f883c51045 100644 > --- a/arch/loongarch/Kconfig > +++ b/arch/loongarch/Kconfig > @@ -7,6 +7,7 @@ config LOONGARCH > select ACPI_MCFG if ACPI > select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI > select ARCH_BINFMT_ELF_STATE > + select ARCH_DISABLE_KASAN_INLINE > select ARCH_ENABLE_MEMORY_HOTPLUG > select ARCH_ENABLE_MEMORY_HOTREMOVE > select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI > @@ -83,6 +84,7 @@ config LOONGARCH > select HAVE_ARCH_AUDITSYSCALL > select HAVE_ARCH_MMAP_RND_BITS if MMU > select HAVE_ARCH_SECCOMP_FILTER > + select HAVE_ARCH_KASAN if 64BIT > select HAVE_ARCH_TRACEHOOK > select HAVE_ARCH_TRANSPARENT_HUGEPAGE > select HAVE_ASM_MODVERSIONS > @@ -626,6 +628,11 @@ config ARCH_MMAP_RND_BITS_MIN > config ARCH_MMAP_RND_BITS_MAX > default 18 > > +config KASAN_SHADOW_OFFSET > + hex > + default 0x0 > + depends on KASAN > + > menu "Power management options" > > config ARCH_SUSPEND_POSSIBLE > diff --git a/arch/loongarch/include/asm/kasan.h b/arch/loongarch/include/asm/kasan.h > new file mode 100644 > index 000000000000..582bcded311e > --- /dev/null > +++ b/arch/loongarch/include/asm/kasan.h > @@ -0,0 +1,120 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef __ASM_KASAN_H > +#define __ASM_KASAN_H > + > +#ifndef __ASSEMBLY__ > + > +#include <linux/linkage.h> > +#include <linux/mmzone.h> > +#include <asm/addrspace.h> > +#include <asm/io.h> > +#include <asm/pgtable.h> > + > +#define __HAVE_ARCH_SHADOW_MAP > + > +#define KASAN_SHADOW_SCALE_SHIFT 3 > +#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) > + > +#define XRANGE_SHIFT (48) > + > +/* Valid address length */ > +#define XRANGE_SHADOW_SHIFT (PGDIR_SHIFT + PAGE_SHIFT - 3) > +/* Used for taking out the valid address */ > +#define XRANGE_SHADOW_MASK GENMASK_ULL(XRANGE_SHADOW_SHIFT - 1, 0) > +/* One segment whole address space size */ > +#define XRANGE_SIZE (XRANGE_SHADOW_MASK + 1) > + > +/* 64-bit segment value. */ > +#define XKPRANGE_UC_SEG (0x8000) > +#define XKPRANGE_CC_SEG (0x9000) > +#define XKVRANGE_VC_SEG (0xffff) > + > +/* Cached */ > +#define XKPRANGE_CC_START CACHE_BASE > +#define XKPRANGE_CC_SIZE XRANGE_SIZE > +#define XKPRANGE_CC_KASAN_OFFSET (0) > +#define XKPRANGE_CC_SHADOW_SIZE (XKPRANGE_CC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_CC_SHADOW_END (XKPRANGE_CC_KASAN_OFFSET + XKPRANGE_CC_SHADOW_SIZE) > + > +/* UnCached */ > +#define XKPRANGE_UC_START UNCACHE_BASE > +#define XKPRANGE_UC_SIZE XRANGE_SIZE > +#define XKPRANGE_UC_KASAN_OFFSET XKPRANGE_CC_SHADOW_END > +#define XKPRANGE_UC_SHADOW_SIZE (XKPRANGE_UC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_UC_SHADOW_END (XKPRANGE_UC_KASAN_OFFSET + XKPRANGE_UC_SHADOW_SIZE) > + > +/* VMALLOC (Cached or UnCached) */ > +#define XKVRANGE_VC_START MODULES_VADDR > +#define XKVRANGE_VC_SIZE round_up(VMEMMAP_END - MODULES_VADDR + 1, PGDIR_SIZE) > +#define XKVRANGE_VC_KASAN_OFFSET XKPRANGE_UC_SHADOW_END > +#define XKVRANGE_VC_SHADOW_SIZE (XKVRANGE_VC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKVRANGE_VC_SHADOW_END (XKVRANGE_VC_KASAN_OFFSET + XKVRANGE_VC_SHADOW_SIZE) > + > +/* Kasan shadow memory start right after vmalloc. */ > +#define KASAN_SHADOW_START round_up(VMEMMAP_END, PGDIR_SIZE) > +#define KASAN_SHADOW_SIZE (XKVRANGE_VC_SHADOW_END - XKPRANGE_CC_KASAN_OFFSET) > +#define KASAN_SHADOW_END round_up(KASAN_SHADOW_START + KASAN_SHADOW_SIZE, PGDIR_SIZE) > + > +#define XKPRANGE_CC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_CC_KASAN_OFFSET) > +#define XKPRANGE_UC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_UC_KASAN_OFFSET) > +#define XKVRANGE_VC_SHADOW_OFFSET (KASAN_SHADOW_START + XKVRANGE_VC_KASAN_OFFSET) > + > +extern bool kasan_early_stage; > +extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; > + > +static inline void *kasan_mem_to_shadow(const void *addr) > +{ > + if (kasan_early_stage) { > + return (void *)(kasan_early_shadow_page); > + } else { > + unsigned long maddr = (unsigned long)addr; > + unsigned long xrange = (maddr >> XRANGE_SHIFT) & 0xffff; > + unsigned long offset = 0; > + > + maddr &= XRANGE_SHADOW_MASK; > + switch (xrange) { > + case XKPRANGE_CC_SEG: > + offset = XKPRANGE_CC_SHADOW_OFFSET; > + break; > + case XKPRANGE_UC_SEG: > + offset = XKPRANGE_UC_SHADOW_OFFSET; > + break; > + case XKVRANGE_VC_SEG: > + offset = XKVRANGE_VC_SHADOW_OFFSET; > + break; > + default: > + WARN_ON(1); > + return NULL; > + } > + > + return (void *)((maddr >> KASAN_SHADOW_SCALE_SHIFT) + offset); > + } > +} > + > +static inline const void *kasan_shadow_to_mem(const void *shadow_addr) > +{ > + unsigned long addr = (unsigned long)shadow_addr; > + > + if (unlikely(addr > KASAN_SHADOW_END) || > + unlikely(addr < KASAN_SHADOW_START)) { > + WARN_ON(1); > + return NULL; > + } > + > + if (addr >= XKVRANGE_VC_SHADOW_OFFSET) > + return (void *)(((addr - XKVRANGE_VC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKVRANGE_VC_START); > + else if (addr >= XKPRANGE_UC_SHADOW_OFFSET) > + return (void *)(((addr - XKPRANGE_UC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_UC_START); > + else if (addr >= XKPRANGE_CC_SHADOW_OFFSET) > + return (void *)(((addr - XKPRANGE_CC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_CC_START); > + else { > + WARN_ON(1); > + return NULL; > + } > +} > + > +void kasan_init(void); > +asmlinkage void kasan_early_init(void); > + > +#endif > +#endif > diff --git a/arch/loongarch/include/asm/pgtable.h b/arch/loongarch/include/asm/pgtable.h > index d28fb9dbec59..5cfdf79b287e 100644 > --- a/arch/loongarch/include/asm/pgtable.h > +++ b/arch/loongarch/include/asm/pgtable.h > @@ -86,9 +86,16 @@ extern unsigned long zero_page_mask; > #define MODULES_END (MODULES_VADDR + SZ_256M) > > #define VMALLOC_START MODULES_END > + > +#ifndef CONFIG_KASAN > #define VMALLOC_END \ > (vm_map_base + \ > min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits)) - PMD_SIZE - VMEMMAP_SIZE) > +#else > +#define VMALLOC_END \ > + (vm_map_base + \ > + min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits) / 2) - PMD_SIZE - VMEMMAP_SIZE) > +#endif > > #define vmemmap ((struct page *)((VMALLOC_END + PMD_SIZE) & PMD_MASK)) > #define VMEMMAP_END ((unsigned long)vmemmap + VMEMMAP_SIZE - 1) > diff --git a/arch/loongarch/include/asm/setup.h b/arch/loongarch/include/asm/setup.h > index be05c0e706a2..2dca0d1dd90a 100644 > --- a/arch/loongarch/include/asm/setup.h > +++ b/arch/loongarch/include/asm/setup.h > @@ -33,7 +33,7 @@ extern long __la_abs_end; > extern long __rela_dyn_begin; > extern long __rela_dyn_end; > > -extern void * __init relocate_kernel(void); > +extern unsigned long __init relocate_kernel(void); > > #endif > > diff --git a/arch/loongarch/include/asm/string.h b/arch/loongarch/include/asm/string.h > index 7b29cc9c70aa..5bb5a90d2681 100644 > --- a/arch/loongarch/include/asm/string.h > +++ b/arch/loongarch/include/asm/string.h > @@ -7,11 +7,31 @@ > > #define __HAVE_ARCH_MEMSET > extern void *memset(void *__s, int __c, size_t __count); > +extern void *__memset(void *__s, int __c, size_t __count); > > #define __HAVE_ARCH_MEMCPY > extern void *memcpy(void *__to, __const__ void *__from, size_t __n); > +extern void *__memcpy(void *__to, __const__ void *__from, size_t __n); > > #define __HAVE_ARCH_MEMMOVE > extern void *memmove(void *__dest, __const__ void *__src, size_t __n); > +extern void *__memmove(void *__dest, __const__ void *__src, size_t __n); > + > +#if defined(CONFIG_KASAN) && !defined(__SANITIZE_ADDRESS__) > + > +/* > + * For files that are not instrumented (e.g. mm/slub.c) we > + * should use not instrumented version of mem* functions. > + */ > + > +#define memset(s, c, n) __memset(s, c, n) > +#define memcpy(dst, src, len) __memcpy(dst, src, len) > +#define memmove(dst, src, len) __memmove(dst, src, len) > + > +#ifndef __NO_FORTIFY > +#define __NO_FORTIFY /* FORTIFY_SOURCE uses __builtin_memcpy, etc. */ > +#endif > + > +#endif > > #endif /* _ASM_STRING_H */ > diff --git a/arch/loongarch/kernel/Makefile b/arch/loongarch/kernel/Makefile > index 9a72d91cd104..0055e7582e15 100644 > --- a/arch/loongarch/kernel/Makefile > +++ b/arch/loongarch/kernel/Makefile > @@ -30,6 +30,9 @@ ifdef CONFIG_FUNCTION_TRACER > CFLAGS_REMOVE_perf_event.o = $(CC_FLAGS_FTRACE) > endif > > +KASAN_SANITIZE_vdso.o := n > +KASAN_SANITIZE_efi.o := n > + > obj-$(CONFIG_MODULES) += module.o module-sections.o > obj-$(CONFIG_STACKTRACE) += stacktrace.o > > diff --git a/arch/loongarch/kernel/head.S b/arch/loongarch/kernel/head.S > index aa64b179744f..19d4be5c8381 100644 > --- a/arch/loongarch/kernel/head.S > +++ b/arch/loongarch/kernel/head.S > @@ -95,13 +95,17 @@ SYM_CODE_START(kernel_entry) # kernel entry point > PTR_LI sp, (_THREAD_SIZE - PT_SIZE) > PTR_ADD sp, sp, tp > set_saved_sp sp, t0, t1 > -#endif > - > - /* relocate_kernel() returns the new kernel entry point */ > - jr a0 > - ASM_BUG() > > + /* Jump to new kernel: new_pc = current_pc + random_offset */ > + pcaddi t0, 0 > + add.d t0, t0, a0 > + jirl zero, t0, 0xc > #endif > +#endif > + > + #ifdef CONFIG_KASAN > + bl kasan_early_init > + #endif > > bl start_kernel > ASM_BUG() > diff --git a/arch/loongarch/kernel/relocate.c b/arch/loongarch/kernel/relocate.c > index 01f94d1e3edf..6c3eff9af9fb 100644 > --- a/arch/loongarch/kernel/relocate.c > +++ b/arch/loongarch/kernel/relocate.c > @@ -157,12 +157,11 @@ static inline void __init update_reloc_offset(unsigned long *addr, long random_o > *new_addr = (unsigned long)reloc_offset; > } > > -void * __init relocate_kernel(void) > +unsigned long __init relocate_kernel(void) > { > unsigned long kernel_length; > unsigned long random_offset = 0; > void *location_new = _text; /* Default to original kernel start */ > - void *kernel_entry = start_kernel; /* Default to original kernel entry point */ > char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ > > strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); > @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) > > reloc_offset += random_offset; > > - /* Return the new kernel's entry point */ > - kernel_entry = RELOCATED_KASLR(start_kernel); > - > /* The current thread is now within the relocated kernel */ > __current_thread_info = RELOCATED_KASLR(__current_thread_info); > > @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) > > relocate_absolute(random_offset); > > - return kernel_entry; > + return random_offset; > } > > /* > diff --git a/arch/loongarch/kernel/setup.c b/arch/loongarch/kernel/setup.c > index 27f71f9531e1..18453f8cb9e8 100644 > --- a/arch/loongarch/kernel/setup.c > +++ b/arch/loongarch/kernel/setup.c > @@ -610,4 +610,8 @@ void __init setup_arch(char **cmdline_p) > #endif > > paging_init(); > + > +#if defined(CONFIG_KASAN) > + kasan_init(); > +#endif > } > diff --git a/arch/loongarch/lib/memcpy.S b/arch/loongarch/lib/memcpy.S > index 3b7e1dec7109..db92ef7bef3a 100644 > --- a/arch/loongarch/lib/memcpy.S > +++ b/arch/loongarch/lib/memcpy.S > @@ -10,16 +10,18 @@ > #include <asm/export.h> > #include <asm/regdef.h> > > -SYM_FUNC_START(memcpy) > +SYM_FUNC_START_WEAK(memcpy) > /* > * Some CPUs support hardware unaligned access > */ > ALTERNATIVE "b __memcpy_generic", \ > "b __memcpy_fast", CPU_FEATURE_UAL > SYM_FUNC_END(memcpy) > +SYM_FUNC_ALIAS(__memcpy, memcpy) > _ASM_NOKPROBE(memcpy) > > EXPORT_SYMBOL(memcpy) > +EXPORT_SYMBOL(__memcpy) > > /* > * void *__memcpy_generic(void *dst, const void *src, size_t n) > diff --git a/arch/loongarch/lib/memmove.S b/arch/loongarch/lib/memmove.S > index b796c3d6da05..a2dec5899f5c 100644 > --- a/arch/loongarch/lib/memmove.S > +++ b/arch/loongarch/lib/memmove.S > @@ -10,7 +10,7 @@ > #include <asm/export.h> > #include <asm/regdef.h> > > -SYM_FUNC_START(memmove) > +SYM_FUNC_START_WEAK(memmove) > blt a0, a1, 1f /* dst < src, memcpy */ > blt a1, a0, 3f /* src < dst, rmemcpy */ > jr ra /* dst == src, return */ > @@ -19,27 +19,30 @@ SYM_FUNC_START(memmove) > 1: ori a3, zero, 64 > sub.d t0, a1, a0 > blt t0, a3, 2f > - b memcpy > + b __memcpy > 2: b __memcpy_generic > > /* if (dst - src) < 64, copy 1 byte at a time */ > 3: ori a3, zero, 64 > sub.d t0, a0, a1 > blt t0, a3, 4f > - b rmemcpy > + b __rmemcpy > 4: b __rmemcpy_generic > SYM_FUNC_END(memmove) > +SYM_FUNC_ALIAS(__memmove, memmove) > _ASM_NOKPROBE(memmove) > > EXPORT_SYMBOL(memmove) > +EXPORT_SYMBOL(__memmove) > + > +SYM_FUNC_START(__rmemcpy) > > -SYM_FUNC_START(rmemcpy) > /* > * Some CPUs support hardware unaligned access > */ > ALTERNATIVE "b __rmemcpy_generic", \ > "b __rmemcpy_fast", CPU_FEATURE_UAL > -SYM_FUNC_END(rmemcpy) > +SYM_FUNC_END(__rmemcpy) > _ASM_NOKPROBE(rmemcpy) > > /* > diff --git a/arch/loongarch/lib/memset.S b/arch/loongarch/lib/memset.S > index a9eb732ab2ad..b5cdbecba8ef 100644 > --- a/arch/loongarch/lib/memset.S > +++ b/arch/loongarch/lib/memset.S > @@ -16,16 +16,18 @@ > bstrins.d \r0, \r0, 63, 32 > .endm > > -SYM_FUNC_START(memset) > +SYM_FUNC_START_WEAK(memset) > /* > * Some CPUs support hardware unaligned access > */ > ALTERNATIVE "b __memset_generic", \ > "b __memset_fast", CPU_FEATURE_UAL > SYM_FUNC_END(memset) > +SYM_FUNC_ALIAS(__memset, memset) > _ASM_NOKPROBE(memset) > > EXPORT_SYMBOL(memset) > +EXPORT_SYMBOL(__memset) > > /* > * void *__memset_generic(void *s, int c, size_t n) > diff --git a/arch/loongarch/mm/Makefile b/arch/loongarch/mm/Makefile > index 8ffc6383f836..6e50cf6cf733 100644 > --- a/arch/loongarch/mm/Makefile > +++ b/arch/loongarch/mm/Makefile > @@ -7,3 +7,5 @@ obj-y += init.o cache.o tlb.o tlbex.o extable.o \ > fault.o ioremap.o maccess.o mmap.o pgtable.o page.o > > obj-$(CONFIG_HUGETLB_PAGE) += hugetlbpage.o > +obj-$(CONFIG_KASAN) += kasan_init.o > +KASAN_SANITIZE_kasan_init.o := n > diff --git a/arch/loongarch/mm/kasan_init.c b/arch/loongarch/mm/kasan_init.c > new file mode 100644 > index 000000000000..fb3077f8d508 > --- /dev/null > +++ b/arch/loongarch/mm/kasan_init.c > @@ -0,0 +1,255 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Copyright (C) 2023 Loongson Technology Corporation Limited > + */ > +#define pr_fmt(fmt) "kasan: " fmt > +#include <linux/kasan.h> > +#include <linux/memblock.h> > +#include <linux/sched/task.h> > + > +#include <asm/tlbflush.h> > +#include <asm/pgalloc.h> > +#include <asm-generic/sections.h> > + > +static pgd_t tmp_pg_dir[PTRS_PER_PGD] __initdata __aligned(PAGE_SIZE); > + > +static inline int __p4d_none(int early, p4d_t p4d) {return 0; } > + > +#ifndef __PAGETABLE_PUD_FOLDED > +#define __p4d_none(early, p4d) (early ? (p4d_val(p4d) == 0) : \ > +(__pa(p4d_val(p4d)) == (unsigned long)__pa(kasan_early_shadow_pud))) > +#endif > + > +#define __pud_none(early, pud) (early ? (pud_val(pud) == 0) : \ > +(__pa(pud_val(pud)) == (unsigned long)__pa(kasan_early_shadow_pmd))) > + > +#define __pmd_none(early, pmd) (early ? (pmd_val(pmd) == 0) : \ > +(__pa(pmd_val(pmd)) == (unsigned long)__pa(kasan_early_shadow_pte))) > + > +#define __pte_none(early, pte) (early ? pte_none(pte) : \ > +((pte_val(pte) & _PFN_MASK) == (unsigned long)__pa(kasan_early_shadow_page))) > + > +bool kasan_early_stage = true; > + > +/* > + * Alloc memory for shadow memory page table. > + */ > +static phys_addr_t __init kasan_alloc_zeroed_page(int node) > +{ > + void *p = memblock_alloc_try_nid(PAGE_SIZE, PAGE_SIZE, > + __pa(MAX_DMA_ADDRESS), > + MEMBLOCK_ALLOC_ACCESSIBLE, node); > + if (!p) > + panic("%s: Failed to allocate %lu bytes align=0x%lx nid=%d from=%llx\n", > + __func__, PAGE_SIZE, PAGE_SIZE, node, __pa(MAX_DMA_ADDRESS)); > + return __pa(p); > +} > + > +static pte_t *kasan_pte_offset(pmd_t *pmdp, unsigned long addr, int node, > + bool early) > +{ > + if (__pmd_none(early, READ_ONCE(*pmdp))) { > + phys_addr_t pte_phys = early ? > + __pa_symbol(kasan_early_shadow_pte) > + : kasan_alloc_zeroed_page(node); > + if (!early) > + memcpy(__va(pte_phys), kasan_early_shadow_pte, > + sizeof(kasan_early_shadow_pte)); > + pmd_populate_kernel(NULL, pmdp, (pte_t *)__va(pte_phys)); > + } > + > + return pte_offset_kernel(pmdp, addr); > +} > + > +static inline void kasan_set_pgd(pgd_t *pgdp, pgd_t pgdval) > +{ > + WRITE_ONCE(*pgdp, pgdval); > +} > + > +static pmd_t *kasan_pmd_offset(pud_t *pudp, unsigned long addr, int node, > + bool early) > +{ > + if (__pud_none(early, READ_ONCE(*pudp))) { > + phys_addr_t pmd_phys = early ? > + __pa_symbol(kasan_early_shadow_pmd) > + : kasan_alloc_zeroed_page(node); > + if (!early) > + memcpy(__va(pmd_phys), kasan_early_shadow_pmd, > + sizeof(kasan_early_shadow_pmd)); > + pud_populate(&init_mm, pudp, (pmd_t *)__va(pmd_phys)); > + } > + > + return pmd_offset(pudp, addr); > +} > + > +static pud_t *__init kasan_pud_offset(p4d_t *p4dp, unsigned long addr, int node, > + bool early) > +{ > + if (__p4d_none(early, READ_ONCE(*p4dp))) { > + phys_addr_t pud_phys = early ? > + __pa_symbol(kasan_early_shadow_pud) > + : kasan_alloc_zeroed_page(node); > + if (!early) > + memcpy(__va(pud_phys), kasan_early_shadow_pud, > + sizeof(kasan_early_shadow_pud)); > + p4d_populate(&init_mm, p4dp, (pud_t *)__va(pud_phys)); > + } > + > + return pud_offset(p4dp, addr); > +} > + > +static void kasan_pte_populate(pmd_t *pmdp, unsigned long addr, > + unsigned long end, int node, bool early) > +{ > + unsigned long next; > + pte_t *ptep = kasan_pte_offset(pmdp, addr, node, early); > + > + do { > + phys_addr_t page_phys = early ? > + __pa_symbol(kasan_early_shadow_page) > + : kasan_alloc_zeroed_page(node); > + next = addr + PAGE_SIZE; > + set_pte(ptep, pfn_pte(__phys_to_pfn(page_phys), PAGE_KERNEL)); > + } while (ptep++, addr = next, addr != end && __pte_none(early, READ_ONCE(*ptep))); > +} > + > +static void kasan_pmd_populate(pud_t *pudp, unsigned long addr, > + unsigned long end, int node, bool early) > +{ > + unsigned long next; > + pmd_t *pmdp = kasan_pmd_offset(pudp, addr, node, early); > + > + do { > + next = pmd_addr_end(addr, end); > + kasan_pte_populate(pmdp, addr, next, node, early); > + } while (pmdp++, addr = next, addr != end && __pmd_none(early, READ_ONCE(*pmdp))); > +} > + > +static void __init kasan_pud_populate(p4d_t *p4dp, unsigned long addr, > + unsigned long end, int node, bool early) > +{ > + unsigned long next; > + pud_t *pudp = kasan_pud_offset(p4dp, addr, node, early); > + > + do { > + next = pud_addr_end(addr, end); > + kasan_pmd_populate(pudp, addr, next, node, early); > + } while (pudp++, addr = next, addr != end); > +} > + > +static void __init kasan_p4d_populate(pgd_t *pgdp, unsigned long addr, > + unsigned long end, int node, bool early) > +{ > + unsigned long next; > + p4d_t *p4dp = p4d_offset(pgdp, addr); > + > + do { > + next = p4d_addr_end(addr, end); > + kasan_pud_populate(p4dp, addr, next, node, early); > + } while (p4dp++, addr = next, addr != end); > +} > + > +static void __init kasan_pgd_populate(unsigned long addr, unsigned long end, > + int node, bool early) > +{ > + unsigned long next; > + pgd_t *pgdp; > + > + pgdp = pgd_offset_k(addr); > + > + do { > + next = pgd_addr_end(addr, end); > + kasan_p4d_populate(pgdp, addr, next, node, early); > + } while (pgdp++, addr = next, addr != end); > + > +} > + > +asmlinkage void __init kasan_early_init(void) > +{ > + BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_START, PGDIR_SIZE)); > + BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_END, PGDIR_SIZE)); > +} > + > +/* Set up full kasan mappings, ensuring that the mapped pages are zeroed */ > +static void __init kasan_map_populate(unsigned long start, unsigned long end, > + int node) > +{ > + kasan_pgd_populate(start & PAGE_MASK, PAGE_ALIGN(end), node, false); > +} > + > +static void __init clear_pgds(unsigned long start, unsigned long end) > +{ > + /* > + * Remove references to kasan page tables from > + * swapper_pg_dir. pgd_clear() can't be used > + * here because it's nop on 2,3-level pagetable setups > + */ > + for (; start < end; start += PGDIR_SIZE) > + kasan_set_pgd((pgd_t *)pgd_offset_k(start), __pgd(0)); > +} > + > +void __init kasan_init(void) > +{ > + u64 i; > + phys_addr_t pa_start, pa_end; > + /* > + * PGD was populated as invalid_pmd_table or invalid_pud_table > + * in pagetable_init() which depends on how many levels of page > + * table you are using, but we had to clean the gpd of kasan > + * shadow memory, as the pgd value is none-zero. > + * The assertion pgd_none is going to be false and the formal populate > + * afterwards is not going to create any new pgd at all. > + */ > + memcpy(tmp_pg_dir, swapper_pg_dir, sizeof(tmp_pg_dir)); > + __sync(); > + csr_write64(__pa_symbol(tmp_pg_dir), LOONGARCH_CSR_PGDH); > + local_flush_tlb_all(); > + > + clear_pgds(KASAN_SHADOW_START, KASAN_SHADOW_END); > + > + /* Maps everything to a single page of zeroes */ > + kasan_pgd_populate(KASAN_SHADOW_START, KASAN_SHADOW_END, > + NUMA_NO_NODE, true); > + > + kasan_populate_early_shadow(kasan_mem_to_shadow((void *)MODULES_END), > + kasan_mem_to_shadow((void *)VMEMMAP_END)); > + > + if (!IS_ENABLED(CONFIG_KASAN_VMALLOC)) > + kasan_populate_early_shadow(kasan_mem_to_shadow((void *)VMALLOC_START), > + kasan_mem_to_shadow((void *)VMALLOC_END)); > + > + kasan_early_stage = false; > + > + /* Populate the linear mapping */ > + for_each_mem_range(i, &pa_start, &pa_end) { > + void *start = (void *)phys_to_virt(pa_start); > + void *end = (void *)phys_to_virt(pa_end); > + > + if (start >= end) > + break; > + > + kasan_map_populate((unsigned long)kasan_mem_to_shadow(start), > + (unsigned long)kasan_mem_to_shadow(end), NUMA_NO_NODE); > + } > + > + /* Populate modules mapping */ > + kasan_map_populate((unsigned long)kasan_mem_to_shadow((void *)MODULES_VADDR), > + (unsigned long)kasan_mem_to_shadow((void *)MODULES_END), NUMA_NO_NODE); > + /* > + * Kasan may reuse the contents of kasan_early_shadow_pte directly, so we > + * should make sure that it maps the zero page read-only. > + */ > + for (i = 0; i < PTRS_PER_PTE; i++) > + set_pte(&kasan_early_shadow_pte[i], > + pfn_pte(__phys_to_pfn(__pa_symbol(kasan_early_shadow_page)), > + PAGE_KERNEL_RO)); > + > + memset(kasan_early_shadow_page, 0, PAGE_SIZE); > + __sync(); > + csr_write64(__pa_symbol(swapper_pg_dir), LOONGARCH_CSR_PGDH); > + local_flush_tlb_all(); > + > + /* At this point kasan is fully initialized. Enable error messages */ > + init_task.kasan_depth = 0; > + pr_info("KernelAddressSanitizer initialized.\n"); > +} > diff --git a/arch/loongarch/vdso/Makefile b/arch/loongarch/vdso/Makefile > index d89e2ac75f7b..df328cd92875 100644 > --- a/arch/loongarch/vdso/Makefile > +++ b/arch/loongarch/vdso/Makefile > @@ -1,6 +1,10 @@ > # SPDX-License-Identifier: GPL-2.0 > # Objects to go into the VDSO. > > +ifdef CONFIG_KASAN > +KASAN_SANITIZE := n > +endif > + > # Absolute relocation type $(ARCH_REL_TYPE_ABS) needs to be defined before > # the inclusion of generic Makefile. > ARCH_REL_TYPE_ABS := R_LARCH_32|R_LARCH_64|R_LARCH_MARK_LA|R_LARCH_JUMP_SLOT > diff --git a/include/linux/kasan.h b/include/linux/kasan.h > index f7ef70661ce2..3b91b941873d 100644 > --- a/include/linux/kasan.h > +++ b/include/linux/kasan.h > @@ -54,11 +54,13 @@ extern p4d_t kasan_early_shadow_p4d[MAX_PTRS_PER_P4D]; > int kasan_populate_early_shadow(const void *shadow_start, > const void *shadow_end); > > +#ifndef __HAVE_ARCH_SHADOW_MAP > static inline void *kasan_mem_to_shadow(const void *addr) > { > return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) > + KASAN_SHADOW_OFFSET; > } > +#endif > > int kasan_add_zero_shadow(void *start, unsigned long size); > void kasan_remove_zero_shadow(void *start, unsigned long size); > diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c > index e5eef670735e..f86194750df5 100644 > --- a/mm/kasan/generic.c > +++ b/mm/kasan/generic.c > @@ -175,6 +175,11 @@ static __always_inline bool check_region_inline(unsigned long addr, > if (unlikely(!addr_has_metadata((void *)addr))) > return !kasan_report(addr, size, write, ret_ip); > > +#ifndef __HAVE_ARCH_SHADOW_MAP > + if (unlikely(kasan_mem_to_shadow((unsigned long *)addr) == NULL)) > + return !kasan_report(addr, size, write, ret_ip); > +#endif > + > if (likely(!memory_is_poisoned(addr, size))) > return true; > > diff --git a/mm/kasan/init.c b/mm/kasan/init.c > index cc64ed6858c6..860061a22ca9 100644 > --- a/mm/kasan/init.c > +++ b/mm/kasan/init.c > @@ -166,8 +166,9 @@ static int __ref zero_pud_populate(p4d_t *p4d, unsigned long addr, > if (!p) > return -ENOMEM; > } else { > - pud_populate(&init_mm, pud, > - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); > + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); > + pmd_init(p); > + pud_populate(&init_mm, pud, p); > } > } > zero_pmd_populate(pud, addr, next); > @@ -207,8 +208,9 @@ static int __ref zero_p4d_populate(pgd_t *pgd, unsigned long addr, > if (!p) > return -ENOMEM; > } else { > - p4d_populate(&init_mm, p4d, > - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); > + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); > + pud_init(p); > + p4d_populate(&init_mm, p4d, p); > } > } > zero_pud_populate(p4d, addr, next); > diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h > index a61eeee3095a..033335c13b25 100644 > --- a/mm/kasan/kasan.h > +++ b/mm/kasan/kasan.h > @@ -291,16 +291,22 @@ struct kasan_stack_ring { > > #if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS) > > +#ifndef __HAVE_ARCH_SHADOW_MAP > static inline const void *kasan_shadow_to_mem(const void *shadow_addr) > { > return (void *)(((unsigned long)shadow_addr - KASAN_SHADOW_OFFSET) > << KASAN_SHADOW_SCALE_SHIFT); > } > +#endif > > static __always_inline bool addr_has_metadata(const void *addr) > { > +#ifdef __HAVE_ARCH_SHADOW_MAP > + return (kasan_mem_to_shadow((void *)addr) != NULL); > +#else > return (kasan_reset_tag(addr) >= > kasan_shadow_to_mem((void *)KASAN_SHADOW_START)); > +#endif > } > > /** >
Hi, Ruoyao On 2023/3/28 下午7:39, Xi Ruoyao wrote: > On Tue, 2023-03-28 at 19:17 +0800, Qing Zhang wrote: > > /* snip */ > > >> -void * __init relocate_kernel(void) >> +unsigned long __init relocate_kernel(void) > > Why we must modify relocate_kernel for KASAN? When the CONFIG_RANDOMIZE_BASE is enabled, the kernel will be updated to a random new address. Kasan needs to call kasan_early_init before start_kernel. There are two situations: 1> After enabling CONFIG_RELOCATABLE, call kasan_early_init. 2> After CONFIG_RELOCATABLE is not enabled, call kasan_early_init. In order to prevent code redundancy and semantic problems caused by calling kasan_early_init (before jr a0) at the old PC. Thanks, -Qing > >> { >> unsigned long kernel_length; >> unsigned long random_offset = 0; >> void *location_new = _text; /* Default to original kernel start */ >> - void *kernel_entry = start_kernel; /* Default to original kernel entry point */ >> char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ >> >> strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); >> @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) >> >> reloc_offset += random_offset; >> >> - /* Return the new kernel's entry point */ >> - kernel_entry = RELOCATED_KASLR(start_kernel); >> - >> /* The current thread is now within the relocated kernel */ >> __current_thread_info = RELOCATED_KASLR(__current_thread_info); >> >> @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) >> >> relocate_absolute(random_offset); >> >> - return kernel_entry; >> + return random_offset; >
Hi, Youling On 2023/3/28 下午8:08, Youling Tang wrote: > Hi, Qing > > On 03/28/2023 07:17 PM, Qing Zhang wrote: >> 1/8 of kernel addresses reserved for shadow memory. But for LoongArch, >> There are a lot of holes between different segments and valid address >> space(256T available) is insufficient to map all these segments to kasan >> shadow memory with the common formula provided by kasan core, saying >> addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET > > If you can provide a virtual memory layout (similar to > Documentation/riscv/vm-layout.rst), it will be convenient for everyone > to review the relevant code, and it will also better explain why > LoongArch needs to implement kasan_mem_to_shadow() separately. ok, on the way... I'll add separate patches about the virtual memory layout document in the future. Thanks, -Qing > > Thanks, > Youling. >> >> So Loongarch has a ARCH specific mapping formula,different segments >> are mapped individually, and only limited length of space of that >> specific segment is mapped to shadow. >> >> At early boot stage the whole shadow region populated with just >> one physical page (kasan_early_shadow_page). Later, this page is >> reused as readonly zero shadow for some memory that Kasan currently >> don't track. >> After mapping the physical memory, pages for shadow memory are >> allocated and mapped. >> >> Functions like memset/memmove/memcpy do a lot of memory accesses. >> If bad pointer passed to one of these function it is important >> to catch this. Compiler's instrumentation cannot do this since >> these functions are written in assembly. >> KASan replaces memory functions with manually instrumented variants. >> Original functions declared as weak symbols so strong definitions >> in mm/kasan/kasan.c could replace them. Original functions have aliases >> with '__' prefix in name, so we could call non-instrumented variant >> if needed. >> >> Signed-off-by: Qing Zhang <zhangqing@loongson.cn> >> --- >> Documentation/dev-tools/kasan.rst | 4 +- >> .../features/debug/KASAN/arch-support.txt | 2 +- >> arch/loongarch/Kconfig | 7 + >> arch/loongarch/include/asm/kasan.h | 120 +++++++++ >> arch/loongarch/include/asm/pgtable.h | 7 + >> arch/loongarch/include/asm/setup.h | 2 +- >> arch/loongarch/include/asm/string.h | 20 ++ >> arch/loongarch/kernel/Makefile | 3 + >> arch/loongarch/kernel/head.S | 14 +- >> arch/loongarch/kernel/relocate.c | 8 +- >> arch/loongarch/kernel/setup.c | 4 + >> arch/loongarch/lib/memcpy.S | 4 +- >> arch/loongarch/lib/memmove.S | 13 +- >> arch/loongarch/lib/memset.S | 4 +- >> arch/loongarch/mm/Makefile | 2 + >> arch/loongarch/mm/kasan_init.c | 255 ++++++++++++++++++ >> arch/loongarch/vdso/Makefile | 4 + >> include/linux/kasan.h | 2 + >> mm/kasan/generic.c | 5 + >> mm/kasan/init.c | 10 +- >> mm/kasan/kasan.h | 6 + >> 21 files changed, 470 insertions(+), 26 deletions(-) >> create mode 100644 arch/loongarch/include/asm/kasan.h >> create mode 100644 arch/loongarch/mm/kasan_init.c >> >> diff --git a/Documentation/dev-tools/kasan.rst >> b/Documentation/dev-tools/kasan.rst >> index e66916a483cd..ee91f2872767 100644 >> --- a/Documentation/dev-tools/kasan.rst >> +++ b/Documentation/dev-tools/kasan.rst >> @@ -41,8 +41,8 @@ Support >> Architectures >> ~~~~~~~~~~~~~ >> >> -Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, >> s390, and >> -xtensa, and the tag-based KASAN modes are supported only on arm64. >> +Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, >> s390, xtensa, >> +and loongarch, and the tag-based KASAN modes are supported only on >> arm64. >> >> Compilers >> ~~~~~~~~~ >> diff --git a/Documentation/features/debug/KASAN/arch-support.txt >> b/Documentation/features/debug/KASAN/arch-support.txt >> index bf0124fae643..c4581c2edb28 100644 >> --- a/Documentation/features/debug/KASAN/arch-support.txt >> +++ b/Documentation/features/debug/KASAN/arch-support.txt >> @@ -13,7 +13,7 @@ >> | csky: | TODO | >> | hexagon: | TODO | >> | ia64: | TODO | >> - | loongarch: | TODO | >> + | loongarch: | ok | >> | m68k: | TODO | >> | microblaze: | TODO | >> | mips: | TODO | >> diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig >> index 72dd00f48b8c..61f883c51045 100644 >> --- a/arch/loongarch/Kconfig >> +++ b/arch/loongarch/Kconfig >> @@ -7,6 +7,7 @@ config LOONGARCH >> select ACPI_MCFG if ACPI >> select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI >> select ARCH_BINFMT_ELF_STATE >> + select ARCH_DISABLE_KASAN_INLINE >> select ARCH_ENABLE_MEMORY_HOTPLUG >> select ARCH_ENABLE_MEMORY_HOTREMOVE >> select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI >> @@ -83,6 +84,7 @@ config LOONGARCH >> select HAVE_ARCH_AUDITSYSCALL >> select HAVE_ARCH_MMAP_RND_BITS if MMU >> select HAVE_ARCH_SECCOMP_FILTER >> + select HAVE_ARCH_KASAN if 64BIT >> select HAVE_ARCH_TRACEHOOK >> select HAVE_ARCH_TRANSPARENT_HUGEPAGE >> select HAVE_ASM_MODVERSIONS >> @@ -626,6 +628,11 @@ config ARCH_MMAP_RND_BITS_MIN >> config ARCH_MMAP_RND_BITS_MAX >> default 18 >> >> +config KASAN_SHADOW_OFFSET >> + hex >> + default 0x0 >> + depends on KASAN >> + >> menu "Power management options" >> >> config ARCH_SUSPEND_POSSIBLE >> diff --git a/arch/loongarch/include/asm/kasan.h >> b/arch/loongarch/include/asm/kasan.h >> new file mode 100644 >> index 000000000000..582bcded311e >> --- /dev/null >> +++ b/arch/loongarch/include/asm/kasan.h >> @@ -0,0 +1,120 @@ >> +/* SPDX-License-Identifier: GPL-2.0 */ >> +#ifndef __ASM_KASAN_H >> +#define __ASM_KASAN_H >> + >> +#ifndef __ASSEMBLY__ >> + >> +#include <linux/linkage.h> >> +#include <linux/mmzone.h> >> +#include <asm/addrspace.h> >> +#include <asm/io.h> >> +#include <asm/pgtable.h> >> + >> +#define __HAVE_ARCH_SHADOW_MAP >> + >> +#define KASAN_SHADOW_SCALE_SHIFT 3 >> +#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) >> + >> +#define XRANGE_SHIFT (48) >> + >> +/* Valid address length */ >> +#define XRANGE_SHADOW_SHIFT (PGDIR_SHIFT + PAGE_SHIFT - 3) >> +/* Used for taking out the valid address */ >> +#define XRANGE_SHADOW_MASK GENMASK_ULL(XRANGE_SHADOW_SHIFT - 1, 0) >> +/* One segment whole address space size */ >> +#define XRANGE_SIZE (XRANGE_SHADOW_MASK + 1) >> + >> +/* 64-bit segment value. */ >> +#define XKPRANGE_UC_SEG (0x8000) >> +#define XKPRANGE_CC_SEG (0x9000) >> +#define XKVRANGE_VC_SEG (0xffff) >> + >> +/* Cached */ >> +#define XKPRANGE_CC_START CACHE_BASE >> +#define XKPRANGE_CC_SIZE XRANGE_SIZE >> +#define XKPRANGE_CC_KASAN_OFFSET (0) >> +#define XKPRANGE_CC_SHADOW_SIZE (XKPRANGE_CC_SIZE >> >> KASAN_SHADOW_SCALE_SHIFT) >> +#define XKPRANGE_CC_SHADOW_END (XKPRANGE_CC_KASAN_OFFSET + >> XKPRANGE_CC_SHADOW_SIZE) >> + >> +/* UnCached */ >> +#define XKPRANGE_UC_START UNCACHE_BASE >> +#define XKPRANGE_UC_SIZE XRANGE_SIZE >> +#define XKPRANGE_UC_KASAN_OFFSET XKPRANGE_CC_SHADOW_END >> +#define XKPRANGE_UC_SHADOW_SIZE (XKPRANGE_UC_SIZE >> >> KASAN_SHADOW_SCALE_SHIFT) >> +#define XKPRANGE_UC_SHADOW_END (XKPRANGE_UC_KASAN_OFFSET + >> XKPRANGE_UC_SHADOW_SIZE) >> + >> +/* VMALLOC (Cached or UnCached) */ >> +#define XKVRANGE_VC_START MODULES_VADDR >> +#define XKVRANGE_VC_SIZE round_up(VMEMMAP_END - MODULES_VADDR >> + 1, PGDIR_SIZE) >> +#define XKVRANGE_VC_KASAN_OFFSET XKPRANGE_UC_SHADOW_END >> +#define XKVRANGE_VC_SHADOW_SIZE (XKVRANGE_VC_SIZE >> >> KASAN_SHADOW_SCALE_SHIFT) >> +#define XKVRANGE_VC_SHADOW_END (XKVRANGE_VC_KASAN_OFFSET + >> XKVRANGE_VC_SHADOW_SIZE) >> + >> +/* Kasan shadow memory start right after vmalloc. */ >> +#define KASAN_SHADOW_START round_up(VMEMMAP_END, PGDIR_SIZE) >> +#define KASAN_SHADOW_SIZE (XKVRANGE_VC_SHADOW_END - >> XKPRANGE_CC_KASAN_OFFSET) >> +#define KASAN_SHADOW_END round_up(KASAN_SHADOW_START + >> KASAN_SHADOW_SIZE, PGDIR_SIZE) >> + >> +#define XKPRANGE_CC_SHADOW_OFFSET (KASAN_SHADOW_START + >> XKPRANGE_CC_KASAN_OFFSET) >> +#define XKPRANGE_UC_SHADOW_OFFSET (KASAN_SHADOW_START + >> XKPRANGE_UC_KASAN_OFFSET) >> +#define XKVRANGE_VC_SHADOW_OFFSET (KASAN_SHADOW_START + >> XKVRANGE_VC_KASAN_OFFSET) >> + >> +extern bool kasan_early_stage; >> +extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; >> + >> +static inline void *kasan_mem_to_shadow(const void *addr) >> +{ >> + if (kasan_early_stage) { >> + return (void *)(kasan_early_shadow_page); >> + } else { >> + unsigned long maddr = (unsigned long)addr; >> + unsigned long xrange = (maddr >> XRANGE_SHIFT) & 0xffff; >> + unsigned long offset = 0; >> + >> + maddr &= XRANGE_SHADOW_MASK; >> + switch (xrange) { >> + case XKPRANGE_CC_SEG: >> + offset = XKPRANGE_CC_SHADOW_OFFSET; >> + break; >> + case XKPRANGE_UC_SEG: >> + offset = XKPRANGE_UC_SHADOW_OFFSET; >> + break; >> + case XKVRANGE_VC_SEG: >> + offset = XKVRANGE_VC_SHADOW_OFFSET; >> + break; >> + default: >> + WARN_ON(1); >> + return NULL; >> + } >> + >> + return (void *)((maddr >> KASAN_SHADOW_SCALE_SHIFT) + offset); >> + } >> +} >> + >> +static inline const void *kasan_shadow_to_mem(const void *shadow_addr) >> +{ >> + unsigned long addr = (unsigned long)shadow_addr; >> + >> + if (unlikely(addr > KASAN_SHADOW_END) || >> + unlikely(addr < KASAN_SHADOW_START)) { >> + WARN_ON(1); >> + return NULL; >> + } >> + >> + if (addr >= XKVRANGE_VC_SHADOW_OFFSET) >> + return (void *)(((addr - XKVRANGE_VC_SHADOW_OFFSET) << >> KASAN_SHADOW_SCALE_SHIFT) + XKVRANGE_VC_START); >> + else if (addr >= XKPRANGE_UC_SHADOW_OFFSET) >> + return (void *)(((addr - XKPRANGE_UC_SHADOW_OFFSET) << >> KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_UC_START); >> + else if (addr >= XKPRANGE_CC_SHADOW_OFFSET) >> + return (void *)(((addr - XKPRANGE_CC_SHADOW_OFFSET) << >> KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_CC_START); >> + else { >> + WARN_ON(1); >> + return NULL; >> + } >> +} >> + >> +void kasan_init(void); >> +asmlinkage void kasan_early_init(void); >> + >> +#endif >> +#endif >> diff --git a/arch/loongarch/include/asm/pgtable.h >> b/arch/loongarch/include/asm/pgtable.h >> index d28fb9dbec59..5cfdf79b287e 100644 >> --- a/arch/loongarch/include/asm/pgtable.h >> +++ b/arch/loongarch/include/asm/pgtable.h >> @@ -86,9 +86,16 @@ extern unsigned long zero_page_mask; >> #define MODULES_END (MODULES_VADDR + SZ_256M) >> >> #define VMALLOC_START MODULES_END >> + >> +#ifndef CONFIG_KASAN >> #define VMALLOC_END \ >> (vm_map_base + \ >> min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * >> PAGE_SIZE, (1UL << cpu_vabits)) - PMD_SIZE - VMEMMAP_SIZE) >> +#else >> +#define VMALLOC_END \ >> + (vm_map_base + \ >> + min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * >> PAGE_SIZE, (1UL << cpu_vabits) / 2) - PMD_SIZE - VMEMMAP_SIZE) >> +#endif >> >> #define vmemmap ((struct page *)((VMALLOC_END + PMD_SIZE) & >> PMD_MASK)) >> #define VMEMMAP_END ((unsigned long)vmemmap + VMEMMAP_SIZE - 1) >> diff --git a/arch/loongarch/include/asm/setup.h >> b/arch/loongarch/include/asm/setup.h >> index be05c0e706a2..2dca0d1dd90a 100644 >> --- a/arch/loongarch/include/asm/setup.h >> +++ b/arch/loongarch/include/asm/setup.h >> @@ -33,7 +33,7 @@ extern long __la_abs_end; >> extern long __rela_dyn_begin; >> extern long __rela_dyn_end; >> >> -extern void * __init relocate_kernel(void); >> +extern unsigned long __init relocate_kernel(void); >> >> #endif >> >> diff --git a/arch/loongarch/include/asm/string.h >> b/arch/loongarch/include/asm/string.h >> index 7b29cc9c70aa..5bb5a90d2681 100644 >> --- a/arch/loongarch/include/asm/string.h >> +++ b/arch/loongarch/include/asm/string.h >> @@ -7,11 +7,31 @@ >> >> #define __HAVE_ARCH_MEMSET >> extern void *memset(void *__s, int __c, size_t __count); >> +extern void *__memset(void *__s, int __c, size_t __count); >> >> #define __HAVE_ARCH_MEMCPY >> extern void *memcpy(void *__to, __const__ void *__from, size_t __n); >> +extern void *__memcpy(void *__to, __const__ void *__from, size_t __n); >> >> #define __HAVE_ARCH_MEMMOVE >> extern void *memmove(void *__dest, __const__ void *__src, size_t __n); >> +extern void *__memmove(void *__dest, __const__ void *__src, size_t __n); >> + >> +#if defined(CONFIG_KASAN) && !defined(__SANITIZE_ADDRESS__) >> + >> +/* >> + * For files that are not instrumented (e.g. mm/slub.c) we >> + * should use not instrumented version of mem* functions. >> + */ >> + >> +#define memset(s, c, n) __memset(s, c, n) >> +#define memcpy(dst, src, len) __memcpy(dst, src, len) >> +#define memmove(dst, src, len) __memmove(dst, src, len) >> + >> +#ifndef __NO_FORTIFY >> +#define __NO_FORTIFY /* FORTIFY_SOURCE uses __builtin_memcpy, etc. */ >> +#endif >> + >> +#endif >> >> #endif /* _ASM_STRING_H */ >> diff --git a/arch/loongarch/kernel/Makefile >> b/arch/loongarch/kernel/Makefile >> index 9a72d91cd104..0055e7582e15 100644 >> --- a/arch/loongarch/kernel/Makefile >> +++ b/arch/loongarch/kernel/Makefile >> @@ -30,6 +30,9 @@ ifdef CONFIG_FUNCTION_TRACER >> CFLAGS_REMOVE_perf_event.o = $(CC_FLAGS_FTRACE) >> endif >> >> +KASAN_SANITIZE_vdso.o := n >> +KASAN_SANITIZE_efi.o := n >> + >> obj-$(CONFIG_MODULES) += module.o module-sections.o >> obj-$(CONFIG_STACKTRACE) += stacktrace.o >> >> diff --git a/arch/loongarch/kernel/head.S b/arch/loongarch/kernel/head.S >> index aa64b179744f..19d4be5c8381 100644 >> --- a/arch/loongarch/kernel/head.S >> +++ b/arch/loongarch/kernel/head.S >> @@ -95,13 +95,17 @@ SYM_CODE_START(kernel_entry) # kernel >> entry point >> PTR_LI sp, (_THREAD_SIZE - PT_SIZE) >> PTR_ADD sp, sp, tp >> set_saved_sp sp, t0, t1 >> -#endif >> - >> - /* relocate_kernel() returns the new kernel entry point */ >> - jr a0 >> - ASM_BUG() >> >> + /* Jump to new kernel: new_pc = current_pc + random_offset */ >> + pcaddi t0, 0 >> + add.d t0, t0, a0 >> + jirl zero, t0, 0xc >> #endif >> +#endif >> + >> + #ifdef CONFIG_KASAN >> + bl kasan_early_init >> + #endif >> >> bl start_kernel >> ASM_BUG() >> diff --git a/arch/loongarch/kernel/relocate.c >> b/arch/loongarch/kernel/relocate.c >> index 01f94d1e3edf..6c3eff9af9fb 100644 >> --- a/arch/loongarch/kernel/relocate.c >> +++ b/arch/loongarch/kernel/relocate.c >> @@ -157,12 +157,11 @@ static inline void __init >> update_reloc_offset(unsigned long *addr, long random_o >> *new_addr = (unsigned long)reloc_offset; >> } >> >> -void * __init relocate_kernel(void) >> +unsigned long __init relocate_kernel(void) >> { >> unsigned long kernel_length; >> unsigned long random_offset = 0; >> void *location_new = _text; /* Default to original kernel start */ >> - void *kernel_entry = start_kernel; /* Default to original kernel >> entry point */ >> char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* >> Boot command line is passed in fw_arg1 */ >> >> strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); >> @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) >> >> reloc_offset += random_offset; >> >> - /* Return the new kernel's entry point */ >> - kernel_entry = RELOCATED_KASLR(start_kernel); >> - >> /* The current thread is now within the relocated kernel */ >> __current_thread_info = RELOCATED_KASLR(__current_thread_info); >> >> @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) >> >> relocate_absolute(random_offset); >> >> - return kernel_entry; >> + return random_offset; >> } >> >> /* >> diff --git a/arch/loongarch/kernel/setup.c >> b/arch/loongarch/kernel/setup.c >> index 27f71f9531e1..18453f8cb9e8 100644 >> --- a/arch/loongarch/kernel/setup.c >> +++ b/arch/loongarch/kernel/setup.c >> @@ -610,4 +610,8 @@ void __init setup_arch(char **cmdline_p) >> #endif >> >> paging_init(); >> + >> +#if defined(CONFIG_KASAN) >> + kasan_init(); >> +#endif >> } >> diff --git a/arch/loongarch/lib/memcpy.S b/arch/loongarch/lib/memcpy.S >> index 3b7e1dec7109..db92ef7bef3a 100644 >> --- a/arch/loongarch/lib/memcpy.S >> +++ b/arch/loongarch/lib/memcpy.S >> @@ -10,16 +10,18 @@ >> #include <asm/export.h> >> #include <asm/regdef.h> >> >> -SYM_FUNC_START(memcpy) >> +SYM_FUNC_START_WEAK(memcpy) >> /* >> * Some CPUs support hardware unaligned access >> */ >> ALTERNATIVE "b __memcpy_generic", \ >> "b __memcpy_fast", CPU_FEATURE_UAL >> SYM_FUNC_END(memcpy) >> +SYM_FUNC_ALIAS(__memcpy, memcpy) >> _ASM_NOKPROBE(memcpy) >> >> EXPORT_SYMBOL(memcpy) >> +EXPORT_SYMBOL(__memcpy) >> >> /* >> * void *__memcpy_generic(void *dst, const void *src, size_t n) >> diff --git a/arch/loongarch/lib/memmove.S b/arch/loongarch/lib/memmove.S >> index b796c3d6da05..a2dec5899f5c 100644 >> --- a/arch/loongarch/lib/memmove.S >> +++ b/arch/loongarch/lib/memmove.S >> @@ -10,7 +10,7 @@ >> #include <asm/export.h> >> #include <asm/regdef.h> >> >> -SYM_FUNC_START(memmove) >> +SYM_FUNC_START_WEAK(memmove) >> blt a0, a1, 1f /* dst < src, memcpy */ >> blt a1, a0, 3f /* src < dst, rmemcpy */ >> jr ra /* dst == src, return */ >> @@ -19,27 +19,30 @@ SYM_FUNC_START(memmove) >> 1: ori a3, zero, 64 >> sub.d t0, a1, a0 >> blt t0, a3, 2f >> - b memcpy >> + b __memcpy >> 2: b __memcpy_generic >> >> /* if (dst - src) < 64, copy 1 byte at a time */ >> 3: ori a3, zero, 64 >> sub.d t0, a0, a1 >> blt t0, a3, 4f >> - b rmemcpy >> + b __rmemcpy >> 4: b __rmemcpy_generic >> SYM_FUNC_END(memmove) >> +SYM_FUNC_ALIAS(__memmove, memmove) >> _ASM_NOKPROBE(memmove) >> >> EXPORT_SYMBOL(memmove) >> +EXPORT_SYMBOL(__memmove) >> + >> +SYM_FUNC_START(__rmemcpy) >> >> -SYM_FUNC_START(rmemcpy) >> /* >> * Some CPUs support hardware unaligned access >> */ >> ALTERNATIVE "b __rmemcpy_generic", \ >> "b __rmemcpy_fast", CPU_FEATURE_UAL >> -SYM_FUNC_END(rmemcpy) >> +SYM_FUNC_END(__rmemcpy) >> _ASM_NOKPROBE(rmemcpy) >> >> /* >> diff --git a/arch/loongarch/lib/memset.S b/arch/loongarch/lib/memset.S >> index a9eb732ab2ad..b5cdbecba8ef 100644 >> --- a/arch/loongarch/lib/memset.S >> +++ b/arch/loongarch/lib/memset.S >> @@ -16,16 +16,18 @@ >> bstrins.d \r0, \r0, 63, 32 >> .endm >> >> -SYM_FUNC_START(memset) >> +SYM_FUNC_START_WEAK(memset) >> /* >> * Some CPUs support hardware unaligned access >> */ >> ALTERNATIVE "b __memset_generic", \ >> "b __memset_fast", CPU_FEATURE_UAL >> SYM_FUNC_END(memset) >> +SYM_FUNC_ALIAS(__memset, memset) >> _ASM_NOKPROBE(memset) >> >> EXPORT_SYMBOL(memset) >> +EXPORT_SYMBOL(__memset) >> >> /* >> * void *__memset_generic(void *s, int c, size_t n) >> diff --git a/arch/loongarch/mm/Makefile b/arch/loongarch/mm/Makefile >> index 8ffc6383f836..6e50cf6cf733 100644 >> --- a/arch/loongarch/mm/Makefile >> +++ b/arch/loongarch/mm/Makefile >> @@ -7,3 +7,5 @@ obj-y += init.o cache.o tlb.o tlbex.o >> extable.o \ >> fault.o ioremap.o maccess.o mmap.o pgtable.o page.o >> >> obj-$(CONFIG_HUGETLB_PAGE) += hugetlbpage.o >> +obj-$(CONFIG_KASAN) += kasan_init.o >> +KASAN_SANITIZE_kasan_init.o := n >> diff --git a/arch/loongarch/mm/kasan_init.c >> b/arch/loongarch/mm/kasan_init.c >> new file mode 100644 >> index 000000000000..fb3077f8d508 >> --- /dev/null >> +++ b/arch/loongarch/mm/kasan_init.c >> @@ -0,0 +1,255 @@ >> +// SPDX-License-Identifier: GPL-2.0-only >> +/* >> + * Copyright (C) 2023 Loongson Technology Corporation Limited >> + */ >> +#define pr_fmt(fmt) "kasan: " fmt >> +#include <linux/kasan.h> >> +#include <linux/memblock.h> >> +#include <linux/sched/task.h> >> + >> +#include <asm/tlbflush.h> >> +#include <asm/pgalloc.h> >> +#include <asm-generic/sections.h> >> + >> +static pgd_t tmp_pg_dir[PTRS_PER_PGD] __initdata __aligned(PAGE_SIZE); >> + >> +static inline int __p4d_none(int early, p4d_t p4d) {return 0; } >> + >> +#ifndef __PAGETABLE_PUD_FOLDED >> +#define __p4d_none(early, p4d) (early ? (p4d_val(p4d) == 0) : \ >> +(__pa(p4d_val(p4d)) == (unsigned long)__pa(kasan_early_shadow_pud))) >> +#endif >> + >> +#define __pud_none(early, pud) (early ? (pud_val(pud) == 0) : \ >> +(__pa(pud_val(pud)) == (unsigned long)__pa(kasan_early_shadow_pmd))) >> + >> +#define __pmd_none(early, pmd) (early ? (pmd_val(pmd) == 0) : \ >> +(__pa(pmd_val(pmd)) == (unsigned long)__pa(kasan_early_shadow_pte))) >> + >> +#define __pte_none(early, pte) (early ? pte_none(pte) : \ >> +((pte_val(pte) & _PFN_MASK) == (unsigned >> long)__pa(kasan_early_shadow_page))) >> + >> +bool kasan_early_stage = true; >> + >> +/* >> + * Alloc memory for shadow memory page table. >> + */ >> +static phys_addr_t __init kasan_alloc_zeroed_page(int node) >> +{ >> + void *p = memblock_alloc_try_nid(PAGE_SIZE, PAGE_SIZE, >> + __pa(MAX_DMA_ADDRESS), >> + MEMBLOCK_ALLOC_ACCESSIBLE, node); >> + if (!p) >> + panic("%s: Failed to allocate %lu bytes align=0x%lx nid=%d >> from=%llx\n", >> + __func__, PAGE_SIZE, PAGE_SIZE, node, >> __pa(MAX_DMA_ADDRESS)); >> + return __pa(p); >> +} >> + >> +static pte_t *kasan_pte_offset(pmd_t *pmdp, unsigned long addr, int >> node, >> + bool early) >> +{ >> + if (__pmd_none(early, READ_ONCE(*pmdp))) { >> + phys_addr_t pte_phys = early ? >> + __pa_symbol(kasan_early_shadow_pte) >> + : kasan_alloc_zeroed_page(node); >> + if (!early) >> + memcpy(__va(pte_phys), kasan_early_shadow_pte, >> + sizeof(kasan_early_shadow_pte)); >> + pmd_populate_kernel(NULL, pmdp, (pte_t *)__va(pte_phys)); >> + } >> + >> + return pte_offset_kernel(pmdp, addr); >> +} >> + >> +static inline void kasan_set_pgd(pgd_t *pgdp, pgd_t pgdval) >> +{ >> + WRITE_ONCE(*pgdp, pgdval); >> +} >> + >> +static pmd_t *kasan_pmd_offset(pud_t *pudp, unsigned long addr, int >> node, >> + bool early) >> +{ >> + if (__pud_none(early, READ_ONCE(*pudp))) { >> + phys_addr_t pmd_phys = early ? >> + __pa_symbol(kasan_early_shadow_pmd) >> + : kasan_alloc_zeroed_page(node); >> + if (!early) >> + memcpy(__va(pmd_phys), kasan_early_shadow_pmd, >> + sizeof(kasan_early_shadow_pmd)); >> + pud_populate(&init_mm, pudp, (pmd_t *)__va(pmd_phys)); >> + } >> + >> + return pmd_offset(pudp, addr); >> +} >> + >> +static pud_t *__init kasan_pud_offset(p4d_t *p4dp, unsigned long >> addr, int node, >> + bool early) >> +{ >> + if (__p4d_none(early, READ_ONCE(*p4dp))) { >> + phys_addr_t pud_phys = early ? >> + __pa_symbol(kasan_early_shadow_pud) >> + : kasan_alloc_zeroed_page(node); >> + if (!early) >> + memcpy(__va(pud_phys), kasan_early_shadow_pud, >> + sizeof(kasan_early_shadow_pud)); >> + p4d_populate(&init_mm, p4dp, (pud_t *)__va(pud_phys)); >> + } >> + >> + return pud_offset(p4dp, addr); >> +} >> + >> +static void kasan_pte_populate(pmd_t *pmdp, unsigned long addr, >> + unsigned long end, int node, bool early) >> +{ >> + unsigned long next; >> + pte_t *ptep = kasan_pte_offset(pmdp, addr, node, early); >> + >> + do { >> + phys_addr_t page_phys = early ? >> + __pa_symbol(kasan_early_shadow_page) >> + : kasan_alloc_zeroed_page(node); >> + next = addr + PAGE_SIZE; >> + set_pte(ptep, pfn_pte(__phys_to_pfn(page_phys), PAGE_KERNEL)); >> + } while (ptep++, addr = next, addr != end && __pte_none(early, >> READ_ONCE(*ptep))); >> +} >> + >> +static void kasan_pmd_populate(pud_t *pudp, unsigned long addr, >> + unsigned long end, int node, bool early) >> +{ >> + unsigned long next; >> + pmd_t *pmdp = kasan_pmd_offset(pudp, addr, node, early); >> + >> + do { >> + next = pmd_addr_end(addr, end); >> + kasan_pte_populate(pmdp, addr, next, node, early); >> + } while (pmdp++, addr = next, addr != end && __pmd_none(early, >> READ_ONCE(*pmdp))); >> +} >> + >> +static void __init kasan_pud_populate(p4d_t *p4dp, unsigned long addr, >> + unsigned long end, int node, bool early) >> +{ >> + unsigned long next; >> + pud_t *pudp = kasan_pud_offset(p4dp, addr, node, early); >> + >> + do { >> + next = pud_addr_end(addr, end); >> + kasan_pmd_populate(pudp, addr, next, node, early); >> + } while (pudp++, addr = next, addr != end); >> +} >> + >> +static void __init kasan_p4d_populate(pgd_t *pgdp, unsigned long addr, >> + unsigned long end, int node, bool early) >> +{ >> + unsigned long next; >> + p4d_t *p4dp = p4d_offset(pgdp, addr); >> + >> + do { >> + next = p4d_addr_end(addr, end); >> + kasan_pud_populate(p4dp, addr, next, node, early); >> + } while (p4dp++, addr = next, addr != end); >> +} >> + >> +static void __init kasan_pgd_populate(unsigned long addr, unsigned >> long end, >> + int node, bool early) >> +{ >> + unsigned long next; >> + pgd_t *pgdp; >> + >> + pgdp = pgd_offset_k(addr); >> + >> + do { >> + next = pgd_addr_end(addr, end); >> + kasan_p4d_populate(pgdp, addr, next, node, early); >> + } while (pgdp++, addr = next, addr != end); >> + >> +} >> + >> +asmlinkage void __init kasan_early_init(void) >> +{ >> + BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_START, PGDIR_SIZE)); >> + BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_END, PGDIR_SIZE)); >> +} >> + >> +/* Set up full kasan mappings, ensuring that the mapped pages are >> zeroed */ >> +static void __init kasan_map_populate(unsigned long start, unsigned >> long end, >> + int node) >> +{ >> + kasan_pgd_populate(start & PAGE_MASK, PAGE_ALIGN(end), node, false); >> +} >> + >> +static void __init clear_pgds(unsigned long start, unsigned long end) >> +{ >> + /* >> + * Remove references to kasan page tables from >> + * swapper_pg_dir. pgd_clear() can't be used >> + * here because it's nop on 2,3-level pagetable setups >> + */ >> + for (; start < end; start += PGDIR_SIZE) >> + kasan_set_pgd((pgd_t *)pgd_offset_k(start), __pgd(0)); >> +} >> + >> +void __init kasan_init(void) >> +{ >> + u64 i; >> + phys_addr_t pa_start, pa_end; >> + /* >> + * PGD was populated as invalid_pmd_table or invalid_pud_table >> + * in pagetable_init() which depends on how many levels of page >> + * table you are using, but we had to clean the gpd of kasan >> + * shadow memory, as the pgd value is none-zero. >> + * The assertion pgd_none is going to be false and the formal >> populate >> + * afterwards is not going to create any new pgd at all. >> + */ >> + memcpy(tmp_pg_dir, swapper_pg_dir, sizeof(tmp_pg_dir)); >> + __sync(); >> + csr_write64(__pa_symbol(tmp_pg_dir), LOONGARCH_CSR_PGDH); >> + local_flush_tlb_all(); >> + >> + clear_pgds(KASAN_SHADOW_START, KASAN_SHADOW_END); >> + >> + /* Maps everything to a single page of zeroes */ >> + kasan_pgd_populate(KASAN_SHADOW_START, KASAN_SHADOW_END, >> + NUMA_NO_NODE, true); >> + >> + kasan_populate_early_shadow(kasan_mem_to_shadow((void >> *)MODULES_END), >> + kasan_mem_to_shadow((void *)VMEMMAP_END)); >> + >> + if (!IS_ENABLED(CONFIG_KASAN_VMALLOC)) >> + kasan_populate_early_shadow(kasan_mem_to_shadow((void >> *)VMALLOC_START), >> + kasan_mem_to_shadow((void *)VMALLOC_END)); >> + >> + kasan_early_stage = false; >> + >> + /* Populate the linear mapping */ >> + for_each_mem_range(i, &pa_start, &pa_end) { >> + void *start = (void *)phys_to_virt(pa_start); >> + void *end = (void *)phys_to_virt(pa_end); >> + >> + if (start >= end) >> + break; >> + >> + kasan_map_populate((unsigned long)kasan_mem_to_shadow(start), >> + (unsigned long)kasan_mem_to_shadow(end), NUMA_NO_NODE); >> + } >> + >> + /* Populate modules mapping */ >> + kasan_map_populate((unsigned long)kasan_mem_to_shadow((void >> *)MODULES_VADDR), >> + (unsigned long)kasan_mem_to_shadow((void *)MODULES_END), >> NUMA_NO_NODE); >> + /* >> + * Kasan may reuse the contents of kasan_early_shadow_pte >> directly, so we >> + * should make sure that it maps the zero page read-only. >> + */ >> + for (i = 0; i < PTRS_PER_PTE; i++) >> + set_pte(&kasan_early_shadow_pte[i], >> + pfn_pte(__phys_to_pfn(__pa_symbol(kasan_early_shadow_page)), >> + PAGE_KERNEL_RO)); >> + >> + memset(kasan_early_shadow_page, 0, PAGE_SIZE); >> + __sync(); >> + csr_write64(__pa_symbol(swapper_pg_dir), LOONGARCH_CSR_PGDH); >> + local_flush_tlb_all(); >> + >> + /* At this point kasan is fully initialized. Enable error >> messages */ >> + init_task.kasan_depth = 0; >> + pr_info("KernelAddressSanitizer initialized.\n"); >> +} >> diff --git a/arch/loongarch/vdso/Makefile b/arch/loongarch/vdso/Makefile >> index d89e2ac75f7b..df328cd92875 100644 >> --- a/arch/loongarch/vdso/Makefile >> +++ b/arch/loongarch/vdso/Makefile >> @@ -1,6 +1,10 @@ >> # SPDX-License-Identifier: GPL-2.0 >> # Objects to go into the VDSO. >> >> +ifdef CONFIG_KASAN >> +KASAN_SANITIZE := n >> +endif >> + >> # Absolute relocation type $(ARCH_REL_TYPE_ABS) needs to be defined >> before >> # the inclusion of generic Makefile. >> ARCH_REL_TYPE_ABS := >> R_LARCH_32|R_LARCH_64|R_LARCH_MARK_LA|R_LARCH_JUMP_SLOT >> diff --git a/include/linux/kasan.h b/include/linux/kasan.h >> index f7ef70661ce2..3b91b941873d 100644 >> --- a/include/linux/kasan.h >> +++ b/include/linux/kasan.h >> @@ -54,11 +54,13 @@ extern p4d_t >> kasan_early_shadow_p4d[MAX_PTRS_PER_P4D]; >> int kasan_populate_early_shadow(const void *shadow_start, >> const void *shadow_end); >> >> +#ifndef __HAVE_ARCH_SHADOW_MAP >> static inline void *kasan_mem_to_shadow(const void *addr) >> { >> return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) >> + KASAN_SHADOW_OFFSET; >> } >> +#endif >> >> int kasan_add_zero_shadow(void *start, unsigned long size); >> void kasan_remove_zero_shadow(void *start, unsigned long size); >> diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c >> index e5eef670735e..f86194750df5 100644 >> --- a/mm/kasan/generic.c >> +++ b/mm/kasan/generic.c >> @@ -175,6 +175,11 @@ static __always_inline bool >> check_region_inline(unsigned long addr, >> if (unlikely(!addr_has_metadata((void *)addr))) >> return !kasan_report(addr, size, write, ret_ip); >> >> +#ifndef __HAVE_ARCH_SHADOW_MAP >> + if (unlikely(kasan_mem_to_shadow((unsigned long *)addr) == NULL)) >> + return !kasan_report(addr, size, write, ret_ip); >> +#endif >> + >> if (likely(!memory_is_poisoned(addr, size))) >> return true; >> >> diff --git a/mm/kasan/init.c b/mm/kasan/init.c >> index cc64ed6858c6..860061a22ca9 100644 >> --- a/mm/kasan/init.c >> +++ b/mm/kasan/init.c >> @@ -166,8 +166,9 @@ static int __ref zero_pud_populate(p4d_t *p4d, >> unsigned long addr, >> if (!p) >> return -ENOMEM; >> } else { >> - pud_populate(&init_mm, pud, >> - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); >> + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); >> + pmd_init(p); >> + pud_populate(&init_mm, pud, p); >> } >> } >> zero_pmd_populate(pud, addr, next); >> @@ -207,8 +208,9 @@ static int __ref zero_p4d_populate(pgd_t *pgd, >> unsigned long addr, >> if (!p) >> return -ENOMEM; >> } else { >> - p4d_populate(&init_mm, p4d, >> - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); >> + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); >> + pud_init(p); >> + p4d_populate(&init_mm, p4d, p); >> } >> } >> zero_pud_populate(p4d, addr, next); >> diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h >> index a61eeee3095a..033335c13b25 100644 >> --- a/mm/kasan/kasan.h >> +++ b/mm/kasan/kasan.h >> @@ -291,16 +291,22 @@ struct kasan_stack_ring { >> >> #if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS) >> >> +#ifndef __HAVE_ARCH_SHADOW_MAP >> static inline const void *kasan_shadow_to_mem(const void *shadow_addr) >> { >> return (void *)(((unsigned long)shadow_addr - KASAN_SHADOW_OFFSET) >> << KASAN_SHADOW_SCALE_SHIFT); >> } >> +#endif >> >> static __always_inline bool addr_has_metadata(const void *addr) >> { >> +#ifdef __HAVE_ARCH_SHADOW_MAP >> + return (kasan_mem_to_shadow((void *)addr) != NULL); >> +#else >> return (kasan_reset_tag(addr) >= >> kasan_shadow_to_mem((void *)KASAN_SHADOW_START)); >> +#endif >> } >> >> /** >>
On Tue, Mar 28, 2023 at 8:15 PM Qing Zhang <zhangqing@loongson.cn> wrote: > > Hi, Ruoyao > > On 2023/3/28 下午7:39, Xi Ruoyao wrote: > > On Tue, 2023-03-28 at 19:17 +0800, Qing Zhang wrote: > > > > /* snip */ > > > > > >> -void * __init relocate_kernel(void) > >> +unsigned long __init relocate_kernel(void) > > > > Why we must modify relocate_kernel for KASAN? > > When the CONFIG_RANDOMIZE_BASE is enabled, the kernel will be updated to > a random new address. > Kasan needs to call kasan_early_init before start_kernel. > There are two situations: > 1> After enabling CONFIG_RELOCATABLE, call kasan_early_init. > 2> After CONFIG_RELOCATABLE is not enabled, call kasan_early_init. > > In order to prevent code redundancy and semantic problems caused by > calling kasan_early_init (before jr a0) at the old PC. In my opinion, you can call kasan_early_init before relocate_kernel in head.S, then no redundancy. Huacai > > Thanks, > -Qing > > > >> { > >> unsigned long kernel_length; > >> unsigned long random_offset = 0; > >> void *location_new = _text; /* Default to original kernel start */ > >> - void *kernel_entry = start_kernel; /* Default to original kernel entry point */ > >> char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ > >> > >> strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); > >> @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) > >> > >> reloc_offset += random_offset; > >> > >> - /* Return the new kernel's entry point */ > >> - kernel_entry = RELOCATED_KASLR(start_kernel); > >> - > >> /* The current thread is now within the relocated kernel */ > >> __current_thread_info = RELOCATED_KASLR(__current_thread_info); > >> > >> @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) > >> > >> relocate_absolute(random_offset); > >> > >> - return kernel_entry; > >> + return random_offset; > > >
Hi, Huacai On 2023/3/29 上午8:22, Huacai Chen wrote: > On Tue, Mar 28, 2023 at 8:15 PM Qing Zhang <zhangqing@loongson.cn> wrote: >> >> Hi, Ruoyao >> >> On 2023/3/28 下午7:39, Xi Ruoyao wrote: >>> On Tue, 2023-03-28 at 19:17 +0800, Qing Zhang wrote: >>> >>> /* snip */ >>> >>> >>>> -void * __init relocate_kernel(void) >>>> +unsigned long __init relocate_kernel(void) >>> >>> Why we must modify relocate_kernel for KASAN? >> >> When the CONFIG_RANDOMIZE_BASE is enabled, the kernel will be updated to >> a random new address. >> Kasan needs to call kasan_early_init before start_kernel. >> There are two situations: >> 1> After enabling CONFIG_RELOCATABLE, call kasan_early_init. >> 2> After CONFIG_RELOCATABLE is not enabled, call kasan_early_init. >> >> In order to prevent code redundancy and semantic problems caused by >> calling kasan_early_init (before jr a0) at the old PC. > In my opinion, you can call kasan_early_init before relocate_kernel in > head.S, then no redundancy. > It has no effect now, but kasan_early_init generally maps everything to a single page of zeroes in kasan area, if placed Before relocate_kernel, when the kernel was relocated, I worried that there were changes other than the memory layout. Thanks, - Qing > Huacai >> >> Thanks, >> -Qing >>> >>>> { >>>> unsigned long kernel_length; >>>> unsigned long random_offset = 0; >>>> void *location_new = _text; /* Default to original kernel start */ >>>> - void *kernel_entry = start_kernel; /* Default to original kernel entry point */ >>>> char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ >>>> >>>> strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); >>>> @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) >>>> >>>> reloc_offset += random_offset; >>>> >>>> - /* Return the new kernel's entry point */ >>>> - kernel_entry = RELOCATED_KASLR(start_kernel); >>>> - >>>> /* The current thread is now within the relocated kernel */ >>>> __current_thread_info = RELOCATED_KASLR(__current_thread_info); >>>> >>>> @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) >>>> >>>> relocate_absolute(random_offset); >>>> >>>> - return kernel_entry; >>>> + return random_offset; >>> >>
> diff --git a/include/linux/kasan.h b/include/linux/kasan.h > index f7ef70661ce2..3b91b941873d 100644 > --- a/include/linux/kasan.h > +++ b/include/linux/kasan.h > @@ -54,11 +54,13 @@ extern p4d_t kasan_early_shadow_p4d[MAX_PTRS_PER_P4D]; > int kasan_populate_early_shadow(const void *shadow_start, > const void *shadow_end); > > +#ifndef __HAVE_ARCH_SHADOW_MAP > static inline void *kasan_mem_to_shadow(const void *addr) > { > return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) > + KASAN_SHADOW_OFFSET; > } > +#endif > > int kasan_add_zero_shadow(void *start, unsigned long size); > void kasan_remove_zero_shadow(void *start, unsigned long size); > diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c > index e5eef670735e..f86194750df5 100644 > --- a/mm/kasan/generic.c > +++ b/mm/kasan/generic.c > @@ -175,6 +175,11 @@ static __always_inline bool check_region_inline(unsigned long addr, > if (unlikely(!addr_has_metadata((void *)addr))) > return !kasan_report(addr, size, write, ret_ip); > > +#ifndef __HAVE_ARCH_SHADOW_MAP > + if (unlikely(kasan_mem_to_shadow((unsigned long *)addr) == NULL)) > + return !kasan_report(addr, size, write, ret_ip); > +#endif This should have been ifdef, right? But I don't think you need this check here at all: addr_has_metadata already checks that shadow exists. > + > if (likely(!memory_is_poisoned(addr, size))) > return true; > > diff --git a/mm/kasan/init.c b/mm/kasan/init.c > index cc64ed6858c6..860061a22ca9 100644 > --- a/mm/kasan/init.c > +++ b/mm/kasan/init.c > @@ -166,8 +166,9 @@ static int __ref zero_pud_populate(p4d_t *p4d, unsigned long addr, > if (!p) > return -ENOMEM; > } else { > - pud_populate(&init_mm, pud, > - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); > + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); > + pmd_init(p); > + pud_populate(&init_mm, pud, p); > } > } > zero_pmd_populate(pud, addr, next); > @@ -207,8 +208,9 @@ static int __ref zero_p4d_populate(pgd_t *pgd, unsigned long addr, > if (!p) > return -ENOMEM; > } else { > - p4d_populate(&init_mm, p4d, > - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); > + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); > + pud_init(p); > + p4d_populate(&init_mm, p4d, p); Please explain why these changes are needed in the patch description. > } > } > zero_pud_populate(p4d, addr, next); > diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h > index a61eeee3095a..033335c13b25 100644 > --- a/mm/kasan/kasan.h > +++ b/mm/kasan/kasan.h > @@ -291,16 +291,22 @@ struct kasan_stack_ring { > > #if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS) > > +#ifndef __HAVE_ARCH_SHADOW_MAP > static inline const void *kasan_shadow_to_mem(const void *shadow_addr) > { > return (void *)(((unsigned long)shadow_addr - KASAN_SHADOW_OFFSET) > << KASAN_SHADOW_SCALE_SHIFT); > } > +#endif > > static __always_inline bool addr_has_metadata(const void *addr) > { > +#ifdef __HAVE_ARCH_SHADOW_MAP > + return (kasan_mem_to_shadow((void *)addr) != NULL); > +#else > return (kasan_reset_tag(addr) >= > kasan_shadow_to_mem((void *)KASAN_SHADOW_START)); > +#endif > } > > /** > -- > 2.20.1 >
Hi, Andrey On 2023/3/30 上午3:02, Andrey Konovalov wrote: >> diff --git a/include/linux/kasan.h b/include/linux/kasan.h >> index f7ef70661ce2..3b91b941873d 100644 >> --- a/include/linux/kasan.h >> +++ b/include/linux/kasan.h >> @@ -54,11 +54,13 @@ extern p4d_t kasan_early_shadow_p4d[MAX_PTRS_PER_P4D]; >> int kasan_populate_early_shadow(const void *shadow_start, >> const void *shadow_end); >> >> +#ifndef __HAVE_ARCH_SHADOW_MAP >> static inline void *kasan_mem_to_shadow(const void *addr) >> { >> return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) >> + KASAN_SHADOW_OFFSET; >> } >> +#endif >> >> int kasan_add_zero_shadow(void *start, unsigned long size); >> void kasan_remove_zero_shadow(void *start, unsigned long size); >> diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c >> index e5eef670735e..f86194750df5 100644 >> --- a/mm/kasan/generic.c >> +++ b/mm/kasan/generic.c >> @@ -175,6 +175,11 @@ static __always_inline bool check_region_inline(unsigned long addr, >> if (unlikely(!addr_has_metadata((void *)addr))) >> return !kasan_report(addr, size, write, ret_ip); >> >> +#ifndef __HAVE_ARCH_SHADOW_MAP >> + if (unlikely(kasan_mem_to_shadow((unsigned long *)addr) == NULL)) >> + return !kasan_report(addr, size, write, ret_ip); >> +#endif > > This should have been ifdef, right? > Sorry, it was a clerical error, Here it is #ifndef __HAVE_ARCH_SHADOW_MAP if (unlikely(! addr_has_metadata((void *)addr))) return ! kasan_report(addr, size, write, ret_ip); #else if (unlikely(kasan_mem_to_shadow((void *)addr) == NULL)) { kasan_report(addr, size, write, ret_ip); return; } #endif > But I don't think you need this check here at all: addr_has_metadata > already checks that shadow exists. > On LongArch, there's a lot of holes between different segments, so kasan shadow area is some different type of memory that we concatenate, we can't use if (unlikely((void *)addr < kasan_shadow_to_mem((void *)KASAN_SHADOW_START))) to determine the validity, and in arch/loongarch/include/asm/kasan.h I construct invalid NULL. >> + >> if (likely(!memory_is_poisoned(addr, size))) >> return true; >> >> diff --git a/mm/kasan/init.c b/mm/kasan/init.c >> index cc64ed6858c6..860061a22ca9 100644 >> --- a/mm/kasan/init.c >> +++ b/mm/kasan/init.c >> @@ -166,8 +166,9 @@ static int __ref zero_pud_populate(p4d_t *p4d, unsigned long addr, >> if (!p) >> return -ENOMEM; >> } else { >> - pud_populate(&init_mm, pud, >> - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); >> + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); >> + pmd_init(p); >> + pud_populate(&init_mm, pud, p); >> } >> } >> zero_pmd_populate(pud, addr, next); >> @@ -207,8 +208,9 @@ static int __ref zero_p4d_populate(pgd_t *pgd, unsigned long addr, >> if (!p) >> return -ENOMEM; >> } else { >> - p4d_populate(&init_mm, p4d, >> - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); >> + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); >> + pud_init(p); >> + p4d_populate(&init_mm, p4d, p); > > Please explain why these changes are needed in the patch description. This is because in pagetable_init on loongarch/mips, we populate pmd/pud with invalid_pmd_table/invalid_pud_table, So pmd_init/pud_init(p) is required, perhaps we define them as __weak in mm/kasan/init.c, like mm/sparse-vmemmap.c. diff --git a/include/linux/mm.h b/include/linux/mm.h ... +void pmd_init(void *addr); +void pud_init(void *addr); ... diff --git a/mm/sparse-vmemmap.c b/mm/sparse-vmemmap.c ... +void __weak __meminit pmd_init(void *addr) + { +} + @@-203,11 +207,16 @@pud_t * __meminit vmemmap_pud_populate(p4d_t *p4d, unsigned long addr, int node) void *p = vmemmap_alloc_block_zero(PAGE_SIZE, node); if (! p) return NULL; + pmd_init(p); pud_populate(&init_mm, pud, p); } return pud; } +void __weak __meminit pud_init(void *addr) + { +} + p4d_t * __meminit vmemmap_p4d_populate(pgd_t *pgd, unsigned long addr, int node) { p4d_t *p4d = p4d_offset(pgd, addr); @@-215,6 +224,7 @@p4d_t * __meminit vmemmap_p4d_populate(pgd_t *pgd, unsigned long addr, int node) void *p = vmemmap_alloc_block_zero(PAGE_SIZE, node); if (! p) return NULL; + pud_init(p); p4d_populate(&init_mm, p4d, p); } return p4d; Thanks, - Qing > >> } >> } >> zero_pud_populate(p4d, addr, next); >> diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h >> index a61eeee3095a..033335c13b25 100644 >> --- a/mm/kasan/kasan.h >> +++ b/mm/kasan/kasan.h >> @@ -291,16 +291,22 @@ struct kasan_stack_ring { >> >> #if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS) >> >> +#ifndef __HAVE_ARCH_SHADOW_MAP >> static inline const void *kasan_shadow_to_mem(const void *shadow_addr) >> { >> return (void *)(((unsigned long)shadow_addr - KASAN_SHADOW_OFFSET) >> << KASAN_SHADOW_SCALE_SHIFT); >> } >> +#endif >> >> static __always_inline bool addr_has_metadata(const void *addr) >> { >> +#ifdef __HAVE_ARCH_SHADOW_MAP >> + return (kasan_mem_to_shadow((void *)addr) != NULL); >> +#else >> return (kasan_reset_tag(addr) >= >> kasan_shadow_to_mem((void *)KASAN_SHADOW_START)); >> +#endif >> } >> >> /** >> -- >> 2.20.1 >>
On Thu, Mar 30, 2023 at 4:06 AM Qing Zhang <zhangqing@loongson.cn> wrote: > > > But I don't think you need this check here at all: addr_has_metadata > > already checks that shadow exists. > > > On LongArch, there's a lot of holes between different segments, so kasan > shadow area is some different type of memory that we concatenate, we > can't use if (unlikely((void *)addr < > kasan_shadow_to_mem((void *)KASAN_SHADOW_START))) to determine the > validity, and in arch/loongarch/include/asm/kasan.h I construct invalid > NULL. I get that, but you already added a special case for __HAVE_ARCH_SHADOW_MAP to addr_has_metadata, so you can just call it? > This is because in pagetable_init on loongarch/mips, we populate pmd/pud > with invalid_pmd_table/invalid_pud_table, I see. Please add this into the patch description for v2. > So pmd_init/pud_init(p) is required, perhaps we define them as __weak in > mm/kasan/init.c, like mm/sparse-vmemmap.c. Yes, this makes sense to do, so that KASAN doesn't depend on definitions from sparse-vmemmap.c. Thank you!
On 2023/3/30 上午10:55, Andrey Konovalov wrote: > On Thu, Mar 30, 2023 at 4:06 AM Qing Zhang <zhangqing@loongson.cn> wrote: >> >>> But I don't think you need this check here at all: addr_has_metadata >>> already checks that shadow exists. >>> >> On LongArch, there's a lot of holes between different segments, so kasan >> shadow area is some different type of memory that we concatenate, we >> can't use if (unlikely((void *)addr < >> kasan_shadow_to_mem((void *)KASAN_SHADOW_START))) to determine the >> validity, and in arch/loongarch/include/asm/kasan.h I construct invalid >> NULL. > > I get that, but you already added a special case for > __HAVE_ARCH_SHADOW_MAP to addr_has_metadata, so you can just call it? > ok, all the changes are going to be in v2. Thanks, -Qing >> This is because in pagetable_init on loongarch/mips, we populate pmd/pud >> with invalid_pmd_table/invalid_pud_table, > > I see. Please add this into the patch description for v2. > >> So pmd_init/pud_init(p) is required, perhaps we define them as __weak in >> mm/kasan/init.c, like mm/sparse-vmemmap.c. > > Yes, this makes sense to do, so that KASAN doesn't depend on > definitions from sparse-vmemmap.c. > > Thank you! >
Hi, Qing On 03/28/2023 07:17 PM, Qing Zhang wrote: > 1/8 of kernel addresses reserved for shadow memory. But for LoongArch, > There are a lot of holes between different segments and valid address > space(256T available) is insufficient to map all these segments to kasan > shadow memory with the common formula provided by kasan core, saying > addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET > > So Loongarch has a ARCH specific mapping formula,different segments > are mapped individually, and only limited length of space of that > specific segment is mapped to shadow. > > At early boot stage the whole shadow region populated with just > one physical page (kasan_early_shadow_page). Later, this page is > reused as readonly zero shadow for some memory that Kasan currently > don't track. > After mapping the physical memory, pages for shadow memory are > allocated and mapped. > > Functions like memset/memmove/memcpy do a lot of memory accesses. > If bad pointer passed to one of these function it is important > to catch this. Compiler's instrumentation cannot do this since > these functions are written in assembly. > KASan replaces memory functions with manually instrumented variants. > Original functions declared as weak symbols so strong definitions > in mm/kasan/kasan.c could replace them. Original functions have aliases > with '__' prefix in name, so we could call non-instrumented variant > if needed. > > Signed-off-by: Qing Zhang <zhangqing@loongson.cn> > --- > Documentation/dev-tools/kasan.rst | 4 +- > .../features/debug/KASAN/arch-support.txt | 2 +- > arch/loongarch/Kconfig | 7 + > arch/loongarch/include/asm/kasan.h | 120 +++++++++ > arch/loongarch/include/asm/pgtable.h | 7 + > arch/loongarch/include/asm/setup.h | 2 +- > arch/loongarch/include/asm/string.h | 20 ++ > arch/loongarch/kernel/Makefile | 3 + > arch/loongarch/kernel/head.S | 14 +- > arch/loongarch/kernel/relocate.c | 8 +- > arch/loongarch/kernel/setup.c | 4 + > arch/loongarch/lib/memcpy.S | 4 +- > arch/loongarch/lib/memmove.S | 13 +- > arch/loongarch/lib/memset.S | 4 +- > arch/loongarch/mm/Makefile | 2 + > arch/loongarch/mm/kasan_init.c | 255 ++++++++++++++++++ > arch/loongarch/vdso/Makefile | 4 + > include/linux/kasan.h | 2 + > mm/kasan/generic.c | 5 + > mm/kasan/init.c | 10 +- > mm/kasan/kasan.h | 6 + > 21 files changed, 470 insertions(+), 26 deletions(-) > create mode 100644 arch/loongarch/include/asm/kasan.h > create mode 100644 arch/loongarch/mm/kasan_init.c > > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst > index e66916a483cd..ee91f2872767 100644 > --- a/Documentation/dev-tools/kasan.rst > +++ b/Documentation/dev-tools/kasan.rst > @@ -41,8 +41,8 @@ Support > Architectures > ~~~~~~~~~~~~~ > > -Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, and > -xtensa, and the tag-based KASAN modes are supported only on arm64. > +Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, xtensa, > +and loongarch, and the tag-based KASAN modes are supported only on arm64. > > Compilers > ~~~~~~~~~ > diff --git a/Documentation/features/debug/KASAN/arch-support.txt b/Documentation/features/debug/KASAN/arch-support.txt > index bf0124fae643..c4581c2edb28 100644 > --- a/Documentation/features/debug/KASAN/arch-support.txt > +++ b/Documentation/features/debug/KASAN/arch-support.txt > @@ -13,7 +13,7 @@ > | csky: | TODO | > | hexagon: | TODO | > | ia64: | TODO | > - | loongarch: | TODO | > + | loongarch: | ok | > | m68k: | TODO | > | microblaze: | TODO | > | mips: | TODO | > diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig > index 72dd00f48b8c..61f883c51045 100644 > --- a/arch/loongarch/Kconfig > +++ b/arch/loongarch/Kconfig > @@ -7,6 +7,7 @@ config LOONGARCH > select ACPI_MCFG if ACPI > select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI > select ARCH_BINFMT_ELF_STATE > + select ARCH_DISABLE_KASAN_INLINE > select ARCH_ENABLE_MEMORY_HOTPLUG > select ARCH_ENABLE_MEMORY_HOTREMOVE > select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI > @@ -83,6 +84,7 @@ config LOONGARCH > select HAVE_ARCH_AUDITSYSCALL > select HAVE_ARCH_MMAP_RND_BITS if MMU > select HAVE_ARCH_SECCOMP_FILTER > + select HAVE_ARCH_KASAN if 64BIT > select HAVE_ARCH_TRACEHOOK > select HAVE_ARCH_TRANSPARENT_HUGEPAGE > select HAVE_ASM_MODVERSIONS > @@ -626,6 +628,11 @@ config ARCH_MMAP_RND_BITS_MIN > config ARCH_MMAP_RND_BITS_MAX > default 18 > > +config KASAN_SHADOW_OFFSET > + hex > + default 0x0 > + depends on KASAN > + > menu "Power management options" > > config ARCH_SUSPEND_POSSIBLE > diff --git a/arch/loongarch/include/asm/kasan.h b/arch/loongarch/include/asm/kasan.h > new file mode 100644 > index 000000000000..582bcded311e > --- /dev/null > +++ b/arch/loongarch/include/asm/kasan.h > @@ -0,0 +1,120 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef __ASM_KASAN_H > +#define __ASM_KASAN_H > + > +#ifndef __ASSEMBLY__ > + > +#include <linux/linkage.h> > +#include <linux/mmzone.h> > +#include <asm/addrspace.h> > +#include <asm/io.h> > +#include <asm/pgtable.h> > + > +#define __HAVE_ARCH_SHADOW_MAP > + > +#define KASAN_SHADOW_SCALE_SHIFT 3 > +#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) > + > +#define XRANGE_SHIFT (48) > + > +/* Valid address length */ > +#define XRANGE_SHADOW_SHIFT (PGDIR_SHIFT + PAGE_SHIFT - 3) > +/* Used for taking out the valid address */ > +#define XRANGE_SHADOW_MASK GENMASK_ULL(XRANGE_SHADOW_SHIFT - 1, 0) > +/* One segment whole address space size */ > +#define XRANGE_SIZE (XRANGE_SHADOW_MASK + 1) > + > +/* 64-bit segment value. */ > +#define XKPRANGE_UC_SEG (0x8000) > +#define XKPRANGE_CC_SEG (0x9000) > +#define XKVRANGE_VC_SEG (0xffff) > + > +/* Cached */ > +#define XKPRANGE_CC_START CACHE_BASE > +#define XKPRANGE_CC_SIZE XRANGE_SIZE > +#define XKPRANGE_CC_KASAN_OFFSET (0) > +#define XKPRANGE_CC_SHADOW_SIZE (XKPRANGE_CC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_CC_SHADOW_END (XKPRANGE_CC_KASAN_OFFSET + XKPRANGE_CC_SHADOW_SIZE) > + > +/* UnCached */ > +#define XKPRANGE_UC_START UNCACHE_BASE > +#define XKPRANGE_UC_SIZE XRANGE_SIZE > +#define XKPRANGE_UC_KASAN_OFFSET XKPRANGE_CC_SHADOW_END > +#define XKPRANGE_UC_SHADOW_SIZE (XKPRANGE_UC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_UC_SHADOW_END (XKPRANGE_UC_KASAN_OFFSET + XKPRANGE_UC_SHADOW_SIZE) > + > +/* VMALLOC (Cached or UnCached) */ > +#define XKVRANGE_VC_START MODULES_VADDR > +#define XKVRANGE_VC_SIZE round_up(VMEMMAP_END - MODULES_VADDR + 1, PGDIR_SIZE) > +#define XKVRANGE_VC_KASAN_OFFSET XKPRANGE_UC_SHADOW_END > +#define XKVRANGE_VC_SHADOW_SIZE (XKVRANGE_VC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKVRANGE_VC_SHADOW_END (XKVRANGE_VC_KASAN_OFFSET + XKVRANGE_VC_SHADOW_SIZE) > + > +/* Kasan shadow memory start right after vmalloc. */ > +#define KASAN_SHADOW_START round_up(VMEMMAP_END, PGDIR_SIZE) > +#define KASAN_SHADOW_SIZE (XKVRANGE_VC_SHADOW_END - XKPRANGE_CC_KASAN_OFFSET) > +#define KASAN_SHADOW_END round_up(KASAN_SHADOW_START + KASAN_SHADOW_SIZE, PGDIR_SIZE) > + > +#define XKPRANGE_CC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_CC_KASAN_OFFSET) > +#define XKPRANGE_UC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_UC_KASAN_OFFSET) > +#define XKVRANGE_VC_SHADOW_OFFSET (KASAN_SHADOW_START + XKVRANGE_VC_KASAN_OFFSET) > + > +extern bool kasan_early_stage; > +extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; > + > +static inline void *kasan_mem_to_shadow(const void *addr) > +{ > + if (kasan_early_stage) { > + return (void *)(kasan_early_shadow_page); > + } else { > + unsigned long maddr = (unsigned long)addr; > + unsigned long xrange = (maddr >> XRANGE_SHIFT) & 0xffff; > + unsigned long offset = 0; > + > + maddr &= XRANGE_SHADOW_MASK; > + switch (xrange) { > + case XKPRANGE_CC_SEG: > + offset = XKPRANGE_CC_SHADOW_OFFSET; > + break; > + case XKPRANGE_UC_SEG: > + offset = XKPRANGE_UC_SHADOW_OFFSET; > + break; > + case XKVRANGE_VC_SEG: > + offset = XKVRANGE_VC_SHADOW_OFFSET; > + break; > + default: > + WARN_ON(1); > + return NULL; > + } > + > + return (void *)((maddr >> KASAN_SHADOW_SCALE_SHIFT) + offset); > + } > +} > + > +static inline const void *kasan_shadow_to_mem(const void *shadow_addr) > +{ > + unsigned long addr = (unsigned long)shadow_addr; > + > + if (unlikely(addr > KASAN_SHADOW_END) || > + unlikely(addr < KASAN_SHADOW_START)) { > + WARN_ON(1); > + return NULL; > + } > + > + if (addr >= XKVRANGE_VC_SHADOW_OFFSET) > + return (void *)(((addr - XKVRANGE_VC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKVRANGE_VC_START); > + else if (addr >= XKPRANGE_UC_SHADOW_OFFSET) > + return (void *)(((addr - XKPRANGE_UC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_UC_START); > + else if (addr >= XKPRANGE_CC_SHADOW_OFFSET) > + return (void *)(((addr - XKPRANGE_CC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_CC_START); > + else { > + WARN_ON(1); > + return NULL; > + } > +} > + > +void kasan_init(void); > +asmlinkage void kasan_early_init(void); > + > +#endif > +#endif > diff --git a/arch/loongarch/include/asm/pgtable.h b/arch/loongarch/include/asm/pgtable.h > index d28fb9dbec59..5cfdf79b287e 100644 > --- a/arch/loongarch/include/asm/pgtable.h > +++ b/arch/loongarch/include/asm/pgtable.h > @@ -86,9 +86,16 @@ extern unsigned long zero_page_mask; > #define MODULES_END (MODULES_VADDR + SZ_256M) > > #define VMALLOC_START MODULES_END > + > +#ifndef CONFIG_KASAN > #define VMALLOC_END \ > (vm_map_base + \ > min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits)) - PMD_SIZE - VMEMMAP_SIZE) > +#else > +#define VMALLOC_END \ > + (vm_map_base + \ > + min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits) / 2) - PMD_SIZE - VMEMMAP_SIZE) > +#endif > > #define vmemmap ((struct page *)((VMALLOC_END + PMD_SIZE) & PMD_MASK)) > #define VMEMMAP_END ((unsigned long)vmemmap + VMEMMAP_SIZE - 1) > diff --git a/arch/loongarch/include/asm/setup.h b/arch/loongarch/include/asm/setup.h > index be05c0e706a2..2dca0d1dd90a 100644 > --- a/arch/loongarch/include/asm/setup.h > +++ b/arch/loongarch/include/asm/setup.h > @@ -33,7 +33,7 @@ extern long __la_abs_end; > extern long __rela_dyn_begin; > extern long __rela_dyn_end; > > -extern void * __init relocate_kernel(void); > +extern unsigned long __init relocate_kernel(void); > > #endif > > diff --git a/arch/loongarch/include/asm/string.h b/arch/loongarch/include/asm/string.h > index 7b29cc9c70aa..5bb5a90d2681 100644 > --- a/arch/loongarch/include/asm/string.h > +++ b/arch/loongarch/include/asm/string.h > @@ -7,11 +7,31 @@ > > #define __HAVE_ARCH_MEMSET > extern void *memset(void *__s, int __c, size_t __count); > +extern void *__memset(void *__s, int __c, size_t __count); > > #define __HAVE_ARCH_MEMCPY > extern void *memcpy(void *__to, __const__ void *__from, size_t __n); > +extern void *__memcpy(void *__to, __const__ void *__from, size_t __n); > > #define __HAVE_ARCH_MEMMOVE > extern void *memmove(void *__dest, __const__ void *__src, size_t __n); > +extern void *__memmove(void *__dest, __const__ void *__src, size_t __n); > + > +#if defined(CONFIG_KASAN) && !defined(__SANITIZE_ADDRESS__) > + > +/* > + * For files that are not instrumented (e.g. mm/slub.c) we > + * should use not instrumented version of mem* functions. > + */ > + > +#define memset(s, c, n) __memset(s, c, n) > +#define memcpy(dst, src, len) __memcpy(dst, src, len) > +#define memmove(dst, src, len) __memmove(dst, src, len) > + > +#ifndef __NO_FORTIFY > +#define __NO_FORTIFY /* FORTIFY_SOURCE uses __builtin_memcpy, etc. */ If we need to add __NO_FORTIFY processing, please add ARCH_HAS_FORTIFY_SOURCE in Kconfig, and submit a separate patch like 9530141455c9 ("riscv: Add ARCH_HAS_FORTIFY_SOURCE"). Youling.
Hi, Youling On 2023/3/30 下午2:50, Youling Tang wrote: > Hi, Qing > > On 03/28/2023 07:17 PM, Qing Zhang wrote: >> 1/8 of kernel addresses reserved for shadow memory. But for LoongArch, >> There are a lot of holes between different segments and valid address >> space(256T available) is insufficient to map all these segments to kasan >> shadow memory with the common formula provided by kasan core, saying >> addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET >> >> So Loongarch has a ARCH specific mapping formula,different segments >> are mapped individually, and only limited length of space of that >> specific segment is mapped to shadow. >> >> At early boot stage the whole shadow region populated with just >> one physical page (kasan_early_shadow_page). Later, this page is >> reused as readonly zero shadow for some memory that Kasan currently >> don't track. >> After mapping the physical memory, pages for shadow memory are >> allocated and mapped. >> >> Functions like memset/memmove/memcpy do a lot of memory accesses. >> If bad pointer passed to one of these function it is important >> to catch this. Compiler's instrumentation cannot do this since >> these functions are written in assembly. >> KASan replaces memory functions with manually instrumented variants. >> Original functions declared as weak symbols so strong definitions >> in mm/kasan/kasan.c could replace them. Original functions have aliases >> with '__' prefix in name, so we could call non-instrumented variant >> if needed. >> >> Signed-off-by: Qing Zhang <zhangqing@loongson.cn> >> --- >> Documentation/dev-tools/kasan.rst | 4 +- >> .../features/debug/KASAN/arch-support.txt | 2 +- >> arch/loongarch/Kconfig | 7 + >> arch/loongarch/include/asm/kasan.h | 120 +++++++++ >> arch/loongarch/include/asm/pgtable.h | 7 + >> arch/loongarch/include/asm/setup.h | 2 +- >> arch/loongarch/include/asm/string.h | 20 ++ >> arch/loongarch/kernel/Makefile | 3 + >> arch/loongarch/kernel/head.S | 14 +- >> arch/loongarch/kernel/relocate.c | 8 +- >> arch/loongarch/kernel/setup.c | 4 + >> arch/loongarch/lib/memcpy.S | 4 +- >> arch/loongarch/lib/memmove.S | 13 +- >> arch/loongarch/lib/memset.S | 4 +- >> arch/loongarch/mm/Makefile | 2 + >> arch/loongarch/mm/kasan_init.c | 255 ++++++++++++++++++ >> arch/loongarch/vdso/Makefile | 4 + >> include/linux/kasan.h | 2 + >> mm/kasan/generic.c | 5 + >> mm/kasan/init.c | 10 +- >> mm/kasan/kasan.h | 6 + >> 21 files changed, 470 insertions(+), 26 deletions(-) >> create mode 100644 arch/loongarch/include/asm/kasan.h >> create mode 100644 arch/loongarch/mm/kasan_init.c >> >> diff --git a/Documentation/dev-tools/kasan.rst >> b/Documentation/dev-tools/kasan.rst >> index e66916a483cd..ee91f2872767 100644 >> --- a/Documentation/dev-tools/kasan.rst >> +++ b/Documentation/dev-tools/kasan.rst >> @@ -41,8 +41,8 @@ Support >> Architectures >> ~~~~~~~~~~~~~ >> >> -Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, >> s390, and >> -xtensa, and the tag-based KASAN modes are supported only on arm64. >> +Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, >> s390, xtensa, >> +and loongarch, and the tag-based KASAN modes are supported only on >> arm64. >> >> Compilers >> ~~~~~~~~~ >> diff --git a/Documentation/features/debug/KASAN/arch-support.txt >> b/Documentation/features/debug/KASAN/arch-support.txt >> index bf0124fae643..c4581c2edb28 100644 >> --- a/Documentation/features/debug/KASAN/arch-support.txt >> +++ b/Documentation/features/debug/KASAN/arch-support.txt >> @@ -13,7 +13,7 @@ >> | csky: | TODO | >> | hexagon: | TODO | >> | ia64: | TODO | >> - | loongarch: | TODO | >> + | loongarch: | ok | >> | m68k: | TODO | >> | microblaze: | TODO | >> | mips: | TODO | >> diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig >> index 72dd00f48b8c..61f883c51045 100644 >> --- a/arch/loongarch/Kconfig >> +++ b/arch/loongarch/Kconfig >> @@ -7,6 +7,7 @@ config LOONGARCH >> select ACPI_MCFG if ACPI >> select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI >> select ARCH_BINFMT_ELF_STATE >> + select ARCH_DISABLE_KASAN_INLINE >> select ARCH_ENABLE_MEMORY_HOTPLUG >> select ARCH_ENABLE_MEMORY_HOTREMOVE >> select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI >> @@ -83,6 +84,7 @@ config LOONGARCH >> select HAVE_ARCH_AUDITSYSCALL >> select HAVE_ARCH_MMAP_RND_BITS if MMU >> select HAVE_ARCH_SECCOMP_FILTER >> + select HAVE_ARCH_KASAN if 64BIT >> select HAVE_ARCH_TRACEHOOK >> select HAVE_ARCH_TRANSPARENT_HUGEPAGE >> select HAVE_ASM_MODVERSIONS >> @@ -626,6 +628,11 @@ config ARCH_MMAP_RND_BITS_MIN >> config ARCH_MMAP_RND_BITS_MAX >> default 18 >> >> +config KASAN_SHADOW_OFFSET >> + hex >> + default 0x0 >> + depends on KASAN >> + >> menu "Power management options" >> >> config ARCH_SUSPEND_POSSIBLE >> diff --git a/arch/loongarch/include/asm/kasan.h >> b/arch/loongarch/include/asm/kasan.h >> new file mode 100644 >> index 000000000000..582bcded311e >> --- /dev/null >> +++ b/arch/loongarch/include/asm/kasan.h >> @@ -0,0 +1,120 @@ >> +/* SPDX-License-Identifier: GPL-2.0 */ >> +#ifndef __ASM_KASAN_H >> +#define __ASM_KASAN_H >> + >> +#ifndef __ASSEMBLY__ >> + >> +#include <linux/linkage.h> >> +#include <linux/mmzone.h> >> +#include <asm/addrspace.h> >> +#include <asm/io.h> >> +#include <asm/pgtable.h> >> + >> +#define __HAVE_ARCH_SHADOW_MAP >> + >> +#define KASAN_SHADOW_SCALE_SHIFT 3 >> +#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) >> + >> +#define XRANGE_SHIFT (48) >> + >> +/* Valid address length */ >> +#define XRANGE_SHADOW_SHIFT (PGDIR_SHIFT + PAGE_SHIFT - 3) >> +/* Used for taking out the valid address */ >> +#define XRANGE_SHADOW_MASK GENMASK_ULL(XRANGE_SHADOW_SHIFT - 1, 0) >> +/* One segment whole address space size */ >> +#define XRANGE_SIZE (XRANGE_SHADOW_MASK + 1) >> + >> +/* 64-bit segment value. */ >> +#define XKPRANGE_UC_SEG (0x8000) >> +#define XKPRANGE_CC_SEG (0x9000) >> +#define XKVRANGE_VC_SEG (0xffff) >> + >> +/* Cached */ >> +#define XKPRANGE_CC_START CACHE_BASE >> +#define XKPRANGE_CC_SIZE XRANGE_SIZE >> +#define XKPRANGE_CC_KASAN_OFFSET (0) >> +#define XKPRANGE_CC_SHADOW_SIZE (XKPRANGE_CC_SIZE >> >> KASAN_SHADOW_SCALE_SHIFT) >> +#define XKPRANGE_CC_SHADOW_END (XKPRANGE_CC_KASAN_OFFSET + >> XKPRANGE_CC_SHADOW_SIZE) >> + >> +/* UnCached */ >> +#define XKPRANGE_UC_START UNCACHE_BASE >> +#define XKPRANGE_UC_SIZE XRANGE_SIZE >> +#define XKPRANGE_UC_KASAN_OFFSET XKPRANGE_CC_SHADOW_END >> +#define XKPRANGE_UC_SHADOW_SIZE (XKPRANGE_UC_SIZE >> >> KASAN_SHADOW_SCALE_SHIFT) >> +#define XKPRANGE_UC_SHADOW_END (XKPRANGE_UC_KASAN_OFFSET + >> XKPRANGE_UC_SHADOW_SIZE) >> + >> +/* VMALLOC (Cached or UnCached) */ >> +#define XKVRANGE_VC_START MODULES_VADDR >> +#define XKVRANGE_VC_SIZE round_up(VMEMMAP_END - MODULES_VADDR >> + 1, PGDIR_SIZE) >> +#define XKVRANGE_VC_KASAN_OFFSET XKPRANGE_UC_SHADOW_END >> +#define XKVRANGE_VC_SHADOW_SIZE (XKVRANGE_VC_SIZE >> >> KASAN_SHADOW_SCALE_SHIFT) >> +#define XKVRANGE_VC_SHADOW_END (XKVRANGE_VC_KASAN_OFFSET + >> XKVRANGE_VC_SHADOW_SIZE) >> + >> +/* Kasan shadow memory start right after vmalloc. */ >> +#define KASAN_SHADOW_START round_up(VMEMMAP_END, PGDIR_SIZE) >> +#define KASAN_SHADOW_SIZE (XKVRANGE_VC_SHADOW_END - >> XKPRANGE_CC_KASAN_OFFSET) >> +#define KASAN_SHADOW_END round_up(KASAN_SHADOW_START + >> KASAN_SHADOW_SIZE, PGDIR_SIZE) >> + >> +#define XKPRANGE_CC_SHADOW_OFFSET (KASAN_SHADOW_START + >> XKPRANGE_CC_KASAN_OFFSET) >> +#define XKPRANGE_UC_SHADOW_OFFSET (KASAN_SHADOW_START + >> XKPRANGE_UC_KASAN_OFFSET) >> +#define XKVRANGE_VC_SHADOW_OFFSET (KASAN_SHADOW_START + >> XKVRANGE_VC_KASAN_OFFSET) >> + >> +extern bool kasan_early_stage; >> +extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; >> + >> +static inline void *kasan_mem_to_shadow(const void *addr) >> +{ >> + if (kasan_early_stage) { >> + return (void *)(kasan_early_shadow_page); >> + } else { >> + unsigned long maddr = (unsigned long)addr; >> + unsigned long xrange = (maddr >> XRANGE_SHIFT) & 0xffff; >> + unsigned long offset = 0; >> + >> + maddr &= XRANGE_SHADOW_MASK; >> + switch (xrange) { >> + case XKPRANGE_CC_SEG: >> + offset = XKPRANGE_CC_SHADOW_OFFSET; >> + break; >> + case XKPRANGE_UC_SEG: >> + offset = XKPRANGE_UC_SHADOW_OFFSET; >> + break; >> + case XKVRANGE_VC_SEG: >> + offset = XKVRANGE_VC_SHADOW_OFFSET; >> + break; >> + default: >> + WARN_ON(1); >> + return NULL; >> + } >> + >> + return (void *)((maddr >> KASAN_SHADOW_SCALE_SHIFT) + offset); >> + } >> +} >> + >> +static inline const void *kasan_shadow_to_mem(const void *shadow_addr) >> +{ >> + unsigned long addr = (unsigned long)shadow_addr; >> + >> + if (unlikely(addr > KASAN_SHADOW_END) || >> + unlikely(addr < KASAN_SHADOW_START)) { >> + WARN_ON(1); >> + return NULL; >> + } >> + >> + if (addr >= XKVRANGE_VC_SHADOW_OFFSET) >> + return (void *)(((addr - XKVRANGE_VC_SHADOW_OFFSET) << >> KASAN_SHADOW_SCALE_SHIFT) + XKVRANGE_VC_START); >> + else if (addr >= XKPRANGE_UC_SHADOW_OFFSET) >> + return (void *)(((addr - XKPRANGE_UC_SHADOW_OFFSET) << >> KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_UC_START); >> + else if (addr >= XKPRANGE_CC_SHADOW_OFFSET) >> + return (void *)(((addr - XKPRANGE_CC_SHADOW_OFFSET) << >> KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_CC_START); >> + else { >> + WARN_ON(1); >> + return NULL; >> + } >> +} >> + >> +void kasan_init(void); >> +asmlinkage void kasan_early_init(void); >> + >> +#endif >> +#endif >> diff --git a/arch/loongarch/include/asm/pgtable.h >> b/arch/loongarch/include/asm/pgtable.h >> index d28fb9dbec59..5cfdf79b287e 100644 >> --- a/arch/loongarch/include/asm/pgtable.h >> +++ b/arch/loongarch/include/asm/pgtable.h >> @@ -86,9 +86,16 @@ extern unsigned long zero_page_mask; >> #define MODULES_END (MODULES_VADDR + SZ_256M) >> >> #define VMALLOC_START MODULES_END >> + >> +#ifndef CONFIG_KASAN >> #define VMALLOC_END \ >> (vm_map_base + \ >> min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * >> PAGE_SIZE, (1UL << cpu_vabits)) - PMD_SIZE - VMEMMAP_SIZE) >> +#else >> +#define VMALLOC_END \ >> + (vm_map_base + \ >> + min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * >> PAGE_SIZE, (1UL << cpu_vabits) / 2) - PMD_SIZE - VMEMMAP_SIZE) >> +#endif >> >> #define vmemmap ((struct page *)((VMALLOC_END + PMD_SIZE) & >> PMD_MASK)) >> #define VMEMMAP_END ((unsigned long)vmemmap + VMEMMAP_SIZE - 1) >> diff --git a/arch/loongarch/include/asm/setup.h >> b/arch/loongarch/include/asm/setup.h >> index be05c0e706a2..2dca0d1dd90a 100644 >> --- a/arch/loongarch/include/asm/setup.h >> +++ b/arch/loongarch/include/asm/setup.h >> @@ -33,7 +33,7 @@ extern long __la_abs_end; >> extern long __rela_dyn_begin; >> extern long __rela_dyn_end; >> >> -extern void * __init relocate_kernel(void); >> +extern unsigned long __init relocate_kernel(void); >> >> #endif >> >> diff --git a/arch/loongarch/include/asm/string.h >> b/arch/loongarch/include/asm/string.h >> index 7b29cc9c70aa..5bb5a90d2681 100644 >> --- a/arch/loongarch/include/asm/string.h >> +++ b/arch/loongarch/include/asm/string.h >> @@ -7,11 +7,31 @@ >> >> #define __HAVE_ARCH_MEMSET >> extern void *memset(void *__s, int __c, size_t __count); >> +extern void *__memset(void *__s, int __c, size_t __count); >> >> #define __HAVE_ARCH_MEMCPY >> extern void *memcpy(void *__to, __const__ void *__from, size_t __n); >> +extern void *__memcpy(void *__to, __const__ void *__from, size_t __n); >> >> #define __HAVE_ARCH_MEMMOVE >> extern void *memmove(void *__dest, __const__ void *__src, size_t __n); >> +extern void *__memmove(void *__dest, __const__ void *__src, size_t __n); >> + >> +#if defined(CONFIG_KASAN) && !defined(__SANITIZE_ADDRESS__) >> + >> +/* >> + * For files that are not instrumented (e.g. mm/slub.c) we >> + * should use not instrumented version of mem* functions. >> + */ >> + >> +#define memset(s, c, n) __memset(s, c, n) >> +#define memcpy(dst, src, len) __memcpy(dst, src, len) >> +#define memmove(dst, src, len) __memmove(dst, src, len) >> + >> +#ifndef __NO_FORTIFY >> +#define __NO_FORTIFY /* FORTIFY_SOURCE uses __builtin_memcpy, etc. */ > > If we need to add __NO_FORTIFY processing, please add > ARCH_HAS_FORTIFY_SOURCE in Kconfig, and submit a separate patch like > 9530141455c9 ("riscv: Add ARCH_HAS_FORTIFY_SOURCE"). Ok, I will add separate patch in v2. Thanks, -Qing > > Youling.
Hi, Qing On 03/28/2023 07:17 PM, Qing Zhang wrote: > 1/8 of kernel addresses reserved for shadow memory. But for LoongArch, > There are a lot of holes between different segments and valid address > space(256T available) is insufficient to map all these segments to kasan > shadow memory with the common formula provided by kasan core, saying > addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET > > So Loongarch has a ARCH specific mapping formula,different segments > are mapped individually, and only limited length of space of that > specific segment is mapped to shadow. > > At early boot stage the whole shadow region populated with just > one physical page (kasan_early_shadow_page). Later, this page is > reused as readonly zero shadow for some memory that Kasan currently > don't track. > After mapping the physical memory, pages for shadow memory are > allocated and mapped. > > Functions like memset/memmove/memcpy do a lot of memory accesses. > If bad pointer passed to one of these function it is important > to catch this. Compiler's instrumentation cannot do this since > these functions are written in assembly. > KASan replaces memory functions with manually instrumented variants. > Original functions declared as weak symbols so strong definitions > in mm/kasan/kasan.c could replace them. Original functions have aliases > with '__' prefix in name, so we could call non-instrumented variant > if needed. > > Signed-off-by: Qing Zhang <zhangqing@loongson.cn> > --- > Documentation/dev-tools/kasan.rst | 4 +- > .../features/debug/KASAN/arch-support.txt | 2 +- > arch/loongarch/Kconfig | 7 + > arch/loongarch/include/asm/kasan.h | 120 +++++++++ > arch/loongarch/include/asm/pgtable.h | 7 + > arch/loongarch/include/asm/setup.h | 2 +- > arch/loongarch/include/asm/string.h | 20 ++ > arch/loongarch/kernel/Makefile | 3 + > arch/loongarch/kernel/head.S | 14 +- > arch/loongarch/kernel/relocate.c | 8 +- > arch/loongarch/kernel/setup.c | 4 + > arch/loongarch/lib/memcpy.S | 4 +- > arch/loongarch/lib/memmove.S | 13 +- > arch/loongarch/lib/memset.S | 4 +- > arch/loongarch/mm/Makefile | 2 + > arch/loongarch/mm/kasan_init.c | 255 ++++++++++++++++++ > arch/loongarch/vdso/Makefile | 4 + > include/linux/kasan.h | 2 + > mm/kasan/generic.c | 5 + > mm/kasan/init.c | 10 +- > mm/kasan/kasan.h | 6 + > 21 files changed, 470 insertions(+), 26 deletions(-) > create mode 100644 arch/loongarch/include/asm/kasan.h > create mode 100644 arch/loongarch/mm/kasan_init.c > > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst > index e66916a483cd..ee91f2872767 100644 > --- a/Documentation/dev-tools/kasan.rst > +++ b/Documentation/dev-tools/kasan.rst > @@ -41,8 +41,8 @@ Support > Architectures > ~~~~~~~~~~~~~ > > -Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, and > -xtensa, and the tag-based KASAN modes are supported only on arm64. > +Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, xtensa, > +and loongarch, and the tag-based KASAN modes are supported only on arm64. Maybe you need to update `Documentation/translations/zh_CN/dev-tools /kasan.rst` synchronously. > > Compilers > ~~~~~~~~~ > diff --git a/Documentation/features/debug/KASAN/arch-support.txt b/Documentation/features/debug/KASAN/arch-support.txt > index bf0124fae643..c4581c2edb28 100644 > --- a/Documentation/features/debug/KASAN/arch-support.txt > +++ b/Documentation/features/debug/KASAN/arch-support.txt > @@ -13,7 +13,7 @@ > | csky: | TODO | > | hexagon: | TODO | > | ia64: | TODO | > - | loongarch: | TODO | > + | loongarch: | ok | > | m68k: | TODO | > | microblaze: | TODO | > | mips: | TODO | > diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig > index 72dd00f48b8c..61f883c51045 100644 > --- a/arch/loongarch/Kconfig > +++ b/arch/loongarch/Kconfig > @@ -7,6 +7,7 @@ config LOONGARCH > select ACPI_MCFG if ACPI > select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI > select ARCH_BINFMT_ELF_STATE > + select ARCH_DISABLE_KASAN_INLINE > select ARCH_ENABLE_MEMORY_HOTPLUG > select ARCH_ENABLE_MEMORY_HOTREMOVE > select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI > @@ -83,6 +84,7 @@ config LOONGARCH > select HAVE_ARCH_AUDITSYSCALL > select HAVE_ARCH_MMAP_RND_BITS if MMU > select HAVE_ARCH_SECCOMP_FILTER > + select HAVE_ARCH_KASAN if 64BIT > select HAVE_ARCH_TRACEHOOK > select HAVE_ARCH_TRANSPARENT_HUGEPAGE > select HAVE_ASM_MODVERSIONS > @@ -626,6 +628,11 @@ config ARCH_MMAP_RND_BITS_MIN > config ARCH_MMAP_RND_BITS_MAX > default 18 > > +config KASAN_SHADOW_OFFSET > + hex > + default 0x0 > + depends on KASAN > + > menu "Power management options" > > config ARCH_SUSPEND_POSSIBLE > diff --git a/arch/loongarch/include/asm/kasan.h b/arch/loongarch/include/asm/kasan.h > new file mode 100644 > index 000000000000..582bcded311e > --- /dev/null > +++ b/arch/loongarch/include/asm/kasan.h > @@ -0,0 +1,120 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef __ASM_KASAN_H > +#define __ASM_KASAN_H > + > +#ifndef __ASSEMBLY__ > + > +#include <linux/linkage.h> > +#include <linux/mmzone.h> > +#include <asm/addrspace.h> > +#include <asm/io.h> > +#include <asm/pgtable.h> > + > +#define __HAVE_ARCH_SHADOW_MAP > + > +#define KASAN_SHADOW_SCALE_SHIFT 3 > +#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) > + > +#define XRANGE_SHIFT (48) > + > +/* Valid address length */ > +#define XRANGE_SHADOW_SHIFT (PGDIR_SHIFT + PAGE_SHIFT - 3) > +/* Used for taking out the valid address */ > +#define XRANGE_SHADOW_MASK GENMASK_ULL(XRANGE_SHADOW_SHIFT - 1, 0) > +/* One segment whole address space size */ > +#define XRANGE_SIZE (XRANGE_SHADOW_MASK + 1) > + > +/* 64-bit segment value. */ > +#define XKPRANGE_UC_SEG (0x8000) > +#define XKPRANGE_CC_SEG (0x9000) > +#define XKVRANGE_VC_SEG (0xffff) > + > +/* Cached */ > +#define XKPRANGE_CC_START CACHE_BASE > +#define XKPRANGE_CC_SIZE XRANGE_SIZE > +#define XKPRANGE_CC_KASAN_OFFSET (0) > +#define XKPRANGE_CC_SHADOW_SIZE (XKPRANGE_CC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_CC_SHADOW_END (XKPRANGE_CC_KASAN_OFFSET + XKPRANGE_CC_SHADOW_SIZE) > + > +/* UnCached */ > +#define XKPRANGE_UC_START UNCACHE_BASE > +#define XKPRANGE_UC_SIZE XRANGE_SIZE > +#define XKPRANGE_UC_KASAN_OFFSET XKPRANGE_CC_SHADOW_END > +#define XKPRANGE_UC_SHADOW_SIZE (XKPRANGE_UC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKPRANGE_UC_SHADOW_END (XKPRANGE_UC_KASAN_OFFSET + XKPRANGE_UC_SHADOW_SIZE) > + > +/* VMALLOC (Cached or UnCached) */ > +#define XKVRANGE_VC_START MODULES_VADDR > +#define XKVRANGE_VC_SIZE round_up(VMEMMAP_END - MODULES_VADDR + 1, PGDIR_SIZE) > +#define XKVRANGE_VC_KASAN_OFFSET XKPRANGE_UC_SHADOW_END > +#define XKVRANGE_VC_SHADOW_SIZE (XKVRANGE_VC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) > +#define XKVRANGE_VC_SHADOW_END (XKVRANGE_VC_KASAN_OFFSET + XKVRANGE_VC_SHADOW_SIZE) > + > +/* Kasan shadow memory start right after vmalloc. */ > +#define KASAN_SHADOW_START round_up(VMEMMAP_END, PGDIR_SIZE) > +#define KASAN_SHADOW_SIZE (XKVRANGE_VC_SHADOW_END - XKPRANGE_CC_KASAN_OFFSET) > +#define KASAN_SHADOW_END round_up(KASAN_SHADOW_START + KASAN_SHADOW_SIZE, PGDIR_SIZE) > + > +#define XKPRANGE_CC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_CC_KASAN_OFFSET) > +#define XKPRANGE_UC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_UC_KASAN_OFFSET) > +#define XKVRANGE_VC_SHADOW_OFFSET (KASAN_SHADOW_START + XKVRANGE_VC_KASAN_OFFSET) > + > +extern bool kasan_early_stage; > +extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; > + > +static inline void *kasan_mem_to_shadow(const void *addr) > +{ > + if (kasan_early_stage) { > + return (void *)(kasan_early_shadow_page); > + } else { > + unsigned long maddr = (unsigned long)addr; > + unsigned long xrange = (maddr >> XRANGE_SHIFT) & 0xffff; > + unsigned long offset = 0; > + > + maddr &= XRANGE_SHADOW_MASK; > + switch (xrange) { > + case XKPRANGE_CC_SEG: > + offset = XKPRANGE_CC_SHADOW_OFFSET; > + break; > + case XKPRANGE_UC_SEG: > + offset = XKPRANGE_UC_SHADOW_OFFSET; > + break; > + case XKVRANGE_VC_SEG: > + offset = XKVRANGE_VC_SHADOW_OFFSET; > + break; > + default: > + WARN_ON(1); > + return NULL; When the "earlycon=uart,mmio,0x1fe001e0,115200n8" cmdline parameter is added under CONFIG_KASAN, the kernel will not start normally and stay at the following position: ... [ 0.000000] On node 0, zone DMA32: 4 pages in unavailable ranges [ 0.000000] On node 0, zone Normal: 8 pages in unavailable ranges [ 0.000000] On node 0, zone Normal: 8 pages in unavailable ranges [ 0.000000] On node 0, zone Normal: 160 pages in unavailable ranges [ 0.000000] On node 0, zone Normal: 256 pages in unavailable ranges The reason is that when accessing the serial port address `0x1fe001e0`, kasan will add relevant checks, such as inserting `__asan_load1()`, and will eventually enter the `default` branch in kasan_mem_to_shadow(), causing the kernel to fail to start. Add the following modification to avoid inserting the kasan check in 8250_early.o, and it will be able to start successfully. diff --git a/drivers/tty/serial/8250/Makefile b/drivers/tty/serial/8250/Makefile index 4fc2fc1f41b6..3c17d0e72c83 100644 --- a/drivers/tty/serial/8250/Makefile +++ b/drivers/tty/serial/8250/Makefile @@ -3,6 +3,8 @@ # Makefile for the 8250 serial device drivers. # +KASAN_SANITIZE_8250_early.o := n + obj-$(CONFIG_SERIAL_8250) += 8250.o 8250_base.o 8250-y := 8250_core.o 8250-$(CONFIG_ALPHA_GENERIC) += 8250_alpha.o Thanks, Youling
On Thu, Mar 30, 2023 at 6:32 AM Qing Zhang <zhangqing@loongson.cn> wrote: > > > I get that, but you already added a special case for > > __HAVE_ARCH_SHADOW_MAP to addr_has_metadata, so you can just call it? > > > ok, all the changes are going to be in v2. Could you also please put changes to the common KASAN code into a separate patch/patches? This will simplify any potential backporting of common KASAN code changes in the future. Thanks!
On 2023/3/31 下午11:58, Andrey Konovalov wrote: > On Thu, Mar 30, 2023 at 6:32 AM Qing Zhang <zhangqing@loongson.cn> wrote: >> >>> I get that, but you already added a special case for >>> __HAVE_ARCH_SHADOW_MAP to addr_has_metadata, so you can just call it? >>> >> ok, all the changes are going to be in v2. > > Could you also please put changes to the common KASAN code into a > separate patch/patches? This will simplify any potential backporting > of common KASAN code changes in the future. > ok, no problem. Thanks, -Qing > Thanks! >
diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst index e66916a483cd..ee91f2872767 100644 --- a/Documentation/dev-tools/kasan.rst +++ b/Documentation/dev-tools/kasan.rst @@ -41,8 +41,8 @@ Support Architectures ~~~~~~~~~~~~~ -Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, and -xtensa, and the tag-based KASAN modes are supported only on arm64. +Generic KASAN is supported on x86_64, arm, arm64, powerpc, riscv, s390, xtensa, +and loongarch, and the tag-based KASAN modes are supported only on arm64. Compilers ~~~~~~~~~ diff --git a/Documentation/features/debug/KASAN/arch-support.txt b/Documentation/features/debug/KASAN/arch-support.txt index bf0124fae643..c4581c2edb28 100644 --- a/Documentation/features/debug/KASAN/arch-support.txt +++ b/Documentation/features/debug/KASAN/arch-support.txt @@ -13,7 +13,7 @@ | csky: | TODO | | hexagon: | TODO | | ia64: | TODO | - | loongarch: | TODO | + | loongarch: | ok | | m68k: | TODO | | microblaze: | TODO | | mips: | TODO | diff --git a/arch/loongarch/Kconfig b/arch/loongarch/Kconfig index 72dd00f48b8c..61f883c51045 100644 --- a/arch/loongarch/Kconfig +++ b/arch/loongarch/Kconfig @@ -7,6 +7,7 @@ config LOONGARCH select ACPI_MCFG if ACPI select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI select ARCH_BINFMT_ELF_STATE + select ARCH_DISABLE_KASAN_INLINE select ARCH_ENABLE_MEMORY_HOTPLUG select ARCH_ENABLE_MEMORY_HOTREMOVE select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI @@ -83,6 +84,7 @@ config LOONGARCH select HAVE_ARCH_AUDITSYSCALL select HAVE_ARCH_MMAP_RND_BITS if MMU select HAVE_ARCH_SECCOMP_FILTER + select HAVE_ARCH_KASAN if 64BIT select HAVE_ARCH_TRACEHOOK select HAVE_ARCH_TRANSPARENT_HUGEPAGE select HAVE_ASM_MODVERSIONS @@ -626,6 +628,11 @@ config ARCH_MMAP_RND_BITS_MIN config ARCH_MMAP_RND_BITS_MAX default 18 +config KASAN_SHADOW_OFFSET + hex + default 0x0 + depends on KASAN + menu "Power management options" config ARCH_SUSPEND_POSSIBLE diff --git a/arch/loongarch/include/asm/kasan.h b/arch/loongarch/include/asm/kasan.h new file mode 100644 index 000000000000..582bcded311e --- /dev/null +++ b/arch/loongarch/include/asm/kasan.h @@ -0,0 +1,120 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef __ASM_KASAN_H +#define __ASM_KASAN_H + +#ifndef __ASSEMBLY__ + +#include <linux/linkage.h> +#include <linux/mmzone.h> +#include <asm/addrspace.h> +#include <asm/io.h> +#include <asm/pgtable.h> + +#define __HAVE_ARCH_SHADOW_MAP + +#define KASAN_SHADOW_SCALE_SHIFT 3 +#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) + +#define XRANGE_SHIFT (48) + +/* Valid address length */ +#define XRANGE_SHADOW_SHIFT (PGDIR_SHIFT + PAGE_SHIFT - 3) +/* Used for taking out the valid address */ +#define XRANGE_SHADOW_MASK GENMASK_ULL(XRANGE_SHADOW_SHIFT - 1, 0) +/* One segment whole address space size */ +#define XRANGE_SIZE (XRANGE_SHADOW_MASK + 1) + +/* 64-bit segment value. */ +#define XKPRANGE_UC_SEG (0x8000) +#define XKPRANGE_CC_SEG (0x9000) +#define XKVRANGE_VC_SEG (0xffff) + +/* Cached */ +#define XKPRANGE_CC_START CACHE_BASE +#define XKPRANGE_CC_SIZE XRANGE_SIZE +#define XKPRANGE_CC_KASAN_OFFSET (0) +#define XKPRANGE_CC_SHADOW_SIZE (XKPRANGE_CC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) +#define XKPRANGE_CC_SHADOW_END (XKPRANGE_CC_KASAN_OFFSET + XKPRANGE_CC_SHADOW_SIZE) + +/* UnCached */ +#define XKPRANGE_UC_START UNCACHE_BASE +#define XKPRANGE_UC_SIZE XRANGE_SIZE +#define XKPRANGE_UC_KASAN_OFFSET XKPRANGE_CC_SHADOW_END +#define XKPRANGE_UC_SHADOW_SIZE (XKPRANGE_UC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) +#define XKPRANGE_UC_SHADOW_END (XKPRANGE_UC_KASAN_OFFSET + XKPRANGE_UC_SHADOW_SIZE) + +/* VMALLOC (Cached or UnCached) */ +#define XKVRANGE_VC_START MODULES_VADDR +#define XKVRANGE_VC_SIZE round_up(VMEMMAP_END - MODULES_VADDR + 1, PGDIR_SIZE) +#define XKVRANGE_VC_KASAN_OFFSET XKPRANGE_UC_SHADOW_END +#define XKVRANGE_VC_SHADOW_SIZE (XKVRANGE_VC_SIZE >> KASAN_SHADOW_SCALE_SHIFT) +#define XKVRANGE_VC_SHADOW_END (XKVRANGE_VC_KASAN_OFFSET + XKVRANGE_VC_SHADOW_SIZE) + +/* Kasan shadow memory start right after vmalloc. */ +#define KASAN_SHADOW_START round_up(VMEMMAP_END, PGDIR_SIZE) +#define KASAN_SHADOW_SIZE (XKVRANGE_VC_SHADOW_END - XKPRANGE_CC_KASAN_OFFSET) +#define KASAN_SHADOW_END round_up(KASAN_SHADOW_START + KASAN_SHADOW_SIZE, PGDIR_SIZE) + +#define XKPRANGE_CC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_CC_KASAN_OFFSET) +#define XKPRANGE_UC_SHADOW_OFFSET (KASAN_SHADOW_START + XKPRANGE_UC_KASAN_OFFSET) +#define XKVRANGE_VC_SHADOW_OFFSET (KASAN_SHADOW_START + XKVRANGE_VC_KASAN_OFFSET) + +extern bool kasan_early_stage; +extern unsigned char kasan_early_shadow_page[PAGE_SIZE]; + +static inline void *kasan_mem_to_shadow(const void *addr) +{ + if (kasan_early_stage) { + return (void *)(kasan_early_shadow_page); + } else { + unsigned long maddr = (unsigned long)addr; + unsigned long xrange = (maddr >> XRANGE_SHIFT) & 0xffff; + unsigned long offset = 0; + + maddr &= XRANGE_SHADOW_MASK; + switch (xrange) { + case XKPRANGE_CC_SEG: + offset = XKPRANGE_CC_SHADOW_OFFSET; + break; + case XKPRANGE_UC_SEG: + offset = XKPRANGE_UC_SHADOW_OFFSET; + break; + case XKVRANGE_VC_SEG: + offset = XKVRANGE_VC_SHADOW_OFFSET; + break; + default: + WARN_ON(1); + return NULL; + } + + return (void *)((maddr >> KASAN_SHADOW_SCALE_SHIFT) + offset); + } +} + +static inline const void *kasan_shadow_to_mem(const void *shadow_addr) +{ + unsigned long addr = (unsigned long)shadow_addr; + + if (unlikely(addr > KASAN_SHADOW_END) || + unlikely(addr < KASAN_SHADOW_START)) { + WARN_ON(1); + return NULL; + } + + if (addr >= XKVRANGE_VC_SHADOW_OFFSET) + return (void *)(((addr - XKVRANGE_VC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKVRANGE_VC_START); + else if (addr >= XKPRANGE_UC_SHADOW_OFFSET) + return (void *)(((addr - XKPRANGE_UC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_UC_START); + else if (addr >= XKPRANGE_CC_SHADOW_OFFSET) + return (void *)(((addr - XKPRANGE_CC_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT) + XKPRANGE_CC_START); + else { + WARN_ON(1); + return NULL; + } +} + +void kasan_init(void); +asmlinkage void kasan_early_init(void); + +#endif +#endif diff --git a/arch/loongarch/include/asm/pgtable.h b/arch/loongarch/include/asm/pgtable.h index d28fb9dbec59..5cfdf79b287e 100644 --- a/arch/loongarch/include/asm/pgtable.h +++ b/arch/loongarch/include/asm/pgtable.h @@ -86,9 +86,16 @@ extern unsigned long zero_page_mask; #define MODULES_END (MODULES_VADDR + SZ_256M) #define VMALLOC_START MODULES_END + +#ifndef CONFIG_KASAN #define VMALLOC_END \ (vm_map_base + \ min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits)) - PMD_SIZE - VMEMMAP_SIZE) +#else +#define VMALLOC_END \ + (vm_map_base + \ + min(PTRS_PER_PGD * PTRS_PER_PUD * PTRS_PER_PMD * PTRS_PER_PTE * PAGE_SIZE, (1UL << cpu_vabits) / 2) - PMD_SIZE - VMEMMAP_SIZE) +#endif #define vmemmap ((struct page *)((VMALLOC_END + PMD_SIZE) & PMD_MASK)) #define VMEMMAP_END ((unsigned long)vmemmap + VMEMMAP_SIZE - 1) diff --git a/arch/loongarch/include/asm/setup.h b/arch/loongarch/include/asm/setup.h index be05c0e706a2..2dca0d1dd90a 100644 --- a/arch/loongarch/include/asm/setup.h +++ b/arch/loongarch/include/asm/setup.h @@ -33,7 +33,7 @@ extern long __la_abs_end; extern long __rela_dyn_begin; extern long __rela_dyn_end; -extern void * __init relocate_kernel(void); +extern unsigned long __init relocate_kernel(void); #endif diff --git a/arch/loongarch/include/asm/string.h b/arch/loongarch/include/asm/string.h index 7b29cc9c70aa..5bb5a90d2681 100644 --- a/arch/loongarch/include/asm/string.h +++ b/arch/loongarch/include/asm/string.h @@ -7,11 +7,31 @@ #define __HAVE_ARCH_MEMSET extern void *memset(void *__s, int __c, size_t __count); +extern void *__memset(void *__s, int __c, size_t __count); #define __HAVE_ARCH_MEMCPY extern void *memcpy(void *__to, __const__ void *__from, size_t __n); +extern void *__memcpy(void *__to, __const__ void *__from, size_t __n); #define __HAVE_ARCH_MEMMOVE extern void *memmove(void *__dest, __const__ void *__src, size_t __n); +extern void *__memmove(void *__dest, __const__ void *__src, size_t __n); + +#if defined(CONFIG_KASAN) && !defined(__SANITIZE_ADDRESS__) + +/* + * For files that are not instrumented (e.g. mm/slub.c) we + * should use not instrumented version of mem* functions. + */ + +#define memset(s, c, n) __memset(s, c, n) +#define memcpy(dst, src, len) __memcpy(dst, src, len) +#define memmove(dst, src, len) __memmove(dst, src, len) + +#ifndef __NO_FORTIFY +#define __NO_FORTIFY /* FORTIFY_SOURCE uses __builtin_memcpy, etc. */ +#endif + +#endif #endif /* _ASM_STRING_H */ diff --git a/arch/loongarch/kernel/Makefile b/arch/loongarch/kernel/Makefile index 9a72d91cd104..0055e7582e15 100644 --- a/arch/loongarch/kernel/Makefile +++ b/arch/loongarch/kernel/Makefile @@ -30,6 +30,9 @@ ifdef CONFIG_FUNCTION_TRACER CFLAGS_REMOVE_perf_event.o = $(CC_FLAGS_FTRACE) endif +KASAN_SANITIZE_vdso.o := n +KASAN_SANITIZE_efi.o := n + obj-$(CONFIG_MODULES) += module.o module-sections.o obj-$(CONFIG_STACKTRACE) += stacktrace.o diff --git a/arch/loongarch/kernel/head.S b/arch/loongarch/kernel/head.S index aa64b179744f..19d4be5c8381 100644 --- a/arch/loongarch/kernel/head.S +++ b/arch/loongarch/kernel/head.S @@ -95,13 +95,17 @@ SYM_CODE_START(kernel_entry) # kernel entry point PTR_LI sp, (_THREAD_SIZE - PT_SIZE) PTR_ADD sp, sp, tp set_saved_sp sp, t0, t1 -#endif - - /* relocate_kernel() returns the new kernel entry point */ - jr a0 - ASM_BUG() + /* Jump to new kernel: new_pc = current_pc + random_offset */ + pcaddi t0, 0 + add.d t0, t0, a0 + jirl zero, t0, 0xc #endif +#endif + + #ifdef CONFIG_KASAN + bl kasan_early_init + #endif bl start_kernel ASM_BUG() diff --git a/arch/loongarch/kernel/relocate.c b/arch/loongarch/kernel/relocate.c index 01f94d1e3edf..6c3eff9af9fb 100644 --- a/arch/loongarch/kernel/relocate.c +++ b/arch/loongarch/kernel/relocate.c @@ -157,12 +157,11 @@ static inline void __init update_reloc_offset(unsigned long *addr, long random_o *new_addr = (unsigned long)reloc_offset; } -void * __init relocate_kernel(void) +unsigned long __init relocate_kernel(void) { unsigned long kernel_length; unsigned long random_offset = 0; void *location_new = _text; /* Default to original kernel start */ - void *kernel_entry = start_kernel; /* Default to original kernel entry point */ char *cmdline = early_ioremap(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */ strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE); @@ -190,9 +189,6 @@ void * __init relocate_kernel(void) reloc_offset += random_offset; - /* Return the new kernel's entry point */ - kernel_entry = RELOCATED_KASLR(start_kernel); - /* The current thread is now within the relocated kernel */ __current_thread_info = RELOCATED_KASLR(__current_thread_info); @@ -204,7 +200,7 @@ void * __init relocate_kernel(void) relocate_absolute(random_offset); - return kernel_entry; + return random_offset; } /* diff --git a/arch/loongarch/kernel/setup.c b/arch/loongarch/kernel/setup.c index 27f71f9531e1..18453f8cb9e8 100644 --- a/arch/loongarch/kernel/setup.c +++ b/arch/loongarch/kernel/setup.c @@ -610,4 +610,8 @@ void __init setup_arch(char **cmdline_p) #endif paging_init(); + +#if defined(CONFIG_KASAN) + kasan_init(); +#endif } diff --git a/arch/loongarch/lib/memcpy.S b/arch/loongarch/lib/memcpy.S index 3b7e1dec7109..db92ef7bef3a 100644 --- a/arch/loongarch/lib/memcpy.S +++ b/arch/loongarch/lib/memcpy.S @@ -10,16 +10,18 @@ #include <asm/export.h> #include <asm/regdef.h> -SYM_FUNC_START(memcpy) +SYM_FUNC_START_WEAK(memcpy) /* * Some CPUs support hardware unaligned access */ ALTERNATIVE "b __memcpy_generic", \ "b __memcpy_fast", CPU_FEATURE_UAL SYM_FUNC_END(memcpy) +SYM_FUNC_ALIAS(__memcpy, memcpy) _ASM_NOKPROBE(memcpy) EXPORT_SYMBOL(memcpy) +EXPORT_SYMBOL(__memcpy) /* * void *__memcpy_generic(void *dst, const void *src, size_t n) diff --git a/arch/loongarch/lib/memmove.S b/arch/loongarch/lib/memmove.S index b796c3d6da05..a2dec5899f5c 100644 --- a/arch/loongarch/lib/memmove.S +++ b/arch/loongarch/lib/memmove.S @@ -10,7 +10,7 @@ #include <asm/export.h> #include <asm/regdef.h> -SYM_FUNC_START(memmove) +SYM_FUNC_START_WEAK(memmove) blt a0, a1, 1f /* dst < src, memcpy */ blt a1, a0, 3f /* src < dst, rmemcpy */ jr ra /* dst == src, return */ @@ -19,27 +19,30 @@ SYM_FUNC_START(memmove) 1: ori a3, zero, 64 sub.d t0, a1, a0 blt t0, a3, 2f - b memcpy + b __memcpy 2: b __memcpy_generic /* if (dst - src) < 64, copy 1 byte at a time */ 3: ori a3, zero, 64 sub.d t0, a0, a1 blt t0, a3, 4f - b rmemcpy + b __rmemcpy 4: b __rmemcpy_generic SYM_FUNC_END(memmove) +SYM_FUNC_ALIAS(__memmove, memmove) _ASM_NOKPROBE(memmove) EXPORT_SYMBOL(memmove) +EXPORT_SYMBOL(__memmove) + +SYM_FUNC_START(__rmemcpy) -SYM_FUNC_START(rmemcpy) /* * Some CPUs support hardware unaligned access */ ALTERNATIVE "b __rmemcpy_generic", \ "b __rmemcpy_fast", CPU_FEATURE_UAL -SYM_FUNC_END(rmemcpy) +SYM_FUNC_END(__rmemcpy) _ASM_NOKPROBE(rmemcpy) /* diff --git a/arch/loongarch/lib/memset.S b/arch/loongarch/lib/memset.S index a9eb732ab2ad..b5cdbecba8ef 100644 --- a/arch/loongarch/lib/memset.S +++ b/arch/loongarch/lib/memset.S @@ -16,16 +16,18 @@ bstrins.d \r0, \r0, 63, 32 .endm -SYM_FUNC_START(memset) +SYM_FUNC_START_WEAK(memset) /* * Some CPUs support hardware unaligned access */ ALTERNATIVE "b __memset_generic", \ "b __memset_fast", CPU_FEATURE_UAL SYM_FUNC_END(memset) +SYM_FUNC_ALIAS(__memset, memset) _ASM_NOKPROBE(memset) EXPORT_SYMBOL(memset) +EXPORT_SYMBOL(__memset) /* * void *__memset_generic(void *s, int c, size_t n) diff --git a/arch/loongarch/mm/Makefile b/arch/loongarch/mm/Makefile index 8ffc6383f836..6e50cf6cf733 100644 --- a/arch/loongarch/mm/Makefile +++ b/arch/loongarch/mm/Makefile @@ -7,3 +7,5 @@ obj-y += init.o cache.o tlb.o tlbex.o extable.o \ fault.o ioremap.o maccess.o mmap.o pgtable.o page.o obj-$(CONFIG_HUGETLB_PAGE) += hugetlbpage.o +obj-$(CONFIG_KASAN) += kasan_init.o +KASAN_SANITIZE_kasan_init.o := n diff --git a/arch/loongarch/mm/kasan_init.c b/arch/loongarch/mm/kasan_init.c new file mode 100644 index 000000000000..fb3077f8d508 --- /dev/null +++ b/arch/loongarch/mm/kasan_init.c @@ -0,0 +1,255 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Copyright (C) 2023 Loongson Technology Corporation Limited + */ +#define pr_fmt(fmt) "kasan: " fmt +#include <linux/kasan.h> +#include <linux/memblock.h> +#include <linux/sched/task.h> + +#include <asm/tlbflush.h> +#include <asm/pgalloc.h> +#include <asm-generic/sections.h> + +static pgd_t tmp_pg_dir[PTRS_PER_PGD] __initdata __aligned(PAGE_SIZE); + +static inline int __p4d_none(int early, p4d_t p4d) {return 0; } + +#ifndef __PAGETABLE_PUD_FOLDED +#define __p4d_none(early, p4d) (early ? (p4d_val(p4d) == 0) : \ +(__pa(p4d_val(p4d)) == (unsigned long)__pa(kasan_early_shadow_pud))) +#endif + +#define __pud_none(early, pud) (early ? (pud_val(pud) == 0) : \ +(__pa(pud_val(pud)) == (unsigned long)__pa(kasan_early_shadow_pmd))) + +#define __pmd_none(early, pmd) (early ? (pmd_val(pmd) == 0) : \ +(__pa(pmd_val(pmd)) == (unsigned long)__pa(kasan_early_shadow_pte))) + +#define __pte_none(early, pte) (early ? pte_none(pte) : \ +((pte_val(pte) & _PFN_MASK) == (unsigned long)__pa(kasan_early_shadow_page))) + +bool kasan_early_stage = true; + +/* + * Alloc memory for shadow memory page table. + */ +static phys_addr_t __init kasan_alloc_zeroed_page(int node) +{ + void *p = memblock_alloc_try_nid(PAGE_SIZE, PAGE_SIZE, + __pa(MAX_DMA_ADDRESS), + MEMBLOCK_ALLOC_ACCESSIBLE, node); + if (!p) + panic("%s: Failed to allocate %lu bytes align=0x%lx nid=%d from=%llx\n", + __func__, PAGE_SIZE, PAGE_SIZE, node, __pa(MAX_DMA_ADDRESS)); + return __pa(p); +} + +static pte_t *kasan_pte_offset(pmd_t *pmdp, unsigned long addr, int node, + bool early) +{ + if (__pmd_none(early, READ_ONCE(*pmdp))) { + phys_addr_t pte_phys = early ? + __pa_symbol(kasan_early_shadow_pte) + : kasan_alloc_zeroed_page(node); + if (!early) + memcpy(__va(pte_phys), kasan_early_shadow_pte, + sizeof(kasan_early_shadow_pte)); + pmd_populate_kernel(NULL, pmdp, (pte_t *)__va(pte_phys)); + } + + return pte_offset_kernel(pmdp, addr); +} + +static inline void kasan_set_pgd(pgd_t *pgdp, pgd_t pgdval) +{ + WRITE_ONCE(*pgdp, pgdval); +} + +static pmd_t *kasan_pmd_offset(pud_t *pudp, unsigned long addr, int node, + bool early) +{ + if (__pud_none(early, READ_ONCE(*pudp))) { + phys_addr_t pmd_phys = early ? + __pa_symbol(kasan_early_shadow_pmd) + : kasan_alloc_zeroed_page(node); + if (!early) + memcpy(__va(pmd_phys), kasan_early_shadow_pmd, + sizeof(kasan_early_shadow_pmd)); + pud_populate(&init_mm, pudp, (pmd_t *)__va(pmd_phys)); + } + + return pmd_offset(pudp, addr); +} + +static pud_t *__init kasan_pud_offset(p4d_t *p4dp, unsigned long addr, int node, + bool early) +{ + if (__p4d_none(early, READ_ONCE(*p4dp))) { + phys_addr_t pud_phys = early ? + __pa_symbol(kasan_early_shadow_pud) + : kasan_alloc_zeroed_page(node); + if (!early) + memcpy(__va(pud_phys), kasan_early_shadow_pud, + sizeof(kasan_early_shadow_pud)); + p4d_populate(&init_mm, p4dp, (pud_t *)__va(pud_phys)); + } + + return pud_offset(p4dp, addr); +} + +static void kasan_pte_populate(pmd_t *pmdp, unsigned long addr, + unsigned long end, int node, bool early) +{ + unsigned long next; + pte_t *ptep = kasan_pte_offset(pmdp, addr, node, early); + + do { + phys_addr_t page_phys = early ? + __pa_symbol(kasan_early_shadow_page) + : kasan_alloc_zeroed_page(node); + next = addr + PAGE_SIZE; + set_pte(ptep, pfn_pte(__phys_to_pfn(page_phys), PAGE_KERNEL)); + } while (ptep++, addr = next, addr != end && __pte_none(early, READ_ONCE(*ptep))); +} + +static void kasan_pmd_populate(pud_t *pudp, unsigned long addr, + unsigned long end, int node, bool early) +{ + unsigned long next; + pmd_t *pmdp = kasan_pmd_offset(pudp, addr, node, early); + + do { + next = pmd_addr_end(addr, end); + kasan_pte_populate(pmdp, addr, next, node, early); + } while (pmdp++, addr = next, addr != end && __pmd_none(early, READ_ONCE(*pmdp))); +} + +static void __init kasan_pud_populate(p4d_t *p4dp, unsigned long addr, + unsigned long end, int node, bool early) +{ + unsigned long next; + pud_t *pudp = kasan_pud_offset(p4dp, addr, node, early); + + do { + next = pud_addr_end(addr, end); + kasan_pmd_populate(pudp, addr, next, node, early); + } while (pudp++, addr = next, addr != end); +} + +static void __init kasan_p4d_populate(pgd_t *pgdp, unsigned long addr, + unsigned long end, int node, bool early) +{ + unsigned long next; + p4d_t *p4dp = p4d_offset(pgdp, addr); + + do { + next = p4d_addr_end(addr, end); + kasan_pud_populate(p4dp, addr, next, node, early); + } while (p4dp++, addr = next, addr != end); +} + +static void __init kasan_pgd_populate(unsigned long addr, unsigned long end, + int node, bool early) +{ + unsigned long next; + pgd_t *pgdp; + + pgdp = pgd_offset_k(addr); + + do { + next = pgd_addr_end(addr, end); + kasan_p4d_populate(pgdp, addr, next, node, early); + } while (pgdp++, addr = next, addr != end); + +} + +asmlinkage void __init kasan_early_init(void) +{ + BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_START, PGDIR_SIZE)); + BUILD_BUG_ON(!IS_ALIGNED(KASAN_SHADOW_END, PGDIR_SIZE)); +} + +/* Set up full kasan mappings, ensuring that the mapped pages are zeroed */ +static void __init kasan_map_populate(unsigned long start, unsigned long end, + int node) +{ + kasan_pgd_populate(start & PAGE_MASK, PAGE_ALIGN(end), node, false); +} + +static void __init clear_pgds(unsigned long start, unsigned long end) +{ + /* + * Remove references to kasan page tables from + * swapper_pg_dir. pgd_clear() can't be used + * here because it's nop on 2,3-level pagetable setups + */ + for (; start < end; start += PGDIR_SIZE) + kasan_set_pgd((pgd_t *)pgd_offset_k(start), __pgd(0)); +} + +void __init kasan_init(void) +{ + u64 i; + phys_addr_t pa_start, pa_end; + /* + * PGD was populated as invalid_pmd_table or invalid_pud_table + * in pagetable_init() which depends on how many levels of page + * table you are using, but we had to clean the gpd of kasan + * shadow memory, as the pgd value is none-zero. + * The assertion pgd_none is going to be false and the formal populate + * afterwards is not going to create any new pgd at all. + */ + memcpy(tmp_pg_dir, swapper_pg_dir, sizeof(tmp_pg_dir)); + __sync(); + csr_write64(__pa_symbol(tmp_pg_dir), LOONGARCH_CSR_PGDH); + local_flush_tlb_all(); + + clear_pgds(KASAN_SHADOW_START, KASAN_SHADOW_END); + + /* Maps everything to a single page of zeroes */ + kasan_pgd_populate(KASAN_SHADOW_START, KASAN_SHADOW_END, + NUMA_NO_NODE, true); + + kasan_populate_early_shadow(kasan_mem_to_shadow((void *)MODULES_END), + kasan_mem_to_shadow((void *)VMEMMAP_END)); + + if (!IS_ENABLED(CONFIG_KASAN_VMALLOC)) + kasan_populate_early_shadow(kasan_mem_to_shadow((void *)VMALLOC_START), + kasan_mem_to_shadow((void *)VMALLOC_END)); + + kasan_early_stage = false; + + /* Populate the linear mapping */ + for_each_mem_range(i, &pa_start, &pa_end) { + void *start = (void *)phys_to_virt(pa_start); + void *end = (void *)phys_to_virt(pa_end); + + if (start >= end) + break; + + kasan_map_populate((unsigned long)kasan_mem_to_shadow(start), + (unsigned long)kasan_mem_to_shadow(end), NUMA_NO_NODE); + } + + /* Populate modules mapping */ + kasan_map_populate((unsigned long)kasan_mem_to_shadow((void *)MODULES_VADDR), + (unsigned long)kasan_mem_to_shadow((void *)MODULES_END), NUMA_NO_NODE); + /* + * Kasan may reuse the contents of kasan_early_shadow_pte directly, so we + * should make sure that it maps the zero page read-only. + */ + for (i = 0; i < PTRS_PER_PTE; i++) + set_pte(&kasan_early_shadow_pte[i], + pfn_pte(__phys_to_pfn(__pa_symbol(kasan_early_shadow_page)), + PAGE_KERNEL_RO)); + + memset(kasan_early_shadow_page, 0, PAGE_SIZE); + __sync(); + csr_write64(__pa_symbol(swapper_pg_dir), LOONGARCH_CSR_PGDH); + local_flush_tlb_all(); + + /* At this point kasan is fully initialized. Enable error messages */ + init_task.kasan_depth = 0; + pr_info("KernelAddressSanitizer initialized.\n"); +} diff --git a/arch/loongarch/vdso/Makefile b/arch/loongarch/vdso/Makefile index d89e2ac75f7b..df328cd92875 100644 --- a/arch/loongarch/vdso/Makefile +++ b/arch/loongarch/vdso/Makefile @@ -1,6 +1,10 @@ # SPDX-License-Identifier: GPL-2.0 # Objects to go into the VDSO. +ifdef CONFIG_KASAN +KASAN_SANITIZE := n +endif + # Absolute relocation type $(ARCH_REL_TYPE_ABS) needs to be defined before # the inclusion of generic Makefile. ARCH_REL_TYPE_ABS := R_LARCH_32|R_LARCH_64|R_LARCH_MARK_LA|R_LARCH_JUMP_SLOT diff --git a/include/linux/kasan.h b/include/linux/kasan.h index f7ef70661ce2..3b91b941873d 100644 --- a/include/linux/kasan.h +++ b/include/linux/kasan.h @@ -54,11 +54,13 @@ extern p4d_t kasan_early_shadow_p4d[MAX_PTRS_PER_P4D]; int kasan_populate_early_shadow(const void *shadow_start, const void *shadow_end); +#ifndef __HAVE_ARCH_SHADOW_MAP static inline void *kasan_mem_to_shadow(const void *addr) { return (void *)((unsigned long)addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET; } +#endif int kasan_add_zero_shadow(void *start, unsigned long size); void kasan_remove_zero_shadow(void *start, unsigned long size); diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c index e5eef670735e..f86194750df5 100644 --- a/mm/kasan/generic.c +++ b/mm/kasan/generic.c @@ -175,6 +175,11 @@ static __always_inline bool check_region_inline(unsigned long addr, if (unlikely(!addr_has_metadata((void *)addr))) return !kasan_report(addr, size, write, ret_ip); +#ifndef __HAVE_ARCH_SHADOW_MAP + if (unlikely(kasan_mem_to_shadow((unsigned long *)addr) == NULL)) + return !kasan_report(addr, size, write, ret_ip); +#endif + if (likely(!memory_is_poisoned(addr, size))) return true; diff --git a/mm/kasan/init.c b/mm/kasan/init.c index cc64ed6858c6..860061a22ca9 100644 --- a/mm/kasan/init.c +++ b/mm/kasan/init.c @@ -166,8 +166,9 @@ static int __ref zero_pud_populate(p4d_t *p4d, unsigned long addr, if (!p) return -ENOMEM; } else { - pud_populate(&init_mm, pud, - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); + pmd_init(p); + pud_populate(&init_mm, pud, p); } } zero_pmd_populate(pud, addr, next); @@ -207,8 +208,9 @@ static int __ref zero_p4d_populate(pgd_t *pgd, unsigned long addr, if (!p) return -ENOMEM; } else { - p4d_populate(&init_mm, p4d, - early_alloc(PAGE_SIZE, NUMA_NO_NODE)); + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE); + pud_init(p); + p4d_populate(&init_mm, p4d, p); } } zero_pud_populate(p4d, addr, next); diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index a61eeee3095a..033335c13b25 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -291,16 +291,22 @@ struct kasan_stack_ring { #if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS) +#ifndef __HAVE_ARCH_SHADOW_MAP static inline const void *kasan_shadow_to_mem(const void *shadow_addr) { return (void *)(((unsigned long)shadow_addr - KASAN_SHADOW_OFFSET) << KASAN_SHADOW_SCALE_SHIFT); } +#endif static __always_inline bool addr_has_metadata(const void *addr) { +#ifdef __HAVE_ARCH_SHADOW_MAP + return (kasan_mem_to_shadow((void *)addr) != NULL); +#else return (kasan_reset_tag(addr) >= kasan_shadow_to_mem((void *)KASAN_SHADOW_START)); +#endif } /**
1/8 of kernel addresses reserved for shadow memory. But for LoongArch, There are a lot of holes between different segments and valid address space(256T available) is insufficient to map all these segments to kasan shadow memory with the common formula provided by kasan core, saying addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET So Loongarch has a ARCH specific mapping formula,different segments are mapped individually, and only limited length of space of that specific segment is mapped to shadow. At early boot stage the whole shadow region populated with just one physical page (kasan_early_shadow_page). Later, this page is reused as readonly zero shadow for some memory that Kasan currently don't track. After mapping the physical memory, pages for shadow memory are allocated and mapped. Functions like memset/memmove/memcpy do a lot of memory accesses. If bad pointer passed to one of these function it is important to catch this. Compiler's instrumentation cannot do this since these functions are written in assembly. KASan replaces memory functions with manually instrumented variants. Original functions declared as weak symbols so strong definitions in mm/kasan/kasan.c could replace them. Original functions have aliases with '__' prefix in name, so we could call non-instrumented variant if needed. Signed-off-by: Qing Zhang <zhangqing@loongson.cn> --- Documentation/dev-tools/kasan.rst | 4 +- .../features/debug/KASAN/arch-support.txt | 2 +- arch/loongarch/Kconfig | 7 + arch/loongarch/include/asm/kasan.h | 120 +++++++++ arch/loongarch/include/asm/pgtable.h | 7 + arch/loongarch/include/asm/setup.h | 2 +- arch/loongarch/include/asm/string.h | 20 ++ arch/loongarch/kernel/Makefile | 3 + arch/loongarch/kernel/head.S | 14 +- arch/loongarch/kernel/relocate.c | 8 +- arch/loongarch/kernel/setup.c | 4 + arch/loongarch/lib/memcpy.S | 4 +- arch/loongarch/lib/memmove.S | 13 +- arch/loongarch/lib/memset.S | 4 +- arch/loongarch/mm/Makefile | 2 + arch/loongarch/mm/kasan_init.c | 255 ++++++++++++++++++ arch/loongarch/vdso/Makefile | 4 + include/linux/kasan.h | 2 + mm/kasan/generic.c | 5 + mm/kasan/init.c | 10 +- mm/kasan/kasan.h | 6 + 21 files changed, 470 insertions(+), 26 deletions(-) create mode 100644 arch/loongarch/include/asm/kasan.h create mode 100644 arch/loongarch/mm/kasan_init.c