Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/813995/?format=api
{ "id": 813995, "url": "http://patchwork.ozlabs.org/api/patches/813995/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20170914223517.8242-10-pasha.tatashin@oracle.com/", "project": { "id": 2, "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api", "name": "Linux PPC development", "link_name": "linuxppc-dev", "list_id": "linuxppc-dev.lists.ozlabs.org", "list_email": "linuxppc-dev@lists.ozlabs.org", "web_url": "https://github.com/linuxppc/wiki/wiki", "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git", "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/", "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/", "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}" }, "msgid": "<20170914223517.8242-10-pasha.tatashin@oracle.com>", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20170914223517.8242-10-pasha.tatashin@oracle.com/", "date": "2017-09-14T22:35:15", "name": "[v8,09/11] x86/kasan: explicitly zero kasan shadow memory", "commit_ref": null, "pull_url": null, "state": "not-applicable", "archived": false, "hash": "038ea14fe28c0bdc8658a002a4cb05528830d5d3", "submitter": { "id": 71010, "url": "http://patchwork.ozlabs.org/api/people/71010/?format=api", "name": "Pavel Tatashin", "email": "pasha.tatashin@oracle.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20170914223517.8242-10-pasha.tatashin@oracle.com/mbox/", "series": [ { "id": 3173, "url": "http://patchwork.ozlabs.org/api/series/3173/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=3173", "date": "2017-09-14T22:35:12", "name": "complete deferred page initialization", "version": 8, "mbox": "http://patchwork.ozlabs.org/series/3173/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/813995/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/813995/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<linuxppc-dev-bounces+patchwork-incoming=ozlabs.org@lists.ozlabs.org>", "X-Original-To": [ "patchwork-incoming@ozlabs.org", "linuxppc-dev@lists.ozlabs.org" ], "Delivered-To": [ "patchwork-incoming@ozlabs.org", "linuxppc-dev@lists.ozlabs.org" ], "Received": [ "from lists.ozlabs.org (lists.ozlabs.org [103.22.144.68])\n\t(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xtYWt0vYCz9sCZ\n\tfor <patchwork-incoming@ozlabs.org>;\n\tFri, 15 Sep 2017 08:45:14 +1000 (AEST)", "from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 3xtYWt04LCzDrZJ\n\tfor <patchwork-incoming@ozlabs.org>;\n\tFri, 15 Sep 2017 08:45:14 +1000 (AEST)", "from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 3xtYLD6GPSzDrWl\n\tfor <linuxppc-dev@lists.ozlabs.org>;\n\tFri, 15 Sep 2017 08:36:52 +1000 (AEST)", "from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74])\n\tby aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with\n\tESMTP id v8EMZcA8029598\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256\n\tverify=OK); Thu, 14 Sep 2017 22:35:39 GMT", "from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72])\n\tby userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id v8EMZcee028809\n\t(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256\n\tverify=OK); Thu, 14 Sep 2017 22:35:38 GMT", "from ubhmp0003.oracle.com (ubhmp0003.oracle.com [156.151.24.56])\n\tby userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id v8EMZc7k009764; \n\tThu, 14 Sep 2017 22:35:38 GMT", "from cmex.localdomain (/12.145.98.253)\n\tby default (Oracle Beehive Gateway v4.0)\n\twith ESMTP ; Thu, 14 Sep 2017 22:35:38 +0000" ], "Authentication-Results": "ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=oracle.com\n\t(client-ip=141.146.126.69; helo=aserp1040.oracle.com;\n\tenvelope-from=pasha.tatashin@oracle.com; receiver=<UNKNOWN>)", "From": "Pavel Tatashin <pasha.tatashin@oracle.com>", "To": "linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org,\n\tlinux-mm@kvack.org, linuxppc-dev@lists.ozlabs.org,\n\tlinux-s390@vger.kernel.org, linux-arm-kernel@lists.infradead.org,\n\tx86@kernel.org, kasan-dev@googlegroups.com, borntraeger@de.ibm.com,\n\theiko.carstens@de.ibm.com, davem@davemloft.net, willy@infradead.org, \n\tmhocko@kernel.org, ard.biesheuvel@linaro.org, will.deacon@arm.com,\n\tcatalin.marinas@arm.com, sam@ravnborg.org, mgorman@techsingularity.net,\n\tSteven.Sistare@oracle.com, daniel.m.jordan@oracle.com,\n\tbob.picco@oracle.com", "Subject": "[PATCH v8 09/11] x86/kasan: explicitly zero kasan shadow memory", "Date": "Thu, 14 Sep 2017 18:35:15 -0400", "Message-Id": "<20170914223517.8242-10-pasha.tatashin@oracle.com>", "X-Mailer": "git-send-email 2.14.1", "In-Reply-To": "<20170914223517.8242-1-pasha.tatashin@oracle.com>", "References": "<20170914223517.8242-1-pasha.tatashin@oracle.com>", "X-Source-IP": "userv0022.oracle.com [156.151.31.74]", "X-BeenThere": "linuxppc-dev@lists.ozlabs.org", "X-Mailman-Version": "2.1.24", "Precedence": "list", "List-Id": "Linux on PowerPC Developers Mail List\n\t<linuxppc-dev.lists.ozlabs.org>", "List-Unsubscribe": "<https://lists.ozlabs.org/options/linuxppc-dev>,\n\t<mailto:linuxppc-dev-request@lists.ozlabs.org?subject=unsubscribe>", "List-Archive": "<http://lists.ozlabs.org/pipermail/linuxppc-dev/>", "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>", "List-Help": "<mailto:linuxppc-dev-request@lists.ozlabs.org?subject=help>", "List-Subscribe": "<https://lists.ozlabs.org/listinfo/linuxppc-dev>,\n\t<mailto:linuxppc-dev-request@lists.ozlabs.org?subject=subscribe>", "Errors-To": "linuxppc-dev-bounces+patchwork-incoming=ozlabs.org@lists.ozlabs.org", "Sender": "\"Linuxppc-dev\"\n\t<linuxppc-dev-bounces+patchwork-incoming=ozlabs.org@lists.ozlabs.org>" }, "content": "To optimize the performance of struct page initialization,\nvmemmap_populate() will no longer zero memory.\n\nWe must explicitly zero the memory that is allocated by vmemmap_populate()\nfor kasan, as this memory does not go through struct page initialization\npath.\n\nSigned-off-by: Pavel Tatashin <pasha.tatashin@oracle.com>\nReviewed-by: Steven Sistare <steven.sistare@oracle.com>\nReviewed-by: Daniel Jordan <daniel.m.jordan@oracle.com>\nReviewed-by: Bob Picco <bob.picco@oracle.com>\n---\n arch/x86/mm/kasan_init_64.c | 66 +++++++++++++++++++++++++++++++++++++++++++++\n 1 file changed, 66 insertions(+)", "diff": "diff --git a/arch/x86/mm/kasan_init_64.c b/arch/x86/mm/kasan_init_64.c\nindex bc84b73684b7..cc0399032673 100644\n--- a/arch/x86/mm/kasan_init_64.c\n+++ b/arch/x86/mm/kasan_init_64.c\n@@ -84,6 +84,66 @@ static struct notifier_block kasan_die_notifier = {\n };\n #endif\n \n+/*\n+ * x86 variant of vmemmap_populate() uses either PMD_SIZE pages or base pages\n+ * to map allocated memory. This routine determines the page size for the given\n+ * address from vmemmap.\n+ */\n+static u64 get_vmemmap_pgsz(u64 addr)\n+{\n+\tpgd_t *pgd;\n+\tp4d_t *p4d;\n+\tpud_t *pud;\n+\tpmd_t *pmd;\n+\n+\tpgd = pgd_offset_k(addr);\n+\tBUG_ON(pgd_none(*pgd) || pgd_large(*pgd));\n+\n+\tp4d = p4d_offset(pgd, addr);\n+\tBUG_ON(p4d_none(*p4d) || p4d_large(*p4d));\n+\n+\tpud = pud_offset(p4d, addr);\n+\tBUG_ON(pud_none(*pud) || pud_large(*pud));\n+\n+\tpmd = pmd_offset(pud, addr);\n+\tBUG_ON(pmd_none(*pmd));\n+\n+\tif (pmd_large(*pmd))\n+\t\treturn PMD_SIZE;\n+\treturn PAGE_SIZE;\n+}\n+\n+/*\n+ * Memory that was allocated by vmemmap_populate is not zeroed, so we must\n+ * zero it here explicitly.\n+ */\n+static void\n+zero_vmemmap_populated_memory(void)\n+{\n+\tu64 i, start, end;\n+\n+\tfor (i = 0; i < E820_MAX_ENTRIES && pfn_mapped[i].end; i++) {\n+\t\tvoid *kaddr_start = pfn_to_kaddr(pfn_mapped[i].start);\n+\t\tvoid *kaddr_end = pfn_to_kaddr(pfn_mapped[i].end);\n+\n+\t\tstart = (u64)kasan_mem_to_shadow(kaddr_start);\n+\t\tend = (u64)kasan_mem_to_shadow(kaddr_end);\n+\n+\t\t/* Round to the start end of the mapped pages */\n+\t\tstart = rounddown(start, get_vmemmap_pgsz(start));\n+\t\tend = roundup(end, get_vmemmap_pgsz(start));\n+\t\tmemset((void *)start, 0, end - start);\n+\t}\n+\n+\tstart = (u64)kasan_mem_to_shadow(_stext);\n+\tend = (u64)kasan_mem_to_shadow(_end);\n+\n+\t/* Round to the start end of the mapped pages */\n+\tstart = rounddown(start, get_vmemmap_pgsz(start));\n+\tend = roundup(end, get_vmemmap_pgsz(start));\n+\tmemset((void *)start, 0, end - start);\n+}\n+\n void __init kasan_early_init(void)\n {\n \tint i;\n@@ -146,6 +206,12 @@ void __init kasan_init(void)\n \tload_cr3(init_top_pgt);\n \t__flush_tlb_all();\n \n+\t/*\n+\t * vmemmap_populate does not zero the memory, so we need to zero it\n+\t * explicitly\n+\t */\n+\tzero_vmemmap_populated_memory();\n+\n \t/*\n \t * kasan_zero_page has been used as early shadow memory, thus it may\n \t * contain some garbage. Now we can clear and write protect it, since\n", "prefixes": [ "v8", "09/11" ] }