[PATCH 1/1] x86_64: fix KASan shadow region page tables

From: Alexander Popov
Date: Fri May 22 2015 - 12:17:30 EST


Physical addresses in KASan shadow region page tables need fixup:
kernel halts without it if phys_base is not zero.

Signed-off-by: Alexander Popov <alpopov@xxxxxxxxxxxxxx>
---
arch/x86/kernel/head_64.S | 14 ++++++++++++++
1 file changed, 14 insertions(+)

diff --git a/arch/x86/kernel/head_64.S b/arch/x86/kernel/head_64.S
index ae6588b..f7711bb 100644
--- a/arch/x86/kernel/head_64.S
+++ b/arch/x86/kernel/head_64.S
@@ -95,6 +95,20 @@ startup_64:

addq %rbp, level2_fixmap_pgt + (506*8)(%rip)

+#ifdef CONFIG_KASAN
+ xor %rax, %rax
+ leaq kasan_zero_pud(%rip), %rbx
+ leaq kasan_zero_pmd(%rip), %rcx
+ leaq kasan_zero_pte(%rip), %rdx
+1:
+ addq %rbp, (%rbx,%rax,8)
+ addq %rbp, (%rcx,%rax,8)
+ addq %rbp, (%rdx,%rax,8)
+ inc %rax
+ cmp $512, %rax
+ jne 1b
+#endif
+
/*
* Set up the identity mapping for the switchover. These
* entries should *NOT* have the global bit set! This also
--
1.9.1

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/