lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 13 Jan 2021 20:57:49 -0800 (PST) From: Palmer Dabbelt <palmer@...belt.com> To: nylon7@...estech.com CC: linux-riscv@...ts.infradead.org, linux-kernel@...r.kernel.org, kasan-dev@...glegroups.com, aou@...s.berkeley.edu, Paul Walmsley <paul.walmsley@...ive.com>, dvyukov@...gle.com, glider@...gle.com, aryabinin@...tuozzo.com, alankao@...estech.com, nickhu@...estech.com, nylon7@...estech.com Subject: Re: [PATCH 1/1] riscv: Fix KASAN memory mapping. On Tue, 12 Jan 2021 18:24:10 PST (-0800), nylon7@...estech.com wrote: > From: Nick Hu <nickhu@...estech.com> > > Use virtual address instead of physical address when translating > the address to shadow memory by kasan_mem_to_shadow(). > > Signed-off-by: Nick Hu <nickhu@...estech.com> > Signed-off-by: Nylon Chen <nylon7@...estech.com> > --- > arch/riscv/mm/kasan_init.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/riscv/mm/kasan_init.c b/arch/riscv/mm/kasan_init.c > index 12ddd1f6bf70..a8a2ffd9114a 100644 > --- a/arch/riscv/mm/kasan_init.c > +++ b/arch/riscv/mm/kasan_init.c > @@ -93,8 +93,8 @@ void __init kasan_init(void) > VMALLOC_END)); > > for_each_mem_range(i, &_start, &_end) { > - void *start = (void *)_start; > - void *end = (void *)_end; > + void *start = (void *)__va(_start); > + void *end = (void *)__va(_end); > > if (start >= end) > break; Thanks, this is on fixes.
Powered by blists - more mailing lists