Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp410079ybh; Wed, 11 Mar 2020 03:34:13 -0700 (PDT) X-Google-Smtp-Source: ADFU+vva9K8kn2tr6aLEilw5YuuEDvcOFzBzC6GDTTLPK9WbO0NygtkjssK4asI1pJ1XF2J8OfMs X-Received: by 2002:a54:4387:: with SMTP id u7mr1148055oiv.139.1583922852897; Wed, 11 Mar 2020 03:34:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583922852; cv=none; d=google.com; s=arc-20160816; b=OtH/JCScHAoGkzbZN3kl6rKgJfjhmSvI0GiAJM9+iI1xVyh+332aeT7J5NBqKL0TdG bn+C/dxoHann3OfdUeWOvWgh+JtQ30na5ak33UOVvtZKyVzU5cT0W0oQjy7b/lBsOpmO TxQdTZOx6yEyTgmXwzbI7ZUBTsaw5NeprV2VH/EeaFGfEKKQpIqhXqbzV1gnmAEp2i/O Q6WKW5ZJGbgcKgGAq4vm2G6EIpiomLw5JvW62d3N6LNgfpwUT1neirif/ZCKPhx+ebIi Or3J/oDlBIVQy942mGMBjVNGiXrjmUZJ7tKm3k1ZGmx9LzdqfbVBUXPY7fNvpeDJ0FJU 0LdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=3LfebpItnr8UT53yyDeaqk12MrsoCu98ryFWrZq5vmk=; b=C9bSeNClU0hWhDoYcwB06lCmxiKGHHc8521/+nD6dVrS0LbntUxNyDbvRjtEVbCrpu J3eUTwcqKS8OFWL4ry3f5kgXw8sd95tUrqS+HGU5vrpwK5+XqW5DRz6UorfggrIcUOeU BXgL0df/eVP4zDEBbZLZgKhChbSahrWN61jseODJU3L0oIWaT47QBMZyCWoTAKY5Nkjq 03hztyd/3kKKA3PRo6VP5j6ovxenkmUFYMI648Ecjnn6Sz/TsR/9Q+L38GnOkZRe69aa wKE0FmURNC8uQn8AuLJRn0J5SzijmlleEGvCIQgXNNJcZcN4qveKAvxjRdZLVs4D3Rhf cnGw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o20si99996oos.59.2020.03.11.03.34.02; Wed, 11 Mar 2020 03:34:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728933AbgCKKcP (ORCPT + 99 others); Wed, 11 Mar 2020 06:32:15 -0400 Received: from s3.sipsolutions.net ([144.76.43.62]:46324 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726097AbgCKKcP (ORCPT ); Wed, 11 Mar 2020 06:32:15 -0400 Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1jByeg-0013Bw-GU; Wed, 11 Mar 2020 11:32:02 +0100 Message-ID: <4b8c1696f658b4c6c393956734d580593b55c4c0.camel@sipsolutions.net> Subject: Re: [PATCH] UML: add support for KASAN under x86_64 From: Johannes Berg To: Patricia Alfonso , Jeff Dike , Richard Weinberger , anton.ivanov@cambridgegreys.com, Andrey Ryabinin , Dmitry Vyukov , Brendan Higgins , David Gow Cc: kasan-dev , LKML , linux-um@lists.infradead.org Date: Wed, 11 Mar 2020 11:32:00 +0100 In-Reply-To: (sfid-20200306_010352_481400_662BF174) References: <20200226004608.8128-1-trishalfonso@google.com> (sfid-20200306_010352_481400_662BF174) Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.2 (3.34.2-1.fc31) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, > Hi all, I just want to bump this so we can get all the comments while > this is still fresh in everyone's minds. I would love if some UML > maintainers could give their thoughts! I'm not the maintainer, and I don't know where Richard is, but I just tried with the test_kasan.ko module, and that seems to work. Did you test that too? I was surprised to see this because you said you didn't test modules, but surely this would've been the easiest way? Anyway, as expected, stack (and of course alloca) OOB access is not detected right now, but otherwise it seems great. Here's the log: https://p.sipsolutions.net/ca9b4157776110fe.txt I'll repost my module init thing as a proper patch then, I guess. I do see issues with modules though, e.g. https://p.sipsolutions.net/1a2df5f65d885937.txt where we seem to get some real confusion when lockdep is storing the stack trace?? And https://p.sipsolutions.net/9a97e8f68d8d24b7.txt, where something convinces ASAN that an address is a user address (it might even be right?) and it disallows kernel access to it? Also, do you have any intention to work on the stack later? For me, enabling that doesn't even report any issues, it just hangs at 'boot'. johannes