From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 73B4FC3DA7F for ; Mon, 12 Aug 2024 23:32:40 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 0ED456B0095; Mon, 12 Aug 2024 19:32:40 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 09C276B0098; Mon, 12 Aug 2024 19:32:40 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EA66A6B009A; Mon, 12 Aug 2024 19:32:39 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id CAB2D6B0095 for ; Mon, 12 Aug 2024 19:32:39 -0400 (EDT) Received: from smtpin17.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 4A63012048A for ; Mon, 12 Aug 2024 23:32:39 +0000 (UTC) X-FDA: 82445195238.17.4DC8982 Received: from mail-ed1-f51.google.com (mail-ed1-f51.google.com [209.85.208.51]) by imf11.hostedemail.com (Postfix) with ESMTP id 7AFBC40010 for ; Mon, 12 Aug 2024 23:32:37 +0000 (UTC) Authentication-Results: imf11.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b="YCvnU+/3"; spf=pass (imf11.hostedemail.com: domain of mmaurer@google.com designates 209.85.208.51 as permitted sender) smtp.mailfrom=mmaurer@google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1723505522; a=rsa-sha256; cv=none; b=do3lsldo21pRYjRexwoSd3gCgR/cUxY8Hu9NfXrRm8ikw0f2abZHHwibYYdTY1CmUH6zwt qEQRflfqNwAzOxF0UwOYMwTTC4J9n8QgXk6IHzeTB+OXC77v5i/rH7aQdnsfEkzSfm00U0 /KUiVrc1/kVNrd2jJVRwQipUY2OMM3M= ARC-Authentication-Results: i=1; imf11.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b="YCvnU+/3"; spf=pass (imf11.hostedemail.com: domain of mmaurer@google.com designates 209.85.208.51 as permitted sender) smtp.mailfrom=mmaurer@google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1723505522; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=WINgTrCjEBL3+Nvcrrvvezt+JSvL21kHSKavfKsKanw=; b=wODE7LxJlbYYK87QzH8ctpBC46ZRG1oayE+SqBS3531NgfKVQ43mN4aPCFJSz3lkymIoql aT44fn7+FH1cQ6NXbM7mfLbHjstrX6XoQJVS6mnOei+0iy/PiOQAVxhdlNXaAimUD8BQVr Hl4ugbeFDVxjKjyeEPU+l89IYmXDg2U= Received: by mail-ed1-f51.google.com with SMTP id 4fb4d7f45d1cf-5a18a5dbb23so1510a12.1 for ; Mon, 12 Aug 2024 16:32:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1723505556; x=1724110356; darn=kvack.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=WINgTrCjEBL3+Nvcrrvvezt+JSvL21kHSKavfKsKanw=; b=YCvnU+/3JzAhJNLu+4We/FgDR9FIsa1IuAOao8B3ixosrwr4XMqaBQvZw5dLHEEM3O CN75htzTr5dKLTXQ0/nlpH6y7pqV/w5XaUGzJHe0/WIU/PjjilDFEQUW2DSdpOviOhLZ oIK+NxtOj9Kyg7btty95tkpmkoT+q7koc9tdKfQxfunc36yrGXyo8gGHeRVv6jvD54E7 ZRbqUWen4c+SshaffumqI8AhYygeA7RsoyMKBVx5a2M0lMR7o1luqXOT8kJtAy6pkWIQ sAkFzRZR2JOeqZYLhBOJ6TGw/1lVzPFyYoN4eLIiaTL/bpDvVcfBjPBUnavZR8WKo10w qWiA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1723505556; x=1724110356; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=WINgTrCjEBL3+Nvcrrvvezt+JSvL21kHSKavfKsKanw=; b=cHara7CxLrOYM8oPiyiY05j4+LTA+y7om7W5VvFuhLMI8vJEVRHXbXVru7EIuofs5Z T58ewMYKvqgiiyqJDaGx7zPW828Ga4RdpRTOLr2DBrgvEXugx82z9jr+qWYbW+uHFTr0 oP8SZgb4HkLUTX+ri1xHJLIjRyb6VHJTaFzCAz3h5sXLjVv2+4rJVABDqTDU4zxcoEHo 5BHXRIrYxqKMFspCpAqFeTCbe0kBbzPM+HGekmFOh+zbXc4pZkcxqmlaPAhojkK+erEX trgmuB6ZQRwe/hMjdD/4/3+MpM5D1gPH0hJA0vDlL2w7UpQWwQAk7hlhZgDZmKvSG4dD wmSA== X-Forwarded-Encrypted: i=1; AJvYcCWJ1RHijLkQl3sFAH8mEiHzpYS5JRyuM1T1e6KIlG+Jc7dF2Ikxj+zFaGoWV1ChZ6jgZnxMc6x76/o/kxXDb5a/PCg= X-Gm-Message-State: AOJu0Yx30r/1ktXERpKVgxsVn6OYc+Qlcw/El+/DL+hq/Jc8SvfVxY1b V7OkA3N1lmffQkP/mWKbMIFTmbFHdFYcURhEVAW8qIRhMvK0BF+BButcOJGcD/sRtKLCcyGIutr sjjZ2pPg7I0I9UcaVzRVyDApjkn84/qUHlujr X-Google-Smtp-Source: AGHT+IH1VwXhHaZFBtsvf8zgZNCNPlxYCt9sfhXPfzEyA01KGjm/YIu1OjxgUUJhYkiEUOMM3UafU8NvB3Dzs25JDK4= X-Received: by 2002:a05:6402:3496:b0:57d:436b:68d6 with SMTP id 4fb4d7f45d1cf-5bd73d1681emr17857a12.7.1723505555723; Mon, 12 Aug 2024 16:32:35 -0700 (PDT) MIME-Version: 1.0 References: <20240812232910.2026387-1-mmaurer@google.com> <20240812232910.2026387-4-mmaurer@google.com> In-Reply-To: <20240812232910.2026387-4-mmaurer@google.com> From: Matthew Maurer Date: Mon, 12 Aug 2024 16:32:23 -0700 Message-ID: Subject: Re: [PATCH v2 3/3] kasan: rust: Add KASAN smoke test via UAF To: dvyukov@google.com, ojeda@kernel.org, Andrey Ryabinin , Andrew Morton , Alex Gaynor , Wedson Almeida Filho Cc: aliceryhl@google.com, samitolvanen@google.com, Alexander Potapenko , Andrey Konovalov , Vincenzo Frascino , Boqun Feng , Gary Guo , =?UTF-8?Q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Andreas Hindborg , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, rust-for-linux@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Stat-Signature: sjsh3wrusess8en3hro9upkdghiosjmk X-Rspamd-Queue-Id: 7AFBC40010 X-Rspam-User: X-Rspamd-Server: rspam10 X-HE-Tag: 1723505557-380918 X-HE-Meta: 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 ag0bg9JL AFokEuNNetaQ471u56f30WFCTdt4JZQp3/cPoNLsG5zSD50FRpiJAknS7IjnXqMVPZWdtzW+Qavw/iX3hcV5d6GWUYkxfMr8IB8nHJWSHZyMCRx2/Qmi3TLASIPVm5ls3c2Bwr0f/LqLlc0cZZDRyiVBEAzf4zmZAHrMQsp+XYbYT4MzebREN6HsQXaFcnFW5/ZnM+RbzFoJjtRCII38iy6qUGVmUV7GyZpY37wxM6pQ79N1p5UKcpKTVQXlhr5BEL4I060/dWEmfiXk= X-Bogosity: Ham, tests=bogofilter, spamicity=0.048196, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: > diff --git a/mm/kasan/kasan_test_rust.rs b/mm/kasan/kasan_test_rust.rs > new file mode 100644 > index 000000000000..6f4b43ea488c > --- /dev/null > +++ b/mm/kasan/kasan_test_rust.rs > @@ -0,0 +1,17 @@ Realized right after sending there should be // SPDX-License-Identifier: GPL-2.0 here. It should be added before merging, but not re-sending to avoid spam. > +//! Helper crate for KASAN testing > +//! Provides behavior to check the sanitization of Rust code. > +use kernel::prelude::*; > +use core::ptr::addr_of_mut; > + > +/// Trivial UAF - allocate a big vector, grab a pointer partway through, > +/// drop the vector, and touch it. > +#[no_mangle] > +pub extern "C" fn kasan_test_rust_uaf() -> u8 { > + let mut v: Vec = Vec::new(); > + for _ in 0..4096 { > + v.push(0x42, GFP_KERNEL).unwrap(); > + } > + let ptr: *mut u8 = addr_of_mut!(v[2048]); > + drop(v); > + unsafe { *ptr } > +} > -- > 2.46.0.76.ge559c4bf1a-goog >