From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9EB7DC433EF for ; Mon, 24 Jan 2022 18:08:01 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3629D6B0093; Mon, 24 Jan 2022 13:08:01 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 3112D6B0099; Mon, 24 Jan 2022 13:08:01 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1B3A46B009C; Mon, 24 Jan 2022 13:08:01 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0251.hostedemail.com [216.40.44.251]) by kanga.kvack.org (Postfix) with ESMTP id 09C1E6B0093 for ; Mon, 24 Jan 2022 13:08:01 -0500 (EST) Received: from smtpin04.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id B8AE093D88 for ; Mon, 24 Jan 2022 18:08:00 +0000 (UTC) X-FDA: 79065964320.04.1F6958D Received: from mail-oi1-f169.google.com (mail-oi1-f169.google.com [209.85.167.169]) by imf05.hostedemail.com (Postfix) with ESMTP id 839B210004D for ; Mon, 24 Jan 2022 18:07:58 +0000 (UTC) Received: by mail-oi1-f169.google.com with SMTP id s127so26787404oig.2 for ; Mon, 24 Jan 2022 10:07:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WDJ2atOq+odBrX85L51zk+4WIQAQxuGUPgw+QxCzzw4=; b=hg6bbvNJY1HV9AmrK7Ect3vbTYFvrYScXZdRSZ+JdQpDUUvm4vQtdzOXW+i/lr630l 7HI6y3qEqw4rM/wso3mZsB1HNyggiuO0Ym+joMMV4vb4k2bG+EqQzoxF6Dfi0NYBj6KN E1QtjdjBMhz+5OBOKGRwuSM5iRj528f9oBbYfqzstxQirp8W9Y759/w0ZWKyXjA94Whz BV//1X338AoCEJrvY0W12VAe7Kfxgdjue56St7qcy5jr03eo0T95n0Fk5MzCYhSuOnxB c87YfmGa037WYByODqkrFkgZKnQR9Qo+7bIIWq58TbL9n2xt5iGOQkozkT80t6z2GsP2 vSOA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WDJ2atOq+odBrX85L51zk+4WIQAQxuGUPgw+QxCzzw4=; b=8GuHQNUJoDYxEGjlbovOk/wPwT5KRhv9d9ESbNdQay8J1rvBct6dOw8IibjLKf1RHZ zQRA3uRbKrK+C72e+N8/xydEHpjGdU+uiQoVPmwPJIDpoOPi7XOokcQ9ozj1q1AFr62F lQR2o5j4U02Icf0IptiDtt0wPhddq/FZIMx6Csyd35jI6gNKQp4/3nQzBvmqINvsDtnE y+1BCOlaqwzG70dPjrubwi0CFhPn2DRDU2GXhI9AjemRcuTVa4NS6qTzj9d156DxfdUJ /PSQqKwYCtJUiHbLgXGBfBu/2nxBocGK4EgX4QVEO84pGfxETww+tO+G6tLLQVkur4Hk NYaw== X-Gm-Message-State: AOAM532vXN5DM22GUS6DcuEOxLqcSkpSp63uGfO/AHbYFusZQHC4r/Cm GNC46oN8uVgtcNbTUQWYUdDQVxOL6kTdxQ73ICxmAaqz4aU= X-Google-Smtp-Source: ABdhPJzjvnKetD9DQ1LikgmSEJtncCyvPZd0qGvFVHLDPo/yclNBXoQ/bp9gTv0JM8kBUYeiHp1bo8c/Ev2K7Km1Gx8= X-Received: by 2002:a05:6808:a97:: with SMTP id q23mr2556523oij.4.1643047191963; Mon, 24 Jan 2022 09:59:51 -0800 (PST) MIME-Version: 1.0 References: <20220124160744.1244685-1-elver@google.com> In-Reply-To: From: Marco Elver Date: Mon, 24 Jan 2022 18:59:40 +0100 Message-ID: Subject: Re: [PATCH] kasan: test: fix compatibility with FORTIFY_SOURCE To: Andrey Konovalov Cc: Andrew Morton , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , kasan-dev , LKML , Linux Memory Management List , Kees Cook , Brendan Higgins , linux-hardening@vger.kernel.org, Nico Pache Content-Type: text/plain; charset="UTF-8" X-Stat-Signature: xxtrgo1qd3qm3tzu94zsjoci9qz9kuya Authentication-Results: imf05.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=hg6bbvNJ; spf=pass (imf05.hostedemail.com: domain of elver@google.com designates 209.85.167.169 as permitted sender) smtp.mailfrom=elver@google.com; dmarc=pass (policy=reject) header.from=google.com X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 839B210004D X-HE-Tag: 1643047678-540110 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon, 24 Jan 2022 at 18:54, Andrey Konovalov wrote: > > -On Mon, Jan 24, 2022 at 5:07 PM Marco Elver wrote: > > > > With CONFIG_FORTIFY_SOURCE enabled, string functions will also perform > > dynamic checks using __builtin_object_size(ptr), which when failed will > > panic the kernel. > > > > Because the KASAN test deliberately performs out-of-bounds operations, > > the kernel panics with FORITY_SOURCE, for example: > > Nit: FORITY_SOURCE -> FORTIFY_SOURCE How did that happen?! My hands need some better synchronization... I'll refrain sending a v2, assuming Andrew can fix up this spelling mistake upon applying. [...] > > Reviewed-by: Andrey Konovalov Thanks!