Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1285224pxf; Fri, 12 Mar 2021 06:28:46 -0800 (PST) X-Google-Smtp-Source: ABdhPJylYAofmht5XF5gBE0MhB3F/1NBmrHvmm19U5VbLQHAl8gFjTENmD62fNae7XQZ+ZgxaUyA X-Received: by 2002:aa7:d492:: with SMTP id b18mr14330293edr.381.1615559326547; Fri, 12 Mar 2021 06:28:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615559326; cv=none; d=google.com; s=arc-20160816; b=031yney0Me00S0vMzk1nz/qJeaeHs4cN1UptOhJm9EEkLBymG4genJzK1w5sK0tQ+H gldfV3PM7HZ8EGUZXAcPDhBlo2mfjKG1k+P39fhIPf0bQPC8umTL1B1Q0OZrm2aWubtI bP70y1BVU4zJyA4mWRfREQ+vCphb+r6mI0sUTZGczJi81RBfC3tMrD5mx8fmqXHrOG7H udXNy5KnveXmuseesSioCGBvhuoCABEJl4wM4QMeZn4iJYqQWfNbpqPU/OA44IT0/3T8 3UH/qX/huOL5oGHuL+Qy15a++rVq8T3Y0eC7g3hBlr4hYjBHKdhRLOaYoduXvRZ7juhE bBTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=JZTsOk7rsE4y13QJJB2MKSWKMrX5Hi5qHr1bAz5AyQ0=; b=azi04HRlbFjNPvrknN6l+lxo567ree+Gas+4GVCsZxHfDU5kpYUUU1NePX13BlgKyj 67vmQh065x7vDSeSC//6hhaddVuobmyBvFWzCL4JZSd1TQgX2BMFO/80NQKifKCwZpNm mZzlnyuRucWUVw1hf2xv5mGn34KLplbRd/rxGQrRrQSFVBEhizCMfKokvrG8xOix5GF1 p9jKimI/vU9bTWg0VUcxu5wb6Wrg6S2XYa/1khvvvtqB3SA8RtFGhxSnvd4uTg4rZhin b/eHUK30swzArfdE5ePuA2XcJ0jilBDKCRC/BFdx1U5Tik2ctdLhj9eEoNJ9U0MHwWFc Clnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=hTQLmWZF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m24si4069429edp.422.2021.03.12.06.28.22; Fri, 12 Mar 2021 06:28:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=hTQLmWZF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232217AbhCLOZA (ORCPT + 99 others); Fri, 12 Mar 2021 09:25:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58084 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232229AbhCLOYs (ORCPT ); Fri, 12 Mar 2021 09:24:48 -0500 Received: from mail-qv1-xf49.google.com (mail-qv1-xf49.google.com [IPv6:2607:f8b0:4864:20::f49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4CA89C061574 for ; Fri, 12 Mar 2021 06:24:48 -0800 (PST) Received: by mail-qv1-xf49.google.com with SMTP id k92so14051642qva.20 for ; Fri, 12 Mar 2021 06:24:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=JZTsOk7rsE4y13QJJB2MKSWKMrX5Hi5qHr1bAz5AyQ0=; b=hTQLmWZFaN/2EBaaI1leaS+J+FqsNZbjnWkVy379obcmHmGy4TQ2Qbw+Y7mvRXWIOi aFMAit90SAHGfQvCfuLLb1QQIkmF2K3wiDzHPkHBtIgwtWRMrjV8BpwlSXV5K+R9LF7Y JqlKASAtwLSGMb1Xf+nxvRmQbuukKW23nwcI6FsgqoPDYyeGMj0l2+9+3OESihxuNoRV hGV0SpTMfQTwvi9S3K1Q+splEsfmPHDbYJouBLP6t1DXCggHaXMnKHuO6dh7/h7H08Gg jjlRbOXFzrTqOunGygqBtdhDs9ZbTwGVikayQ6Wx6EIDDOssRaphq6B5Z4yZv2bNLeI1 IKFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=JZTsOk7rsE4y13QJJB2MKSWKMrX5Hi5qHr1bAz5AyQ0=; b=VCtwxyKKDgKevCv8BfFGilMk+Nx4x+3Cvo9qFTNrjawrSVYQQG1Y3byMGdTpPTZqTg 6wk3Xwgatd9ykdW2plKUQw4PUJw/VY3/o2dRwEJrpmbB5Ut5GUGYqldyK0GAs4imUhEO qUGqGfH1WafDkdoXChPzawgX8O/jzHmx6peQl3b/EWUJjGG7tCppfPmELOOhdSuEkoCh vKuTRRvGjGTBFPFUM8WZQt+TmEmiLhOAQEPOhJ8RmQ1WeX1E8KWo10MaxxgGXaCcq1OR UyFCiUxAhSv6SJagm7Onqn0tTbKYjmcwlUvns1u80BVLNIOYK6jaGHsMtcPKjt2u56ho 6xiw== X-Gm-Message-State: AOAM532TyuOo4uIlp0mwoGKlZII447IYhMWSoqrN4OSk7YEmdiK+8nN2 4Dxr7OeUP7Z8kdidsiNdsZ4+Xv+W0xM+PnGs X-Received: from andreyknvl3.muc.corp.google.com ([2a00:79e0:15:13:95a:d8a8:4925:42be]) (user=andreyknvl job=sendgmr) by 2002:ad4:51c1:: with SMTP id p1mr12931323qvq.39.1615559087508; Fri, 12 Mar 2021 06:24:47 -0800 (PST) Date: Fri, 12 Mar 2021 15:24:28 +0100 In-Reply-To: Message-Id: <01364952f15789948f0627d6733b5cdf5209f83a.1615559068.git.andreyknvl@google.com> Mime-Version: 1.0 References: X-Mailer: git-send-email 2.31.0.rc2.261.g7f71774620-goog Subject: [PATCH v2 05/11] kasan: docs: update boot parameters section From: Andrey Konovalov To: Andrew Morton , Alexander Potapenko , Marco Elver Cc: Andrey Ryabinin , Dmitry Vyukov , kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrey Konovalov Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Update the "Boot parameters" section in KASAN documentation: - Mention panic_on_warn. - Mention kasan_multi_shot and its interaction with panic_on_warn. - Clarify kasan.fault=panic interaction with panic_on_warn. - A readability clean-up. Signed-off-by: Andrey Konovalov --- Documentation/dev-tools/kasan.rst | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst index cd12c890b888..1189be9b4cb5 100644 --- a/Documentation/dev-tools/kasan.rst +++ b/Documentation/dev-tools/kasan.rst @@ -174,10 +174,16 @@ call_rcu() and workqueue queuing. Boot parameters ~~~~~~~~~~~~~~~ +KASAN is affected by the generic ``panic_on_warn`` command line parameter. +When it is enabled, KASAN panics the kernel after printing a bug report. + +By default, KASAN prints a bug report only for the first invalid memory access. +With ``kasan_multi_shot``, KASAN prints a report on every invalid access. This +effectively disables ``panic_on_warn`` for KASAN reports. + Hardware tag-based KASAN mode (see the section about various modes below) is intended for use in production as a security mitigation. Therefore, it supports -boot parameters that allow to disable KASAN competely or otherwise control -particular KASAN features. +boot parameters that allow disabling KASAN or controlling its features. - ``kasan=off`` or ``=on`` controls whether KASAN is enabled (default: ``on``). @@ -185,8 +191,8 @@ particular KASAN features. traces collection (default: ``on``). - ``kasan.fault=report`` or ``=panic`` controls whether to only print a KASAN - report or also panic the kernel (default: ``report``). Note, that tag - checking gets disabled after the first reported bug. + report or also panic the kernel (default: ``report``). The panic happens even + if ``kasan_multi_shot`` is enabled. Implementation details ---------------------- -- 2.31.0.rc2.261.g7f71774620-goog