Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp1552538iob; Fri, 29 Apr 2022 07:47:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRMf8xxHmIIuG3abgLZcp6dYXl6QTq2Dl0IPdZ3zuWb022bVt4c3o2s6H70/PiftDEKT2b X-Received: by 2002:a2e:934b:0:b0:24f:cce:5501 with SMTP id m11-20020a2e934b000000b0024f0cce5501mr19103050ljh.443.1651243638774; Fri, 29 Apr 2022 07:47:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651243638; cv=none; d=google.com; s=arc-20160816; b=r+zPY5RP5df4D+0A/qyxMzu/BHMMRYwBYkejli+lwmUIo1U/CYH0DGjISi3EWaBpd1 iZl7y0+vpqV3i5Y4AO8gDjtIqxQV+daKO9Q4ykXPk1BcJsYeP9kWOenMtPdwOQ/wa0v5 S5Gq/6b1r3VvIa9zkA/u7YK34Tf8AB+PPw5FGGC9B5RZXn5kqOuLPYkMLh7fVX46e2dm 6SwZjSLjbCm/8YDFdj0PsUXC45F54mBa+Kkp1lySpmNQG8t0izYU/FKPaZ4VvRZeMPwF 4kaS2VdRT6e1+ByqruzYV1dBAG2ZlY3Lnb5T8Mhm+LzPMQC8S83pFfDR4uh+dWKWRTF5 7myg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=lTpBFKRXoGkoJEzRZfvNidTXlgsxPd3NSm3l3dY6/PU=; b=R28VN9QgKAJOQJ6f6COq42sxzQVM2n48bCeT9hzuYpmzOYveeiRQ3F1/B28dknriTT Q2yeeSlX9kjurTIdVh5lIpm1xDWUhWtjMx+1JY5QAhgcsr/HnPm93ko6u7IoWJ3t+9/+ bKpiCkC47znV/V4vLKGniceEuddOlFP4YKp48OIS4pa8baJkprEXoW7OQ1A5+tb+pDxV ZLS6K+4SEhxnFRHPYd+hyUN5tsoJljYU5UaQ3DyaqEhORkl8uuOWY9z39fftocdeErDN bV7uOO/CH6MERNN3kJalNQtyDyTjQXmp51zXnwMK9FxxnmbXGVZSrXTCYUPBYI6pgFyo NGqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=hvPXKUpq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p12-20020a056512328c00b00472114e4704si6339837lfe.130.2022.04.29.07.46.51; Fri, 29 Apr 2022 07:47:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=hvPXKUpq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1358906AbiD2MKz (ORCPT + 99 others); Fri, 29 Apr 2022 08:10:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33334 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347487AbiD2MKs (ORCPT ); Fri, 29 Apr 2022 08:10:48 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 037A0A1472; Fri, 29 Apr 2022 05:07:28 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id A7BAEB8346E; Fri, 29 Apr 2022 12:07:27 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CDCBFC385AD; Fri, 29 Apr 2022 12:07:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1651234046; bh=VeZZK3nq0xqQBNb7qp0qAkJQnROZryyX5wpt1xcREVU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=hvPXKUpqvoPhSromFOwczy83Hk/E46GrEsHnY/pQT/pRRP7M4nu6WiYLiQQuIsClo 84qCLfg1PPd6yp5ZFWCzlB6F3B2/9OrCDFLTrqtrPIBG7TKnUxkQL20bTNNA1/IURE 7w3eySy9Vn7u5Ub1xUfm9eiUEPcny7kmctL3bf0g= Date: Fri, 29 Apr 2022 14:07:23 +0200 From: Greg KH To: Jani Nikula Cc: David Gow , Brendan Higgins , Andy Shevchenko , Jonathan Corbet , Andrew Morton , Kees Cook , Shuah Khan , "Guilherme G . Piccoli" , Luis Chamberlain , Sebastian Reichel , John Ogness , Joe Fradley , Daniel Latypov , kunit-dev@googlegroups.com, linux-kselftest@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] kunit: Taint kernel if any tests run Message-ID: References: <20220429043913.626647-1-davidgow@google.com> <87tuacrv7t.fsf@intel.com> <87o80krtou.fsf@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87o80krtou.fsf@intel.com> X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 29, 2022 at 02:54:25PM +0300, Jani Nikula wrote: > On Fri, 29 Apr 2022, Greg KH wrote: > > On Fri, Apr 29, 2022 at 02:21:26PM +0300, Jani Nikula wrote: > >> On Fri, 29 Apr 2022, Greg KH wrote: > >> > On Fri, Apr 29, 2022 at 12:39:14PM +0800, David Gow wrote: > >> >> KUnit tests are not supposed to run on production systems: they may do > >> >> deliberately illegal things to trigger errors, and have security > >> >> implications (assertions will often deliberately leak kernel addresses). > >> >> > >> >> Add a new taint type, TAINT_KUNIT to signal that a KUnit test has been > >> >> run. This will be printed as 'N' (for kuNit, as K, U and T were already > >> >> taken). > >> >> > >> >> This should discourage people from running KUnit tests on production > >> >> systems, and to make it easier to tell if tests have been run > >> >> accidentally (by loading the wrong configuration, etc.) > >> >> > >> >> Signed-off-by: David Gow > >> >> --- > >> >> > >> >> This is something I'd been thinking about for a while, and it came up > >> >> again, so I'm finally giving it a go. > >> >> > >> >> Two notes: > >> >> - I decided to add a new type of taint, as none of the existing ones > >> >> really seemed to fit. We could live with considering KUnit tests as > >> >> TAINT_WARN or TAINT_CRAP or something otherwise, but neither are quite > >> >> right. > >> >> - The taint_flags table gives a couple of checkpatch.pl errors around > >> >> bracket placement. I've kept the new entry consistent with what's > >> >> there rather than reformatting the whole table, but be prepared for > >> >> complaints about spaces. > >> >> > >> >> Thoughts? > >> >> -- David > >> >> > >> >> --- > >> >> Documentation/admin-guide/tainted-kernels.rst | 1 + > >> >> include/linux/panic.h | 3 ++- > >> >> kernel/panic.c | 1 + > >> >> lib/kunit/test.c | 4 ++++ > >> >> 4 files changed, 8 insertions(+), 1 deletion(-) > >> >> > >> >> diff --git a/Documentation/admin-guide/tainted-kernels.rst b/Documentation/admin-guide/tainted-kernels.rst > >> >> index ceeed7b0798d..8f18fc4659d4 100644 > >> >> --- a/Documentation/admin-guide/tainted-kernels.rst > >> >> +++ b/Documentation/admin-guide/tainted-kernels.rst > >> >> @@ -100,6 +100,7 @@ Bit Log Number Reason that got the kernel tainted > >> >> 15 _/K 32768 kernel has been live patched > >> >> 16 _/X 65536 auxiliary taint, defined for and used by distros > >> >> 17 _/T 131072 kernel was built with the struct randomization plugin > >> >> + 18 _/N 262144 a KUnit test has been run > >> >> === === ====== ======================================================== > >> >> > >> >> Note: The character ``_`` is representing a blank in this table to make reading > >> >> diff --git a/include/linux/panic.h b/include/linux/panic.h > >> >> index f5844908a089..1d316c26bf27 100644 > >> >> --- a/include/linux/panic.h > >> >> +++ b/include/linux/panic.h > >> >> @@ -74,7 +74,8 @@ static inline void set_arch_panic_timeout(int timeout, int arch_default_timeout) > >> >> #define TAINT_LIVEPATCH 15 > >> >> #define TAINT_AUX 16 > >> >> #define TAINT_RANDSTRUCT 17 > >> >> -#define TAINT_FLAGS_COUNT 18 > >> >> +#define TAINT_KUNIT 18 > >> >> +#define TAINT_FLAGS_COUNT 19 > >> >> #define TAINT_FLAGS_MAX ((1UL << TAINT_FLAGS_COUNT) - 1) > >> >> > >> >> struct taint_flag { > >> >> diff --git a/kernel/panic.c b/kernel/panic.c > >> >> index eb4dfb932c85..b24ca63ed738 100644 > >> >> --- a/kernel/panic.c > >> >> +++ b/kernel/panic.c > >> >> @@ -404,6 +404,7 @@ const struct taint_flag taint_flags[TAINT_FLAGS_COUNT] = { > >> >> [ TAINT_LIVEPATCH ] = { 'K', ' ', true }, > >> >> [ TAINT_AUX ] = { 'X', ' ', true }, > >> >> [ TAINT_RANDSTRUCT ] = { 'T', ' ', true }, > >> >> + [ TAINT_KUNIT ] = { 'N', ' ', false }, > >> > > >> > As kunit tests can be in modules, shouldn't this be "true" here? > >> > > >> > Overall, I like it, makes sense to me. The "N" will take some getting > >> > used to, and I have no idea why "T" was for "struct randomization", that > >> > would have allowed you to use "T" instead. Oh well. > >> > >> Would you consider a patch adding more self-explanatory taint flag > >> strings to the output? > > > > Where would those strings go? In the oops report? Or somewhere else? > > I was thinking the oops report. Basically most times I look at an oops > with taint, I need to double check what the flags mean. There are soon > 19 of them, you need to look at a lot of oops to remember them all. I agree, it isn't easy to remember. > Currently we also print ' ' (or 'G' in case of non-properietary module) > for every unset taint flag. If we stopped doing that we wouldn't even > need that much more horizontal space for the strings, unless several > flags were set. (I assume people who do remember all the flags by heart > would still want to keep them too.) I recommend keeping the current layout, but maybe adding a new line that gives the "key" for what the current taint flags mean? For example, the oops report here: https://lore.kernel.org/r/20220413033425.GM16799@magnolia Has the lines: kernel BUG at mm/filemap.c:1653! invalid opcode: 0000 [#1] PREEMPT SMP CPU: 0 PID: 1349866 Comm: 0:116 Tainted: G W 5.18.0-rc2-djwx #rc2 19cc48221d47ada6c8e5859639b6a0946c9a3777 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20171121_152543-x86-ol7-builder-01.us.oracle.com-4.el7.1 04/01/2014 Workqueue: xfs-conv/sda4 xfs_end_io [xfs] RIP: 0010:folio_end_writeback+0x79/0x80 Perhaps we add another line right before or after "Hardware name:" that lists the flags that are set at the moment and what they mean: Taint flags: [G]=PROPRIETARY_MODULE, [W]=WARN Or something like that (format was a first guess only). Anyway, might be helpful? thanks, greg k-h