Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp923721imw; Fri, 8 Jul 2022 14:30:24 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vv2bV69+3rl3i2Tvwgfn4LK5MiTWXo7p+4Z1SODJaFgiqQBumai4pydPuClcDTP+9f5D++ X-Received: by 2002:a17:90b:3807:b0:1f0:a86:6875 with SMTP id mq7-20020a17090b380700b001f00a866875mr51232pjb.103.1657315824565; Fri, 08 Jul 2022 14:30:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657315824; cv=none; d=google.com; s=arc-20160816; b=dcoYUge5TIiBPDc977fcM6Pn2k8I8bq+iBV380wpU0ZS2RkvIqboKNiLzaCYln5edC DA1iXErhvtIkECSqFHHeo4vGXPnRFF9t6pzsUajJFKo9C5+Bzuub9BRM8nH3zIr72yjx UBOsba7kSsfmSJ9pExYlPLrW2nhuZ0LTtHanQYY3QVCpwQq6i420eFky+W7cy6uoNMef WnUC/FEpcNNr2MXCxR2vocinn15rrpAhw61tiK+bZHPxKqG5MCI6jte67eacs8HbDhUH kEU44LKEdHRsJmQWY3CB1c/jkbCVTFIzfweoLtAYjdW1u83XeiINcvGelaF3xyrpE0ql yUDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=VBRRCtPEnNxgQyJUGv/ZJ77JZZ/1FLrQdGhONhznMbk=; b=Dy7A1i5ix0xmeOMpm+sjXUesXLXaXqthgIg9PL59jeOgqVjMs8Evm4tzdI0xpCZPnU IXAfZKO8iPLjplSqZWaSOCMgdoJmaRn6sWX/Cjelfx/NS0p+FqaN7Cv+xOLzoW8uBDxr jKg2dB4IGdM74JTRbOzJeSXX66q95oZb1/VF+Q7dUwMS4eOtiXC+zeKz8p4eY8c/uf5U USYyX/oDkEe7FEuKaD62rcdWXCXZfvPdCG6SAS4CdgqTjAV6Hb32fvUldjXOUz7JWXnk 0zJ3fvOOvca3MYvhLZkNQzPzMTqaXF81egO7Mtz28oNoTEwJFkeYAGlrgTkGwDb2C9dB Q8ew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=pmruvDq1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o198-20020a62cdcf000000b0051bb1890459si148720pfg.28.2022.07.08.14.30.10; Fri, 08 Jul 2022 14:30:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=pmruvDq1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239922AbiGHVBH (ORCPT + 99 others); Fri, 8 Jul 2022 17:01:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52866 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240121AbiGHVBG (ORCPT ); Fri, 8 Jul 2022 17:01:06 -0400 Received: from mail-io1-xd2d.google.com (mail-io1-xd2d.google.com [IPv6:2607:f8b0:4864:20::d2d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6AB8BE08D for ; Fri, 8 Jul 2022 14:01:04 -0700 (PDT) Received: by mail-io1-xd2d.google.com with SMTP id y2so77959ior.12 for ; Fri, 08 Jul 2022 14:01:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=VBRRCtPEnNxgQyJUGv/ZJ77JZZ/1FLrQdGhONhznMbk=; b=pmruvDq1xnw+/V9pDHQd617MBdsm7UB+XfjxhoWht6gF0Yo61yPzf064GBhy/1Opyz 5TSIjQmHJ/7zqiYFexhoTXUL4CKBbRNV6GBEmCGs086p3ldy/j8qOBfteud/uJmKzW3s ptezWouRmnPXcWOKjzCQwU0a5YlUTipEXNrvuPx3X/VW4wRi8n/pAlnHBBL72z+5gKrn ZspiFBvNHw1zSVNTaAdou1CVXQMQwKlYW71DebClYIUEywUoEzXPDSUOaMEwox5cyKkT p50sysjXJY8AKlxu2us8vgtpKSpr6xIgXlIL+fyeLb3K0W/U11hs6EszRhO8jZ1iiDKp Oovg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=VBRRCtPEnNxgQyJUGv/ZJ77JZZ/1FLrQdGhONhznMbk=; b=a8lWIUoAhupemKkMqRoX3zgKVW78i+lmjdNjeO+u1hBSzCAvd/cAvKeSpCI4ztGl7j dkMFbFwijv0dh5DG3QIUyPvTzRxZ3qaFoj8QVgZIrh7j8OJZ8iL4GnEUsww0JPnaCsmn L+j0ARZIU6lHzuJUbk4D+xHQoJMi5ayitNk/3DmQ0seu/o6LsVg/tOeb2CosHy4dVBsg XX6CYTClgwKUH9cSyJPtLP7KpzT2BHEbhUR8oF5R4DSaVTtXLzI1ZPOIky2lSXvoh+3z CH90Rdw1EYFjCPblZIofICwhj0DPk+g7HHdsdBGkcEuXf9fVmxtT3igqjHOaH2XMZYj+ +ASw== X-Gm-Message-State: AJIora9DdL54PdyN1BiRqEbWBGD507i7/nSWl/vkyTGvINLUO/OHXLP6 L33vHKEDtTLPuCje5zifyRvw3mYuroGMHvDZ20W9+w== X-Received: by 2002:a05:6602:2e8d:b0:64f:b683:c70d with SMTP id m13-20020a0566022e8d00b0064fb683c70dmr2919156iow.62.1657314063709; Fri, 08 Jul 2022 14:01:03 -0700 (PDT) MIME-Version: 1.0 References: <20220708044847.531566-1-davidgow@google.com> <20220708044847.531566-3-davidgow@google.com> In-Reply-To: From: Daniel Latypov Date: Fri, 8 Jul 2022 14:00:51 -0700 Message-ID: Subject: Re: [PATCH v6 3/4] kunit: Taint the kernel when KUnit tests are run To: Shuah Khan Cc: David Gow , Andrew Morton , Brendan Higgins , "Guilherme G . Piccoli" , Sebastian Reichel , John Ogness , Joe Fradley , Luis Chamberlain , Nathan Chancellor , kunit-dev@googlegroups.com, linux-kselftest@vger.kernel.org, Andy Shevchenko , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Jani Nikula , Lucas De Marchi , Aaron Tomlin , linux-fsdevel@vger.kernel.org, linux-block@vger.kernel.org, Michal Marek , Nick Desaulniers , Jonathan Corbet , linux-kbuild@vger.kernel.org, Greg KH , Masahiro Yamada , Kees Cook Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 8, 2022 at 1:22 PM Shuah Khan wrote: > > On 7/7/22 10:48 PM, David Gow wrote: > > Make KUnit trigger the new TAINT_TEST taint when any KUnit test is run. > > Due to KUnit tests not being intended to run on production systems, and > > potentially causing problems (or security issues like leaking kernel > > addresses), the kernel's state should not be considered safe for > > production use after KUnit tests are run. > > > > This both marks KUnit modules as test modules using MODULE_INFO() and > > manually taints the kernel when tests are run (which catches builtin > > tests). > > > > Acked-by: Luis Chamberlain > > Tested-by: Daniel Latypov > > Reviewed-by: Brendan Higgins > > Signed-off-by: David Gow > > --- > > > > No changes since v5: > > https://lore.kernel.org/linux-kselftest/20220702040959.3232874-3-davidgow@google.com/ > > > > No changes since v4: > > https://lore.kernel.org/linux-kselftest/20220701084744.3002019-3-davidgow@google.com/ > > > > David, Brendan, Andrew, > > Just confirming the status of these patches. I applied v4 1/3 and v4 3/4 > to linux-kselftest kunit for 5.20-rc1. > I am seeing v5 and v6 now. Andrew applied v5 looks like. Would you like > me to drop the two I applied? Do we have to refresh with v6? Just noting here that there'll be a merge conflict between this patch (3/4) and some other patches lined up to go through the kunit tree: https://patchwork.kernel.org/project/linux-kselftest/patch/20220625050838.1618469-2-davidgow@google.com/ Not sure how we want to handle that. Daniel