Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp878153rwb; Thu, 1 Dec 2022 09:25:11 -0800 (PST) X-Google-Smtp-Source: AA0mqf4+tnO4sKKGrXOXqtBbLM3Ne1U0DHdfERq/mEGkASqsD2aO6oVcVynT/4rQzVKfLV7RwLQu X-Received: by 2002:a17:906:a20f:b0:7bf:f0e9:1cde with SMTP id r15-20020a170906a20f00b007bff0e91cdemr17084613ejy.512.1669915511080; Thu, 01 Dec 2022 09:25:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669915511; cv=none; d=google.com; s=arc-20160816; b=gYUSluKWvwlKqe0Va0jNx/GgEp1yM9V1y/dmUO+s0sgactydTk6H/EAsKoZySvcmHr nFsyGva3/+1NR9bLCYrUsCLyCJ50tdE9SjXK3XR8cDFcWvaaoxaanhbZMseiAZc5VtzF nSLhS49YLXz5xGuozl8vkhNKwMYk5+8w5i6HMmr8xEkHwmNPwvfMhC40xWtHOGnziomd wnRvnnAWsjFjjJS5O24bjKDbj5gPMl0vjxoURbSruvlamdAoehlIE5tp3DsX81BszoVn E6qPtWUUE5rmMd5aX1OObiBW8SSe4yvMl/aOqZEg8DRWjfjfCLKWtm18We3Qjj2cWaOm 6cow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=PztzqaSw6vhHjLXE10JsT4aVmlpqdIPjvPBxpOAYiyU=; b=kniXdZk5Fwgz0x0t+gvz3mNWtw1dVondEx6Q40OrtdgtxMBjz8M1U/sONKmiFU24EK E6PPM4+Y6WNZTnYiNrep2hjKKjJsQt/DZD1JW2tmY+XmKEootLaTaBBmT0GZOE1Wjid7 BagJiHm0pB21WBGH2W20VdWKN1d+AqVAGJSA4gUFu2yswLO+0XRzWTAQzbaQ8INn+P96 M8V8g/7UqIDUBBmc+G0LsEAxUGOkelnOJFcUkWTx3wEDZ1Yc7l4OE1oTfz1KnYZjTZVh qT6S12IFPsFRkqGl7R5G8j/cuMBDiNXY7QKiIx+eA2h8nERHqxnv5wM+2K6KwajYSAat T86w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w5-20020aa7cb45000000b0046b3f597478si3978775edt.104.2022.12.01.09.24.49; Thu, 01 Dec 2022 09:25:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229838AbiLAQtM (ORCPT + 82 others); Thu, 1 Dec 2022 11:49:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39988 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229854AbiLAQs4 (ORCPT ); Thu, 1 Dec 2022 11:48:56 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 134411DDCB for ; Thu, 1 Dec 2022 08:48:55 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id AD1F1B81F96 for ; Thu, 1 Dec 2022 16:48:53 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AF7F8C433C1; Thu, 1 Dec 2022 16:48:50 +0000 (UTC) Date: Thu, 1 Dec 2022 11:48:48 -0500 From: Steven Rostedt To: Kees Cook Cc: "Masami Hiramatsu (Google)" , LKML , Borislav Petkov , Alexei Starovoitov , Linus Torvalds , Andrew Morton , Peter Zijlstra , Josh Poimboeuf , KP Singh , Mark Rutland , Florent Revest , Greg Kroah-Hartman , Christoph Hellwig , Chris Mason Subject: Re: [RFC PATCH] panic: Add new taint flag for fault injection Message-ID: <20221201114848.13a87aca@gandalf.local.home> In-Reply-To: <202212010838.B0B109DA@keescook> References: <20221201234121.8925fdf83115747ac4ac116a@kernel.org> <166991263326.311919.16890937584677289681.stgit@devnote3> <202212010838.B0B109DA@keescook> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 1 Dec 2022 08:39:28 -0800 Kees Cook wrote: > On Fri, Dec 02, 2022 at 01:37:13AM +0900, Masami Hiramatsu (Google) wrote: > > From: Masami Hiramatsu (Google) > > > > Since the function error injection framework in the fault injection > > subsystem can change the function code flow forcibly, it may cause > > unexpected behavior (but that is the purpose of this feature). > > To identify this in the kernel oops message, add a new taint flag > > for this, and set it if it is (and similar things in BPF) used. > > Why is hooking through BPF considered to be "fault injection" here? > Have you not been reading this thread? -- Steve