Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp796550rwb; Wed, 7 Dec 2022 05:15:03 -0800 (PST) X-Google-Smtp-Source: AA0mqf5y2vpoEqIiSKkA+EaYlvtawN6Z6FTMGw582gt/0QB5Uoo4EbNgibLAzuFtT6Oo2GHYrV2b X-Received: by 2002:a17:906:bf2:b0:7ac:a2b7:6c97 with SMTP id z18-20020a1709060bf200b007aca2b76c97mr74154995ejg.497.1670418902851; Wed, 07 Dec 2022 05:15:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670418902; cv=none; d=google.com; s=arc-20160816; b=yZAUYcg6vvbixIKf2VLroo7B+hqxlEeFBThDYv06UWl+VGsx8RPLc3kOlQGQOBjx34 qMx8RPP9eLSNLEjbjYONedVbNEaxF7F0KAkUty9ebtCo5bl1fIBcFgfB2CEPZXb3XoUn L1PtihkWKaNVozikpcxUgEHJhr+gCfLKcCQRavRrFPdurokIYlEJdael6/1dEE37K5i6 DoiT2BHfIXU+MicvSPq/RQMF8M1aixBF5Veg8EdkkvusYVt5py5ppmUejXZRk7cxKV4n EhX0hoG7FPHbxeK4yo+4s+xECdQvgDVZhOpgcZ6phSpaj5z/9uuipoIHM02nBNWbUIob oyjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=uuRv6NN/Jz0sEj/XDTri1GZCjxpPQThvNQRg4JyJ50g=; b=p2EAtRuvKSbC4WDy38pr9HsvTpxzUSjDkLTkyHZxc0zHN7nqh3TpcQtX+iDSLrSGqP MMVVCkELTFlPGgATv6CuY9OsflWUoeBQL6zHqB6GQJPfn9jj2U/ZMqW9q9QjCSB1+yiw MuJKr30RkmVw/soRPNxgHJ6H3gmkqTlQQALRPjsE71KMBuW9cerkjBl1BtYDbDU4iAzd lpIOigCwOCYmFMP50p+pww7PBB6eInolWw8WUep3j09GCxgnhYZ3adcRrPwPH9wrZYdU nhp7YkMBxJD8qKQSq4ifMJyiQLVB3EZMya08SLGEgml4wKmmoFpmbssdUeKrudvHm7p3 Bo7w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sc15-20020a1709078a0f00b007ad6a0afbc6si13969133ejc.7.2022.12.07.05.14.42; Wed, 07 Dec 2022 05:15:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229593AbiLGMsM (ORCPT + 77 others); Wed, 7 Dec 2022 07:48:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60344 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229480AbiLGMsL (ORCPT ); Wed, 7 Dec 2022 07:48:11 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C1BCCF592; Wed, 7 Dec 2022 04:48:10 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 62EF5615F7; Wed, 7 Dec 2022 12:48:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 12D30C433D7; Wed, 7 Dec 2022 12:48:07 +0000 (UTC) Date: Wed, 7 Dec 2022 07:48:06 -0500 From: Steven Rostedt To: Alexei Starovoitov Cc: Masami Hiramatsu , LKML , bpf , Borislav Petkov , Linus Torvalds , Andrew Morton , Peter Zijlstra , Kees Cook , Josh Poimboeuf , KP Singh , Mark Rutland , Florent Revest , Greg Kroah-Hartman , Christoph Hellwig , Chris Mason Subject: Re: [PATCH v2] panic: Taint kernel if fault injection has been used Message-ID: <20221207074806.6f869be2@gandalf.local.home> In-Reply-To: References: <167019256481.3792653.4369637751468386073.stgit@devnote3> <20221204223001.6wea7cgkofjsiy2z@macbook-pro-6.dhcp.thefacebook.com> <20221205075921.02edfe6b54abc5c2f9831875@kernel.org> <20221206021700.oryt26otos7vpxjh@macbook-pro-6.dhcp.thefacebook.com> <20221206162035.97ae19674d6d17108bed1910@kernel.org> <20221207040146.zhm3kyduqp7kosqa@macbook-pro-6.dhcp.thefacebook.com> <20221206233947.4c27cc9d@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 6 Dec 2022 20:45:17 -0800 Alexei Starovoitov wrote: > > "G - Proprietary module" - "O - out of tree module" > > > > Can you reproduce this without those taints? > > Lol. That question is exactly the reason why my Nack stands. First, that's a BS reason for a NACK. But in all seriousness, what I would actually ask (and what I'll ask now) is, what module did you use that is out of tree, and was it relevant to this test? That's a reasonable question to ask, and one that only gets asked with a taint. If there's a BPF injection taint, one can ask that same question, as the bug may happen sometime after the injection but be caused by that injection, and not be in the backtrace. Not all kernel developers have the access to debugging utilities that backend production servers have. A lot of bugs that kernel developers debug are from someone's laptop. Where all they have is that backtrace. If a tool or root kit, added function error injection, it would be extremely useful information to debug what happened. I don't understand the push back here. -- Steve