Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5637899rwb; Sun, 11 Dec 2022 09:34:35 -0800 (PST) X-Google-Smtp-Source: AA0mqf6LAJVY3NYxHIivE7CSczddC6qJxfvhPsO8u34SlSsvvAZ/i5hRoZoOBqn6K9DYNQ3Mxy/u X-Received: by 2002:a17:907:d0e:b0:7c0:a4e9:615b with SMTP id gn14-20020a1709070d0e00b007c0a4e9615bmr15583254ejc.61.1670780075083; Sun, 11 Dec 2022 09:34:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670780075; cv=none; d=google.com; s=arc-20160816; b=KwgQ8vYy1ezk9KGMidW2uoL8QfK5tZinB2OupVyiZo2i6MNpho1eSvzy89K45I1+V4 lggCRM8RGdokBRyI3wF+FGHDRqeSmWpH179jNpXFne06GO5cFWcxMoUtxwmtZaCJSPYN axzgcMi8MpZv+hDOabfW3vzaGEk2C25k4IlhiUz4SQvPwTYuOgiTYYA0BxgbRxTOIAIm JzHrBJQWo7DD1h7HxO4OTSteVSRvqcUtq9ZmcV6e1klFJVwWa947ejEEysfYMya74pVP 6J54eFuSMZIYhbnCplT422lpnoz23oP823Z333PwF+XM78CVxAzuTi9X/sodgDNnKbC5 dfQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=tw6LZOVH3XxSGWwW9bjYv8BEF7KyP/KYyrNSSm9BJVc=; b=ZBlDAo2yKlUkSPIoi002kbWHuM3cfAtpdMOug93bwq9HBP5mpNIzMOHDhE3y0E6VVR 9HGliWJMEipuCVYA15wSXme/fDCRMyUHT6ugZK8Ezz6oWlLwdUBDA7XEtc/e0SzfyKUS kX/FGTIG/dMz4XDxTxIIiNFmSHDEkkreyDSTisvbER3WPr7lCKMtG/jthlFwNjxFiIKN HR/L51PnM2YeNQpEylbTdYzPwybjnS/YWz9xmC97YYBBf6AACSnJdDejiJh4muOAMAdV OBAFLbuP+I8xfuju8k7xtqrVtRAuFWUOp1S8VcpV7jNEVYkcgJqo7NxoBDz0uNjmwvRV ZYKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hq15-20020a1709073f0f00b007c1633cea0csi1972172ejc.513.2022.12.11.09.34.17; Sun, 11 Dec 2022 09:34:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230307AbiLKRCh (ORCPT + 76 others); Sun, 11 Dec 2022 12:02:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33358 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230014AbiLKRCf (ORCPT ); Sun, 11 Dec 2022 12:02:35 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 24E0AB2E; Sun, 11 Dec 2022 09:02:33 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id C504FB80A2B; Sun, 11 Dec 2022 17:02:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A7FA3C433EF; Sun, 11 Dec 2022 17:02:28 +0000 (UTC) Date: Sun, 11 Dec 2022 12:02:26 -0500 From: Steven Rostedt To: KP Singh Cc: Masami Hiramatsu , Alexei Starovoitov , LKML , bpf , Borislav Petkov , Linus Torvalds , Andrew Morton , Peter Zijlstra , Kees Cook , Josh Poimboeuf , Mark Rutland , Florent Revest , Greg Kroah-Hartman , Christoph Hellwig , Chris Mason Subject: Re: [PATCH v2] panic: Taint kernel if fault injection has been used Message-ID: <20221211120226.11c97578@rorschach.local.home> In-Reply-To: References: <167019256481.3792653.4369637751468386073.stgit@devnote3> <20221204223001.6wea7cgkofjsiy2z@macbook-pro-6.dhcp.thefacebook.com> <20221205075921.02edfe6b54abc5c2f9831875@kernel.org> <20221206021700.oryt26otos7vpxjh@macbook-pro-6.dhcp.thefacebook.com> <20221206162035.97ae19674d6d17108bed1910@kernel.org> <20221207040146.zhm3kyduqp7kosqa@macbook-pro-6.dhcp.thefacebook.com> <20221206233947.4c27cc9d@gandalf.local.home> <20221207074806.6f869be2@gandalf.local.home> <20221208043628.el5yykpjr4j45zqx@macbook-pro-6.dhcp.thefacebook.com> <20221211115218.2e6e289bb85f8cf53c11aa97@kernel.org> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 11 Dec 2022 08:49:01 +0100 KP Singh wrote: > Let's take a step back and focus on solving debuggability and > introspection as we clearly have some perception issues about taints > in the community. (distro maintainers, users) before we go and add > more taints. Note, you will likely get the same push back if the dump includes bpf programs known to change the return of a function that may be involved with the bug report. That is, if a crash is reported to code I maintain, and I see that the bug report includes a list of BPF programs that can modify the return of a function, and one of those functions could affect the place that crashed, I'd push back and ask if the crash could be done without that BPF program loaded, regardless of taints. I agree that a taint is just a hint and it can include something that caused the bug or it may not. I would like to see more details in how the crashed kernel was configured. That includes loaded BPF programs (just like we include loaded modules). And if any BPF program modifies a core function (outside of syscall returns) I'd be a bit suspect of what happened. I also agree that if a function that checks error paths fails, it should be fixed, but knowing that the error path was caused by fault injection will prevent the wasted effort that most developers will go through to find out why the error path was hit in the first place. -- Steve