Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp7408966rwb; Mon, 12 Dec 2022 14:23:14 -0800 (PST) X-Google-Smtp-Source: AA0mqf70HvnaUC9LJ7AKF+7qVfjinFO3oCasu7l8vLTowCvPkIw8FgVI0JyoDKR8X6UjZaxTF/2/ X-Received: by 2002:a17:906:ae82:b0:7ae:4de9:68ff with SMTP id md2-20020a170906ae8200b007ae4de968ffmr14503976ejb.64.1670883794756; Mon, 12 Dec 2022 14:23:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670883794; cv=none; d=google.com; s=arc-20160816; b=uKoLqmesVvmNrRcivAYhz7pcf4PqENzvjG9G/wRtwRaOavGpbNI+Ng0wDXNVqFPeEM CLPFrhKwzBspiZOfrsy2ISlcZvY/rwHd7yd0SYtZXLkm5ftnDAcy3q0SeniNUoP8HbCu k2exjdLezlldRHtr4SfkFd++Fj6u3V5aBcWgSrIQgOeiF65yq9C9hmfwPAvQw0JXGkiH TnKXej7MRSzcsOY/PlTvrZWByUyoAu/PmSCgho39qK2pQ4Z1Wy/ePQ/unyfOJv66i2eH nVH2LnSN4WKoXTO2Adf9KKGcoFQ/ICcsZbmp1yNZgkd6PHwob9oJZP9wqVNyXEY32ob2 06Vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=cEIYgBCk1jS2CNgVDh3B0JExa8+XC/aNPD8hEMVh3es=; b=sG+RdODvYjKmo6iuc5PlOZSyQfC3En5tCooJbmH7YYHo2Fx3Gy9KKt9EDTwRrY463Z jlMRPehF2Y6MRS2O0Nm56McBpvRkbGWkzh44qNlC0OtQQvH2psrFQ5mG44DNhGrnEvMd EkjqnGlZQo6CXFFLJuCGs9mXt4EokJBNVxNwipxAL6BIG8QUTZc01tOFXjhkytLV16B1 C6w3NycRrSG1ihfeIZqHFY4DIM5peefr9WTPu6QyvNNkOr34SIXrHYDPox1s7LotLfYe EEpXuh2pTsQflWMhXhZrLsxS66JNuEoEWjzm3A8Wx6shrZxGNjltFPiCOjCdbAtf6cyM prwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GKkfNM86; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sb23-20020a1709076d9700b0078d770f363fsi60396ejc.471.2022.12.12.14.22.55; Mon, 12 Dec 2022 14:23:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GKkfNM86; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232791AbiLLVn5 (ORCPT + 74 others); Mon, 12 Dec 2022 16:43:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38274 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229497AbiLLVny (ORCPT ); Mon, 12 Dec 2022 16:43:54 -0500 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E12F913CCA for ; Mon, 12 Dec 2022 13:43:53 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 54A23CE1177 for ; Mon, 12 Dec 2022 21:43:52 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 86BE1C433F1 for ; Mon, 12 Dec 2022 21:43:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1670881430; bh=cEIYgBCk1jS2CNgVDh3B0JExa8+XC/aNPD8hEMVh3es=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=GKkfNM8626cQ1r/eXVnIHYg8cv+wJm9dQrh0MC4gWydIEdzhgVm9lZrzlZvXbHoQY 8/hs+syeFz2deFZunRNLsghite3pILkWglx6M69aFOa8DnEAm0slbpoX05rRuBL+8n P31MqOe/IxCecZw3hlQ/Mxhnh+5Qt1e1ZX3/I/cp1vsLXhcDKPNZkDSBg8Go6pfxXO wwD8f3hXxF6pfzsFJeN/gP1nIU6zX2MsIwFxrW+OsgafpFpxdPg/SprW2AbkTlkIXq HF8Oc2tI+njzdXG1EGVRpU25oJ3wznPla7Q3xV/J1VgmFDMv18qHNnrCb3F8vHw0eu zxF5fqspavO2Q== Received: by mail-ej1-f51.google.com with SMTP id fc4so31630643ejc.12 for ; Mon, 12 Dec 2022 13:43:50 -0800 (PST) X-Gm-Message-State: ANoB5pl7xdzwSCmRtIepq9cxuvZSmjLwqYXc8X0IuZ9cXfMHRrFDGEku rhbKTHZGP5hiWYKhsW0k3D/j0aLuMtimlT+Q01/xxA== X-Received: by 2002:a17:906:402:b0:7a6:fc0f:6fe6 with SMTP id d2-20020a170906040200b007a6fc0f6fe6mr77481275eja.694.1670881428767; Mon, 12 Dec 2022 13:43:48 -0800 (PST) MIME-Version: 1.0 References: <167019256481.3792653.4369637751468386073.stgit@devnote3> <20221204223001.6wea7cgkofjsiy2z@macbook-pro-6.dhcp.thefacebook.com> <20221205075921.02edfe6b54abc5c2f9831875@kernel.org> <20221206021700.oryt26otos7vpxjh@macbook-pro-6.dhcp.thefacebook.com> <20221206162035.97ae19674d6d17108bed1910@kernel.org> <20221207040146.zhm3kyduqp7kosqa@macbook-pro-6.dhcp.thefacebook.com> <20221206233947.4c27cc9d@gandalf.local.home> <20221207074806.6f869be2@gandalf.local.home> <20221208043628.el5yykpjr4j45zqx@macbook-pro-6.dhcp.thefacebook.com> <20221211115218.2e6e289bb85f8cf53c11aa97@kernel.org> <20221211120226.11c97578@rorschach.local.home> In-Reply-To: <20221211120226.11c97578@rorschach.local.home> From: KP Singh Date: Mon, 12 Dec 2022 22:43:37 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2] panic: Taint kernel if fault injection has been used To: Steven Rostedt Cc: Masami Hiramatsu , Alexei Starovoitov , LKML , bpf , Borislav Petkov , Linus Torvalds , Andrew Morton , Peter Zijlstra , Kees Cook , Josh Poimboeuf , Mark Rutland , Florent Revest , Greg Kroah-Hartman , Christoph Hellwig , Chris Mason Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Dec 11, 2022 at 6:02 PM Steven Rostedt wrote: > > On Sun, 11 Dec 2022 08:49:01 +0100 > KP Singh wrote: > > > Let's take a step back and focus on solving debuggability and > > introspection as we clearly have some perception issues about taints > > in the community. (distro maintainers, users) before we go and add > > more taints. > > Note, you will likely get the same push back if the dump includes bpf > programs known to change the return of a function that may be involved > with the bug report. That is, if a crash is reported to code I > maintain, and I see that the bug report includes a list of BPF programs > that can modify the return of a function, and one of those functions > could affect the place that crashed, I'd push back and ask if the crash > could be done without that BPF program loaded, regardless of taints. > I think this is already better as it gives the recipient of the stack trace more information to ask more questions and see if the BPF programs are relevant to the stack trace and engage further. > I agree that a taint is just a hint and it can include something that > caused the bug or it may not. I would like to see more details in how > the crashed kernel was configured. That includes loaded BPF programs > (just like we include loaded modules). And if any BPF program modifies > a core function (outside of syscall returns) I'd be a bit suspect of > what happened. Agreed. > > I also agree that if a function that checks error paths fails, it > should be fixed, but knowing that the error path was caused by fault > injection will prevent the wasted effort that most developers will go > through to find out why the error path was hit in the first place. Agreed. > > -- Steve