From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 06A61EB64DB for ; Tue, 20 Jun 2023 17:19:21 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A240F8D0002; Tue, 20 Jun 2023 13:19:20 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9ACDF8D0001; Tue, 20 Jun 2023 13:19:20 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 874A08D0002; Tue, 20 Jun 2023 13:19:20 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 745B88D0001 for ; Tue, 20 Jun 2023 13:19:20 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 2C819140505 for ; Tue, 20 Jun 2023 17:19:20 +0000 (UTC) X-FDA: 80923787280.21.67A111D Received: from mail-oi1-f180.google.com (mail-oi1-f180.google.com [209.85.167.180]) by imf06.hostedemail.com (Postfix) with ESMTP id 65E11180019 for ; Tue, 20 Jun 2023 17:19:18 +0000 (UTC) Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=gmail.com header.s=20221208 header.b=b9lHqrba; spf=pass (imf06.hostedemail.com: domain of andreyknvl@gmail.com designates 209.85.167.180 as permitted sender) smtp.mailfrom=andreyknvl@gmail.com; dmarc=pass (policy=none) header.from=gmail.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1687281558; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=WmCprH+idanaTAuo2dvFzhcGXyTLAiyj5xkHxuQVXTU=; b=ctIYy+NwO4PFmnC0dbrgjFSkwZMPNkMusKfVvQGaeIxIfXJKy+E8Em1bchAjYsJTPgZ2pK FR+MvRax9WGCMlqv148SplKlDvvYiSwPY9NZ/rRAAmXn1upIDzdB/cg4mr0gdALWT/0Sxq YUqU5prmkqM43j6w3hQG78yNPSGz/iw= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1687281558; a=rsa-sha256; cv=none; b=mc6uwRr+NdGgRSa2DvSyR+Sfzzm2Zgiug+sLbIT4GGqKOw46ex2xP/5EnmEcRCRSE5VYRf JAFZue/q26kiDdBMVtkY9ur7DZeKuh0SB9RwF4DeyaTrlL8s14LHIr45i67dZ92DdxDWNP kPb1p0U8T3v+ktEJXZ5oHiPJgZGVT8c= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=gmail.com header.s=20221208 header.b=b9lHqrba; spf=pass (imf06.hostedemail.com: domain of andreyknvl@gmail.com designates 209.85.167.180 as permitted sender) smtp.mailfrom=andreyknvl@gmail.com; dmarc=pass (policy=none) header.from=gmail.com Received: by mail-oi1-f180.google.com with SMTP id 5614622812f47-39eab4bcee8so2970541b6e.0 for ; Tue, 20 Jun 2023 10:19:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1687281557; x=1689873557; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=WmCprH+idanaTAuo2dvFzhcGXyTLAiyj5xkHxuQVXTU=; b=b9lHqrbagfr1RSGyhYN77p4kcA/eHb4NKgN16tHcbxlk8o72r0HdwtasyTOHARltWD C/E82gKtEmrd4NpGBjaRFuww/h40qL0AfXOHeEvlXReEGa/3ENiah0Gce1po/Hu5MBfH NHqy0OE1EXnomjjuY1iicVoEUf4vyoVYLymygmw2KKkeT8i+ZrPnKE96GdYrgTDyaRIB ZV9hvI/ilx024AGepjkwoOEVvWApcD9JvxTUX52ZVxsF0+6FGcbPM+c4i00rm1N1iv2h dOp4RnvtAyaI5f9WpFdroMUvIvKJd+mcut+phNZHdiuqhx2VDf9Usn7eDjWnp+i/62rX FL0w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687281557; x=1689873557; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=WmCprH+idanaTAuo2dvFzhcGXyTLAiyj5xkHxuQVXTU=; b=UD2D9y8ZZfXvqIzQ6wh/yv7ZEZvWRa8dR7tBiyRF6HQZ3CE3hoCCfNAlPPD1DCCZE2 mNUdaybEYtEpu+8FcjielBn9i6gwvioTQaU9O3q1AMJpGoAxzwDoiZ4QGvXhNJyQH94Z /GyFoBiDPxotrxWn9eAhsuAB3aryxQTnCkemuSsP/VnbX+uUApE0/jzH63fqBXzIOevg 5NJyzTnmTce8t2IEOywp5BKVXtLWcDc9hkBP2fvSji1Fr3FOz5ERonGRLCDlaW2EbW7K qDWmZzfQy65+e7FpW1LjlGYT071cOafjXdc+sz/Fr3a26G7kURHTreQYkjoARmtP73c2 EImw== X-Gm-Message-State: AC+VfDzOcyqFh4jxaDjbHu1f6M7LcKcgNV9e34fQLYkq1NGaN8uumC03 gJXp133g9ut8rbZWzLKMI7iGZ9ZgrIPGAUASzZs= X-Google-Smtp-Source: ACHHUZ48AUCk89CwU1xZqpN0N9tbmO9d1ar83T9TqB8/AUAW9KqhF6B8cLTq3zwM5FrnfvvltVLs7q41z0lnrCLjlyM= X-Received: by 2002:a05:6808:1b0f:b0:39a:aafd:dda7 with SMTP id bx15-20020a0568081b0f00b0039aaafddda7mr15864716oib.35.1687281557150; Tue, 20 Jun 2023 10:19:17 -0700 (PDT) MIME-Version: 1.0 References: <20230614095158.1133673-1-elver@google.com> In-Reply-To: From: Andrey Konovalov Date: Tue, 20 Jun 2023 19:19:06 +0200 Message-ID: Subject: Re: [PATCH] kasan, doc: note kasan.fault=panic_on_write behaviour for async modes To: Marco Elver Cc: Andrew Morton , Alexander Potapenko , Dmitry Vyukov , Taras Madan , Aleksandr Nogikh , Andrey Ryabinin , Vincenzo Frascino , Jonathan Corbet , kasan-dev@googlegroups.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Catalin Marinas Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 65E11180019 X-Rspam-User: X-Stat-Signature: snc46knbgwkdxxqqgegjgrcbzdkwepbd X-Rspamd-Server: rspam03 X-HE-Tag: 1687281558-467713 X-HE-Meta: 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 SgKKDLF6 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, Jun 20, 2023 at 7:17=E2=80=AFPM Marco Elver wrot= e: > > Note the behaviour of kasan.fault=3Dpanic_on_write for async modes, since > all asynchronous faults will result in panic (even if they are reads). > > Fixes: 452c03fdbed0 ("kasan: add support for kasan.fault=3Dpanic_on_write= ") > Signed-off-by: Marco Elver > --- > Documentation/dev-tools/kasan.rst | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/= kasan.rst > index 7f37a46af574..f4acf9c2e90f 100644 > --- a/Documentation/dev-tools/kasan.rst > +++ b/Documentation/dev-tools/kasan.rst > @@ -110,7 +110,9 @@ parameter can be used to control panic and reporting = behaviour: > - ``kasan.fault=3Dreport``, ``=3Dpanic``, or ``=3Dpanic_on_write`` contr= ols whether > to only print a KASAN report, panic the kernel, or panic the kernel on > invalid writes only (default: ``report``). The panic happens even if > - ``kasan_multi_shot`` is enabled. > + ``kasan_multi_shot`` is enabled. Note that when using asynchronous mod= e of > + Hardware Tag-Based KASAN, ``kasan.fault=3Dpanic_on_write`` always pani= cs on > + asynchronously checked accesses (including reads). > > Software and Hardware Tag-Based KASAN modes (see the section about vario= us > modes below) support altering stack trace collection behavior: > -- > 2.41.0.185.g7c58973941-goog > Reviewed-by: Andrey Konovalov