From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-it0-f69.google.com (mail-it0-f69.google.com [209.85.214.69]) by kanga.kvack.org (Postfix) with ESMTP id 43BBE6B0005 for ; Fri, 9 Mar 2018 13:42:22 -0500 (EST) Received: by mail-it0-f69.google.com with SMTP id p203so2886686itc.1 for ; Fri, 09 Mar 2018 10:42:22 -0800 (PST) Received: from mail-sor-f41.google.com (mail-sor-f41.google.com. [209.85.220.41]) by mx.google.com with SMTPS id 76sor931884ioh.140.2018.03.09.10.42.21 for (Google Transport Security); Fri, 09 Mar 2018 10:42:21 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <0377a2e1-ccc2-51bf-26b9-978eb685cdce@arm.com> References: <739eecf573b6342fc41c4f89d7f64eb8c183e312.1520017438.git.andreyknvl@google.com> <20180305143625.vtrfvsbw7loxngaj@lakrids.cambridge.arm.com> <0377a2e1-ccc2-51bf-26b9-978eb685cdce@arm.com> From: Andrey Konovalov Date: Fri, 9 Mar 2018 19:42:19 +0100 Message-ID: Subject: Re: [RFC PATCH 06/14] khwasan: enable top byte ignore for the kernel Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Marc Zyngier Cc: Mark Rutland , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Jonathan Corbet , Catalin Marinas , Will Deacon , Theodore Ts'o , Jan Kara , Christopher Li , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , Masahiro Yamada , Michal Marek , Ard Biesheuvel , Yury Norov , Nick Desaulniers , Suzuki K Poulose , Kristina Martsenko , Punit Agrawal , Dave Martin , James Morse , Julien Thierry , Michael Weiser , Steve Capper , Ingo Molnar , Thomas Gleixner , Sandipan Das , Paul Lawrence , David Woodhouse , Kees Cook , Geert Uytterhoeven , Josh Poimboeuf , Arnd Bergmann , kasan-dev , linux-doc@vger.kernel.org, LKML , Linux ARM , linux-ext4@vger.kernel.org, linux-sparse@vger.kernel.org, Linux Memory Management List , Linux Kbuild mailing list , Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Kees Cook , Jann Horn , Mark Brand On Fri, Mar 9, 2018 at 7:32 PM, Marc Zyngier wrote: > Well, that's not quite how it works. KVM is an integral part of the > kernel, and I don't really want to have to deal with regression (not to > mention that KVM is an essential tool in our testing infrastructure). > > You could try and exclude KVM from the instrumentation (which we already > have for invasive things such as KASAN), but I'm afraid that having a > debugging option that conflicts with another essential part of the > kernel is not an option. > > I'm happy to help you with that though. > Hm, KHWASAN instruments the very same parts of the kernel that KASAN does (it reuses the same flag). I've checked, I actually have CONFIG_KVM enabled in my test build, however I haven't tried to test KVM yet. I'm planning to perform extensive fuzzing of the kernel with syzkaller, so if there's any crashes caused by KHWASAN in kvm code I'll see them. However if some bugs don't manifest as crashes, that would be a difficult thing to detect for me. Thanks!