From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ot0-f198.google.com (mail-ot0-f198.google.com [74.125.82.198]) by kanga.kvack.org (Postfix) with ESMTP id 928816B0005 for ; Fri, 9 Mar 2018 14:06:12 -0500 (EST) Received: by mail-ot0-f198.google.com with SMTP id h7so5427291oti.23 for ; Fri, 09 Mar 2018 11:06:12 -0800 (PST) Received: from foss.arm.com (foss.arm.com. [217.140.101.70]) by mx.google.com with ESMTP id z48si493011otc.308.2018.03.09.11.06.11 for ; Fri, 09 Mar 2018 11:06:11 -0800 (PST) Subject: Re: [RFC PATCH 06/14] khwasan: enable top byte ignore for the kernel References: <739eecf573b6342fc41c4f89d7f64eb8c183e312.1520017438.git.andreyknvl@google.com> <20180305143625.vtrfvsbw7loxngaj@lakrids.cambridge.arm.com> <0377a2e1-ccc2-51bf-26b9-978eb685cdce@arm.com> From: Marc Zyngier Message-ID: Date: Fri, 9 Mar 2018 19:06:01 +0000 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Andrey Konovalov Cc: Mark Rutland , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Jonathan Corbet , Catalin Marinas , Will Deacon , Theodore Ts'o , Jan Kara , Christopher Li , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , Masahiro Yamada , Michal Marek , Ard Biesheuvel , Yury Norov , Nick Desaulniers , Suzuki K Poulose , Kristina Martsenko , Punit Agrawal , Dave Martin , James Morse , Julien Thierry , Michael Weiser , Steve Capper , Ingo Molnar , Thomas Gleixner , Sandipan Das , Paul Lawrence , David Woodhouse , Kees Cook , Geert Uytterhoeven , Josh Poimboeuf , Arnd Bergmann , kasan-dev , linux-doc@vger.kernel.org, LKML , Linux ARM , linux-ext4@vger.kernel.org, linux-sparse@vger.kernel.org, Linux Memory Management List , Linux Kbuild mailing list , Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Kees Cook , Jann Horn , Mark Brand On 09/03/18 18:42, Andrey Konovalov wrote: > On Fri, Mar 9, 2018 at 7:32 PM, Marc Zyngier wrote: >> Well, that's not quite how it works. KVM is an integral part of the >> kernel, and I don't really want to have to deal with regression (not to >> mention that KVM is an essential tool in our testing infrastructure). >> >> You could try and exclude KVM from the instrumentation (which we already >> have for invasive things such as KASAN), but I'm afraid that having a >> debugging option that conflicts with another essential part of the >> kernel is not an option. >> >> I'm happy to help you with that though. >> > > Hm, KHWASAN instruments the very same parts of the kernel that KASAN > does (it reuses the same flag). I've checked, I actually have > CONFIG_KVM enabled in my test build, however I haven't tried to test > KVM yet. I'm planning to perform extensive fuzzing of the kernel with > syzkaller, so if there's any crashes caused by KHWASAN in kvm code > I'll see them. However if some bugs don't manifest as crashes, that > would be a difficult thing to detect for me. Well, if something is wrong in KVM, it usually manifests itself extremely quickly, and takes the whole box with it. I have the ugly feeling that feeding coloured pointers to KVM is going to be a fun ride though. Also, last time I checked Clang couldn't even compile KVM correctly. Hopefully, things have changed... Thanks, M. -- Jazz is not dead. It just smells funny...