From patchwork Wed May 11 02:49:35 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jian Hui Lee X-Patchwork-Id: 1629415 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=JYZLtdDI; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4KyfWz12d2z9sG2 for ; Wed, 11 May 2022 12:49:50 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1nocQ5-0000ac-Pe; Wed, 11 May 2022 02:49:45 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1nocQ4-0000a0-4I for kernel-team@lists.ubuntu.com; Wed, 11 May 2022 02:49:44 +0000 Received: from mail-pg1-f197.google.com (mail-pg1-f197.google.com [209.85.215.197]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id CA0083F044 for ; Wed, 11 May 2022 02:49:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1652237383; bh=zlRBIzmuymbRp5Hmn8sC4D4faah3YezszX0JhGNf2ZY=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=JYZLtdDIptlvayfYdNbziLHTiVgfR1hA42PLGQolKmRN85/MKS+PQpk3yQnzmuXIl Qo08c1DGS18QHG9XCYzQ/ay4cht6IVDnP069zHQdOlH9oRujip6f6Kq/Q0ng4K2YPT c2pCBb1bxah1JrwDoHQOGAEC9ueHL+jqMQ0IqZYAe6Q/ijoVU4uZ9HfRLMofk7NFdb uW7zRdhLfG3F5FnxtWPGeS65Rrw5i1zfD0jnOSbqI/V3frYJTsoV15iiNKxfi4mQ+2 7OXXMml87tp6reQnPHQJq8m/5vV5CwhHN4vZVrcY6jFqlZ/zlIDQqzYyr0jwaR36Ew FbA4bA4XD83cQ== Received: by mail-pg1-f197.google.com with SMTP id x190-20020a6386c7000000b003d82199c4fdso353913pgd.16 for ; Tue, 10 May 2022 19:49:43 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=zlRBIzmuymbRp5Hmn8sC4D4faah3YezszX0JhGNf2ZY=; b=j4gFhvNhIW/DZemiCu8sbM+5CUlsFJXiR0Ne5tXg/UQJwu//ABPkpWhDjL61l4xVoZ zNektZ3ygPmEiuRtAvvYWfd1/F9mJXCjWIP6wCTEG2CJMoIccVbMAwePz1K4OriGdOJY YIfhsjeZzFP7pdRgfSKXVdrBsbSLqkh7FHE7jFR7OnP0y0q7pw7pm0MP5n6nsGUljW7G 3sQ7UJZw7d4oSlgwgx7gYLHgoieE4owgDXJEEH2ydnXpqqypguSGSjihijusYbq7mLwY 1UWhXBWid1wPQ5O5QI5LuqF7wkDHgeAKgVrzBrgjMh2cJ5rLEwGKyvF1alvhKlp9cFog luNA== X-Gm-Message-State: AOAM530YVbn2ROzzM4vmWmswn8LJlk01rGeduYZuRA0fr14T6Z5eY4pw 8pRiRkiuOt9dLbTmkLOkk5Qic2X4oy/YYV0OSx5F8NtYvLACnE+QUwCajROB3SeI4pnJ12wLMuZ HLXM7P/yh2Gfh1SpwAGkCXKlzQVKzhvm0C1K3sYCh5g== X-Received: by 2002:a17:902:d707:b0:15f:42a:bc62 with SMTP id w7-20020a170902d70700b0015f042abc62mr15724796ply.98.1652237382474; Tue, 10 May 2022 19:49:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzo3WsnRKSxE67xZZ6bDCEt1mL1IojCqFQ02hAxrnmFBy/OubrBvi1BYj4dMnMbZXYAKBzVoQ== X-Received: by 2002:a17:902:d707:b0:15f:42a:bc62 with SMTP id w7-20020a170902d70700b0015f042abc62mr15724779ply.98.1652237382177; Tue, 10 May 2022 19:49:42 -0700 (PDT) Received: from localhost.localdomain (36-230-93-232.dynamic-ip.hinet.net. [36.230.93.232]) by smtp.gmail.com with ESMTPSA id b15-20020a056a0002cf00b0050dc76281c4sm268107pft.158.2022.05.10.19.49.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 May 2022 19:49:41 -0700 (PDT) From: Jian Hui Lee To: kernel-team@lists.ubuntu.com Subject: [SRU][Jammy:linux-intel-iotg][PATCH v2 1/1] UBUNTU: [Config] disable KFENCE Date: Wed, 11 May 2022 10:49:35 +0800 Message-Id: <20220511024935.187039-2-jianhui.lee@canonical.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220511024935.187039-1-jianhui.lee@canonical.com> References: <20220511024935.187039-1-jianhui.lee@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" From: Wen-chien Jesse Sung BugLink: https://bugs.launchpad.net/bugs/1946001 Disable KFENCE as a workaround to prevent potential kernel panics that seem to happen in nested KVM environments (e.g., systemd autopackage test). Disabling this feature also allows to remove the overhead of the periodic sampling performed by KFENCE. The regression potential is that we may receive memory corruption bug reports (that were previously detected explicitly by KFENCE), but in such case we have always the option to provide a test kernel with KASAN enabled, that provides a better coverage for this kind of bugs. Signed-off-by: Wen-chien Jesse Sung (cherry picked from commit 14c6596e47be5f17749172710ff6a850958e139d linux-intel-5.13) Signed-off-by: Jian Hui Lee --- debian.intel-iotg/config/annotations | 8 ++++++++ debian.intel-iotg/config/config.common.ubuntu | 6 +----- 2 files changed, 9 insertions(+), 5 deletions(-) diff --git a/debian.intel-iotg/config/annotations b/debian.intel-iotg/config/annotations index a995a8abfd50..d5bf07ddd3e5 100644 --- a/debian.intel-iotg/config/annotations +++ b/debian.intel-iotg/config/annotations @@ -16,3 +16,11 @@ CONFIG_TEST_DIV64 policy<{'amd64': 'n'}> CONFIG_SYSFB_SIMPLEFB policy<{'amd64': 'n', 'arm64': 'y', 'armhf': 'y'}> +# Menu: Kernel hacking >> Memory Debugging >> KFENCE: low-overhead sampling-based memory safety error detector +CONFIG_KFENCE policy<{'amd64': 'n', 'arm64': 'n'}> +CONFIG_KFENCE_STATIC_KEYS policy<{'amd64': '-', 'arm64': '-'}> +CONFIG_KFENCE_SAMPLE_INTERVAL policy<{'amd64': '-', 'arm64': '-'}> +CONFIG_KFENCE_NUM_OBJECTS policy<{'amd64': '-', 'arm64': '-'}> +CONFIG_KFENCE_STRESS_TEST_FAULTS policy<{'amd64': '-', 'arm64': '-'}> +# +CONFIG_KFENCE mark note diff --git a/debian.intel-iotg/config/config.common.ubuntu b/debian.intel-iotg/config/config.common.ubuntu index 7e289924beb1..02a3e58e793c 100644 --- a/debian.intel-iotg/config/config.common.ubuntu +++ b/debian.intel-iotg/config/config.common.ubuntu @@ -4004,11 +4004,7 @@ CONFIG_KEYS=y CONFIG_KEYS_REQUEST_CACHE=y CONFIG_KEY_DH_OPERATIONS=y CONFIG_KEY_NOTIFICATIONS=y -CONFIG_KFENCE=y -CONFIG_KFENCE_NUM_OBJECTS=255 -CONFIG_KFENCE_SAMPLE_INTERVAL=0 -# CONFIG_KFENCE_STATIC_KEYS is not set -CONFIG_KFENCE_STRESS_TEST_FAULTS=0 +# CONFIG_KFENCE is not set CONFIG_KGDB=y CONFIG_KGDB_HONOUR_BLOCKLIST=y CONFIG_KGDB_KDB=y