From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga02.intel.com ([134.134.136.20]:26174 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750889AbaGIVTj (ORCPT ); Wed, 9 Jul 2014 17:19:39 -0400 Message-ID: <53BDB1D6.1090605@intel.com> Date: Wed, 09 Jul 2014 14:19:18 -0700 From: Dave Hansen MIME-Version: 1.0 Subject: Re: [RFC/PATCH RESEND -next 00/21] Address sanitizer for kernel (kasan) - dynamic memory error detector. References: <1404905415-9046-1-git-send-email-a.ryabinin@samsung.com> In-Reply-To: <1404905415-9046-1-git-send-email-a.ryabinin@samsung.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kbuild-owner@vger.kernel.org List-ID: To: Andrey Ryabinin , linux-kernel@vger.kernel.org Cc: Dmitry Vyukov , Konstantin Serebryany , Alexey Preobrazhensky , Andrey Konovalov , Yuri Gribov , Konstantin Khlebnikov , Sasha Levin , Michal Marek , Russell King , Thomas Gleixner , Ingo Molnar , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , linux-kbuild@vger.kernel.org, linux-arm-kernel@lists.infradead.org, x86@kernel.org, linux-mm@kvack.org This is totally self-serving (and employer-serving), but has anybody thought about this large collection of memory debugging tools that we are growing? It helps to have them all in the same places in the menus (thanks for adding it to Memory Debugging, btw!). But, this gives us at least four things that overlap with kasan's features on some level. Each of these has its own advantages and disadvantages, of course: 1. DEBUG_PAGEALLOC 2. SLUB debugging / DEBUG_OBJECTS 3. kmemcheck 4. kasan ... and there are surely more coming down pike. Like Intel MPX: > https://software.intel.com/en-us/articles/introduction-to-intel-memory-protection-extensions Or, do we just keep adding these overlapping tools and their associated code over and over and fragment their user bases? You're also claiming that "KASAN is better than all of CONFIG_DEBUG_PAGEALLOC". So should we just disallow (or hide) DEBUG_PAGEALLOC on kernels where KASAN is available? Maybe we just need to keep these out of mainline and make Andrew carry it in -mm until the end of time. :)