From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 40472C433FE for ; Tue, 14 Dec 2021 17:34:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236480AbhLNReC (ORCPT ); Tue, 14 Dec 2021 12:34:02 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:49840 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233805AbhLNReB (ORCPT ); Tue, 14 Dec 2021 12:34:01 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id DBE3A61639; Tue, 14 Dec 2021 17:34:00 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 90AF7C34606; Tue, 14 Dec 2021 17:33:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1639503240; bh=a14UGs1HcGFj82qfqT6BrA/2RMCLBg5mQx9AVEK4VpU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ZlNfM5dbjGpaDzMXebg0TsJnfkA5Czsy+vca92OsqdJw0F5cjEpoJo01rPHq/3rrJ fuW0NaLq+vFPwBn5y4KGLJi7jFsGXAmEkMaF9RuphWRETj7RucU3CpLTqB4osHXdNL UN20De1UpptLO/bPtLRtxHSyQ83o9UJY3Qwi2Is8= Date: Tue, 14 Dec 2021 18:33:57 +0100 From: Greg Kroah-Hartman To: Alexander Potapenko Cc: Alexander Viro , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Ard Biesheuvel , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Marco Elver , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 41/43] security: kmsan: fix interoperability with auto-initialization Message-ID: References: <20211214162050.660953-1-glider@google.com> <20211214162050.660953-42-glider@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 14, 2021 at 06:00:41PM +0100, Alexander Potapenko wrote: > On Tue, Dec 14, 2021 at 5:38 PM Greg Kroah-Hartman > wrote: > > > > > @@ -124,6 +125,7 @@ choice > > > config INIT_STACK_ALL_ZERO > > > bool "zero-init everything (strongest and safest)" > > > depends on CC_HAS_AUTO_VAR_INIT_ZERO > > > + depends on !KMSAN > > > > So this means KMSAN is a developer debugging feature only and should > > never be turned on on a real device/server that has users? > > 100% correct. KMSAN is way slower than KASAN, it also eats 2/3 of your > memory to store the metadata. > I thought it was sort of self-evident, but I can surely mention this > explicitly in the cover letter. Please mention it here and in the Kconfig option for it as well (don't know if it was there or not.) Also you might want to print out very large "DO NOT USE THIS ON A REAL MACHINE" to the kernel log when booting, like other kernel options are starting to do that should not be enabled. thanks, greg k-h