Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932660AbaKRU6r (ORCPT ); Tue, 18 Nov 2014 15:58:47 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:35974 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932175AbaKRU6q (ORCPT ); Tue, 18 Nov 2014 15:58:46 -0500 Date: Tue, 18 Nov 2014 12:58:43 -0800 From: Andrew Morton To: Andrey Ryabinin Cc: Dmitry Vyukov , Konstantin Serebryany , Dmitry Chernenkov , Andrey Konovalov , Yuri Gribov , Konstantin Khlebnikov , Sasha Levin , Michal Marek , Thomas Gleixner , Ingo Molnar , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Dave Hansen , Andi Kleen , Vegard Nossum , "H. Peter Anvin" , x86@kernel.org, linux-mm@kvack.org, Randy Dunlap , Peter Zijlstra , Alexander Viro , Dave Jones , Jonathan Corbet , Joe Perches , linux-kernel@vger.kernel.org Subject: Re: [PATCH v6 00/11] Kernel address sanitizer - runtime memory debugger. Message-Id: <20141118125843.434c216540def495d50f3a45@linux-foundation.org> In-Reply-To: <5461B906.1040803@samsung.com> References: <1404905415-9046-1-git-send-email-a.ryabinin@samsung.com> <1415199241-5121-1-git-send-email-a.ryabinin@samsung.com> <5461B906.1040803@samsung.com> X-Mailer: Sylpheed 3.4.0beta7 (GTK+ 2.24.23; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 11 Nov 2014 10:21:42 +0300 Andrey Ryabinin wrote: > Hi Andrew, > > Now we have stable GCC(4.9.2) which supports kasan and from my point of view patchset is ready for merging. > I could have sent v7 (it's just rebased v6), but I see no point in doing that and bothering people, > unless you are ready to take it. It's a huge pile of tricky code we'll need to maintain. To justify its inclusion I think we need to be confident that kasan will find a significant number of significant bugs that kmemcheck/debug_pagealloc/slub_debug failed to detect. How do we get that confidence? I've seen a small number of minorish-looking kasan-detected bug reports go past, maybe six or so. That's in a 20-year-old code base, so one new minor bug discovered per three years? Not worth it! Presumably more bugs will be exposed as more people use kasan on different kernel configs, but will their number and seriousness justify the maintenance effort? If kasan will permit us to remove kmemcheck/debug_pagealloc/slub_debug then that tips the balance a little. What's the feasibility of that? Sorry to play the hardass here, but someone has to ;) -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/