Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp915797pxb; Tue, 3 Nov 2020 16:35:04 -0800 (PST) X-Google-Smtp-Source: ABdhPJy/ZZYFb5kV8PiFYA0pqb16TtmekYlakhu5THgesX9NLqVqfT7qv0i4G689R2AUpSu4Dnrg X-Received: by 2002:a17:906:5052:: with SMTP id e18mr21536546ejk.530.1604450104614; Tue, 03 Nov 2020 16:35:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604450104; cv=none; d=google.com; s=arc-20160816; b=kLz62fhBoJ/3S5sqbNCyo6hbFZrFDGV58MEchWCm/OsBPd4aEyalw+NPTWiYlQaaUL 3CWxDbByMgNxnR08bSwvTemi/zKDO7fL6kNuUfs/AypoOowwu/xRU+vxu86D4vfkpSD7 7R+cm34DWWABMFgI7VycJvQ5pUfHPMpoLT2g15wCecDtM38Jv7MI72WgSoE6zH6nyUzk NPiggftRTSC+i9NgHMhua+5ELS5J6BLx+7rPDtnT6YVDnWQHgHHIdpt1c4upVFmvU+3H f3Wlajvpw8sLk9X8YZshQBAyGa1A2IaEjwwIDuLHcHn0ghnKWMBKbIacCIDqLWqB+F52 rqLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=UdhHRU0F98jC1cBoiYUxAunB9O2RIE4/2px9pbMYCqA=; b=Brt74ptv0dsmXpMDe4gGKBOyOoGdMbQ/dsGdurnUdPAwXdImEO9BT4yjzJCfDBxXcs pOVCsHVJQ535ejqHG6ceoyeZkL+1sJd2WBNn2eTqx07ahq1XkXbsFDVq1FkMh+MZUEj1 GU/fiFoOGKSXg5P27y4ItGB7Trc3kWCOB6/tyCs+u6nfHONozUxrfzN/N2hVkEPxPSL/ ZwXbreW6KGIpKYyAC1Li9scX/TsjdhRhjDn+1A0Vl/qKktZd+hoGsILnoSzT4LHV9Jdb APcFkbCqvh+U6uQn0Q7K5qts9i8PMRxrcJUXOcRARRhHuJptuG9RPf1MlsxnOpaW1xqt VUjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ER7zLL0f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s9si194070edu.457.2020.11.03.16.34.39; Tue, 03 Nov 2020 16:35:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ER7zLL0f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729964AbgKDAbY (ORCPT + 99 others); Tue, 3 Nov 2020 19:31:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:47680 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729890AbgKDAbJ (ORCPT ); Tue, 3 Nov 2020 19:31:09 -0500 Received: from X1 (unknown [208.106.6.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 42824223EA; Wed, 4 Nov 2020 00:31:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604449867; bh=PJ+R6XPlsYAvbfPPVfH/b36l9Qxf3mjjxVF2HSd4mPY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ER7zLL0fsJywguzjfs3PdQZTmOgVAwtAz5yE5+b1SdacnLAOa3OQtAGteR5rW7qCD Ywc7Z9rUQo9Vi+5FVv3vDhZ6WcR6fNJM16p3Tc2cdLZyMHI3nO70s8Q5UgVBzUwL0U RpnJUxRfACjNdutK4tXoVqBpsWdb3+kUMVEy2qI4= Date: Tue, 3 Nov 2020 16:31:03 -0800 From: Andrew Morton To: Marco Elver Cc: glider@google.com, hpa@zytor.com, paulmck@kernel.org, andreyknvl@google.com, aryabinin@virtuozzo.com, luto@kernel.org, bp@alien8.de, catalin.marinas@arm.com, cl@linux.com, dave.hansen@linux.intel.com, rientjes@google.com, dvyukov@google.com, edumazet@google.com, gregkh@linuxfoundation.org, hdanton@sina.com, mingo@redhat.com, jannh@google.com, Jonathan.Cameron@huawei.com, corbet@lwn.net, iamjoonsoo.kim@lge.com, joern@purestorage.com, keescook@chromium.org, mark.rutland@arm.com, penberg@kernel.org, peterz@infradead.org, sjpark@amazon.com, tglx@linutronix.de, vbabka@suse.cz, will@kernel.org, x86@kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org Subject: Re: [PATCH v7 0/9] KFENCE: A low-overhead sampling-based memory safety error detector Message-Id: <20201103163103.109deb9d49a140032d67434f@linux-foundation.org> In-Reply-To: <20201103175841.3495947-1-elver@google.com> References: <20201103175841.3495947-1-elver@google.com> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 3 Nov 2020 18:58:32 +0100 Marco Elver wrote: > This adds the Kernel Electric-Fence (KFENCE) infrastructure. KFENCE is a > low-overhead sampling-based memory safety error detector of heap > use-after-free, invalid-free, and out-of-bounds access errors. This > series enables KFENCE for the x86 and arm64 architectures, and adds > KFENCE hooks to the SLAB and SLUB allocators. > > KFENCE is designed to be enabled in production kernels, and has near > zero performance overhead. Compared to KASAN, KFENCE trades performance > for precision. The main motivation behind KFENCE's design, is that with > enough total uptime KFENCE will detect bugs in code paths not typically > exercised by non-production test workloads. One way to quickly achieve a > large enough total uptime is when the tool is deployed across a large > fleet of machines. Has kfence detected any kernel bugs yet? What is its track record? Will a kfence merge permit us to remove some other memory debugging subsystem? We seem to have rather a lot of them.