From: Andy Lutomirski <luto@kernel.org> To: x86@kernel.org, linux-kernel@vger.kernel.org Cc: linux-arch@vger.kernel.org, Borislav Petkov <bp@alien8.de>, Nadav Amit <nadav.amit@gmail.com>, Kees Cook <keescook@chromium.org>, Brian Gerst <brgerst@gmail.com>, "kernel-hardening@lists.openwall.com" <kernel-hardening@lists.openwall.com>, Linus Torvalds <torvalds@linux-foundation.org>, Josh Poimboeuf <jpoimboe@redhat.com>, Jann Horn <jann@thejh.net>, Heiko Carstens <heiko.carstens@de.ibm.com>, Andy Lutomirski <luto@kernel.org>, Oleg Nesterov <oleg@redhat.com>, Peter Zijlstra <peterz@infradead.org> Subject: [PATCH v5 31/32] sched: Free the stack early if CONFIG_THREAD_INFO_IN_TASK Date: Mon, 11 Jul 2016 13:54:04 -0700 [thread overview] Message-ID: <0adfb2c369747002dc8442f71987d1fb6eb9feb7.1468270393.git.luto@kernel.org> (raw) In-Reply-To: <cover.1468270393.git.luto@kernel.org> In-Reply-To: <cover.1468270393.git.luto@kernel.org> We currently keep every task's stack around until the task_struct itself is freed. This means that we keep the stack allocation alive for longer than necessary and that, under load, we free stacks in big batches whenever RCU drops the last task reference. Neither of these is good for reuse of cache-hot memory, and freeing in batches prevents us from usefully caching small numbers of vmalloced stacks. On architectures that have thread_info on the stack, we can't easily change this, but on architectures that set THREAD_INFO_IN_TASK, we can free it as soon as the task is dead. Cc: Oleg Nesterov <oleg@redhat.com> Cc: Peter Zijlstra <peterz@infradead.org> Signed-off-by: Andy Lutomirski <luto@kernel.org> --- include/linux/init_task.h | 4 +++- include/linux/sched.h | 14 ++++++++++++++ kernel/fork.c | 35 ++++++++++++++++++++++++++++++++++- kernel/sched/core.c | 4 ++++ 4 files changed, 55 insertions(+), 2 deletions(-) diff --git a/include/linux/init_task.h b/include/linux/init_task.h index 9c04d44eeb3c..325f649d77ff 100644 --- a/include/linux/init_task.h +++ b/include/linux/init_task.h @@ -186,7 +186,9 @@ extern struct task_group root_task_group; #endif #ifdef CONFIG_THREAD_INFO_IN_TASK -# define INIT_TASK_TI(tsk) .thread_info = INIT_THREAD_INFO(tsk), +# define INIT_TASK_TI(tsk) \ + .thread_info = INIT_THREAD_INFO(tsk), \ + .stack_refcount = ATOMIC_INIT(1), #else # define INIT_TASK_TI(tsk) #endif diff --git a/include/linux/sched.h b/include/linux/sched.h index 18bef18fef88..cefd136248c4 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -1934,6 +1934,10 @@ struct task_struct { #ifdef CONFIG_VMAP_STACK struct vm_struct *stack_vm_area; #endif +#ifdef CONFIG_THREAD_INFO_IN_TASK + /* A live task holds one reference. */ + atomic_t stack_refcount; +#endif /* CPU-specific state of this task */ struct thread_struct thread; /* @@ -3112,12 +3116,22 @@ static inline unsigned long *end_of_stack(struct task_struct *p) #endif +#ifdef CONFIG_THREAD_INFO_IN_TASK +static inline void *try_get_task_stack(struct task_struct *tsk) +{ + return atomic_inc_not_zero(&tsk->stack_refcount) ? + task_stack_page(tsk) : NULL; +} + +extern void put_task_stack(struct task_struct *tsk); +#else static inline void *try_get_task_stack(struct task_struct *tsk) { return task_stack_page(tsk); } static inline void put_task_stack(struct task_struct *tsk) {} +#endif #define task_stack_end_corrupted(task) \ (*(end_of_stack(task)) != STACK_END_MAGIC) diff --git a/kernel/fork.c b/kernel/fork.c index d2a64a0413be..3003edae90fc 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -269,11 +269,40 @@ static void account_kernel_stack(struct task_struct *tsk, int account) } } -void free_task(struct task_struct *tsk) +static void release_task_stack(struct task_struct *tsk) { account_kernel_stack(tsk, -1); arch_release_thread_stack(tsk->stack); free_thread_stack(tsk); + tsk->stack = NULL; +#ifdef CONFIG_VMAP_STACK + tsk->stack_vm_area = NULL; +#endif +} + +#ifdef CONFIG_THREAD_INFO_IN_TASK +void put_task_stack(struct task_struct *tsk) +{ + if (atomic_dec_and_test(&tsk->stack_refcount)) + release_task_stack(tsk); +} +#endif + +void free_task(struct task_struct *tsk) +{ +#ifndef CONFIG_THREAD_INFO_IN_TASK + /* + * The task is finally done with both the stack and thread_info, + * so free both. + */ + release_task_stack(tsk); +#else + /* + * If the task had a separate stack allocation, it should be gone + * by now. + */ + WARN_ON_ONCE(atomic_read(&tsk->stack_refcount) != 0); +#endif rt_mutex_debug_task_free(tsk); ftrace_graph_exit_task(tsk); put_seccomp_filter(tsk); @@ -411,6 +440,9 @@ static struct task_struct *dup_task_struct(struct task_struct *orig, int node) #ifdef CONFIG_VMAP_STACK tsk->stack_vm_area = stack_vm_area; #endif +#ifdef CONFIG_THREAD_INFO_IN_TASK + atomic_set(&tsk->stack_refcount, 1); +#endif if (err) goto free_stack; @@ -1750,6 +1782,7 @@ bad_fork_cleanup_count: atomic_dec(&p->cred->user->processes); exit_creds(p); bad_fork_free: + put_task_stack(p); free_task(p); fork_out: return ERR_PTR(retval); diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 51d7105f529a..a2da85cbcbde 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -2742,6 +2742,10 @@ static struct rq *finish_task_switch(struct task_struct *prev) * task and put them back on the free list. */ kprobe_flush_task(prev); + + /* Task is done with its stack. */ + put_task_stack(prev); + put_task_struct(prev); } -- 2.7.4
WARNING: multiple messages have this Message-ID (diff)
From: Andy Lutomirski <luto@kernel.org> To: x86@kernel.org, linux-kernel@vger.kernel.org Cc: linux-arch@vger.kernel.org, Borislav Petkov <bp@alien8.de>, Nadav Amit <nadav.amit@gmail.com>, Kees Cook <keescook@chromium.org>, Brian Gerst <brgerst@gmail.com>, "kernel-hardening@lists.openwall.com" <kernel-hardening@lists.openwall.com>, Linus Torvalds <torvalds@linux-foundation.org>, Josh Poimboeuf <jpoimboe@redhat.com>, Jann Horn <jann@thejh.net>, Heiko Carstens <heiko.carstens@de.ibm.com>, Andy Lutomirski <luto@kernel.org>, Oleg Nesterov <oleg@redhat.com>, Peter Zijlstra <peterz@infradead.org> Subject: [kernel-hardening] [PATCH v5 31/32] sched: Free the stack early if CONFIG_THREAD_INFO_IN_TASK Date: Mon, 11 Jul 2016 13:54:04 -0700 [thread overview] Message-ID: <0adfb2c369747002dc8442f71987d1fb6eb9feb7.1468270393.git.luto@kernel.org> (raw) In-Reply-To: <cover.1468270393.git.luto@kernel.org> In-Reply-To: <cover.1468270393.git.luto@kernel.org> We currently keep every task's stack around until the task_struct itself is freed. This means that we keep the stack allocation alive for longer than necessary and that, under load, we free stacks in big batches whenever RCU drops the last task reference. Neither of these is good for reuse of cache-hot memory, and freeing in batches prevents us from usefully caching small numbers of vmalloced stacks. On architectures that have thread_info on the stack, we can't easily change this, but on architectures that set THREAD_INFO_IN_TASK, we can free it as soon as the task is dead. Cc: Oleg Nesterov <oleg@redhat.com> Cc: Peter Zijlstra <peterz@infradead.org> Signed-off-by: Andy Lutomirski <luto@kernel.org> --- include/linux/init_task.h | 4 +++- include/linux/sched.h | 14 ++++++++++++++ kernel/fork.c | 35 ++++++++++++++++++++++++++++++++++- kernel/sched/core.c | 4 ++++ 4 files changed, 55 insertions(+), 2 deletions(-) diff --git a/include/linux/init_task.h b/include/linux/init_task.h index 9c04d44eeb3c..325f649d77ff 100644 --- a/include/linux/init_task.h +++ b/include/linux/init_task.h @@ -186,7 +186,9 @@ extern struct task_group root_task_group; #endif #ifdef CONFIG_THREAD_INFO_IN_TASK -# define INIT_TASK_TI(tsk) .thread_info = INIT_THREAD_INFO(tsk), +# define INIT_TASK_TI(tsk) \ + .thread_info = INIT_THREAD_INFO(tsk), \ + .stack_refcount = ATOMIC_INIT(1), #else # define INIT_TASK_TI(tsk) #endif diff --git a/include/linux/sched.h b/include/linux/sched.h index 18bef18fef88..cefd136248c4 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -1934,6 +1934,10 @@ struct task_struct { #ifdef CONFIG_VMAP_STACK struct vm_struct *stack_vm_area; #endif +#ifdef CONFIG_THREAD_INFO_IN_TASK + /* A live task holds one reference. */ + atomic_t stack_refcount; +#endif /* CPU-specific state of this task */ struct thread_struct thread; /* @@ -3112,12 +3116,22 @@ static inline unsigned long *end_of_stack(struct task_struct *p) #endif +#ifdef CONFIG_THREAD_INFO_IN_TASK +static inline void *try_get_task_stack(struct task_struct *tsk) +{ + return atomic_inc_not_zero(&tsk->stack_refcount) ? + task_stack_page(tsk) : NULL; +} + +extern void put_task_stack(struct task_struct *tsk); +#else static inline void *try_get_task_stack(struct task_struct *tsk) { return task_stack_page(tsk); } static inline void put_task_stack(struct task_struct *tsk) {} +#endif #define task_stack_end_corrupted(task) \ (*(end_of_stack(task)) != STACK_END_MAGIC) diff --git a/kernel/fork.c b/kernel/fork.c index d2a64a0413be..3003edae90fc 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -269,11 +269,40 @@ static void account_kernel_stack(struct task_struct *tsk, int account) } } -void free_task(struct task_struct *tsk) +static void release_task_stack(struct task_struct *tsk) { account_kernel_stack(tsk, -1); arch_release_thread_stack(tsk->stack); free_thread_stack(tsk); + tsk->stack = NULL; +#ifdef CONFIG_VMAP_STACK + tsk->stack_vm_area = NULL; +#endif +} + +#ifdef CONFIG_THREAD_INFO_IN_TASK +void put_task_stack(struct task_struct *tsk) +{ + if (atomic_dec_and_test(&tsk->stack_refcount)) + release_task_stack(tsk); +} +#endif + +void free_task(struct task_struct *tsk) +{ +#ifndef CONFIG_THREAD_INFO_IN_TASK + /* + * The task is finally done with both the stack and thread_info, + * so free both. + */ + release_task_stack(tsk); +#else + /* + * If the task had a separate stack allocation, it should be gone + * by now. + */ + WARN_ON_ONCE(atomic_read(&tsk->stack_refcount) != 0); +#endif rt_mutex_debug_task_free(tsk); ftrace_graph_exit_task(tsk); put_seccomp_filter(tsk); @@ -411,6 +440,9 @@ static struct task_struct *dup_task_struct(struct task_struct *orig, int node) #ifdef CONFIG_VMAP_STACK tsk->stack_vm_area = stack_vm_area; #endif +#ifdef CONFIG_THREAD_INFO_IN_TASK + atomic_set(&tsk->stack_refcount, 1); +#endif if (err) goto free_stack; @@ -1750,6 +1782,7 @@ bad_fork_cleanup_count: atomic_dec(&p->cred->user->processes); exit_creds(p); bad_fork_free: + put_task_stack(p); free_task(p); fork_out: return ERR_PTR(retval); diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 51d7105f529a..a2da85cbcbde 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -2742,6 +2742,10 @@ static struct rq *finish_task_switch(struct task_struct *prev) * task and put them back on the free list. */ kprobe_flush_task(prev); + + /* Task is done with its stack. */ + put_task_stack(prev); + put_task_struct(prev); } -- 2.7.4
next prev parent reply other threads:[~2016-07-11 20:55 UTC|newest] Thread overview: 176+ messages / expand[flat|nested] mbox.gz Atom feed top 2016-07-11 20:53 [PATCH v5 00/32] virtually mapped stacks and thread_info cleanup Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 01/32] bluetooth: Switch SMP to crypto_cipher_encrypt_one() Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-14 19:10 ` Andy Lutomirski 2016-07-14 19:10 ` [kernel-hardening] " Andy Lutomirski 2016-07-14 19:10 ` Andy Lutomirski 2016-07-14 20:30 ` Marcel Holtmann 2016-07-14 20:30 ` [kernel-hardening] " Marcel Holtmann 2016-07-14 20:30 ` Marcel Holtmann 2016-07-14 20:41 ` David Miller 2016-07-14 20:41 ` [kernel-hardening] " David Miller 2016-07-11 20:53 ` [PATCH v5 02/32] x86/mm/hotplug: Don't remove PGD entries in remove_pagetable() Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-22 4:43 ` [kernel-hardening] " Valdis.Kletnieks 2016-07-22 4:43 ` Valdis.Kletnieks 2016-07-22 5:34 ` [kernel-hardening] " Andy Lutomirski 2016-07-22 5:34 ` Andy Lutomirski 2016-07-22 5:34 ` Andy Lutomirski 2016-07-22 10:18 ` Mike Krinkin 2016-07-22 10:21 ` Ingo Molnar 2016-07-22 18:21 ` Andy Lutomirski 2016-07-22 18:21 ` Andy Lutomirski 2016-07-22 18:31 ` Andy Lutomirski 2016-07-22 18:31 ` Andy Lutomirski 2016-07-22 20:11 ` Ingo Molnar 2016-07-22 20:11 ` Ingo Molnar 2016-07-22 20:11 ` Ingo Molnar 2016-07-23 5:21 ` [kernel-hardening] " Valdis.Kletnieks 2016-07-23 5:21 ` Valdis.Kletnieks 2016-07-23 14:58 ` [kernel-hardening] " Nicolai Stange 2016-07-28 9:26 ` Valdis.Kletnieks 2016-07-28 9:26 ` Valdis.Kletnieks 2016-07-11 20:53 ` [PATCH v5 04/32] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables() Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 05/32] mm: Track NR_KERNEL_STACK in KiB instead of number of stacks Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 06/32] mm: Fix memcg stack accounting for sub-page stacks Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 07/32] fork: Add generic vmalloced stack support Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 08/32] dma-api: Teach the "DMA-from-stack" check about vmapped stacks Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 09/32] x86/dumpstack: When OOPSing, rewind the stack before do_exit() Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 10/32] x86/dumpstack: Honor supplied @regs arg Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 11/32] x86/dumpstack: Try harder to get a call trace on stack overflow Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 12/32] x86/dumpstack/64: Handle faults when printing the "Stack:" part of an OOPS Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 13/32] x86/mm/64: In vmalloc_fault(), use CR3 instead of current->active_mm Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-12 17:51 ` [kernel-hardening] " Dave Hansen 2016-07-12 18:03 ` Andy Lutomirski 2016-07-12 18:03 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 14/32] x86/mm/64: Enable vmapped stacks Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-13 7:53 ` Ingo Molnar 2016-07-13 7:53 ` [kernel-hardening] " Ingo Molnar 2016-07-13 7:53 ` Ingo Molnar 2016-07-13 18:42 ` Andy Lutomirski 2016-07-13 18:42 ` [kernel-hardening] " Andy Lutomirski 2016-07-13 18:42 ` Andy Lutomirski 2016-07-14 8:34 ` Ingo Molnar 2016-07-14 8:34 ` [kernel-hardening] " Ingo Molnar 2016-07-14 8:34 ` Ingo Molnar 2016-07-14 16:51 ` Andy Lutomirski 2016-07-14 16:51 ` [kernel-hardening] " Andy Lutomirski 2016-07-14 16:51 ` Andy Lutomirski 2016-07-14 18:45 ` Ingo Molnar 2016-07-14 18:45 ` [kernel-hardening] " Ingo Molnar 2016-07-14 18:45 ` Ingo Molnar 2016-07-11 20:53 ` [PATCH v5 15/32] x86/mm: Improve stack-overflow #PF handling Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 16/32] x86: Move uaccess_err and sig_on_uaccess_err to thread_struct Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 17/32] x86: Move addr_limit " Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 18/32] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-12 11:57 ` Brian Gerst 2016-07-12 11:57 ` Brian Gerst 2016-07-12 11:57 ` [kernel-hardening] " Brian Gerst 2016-07-12 11:57 ` [PATCH v5 18/32] signal: Consolidate {TS, TLF}_RESTORE_SIGMASK code Brian Gerst 2016-07-12 11:57 ` [PATCH v5 18/32] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code Brian Gerst 2016-07-12 11:57 ` Brian Gerst 2016-07-12 11:57 ` Brian Gerst 2016-07-12 23:01 ` Andy Lutomirski 2016-07-12 23:01 ` [kernel-hardening] " Andy Lutomirski 2016-07-12 23:01 ` [PATCH v5 18/32] signal: Consolidate {TS, TLF}_RESTORE_SIGMASK code Andy Lutomirski 2016-07-12 23:01 ` [PATCH v5 18/32] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code Andy Lutomirski 2016-07-12 23:01 ` Andy Lutomirski 2016-07-12 23:01 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 19/32] x86/smp: Remove stack_smp_processor_id() Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 20/32] x86/smp: Remove unnecessary initialization of thread_info::cpu Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 21/32] x86/asm: Move 'status' from struct thread_info to struct thread_struct Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 22/32] kdb: Use task_cpu() instead of task_thread_info()->cpu Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 23/32] printk: When dumping regs, show the stack, not thread_info Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 24/32] x86/entry: Get rid of pt_regs_to_thread_info() Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 25/32] um: Stop conflating task_struct::stack with thread_info Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:53 ` [PATCH v5 26/32] sched: Allow putting thread_info into task_struct Andy Lutomirski 2016-07-11 20:53 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:53 ` Andy Lutomirski 2016-07-11 20:54 ` [PATCH v5 27/32] x86: Move " Andy Lutomirski 2016-07-11 20:54 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:54 ` Andy Lutomirski 2016-07-11 20:54 ` [PATCH v5 28/32] sched: Add try_get_task_stack() and put_task_stack() Andy Lutomirski 2016-07-11 20:54 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:54 ` Andy Lutomirski 2016-07-11 20:54 ` [PATCH v5 29/32] kthread: to_live_kthread() needs try_get_task_stack() Andy Lutomirski 2016-07-11 20:54 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:54 ` Andy Lutomirski 2016-07-11 20:54 ` [PATCH v5 30/32] x86/dumpstack: Pin the target stack in save_stack_trace_tsk() Andy Lutomirski 2016-07-11 20:54 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:54 ` Andy Lutomirski 2016-07-11 20:54 ` Andy Lutomirski [this message] 2016-07-11 20:54 ` [kernel-hardening] [PATCH v5 31/32] sched: Free the stack early if CONFIG_THREAD_INFO_IN_TASK Andy Lutomirski 2016-07-11 20:54 ` Andy Lutomirski 2016-07-11 20:54 ` [PATCH v5 32/32] fork: Cache two thread stacks per cpu if CONFIG_VMAP_STACK is set Andy Lutomirski 2016-07-11 20:54 ` [kernel-hardening] " Andy Lutomirski 2016-07-11 20:54 ` Andy Lutomirski 2016-07-12 8:56 ` [PATCH v5 00/32] virtually mapped stacks and thread_info cleanup Herbert Xu 2016-07-12 8:56 ` [kernel-hardening] " Herbert Xu 2016-07-12 8:56 ` Herbert Xu 2016-07-12 8:56 ` Herbert Xu 2016-07-13 8:54 ` Christian Borntraeger 2016-07-13 8:54 ` Christian Borntraeger 2016-07-13 8:54 ` [kernel-hardening] " Christian Borntraeger 2016-07-13 18:36 ` Andy Lutomirski 2016-07-13 18:36 ` Andy Lutomirski 2016-07-13 18:36 ` [kernel-hardening] " Andy Lutomirski 2016-07-13 18:53 ` Christian Borntraeger 2016-07-13 18:53 ` Christian Borntraeger 2016-07-13 18:53 ` [kernel-hardening] " Christian Borntraeger
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=0adfb2c369747002dc8442f71987d1fb6eb9feb7.1468270393.git.luto@kernel.org \ --to=luto@kernel.org \ --cc=bp@alien8.de \ --cc=brgerst@gmail.com \ --cc=heiko.carstens@de.ibm.com \ --cc=jann@thejh.net \ --cc=jpoimboe@redhat.com \ --cc=keescook@chromium.org \ --cc=kernel-hardening@lists.openwall.com \ --cc=linux-arch@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=nadav.amit@gmail.com \ --cc=oleg@redhat.com \ --cc=peterz@infradead.org \ --cc=torvalds@linux-foundation.org \ --cc=x86@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.