From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754673AbcHXKSw (ORCPT ); Wed, 24 Aug 2016 06:18:52 -0400 Received: from mail-wm0-f65.google.com ([74.125.82.65]:34995 "EHLO mail-wm0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752344AbcHXKSu (ORCPT ); Wed, 24 Aug 2016 06:18:50 -0400 Date: Wed, 24 Aug 2016 12:03:53 +0200 From: Ingo Molnar To: Andy Lutomirski , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov Cc: x86@kernel.org, Borislav Petkov , linux-kernel@vger.kernel.org, Brian Gerst , Oleg Nesterov , Linus Torvalds , Andrew Morton , Thomas Gleixner , "H. Peter Anvin" , Peter Zijlstra Subject: Re: [PATCH v6 1/3] fork: Add generic vmalloced stack support Message-ID: <20160824100352.GA9681@gmail.com> References: <14c07d4fd173a5b117f51e8b939f9f4323e39899.1470907718.git.luto@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <14c07d4fd173a5b117f51e8b939f9f4323e39899.1470907718.git.luto@kernel.org> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Andy Lutomirski wrote: > +config VMAP_STACK > + default y > + bool "Use a virtually-mapped stack" > + depends on HAVE_ARCH_VMAP_STACK && !KASAN > + ---help--- > + Enable this if you want the use virtually-mapped kernel stacks > + with guard pages. This causes kernel stack overflows to be > + caught immediately rather than causing difficult-to-diagnose > + corruption. > + > + This is presently incompatible with KASAN because KASAN expects > + the stack to map directly to the KASAN shadow map using a formula > + that is incorrect if the stack is in vmalloc space. Btw., is this KASAN limitation fundamental? As x86 is going to enable this feature by default, this probably limits KASAN utility rather significantly. Thanks, Ingo