Re: [PATCH] fork, vmalloc: KASAN-poison backing pages of vmapped stacks
From: Jann Horn
Date: Wed Jan 25 2023 - 04:50:32 EST
On Tue, Jan 17, 2023 at 5:35 PM Jann Horn <jannh@xxxxxxxxxx> wrote:
> KASAN (except in HW_TAGS mode) tracks memory state based on virtual
> addresses. The mappings of kernel stack pages in the linear mapping are
> currently marked as fully accessible.
> Since stack corruption issues can cause some very gnarly errors, let's be
> extra careful and tell KASAN to forbid accesses to stack memory through the
> linear mapping.
>
> Signed-off-by: Jann Horn <jannh@xxxxxxxxxx>
@akpm please remove this one from your tree for now, it's unlikely to
work at least for now because there's code like cifs_sg_set_buf()