Mark Rutland
unread,Jul 23, 2018, 7:18:19 AM7/23/18Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Dmitry Vyukov, Andy Lutomirski, Andrey Ryabinin, Alexander Potapenko, kasan-dev, LKML, X86 ML
VMAP_STACK makes it possible to detect stack overflows reliably at the
point of overflow.
KASAN can't handle this reliably, even if it detects that an access is
out of the stack bounds, since handling this requires stack space.
Depending on a number of factors, this may be reported, might result in
recursive exceptions, etc.
I assume we must populate shadow for vmalloc regions today, but I guess
that just shares the zero shadow?
Thanks,
Mark.