Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754205AbdFWDKy (ORCPT ); Thu, 22 Jun 2017 23:10:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:34086 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753925AbdFWDKx (ORCPT ); Thu, 22 Jun 2017 23:10:53 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 751DB22B68 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=luto@kernel.org MIME-Version: 1.0 In-Reply-To: <20170622143443.GA22690@1wt.eu> References: <20170622123045.GA2694@decadent.org.uk> <20170622124659.GE22510@1wt.eu> <1498136291.2655.24.camel@decadent.org.uk> <20170622135927.GA22684@1wt.eu> <1498140840.2655.28.camel@decadent.org.uk> <20170622143443.GA22690@1wt.eu> From: Andy Lutomirski Date: Thu, 22 Jun 2017 20:10:29 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [vs-plain] Re: [PATCH] mm: larger stack guard gap, between vmas To: Willy Tarreau Cc: Ben Hutchings , Levente Polyak , Hugh Dickins , Linus Torvalds , Oleg Nesterov , Michal Hocko , "Jason A. Donenfeld" , Rik van Riel , Larry Woodman , "Kirill A. Shutemov" , Tony Luck , "James E.J. Bottomley" , Helge Diller , James Hogan , Laura Abbott , Greg KH , "security@kernel.org" , linux-distros@vs.openwall.org, Qualys Security Advisory , stable , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 703 Lines: 19 On Thu, Jun 22, 2017 at 7:34 AM, Willy Tarreau wrote: > On Thu, Jun 22, 2017 at 03:14:00PM +0100, Ben Hutchings wrote: >> On Thu, 2017-06-22 at 15:59 +0200, Willy Tarreau wrote: >> > but I think Ben is currently looking >> > for feedback on the validity of his backport which was a difficult >> > task. >> >> Right. > > Ben, barring more feedback, I think your should put your patch to your > stable queue so that Guenter can run his build+boot tests. They managed > to spot a few issues in my patches and that will make you more confident > regarding the whole architectures coverage. > Has anyone checked how grsecurity deals with this? I think they have a large stack guard gap. --Andy