Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754521AbdFWPNf (ORCPT ); Fri, 23 Jun 2017 11:13:35 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55580 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752756AbdFWPNe (ORCPT ); Fri, 23 Jun 2017 11:13:34 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 91F7FC05FFF4 Authentication-Results: ext-mx08.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx08.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=riel@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 91F7FC05FFF4 Message-ID: <1498230808.13083.29.camel@redhat.com> Subject: Re: [PATCH 0/3] properly account for stack randomization and guard gap From: Rik van Riel To: Ingo Molnar Cc: linux-kernel@vger.kernel.org, akpm@linux-foundation.org, will.deacon@arm.com, danielmicay@gmail.com, benh@kernel.crashing.org, hughd@google.com, Linus Torvalds , Michal Hocko , Dave Jones , Oleg Nesterov Date: Fri, 23 Jun 2017 11:13:28 -0400 In-Reply-To: <20170623083521.f62me7efrm4ygawq@gmail.com> References: <20170622200033.25714-1-riel@redhat.com> <20170623083521.f62me7efrm4ygawq@gmail.com> Organization: Red Hat, Inc Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Fri, 23 Jun 2017 15:13:33 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 808 Lines: 22 On Fri, 2017-06-23 at 10:35 +0200, Ingo Molnar wrote: > * riel@redhat.com wrote: > > > When RLIMIT_STACK is larger than the minimum gap enforced by > > mmap_base(), it is possible for the kernel to place the mmap > > area where the stack wants to grow, resulting in the stack > > not being able to use the space that should have been allocated > > to it through RLIMIT_STACK. > > > > This series ensures that x86, ARM64, and PPC have at least > > RLIMIT_STACK + stack randomization + the stack guard gap > > space available for the stack. > > > > s390 seems to be ok. I have not checked other architectures. > > x86 patch LGTM: > >   Acked-by: Ingo Molnar > > ... but I suspect this wants to go via -mm or Linus directly? I believe Andrew picked it up yesterday.