linux/arch/um
Johannes Berg ef4459a6da um: allocate a guard page to helper threads
We've been running into stack overflows in helper threads
corrupting memory (e.g. because somebody put printf() or
os_info() there), so to avoid those causing hard-to-debug
issues later on, allocate a guard page for helper thread
stacks and mark it read-only.

Unfortunately, the crash dump at that point is useless as
the stack tracer will try to backtrace the *kernel* thread,
not the helper thread, but at least we don't survive to a
random issue caused by corruption.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: Richard Weinberger <richard@nod.at>
2020-12-13 22:38:06 +01:00
..
configs um: Cleanup CONFIG_IOSCHED_CFQ 2020-03-29 23:15:22 +02:00
drivers um: allocate a guard page to helper threads 2020-12-13 22:38:06 +01:00
include um: allocate a guard page to helper threads 2020-12-13 22:38:06 +01:00
kernel um: allocate a guard page to helper threads 2020-12-13 22:38:06 +01:00
os-Linux um: allocate a guard page to helper threads 2020-12-13 22:38:06 +01:00
scripts License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00
.gitignore .gitignore: add SPDX License Identifier 2020-03-25 11:50:48 +01:00
Kconfig um: support some of ARCH_HAS_SET_MEMORY 2020-12-13 22:38:06 +01:00
Kconfig.debug treewide: replace '---help---' in Kconfig files with 'help' 2020-06-14 01:57:21 +09:00
Makefile kbuild: remove cc-option test of -fno-stack-protector 2020-07-07 11:13:10 +09:00
Makefile-os-Linux x86, um: get rid of arch/um/os symlink 2008-10-22 22:55:22 -07:00
Makefile-skas [PATCH] uml makefiles sanitized 2005-09-29 08:46:26 -07:00