On Fri, Jun 03, 2005 at 12:09:14PM -0700, Siddha, Suresh B wrote: > can happen in syscall32_setup_pages because of a malicious app and > another is the 32bit hugetlb application failure(which was also observed > by a customer recently). More details are in my changeset comments. Ok agreed the memory leak needs to be fixed somehow. The hugetlb thing should be caught by the compat mmap function. I will double check it. -andi - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
- References:
- [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- From: "Siddha, Suresh B" <[email protected]>
- Re: [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- From: Andrew Morton <[email protected]>
- Re: [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- From: "Siddha, Suresh B" <[email protected]>
- Re: [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- From: Andrew Morton <[email protected]>
- Re: [discuss] Re: [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- From: "Siddha, Suresh B" <[email protected]>
- Re: [discuss] Re: [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- From: Andi Kleen <[email protected]>
- Re: [discuss] Re: [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- From: "Siddha, Suresh B" <[email protected]>
- [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- Prev by Date: Re: patch] Real-Time Preemption, plist fixes
- Next by Date: Re: [PATCH] ptrace(2) single-stepping into signal handlers
- Previous by thread: Re: [discuss] Re: [Patch] x86_64: TASK_SIZE fixes for compatibility mode processes
- Next by thread: [PATCH][1/5] RapidIO support: core
- Index(es):