Re: [PATCH] x86_64: another fix for canonical RIPs during signal handling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> If I understand it well, an application which maps address 0 has no way to
> be notified that the kernel detected a corrupted stack pointer. 

It will just not crash again after the application tried to deliberately
crash the kernel.

> I agree 
> that if the proposed patch avoids to make this undesired distinction between
> apps that map addr 0 and those which don't, it would be better to merge it.
> Andi, you said there was nothing wrong with it, do you accept that it gets
> merged ?

As I said, it's not wrong, just not necessary.

-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux