Re: [PATCH] x86_64: another fix for canonical RIPs during signal handling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ar Gwe, 2006-06-23 am 15:32 +0200, ysgrifennodd Willy Tarreau:
> If I understand it well, an application which maps address 0 has no way to
> be notified that the kernel detected a corrupted stack pointer. 

A debugger can deal with this corner case if it ever needs to be careful
mapping and remapping of the page. Very few apps map data at the zero
page and those that do usually map a single zero page which probably
isn't PROT_EXEC anyway.

(The usual case is to speed up pointer chain walking by knowing that
NULL->NULL->... is always NULL)

Alan

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux