Re: [PATCH] x86_64: another fix for canonical RIPs during signal handling

From: Andi Kleen
Date: Fri Jun 23 2006 - 09:58:15 EST



> If I understand it well, an application which maps address 0 has no way to
> be notified that the kernel detected a corrupted stack pointer.

It will just not crash again after the application tried to deliberately
crash the kernel.

> I agree
> that if the proposed patch avoids to make this undesired distinction between
> apps that map addr 0 and those which don't, it would be better to merge it.
> Andi, you said there was nothing wrong with it, do you accept that it gets
> merged ?

As I said, it's not wrong, just not necessary.

-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/