Re: [PATCH v5 8/9] x86-64: Emulate legacy vsyscalls

From: Ingo Molnar
Date: Mon Jun 06 2011 - 11:34:03 EST



* pageexec@xxxxxxxxxxx <pageexec@xxxxxxxxxxx> wrote:

> > No, we don't update any libraries for a kernel upgrade. Ever. End
> > of story.
>
> then you *must* revert the utterly *wrong* heap/stack gap 'fix' of
> yours that you cooked up without any public discussion a year ago
> and have been 'fixing' it for various userland breakage ever since.

Is it this commit:

320b2b8de126: mm: keep a guard page below a grow-down stack segment

?

It has a few followup fixes indeed:

a1fde08c74e9: VM: skip the stack guard page lookup in get_user_pages only for mlock
a626ca6a6564: vm: fix vm_pgoff wrap in stack expansion
95042f9eb78a: vm: fix mlock() on stack guard page
0e8e50e20c83: mm: make stack guard page logic use vm_prev pointer
7798330ac811: mm: make the mlock() stack guard page checks stricter
d7824370e263: mm: fix up some user-visible effects of the stack guard page
11ac552477e3: mm: fix page table unmap for stack guard page properly
5528f9132cf6: mm: fix missing page table unmap for stack guard page failure case

But you say that there's a Sun JVM breakage still left, right? Is
there a bugzilla # or simple .c reproducer for that?

Thanks,

Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/