Re: [PATCH v5 8/9] x86-64: Emulate legacy vsyscalls
From: Ingo Molnar
Date: Mon Jun 06 2011 - 11:34:03 EST
* pageexec@xxxxxxxxxxx <pageexec@xxxxxxxxxxx> wrote:
> > No, we don't update any libraries for a kernel upgrade. Ever. End
> > of story.
>
> then you *must* revert the utterly *wrong* heap/stack gap 'fix' of
> yours that you cooked up without any public discussion a year ago
> and have been 'fixing' it for various userland breakage ever since.
Is it this commit:
320b2b8de126: mm: keep a guard page below a grow-down stack segment
?
It has a few followup fixes indeed:
a1fde08c74e9: VM: skip the stack guard page lookup in get_user_pages only for mlock
a626ca6a6564: vm: fix vm_pgoff wrap in stack expansion
95042f9eb78a: vm: fix mlock() on stack guard page
0e8e50e20c83: mm: make stack guard page logic use vm_prev pointer
7798330ac811: mm: make the mlock() stack guard page checks stricter
d7824370e263: mm: fix up some user-visible effects of the stack guard page
11ac552477e3: mm: fix page table unmap for stack guard page properly
5528f9132cf6: mm: fix missing page table unmap for stack guard page failure case
But you say that there's a Sun JVM breakage still left, right? Is
there a bugzilla # or simple .c reproducer for that?
Thanks,
Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/