Bill Irwin wrote: > This patch introduces CONFIG_DEBUG_STACK, which vmalloc()'s task and IRQ > stacks in order to establish guard pages. In such a manner any stack > overflow that references pages immediately adjacent to the stack is > immediately trapped with a fault, which precludes silent memory corruption > or difficult-to-decipher failure modes resulting from stack corruption. >
Is there a guard page below and above the stack? (I've seen stack underflow before, as well as overflow.) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/