diff options
author | Peter Oberparleiter <peter.oberparleiter@de.ibm.com> | 2005-09-16 19:27:42 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@g5.osdl.org> | 2005-09-17 11:49:59 -0700 |
commit | 6add9f7f529b124938d14ae9db5a952d1272075a (patch) | |
tree | 512f82531228094f6c8696296f36304a4a4e7049 /security/security.c | |
parent | 26ff6ad9786abf6f40a6d3cbb89753b4fa50cb00 (diff) |
[PATCH] s390: kernel stack corruption
When an asynchronous interruption occurs during the execution of the
'critical section' within the generic interruption handling code (entry.S),
a faulty check for a userspace PSW may result in a corrupted kernel stack
pointer which subsequently triggers a stack overflow check.
Signed-off-by: Peter Oberparleiter <peter.oberparleiter@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
Diffstat (limited to 'security/security.c')
0 files changed, 0 insertions, 0 deletions