kernel-ark/arch/s390/kernel
Peter Oberparleiter 6add9f7f52 [PATCH] s390: kernel stack corruption
When an asynchronous interruption occurs during the execution of the
'critical section' within the generic interruption handling code (entry.S),
a faulty check for a userspace PSW may result in a corrupted kernel stack
pointer which subsequently triggers a stack overflow check.

Signed-off-by: Peter Oberparleiter <peter.oberparleiter@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-09-17 11:49:59 -07:00
..
asm-offsets.c
binfmt_elf32.c
bitmap.S
compat_exec_domain.c
compat_ioctl.c
compat_linux.c [PATCH] x86-64: Fix 32bit sendfile 2005-09-12 10:49:57 -07:00
compat_linux.h
compat_ptrace.h
compat_signal.c
compat_wrapper.S
cpcmd.c
crash.c
debug.c
ebcdic.c
entry64.S [PATCH] s390: kernel stack corruption 2005-09-17 11:49:59 -07:00
entry.S [PATCH] s390: kernel stack corruption 2005-09-17 11:49:59 -07:00
head64.S
head.S
init_task.c
irq.c
machine_kexec.c
Makefile [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
module.c
process.c
profile.c
ptrace.c
reipl64.S
reipl_diag.c [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
reipl.S
relocate_kernel64.S
relocate_kernel.S
s390_ext.c
s390_ksyms.c
semaphore.c
setup.c [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
signal.c
smp.c [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
sys_s390.c
syscalls.S
time.c
traps.c
vmlinux.lds.S
vtime.c