[PATCH] s390: kernel stack corruption
authorPeter Oberparleiter <peter.oberparleiter@de.ibm.com>
Sat, 17 Sep 2005 02:27:42 +0000 (19:27 -0700)
committerLinus Torvalds <torvalds@g5.osdl.org>
Sat, 17 Sep 2005 18:49:59 +0000 (11:49 -0700)
commit6add9f7f529b124938d14ae9db5a952d1272075a
tree512f82531228094f6c8696296f36304a4a4e7049
parent26ff6ad9786abf6f40a6d3cbb89753b4fa50cb00
[PATCH] s390: kernel stack corruption

When an asynchronous interruption occurs during the execution of the
'critical section' within the generic interruption handling code (entry.S),
a faulty check for a userspace PSW may result in a corrupted kernel stack
pointer which subsequently triggers a stack overflow check.

Signed-off-by: Peter Oberparleiter <peter.oberparleiter@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
arch/s390/kernel/entry.S
arch/s390/kernel/entry64.S