778959db97
The special cases of peek and poke on acrs[15] and the fpc register are not handled correctly. A poke on acrs[15] will clobber the 4 bytes after the access registers in the thread_info structure. That happens to be the kernel stack pointer. A poke on the fpc with an invalid value is not caught by the validity check. On the next context switch the broken fpc value will cause a program check in the kernel. Improving the checks in peek and poke fixes this. Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org> |
||
---|---|---|
.. | ||
asm-offsets.c | ||
binfmt_elf32.c | ||
bitmap.S | ||
compat_exec_domain.c | ||
compat_ioctl.c | ||
compat_linux.c | ||
compat_linux.h | ||
compat_ptrace.h | ||
compat_signal.c | ||
compat_wrapper.S | ||
cpcmd.c | ||
debug.c | ||
ebcdic.c | ||
entry64.S | ||
entry.S | ||
head64.S | ||
head.S | ||
init_task.c | ||
irq.c | ||
Makefile | ||
module.c | ||
process.c | ||
profile.c | ||
ptrace.c | ||
reipl64.S | ||
reipl.S | ||
s390_ext.c | ||
s390_ksyms.c | ||
semaphore.c | ||
setup.c | ||
signal.c | ||
smp.c | ||
sys_s390.c | ||
syscalls.S | ||
time.c | ||
traps.c | ||
vmlinux.lds.S | ||
vtime.c |