linux/arch/s390
Peter Oberparleiter 6add9f7f52 [PATCH] s390: kernel stack corruption
When an asynchronous interruption occurs during the execution of the
'critical section' within the generic interruption handling code (entry.S),
a faulty check for a userspace PSW may result in a corrupted kernel stack
pointer which subsequently triggers a stack overflow check.

Signed-off-by: Peter Oberparleiter <peter.oberparleiter@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-09-17 11:49:59 -07:00
..
appldata
boot
crypto
kernel [PATCH] s390: kernel stack corruption 2005-09-17 11:49:59 -07:00
lib [PATCH] spinlock consolidation 2005-09-10 10:06:21 -07:00
math-emu
mm
oprofile
Kconfig
Kconfig.debug
Makefile
defconfig [PATCH] s390: default configuration 2005-09-17 11:49:58 -07:00