linux-stable-rt/arch/powerpc/platforms/cell/spufs
Masato Noguchi 128b8546a8 [POWERPC] spufs: avoid accessing kernel memory through mmapped /mem node
I found an exploit in current kernel.
Currently, there is no range check about mmapping "/mem" node in
spufs. Thus, an application can access privilege memory region.

In case this kernel already worked on a public server, I send this
information only here.
If there are such servers in somewhere, please replace it, ASAP.

Signed-off-by: Masato Noguchi <Masato.Noguchi@jp.sony.com>
Signed-off-by: Arnd Bergmann <arnd.bergmann@de.ibm.com>
2007-02-13 21:55:43 +01:00
..
Makefile
backing_ops.c
context.c [POWERPC] spu sched: static timeslicing for SCHED_RR contexts 2007-02-13 21:55:43 +01:00
coredump.c
file.c [POWERPC] spufs: avoid accessing kernel memory through mmapped /mem node 2007-02-13 21:55:43 +01:00
gang.c
hw_ops.c
inode.c
run.c [POWERPC] spu sched: static timeslicing for SCHED_RR contexts 2007-02-13 21:55:43 +01:00
sched.c [POWERPC] spu sched: static timeslicing for SCHED_RR contexts 2007-02-13 21:55:43 +01:00
spu_restore.c
spu_restore_crt0.S
spu_restore_dump.h_shipped
spu_save.c
spu_save_crt0.S
spu_save_dump.h_shipped
spu_utils.h
spufs.h [POWERPC] spu sched: static timeslicing for SCHED_RR contexts 2007-02-13 21:55:43 +01:00
switch.c
syscalls.c