128b8546a8
I found an exploit in current kernel. Currently, there is no range check about mmapping "/mem" node in spufs. Thus, an application can access privilege memory region. In case this kernel already worked on a public server, I send this information only here. If there are such servers in somewhere, please replace it, ASAP. Signed-off-by: Masato Noguchi <Masato.Noguchi@jp.sony.com> Signed-off-by: Arnd Bergmann <arnd.bergmann@de.ibm.com> |
||
---|---|---|
.. | ||
Makefile | ||
backing_ops.c | ||
context.c | ||
coredump.c | ||
file.c | ||
gang.c | ||
hw_ops.c | ||
inode.c | ||
run.c | ||
sched.c | ||
spu_restore.c | ||
spu_restore_crt0.S | ||
spu_restore_dump.h_shipped | ||
spu_save.c | ||
spu_save_crt0.S | ||
spu_save_dump.h_shipped | ||
spu_utils.h | ||
spufs.h | ||
switch.c | ||
syscalls.c |