original_kernel/arch/s390/kernel
Peter Oberparleiter 6add9f7f52 [PATCH] s390: kernel stack corruption
When an asynchronous interruption occurs during the execution of the
'critical section' within the generic interruption handling code (entry.S),
a faulty check for a userspace PSW may result in a corrupted kernel stack
pointer which subsequently triggers a stack overflow check.

Signed-off-by: Peter Oberparleiter <peter.oberparleiter@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-09-17 11:49:59 -07:00
..
Makefile [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
asm-offsets.c
binfmt_elf32.c
bitmap.S
compat_exec_domain.c
compat_ioctl.c
compat_linux.c [PATCH] x86-64: Fix 32bit sendfile 2005-09-12 10:49:57 -07:00
compat_linux.h
compat_ptrace.h
compat_signal.c
compat_wrapper.S
cpcmd.c
crash.c
debug.c
ebcdic.c
entry.S [PATCH] s390: kernel stack corruption 2005-09-17 11:49:59 -07:00
entry64.S [PATCH] s390: kernel stack corruption 2005-09-17 11:49:59 -07:00
head.S kbuild: m68k,parisc,ppc,ppc64,s390,xtensa use generic asm-offsets.h support 2005-09-09 20:57:26 +02:00
head64.S kbuild: m68k,parisc,ppc,ppc64,s390,xtensa use generic asm-offsets.h support 2005-09-09 20:57:26 +02:00
init_task.c
irq.c
machine_kexec.c
module.c
process.c
profile.c
ptrace.c
reipl.S
reipl64.S
reipl_diag.c [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
relocate_kernel.S
relocate_kernel64.S
s390_ext.c
s390_ksyms.c
semaphore.c
setup.c [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
signal.c
smp.c [PATCH] s390: diag 0x308 reipl 2005-09-17 11:49:59 -07:00
sys_s390.c
syscalls.S
time.c [PATCH] NTP: ntp-helper functions 2005-09-07 16:57:34 -07:00
traps.c
vmlinux.lds.S
vtime.c