1. 05 12月, 2009 1 次提交
  2. 25 11月, 2009 21 次提交
  3. 07 11月, 2009 1 次提交
  4. 05 11月, 2009 13 次提交
  5. 28 10月, 2009 1 次提交
  6. 27 10月, 2009 1 次提交
  7. 26 10月, 2009 2 次提交
    • J
      x86-64: Fix register leak in 32-bit syscall audting · 81766741
      Jan Beulich 提交于
      Restoring %ebp after the call to audit_syscall_exit() is not
      only unnecessary (because the register didn't get clobbered),
      but in the sysenter case wasn't even doing the right thing: It
      loaded %ebp from a location below the top of stack (RBP <
      ARGOFFSET), i.e. arbitrary kernel data got passed back to user
      mode in the register.
      Signed-off-by: NJan Beulich <jbeulich@novell.com>
      Acked-by: NRoland McGrath <roland@redhat.com>
      Cc: <stable@kernel.org>
      LKML-Reference: <4AE5CC4D020000780001BD13@vpn.id2.novell.com>
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      81766741
    • J
      x86: crash_dump: Fix non-pae kdump kernel memory accesses · 72ed7de7
      Jiri Slaby 提交于
      Non-PAE 32-bit dump kernels may wrap an address around 4G and
      poke unwanted space. ptes there are 32-bit long, and since
      pfn << PAGE_SIZE may exceed this limit, high pfn bits are
      cropped and wrong address mapped by kmap_atomic_pfn in
      copy_oldmem_page.
      
      Don't allow this behavior in non-PAE kdump kernels by checking
      pfns passed into copy_oldmem_page. In the case of failure,
      userspace process gets EFAULT.
      
      [v2]
      - fix comments
      - move ifdefs inside the function
      Signed-off-by: NJiri Slaby <jirislaby@gmail.com>
      Cc: Vivek Goyal <vgoyal@redhat.com>
      Cc: Eric W. Biederman <ebiederm@xmission.com>
      Cc: Simon Horman <horms@verge.net.au>
      Cc: Paul Mundt <lethal@linux-sh.org>
      LKML-Reference: <1256551903-30567-1-git-send-email-jirislaby@gmail.com>
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      72ed7de7