From: Peter Oberparleiter When an asynchronous interruption occurs during the execution of the 'critical section' within the generic interruption handling code (entry.S), a faulty check for a userspace PSW may result in a corrupted kernel stack pointer which subsequently triggers a stack overflow check. Signed-off-by: Peter Oberparleiter Signed-off-by: Martin Schwidefsky Signed-off-by: Andrew Morton --- arch/s390/kernel/entry.S | 2 +- arch/s390/kernel/entry64.S | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff -puN arch/s390/kernel/entry64.S~s390-kernel-stack-corruption arch/s390/kernel/entry64.S --- devel/arch/s390/kernel/entry64.S~s390-kernel-stack-corruption 2005-09-15 12:15:40.000000000 -0700 +++ devel-akpm/arch/s390/kernel/entry64.S 2005-09-15 12:15:40.000000000 -0700 @@ -101,7 +101,7 @@ _TIF_WORK_INT = (_TIF_SIGPENDING | _TIF_ clc \psworg+8(8),BASED(.Lcritical_start) jl 0f brasl %r14,cleanup_critical - tm 0(%r12),0x01 # retest problem state after cleanup + tm 1(%r12),0x01 # retest problem state after cleanup jnz 1f 0: lg %r14,__LC_ASYNC_STACK # are we already on the async. stack ? slgr %r14,%r15 diff -puN arch/s390/kernel/entry.S~s390-kernel-stack-corruption arch/s390/kernel/entry.S --- devel/arch/s390/kernel/entry.S~s390-kernel-stack-corruption 2005-09-15 12:15:40.000000000 -0700 +++ devel-akpm/arch/s390/kernel/entry.S 2005-09-15 12:15:40.000000000 -0700 @@ -108,7 +108,7 @@ STACK_SIZE = 1 << STACK_SHIFT bl BASED(0f) l %r14,BASED(.Lcleanup_critical) basr %r14,%r14 - tm 0(%r12),0x01 # retest problem state after cleanup + tm 1(%r12),0x01 # retest problem state after cleanup bnz BASED(1f) 0: l %r14,__LC_ASYNC_STACK # are we already on the async stack ? slr %r14,%r15 _