If caller passed the tsk, we should use it to validate a stack ptr.
Otherwise, sysrq-t and other debugging stuff doesn't work.
Signed-off-by: OGAWA Hirofumi <[email protected]>
---
arch/x86_64/kernel/traps.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff -puN arch/x86_64/kernel/traps.c~x86_64-fix-show_trace arch/x86_64/kernel/traps.c
--- linux-2.6/arch/x86_64/kernel/traps.c~x86_64-fix-show_trace 2007-01-04 00:28:02.000000000 +0900
+++ linux-2.6-hirofumi/arch/x86_64/kernel/traps.c 2007-01-04 00:28:02.000000000 +0900
@@ -319,7 +319,7 @@ void dump_trace(struct task_struct *tsk,
/*
* This handles the process stack:
*/
- tinfo = current_thread_info();
+ tinfo = task_thread_info(tsk);
HANDLE_STACK (valid_stack_ptr(tinfo, stack));
#undef HANDLE_STACK
put_cpu();
_
--
OGAWA Hirofumi <[email protected]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]