summaryrefslogtreecommitdiffstats
path: root/arch/powerpc/platforms/cell/pmu.c
diff options
context:
space:
mode:
authorMasato Noguchi2007-02-13 21:54:30 +0100
committerArnd Bergmann2007-02-13 21:55:43 +0100
commit128b8546a83a9e37448bc126e1045dc1db291165 (patch)
tree01281bb501601f643f50210314bcc31f44f5dcf7 /arch/powerpc/platforms/cell/pmu.c
parent[POWERPC] spu sched: static timeslicing for SCHED_RR contexts (diff)
downloadkernel-qcow2-linux-128b8546a83a9e37448bc126e1045dc1db291165.tar.gz
kernel-qcow2-linux-128b8546a83a9e37448bc126e1045dc1db291165.tar.xz
kernel-qcow2-linux-128b8546a83a9e37448bc126e1045dc1db291165.zip
[POWERPC] spufs: avoid accessing kernel memory through mmapped /mem node
I found an exploit in current kernel. Currently, there is no range check about mmapping "/mem" node in spufs. Thus, an application can access privilege memory region. In case this kernel already worked on a public server, I send this information only here. If there are such servers in somewhere, please replace it, ASAP. Signed-off-by: Masato Noguchi <Masato.Noguchi@jp.sony.com> Signed-off-by: Arnd Bergmann <arnd.bergmann@de.ibm.com>
Diffstat (limited to 'arch/powerpc/platforms/cell/pmu.c')
0 files changed, 0 insertions, 0 deletions