diff options
author | Thomas Gleixner <tglx@linutronix.de> | 2019-11-21 02:40:24 +0300 |
---|---|---|
committer | Peter Zijlstra <peterz@infradead.org> | 2019-11-21 21:37:43 +0300 |
commit | 880a98c339961eaa074393e3a2117cbe9125b8bb (patch) | |
tree | e7730f252db8af6007070060c9b2c8a3394b9110 /tools/perf/scripts/python/stackcollapse.py | |
parent | f490e07c53d66045d9d739e134145ec9b38653d3 (diff) | |
download | linux-880a98c339961eaa074393e3a2117cbe9125b8bb.tar.xz |
x86/cpu_entry_area: Add guard page for entry stack on 32bit
The entry stack in the cpu entry area is protected against overflow by the
readonly GDT on 64-bit, but on 32-bit the GDT needs to be writeable and
therefore does not trigger a fault on stack overflow.
Add a guard page.
Fixes: c482feefe1ae ("x86/entry/64: Make cpu_entry_area.tss read-only")
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: stable@kernel.org
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions