[PATCH] x86_64: Fix dump_trace()

From: OGAWA Hirofumi
Date: Wed Jan 03 2007 - 11:22:28 EST


If caller passed the tsk, we should use it to validate a stack ptr.
Otherwise, sysrq-t and other debugging stuff doesn't work.

Signed-off-by: OGAWA Hirofumi <hirofumi@xxxxxxxxxxxxxxxxxx>
---

arch/x86_64/kernel/traps.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff -puN arch/x86_64/kernel/traps.c~x86_64-fix-show_trace arch/x86_64/kernel/traps.c
--- linux-2.6/arch/x86_64/kernel/traps.c~x86_64-fix-show_trace 2007-01-04 00:28:02.000000000 +0900
+++ linux-2.6-hirofumi/arch/x86_64/kernel/traps.c 2007-01-04 00:28:02.000000000 +0900
@@ -319,7 +319,7 @@ void dump_trace(struct task_struct *tsk,
/*
* This handles the process stack:
*/
- tinfo = current_thread_info();
+ tinfo = task_thread_info(tsk);
HANDLE_STACK (valid_stack_ptr(tinfo, stack));
#undef HANDLE_STACK
put_cpu();
_

--
OGAWA Hirofumi <hirofumi@xxxxxxxxxxxxxxxxxx>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/