[PATCH] x86_64: Fix dump_trace()
authorOGAWA Hirofumi <hirofumi@mail.parknet.co.jp>
Wed, 3 Jan 2007 16:21:28 +0000 (01:21 +0900)
committerLinus Torvalds <torvalds@woody.osdl.org>
Wed, 3 Jan 2007 16:49:59 +0000 (08:49 -0800)
If caller passed the tsk, we should use it to validate a stack ptr.
Otherwise, sysrq-t and other debugging stuff doesn't work.

Signed-off-by: OGAWA Hirofumi <hirofumi@mail.parknet.co.jp>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
arch/x86_64/kernel/traps.c

index 1d9eb6db732a73f7b22496f5b4cccfb154ace257..09d2e8a10a496d2dd4c65b19ab7365f5073e2ec0 100644 (file)
@@ -319,7 +319,7 @@ void dump_trace(struct task_struct *tsk, struct pt_regs *regs,
        /*
         * This handles the process stack:
         */
-       tinfo = current_thread_info();
+       tinfo = task_thread_info(tsk);
        HANDLE_STACK (valid_stack_ptr(tinfo, stack));
 #undef HANDLE_STACK
        put_cpu();