I have no idea how a bug like this lasted so long. Anyways, obvious memset()'ing of incorrect pointer.
Please apply, thanks. Signed-off-by: David S. Miller <[EMAIL PROTECTED]> ===== kernel/compat.c 1.46 vs edited ===== --- 1.46/kernel/compat.c 2005-03-13 15:29:47 -08:00 +++ edited/kernel/compat.c 2005-04-04 22:36:13 -07:00 @@ -640,7 +640,7 @@ int get_compat_sigevent(struct sigevent *event, const struct compat_sigevent __user *u_event) { - memset(&event, 0, sizeof(*event)); + memset(event, 0, sizeof(*event)); return (!access_ok(VERIFY_READ, u_event, sizeof(*u_event)) || __get_user(event->sigev_value.sival_int, &u_event->sigev_value.sival_int) || - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/