In the Linux kernel, the following vulnerability has been resolved: s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again Commit 7ded842b356d ("s390/bpf: Fix bpf_plt pointer arithmetic") has accidentally removed the critical piece of commit c730fce7c70c ("s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL"), causing intermittent kernel panics in e.g. perf's on_switch() prog to reappear. Restore the fix and add a comment.
https://git.kernel.org/stable/c/d5629d1af0600f8cc7c9245e8d832a66358ef889
https://git.kernel.org/stable/c/a4f9c7846b1ac428921ce9676b1b8c80ed60093c
https://git.kernel.org/stable/c/6a5abf8cf182f577c7ae6c62f14debc9754ec986
https://git.kernel.org/stable/c/0c7b20f7785cfdd59403333612c90b458b12307c