ChangeSet@1.1538, 2004-12-23 21:33:57-02:00, paulus@samba.org [PATCH] PPC64 signal code cleanup This patch cleans up the signal handling for PPC64 in 2.4. There was some old code in there that was never used, and also the signal delivery code was saving some state in the thread_struct (in the saved_msr and saved_softe fields). That is of course bogus because the kernel doesn't actually know when the process exits the signal handler, and because signal handlers can be nested. This patch dispenses with the use of those thread_struct fields. It also fixes a possible race by using set_current_state (which has a barrier) rather than setting current->state directly, removes some unused code, removes some debug cruft, and fixes some compile warnings. Please apply. Signed-off-by: Paul Mackerras ChangeSet@1.1537, 2004-12-22 14:00:27-02:00, ak@suse.de [PATCH] [CAN-2004-1144] Fix int 0x80 hole in 2.4 x86-64 linux kernels Petr Vandrovec discovered an exploitable root hole on all 2.4 x86-64 kernels. The problem occurs because the eax register on the 32bit int 0x80 syscall handler is not properly 64bit zero extended, which can be used to overflow the system call table. The problem only occurs on 2.4 x86-64 kernels, 2.6 doesn't have this hole because some unrelated changes in 2.5 fixed it as a side effect. Marcelo should be releasing a new pre* kernel with this fix shortly, there should be also update kernel from the various linux distributions. It is recommended that everybody who runs a 2.4 x86-64 kernel with shell user access updates to a kernel which has this patch applied. Patch is for 2.4.29pre2, but should apply to pretty much any 2.4.x x86-64 kernel. -Andi TAG: v2.4.29-pre3