1. 27 Jul, 2004 1 commit
  2. 19 Jul, 2004 15 commits
  3. 18 Jul, 2004 2 commits
    • Ingo Molnar's avatar
      [PATCH] NX: clean up legacy binary support · 1bb0fa18
      Ingo Molnar authored
      This cleans up legacy x86 binary support by introducing a new
      personality bit: READ_IMPLIES_EXEC, and implements Linus' suggestion to
      add the PROT_EXEC bit on the two affected syscall entry places,
      sys_mprotect() and sys_mmap().  If this bit is set then PROT_READ will
      also add the PROT_EXEC bit - as expected by legacy x86 binaries.  The
      ELF loader will automatically set this bit when it encounters a legacy
      binary.
      
      This approach avoids the problems the previous ->def_flags solution
      caused.  In particular this patch fixes the PROT_NONE problem in a
      cleaner way (http://lkml.org/lkml/2004/7/12/227), and it should fix the
      ia64 PROT_EXEC problem reported by David Mosberger.  Also,
      mprotect(PROT_READ) done by legacy binaries will do the right thing as
      well. 
      
      the details:
      
      - the personality bit is added to the personality mask upon exec(),
        within the ELF loader, but is not cleared (see the exceptions below). 
        This means that if an environment that already has the bit exec()s a
        new-style binary it will still get the old behavior.
      
      - one exception are setuid/setgid binaries: these will reset the
        bit - thus local attackers cannot manually set the bit and circumvent
        NX protection. Legacy setuid binaries will still get the bit through
        the ELF loader. This gives us maximum flexibility in shaping
        compatibility environments.
      
      - selinux also clears the bit when switching SIDs via exec().
      
      - x86 is the only arch making use of READ_IMPLIES_EXEC currently. Other
        arches will have the pre-NX-patch protection setup they always had.
      
      I have booted an old distro [RH 7.2] and two new PT_GNU_STACK distros
      [SuSE 9.2 and FC2] on an NX-capable CPU - they work just fine and all
      the mapping details are right. I've checked the PROT_NONE test-utility
      as well and it works as expected. I have checked various setuid
      scenarios as well involving legacy and new-style binaries.
      
      an improved setarch utility can be used to set the personality bit
      manually:
      
      	http://redhat.com/~mingo/nx-patches/setarch-1.4-3.tar.gz
      
      the new '-X' flag does it, e.g.:
      
      	./setarch -X linux /bin/cat /proc/self/maps
      
      will trigger the old protection layout even on a new distro.
      Signed-off-by: default avatarIngo Molnar <mingo@elte.hu>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      1bb0fa18
    • David Eger's avatar
      [PATCH] pmac_zilog: serial minors taken failure path fix · 4e8688b2
      David Eger authored
      I've tracked down the core issue giving me the oops wrt pmac_zilog.
      
      When you have two serial drivers, (e.g. 8250 and PMAC_ZILOG) they both say
      
      "I want to reserve X ports starting with major TTY_MAJOR and minor 64".
      
      By the time pmac_zilog gets there, the ports it requests are already
      reserved.  Unfortunately, init_pmz() doesn't check for pmz_register()
      failure, and so it merrily goes on to register the half-initialized
      pmac_zilog driver with the power management subsystem.
      
      This path provides a proper failure path.
      
      Also: 
      
      Restore ppc configs now that I know people use AT Keyboards on CHRP and PReP
      machines, and the zilog driver is no longer Oops'ing.
      Signed-off-by: default avatarDavid Eger <eger@havoc.gtf.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      4e8688b2
  4. 17 Jul, 2004 4 commits
    • Linus Torvalds's avatar
      Linux 2.6.8-rc2 · d96a9bf5
      Linus Torvalds authored
      Ready for the kernel summit in Ottawa...
      d96a9bf5
    • Linus Torvalds's avatar
      Clean up ptrace child exit case. · a61b6024
      Linus Torvalds authored
      This also fixes it for when the real parent is ignoring
      SIGCHLD - noted by David Mosberger.
      a61b6024
    • Andi Kleen's avatar
      [PATCH] Fix i386 bootup with HIGHMEM+SLAB_DEBUG+NUMA and no real · 6bf1545b
      Andi Kleen authored
      For some reason I booted a NUMA and SLAB_DEBUG i386 kernel on a non
      NUMA 512MB machine.  This caused an oops at bootup in change_page_attr.
      The reason was that highmem_start_start page ended up zero and 
      that triggered the highmem check in change_page_attr when the
      slab debug code would unmap a kernel mapping.
      
      Fix is straightforward: if there is no highmem set highmem_start_page
      to max_low_pfn+1
      6bf1545b
    • Andi Kleen's avatar
      [PATCH] Fix memory corruption at x86-64 SMP bootup · 32f5543d
      Andi Kleen authored
      This fixes a long standing corruption bug in the x86-64 code. The SMP
      trampoline would corrupt page 2, which was sometimes used for other
      data.  This corrupted the ioport/iomem list in some cases and causes
      oopses while read /proc/iomem.
      
      Fix is to check the correct location and don't zero it afterwards
      because it gets reinitialized for the next CPU anyways.
      
      Thanks to Alexander Nyberg for tracking it down.
      32f5543d
  5. 16 Jul, 2004 18 commits