don't trust siginfo in rsyscall handler
authorRich Felker <dalias@aerifal.cx>
Sun, 3 Apr 2011 16:20:51 +0000 (12:20 -0400)
committerRich Felker <dalias@aerifal.cx>
Sun, 3 Apr 2011 16:20:51 +0000 (12:20 -0400)
commitc9b2d8016fca3b0545433e9d58a04c038b6fc921
treeb95287cafebf3496a773131f277f60f506cb1519
parent6e9ed66d0db17ac9ad2342fc107e8c4528fce0ba
don't trust siginfo in rsyscall handler

for some inexplicable reason, linux allows the sender of realtime
signals to spoof its identity. permission checks for sending signals
should limit the impact to same-user processes, but just to be safe,
we avoid trusting the siginfo structure and instead simply examine the
program state to see if we're in the middle of a legitimate rsyscall.
src/thread/pthread_create.c