diff options
author | Justin M. Forbes <jforbes@redhat.com> | 2016-12-14 12:50:48 -0600 |
---|---|---|
committer | Justin M. Forbes <jforbes@redhat.com> | 2016-12-14 12:50:48 -0600 |
commit | 962ea4f047b3b4b4360446be4289c4e4deb29551 (patch) | |
tree | 0a13142b9219114c8902cac2b45fe9c7abc96897 /kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch | |
parent | b31b0fb7f4d47143f49fdbc50e7c0da678c0540b (diff) | |
download | kernel-962ea4f047b3b4b4360446be4289c4e4deb29551.tar.gz kernel-962ea4f047b3b4b4360446be4289c4e4deb29551.tar.xz kernel-962ea4f047b3b4b4360446be4289c4e4deb29551.zip |
Linux v4.9-7150-gcdb98c2
Diffstat (limited to 'kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch')
-rw-r--r-- | kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch | 44 |
1 files changed, 0 insertions, 44 deletions
diff --git a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch b/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch deleted file mode 100644 index ec8675eb4..000000000 --- a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch +++ /dev/null @@ -1,44 +0,0 @@ -From 85968a9f0b3f05c56d4ac4002748f3412a9baab0 Mon Sep 17 00:00:00 2001 -From: Matthew Garrett <matthew.garrett@nebula.com> -Date: Fri, 9 Aug 2013 03:33:56 -0400 -Subject: [PATCH 08/20] kexec: Disable at runtime if the kernel enforces module - loading restrictions - -kexec permits the loading and execution of arbitrary code in ring 0, which -is something that module signing enforcement is meant to prevent. It makes -sense to disable kexec in this situation. - -Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com> ---- - kernel/kexec.c | 8 ++++++++ - 1 file changed, 8 insertions(+) - -diff --git a/kernel/kexec.c b/kernel/kexec.c -index 980936a90ee6..fce28bf7d5d7 100644 ---- a/kernel/kexec.c -+++ b/kernel/kexec.c -@@ -12,6 +12,7 @@ - #include <linux/mm.h> - #include <linux/file.h> - #include <linux/kexec.h> -+#include <linux/module.h> - #include <linux/mutex.h> - #include <linux/list.h> - #include <linux/syscalls.h> -@@ -194,6 +195,13 @@ SYSCALL_DEFINE4(kexec_load, unsigned long, entry, unsigned long, nr_segments, - return -EPERM; - - /* -+ * kexec can be used to circumvent module loading restrictions, so -+ * prevent loading in that case -+ */ -+ if (secure_modules()) -+ return -EPERM; -+ -+ /* - * Verify we have a legal set of flags - * This leaves us room for future extensions. - */ --- -2.9.3 - |