From ea38f2f9388111b2e0f202cae81c26629937dead Mon Sep 17 00:00:00 2001 From: Josh Boyer Date: Thu, 27 Oct 2016 10:49:53 -0400 Subject: Refresh SB patchset to fix bisectability issue --- kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch') diff --git a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch b/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch index a5832ea70..ec8675eb4 100644 --- a/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch +++ b/kexec-Disable-at-runtime-if-the-kernel-enforces-modu.patch @@ -1,7 +1,7 @@ -From 6306cad6e5663424c08e5ebdfdcfd799c5537bfe Mon Sep 17 00:00:00 2001 +From 85968a9f0b3f05c56d4ac4002748f3412a9baab0 Mon Sep 17 00:00:00 2001 From: Matthew Garrett Date: Fri, 9 Aug 2013 03:33:56 -0400 -Subject: [PATCH] kexec: Disable at runtime if the kernel enforces module +Subject: [PATCH 08/20] kexec: Disable at runtime if the kernel enforces module loading restrictions kexec permits the loading and execution of arbitrary code in ring 0, which @@ -14,10 +14,10 @@ Signed-off-by: Matthew Garrett 1 file changed, 8 insertions(+) diff --git a/kernel/kexec.c b/kernel/kexec.c -index 4c5edc357923..db431971dbd4 100644 +index 980936a90ee6..fce28bf7d5d7 100644 --- a/kernel/kexec.c +++ b/kernel/kexec.c -@@ -10,6 +10,7 @@ +@@ -12,6 +12,7 @@ #include #include #include @@ -25,7 +25,7 @@ index 4c5edc357923..db431971dbd4 100644 #include #include #include -@@ -133,6 +134,13 @@ SYSCALL_DEFINE4(kexec_load, unsigned long, entry, unsigned long, nr_segments, +@@ -194,6 +195,13 @@ SYSCALL_DEFINE4(kexec_load, unsigned long, entry, unsigned long, nr_segments, return -EPERM; /* @@ -40,5 +40,5 @@ index 4c5edc357923..db431971dbd4 100644 * This leaves us room for future extensions. */ -- -2.4.3 +2.9.3 -- cgit