SOURCES: grsecurity-2.1.9-2.6.17.3.patch (NEW) - raw from http://w...
hawk
hawk at pld-linux.org
Tue Jul 4 21:02:04 CEST 2006
Author: hawk Date: Tue Jul 4 19:02:03 2006 GMT
Module: SOURCES Tag: HEAD
---- Log message:
- raw from http://www.grsecurity.net/~spender/grsecurity-2.1.9-2.6.17.3-200607040032.patch
---- Files affected:
SOURCES:
grsecurity-2.1.9-2.6.17.3.patch (NONE -> 1.1) (NEW)
---- Diffs:
================================================================
Index: SOURCES/grsecurity-2.1.9-2.6.17.3.patch
diff -u /dev/null SOURCES/grsecurity-2.1.9-2.6.17.3.patch:1.1
--- /dev/null Tue Jul 4 21:02:03 2006
+++ SOURCES/grsecurity-2.1.9-2.6.17.3.patch Tue Jul 4 21:01:58 2006
@@ -0,0 +1,25592 @@
+diff -urNp linux-2.6.17.3/arch/alpha/kernel/module.c linux-2.6.17.3/arch/alpha/kernel/module.c
+--- linux-2.6.17.3/arch/alpha/kernel/module.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/kernel/module.c 2006-07-01 14:35:29.000000000 -0400
+@@ -177,7 +177,7 @@ apply_relocate_add(Elf64_Shdr *sechdrs,
+
+ /* The small sections were sorted to the end of the segment.
+ The following should definitely cover them. */
+- gp = (u64)me->module_core + me->core_size - 0x8000;
++ gp = (u64)me->module_core_rw + me->core_size_rw - 0x8000;
+ got = sechdrs[me->arch.gotsecindex].sh_addr;
+
+ for (i = 0; i < n; i++) {
+diff -urNp linux-2.6.17.3/arch/alpha/kernel/osf_sys.c linux-2.6.17.3/arch/alpha/kernel/osf_sys.c
+--- linux-2.6.17.3/arch/alpha/kernel/osf_sys.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/kernel/osf_sys.c 2006-07-01 14:35:29.000000000 -0400
+@@ -1273,6 +1273,10 @@ arch_get_unmapped_area(struct file *filp
+ merely specific addresses, but regions of memory -- perhaps
+ this feature should be incorporated into all ports? */
+
++#ifdef CONFIG_PAX_RANDMMAP
++ if (!(current->mm->pax_flags & MF_PAX_RANDMMAP) || !filp)
++#endif
++
+ if (addr) {
+ addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit);
+ if (addr != (unsigned long) -ENOMEM)
+@@ -1280,8 +1284,8 @@ arch_get_unmapped_area(struct file *filp
+ }
+
+ /* Next, try allocating at TASK_UNMAPPED_BASE. */
+- addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE),
+- len, limit);
++ addr = arch_get_unmapped_area_1 (PAGE_ALIGN(current->mm->mmap_base), len, limit);
++
+ if (addr != (unsigned long) -ENOMEM)
+ return addr;
+
+diff -urNp linux-2.6.17.3/arch/alpha/kernel/ptrace.c linux-2.6.17.3/arch/alpha/kernel/ptrace.c
+--- linux-2.6.17.3/arch/alpha/kernel/ptrace.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/kernel/ptrace.c 2006-07-01 15:38:54.000000000 -0400
+@@ -15,6 +15,7 @@
+ #include <linux/slab.h>
+ #include <linux/security.h>
+ #include <linux/signal.h>
++#include <linux/grsecurity.h>
+
+ #include <asm/uaccess.h>
+ #include <asm/pgtable.h>
+@@ -283,6 +284,9 @@ do_sys_ptrace(long request, long pid, lo
+ goto out_notsk;
+ }
+
++ if (gr_handle_ptrace(child, request))
++ goto out;
++
+ if (request == PTRACE_ATTACH) {
+ ret = ptrace_attach(child);
+ goto out;
+diff -urNp linux-2.6.17.3/arch/alpha/mm/fault.c linux-2.6.17.3/arch/alpha/mm/fault.c
+--- linux-2.6.17.3/arch/alpha/mm/fault.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/mm/fault.c 2006-07-01 14:35:29.000000000 -0400
+@@ -25,6 +25,7 @@
+ #include <linux/smp_lock.h>
+ #include <linux/interrupt.h>
+ #include <linux/module.h>
++#include <linux/binfmts.h>
+
+ #include <asm/system.h>
+ #include <asm/uaccess.h>
+@@ -56,6 +57,124 @@ __load_new_mm_context(struct mm_struct *
+ __reload_thread(pcb);
+ }
+
++#ifdef CONFIG_PAX_PAGEEXEC
++/*
++ * PaX: decide what to do with offenders (regs->pc = fault address)
++ *
++ * returns 1 when task should be killed
++ * 2 when patched PLT trampoline was detected
++ * 3 when unpatched PLT trampoline was detected
++ */
++static int pax_handle_fetch_fault(struct pt_regs *regs)
++{
++
++#ifdef CONFIG_PAX_EMUPLT
++ int err;
++
++ do { /* PaX: patched PLT emulation #1 */
++ unsigned int ldah, ldq, jmp;
++
++ err = get_user(ldah, (unsigned int *)regs->pc);
++ err |= get_user(ldq, (unsigned int *)(regs->pc+4));
++ err |= get_user(jmp, (unsigned int *)(regs->pc+8));
++
++ if (err)
++ break;
++
++ if ((ldah & 0xFFFF0000U) == 0x277B0000U &&
++ (ldq & 0xFFFF0000U) == 0xA77B0000U &&
++ jmp == 0x6BFB0000U)
++ {
++ unsigned long r27, addr;
++ unsigned long addrh = (ldah | 0xFFFFFFFFFFFF0000UL) << 16;
++ unsigned long addrl = ldq | 0xFFFFFFFFFFFF0000UL;
++
++ addr = regs->r27 + ((addrh ^ 0x80000000UL) + 0x80000000UL) + ((addrl ^ 0x8000UL) + 0x8000UL);
++ err = get_user(r27, (unsigned long*)addr);
++ if (err)
++ break;
++
++ regs->r27 = r27;
++ regs->pc = r27;
++ return 2;
++ }
++ } while (0);
++
++ do { /* PaX: patched PLT emulation #2 */
++ unsigned int ldah, lda, br;
++
++ err = get_user(ldah, (unsigned int *)regs->pc);
++ err |= get_user(lda, (unsigned int *)(regs->pc+4));
++ err |= get_user(br, (unsigned int *)(regs->pc+8));
++
++ if (err)
++ break;
++
++ if ((ldah & 0xFFFF0000U)== 0x277B0000U &&
++ (lda & 0xFFFF0000U) == 0xA77B0000U &&
++ (br & 0xFFE00000U) == 0xC3E00000U)
++ {
++ unsigned long addr = br | 0xFFFFFFFFFFE00000UL;
++ unsigned long addrh = (ldah | 0xFFFFFFFFFFFF0000UL) << 16;
++ unsigned long addrl = lda | 0xFFFFFFFFFFFF0000UL;
++
++ regs->r27 += ((addrh ^ 0x80000000UL) + 0x80000000UL) + ((addrl ^ 0x8000UL) + 0x8000UL);
++ regs->pc += 12 + (((addr ^ 0x00100000UL) + 0x00100000UL) << 2);
++ return 2;
++ }
++ } while (0);
++
++ do { /* PaX: unpatched PLT emulation */
++ unsigned int br;
++
++ err = get_user(br, (unsigned int *)regs->pc);
++
++ if (!err && (br & 0xFFE00000U) == 0xC3800000U) {
++ unsigned int br2, ldq, nop, jmp;
++ unsigned long addr = br | 0xFFFFFFFFFFE00000UL, resolver;
++
++ addr = regs->pc + 4 + (((addr ^ 0x00100000UL) + 0x00100000UL) << 2);
++ err = get_user(br2, (unsigned int *)addr);
++ err |= get_user(ldq, (unsigned int *)(addr+4));
++ err |= get_user(nop, (unsigned int *)(addr+8));
++ err |= get_user(jmp, (unsigned int *)(addr+12));
++ err |= get_user(resolver, (unsigned long *)(addr+16));
++
++ if (err)
++ break;
++
++ if (br2 == 0xC3600000U &&
++ ldq == 0xA77B000CU &&
++ nop == 0x47FF041FU &&
++ jmp == 0x6B7B0000U)
++ {
++ regs->r28 = regs->pc+4;
++ regs->r27 = addr+16;
++ regs->pc = resolver;
++ return 3;
++ }
++ }
++ } while (0);
++#endif
++
++ return 1;
++}
++
++void pax_report_insns(void *pc, void *sp)
++{
++ unsigned long i;
++
++ printk(KERN_ERR "PAX: bytes at PC: ");
++ for (i = 0; i < 5; i++) {
++ unsigned int c;
++ if (get_user(c, (unsigned int*)pc+i))
++ printk("???????? ");
++ else
++ printk("%08x ", c);
++ }
++ printk("\n");
++}
++#endif
+
+ /*
+ * This routine handles page faults. It determines the address,
+@@ -133,8 +252,29 @@ do_page_fault(unsigned long address, uns
+ good_area:
+ si_code = SEGV_ACCERR;
+ if (cause < 0) {
+- if (!(vma->vm_flags & VM_EXEC))
++ if (!(vma->vm_flags & VM_EXEC)) {
++
++#ifdef CONFIG_PAX_PAGEEXEC
++ if (!(mm->pax_flags & MF_PAX_PAGEEXEC) || address != regs->pc)
++ goto bad_area;
++
++ up_read(&mm->mmap_sem);
++ switch(pax_handle_fetch_fault(regs)) {
++
++#ifdef CONFIG_PAX_EMUPLT
++ case 2:
++ case 3:
++ return;
++#endif
++
++ }
++ pax_report_fault(regs, (void*)regs->pc, (void*)rdusp());
++ do_exit(SIGKILL);
++#else
+ goto bad_area;
++#endif
++
++ }
+ } else if (!cause) {
+ /* Allow reads even for write-only mappings */
+ if (!(vma->vm_flags & (VM_READ | VM_WRITE)))
+diff -urNp linux-2.6.17.3/arch/arm/mm/mmap.c linux-2.6.17.3/arch/arm/mm/mmap.c
+--- linux-2.6.17.3/arch/arm/mm/mmap.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/arm/mm/mmap.c 2006-07-01 14:35:29.000000000 -0400
+@@ -62,6 +62,10 @@ arch_get_unmapped_area(struct file *filp
+ if (len > TASK_SIZE)
+ return -ENOMEM;
+
++#ifdef CONFIG_PAX_RANDMMAP
++ if (!(mm->pax_flags & MF_PAX_RANDMMAP) || !filp)
++#endif
++
+ if (addr) {
+ if (do_align)
+ addr = COLOUR_ALIGN(addr, pgoff);
+@@ -76,7 +80,7 @@ arch_get_unmapped_area(struct file *filp
+ if (len > mm->cached_hole_size) {
+ start_addr = addr = mm->free_area_cache;
+ } else {
+- start_addr = addr = TASK_UNMAPPED_BASE;
++ start_addr = addr = mm->mmap_base;
+ mm->cached_hole_size = 0;
+ }
+
+@@ -93,8 +97,8 @@ full_search:
+ * Start a new search - just in case we missed
+ * some holes.
+ */
+- if (start_addr != TASK_UNMAPPED_BASE) {
+- start_addr = addr = TASK_UNMAPPED_BASE;
++ if (start_addr != mm->mmap_base) {
++ start_addr = addr = mm->mmap_base;
+ mm->cached_hole_size = 0;
+ goto full_search;
+ }
+diff -urNp linux-2.6.17.3/arch/i386/boot/compressed/head.S linux-2.6.17.3/arch/i386/boot/compressed/head.S
+--- linux-2.6.17.3/arch/i386/boot/compressed/head.S 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/boot/compressed/head.S 2006-07-01 14:35:29.000000000 -0400
+@@ -39,11 +39,13 @@ startup_32:
+ movl %eax,%gs
+
+ lss stack_start,%esp
++ movl 0x000000,%ecx
+ xorl %eax,%eax
+ 1: incl %eax # check that A20 really IS enabled
+ movl %eax,0x000000 # loop forever if it isn't
+ cmpl %eax,0x100000
+ je 1b
++ movl %ecx,0x000000
+
+ /*
+ * Initialize eflags. Some BIOS's leave bits like NT set. This would
+diff -urNp linux-2.6.17.3/arch/i386/Kconfig linux-2.6.17.3/arch/i386/Kconfig
+--- linux-2.6.17.3/arch/i386/Kconfig 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/Kconfig 2006-07-01 15:38:54.000000000 -0400
+@@ -977,7 +977,7 @@ endchoice
+
+ config PCI_BIOS
+ bool
+- depends on !X86_VISWS && PCI && (PCI_GOBIOS || PCI_GOANY)
++ depends on !X86_VISWS && PCI && PCI_GOBIOS
+ default y
+
+ config PCI_DIRECT
+diff -urNp linux-2.6.17.3/arch/i386/Kconfig.cpu linux-2.6.17.3/arch/i386/Kconfig.cpu
+--- linux-2.6.17.3/arch/i386/Kconfig.cpu 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/Kconfig.cpu 2006-07-01 14:35:29.000000000 -0400
+@@ -251,7 +251,7 @@ config X86_PPRO_FENCE
+
+ config X86_F00F_BUG
+ bool
+- depends on M586MMX || M586TSC || M586 || M486 || M386
++ depends on (M586MMX || M586TSC || M586 || M486 || M386) && !PAX_KERNEXEC
+ default y
+
+ config X86_WP_WORKS_OK
+@@ -281,7 +281,7 @@ config X86_CMPXCHG64
+
+ config X86_ALIGNMENT_16
+ bool
+- depends on MWINCHIP3D || MWINCHIP2 || MWINCHIPC6 || MCYRIXIII || X86_ELAN || MK6 || M586MMX || M586TSC || M586 || M486 || MVIAC3_2 || MGEODEGX1
++ depends on MWINCHIP3D || MWINCHIP2 || MWINCHIPC6 || MCYRIXIII || X86_ELAN || MK8 || MK7 || MK6 || MPENTIUM4 || MPENTIUMIII || MPENTIUMII || M686 || M586MMX || M586TSC || M586 || M486 || MVIAC3_2 || MGEODEGX1
+ default y
+
+ config X86_GOOD_APIC
+diff -urNp linux-2.6.17.3/arch/i386/Kconfig.debug linux-2.6.17.3/arch/i386/Kconfig.debug
+--- linux-2.6.17.3/arch/i386/Kconfig.debug 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/Kconfig.debug 2006-07-01 14:35:29.000000000 -0400
+@@ -53,7 +53,7 @@ config DEBUG_PAGEALLOC
+
+ config DEBUG_RODATA
+ bool "Write protect kernel read-only data structures"
+- depends on DEBUG_KERNEL
++ depends on DEBUG_KERNEL && 0
+ help
+ Mark the kernel read-only data as write-protected in the pagetables,
+ in order to catch accidental (and incorrect) writes to such const
+diff -urNp linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c
+--- linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c 2006-07-01 14:35:29.000000000 -0400
+@@ -10,6 +10,7 @@
+ #include <linux/dmi.h>
+ #include <asm/smp.h>
+ #include <asm/tlbflush.h>
++#include <asm/desc.h>
+
+ /* address in low memory of the wakeup routine. */
+ unsigned long acpi_wakeup_address = 0;
+@@ -24,11 +25,22 @@ static void init_low_mapping(pgd_t * pgd
+ {
+ int pgd_ofs = 0;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ while ((pgd_ofs < pgd_limit)
+ && (pgd_ofs + USER_PTRS_PER_PGD < PTRS_PER_PGD)) {
+ set_pgd(pgd, *(pgd + USER_PTRS_PER_PGD));
+ pgd_ofs++, pgd++;
+ }
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ flush_tlb_all();
+ }
+
+@@ -55,7 +67,18 @@ int acpi_save_state_mem(void)
+ */
+ void acpi_restore_state_mem(void)
+ {
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ zap_low_mappings();
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ /**
+diff -urNp linux-2.6.17.3/arch/i386/kernel/alternative.c linux-2.6.17.3/arch/i386/kernel/alternative.c
+--- linux-2.6.17.3/arch/i386/kernel/alternative.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/alternative.c 2006-07-01 14:35:29.000000000 -0400
+@@ -3,6 +3,7 @@
+ #include <linux/list.h>
+ #include <asm/alternative.h>
+ #include <asm/sections.h>
++#include <asm/desc.h>
+
+ #define DEBUG 0
+ #if DEBUG
+@@ -101,71 +102,128 @@ void apply_alternatives(struct alt_instr
+ struct alt_instr *a;
+ int diff, i, k;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ DPRINTK("%s: alt table %p -> %p\n", __FUNCTION__, start, end);
+ for (a = start; a < end; a++) {
+ BUG_ON(a->replacementlen > a->instrlen);
+ if (!boot_cpu_has(a->cpuid))
+ continue;
+- memcpy(a->instr, a->replacement, a->replacementlen);
++ memcpy(a->instr + __KERNEL_TEXT_OFFSET, a->replacement, a->replacementlen);
+ diff = a->instrlen - a->replacementlen;
+ /* Pad the rest with nops */
+ for (i = a->replacementlen; diff > 0; diff -= k, i += k) {
+ k = diff;
+ if (k > ASM_NOP_MAX)
+ k = ASM_NOP_MAX;
+- memcpy(a->instr + i, noptable[k], k);
++ memcpy(a->instr + i + __KERNEL_TEXT_OFFSET, noptable[k], k);
+ }
+ }
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ static void alternatives_smp_save(struct alt_instr *start, struct alt_instr *end)
+ {
+ struct alt_instr *a;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ DPRINTK("%s: alt table %p-%p\n", __FUNCTION__, start, end);
+ for (a = start; a < end; a++) {
+ memcpy(a->replacement + a->replacementlen,
+- a->instr,
++ a->instr + __KERNEL_TEXT_OFFSET,
+ a->instrlen);
+ }
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ static void alternatives_smp_apply(struct alt_instr *start, struct alt_instr *end)
+ {
+ struct alt_instr *a;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ for (a = start; a < end; a++) {
+- memcpy(a->instr,
++ memcpy(a->instr + __KERNEL_TEXT_OFFSET,
+ a->replacement + a->replacementlen,
+ a->instrlen);
+ }
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ static void alternatives_smp_lock(u8 **start, u8 **end, u8 *text, u8 *text_end)
+ {
+- u8 **ptr;
++ u8 *ptr;
++
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
+
+- for (ptr = start; ptr < end; ptr++) {
+- if (*ptr < text)
++ pax_open_kernel(cr0);
++#endif
++
++ for (; start < end; start++) {
++ ptr = *start + __KERNEL_TEXT_OFFSET;
++ if (ptr < text)
+ continue;
+- if (*ptr > text_end)
++ if (ptr > text_end)
+ continue;
+- **ptr = 0xf0; /* lock prefix */
++ *ptr = 0xf0; /* lock prefix */
+ };
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ static void alternatives_smp_unlock(u8 **start, u8 **end, u8 *text, u8 *text_end)
+ {
+ unsigned char **noptable = find_nop_table();
+- u8 **ptr;
++ u8 *ptr;
++
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
+
+- for (ptr = start; ptr < end; ptr++) {
+- if (*ptr < text)
++ for (; start < end; start++) {
++ ptr = *start + __KERNEL_TEXT_OFFSET;
++ if (ptr < text)
+ continue;
+- if (*ptr > text_end)
++ if (ptr > text_end)
+ continue;
+- **ptr = noptable[1][0];
++ *ptr = noptable[1][0];
+ };
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ struct smp_alt_module {
+diff -urNp linux-2.6.17.3/arch/i386/kernel/apic.c linux-2.6.17.3/arch/i386/kernel/apic.c
+--- linux-2.6.17.3/arch/i386/kernel/apic.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/apic.c 2006-07-01 14:35:29.000000000 -0400
+@@ -1176,7 +1176,7 @@ inline void smp_local_timer_interrupt(st
+ {
+ profile_tick(CPU_PROFILING, regs);
+ #ifdef CONFIG_SMP
+- update_process_times(user_mode_vm(regs));
++ update_process_times(user_mode(regs));
+ #endif
+
+ /*
+diff -urNp linux-2.6.17.3/arch/i386/kernel/apm.c linux-2.6.17.3/arch/i386/kernel/apm.c
+--- linux-2.6.17.3/arch/i386/kernel/apm.c 2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/apm.c 2006-07-01 14:35:29.000000000 -0400
+@@ -589,9 +589,18 @@ static u8 apm_bios_call(u32 func, u32 eb
+ struct desc_struct save_desc_40;
+ struct desc_struct *gdt;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++#endif
++
+ cpus = apm_save_cpus();
+
+ cpu = get_cpu();
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_open_kernel(cr0);
++#endif
++
+ gdt = get_cpu_gdt_table(cpu);
+ save_desc_40 = gdt[0x40 / 8];
+ gdt[0x40 / 8] = bad_bios_desc;
+@@ -603,6 +612,11 @@ static u8 apm_bios_call(u32 func, u32 eb
+ APM_DO_RESTORE_SEGS;
+ local_irq_restore(flags);
+ gdt[0x40 / 8] = save_desc_40;
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ put_cpu();
+ apm_restore_cpus(cpus);
+
+@@ -633,9 +647,18 @@ static u8 apm_bios_call_simple(u32 func,
+ struct desc_struct save_desc_40;
+ struct desc_struct *gdt;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++#endif
++
+ cpus = apm_save_cpus();
+
+ cpu = get_cpu();
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_open_kernel(cr0);
++#endif
++
+ gdt = get_cpu_gdt_table(cpu);
<<Diff was trimmed, longer than 597 lines>>
More information about the pld-cvs-commit
mailing list