SOURCES: linux-2.6-grsec-vs-full.patch (NEW) - raw from http://www...
hawk
hawk at pld-linux.org
Mon May 7 15:25:12 CEST 2007
Author: hawk Date: Mon May 7 13:25:12 2007 GMT
Module: SOURCES Tag: HEAD
---- Log message:
- raw from http://www.grsecurity.net/~spender/grsecurity-2.1.10-2.6.21-200705041939.patch
with localversion killed and updated for vserver patched kernel
---- Files affected:
SOURCES:
linux-2.6-grsec-vs-full.patch (NONE -> 1.1) (NEW)
---- Diffs:
================================================================
Index: SOURCES/linux-2.6-grsec-vs-full.patch
diff -u /dev/null SOURCES/linux-2.6-grsec-vs-full.patch:1.1
--- /dev/null Mon May 7 15:25:12 2007
+++ SOURCES/linux-2.6-grsec-vs-full.patch Mon May 7 15:25:07 2007
@@ -0,0 +1,31860 @@
+diff -urNp linux-2.6.21/arch/alpha/kernel/module.c linux-2.6.21/arch/alpha/kernel/module.c
+--- linux-2.6.21/arch/alpha/kernel/module.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/alpha/kernel/module.c 2007-04-30 17:07:41.000000000 -0400
+@@ -177,7 +177,7 @@ apply_relocate_add(Elf64_Shdr *sechdrs,
+
+ /* The small sections were sorted to the end of the segment.
+ The following should definitely cover them. */
+- gp = (u64)me->module_core + me->core_size - 0x8000;
++ gp = (u64)me->module_core_rw + me->core_size_rw - 0x8000;
+ got = sechdrs[me->arch.gotsecindex].sh_addr;
+
+ for (i = 0; i < n; i++) {
+diff -urNp linux-2.6.21/arch/alpha/kernel/osf_sys.c linux-2.6.21/arch/alpha/kernel/osf_sys.c
+--- linux-2.6.21/arch/alpha/kernel/osf_sys.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/alpha/kernel/osf_sys.c 2007-04-30 17:07:41.000000000 -0400
+@@ -1277,6 +1277,10 @@ arch_get_unmapped_area(struct file *filp
+ merely specific addresses, but regions of memory -- perhaps
+ this feature should be incorporated into all ports? */
+
++#ifdef CONFIG_PAX_RANDMMAP
++ if (!(current->mm->pax_flags & MF_PAX_RANDMMAP) || !filp)
++#endif
++
+ if (addr) {
+ addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit);
+ if (addr != (unsigned long) -ENOMEM)
+@@ -1284,8 +1288,8 @@ arch_get_unmapped_area(struct file *filp
+ }
+
+ /* Next, try allocating at TASK_UNMAPPED_BASE. */
+- addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE),
+- len, limit);
++ addr = arch_get_unmapped_area_1 (PAGE_ALIGN(current->mm->mmap_base), len, limit);
++
+ if (addr != (unsigned long) -ENOMEM)
+ return addr;
+
+diff -urNp linux-2.6.21/arch/alpha/kernel/ptrace.c linux-2.6.21/arch/alpha/kernel/ptrace.c
+--- linux-2.6.21/arch/alpha/kernel/ptrace.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/alpha/kernel/ptrace.c 2007-04-29 22:41:26.000000000 -0400
+@@ -15,6 +15,7 @@
+ #include <linux/security.h>
+ #include <linux/signal.h>
+ #include <linux/vs_base.h>
++#include <linux/grsecurity.h>
+
+ #include <asm/uaccess.h>
+ #include <asm/pgtable.h>
+@@ -283,6 +284,9 @@ do_sys_ptrace(long request, long pid, lo
+ goto out_notsk;
+ }
+
++ if (gr_handle_ptrace(child, request))
++ goto out;
++
+ if (request == PTRACE_ATTACH) {
+ ret = ptrace_attach(child);
+ goto out;
+diff -urNp linux-2.6.21/arch/alpha/mm/fault.c linux-2.6.21/arch/alpha/mm/fault.c
+--- linux-2.6.21/arch/alpha/mm/fault.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/alpha/mm/fault.c 2007-04-30 17:07:41.000000000 -0400
+@@ -24,6 +24,7 @@
+ #include <linux/smp_lock.h>
+ #include <linux/interrupt.h>
+ #include <linux/module.h>
++#include <linux/binfmts.h>
+
+ #include <asm/system.h>
+ #include <asm/uaccess.h>
+@@ -55,6 +56,124 @@ __load_new_mm_context(struct mm_struct *
+ __reload_thread(pcb);
+ }
+
++#ifdef CONFIG_PAX_PAGEEXEC
++/*
++ * PaX: decide what to do with offenders (regs->pc = fault address)
++ *
++ * returns 1 when task should be killed
++ * 2 when patched PLT trampoline was detected
++ * 3 when unpatched PLT trampoline was detected
++ */
++static int pax_handle_fetch_fault(struct pt_regs *regs)
++{
++
++#ifdef CONFIG_PAX_EMUPLT
++ int err;
++
++ do { /* PaX: patched PLT emulation #1 */
++ unsigned int ldah, ldq, jmp;
++
++ err = get_user(ldah, (unsigned int *)regs->pc);
++ err |= get_user(ldq, (unsigned int *)(regs->pc+4));
++ err |= get_user(jmp, (unsigned int *)(regs->pc+8));
++
++ if (err)
++ break;
++
++ if ((ldah & 0xFFFF0000U) == 0x277B0000U &&
++ (ldq & 0xFFFF0000U) == 0xA77B0000U &&
++ jmp == 0x6BFB0000U)
++ {
++ unsigned long r27, addr;
++ unsigned long addrh = (ldah | 0xFFFFFFFFFFFF0000UL) << 16;
++ unsigned long addrl = ldq | 0xFFFFFFFFFFFF0000UL;
++
++ addr = regs->r27 + ((addrh ^ 0x80000000UL) + 0x80000000UL) + ((addrl ^ 0x8000UL) + 0x8000UL);
++ err = get_user(r27, (unsigned long*)addr);
++ if (err)
++ break;
++
++ regs->r27 = r27;
++ regs->pc = r27;
++ return 2;
++ }
++ } while (0);
++
++ do { /* PaX: patched PLT emulation #2 */
++ unsigned int ldah, lda, br;
++
++ err = get_user(ldah, (unsigned int *)regs->pc);
++ err |= get_user(lda, (unsigned int *)(regs->pc+4));
++ err |= get_user(br, (unsigned int *)(regs->pc+8));
++
++ if (err)
++ break;
++
++ if ((ldah & 0xFFFF0000U) == 0x277B0000U &&
++ (lda & 0xFFFF0000U) == 0xA77B0000U &&
++ (br & 0xFFE00000U) == 0xC3E00000U)
++ {
++ unsigned long addr = br | 0xFFFFFFFFFFE00000UL;
++ unsigned long addrh = (ldah | 0xFFFFFFFFFFFF0000UL) << 16;
++ unsigned long addrl = lda | 0xFFFFFFFFFFFF0000UL;
++
++ regs->r27 += ((addrh ^ 0x80000000UL) + 0x80000000UL) + ((addrl ^ 0x8000UL) + 0x8000UL);
++ regs->pc += 12 + (((addr ^ 0x00100000UL) + 0x00100000UL) << 2);
++ return 2;
++ }
++ } while (0);
++
++ do { /* PaX: unpatched PLT emulation */
++ unsigned int br;
++
++ err = get_user(br, (unsigned int *)regs->pc);
++
++ if (!err && (br & 0xFFE00000U) == 0xC3800000U) {
++ unsigned int br2, ldq, nop, jmp;
++ unsigned long addr = br | 0xFFFFFFFFFFE00000UL, resolver;
++
++ addr = regs->pc + 4 + (((addr ^ 0x00100000UL) + 0x00100000UL) << 2);
++ err = get_user(br2, (unsigned int *)addr);
++ err |= get_user(ldq, (unsigned int *)(addr+4));
++ err |= get_user(nop, (unsigned int *)(addr+8));
++ err |= get_user(jmp, (unsigned int *)(addr+12));
++ err |= get_user(resolver, (unsigned long *)(addr+16));
++
++ if (err)
++ break;
++
++ if (br2 == 0xC3600000U &&
++ ldq == 0xA77B000CU &&
++ nop == 0x47FF041FU &&
++ jmp == 0x6B7B0000U)
++ {
++ regs->r28 = regs->pc+4;
++ regs->r27 = addr+16;
++ regs->pc = resolver;
++ return 3;
++ }
++ }
++ } while (0);
++#endif
++
++ return 1;
++}
++
++void pax_report_insns(void *pc, void *sp)
++{
++ unsigned long i;
++
++ printk(KERN_ERR "PAX: bytes at PC: ");
++ for (i = 0; i < 5; i++) {
++ unsigned int c;
++ if (get_user(c, (unsigned int*)pc+i))
++ printk("???????? ");
++ else
++ printk("%08x ", c);
++ }
++ printk("\n");
++}
++#endif
+
+ /*
+ * This routine handles page faults. It determines the address,
+@@ -132,8 +251,29 @@ do_page_fault(unsigned long address, uns
+ good_area:
+ si_code = SEGV_ACCERR;
+ if (cause < 0) {
+- if (!(vma->vm_flags & VM_EXEC))
++ if (!(vma->vm_flags & VM_EXEC)) {
++
++#ifdef CONFIG_PAX_PAGEEXEC
++ if (!(mm->pax_flags & MF_PAX_PAGEEXEC) || address != regs->pc)
++ goto bad_area;
++
++ up_read(&mm->mmap_sem);
++ switch(pax_handle_fetch_fault(regs)) {
++
++#ifdef CONFIG_PAX_EMUPLT
++ case 2:
++ case 3:
++ return;
++#endif
++
++ }
++ pax_report_fault(regs, (void*)regs->pc, (void*)rdusp());
++ do_exit(SIGKILL);
++#else
+ goto bad_area;
++#endif
++
++ }
+ } else if (!cause) {
+ /* Allow reads even for write-only mappings */
+ if (!(vma->vm_flags & (VM_READ | VM_WRITE)))
+diff -urNp linux-2.6.21/arch/arm/mm/mmap.c linux-2.6.21/arch/arm/mm/mmap.c
+--- linux-2.6.21/arch/arm/mm/mmap.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/arm/mm/mmap.c 2007-04-30 17:07:41.000000000 -0400
+@@ -61,6 +61,10 @@ arch_get_unmapped_area(struct file *filp
+ if (len > TASK_SIZE)
+ return -ENOMEM;
+
++#ifdef CONFIG_PAX_RANDMMAP
++ if (!(mm->pax_flags & MF_PAX_RANDMMAP) || !filp)
++#endif
++
+ if (addr) {
+ if (do_align)
+ addr = COLOUR_ALIGN(addr, pgoff);
+@@ -75,7 +79,7 @@ arch_get_unmapped_area(struct file *filp
+ if (len > mm->cached_hole_size) {
+ start_addr = addr = mm->free_area_cache;
+ } else {
+- start_addr = addr = TASK_UNMAPPED_BASE;
++ start_addr = addr = mm->mmap_base;
+ mm->cached_hole_size = 0;
+ }
+
+@@ -92,8 +96,8 @@ full_search:
+ * Start a new search - just in case we missed
+ * some holes.
+ */
+- if (start_addr != TASK_UNMAPPED_BASE) {
+- start_addr = addr = TASK_UNMAPPED_BASE;
++ if (start_addr != mm->mmap_base) {
++ start_addr = addr = mm->mmap_base;
+ mm->cached_hole_size = 0;
+ goto full_search;
+ }
+diff -urNp linux-2.6.21/arch/avr32/mm/fault.c linux-2.6.21/arch/avr32/mm/fault.c
+--- linux-2.6.21/arch/avr32/mm/fault.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/avr32/mm/fault.c 2007-04-30 17:07:41.000000000 -0400
+@@ -68,6 +68,23 @@ static inline int notify_page_fault(enum
+ }
+ #endif
+
++#ifdef CONFIG_PAX_PAGEEXEC
++void pax_report_insns(void *pc, void *sp)
++{
++ unsigned long i;
++
++ printk(KERN_ERR "PAX: bytes at PC: ");
++ for (i = 0; i < 20; i++) {
++ unsigned char c;
++ if (get_user(c, (unsigned char*)pc+i))
++ printk("???????? ");
++ else
++ printk("%02x ", c);
++ }
++ printk("\n");
++}
++#endif
++
+ /*
+ * This routine handles page faults. It determines the address and the
+ * problem, and then passes it off to one of the appropriate routines.
+@@ -182,6 +199,16 @@ bad_area:
+ up_read(&mm->mmap_sem);
+
+ if (user_mode(regs)) {
++
++#ifdef CONFIG_PAX_PAGEEXEC
++ if (mm->pax_flags & MF_PAX_PAGEEXEC) {
++ if (ecr == ECR_PROTECTION_X || ecr == ECR_TLB_MISS_X) {
++ pax_report_fault(regs, (void*)regs->pc, (void*)regs->sp);
++ do_exit(SIGKILL);
++ }
++ }
++#endif
++
+ /* Hmm...we have to pass address and ecr somehow... */
+ /* tsk->thread.address = address;
+ tsk->thread.error_code = ecr; */
+diff -urNp linux-2.6.21/arch/i386/boot/setup.S linux-2.6.21/arch/i386/boot/setup.S
+--- linux-2.6.21/arch/i386/boot/setup.S 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/boot/setup.S 2007-04-30 17:07:41.000000000 -0400
+@@ -869,11 +869,13 @@ startup_32:
+ movl %eax, %gs
+ movl %eax, %ss
+
++ movl 0x00000000, %ecx
+ xorl %eax, %eax
+ 1: incl %eax # check that A20 really IS enabled
+ movl %eax, 0x00000000 # loop forever if it isn't
+ cmpl %eax, 0x00100000
+ je 1b
++ movl %ecx, 0x00000000
+
+ # Jump to the 32bit entry point
+ jmpl *(code32_start - start + (DELTA_INITSEG << 4))(%esi)
+diff -urNp linux-2.6.21/arch/i386/Kconfig linux-2.6.21/arch/i386/Kconfig
+--- linux-2.6.21/arch/i386/Kconfig 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/Kconfig 2007-04-30 17:07:41.000000000 -0400
+@@ -892,7 +892,7 @@ config HOTPLUG_CPU
+
+ config COMPAT_VDSO
+ bool "Compat VDSO support"
+- default y
++ default n
+ help
+ Map the VDSO to the predictable old-style address too.
+ ---help---
+@@ -1087,7 +1087,7 @@ config PCI
+ choice
+ prompt "PCI access mode"
+ depends on PCI && !X86_VISWS
+- default PCI_GOANY
++ default PCI_GODIRECT
+ ---help---
+ On PCI systems, the BIOS can be used to detect the PCI devices and
+ determine their configuration. However, some old PCI motherboards
+@@ -1119,7 +1119,7 @@ endchoice
+
+ config PCI_BIOS
+ bool
+- depends on !X86_VISWS && PCI && (PCI_GOBIOS || PCI_GOANY)
++ depends on !X86_VISWS && PCI && PCI_GOBIOS
+ default y
+
+ config PCI_DIRECT
+diff -urNp linux-2.6.21/arch/i386/Kconfig.cpu linux-2.6.21/arch/i386/Kconfig.cpu
+--- linux-2.6.21/arch/i386/Kconfig.cpu 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/Kconfig.cpu 2007-04-30 17:07:41.000000000 -0400
+@@ -262,7 +262,7 @@ config X86_PPRO_FENCE
+
+ config X86_F00F_BUG
+ bool
+- depends on M586MMX || M586TSC || M586 || M486 || M386
++ depends on (M586MMX || M586TSC || M586 || M486 || M386) && !PAX_KERNEXEC
+ default y
+
+ config X86_WP_WORKS_OK
+@@ -292,7 +292,7 @@ config X86_CMPXCHG64
+
+ config X86_ALIGNMENT_16
+ bool
+- depends on MWINCHIP3D || MWINCHIP2 || MWINCHIPC6 || MCYRIXIII || X86_ELAN || MK6 || M586MMX || M586TSC || M586 || M486 || MVIAC3_2 || MGEODEGX1
++ depends on MWINCHIP3D || MWINCHIP2 || MWINCHIPC6 || MCYRIXIII || X86_ELAN || MK8 || MK7 || MK6 || MPENTIUM4 || MPENTIUMIII || MPENTIUMII || M686 || M586MMX || M586TSC || M586 || M486 || MVIAC3_2 || MGEODEGX1
+ default y
+
+ config X86_GOOD_APIC
+diff -urNp linux-2.6.21/arch/i386/Kconfig.debug linux-2.6.21/arch/i386/Kconfig.debug
+--- linux-2.6.21/arch/i386/Kconfig.debug 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/Kconfig.debug 2007-04-30 17:07:41.000000000 -0400
+@@ -48,7 +48,7 @@ config DEBUG_PAGEALLOC
+
+ config DEBUG_RODATA
+ bool "Write protect kernel read-only data structures"
+- depends on DEBUG_KERNEL
++ depends on DEBUG_KERNEL && !PAX_KERNEXEC
+ help
+ Mark the kernel read-only data as write-protected in the pagetables,
+ in order to catch accidental (and incorrect) writes to such const
+diff -urNp linux-2.6.21/arch/i386/kernel/acpi/boot.c linux-2.6.21/arch/i386/kernel/acpi/boot.c
+--- linux-2.6.21/arch/i386/kernel/acpi/boot.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/kernel/acpi/boot.c 2007-04-30 17:07:41.000000000 -0400
+@@ -1116,7 +1116,7 @@ static struct dmi_system_id __initdata a
+ DMI_MATCH(DMI_PRODUCT_NAME, "TravelMate 360"),
+ },
+ },
+- {}
++ { NULL, NULL, {{0, NULL}}, NULL}
+ };
+
+ #endif /* __i386__ */
+diff -urNp linux-2.6.21/arch/i386/kernel/acpi/sleep.c linux-2.6.21/arch/i386/kernel/acpi/sleep.c
+--- linux-2.6.21/arch/i386/kernel/acpi/sleep.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/kernel/acpi/sleep.c 2007-04-30 17:07:41.000000000 -0400
+@@ -94,7 +94,7 @@ static __initdata struct dmi_system_id a
+ DMI_MATCH(DMI_PRODUCT_NAME, "S4030CDT/4.3"),
+ },
+ },
+- {}
++ { NULL, NULL, {{0, NULL}}, NULL}
+ };
+
+ static int __init acpisleep_dmi_init(void)
+diff -urNp linux-2.6.21/arch/i386/kernel/acpi/wakeup.S linux-2.6.21/arch/i386/kernel/acpi/wakeup.S
+--- linux-2.6.21/arch/i386/kernel/acpi/wakeup.S 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/kernel/acpi/wakeup.S 2007-04-30 17:07:41.000000000 -0400
+@@ -205,13 +205,11 @@ wakeup_pmode_return:
+ # and restore the stack ... but you need gdt for this to work
+ movl saved_context_esp, %esp
+
+- movl %cs:saved_magic, %eax
+- cmpl $0x12345678, %eax
++ cmpl $0x12345678, saved_magic
+ jne bogus_magic
+
+ # jump to place where we left off
+- movl saved_eip,%eax
+- jmp *%eax
++ jmp *(saved_eip)
+
+ bogus_magic:
+ movw $0x0e00 + 'B', 0xb8018
+diff -urNp linux-2.6.21/arch/i386/kernel/alternative.c linux-2.6.21/arch/i386/kernel/alternative.c
+--- linux-2.6.21/arch/i386/kernel/alternative.c 2007-04-25 23:08:32.000000000 -0400
++++ linux-2.6.21/arch/i386/kernel/alternative.c 2007-04-30 17:07:41.000000000 -0400
+@@ -4,6 +4,7 @@
+ #include <linux/list.h>
+ #include <asm/alternative.h>
+ #include <asm/sections.h>
++#include <asm/desc.h>
+
+ static int smp_alt_once = 0;
+ static int debug_alternative = 0;
+@@ -149,12 +150,18 @@ void apply_alternatives(struct alt_instr
+ u8 *instr;
+ int diff;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ DPRINTK("%s: alt table %p -> %p\n", __FUNCTION__, start, end);
+ for (a = start; a < end; a++) {
+ BUG_ON(a->replacementlen > a->instrlen);
+ if (!boot_cpu_has(a->cpuid))
+ continue;
+- instr = a->instr;
++ instr = a->instr + __KERNEL_TEXT_OFFSET;
+ #ifdef CONFIG_X86_64
+ /* vsyscall code is not mapped yet. resolve it manually. */
+ if (instr >= (u8 *)VSYSCALL_START && instr < (u8*)VSYSCALL_END) {
+@@ -167,6 +174,11 @@ void apply_alternatives(struct alt_instr
+ diff = a->instrlen - a->replacementlen;
+ nop_out(instr + a->replacementlen, diff);
+ }
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ #ifdef CONFIG_SMP
+@@ -175,49 +187,95 @@ static void alternatives_smp_save(struct
+ {
+ struct alt_instr *a;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ DPRINTK("%s: alt table %p-%p\n", __FUNCTION__, start, end);
+ for (a = start; a < end; a++) {
+ memcpy(a->replacement + a->replacementlen,
+- a->instr,
++ a->instr + __KERNEL_TEXT_OFFSET,
+ a->instrlen);
+ }
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ static void alternatives_smp_apply(struct alt_instr *start, struct alt_instr *end)
+ {
+ struct alt_instr *a;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ for (a = start; a < end; a++) {
+- memcpy(a->instr,
++ memcpy(a->instr + __KERNEL_TEXT_OFFSET,
+ a->replacement + a->replacementlen,
+ a->instrlen);
+ }
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ static void alternatives_smp_lock(u8 **start, u8 **end, u8 *text, u8 *text_end)
+ {
+- u8 **ptr;
++ u8 *ptr;
+
+- for (ptr = start; ptr < end; ptr++) {
+- if (*ptr < text)
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
++ for (; start < end; start++) {
++ ptr = *start + __KERNEL_TEXT_OFFSET;
++ if (ptr < text)
+ continue;
+- if (*ptr > text_end)
++ if (ptr > text_end)
+ continue;
+- **ptr = 0xf0; /* lock prefix */
++ *ptr = 0xf0; /* lock prefix */
+ };
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ static void alternatives_smp_unlock(u8 **start, u8 **end, u8 *text, u8 *text_end)
+ {
+- u8 **ptr;
++ u8 *ptr;
++
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
+
+- for (ptr = start; ptr < end; ptr++) {
+- if (*ptr < text)
++ for (; start < end; start++) {
++ ptr = *start + __KERNEL_TEXT_OFFSET;
++ if (ptr < text)
+ continue;
+- if (*ptr > text_end)
++ if (ptr > text_end)
+ continue;
+- nop_out(*ptr, 1);
++ nop_out(ptr, 1);
+ };
++
++#ifdef CONFIG_PAX_KERNEXEC
++ pax_close_kernel(cr0);
++#endif
++
+ }
+
+ struct smp_alt_module {
+@@ -344,10 +402,17 @@ void apply_paravirt(struct paravirt_patc
+ {
+ struct paravirt_patch *p;
+
++#ifdef CONFIG_PAX_KERNEXEC
++ unsigned long cr0;
++
++ pax_open_kernel(cr0);
++#endif
++
+ for (p = start; p < end; p++) {
+ unsigned int used;
++ u8 *instr = p->instr + __KERNEL_TEXT_OFFSET;
+
<<Diff was trimmed, longer than 597 lines>>
More information about the pld-cvs-commit
mailing list