SOURCES: grsecurity-2.1.9-2.6.17.3.patch (NEW) - raw from http://w...

hawk hawk at pld-linux.org
Tue Jul 4 21:02:04 CEST 2006


Author: hawk                         Date: Tue Jul  4 19:02:03 2006 GMT
Module: SOURCES                       Tag: HEAD
---- Log message:
- raw from http://www.grsecurity.net/~spender/grsecurity-2.1.9-2.6.17.3-200607040032.patch

---- Files affected:
SOURCES:
   grsecurity-2.1.9-2.6.17.3.patch (NONE -> 1.1)  (NEW)

---- Diffs:

================================================================
Index: SOURCES/grsecurity-2.1.9-2.6.17.3.patch
diff -u /dev/null SOURCES/grsecurity-2.1.9-2.6.17.3.patch:1.1
--- /dev/null	Tue Jul  4 21:02:03 2006
+++ SOURCES/grsecurity-2.1.9-2.6.17.3.patch	Tue Jul  4 21:01:58 2006
@@ -0,0 +1,25592 @@
+diff -urNp linux-2.6.17.3/arch/alpha/kernel/module.c linux-2.6.17.3/arch/alpha/kernel/module.c
+--- linux-2.6.17.3/arch/alpha/kernel/module.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/kernel/module.c	2006-07-01 14:35:29.000000000 -0400
+@@ -177,7 +177,7 @@ apply_relocate_add(Elf64_Shdr *sechdrs, 
+ 
+ 	/* The small sections were sorted to the end of the segment.
+ 	   The following should definitely cover them.  */
+-	gp = (u64)me->module_core + me->core_size - 0x8000;
++	gp = (u64)me->module_core_rw + me->core_size_rw - 0x8000;
+ 	got = sechdrs[me->arch.gotsecindex].sh_addr;
+ 
+ 	for (i = 0; i < n; i++) {
+diff -urNp linux-2.6.17.3/arch/alpha/kernel/osf_sys.c linux-2.6.17.3/arch/alpha/kernel/osf_sys.c
+--- linux-2.6.17.3/arch/alpha/kernel/osf_sys.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/kernel/osf_sys.c	2006-07-01 14:35:29.000000000 -0400
+@@ -1273,6 +1273,10 @@ arch_get_unmapped_area(struct file *filp
+ 	   merely specific addresses, but regions of memory -- perhaps
+ 	   this feature should be incorporated into all ports?  */
+ 
++#ifdef CONFIG_PAX_RANDMMAP
++	if (!(current->mm->pax_flags & MF_PAX_RANDMMAP) || !filp)
++#endif
++
+ 	if (addr) {
+ 		addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit);
+ 		if (addr != (unsigned long) -ENOMEM)
+@@ -1280,8 +1284,8 @@ arch_get_unmapped_area(struct file *filp
+ 	}
+ 
+ 	/* Next, try allocating at TASK_UNMAPPED_BASE.  */
+-	addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE),
+-					 len, limit);
++	addr = arch_get_unmapped_area_1 (PAGE_ALIGN(current->mm->mmap_base), len, limit);
++
+ 	if (addr != (unsigned long) -ENOMEM)
+ 		return addr;
+ 
+diff -urNp linux-2.6.17.3/arch/alpha/kernel/ptrace.c linux-2.6.17.3/arch/alpha/kernel/ptrace.c
+--- linux-2.6.17.3/arch/alpha/kernel/ptrace.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/kernel/ptrace.c	2006-07-01 15:38:54.000000000 -0400
+@@ -15,6 +15,7 @@
+ #include <linux/slab.h>
+ #include <linux/security.h>
+ #include <linux/signal.h>
++#include <linux/grsecurity.h>
+ 
+ #include <asm/uaccess.h>
+ #include <asm/pgtable.h>
+@@ -283,6 +284,9 @@ do_sys_ptrace(long request, long pid, lo
+ 		goto out_notsk;
+ 	}
+ 
++	if (gr_handle_ptrace(child, request))
++		goto out;
++
+ 	if (request == PTRACE_ATTACH) {
+ 		ret = ptrace_attach(child);
+ 		goto out;
+diff -urNp linux-2.6.17.3/arch/alpha/mm/fault.c linux-2.6.17.3/arch/alpha/mm/fault.c
+--- linux-2.6.17.3/arch/alpha/mm/fault.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/alpha/mm/fault.c	2006-07-01 14:35:29.000000000 -0400
+@@ -25,6 +25,7 @@
+ #include <linux/smp_lock.h>
+ #include <linux/interrupt.h>
+ #include <linux/module.h>
++#include <linux/binfmts.h>
+ 
+ #include <asm/system.h>
+ #include <asm/uaccess.h>
+@@ -56,6 +57,124 @@ __load_new_mm_context(struct mm_struct *
+ 	__reload_thread(pcb);
+ }
+ 
++#ifdef CONFIG_PAX_PAGEEXEC
++/*
++ * PaX: decide what to do with offenders (regs->pc = fault address)
++ *
++ * returns 1 when task should be killed
++ *         2 when patched PLT trampoline was detected
++ *         3 when unpatched PLT trampoline was detected
++ */
++static int pax_handle_fetch_fault(struct pt_regs *regs)
++{
++
++#ifdef CONFIG_PAX_EMUPLT
++	int err;
++
++	do { /* PaX: patched PLT emulation #1 */
++		unsigned int ldah, ldq, jmp;
++
++		err = get_user(ldah, (unsigned int *)regs->pc);
++		err |= get_user(ldq, (unsigned int *)(regs->pc+4));
++		err |= get_user(jmp, (unsigned int *)(regs->pc+8));
++
++		if (err)
++			break;
++
++		if ((ldah & 0xFFFF0000U) == 0x277B0000U &&
++		    (ldq & 0xFFFF0000U) == 0xA77B0000U &&
++		    jmp == 0x6BFB0000U)
++		{
++			unsigned long r27, addr;
++			unsigned long addrh = (ldah | 0xFFFFFFFFFFFF0000UL) << 16;
++			unsigned long addrl = ldq | 0xFFFFFFFFFFFF0000UL;
++
++			addr = regs->r27 + ((addrh ^ 0x80000000UL) + 0x80000000UL) + ((addrl ^ 0x8000UL) + 0x8000UL);
++			err = get_user(r27, (unsigned long*)addr);
++			if (err)
++				break;
++
++			regs->r27 = r27;
++			regs->pc = r27;
++			return 2;
++		}
++	} while (0);
++
++	do { /* PaX: patched PLT emulation #2 */
++		unsigned int ldah, lda, br;
++
++		err = get_user(ldah, (unsigned int *)regs->pc);
++		err |= get_user(lda, (unsigned int *)(regs->pc+4));
++		err |= get_user(br, (unsigned int *)(regs->pc+8));
++
++		if (err)
++			break;
++
++		if ((ldah & 0xFFFF0000U)== 0x277B0000U &&
++		    (lda & 0xFFFF0000U) == 0xA77B0000U &&
++		    (br & 0xFFE00000U) == 0xC3E00000U)
++		{
++			unsigned long addr = br | 0xFFFFFFFFFFE00000UL;
++			unsigned long addrh = (ldah | 0xFFFFFFFFFFFF0000UL) << 16;
++			unsigned long addrl = lda | 0xFFFFFFFFFFFF0000UL;
++
++			regs->r27 += ((addrh ^ 0x80000000UL) + 0x80000000UL) + ((addrl ^ 0x8000UL) + 0x8000UL);
++			regs->pc += 12 + (((addr ^ 0x00100000UL) + 0x00100000UL) << 2);
++			return 2;
++		}
++	} while (0);
++
++	do { /* PaX: unpatched PLT emulation */
++		unsigned int br;
++
++		err = get_user(br, (unsigned int *)regs->pc);
++
++		if (!err && (br & 0xFFE00000U) == 0xC3800000U) {
++			unsigned int br2, ldq, nop, jmp;
++			unsigned long addr = br | 0xFFFFFFFFFFE00000UL, resolver;
++
++			addr = regs->pc + 4 + (((addr ^ 0x00100000UL) + 0x00100000UL) << 2);
++			err = get_user(br2, (unsigned int *)addr);
++			err |= get_user(ldq, (unsigned int *)(addr+4));
++			err |= get_user(nop, (unsigned int *)(addr+8));
++			err |= get_user(jmp, (unsigned int *)(addr+12));
++			err |= get_user(resolver, (unsigned long *)(addr+16));
++
++			if (err)
++				break;
++
++			if (br2 == 0xC3600000U &&
++			    ldq == 0xA77B000CU &&
++			    nop == 0x47FF041FU &&
++			    jmp == 0x6B7B0000U)
++			{
++				regs->r28 = regs->pc+4;
++				regs->r27 = addr+16;
++				regs->pc = resolver;
++				return 3;
++			}
++		}
++	} while (0);
++#endif
++
++	return 1;
++}
++
++void pax_report_insns(void *pc, void *sp)
++{
++	unsigned long i;
++
++	printk(KERN_ERR "PAX: bytes at PC: ");
++	for (i = 0; i < 5; i++) {
++		unsigned int c;
++		if (get_user(c, (unsigned int*)pc+i))
++			printk("???????? ");
++		else
++			printk("%08x ", c);
++	}
++	printk("\n");
++}
++#endif
+ 
+ /*
+  * This routine handles page faults.  It determines the address,
+@@ -133,8 +252,29 @@ do_page_fault(unsigned long address, uns
+  good_area:
+ 	si_code = SEGV_ACCERR;
+ 	if (cause < 0) {
+-		if (!(vma->vm_flags & VM_EXEC))
++		if (!(vma->vm_flags & VM_EXEC)) {
++
++#ifdef CONFIG_PAX_PAGEEXEC
++			if (!(mm->pax_flags & MF_PAX_PAGEEXEC) || address != regs->pc)
++				goto bad_area;
++
++			up_read(&mm->mmap_sem);
++			switch(pax_handle_fetch_fault(regs)) {
++
++#ifdef CONFIG_PAX_EMUPLT
++			case 2:
++			case 3:
++				return;
++#endif
++
++			}
++			pax_report_fault(regs, (void*)regs->pc, (void*)rdusp());
++			do_exit(SIGKILL);
++#else
+ 			goto bad_area;
++#endif
++
++		}
+ 	} else if (!cause) {
+ 		/* Allow reads even for write-only mappings */
+ 		if (!(vma->vm_flags & (VM_READ | VM_WRITE)))
+diff -urNp linux-2.6.17.3/arch/arm/mm/mmap.c linux-2.6.17.3/arch/arm/mm/mmap.c
+--- linux-2.6.17.3/arch/arm/mm/mmap.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/arm/mm/mmap.c	2006-07-01 14:35:29.000000000 -0400
+@@ -62,6 +62,10 @@ arch_get_unmapped_area(struct file *filp
+ 	if (len > TASK_SIZE)
+ 		return -ENOMEM;
+ 
++#ifdef CONFIG_PAX_RANDMMAP
++	if (!(mm->pax_flags & MF_PAX_RANDMMAP) || !filp)
++#endif
++
+ 	if (addr) {
+ 		if (do_align)
+ 			addr = COLOUR_ALIGN(addr, pgoff);
+@@ -76,7 +80,7 @@ arch_get_unmapped_area(struct file *filp
+ 	if (len > mm->cached_hole_size) {
+ 	        start_addr = addr = mm->free_area_cache;
+ 	} else {
+-	        start_addr = addr = TASK_UNMAPPED_BASE;
++	        start_addr = addr = mm->mmap_base;
+ 	        mm->cached_hole_size = 0;
+ 	}
+ 
+@@ -93,8 +97,8 @@ full_search:
+ 			 * Start a new search - just in case we missed
+ 			 * some holes.
+ 			 */
+-			if (start_addr != TASK_UNMAPPED_BASE) {
+-				start_addr = addr = TASK_UNMAPPED_BASE;
++			if (start_addr != mm->mmap_base) {
++				start_addr = addr = mm->mmap_base;
+ 				mm->cached_hole_size = 0;
+ 				goto full_search;
+ 			}
+diff -urNp linux-2.6.17.3/arch/i386/boot/compressed/head.S linux-2.6.17.3/arch/i386/boot/compressed/head.S
+--- linux-2.6.17.3/arch/i386/boot/compressed/head.S	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/boot/compressed/head.S	2006-07-01 14:35:29.000000000 -0400
+@@ -39,11 +39,13 @@ startup_32:
+ 	movl %eax,%gs
+ 
+ 	lss stack_start,%esp
++	movl 0x000000,%ecx
+ 	xorl %eax,%eax
+ 1:	incl %eax		# check that A20 really IS enabled
+ 	movl %eax,0x000000	# loop forever if it isn't
+ 	cmpl %eax,0x100000
+ 	je 1b
++	movl %ecx,0x000000
+ 
+ /*
+  * Initialize eflags.  Some BIOS's leave bits like NT set.  This would
+diff -urNp linux-2.6.17.3/arch/i386/Kconfig linux-2.6.17.3/arch/i386/Kconfig
+--- linux-2.6.17.3/arch/i386/Kconfig	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/Kconfig	2006-07-01 15:38:54.000000000 -0400
+@@ -977,7 +977,7 @@ endchoice
+ 
+ config PCI_BIOS
+ 	bool
+-	depends on !X86_VISWS && PCI && (PCI_GOBIOS || PCI_GOANY)
++	depends on !X86_VISWS && PCI && PCI_GOBIOS
+ 	default y
+ 
+ config PCI_DIRECT
+diff -urNp linux-2.6.17.3/arch/i386/Kconfig.cpu linux-2.6.17.3/arch/i386/Kconfig.cpu
+--- linux-2.6.17.3/arch/i386/Kconfig.cpu	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/Kconfig.cpu	2006-07-01 14:35:29.000000000 -0400
+@@ -251,7 +251,7 @@ config X86_PPRO_FENCE
+ 
+ config X86_F00F_BUG
+ 	bool
+-	depends on M586MMX || M586TSC || M586 || M486 || M386
++	depends on (M586MMX || M586TSC || M586 || M486 || M386) && !PAX_KERNEXEC
+ 	default y
+ 
+ config X86_WP_WORKS_OK
+@@ -281,7 +281,7 @@ config X86_CMPXCHG64
+ 
+ config X86_ALIGNMENT_16
+ 	bool
+-	depends on MWINCHIP3D || MWINCHIP2 || MWINCHIPC6 || MCYRIXIII || X86_ELAN || MK6 || M586MMX || M586TSC || M586 || M486 || MVIAC3_2 || MGEODEGX1
++	depends on MWINCHIP3D || MWINCHIP2 || MWINCHIPC6 || MCYRIXIII || X86_ELAN || MK8 || MK7 || MK6 || MPENTIUM4 || MPENTIUMIII || MPENTIUMII || M686 || M586MMX || M586TSC || M586 || M486 || MVIAC3_2 || MGEODEGX1
+ 	default y
+ 
+ config X86_GOOD_APIC
+diff -urNp linux-2.6.17.3/arch/i386/Kconfig.debug linux-2.6.17.3/arch/i386/Kconfig.debug
+--- linux-2.6.17.3/arch/i386/Kconfig.debug	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/Kconfig.debug	2006-07-01 14:35:29.000000000 -0400
+@@ -53,7 +53,7 @@ config DEBUG_PAGEALLOC
+ 
+ config DEBUG_RODATA
+ 	bool "Write protect kernel read-only data structures"
+-	depends on DEBUG_KERNEL
++	depends on DEBUG_KERNEL && 0
+ 	help
+ 	  Mark the kernel read-only data as write-protected in the pagetables,
+ 	  in order to catch accidental (and incorrect) writes to such const
+diff -urNp linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c
+--- linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/acpi/sleep.c	2006-07-01 14:35:29.000000000 -0400
+@@ -10,6 +10,7 @@
+ #include <linux/dmi.h>
+ #include <asm/smp.h>
+ #include <asm/tlbflush.h>
++#include <asm/desc.h>
+ 
+ /* address in low memory of the wakeup routine. */
+ unsigned long acpi_wakeup_address = 0;
+@@ -24,11 +25,22 @@ static void init_low_mapping(pgd_t * pgd
+ {
+ 	int pgd_ofs = 0;
+ 
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long cr0;
++
++	pax_open_kernel(cr0);
++#endif
++
+ 	while ((pgd_ofs < pgd_limit)
+ 	       && (pgd_ofs + USER_PTRS_PER_PGD < PTRS_PER_PGD)) {
+ 		set_pgd(pgd, *(pgd + USER_PTRS_PER_PGD));
+ 		pgd_ofs++, pgd++;
+ 	}
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ 	flush_tlb_all();
+ }
+ 
+@@ -55,7 +67,18 @@ int acpi_save_state_mem(void)
+  */
+ void acpi_restore_state_mem(void)
+ {
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long cr0;
++
++	pax_open_kernel(cr0);
++#endif
++
+ 	zap_low_mappings();
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ }
+ 
+ /**
+diff -urNp linux-2.6.17.3/arch/i386/kernel/alternative.c linux-2.6.17.3/arch/i386/kernel/alternative.c
+--- linux-2.6.17.3/arch/i386/kernel/alternative.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/alternative.c	2006-07-01 14:35:29.000000000 -0400
+@@ -3,6 +3,7 @@
+ #include <linux/list.h>
+ #include <asm/alternative.h>
+ #include <asm/sections.h>
++#include <asm/desc.h>
+ 
+ #define DEBUG 0
+ #if DEBUG
+@@ -101,71 +102,128 @@ void apply_alternatives(struct alt_instr
+ 	struct alt_instr *a;
+ 	int diff, i, k;
+ 
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long cr0;
++
++	pax_open_kernel(cr0);
++#endif
++
+ 	DPRINTK("%s: alt table %p -> %p\n", __FUNCTION__, start, end);
+ 	for (a = start; a < end; a++) {
+ 		BUG_ON(a->replacementlen > a->instrlen);
+ 		if (!boot_cpu_has(a->cpuid))
+ 			continue;
+-		memcpy(a->instr, a->replacement, a->replacementlen);
++		memcpy(a->instr + __KERNEL_TEXT_OFFSET, a->replacement, a->replacementlen);
+ 		diff = a->instrlen - a->replacementlen;
+ 		/* Pad the rest with nops */
+ 		for (i = a->replacementlen; diff > 0; diff -= k, i += k) {
+ 			k = diff;
+ 			if (k > ASM_NOP_MAX)
+ 				k = ASM_NOP_MAX;
+-			memcpy(a->instr + i, noptable[k], k);
++			memcpy(a->instr + i + __KERNEL_TEXT_OFFSET, noptable[k], k);
+ 		}
+ 	}
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ }
+ 
+ static void alternatives_smp_save(struct alt_instr *start, struct alt_instr *end)
+ {
+ 	struct alt_instr *a;
+ 
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long cr0;
++
++	pax_open_kernel(cr0);
++#endif
++
+ 	DPRINTK("%s: alt table %p-%p\n", __FUNCTION__, start, end);
+ 	for (a = start; a < end; a++) {
+ 		memcpy(a->replacement + a->replacementlen,
+-		       a->instr,
++		       a->instr + __KERNEL_TEXT_OFFSET,
+ 		       a->instrlen);
+ 	}
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ }
+ 
+ static void alternatives_smp_apply(struct alt_instr *start, struct alt_instr *end)
+ {
+ 	struct alt_instr *a;
+ 
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long cr0;
++
++	pax_open_kernel(cr0);
++#endif
++
+ 	for (a = start; a < end; a++) {
+-		memcpy(a->instr,
++		memcpy(a->instr + __KERNEL_TEXT_OFFSET,
+ 		       a->replacement + a->replacementlen,
+ 		       a->instrlen);
+ 	}
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ }
+ 
+ static void alternatives_smp_lock(u8 **start, u8 **end, u8 *text, u8 *text_end)
+ {
+-	u8 **ptr;
++	u8 *ptr;
++
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long cr0;
+ 
+-	for (ptr = start; ptr < end; ptr++) {
+-		if (*ptr < text)
++	pax_open_kernel(cr0);
++#endif
++
++	for (; start < end; start++) {
++		ptr = *start + __KERNEL_TEXT_OFFSET;
++		if (ptr < text)
+ 			continue;
+-		if (*ptr > text_end)
++		if (ptr > text_end)
+ 			continue;
+-		**ptr = 0xf0; /* lock prefix */
++		*ptr = 0xf0; /* lock prefix */
+ 	};
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ }
+ 
+ static void alternatives_smp_unlock(u8 **start, u8 **end, u8 *text, u8 *text_end)
+ {
+ 	unsigned char **noptable = find_nop_table();
+-	u8 **ptr;
++	u8 *ptr;
++
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long cr0;
++
++	pax_open_kernel(cr0);
++#endif
+ 
+-	for (ptr = start; ptr < end; ptr++) {
+-		if (*ptr < text)
++	for (; start < end; start++) {
++		ptr = *start + __KERNEL_TEXT_OFFSET;
++		if (ptr < text)
+ 			continue;
+-		if (*ptr > text_end)
++		if (ptr > text_end)
+ 			continue;
+-		**ptr = noptable[1][0];
++		*ptr = noptable[1][0];
+ 	};
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ }
+ 
+ struct smp_alt_module {
+diff -urNp linux-2.6.17.3/arch/i386/kernel/apic.c linux-2.6.17.3/arch/i386/kernel/apic.c
+--- linux-2.6.17.3/arch/i386/kernel/apic.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/apic.c	2006-07-01 14:35:29.000000000 -0400
+@@ -1176,7 +1176,7 @@ inline void smp_local_timer_interrupt(st
+ {
+ 	profile_tick(CPU_PROFILING, regs);
+ #ifdef CONFIG_SMP
+-	update_process_times(user_mode_vm(regs));
++	update_process_times(user_mode(regs));
+ #endif
+ 
+ 	/*
+diff -urNp linux-2.6.17.3/arch/i386/kernel/apm.c linux-2.6.17.3/arch/i386/kernel/apm.c
+--- linux-2.6.17.3/arch/i386/kernel/apm.c	2006-06-30 13:37:38.000000000 -0400
++++ linux-2.6.17.3/arch/i386/kernel/apm.c	2006-07-01 14:35:29.000000000 -0400
+@@ -589,9 +589,18 @@ static u8 apm_bios_call(u32 func, u32 eb
+ 	struct desc_struct	save_desc_40;
+ 	struct desc_struct	*gdt;
+ 
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long		cr0;
++#endif
++
+ 	cpus = apm_save_cpus();
+ 	
+ 	cpu = get_cpu();
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_open_kernel(cr0);
++#endif
++
+ 	gdt = get_cpu_gdt_table(cpu);
+ 	save_desc_40 = gdt[0x40 / 8];
+ 	gdt[0x40 / 8] = bad_bios_desc;
+@@ -603,6 +612,11 @@ static u8 apm_bios_call(u32 func, u32 eb
+ 	APM_DO_RESTORE_SEGS;
+ 	local_irq_restore(flags);
+ 	gdt[0x40 / 8] = save_desc_40;
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_close_kernel(cr0);
++#endif
++
+ 	put_cpu();
+ 	apm_restore_cpus(cpus);
+ 	
+@@ -633,9 +647,18 @@ static u8 apm_bios_call_simple(u32 func,
+ 	struct desc_struct	save_desc_40;
+ 	struct desc_struct	*gdt;
+ 
++#ifdef CONFIG_PAX_KERNEXEC
++	unsigned long		cr0;
++#endif
++
+ 	cpus = apm_save_cpus();
+ 	
+ 	cpu = get_cpu();
++
++#ifdef CONFIG_PAX_KERNEXEC
++	pax_open_kernel(cr0);
++#endif
++
+ 	gdt = get_cpu_gdt_table(cpu);
<<Diff was trimmed, longer than 597 lines>>


More information about the pld-cvs-commit mailing list