* [PATCH] disable runtime kernel replacement via kexec
@ 2018-08-16 15:31 Peter Müller
2018-08-19 18:14 ` Peter Müller
0 siblings, 1 reply; 4+ messages in thread
From: Peter Müller @ 2018-08-16 15:31 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 550 bytes --]
Signed-off-by: Peter Müller <peter.mueller(a)link38.eu>
---
config/etc/sysctl.conf | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
index 011c4287e..5735dd42e 100644
--- a/config/etc/sysctl.conf
+++ b/config/etc/sysctl.conf
@@ -48,3 +48,7 @@ kernel.kptr_restrict = 1
# Avoid kernel memory address exposures via dmesg.
kernel.dmesg_restrict = 1
+
+# Turn off kexec, even if it's built in (dangerous because
+# it can replace the running kernel).
+kernel.kexec_load_disabled = 1
--
2.16.4
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] disable runtime kernel replacement via kexec
2018-08-16 15:31 [PATCH] disable runtime kernel replacement via kexec Peter Müller
@ 2018-08-19 18:14 ` Peter Müller
2018-08-20 9:03 ` Michael Tremer
0 siblings, 1 reply; 4+ messages in thread
From: Peter Müller @ 2018-08-19 18:14 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 940 bytes --]
Hello,
please ignore this patch as it contains some errors leading
to key lookup failures in sysctl.
Sorry for the inconvenience.
Thanks, and best regards,
Peter Müller
> Signed-off-by: Peter Müller <peter.mueller(a)link38.eu>
> ---
> config/etc/sysctl.conf | 4 ++++
> 1 file changed, 4 insertions(+)
>
> diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
> index 011c4287e..5735dd42e 100644
> --- a/config/etc/sysctl.conf
> +++ b/config/etc/sysctl.conf
> @@ -48,3 +48,7 @@ kernel.kptr_restrict = 1
>
> # Avoid kernel memory address exposures via dmesg.
> kernel.dmesg_restrict = 1
> +
> +# Turn off kexec, even if it's built in (dangerous because
> +# it can replace the running kernel).
> +kernel.kexec_load_disabled = 1
>
--
Microsoft DNS service terminates abnormally when it recieves a response
to a DNS query that was never made. Fix Information: Run your DNS
service on a different platform.
-- bugtraq
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] disable runtime kernel replacement via kexec
2018-08-19 18:14 ` Peter Müller
@ 2018-08-20 9:03 ` Michael Tremer
2018-08-20 15:17 ` Peter Müller
0 siblings, 1 reply; 4+ messages in thread
From: Michael Tremer @ 2018-08-20 9:03 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1121 bytes --]
To avoid this noise on the list, please *thoroughly* test those changes before.
Although this is a trivial patch itself with only a one-line change, those
changes can have loads of implications.
Best,
-Michael
On Sun, 2018-08-19 at 20:14 +0200, Peter Müller wrote:
> Hello,
>
> please ignore this patch as it contains some errors leading
> to key lookup failures in sysctl.
>
> Sorry for the inconvenience.
>
> Thanks, and best regards,
> Peter Müller
>
> > Signed-off-by: Peter Müller <peter.mueller(a)link38.eu>
> > ---
> > config/etc/sysctl.conf | 4 ++++
> > 1 file changed, 4 insertions(+)
> >
> > diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
> > index 011c4287e..5735dd42e 100644
> > --- a/config/etc/sysctl.conf
> > +++ b/config/etc/sysctl.conf
> > @@ -48,3 +48,7 @@ kernel.kptr_restrict = 1
> >
> > # Avoid kernel memory address exposures via dmesg.
> > kernel.dmesg_restrict = 1
> > +
> > +# Turn off kexec, even if it's built in (dangerous because
> > +# it can replace the running kernel).
> > +kernel.kexec_load_disabled = 1
> >
>
>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] disable runtime kernel replacement via kexec
2018-08-20 9:03 ` Michael Tremer
@ 2018-08-20 15:17 ` Peter Müller
0 siblings, 0 replies; 4+ messages in thread
From: Peter Müller @ 2018-08-20 15:17 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 639 bytes --]
Hello Michael,
> To avoid this noise on the list, please *thoroughly* test those changes before.
I do, but this was (successfully) tested against the wrong kernel. :-\
>
> Although this is a trivial patch itself with only a one-line change, those
> changes can have loads of implications.
ACK.
Sorry for the poor quality of my patches. Promise to get better...
Best regards,
Peter Müller
>
> Best,
> -Michael
>
> [...]
--
Microsoft DNS service terminates abnormally when it recieves a response
to a DNS query that was never made. Fix Information: Run your DNS
service on a different platform.
-- bugtraq
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2018-08-20 15:17 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-08-16 15:31 [PATCH] disable runtime kernel replacement via kexec Peter Müller
2018-08-19 18:14 ` Peter Müller
2018-08-20 9:03 ` Michael Tremer
2018-08-20 15:17 ` Peter Müller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox