public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] disable runtime kernel replacement via kexec
@ 2018-08-16 15:31 Peter Müller
  2018-08-19 18:14 ` Peter Müller
  0 siblings, 1 reply; 4+ messages in thread
From: Peter Müller @ 2018-08-16 15:31 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 550 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)link38.eu>
---
 config/etc/sysctl.conf | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
index 011c4287e..5735dd42e 100644
--- a/config/etc/sysctl.conf
+++ b/config/etc/sysctl.conf
@@ -48,3 +48,7 @@ kernel.kptr_restrict = 1
 
 # Avoid kernel memory address exposures via dmesg.
 kernel.dmesg_restrict = 1
+
+# Turn off kexec, even if it's built in (dangerous because
+# it can replace the running kernel).
+kernel.kexec_load_disabled = 1
-- 
2.16.4


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] disable runtime kernel replacement via kexec
  2018-08-16 15:31 [PATCH] disable runtime kernel replacement via kexec Peter Müller
@ 2018-08-19 18:14 ` Peter Müller
  2018-08-20  9:03   ` Michael Tremer
  0 siblings, 1 reply; 4+ messages in thread
From: Peter Müller @ 2018-08-19 18:14 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 940 bytes --]

Hello,

please ignore this patch as it contains some errors leading
to key lookup failures in sysctl.

Sorry for the inconvenience.

Thanks, and best regards,
Peter Müller

> Signed-off-by: Peter Müller <peter.mueller(a)link38.eu>
> ---
>  config/etc/sysctl.conf | 4 ++++
>  1 file changed, 4 insertions(+)
> 
> diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
> index 011c4287e..5735dd42e 100644
> --- a/config/etc/sysctl.conf
> +++ b/config/etc/sysctl.conf
> @@ -48,3 +48,7 @@ kernel.kptr_restrict = 1
>  
>  # Avoid kernel memory address exposures via dmesg.
>  kernel.dmesg_restrict = 1
> +
> +# Turn off kexec, even if it's built in (dangerous because
> +# it can replace the running kernel).
> +kernel.kexec_load_disabled = 1
> 

-- 
Microsoft DNS service terminates abnormally when it recieves a response
to a DNS query that was never made.  Fix Information: Run your DNS
service on a different platform.
		-- bugtraq


[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] disable runtime kernel replacement via kexec
  2018-08-19 18:14 ` Peter Müller
@ 2018-08-20  9:03   ` Michael Tremer
  2018-08-20 15:17     ` Peter Müller
  0 siblings, 1 reply; 4+ messages in thread
From: Michael Tremer @ 2018-08-20  9:03 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1121 bytes --]

To avoid this noise on the list, please *thoroughly* test those changes before.

Although this is a trivial patch itself with only a one-line change, those
changes can have loads of implications.

Best,
-Michael

On Sun, 2018-08-19 at 20:14 +0200, Peter Müller wrote:
> Hello,
> 
> please ignore this patch as it contains some errors leading
> to key lookup failures in sysctl.
> 
> Sorry for the inconvenience.
> 
> Thanks, and best regards,
> Peter Müller
> 
> > Signed-off-by: Peter Müller <peter.mueller(a)link38.eu>
> > ---
> >  config/etc/sysctl.conf | 4 ++++
> >  1 file changed, 4 insertions(+)
> > 
> > diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
> > index 011c4287e..5735dd42e 100644
> > --- a/config/etc/sysctl.conf
> > +++ b/config/etc/sysctl.conf
> > @@ -48,3 +48,7 @@ kernel.kptr_restrict = 1
> >  
> >  # Avoid kernel memory address exposures via dmesg.
> >  kernel.dmesg_restrict = 1
> > +
> > +# Turn off kexec, even if it's built in (dangerous because
> > +# it can replace the running kernel).
> > +kernel.kexec_load_disabled = 1
> > 
> 
> 


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] disable runtime kernel replacement via kexec
  2018-08-20  9:03   ` Michael Tremer
@ 2018-08-20 15:17     ` Peter Müller
  0 siblings, 0 replies; 4+ messages in thread
From: Peter Müller @ 2018-08-20 15:17 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 639 bytes --]

Hello Michael,

> To avoid this noise on the list, please *thoroughly* test those changes before.
I do, but this was (successfully) tested against the wrong kernel. :-\
>
> Although this is a trivial patch itself with only a one-line change, those
> changes can have loads of implications.
ACK.

Sorry for the poor quality of my patches. Promise to get better...

Best regards,
Peter Müller
>
> Best,
> -Michael
>
> [...]
-- 
Microsoft DNS service terminates abnormally when it recieves a response
to a DNS query that was never made.  Fix Information: Run your DNS
service on a different platform.
		-- bugtraq



[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2018-08-20 15:17 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-08-16 15:31 [PATCH] disable runtime kernel replacement via kexec Peter Müller
2018-08-19 18:14 ` Peter Müller
2018-08-20  9:03   ` Michael Tremer
2018-08-20 15:17     ` Peter Müller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox