On Fri, Mar 13, 2015 at 2:38 PM, Matthew Garrett
<matthew.garr...@nebula.com> wrote:
> uswsusp allows a user process to dump and then restore kernel state, which
> makes it possible to modify the running kernel. Disable this if
> trusted_kernel is true.
>
> Signed-off-by: Matthew Garrett <matthew.garr...@nebula.com>
> ---
>  kernel/power/user.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/kernel/power/user.c b/kernel/power/user.c
> index 526e891..43b7b59 100644
> --- a/kernel/power/user.c
> +++ b/kernel/power/user.c
> @@ -24,6 +24,7 @@
>  #include <linux/console.h>
>  #include <linux/cpu.h>
>  #include <linux/freezer.h>
> +#include <linux/security.h>
>
>  #include <asm/uaccess.h>
>
> @@ -49,7 +50,7 @@ static int snapshot_open(struct inode *inode, struct file 
> *filp)
>         struct snapshot_data *data;
>         int error;
>
> -       if (!hibernation_available())
> +       if (get_trusted_kernel() || !hibernation_available())
>                 return -EPERM;
>
>         lock_system_sleep();
> --
> 2.1.0
>

Perhaps this should be folded into the hibernation_available check
instead of added as an "||" check here?

-Kees


-- 
Kees Cook
Chrome OS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to