path: root/security/lockdown/lockdown.c
diff options
authorMatthew Garrett <>2019-08-19 17:17:42 -0700
committerJames Morris <>2019-08-19 21:54:15 -0700
commit7d31f4602f8d366072471ca138e4ea7b8edf9be0 (patch)
treed6c84bb75d5972c3c2ba086f6e7179d82f36393d /security/lockdown/lockdown.c
parent9b9d8dda1ed72e9bd560ab0ca93d322a9440510e (diff)
kexec_load: Disable at runtime if the kernel is locked down
The kexec_load() syscall permits the loading and execution of arbitrary code in ring 0, which is something that lock-down is meant to prevent. It makes sense to disable kexec_load() in this situation. This does not affect kexec_file_load() syscall which can check for a signature on the image to be booted. Signed-off-by: David Howells <> Signed-off-by: Matthew Garrett <> Acked-by: Dave Young <> Reviewed-by: Kees Cook <> cc: Signed-off-by: James Morris <>
Diffstat (limited to 'security/lockdown/lockdown.c')
1 files changed, 1 insertions, 0 deletions
diff --git a/security/lockdown/lockdown.c b/security/lockdown/lockdown.c
index 240ecaa10a1d..aaf30ad351f9 100644
--- a/security/lockdown/lockdown.c
+++ b/security/lockdown/lockdown.c
@@ -20,6 +20,7 @@ static char *lockdown_reasons[LOCKDOWN_CONFIDENTIALITY_MAX+1] = {
[LOCKDOWN_NONE] = "none",
[LOCKDOWN_MODULE_SIGNATURE] = "unsigned module loading",
[LOCKDOWN_DEV_MEM] = "/dev/mem,kmem,port",
+ [LOCKDOWN_KEXEC] = "kexec of unsigned images",