[SRU Eoan 1/2] Revert "UBUNTU: SAUCE: (efi-lockdown) Lock down kprobes"

Thadeu Lima de Souza Cascardo cascardo at canonical.com
Tue Mar 24 09:59:02 UTC 2020


BugLink: https://bugs.launchpad.net/bugs/1868626

This reverts commit 98147fbaa80ad04b6d2d90d80d7bc116d5930a5b.

Upstream lockdown support locks down kprobes only above the integrity
level. As we are moving to an integrity level on secure boot on Focal,
and there is no kprobes lockdown on Bionic too, this makes Eoan behave
like those two releases.

Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo at canonical.com>
---
 kernel/kprobes.c | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/kernel/kprobes.c b/kernel/kprobes.c
index 2cce4b714e3f..ebe8315a756a 100644
--- a/kernel/kprobes.c
+++ b/kernel/kprobes.c
@@ -1557,9 +1557,6 @@ int register_kprobe(struct kprobe *p)
 	struct module *probed_mod;
 	kprobe_opcode_t *addr;
 
-	if (kernel_is_locked_down("Use of kprobes"))
-		return -EPERM;
-
 	/* Adjust probe address from symbol */
 	addr = kprobe_addr(p);
 	if (IS_ERR(addr))
-- 
2.17.1




More information about the kernel-team mailing list