From 14cdd3fdc1cb2ca3b6e323cf8ba5bf5ce5c5f236 Mon Sep 17 00:00:00 2001 From: Andreas Kling Date: Wed, 1 Jan 2020 00:45:03 +0100 Subject: [PATCH] Kernel: Make module_load() and module_unload() be superuser-only These should just fail with EPERM if you're not the superuser. --- Kernel/Process.cpp | 4 ---- 1 file changed, 4 deletions(-) diff --git a/Kernel/Process.cpp b/Kernel/Process.cpp index 3eae6059a1..7954aa6f04 100644 --- a/Kernel/Process.cpp +++ b/Kernel/Process.cpp @@ -3695,10 +3695,8 @@ int Process::sys$beep() int Process::sys$module_load(const char* path, size_t path_length) { -#if 0 if (!is_superuser()) return -EPERM; -#endif if (!validate_read(path, path_length)) return -EFAULT; auto description_or_error = VFS::the().open(path, 0, 0, current_directory()); @@ -3814,10 +3812,8 @@ int Process::sys$module_load(const char* path, size_t path_length) int Process::sys$module_unload(const char* name, size_t name_length) { -#if 0 if (!is_superuser()) return -EPERM; -#endif if (!validate_read(name, name_length)) return -EFAULT;