diff options
author | Suresh Siddha <suresh.b.siddha@intel.com> | 2009-10-29 03:46:56 +0100 |
---|---|---|
committer | Ingo Molnar <mingo@elte.hu> | 2009-11-02 17:16:35 +0100 |
commit | 502f660466ba7a66711ffdf414b1f7f1131dcbf7 (patch) | |
tree | 9b5ac4309f392855108365d3d17406ce3199d2eb /arch/x86/mm/init_32.c | |
parent | tracing: allow to change permissions for text with dynamic ftrace enabled (diff) | |
download | linux-502f660466ba7a66711ffdf414b1f7f1131dcbf7.tar.xz linux-502f660466ba7a66711ffdf414b1f7f1131dcbf7.zip |
x86, cpa: Fix kernel text RO checks in static_protection()
Steven Rostedt reported that we are unconditionally making the
kernel text mapping as read-only. i.e., if someone does cpa() to
the kernel text area for setting/clearing any page table
attribute, we unconditionally clear the read-write attribute for
the kernel text mapping that is set at compile time.
We should delay (to forbid the write attribute) and enforce only
after the kernel has mapped the text as read-only.
Reported-by: Steven Rostedt <rostedt@goodmis.org>
Signed-off-by: Suresh Siddha <suresh.b.siddha@intel.com>
Acked-by: Steven Rostedt <rostedt@goodmis.org>
Tested-by: Steven Rostedt <rostedt@goodmis.org>
LKML-Reference: <20091029024820.996634347@sbs-t61.sc.intel.com>
[ marked kernel_set_to_readonly as __read_mostly ]
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Diffstat (limited to 'arch/x86/mm/init_32.c')
-rw-r--r-- | arch/x86/mm/init_32.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/x86/mm/init_32.c b/arch/x86/mm/init_32.c index f64d0d5e0f89..c973f8e2a6cf 100644 --- a/arch/x86/mm/init_32.c +++ b/arch/x86/mm/init_32.c @@ -997,7 +997,7 @@ static noinline int do_test_wp_bit(void) const int rodata_test_data = 0xC3; EXPORT_SYMBOL_GPL(rodata_test_data); -static int kernel_set_to_readonly; +int kernel_set_to_readonly __read_mostly; void set_kernel_text_rw(void) { |