diff options
| author | Rick Edgecombe <rick.p.edgecombe@intel.com> | 2019-04-25 20:11:40 -0400 |
|---|---|---|
| committer | Ingo Molnar <mingo@kernel.org> | 2019-04-30 06:38:01 -0400 |
| commit | 241a1f22380646bc4d1dd18e5bc246877513da68 (patch) | |
| tree | d9aa37d237eefff927100d8a247703fd2c017a7c | |
| parent | 7fdfe1e40b225b1d163f9afed2fa3f04442dbaad (diff) | |
x86/kprobes: Use vmalloc special flag
Use new flag VM_FLUSH_RESET_PERMS for handling freeing of special
permissioned memory in vmalloc and remove places where memory was set NX
and RW before freeing which is no longer needed.
Signed-off-by: Rick Edgecombe <rick.p.edgecombe@intel.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: <akpm@linux-foundation.org>
Cc: <ard.biesheuvel@linaro.org>
Cc: <deneen.t.dock@intel.com>
Cc: <kernel-hardening@lists.openwall.com>
Cc: <kristen@linux.intel.com>
Cc: <linux_dti@icloud.com>
Cc: <will.deacon@arm.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Nadav Amit <nadav.amit@gmail.com>
Cc: Rik van Riel <riel@surriel.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Link: https://lkml.kernel.org/r/20190426001143.4983-21-namit@vmware.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
| -rw-r--r-- | arch/x86/kernel/kprobes/core.c | 7 |
1 files changed, 1 insertions, 6 deletions
diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c index 06058c44ab57..800593f4ddf7 100644 --- a/arch/x86/kernel/kprobes/core.c +++ b/arch/x86/kernel/kprobes/core.c | |||
| @@ -434,6 +434,7 @@ void *alloc_insn_page(void) | |||
| 434 | if (!page) | 434 | if (!page) |
| 435 | return NULL; | 435 | return NULL; |
| 436 | 436 | ||
| 437 | set_vm_flush_reset_perms(page); | ||
| 437 | /* | 438 | /* |
| 438 | * First make the page read-only, and only then make it executable to | 439 | * First make the page read-only, and only then make it executable to |
| 439 | * prevent it from being W+X in between. | 440 | * prevent it from being W+X in between. |
| @@ -452,12 +453,6 @@ void *alloc_insn_page(void) | |||
| 452 | /* Recover page to RW mode before releasing it */ | 453 | /* Recover page to RW mode before releasing it */ |
| 453 | void free_insn_page(void *page) | 454 | void free_insn_page(void *page) |
| 454 | { | 455 | { |
| 455 | /* | ||
| 456 | * First make the page non-executable, and only then make it writable to | ||
| 457 | * prevent it from being W+X in between. | ||
| 458 | */ | ||
| 459 | set_memory_nx((unsigned long)page, 1); | ||
| 460 | set_memory_rw((unsigned long)page, 1); | ||
| 461 | module_memfree(page); | 456 | module_memfree(page); |
| 462 | } | 457 | } |
| 463 | 458 | ||
