Received: by 10.192.165.148 with SMTP id m20csp3582857imm; Mon, 23 Apr 2018 08:54:46 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/Nr2cweLkT69RO/ZQClThw3zOJtjvoPVUukN3ieuJwCaD1eZB94YwyCr3AgEZuqWsE4wsV X-Received: by 2002:a17:902:5602:: with SMTP id h2-v6mr18553960pli.115.1524498886711; Mon, 23 Apr 2018 08:54:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524498886; cv=none; d=google.com; s=arc-20160816; b=0gKQFvFMHl8BOMFb5PnhB5C6OtVbgYea3XugWaTqiuEtBCzFdbEq5UiK7oO3Q+BMGV YGxmAU1CA92ewdtC0XIFQLKKRDIabt3jBfdtix7kIX5dHMibxQQe+dIbzEgGPJgHFX9m wYfOt6hfk1j+4IB+OEhftrQU899JJIBxLt31Rt98dC4iahcpuqXiF2FqwAD/bA0Fi4Un wDgus71FB2XX3zOwumLmYhudZcRdvrZ+Lrq9GDnDxTOWpyqH6m8TOJ7kkUeemqxR66di ZG2+qMKElkk/sPSyhT5hhA9w0un7ovPcp5vrrL/8pbNqtMPycVA8kcWVtsMwV+Oo4yoC oaqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=AkL2T1gFHrvbc/GzjpwIwKONVsdxG+I5UvQKry0B44A=; b=R40rnpx2SqhAbkq4sQEtHCueb9qwcTRYsPaSIhJ1e9+MX/n71KOq+mBAhaXx+szhe4 yjGmv6ezfMPWr2BrVt2iPhZ1CXU8GVk9D/oDrTt8Rj0vrZJGDEfnyqLjx5TvHFgpwxV0 f+17Mcw/GUWa+IvHHBHNFoWlXD1iB3Ul/0AUbqrNvIlAatI86FM0QuXk9IemZGllVLxE iM0ktpWm76KrK3VXrl84YGwloikgr+Yb3n6i2pK5XSf8kI+P2lAu0rd0er67LpdHi5VO gIZDkTCkEIMSsmUGwECMuNnwum4E19IrUhxij0hpQq4NpYQXyM90JdI/MIzJ5zwp0I/H u8Vw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail (test mode) header.i=@8bytes.org header.s=mail-1 header.b=g7eBR9dz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 189si9636031pgc.616.2018.04.23.08.54.32; Mon, 23 Apr 2018 08:54:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@8bytes.org header.s=mail-1 header.b=g7eBR9dz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932192AbeDWPw2 (ORCPT + 99 others); Mon, 23 Apr 2018 11:52:28 -0400 Received: from 8bytes.org ([81.169.241.247]:60874 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755791AbeDWPr5 (ORCPT ); Mon, 23 Apr 2018 11:47:57 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id AA0E6A62; Mon, 23 Apr 2018 17:47:47 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=8bytes.org; s=mail-1; t=1524498467; bh=k4jlcbtnfN6ZuNdBBqFZbxTQCMybftnVc9qNMChfKI0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=g7eBR9dzmST54oNWrZrvKvmcMZSl7RErSgN5r1kTaBK27IRp7dp4+H2UImQSeAtIq UB80C3g7gvZpxVhbbEe+gsXy6sxeANSKmHTyIVFKsQYYssQFlKYMBy39fyPNa1YiWE X+bXi7MPCUJKhooAF1J15SiOIfV85JV8L1KRVz7oMnJxXRumtlIxFPbaHV/hMpFnr8 whEvdbxrwYIEAsy25Miv5p0N2cXBrYx4PfwXc38erjm6VhcgXQLQSbC3FeaO4mswmL EfYosm8jspbc9nJRb1G59mnbjLionQ6vsHczTaIY2MazSlitPUp+OeoXs5b7jy9cvi hWALbI3LwgzFg== From: Joerg Roedel To: Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" Cc: x86@kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Linus Torvalds , Andy Lutomirski , Dave Hansen , Josh Poimboeuf , Juergen Gross , Peter Zijlstra , Borislav Petkov , Jiri Kosina , Boris Ostrovsky , Brian Gerst , David Laight , Denys Vlasenko , Eduardo Valentin , Greg KH , Will Deacon , aliguori@amazon.com, daniel.gruss@iaik.tugraz.at, hughd@google.com, keescook@google.com, Andrea Arcangeli , Waiman Long , Pavel Machek , "David H . Gutteridge" , jroedel@suse.de, joro@8bytes.org Subject: [PATCH 27/37] x86/mm/pti: Keep permissions when cloning kernel text in pti_clone_kernel_text() Date: Mon, 23 Apr 2018 17:47:30 +0200 Message-Id: <1524498460-25530-28-git-send-email-joro@8bytes.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1524498460-25530-1-git-send-email-joro@8bytes.org> References: <1524498460-25530-1-git-send-email-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Mapping the kernel text area to user-space makes only sense if it has the same permissions as in the kernel page-table. If permissions are different this will cause a TLB reload when using the kernel page-table, which is as good as not mapping it at all. On 64-bit kernels this patch makes no difference, as the whole range cloned by pti_clone_kernel_text() is mapped RO anyway. On 32 bit there are writeable mappings in the range, so just keep the permissions as they are. Signed-off-by: Joerg Roedel --- arch/x86/mm/pti.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/mm/pti.c b/arch/x86/mm/pti.c index 9cceae3..e3059bb0 100644 --- a/arch/x86/mm/pti.c +++ b/arch/x86/mm/pti.c @@ -460,7 +460,7 @@ void pti_clone_kernel_text(void) if (!pti_kernel_image_global_ok()) return; - pti_clone_pmds(start, end, _PAGE_RW); + pti_clone_pmds(start, end, 0); } /* -- 2.7.4