Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp320185imm; Wed, 18 Jul 2018 02:43:58 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfYHQVajbF4pT82N6Sz3dAhIhlGYg9q6G4VkLEGMCQG0jHMEfsoQ72aYqRIyPcNJ2oUEbG0 X-Received: by 2002:a63:66c7:: with SMTP id a190-v6mr5022514pgc.411.1531907038261; Wed, 18 Jul 2018 02:43:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531907038; cv=none; d=google.com; s=arc-20160816; b=qNEPY2FeKLLWbo7oRIIbew0xNQNBGd2TW32wrRlRHGv04Ht38plfEfY+FWostmH5Ho BVkjy1SIlYvguZwUEwa3DF2LmFpzLShyn5Tmmm52qwDATSVs5OByggvleqFpH4nw4bXm /3XHHw++iV2e74K1brA54JBCHkQxmq+KsfIFZNBEbM37wu3EpTjWXz7d6fHtQmbJioD7 m79fuV0/RfC0PW3c+1ULZh/EfqemAdqN1JmDJ3tCmUWd4Ime9pUJarA6H8MAR2wdTrE6 Ufk9zzn9bMvaBUmWYrk8brK5S8AtvvxcYbq1G/clRZpGoC74KZFFamWbx3jTx6Hkj74z 9i7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=yudYNyn1Lxan+E5J+81h1NnRe9DFfy1ORIbUjMxHj1k=; b=K11/Pk9dqp4DBGl/DCchd5C1jnHbkyHDTmwlOllAJU6Abtc3cdhEG/2Fo7Yr24E/TW nWBS3Lb4051rvyqlo2/dYbu34KXC0BToMVMRFOlCu2FrDOh3tAQ66zBQBO1Zo66Qf0Fa PgdbUQh+SUfAM9hLKTjYA8zN3G3iOHhxWTdtKaxCW0PcNB8oKENu2uxy8AYFGzq1cIBP 7yC0lVtpfF6dg5OUrTogFmmrv8uUHOQURA4DbgwPR4efoDKAPKEtN0Im225rqNLQiGXS SMKu+hRHlX5iTDhUzF9ItGeCN+6JoJs6nNVO0XH+qoSai2ynLOcsva15pJ9U2YgV49nq QF9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail (test mode) header.i=@8bytes.org header.s=mail-1 header.b=cOlSHeNf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 2-v6si3051005ple.192.2018.07.18.02.43.43; Wed, 18 Jul 2018 02:43:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@8bytes.org header.s=mail-1 header.b=cOlSHeNf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731790AbeGRKSl (ORCPT + 99 others); Wed, 18 Jul 2018 06:18:41 -0400 Received: from 8bytes.org ([81.169.241.247]:54792 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731735AbeGRKSk (ORCPT ); Wed, 18 Jul 2018 06:18:40 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id 85DAC2099; Wed, 18 Jul 2018 11:41:23 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=8bytes.org; s=mail-1; t=1531906884; bh=dfv0Zih1QJqgNawf7FbV+BW/CZ/u7bR2eHjCpA2aoNE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cOlSHeNfP/bPXkP8PlYzUEWoC32mDdwa9aHXeZHiYC8VOy16vxj4V0UzWfSgLhXcv 70qgM1w4VaMKnAYqgqTrF54Pa5wjZrV87DMz4H2OvSxJBQFzrR6/4o653KFsHa1jAE 6C4QppUSfFYh2bZbYMmctDTdzh63TOoRj5qFBLl0ktX5M8FeWOUp5N7WkLxjATqmXH DilzCmSQnTNMZfSzdfZv74HJTYSDzAsMYyh7TMoh9VwkCcIpLe2ECl6aYFAyLnGDqH wcqgXWDoFvZwiNBAHQggF2cOiVbucW1VbNVpvEM19ShttBASv1RYFZ1DwM8tN3YbuK kqRo8G+73G5Ug== From: Joerg Roedel To: Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" Cc: x86@kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Linus Torvalds , Andy Lutomirski , Dave Hansen , Josh Poimboeuf , Juergen Gross , Peter Zijlstra , Borislav Petkov , Jiri Kosina , Boris Ostrovsky , Brian Gerst , David Laight , Denys Vlasenko , Eduardo Valentin , Greg KH , Will Deacon , aliguori@amazon.com, daniel.gruss@iaik.tugraz.at, hughd@google.com, keescook@google.com, Andrea Arcangeli , Waiman Long , Pavel Machek , "David H . Gutteridge" , jroedel@suse.de, joro@8bytes.org Subject: [PATCH 28/39] x86/mm/pti: Keep permissions when cloning kernel text in pti_clone_kernel_text() Date: Wed, 18 Jul 2018 11:41:05 +0200 Message-Id: <1531906876-13451-29-git-send-email-joro@8bytes.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1531906876-13451-1-git-send-email-joro@8bytes.org> References: <1531906876-13451-1-git-send-email-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Mapping the kernel text area to user-space makes only sense if it has the same permissions as in the kernel page-table. If permissions are different this will cause a TLB reload when using the kernel page-table, which is as good as not mapping it at all. On 64-bit kernels this patch makes no difference, as the whole range cloned by pti_clone_kernel_text() is mapped RO anyway. On 32 bit there are writeable mappings in the range, so just keep the permissions as they are. Signed-off-by: Joerg Roedel --- arch/x86/mm/pti.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/mm/pti.c b/arch/x86/mm/pti.c index 4f6e933..fc77054 100644 --- a/arch/x86/mm/pti.c +++ b/arch/x86/mm/pti.c @@ -482,7 +482,7 @@ void pti_clone_kernel_text(void) * pti_set_kernel_image_nonglobal() did to clear the * global bit. */ - pti_clone_pmds(start, end, _PAGE_RW); + pti_clone_pmds(start, end, 0); } /* -- 2.7.4