Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4070159imu; Mon, 28 Jan 2019 16:42:01 -0800 (PST) X-Google-Smtp-Source: ALg8bN6T7BELpYSceplZ/wgFEimqjiVZhRtq7IeCpr3EMPBytxIvwIhK1B+EoUTmMRdCdGSadVDt X-Received: by 2002:a17:902:b118:: with SMTP id q24mr24241551plr.209.1548722521541; Mon, 28 Jan 2019 16:42:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548722521; cv=none; d=google.com; s=arc-20160816; b=NOzjrcvoiQmzeqWtdo4TBY+W28fnTQ7OpmUvSrym95+XP/cOg+JVO0XDfuoWz0eFwC XCG8scU+s5P/3bCOVAVpt9bpj247vR2DTmXhbmRUqKO9rPBxjpvKDXn0CpT6f0BNu0/M 6vjAXsAM/p9nuFXZJuFwyLLmhLwEjZ5mjmi/XnzIL2Hb/364oNsul9qFQE0q7YMjiqh2 bALJf8iqKnbD+mYMckw9c8zWoMlRpOUrm3SccKVbVWz75/Zsj8Fva9uDmomSSEBA3J/W BCnjJyvYvq7GF2lii0Mrm9MbKTdMe6jtBjpeRMMVysZ7VDU82mS+yDMQ3AVKAcNMVKJ+ vupA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=f0ndo1Xal1a6v/4PjrGdAuv0FcoU8GzPJ1j2wQZwxYY=; b=A+OGMxBpfXD9g/6avSf2cuebfnbQdakfh/+UO0DMcOaKs3gpeulqRRXnAwRN4+g2wl OPEplwb8AQEXhiU34OrSYDtgEhIfOVwb8a/UYg2nXDKNKm/1U1Nrq7pW6qzAWEPMmBv4 WcQqKE7lviXjoy8BqI9PgZhfakgOF6ZN8i3UEoH/JShI2K5gshlQwXuTj7W+agt+RHZo FReXIvbS1ZxvMsA8oQ0jnzytW+3inbrIbm/0QKOLRJIiseMrQU0AzLCjCaQG+GqPVb96 rXJ2eAtpJ10RhE1AQ9YildC8FdDwyQvlBpv5gpv8ed9YoBpgT5MQUNE6hNcETs3Hckny pE+w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t3si34332311pgl.108.2019.01.28.16.41.45; Mon, 28 Jan 2019 16:42:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728044AbfA2Aj6 (ORCPT + 99 others); Mon, 28 Jan 2019 19:39:58 -0500 Received: from mga06.intel.com ([134.134.136.31]:5088 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727664AbfA2AjW (ORCPT ); Mon, 28 Jan 2019 19:39:22 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Jan 2019 16:39:12 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,535,1539673200"; d="scan'208";a="133921942" Received: from rpedgeco-desk5.jf.intel.com ([10.54.75.79]) by orsmga001.jf.intel.com with ESMTP; 28 Jan 2019 16:39:12 -0800 From: Rick Edgecombe To: Andy Lutomirski , Ingo Molnar Cc: linux-kernel@vger.kernel.org, x86@kernel.org, hpa@zytor.com, Thomas Gleixner , Borislav Petkov , Nadav Amit , Dave Hansen , Peter Zijlstra , linux_dti@icloud.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, akpm@linux-foundation.org, kernel-hardening@lists.openwall.com, linux-mm@kvack.org, will.deacon@arm.com, ard.biesheuvel@linaro.org, kristen@linux.intel.com, deneen.t.dock@intel.com, Rick Edgecombe , Masami Hiramatsu Subject: [PATCH v2 19/20] x86/kprobes: Use vmalloc special flag Date: Mon, 28 Jan 2019 16:34:21 -0800 Message-Id: <20190129003422.9328-20-rick.p.edgecombe@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190129003422.9328-1-rick.p.edgecombe@intel.com> References: <20190129003422.9328-1-rick.p.edgecombe@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Use new flag VM_HAS_SPECIAL_PERMS for handling freeing of special permissioned memory in vmalloc and remove places where memory was set NX and RW before freeing which is no longer needed. Cc: Masami Hiramatsu Signed-off-by: Rick Edgecombe --- arch/x86/kernel/kprobes/core.c | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c index fac692e36833..f2fab35bcb82 100644 --- a/arch/x86/kernel/kprobes/core.c +++ b/arch/x86/kernel/kprobes/core.c @@ -434,6 +434,7 @@ void *alloc_insn_page(void) if (page == NULL) return NULL; + set_vm_special(page); /* * First make the page read-only, and then only then make it executable * to prevent it from being W+X in between. @@ -452,12 +453,6 @@ void *alloc_insn_page(void) /* Recover page to RW mode before releasing it */ void free_insn_page(void *page) { - /* - * First make the page non-executable, and then only then make it - * writable to prevent it from being W+X in between. - */ - set_memory_nx((unsigned long)page, 1); - set_memory_rw((unsigned long)page, 1); module_memfree(page); } -- 2.17.1