Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp1009192imp; Thu, 21 Feb 2019 16:22:50 -0800 (PST) X-Google-Smtp-Source: AHgI3IbHRRdUIvsovNRn98B1wU4RMiXEb9/QGG20ohyarmuavRRswV+I3BipYyN7ryqckJTX6xnt X-Received: by 2002:a63:9751:: with SMTP id d17mr1085955pgo.392.1550794970515; Thu, 21 Feb 2019 16:22:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550794970; cv=none; d=google.com; s=arc-20160816; b=ZXRqcX2RsQEIiG6W+/YtnJyEEOj+JHYvZbSC4579QCk4YCT950jlSTWGy4BGUULqhy +pl0a+oP56GtqX28iuZ/sGOrchk00upTtAmV4cBGNOtIHdCMcOf/PHhrghd9B3ct5EDz qorm/RkY+ORfNHEN4OvGD2vkaJqZn4iS2wlmNODwSKbDsvE126uL0/D6oMP+IHdMmQ+f EyGKTSUfTShePBgqIV3geCunlwPw+GnRkslk3bOfzm8Wgp3Mf0Gb3Ggr2+afV4eos5ee QAgaEOWP9xbIUg+7esYPXPr1eH9NN7MOp+7trX1uaX8BNis12ug3HLVEb90PDydlXaSw kdTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=n1prsKbkoxxdtD4zxhDoVWYDC3zm+GcNPoq5ImzQ2UA=; b=voXWvRMj5utMLXRltf9uvEJdWXZqSm/i4BdAgn4j6yVFbTXpsf2kZiIoNyn0yQXtO6 UrQGMYhnHm9cZdMHiNrIv4SJ8V6Uhs+EJCH4ZqgaqnEdm8CiKHTMbWv70OSDegMV3cm6 UL2+KFQiFxtCiCyO89nYHBtv6RRWjtZRbV/x94Q2VWEQH3J11PMOisXJ8rZdAa4lmAaq F/FLE2mauAvzIshTJVyh8DbNwY2f+9hewIchpZEJeVnY/R1lmfu9YkpNkqnRVCILlmH+ IziYf7YOTi7XcZzoLnNFjN/0bQ7NkoNLIANRDReVTMUqIyAV6m+1hg6KrMitfGOrpmpr hTTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p12si264478pgl.106.2019.02.21.16.22.34; Thu, 21 Feb 2019 16:22:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726352AbfBVAWO (ORCPT + 99 others); Thu, 21 Feb 2019 19:22:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:35128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725961AbfBVAWO (ORCPT ); Thu, 21 Feb 2019 19:22:14 -0500 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF0422080F; Fri, 22 Feb 2019 00:22:11 +0000 (UTC) Date: Thu, 21 Feb 2019 19:22:10 -0500 From: Steven Rostedt To: Rick Edgecombe Cc: Andy Lutomirski , Ingo Molnar , linux-kernel@vger.kernel.org, x86@kernel.org, hpa@zytor.com, Thomas Gleixner , Borislav Petkov , Nadav Amit , Dave Hansen , Peter Zijlstra , linux_dti@icloud.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, akpm@linux-foundation.org, kernel-hardening@lists.openwall.com, linux-mm@kvack.org, will.deacon@arm.com, ard.biesheuvel@linaro.org, kristen@linux.intel.com, deneen.t.dock@intel.com Subject: Re: [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag Message-ID: <20190221192210.3e038fc3@gandalf.local.home> In-Reply-To: <20190221234451.17632-19-rick.p.edgecombe@intel.com> References: <20190221234451.17632-1-rick.p.edgecombe@intel.com> <20190221234451.17632-19-rick.p.edgecombe@intel.com> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 21 Feb 2019 15:44:49 -0800 Rick Edgecombe wrote: > Use new flag VM_FLUSH_RESET_PERMS for handling freeing of special > permissioned memory in vmalloc and remove places where memory was set NX > and RW before freeing which is no longer needed. > > Cc: Steven Rostedt > Acked-by: Steven Rostedt (VMware) > Signed-off-by: Rick Edgecombe > --- > arch/x86/kernel/ftrace.c | 6 ++---- > 1 file changed, 2 insertions(+), 4 deletions(-) > > diff --git a/arch/x86/kernel/ftrace.c b/arch/x86/kernel/ftrace.c > index 13c8249b197f..93efe3955333 100644 > --- a/arch/x86/kernel/ftrace.c > +++ b/arch/x86/kernel/ftrace.c > @@ -692,10 +692,6 @@ static inline void *alloc_tramp(unsigned long size) > } > static inline void tramp_free(void *tramp, int size) As size is no longer used within the function, can you remove that too. Thanks, -- Steve > { > - int npages = PAGE_ALIGN(size) >> PAGE_SHIFT; > - > - set_memory_nx((unsigned long)tramp, npages); > - set_memory_rw((unsigned long)tramp, npages); > module_memfree(tramp); > } > #else > @@ -820,6 +816,8 @@ create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size) > /* ALLOC_TRAMP flags lets us know we created it */ > ops->flags |= FTRACE_OPS_FL_ALLOC_TRAMP; > > + set_vm_flush_reset_perms(trampoline); > + > /* > * Module allocation needs to be completed by making the page > * executable. The page is still writable, which is a security hazard,