|
Message-Id: <20170510174441.26163-1-danielmicay@gmail.com> Date: Wed, 10 May 2017 13:44:41 -0400 From: Daniel Micay <danielmicay@...il.com> To: Andrew Morton <akpm@...ux-foundation.org>, linux-mm@...ck.org Cc: Kees Cook <keescook@...omium.org>, kernel-hardening@...ts.openwall.com, Daniel Micay <danielmicay@...il.com> Subject: [PATCH] mark protection_map as __ro_after_init The protection map is only modified by per-arch init code so it can be protected from writes after the init code runs. This change was extracted from PaX where it's part of KERNEXEC. Signed-off-by: Daniel Micay <danielmicay@...il.com> --- mm/mmap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/mmap.c b/mm/mmap.c index f82741e199c0..3bd5ecd20d4d 100644 --- a/mm/mmap.c +++ b/mm/mmap.c @@ -94,7 +94,7 @@ static void unmap_region(struct mm_struct *mm, * w: (no) no * x: (yes) yes */ -pgprot_t protection_map[16] = { +pgprot_t protection_map[16] __ro_after_init = { __P000, __P001, __P010, __P011, __P100, __P101, __P110, __P111, __S000, __S001, __S010, __S011, __S100, __S101, __S110, __S111 }; -- 2.12.2
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.