|
Message-Id: <20200413153211.29876-5-levonshe@gmail.com> Date: Mon, 13 Apr 2020 18:32:10 +0300 From: Lev Olshvang <levonshe@...il.com> To: keescook@...omium.orh Cc: kernel-hardening@...ts.openwall.com, Lev Olshvang <levonshe@...il.com> Subject: [PATCH v3 4/5] Hardening unicore32: Forbid writes to read-only memory pages of a process Signed-off-by: Lev Olshvang <levonshe@...il.com> --- arch/unicore32/include/asm/mmu_context.h | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/arch/unicore32/include/asm/mmu_context.h b/arch/unicore32/include/asm/mmu_context.h index 50961d4b4951..388c0c811c68 100644 --- a/arch/unicore32/include/asm/mmu_context.h +++ b/arch/unicore32/include/asm/mmu_context.h @@ -93,11 +93,6 @@ static inline bool arch_vma_access_permitted(struct vm_area_struct *vma, bool write, bool execute, bool foreign) { /* by default, allow everything */ - if (likely(vma_write_allowed(vma, write, execute, foreign))) - return true; - - pr_err_once("Error : PID[%d] %s writes to read only memory\n", - current->tgid, current->comm); - return false; + return true; } #endif -- 2.17.1
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.