|
Message-Id: <20200413153211.29876-6-levonshe@gmail.com> Date: Mon, 13 Apr 2020 18:32:11 +0300 From: Lev Olshvang <levonshe@...il.com> To: keescook@...omium.orh Cc: kernel-hardening@...ts.openwall.com, Lev Olshvang <levonshe@...il.com> Subject: [PATCH v3 5/5] Hardening : PPC book3s64: Forbid writes to read-only memory pages of a process Signed-off-by: Lev Olshvang <levonshe@...il.com> --- arch/powerpc/mm/book3s64/pkeys.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/arch/powerpc/mm/book3s64/pkeys.c b/arch/powerpc/mm/book3s64/pkeys.c index 4c537af6ab01..1199fc2bfaec 100644 --- a/arch/powerpc/mm/book3s64/pkeys.c +++ b/arch/powerpc/mm/book3s64/pkeys.c @@ -384,11 +384,6 @@ bool arch_pte_access_permitted(u64 pte, bool write, bool execute) bool arch_vma_access_permitted(struct vm_area_struct *vma, bool write, bool execute, bool foreign) { - if (unlikely(!vma_write_allowed(vma, write, execute, foreign))) { - pr_err_once("Error : PID[%d] %s writes to read only memory\n", - current->tgid, current->comm); - return false; - } if (static_branch_likely(&pkey_disabled)) return true; /* -- 2.17.1
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.