[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <4AA0E95F0200007800013707@vpn.id2.novell.com>
Date: Fri, 04 Sep 2009 09:18:07 +0100
From: "Jan Beulich" <JBeulich@...ell.com>
To: <mingo@...e.hu>, <tglx@...utronix.de>, <hpa@...or.com>
Cc: <linux-kernel@...r.kernel.org>
Subject: [PATCH] x86-64: correct segment permission flags in linker
script
While these don't get actively used (afaict), it still doesn't hurt for
them to properly reflect what how respective segments will get mapped/
accessed.
Signed-off-by: Jan Beulich <jbeulich@...ell.com>
---
arch/x86/kernel/vmlinux.lds.S | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--- linux-2.6.31-rc8/arch/x86/kernel/vmlinux.lds.S 2009-08-28 14:57:38.000000000 +0200
+++ 2.6.31-rc8-x86_64-segment-flags/arch/x86/kernel/vmlinux.lds.S 2009-09-03 11:39:08.000000000 +0200
@@ -45,9 +45,9 @@ PHDRS {
text PT_LOAD FLAGS(5); /* R_E */
data PT_LOAD FLAGS(7); /* RWE */
#ifdef CONFIG_X86_64
- user PT_LOAD FLAGS(7); /* RWE */
+ user PT_LOAD FLAGS(5); /* R_E */
#ifdef CONFIG_SMP
- percpu PT_LOAD FLAGS(7); /* RWE */
+ percpu PT_LOAD FLAGS(6); /* RW_ */
#endif
init PT_LOAD FLAGS(7); /* RWE */
#endif
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists