lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 4 Dec 2015 22:54:43 +0100 (CET) From: Jiri Kosina <jikos@...nel.org> To: Josh Poimboeuf <jpoimboe@...hat.com> cc: Seth Jennings <sjenning@...hat.com>, Vojtech Pavlik <vojtech@...e.com>, linux-kernel@...r.kernel.org, live-patching@...r.kernel.org, Rusty Russell <rusty@...tcorp.com.au>, Miroslav Benes <mbenes@...e.cz> Subject: Re: [PATCH v4] livepatch: Cleanup module page permission changes On Thu, 3 Dec 2015, Josh Poimboeuf wrote: > Calling set_memory_rw() and set_memory_ro() for every iteration of the > loop in klp_write_object_relocations() is messy, inefficient, and > error-prone. > > Change all the read-only pages to read-write before the loop and convert > them back to read-only again afterwards. > > Suggested-by: Miroslav Benes <mbenes@...e.cz> > Signed-off-by: Josh Poimboeuf <jpoimboe@...hat.com> > --- > Based on the following branches: > - git://git.kernel.org/pub/scm/linux/kernel/git/jikos/livepatching.git for-4.5/core > - git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux.git modules-next > > - v4: rebase onto Chris's sympos changes > - v3: use new module_{disable,enable}_ro() functions (in linux-next) Merged together with patches from Rusty's modules-next and applied to for-4.5/core. Thanks, -- Jiri Kosina SUSE Labs -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists