[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 6/8] x86/boot: Adjust .text/.rodata/etc permissions in one place


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 2 Dec 2021 13:15:00 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oVtE6UF9HP/6aSuHtY3p01RV6M7y4FaPNq6PT45yM4c=; b=FwWhKH2sDanJrOW2zQIqrEbDoN9SMmkfXux/WR6efgwvuECJWwsQTiaeIvXk9bZjJcW+4RkfpWTifz/SRgoMErFW0d9vUbtpaz15TxydSDVTmSKeTIamHRNDsAgTXqYtIHda/DAj74te229TXoqD4aJ3yVDZAQYPyIXZDA4aWIhvwiyofZNreKgpH/8bZQDb4P1Jx4SuBN6d7078xnZAgfHyL4zd7/m6AWERxsOcjkslI5t73F6TFtMsmp2LCo8HRb4z6bYQAEoreehD8+zi8SfoCg+smtegWq2QlskyzBxd2UR+gdGD6H3zTpMtOGlBb1Yapb5FVTPinglfe6Sb1Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LEDWWyoHr32Shu3wLHMmgNJtJbB7n+KSu3CMysbrYbxFC0WB/7YTheUZFdW8ATaEE9Z+LtVRVmchviIg6tk45TnU8ePJTAG3WE1KtxskxiT/q0P8izMJS/ia70ZyN09TIpbWuB5yix06aargTv6l873PBrh74gwp0WasyZidKi0a9ulbIX7gvbCE6wc9/j8SEPC0m2Q7gyMrShYQpFS/3BvJduY7NIkPVDduppHcs4tA6NkW1IlH2atpBx6vuiUOqMwLXl1pMw8lnJYqQC/UmTAwz6zZLCWRgljjq9HRUpcv2W/Le2e6gLVHa/8jw4fyYgGcYBj+v67ypwLr9E5Kuw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 02 Dec 2021 12:15:26 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 30.11.2021 11:04, Andrew Cooper wrote:
> At the moment, we have two locations selecting restricted permissions, not
> very far apart on boot, dependent on opposite answers from using_2M_mapping().
> The later location however can shatter superpages if needed, while the former
> cannot.
> 
> Collect together all the permission adjustments at the slightly later point in
> boot, as we're may need to shatter a superpage to support __ro_after_init.
> 
> No functional change.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

Again with the understanding that this doesn't really depend on patch 4:
Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.