Re: [PATCH 09/17] x86/kprobes: Instruction pages initialization enhancements

2019-01-16 Thread Masami Hiramatsu
On Wed, 16 Jan 2019 16:32:51 -0800 Rick Edgecombe wrote: > From: Nadav Amit > > This patch is a preparatory patch for a following patch that makes > module allocated pages non-executable. The patch sets the page as > executable after allocation. > > In the future, we may get better protection

[PATCH 09/17] x86/kprobes: Instruction pages initialization enhancements

2019-01-16 Thread Rick Edgecombe
From: Nadav Amit This patch is a preparatory patch for a following patch that makes module allocated pages non-executable. The patch sets the page as executable after allocation. In the future, we may get better protection of executables. For example, by using hypercalls to request the hyperviso