On Wed, 17 Nov 2010 11:00:54 +0100, Pavel Machek said: > > - Entry points to set_kernel_text_rw() and similar need to be blockable. > > Having these symbols available make kernel memory modification trivial; > > What prevents attacker to just inlining those functions in the > exploit? Quite often, you are limited on how many bytes of exploit code you can inject. If you have to do the whole thing in (say) 139 bytes, having to inlinine even one function may make the exploit impossible to run.