x86: Fix alternatives and kprobes to remap write-protected kernel text
[linux-2.6.git] / arch / x86_64 / mm / init.c
index 2044fa961c0764a31e7f1b9587aa54d49ddad9b5..314e12b2209f111464dd499949bc91d806e0b095 100644 (file)
@@ -600,16 +600,6 @@ void mark_rodata_ro(void)
 {
        unsigned long start = (unsigned long)_stext, end;
 
-#ifdef CONFIG_HOTPLUG_CPU
-       /* It must still be possible to apply SMP alternatives. */
-       if (num_possible_cpus() > 1)
-               start = (unsigned long)_etext;
-#endif
-
-#ifdef CONFIG_KPROBES
-       start = (unsigned long)__start_rodata;
-#endif
-       
        end = (unsigned long)__end_rodata;
        start = (start + PAGE_SIZE - 1) & PAGE_MASK;
        end &= PAGE_MASK;