Searched hist:"80 d6b0c2eed2a504f6740cd1f5ea76dc50abfc4d" (Results 1 – 5 of 5) sorted by relevance
/linux/arch/arm/kernel/ |
H A D | machine_kexec.c | diff 80d6b0c2eed2a504f6740cd1f5ea76dc50abfc4d Thu Apr 03 22:29:50 CEST 2014 Kees Cook <keescook@chromium.org> ARM: mm: allow text and rodata sections to be read-only
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata read-only. Additionally, this splits rodata from text so that rodata can also be NX, which may lead to wasted memory when aligning to SECTION_SIZE. The read-only areas are made writable during ftrace updates and kexec.
Signed-off-by: Kees Cook <keescook@chromium.org> Tested-by: Laura Abbott <lauraa@codeaurora.org> Acked-by: Nicolas Pitre <nico@linaro.org>
|
H A D | vmlinux.lds.S | diff 80d6b0c2eed2a504f6740cd1f5ea76dc50abfc4d Thu Apr 03 22:29:50 CEST 2014 Kees Cook <keescook@chromium.org> ARM: mm: allow text and rodata sections to be read-only
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata read-only. Additionally, this splits rodata from text so that rodata can also be NX, which may lead to wasted memory when aligning to SECTION_SIZE. The read-only areas are made writable during ftrace updates and kexec.
Signed-off-by: Kees Cook <keescook@chromium.org> Tested-by: Laura Abbott <lauraa@codeaurora.org> Acked-by: Nicolas Pitre <nico@linaro.org>
|
/linux/arch/arm/include/asm/ |
H A D | cacheflush.h | diff 80d6b0c2eed2a504f6740cd1f5ea76dc50abfc4d Thu Apr 03 22:29:50 CEST 2014 Kees Cook <keescook@chromium.org> ARM: mm: allow text and rodata sections to be read-only
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata read-only. Additionally, this splits rodata from text so that rodata can also be NX, which may lead to wasted memory when aligning to SECTION_SIZE. The read-only areas are made writable during ftrace updates and kexec.
Signed-off-by: Kees Cook <keescook@chromium.org> Tested-by: Laura Abbott <lauraa@codeaurora.org> Acked-by: Nicolas Pitre <nico@linaro.org>
|
/linux/arch/arm/mm/ |
H A D | Kconfig | diff 80d6b0c2eed2a504f6740cd1f5ea76dc50abfc4d Thu Apr 03 22:29:50 CEST 2014 Kees Cook <keescook@chromium.org> ARM: mm: allow text and rodata sections to be read-only
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata read-only. Additionally, this splits rodata from text so that rodata can also be NX, which may lead to wasted memory when aligning to SECTION_SIZE. The read-only areas are made writable during ftrace updates and kexec.
Signed-off-by: Kees Cook <keescook@chromium.org> Tested-by: Laura Abbott <lauraa@codeaurora.org> Acked-by: Nicolas Pitre <nico@linaro.org>
|
H A D | init.c | diff 80d6b0c2eed2a504f6740cd1f5ea76dc50abfc4d Thu Apr 03 22:29:50 CEST 2014 Kees Cook <keescook@chromium.org> ARM: mm: allow text and rodata sections to be read-only
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata read-only. Additionally, this splits rodata from text so that rodata can also be NX, which may lead to wasted memory when aligning to SECTION_SIZE. The read-only areas are made writable during ftrace updates and kexec.
Signed-off-by: Kees Cook <keescook@chromium.org> Tested-by: Laura Abbott <lauraa@codeaurora.org> Acked-by: Nicolas Pitre <nico@linaro.org>
|