Home
last modified time | relevance | path

Searched hist:"853 fe1bf7554155376bb3b231112cdff9ff79177" (Results 1 – 3 of 3) sorted by relevance

/linux/drivers/cdrom/
H A Dgdrom.cdiff 853fe1bf7554155376bb3b231112cdff9ff79177 Tue Feb 14 01:25:26 CET 2017 Kees Cook <keescook@chromium.org> cdrom: Make device operations read-only

Since function tables are a common target for attackers, it's best to keep
them in read-only memory. As such, this makes the CDROM device ops tables
const. This drops additionally n_minors, since it isn't used meaningfully,
and sets the only user of cdrom_dummy_generic_packet explicitly so the
variables can all be const.

Inspired by similar changes in grsecurity/PaX.

Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Jens Axboe <axboe@fb.com>
H A Dcdrom.cdiff 853fe1bf7554155376bb3b231112cdff9ff79177 Tue Feb 14 01:25:26 CET 2017 Kees Cook <keescook@chromium.org> cdrom: Make device operations read-only

Since function tables are a common target for attackers, it's best to keep
them in read-only memory. As such, this makes the CDROM device ops tables
const. This drops additionally n_minors, since it isn't used meaningfully,
and sets the only user of cdrom_dummy_generic_packet explicitly so the
variables can all be const.

Inspired by similar changes in grsecurity/PaX.

Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Jens Axboe <axboe@fb.com>
/linux/drivers/scsi/
H A Dsr.cdiff 853fe1bf7554155376bb3b231112cdff9ff79177 Tue Feb 14 01:25:26 CET 2017 Kees Cook <keescook@chromium.org> cdrom: Make device operations read-only

Since function tables are a common target for attackers, it's best to keep
them in read-only memory. As such, this makes the CDROM device ops tables
const. This drops additionally n_minors, since it isn't used meaningfully,
and sets the only user of cdrom_dummy_generic_packet explicitly so the
variables can all be const.

Inspired by similar changes in grsecurity/PaX.

Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Jens Axboe <axboe@fb.com>