Searched hist:"8 ec53663d2698076468b3e1edc4e1b418bd54de3" (Results 1 – 6 of 6) sorted by relevance
/linux/arch/arm/kernel/ |
H A D | elf.c | 8ec53663d2698076468b3e1edc4e1b418bd54de3 Sun Sep 07 18:16:54 CEST 2008 Russell King <rmk@dyn-67.arm.linux.org.uk> [ARM] Improve non-executable support
Add support for detecting non-executable stack binaries, and adjust permissions to prevent execution from data and stack areas. Also, ensure that READ_IMPLIES_EXEC is enabled for older CPUs where that is true, and for any executable-stack binary.
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
|
H A D | module.c | diff 8ec53663d2698076468b3e1edc4e1b418bd54de3 Sun Sep 07 18:16:54 CEST 2008 Russell King <rmk@dyn-67.arm.linux.org.uk> [ARM] Improve non-executable support
Add support for detecting non-executable stack binaries, and adjust permissions to prevent execution from data and stack areas. Also, ensure that READ_IMPLIES_EXEC is enabled for older CPUs where that is true, and for any executable-stack binary.
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
|
H A D | Makefile | diff 8ec53663d2698076468b3e1edc4e1b418bd54de3 Sun Sep 07 18:16:54 CEST 2008 Russell King <rmk@dyn-67.arm.linux.org.uk> [ARM] Improve non-executable support
Add support for detecting non-executable stack binaries, and adjust permissions to prevent execution from data and stack areas. Also, ensure that READ_IMPLIES_EXEC is enabled for older CPUs where that is true, and for any executable-stack binary.
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
|
/linux/arch/arm/include/asm/ |
H A D | elf.h | diff 8ec53663d2698076468b3e1edc4e1b418bd54de3 Sun Sep 07 18:16:54 CEST 2008 Russell King <rmk@dyn-67.arm.linux.org.uk> [ARM] Improve non-executable support
Add support for detecting non-executable stack binaries, and adjust permissions to prevent execution from data and stack areas. Also, ensure that READ_IMPLIES_EXEC is enabled for older CPUs where that is true, and for any executable-stack binary.
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
|
H A D | processor.h | diff 794baba637999b81aa40e60fae1fa91978e08808 Fri Dec 05 03:25:47 CET 2008 Lennert Buytenhek <buytenh@wantstofly.org> [ARM] 5340/1: fix stack placement after noexecstack changes
Commit 8ec53663d2698076468b3e1edc4e1b418bd54de3 ("[ARM] Improve non-executable support") added support for detecting non-executable stack binaries. One of the things it does is to make READ_IMPLIES_EXEC be set in ->personality if we are running on a CPU that doesn't support the XN ("Execute Never") page table bit or if we are running a binary that needs an executable stack.
This exposed a latent bug in ARM's asm/processor.h due to which we'll end up placing the stack at a very low address, where it will bump into the heap on any application that uses significant amount of stack or heap or both, causing many interesting crashes.
Fix this by testing the ADDR_LIMIT_32BIT bit in ->personality instead of testing for equality against PER_LINUX_32BIT.
Reviewed-by: Nicolas Pitre <nico@marvell.com>
Signed-off-by: Lennert Buytenhek <buytenh@marvell.com> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
|
H A D | pgtable.h | diff 8ec53663d2698076468b3e1edc4e1b418bd54de3 Sun Sep 07 18:16:54 CEST 2008 Russell King <rmk@dyn-67.arm.linux.org.uk> [ARM] Improve non-executable support
Add support for detecting non-executable stack binaries, and adjust permissions to prevent execution from data and stack areas. Also, ensure that READ_IMPLIES_EXEC is enabled for older CPUs where that is true, and for any executable-stack binary.
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
|