[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20140814174652.GA2045@www.outflux.net>
Date: Thu, 14 Aug 2014 10:46:52 -0700
From: Kees Cook <keescook@...omium.org>
To: Russell King - ARM Linux <linux@....linux.org.uk>
Cc: linux-arm-kernel@...r.kernel.org, linux-kernel@...r.kernel.org,
Doug Anderson <dianders@...omium.org>,
Mark Salter <msalter@...hat.com>,
Nicolas Pitre <nico@...aro.org>,
Nikolay Borisov <Nikolay.Borisov@....com>,
Rabin Vincent <rabin@....in>, Rob Herring <robh@...nel.org>,
Will Deacon <will.deacon@....com>,
Laura Abbott <lauraa@...eaurora.org>
Subject: [PULL] ronx update (3.18)
Hi Russel,
Once the merge window for 3.17 closes, could you please pull these ARM
fixmap and RO/NX changes for 3.18?
Thanks!
-Kees
The following changes since commit e57e41931134e09fc6c03c8d4eb19d516cc6e59b:
ARM: wire up memfd_create syscall (2014-08-09 14:07:59 +0100)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/ronx-3.18
for you to fetch changes up to 41fc56ee0a0ea765236d86818523be55bca1eee2:
ARM: mm: allow text and rodata sections to be read-only (2014-08-14 10:36:36 -0700)
----------------------------------------------------------------
This is a series of patches to support CONFIG_RODATA on ARM, so that
the kernel text is RO, and non-text sections default to NX. To support
on-the-fly kernel text patching (via ftrace, kprobes, etc), fixmap
support has been finalized based on several versions of various patches
that are floating around on the mailing list. This series attempts to
include the least intrusive version, so that others can build on it for
future fixmap work.
The series has been heavily tested, and appears to be working correctly:
With CONFIG_ARM_PTDUMP, expected page table permissions are seen in
/sys/kernel/debug/kernel_page_tables.
Using CONFIG_LKDTM, the kernel now correctly detects bad accesses for
for the following lkdtm tests via /sys/kernel/debug/provoke-crash/DIRECT:
EXEC_DATA
WRITE_RO
WRITE_KERN
ftrace works:
CONFIG_FTRACE_STARTUP_TEST passes
Enabling tracing works:
echo function > /sys/kernel/debug/tracing/current_tracer
kprobes works:
CONFIG_ARM_KPROBES_TEST passes
kexec works:
kexec will load and start a new kernel
Built with and without CONFIG_HIGHMEM, CONFIG_HIGHMEM_DEBUG, and
CONFIG_NR_CPUS=32.
Thanks to everyone who has been testing this series and working on its
various pieces!
----------------------------------------------------------------
Doug Anderson (1):
arm: kgdb: Handle read-only text / modules
Kees Cook (3):
arm: fixmap: implement __set_fixmap()
ARM: mm: allow non-text sections to be non-executable
ARM: mm: allow text and rodata sections to be read-only
Mark Salter (1):
arm: use generic fixmap.h
Nikolay Borisov (1):
ARM: kexec: Make .text R/W in machine_kexec
Rabin Vincent (1):
arm: use fixmap for text patching when text is RO
Rob Herring (1):
ARM: expand fixmap region to 3MB
Documentation/arm/memory.txt | 2 +-
arch/arm/include/asm/cacheflush.h | 10 +++
arch/arm/include/asm/fixmap.h | 31 ++++----
arch/arm/kernel/Makefile | 2 +-
arch/arm/kernel/ftrace.c | 19 +++++
arch/arm/kernel/jump_label.c | 2 +-
arch/arm/kernel/kgdb.c | 29 +++++++
arch/arm/kernel/machine_kexec.c | 9 ++-
arch/arm/kernel/patch.c | 79 +++++++++++++++++--
arch/arm/kernel/patch.h | 12 ++-
arch/arm/kernel/vmlinux.lds.S | 20 +++++
arch/arm/mm/Kconfig | 21 ++++++
arch/arm/mm/highmem.c | 15 ++--
arch/arm/mm/init.c | 154 +++++++++++++++++++++++++++++++++++++-
arch/arm/mm/mmu.c | 38 +++++++++-
15 files changed, 399 insertions(+), 44 deletions(-)
--
Kees Cook
Chrome OS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists