[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1513356888-7517-1-git-send-email-aleksandar.markovic@rt-rk.com>
Date: Fri, 15 Dec 2017 17:54:46 +0100
From: Aleksandar Markovic <aleksandar.markovic@...rk.com>
To: linux-mips@...ux-mips.org
Cc: Miodrag Dinic <miodrag.dinic@...s.com>,
Aleksandar Markovic <aleksandar.markovic@...s.com>,
Christoffer Dall <cdall@...aro.org>,
Dengcheng Zhu <dengcheng.zhu@...s.com>,
Ding Tianhong <dingtianhong@...wei.com>,
Douglas Leung <douglas.leung@...s.com>,
Frederic Weisbecker <frederic@...nel.org>,
Goran Ferenc <goran.ferenc@...s.com>,
Ingo Molnar <mingo@...nel.org>,
James Cowgill <James.Cowgill@...tec.com>,
James Hogan <james.hogan@...s.com>,
James Hogan <jhogan@...nel.org>,
Jonathan Corbet <corbet@....net>,
"Levin, Alexander (Sasha Levin)" <alexander.levin@...izon.com>,
linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org,
Marc Zyngier <marc.zyngier@....com>,
Matt Redfearn <matt.redfearn@...s.com>,
Mimi Zohar <zohar@...ux.vnet.ibm.com>,
Paul Burton <paul.burton@...s.com>,
"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
Petar Jovanovic <petar.jovanovic@...s.com>,
Raghu Gandham <raghu.gandham@...s.com>,
Ralf Baechle <ralf@...ux-mips.org>,
Thomas Gleixner <tglx@...utronix.de>,
Tom Saeger <tom.saeger@...cle.com>
Subject: [PATCH v4] MIPS: Add noexec=on|off kernel parameter
From: Miodrag Dinic <miodrag.dinic@...s.com>
Add a new kernel parameter to override the default behavior related
to the decision whether to set up stack as non-executable in function
mips_elf_read_implies_exec().
The new parameter is used to control non executable stack and heap,
regardless of PT_GNU_STACK entry or CPU RIXI support.
Allowed values:
noexec=on Force non-exec stack & heap
noexec=off Force executable stack & heap
If this parameter is omitted, kernel behavior remains the same as it
was before this patch is applied.
This functionality is convenient during debugging and is especially
useful for Android development where non-exec stack is required.
Signed-off-by: Miodrag Dinic <miodrag.dinic@...s.com>
Signed-off-by: Aleksandar Markovic <aleksandar.markovic@...s.com>
---
Parameter name was changed from "nonxstack" to "noexec" in v4, in
order to achieve consistency with similar parameter naming for Intel
platform.
---
Documentation/admin-guide/kernel-parameters.txt | 10 +++++++
arch/mips/kernel/elf.c | 38 +++++++++++++++++++++++++
2 files changed, 48 insertions(+)
diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt
index 6571fbf..6dff711 100644
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -2596,6 +2596,16 @@
noexec=on: enable non-executable mappings (default)
noexec=off: disable non-executable mappings
+ noexec [MIPS]
+ Force setting up stack and heap as non-executable or
+ executable regardless of PT_GNU_STACK entry or CPU XI
+ support. Valid arguments: on, off.
+ noexec=on: Force non-executable stack and heap
+ noexec=off: Force executable stack and heap
+ If omitted, stack and heap will or will not be set
+ up as non-executable depending on PT_GNU_STACK
+ entry and possibly other factors (like CPU XI support).
+
nosmap [X86]
Disable SMAP (Supervisor Mode Access Prevention)
even if it is supported by processor.
diff --git a/arch/mips/kernel/elf.c b/arch/mips/kernel/elf.c
index 731325a..a0235d1 100644
--- a/arch/mips/kernel/elf.c
+++ b/arch/mips/kernel/elf.c
@@ -326,8 +326,46 @@ void mips_set_personality_nan(struct arch_elf_state *state)
}
}
+static int noexec = EXSTACK_DEFAULT;
+
+/*
+ * kernel parameter: noexec=on|off
+ *
+ * Force setting up stack and heap as non-executable or
+ * executable regardless of PT_GNU_STACK entry or CPU RIXI
+ * support. Valid arguments: on, off.
+ *
+ * noexec=on: Force non-executable stack and heap
+ * noexec=off: Force executable stack and heap
+ *
+ * If omitted, stack and heap will or will not be set
+ * up as non-executable depending on PT_GNU_STACK
+ * entry and possibly other factors (CPU RIXI support).
+ */
+static int __init noexec_setup(char *str)
+{
+ if (!strcmp(str, "on"))
+ noexec = EXSTACK_DISABLE_X;
+ else if (!strcmp(str, "off"))
+ noexec = EXSTACK_ENABLE_X;
+ else
+ pr_err("Malformed noexec format! noexec=on|off\n");
+
+ return 1;
+}
+__setup("noexec=", noexec_setup);
+
int mips_elf_read_implies_exec(void *elf_ex, int exstack)
{
+ switch (noexec) {
+ case EXSTACK_DISABLE_X:
+ return 0;
+ case EXSTACK_ENABLE_X:
+ return 1;
+ default:
+ break;
+ }
+
if (exstack != EXSTACK_DISABLE_X) {
/* The binary doesn't request a non-executable stack */
return 1;
--
2.7.4
Powered by blists - more mailing lists