On Fri, Oct 17, 2014 at 1:15 AM, Hillf Danton wrote:
> Hey Kees
>
>> From: Kees Cook
>> To: linux-kernel@vger.kernel.org
>> Cc: Kees Cook , Will Deacon ,
>> Rabin Vincent , Laura Abbott , Rob
>> Herring , Leif Lindholm , Mark
>> Salter , Liu hua &
Hey Kees
> From: Kees Cook
> To: linux-kernel@vger.kernel.org
> Cc: Kees Cook , Will Deacon ,
> Rabin Vincent , Laura Abbott , Rob
> Herring , Leif Lindholm , Mark
> Salter , Liu hua <
> Subject: [PATCH v6 8/8] ARM: mm: allow text and rodata sections to be
> re
Salter msal...@redhat.com, Liu hua
Subject: [PATCH v6 8/8] ARM: mm: allow text and rodata sections to be
read-only
Date: Thu, 18 Sep 2014 12:19:09 -0700
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata
read-only. Additionally, this splits rodata from text so that rodata can
Herring r...@kernel.org, Leif Lindholm leif.lindh...@linaro.org, Mark
Salter msal...@redhat.com, Liu hua
Subject: [PATCH v6 8/8] ARM: mm: allow text and rodata sections to be
read-only
Date: Thu, 18 Sep 2014 12:19:09 -0700
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata
read-only. Additionally, this splits rodata from text so that rodata can
also be NX, which may lead to wasted memory when aligning to SECTION_SIZE.
The read-only areas are made writable during ftrace updates and kexec.
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata
read-only. Additionally, this splits rodata from text so that rodata can
also be NX, which may lead to wasted memory when aligning to SECTION_SIZE.
The read-only areas are made writable during ftrace updates and kexec.
6 matches
Mail list logo