Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753096AbaBNBHc (ORCPT ); Thu, 13 Feb 2014 20:07:32 -0500 Received: from smtp.outflux.net ([198.145.64.163]:37851 "EHLO smtp.outflux.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751643AbaBNBHD (ORCPT ); Thu, 13 Feb 2014 20:07:03 -0500 From: Kees Cook To: linux-arm-kernel@lists.infradead.org Cc: keescook@chromium.org, Russell King , Laura Abbott , Larry Bassel , Catalin Marinas , Stephen Rothwell , Greg Kroah-Hartman , Christoffer Dall , Marc Zyngier , Jonathan Austin , Simon Baatz , Nicolas Pitre , Dave Martin , Will Deacon , =?UTF-8?q?Uwe=20Kleine-K=C3=B6nig?= , Ben Dooks , Andrew Morton , Santosh Shilimkar , Jiang Liu , Grant Likely , Rob Herring , Vitaly Andrianov , linux-kernel@vger.kernel.org Subject: [PATCH 2/2] ARM: mm: keep rodata non-executable Date: Thu, 13 Feb 2014 17:04:10 -0800 Message-Id: <1392339850-18686-3-git-send-email-keescook@chromium.org> X-Mailer: git-send-email 1.7.9.5 In-Reply-To: <1392339850-18686-1-git-send-email-keescook@chromium.org> References: <1392339850-18686-1-git-send-email-keescook@chromium.org> X-HELO: www.outflux.net Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Introduce "CONFIG_DEBUG_RODATA" to mostly match the x86 config, though the behavior is different: it depends on STRICT_KERNMEM_PERMS, which sets rodata read-only (but executable), where as this option additionally splits rodata from the kernel text (resulting in potentially more memory lost to padding) and sets it non-executable as well. The end result is that on builds with CONFIG_DEBUG_RODATA=y (like x86) the rodata with be marked purely read-only. Signed-off-by: Kees Cook --- arch/arm/include/asm/cacheflush.h | 5 +++++ arch/arm/kernel/vmlinux.lds.S | 3 +++ arch/arm/mm/Kconfig | 12 ++++++++++++ arch/arm/mm/init.c | 8 ++++++++ 4 files changed, 28 insertions(+) diff --git a/arch/arm/include/asm/cacheflush.h b/arch/arm/include/asm/cacheflush.h index e9a49fe0284e..2b058fc7a188 100644 --- a/arch/arm/include/asm/cacheflush.h +++ b/arch/arm/include/asm/cacheflush.h @@ -486,4 +486,9 @@ int set_memory_rw(unsigned long addr, int numpages); int set_memory_x(unsigned long addr, int numpages); int set_memory_nx(unsigned long addr, int numpages); +#ifdef CONFIG_DEBUG_RODATA +/* This has already happened during free_initmem. */ +static inline void mark_rodata_ro(void) { } +#endif + #endif diff --git a/arch/arm/kernel/vmlinux.lds.S b/arch/arm/kernel/vmlinux.lds.S index 08fa667ef2f1..ec79e7268e09 100644 --- a/arch/arm/kernel/vmlinux.lds.S +++ b/arch/arm/kernel/vmlinux.lds.S @@ -120,6 +120,9 @@ SECTIONS ARM_CPU_KEEP(PROC_INFO) } +#ifdef CONFIG_DEBUG_RODATA + . = ALIGN(1<