ARM: mm: allow text and rodata sections to be read-only
This introduces CONFIG_DEBUG_RODATA, making kernel text and rodata read-only. Additionally, this splits rodata from text so that rodata can also be NX, which may lead to wasted memory when aligning to SECTION_SIZE. The read-only areas are made writable during ftrace updates and kexec. Signed-off-by:Kees Cook <keescook@chromium.org> Tested-by:
Laura Abbott <lauraa@codeaurora.org> Acked-by:
Nicolas Pitre <nico@linaro.org>
Showing
- arch/arm/include/asm/cacheflush.h 10 additions, 0 deletionsarch/arm/include/asm/cacheflush.h
- arch/arm/kernel/ftrace.c 19 additions, 0 deletionsarch/arm/kernel/ftrace.c
- arch/arm/kernel/machine_kexec.c 1 addition, 0 deletionsarch/arm/kernel/machine_kexec.c
- arch/arm/kernel/vmlinux.lds.S 3 additions, 0 deletionsarch/arm/kernel/vmlinux.lds.S
- arch/arm/mm/Kconfig 12 additions, 0 deletionsarch/arm/mm/Kconfig
- arch/arm/mm/init.c 47 additions, 1 deletionarch/arm/mm/init.c
Please register or sign in to comment