summaryrefslogtreecommitdiffstats
path: root/arch/arm/mm/init.c
diff options
context:
space:
mode:
authorJinbum Park <jinb.park7@gmail.com>2017-12-12 01:43:57 +0100
committerRussell King <rmk+kernel@armlinux.org.uk>2018-01-21 15:32:20 +0000
commita8e53c151fe7ac52a1c13a6ace0c9e8e0f61260c (patch)
treebdd795b97c9311d45e626e5b90814afcd78567a0 /arch/arm/mm/init.c
parentd02ca6d76ba7f089706db555ee19f3775bc42740 (diff)
downloadlinux-stable-a8e53c151fe7ac52a1c13a6ace0c9e8e0f61260c.tar.gz
linux-stable-a8e53c151fe7ac52a1c13a6ace0c9e8e0f61260c.tar.bz2
linux-stable-a8e53c151fe7ac52a1c13a6ace0c9e8e0f61260c.zip
ARM: 8737/1: mm: dump: add checking for writable and executable
Page mappings with full RWX permissions are a security risk. x86, arm64 has an option to walk the page tables and dump any bad pages. (1404d6f13e47 ("arm64: dump: Add checking for writable and exectuable pages")) Add a similar implementation for arm. Reviewed-by: Kees Cook <keescook@chromium.org> Tested-by: Laura Abbott <labbott@redhat.com> Reviewed-by: Laura Abbott <labbott@redhat.com> Signed-off-by: Jinbum Park <jinb.park7@gmail.com> Signed-off-by: Russell King <rmk+kernel@armlinux.org.uk>
Diffstat (limited to 'arch/arm/mm/init.c')
-rw-r--r--arch/arm/mm/init.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c
index a1f11a7ee81b..bd6f4513539a 100644
--- a/arch/arm/mm/init.c
+++ b/arch/arm/mm/init.c
@@ -36,6 +36,7 @@
#include <asm/system_info.h>
#include <asm/tlb.h>
#include <asm/fixmap.h>
+#include <asm/ptdump.h>
#include <asm/mach/arch.h>
#include <asm/mach/map.h>
@@ -738,6 +739,7 @@ static int __mark_rodata_ro(void *unused)
void mark_rodata_ro(void)
{
stop_machine(__mark_rodata_ro, NULL, NULL);
+ debug_checkwx();
}
void set_kernel_text_rw(void)