diff options
author | Vineet Gupta <vgupta@synopsys.com> | 2013-06-05 17:49:14 +0530 |
---|---|---|
committer | Vineet Gupta <vgupta@synopsys.com> | 2013-06-22 19:23:20 +0530 |
commit | 3abc94480225677ea08af817d56edfb0df9e9b80 (patch) | |
tree | 364c3c03f33d3934f53621669aba62023d5a5633 /arch | |
parent | 2ed21dae021db1f9f988494ceee519290217520d (diff) | |
download | op-kernel-dev-3abc94480225677ea08af817d56edfb0df9e9b80.zip op-kernel-dev-3abc94480225677ea08af817d56edfb0df9e9b80.tar.gz |
ARC: [mm] Make stack/heap Non-executable by default
1. For VM_EXEC based delayed dcache/icache flush, reduces the number of
flushes.
2. Makes this security feature ON by default rather than OFF before.
3. Applications can use mprotect() to selectively override this.
4. ELF binaries have a GNU_STACK segment which can easily override the
kernel default permissions.
For nested-functions/trampolines, gcc already auto-enables executable
stack in elf. Others needing this can use -Wl,-z,execstack option.
Signed-off-by: Vineet Gupta <vgupta@synopsys.com>
Diffstat (limited to 'arch')
-rw-r--r-- | arch/arc/Kconfig | 7 | ||||
-rw-r--r-- | arch/arc/include/asm/page.h | 7 |
2 files changed, 1 insertions, 13 deletions
diff --git a/arch/arc/Kconfig b/arch/arc/Kconfig index 50862ac8..4a0e54f 100644 --- a/arch/arc/Kconfig +++ b/arch/arc/Kconfig @@ -362,13 +362,6 @@ config ARC_MISALIGN_ACCESS Use ONLY-IF-ABS-NECESSARY as it will be very slow and also can hide potential bugs in code -config ARC_STACK_NONEXEC - bool "Make stack non-executable" - default n - help - To disable the execute permissions of stack/heap of processes - which are enabled by default. - config HZ int "Timer Frequency" default 100 diff --git a/arch/arc/include/asm/page.h b/arch/arc/include/asm/page.h index ab84bf1..9c8aa41 100644 --- a/arch/arc/include/asm/page.h +++ b/arch/arc/include/asm/page.h @@ -96,13 +96,8 @@ typedef unsigned long pgtable_t; #define virt_addr_valid(kaddr) pfn_valid(__pa(kaddr) >> PAGE_SHIFT) -/* Default Permissions for page, used in mmap.c */ -#ifdef CONFIG_ARC_STACK_NONEXEC +/* Default Permissions for stack/heaps pages (Non Executable) */ #define VM_DATA_DEFAULT_FLAGS (VM_READ | VM_WRITE | VM_MAYREAD | VM_MAYWRITE) -#else -#define VM_DATA_DEFAULT_FLAGS (VM_READ | VM_WRITE | VM_EXEC | \ - VM_MAYREAD | VM_MAYWRITE | VM_MAYEXEC) -#endif #define WANT_PAGE_VIRTUAL 1 |