|
Message-ID: <56559815.30416.DC24D0B@pageexec.freemail.hu> Date: Wed, 25 Nov 2015 12:14:29 +0100 From: "PaX Team" <pageexec@...email.hu> To: Mathias Krause <minipli@...glemail.com>, kernel-hardening@...ts.openwall.com, Clemens Ladisch <clemens@...isch.de> CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Kees Cook <keescook@...omium.org>, Andy Lutomirski <luto@...capital.net>, Ingo Molnar <mingo@...hat.com>, Thomas Gleixner <tglx@...utronix.de>, "H. Peter Anvin" <hpa@...or.com>, x86-ml <x86@...nel.org>, Arnd Bergmann <arnd@...db.de>, Michael Ellerman <mpe@...erman.id.au>, linux-arch@...r.kernel.org, Emese Revfy <re.emese@...il.com> Subject: Re: [PATCH 0/2] introduce post-init read-only memory On 25 Nov 2015 at 11:06, Clemens Ladisch wrote: > Mathias Krause wrote: > > [...] > > So, prior extending the usage of the __read_only annotation some > > toolchain support is needed. Maybe a gcc plugin that'll warn/error on > > code that writes to such a variable but is not __init itself. > > Or mark them as "const". This would require the initialization code to > cast it away, probably with a helper macro. no, that'd be undefined behaviour and in practice gcc would take advantage of it and produce unintended (and quite broken) code. if the constified object is modified from a different translation unit then the compiler is free to assume that it can constant propagate its initialization value into uses, completely breaking the code that (forcibly) writes to it. however as a poor man's detector for such __read_only violations it's possible to just make the object const temporarily (without casting away the write attempts!), recompile the tree and see if any writes outside __init functions pop up.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.