diff options
author | Andy Lutomirski <luto@kernel.org> | 2019-06-27 07:45:08 +0300 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2019-06-28 01:04:40 +0300 |
commit | 441cedab2dfca18fe4983cbc795de04536ed421e (patch) | |
tree | edc94bb896bc62f7504668f09a720a947e20ce57 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | 625b7b7f79c66626fb2b7687fc1a58309a57edd5 (diff) | |
download | linux-441cedab2dfca18fe4983cbc795de04536ed421e.tar.xz |
x86/vsyscall: Add __ro_after_init to global variables
The vDSO is only configurable by command-line options, so make its
global variables __ro_after_init. This seems highly unlikely to
ever stop an exploit, but it's nicer anyway.
Signed-off-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Kees Cook <keescook@chromium.org>
Cc: Florian Weimer <fweimer@redhat.com>
Cc: Jann Horn <jannh@google.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Kernel Hardening <kernel-hardening@lists.openwall.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lkml.kernel.org/r/a386925835e49d319e70c4d7404b1f6c3c2e3702.1561610354.git.luto@kernel.org
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions