Overwrite detection for kernel text and read-only data

From eLinux.org
Revision as of 11:00, 1 October 2013 by Tim Bird (Talk | contribs) (add page for overwrite detection for kernel)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Overwrite detection for kernel text and read-only data
Tim Bird, Sony Mobile


In embedded systems, drivers or other subsystems can easily (mistakenly) overwrite kernel text or kernel read-only area. It can be very difficult to debug who is overwriting kernel.

It would be nice to have some mechanism to detect kernel overwriting or corruption by setting a write-protect attribute in page tables for kernel text or read-only data. x86 already has this feature in the form of CONFIG_DEBUG_RODATA. This project would consist of providing support for this feature in ARM, as well as possibly creating exceptions for code which needs to modify the kernel text at runtime, such as Kprobe or ftrace.

Related work



Contractor Candidates

None yet.