4ce902c30e087f45c6d6ede2012519e2eea44194 |
|
12-Jul-2016 |
Elliott Hughes <enh@google.com> |
Support 32-bit ARM vdso. Linux 4.1 added this. Bug: http://b/19198045 Change-Id: I28be802ff403a61dd6733a001411b3ff05fef5a5
|
93c0f5ee00d1357247fda333c9d49c8673c9c83b |
|
06-Oct-2015 |
Josh Gao <jmgao@google.com> |
Move VDSO pointers to a shared globals struct. Change-Id: I01cbc9cf0917dc1fac52d9205bda2c68529d12ef
|
10726d52ac3a7b34a6e2d9c40532037ca1108485 |
|
15-Jul-2015 |
Robert Jarzmik <robert.jarzmik@intel.com> |
libc: arch-x86: implement kernel vdso time functions This patch give the possibility of time vdso support on 32bit kernel. If the 32bit x86 kernel provides gettimeofday() and clock_gettime() primitives in vdso. In this case make bionic use them. If the kernel doesn't provide them, fallback to the legacy system call versions. Change-Id: I87b772a9486fa356903e1f98f486ab9eb0b6f6f7 Signed-off-by: Robert Jarzmik <robert.jarzmik@intel.com> Signed-off-by: Mingwei Shi <mingwei.shi@intel.com>
|
613f8145087a763e128d58e638bc85799fb06989 |
|
21-Jul-2015 |
Elliott Hughes <enh@google.com> |
Revert "Revert "make vdso function pointers read-only at runtime"" This reverts commit 1946856b1f18a27c51ba30bb9e304f25b722ee05. This goes back to the original scheme of PROT_NONEing a page within libc. Allocating a new page didn't fail safe for cases where these functions are called from the dynamic linker. Bug: http://b/22568628 Change-Id: I3e7241c8b54c27ea4a898bc952375c1e9ae38c80
|
1946856b1f18a27c51ba30bb9e304f25b722ee05 |
|
20-Jul-2015 |
Elliott Hughes <enh@google.com> |
Revert "make vdso function pointers read-only at runtime" This reverts commit df1a3c6d21702e3e96cfcddadee4a50bfac82110. This change prevented N9 from booting (http://b/22568628). Change-Id: I071d6d6a0ae7881d65641839e665acdcf58462b4
|
df1a3c6d21702e3e96cfcddadee4a50bfac82110 |
|
17-Jul-2015 |
Daniel Micay <danielmicay@gmail.com> |
make vdso function pointers read-only at runtime Global, writable function pointers are low-hanging fruit for hijacking control flow with an overflow from a global buffer or an arbitrary write vulnerability. This moves the function pointer table into a dedicated page and makes it read-only at runtime, similar to RELRO. This increases the memory usage of the library by just under one page. This could be avoided by having the linker load the vdso by replacing weak symbols. It's not significant within the Zygote spawning model though because it's read-only after early init. Change-Id: Id7a49c96c1b15c2e1926528304b3c54a81e78caf
|
05fc1d7050d5451aea08dc5f504d2670287b2d43 |
|
29-Jan-2015 |
Elliott Hughes <enh@google.com> |
Add missing includes. Change-Id: Ibf549266a19a67eb9158d341a69dddfb654be669
|
8b5df3920f2843c9cdf04160517c1e8b77c992f5 |
|
22-Jan-2015 |
Elliott Hughes <enh@google.com> |
Turn on -Wold-style-cast and fix the errors. A couple of dodgy cases where we cast away const, but otherwise pretty boring. Change-Id: Ibc39ebd525377792b5911464be842121c20f03b9
|
3002131da33401cf1b45abbdbec58b7c751fc43a |
|
16-Jul-2014 |
Elliott Hughes <enh@google.com> |
Use VDSO for clock_gettime(2) and gettimeofday(2). Bug: 15387103 (cherry picked from commit 625993dfbb085a3cde7492eda8ec1cdc1ee39a78) Change-Id: I0e156d7049ba1495902259071a96936592e74025
|
625993dfbb085a3cde7492eda8ec1cdc1ee39a78 |
|
16-Jul-2014 |
Elliott Hughes <enh@google.com> |
Use VDSO for clock_gettime(2) and gettimeofday(2). Bug: 15387103 Change-Id: Ifc3608ea65060c1dc38120b10b6e79874f182a36
|