diff options
author | Ard Biesheuvel <ard.biesheuvel@arm.com> | 2019-05-23 11:22:56 +0100 |
---|---|---|
committer | Catalin Marinas <catalin.marinas@arm.com> | 2019-06-24 18:10:39 +0100 |
commit | 3f750706486227f32991092fe57c25e1290691d5 (patch) | |
tree | 5a72f5b162d30df760052975423bd62dd8e04d2f /arch/arm64/Kconfig | |
parent | f83b4f8860046e0f5244eef35b25fc3e405d7fee (diff) | |
download | lwn-3f750706486227f32991092fe57c25e1290691d5.tar.gz lwn-3f750706486227f32991092fe57c25e1290691d5.zip |
arm64: bpf: do not allocate executable memory
The BPF code now takes care of mapping the code pages executable
after mapping them read-only, to ensure that no RWX mapped regions
are needed, even transiently. This means we can drop the executable
permissions from the mapping at allocation time.
Acked-by: Will Deacon <will@kernel.org>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to 'arch/arm64/Kconfig')
0 files changed, 0 insertions, 0 deletions