arm64: Support execute-only permissions with Enhanced PAN
Enhanced Privileged Access Never (EPAN) allows Privileged Access Never to be used with Execute-only mappings. Absence of such support was a reason for 24cecc37 ("arm64: Revert support for execute-only user mappings"). Thus now it can be revisited and re-enabled. Cc: Kees Cook <keescook@chromium.org> Signed-off-by:Vladimir Murzin <vladimir.murzin@arm.com> Acked-by:
Will Deacon <will@kernel.org> Link: https://lore.kernel.org/r/20210312173811.58284-2-vladimir.murzin@arm.com Signed-off-by:
Catalin Marinas <catalin.marinas@arm.com>
Showing
- arch/arm64/Kconfig 17 additions, 0 deletionsarch/arm64/Kconfig
- arch/arm64/include/asm/cpucaps.h 2 additions, 1 deletionarch/arm64/include/asm/cpucaps.h
- arch/arm64/include/asm/pgtable-prot.h 3 additions, 2 deletionsarch/arm64/include/asm/pgtable-prot.h
- arch/arm64/include/asm/pgtable.h 23 additions, 8 deletionsarch/arm64/include/asm/pgtable.h
- arch/arm64/include/asm/sysreg.h 2 additions, 1 deletionarch/arm64/include/asm/sysreg.h
- arch/arm64/kernel/cpufeature.c 12 additions, 0 deletionsarch/arm64/kernel/cpufeature.c
- arch/arm64/mm/fault.c 17 additions, 1 deletionarch/arm64/mm/fault.c
- mm/mmap.c 6 additions, 0 deletionsmm/mmap.c
Loading