commit | 3f750706486227f32991092fe57c25e1290691d5 | [log] [tgz] |
---|---|---|
author | Ard Biesheuvel <ard.biesheuvel@arm.com> | Thu May 23 11:22:56 2019 +0100 |
committer | Catalin Marinas <catalin.marinas@arm.com> | Mon Jun 24 18:10:39 2019 +0100 |
tree | 5a72f5b162d30df760052975423bd62dd8e04d2f | |
parent | f83b4f8860046e0f5244eef35b25fc3e405d7fee [diff] |
arm64: bpf: do not allocate executable memory The BPF code now takes care of mapping the code pages executable after mapping them read-only, to ensure that no RWX mapped regions are needed, even transiently. This means we can drop the executable permissions from the mapping at allocation time. Acked-by: Will Deacon <will@kernel.org> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@arm.com> Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>