From: Mark Brown Date: Wed, 6 May 2020 19:51:33 +0000 (+0100) Subject: arm64: mm: Mark executable text as guarded pages X-Git-Tag: v5.10.7~2348^2~9^2~9 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=67d4a1cd09765db92581dbce8438305ea0e06004;p=platform%2Fkernel%2Flinux-rpi.git arm64: mm: Mark executable text as guarded pages When the kernel is built for BTI and running on a system which supports make all executable text guarded pages to ensure that loadable module and JITed BPF code is protected by BTI. Signed-off-by: Mark Brown Reviewed-by: Catalin Marinas Link: https://lore.kernel.org/r/20200506195138.22086-7-broonie@kernel.org Signed-off-by: Will Deacon --- diff --git a/arch/arm64/mm/pageattr.c b/arch/arm64/mm/pageattr.c index 250c490..bde0809 100644 --- a/arch/arm64/mm/pageattr.c +++ b/arch/arm64/mm/pageattr.c @@ -126,13 +126,13 @@ int set_memory_nx(unsigned long addr, int numpages) { return change_memory_common(addr, numpages, __pgprot(PTE_PXN), - __pgprot(0)); + __pgprot(PTE_MAYBE_GP)); } int set_memory_x(unsigned long addr, int numpages) { return change_memory_common(addr, numpages, - __pgprot(0), + __pgprot(PTE_MAYBE_GP), __pgprot(PTE_PXN)); }