linux_dsm_epyc7002/arch/arm64/include/asm
Catalin Marinas 24cecc3774 arm64: Revert support for execute-only user mappings
The ARMv8 64-bit architecture supports execute-only user permissions by
clearing the PTE_USER and PTE_UXN bits, practically making it a mostly
privileged mapping but from which user running at EL0 can still execute.

The downside, however, is that the kernel at EL1 inadvertently reading
such mapping would not trip over the PAN (privileged access never)
protection.

Revert the relevant bits from commit cab15ce604 ("arm64: Introduce
execute-only page access permissions") so that PROT_EXEC implies
PROT_READ (and therefore PTE_USER) until the architecture gains proper
support for execute-only user mappings.

Fixes: cab15ce604 ("arm64: Introduce execute-only page access permissions")
Cc: <stable@vger.kernel.org> # 4.9.x-
Acked-by: Will Deacon <will@kernel.org>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2020-01-06 10:10:07 -08:00
..
vdso
xen
acenv.h
acpi.h
alternative.h
arch_gicv3.h
arch_timer.h
arm_dsu_pmu.h
arm-cci.h
asm-bug.h
asm-offsets.h
asm-prototypes.h
asm-uaccess.h arm64 updates for 5.5: 2019-11-25 15:39:19 -08:00
assembler.h
atomic_ll_sc.h
atomic_lse.h
atomic.h
barrier.h
bitops.h
bitrev.h
boot.h
brk-imm.h
bug.h
cache.h
cacheflush.h
checksum.h
clocksource.h
cmpxchg.h
compat.h
cpu_ops.h
cpu.h
cpucaps.h
cpufeature.h
cpuidle.h
cputype.h
current.h
daifflags.h
dcc.h
debug-monitors.h
device.h
dmi.h
efi.h
elf.h
esr.h
exception.h
exec.h
extable.h
fb.h
fixmap.h
fpsimd.h
fpsimdmacros.h
ftrace.h
futex.h
hardirq.h
hugetlb.h
hw_breakpoint.h
hwcap.h
hypervisor.h
image.h
insn.h
io.h
irq_work.h
irq.h
irqflags.h
jump_label.h
kasan.h
Kbuild asm-generic: Make msi.h a mandatory include/asm header 2019-11-26 13:14:11 -06:00
kernel-pgtable.h
kexec.h
kgdb.h
kprobes.h
kvm_arm.h
kvm_asm.h
kvm_coproc.h
kvm_emulate.h
kvm_host.h ARM: 2019-11-25 18:02:36 -08:00
kvm_hyp.h
kvm_mmio.h
kvm_mmu.h arm64: KVM: Invoke compute_layout() before alternatives are applied 2019-12-06 12:14:45 +00:00
kvm_ptrauth.h
kvm_ras.h
linkage.h
lse.h
memory.h
mmu_context.h
mmu.h
mmzone.h
module.h
neon-intrinsics.h
neon.h
numa.h
page-def.h
page.h
paravirt.h
pci.h
percpu.h
perf_event.h
pgalloc.h
pgtable-hwdef.h
pgtable-prot.h arm64: Revert support for execute-only user mappings 2020-01-06 10:10:07 -08:00
pgtable-types.h
pgtable.h arm64: Revert support for execute-only user mappings 2020-01-06 10:10:07 -08:00
pointer_auth.h
preempt.h
probes.h
proc-fns.h
processor.h
ptdump.h
ptrace.h
pvclock-abi.h
sdei.h
seccomp.h
sections.h arm64: insn: consistently handle exit text 2019-12-04 11:32:20 +00:00
shmparam.h
signal32.h
simd.h
smp_plat.h
smp.h
sparsemem.h
spinlock_types.h
spinlock.h
stack_pointer.h
stackprotector.h
stacktrace.h
stage2_pgtable.h
stat.h
string.h
suspend.h
sync_bitops.h
syscall_wrapper.h
syscall.h
sysreg.h
system_misc.h
thread_info.h
timex.h
tlb.h
tlbflush.h
topology.h
traps.h
uaccess.h arm64 updates for 5.5: 2019-12-06 14:18:01 -08:00
unistd32.h
unistd.h
uprobes.h
vdso.h
virt.h
vmap_stack.h
word-at-a-time.h
xor.h