arm64: Introduce execute-only page access permissions
The ARMv8 architecture allows execute-only user permissions by clearing the PTE_UXN and PTE_USER bits. However, the kernel running on a CPU implementation without User Access Override (ARMv8.2 onwards) can still access such page, so execute-only page permission does not protect against read(2)/write(2) etc. accesses. Systems requiring such protection must enable features like SECCOMP. This patch changes the arm64 __P100 and __S100 protection_map[] macros to the new __PAGE_EXECONLY attributes. A side effect is that pte_user() no longer triggers for __PAGE_EXECONLY since PTE_USER isn't set. To work around this, the check is done on the PTE_NG bit via the pte_ng() macro. VM_READ is also checked now for page faults. Reviewed-by:Will Deacon <will.deacon@arm.com> Signed-off-by:
Catalin Marinas <catalin.marinas@arm.com> Signed-off-by:
Will Deacon <will.deacon@arm.com>
Showing
- arch/arm64/include/asm/pgtable-prot.h 3 additions, 2 deletionsarch/arm64/include/asm/pgtable-prot.h
- arch/arm64/include/asm/pgtable.h 5 additions, 5 deletionsarch/arm64/include/asm/pgtable.h
- arch/arm64/mm/fault.c 2 additions, 3 deletionsarch/arm64/mm/fault.c
- mm/mmap.c 5 additions, 0 deletionsmm/mmap.c
Please register or sign in to comment