Revert "arm64: Introduce execute-only page access permissions"
authorCatalin Marinas <catalin.marinas@arm.com>
Fri, 16 May 2014 15:44:32 +0000 (16:44 +0100)
committerMark Brown <broonie@linaro.org>
Wed, 4 Jun 2014 13:55:37 +0000 (14:55 +0100)
commit5af70c99ecd544f98f84c4d369d8545fe221dca7
tree9f30be52a12dd3a5d1911fe9b588939a58b0718b
parent3698e46b6e5bcd43d7b2faad9e77a015a3495011
Revert "arm64: Introduce execute-only page access permissions"

This reverts commit bc07c2c6e9ed125d362af0214b6313dca180cb08.

While the aim is increased security for --x memory maps, it does not
protect against kernel level reads. Until SECCOMP is implemented for
arm64, revert this patch to avoid giving a false idea of execute-only
mappings.

Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
(cherry picked from commit 5a0fdfada3a2aa50d7b947a2e958bf00cbe0d830)
Signed-off-by: Mark Brown <broonie@linaro.org>
arch/arm64/include/asm/pgtable.h
arch/arm64/mm/fault.c