diff options
author | Mark Brown <broonie@kernel.org> | 2020-05-06 20:51:33 +0100 |
---|---|---|
committer | Will Deacon <will@kernel.org> | 2020-05-07 17:53:20 +0100 |
commit | 67d4a1cd09765db92581dbce8438305ea0e06004 (patch) | |
tree | 01ad148f8f9a897754128dce0b94e94524e4bf58 /tools/perf/scripts/python/stackcollapse.py | |
parent | fa76cfe65c1d748ef418e930a4b631a03b28f04c (diff) |
arm64: mm: Mark executable text as guarded pages
When the kernel is built for BTI and running on a system which supports
make all executable text guarded pages to ensure that loadable module
and JITed BPF code is protected by BTI.
Signed-off-by: Mark Brown <broonie@kernel.org>
Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
Link: https://lore.kernel.org/r/20200506195138.22086-7-broonie@kernel.org
Signed-off-by: Will Deacon <will@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions