diff options
author | Kees Cook <keescook@chromium.org> | 2020-03-26 23:48:17 -0700 |
---|---|---|
committer | Borislav Petkov <bp@suse.de> | 2020-04-20 19:24:33 +0200 |
commit | 9fccc5c0c99f238aa1b0460fccbdb30a887e7036 (patch) | |
tree | ce74f5ea115587fe836851a2c33f605360b1c608 /tools/perf/scripts/python/event_analyzing_sample.py | |
parent | 122306117afe4ba202b5e57c61dfbeffc5c41387 (diff) | |
download | linux-9fccc5c0c99f238aa1b0460fccbdb30a887e7036.tar.bz2 |
x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit
With modern x86 64-bit environments, there should never be a need for
automatic READ_IMPLIES_EXEC, as the architecture is intended to always
be execute-bit aware (as in, the default memory protection should be NX
unless a region explicitly requests to be executable).
There were very old x86_64 systems that lacked the NX bit, but for those,
the NX bit is, obviously, unenforceable, so these changes should have
no impact on them.
Suggested-by: Hector Marco-Gisbert <hecmargi@upv.es>
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Jason Gunthorpe <jgg@mellanox.com>
Link: https://lkml.kernel.org/r/20200327064820.12602-4-keescook@chromium.org
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions