mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2026-05-22 10:55:07 -04:00
arm64/Kconfig: Remove CONFIG_RODATA_FULL_DEFAULT_ENABLED
Now that 'rodata=full' has been removed in favour of parity with x86, CONFIG_RODATA_FULL_DEFAULT_ENABLED no longer serves a useful purpose. Remove it. Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com> Signed-off-by: Huang Shijie <shijie@os.amperecomputing.com> Signed-off-by: Will Deacon <will@kernel.org>
This commit is contained in:
committed by
Will Deacon
parent
c0f303d7d4
commit
bfbbb0d321
@@ -1698,20 +1698,6 @@ config MITIGATE_SPECTRE_BRANCH_HISTORY
|
||||
When taking an exception from user-space, a sequence of branches
|
||||
or a firmware call overwrites the branch history.
|
||||
|
||||
config RODATA_FULL_DEFAULT_ENABLED
|
||||
bool "Apply r/o permissions of VM areas also to their linear aliases"
|
||||
default y
|
||||
help
|
||||
Apply read-only attributes of VM areas to the linear alias of
|
||||
the backing pages as well. This prevents code or read-only data
|
||||
from being modified (inadvertently or intentionally) via another
|
||||
mapping of the same memory page. This additional enhancement can
|
||||
be turned off at runtime by passing rodata=[off|on] (and turned on
|
||||
with rodata=full if this option is set to 'n')
|
||||
|
||||
This requires the linear region to be mapped down to pages,
|
||||
which may adversely affect performance in some cases.
|
||||
|
||||
config ARM64_SW_TTBR0_PAN
|
||||
bool "Emulate Privileged Access Never using TTBR0_EL1 switching"
|
||||
depends on !KCSAN
|
||||
|
||||
@@ -20,7 +20,7 @@ struct page_change_data {
|
||||
pgprot_t clear_mask;
|
||||
};
|
||||
|
||||
bool rodata_full __ro_after_init = IS_ENABLED(CONFIG_RODATA_FULL_DEFAULT_ENABLED);
|
||||
bool rodata_full __ro_after_init = true;
|
||||
|
||||
bool can_set_direct_map(void)
|
||||
{
|
||||
|
||||
Reference in New Issue
Block a user