diff options
author | Will Deacon <will.deacon@arm.com> | 2012-09-18 19:18:35 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2013-01-11 09:07:16 -0800 |
commit | 99574fa03e407cad20953d7cbfcb0056f02e811e (patch) | |
tree | f2f96ae490b89959329802232ae1415eb2b5c4fe /arch/arm/kernel/swp_emulate.c | |
parent | 2ee4432e82437a7c051c254b065fbf5d4581e1a3 (diff) |
ARM: mm: use pteval_t to represent page protection values
commit 864aa04cd02979c2c755cb28b5f4fe56039171c0 upstream.
When updating the page protection map after calculating the user_pgprot
value, the base protection map is temporarily stored in an unsigned long
type, causing truncation of the protection bits when LPAE is enabled.
This effectively means that calls to mprotect() will corrupt the upper
page attributes, clearing the XN bit unconditionally.
This patch uses pteval_t to store the intermediate protection values,
preserving the upper bits for 64-bit descriptors.
Acked-by: Nicolas Pitre <nico@linaro.org>
Acked-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'arch/arm/kernel/swp_emulate.c')
0 files changed, 0 insertions, 0 deletions