aboutsummaryrefslogtreecommitdiff
path: root/arch/arm/kernel/swp_emulate.c
diff options
context:
space:
mode:
authorWill Deacon <will.deacon@arm.com>2012-09-18 19:18:35 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2013-01-11 09:07:16 -0800
commit99574fa03e407cad20953d7cbfcb0056f02e811e (patch)
treef2f96ae490b89959329802232ae1415eb2b5c4fe /arch/arm/kernel/swp_emulate.c
parent2ee4432e82437a7c051c254b065fbf5d4581e1a3 (diff)
ARM: mm: use pteval_t to represent page protection values
commit 864aa04cd02979c2c755cb28b5f4fe56039171c0 upstream. When updating the page protection map after calculating the user_pgprot value, the base protection map is temporarily stored in an unsigned long type, causing truncation of the protection bits when LPAE is enabled. This effectively means that calls to mprotect() will corrupt the upper page attributes, clearing the XN bit unconditionally. This patch uses pteval_t to store the intermediate protection values, preserving the upper bits for 64-bit descriptors. Acked-by: Nicolas Pitre <nico@linaro.org> Acked-by: Catalin Marinas <catalin.marinas@arm.com> Signed-off-by: Will Deacon <will.deacon@arm.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'arch/arm/kernel/swp_emulate.c')
0 files changed, 0 insertions, 0 deletions