diff options
author | Will Deacon <will.deacon@arm.com> | 2012-09-18 20:18:35 +0200 |
---|---|---|
committer | Will Deacon <will.deacon@arm.com> | 2012-11-09 15:12:55 +0100 |
commit | 864aa04cd02979c2c755cb28b5f4fe56039171c0 (patch) | |
tree | 1f5fb36b17bc8a48341c0c039399e7c5a5d04ef4 /arch/arm/mm/mmu.c | |
parent | Linux 3.7-rc4 (diff) | |
download | linux-864aa04cd02979c2c755cb28b5f4fe56039171c0.tar.xz linux-864aa04cd02979c2c755cb28b5f4fe56039171c0.zip |
ARM: mm: use pteval_t to represent page protection values
When updating the page protection map after calculating the user_pgprot
value, the base protection map is temporarily stored in an unsigned long
type, causing truncation of the protection bits when LPAE is enabled.
This effectively means that calls to mprotect() will corrupt the upper
page attributes, clearing the XN bit unconditionally.
This patch uses pteval_t to store the intermediate protection values,
preserving the upper bits for 64-bit descriptors.
Cc: stable@vger.kernel.org
Acked-by: Nicolas Pitre <nico@linaro.org>
Acked-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Diffstat (limited to 'arch/arm/mm/mmu.c')
-rw-r--r-- | arch/arm/mm/mmu.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/arm/mm/mmu.c b/arch/arm/mm/mmu.c index 941dfb9e9a78..99b47b950efc 100644 --- a/arch/arm/mm/mmu.c +++ b/arch/arm/mm/mmu.c @@ -488,7 +488,7 @@ static void __init build_mem_type_table(void) #endif for (i = 0; i < 16; i++) { - unsigned long v = pgprot_val(protection_map[i]); + pteval_t v = pgprot_val(protection_map[i]); protection_map[i] = __pgprot(v | user_pgprot); } |