summaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorImre Deak <imre.deak@nokia.com>2009-10-05 14:40:44 +0200
committerRussell King <rmk+kernel@arm.linux.org.uk>2009-10-05 18:55:55 +0200
commit1d2127123db9b1821959c2b8b7473dd7ffcdf527 (patch)
tree17134cbb3a6d7a077e5f05877964b1258d1f30c8 /crypto
parentARM: 5741/1: pl022: fix peripheral id for ST vendor (diff)
downloadlinux-1d2127123db9b1821959c2b8b7473dd7ffcdf527.tar.xz
linux-1d2127123db9b1821959c2b8b7473dd7ffcdf527.zip
ARM: 5742/1: ARM: add debug check for invalid kernel page faults
According to the following in arch/arm/mm/fault.c page faults from kernel mode are invalid if mmap_sem is already held and there is no exception handler defined for the faulting instruction: /* * As per x86, we may deadlock here. However, since the kernel only * validly references user space from well defined areas of the code, * we can bug out early if this is from code which shouldn't. */ if (!down_read_trylock(&mm->mmap_sem)) { if (!user_mode(regs) && !search_exception_tables(regs->ARM_pc)) goto no_context; Since mmap_sem can be held at arbitrary times by another thread this also means that any page faults from kernel mode are invalid if no exception handler is defined for them, regardless whether mmap_sem is held at the time of fault. To easier detect code that can trigger the above error, add a check also for the case where mmap_sem is acquired. As this has an overhead make it a VM debug check. Signed-off-by: Imre Deak <imre.deak@nokia.com> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
Diffstat (limited to 'crypto')
0 files changed, 0 insertions, 0 deletions