diff options
author | Laura Abbott <labbott@redhat.com> | 2018-05-23 21:43:46 +0300 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2020-01-17 21:45:42 +0300 |
commit | 4ded4a2cf506a1aa621901d1289e89a8587963bc (patch) | |
tree | 15e9668301a932921be07c0a25dfb3f7703a6927 /include/net/cfg80211.h | |
parent | 68a066f6ff13e7029d54da9d322ad686694c7039 (diff) | |
download | linux-4ded4a2cf506a1aa621901d1289e89a8587963bc.tar.xz |
arm64: Make sure permission updates happen for pmd/pud
commit 82034c23fcbc2389c73d97737f61fa2dd6526413 upstream.
Commit 15122ee2c515 ("arm64: Enforce BBM for huge IO/VMAP mappings")
disallowed block mappings for ioremap since that code does not honor
break-before-make. The same APIs are also used for permission updating
though and the extra checks prevent the permission updates from happening,
even though this should be permitted. This results in read-only permissions
not being fully applied. Visibly, this can occasionaly be seen as a failure
on the built in rodata test when the test data ends up in a section or
as an odd RW gap on the page table dump. Fix this by using
pgattr_change_is_safe instead of p*d_present for determining if the
change is permitted.
Reviewed-by: Kees Cook <keescook@chromium.org>
Tested-by: Peter Robinson <pbrobinson@gmail.com>
Reported-by: Peter Robinson <pbrobinson@gmail.com>
Fixes: 15122ee2c515 ("arm64: Enforce BBM for huge IO/VMAP mappings")
Signed-off-by: Laura Abbott <labbott@redhat.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Ben Hutchings <ben.hutchings@codethink.co.uk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'include/net/cfg80211.h')
0 files changed, 0 insertions, 0 deletions