2
0
mirror of https://github.com/edk2-porting/linux-next.git synced 2024-12-22 12:14:01 +08:00

mm: smaps: Report arm64 guarded pages in smaps

The arm64 Branch Target Identification support is activated by marking
executable pages as guarded pages.  Report pages mapped this way in
smaps to aid diagnostics.

Signed-off-by: Mark Brown <broonie@kernel.org>
Signed-off-by: Daniel Kiss <daniel.kiss@arm.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
This commit is contained in:
Daniel Kiss 2020-03-16 16:50:54 +00:00 committed by Catalin Marinas
parent de48bb3692
commit 424037b775
2 changed files with 4 additions and 0 deletions

View File

@ -519,6 +519,7 @@ manner. The codes are the following:
hg - huge page advise flag hg - huge page advise flag
nh - no-huge page advise flag nh - no-huge page advise flag
mg - mergable advise flag mg - mergable advise flag
bt - arm64 BTI guarded page
Note that there is no guarantee that every flag and associated mnemonic will Note that there is no guarantee that every flag and associated mnemonic will
be present in all further kernel releases. Things get changed, the flags may be present in all further kernel releases. Things get changed, the flags may

View File

@ -668,6 +668,9 @@ static void show_smap_vma_flags(struct seq_file *m, struct vm_area_struct *vma)
[ilog2(VM_ARCH_1)] = "ar", [ilog2(VM_ARCH_1)] = "ar",
[ilog2(VM_WIPEONFORK)] = "wf", [ilog2(VM_WIPEONFORK)] = "wf",
[ilog2(VM_DONTDUMP)] = "dd", [ilog2(VM_DONTDUMP)] = "dd",
#ifdef CONFIG_ARM64_BTI
[ilog2(VM_ARM64_BTI)] = "bt",
#endif
#ifdef CONFIG_MEM_SOFT_DIRTY #ifdef CONFIG_MEM_SOFT_DIRTY
[ilog2(VM_SOFTDIRTY)] = "sd", [ilog2(VM_SOFTDIRTY)] = "sd",
#endif #endif