aboutsummaryrefslogtreecommitdiffstats
path: root/arch/arm/kernel
diff options
context:
space:
mode:
authorNicolas Pitre <nico@cam.org>2006-03-25 22:44:05 +0000
committerRussell King <rmk+kernel@arm.linux.org.uk>2006-03-25 22:44:05 +0000
commit2ce9804fbd9d4da75fb5bb53331b46b614a7d5c3 (patch)
tree8b5770e7f6910d518227d68db34f1f322f4d69c7 /arch/arm/kernel
parent0003cedfc577be9d679c16531f8720739e9637ed (diff)
downloadkernel_samsung_tuna-2ce9804fbd9d4da75fb5bb53331b46b614a7d5c3.zip
kernel_samsung_tuna-2ce9804fbd9d4da75fb5bb53331b46b614a7d5c3.tar.gz
kernel_samsung_tuna-2ce9804fbd9d4da75fb5bb53331b46b614a7d5c3.tar.bz2
[ARM] 3030/2: fix permission check in the obscur cmpxchg syscall
Patch from Nicolas Pitre Quoting RMK: |pte_write() just says that the page _may_ be writable. It doesn't say |that the MMU is programmed to allow writes. If pte_dirty() doesn't |return true, that means that the page is _not_ writable from userspace. |If you write to it from kernel mode (without using put_user) you'll |bypass the MMU read-only protection and may end up writing to a page |owned by two separate processes. Signed-off-by: Nicolas Pitre <nico@cam.org> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
Diffstat (limited to 'arch/arm/kernel')
-rw-r--r--arch/arm/kernel/traps.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/arm/kernel/traps.c b/arch/arm/kernel/traps.c
index 03924bc..d566d5f 100644
--- a/arch/arm/kernel/traps.c
+++ b/arch/arm/kernel/traps.c
@@ -506,7 +506,7 @@ asmlinkage int arm_syscall(int no, struct pt_regs *regs)
if (!pmd_present(*pmd))
goto bad_access;
pte = pte_offset_map_lock(mm, pmd, addr, &ptl);
- if (!pte_present(*pte) || !pte_write(*pte)) {
+ if (!pte_present(*pte) || !pte_dirty(*pte)) {
pte_unmap_unlock(pte, ptl);
goto bad_access;
}