Commit 424037b7 authored by Daniel Kiss's avatar Daniel Kiss Committed by Catalin Marinas
Browse files

mm: smaps: Report arm64 guarded pages in smaps



The arm64 Branch Target Identification support is activated by marking
executable pages as guarded pages.  Report pages mapped this way in
smaps to aid diagnostics.

Signed-off-by: default avatarMark Brown <broonie@kernel.org>
Signed-off-by: default avatarDaniel Kiss <daniel.kiss@arm.com>
Reviewed-by: default avatarKees Cook <keescook@chromium.org>
Signed-off-by: default avatarCatalin Marinas <catalin.marinas@arm.com>
parent de48bb36
Loading
Loading
Loading
Loading
+1 −0
Original line number Diff line number Diff line
@@ -519,6 +519,7 @@ manner. The codes are the following:
    hg  - huge page advise flag
    nh  - no-huge page advise flag
    mg  - mergable advise flag
    bt  - arm64 BTI guarded page

Note that there is no guarantee that every flag and associated mnemonic will
be present in all further kernel releases. Things get changed, the flags may
+3 −0
Original line number Diff line number Diff line
@@ -668,6 +668,9 @@ static void show_smap_vma_flags(struct seq_file *m, struct vm_area_struct *vma)
		[ilog2(VM_ARCH_1)]	= "ar",
		[ilog2(VM_WIPEONFORK)]	= "wf",
		[ilog2(VM_DONTDUMP)]	= "dd",
#ifdef CONFIG_ARM64_BTI
		[ilog2(VM_ARM64_BTI)]	= "bt",
#endif
#ifdef CONFIG_MEM_SOFT_DIRTY
		[ilog2(VM_SOFTDIRTY)]	= "sd",
#endif