[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210408191529.677958-1-zackr@vmware.com>
Date: Thu, 8 Apr 2021 15:15:29 -0400
From: Zack Rusin <zackr@...are.com>
To: <linux-kernel@...r.kernel.org>
CC: Andrew Morton <akpm@...ux-foundation.org>,
Thomas Hellström <thomas_os@...pmail.org>,
<linux-mm@...ck.org>
Subject: [PATCH] mm/mapping_dirty_helpers: Guard hugepage pud's usage
Lets make sure we don't use pud hugepage helpers on architectures
which do not support it. This fixes the code on arm64.
Signed-off-by: Zack Rusin <zackr@...are.com>
Cc: Andrew Morton <akpm@...ux-foundation.org>
Cc: Thomas Hellström (Intel) <thomas_os@...pmail.org>
Cc: linux-mm@...ck.org
Cc: linux-kernel@...r.kernel.org
---
mm/mapping_dirty_helpers.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/mm/mapping_dirty_helpers.c b/mm/mapping_dirty_helpers.c
index b59054ef2e10..b890854ec761 100644
--- a/mm/mapping_dirty_helpers.c
+++ b/mm/mapping_dirty_helpers.c
@@ -165,10 +165,12 @@ static int wp_clean_pud_entry(pud_t *pud, unsigned long addr, unsigned long end,
return 0;
}
+#ifdef CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD
/* Huge pud */
walk->action = ACTION_CONTINUE;
if (pud_trans_huge(pudval) || pud_devmap(pudval))
WARN_ON(pud_write(pudval) || pud_dirty(pudval));
+#endif
return 0;
}
--
2.27.0
Powered by blists - more mailing lists