Move out the code that sets FAULT_FLAG_WRITE so the block that check
access permissions can be extracted. While at it also set
FAULT_FLAG_INSTRUCTION which will be used for protection keys.

Signed-off-by: Benjamin Herrenschmidt <b...@kernel.crashing.org>
---
 arch/powerpc/mm/fault.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/arch/powerpc/mm/fault.c b/arch/powerpc/mm/fault.c
index f1abdc90e330..6a938fc8c5fb 100644
--- a/arch/powerpc/mm/fault.c
+++ b/arch/powerpc/mm/fault.c
@@ -384,6 +384,10 @@ static int __do_page_fault(struct pt_regs *regs, unsigned 
long address,
 
        if (is_user)
                flags |= FAULT_FLAG_USER;
+       if (is_write)
+               flags |= FAULT_FLAG_WRITE;
+       if (is_exec)
+               flags |= FAULT_FLAG_INSTRUCTION;
 
        /* When running in the kernel we expect faults to occur only to
         * addresses in user space.  All other faults represent errors in the
@@ -476,7 +480,6 @@ static int __do_page_fault(struct pt_regs *regs, unsigned 
long address,
        } else if (is_write) {
                if (unlikely(!(vma->vm_flags & VM_WRITE)))
                        return bad_area(regs, address);
-               flags |= FAULT_FLAG_WRITE;
        /* a read */
        } else {
                if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE))))
-- 
2.13.3

Reply via email to