diff options
author | 2024-12-09 10:45:16 +0100 | |
---|---|---|
committer | 2024-12-17 12:46:13 +0100 | |
commit | 62b87e0c9a2cb35a74b47766743135e175f488b4 (patch) | |
tree | 1ecdac454409d0e1739d320cb4645a5e16dd8913 | |
parent | s390/mm/hugetlbfs: Remove huge_pte_none() / huge_pte_none_mostly() (diff) | |
download | wireguard-linux-62b87e0c9a2cb35a74b47766743135e175f488b4.tar.xz wireguard-linux-62b87e0c9a2cb35a74b47766743135e175f488b4.zip |
s390/mm: Remove incorrect comment
Remove an outdated comment that is also located at a random place. The
generic statement that read permissions imply execute permissions is
wrong since the instruction execution-protection facility is available.
Reviewed-by: Gerald Schaefer <gerald.schaefer@linux.ibm.com>
Acked-by: Alexander Gordeev <agordeev@linux.ibm.com>
Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
Signed-off-by: Alexander Gordeev <agordeev@linux.ibm.com>
-rw-r--r-- | arch/s390/include/asm/pgtable.h | 7 |
1 files changed, 0 insertions, 7 deletions
diff --git a/arch/s390/include/asm/pgtable.h b/arch/s390/include/asm/pgtable.h index 3b21aecf69ac..235360314f67 100644 --- a/arch/s390/include/asm/pgtable.h +++ b/arch/s390/include/asm/pgtable.h @@ -462,13 +462,6 @@ static inline int is_module_addr(void *addr) _PAGE_YOUNG | _PAGE_DIRTY) /* - * On s390 the page table entry has an invalid bit and a read-only bit. - * Read permission implies execute permission and write permission - * implies read permission. - */ - /*xwr*/ - -/* * Segment entry (large page) protection definitions. */ #define SEGMENT_NONE __pgprot(_SEGMENT_ENTRY_PRESENT | \ |