From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752566AbdLLKYN convert rfc822-to-8bit (ORCPT ); Tue, 12 Dec 2017 05:24:13 -0500 Received: from prv-mh.provo.novell.com ([137.65.248.74]:54806 "EHLO prv-mh.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751547AbdLLKYJ (ORCPT ); Tue, 12 Dec 2017 05:24:09 -0500 Message-Id: <5A2FBC570200007800196B3E@prv-mh.provo.novell.com> X-Mailer: Novell GroupWise Internet Agent 14.2.2 Date: Tue, 12 Dec 2017 03:24:07 -0700 From: "Jan Beulich" To: , , "Boris Ostrovsky" , "Juergen Gross" , Cc: "xen-devel" , Subject: [PATCH 0/2] x86: deal with remaining W+X pages on Xen Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8BIT Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The two patches here are entirely independent (i.e. they could by applied in any order and/or go through separate trees), but for the warning to go away both are necessary. 1: x86: consider effective protection attributes in W+X check 2: x86-64/Xen: eliminate W+X pages Signed-off-by: Jan Beulich