linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Dave Hansen <dave.hansen@intel.com>
To: Linus Torvalds <torvalds@linux-foundation.org>,
	the arch/x86 maintainers <x86@kernel.org>,
	LKML <linux-kernel@vger.kernel.org>
Subject: [GIT PULL] x86/mm for 6.1
Date: Thu, 6 Oct 2022 09:23:37 -0700	[thread overview]
Message-ID: <f42d43fd-30b0-e661-4b47-61ab15ef76ab@intel.com> (raw)

Hi Linus,

Please pull some x86/mm changes for v6.1.  There are some small things
here, plus one big one.  The big one detected and refused to create W+X
kernel mappings.  This caused a bit of trouble and it is entirely
disabled on 32-bit due to known unfixable EFI issues.  It also oopsed
on some systemd eBPF use, which kept some users from booting.

The eBPF issue is fixed, but those troubles were caught relatively
recently which made me nervous that there are more lurking.  The final
commit in x86_mm_for_v6.1_rc1 retains the warnings, but doesn't
actually refuse to create W+X mappings.

--

The following changes since commit 42e66b1cc3a070671001f8a1e933a80818a192bf:

  Merge tag 'net-6.0-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2022-09-01 09:20:42 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_mm_for_v6.1_rc1

for you to fetch changes up to c5129ecc12a3101555d8922b1e0aa90f91247ab6:

  x86/mm: Ease W^X enforcement back to just a warning (2022-10-04 12:53:52 -0700)

----------------------------------------------------------------

 * Detect insecure W+X mappings and warn about them, including a
   few bug fixes and relaxing the enforcement
 * Do a long-overdue defconfig update and enabling W+X boot-time
   detection
 * Cleanup _PAGE_PSE handling (follow-up on an earlier bug)
 * Rename a change_page_attr function

----------------------------------------------------------------
Borislav Petkov (1):
      x86/mm: Rename set_memory_present() to set_memory_p()

Dave Hansen (3):
      x86/mm/32: Fix W^X detection when page tables do not support NX
      x86/mm: Disable W^X detection and enforcement on 32-bit
      x86/mm: Ease W^X enforcement back to just a warning

Ingo Molnar (3):
      Merge branch 'linus' into x86/mm, to refresh the branch
      x86/defconfig: Refresh the defconfigs
      x86/defconfig: Enable CONFIG_DEBUG_WX=y

Linus Torvalds (1):
      x86/mm: Add prot_sethuge() helper to abstract out _PAGE_PSE handling

Peter Zijlstra (1):
      x86/mm: Refuse W^X violations

 arch/x86/configs/i386_defconfig   |  6 ++++--
 arch/x86/configs/x86_64_defconfig |  5 +++--
 arch/x86/mm/init_64.c             | 19 ++++++++++---------
 arch/x86/mm/pat/set_memory.c      | 49 +++++++++++++++++++++++++++++++++++++++++++++++--
 4 files changed, 64 insertions(+), 15 deletions(-)


             reply	other threads:[~2022-10-06 16:23 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-10-06 16:23 Dave Hansen [this message]
2022-10-11  1:23 ` [GIT PULL] x86/mm for 6.1 pr-tracker-bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=f42d43fd-30b0-e661-4b47-61ab15ef76ab@intel.com \
    --to=dave.hansen@intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).