lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <f42d43fd-30b0-e661-4b47-61ab15ef76ab@intel.com>
Date:   Thu, 6 Oct 2022 09:23:37 -0700
From:   Dave Hansen <dave.hansen@...el.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>,
        the arch/x86 maintainers <x86@...nel.org>,
        LKML <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/mm for 6.1

Hi Linus,

Please pull some x86/mm changes for v6.1.  There are some small things
here, plus one big one.  The big one detected and refused to create W+X
kernel mappings.  This caused a bit of trouble and it is entirely
disabled on 32-bit due to known unfixable EFI issues.  It also oopsed
on some systemd eBPF use, which kept some users from booting.

The eBPF issue is fixed, but those troubles were caught relatively
recently which made me nervous that there are more lurking.  The final
commit in x86_mm_for_v6.1_rc1 retains the warnings, but doesn't
actually refuse to create W+X mappings.

--

The following changes since commit 42e66b1cc3a070671001f8a1e933a80818a192bf:

  Merge tag 'net-6.0-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2022-09-01 09:20:42 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_mm_for_v6.1_rc1

for you to fetch changes up to c5129ecc12a3101555d8922b1e0aa90f91247ab6:

  x86/mm: Ease W^X enforcement back to just a warning (2022-10-04 12:53:52 -0700)

----------------------------------------------------------------

 * Detect insecure W+X mappings and warn about them, including a
   few bug fixes and relaxing the enforcement
 * Do a long-overdue defconfig update and enabling W+X boot-time
   detection
 * Cleanup _PAGE_PSE handling (follow-up on an earlier bug)
 * Rename a change_page_attr function

----------------------------------------------------------------
Borislav Petkov (1):
      x86/mm: Rename set_memory_present() to set_memory_p()

Dave Hansen (3):
      x86/mm/32: Fix W^X detection when page tables do not support NX
      x86/mm: Disable W^X detection and enforcement on 32-bit
      x86/mm: Ease W^X enforcement back to just a warning

Ingo Molnar (3):
      Merge branch 'linus' into x86/mm, to refresh the branch
      x86/defconfig: Refresh the defconfigs
      x86/defconfig: Enable CONFIG_DEBUG_WX=y

Linus Torvalds (1):
      x86/mm: Add prot_sethuge() helper to abstract out _PAGE_PSE handling

Peter Zijlstra (1):
      x86/mm: Refuse W^X violations

 arch/x86/configs/i386_defconfig   |  6 ++++--
 arch/x86/configs/x86_64_defconfig |  5 +++--
 arch/x86/mm/init_64.c             | 19 ++++++++++---------
 arch/x86/mm/pat/set_memory.c      | 49 +++++++++++++++++++++++++++++++++++++++++++++++--
 4 files changed, 64 insertions(+), 15 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ