[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250603144539.GD38114@noisy.programming.kicks-ass.net>
Date: Tue, 3 Jun 2025 16:45:39 +0200
From: Peter Zijlstra <peterz@...radead.org>
To: Mike Rapoport <rppt@...nel.org>
Cc: Borislav Petkov <bp@...en8.de>,
Dave Hansen <dave.hansen@...ux.intel.com>,
Ingo Molnar <mingo@...hat.com>,
J�rgen Gro <jgross@...e.com>,
"H. Peter Anvin" <hpa@...or.com>,
Thomas Gleixner <tglx@...utronix.de>, Xin Li <xin@...or.com>,
linux-kernel@...r.kernel.org, stable@...r.kernel.org,
x86@...nel.org
Subject: Re: [PATCH 4/5] x86/its: explicitly manage permissions for ITS pages
On Tue, Jun 03, 2025 at 05:36:41PM +0300, Mike Rapoport wrote:
> > static void its_pages_protect(struct its_array *pages)
> > {
> > + if (!IS_ENABLED(CONFIG_STRICT_KERNEL_RWX))
> > + return;
> > +
>
> But modules generally use STRICT_MODULE_RWX.
Oh, I can't read anymore :-( I'll undo that one.
Powered by blists - more mailing lists