Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4820551ybi; Tue, 28 May 2019 03:06:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqzhpPo3qlkOeoVGLmvJ2qMRa2cAhjyyfHzfC59KjtYGXtwcWvp01g0HPMzU6rIi8pfJuGBj X-Received: by 2002:a62:2c17:: with SMTP id s23mr111853335pfs.51.1559037973597; Tue, 28 May 2019 03:06:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559037973; cv=none; d=google.com; s=arc-20160816; b=afvxGMn20pkhzrxOaQ05xvvOntg1t6gkF4VCa1jlYfmlxdHY40TfLgvL6qoskKCt8r SAWC1jalgItr9/bUPkffwE6va2ffNlnEoYyN1Bs9McOB/CJTTpwYFdE+Q1C4dxpyrT/F GNs31KTnA+K6M3Sy/qfxKONjM1IwxToFIoaSm4Lg6e6WhjxpY24fA85yOOpZ0nAJvuHL B7WSllqeLpJN6VMcLNvFzzsq3N702TWN0UJyiBpVYGc6STpsOdDNBJijEWd0GVqbPq7Y qBM9vbnpeocPWJXQal/3fsv3M374OxQU9R2niPPwOT7V0lSf75vygkrovXUWraKMCXNM r02g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=NF6y0L0OjDWgY9cYENdjrkTO99dmMjhsbBAJ9BR6g/U=; b=qzvA5txQ6KbK/xwQF1zWYc2zAjgFKuamCg8FsOj3nR0eHNlU8TAICLj6mMOX5ZzDgU Nu2lHN+UEzMCOzeCcCLbKdV/07vzZA7i/mEtPKFmEmB6gVnz8dxB8rn/pyjvnQQ9wLGe PaQbWdr74HrUtnbJnx60eb9FZKLey6eYRqXjl6bed/pP6M94AU/CC3nN4rCTF2YjB709 Aq+xNDIC8jNgftnPApvVsa6bN/2zge05ZLx+EjvEzDj1wQNiq/cVrishTHs3MP56KIy8 AQ6JNrezQkck2GylikIAmxGUJZrwpXX5B/E9WN9mamKc+vERqRIenTwbUjUKLOKA3uZ/ KeyA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f8si20210884pgv.482.2019.05.28.03.05.55; Tue, 28 May 2019 03:06:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726722AbfE1KEV (ORCPT + 99 others); Tue, 28 May 2019 06:04:21 -0400 Received: from foss.arm.com ([217.140.101.70]:54054 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726236AbfE1KEU (ORCPT ); Tue, 28 May 2019 06:04:20 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 473B9341; Tue, 28 May 2019 03:04:20 -0700 (PDT) Received: from fuggles.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 56DCD3F59C; Tue, 28 May 2019 03:04:18 -0700 (PDT) Date: Tue, 28 May 2019 11:04:13 +0100 From: Will Deacon To: Ard Biesheuvel Cc: linux-arm-kernel@lists.infradead.org, marc.zyngier@arm.com, mark.rutland@arm.com, linux-kernel@vger.kernel.org, Nadav Amit , Rick Edgecombe , Peter Zijlstra , Andrew Morton , Masami Hiramatsu , James Morse Subject: Re: [PATCH 0/4] arm64: wire up VM_FLUSH_RESET_PERMS Message-ID: <20190528100413.GA20809@fuggles.cambridge.arm.com> References: <20190523102256.29168-1-ard.biesheuvel@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190523102256.29168-1-ard.biesheuvel@arm.com> User-Agent: Mutt/1.11.1+86 (6f28e57d73f2) () Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 23, 2019 at 11:22:52AM +0100, Ard Biesheuvel wrote: > Wire up the code introduced in v5.2 to manage the permissions > of executable vmalloc regions (and their linear aliases) more > strictly. > > One of the things that came up in the internal discussion is > whether non-x86 architectures have any benefit at all from the > lazy vunmap feature, and whether it would perhaps be better to > implement eager vunmap instead. > > Cc: Nadav Amit > Cc: Rick Edgecombe > Cc: Peter Zijlstra > Cc: Andrew Morton > Cc: Will Deacon > Cc: Masami Hiramatsu > Cc: James Morse > > Ard Biesheuvel (4): > arm64: module: create module allocations without exec permissions > arm64/mm: wire up CONFIG_ARCH_HAS_SET_DIRECT_MAP > arm64/kprobes: set VM_FLUSH_RESET_PERMS on kprobe instruction pages > arm64: bpf: do not allocate executable memory > > arch/arm64/Kconfig | 1 + > arch/arm64/include/asm/cacheflush.h | 3 ++ > arch/arm64/kernel/module.c | 4 +- > arch/arm64/kernel/probes/kprobes.c | 4 +- > arch/arm64/mm/pageattr.c | 48 ++++++++++++++++---- > arch/arm64/net/bpf_jit_comp.c | 2 +- > mm/vmalloc.c | 11 ----- > 7 files changed, 50 insertions(+), 23 deletions(-) Thanks, this all looks good to me. I can get pick this up for 5.2 if Rick's fixes [1] land soon enough. Cheers, Will [1] https://lore.kernel.org/lkml/20190527211058.2729-1-rick.p.edgecombe@intel.com/T/#u