Re: [EXTERNAL] [PATCH 6.13 089/443] x86/kexec: Allocate PGD for x86_64 transition page tables separately

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2025-03-12 at 09:16 +0100, Greg Kroah-Hartman wrote:
> On Wed, Mar 12, 2025 at 08:54:52AM +0100, Ard Biesheuvel wrote:
> > On Wed, 12 Mar 2025 at 08:47, Greg Kroah-Hartman
> > <gregkh@xxxxxxxxxxxxxxxxxxx> wrote:
> > > 
> > > On Tue, Mar 11, 2025 at 04:45:26PM +0100, David Woodhouse wrote:
> > > > On Thu, 2025-02-13 at 15:24 +0100, Greg Kroah-Hartman wrote:
> > > > > 6.13-stable review patch.  If anyone has any objections, please let me know.
> > > > > 
> > > > > ------------------
> > > > > 
> > > > > From: David Woodhouse <dwmw@xxxxxxxxxxxx>
> > > > > 
> > > > > [ Upstream commit 4b5bc2ec9a239bce261ffeafdd63571134102323 ]
> > > > > 
> > > > > Now that the following fix:
> > > > > 
> > > > >   d0ceea662d45 ("x86/mm: Add _PAGE_NOPTISHADOW bit to avoid updating userspace page tables")
> > > > > 
> > > > > stops kernel_ident_mapping_init() from scribbling over the end of a
> > > > > 4KiB PGD by assuming the following 4KiB will be a userspace PGD,
> > > > > there's no good reason for the kexec PGD to be part of a single
> > > > > 8KiB allocation with the control_code_page.
> > > > > 
> > > > > ( It's not clear that that was the reason for x86_64 kexec doing it that
> > > > >   way in the first place either; there were no comments to that effect and
> > > > >   it seems to have been the case even before PTI came along. It looks like
> > > > >   it was just a happy accident which prevented memory corruption on kexec. )
> > > > > 
> > > > > Either way, it definitely isn't needed now. Just allocate the PGD
> > > > > separately on x86_64, like i386 already does.
> > > > 
> > > > No objection (which is just as well given how late I am in replying)
> > > > but I'm just not sure *why*. This doesn't fix a real bug; it's just a
> > > > cleanup.
> > > > 
> > > > Does this mean I should have written my original commit message better,
> > > > to make it clearer that this *isn't* a bugfix?
> > > 
> > > Yes, that's why it was picked up.
> > > 
> > 
> > The patch has no fixes: tag and no cc:stable. The burden shouldn't be
> > on the patch author to sprinkle enough of the right keywords over the
> > commit log to convince the bot that this is not a suitable stable
> > candidate, just because it happens to apply without conflicts.
> 
> The burden is not there to do that, this came in from the AUTOSEL stuff.
> It was sent to everyone on Jan 26:
> 	https://lore.kernel.org/r/20250126150720.961959-3-sashal@xxxxxxxxxx
> so there was 1 1/2 weeks chance to say something before Sasha committed
> it to the stable queue.  Then it was sent out again here in the -rc
> releases for review, for anyone to object to.
> 
> So there was 3 different times someone could have said "no, this isn't
> ok for stable inclusion" before it was merged.  And even if that's not
> enough, I'll be glad to revert it if it wasn't ok to be merged at any
> time afterward.

FWIW I don't think there's any need to revert it; it's fine. Just not
entirely necessary. I did see it in January but I was travelling so I
didn't get past briefly wondering *why* it was being picked up; I
thought perhaps one of the x86 maintainers had actually chosen to do
so.

If I'd *objected*, I'd have found the time to do so then.


Attachment: smime.p7s
Description: S/MIME cryptographic signature


[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux