]> git.proxmox.com Git - pve-kernel.git/blame - patches/kernel/0302-x86-tboot-Unbreak-tboot-with-PTI-enabled.patch
update ZFS to 0.7.4 + ARC hit rate cherry-pick
[pve-kernel.git] / patches / kernel / 0302-x86-tboot-Unbreak-tboot-with-PTI-enabled.patch
CommitLineData
035dbe67
FG
1From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
2From: Dave Hansen <dave.hansen@linux.intel.com>
3Date: Sat, 6 Jan 2018 18:41:14 +0100
4Subject: [PATCH] x86/tboot: Unbreak tboot with PTI enabled
5MIME-Version: 1.0
6Content-Type: text/plain; charset=UTF-8
7Content-Transfer-Encoding: 8bit
8
9commit 262b6b30087246abf09d6275eb0c0dc421bcbe38 upstream.
10
11This is another case similar to what EFI does: create a new set of
12page tables, map some code at a low address, and jump to it. PTI
13mistakes this low address for userspace and mistakenly marks it
14non-executable in an effort to make it unusable for userspace.
15
16Undo the poison to allow execution.
17
18Fixes: 385ce0ea4c07 ("x86/mm/pti: Add Kconfig")
19Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
20Signed-off-by: Andrea Arcangeli <aarcange@redhat.com>
21Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
22Cc: Alan Cox <gnomes@lxorguk.ukuu.org.uk>
23Cc: Tim Chen <tim.c.chen@linux.intel.com>
24Cc: Jon Masters <jcm@redhat.com>
25Cc: Dave Hansen <dave.hansen@intel.com>
26Cc: Andi Kleen <andi@firstfloor.org>
27Cc: Jeff Law <law@redhat.com>
28Cc: Paolo Bonzini <pbonzini@redhat.com>
29Cc: Linus Torvalds <torvalds@linux-foundation.org>
30Cc: Greg Kroah-Hartman <gregkh@linux-foundation.org>
31Cc: David" <dwmw@amazon.co.uk>
32Cc: Nick Clifton <nickc@redhat.com>
33Link: https://lkml.kernel.org/r/20180108102805.GK25546@redhat.com
34Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
35Signed-off-by: Fabian Grünbichler <f.gruenbichler@proxmox.com>
36---
37 arch/x86/kernel/tboot.c | 1 +
38 1 file changed, 1 insertion(+)
39
40diff --git a/arch/x86/kernel/tboot.c b/arch/x86/kernel/tboot.c
41index a2486f444073..8337730f0956 100644
42--- a/arch/x86/kernel/tboot.c
43+++ b/arch/x86/kernel/tboot.c
44@@ -127,6 +127,7 @@ static int map_tboot_page(unsigned long vaddr, unsigned long pfn,
45 p4d = p4d_alloc(&tboot_mm, pgd, vaddr);
46 if (!p4d)
47 return -1;
48+ pgd->pgd &= ~_PAGE_NX;
49 pud = pud_alloc(&tboot_mm, p4d, vaddr);
50 if (!pud)
51 return -1;
52--
532.14.2
54