This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from b97d64c72259 Merge tag '6.6-rc-smb3-client-fixes-part1' of git://git.sa [...] new 2f0584f3f4bd mm: Rename arch pte_mkwrite()'s to pte_mkwrite_novma() new 6ecc21bb432d mm: Move pte/pmd_mkwrite() callers with no VMA to _novma() new 161e393c0f63 mm: Make pte_mkwrite() take a VMA new 592b5fad1677 mm: Re-introduce vm_flags to do_mmap() new fb47a799cc5c mm: Move VM_UFFD_MINOR_BIT from 37 to 38 new 18e66b695e78 x86/shstk: Add Kconfig option for shadow stack new 2da5b91fe409 x86/traps: Move control protection handler to separate file new 701fb66d576e x86/cpufeatures: Add CPU feature flags for shadow stacks new a956efc09b10 x86/mm: Move pmd_write(), pud_write() up in the file new fca4d413c5f7 x86/mm: Introduce _PAGE_SAVED_DIRTY new 1f6f66f62e8c x86/mm: Update ptep/pmdp_set_wrprotect() for _PAGE_SAVED_DIRTY new bb3aadf7d446 x86/mm: Start actually marking _PAGE_SAVED_DIRTY new f788b71768ff x86/mm: Remove _PAGE_DIRTY from kernel RO pages new 54007f818206 mm: Introduce VM_SHADOW_STACK for shadow stack memory new fd5439e0c97b x86/mm: Check shadow stack page fault errors new 0266e7c53647 mm: Add guard pages around a shadow stack. new e5136e876581 mm: Warn on shadow stack memory in wrong vma new ae1f05a617dc x86/mm: Warn if create Write=0,Dirty=1 with raw prot new 00547ef73ff2 mm/mmap: Add shadow stack pages to memory accounting new 29f890d1050f x86/mm: Introduce MAP_ABOVE4G new b497e52ddb2a x86/mm: Teach pte_mkwrite() about stack memory new 6beb99580bc0 mm: Don't allow write GUPs to shadow stack memory new 1eb2b7841c37 Documentation/x86: Add CET shadow stack description new 8970ef027b21 x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states new 6ee836687a3f x86/fpu: Add helper for modifying xstate new 98cfa4630912 x86: Introduce userspace API for shadow stack new a5f6c2ace997 x86/shstk: Add user control-protection fault handler new 2d39a6add422 x86/shstk: Add user-mode shadow stack support new b2926a36b97a x86/shstk: Handle thread shadow stack new 928054769dbd x86/shstk: Introduce routines modifying shstk new 05e36022c054 x86/shstk: Handle signals for shadow stack new b93d6c78829a x86/shstk: Check that SSP is aligned on sigreturn new 7fad2a432cd3 x86/shstk: Check that signal frame is shadow stack mem new c35559f94ebc x86/shstk: Introduce map_shadow_stack syscall new 1d62c65372ab x86/shstk: Support WRSS for userspace new 0ee44885fe9c x86: Expose thread features in /proc/$PID/status new 488af8ea7131 x86/shstk: Wire in shadow stack interface new 0dc2a76092d9 x86/cpufeatures: Enable CET CR4 bit for shadow stack new 81f30337ef4f selftests/x86: Add shadow stack test new 2fab02b25ae7 x86: Add PTRACE interface for shadow stack new 680ed2f15e70 x86/shstk: Add ARCH_SHSTK_UNLOCK new 67840ad0fa14 x86/shstk: Add ARCH_SHSTK_STATUS new 87f0df782889 x86/shstk: Move arch detail comment out of core mm new 54acee601b87 x86/kbuild: Fix Documentation/ reference new c6b53dcec07c x86/shstk: Don't retry vm_munmap() on -EINTR new c6cfcbd8ca43 x86/ibt: Convert IBT selftest to asm new 1fe428d3692f x86/shstk: Change order of __user in type new df57721f9a63 Merge tag 'x86_shstk_for_6.6-rc1' of git://git.kernel.org/ [...]
The 48 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/arch/x86/index.rst | 1 + Documentation/arch/x86/shstk.rst | 179 +++++ Documentation/filesystems/proc.rst | 1 + Documentation/mm/arch_pgtable_helpers.rst | 12 +- arch/Kconfig | 8 + arch/alpha/include/asm/pgtable.h | 2 +- arch/arc/include/asm/hugepage.h | 2 +- arch/arc/include/asm/pgtable-bits-arcv2.h | 2 +- arch/arm/include/asm/pgtable-3level.h | 2 +- arch/arm/include/asm/pgtable.h | 2 +- arch/arm/kernel/signal.c | 2 +- arch/arm64/include/asm/pgtable.h | 4 +- arch/arm64/kernel/signal.c | 2 +- arch/arm64/kernel/signal32.c | 2 +- arch/arm64/mm/trans_pgd.c | 4 +- arch/csky/include/asm/pgtable.h | 2 +- arch/hexagon/include/asm/pgtable.h | 2 +- arch/ia64/include/asm/pgtable.h | 2 +- arch/loongarch/include/asm/pgtable.h | 4 +- arch/m68k/include/asm/mcf_pgtable.h | 2 +- arch/m68k/include/asm/motorola_pgtable.h | 2 +- arch/m68k/include/asm/sun3_pgtable.h | 2 +- arch/microblaze/include/asm/pgtable.h | 2 +- arch/mips/include/asm/pgtable.h | 6 +- arch/nios2/include/asm/pgtable.h | 2 +- arch/openrisc/include/asm/pgtable.h | 2 +- arch/parisc/include/asm/pgtable.h | 2 +- arch/powerpc/include/asm/book3s/32/pgtable.h | 2 +- arch/powerpc/include/asm/book3s/64/pgtable.h | 4 +- arch/powerpc/include/asm/nohash/32/pgtable.h | 4 +- arch/powerpc/include/asm/nohash/32/pte-8xx.h | 4 +- arch/powerpc/include/asm/nohash/64/pgtable.h | 2 +- arch/riscv/include/asm/pgtable.h | 6 +- arch/s390/Kconfig | 1 + arch/s390/include/asm/hugetlb.h | 2 +- arch/s390/include/asm/pgtable.h | 4 +- arch/s390/mm/pageattr.c | 4 +- arch/sh/include/asm/pgtable_32.h | 4 +- arch/sparc/include/asm/pgtable_32.h | 2 +- arch/sparc/include/asm/pgtable_64.h | 6 +- arch/sparc/kernel/signal32.c | 2 +- arch/sparc/kernel/signal_64.c | 2 +- arch/um/include/asm/pgtable.h | 2 +- arch/x86/Kconfig | 24 + arch/x86/Kconfig.assembler | 5 + arch/x86/entry/syscalls/syscall_64.tbl | 1 + arch/x86/include/asm/cpufeatures.h | 2 + arch/x86/include/asm/disabled-features.h | 16 +- arch/x86/include/asm/fpu/api.h | 9 + arch/x86/include/asm/fpu/regset.h | 7 +- arch/x86/include/asm/fpu/sched.h | 3 +- arch/x86/include/asm/fpu/types.h | 16 +- arch/x86/include/asm/fpu/xstate.h | 6 +- arch/x86/include/asm/idtentry.h | 2 +- arch/x86/include/asm/mmu_context.h | 2 + arch/x86/include/asm/pgtable.h | 302 +++++++- arch/x86/include/asm/pgtable_types.h | 44 +- arch/x86/include/asm/processor.h | 8 + arch/x86/include/asm/shstk.h | 38 + arch/x86/include/asm/special_insns.h | 13 + arch/x86/include/asm/tlbflush.h | 3 +- arch/x86/include/asm/trap_pf.h | 2 + arch/x86/include/asm/traps.h | 15 +- arch/x86/include/uapi/asm/mman.h | 4 + arch/x86/include/uapi/asm/prctl.h | 12 + arch/x86/kernel/Makefile | 5 + arch/x86/kernel/cet.c | 131 ++++ arch/x86/kernel/cpu/common.c | 35 +- arch/x86/kernel/cpu/cpuid-deps.c | 1 + arch/x86/kernel/cpu/proc.c | 23 + arch/x86/kernel/fpu/core.c | 54 +- arch/x86/kernel/fpu/regset.c | 81 +++ arch/x86/kernel/fpu/xstate.c | 90 ++- arch/x86/kernel/ibt_selftest.S | 17 + arch/x86/kernel/idt.c | 2 +- arch/x86/kernel/process.c | 21 +- arch/x86/kernel/process_64.c | 8 + arch/x86/kernel/ptrace.c | 12 + arch/x86/kernel/shstk.c | 550 +++++++++++++++ arch/x86/kernel/signal.c | 1 + arch/x86/kernel/signal_32.c | 2 +- arch/x86/kernel/signal_64.c | 8 +- arch/x86/kernel/sys_x86_64.c | 6 +- arch/x86/kernel/traps.c | 87 --- arch/x86/mm/fault.c | 22 + arch/x86/mm/pat/set_memory.c | 4 +- arch/x86/mm/pgtable.c | 40 ++ arch/x86/xen/enlighten_pv.c | 2 +- arch/x86/xen/mmu_pv.c | 2 +- arch/x86/xen/xen-asm.S | 2 +- arch/xtensa/include/asm/pgtable.h | 2 +- fs/aio.c | 2 +- fs/proc/array.c | 6 + fs/proc/task_mmu.c | 3 + include/asm-generic/hugetlb.h | 2 +- include/linux/mm.h | 47 +- include/linux/mman.h | 4 + include/linux/pgtable.h | 28 + include/linux/proc_fs.h | 1 + include/linux/syscalls.h | 1 + include/uapi/asm-generic/siginfo.h | 3 +- include/uapi/linux/elf.h | 2 + ipc/shm.c | 2 +- kernel/sys_ni.c | 1 + mm/debug_vm_pgtable.c | 12 +- mm/gup.c | 2 +- mm/huge_memory.c | 11 +- mm/internal.h | 4 +- mm/memory.c | 5 +- mm/migrate.c | 2 +- mm/migrate_device.c | 2 +- mm/mmap.c | 14 +- mm/mprotect.c | 2 +- mm/nommu.c | 4 +- mm/userfaultfd.c | 2 +- mm/util.c | 2 +- tools/testing/selftests/x86/Makefile | 2 +- tools/testing/selftests/x86/test_shadow_stack.c | 884 ++++++++++++++++++++++++ 118 files changed, 2790 insertions(+), 308 deletions(-) create mode 100644 Documentation/arch/x86/shstk.rst create mode 100644 arch/x86/include/asm/shstk.h create mode 100644 arch/x86/kernel/cet.c create mode 100644 arch/x86/kernel/ibt_selftest.S create mode 100644 arch/x86/kernel/shstk.c create mode 100644 tools/testing/selftests/x86/test_shadow_stack.c