From patchwork Fri May 24 18:51:35 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrew Morton X-Patchwork-Id: 13673555 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D85E6C25B74 for ; Fri, 24 May 2024 18:51:46 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 412456B007B; Fri, 24 May 2024 14:51:46 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 3C1C56B0082; Fri, 24 May 2024 14:51:46 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2B1236B0083; Fri, 24 May 2024 14:51:46 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 0E4066B007B for ; Fri, 24 May 2024 14:51:46 -0400 (EDT) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 60B8B160CA5 for ; Fri, 24 May 2024 18:51:43 +0000 (UTC) X-FDA: 82154183286.03.27F91B1 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by imf30.hostedemail.com (Postfix) with ESMTP id 0DF9080009 for ; Fri, 24 May 2024 18:51:40 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=v0ZDJDFo; spf=pass (imf30.hostedemail.com: domain of akpm@linux-foundation.org designates 145.40.73.55 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org; dmarc=none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1716576701; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=liaK1OiDGAXw9/VMcno07QXmLmnwmQwbO+mOGxsJhNk=; b=m5A6mGlJZ29uZNyKu+ARCq+iOKEziR9/KX/ddT61f4v/BGj+wa8Li22u+kky5GZbkM2XJi 8DEhpmTGIoIvMDxaZw5QGEJHquQC/lhrzdOBkCadtb9aLstQhktjy3PGZhjnj00H2NAhYy O1e541VLgkRfRro1ZHaJ22XOiqaOuAY= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1716576701; a=rsa-sha256; cv=none; b=i/oJsFOYWZK9unN4VL/xEWzRwqE8hnn/yuZCDHIyIy5OHr5PluG0ZVXAKD1wwWrRZf6h/8 Jm1C+v5xi9b9DjMFWsPb9PVRFZkltIIZtKdwU73pCmtFzkEyYcB4DUSTykPwDeJIrUl46B SMmj0+Lta4mrbla/cyNJ7efs6kwlWPQ= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=v0ZDJDFo; spf=pass (imf30.hostedemail.com: domain of akpm@linux-foundation.org designates 145.40.73.55 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org; dmarc=none Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by sin.source.kernel.org (Postfix) with ESMTP id 7FC89CE1286; Fri, 24 May 2024 18:51:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3290DC2BBFC; Fri, 24 May 2024 18:51:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1716576696; bh=LMF9gkUgHj1akckbBYnGykASAD6kVjbsT7sG7bX3nE4=; h=Date:From:To:Cc:Subject:From; b=v0ZDJDFokhg5Y1Da+53pmWUPHBl53thb8uo3wp/9W0jDlrEVTjKZXPE7rd09wJtDX gfL6iuCIZfbefowsxPyeH7MUZgah0zVaOauf9dCnx17BWKrhw8Is5cZeBTMluz3Ttz x9NL+f5tIhQUIs5Esa1VdtWmms4iIuoerSE+9gL8= Date: Fri, 24 May 2024 11:51:35 -0700 From: Andrew Morton To: Linus Torvalds Cc: linux-mm@kvack.org, mm-commits@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] final MM update for 6.10-rc1 Message-Id: <20240524115135.3b6fd971bdb3e538e1873632@linux-foundation.org> X-Mailer: Sylpheed 3.8.0beta1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Mime-Version: 1.0 X-Rspam-User: X-Stat-Signature: kj89kms6rwtz311knkzqspz1uxxyq636 X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 0DF9080009 X-HE-Tag: 1716576700-608525 X-HE-Meta: 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 j8/B6sEN RFRKPkPg8NsGpAZC5ZhC9wi/AdnPvGjSAlgxhFptawFVSRxbT8YLxODyJWavdQNCp8ctSxgFrJkas4H9DFLS4G5TZtziBDHM2h/hPhRbT0cY1SRagVKy9xxnrfSCn61vX6QAH77xbq/qGx/mzmtFQfjJ3g7J24XwG6BwlTt/S8FgnC48fmDr+MjevLTP1+otx6tJapyLTbiHNVHlO8kHbnBsxEi3/qvPWRjTixap4Tc7fDhVLM5DIF9spPC7+8BzmhBx/acHU64p4CQKsDS3zlgVVFZuUpBDip6Oc X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Linus, please merge Jeff's mseal() syscall patchset, thanks. The following changes since commit c760b3725e52403dc1b28644fb09c47a83cacea6: Merge tag 'mm-nonmm-stable-2024-05-22-17-30' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm (2024-05-22 18:59:29 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm tags/mm-stable-2024-05-24-11-49 for you to fetch changes up to a52b4f11a2e17109c4b9f7df4ff19215b1752efc: selftest mm/mseal read-only elf memory segment (2024-05-23 19:40:27 -0700) ---------------------------------------------------------------- Jeff Xu's implementation of the mseal() syscall. ---------------------------------------------------------------- Jeff Xu (5): mseal: wire up mseal syscall mseal: add mseal syscall selftest mm/mseal memory sealing mseal: add documentation selftest mm/mseal read-only elf memory segment Documentation/userspace-api/index.rst | 1 + Documentation/userspace-api/mseal.rst | 199 +++ arch/alpha/kernel/syscalls/syscall.tbl | 1 + arch/arm/tools/syscall.tbl | 1 + arch/arm64/include/asm/unistd.h | 2 +- arch/arm64/include/asm/unistd32.h | 2 + arch/m68k/kernel/syscalls/syscall.tbl | 1 + arch/microblaze/kernel/syscalls/syscall.tbl | 1 + arch/mips/kernel/syscalls/syscall_n32.tbl | 1 + arch/mips/kernel/syscalls/syscall_n64.tbl | 1 + arch/mips/kernel/syscalls/syscall_o32.tbl | 1 + arch/parisc/kernel/syscalls/syscall.tbl | 1 + arch/powerpc/kernel/syscalls/syscall.tbl | 1 + arch/s390/kernel/syscalls/syscall.tbl | 1 + arch/sh/kernel/syscalls/syscall.tbl | 1 + arch/sparc/kernel/syscalls/syscall.tbl | 1 + arch/x86/entry/syscalls/syscall_32.tbl | 1 + arch/x86/entry/syscalls/syscall_64.tbl | 1 + arch/xtensa/kernel/syscalls/syscall.tbl | 1 + include/linux/syscalls.h | 1 + include/uapi/asm-generic/unistd.h | 5 +- kernel/sys_ni.c | 1 + mm/Makefile | 4 + mm/internal.h | 37 + mm/madvise.c | 12 + mm/mmap.c | 31 +- mm/mprotect.c | 10 + mm/mremap.c | 31 + mm/mseal.c | 307 +++++ tools/testing/selftests/mm/.gitignore | 2 + tools/testing/selftests/mm/Makefile | 2 + tools/testing/selftests/mm/mseal_test.c | 1894 +++++++++++++++++++++++++++ tools/testing/selftests/mm/seal_elf.c | 179 +++ 33 files changed, 2732 insertions(+), 3 deletions(-) create mode 100644 Documentation/userspace-api/mseal.rst create mode 100644 mm/mseal.c create mode 100644 tools/testing/selftests/mm/mseal_test.c create mode 100644 tools/testing/selftests/mm/seal_elf.c