[PATCH v2 0/1] x86/pti: Fix kernel warnings for pti= and nopti cmdline options.
From: Jo Van Bulck
Date: Sat Aug 12 2023 - 11:55:30 EST
Hi,
This is the third iteration of a patch to improve the cmdline option parsing
for PTI. This reverts largely back to the first iteration and cleans up the
code to remove any attempts at backwards compatible behavior for clearly
conflicting options when users erroneously combine pti= nopti and
mitigations=off as per Dave's suggestions [1].
[1] https://lore.kernel.org/all/b9bbb279-fa8f-0784-900f-114ce186cbb3@xxxxxxxxx/
Behavior
--------
For reference, behavior with this patch is now as follows in case of any
conflicting options.
1. Latest in order of nopti pti= takes priority:
KERNEL_CMDLINE="nopti pti=on"
[ 0.021779] Kernel/User page tables isolation: enabled
Mitigation: PTI
KERNEL_CMDLINE="pti=on nopti"
[ 0.010289] Kernel/User page tables isolation: disabled on command line.
Vulnerable
2. Passing mitigations=off will unconditionally disable PTI:
KERNEL_CMDLINE="mitigations=off pti=on"
[ 0.008331] Kernel/User page tables isolation: disabled on command line.
Vulnerable
KERNEL_CMDLINE="pti=on mitigations=off"
[ 0.008495] Kernel/User page tables isolation: disabled on command line.
Vulnerable
Changelog
---------
v3
- Revert backwards compatibility ugliness for conflicting options (Dave)
v2
- Split pti=off and mitigations=off checks (Sohil)
- Ensure backwards compatibility for conflicting options (Sohil)
Best,
Jo
Jo Van Bulck (1):
x86/pti: Fix kernel warnings for pti= and nopti cmdline options.
arch/x86/mm/pti.c | 55 ++++++++++++++++++++++++-----------------------
1 file changed, 28 insertions(+), 27 deletions(-)
--
2.25.1