Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751901AbbLHSVz (ORCPT ); Tue, 8 Dec 2015 13:21:55 -0500 Received: from www.linutronix.de ([62.245.132.108]:51604 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751554AbbLHSVy (ORCPT ); Tue, 8 Dec 2015 13:21:54 -0500 Date: Tue, 8 Dec 2015 19:21:05 +0100 (CET) From: Thomas Gleixner To: Dave Hansen cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, x86@kernel.org, dave.hansen@linux.intel.com Subject: Re: [PATCH 23/34] x86, pkeys: add Kconfig prompt to existing config option In-Reply-To: <20151204011456.A052855B@viggo.jf.intel.com> Message-ID: References: <20151204011424.8A36E365@viggo.jf.intel.com> <20151204011456.A052855B@viggo.jf.intel.com> User-Agent: Alpine 2.11 (DEB 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001,URIBL_BLOCKED=0.001 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1689 Lines: 49 On Thu, 3 Dec 2015, Dave Hansen wrote: > I don't have a strong opinion on whether we need this or not. > Protection Keys has relatively little code associated with it, > and it is not a heavyweight feature to keep enabled. However, > I can imagine that folks would still appreciate being able to > disable it. The tiny kernel folks are happy about every few kB which are NOT added by default. > > Signed-off-by: Dave Hansen Reviewed-by: Thomas Gleixner > --- > > b/arch/x86/Kconfig | 10 ++++++++++ > 1 file changed, 10 insertions(+) > > diff -puN arch/x86/Kconfig~pkeys-40-kconfig-prompt arch/x86/Kconfig > --- a/arch/x86/Kconfig~pkeys-40-kconfig-prompt 2015-12-03 16:21:28.726811905 -0800 > +++ b/arch/x86/Kconfig 2015-12-03 16:21:28.730812086 -0800 > @@ -1682,8 +1682,18 @@ config X86_INTEL_MPX > If unsure, say N. > > config X86_INTEL_MEMORY_PROTECTION_KEYS > + prompt "Intel Memory Protection Keys" > def_bool y > + # Note: only available in 64-bit mode > depends on CPU_SUP_INTEL && X86_64 > + ---help--- > + Memory Protection Keys provides a mechanism for enforcing > + page-based protections, but without requiring modification of the > + page tables when an application changes protection domains. > + > + For details, see Documentation/x86/protection-keys.txt > + > + If unsure, say y. > > config EFI > bool "EFI runtime service support" > _ > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/