Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2214241imu; Sun, 18 Nov 2018 18:45:13 -0800 (PST) X-Google-Smtp-Source: AJdET5cbXeOgetRxZiQDOqVw6HCxtwvbmDhszMhPDgLlzBEY1Zmv3HsN8Nxjosh7fsdAUfuqFWHC X-Received: by 2002:a63:f0c:: with SMTP id e12mr18265192pgl.274.1542595513331; Sun, 18 Nov 2018 18:45:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542595513; cv=none; d=google.com; s=arc-20160816; b=gWPgTw6wgcE4BYclfuwW3v5/3WT4EnBVS23weZMkGP0WiVfluuzGf6olMl+H+7F1jM e/ehgazdkDQyeEf1mCI57SqaBDYpjkv03/AdRDz5OJGV5lrisxtejGztuLcqKuokvK9y k4PoJtVRXK/i6Up9WYrhH2TVn8bDJBvAFQq86cdsywVvM0E5PfjoR3G9W9C2Jt8kNW4b m5+DiJpNIclm0xieY3/2VNLDLj5jsCUrs2UyC5SatugQ0mUat4TyIX7vr7fcqLofAkjG wrwtJfBnUbL6FhcPOmsOmmbHk2Zh1F4kUMGNMbXqVuNKPp73MSZsNLK1z2kmh+k9gDwg mzbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=k4judxvnQqY4gxG2Ew236YLz5HTm5ZsyoOzfNiUOJy4=; b=e5agC7AXNuOmSnEekUYgDClwZhdAJIhbcaM2KvDKKSHTHAGmQ6kGj9E5/KIJlxQRYN 7f7cgOx7hq1Wp45rq4Vp7GCucTu+zDfwJFKpMOpxF7Dh4X6tWlnas/W8c1PpY5/az1fy HDJiTSBcLC2qPhYuXnP6LEIRu3rFZNTCnFdeB15ZBe0SW5IoX6A42pctwWM7kR+G6ww6 YQ/lPLFC6OVTvNfonAIuIzmo1DOyhOQvj/TcCTKuFIyAbzO/Y6hX4rF14Usdif1B9BjB 2jP+dMxC/IUc7vJ9peDdFP7Z3gTYZfu0OStTzjxJznWuyE7wfK+vnQ7EiSCLFY0On34F fz7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=TzTV2XHW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e7si22195492pfh.147.2018.11.18.18.44.58; Sun, 18 Nov 2018 18:45:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=TzTV2XHW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727773AbeKSNF5 (ORCPT + 99 others); Mon, 19 Nov 2018 08:05:57 -0500 Received: from wout2-smtp.messagingengine.com ([64.147.123.25]:54265 "EHLO wout2-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726393AbeKSNF5 (ORCPT ); Mon, 19 Nov 2018 08:05:57 -0500 Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.west.internal (Postfix) with ESMTP id 8617D966; Sun, 18 Nov 2018 21:43:46 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Sun, 18 Nov 2018 21:43:46 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=k4judxvnQqY4gxG2Ew236YLz5HTm5ZsyoOzfNiUOJ y4=; b=TzTV2XHWYVIJsqmbzmBruAIPqxv4EpAEqqsER9dF4KbOY2LcBjhVvxgci f7i3qraS4WEft9LP6r0IUkrkV8bswEYh3W1yciSzKNhUob907DZ68O9EhDdHNxxG vMZQxKttYKq5aJvBenrnmJAhtdbljZoafCQIFXFFTRT1ydPZBDYD07VFsH1gJUSO XFk3MJLlaX/OadACA4D25nbW2eOjCrSlAS6J8mi+icJJs/9eUaeC7cZ+nqsqi9AA sZKcrEa/Wd7R8wEW3ccWvKvUVtMUcw67KsXCU0ogVNauIysS0m1kQwYQfQICxeNv 6VydGrgaYGnIUT3aroekuvp8iQXag== X-ME-Sender: X-ME-Proxy: Received: from crackle.ozlabs.ibm.com (unknown [122.99.82.10]) by mail.messagingengine.com (Postfix) with ESMTPA id C490BE405B; Sun, 18 Nov 2018 21:43:41 -0500 (EST) Message-ID: <63177c72b94a653707d6b984ca789ecf8ebf0a95.camel@russell.cc> Subject: Re: [RFC PATCH v1 3/6] powerpc: Add skeleton for Kernel Userspace Execution Prevention From: Russell Currey To: Christophe Leroy , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Mon, 19 Nov 2018 13:44:08 +1100 In-Reply-To: <1b27e980fa8dda09955b35be09c99bb1e22fef70.1541568127.git.christophe.leroy@c-s.fr> References: <1b27e980fa8dda09955b35be09c99bb1e22fef70.1541568127.git.christophe.leroy@c-s.fr> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.2 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2018-11-07 at 16:56 +0000, Christophe Leroy wrote: > This patch adds a skeleton for Kernel Userspace Execution Prevention. > > Then subarches implementing it have to define CONFIG_PPC_HAVE_KUEP > and provide setup_kuep() function. > > Signed-off-by: Christophe Leroy An open question (with nothing to do specifically with this patch): For what reason would you ever disable execution prevention? Clearly there must be something since "nosmep" is a thing, but I don't know why we'd ever do it. - Russell