Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp710724ybz; Wed, 15 Apr 2020 17:15:09 -0700 (PDT) X-Google-Smtp-Source: APiQypL6agPW91kDOmu9D4I3OwBx7YutALdnHoEpP0QYP8Ssj022Vug8NmZ4jvKdWNFa7Bw7tNsQ X-Received: by 2002:a05:6402:8d8:: with SMTP id d24mr28601988edz.173.1586996109303; Wed, 15 Apr 2020 17:15:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586996109; cv=none; d=google.com; s=arc-20160816; b=QVEy9FhIeMXkWkV7oacv1EikmCk9WP3Ht2W+jROXKwaASaiGIa4sGyXobEDqtPqCRQ vckSSFoKhjCw7GfGu3dRz100r8dNMOT2ol521bkXy+4wB+asmpf+taTSOsbgclr7bHm+ 8kBJa+oDEXbDIYtSO+cdXaLJcvudHtlDXlCcQb4ydmpxTa+MFNpoKSgUKVdstTg3az9r wyDwldcc4CXSDOE4am+pJTCaMpuOuI9xw09f93F5R0ax4WOs/NkKimKoylhlmJJqmmon ie/Uiuqx3PAHTWNnZ9Z7D/YaXaykny3dVY16Qft2qWoK0oNB0i5gPnVNjz01HLjCVGzL 1FvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:message-id :dkim-signature; bh=1Xb7ETTN09xsr/258GQZjtHOSSD6VgHkXQ6yunhYxr8=; b=Lg6avhGoxPau/w8ku8XqOyVSBRK1PFpqeFwNmXyOsAsykxwdjHQDhjZUQaCiQxOn3I Gaw6F4wZD/2KIe45pD8jroXdnxVkzkfi7wpNHXIQOpp5x1ltwBqvzEgVXnq3o7PzHzxx VK93d99jjkCJRXk5D1hzKMbKDZ9uq5FbjBS9jr220gRr4gSzBJlvYouFONC+L3J6WLuH 9/nyC+l/reOB/zcdqTmuntlgm2YpF61PfAdlKIEQ+ZgKh8iaPokSHn6IovrQz7NcNack VPxjzLXF+EpnXJgHcn3MItedDSGgaDt45PAXM21I88HqcYHa4gPBLheD691vs1winG5U 70cw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=K+4GfYRW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p9si322369ejf.493.2020.04.15.17.14.45; Wed, 15 Apr 2020 17:15:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=K+4GfYRW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392759AbgDOO5a (ORCPT + 99 others); Wed, 15 Apr 2020 10:57:30 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:53661 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390410AbgDOO5O (ORCPT ); Wed, 15 Apr 2020 10:57:14 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 492QS61xD1z9v13t; Wed, 15 Apr 2020 16:57:10 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=K+4GfYRW; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id l7_0scJaQh56; Wed, 15 Apr 2020 16:57:10 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 492QS60phYz9v13r; Wed, 15 Apr 2020 16:57:10 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1586962630; bh=1Xb7ETTN09xsr/258GQZjtHOSSD6VgHkXQ6yunhYxr8=; h=From:Subject:To:Cc:Date:From; b=K+4GfYRWGpfU2GiiSNnqBM6cOtyEfZMohzRvwcz+6rYZ1mvFtIh8UtmpW1x1GJO6n UtWLVXsYPMY2wURgbUiSDVcc86+3acIZ+S2EdpNXT8mrsrEE9Doiz9hPsQVKBdvg1H 5dPpa32TC8c5gFI9XS5lj20WbeDFn9UFbKiryqY4= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 7E2918BB6C; Wed, 15 Apr 2020 16:57:11 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id kOjgO8qiAm7j; Wed, 15 Apr 2020 16:57:11 +0200 (CEST) Received: from pc16570vm.idsi0.si.c-s.fr (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 2F59F8B931; Wed, 15 Apr 2020 16:57:11 +0200 (CEST) Received: by pc16570vm.idsi0.si.c-s.fr (Postfix, from userid 0) id 05A9E6578F; Wed, 15 Apr 2020 14:57:11 +0000 (UTC) Message-Id: <1492bb150c1aaa53d99a604b49992e60ea20cd5f.1586962582.git.christophe.leroy@c-s.fr> From: Christophe Leroy Subject: [PATCH] powerpc/uaccess: Don't set KUEP by default on book3s/32 To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Wed, 15 Apr 2020 14:57:11 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On book3s/32, KUEP is an heavy process as it requires to set/unset the NX bit in each of the 12 user segments everytime the kernel is entered/exited from/to user space. Don't select KUEP by default on book3s/32. Signed-off-by: Christophe Leroy --- arch/powerpc/platforms/Kconfig.cputype | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/powerpc/platforms/Kconfig.cputype b/arch/powerpc/platforms/Kconfig.cputype index 0c7151c98b56..11412078e732 100644 --- a/arch/powerpc/platforms/Kconfig.cputype +++ b/arch/powerpc/platforms/Kconfig.cputype @@ -377,7 +377,7 @@ config PPC_HAVE_KUEP config PPC_KUEP bool "Kernel Userspace Execution Prevention" depends on PPC_HAVE_KUEP - default y + default y if !PPC_BOOK3S_32 help Enable support for Kernel Userspace Execution Prevention (KUEP) -- 2.25.0