Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp98906pxj; Thu, 3 Jun 2021 01:43:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxKG/7NKlbls4dVXaRuGMTmC7Qzxk7Jn9kyEorsQDHqu5mCEJD4xETvHp1rP5IPC3Q4vaRh X-Received: by 2002:a17:906:6d97:: with SMTP id h23mr886067ejt.467.1622709818525; Thu, 03 Jun 2021 01:43:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622709818; cv=none; d=google.com; s=arc-20160816; b=ToXvb5sa3EoI7VgWKRFoTjmgFrJ26xuOttS3yuAsxOCy411CFUOdQtsj765+7IUfbU h7bo3SVHlA8GdcBaWtTLKL8gc9v71HvlaLo9rRxawp5QU+xNDjzG7tExO6t8yXSdSXg5 M63FKtj0GxaZeAn9Rtq9sdmhdQ5G4lSDS2p90w+B92bE5OFgoK3S0+LTb4DDQnHpTJL4 QAmD3qhxBV16hpBpn14PTJs4aduFcnhJ06jgV7YS8nXz6DdNazrogygKikKsZYbkVNUq PmLY854ZGiDzKieifpFoRDn+uvavF8bzMROB83K5EpKCoJuxvBtJdZbv2BisgDPFWZE6 foTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:date:cc:to:subject:from:references:in-reply-to :message-id; bh=bK18UMhtqJKZufrHmdrYS5CvcI5sAfbJnL8sJGFvWZw=; b=1FK9a5DGC958/ygeGyK1SaZc/KKXrNbUCllu88fRcBICQFPVq+ftH1HSrDziYLy027 UmcXiBDvjilbHzQehWYrtV7ZIWdUnmBivRigBX1OfuN1dH72sNhS0A4Y3rEqwez+yiDN axc9DB9Rk6/am1CTEcWusD03ny3G/UHNkLhb/kETc0pvW6SagppJ4uAZ3UCkgEZCyctN xLaQy4r85p9KZKzfrMFKa0UTmI9HZT7bdJuAwlOOFML7UTIe08ysAaPFkmq2MnPH3dGh +zLP3Vx38aNcLEtdqg2uMBSCFQmCKKoYBOk8nBFykjSp3ITppI4t5LghOexJfaGTGzPP e0qQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bj9si1920393ejb.518.2021.06.03.01.43.16; Thu, 03 Jun 2021 01:43:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229799AbhFCInZ (ORCPT + 99 others); Thu, 3 Jun 2021 04:43:25 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:7043 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229620AbhFCInX (ORCPT ); Thu, 3 Jun 2021 04:43:23 -0400 Received: from localhost (mailhub3.si.c-s.fr [192.168.12.233]) by localhost (Postfix) with ESMTP id 4FwfWj2XvbzBC5k; Thu, 3 Jun 2021 10:41:37 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8HbybS6boAPN; Thu, 3 Jun 2021 10:41:37 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 4FwfWj1jgtzBC5Z; Thu, 3 Jun 2021 10:41:37 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 1B2148B849; Thu, 3 Jun 2021 10:41:37 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id R71Qwk0EC8tT; Thu, 3 Jun 2021 10:41:37 +0200 (CEST) Received: from po15610vm.idsi0.si.c-s.fr (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id D7DFC8B767; Thu, 3 Jun 2021 10:41:36 +0200 (CEST) Received: by po15610vm.idsi0.si.c-s.fr (Postfix, from userid 0) id B2AFA64BD2; Thu, 3 Jun 2021 08:41:36 +0000 (UTC) Message-Id: <0b7a13d414837e58264edc336b89c2fe9f35f9bc.1622708530.git.christophe.leroy@csgroup.eu> In-Reply-To: References: From: Christophe Leroy Subject: [PATCH v2 01/12] powerpc/32s: Move setup_{kuep/kuap}() into {kuep/kuap}.c To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Thu, 3 Jun 2021 08:41:36 +0000 (UTC) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Avoids the #ifdef in mmu.c Signed-off-by: Christophe Leroy --- arch/powerpc/mm/book3s32/Makefile | 1 + arch/powerpc/mm/book3s32/kuap.c | 11 +++++++++++ arch/powerpc/mm/book3s32/kuep.c | 8 ++++++++ arch/powerpc/mm/book3s32/mmu.c | 20 -------------------- 4 files changed, 20 insertions(+), 20 deletions(-) create mode 100644 arch/powerpc/mm/book3s32/kuap.c diff --git a/arch/powerpc/mm/book3s32/Makefile b/arch/powerpc/mm/book3s32/Makefile index 7f0c8a78ba0c..15f4773643d2 100644 --- a/arch/powerpc/mm/book3s32/Makefile +++ b/arch/powerpc/mm/book3s32/Makefile @@ -10,3 +10,4 @@ obj-y += mmu.o mmu_context.o obj-$(CONFIG_PPC_BOOK3S_603) += nohash_low.o obj-$(CONFIG_PPC_BOOK3S_604) += hash_low.o tlb.o obj-$(CONFIG_PPC_KUEP) += kuep.o +obj-$(CONFIG_PPC_KUAP) += kuap.o diff --git a/arch/powerpc/mm/book3s32/kuap.c b/arch/powerpc/mm/book3s32/kuap.c new file mode 100644 index 000000000000..1df55392878e --- /dev/null +++ b/arch/powerpc/mm/book3s32/kuap.c @@ -0,0 +1,11 @@ +// SPDX-License-Identifier: GPL-2.0-or-later + +#include + +void __init setup_kuap(bool disabled) +{ + pr_info("Activating Kernel Userspace Access Protection\n"); + + if (disabled) + pr_warn("KUAP cannot be disabled yet on 6xx when compiled in\n"); +} diff --git a/arch/powerpc/mm/book3s32/kuep.c b/arch/powerpc/mm/book3s32/kuep.c index 8ed1b8634839..6eafe7b2b031 100644 --- a/arch/powerpc/mm/book3s32/kuep.c +++ b/arch/powerpc/mm/book3s32/kuep.c @@ -38,3 +38,11 @@ void kuep_unlock(void) { kuep_update(mfsr(0) & ~SR_NX); } + +void __init setup_kuep(bool disabled) +{ + pr_info("Activating Kernel Userspace Execution Prevention\n"); + + if (disabled) + pr_warn("KUEP cannot be disabled yet on 6xx when compiled in\n"); +} diff --git a/arch/powerpc/mm/book3s32/mmu.c b/arch/powerpc/mm/book3s32/mmu.c index 159930351d9f..27061583a010 100644 --- a/arch/powerpc/mm/book3s32/mmu.c +++ b/arch/powerpc/mm/book3s32/mmu.c @@ -445,26 +445,6 @@ void __init print_system_hash_info(void) pr_info("Hash_mask = 0x%lx\n", Hash_mask); } -#ifdef CONFIG_PPC_KUEP -void __init setup_kuep(bool disabled) -{ - pr_info("Activating Kernel Userspace Execution Prevention\n"); - - if (disabled) - pr_warn("KUEP cannot be disabled yet on 6xx when compiled in\n"); -} -#endif - -#ifdef CONFIG_PPC_KUAP -void __init setup_kuap(bool disabled) -{ - pr_info("Activating Kernel Userspace Access Protection\n"); - - if (disabled) - pr_warn("KUAP cannot be disabled yet on 6xx when compiled in\n"); -} -#endif - void __init early_init_mmu(void) { } -- 2.25.0