From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965689AbcBQWx4 (ORCPT ); Wed, 17 Feb 2016 17:53:56 -0500 Received: from www.sr71.net ([198.145.64.142]:59558 "EHLO blackbird.sr71.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965386AbcBQWxz (ORCPT ); Wed, 17 Feb 2016 17:53:55 -0500 Subject: Re: [PATCH 33/33] x86, pkeys: execute-only support To: Andy Lutomirski , Kees Cook References: <20160212210152.9CAD15B0@viggo.jf.intel.com> <20160212210240.CB4BB5CA@viggo.jf.intel.com> Cc: Dave Hansen , X86 ML , Linux-MM , Andrew Morton , LKML , Linus Torvalds From: Dave Hansen Message-ID: <56C4FA01.2070008@sr71.net> Date: Wed, 17 Feb 2016 14:53:53 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/17/2016 02:17 PM, Andy Lutomirski wrote: >> > Is there a way to detect this feature's availability without userspace >> > having to set up a segv handler and attempting to read a >> > PROT_EXEC-only region? (i.e. cpu flag for protection keys, or a way to >> > check the protection to see if PROT_READ got added automatically, >> > etc?) >> > > We could add an HWCAP. I'll bite. What's an HWCAP?