Re: SEP bit disabled in FC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jun 10, 2005 at 09:32:55AM +0200, Arjan van de Ven wrote:
 > On Thu, 2005-06-09 at 21:25 -0400, Dave Jones wrote:
 > > On Thu, Jun 09, 2005 at 06:22:05PM -0700, Jeffrey Buell wrote:
 > >  > In arch/i386/kernel/cpu/common.c:
 > >  > 
 > >  >         /* hack: disable SEP for non-NX cpus; SEP breaks Execshield. */
 > >  >         #ifdef CONFIG_HIGHMEM64G
 > >  >         if (!test_bit(X86_FEATURE_NX, c->x86_capability))
 > >  >         #endif
 > >  >                 clear_bit(X86_FEATURE_SEP, c->x86_capability);
 > >  > 
 > >  > So, in order to enable Execshield, the SEP cpu bit (sysenter/sysexit) has to
 > >  > be turned off.  But this costs a lot of performance: as much as 2.5X in
 > >  > syscall-heavy benchmarks (e.g., process tests in lmbench).
 > >  > 
 > >  > How permanent is this hack?  Will Execshield be fixed (or removed) by FC5?
 > > 
 > > It was going to be reeanbled for FC4, but due to a last minute glitch,
 > > (which we think we fixed), we disabled for it for the release with
 > > the intention of reenabling it in the first kernel update that goes
 > > out for FC4.
 > 
 > You're confusing VDSO page with SEP.

Indeed.

		Dave

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux