Received: by 10.223.176.46 with SMTP id f43csp310937wra; Thu, 18 Jan 2018 17:59:40 -0800 (PST) X-Google-Smtp-Source: ACJfBosNDNxqHWw4/NfAOpATAIW5WSi+D2wlk9U2o6QzdOQd4UEzqgI7ansDrOP7aS7YnLXnp7K8 X-Received: by 2002:a17:902:bf0a:: with SMTP id bi10-v6mr752146plb.421.1516327180881; Thu, 18 Jan 2018 17:59:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516327180; cv=none; d=google.com; s=arc-20160816; b=Asx7IeZF9F6oPWGlTQV59rK/jl/FEV/B8VH77FjY7mugnLhjBDH+YjyjMv6BDtE0Ui Rx2JkIuYGE5JuicjPnLvGKq42CZKBu1xJKPIZChgenR0rjV6q0i6Jvx9f5WBaZAqhuLr 3PLZPm9NkT71ZF9WOrTH1MIk51rN2IRAHScWJcY18x1ApdDUf7pyxMpLqrM6ylsD75g7 /GwNhpkRGsQ7GlU9mU7j4OVx4KCgfHIA6j1TjF7hDKApPGQHRyfA9paYL5tfzsAv3zwp /LM2vMJw2tv1vUCIKMjEfX0F5fcaZZSUu+ahccBcL2WZpOIsiGUMCBry9Xu/ffeEKaG/ yXDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=RlEtcT6gHrZUeksrKig78aWW67r7ncH1P8ys9v772Yk=; b=dzJ+tuZt4RyHO89+8UtSIOGtMKjdVolcFURNrL+pxDgwZYU7aGpD+eKjzjhLCcXyRx jX7WRtr/u74i36XO0C28eA6g+ZOWVKYM6SH1qelMsN/+7cYrUN01vxOA6mI1I1SUfwQi cjzr/+KmBvY3J1eX7bJGjihg0TNS7MKKduKpkdxxrHfzXLsg5WwJo/caduKPSUlgCTgb jkbcyFDYsYKPjua7GciyU7rAMj8+yy8V3p+pJYP/joRucHBllbGv45kUp0cjJihziqj+ KVShXkJMCAyF7lhg+au3Z12fyEpDbHEsHfq4ZQLTWdeT9AN9un8oY44YPGoIeeegdaKl jDug== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=VY4IiHbR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c5-v6si400747pls.500.2018.01.18.17.59.27; Thu, 18 Jan 2018 17:59:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=VY4IiHbR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755501AbeASB55 (ORCPT + 99 others); Thu, 18 Jan 2018 20:57:57 -0500 Received: from mail-qt0-f196.google.com ([209.85.216.196]:42265 "EHLO mail-qt0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755621AbeASBwT (ORCPT ); Thu, 18 Jan 2018 20:52:19 -0500 Received: by mail-qt0-f196.google.com with SMTP id c2so428224qtn.9; Thu, 18 Jan 2018 17:52:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references; bh=RlEtcT6gHrZUeksrKig78aWW67r7ncH1P8ys9v772Yk=; b=VY4IiHbRa8hFOiqrkRqMUYD5PpnkYtYlVZ/FngzeRZwOYJRwMvoY9RvH/jiFvXJvnW z85+DEmfjuv/ftD6V2v1MSfOdaIFs+shs/XJbzw+HesrEdD15YsJYAOOoYTGgLCosrH3 oqcnmXatg2xoEsffwP1ucIEF9Nllfce1mjN9ccNzq0qnty0Pb+jTA0J3CJtegYSiTR3s jnX6KPEA8VEhOIj3qRVxZwnZZs4GEJRdHtmIPEVOiuUqZ5h1++qtxERz67hcFgPqH+60 amo9eya/f373fJkelj2hm41NxBVG1l2UqEzDgDAIVW5VMZckkQbqbiymOooLVJj57C+X RjAA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references; bh=RlEtcT6gHrZUeksrKig78aWW67r7ncH1P8ys9v772Yk=; b=lsoifJLkJSd2tgYyJfavmuakYfTdwX73jRSbxDH+fc0ls2fR8HnWp/XqJ6Som3i/2D 6dNYcpzBb1EWx+Jp5UeIi8ZCA8VbSSIopvVp6xeouMPQDxQVQ3Xi6xeg56hq3VAlHsN7 E7kH7On+54IzCUTgxZBXoPDMEi7ZvdUzcU/u2BqhkEsc8LGdGS40F4AwrhroQQOd2uR/ W/iesDMDCIUSp4DiammLNPTmmlP2jpn2xsCq2NVQ0jL9lqkaJU8xrD7AYbDqXRX4PW1E +BlL8Xg/+v9h2+C3XJ1HFskZ8f/v5iMQPLG/ls1F/QQZfWG+iMd61sNgs6Qab04fzzkB 8hPw== X-Gm-Message-State: AKwxytfIVGg7Fqp7GTPUuutiH5TuWSS6A4VkGRzWDca9k5JdegwU5lwF hmthB4VcPKj3izKbSJi8MPk= X-Received: by 10.200.48.166 with SMTP id v35mr40245717qta.296.1516326738703; Thu, 18 Jan 2018 17:52:18 -0800 (PST) Received: from localhost.localdomain (50-39-100-161.bvtn.or.frontiernet.net. [50.39.100.161]) by smtp.gmail.com with ESMTPSA id c127sm5483161qke.78.2018.01.18.17.52.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 18 Jan 2018 17:52:18 -0800 (PST) From: Ram Pai To: mpe@ellerman.id.au, mingo@redhat.com, akpm@linux-foundation.org, corbet@lwn.net, arnd@arndb.de Cc: linuxppc-dev@lists.ozlabs.org, linux-mm@kvack.org, x86@kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, dave.hansen@intel.com, benh@kernel.crashing.org, paulus@samba.org, khandual@linux.vnet.ibm.com, aneesh.kumar@linux.vnet.ibm.com, bsingharora@gmail.com, hbabu@us.ibm.com, mhocko@kernel.org, bauerman@linux.vnet.ibm.com, ebiederm@xmission.com, linuxram@us.ibm.com Subject: [PATCH v10 12/27] powerpc: ability to associate pkey to a vma Date: Thu, 18 Jan 2018 17:50:33 -0800 Message-Id: <1516326648-22775-13-git-send-email-linuxram@us.ibm.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1516326648-22775-1-git-send-email-linuxram@us.ibm.com> References: <1516326648-22775-1-git-send-email-linuxram@us.ibm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org arch-independent code expects the arch to map a pkey into the vma's protection bit setting. The patch provides that ability. Signed-off-by: Ram Pai --- arch/powerpc/include/asm/mman.h | 7 ++++++- arch/powerpc/include/asm/pkeys.h | 11 +++++++++++ arch/powerpc/mm/pkeys.c | 8 ++++++++ 3 files changed, 25 insertions(+), 1 deletions(-) diff --git a/arch/powerpc/include/asm/mman.h b/arch/powerpc/include/asm/mman.h index 30922f6..2999478 100644 --- a/arch/powerpc/include/asm/mman.h +++ b/arch/powerpc/include/asm/mman.h @@ -13,6 +13,7 @@ #include #include +#include #include /* @@ -22,7 +23,11 @@ static inline unsigned long arch_calc_vm_prot_bits(unsigned long prot, unsigned long pkey) { - return (prot & PROT_SAO) ? VM_SAO : 0; +#ifdef CONFIG_PPC_MEM_KEYS + return (((prot & PROT_SAO) ? VM_SAO : 0) | pkey_to_vmflag_bits(pkey)); +#else + return ((prot & PROT_SAO) ? VM_SAO : 0); +#endif } #define arch_calc_vm_prot_bits(prot, pkey) arch_calc_vm_prot_bits(prot, pkey) diff --git a/arch/powerpc/include/asm/pkeys.h b/arch/powerpc/include/asm/pkeys.h index 2b5bb35..c7cc433 100644 --- a/arch/powerpc/include/asm/pkeys.h +++ b/arch/powerpc/include/asm/pkeys.h @@ -41,6 +41,17 @@ #define ARCH_VM_PKEY_FLAGS (VM_PKEY_BIT0 | VM_PKEY_BIT1 | VM_PKEY_BIT2 | \ VM_PKEY_BIT3 | VM_PKEY_BIT4) +/* Override any generic PKEY permission defines */ +#define PKEY_DISABLE_EXECUTE 0x4 +#define PKEY_ACCESS_MASK (PKEY_DISABLE_ACCESS | \ + PKEY_DISABLE_WRITE | \ + PKEY_DISABLE_EXECUTE) + +static inline u64 pkey_to_vmflag_bits(u16 pkey) +{ + return (((u64)pkey << VM_PKEY_SHIFT) & ARCH_VM_PKEY_FLAGS); +} + #define arch_max_pkey() pkeys_total #define pkey_alloc_mask(pkey) (0x1 << pkey) diff --git a/arch/powerpc/mm/pkeys.c b/arch/powerpc/mm/pkeys.c index b466a2c..ee31ab5 100644 --- a/arch/powerpc/mm/pkeys.c +++ b/arch/powerpc/mm/pkeys.c @@ -39,6 +39,14 @@ int pkey_initialize(void) (PKEY_DISABLE_ACCESS | PKEY_DISABLE_WRITE)); /* + * pkey_to_vmflag_bits() assumes that the pkey bits are contiguous + * in the vmaflag. Make sure that is really the case. + */ + BUILD_BUG_ON(__builtin_clzl(ARCH_VM_PKEY_FLAGS >> VM_PKEY_SHIFT) + + __builtin_popcountl(ARCH_VM_PKEY_FLAGS >> VM_PKEY_SHIFT) + != (sizeof(u64) * BITS_PER_BYTE)); + + /* * Disable the pkey system till everything is in place. A subsequent * patch will enable it. */ -- 1.7.1