Received: by 10.192.165.148 with SMTP id m20csp4406464imm; Tue, 8 May 2018 08:00:47 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrZs2XfDvxo+QjK61xJ4dXYsKSpQrGAfBRv6pk0mdGWp8XU5jiR1b+xKeFuEJgaHwsExkj8 X-Received: by 2002:a65:5cc6:: with SMTP id b6-v6mr32131038pgt.84.1525791647206; Tue, 08 May 2018 08:00:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525791647; cv=none; d=google.com; s=arc-20160816; b=DG14d9UUIZcqhu27S1ETuph2Z0DDpg/Ohv7OPkmbvjP4A1C+Af1ndQW8OOEye5gt+e 0EICD3JnOSMmBvLCFCf91UoQNgeEEIvWvZdJ8UsG3GNKb/0h1WpXAguOBxMFWWjitrKJ FAXA0hoWCBPDb4f3T1avxOP1DLbUsk2MFwBwBoxtshkDBT+3SSPNbS8ia9Xn1Qe/doqK R4PWpu6WRU1Hvu4vhnv50Y6Pr9BKa8pOId5ybxB04qs9PvXVf6ctB1JrY+W8yjslRhNg AnpWrhIKDO9tU2P7bOEmJ2Bu6wMGNUp6+KGJJNp6ks2XNFpaf0Upu/8xlEXOtv4fyEQX 7lLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=MpISJ4BK84c+dseMztOjsncOZniVagiPiRVh4R4ZxxQ=; b=dmGF2owMvm74i33FoT8cOYMALArJs7LA40XshROiJ48n7TbYX9dWANoUwKsnJw21w5 mtOaE5AKiA95ApIpy0MEdtgTucCZoRVV4pM9OsOUUHLsa4khnjfoA8YuJXmWDOucwtx0 oV97FZn/oL7IsJXeCgw7cWbLTo0TniljbgXchkUoOX8pw2L6ab0GHFizepN2WgPmPhQy wSmVo9R7ewUvpHWWbv4pPQXVcxCZrXpuTJyyCB1vzxu8mh/jkd/tHfKzOzBf6EaYWyKD 9kJ5+NFHf7Lp+l+p355ITW9tDEp7GUtHQ+xoSzHi4KmuZv4BuTrhysTaEYlZlgCUuKaw sMCA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o78si445579pfa.54.2018.05.08.08.00.32; Tue, 08 May 2018 08:00:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932925AbeEHPAE (ORCPT + 99 others); Tue, 8 May 2018 11:00:04 -0400 Received: from ozlabs.org ([203.11.71.1]:35025 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932769AbeEHPAA (ORCPT ); Tue, 8 May 2018 11:00:00 -0400 Received: by ozlabs.org (Postfix, from userid 1034) id 40gN2660bqz9s4n; Wed, 9 May 2018 00:59:58 +1000 (AEST) From: Michael Ellerman To: linuxram@us.ibm.com Cc: mingo@redhat.com, linuxppc-dev@ozlabs.org, linux-mm@kvack.org, x86@kernel.org, linux-kernel@vger.kernel.org, dave.hansen@intel.com Subject: [PATCH 4/8] mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h Date: Wed, 9 May 2018 00:59:44 +1000 Message-Id: <20180508145948.9492-5-mpe@ellerman.id.au> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180508145948.9492-1-mpe@ellerman.id.au> References: <20180508145948.9492-1-mpe@ellerman.id.au> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Consolidate the pkey handling by providing a common empty definition of vma_pkey() in pkeys.h when CONFIG_ARCH_HAS_PKEYS=n. This also removes another entanglement of pkeys.h and asm/mmu_context.h. Signed-off-by: Michael Ellerman --- arch/powerpc/include/asm/mmu_context.h | 5 ----- arch/x86/include/asm/mmu_context.h | 5 ----- include/linux/pkeys.h | 5 +++++ 3 files changed, 5 insertions(+), 10 deletions(-) diff --git a/arch/powerpc/include/asm/mmu_context.h b/arch/powerpc/include/asm/mmu_context.h index 1835ca1505d6..896efa559996 100644 --- a/arch/powerpc/include/asm/mmu_context.h +++ b/arch/powerpc/include/asm/mmu_context.h @@ -250,11 +250,6 @@ static inline bool arch_vma_access_permitted(struct vm_area_struct *vma, #define thread_pkey_regs_restore(new_thread, old_thread) #define thread_pkey_regs_init(thread) -static inline int vma_pkey(struct vm_area_struct *vma) -{ - return 0; -} - static inline u64 pte_to_hpte_pkey_bits(u64 pteflags) { return 0x0UL; diff --git a/arch/x86/include/asm/mmu_context.h b/arch/x86/include/asm/mmu_context.h index 57e3785d0d26..3d748bdf44a7 100644 --- a/arch/x86/include/asm/mmu_context.h +++ b/arch/x86/include/asm/mmu_context.h @@ -296,11 +296,6 @@ static inline int vma_pkey(struct vm_area_struct *vma) return (vma->vm_flags & vma_pkey_mask) >> VM_PKEY_SHIFT; } -#else -static inline int vma_pkey(struct vm_area_struct *vma) -{ - return 0; -} #endif /* diff --git a/include/linux/pkeys.h b/include/linux/pkeys.h index ed06e1a67bfa..aad54663763b 100644 --- a/include/linux/pkeys.h +++ b/include/linux/pkeys.h @@ -13,6 +13,11 @@ #define PKEY_DEDICATED_EXECUTE_ONLY 0 #define ARCH_VM_PKEY_FLAGS 0 +static inline int vma_pkey(struct vm_area_struct *vma) +{ + return 0; +} + static inline bool mm_pkey_is_allocated(struct mm_struct *mm, int pkey) { return (pkey == 0); -- 2.14.1