Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3172097pxf; Sun, 21 Mar 2021 22:34:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxWoHGjvjTkeRb+izQAKZCKPBIE7XxL9xjKH4h5AaqYgSx9q171nqn2WmwKLykSsRpNYpvQ X-Received: by 2002:a17:906:684b:: with SMTP id a11mr16856940ejs.329.1616391252207; Sun, 21 Mar 2021 22:34:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616391252; cv=none; d=google.com; s=arc-20160816; b=LvHruBZuHWEZLbuATXCjQID7k2MTAeRg/HbMCx6YMjyGYj6Y691yykVu4Tm4RmsoEm Zu9ucBdWn57lfY/iK6F/dE8H0MYxKjfewolV1ynUAz3XWhGGeaPoWV7glR21HH3LiBSV ESofjUFTTBP4S3NcjI0OSPq/Izq6pHCVRf+92UnQn7WKzLxQX+hDLfuG4XDPshiP9UXk lDDkS1wVL5S8g5dnSnqtQcBCZLr0wZUWVcxDZXPCv/ibcDSvyYN0rte3mBS/CX1i7mlI o+IkSI8WXHxt0joMerjB61iIiIB45R4/JPs98ftbMzOltvNYBSnOl8fLg3HmmOB2oCof jLbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=fRrb78+gunFWEk+053QVFBl2TFBQBRG8qDos0wm1DU8=; b=FMrdJXCr2yCT+1gwIAC7tTI/Lf122hZsv0e+shsrFzd6rvO2UQSYf4IQjRWbzhixrv BmTH/UN4LSrcJ79K2PPGR43SWS9c7jkSqImHHvolXwqZmRJHHWPx417obH8dl8g5qmMc W3B65/x7aeUZK5DK/tzAqKDYCSm5Ey7Lsv1EEtWp9kqKrpFpJgPnitRHRJKthcxbtf13 sz7DwLTfguRiQ9oXPUINLNURLOTGztwTTJHrDMYTdlMqVC5p+Afx4YAhHpYUJlPDe5U9 1oa6YdUrMKx03PE599V1tZJ925V4k8b0qdK9+xZ2WQxQUnO96FUVhLWIgS/u5K/46SIN YLlA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ju22si10511927ejc.514.2021.03.21.22.33.50; Sun, 21 Mar 2021 22:34:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230053AbhCVFar (ORCPT + 99 others); Mon, 22 Mar 2021 01:30:47 -0400 Received: from mga09.intel.com ([134.134.136.24]:18631 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229905AbhCVFae (ORCPT ); Mon, 22 Mar 2021 01:30:34 -0400 IronPort-SDR: dbHJR4k80k04eXEuERkApa4PI9bTjjzhpnI5V9tn0BHJ3234M2uZio3Y0o0zOlqjLFHaTM4xkb xlRBqhKaiLzA== X-IronPort-AV: E=McAfee;i="6000,8403,9930"; a="190298142" X-IronPort-AV: E=Sophos;i="5.81,268,1610438400"; d="scan'208";a="190298142" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Mar 2021 22:30:33 -0700 IronPort-SDR: ry40SVansIgNGu+yKgeI6X2P5H8oq2YpVGVU/H0yomDUuEIc9Z9ZLnYAPfEFSVdUmuyBstKdqB MzFw4SoiOBAQ== X-IronPort-AV: E=Sophos;i="5.81,268,1610438400"; d="scan'208";a="607238739" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Mar 2021 22:30:33 -0700 From: ira.weiny@intel.com To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Andy Lutomirski , Peter Zijlstra Cc: Ira Weiny , Dan Williams , Dave Hansen , x86@kernel.org, linux-kernel@vger.kernel.org, Fenghua Yu , linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [PATCH V4 03/10] x86/pks: Add additional PKEY helper macros Date: Sun, 21 Mar 2021 22:30:13 -0700 Message-Id: <20210322053020.2287058-4-ira.weiny@intel.com> X-Mailer: git-send-email 2.28.0.rc0.12.gb6a658bd00c9 In-Reply-To: <20210322053020.2287058-1-ira.weiny@intel.com> References: <20210322053020.2287058-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny Avoid open coding shift and mask operations by defining and using helper macros for PKey operations. Reviewed-by: Dan Williams Signed-off-by: Ira Weiny --- Changes from V3: new patch suggested by Dan Williams to use macros better. --- arch/x86/include/asm/pgtable.h | 7 ++----- arch/x86/include/asm/pkeys_common.h | 11 ++++++++--- arch/x86/mm/pkeys.c | 8 +++----- 3 files changed, 13 insertions(+), 13 deletions(-) diff --git a/arch/x86/include/asm/pgtable.h b/arch/x86/include/asm/pgtable.h index bfbfb951fe65..b1529b44a996 100644 --- a/arch/x86/include/asm/pgtable.h +++ b/arch/x86/include/asm/pgtable.h @@ -1370,19 +1370,16 @@ extern u32 init_pkru_value; static inline bool __pkru_allows_read(u32 pkru, u16 pkey) { - int pkru_pkey_bits = pkey * PKR_BITS_PER_PKEY; - - return !(pkru & (PKR_AD_BIT << pkru_pkey_bits)); + return !(pkru & PKR_AD_KEY(pkey)); } static inline bool __pkru_allows_write(u32 pkru, u16 pkey) { - int pkru_pkey_bits = pkey * PKR_BITS_PER_PKEY; /* * Access-disable disables writes too so we need to check * both bits here. */ - return !(pkru & ((PKR_AD_BIT|PKR_WD_BIT) << pkru_pkey_bits)); + return !(pkru & (PKR_AD_KEY(pkey) | PKR_WD_KEY(pkey))); } static inline u16 pte_flags_pkey(unsigned long pte_flags) diff --git a/arch/x86/include/asm/pkeys_common.h b/arch/x86/include/asm/pkeys_common.h index e40b0ced733f..0681522974ba 100644 --- a/arch/x86/include/asm/pkeys_common.h +++ b/arch/x86/include/asm/pkeys_common.h @@ -6,10 +6,15 @@ #define PKR_WD_BIT 0x2 #define PKR_BITS_PER_PKEY 2 +#define PKR_PKEY_SHIFT(pkey) (pkey * PKR_BITS_PER_PKEY) +#define PKR_PKEY_MASK(pkey) (((1 << PKR_BITS_PER_PKEY) - 1) << PKR_PKEY_SHIFT(pkey)) + /* - * Generate an Access-Disable mask for the given pkey. Several of these can be - * OR'd together to generate pkey register values. + * Generate an Access-Disable and Write-Disable mask for the given pkey. + * Several of the AD's are OR'd together to generate a default pkey register + * value. */ -#define PKR_AD_KEY(pkey) (PKR_AD_BIT << ((pkey) * PKR_BITS_PER_PKEY)) +#define PKR_AD_KEY(pkey) (PKR_AD_BIT << PKR_PKEY_SHIFT(pkey)) +#define PKR_WD_KEY(pkey) (PKR_WD_BIT << PKR_PKEY_SHIFT(pkey)) #endif /*_ASM_X86_PKEYS_COMMON_H */ diff --git a/arch/x86/mm/pkeys.c b/arch/x86/mm/pkeys.c index d1dfe743e79f..fc8c7e2bb21b 100644 --- a/arch/x86/mm/pkeys.c +++ b/arch/x86/mm/pkeys.c @@ -218,16 +218,14 @@ __setup("init_pkru=", setup_init_pkru); */ u32 update_pkey_val(u32 pk_reg, int pkey, unsigned int flags) { - int pkey_shift = pkey * PKR_BITS_PER_PKEY; - /* Mask out old bit values */ - pk_reg &= ~(((1 << PKR_BITS_PER_PKEY) - 1) << pkey_shift); + pk_reg &= ~PKR_PKEY_MASK(pkey); /* Or in new values */ if (flags & PKEY_DISABLE_ACCESS) - pk_reg |= PKR_AD_BIT << pkey_shift; + pk_reg |= PKR_AD_KEY(pkey); if (flags & PKEY_DISABLE_WRITE) - pk_reg |= PKR_WD_BIT << pkey_shift; + pk_reg |= PKR_WD_KEY(pkey); return pk_reg; } -- 2.28.0.rc0.12.gb6a658bd00c9