{"id":814445,"url":"http://patchwork.ozlabs.org/api/covers/814445/?format=json","web_url":"http://patchwork.ozlabs.org/project/linuxppc-dev/cover/1505524870-4783-1-git-send-email-linuxram@us.ibm.com/","project":{"id":2,"url":"http://patchwork.ozlabs.org/api/projects/2/?format=json","name":"Linux PPC development","link_name":"linuxppc-dev","list_id":"linuxppc-dev.lists.ozlabs.org","list_email":"linuxppc-dev@lists.ozlabs.org","web_url":"https://github.com/linuxppc/wiki/wiki","scm_url":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git","webscm_url":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/","list_archive_url":"https://lore.kernel.org/linuxppc-dev/","list_archive_url_format":"https://lore.kernel.org/linuxppc-dev/{}/","commit_url_format":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}"},"msgid":"<1505524870-4783-1-git-send-email-linuxram@us.ibm.com>","list_archive_url":"https://lore.kernel.org/linuxppc-dev/1505524870-4783-1-git-send-email-linuxram@us.ibm.com/","date":"2017-09-16T01:21:04","name":"[0/6] mm, x86, powerpc: Memory Protection Keys enhancement","submitter":{"id":2667,"url":"http://patchwork.ozlabs.org/api/people/2667/?format=json","name":"Ram Pai","email":"linuxram@us.ibm.com"},"mbox":"http://patchwork.ozlabs.org/project/linuxppc-dev/cover/1505524870-4783-1-git-send-email-linuxram@us.ibm.com/mbox/","series":[{"id":3406,"url":"http://patchwork.ozlabs.org/api/series/3406/?format=json","web_url":"http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=3406","date":"2017-09-16T01:21:04","name":"mm, x86, powerpc: Memory Protection Keys enhancement","version":1,"mbox":"http://patchwork.ozlabs.org/series/3406/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/814445/comments/","headers":{"Return-Path":"<linuxppc-dev-bounces+patchwork-incoming=ozlabs.org@lists.ozlabs.org>","X-Original-To":["patchwork-incoming@ozlabs.org","linuxppc-dev@lists.ozlabs.org"],"Delivered-To":["patchwork-incoming@ozlabs.org","linuxppc-dev@lists.ozlabs.org"],"Received":["from lists.ozlabs.org (lists.ozlabs.org [103.22.144.68])\n\t(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xvF0B485xz9t16\n\tfor <patchwork-incoming@ozlabs.org>;\n\tSat, 16 Sep 2017 11:23:38 +1000 (AEST)","from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 3xvF0B2fXyzDrnj\n\tfor <patchwork-incoming@ozlabs.org>;\n\tSat, 16 Sep 2017 11:23:38 +1000 (AEST)","from mail-qt0-x242.google.com (mail-qt0-x242.google.com\n\t[IPv6:2607:f8b0:400d:c0d::242])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128\n\tbits)) (No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 3xvDxm34L7zDrbr\n\tfor <linuxppc-dev@lists.ozlabs.org>;\n\tSat, 16 Sep 2017 11:21:31 +1000 (AEST)","by mail-qt0-x242.google.com with SMTP id f24so2499623qte.5\n\tfor <linuxppc-dev@lists.ozlabs.org>;\n\tFri, 15 Sep 2017 18:21:31 -0700 (PDT)","from localhost.localdomain (50-39-103-96.bvtn.or.frontiernet.net.\n\t[50.39.103.96]) by smtp.gmail.com with ESMTPSA id\n\tv11sm1493189qkl.45.2017.09.15.18.21.26\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);\n\tFri, 15 Sep 2017 18:21:28 -0700 (PDT)"],"Authentication-Results":["ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"WgHsYfG5\"; dkim-atps=neutral","lists.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"WgHsYfG5\"; dkim-atps=neutral","ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=gmail.com\n\t(client-ip=2607:f8b0:400d:c0d::242; helo=mail-qt0-x242.google.com;\n\tenvelope-from=ram.n.pai@gmail.com; receiver=<UNKNOWN>)","lists.ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"WgHsYfG5\"; dkim-atps=neutral"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;\n\th=sender:from:to:cc:subject:date:message-id;\n\tbh=MvoW+5pbVQvNBPXq5hwix1JEwYdvCgZj+7skyLtd3Xo=;\n\tb=WgHsYfG5cxQgcELr/p5dtFVJP32UeWqHYF1lxZTWx7e5NW0k4Uw7L1Zn+rXipYVBQM\n\tHsisPBmVi9CBfwXyAoh4Sia1Q5e5b2DdxQPk4FN6RWuq0lGzCQb39x6xU6yKD8duAirF\n\tw/T6aA88g89iPYAznnDPzGUs/h/kMOiSoDM6ImdF9zZRZg6HiJNqsRgePfnNpOVxmSBo\n\tAnekk+C6xV1EQh59Tb9ISikNdSVok8aUPWTlwJVAvH/Wh+MmDt+IoU7+kf4KYowObrkb\n\tdBvZRjJb9JE1GPEU6hgj1Udw5PPz3Twxal/V8rPV/SCx0G8vO5ohDOLqHq+Jl3sy/Vco\n\tPTqA==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:sender:from:to:cc:subject:date:message-id;\n\tbh=MvoW+5pbVQvNBPXq5hwix1JEwYdvCgZj+7skyLtd3Xo=;\n\tb=tAdEwa4CaZnRkyGvD27xLBE9MQAXMJw6P+9opyHYUR4LZfT+v56qvG2XhsK7UTCXtE\n\t95eWwaSEV6PoEYiAkjJfmRSwbesimWO+COsAgTivj6ZSsu4WUqxNdIikZRDljMyQXdRi\n\tcNgih7X4f0D7ZVlJdVRsJ/Wp63yyPmDLgNuUOEJQOY2JSCIs8sF2OaFbgGQKMrYTj9b6\n\tDIPkpPSK1ZuUsT/uJiRMx5Llfw307llZ13l004N+TXFKJoHFOKVQpvWkUutSWIHZz7Du\n\tfaCfvGfqY7pTbx5zn6NH/yIWSMm0MB7J304kfQwnI3UHgAJ9ZSwscVhRgtDF6S68jcET\n\tU+cw==","X-Gm-Message-State":"AHPjjUjfZw7y+5ishyDoCZOXgZi23TY0U0PH5cXVCMpAdTNmqNPRi9tA\n\tDVaMiAwGdH4Gcg==","X-Google-Smtp-Source":"AOwi7QDNwK8Of48+0Fiz1bNt3q7945NZBh0uP2PqDyW45lqJ6atfIZO9tF+nOz+Na0S07+OPPoRANg==","X-Received":"by 10.200.41.218 with SMTP id 26mr7689050qtt.291.1505524889497; \n\tFri, 15 Sep 2017 18:21:29 -0700 (PDT)","From":"Ram Pai <linuxram@us.ibm.com>","To":"mpe@ellerman.id.au, linuxppc-dev@lists.ozlabs.org,\n\tlinux-kernel@vger.kernel.org, linux-arch@vger.kernel.org,\n\tlinux-mm@kvack.org, x86@kernel.org, linux-doc@vger.kernel.org","Subject":"[PATCH 0/6] mm, x86, powerpc: Memory Protection Keys enhancement","Date":"Fri, 15 Sep 2017 18:21:04 -0700","Message-Id":"<1505524870-4783-1-git-send-email-linuxram@us.ibm.com>","X-Mailer":"git-send-email 1.7.1","X-BeenThere":"linuxppc-dev@lists.ozlabs.org","X-Mailman-Version":"2.1.24","Precedence":"list","List-Id":"Linux on PowerPC Developers Mail List\n\t<linuxppc-dev.lists.ozlabs.org>","List-Unsubscribe":"<https://lists.ozlabs.org/options/linuxppc-dev>,\n\t<mailto:linuxppc-dev-request@lists.ozlabs.org?subject=unsubscribe>","List-Archive":"<http://lists.ozlabs.org/pipermail/linuxppc-dev/>","List-Post":"<mailto:linuxppc-dev@lists.ozlabs.org>","List-Help":"<mailto:linuxppc-dev-request@lists.ozlabs.org?subject=help>","List-Subscribe":"<https://lists.ozlabs.org/listinfo/linuxppc-dev>,\n\t<mailto:linuxppc-dev-request@lists.ozlabs.org?subject=subscribe>","Cc":"ebiederm@xmission.com, arnd@arndb.de, corbet@lwn.net, linuxram@us.ibm.com,\n\tmhocko@kernel.org, mingo@redhat.com, paulus@samba.org,\n\taneesh.kumar@linux.vnet.ibm.com, bauerman@linux.vnet.ibm.com,\n\takpm@linux-foundation.org, khandual@linux.vnet.ibm.com","Errors-To":"linuxppc-dev-bounces+patchwork-incoming=ozlabs.org@lists.ozlabs.org","Sender":"\"Linuxppc-dev\"\n\t<linuxppc-dev-bounces+patchwork-incoming=ozlabs.org@lists.ozlabs.org>"},"content":"The patch-series enhances memory protection keys feature.\n\nThe patch(1)  introduces  an  additional  vma bit to support 32\npkeys.  PowerPC supports 32 pkeys.\n\nThe patch(2,3)  introduces a new interface arch_pkeys_enabled(),\nthis  interface  can   be used by arch-neutral code to display\nprotection key value in smap.\n\nThe patch(4) introduces a syfs interface, to display the static\nattributes  of the protection key. Eg: max number of keys.\n\nThe last two patches, (5,6) update documentation.\n\nA separate patch series that enhances selftest will follow. The\nentire  patch  series  that  enables  pkeys  on  powerpc  is at \nhttps://github.com/rampai/memorykeys.git memkey.v9-rc1\n\nTesting:\n-------\nThis  patches are tested on powerpc platform using a\nenhaced set of selftests.\nCould not test on x86 since I do not have access to\none with pkey support.\n\nHistory:\n-------\nversion v3:\n\t(1) sysfs interface - thanks Thiago.\n\t(2) Documentation update.\n\nversion v2:\n\t(1) Documentation   is   updated   to  better \n\t\tcapture the semantics.\n\t(2) introduced   arch_pkeys_enabled() to find\n       \t\tif an arch enables pkeys.  Correspond-\n\t\ting change in logic that displays key\n\t\tvalue in smaps.\n\t(3) code  rearranged  in many places based on\n       \t\tcomments from   Dave Hansen,   Balbir,\n\t       \tAnshuman.\t\nversion v1: Initial version\n\nRam Pai (5):\n  mm: introduce an additional vma bit for powerpc pkey\n  mm, x86 : introduce arch_pkeys_enabled()\n  mm: display pkey in smaps if arch_pkeys_enabled() is true\n  Documentation/x86: Move protecton key documentation to arch neutral\n    directory\n  Documentation/vm: PowerPC specific updates to memory protection keys\n\nThiago Jung Bauermann (1):\n  mm/mprotect, powerpc/mm/pkeys, x86/mm/pkeys: Add sysfs interface\n\n Documentation/vm/protection-keys.txt  |  160 +++++++++++++++++++++++++++++++++\n Documentation/x86/protection-keys.txt |   85 -----------------\n arch/powerpc/include/asm/pkeys.h      |    2 +\n arch/powerpc/mm/pkeys.c               |   20 ++++\n arch/x86/include/asm/mmu_context.h    |    4 +-\n arch/x86/include/asm/pkeys.h          |    2 +\n arch/x86/kernel/fpu/xstate.c          |    5 +\n arch/x86/kernel/setup.c               |    8 --\n arch/x86/mm/pkeys.c                   |    8 ++\n fs/proc/task_mmu.c                    |   17 ++--\n include/linux/mm.h                    |   16 ++--\n include/linux/pkeys.h                 |    9 ++\n mm/mprotect.c                         |   88 ++++++++++++++++++\n 13 files changed, 317 insertions(+), 107 deletions(-)\n create mode 100644 Documentation/vm/protection-keys.txt\n delete mode 100644 Documentation/x86/protection-keys.txt"}