On 05/07/2015 12:11 PM, One Thousand Gnomes wrote:
>> diff -puN include/uapi/asm-generic/mman-common.h~pkeys-11-user-abi-bits 
>> include/uapi/asm-generic/mman-common.h
>> --- a/include/uapi/asm-generic/mman-common.h~pkeys-11-user-abi-bits  
>> 2015-05-07 10:31:43.367276719 -0700
>> +++ b/include/uapi/asm-generic/mman-common.h 2015-05-07 10:31:43.370276855 
>> -0700
>> @@ -10,6 +10,10 @@
>>  #define PROT_WRITE  0x2             /* page can be written */
>>  #define PROT_EXEC   0x4             /* page can be executed */
>>  #define PROT_SEM    0x8             /* page may be used for atomic ops */
>> +#define PROT_PKEY0  0x10            /* protection key value (bit 0) */
>> +#define PROT_PKEY1  0x20            /* protection key value (bit 1) */
>> +#define PROT_PKEY2  0x40            /* protection key value (bit 2) */
>> +#define PROT_PKEY3  0x80            /* protection key value (bit 3) */
> 
> Thats leaking deep Intelisms into asm-generic which makes me very
> uncomfortable. Whether we need to reserve some bits for "arch specific"
> is one question, what we do with them ought not to be leaking out.
> 
> To start with trying to port code people will want to do
> 
> #define PROT_PKEY0    0
> #define PROT_PKEY1    0

Yeah, I feel pretty uncomfortable with it as well.  I really don't
expect these to live like this in asm-generic when I submit this.

Powerpc and ia64 have _something_ resembling protection keys, so the
concept isn't entirely x86 or Intel-specific.  My hope would be that we
do this in a way that other architectures can use.


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to