From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 720C5E77180 for ; Mon, 9 Dec 2024 09:51:11 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9D8188D0041; Mon, 9 Dec 2024 04:51:09 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 961BE8D0029; Mon, 9 Dec 2024 04:51:09 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7DE378D0041; Mon, 9 Dec 2024 04:51:09 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 597448D0029 for ; Mon, 9 Dec 2024 04:51:09 -0500 (EST) Received: from smtpin05.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 1F90440B4B for ; Mon, 9 Dec 2024 09:51:09 +0000 (UTC) X-FDA: 82874951796.05.373B106 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by imf21.hostedemail.com (Postfix) with ESMTP id 7FA3D1C0003 for ; Mon, 9 Dec 2024 09:50:28 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=none; spf=pass (imf21.hostedemail.com: domain of kevin.brodsky@arm.com designates 217.140.110.172 as permitted sender) smtp.mailfrom=kevin.brodsky@arm.com; dmarc=pass (policy=none) header.from=arm.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733737858; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=cbBxn5qOQ9J377eYviEtKB0cQDc5LmCO4foK1XGor9k=; b=zAi0xtqquR0znrSjscwKVZlB4ncBHZMz4upcD90FMqtHHYkgCw4JbaCRH+6xgKn9yfFAtP ODDhj+IWFueRKgWU+QOXwIkNViwynNFOmAuLt19rg59M0CuKMJBe1N6Dq7TpX+BTz3uvfD AjxgSPHYhMvik6Oz0t7f2GF2Hss27Zw= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733737858; a=rsa-sha256; cv=none; b=shVURAdiZ4FwjrZH9XU3qD8aPD/dftaypvKvYLNBSsZGyCOCcWtliTS0fhRVZV7hQHPKVQ Ac8V5dX84sTqedQfbLemJpNpEXn6FsK4qo7CJdH61aPt65A3cRRdZ1LkMSH34aCJWEBLDJ Ud9+m0ZMVpfUyEXMXoK1vcNKPW1fGYw= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=none; spf=pass (imf21.hostedemail.com: domain of kevin.brodsky@arm.com designates 217.140.110.172 as permitted sender) smtp.mailfrom=kevin.brodsky@arm.com; dmarc=pass (policy=none) header.from=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EDC24113E; Mon, 9 Dec 2024 01:51:34 -0800 (PST) Received: from e123572-lin.arm.com (e123572-lin.cambridge.arm.com [10.1.194.54]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E43033F720; Mon, 9 Dec 2024 01:51:04 -0800 (PST) From: Kevin Brodsky To: linux-mm@kvack.org Cc: linux-kernel@vger.kernel.org, Kevin Brodsky , akpm@linux-foundation.org, aruna.ramakrishna@oracle.com, catalin.marinas@arm.com, dave.hansen@linux.intel.com, joey.gouly@arm.com, keith.lucas@oracle.com, ryan.roberts@arm.com, shuah@kernel.org, linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org, x86@kernel.org Subject: [PATCH 12/14] selftests/mm: Rename pkey register macro Date: Mon, 9 Dec 2024 09:50:17 +0000 Message-ID: <20241209095019.1732120-13-kevin.brodsky@arm.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241209095019.1732120-1-kevin.brodsky@arm.com> References: <20241209095019.1732120-1-kevin.brodsky@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 7FA3D1C0003 X-Stat-Signature: 1qwfk3hsjrtqnwgaf74mw6tk1ma41grh X-Rspam-User: X-HE-Tag: 1733737828-450019 X-HE-Meta: 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 YOaN8PIo 3o/hl64vLbfWwEYotH2qJBS1kXK6MUqWMmg2uWKeONG5J0JMkFU8C5mSZXir1VyKWyAcfebGsbxMUB7q8Bf4cEb2e/o/K3brtZYMRVdZRM8QL7fSDD5CwH5krD4slTKcEOQMrr/llST5TTWXWmg6vByUv5QFSHpZIyuBl4NOgXzNtET2iAYMixQj/YRjSmxcfikgjAtyxHB5N7/OjteflPXubuZydRtxW4Dw5UaMjjr7F5WWHPr+0Rv60LA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: PKEY_ALLOW_ALL is meant to represent the pkey register value that allows all accesses (enables all pkeys). However its current naming suggests that the value applies to *one* key only (like PKEY_DISABLE_ACCESS for instance). Rename PKEY_ALLOW_ALL to PKEY_REG_ALLOW_ALL to avoid such misunderstanding. This is consistent with the PKEY_REG_ALLOW_NONE macro introduced by commit 6e182dc9f268 ("selftests/mm: Use generic pkey register manipulation"). Signed-off-by: Kevin Brodsky --- tools/testing/selftests/mm/pkey-arm64.h | 2 +- tools/testing/selftests/mm/protection_keys.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/tools/testing/selftests/mm/pkey-arm64.h b/tools/testing/selftests/mm/pkey-arm64.h index 9897e31f16dd..8e9685e03c44 100644 --- a/tools/testing/selftests/mm/pkey-arm64.h +++ b/tools/testing/selftests/mm/pkey-arm64.h @@ -30,7 +30,7 @@ #define NR_PKEYS 8 #define NR_RESERVED_PKEYS 1 /* pkey-0 */ -#define PKEY_ALLOW_ALL 0x77777777 +#define PKEY_REG_ALLOW_ALL 0x77777777 #define PKEY_REG_ALLOW_NONE 0x0 #define PKEY_BITS_PER_PKEY 4 diff --git a/tools/testing/selftests/mm/protection_keys.c b/tools/testing/selftests/mm/protection_keys.c index 3688571e6b39..a4683f2476f2 100644 --- a/tools/testing/selftests/mm/protection_keys.c +++ b/tools/testing/selftests/mm/protection_keys.c @@ -396,7 +396,7 @@ static void signal_handler(int signum, siginfo_t *si, void *vucontext) /* restore access and let the faulting instruction continue */ pkey_access_allow(siginfo_pkey); #elif defined(__aarch64__) - aarch64_write_signal_pkey(uctxt, PKEY_ALLOW_ALL); + aarch64_write_signal_pkey(uctxt, PKEY_REG_ALLOW_ALL); #endif /* arch */ pkey_faults++; dprintf1("<<<<==================================================\n"); @@ -842,7 +842,7 @@ void expected_pkey_fault(int pkey) */ if (__read_pkey_reg() != 0) #elif defined(__aarch64__) - if (__read_pkey_reg() != PKEY_ALLOW_ALL) + if (__read_pkey_reg() != PKEY_REG_ALLOW_ALL) #else if (__read_pkey_reg() != shadow_pkey_reg) #endif /* arch */ -- 2.47.0