]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/commit
x86/pkeys/selftests: Add a test for pkey 0
authorDave Hansen <dave.hansen@linux.intel.com>
Wed, 9 May 2018 17:13:56 +0000 (10:13 -0700)
committerStefan Bader <stefan.bader@canonical.com>
Mon, 1 Oct 2018 12:57:03 +0000 (14:57 +0200)
commit5a9d29b9b5db70c786e51213be6cb228757c76be
treef704c4a4b792cc92a350292342a147860c9b0cbe
parentad8e7dd53d0a531f4bc5260c94fa610fa7c32c88
x86/pkeys/selftests: Add a test for pkey 0

BugLink: http://bugs.launchpad.net/bugs/1794889
[ Upstream commit 3488a600d90bcaf061b104dbcfbdc8d99b398312 ]

Protection key 0 is the default key for all memory and will
not normally come back from pkey_alloc().  But, you might
still want pass it to mprotect_pkey().

This check ensures that you can use pkey 0.

Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Michael Ellermen <mpe@ellerman.id.au>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Ram Pai <linuxram@us.ibm.com>
Cc: Shuah Khan <shuah@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: linux-mm@kvack.org
Link: http://lkml.kernel.org/r/20180509171356.9E40B254@viggo.jf.intel.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Sasha Levin <alexander.levin@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
tools/testing/selftests/x86/protection_keys.c