xref: /linux/tools/testing/selftests/mm/pkey_util.c (revision 3ce9925823c7d6bb0e6eb951bf2db0e9e182582d)
1 // SPDX-License-Identifier: GPL-2.0-only
2 #define __SANE_USERSPACE_TYPES__
3 #include <sys/syscall.h>
4 #include <unistd.h>
5 
6 #include "pkey-helpers.h"
7 
sys_pkey_alloc(unsigned long flags,unsigned long init_val)8 int sys_pkey_alloc(unsigned long flags, unsigned long init_val)
9 {
10 	int ret = syscall(SYS_pkey_alloc, flags, init_val);
11 	dprintf1("%s(flags=%lx, init_val=%lx) syscall ret: %d errno: %d\n",
12 			__func__, flags, init_val, ret, errno);
13 	return ret;
14 }
15 
sys_pkey_free(unsigned long pkey)16 int sys_pkey_free(unsigned long pkey)
17 {
18 	int ret = syscall(SYS_pkey_free, pkey);
19 	dprintf1("%s(pkey=%ld) syscall ret: %d\n", __func__, pkey, ret);
20 	return ret;
21 }
22 
sys_mprotect_pkey(void * ptr,size_t size,unsigned long orig_prot,unsigned long pkey)23 int sys_mprotect_pkey(void *ptr, size_t size, unsigned long orig_prot,
24 		unsigned long pkey)
25 {
26 	int sret;
27 
28 	dprintf2("%s(0x%p, %zx, prot=%lx, pkey=%lx)\n", __func__,
29 			ptr, size, orig_prot, pkey);
30 
31 	errno = 0;
32 	sret = syscall(__NR_pkey_mprotect, ptr, size, orig_prot, pkey);
33 	if (errno) {
34 		dprintf2("SYS_mprotect_key sret: %d\n", sret);
35 		dprintf2("SYS_mprotect_key prot: 0x%lx\n", orig_prot);
36 		dprintf2("SYS_mprotect_key failed, errno: %d\n", errno);
37 		if (DEBUG_LEVEL >= 2)
38 			perror("SYS_mprotect_pkey");
39 	}
40 	return sret;
41 }
42