public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] x86/pkeys: fix pkeys build breakage for some non-x86 arches
@ 2016-09-12 20:38 Dave Hansen
  2016-09-13 12:46 ` [tip:mm/pkeys] x86/pkeys: Fix " tip-bot for Dave Hansen
  0 siblings, 1 reply; 2+ messages in thread
From: Dave Hansen @ 2016-09-12 20:38 UTC (permalink / raw)
  To: linux-kernel
  Cc: x86, Dave Hansen, dave.hansen, arnd, tglx, linux-api, linux-arch


From: Dave Hansen <dave.hansen@intel.com>

Guenter Roeck reported [1] breakage on the h8300 and c6x
architectures (among others) caused by the new memory protection
keys syscalls.  This patch does what Arnd suggested and adds them
to kernel/sys_ni.c.

1. http://marc.info/?l=linux-kernel&m=147369214820072&w=2

Signed-off-by: Dave Hansen <dave.hansen@intel.com>
Tested-by: Guenter Roeck <linux@roeck-us.net>
Acked-by: Arnd Bergmann <arnd@arndb.de>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: "open list:ABI/API" <linux-api@vger.kernel.org>
Cc: linux-arch@vger.kernel.org
---

 b/kernel/sys_ni.c |    5 +++++
 1 file changed, 5 insertions(+)

diff -puN kernel/sys_ni.c~fix-pkeys-arch-breakage kernel/sys_ni.c
--- a/kernel/sys_ni.c~fix-pkeys-arch-breakage	2016-09-12 13:35:17.449066541 -0700
+++ b/kernel/sys_ni.c	2016-09-12 13:35:17.452066676 -0700
@@ -250,3 +250,8 @@ cond_syscall(sys_execveat);
 
 /* membarrier */
 cond_syscall(sys_membarrier);
+
+/* memory protection keys */
+cond_syscall(sys_pkey_mprotect);
+cond_syscall(sys_pkey_alloc);
+cond_syscall(sys_pkey_free);
_

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2016-09-13 12:47 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-09-12 20:38 [PATCH] x86/pkeys: fix pkeys build breakage for some non-x86 arches Dave Hansen
2016-09-13 12:46 ` [tip:mm/pkeys] x86/pkeys: Fix " tip-bot for Dave Hansen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox