Commit-ID:  e2753293ac4bce8623650bb2d610b7e657bc869f
Gitweb:     http://git.kernel.org/tip/e2753293ac4bce8623650bb2d610b7e657bc869f
Author:     Dave Hansen <[email protected]>
AuthorDate: Mon, 12 Sep 2016 13:38:42 -0700
Committer:  Thomas Gleixner <[email protected]>
CommitDate: Tue, 13 Sep 2016 14:41:36 +0200

x86/pkeys: Fix pkeys build breakage for some non-x86 arches

Guenter Roeck reported breakage on the h8300 and c6x architectures (among
others) caused by the new memory protection keys syscalls.  This patch does
what Arnd suggested and adds them to kernel/sys_ni.c.

Fixes: a60f7b69d92c ("generic syscalls: Wire up memory protection keys 
syscalls")
Reported-and-tested-by: Guenter Roeck <[email protected]>
Signed-off-by: Dave Hansen <[email protected]>
Acked-by: Arnd Bergmann <[email protected]>
Cc: [email protected]
Cc: Dave Hansen <[email protected]>
Cc: [email protected]
Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: Thomas Gleixner <[email protected]>
---
 kernel/sys_ni.c | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/kernel/sys_ni.c b/kernel/sys_ni.c
index 2c5e3a8..635482e 100644
--- a/kernel/sys_ni.c
+++ b/kernel/sys_ni.c
@@ -250,3 +250,8 @@ cond_syscall(sys_execveat);
 
 /* membarrier */
 cond_syscall(sys_membarrier);
+
+/* memory protection keys */
+cond_syscall(sys_pkey_mprotect);
+cond_syscall(sys_pkey_alloc);
+cond_syscall(sys_pkey_free);

Reply via email to