x86/pkeys: Fix pkeys build breakage for some non-x86 arches
authorDave Hansen <dave.hansen@intel.com>
Mon, 12 Sep 2016 20:38:42 +0000 (13:38 -0700)
committerThomas Gleixner <tglx@linutronix.de>
Tue, 13 Sep 2016 12:41:36 +0000 (14:41 +0200)
Guenter Roeck reported breakage on the h8300 and c6x architectures (among
others) caused by the new memory protection keys syscalls.  This patch does
what Arnd suggested and adds them to kernel/sys_ni.c.

Fixes: a60f7b69d92c ("generic syscalls: Wire up memory protection keys syscalls")
Reported-and-tested-by: Guenter Roeck <linux@roeck-us.net>
Signed-off-by: Dave Hansen <dave.hansen@intel.com>
Acked-by: Arnd Bergmann <arnd@arndb.de>
Cc: linux-arch@vger.kernel.org
Cc: Dave Hansen <dave@sr71.net>
Cc: linux-api@vger.kernel.org
Link: http://lkml.kernel.org/r/20160912203842.48E7AC50@viggo.jf.intel.com
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
kernel/sys_ni.c

index 2c5e3a8e00d7bd152c045549d68458c1b76e253f..635482e60ca39f93e706f51dbccf7a19dfefe284 100644 (file)
@@ -250,3 +250,8 @@ cond_syscall(sys_execveat);
 
 /* membarrier */
 cond_syscall(sys_membarrier);
+
+/* memory protection keys */
+cond_syscall(sys_pkey_mprotect);
+cond_syscall(sys_pkey_alloc);
+cond_syscall(sys_pkey_free);