From patchwork Mon Jun 3 12:03:49 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dan Streetman X-Patchwork-Id: 1109203 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 45HYd212k6z9s4Y; Mon, 3 Jun 2019 22:04:22 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1hXlhK-0004NG-Ie; Mon, 03 Jun 2019 12:04:18 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1hXlhI-0004MC-AP for kernel-team@lists.ubuntu.com; Mon, 03 Jun 2019 12:04:16 +0000 Received: from mail-yb1-f200.google.com ([209.85.219.200]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1hXlhH-0002rk-Tc for kernel-team@lists.ubuntu.com; Mon, 03 Jun 2019 12:04:16 +0000 Received: by mail-yb1-f200.google.com with SMTP id k10so14250332ybd.14 for ; Mon, 03 Jun 2019 05:04:15 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=fHNc0UVXB8W4eROFk4NupnDu6Yb0mOmt+FqUVMuf5xo=; b=juFQK9/NBBPgnCfOZxYNNYUVU0C14DoFLY2XWbqUd/FFyabWF3R9agJEu5l5FvUidX j9kY4XVXWuE8OBlte5tLJMSowHyGFIiDD51kz698gmkNYpKU1CW6WuRWNLX9VCu3/Gp7 jH7x8lD3B3OZKDkd9TVcNgxlgGIsobutGhuQOZhphb+kLMzj2WuHgXRYsx5MmhDNMog4 i/058fwwX1H4uNv4Hj8eAHEJVaQV42ciQmwtGIAnsNCovgGYF8SMy7STBjfQ8WS/VXKD OuC0ffIkZoYGwPMNeUf9T4K6ipYqf4jXQTu4lkwmQUsD9jDWRlQ8sSAAaIFx5mvH/wv2 s6sg== X-Gm-Message-State: APjAAAVDlwVB6R94Ew8zpSt50z9ah22nTK1j7lp7m/HiL7m8GQm5LKWD aL8aS+7l2hCNK45QBTR0agWXYUa3dGN/ZJEInXC8qamMm9Owak8KtTJ4XSXiktbl7AeqKe7mvhG YQ5HJLoHGScth6kCOVs1EIs05hDGaJb+Jy3jw9/kR0g== X-Received: by 2002:a25:2410:: with SMTP id k16mr11664520ybk.174.1559563454867; Mon, 03 Jun 2019 05:04:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqxDNyP4D6svLD1fMF1/pTKwau5nsabdoHAS3ezlV4e7i6P8MS0UtQ3ZRhyD7Hz10jFBuDsQVg== X-Received: by 2002:a25:2410:: with SMTP id k16mr11664506ybk.174.1559563454609; Mon, 03 Jun 2019 05:04:14 -0700 (PDT) Received: from thorin.lan (45-27-90-188.lightspeed.rlghnc.sbcglobal.net. [45.27.90.188]) by smtp.gmail.com with ESMTPSA id 138sm3672872ywm.96.2019.06.03.05.04.13 for (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 03 Jun 2019 05:04:13 -0700 (PDT) From: Dan Streetman To: kernel-team@lists.ubuntu.com Subject: [PATCH 2/2] powerpc: sys_pkey_mprotect() system call Date: Mon, 3 Jun 2019 08:03:49 -0400 Message-Id: <20190603120349.403-3-dan.streetman@canonical.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190603120349.403-1-dan.streetman@canonical.com> References: <20190603120349.403-1-dan.streetman@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" From: Ram Pai BugLink: https://bugs.launchpad.net/bugs/1821625 Patch provides the ability for a process to associate a pkey with a address range. Signed-off-by: Ram Pai Signed-off-by: Michael Ellerman (cherry picked from commit 3350eb2ea127978319ced883523d828046af4045) Signed-off-by: Dan Streetman --- arch/powerpc/include/asm/systbl.h | 1 + arch/powerpc/include/asm/unistd.h | 4 +--- arch/powerpc/include/uapi/asm/unistd.h | 1 + 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/powerpc/include/asm/systbl.h b/arch/powerpc/include/asm/systbl.h index dea4a952ec53d..d61f9c96d9163 100644 --- a/arch/powerpc/include/asm/systbl.h +++ b/arch/powerpc/include/asm/systbl.h @@ -391,3 +391,4 @@ SYSCALL(kexec_file_load) SYSCALL(statx) SYSCALL(pkey_alloc) SYSCALL(pkey_free) +SYSCALL(pkey_mprotect) diff --git a/arch/powerpc/include/asm/unistd.h b/arch/powerpc/include/asm/unistd.h index e0273bc5b0952..daf1ba97a00cd 100644 --- a/arch/powerpc/include/asm/unistd.h +++ b/arch/powerpc/include/asm/unistd.h @@ -12,12 +12,10 @@ #include -#define NR_syscalls 386 +#define NR_syscalls 387 #define __NR__exit __NR_exit -#define __IGNORE_pkey_mprotect - #ifndef __ASSEMBLY__ #include diff --git a/arch/powerpc/include/uapi/asm/unistd.h b/arch/powerpc/include/uapi/asm/unistd.h index 5db438516e61b..389c36fd82990 100644 --- a/arch/powerpc/include/uapi/asm/unistd.h +++ b/arch/powerpc/include/uapi/asm/unistd.h @@ -397,5 +397,6 @@ #define __NR_statx 383 #define __NR_pkey_alloc 384 #define __NR_pkey_free 385 +#define __NR_pkey_mprotect 386 #endif /* _UAPI_ASM_POWERPC_UNISTD_H_ */