diff options
author | Heiko Carstens <heiko.carstens@de.ibm.com> | 2014-03-03 16:34:41 +0100 |
---|---|---|
committer | Heiko Carstens <heiko.carstens@de.ibm.com> | 2014-03-06 16:30:42 +0100 |
commit | 875ec3da4c50571906dcd23952f1dfcdd92ae3f1 (patch) | |
tree | a8207476eda6e30687b1ff990c337d4a5ac6507e /security/keys | |
parent | c93e0f6c894312705fcdf1fc156b684a344155b5 (diff) | |
download | lwn-875ec3da4c50571906dcd23952f1dfcdd92ae3f1.tar.gz lwn-875ec3da4c50571906dcd23952f1dfcdd92ae3f1.zip |
security/compat: convert to COMPAT_SYSCALL_DEFINE
Convert all compat system call functions where all parameter types
have a size of four or less than four bytes, or are pointer types
to COMPAT_SYSCALL_DEFINE.
The implicit casts within COMPAT_SYSCALL_DEFINE will perform proper
zero and sign extension to 64 bit of all parameters if needed.
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Diffstat (limited to 'security/keys')
-rw-r--r-- | security/keys/compat.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/keys/compat.c b/security/keys/compat.c index bbd32c729dbb..347896548ad3 100644 --- a/security/keys/compat.c +++ b/security/keys/compat.c @@ -65,8 +65,8 @@ no_payload: * taking a 32-bit syscall are zero. If you can, you should call sys_keyctl() * directly. */ -asmlinkage long compat_sys_keyctl(u32 option, - u32 arg2, u32 arg3, u32 arg4, u32 arg5) +COMPAT_SYSCALL_DEFINE5(keyctl, u32, option, + u32, arg2, u32, arg3, u32, arg4, u32, arg5) { switch (option) { case KEYCTL_GET_KEYRING_ID: |