summaryrefslogtreecommitdiff
path: root/security/keys
diff options
context:
space:
mode:
authorHeiko Carstens <heiko.carstens@de.ibm.com>2014-03-03 19:34:41 +0400
committerHeiko Carstens <heiko.carstens@de.ibm.com>2014-03-06 19:30:42 +0400
commit875ec3da4c50571906dcd23952f1dfcdd92ae3f1 (patch)
treea8207476eda6e30687b1ff990c337d4a5ac6507e /security/keys
parentc93e0f6c894312705fcdf1fc156b684a344155b5 (diff)
downloadlinux-875ec3da4c50571906dcd23952f1dfcdd92ae3f1.tar.xz
security/compat: convert to COMPAT_SYSCALL_DEFINE
Convert all compat system call functions where all parameter types have a size of four or less than four bytes, or are pointer types to COMPAT_SYSCALL_DEFINE. The implicit casts within COMPAT_SYSCALL_DEFINE will perform proper zero and sign extension to 64 bit of all parameters if needed. Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Diffstat (limited to 'security/keys')
-rw-r--r--security/keys/compat.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/security/keys/compat.c b/security/keys/compat.c
index bbd32c729dbb..347896548ad3 100644
--- a/security/keys/compat.c
+++ b/security/keys/compat.c
@@ -65,8 +65,8 @@ no_payload:
* taking a 32-bit syscall are zero. If you can, you should call sys_keyctl()
* directly.
*/
-asmlinkage long compat_sys_keyctl(u32 option,
- u32 arg2, u32 arg3, u32 arg4, u32 arg5)
+COMPAT_SYSCALL_DEFINE5(keyctl, u32, option,
+ u32, arg2, u32, arg3, u32, arg4, u32, arg5)
{
switch (option) {
case KEYCTL_GET_KEYRING_ID: