generic syscalls: Wire up memory protection keys syscalls
authorDave Hansen <dave.hansen@linux.intel.com>
Fri, 29 Jul 2016 16:30:18 +0000 (09:30 -0700)
committerThomas Gleixner <tglx@linutronix.de>
Fri, 9 Sep 2016 11:02:27 +0000 (13:02 +0200)
commita60f7b69d92c0142c80a30d669a76b617b7f6879
tree3a01d8bd0a6028a0ba4325a39845cbc439c1e128
parentf9afc6197e9bba1e2e62e262704f661810cc8bba
generic syscalls: Wire up memory protection keys syscalls

These new syscalls are implemented as generic code, so enable them for
architectures like arm64 which use the generic syscall table.

According to Arnd:

  Even if the support is x86 specific for the forseeable future, it may be
  good to reserve the number just in case.  The other architecture specific
  syscall lists are usually left to the individual arch maintainers, most a
  lot of the newer architectures share this table.

Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Acked-by: Arnd Bergmann <arnd@arndb.de>
Cc: linux-arch@vger.kernel.org
Cc: Dave Hansen <dave@sr71.net>
Cc: mgorman@techsingularity.net
Cc: linux-api@vger.kernel.org
Cc: linux-mm@kvack.org
Cc: luto@kernel.org
Cc: akpm@linux-foundation.org
Cc: torvalds@linux-foundation.org
Link: http://lkml.kernel.org/r/20160729163018.505A6875@viggo.jf.intel.com
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
include/linux/syscalls.h
include/uapi/asm-generic/unistd.h