From patchwork Thu Jan 10 16:24:23 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 155212 Delivered-To: patch@linaro.org Received: by 2002:a02:48:0:0:0:0:0 with SMTP id 69csp2087944jaa; Thu, 10 Jan 2019 08:28:01 -0800 (PST) X-Google-Smtp-Source: ALg8bN7RgiokbUWiSgFTtcLFmozF/ikgzmzkbBLhu5RpSLyyqwsr13Q1D3GR9lMmEhomYl/hAOyk X-Received: by 2002:a63:2c82:: with SMTP id s124mr9738042pgs.73.1547137681083; Thu, 10 Jan 2019 08:28:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547137681; cv=none; d=google.com; s=arc-20160816; b=kcDovdto7SkPq25wX4KsWpwGXyTTize6Zk+GW47PtRJnbHJrSYQo1OHg21DAP+eYDa T5fv55aMJPcnkJlBbj7/JQff2m/8c0LvBb5lpAUZsymtqlpcJE+DADF82pfAcOEIWC3h raPVF+hyQJkH8kTyL87JUzcmLJaypgVvsRpkj/UrOPbVpqgK4XfpEYfW3bs0ILt2uEWu E7FOo1Fkq3JWzYO+KqT+1RKRisyAAQdnMbeUmYV0o7RN5SMHRpK1lMXqAOWkmm3gozzz DbdxcdPMb7xJTjkzHPoFkHz0ug2CHPHXzwkAtqcwvE4nxy/Vpry0Q0Pknh0Ff0mgpVpV /UgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=tq3uNbSQMyE/72FV8T1FtK2j0aJucLQF/jUKL3WvFRQ=; b=dTWPSKqJGeSRJTTGpfwvsu1HTara9e3skSJruAD6SYxl/cCrsPWnAFMNPBipWsJSdy 1/MRq9ZDJRB+SNxT5EfCDSGawrVmaoX7kzqmUiXnbKXVrp1wdtT9SwrtRRJZR9FfVVNI rhZt9EXN247q9CXQghSFGkbHQaaJbmkhGyZHe5V7NJI2kIFzfJ+LVsej6hgZZKGT7ZAj 4R283v/1+T/i52ofr73ZY9Ds4R9wbJExA1nhZnzjRohwt+Epvt8XyhK1gViQ5k4phosc DUtAe5KlEetFiYyzW6d1EC9P+MvnbH7GP8osUAi3A2C+CKKQhg7cwnawGJo7HTszX3us Uk8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z19si34009929pfc.95.2019.01.10.08.28.00; Thu, 10 Jan 2019 08:28:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729355AbfAJQ1x (ORCPT + 31 others); Thu, 10 Jan 2019 11:27:53 -0500 Received: from mout.kundenserver.de ([217.72.192.73]:37095 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729871AbfAJQ0W (ORCPT ); Thu, 10 Jan 2019 11:26:22 -0500 Received: from wuerfel.lan ([109.192.41.194]) by mrelayeu.kundenserver.de (mreue108 [212.227.15.145]) with ESMTPA (Nemesis) id 1N9Mh8-1hK9GT0x08-015KyR; Thu, 10 Jan 2019 17:25:09 +0100 From: Arnd Bergmann To: y2038@lists.linaro.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Arnd Bergmann , ink@jurassic.park.msu.ru, mattst88@gmail.com, linux@armlinux.org.uk, catalin.marinas@arm.com, will.deacon@arm.com, tony.luck@intel.com, fenghua.yu@intel.com, geert@linux-m68k.org, monstr@monstr.eu, paul.burton@mips.com, deller@gmx.de, mpe@ellerman.id.au, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, dalias@libc.org, davem@davemloft.net, luto@kernel.org, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, jcmvbkbc@gmail.com, firoz.khan@linaro.org, ebiederm@xmission.com, deepa.kernel@gmail.com, linux@dominikbrodowski.net, akpm@linux-foundation.org, dave@stgolabs.net, linux-alpha@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org Subject: [PATCH 03/15] ia64: assign syscall numbers for perf and seccomp Date: Thu, 10 Jan 2019 17:24:23 +0100 Message-Id: <20190110162435.309262-4-arnd@arndb.de> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20190110162435.309262-1-arnd@arndb.de> References: <20190110162435.309262-1-arnd@arndb.de> MIME-Version: 1.0 X-Provags-ID: V03:K1:Aqo6N9d9grrvjwZZFEqN/kvQ31MLlDiiylB1bz3l3bnWOkX29Jb FIpuJ/jDdTbyft/4m0XHsdrBBVlm/5kn3AxdnjdvfrdFVcnigok/cmoOYzEopX64Kvw6dls WX4c0A3ajbuIPBhtDJnOxItEcolnrdicUdlbDH0vyMO4tFgIrLIN3zrBeur2mEJPy3oMIBX ZH1cdK/uOrjSnDnCsmVEg== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1; V03:K0:DcqPdkrtZkA=:QS9oAutwixmbvSVltaI9L6 +m9uizBojpDw4Y/KGXSwSjuE5RFBEi7OZQFNyG/xCTeJGtb6VPYkwAOz9MsrA2pxEiUjFa9rG fuJdxhEHR1LixU3L7SSftPuAu/E+HMI7cMR38HXeU8sTwYxz1Lhfz/ndk7VKbWpgR6e48hHTh 52oG4XPC5Sd/bup/d7xyO1GwtMOv8KicBE7MTnwJg30UL0KV+2zy8+uaQIIBfpCDfWM6kjw1Y 9zf/dxhuEvLX4cTqoUgQnILjvndG21zv6xai7n9Mo8+weKMX3oFsIyKniIqcYSLZpFjZZad6J iFX8KqIDD2L15m14S+VUGqz3BXl9nnN+3YZmaY2aCgRLj+1lVPyqEAJNryhh8rK6FIJ8GHxDJ b6kKEjdlplavAtZsSD6iylVr6KSzwNw62ShZ5OZvUL5XVI3/keVLJIlNTf9Dj4xsiQPsm/3YS hBnYM2p500m6A4e6wcUThTchOc2YPdSSH2b1Gg0KaympGurdwlWM2AnEkcYg+rJMB8ejQK2OV FvODRVy/7YsxTrzkyuDInaJdUb6X2TzSWEOoqh1ifvX44kfRzsj3wFkCRTG7Tcl0WUsDB/tak aArpMEZ5ewfQfVdDVvG0xAc0R1LMlt+LCk6prUqgqK6D+A4b9mninT6hfcvtpKZL0P1KVrvKJ elmxmdqcPPwGsxzlTz8rV4AOm/8m9AoXxIvPJ0wCPLcEf+m+XNV/BH5QBhqwba8jH8VLEyHqT 16Toqp4Rzx0iHqbsVLKUtulq49kZQX99otz0fw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Most architectures have assigned numbers for both seccomp and perf_event_open, even when they do not implement either. ia64 is an exception here, so for consistency lets add numbers for both of them. Unless CONFIG_PERF_EVENTS and CONFIG_SECCOMP are implemented, the system calls just return -ENOSYS. Signed-off-by: Arnd Bergmann --- arch/ia64/kernel/syscalls/syscall.tbl | 2 ++ 1 file changed, 2 insertions(+) -- 2.20.0 diff --git a/arch/ia64/kernel/syscalls/syscall.tbl b/arch/ia64/kernel/syscalls/syscall.tbl index 52585281205b..2e93dbdcdb80 100644 --- a/arch/ia64/kernel/syscalls/syscall.tbl +++ b/arch/ia64/kernel/syscalls/syscall.tbl @@ -337,3 +337,5 @@ 325 common pwritev2 sys_pwritev2 326 common statx sys_statx 327 common io_pgetevents sys_io_pgetevents +328 common perf_event_open sys_perf_event_open +329 common seccomp sys_seccomp