Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1943025imm; Thu, 11 Oct 2018 02:23:27 -0700 (PDT) X-Google-Smtp-Source: ACcGV60NJm2H0GlsKLtZs5MmhlKoV/DGBoYNEOTTkPNjL9I7/g8H+A0qvqZW0u+RZD1XJWesqSYg X-Received: by 2002:a62:4e09:: with SMTP id c9-v6mr760093pfb.105.1539249807776; Thu, 11 Oct 2018 02:23:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539249807; cv=none; d=google.com; s=arc-20160816; b=BebuV63OLL2mDcSM1HEcfIdh6bXb2yMKhtBqojVYAv2xwYBRefOeLiNWs+W12hKmDH tSGnCSd19D3aVVh50YCYOVl5YAmNGiScioRRqpKWIHr5bFT1YRLvrPMwd09D4r+6OGEs 0RXWi8PGZlXTlZhVTYr1FG2S049DJwfrjkRuk/THrkIf3RJoZCGKd7+Gs10XlNUVRTfq szuf14q2MR7i304SWXtVmZc75yZMZBpF4GAGUlrpRRkAT0K0f+jYI2yodhrnYl2ksju/ RuHSiNz+IrUC35X3HyF1erTKLyfuM+cmSdUxUcfizpwzsWeQvkGTGLk8BqjgjH2S2L/p 5Hmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=KIzNl5MyXyPdBtW1D+ZzfZvtak4OL15GXB5RKgoC9hA=; b=FwL9JIdnuxhCn2i0qjGSkAGQYAY7cNLYBdadeI6kAXFXPBMNZe+C4vwbwzMkkhzEg6 xmkqDab1BLBj7h7XObOcMrcgkPVlP70Xs2P7s+4sCY+cL/PgQU+HDRFFGFYFX+TmYaEL HpZbrWwZh/d58xKDRjlQxXmbGUwmparVkn7k8vqO7WteqS8kx/2cyscFECOm2O/dgZyu xYIZK+mhjFh0XXBa/1cBVn09NTEk64AOpp2RwIeGLRvqeyspBoZlxhmFgBDZsS6NCFDP vCDar46+vRBY63kSCXrIhIPPNt5KgIku/mzzxg4uuzwKLGdOM3tJ1HUgV0n+AgrBiqqE O+ZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=eRD3F7D5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n24-v6si26522762pff.136.2018.10.11.02.23.13; Thu, 11 Oct 2018 02:23:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=eRD3F7D5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728088AbeJKQBa (ORCPT + 99 others); Thu, 11 Oct 2018 12:01:30 -0400 Received: from mail-yw1-f68.google.com ([209.85.161.68]:36465 "EHLO mail-yw1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727675AbeJKQBa (ORCPT ); Thu, 11 Oct 2018 12:01:30 -0400 Received: by mail-yw1-f68.google.com with SMTP id e201-v6so3273091ywa.3 for ; Thu, 11 Oct 2018 01:35:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=KIzNl5MyXyPdBtW1D+ZzfZvtak4OL15GXB5RKgoC9hA=; b=eRD3F7D5NF4eYzZrB7L3NqGeZcJMpjlrhz9OlRTPFuEM1pAMd7Ckpp+hfV88SvycVl 2Hdg5I/dW69mLw7QF+1iRWOlju9ips0H463oS+NyO0eVsQ5pQy83OzeCGUw0eOs+Wx1H fNIwOGmoCDf0LIedx90+KKCISba1FwpauiB5g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=KIzNl5MyXyPdBtW1D+ZzfZvtak4OL15GXB5RKgoC9hA=; b=HTnOiAsfrCHntzyNPJICFU5/2NBBXvbp3Q7HnWe/R2DDqcXEkaz6RoxArKUUEvT1HU FsMoHlmzyIfyqbxmkM6JMVrH1968T2aCudCCRD8kFK+on7bv/7JyN407JSnxHvus19iZ gxTS+eHTGx4ueWnOo7HDWUobzHHrmN/VC2e3PWDV3VJGm9ZdJS/sQ5BTOMp0zIGBoEdx ORt7kaFykKH8TciOPJFKgxDuG0mz+MU+zxn56h3ef1/eo9UxxPRmyto2y/m1ibk7UZYS Ku5YtOmFeqjzoG5YhZ8nEycjX7nDUJ73dlvSdVJMq+OIV4gvp4bEp1Ycfsj1BIwKHyt6 7xRg== X-Gm-Message-State: ABuFfoh40whsPbT0E+ZWUqg1GSuIOB716ATJLLLJO/Cfoq6eaZ+Uzb8X hn/7JDQBE4SnrQsN4yCsWTm0KVfoRuNFOluLLRiYUw== X-Received: by 2002:a81:3bc4:: with SMTP id i187-v6mr266432ywa.82.1539246915007; Thu, 11 Oct 2018 01:35:15 -0700 (PDT) MIME-Version: 1.0 References: <1539231895-4118-1-git-send-email-firoz.khan@linaro.org> <1539231895-4118-8-git-send-email-firoz.khan@linaro.org> In-Reply-To: From: Firoz Khan Date: Thu, 11 Oct 2018 14:05:03 +0530 Message-ID: Subject: Re: [PATCH v3 7/7] ia64: wire up system calls To: Arnd Bergmann Cc: linux-ia64@vger.kernel.org, Tony Luck , Fenghua Yu , Thomas Gleixner , Greg Kroah-Hartman , Philippe Ombredanne , Kate Stewart , y2038 Mailman List , Linux Kernel Mailing List , Linux-Arch , Deepa Dinamani , Marcin Juszkiewicz Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Arnd, On Thu, 11 Oct 2018 at 12:55, Arnd Bergmann wrote: > > On Thu, Oct 11, 2018 at 6:26 AM Firoz Khan wrote: > > > > wire up perf_event_open, seccomp, pkey_mprotect, pkey_alloc, > > pkey_free, statx, io_pgetevents and rseq system calls > > > > This require an architecture specific implementation as it not > > present now. > > > > Signed-off-by: Firoz Khan > > --- > > arch/ia64/kernel/syscalls/syscall.tbl | 16 ++++++++++++++++ > > 1 file changed, 16 insertions(+) > > > > diff --git a/arch/ia64/kernel/syscalls/syscall.tbl b/arch/ia64/kernel/syscalls/syscall.tbl > > index 6b64f60..1f42b60 100644 > > --- a/arch/ia64/kernel/syscalls/syscall.tbl > > +++ b/arch/ia64/kernel/syscalls/syscall.tbl > > @@ -335,3 +335,19 @@ > > 323 common copy_file_range sys_copy_file_range > > 324 common preadv2 sys_preadv2 > > 325 common pwritev2 sys_pwritev2 > > +# perf_event_open requires an architecture specific implementation > > +326 common perf_event_open sys_perf_event_open > > +# seccomp requires an architecture specific implementation > > +327 common seccomp sys_seccomp > > I don't think that's correct for these two. perf_event_open() of > course requires 'perf' support that ia64 does not have, but > at least seccomp should just work. > > > +# pkey_mprotect requires an architecture specific implementation > > +328 common pkey_mprotect sys_pkey_mprotect > > +# pkey_alloc requires an architecture specific implementation > > +329 common pkey_alloc sys_pkey_alloc > > +# pkey_free requires an architecture specific implementation > > +330 common pkey_free sys_pkey_free > > One comment for all pkey calls would be sufficient. More importantly > it requires hardware support that ia64 does not have AFAICT. > > > +# statx requires an architecture specific implementation > > +331 common statx sys_statx > > +# io_pgetevents requires an architecture specific implementation > > +332 common io_pgetevents sys_io_pgetevents > > It certainly does not require any support from the architecture for these. > > > +# rseq requires an architecture specific implementation > > +333 common rseq sys_rseq > > Maybe leave rseq and pkey_* commented out so we reserve > the number but don't add it for real? Maybe the ia64 maintainers > have a preference. > > As asm-generic maintainer, I'd like to have the various asm/unistd.h > headers be as similar as possible and at least reserve all the > numbers even if we don't need the calls on a given architecture. > Thanks for your review. Firoz > Arnd