Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2115293imu; Thu, 10 Jan 2019 08:31:27 -0800 (PST) X-Google-Smtp-Source: ALg8bN6F1K4cGfoXpaTzow5NZZ8j7fsc1ksN+q2xTqSDZQEFQT1G+cXQ4tjIq9N5podiD7ZrtFvm X-Received: by 2002:a17:902:59c8:: with SMTP id d8mr10969828plj.116.1547137887334; Thu, 10 Jan 2019 08:31:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547137887; cv=none; d=google.com; s=arc-20160816; b=qLt5aG9pQmT2O3o8kt1devVJ79xkg/zayiVS+O/aownd3IQLHe/54uH3oQwg1Z20y5 MbOhyJ50ALM4A8ZcBuZvng+7BYUD7tTH8JCKcJqhkg3spbuWB9KnKV1eXAHTXQ4/oYmP zYN/1P5cjp70pR/HkuaHxm5YZzm/WUzvfQ0Z+Q/g028lMi3RNT7WJwlf4OVovm6fsZNb e9JNSsezYZWJDA2y6GbxuF6oJHMCyaYIY98KC5Q9edqZWLr9LL4tc06Lme8zIVydB5FR MYvgcueCEVdEoj6oYsCDyN2eMyLpGXaRleSaDtaMbIBtA5kelg/byWNc93GxXarM71BF Ueiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=tq3uNbSQMyE/72FV8T1FtK2j0aJucLQF/jUKL3WvFRQ=; b=dTWPSKqJGeSRJTTGpfwvsu1HTara9e3skSJruAD6SYxl/cCrsPWnAFMNPBipWsJSdy 1/MRq9ZDJRB+SNxT5EfCDSGawrVmaoX7kzqmUiXnbKXVrp1wdtT9SwrtRRJZR9FfVVNI rhZt9EXN247q9CXQghSFGkbHQaaJbmkhGyZHe5V7NJI2kIFzfJ+LVsej6hgZZKGT7ZAj 4R283v/1+T/i52ofr73ZY9Ds4R9wbJExA1nhZnzjRohwt+Epvt8XyhK1gViQ5k4phosc DUtAe5KlEetFiYyzW6d1EC9P+MvnbH7GP8osUAi3A2C+CKKQhg7cwnawGJo7HTszX3us Uk8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x128si1022036pfb.128.2019.01.10.08.31.12; Thu, 10 Jan 2019 08:31:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729267AbfAJQ1w (ORCPT + 99 others); Thu, 10 Jan 2019 11:27:52 -0500 Received: from mout.kundenserver.de ([217.72.192.73]:37095 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729871AbfAJQ0W (ORCPT ); Thu, 10 Jan 2019 11:26:22 -0500 Received: from wuerfel.lan ([109.192.41.194]) by mrelayeu.kundenserver.de (mreue108 [212.227.15.145]) with ESMTPA (Nemesis) id 1N9Mh8-1hK9GT0x08-015KyR; Thu, 10 Jan 2019 17:25:09 +0100 From: Arnd Bergmann To: y2038@lists.linaro.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Arnd Bergmann , ink@jurassic.park.msu.ru, mattst88@gmail.com, linux@armlinux.org.uk, catalin.marinas@arm.com, will.deacon@arm.com, tony.luck@intel.com, fenghua.yu@intel.com, geert@linux-m68k.org, monstr@monstr.eu, paul.burton@mips.com, deller@gmx.de, mpe@ellerman.id.au, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, dalias@libc.org, davem@davemloft.net, luto@kernel.org, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, jcmvbkbc@gmail.com, firoz.khan@linaro.org, ebiederm@xmission.com, deepa.kernel@gmail.com, linux@dominikbrodowski.net, akpm@linux-foundation.org, dave@stgolabs.net, linux-alpha@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org Subject: [PATCH 03/15] ia64: assign syscall numbers for perf and seccomp Date: Thu, 10 Jan 2019 17:24:23 +0100 Message-Id: <20190110162435.309262-4-arnd@arndb.de> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20190110162435.309262-1-arnd@arndb.de> References: <20190110162435.309262-1-arnd@arndb.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Provags-ID: V03:K1:Aqo6N9d9grrvjwZZFEqN/kvQ31MLlDiiylB1bz3l3bnWOkX29Jb FIpuJ/jDdTbyft/4m0XHsdrBBVlm/5kn3AxdnjdvfrdFVcnigok/cmoOYzEopX64Kvw6dls WX4c0A3ajbuIPBhtDJnOxItEcolnrdicUdlbDH0vyMO4tFgIrLIN3zrBeur2mEJPy3oMIBX ZH1cdK/uOrjSnDnCsmVEg== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:DcqPdkrtZkA=:QS9oAutwixmbvSVltaI9L6 +m9uizBojpDw4Y/KGXSwSjuE5RFBEi7OZQFNyG/xCTeJGtb6VPYkwAOz9MsrA2pxEiUjFa9rG fuJdxhEHR1LixU3L7SSftPuAu/E+HMI7cMR38HXeU8sTwYxz1Lhfz/ndk7VKbWpgR6e48hHTh 52oG4XPC5Sd/bup/d7xyO1GwtMOv8KicBE7MTnwJg30UL0KV+2zy8+uaQIIBfpCDfWM6kjw1Y 9zf/dxhuEvLX4cTqoUgQnILjvndG21zv6xai7n9Mo8+weKMX3oFsIyKniIqcYSLZpFjZZad6J iFX8KqIDD2L15m14S+VUGqz3BXl9nnN+3YZmaY2aCgRLj+1lVPyqEAJNryhh8rK6FIJ8GHxDJ b6kKEjdlplavAtZsSD6iylVr6KSzwNw62ShZ5OZvUL5XVI3/keVLJIlNTf9Dj4xsiQPsm/3YS hBnYM2p500m6A4e6wcUThTchOc2YPdSSH2b1Gg0KaympGurdwlWM2AnEkcYg+rJMB8ejQK2OV FvODRVy/7YsxTrzkyuDInaJdUb6X2TzSWEOoqh1ifvX44kfRzsj3wFkCRTG7Tcl0WUsDB/tak aArpMEZ5ewfQfVdDVvG0xAc0R1LMlt+LCk6prUqgqK6D+A4b9mninT6hfcvtpKZL0P1KVrvKJ elmxmdqcPPwGsxzlTz8rV4AOm/8m9AoXxIvPJ0wCPLcEf+m+XNV/BH5QBhqwba8jH8VLEyHqT 16Toqp4Rzx0iHqbsVLKUtulq49kZQX99otz0fw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Most architectures have assigned numbers for both seccomp and perf_event_open, even when they do not implement either. ia64 is an exception here, so for consistency lets add numbers for both of them. Unless CONFIG_PERF_EVENTS and CONFIG_SECCOMP are implemented, the system calls just return -ENOSYS. Signed-off-by: Arnd Bergmann --- arch/ia64/kernel/syscalls/syscall.tbl | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/ia64/kernel/syscalls/syscall.tbl b/arch/ia64/kernel/syscalls/syscall.tbl index 52585281205b..2e93dbdcdb80 100644 --- a/arch/ia64/kernel/syscalls/syscall.tbl +++ b/arch/ia64/kernel/syscalls/syscall.tbl @@ -337,3 +337,5 @@ 325 common pwritev2 sys_pwritev2 326 common statx sys_statx 327 common io_pgetevents sys_io_pgetevents +328 common perf_event_open sys_perf_event_open +329 common seccomp sys_seccomp -- 2.20.0