Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp1631601pxb; Sat, 4 Sep 2021 16:29:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwcdYqsoWRoY2unJmg6DYFSmhFQJyEXKBXIh7cGUnN9TZQl3x3ItZfOXm+L1k3lGbfmetLF X-Received: by 2002:a17:906:994f:: with SMTP id zm15mr6250453ejb.480.1630798191341; Sat, 04 Sep 2021 16:29:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630798191; cv=none; d=google.com; s=arc-20160816; b=Pw4nHzq8GZq3s0XcB6mgvbbzJPkTIqoYDpMLNADXBvB28+iIWmCtYgYaQwCbTmxqCz eOZBEdA23PDecd1tcjClJNLsXU+aZbMwjlBsA6DS1uZZoNLlZ/vKp/lkBSOBYbpI+PJ3 v2OMLcJd63643JtqKX0xM1nbqcUtHYv8PnhX1WXF7SCk/yo3TUOU6g2EUdGN430IYQrX YZo4h516d2gbkkqjwGtONEf1eF8uxFwTFISL4xfqBuLnGQdeRvEJ68dwedQ0MZ+sEknW EYbMeaJR1UQ8Sv0Y+ivAP7BfuJXRG6HHpf2chLASBA8bGEPpgFiHO6b85dQE4ncnDZzE qpyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=BE+CtnRe6/nn7XpKV/l/qkcLEYOs1Y+5jmNtINaVay4=; b=xJzVjPno7L9TL7+LR5FpfRnmgDrM/gEhrcSflSl5naX8EUDTLGNM/wPH231gbNr20D 1dmJ+cskVfWF1fWUHy3U5PFxmOEO+h1EojUOp83J4RHfOp8yDsCWB5WR/TGo3P46plGn 0vLwKsRQDLYBLuWU12uPZYqDjEy1K3S2ug79fDPIUq/2mv/Ie2EBgA3Ss+K1Lgwz8IXE BNRUlfAoDsydWJbAUVh5oWRipakOMyx04eFkTZ+5ncg0zYcLDvwCD6roidiTWjZyeFpV UO3pXbjcgA0k1RV5NVpRDzTe2YY6vhIV1riA/WsvvdpIABDIfKQ2EO5izL3f9XvBW1s8 jM+w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id aq7si3553058ejc.75.2021.09.04.16.29.14; Sat, 04 Sep 2021 16:29:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237640AbhIDXNe (ORCPT + 99 others); Sat, 4 Sep 2021 19:13:34 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:52048 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237582AbhIDXN3 (ORCPT ); Sat, 4 Sep 2021 19:13:29 -0400 Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: tonyk) with ESMTPSA id 1F18A1F41F44 From: =?UTF-8?q?Andr=C3=A9=20Almeida?= To: Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Darren Hart , linux-kernel@vger.kernel.org, Steven Rostedt , Sebastian Andrzej Siewior Cc: kernel@collabora.com, krisman@collabora.com, linux-api@vger.kernel.org, libc-alpha@sourceware.org, mtk.manpages@gmail.com, Davidlohr Bueso , Arnd Bergmann , =?UTF-8?q?Andr=C3=A9=20Almeida?= Subject: [PATCH v2 3/5] futex2: wire up syscall for x86 Date: Sat, 4 Sep 2021 20:11:57 -0300 Message-Id: <20210904231159.13292-4-andrealmeid@collabora.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210904231159.13292-1-andrealmeid@collabora.com> References: <20210904231159.13292-1-andrealmeid@collabora.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Wire up syscall entry point for x86 arch, for both i386 and x86_64. Signed-off-by: André Almeida --- arch/x86/entry/syscalls/syscall_32.tbl | 1 + arch/x86/entry/syscalls/syscall_64.tbl | 1 + 2 files changed, 2 insertions(+) diff --git a/arch/x86/entry/syscalls/syscall_32.tbl b/arch/x86/entry/syscalls/syscall_32.tbl index 61f18b72552b..d5b2ed3802c7 100644 --- a/arch/x86/entry/syscalls/syscall_32.tbl +++ b/arch/x86/entry/syscalls/syscall_32.tbl @@ -453,3 +453,4 @@ 446 i386 landlock_restrict_self sys_landlock_restrict_self 447 i386 memfd_secret sys_memfd_secret 448 i386 process_mrelease sys_process_mrelease +449 i386 futex_waitv sys_futex_waitv compat_sys_futex_waitv diff --git a/arch/x86/entry/syscalls/syscall_64.tbl b/arch/x86/entry/syscalls/syscall_64.tbl index 807b6a1de8e8..b4cd3923399a 100644 --- a/arch/x86/entry/syscalls/syscall_64.tbl +++ b/arch/x86/entry/syscalls/syscall_64.tbl @@ -370,6 +370,7 @@ 446 common landlock_restrict_self sys_landlock_restrict_self 447 common memfd_secret sys_memfd_secret 448 common process_mrelease sys_process_mrelease +449 common futex_waitv sys_futex_waitv # # Due to a historical design error, certain syscalls are numbered differently -- 2.33.0