Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp229959pxb; Mon, 13 Sep 2021 17:47:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx5LgNYqXjtifyfKMHyJa9+5fjMpb/fQtrCQS8lLu44wGP5IKEq+eCzPBfMwnhdLfhOpdcr X-Received: by 2002:a50:f145:: with SMTP id z5mr16865540edl.4.1631580461306; Mon, 13 Sep 2021 17:47:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631580461; cv=none; d=google.com; s=arc-20160816; b=V/yPKXAlaCU+tIfUhH1GF8qpqUqsjtqqaTKeQkAn+MkfslTnOaEwUpQAIBCe+7elBe tvGEqoydMWxY6YplrOMAJTIeTe777Ir8ept4tQGWzssdDUkl+a98SrG8Un0aLznc5t9Z p4zLFXa3BRS77iYoM7E8YOJZFcVIX4vviFD/mVeizFO30NHtuyU29nGAJpbJf2lwB3sg N1mmBTuMt5pvq/sXLEHiFJgiTrM81fL+XqY9KGPu4AbRE7iPGQIoM/lR9NplImdxpuaM 9NIqw+vCCRtc0HhDsEYuNrqZBCnRWdTEAFKb82BiEouZzIG9im3in8xBGiSGM3Sx27Sq 8Qaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=AQmKgfH3qEqOtDyuCan45GTszTZszAW9eky6Y41uuFc=; b=wRUgsYEg3iLR+wfMBmkpIlLMLw1e1ZOOOlCRFR9XZ8OY6zPqTEZjkbmep49yxGUPT5 /g/OGUXgfCSqFUfnZ4JLW2cE2CaKABp2cIsftSQpQEUF6zxL728CXupzZ6WxLBCIhlu0 2JLjHYrwl1yyK3TLeBT+obfy3uDJFNdLW6j1BYXXoJmgcq4Ss3Qm3WMNXCy/a5z48eSS I4P78w2fWdEca/eeRWPJqOt42n4tnecFzNedO19gEi+H8ZGRs592KdQsRKMKTC2Tnbb6 5Y8d7zfwF3LV9e7Dbr5O5fwuKbTWQiTZUF5i5jPI7NYn7O6J3Plt/a8AvHuP+NC7Koox karA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gx12si8491395ejc.724.2021.09.13.17.47.16; Mon, 13 Sep 2021 17:47:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245147AbhIMRyq (ORCPT + 99 others); Mon, 13 Sep 2021 13:54:46 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:57648 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239506AbhIMRye (ORCPT ); Mon, 13 Sep 2021 13:54:34 -0400 Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: tonyk) with ESMTPSA id DA46C1F42D19 From: =?UTF-8?q?Andr=C3=A9=20Almeida?= To: Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Darren Hart , linux-kernel@vger.kernel.org, Steven Rostedt , Sebastian Andrzej Siewior Cc: kernel@collabora.com, krisman@collabora.com, linux-api@vger.kernel.org, libc-alpha@sourceware.org, mtk.manpages@gmail.com, Davidlohr Bueso , Arnd Bergmann , =?UTF-8?q?Andr=C3=A9=20Almeida?= Subject: [PATCH v3 3/6] futex2: wire up syscall for x86 Date: Mon, 13 Sep 2021 14:52:46 -0300 Message-Id: <20210913175249.81074-4-andrealmeid@collabora.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913175249.81074-1-andrealmeid@collabora.com> References: <20210913175249.81074-1-andrealmeid@collabora.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Wire up syscall entry point for x86 arch, for both i386 and x86_64. Signed-off-by: André Almeida --- arch/x86/entry/syscalls/syscall_32.tbl | 1 + arch/x86/entry/syscalls/syscall_64.tbl | 1 + 2 files changed, 2 insertions(+) diff --git a/arch/x86/entry/syscalls/syscall_32.tbl b/arch/x86/entry/syscalls/syscall_32.tbl index 960a021d543e..7e25543693de 100644 --- a/arch/x86/entry/syscalls/syscall_32.tbl +++ b/arch/x86/entry/syscalls/syscall_32.tbl @@ -453,3 +453,4 @@ 446 i386 landlock_restrict_self sys_landlock_restrict_self 447 i386 memfd_secret sys_memfd_secret 448 i386 process_mrelease sys_process_mrelease +449 i386 futex_waitv sys_futex_waitv diff --git a/arch/x86/entry/syscalls/syscall_64.tbl b/arch/x86/entry/syscalls/syscall_64.tbl index 18b5500ea8bf..fe8f8dd157b4 100644 --- a/arch/x86/entry/syscalls/syscall_64.tbl +++ b/arch/x86/entry/syscalls/syscall_64.tbl @@ -370,6 +370,7 @@ 446 common landlock_restrict_self sys_landlock_restrict_self 447 common memfd_secret sys_memfd_secret 448 common process_mrelease sys_process_mrelease +449 common futex_waitv sys_futex_waitv # # Due to a historical design error, certain syscalls are numbered differently -- 2.33.0