From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753035AbbH0SDN (ORCPT ); Thu, 27 Aug 2015 14:03:13 -0400 Received: from mail.efficios.com ([78.47.125.74]:46588 "EHLO mail.efficios.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752669AbbH0SCx (ORCPT ); Thu, 27 Aug 2015 14:02:53 -0400 From: Mathieu Desnoyers To: Andrew Morton , linux-api@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Mathieu Desnoyers , Catalin Marinas , Will Deacon Subject: [RFC PATCH 3/9] arm64: allocate sys_membarrier system call number Date: Thu, 27 Aug 2015 13:56:49 -0400 Message-Id: <1440698215-8355-4-git-send-email-mathieu.desnoyers@efficios.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1440698215-8355-1-git-send-email-mathieu.desnoyers@efficios.com> References: <1440698215-8355-1-git-send-email-mathieu.desnoyers@efficios.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org arm64 sys_membarrier number is already wired for arm64 through asm-generic/unistd.h, but needs to be allocated separately for the 32-bit compability layer of arm64. [ Untested on this architecture. To try it out: fetch linux-next/akpm, apply this patch, build/run a membarrier-enabled kernel, and do make kselftest. ] Signed-off-by: Mathieu Desnoyers CC: Andrew Morton CC: linux-api@vger.kernel.org CC: Catalin Marinas CC: Will Deacon --- arch/arm64/include/asm/unistd32.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/arm64/include/asm/unistd32.h b/arch/arm64/include/asm/unistd32.h index cef934a..d97be80 100644 --- a/arch/arm64/include/asm/unistd32.h +++ b/arch/arm64/include/asm/unistd32.h @@ -797,3 +797,5 @@ __SYSCALL(__NR_memfd_create, sys_memfd_create) __SYSCALL(__NR_bpf, sys_bpf) #define __NR_execveat 387 __SYSCALL(__NR_execveat, compat_sys_execveat) +#define __NR_membarrier 388 +__SYSCALL(__NR_membarrier, sys_membarrier) -- 1.9.1