On Thu, Aug 27, 2015 at 06:56:49PM +0100, Mathieu Desnoyers wrote: > arm64 sys_membarrier number is already wired for arm64 through > asm-generic/unistd.h, but needs to be allocated separately for > the 32-bit compability layer of arm64. > > [ Untested on this architecture. To try it out: fetch linux-next/akpm, > apply this patch, build/run a membarrier-enabled kernel, and do make > kselftest. ] > > Signed-off-by: Mathieu Desnoyers <mathieu.desnoy...@efficios.com> > CC: Andrew Morton <a...@linux-foundation.org> > CC: linux-...@vger.kernel.org > CC: Catalin Marinas <catalin.mari...@arm.com> > CC: Will Deacon <will.dea...@arm.com> > --- > arch/arm64/include/asm/unistd32.h | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/arch/arm64/include/asm/unistd32.h > b/arch/arm64/include/asm/unistd32.h > index cef934a..d97be80 100644 > --- a/arch/arm64/include/asm/unistd32.h > +++ b/arch/arm64/include/asm/unistd32.h > @@ -797,3 +797,5 @@ __SYSCALL(__NR_memfd_create, sys_memfd_create) > __SYSCALL(__NR_bpf, sys_bpf) > #define __NR_execveat 387 > __SYSCALL(__NR_execveat, compat_sys_execveat) > +#define __NR_membarrier 388 > +__SYSCALL(__NR_membarrier, sys_membarrier)
I think people have made similar comments for other architectures, but please also updated __NR_compat_syscalls when adding new compat syscalls here. Will -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/