[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <370F7C12-ADF7-4365-BA32-35148B7D0280@cisco.com>
Date: Mon, 14 May 2018 15:09:30 +0000
From: "Christian Hansen (chansen3)" <chansen3@...co.com>
To: "catalin.marinas@....com" <catalin.marinas@....com>,
"linux@...inikbrodowski.net" <linux@...inikbrodowski.net>,
"will.deacon@....com" <will.deacon@....com>
CC: "xe-linux-external(mailer list)" <xe-linux-external@...co.com>,
"linux-arm-kernel@...ts.infradead.org"
<linux-arm-kernel@...ts.infradead.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] arm64: allowing mmap to be traced
Indeed, you have the quicker draw. I concede to your patch.
On 2018-05-14, 10:32 AM, "Christian Hansen (chansen3)" <chansen3@...co.com> wrote:
Adding missing macro which is present all other system calls to
to mmap declaration for ARM. This allows it to appear as a kernel
tracing target.
Signed-off-by: Christian Hansen <chansen3@...co.com>
---
arch/arm64/kernel/sys.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/arch/arm64/kernel/sys.c b/arch/arm64/kernel/sys.c
index 72981ba..1ccdbfc 100644
--- a/arch/arm64/kernel/sys.c
+++ b/arch/arm64/kernel/sys.c
@@ -27,9 +27,9 @@
#include <linux/syscalls.h>
#include <asm/cpufeature.h>
-asmlinkage long sys_mmap(unsigned long addr, unsigned long len,
- unsigned long prot, unsigned long flags,
- unsigned long fd, off_t off)
+SYSCALL_DEFINE6(mmap, unsigned long, addr, unsigned long, len,
+ unsigned long, prot, unsigned long, flags,
+ unsigned long, fd, off_t, off)
{
if (offset_in_page(off) != 0)
return -EINVAL;
--
2.5.0
Powered by blists - more mailing lists