This new syscall was introduced by Linux commit
v4.17-1308-gd7822b1.
* linux/dummy.h (sys_rseq): New macro.
* linux/arm/syscallent.h (398): Add rseq entry.
* linux/i386/syscallent.h (386): Likewise.
* linux/powerpc/syscallent.h (387): Likewise.
* linux/powerpc64/syscallent.h (387): Likewise.
* linux/x32/syscallent.h (334): Likewise.
* linux/x86_64/syscallent.h (334): Likewise.
[395] = { 2, 0, SEN(pkey_alloc), "pkey_alloc" },
[396] = { 1, 0, SEN(pkey_free), "pkey_free" },
[397] = { 5, TD|TF|TSTA, SEN(statx), "statx" },
+[398] = { 4, 0, SEN(rseq), "rseq" },
#ifdef __ARM_EABI__
# define ARM_FIRST_SHUFFLED_SYSCALL 400
#endif
/* still unfinished */
+#define sys_rseq printargs
#define sys_vm86 printargs
#define sys_vm86old printargs
[383] = { 5, TD|TF|TSTA, SEN(statx), "statx" },
[384] = { 2, TP, SEN(arch_prctl), "arch_prctl" },
[385] = { 6, 0, SEN(io_pgetevents), "io_pgetevents" },
+[386] = { 4, 0, SEN(rseq), "rseq" },
#define SYS_socket_subcall 400
#include "subcall.h"
[384] = { 2, 0, SEN(pkey_alloc), "pkey_alloc" },
[385] = { 1, 0, SEN(pkey_free), "pkey_free" },
[386] = { 4, TM|SI, SEN(pkey_mprotect), "pkey_mprotect" },
+[387] = { 4, 0, SEN(rseq), "rseq" },
#define SYS_socket_subcall 400
#include "subcall.h"
[384] = { 2, 0, SEN(pkey_alloc), "pkey_alloc" },
[385] = { 1, 0, SEN(pkey_free), "pkey_free" },
[386] = { 4, TM|SI, SEN(pkey_mprotect), "pkey_mprotect" },
+[387] = { 4, 0, SEN(rseq), "rseq" },
#define SYS_socket_subcall 400
#include "subcall.h"
[545] = { 5, CST|TD|TF|TP|SE|SI, SEN(execveat), "execveat" },
[546] = { 5, TD, SEN(preadv2), "preadv2" },
[547] = { 5, TD, SEN(pwritev2), "pwritev2" },
+[334] = { 4, 0, SEN(rseq), "rseq" },
[331] = { 1, 0, SEN(pkey_free), "pkey_free" },
[332] = { 5, TD|TF|TSTA, SEN(statx), "statx" },
[333] = { 6, 0, SEN(io_pgetevents), "io_pgetevents" },
+[334] = { 4, 0, SEN(rseq), "rseq" },