From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752825AbcEMK4E (ORCPT ); Fri, 13 May 2016 06:56:04 -0400 Received: from mail-bl2on0080.outbound.protection.outlook.com ([65.55.169.80]:60336 "EHLO na01-bl2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751806AbcEMKz6 (ORCPT ); Fri, 13 May 2016 06:55:58 -0400 Authentication-Results: arm.com; dkim=none (message not signed) header.d=none;arm.com; dmarc=none action=none header.from=caviumnetworks.com; Date: Fri, 13 May 2016 13:51:15 +0300 From: Yury Norov To: Catalin Marinas CC: "Zhangjian (Bamvor)" , , , Kefeng Wang , , , , , , , , , , , , , , , Subject: Re: [RFC6 PATCH v6 00/21] ILP32 for ARM64 Message-ID: <20160513105115.GA16672@yury-N73SV> References: <1459894127-17698-1-git-send-email-ynorov@caviumnetworks.com> <20160512002000.GA30997@yury-N73SV> <20160512133533.GF11226@e104818-lin.cambridge.arm.com> <20160512134431.GB30205@yury-N73SV> <20160512140734.GG11226@e104818-lin.cambridge.arm.com> <20160512142457.GC30205@yury-N73SV> <20160512152805.GJ11226@e104818-lin.cambridge.arm.com> <57358C2B.1010106@huawei.com> <20160513092802.GA13400@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20160513092802.GA13400@localhost.localdomain> User-Agent: Mutt/1.5.23 (2014-03-12) X-Originating-IP: [95.143.213.121] X-ClientProxiedBy: AM3PR03CA044.eurprd03.prod.outlook.com (10.141.191.172) To BN4PR07MB2228.namprd07.prod.outlook.com (10.164.63.146) X-MS-Office365-Filtering-Correlation-Id: 3654fd3c-3c07-4d98-499c-08d37b1d26c4 X-Microsoft-Exchange-Diagnostics: 1;BN4PR07MB2228;2:HDNWMANoLZv6MSoljv37WYi1dnjU7w6b7SYPbJ3QNM34z0sLATyo1QzioBcmvCMa0e85Xi6MWzGSMYvC4i+mfEg6lg11HnRIvzVWoQa2zNhRMV+XlCGS2DDDw1V8QKOdj2oTrXb5iZy9dO4YoCW2t4RymyVnR+BQZoGZAedbf/8AQ2MbTMUluhPoS1rfPt1r;3:3l8psITWeRp7VTTlccM30z1/b0a2zAsl9qA7Bav6blxSMy96RlYC5c74g3ODXBQoEaDZuIzY3d3N6N6frQnb5NVxplLFKW4CmKAxJbVKE+EiP+q1jeBT20wWFxvY6vMX;25:nwwAd/KAL0GyCDMiszTZCJPD5vS/Ke8pdc7WDEcpOX7ilJOPKvoUsmrNHtdygnXkkGTjwccw2WvSAgMCJRnA5osFdJGJOOcLISOaiRIeC5zOUqYlLBUw2EFtARVNn2hGt+7SUeBEn+JPBowmm9dC/JFA8fZRdyabE6rcLgOux6i7mrSTtaxo+Csm9T/QJmo8vDSwfzmrTB1DyWDCVOT24hr9nC89TU8GIcYsbvFZuZKylje/h8rTR+rf0hhs/sceKagCJCZENcBKUTL221DtvKSVJMjL1os8hOz2tL27G/VxCTwR6ufoHIONm1BFRephcu/7LarBtMQTh8Ao+J5e7Xra5dmKKmGe9xHJlht4OzwuKkrtV/iyzMnkwZ/w2S7erwBvSobwKKFbVkoTR0XQb4bzZa4lbtbZEFDhgIOSuOo= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN4PR07MB2228; X-Microsoft-Exchange-Diagnostics: 1;BN4PR07MB2228;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046);SRVR:BN4PR07MB2228;BCL:0;PCL:0;RULEID:;SRVR:BN4PR07MB2228; X-Microsoft-Exchange-Diagnostics: 1;BN4PR07MB2228;4:cHtWEIbptn4b7GD1hWEoKpDLjUjib8KVqxdltDB/Xu2CkFxNJKLfwTj0NS1NolWs7sHFvxd7XTQq3+vMgMKrFYGXctNb3pFOKXPRhye/969e/P/sH1b8L1B+mdhNMiqSgLFD20o0+bRKqUwvj/SW9HTlapUa+DpHy/B18SddPwMfG7xbPtzzTQ49DiODH39omOT0oGEZ0b7QHlPmVE6D8jmwlbiuutv8zIXltbDcBQQbpzilHSSaCvmfpLBf3fcsQtxyTc80u7CsWBDHubpVOXO3vlONsyJf9IZBPVig1jIX+ul0yP9Cd2tVfEwBRVQbTaZy7M6Y+g4LEhrEnzWKyRBbkeJSESvaWUhmKsTnpwLlZWyq3EhpIaIiqXJRj72k X-Forefront-PRVS: 0941B96580 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6069001)(6009001)(24454002)(33716001)(19580395003)(15975445007)(77096005)(92566002)(19580405001)(6116002)(3846002)(575784001)(586003)(5008740100001)(23726003)(97756001)(2950100001)(83506001)(93886004)(1076002)(5004730100002)(76176999)(54356999)(50986999)(46406003)(9686002)(81166006)(8676002)(50466002)(2906002)(4326007)(4001350100001)(66066001)(1720100001)(76506005)(47776003)(110136002)(189998001)(33656002)(42186005);DIR:OUT;SFP:1101;SCL:1;SRVR:BN4PR07MB2228;H:localhost;FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;BN4PR07MB2228;23:KDRa/vYtNndYVfy2Q4ed5QvqqCmL2/2gA9lm9u0kZ?= =?us-ascii?Q?mVEvprC+8LgiVRYPQJo9q+7F2/9oBqvwimI+jG0k9ybQmhREB0D9WHNAKksV?= =?us-ascii?Q?AwSCFAfRgdII8N3SNORl7NI0fzP5tCzdRYcom+TXMItDI4Uw1t/a/t1oSnJu?= =?us-ascii?Q?OhDO5K+xJKw6OEyVq1kVPg1qQidwvIiX6jGK/t8wzLoewUEullkEMrjEySow?= =?us-ascii?Q?Jiyd5K5hCiHpYUzzfP16DL3WFr2Vps6bH/RNulKcmZEERUtPMafXgmM5UZpD?= =?us-ascii?Q?CSLGvXvx27MuuEBDixEqCnnxKIFbs4TnYzkrZitG82Saoz17Igh7u8aib/AC?= =?us-ascii?Q?YqDOKWa1a4PdU7kCxLqgnKOit49Gxp1G0lpWRMvf9JUBMzq1TjA5vPhuZ0FZ?= =?us-ascii?Q?R4nohwxSxN/4xF9XpDefncXcAWtOpfhfkajip8CSEWcQfYaxp++m5ebpc9uz?= =?us-ascii?Q?QRRBHItbrq26zYrl1x55SeoS7YGfcEhxZ2+j4doDwsNoxHnzLnbeohE/efkR?= =?us-ascii?Q?QATm2TG7l2cs9kd0dE63xIJAv71erxVK7Qvz3kMV2JnxjDFYcqotXKxFbhJG?= =?us-ascii?Q?2kVfRmzOvG9pAnLDxbS2Tj6nhSXwvV1LbxN70RWHLmLDVIE0kz9NLvZ8Z6Qp?= =?us-ascii?Q?at3s8iwJ5Lz1zg7EWZoQpEES8p8fTANajgOFyTkjpl/Lw0vgkLYen2Z2d0yr?= =?us-ascii?Q?BtVbjL4155ZC0nkeQ3WgUwLfUEw0OGGfKV98lPdmzgv4FWWHvr25Tq0x8ofO?= =?us-ascii?Q?YmUa9CbIQtZFIS2780z52Ba6TwkEk9+ieJ8ofy0flaeWNFKNyljfRzMXRr2T?= =?us-ascii?Q?DuGmISSD2yfdFlIRH+dlPDnOFNx/nfCoXNidsN3vNEOzbn54SoKlt9dwJp/a?= =?us-ascii?Q?k0PTKL8brLHTxAs1xhsEYb/x+hZebOcVkpWw9IzrMEfdA9GxgHwoCoSwz5JV?= =?us-ascii?Q?Px/6egydY9VbGyOourm6ixTtO67ZrilDFATrfNkEhulGhwwnT+gGxcV5aVIt?= =?us-ascii?Q?APUOb1ab9MT8vDhIP0ElQcRHRl/IMFb2gMt8w9Y9YFs3H2w/xcx+8MdvsfwK?= =?us-ascii?Q?K0fWt41jbd81UOh2MTKztlTezwYRUoXQWg4o2nW/afEmdHB+w=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1;BN4PR07MB2228;5:T/aZULvr5rX1SnzgSGop+QkxL6/J24ZqTPz3mm25TTTGXBDL9xNPyCtIo7uTuziUadBDFZEVMlaeKAdz7BMZTJo1sl48z3JsuvAaRPRNIwUl4UH9jFNSIYWZhG8KzxA1iVM0hzffu3T76M8Qmo/KJg==;24:RRw4KH7RT+5XgClIqix8tLYv/DbZ9o+FfohjNg8wMtoLjF7exqT6YQTN+H1zWV5d+hwS0dDBEOn4JU31EqzyuqgewSqPQioQczFAxkiAiMw=;7:Ko/Qzg55a3P1WJZJwr8k+pEJ1HaXOJMwAMEijKPBfiMJSc99mgi1GlIBNVBStFdQnCa3U3ti4LNylCA+6C8RsSs2e05z0JwLFVcyixFo2qIGOv5jFhZhnJd+16sGvmzOnUzAoLXI0ZSjGnMzQQguKyzKbZiZGwgiwESeINexb2yO/bGd43bT4X6kbBIgPrrq SpamDiagnosticOutput: 1:23 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 May 2016 10:55:52.1069 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN4PR07MB2228 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 13, 2016 at 09:28:03AM +0000, Catalin Marinas wrote: > > The discussion is mainly around whether USER_DS for 32-bit compat apps > should be the same as USER_DS for native 32-bit apps. Even for native > 32-bit kernels, we don't use STACK_TOP as addr_limit. A read/write from > 0xffffffff would fail in both cases anyway. I think the LTP test doesn't > even try to access such memory but only to probe the range validity (I > haven't managed to build the latest LTP yet). This fix lets me build it (on top of 7b3ef3b0b) Of course, it's not 'official'. :) --- testcases/kernel/syscalls/fstatat/fstatat01.c | 1 + testcases/kernel/syscalls/preadv/preadv.h | 1 + testcases/kernel/syscalls/pwritev/pwritev.h | 1 + testcases/kernel/syscalls/request_key/Makefile | 2 +- 4 files changed, 4 insertions(+), 1 deletion(-) diff --git a/testcases/kernel/syscalls/fstatat/fstatat01.c b/testcases/kernel/syscalls/fstatat/fstatat01.c index 128f6dd..6e23c9e 100644 --- a/testcases/kernel/syscalls/fstatat/fstatat01.c +++ b/testcases/kernel/syscalls/fstatat/fstatat01.c @@ -59,6 +59,7 @@ static const char *filenames[TEST_CASES]; static const int expected_errno[] = { 0, 0, ENOTDIR, EBADF, EINVAL, 0 }; static const int flags[] = { 0, 0, 0, 0, 9999, 0 }; +#define HAVE_FSTATAT #if !defined(HAVE_FSTATAT) #if (__NR_fstatat64 > 0) int fstatat(int dirfd, const char *filename, struct stat64 *statbuf, int flags) diff --git a/testcases/kernel/syscalls/preadv/preadv.h b/testcases/kernel/syscalls/preadv/preadv.h index f3ac30d..b001389 100644 --- a/testcases/kernel/syscalls/preadv/preadv.h +++ b/testcases/kernel/syscalls/preadv/preadv.h @@ -21,6 +21,7 @@ #include "config.h" #include "linux_syscall_numbers.h" +#define HAVE_PREADV #if !defined(HAVE_PREADV) int preadv(int fd, const struct iovec *iov, int iovcnt, off_t offset) { diff --git a/testcases/kernel/syscalls/pwritev/pwritev.h b/testcases/kernel/syscalls/pwritev/pwritev.h index ae9d999..2a4d188 100644 --- a/testcases/kernel/syscalls/pwritev/pwritev.h +++ b/testcases/kernel/syscalls/pwritev/pwritev.h @@ -21,6 +21,7 @@ #include "config.h" #include "linux_syscall_numbers.h" +#define HAVE_PWRITEV #if !defined(HAVE_PWRITEV) int pwritev(int fd, const struct iovec *iov, int iovcnt, off_t offset) { diff --git a/testcases/kernel/syscalls/request_key/Makefile b/testcases/kernel/syscalls/request_key/Makefile index 9add429..2e8a37c 100644 --- a/testcases/kernel/syscalls/request_key/Makefile +++ b/testcases/kernel/syscalls/request_key/Makefile @@ -19,6 +19,6 @@ top_srcdir ?= ../../../.. include $(top_srcdir)/include/mk/testcases.mk -LDLIBS += $(KEYUTILS_LIBS) +LDLIBS += $(lkeyutils) include $(top_srcdir)/include/mk/generic_leaf_target.mk -- 2.5.0 > > -- > Catalin > > _______________________________________________ > linux-arm-kernel mailing list > linux-arm-kernel@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-arm-kernel