Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp9678760imu; Wed, 5 Dec 2018 08:33:42 -0800 (PST) X-Google-Smtp-Source: AFSGD/Vt8BsfEp8v3A/4r3wsq2vOxZCX1RkaOzAyRBu7Ee3ytnSoA9zmqYLkP6lB7nKFH3cZLKWN X-Received: by 2002:a63:9306:: with SMTP id b6mr20196541pge.36.1544027622777; Wed, 05 Dec 2018 08:33:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544027622; cv=none; d=google.com; s=arc-20160816; b=frexeAU+op4TmTc12/h7Qh4DzIRm1Cb+5C4gRC7DILAg44QTYBG8vkPhwQG24e/sRg 4hLUyt1nUPEQqt8ijAURTgBp7kc7nARMNXDOBYMKuGI9ISe+aQkzNOQJaLfq8x0+yF3O WU4342BcTMhGeXlz3Xcuk0YoGrx3SCm/iPPThc4eERLuKu15EEQXT9w1IGmdQcAqs0jK kDYG7Qt//WZW13cqXe4U7pqy5NL9VhCHBjXV1sk8y1U/ymOWRjl5Jn75U6useNqwbdPf sDGlm0DN5asN44ndlQd6WeFzOhODUicObCYK07IF24ss0Hd0sekasAgdf93Ek94UskX8 HeQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=X37BQW0g0tcydEEvHrBv8nL72bkni3liBD/RPSPSlsg=; b=zrzmSZK1qFPoc7IBsizPE137dRZ/TzGjAEzazgeoH9qFZCXGxb6wYEihJftXUCzxYp SPqIzbY6qk6UryKGrnjkL56tchVKJGefq/xhKr9upUuswncvXDFhMtodT970vcEJiF9s rKXEbal9kpQIlhze6WfADTKUxwxeAIXYqqX5k1QKYkkmLWA+DZcLjmsDhAIBhglmOT7c ssDM97S3DzpVRxrLvH9vpXG8MvinXDIGxSQ6o/K4wsz5w3/Xhox1W5cu4oh4ZtE0w5Yb wdlVDlyNQk8hKMRruv2O7iUZw5PM0Fd6+L7IcHMflvGPJ+miEbBJY9QQTGSZ80gqJyZx roTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Os7JCdUI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w6si20196176pfb.191.2018.12.05.08.33.26; Wed, 05 Dec 2018 08:33:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Os7JCdUI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727836AbeLEQas (ORCPT + 99 others); Wed, 5 Dec 2018 11:30:48 -0500 Received: from mail.kernel.org ([198.145.29.99]:42666 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727737AbeLEQar (ORCPT ); Wed, 5 Dec 2018 11:30:47 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 484E62082B; Wed, 5 Dec 2018 16:30:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544027446; bh=dHQfDerNuj2N49NiI3C9axw+52chXrULOjae4wogl1g=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Os7JCdUIi7I/vQg1fUg0wshtF77uk+pcyYzqkvGHPRkWTpDx6aRB2urU30GrireD1 suuxBYKOP0ydlCJtcctmi5mboc/5zVAlOzjhgfaKgAtbKLAFLMuDQzhck7wTY7BDDv 47WLvZ5kr5RVhggiGLw0T51YXbVu1RmEJeTSDvnE= Date: Wed, 5 Dec 2018 17:30:44 +0100 From: Greg KH To: Peter Rajnoha Cc: rafael@kernel.org, jeyu@kernel.org, linux-kernel@vger.kernel.org, msekleta@redhat.com Subject: Re: [PATCH 0/2] Fix return code and improve feature check for synthetic uevents Message-ID: <20181205163044.GB7185@kroah.com> References: <20181205112745.12276-1-prajnoha@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181205112745.12276-1-prajnoha@redhat.com> User-Agent: Mutt/1.11.0 (2018-11-25) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 05, 2018 at 12:27:43PM +0100, Peter Rajnoha wrote: > Two small patches to aid handling of synthetic uevents back in userspace: > > - Return error code back to userspace on /sys/.../uevent file write > failure so userspace knows and it can act accordingly. > > - Add new 'kernel/uevent_features' sysfs file to make it possible for > userspace to check that the extended synthetic uevent arguments are > supported without relying on kernel version check only. > > Peter Rajnoha (2): > kobject: return error code if writing /sys/.../uevent fails > kobject: add kernel/uevent_features sysfs file Did you send this series twice? Which one should I pay attention to? confused, greg k-h