Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp794570ybm; Wed, 22 May 2019 11:37:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqxHuSmppRjjvfYdDKP43Ei7hs1oeII55BYPolVdoIn554UnaF7LCnlW0ZaLYisBzhRHLLc+ X-Received: by 2002:a17:902:7045:: with SMTP id h5mr45050228plt.250.1558550254193; Wed, 22 May 2019 11:37:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558550254; cv=none; d=google.com; s=arc-20160816; b=DRFEmWV+C8VoLu5Jz4joU2xoWaUEXCAm5gJuNXkHH9IXrfgYAvKPOxvzt7hxIi0rjo KVq4W3kCbthTMnc8hw4Y2I93R3fWbiLev52kpIKwnEVaDI+K56N6of3POpyJ3m2Dqv3G cD1F4RvH/l9QhVEc38MVRgH9nUqJmQ8yv8pIZwE3sfnk/91oNKm4OKX4I3G6uCyL3kfp gchr1QJQyww1CpnCDqMGYVdU8vkRHpfWZeX6bG2NwpbDgoPV6RmFzmCKdzWJtZj68rM7 lXuYU0WgyV/+JzWheEhVbPA6G9JPUyp7VLURQEbNoRREbwmiInNRnQatnt7dSkmjdQfd 7X+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=yWu16qq1j0tw43ZaYGsrgFnuqKTTsykmok3dPSYF5y4=; b=WnIrQs6oiTzQhOm7MRiULbRvPRhJs1uQz6IKWhDCIWMzT0uhU2HxW5Oi7DQiLDfUvT 7/0cMtKnbc5xwlZ3dd/lBk04yUTu95ykeUepo4yE159s6NeCQLgfUWpWUSwSumt4qo3P dnZTZG01tD/flVGS/1GgJdfg6UoLUzGXqP7qmuPFcFAL2F3T1Ewd4IuuXcvTWlPML61v LYKHX793GTd3Gw4vcbZTVLtIJkRLYGPSzPCsDmYvP+RYK8s+KPcFNZuhRfRyfbpP3H/e 6lPq1Z+Jk24mfDZMBqKk7P0HghArTCmZH3IDitMhnyWr3kABBAY1oEJO0xmzsehAj4Jy PdZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wGAaee79; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q33si26906405pgm.287.2019.05.22.11.37.18; Wed, 22 May 2019 11:37:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wGAaee79; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729559AbfEVSgM (ORCPT + 99 others); Wed, 22 May 2019 14:36:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:52920 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728272AbfEVSgM (ORCPT ); Wed, 22 May 2019 14:36:12 -0400 Received: from localhost.localdomain (c-73-223-200-170.hsd1.ca.comcast.net [73.223.200.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 65ADE21473; Wed, 22 May 2019 18:36:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558550171; bh=643w0e1RwXyPDz2yZkL2WWaU1kzeYkYsjBXV9gFNFsg=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=wGAaee798ILL90HhT88AZgysvLeH4EcomUxmt5iB1XdPXL2FocEbRluGwflT7Qc92 pw7NVvgY6UyvOaHgVZzydkvQ5sxFUppGwvwRfWqStn8WdWEYLfrMOyKZCJIm3ZefUI ialtzgtuEU0eh5yXJkbk6VCH/nGc2AVcUciFEf+8= Date: Wed, 22 May 2019 11:36:10 -0700 From: Andrew Morton To: Arnd Bergmann Cc: Roman Penyaev , Azat Khuzhin , Al Viro , Linus Torvalds , Linux FS-devel Mailing List , Linux Kernel Mailing List Subject: Re: [PATCH v3 13/13] epoll: implement epoll_create2() syscall Message-Id: <20190522113610.51d13f168d70f19a950540b4@linux-foundation.org> In-Reply-To: References: <20190516085810.31077-1-rpenyaev@suse.de> <20190516085810.31077-14-rpenyaev@suse.de> <41b847c48ccbe0c406bd54c16fbc1bf0@suse.de> <20190521193312.42a3fdda1774b1922730e459@linux-foundation.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 22 May 2019 13:14:41 +0200 Arnd Bergmann wrote: > > I thought the preferred approach was to wire up the architectures on > > which the submitter has tested the syscall, then allow the arch > > maintainers to enable the syscall independently? > > I'm hoping to change that practice now, as it has not worked well > in the past: > > - half the architectures now use asm-generic/unistd.h, so they are > already wired up at the same time, regardless of testing > - in the other half, not adding them at the same time actually > made it harder to test, as it was significantly harder to figure > out how to build a modified kernel for a given architecture > than to run the test case > - Not having all architectures add a new call at the same time caused > the architectures to get out of sync when some got added and others > did not. Now that we use the same numbers across all architectures, > that would be even more confusing. > > My plan for the long run is to only have one file to which new > system calls get added in the future. Fair enough. We're adding code to architectures without having tested it on those architectures but we do that all the time anyway - I guess there's not a lot of point in special-casing new syscalls.