Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4874968ybi; Tue, 28 May 2019 04:04:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqxAbcSdXDk/ZLde3Eia9aS6haJ2xniYh8qvlQlMPWPbNilh9Ssuo/kqzNy/b9I+9Jb/XVqi X-Received: by 2002:a65:4907:: with SMTP id p7mr129955907pgs.288.1559041495177; Tue, 28 May 2019 04:04:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559041495; cv=none; d=google.com; s=arc-20160816; b=wJfZ6yOOwSzPfNEc69xDKJrR5qvY2eOO9PTPCFB22g6MC7RJ8Bjyb3V4sNtJwOes3p 69qMDdxYO5HaAXDH/b0/2s6+/+bcMBfW7lFK0ewhNyzKtoDBuNp2Z2VB35PEvHkYZ0V9 skWbL+VAyUS4PdQFPeoX9VgaGRw1cm+KWB0uli/yIKGNJYzMkX7cocw4Sp3mUGaptmbZ F5RLDMgKDN1g4RBPSrPXO6isG8iqAY/FfP6oJA1Dfev0Xg2ZLtiTSlxjyT57uXW5oVDH NZ4i27BusuWYnfQ1ojwgrcvjK52oN/ZfRD+psYAzkC0Kg9LMDNJ0fYuLPHv9GXhJIMog zTbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :in-reply-to:date:references:subject:cc:to:from; bh=OUfvyr6WC4RXVSVBWfm3Yz7gN0wtaDcXcOWuiEkSRmE=; b=N9uvEpU+ULUPrJu7HawVKPcM4FU3MTTcnCvWTuY8HFdZSo1yWxAslKRF/oHn/CFEgl jYdX6fhQVPpDxKYJJM0i1+Y2U9OdmFZ2V6De/gBEJyiE1mpsOxPLsBx6VnVvW0Q1WTJm Ak4u+F4864tRXpci+6aPTBYvPErxpsMoYdBIHNLThg4U/gnQCRjKg3nH+7DhI5S+CFR4 95jOC0f44U2htrEvQEc1KyF0W0JcK3NmzmpgJwexypQsRGtXK5pw3sHc/eAXNhWQIvou PIx+zmn3EhtlY6t+04bu3nt6bkKYp2WCIXS0UIYC+gqPQ3Bi3Y1lnXZI19XL+wPanqsL iOhw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q205si24984699pfc.151.2019.05.28.04.04.38; Tue, 28 May 2019 04:04:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726668AbfE1LD0 (ORCPT + 99 others); Tue, 28 May 2019 07:03:26 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55986 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726400AbfE1LDZ (ORCPT ); Tue, 28 May 2019 07:03:25 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 44A8E307B963; Tue, 28 May 2019 11:03:25 +0000 (UTC) Received: from oldenburg2.str.redhat.com (ovpn-116-154.ams2.redhat.com [10.36.116.154]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C1D0A1B479; Tue, 28 May 2019 11:03:21 +0000 (UTC) From: Florian Weimer To: Cyril Hrubis Cc: Andreas Schwab , lkml , linux-alpha@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, linux-m68k@lists.linux-m68k.org, Michal Simek , linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, linux-xtensa@linux-xtensa.org, linux-fsdevel@vger.kernel.org, linux-api@vger.kernel.org Subject: Re: [PATCH] [RFC] Remove bdflush syscall stub References: <20190528101012.11402-1-chrubis@suse.cz> <20190528104017.GA11969@rei> Date: Tue, 28 May 2019 13:03:20 +0200 In-Reply-To: <20190528104017.GA11969@rei> (Cyril Hrubis's message of "Tue, 28 May 2019 12:40:18 +0200") Message-ID: <87ftoyg7t3.fsf@oldenburg2.str.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.47]); Tue, 28 May 2019 11:03:25 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Cyril Hrubis: > Hi! >> > I've tested the patch on i386. Before the patch calling bdflush() with >> > attempt to tune a variable returned 0 and after the patch the syscall >> > fails with EINVAL. >> >> Should be ENOSYS, doesn't it? > > My bad, the LTP syscall wrapper handles ENOSYS and produces skipped > results based on that. > > EINVAL is what you get for not yet implemented syscalls, i.e. new > syscall on old kernel. EINVAL? Is that a bdflush-specific thing, test-specific, or is itmore general? glibc has fallback paths that test for ENOSYS only. EINVAL will be passed to the application, skipping fallback. For missing system calls, this is not what we want. Thanks, Florian