Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp2090616ybp; Thu, 10 Oct 2019 02:01:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqwjI9z5NMhjVH//0/dNP0M+zwudESzhKW8/75jg8ioZd+FnT4hxVETMe2Ssg+i0W18dveTm X-Received: by 2002:a17:906:e8d:: with SMTP id p13mr7056129ejf.236.1570698115576; Thu, 10 Oct 2019 02:01:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570698115; cv=none; d=google.com; s=arc-20160816; b=ftjXfb/Itr/WIUdCqc1qOH1uwGtZ7VrZp2XTN2OcKnz/HAjL10bvtOGvzBfBwrTDxR o2aK3lnsSMVY5FaXH6i/IOoxt5juZT31mrCdkh47TLE+NaxCfjoJJVULYVemGBFh+Tsy kusURWlPI+BnVw6IshpHcGDKKMfJvYtFZcVnxmIB8iYEBJeHypBLVYjCjAbijdy+xzMh jexdi6bELd70QfvIXKisCQ0977sukKyj/VydWbLcieqnrwpz5g5H9DTeVetTgl7+bzBl 5jLidd4M1IonfHhFKBr93YeV6RXIpuDD8y6rwu44PUu320Vw6VucWw8NbJ+S+OqHkCM5 4jRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=YCCeCeaRKxxj85VOYhWODTku9GMJ8jItMHopOp7VwVk=; b=A9el8cai29eHQMGBxtdtayM2Ba2nULOrgMVXHRI0waz4MfVmjx9SlYBSD7+184eP/6 InkxvUWpNZ/nvNdq9q0ql+7xxYYtD4LVRq12IykVzH97hexT9TzHDPV81ojZOJ3M0GLf 5nFCcqxy5FDV8zjmo1E82G/f3zoAFJNf5oMeTF+Plry+HKIjtbeJoUw/1Ht2Y3DhIMjL PAvqKF5JOUwtX8MGzJlSM1APmR12lRXWMuPsBHPpuJE32FV+UlFByoWB+xLg87M1BlT5 S1ShqqtVBS2ZrrCGdrZi2Ooon3qDcS3Flxl7P83nMPv6dzCthqThOyCbBHZXdQ+vjiPJ Me/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fyo+w8nW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f14si3361105edf.102.2019.10.10.02.01.32; Thu, 10 Oct 2019 02:01:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fyo+w8nW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388324AbfJJIlY (ORCPT + 99 others); Thu, 10 Oct 2019 04:41:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:45778 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388308AbfJJIlW (ORCPT ); Thu, 10 Oct 2019 04:41:22 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 86B332054F; Thu, 10 Oct 2019 08:41:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570696882; bh=EnWOWXgtHqr3dAFC04IlHKFxsfEX7VQ3jS4M3PIxfbA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fyo+w8nWTDuxTYaUcJJ59o2qCAB87VhbU16r3d1uSjKCN11oBmjZeEOCusSONlM58 W8SjGN69Bxs94l9/P8gWTUN3HG5iBageBg9pp8V/jsNt2cLolMBkDzRZWLfNu42oL9 0Qi+ZCUZL8U1KcwhaVrBZemQCQfQvr0kzj7oYLek= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Seth Forshee , Ingo Molnar , Christian Brauner Subject: [PATCH 5.3 080/148] sched: Add __ASSEMBLY__ guards around struct clone_args Date: Thu, 10 Oct 2019 10:35:41 +0200 Message-Id: <20191010083616.174108522@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191010083609.660878383@linuxfoundation.org> References: <20191010083609.660878383@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Seth Forshee commit 61129dd29f7962f278b618a2a3e8fdb986a66dc8 upstream. The addition of struct clone_args to uapi/linux/sched.h is not protected by __ASSEMBLY__ guards, causing a failure to build from source for glibc on RISC-V. Add the guards to fix this. Fixes: 7f192e3cd316 ("fork: add clone3") Signed-off-by: Seth Forshee Cc: Acked-by: Ingo Molnar Link: https://lore.kernel.org/r/20190917071853.12385-1-seth.forshee@canonical.com Signed-off-by: Christian Brauner Signed-off-by: Greg Kroah-Hartman --- include/uapi/linux/sched.h | 2 ++ 1 file changed, 2 insertions(+) --- a/include/uapi/linux/sched.h +++ b/include/uapi/linux/sched.h @@ -33,6 +33,7 @@ #define CLONE_NEWNET 0x40000000 /* New network namespace */ #define CLONE_IO 0x80000000 /* Clone io context */ +#ifndef __ASSEMBLY__ /* * Arguments for the clone3 syscall */ @@ -46,6 +47,7 @@ struct clone_args { __aligned_u64 stack_size; __aligned_u64 tls; }; +#endif /* * Scheduling policies