Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4280126ybz; Tue, 28 Apr 2020 08:39:56 -0700 (PDT) X-Google-Smtp-Source: APiQypIQREqWXSSVC8TLBfeNSv2C6/2z+N9LvNdW9sbcljNSa3WFYQ8yjnpPjHGSQ8ZfNnhNtd+x X-Received: by 2002:a50:f288:: with SMTP id f8mr23541077edm.337.1588088396296; Tue, 28 Apr 2020 08:39:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588088396; cv=none; d=google.com; s=arc-20160816; b=ii0ZSIUiKHCEQzEbbgu3Q4CiDUpF2TC7rUtD+7y1Msp26R9NmgWR19plDZDSHmLs/8 rMpE4QgiFdS+DlXOY/mH5GEmWEUn2LyPhyk/EfvTMqKD0BABDDg3WAhLbtvvl9ycLq96 d8aSwK+qZa4Ug6wo351NC/ZF4Iy7tTldVsFuD7EhI+wB72j+FoMdfh+MtzHRYN3y296M CApgtyMCV/9oYft+D6uCdeY3xlIAJTDJZE/xRYbg0ftMNOohfEqaNQlaJypDOEmpjRt8 CD8CGMZsOXAcVGwg8qbtIfF49VTWXtuqAcJ2V/R2Uo5dqv5jq2pKus/E+7c0Y6Kxg9ZB iOoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=NYYsuXcMgxnBybqRdlA4CEiH3BNj9Uc8ElQ0y7PsliM=; b=eTXyUQqewCDeiXENqN4XnVOt0HIetRebbJJeI9jlrlLaojhv9ELF/03gtRtiF1dC+V un9b/MndiVL70f/ZLGcw/Hx+hhYztshJ+Vn+holkTL80fyJyffQ9RsEH7J6HoW2yF+o5 xqPO++XEh3dUtdeyXIF+URebKVvl6nnMaLTLvJKdzdDLCbhMP+H4iW+w1pLJn5oPL15c wEGTxB1Dr2EXVHwxprfsH136p4KSDZeLbvAucdbj2lXPRnVJxrVCpnnrjJepHPcrj3X0 dMVDUC2/eYAuV80VY1FGXCRtEewbk3PgRVbroUBia8liOntsLFz32i5pyqPWq08dazoM bbDw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cx19si1963439edb.230.2020.04.28.08.39.33; Tue, 28 Apr 2020 08:39:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728179AbgD1PgR (ORCPT + 99 others); Tue, 28 Apr 2020 11:36:17 -0400 Received: from mout-p-202.mailbox.org ([80.241.56.172]:63956 "EHLO mout-p-202.mailbox.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727931AbgD1PgQ (ORCPT ); Tue, 28 Apr 2020 11:36:16 -0400 Received: from smtp2.mailbox.org (smtp2.mailbox.org [80.241.60.241]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mout-p-202.mailbox.org (Postfix) with ESMTPS id 49BQjB3yHRzQlHm; Tue, 28 Apr 2020 17:36:14 +0200 (CEST) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp2.mailbox.org ([80.241.60.241]) by spamfilter04.heinlein-hosting.de (spamfilter04.heinlein-hosting.de [80.241.56.122]) (amavisd-new, port 10030) with ESMTP id Rw9K7dG0uHR5; Tue, 28 Apr 2020 17:36:10 +0200 (CEST) Date: Wed, 29 Apr 2020 01:35:58 +1000 From: Aleksa Sarai To: Cyril Hrubis Cc: kernel test robot , Josh Triplett , linux-arch@vger.kernel.org, Jens Axboe , Arnd Bergmann , linux-kernel@vger.kernel.org, lkp@lists.01.org, Alexander Viro , linux-fsdevel@vger.kernel.org, io-uring@vger.kernel.org, ltp@lists.linux.it Subject: Re: [LTP] [fs] ce436509a8: ltp.openat203.fail Message-ID: <20200428153558.r32pgvymgk56urtu@yavin.dot.cyphar.com> References: <20200427135210.GB5770@shao2-debian> <20200427142733.GD7661@rei> <20200428005126.6wncibudt6ohghvc@yavin.dot.cyphar.com> <20200428153022.GC4244@yuki.lan> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="qekeybbajeoqkaf2" Content-Disposition: inline In-Reply-To: <20200428153022.GC4244@yuki.lan> X-Rspamd-Queue-Id: D19511738 X-Rspamd-Score: -8.94 / 15.00 / 15.00 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --qekeybbajeoqkaf2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2020-04-28, Cyril Hrubis wrote: > Hi! > > > > commit: ce436509a8e109330c56bb4d8ec87d258788f5f4 ("[PATCH v4 2/3] f= s: openat2: Extend open_how to allow userspace-selected fds") > > > > url: https://github.com/0day-ci/linux/commits/Josh-Triplett/Support= -userspace-selected-fds/20200414-102939 > > > > base: https://git.kernel.org/cgit/linux/kernel/git/shuah/linux-ksel= ftest.git next > > >=20 > > > This commit adds fd parameter to the how structure where LTP test was > > > previously passing garbage, which obviously causes the difference in > > > errno. > > >=20 > > > This could be safely ignored for now, if the patch gets merged the te= st > > > needs to be updated. > >=20 > > It wouldn't be a bad idea to switch the test to figure out the ksize of > > the struct, so that you only add bad padding after that. But then again, > > this would be a bit ugly -- having CHECK_FIELDS would make this simpler. >=20 > Any pointers how can be the size figured out without relying on the > E2BIG we are testing for? Does the kernel export it somewhere? No, you would have to effectively binary search on -E2BIG at the moment. CHECK_FIELDS is a proposal I have which would allow you to get get the size of the in-kernel struct, but it's still a proposal. In theory you could get the size through BTF, but it's probably more effort than it's worth to implement that. --=20 Aleksa Sarai Senior Software Engineer (Containers) SUSE Linux GmbH --qekeybbajeoqkaf2 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQSxZm6dtfE8gxLLfYqdlLljIbnQEgUCXqhNWwAKCRCdlLljIbnQ Esn9AQCkc2dq/DSy5/MYZkNgJc7GfzxvLJGPqfhRlbD3A09eyQEA0CfnnSVqWzit PCqYg2CM/EUK36nHPWj7vQb7o8bFSQo= =TzFl -----END PGP SIGNATURE----- --qekeybbajeoqkaf2--